Hay
Date
July 11, 2025, 10:11 a.m.
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[  283.324941] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  283.333158] SMP: stopping secondary CPUs
[  283.337081] Kernel Offset: disabled
[  283.340532] CPU features: 0x20000,00000000,10023140,0400721b
[  283.346174] Memory Limit: none
[  283.349246] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  117.649137] ==================================================================
[  117.649260] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[  117.649260] 
[  117.649407] Use-after-free read at 0x(____ptrval____) (in kfence-#228):
[  117.649516]  test_krealloc+0x51c/0x830
[  117.652660]  kunit_try_run_case+0x170/0x3f0
[  117.656827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.662296]  kthread+0x328/0x630
[  117.665507]  ret_from_fork+0x10/0x20
[  117.669066] 
[  117.670545] kfence-#228: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[  117.670545] 
[  117.680180] allocated by task 421 on cpu 3 at 117.649048s (0.031129s ago):
[  117.687056]  test_alloc+0x29c/0x628
[  117.690507]  test_krealloc+0xc0/0x830
[  117.694153]  kunit_try_run_case+0x170/0x3f0
[  117.698320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.703788]  kthread+0x328/0x630
[  117.707000]  ret_from_fork+0x10/0x20
[  117.710559] 
[  117.712039] freed by task 421 on cpu 3 at 117.649075s (0.062959s ago):
[  117.718565]  krealloc_noprof+0x148/0x360
[  117.722451]  test_krealloc+0x1dc/0x830
[  117.726185]  kunit_try_run_case+0x170/0x3f0
[  117.730350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.735819]  kthread+0x328/0x630
[  117.739031]  ret_from_fork+0x10/0x20
[  117.742591] 
[  117.744076] CPU: 3 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  117.755187] Tainted: [B]=BAD_PAGE, [N]=TEST
[  117.759345] Hardware name: WinLink E850-96 board (DT)
[  117.764382] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  117.424346] ==================================================================
[  117.424491] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[  117.424491] 
[  117.424661] Use-after-free read at 0x(____ptrval____) (in kfence-#226):
[  117.425547]  test_memcache_typesafe_by_rcu+0x280/0x560
[  117.430667]  kunit_try_run_case+0x170/0x3f0
[  117.434834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.440303]  kthread+0x328/0x630
[  117.443514]  ret_from_fork+0x10/0x20
[  117.447073] 
[  117.448551] kfence-#226: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[  117.448551] 
[  117.457666] allocated by task 419 on cpu 3 at 117.381077s (0.076587s ago):
[  117.464540]  test_alloc+0x230/0x628
[  117.467993]  test_memcache_typesafe_by_rcu+0x15c/0x560
[  117.473114]  kunit_try_run_case+0x170/0x3f0
[  117.477280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.482749]  kthread+0x328/0x630
[  117.485961]  ret_from_fork+0x10/0x20
[  117.489520] 
[  117.490998] freed by task 419 on cpu 3 at 117.381092s (0.109904s ago):
[  117.497521]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[  117.502629]  kunit_try_run_case+0x170/0x3f0
[  117.506796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.512263]  kthread+0x328/0x630
[  117.515474]  ret_from_fork+0x10/0x20
[  117.519035] 
[  117.520520] CPU: 3 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  117.531630] Tainted: [B]=BAD_PAGE, [N]=TEST
[  117.535788] Hardware name: WinLink E850-96 board (DT)
[  117.540826] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   94.717731] ==================================================================
[   94.717934] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   94.717934] 
[   94.718093] Invalid read at 0x(____ptrval____):
[   94.719198]  test_invalid_access+0xdc/0x1f0
[   94.723403]  kunit_try_run_case+0x170/0x3f0
[   94.727624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.733237]  kthread+0x328/0x630
[   94.736210]  ret_from_fork+0x10/0x20
[   94.739915] 
[   94.741335] CPU: 5 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   94.752446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.756557] Hardware name: WinLink E850-96 board (DT)
[   94.761626] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   94.373131] ==================================================================
[   94.373266] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   94.373266] 
[   94.373416] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#221):
[   94.377100]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   94.382306]  kunit_try_run_case+0x170/0x3f0
[   94.386473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.391942]  kthread+0x328/0x630
[   94.395153]  ret_from_fork+0x10/0x20
[   94.398712] 
[   94.400190] kfence-#221: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   94.400190] 
[   94.409826] allocated by task 409 on cpu 4 at 94.373051s (0.036773s ago):
[   94.416613]  test_alloc+0x29c/0x628
[   94.420066]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   94.425187]  kunit_try_run_case+0x170/0x3f0
[   94.429354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.434823]  kthread+0x328/0x630
[   94.438036]  ret_from_fork+0x10/0x20
[   94.441595] 
[   94.443072] freed by task 409 on cpu 4 at 94.373067s (0.070002s ago):
[   94.449511]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   94.454703]  kunit_try_run_case+0x170/0x3f0
[   94.458868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.464336]  kthread+0x328/0x630
[   94.467548]  ret_from_fork+0x10/0x20
[   94.471109] 
[   94.472595] CPU: 4 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   94.483703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.487861] Hardware name: WinLink E850-96 board (DT)
[   94.492899] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   94.165097] ==================================================================
[   94.165237] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   94.165237] 
[   94.165402] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#219):
[   94.167074]  test_kmalloc_aligned_oob_read+0x238/0x468
[   94.172195]  kunit_try_run_case+0x170/0x3f0
[   94.176362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.181830]  kthread+0x328/0x630
[   94.185042]  ret_from_fork+0x10/0x20
[   94.188601] 
[   94.190080] kfence-#219: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   94.190080] 
[   94.199715] allocated by task 407 on cpu 5 at 94.165062s (0.034651s ago):
[   94.206501]  test_alloc+0x29c/0x628
[   94.209955]  test_kmalloc_aligned_oob_read+0x100/0x468
[   94.215076]  kunit_try_run_case+0x170/0x3f0
[   94.219243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.224712]  kthread+0x328/0x630
[   94.227923]  ret_from_fork+0x10/0x20
[   94.231484] 
[   94.232970] CPU: 5 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   94.244077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.248237] Hardware name: WinLink E850-96 board (DT)
[   94.253275] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   87.989104] ==================================================================
[   87.989227] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   87.989227] 
[   87.989361] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#160):
[   87.989527]  test_corruption+0x284/0x378
[   87.993061]  kunit_try_run_case+0x170/0x3f0
[   87.997227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.002696]  kthread+0x328/0x630
[   88.005908]  ret_from_fork+0x10/0x20
[   88.009467] 
[   88.010946] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   88.010946] 
[   88.020580] allocated by task 395 on cpu 4 at 87.989039s (0.031538s ago):
[   88.027365]  test_alloc+0x29c/0x628
[   88.030821]  test_corruption+0x198/0x378
[   88.034728]  kunit_try_run_case+0x170/0x3f0
[   88.038893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.044362]  kthread+0x328/0x630
[   88.047574]  ret_from_fork+0x10/0x20
[   88.051135] 
[   88.052611] freed by task 395 on cpu 4 at 87.989054s (0.063554s ago):
[   88.059053]  test_corruption+0x284/0x378
[   88.062938]  kunit_try_run_case+0x170/0x3f0
[   88.067105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.072574]  kthread+0x328/0x630
[   88.075785]  ret_from_fork+0x10/0x20
[   88.079346] 
[   88.080830] CPU: 4 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   88.091939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.096099] Hardware name: WinLink E850-96 board (DT)
[   88.101136] ==================================================================
[   88.833102] ==================================================================
[   88.833240] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   88.833240] 
[   88.833376] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#168):
[   88.835773]  test_corruption+0x120/0x378
[   88.839677]  kunit_try_run_case+0x170/0x3f0
[   88.843846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.849313]  kthread+0x328/0x630
[   88.852524]  ret_from_fork+0x10/0x20
[   88.856083] 
[   88.857561] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   88.857561] 
[   88.866677] allocated by task 397 on cpu 2 at 88.833031s (0.033644s ago):
[   88.873464]  test_alloc+0x230/0x628
[   88.876916]  test_corruption+0xdc/0x378
[   88.880737]  kunit_try_run_case+0x170/0x3f0
[   88.884902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.890371]  kthread+0x328/0x630
[   88.893583]  ret_from_fork+0x10/0x20
[   88.897142] 
[   88.898620] freed by task 397 on cpu 2 at 88.833044s (0.065572s ago):
[   88.905061]  test_corruption+0x120/0x378
[   88.908947]  kunit_try_run_case+0x170/0x3f0
[   88.913114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.918583]  kthread+0x328/0x630
[   88.921794]  ret_from_fork+0x10/0x20
[   88.925355] 
[   88.926840] CPU: 2 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   88.937947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.942108] Hardware name: WinLink E850-96 board (DT)
[   88.947145] ==================================================================
[   89.057100] ==================================================================
[   89.057222] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   89.057222] 
[   89.057357] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#170):
[   89.057523]  test_corruption+0x1d8/0x378
[   89.061057]  kunit_try_run_case+0x170/0x3f0
[   89.065224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   89.070692]  kthread+0x328/0x630
[   89.073904]  ret_from_fork+0x10/0x20
[   89.077463] 
[   89.078941] kfence-#170: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   89.078941] 
[   89.088054] allocated by task 397 on cpu 2 at 89.057032s (0.031019s ago):
[   89.094838]  test_alloc+0x230/0x628
[   89.098296]  test_corruption+0x198/0x378
[   89.102202]  kunit_try_run_case+0x170/0x3f0
[   89.106369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   89.111837]  kthread+0x328/0x630
[   89.115049]  ret_from_fork+0x10/0x20
[   89.118608] 
[   89.120087] freed by task 397 on cpu 2 at 89.057048s (0.063035s ago):
[   89.126525]  test_corruption+0x1d8/0x378
[   89.130414]  kunit_try_run_case+0x170/0x3f0
[   89.134580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   89.140049]  kthread+0x328/0x630
[   89.143262]  ret_from_fork+0x10/0x20
[   89.146820] 
[   89.148306] CPU: 2 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   89.159415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   89.163574] Hardware name: WinLink E850-96 board (DT)
[   89.168611] ==================================================================
[   87.765112] ==================================================================
[   87.765244] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   87.765244] 
[   87.765377] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#158):
[   87.767778]  test_corruption+0x278/0x378
[   87.771682]  kunit_try_run_case+0x170/0x3f0
[   87.775849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.781317]  kthread+0x328/0x630
[   87.784529]  ret_from_fork+0x10/0x20
[   87.788088] 
[   87.789566] kfence-#158: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   87.789566] 
[   87.799200] allocated by task 395 on cpu 4 at 87.765042s (0.034156s ago):
[   87.805986]  test_alloc+0x29c/0x628
[   87.809441]  test_corruption+0xdc/0x378
[   87.813261]  kunit_try_run_case+0x170/0x3f0
[   87.817428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.822896]  kthread+0x328/0x630
[   87.826108]  ret_from_fork+0x10/0x20
[   87.829670] 
[   87.831145] freed by task 395 on cpu 4 at 87.765056s (0.066086s ago):
[   87.837587]  test_corruption+0x278/0x378
[   87.841472]  kunit_try_run_case+0x170/0x3f0
[   87.845639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.851108]  kthread+0x328/0x630
[   87.854319]  ret_from_fork+0x10/0x20
[   87.857880] 
[   87.859365] CPU: 4 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   87.870473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.874633] Hardware name: WinLink E850-96 board (DT)
[   87.879671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   87.349112] ==================================================================
[   87.349249] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   87.349249] 
[   87.349384] Invalid free of 0x(____ptrval____) (in kfence-#154):
[   87.349487]  test_invalid_addr_free+0x1ac/0x238
[   87.352996]  kunit_try_run_case+0x170/0x3f0
[   87.357162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.362631]  kthread+0x328/0x630
[   87.365842]  ret_from_fork+0x10/0x20
[   87.369401] 
[   87.370880] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   87.370880] 
[   87.380515] allocated by task 391 on cpu 4 at 87.349054s (0.031459s ago):
[   87.387299]  test_alloc+0x29c/0x628
[   87.390755]  test_invalid_addr_free+0xd4/0x238
[   87.395182]  kunit_try_run_case+0x170/0x3f0
[   87.399349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.404818]  kthread+0x328/0x630
[   87.408029]  ret_from_fork+0x10/0x20
[   87.411590] 
[   87.413076] CPU: 4 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   87.424184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.428343] Hardware name: WinLink E850-96 board (DT)
[   87.433380] ==================================================================
[   87.557119] ==================================================================
[   87.557255] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   87.557255] 
[   87.557387] Invalid free of 0x(____ptrval____) (in kfence-#156):
[   87.557494]  test_invalid_addr_free+0xec/0x238
[   87.560827]  kunit_try_run_case+0x170/0x3f0
[   87.564993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.570462]  kthread+0x328/0x630
[   87.573674]  ret_from_fork+0x10/0x20
[   87.577233] 
[   87.578710] kfence-#156: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   87.578710] 
[   87.587826] allocated by task 393 on cpu 5 at 87.557061s (0.030763s ago):
[   87.594609]  test_alloc+0x230/0x628
[   87.598066]  test_invalid_addr_free+0xd4/0x238
[   87.602493]  kunit_try_run_case+0x170/0x3f0
[   87.606659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.612128]  kthread+0x328/0x630
[   87.615339]  ret_from_fork+0x10/0x20
[   87.618900] 
[   87.620386] CPU: 5 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   87.631493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.635653] Hardware name: WinLink E850-96 board (DT)
[   87.640689] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   87.129112] ==================================================================
[   87.129242] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   87.129242] 
[   87.129373] Invalid free of 0x(____ptrval____) (in kfence-#152):
[   87.129476]  test_double_free+0x100/0x238
[   87.131947]  kunit_try_run_case+0x170/0x3f0
[   87.136113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.141582]  kthread+0x328/0x630
[   87.144794]  ret_from_fork+0x10/0x20
[   87.148352] 
[   87.149832] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   87.149832] 
[   87.158945] allocated by task 389 on cpu 4 at 87.129035s (0.029908s ago):
[   87.165731]  test_alloc+0x230/0x628
[   87.169185]  test_double_free+0xd4/0x238
[   87.173092]  kunit_try_run_case+0x170/0x3f0
[   87.177258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.182727]  kthread+0x328/0x630
[   87.185939]  ret_from_fork+0x10/0x20
[   87.189498] 
[   87.190976] freed by task 389 on cpu 4 at 87.129050s (0.061924s ago):
[   87.197416]  test_double_free+0xf0/0x238
[   87.201303]  kunit_try_run_case+0x170/0x3f0
[   87.205470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.210938]  kthread+0x328/0x630
[   87.214150]  ret_from_fork+0x10/0x20
[   87.217711] 
[   87.219195] CPU: 4 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   87.230305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.234464] Hardware name: WinLink E850-96 board (DT)
[   87.239501] ==================================================================
[   86.909125] ==================================================================
[   86.909257] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   86.909257] 
[   86.909392] Invalid free of 0x(____ptrval____) (in kfence-#150):
[   86.909496]  test_double_free+0x1bc/0x238
[   86.911960]  kunit_try_run_case+0x170/0x3f0
[   86.916127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.921596]  kthread+0x328/0x630
[   86.924808]  ret_from_fork+0x10/0x20
[   86.928366] 
[   86.929845] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   86.929845] 
[   86.939481] allocated by task 387 on cpu 7 at 86.909045s (0.030434s ago):
[   86.946265]  test_alloc+0x29c/0x628
[   86.949722]  test_double_free+0xd4/0x238
[   86.953627]  kunit_try_run_case+0x170/0x3f0
[   86.957793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.963263]  kthread+0x328/0x630
[   86.966474]  ret_from_fork+0x10/0x20
[   86.970034] 
[   86.971514] freed by task 387 on cpu 7 at 86.909061s (0.062447s ago):
[   86.977952]  test_double_free+0x1ac/0x238
[   86.981925]  kunit_try_run_case+0x170/0x3f0
[   86.986091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.991560]  kthread+0x328/0x630
[   86.994772]  ret_from_fork+0x10/0x20
[   86.998332] 
[   86.999818] CPU: 7 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   87.010930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.015086] Hardware name: WinLink E850-96 board (DT)
[   87.020123] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   86.253100] ==================================================================
[   86.253235] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   86.253235] 
[   86.253392] Use-after-free read at 0x(____ptrval____) (in kfence-#144):
[   86.253859]  test_use_after_free_read+0x114/0x248
[   86.258544]  kunit_try_run_case+0x170/0x3f0
[   86.262710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.268179]  kthread+0x328/0x630
[   86.271391]  ret_from_fork+0x10/0x20
[   86.274950] 
[   86.276428] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   86.276428] 
[   86.286062] allocated by task 379 on cpu 6 at 86.253045s (0.033015s ago):
[   86.292850]  test_alloc+0x29c/0x628
[   86.296304]  test_use_after_free_read+0xd0/0x248
[   86.300905]  kunit_try_run_case+0x170/0x3f0
[   86.305071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.310539]  kthread+0x328/0x630
[   86.313751]  ret_from_fork+0x10/0x20
[   86.317310] 
[   86.318788] freed by task 379 on cpu 6 at 86.253060s (0.065726s ago):
[   86.325230]  test_use_after_free_read+0x1c0/0x248
[   86.329897]  kunit_try_run_case+0x170/0x3f0
[   86.334063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.339532]  kthread+0x328/0x630
[   86.342744]  ret_from_fork+0x10/0x20
[   86.346304] 
[   86.347790] CPU: 6 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   86.358898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.363057] Hardware name: WinLink E850-96 board (DT)
[   86.368095] ==================================================================
[   86.477109] ==================================================================
[   86.477238] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   86.477238] 
[   86.477398] Use-after-free read at 0x(____ptrval____) (in kfence-#146):
[   86.477859]  test_use_after_free_read+0x114/0x248
[   86.482546]  kunit_try_run_case+0x170/0x3f0
[   86.486713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.492181]  kthread+0x328/0x630
[   86.495394]  ret_from_fork+0x10/0x20
[   86.498952] 
[   86.500431] kfence-#146: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   86.500431] 
[   86.509545] allocated by task 381 on cpu 4 at 86.477048s (0.032495s ago):
[   86.516331]  test_alloc+0x230/0x628
[   86.519785]  test_use_after_free_read+0xd0/0x248
[   86.524386]  kunit_try_run_case+0x170/0x3f0
[   86.528553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.534021]  kthread+0x328/0x630
[   86.537233]  ret_from_fork+0x10/0x20
[   86.540792] 
[   86.542272] freed by task 381 on cpu 4 at 86.477063s (0.065205s ago):
[   86.548714]  test_use_after_free_read+0xf0/0x248
[   86.553292]  kunit_try_run_case+0x170/0x3f0
[   86.557459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.562927]  kthread+0x328/0x630
[   86.566139]  ret_from_fork+0x10/0x20
[   86.569699] 
[   86.571183] CPU: 4 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   86.582292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.586453] Hardware name: WinLink E850-96 board (DT)
[   86.591490] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   85.733093] ==================================================================
[   85.733223] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   85.733223] 
[   85.733381] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#139):
[   85.734539]  test_out_of_bounds_write+0x100/0x240
[   85.739225]  kunit_try_run_case+0x170/0x3f0
[   85.743392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.748861]  kthread+0x328/0x630
[   85.752072]  ret_from_fork+0x10/0x20
[   85.755632] 
[   85.757111] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   85.757111] 
[   85.766744] allocated by task 375 on cpu 4 at 85.733060s (0.033681s ago):
[   85.773532]  test_alloc+0x29c/0x628
[   85.776985]  test_out_of_bounds_write+0xc8/0x240
[   85.781586]  kunit_try_run_case+0x170/0x3f0
[   85.785752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.791221]  kthread+0x328/0x630
[   85.794433]  ret_from_fork+0x10/0x20
[   85.797995] 
[   85.799478] CPU: 4 UID: 0 PID: 375 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   85.810588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.814746] Hardware name: WinLink E850-96 board (DT)
[   85.819784] ==================================================================
[   86.045075] ==================================================================
[   86.045218] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   86.045218] 
[   86.045378] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#142):
[   86.046535]  test_out_of_bounds_write+0x100/0x240
[   86.051220]  kunit_try_run_case+0x170/0x3f0
[   86.055387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.060856]  kthread+0x328/0x630
[   86.064067]  ret_from_fork+0x10/0x20
[   86.067626] 
[   86.069105] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   86.069105] 
[   86.078219] allocated by task 377 on cpu 5 at 86.045040s (0.033177s ago):
[   86.085006]  test_alloc+0x230/0x628
[   86.088459]  test_out_of_bounds_write+0xc8/0x240
[   86.093060]  kunit_try_run_case+0x170/0x3f0
[   86.097227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.102696]  kthread+0x328/0x630
[   86.105907]  ret_from_fork+0x10/0x20
[   86.109468] 
[   86.110952] CPU: 5 UID: 0 PID: 377 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   86.122062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.126221] Hardware name: WinLink E850-96 board (DT)
[   86.131258] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   85.105077] ==================================================================
[   85.105215] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   85.105215] 
[   85.105372] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#133):
[   85.106445]  test_out_of_bounds_read+0x1c8/0x3e0
[   85.111044]  kunit_try_run_case+0x170/0x3f0
[   85.115211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.120679]  kthread+0x328/0x630
[   85.123891]  ret_from_fork+0x10/0x20
[   85.127450] 
[   85.128930] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   85.128930] 
[   85.138564] allocated by task 371 on cpu 4 at 85.105041s (0.033520s ago):
[   85.145352]  test_alloc+0x29c/0x628
[   85.148804]  test_out_of_bounds_read+0x198/0x3e0
[   85.153405]  kunit_try_run_case+0x170/0x3f0
[   85.157571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.163040]  kthread+0x328/0x630
[   85.166252]  ret_from_fork+0x10/0x20
[   85.169812] 
[   85.171297] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   85.182408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.186565] Hardware name: WinLink E850-96 board (DT)
[   85.191603] ==================================================================
[   85.417095] ==================================================================
[   85.417236] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   85.417236] 
[   85.417390] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#136):
[   85.418293]  test_out_of_bounds_read+0x114/0x3e0
[   85.422892]  kunit_try_run_case+0x170/0x3f0
[   85.427058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.432527]  kthread+0x328/0x630
[   85.435739]  ret_from_fork+0x10/0x20
[   85.439297] 
[   85.440775] kfence-#136: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.440775] 
[   85.449891] allocated by task 373 on cpu 5 at 85.417059s (0.032829s ago):
[   85.456678]  test_alloc+0x230/0x628
[   85.460131]  test_out_of_bounds_read+0xdc/0x3e0
[   85.464645]  kunit_try_run_case+0x170/0x3f0
[   85.468811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.474280]  kthread+0x328/0x630
[   85.477491]  ret_from_fork+0x10/0x20
[   85.481052] 
[   85.482537] CPU: 5 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   85.493645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.497805] Hardware name: WinLink E850-96 board (DT)
[   85.502841] ==================================================================
[   84.377084] ==================================================================
[   84.377207] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   84.377207] 
[   84.377362] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#126):
[   84.378264]  test_out_of_bounds_read+0x114/0x3e0
[   84.382863]  kunit_try_run_case+0x170/0x3f0
[   84.387031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.392499]  kthread+0x328/0x630
[   84.395710]  ret_from_fork+0x10/0x20
[   84.399270] 
[   84.400748] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   84.400748] 
[   84.410383] allocated by task 371 on cpu 4 at 84.377049s (0.033331s ago):
[   84.417171]  test_alloc+0x29c/0x628
[   84.420623]  test_out_of_bounds_read+0xdc/0x3e0
[   84.425137]  kunit_try_run_case+0x170/0x3f0
[   84.429304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.434772]  kthread+0x328/0x630
[   84.437984]  ret_from_fork+0x10/0x20
[   84.441545] 
[   84.443028] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   84.454138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.458297] Hardware name: WinLink E850-96 board (DT)
[   84.463335] ==================================================================
[   85.525046] ==================================================================
[   85.526625] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   85.526625] 
[   85.535652] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#137):
[   85.543029]  test_out_of_bounds_read+0x1c8/0x3e0
[   85.547630]  kunit_try_run_case+0x170/0x3f0
[   85.551796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.557265]  kthread+0x328/0x630
[   85.560476]  ret_from_fork+0x10/0x20
[   85.564035] 
[   85.565511] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.565511] 
[   85.574626] allocated by task 373 on cpu 5 at 85.525021s (0.049603s ago):
[   85.581416]  test_alloc+0x230/0x628
[   85.584868]  test_out_of_bounds_read+0x198/0x3e0
[   85.589469]  kunit_try_run_case+0x170/0x3f0
[   85.593636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.599104]  kthread+0x328/0x630
[   85.602316]  ret_from_fork+0x10/0x20
[   85.605875] 
[   85.607358] CPU: 5 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   85.618471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.622628] Hardware name: WinLink E850-96 board (DT)
[   85.627667] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   37.830336] ==================================================================
[   37.853213] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   37.853213] 
[   37.862759] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#61):
[   37.870744]  kmalloc_track_caller_oob_right+0x224/0x488
[   37.875953]  kunit_try_run_case+0x170/0x3f0
[   37.880120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.885588]  kthread+0x328/0x630
[   37.888800]  ret_from_fork+0x10/0x20
[   37.892359] 
[   37.893838] kfence-#61: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   37.893838] 
[   37.903561] allocated by task 226 on cpu 2 at 37.829941s (0.073618s ago):
[   37.910349]  kmalloc_track_caller_oob_right+0x184/0x488
[   37.915536]  kunit_try_run_case+0x170/0x3f0
[   37.919702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.925171]  kthread+0x328/0x630
[   37.928383]  ret_from_fork+0x10/0x20
[   37.931942] 
[   37.933421] freed by task 226 on cpu 2 at 37.830291s (0.103128s ago):
[   37.939863]  kmalloc_track_caller_oob_right+0x224/0x488
[   37.945051]  kunit_try_run_case+0x170/0x3f0
[   37.949216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.954684]  kthread+0x328/0x630
[   37.957896]  ret_from_fork+0x10/0x20
[   37.961457] 
[   37.962942] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   37.974051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.978208] Hardware name: WinLink E850-96 board (DT)
[   37.983246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   83.659405] ==================================================================
[   83.666423] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   83.673275] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   83.680827] 
[   83.682309] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.682364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.682378] Hardware name: WinLink E850-96 board (DT)
[   83.682400] Call trace:
[   83.682415]  show_stack+0x20/0x38 (C)
[   83.682451]  dump_stack_lvl+0x8c/0xd0
[   83.682485]  print_report+0x118/0x5d0
[   83.682514]  kasan_report+0xdc/0x128
[   83.682542]  kasan_check_range+0x100/0x1a8
[   83.682574]  __kasan_check_write+0x20/0x30
[   83.682606]  strncpy_from_user+0x3c/0x2a0
[   83.682643]  copy_user_test_oob+0x5c0/0xec8
[   83.682680]  kunit_try_run_case+0x170/0x3f0
[   83.682717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.682754]  kthread+0x328/0x630
[   83.682787]  ret_from_fork+0x10/0x20
[   83.682823] 
[   83.753742] Allocated by task 369:
[   83.757131]  kasan_save_stack+0x3c/0x68
[   83.760947]  kasan_save_track+0x20/0x40
[   83.764767]  kasan_save_alloc_info+0x40/0x58
[   83.769020]  __kasan_kmalloc+0xd4/0xd8
[   83.772753]  __kmalloc_noprof+0x198/0x4c8
[   83.776745]  kunit_kmalloc_array+0x34/0x88
[   83.780827]  copy_user_test_oob+0xac/0xec8
[   83.784904]  kunit_try_run_case+0x170/0x3f0
[   83.789072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.794540]  kthread+0x328/0x630
[   83.797752]  ret_from_fork+0x10/0x20
[   83.801311] 
[   83.802788] The buggy address belongs to the object at ffff000803b98000
[   83.802788]  which belongs to the cache kmalloc-128 of size 128
[   83.815287] The buggy address is located 0 bytes inside of
[   83.815287]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   83.827699] 
[   83.829177] The buggy address belongs to the physical page:
[   83.834736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   83.842719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.850358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.857301] page_type: f5(slab)
[   83.860435] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.868157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.875883] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.883695] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.891508] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   83.899320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.907127] page dumped because: kasan: bad access detected
[   83.912681] 
[   83.914156] Memory state around the buggy address:
[   83.918936]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.926139]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.933346] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.940545]                                                                 ^
[   83.947667]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.954872]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.962073] ==================================================================
[   83.969472] ==================================================================
[   83.976490] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   83.983427] Write of size 1 at addr ffff000803b98078 by task kunit_try_catch/369
[   83.990805] 
[   83.992290] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.992344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.992360] Hardware name: WinLink E850-96 board (DT)
[   83.992382] Call trace:
[   83.992397]  show_stack+0x20/0x38 (C)
[   83.992429]  dump_stack_lvl+0x8c/0xd0
[   83.992465]  print_report+0x118/0x5d0
[   83.992497]  kasan_report+0xdc/0x128
[   83.992523]  __asan_report_store1_noabort+0x20/0x30
[   83.992559]  strncpy_from_user+0x270/0x2a0
[   83.992598]  copy_user_test_oob+0x5c0/0xec8
[   83.992634]  kunit_try_run_case+0x170/0x3f0
[   83.992671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.992707]  kthread+0x328/0x630
[   83.992739]  ret_from_fork+0x10/0x20
[   83.992776] 
[   84.060509] Allocated by task 369:
[   84.063897]  kasan_save_stack+0x3c/0x68
[   84.067713]  kasan_save_track+0x20/0x40
[   84.071533]  kasan_save_alloc_info+0x40/0x58
[   84.075786]  __kasan_kmalloc+0xd4/0xd8
[   84.079519]  __kmalloc_noprof+0x198/0x4c8
[   84.083512]  kunit_kmalloc_array+0x34/0x88
[   84.087593]  copy_user_test_oob+0xac/0xec8
[   84.091672]  kunit_try_run_case+0x170/0x3f0
[   84.095838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.101307]  kthread+0x328/0x630
[   84.104519]  ret_from_fork+0x10/0x20
[   84.108077] 
[   84.109555] The buggy address belongs to the object at ffff000803b98000
[   84.109555]  which belongs to the cache kmalloc-128 of size 128
[   84.122055] The buggy address is located 0 bytes to the right of
[   84.122055]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   84.134987] 
[   84.136465] The buggy address belongs to the physical page:
[   84.142022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   84.150005] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   84.157645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   84.164588] page_type: f5(slab)
[   84.167725] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   84.175444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.183171] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   84.190982] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.198795] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   84.206607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   84.214413] page dumped because: kasan: bad access detected
[   84.219968] 
[   84.221444] Memory state around the buggy address:
[   84.226222]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.233426]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.240633] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.247832]                                                                 ^
[   84.254954]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.262159]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.269360] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   82.434915] ==================================================================
[   82.441788] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   82.448814] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   82.456366] 
[   82.457851] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   82.457907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.457924] Hardware name: WinLink E850-96 board (DT)
[   82.457949] Call trace:
[   82.457964]  show_stack+0x20/0x38 (C)
[   82.458003]  dump_stack_lvl+0x8c/0xd0
[   82.458035]  print_report+0x118/0x5d0
[   82.458062]  kasan_report+0xdc/0x128
[   82.458089]  kasan_check_range+0x100/0x1a8
[   82.458116]  __kasan_check_write+0x20/0x30
[   82.458148]  copy_user_test_oob+0x35c/0xec8
[   82.458184]  kunit_try_run_case+0x170/0x3f0
[   82.458223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.458258]  kthread+0x328/0x630
[   82.458285]  ret_from_fork+0x10/0x20
[   82.458320] 
[   82.525288] Allocated by task 369:
[   82.528676]  kasan_save_stack+0x3c/0x68
[   82.532493]  kasan_save_track+0x20/0x40
[   82.536313]  kasan_save_alloc_info+0x40/0x58
[   82.540566]  __kasan_kmalloc+0xd4/0xd8
[   82.544299]  __kmalloc_noprof+0x198/0x4c8
[   82.548292]  kunit_kmalloc_array+0x34/0x88
[   82.552373]  copy_user_test_oob+0xac/0xec8
[   82.556453]  kunit_try_run_case+0x170/0x3f0
[   82.560618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.566087]  kthread+0x328/0x630
[   82.569298]  ret_from_fork+0x10/0x20
[   82.572857] 
[   82.574335] The buggy address belongs to the object at ffff000803b98000
[   82.574335]  which belongs to the cache kmalloc-128 of size 128
[   82.586835] The buggy address is located 0 bytes inside of
[   82.586835]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   82.599246] 
[   82.600724] The buggy address belongs to the physical page:
[   82.606280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.614266] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.621904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.628846] page_type: f5(slab)
[   82.631984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.639703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.647430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.655241] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.663054] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.670866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.678672] page dumped because: kasan: bad access detected
[   82.684227] 
[   82.685703] Memory state around the buggy address:
[   82.690483]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.697685]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.704892] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.712091]                                                                 ^
[   82.719213]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.726418]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.733619] ==================================================================
[   83.047120] ==================================================================
[   83.054110] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   83.061133] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   83.068685] 
[   83.070166] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.070219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.070235] Hardware name: WinLink E850-96 board (DT)
[   83.070258] Call trace:
[   83.070273]  show_stack+0x20/0x38 (C)
[   83.070308]  dump_stack_lvl+0x8c/0xd0
[   83.070343]  print_report+0x118/0x5d0
[   83.070372]  kasan_report+0xdc/0x128
[   83.070401]  kasan_check_range+0x100/0x1a8
[   83.070431]  __kasan_check_write+0x20/0x30
[   83.070464]  copy_user_test_oob+0x434/0xec8
[   83.070500]  kunit_try_run_case+0x170/0x3f0
[   83.070538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.070572]  kthread+0x328/0x630
[   83.070605]  ret_from_fork+0x10/0x20
[   83.070638] 
[   83.137606] Allocated by task 369:
[   83.140993]  kasan_save_stack+0x3c/0x68
[   83.144811]  kasan_save_track+0x20/0x40
[   83.148630]  kasan_save_alloc_info+0x40/0x58
[   83.152883]  __kasan_kmalloc+0xd4/0xd8
[   83.156616]  __kmalloc_noprof+0x198/0x4c8
[   83.160609]  kunit_kmalloc_array+0x34/0x88
[   83.164690]  copy_user_test_oob+0xac/0xec8
[   83.168769]  kunit_try_run_case+0x170/0x3f0
[   83.172935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.178404]  kthread+0x328/0x630
[   83.181616]  ret_from_fork+0x10/0x20
[   83.185175] 
[   83.186652] The buggy address belongs to the object at ffff000803b98000
[   83.186652]  which belongs to the cache kmalloc-128 of size 128
[   83.199154] The buggy address is located 0 bytes inside of
[   83.199154]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   83.211564] 
[   83.213042] The buggy address belongs to the physical page:
[   83.218598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   83.226583] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.234221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.241165] page_type: f5(slab)
[   83.244300] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.252022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.259747] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.267558] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.275372] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   83.283183] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.290989] page dumped because: kasan: bad access detected
[   83.296544] 
[   83.298020] Memory state around the buggy address:
[   83.302799]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.310003]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.317211] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.324409]                                                                 ^
[   83.331530]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.338735]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.345936] ==================================================================
[   83.353540] ==================================================================
[   83.360352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   83.367377] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   83.374842] 
[   83.376325] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   83.376379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.376395] Hardware name: WinLink E850-96 board (DT)
[   83.376416] Call trace:
[   83.376430]  show_stack+0x20/0x38 (C)
[   83.376463]  dump_stack_lvl+0x8c/0xd0
[   83.376497]  print_report+0x118/0x5d0
[   83.376527]  kasan_report+0xdc/0x128
[   83.376554]  kasan_check_range+0x100/0x1a8
[   83.376586]  __kasan_check_read+0x20/0x30
[   83.376615]  copy_user_test_oob+0x4a0/0xec8
[   83.376647]  kunit_try_run_case+0x170/0x3f0
[   83.376685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.376723]  kthread+0x328/0x630
[   83.376754]  ret_from_fork+0x10/0x20
[   83.376787] 
[   83.443677] Allocated by task 369:
[   83.447066]  kasan_save_stack+0x3c/0x68
[   83.450882]  kasan_save_track+0x20/0x40
[   83.454702]  kasan_save_alloc_info+0x40/0x58
[   83.458955]  __kasan_kmalloc+0xd4/0xd8
[   83.462688]  __kmalloc_noprof+0x198/0x4c8
[   83.466681]  kunit_kmalloc_array+0x34/0x88
[   83.470762]  copy_user_test_oob+0xac/0xec8
[   83.474840]  kunit_try_run_case+0x170/0x3f0
[   83.479009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.484476]  kthread+0x328/0x630
[   83.487688]  ret_from_fork+0x10/0x20
[   83.491246] 
[   83.492723] The buggy address belongs to the object at ffff000803b98000
[   83.492723]  which belongs to the cache kmalloc-128 of size 128
[   83.505222] The buggy address is located 0 bytes inside of
[   83.505222]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   83.517635] 
[   83.519112] The buggy address belongs to the physical page:
[   83.524670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   83.532654] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.540293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.547235] page_type: f5(slab)
[   83.550372] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.558092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.565819] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   83.573630] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.581443] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   83.589255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.597061] page dumped because: kasan: bad access detected
[   83.602616] 
[   83.604092] Memory state around the buggy address:
[   83.608871]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.616075]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.623281] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.630480]                                                                 ^
[   83.637602]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.644807]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.652008] ==================================================================
[   81.817111] ==================================================================
[   81.829472] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   81.836498] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   81.844049] 
[   81.845536] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   81.845599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.845616] Hardware name: WinLink E850-96 board (DT)
[   81.845638] Call trace:
[   81.845654]  show_stack+0x20/0x38 (C)
[   81.845688]  dump_stack_lvl+0x8c/0xd0
[   81.845723]  print_report+0x118/0x5d0
[   81.845756]  kasan_report+0xdc/0x128
[   81.845786]  kasan_check_range+0x100/0x1a8
[   81.845820]  __kasan_check_write+0x20/0x30
[   81.845854]  copy_user_test_oob+0x234/0xec8
[   81.845888]  kunit_try_run_case+0x170/0x3f0
[   81.845930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.845964]  kthread+0x328/0x630
[   81.845996]  ret_from_fork+0x10/0x20
[   81.846034] 
[   81.912973] Allocated by task 369:
[   81.916359]  kasan_save_stack+0x3c/0x68
[   81.920176]  kasan_save_track+0x20/0x40
[   81.923996]  kasan_save_alloc_info+0x40/0x58
[   81.928249]  __kasan_kmalloc+0xd4/0xd8
[   81.931982]  __kmalloc_noprof+0x198/0x4c8
[   81.935975]  kunit_kmalloc_array+0x34/0x88
[   81.940056]  copy_user_test_oob+0xac/0xec8
[   81.944134]  kunit_try_run_case+0x170/0x3f0
[   81.948301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.953770]  kthread+0x328/0x630
[   81.956981]  ret_from_fork+0x10/0x20
[   81.960540] 
[   81.962017] The buggy address belongs to the object at ffff000803b98000
[   81.962017]  which belongs to the cache kmalloc-128 of size 128
[   81.974519] The buggy address is located 0 bytes inside of
[   81.974519]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   81.986928] 
[   81.988410] The buggy address belongs to the physical page:
[   81.993964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.001948] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.009588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.016531] page_type: f5(slab)
[   82.019668] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.027386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.035114] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.042924] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.050737] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.058549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.066354] page dumped because: kasan: bad access detected
[   82.071910] 
[   82.073385] Memory state around the buggy address:
[   82.078167]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.085368]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.092575] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.099774]                                                                 ^
[   82.106896]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.114101]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.121303] ==================================================================
[   82.741040] ==================================================================
[   82.748033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   82.755060] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   82.762525] 
[   82.764009] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   82.764062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.764080] Hardware name: WinLink E850-96 board (DT)
[   82.764103] Call trace:
[   82.764118]  show_stack+0x20/0x38 (C)
[   82.764155]  dump_stack_lvl+0x8c/0xd0
[   82.764190]  print_report+0x118/0x5d0
[   82.764218]  kasan_report+0xdc/0x128
[   82.764244]  kasan_check_range+0x100/0x1a8
[   82.764274]  __kasan_check_read+0x20/0x30
[   82.764305]  copy_user_test_oob+0x3c8/0xec8
[   82.764341]  kunit_try_run_case+0x170/0x3f0
[   82.764379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.764414]  kthread+0x328/0x630
[   82.764443]  ret_from_fork+0x10/0x20
[   82.764479] 
[   82.831362] Allocated by task 369:
[   82.834749]  kasan_save_stack+0x3c/0x68
[   82.838565]  kasan_save_track+0x20/0x40
[   82.842385]  kasan_save_alloc_info+0x40/0x58
[   82.846638]  __kasan_kmalloc+0xd4/0xd8
[   82.850371]  __kmalloc_noprof+0x198/0x4c8
[   82.854363]  kunit_kmalloc_array+0x34/0x88
[   82.858445]  copy_user_test_oob+0xac/0xec8
[   82.862523]  kunit_try_run_case+0x170/0x3f0
[   82.866690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.872158]  kthread+0x328/0x630
[   82.875370]  ret_from_fork+0x10/0x20
[   82.878929] 
[   82.880406] The buggy address belongs to the object at ffff000803b98000
[   82.880406]  which belongs to the cache kmalloc-128 of size 128
[   82.892904] The buggy address is located 0 bytes inside of
[   82.892904]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   82.905318] 
[   82.906797] The buggy address belongs to the physical page:
[   82.912352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.920337] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.927976] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.934919] page_type: f5(slab)
[   82.938054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.945775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.953501] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.961313] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.969126] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.976937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.984744] page dumped because: kasan: bad access detected
[   82.990299] 
[   82.991775] Memory state around the buggy address:
[   82.996554]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.003757]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.010964] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.018163]                                                                 ^
[   83.025285]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.032490]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.039691] ==================================================================
[   82.128743] ==================================================================
[   82.135718] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   82.142743] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369
[   82.150208] 
[   82.151692] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   82.151746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.151764] Hardware name: WinLink E850-96 board (DT)
[   82.151788] Call trace:
[   82.151801]  show_stack+0x20/0x38 (C)
[   82.151839]  dump_stack_lvl+0x8c/0xd0
[   82.151873]  print_report+0x118/0x5d0
[   82.151904]  kasan_report+0xdc/0x128
[   82.151932]  kasan_check_range+0x100/0x1a8
[   82.151964]  __kasan_check_read+0x20/0x30
[   82.151995]  copy_user_test_oob+0x728/0xec8
[   82.152029]  kunit_try_run_case+0x170/0x3f0
[   82.152069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.152104]  kthread+0x328/0x630
[   82.152136]  ret_from_fork+0x10/0x20
[   82.152174] 
[   82.219043] Allocated by task 369:
[   82.222432]  kasan_save_stack+0x3c/0x68
[   82.226248]  kasan_save_track+0x20/0x40
[   82.230068]  kasan_save_alloc_info+0x40/0x58
[   82.234321]  __kasan_kmalloc+0xd4/0xd8
[   82.238053]  __kmalloc_noprof+0x198/0x4c8
[   82.242046]  kunit_kmalloc_array+0x34/0x88
[   82.246126]  copy_user_test_oob+0xac/0xec8
[   82.250206]  kunit_try_run_case+0x170/0x3f0
[   82.254373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.259841]  kthread+0x328/0x630
[   82.263053]  ret_from_fork+0x10/0x20
[   82.266612] 
[   82.268089] The buggy address belongs to the object at ffff000803b98000
[   82.268089]  which belongs to the cache kmalloc-128 of size 128
[   82.280588] The buggy address is located 0 bytes inside of
[   82.280588]  allocated 120-byte region [ffff000803b98000, ffff000803b98078)
[   82.293000] 
[   82.294479] The buggy address belongs to the physical page:
[   82.300035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   82.308019] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.315659] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.322602] page_type: f5(slab)
[   82.325737] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.333458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.341184] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.348995] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.356809] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   82.364621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.372426] page dumped because: kasan: bad access detected
[   82.377981] 
[   82.379457] Memory state around the buggy address:
[   82.384239]  ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.391440]  ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.398646] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.405846]                                                                 ^
[   82.412968]  ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.420173]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.427374] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   81.189699] ==================================================================
[   81.203873] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   81.211250] Read of size 8 at addr ffff000800de6578 by task kunit_try_catch/365
[   81.218539] 
[   81.220024] CPU: 7 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   81.220085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.220104] Hardware name: WinLink E850-96 board (DT)
[   81.220128] Call trace:
[   81.220144]  show_stack+0x20/0x38 (C)
[   81.220183]  dump_stack_lvl+0x8c/0xd0
[   81.220217]  print_report+0x118/0x5d0
[   81.220249]  kasan_report+0xdc/0x128
[   81.220279]  __asan_report_load8_noabort+0x20/0x30
[   81.220317]  copy_to_kernel_nofault+0x204/0x250
[   81.220356]  copy_to_kernel_nofault_oob+0x158/0x418
[   81.220393]  kunit_try_run_case+0x170/0x3f0
[   81.220435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.220470]  kthread+0x328/0x630
[   81.220499]  ret_from_fork+0x10/0x20
[   81.220536] 
[   81.289285] Allocated by task 365:
[   81.292673]  kasan_save_stack+0x3c/0x68
[   81.296488]  kasan_save_track+0x20/0x40
[   81.300307]  kasan_save_alloc_info+0x40/0x58
[   81.304561]  __kasan_kmalloc+0xd4/0xd8
[   81.308293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   81.312807]  copy_to_kernel_nofault_oob+0xc8/0x418
[   81.317581]  kunit_try_run_case+0x170/0x3f0
[   81.321749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.327218]  kthread+0x328/0x630
[   81.330428]  ret_from_fork+0x10/0x20
[   81.333987] 
[   81.335465] The buggy address belongs to the object at ffff000800de6500
[   81.335465]  which belongs to the cache kmalloc-128 of size 128
[   81.347965] The buggy address is located 0 bytes to the right of
[   81.347965]  allocated 120-byte region [ffff000800de6500, ffff000800de6578)
[   81.360896] 
[   81.362375] The buggy address belongs to the physical page:
[   81.367932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6
[   81.375917] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.383555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.390500] page_type: f5(slab)
[   81.393635] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.401354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.409083] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.416891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.424705] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff
[   81.432516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.440322] page dumped because: kasan: bad access detected
[   81.445878] 
[   81.447353] Memory state around the buggy address:
[   81.452133]  ffff000800de6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   81.459336]  ffff000800de6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.466542] >ffff000800de6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.473742]                                                                 ^
[   81.480864]  ffff000800de6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.488070]  ffff000800de6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.495271] ==================================================================
[   81.502708] ==================================================================
[   81.509686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   81.516971] Write of size 8 at addr ffff000800de6578 by task kunit_try_catch/365
[   81.524349] 
[   81.525835] CPU: 7 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   81.525891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.525911] Hardware name: WinLink E850-96 board (DT)
[   81.525934] Call trace:
[   81.525948]  show_stack+0x20/0x38 (C)
[   81.525983]  dump_stack_lvl+0x8c/0xd0
[   81.526016]  print_report+0x118/0x5d0
[   81.526049]  kasan_report+0xdc/0x128
[   81.526077]  kasan_check_range+0x100/0x1a8
[   81.526110]  __kasan_check_write+0x20/0x30
[   81.526143]  copy_to_kernel_nofault+0x8c/0x250
[   81.526179]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   81.526217]  kunit_try_run_case+0x170/0x3f0
[   81.526253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.526288]  kthread+0x328/0x630
[   81.526320]  ret_from_fork+0x10/0x20
[   81.526355] 
[   81.598393] Allocated by task 365:
[   81.601781]  kasan_save_stack+0x3c/0x68
[   81.605599]  kasan_save_track+0x20/0x40
[   81.609417]  kasan_save_alloc_info+0x40/0x58
[   81.613671]  __kasan_kmalloc+0xd4/0xd8
[   81.617403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   81.621917]  copy_to_kernel_nofault_oob+0xc8/0x418
[   81.626691]  kunit_try_run_case+0x170/0x3f0
[   81.630858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.636326]  kthread+0x328/0x630
[   81.639538]  ret_from_fork+0x10/0x20
[   81.643097] 
[   81.644574] The buggy address belongs to the object at ffff000800de6500
[   81.644574]  which belongs to the cache kmalloc-128 of size 128
[   81.657074] The buggy address is located 0 bytes to the right of
[   81.657074]  allocated 120-byte region [ffff000800de6500, ffff000800de6578)
[   81.670007] 
[   81.671485] The buggy address belongs to the physical page:
[   81.677042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6
[   81.685025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.692664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.699606] page_type: f5(slab)
[   81.702743] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.710464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.718191] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.726002] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.733815] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff
[   81.741626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.749434] page dumped because: kasan: bad access detected
[   81.754988] 
[   81.756463] Memory state around the buggy address:
[   81.761241]  ffff000800de6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   81.768446]  ffff000800de6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.775652] >ffff000800de6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.782852]                                                                 ^
[   81.789973]  ffff000800de6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.797180]  ffff000800de6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.804379] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   80.765891] ==================================================================
[   80.780266] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   80.786949] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/353
[   80.794239] 
[   80.795724] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.795782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.795798] Hardware name: WinLink E850-96 board (DT)
[   80.795823] Call trace:
[   80.795841]  show_stack+0x20/0x38 (C)
[   80.795880]  dump_stack_lvl+0x8c/0xd0
[   80.795917]  print_report+0x310/0x5d0
[   80.795948]  kasan_report+0xdc/0x128
[   80.795973]  __asan_report_load1_noabort+0x20/0x30
[   80.796008]  vmalloc_oob+0x578/0x5d0
[   80.796037]  kunit_try_run_case+0x170/0x3f0
[   80.796077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.796110]  kthread+0x328/0x630
[   80.796141]  ret_from_fork+0x10/0x20
[   80.796178] 
[   80.859173] The buggy address ffff800087c7d7f3 belongs to a vmalloc virtual mapping
[   80.866811] The buggy address belongs to the physical page:
[   80.872365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   80.880352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.886870] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   80.894591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   80.902311] page dumped because: kasan: bad access detected
[   80.907865] 
[   80.909342] Memory state around the buggy address:
[   80.914125]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.921323]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.928529] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   80.935729]                                                              ^
[   80.942591]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.949795]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.956997] ==================================================================
[   80.964301] ==================================================================
[   80.971407] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   80.978090] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/353
[   80.985381] 
[   80.986864] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.986915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.986932] Hardware name: WinLink E850-96 board (DT)
[   80.986954] Call trace:
[   80.986967]  show_stack+0x20/0x38 (C)
[   80.987003]  dump_stack_lvl+0x8c/0xd0
[   80.987036]  print_report+0x310/0x5d0
[   80.987064]  kasan_report+0xdc/0x128
[   80.987090]  __asan_report_load1_noabort+0x20/0x30
[   80.987123]  vmalloc_oob+0x51c/0x5d0
[   80.987154]  kunit_try_run_case+0x170/0x3f0
[   80.987194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.987226]  kthread+0x328/0x630
[   80.987256]  ret_from_fork+0x10/0x20
[   80.987292] 
[   81.050314] The buggy address ffff800087c7d7f8 belongs to a vmalloc virtual mapping
[   81.057953] The buggy address belongs to the physical page:
[   81.063509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   81.071493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   81.078010] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   81.085734] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   81.093454] page dumped because: kasan: bad access detected
[   81.099008] 
[   81.100483] Memory state around the buggy address:
[   81.105262]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.112466]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.119671] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   81.126872]                                                                 ^
[   81.133994]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.141199]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.148399] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   64.908454] ==================================================================
[   64.915486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   64.922862] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.930153] 
[   64.931636] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.931690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.931707] Hardware name: WinLink E850-96 board (DT)
[   64.931728] Call trace:
[   64.931741]  show_stack+0x20/0x38 (C)
[   64.931776]  dump_stack_lvl+0x8c/0xd0
[   64.931809]  print_report+0x118/0x5d0
[   64.931839]  kasan_report+0xdc/0x128
[   64.931866]  __asan_report_load4_noabort+0x20/0x30
[   64.931900]  kasan_atomics_helper+0x40fc/0x4858
[   64.931935]  kasan_atomics+0x198/0x2e0
[   64.931967]  kunit_try_run_case+0x170/0x3f0
[   64.932006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.932039]  kthread+0x328/0x630
[   64.932068]  ret_from_fork+0x10/0x20
[   64.932102] 
[   64.999770] Allocated by task 349:
[   65.003158]  kasan_save_stack+0x3c/0x68
[   65.006975]  kasan_save_track+0x20/0x40
[   65.010795]  kasan_save_alloc_info+0x40/0x58
[   65.015048]  __kasan_kmalloc+0xd4/0xd8
[   65.018781]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.023294]  kasan_atomics+0xb8/0x2e0
[   65.026940]  kunit_try_run_case+0x170/0x3f0
[   65.031107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.036575]  kthread+0x328/0x630
[   65.039787]  ret_from_fork+0x10/0x20
[   65.043346] 
[   65.044822] The buggy address belongs to the object at ffff000807848f80
[   65.044822]  which belongs to the cache kmalloc-64 of size 64
[   65.057148] The buggy address is located 0 bytes to the right of
[   65.057148]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.069995] 
[   65.071473] The buggy address belongs to the physical page:
[   65.077030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.085015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.091524] page_type: f5(slab)
[   65.094657] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.102380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.110099] page dumped because: kasan: bad access detected
[   65.115654] 
[   65.117130] Memory state around the buggy address:
[   65.121909]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.129112]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.136319] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.143518]                                      ^
[   65.148296]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.155501]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.162702] ==================================================================
[   68.081146] ==================================================================
[   68.088180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   68.095471] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.102849] 
[   68.104330] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.104381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.104398] Hardware name: WinLink E850-96 board (DT)
[   68.104416] Call trace:
[   68.104429]  show_stack+0x20/0x38 (C)
[   68.104461]  dump_stack_lvl+0x8c/0xd0
[   68.104491]  print_report+0x118/0x5d0
[   68.104519]  kasan_report+0xdc/0x128
[   68.104547]  kasan_check_range+0x100/0x1a8
[   68.104578]  __kasan_check_write+0x20/0x30
[   68.104609]  kasan_atomics_helper+0x760/0x4858
[   68.104645]  kasan_atomics+0x198/0x2e0
[   68.104677]  kunit_try_run_case+0x170/0x3f0
[   68.104711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.104745]  kthread+0x328/0x630
[   68.104771]  ret_from_fork+0x10/0x20
[   68.104802] 
[   68.175764] Allocated by task 349:
[   68.179150]  kasan_save_stack+0x3c/0x68
[   68.182969]  kasan_save_track+0x20/0x40
[   68.186789]  kasan_save_alloc_info+0x40/0x58
[   68.191042]  __kasan_kmalloc+0xd4/0xd8
[   68.194775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.199289]  kasan_atomics+0xb8/0x2e0
[   68.202934]  kunit_try_run_case+0x170/0x3f0
[   68.207101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.212570]  kthread+0x328/0x630
[   68.215781]  ret_from_fork+0x10/0x20
[   68.219340] 
[   68.220816] The buggy address belongs to the object at ffff000807848f80
[   68.220816]  which belongs to the cache kmalloc-64 of size 64
[   68.233143] The buggy address is located 0 bytes to the right of
[   68.233143]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   68.245989] 
[   68.247465] The buggy address belongs to the physical page:
[   68.253021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   68.261006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.267517] page_type: f5(slab)
[   68.270649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.278374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.286093] page dumped because: kasan: bad access detected
[   68.291648] 
[   68.293124] Memory state around the buggy address:
[   68.297902]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.305107]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.312311] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.319512]                                      ^
[   68.324291]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.331495]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.338696] ==================================================================
[   70.988733] ==================================================================
[   70.995776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   71.003153] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.010444] 
[   71.011924] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.011972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.011990] Hardware name: WinLink E850-96 board (DT)
[   71.012007] Call trace:
[   71.012019]  show_stack+0x20/0x38 (C)
[   71.012051]  dump_stack_lvl+0x8c/0xd0
[   71.012082]  print_report+0x118/0x5d0
[   71.012111]  kasan_report+0xdc/0x128
[   71.012139]  __asan_report_load4_noabort+0x20/0x30
[   71.012172]  kasan_atomics_helper+0x3dbc/0x4858
[   71.012208]  kasan_atomics+0x198/0x2e0
[   71.012239]  kunit_try_run_case+0x170/0x3f0
[   71.012278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.012311]  kthread+0x328/0x630
[   71.012338]  ret_from_fork+0x10/0x20
[   71.012370] 
[   71.080061] Allocated by task 349:
[   71.083447]  kasan_save_stack+0x3c/0x68
[   71.087266]  kasan_save_track+0x20/0x40
[   71.091086]  kasan_save_alloc_info+0x40/0x58
[   71.095339]  __kasan_kmalloc+0xd4/0xd8
[   71.099071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.103585]  kasan_atomics+0xb8/0x2e0
[   71.107231]  kunit_try_run_case+0x170/0x3f0
[   71.111398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.116866]  kthread+0x328/0x630
[   71.120078]  ret_from_fork+0x10/0x20
[   71.123637] 
[   71.125113] The buggy address belongs to the object at ffff000807848f80
[   71.125113]  which belongs to the cache kmalloc-64 of size 64
[   71.137439] The buggy address is located 0 bytes to the right of
[   71.137439]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.150286] 
[   71.151762] The buggy address belongs to the physical page:
[   71.157318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.165305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.171813] page_type: f5(slab)
[   71.174946] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.182671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.190390] page dumped because: kasan: bad access detected
[   71.195945] 
[   71.197420] Memory state around the buggy address:
[   71.202198]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.209403]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.216608] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.223809]                                      ^
[   71.228587]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.235792]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.242993] ==================================================================
[   64.114026] ==================================================================
[   64.121055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   64.128345] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.135634] 
[   64.137120] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.137181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.137196] Hardware name: WinLink E850-96 board (DT)
[   64.137219] Call trace:
[   64.137235]  show_stack+0x20/0x38 (C)
[   64.137270]  dump_stack_lvl+0x8c/0xd0
[   64.137304]  print_report+0x118/0x5d0
[   64.137334]  kasan_report+0xdc/0x128
[   64.137361]  kasan_check_range+0x100/0x1a8
[   64.137393]  __kasan_check_read+0x20/0x30
[   64.137426]  kasan_atomics_helper+0x1ec/0x4858
[   64.137461]  kasan_atomics+0x198/0x2e0
[   64.137493]  kunit_try_run_case+0x170/0x3f0
[   64.137532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.137565]  kthread+0x328/0x630
[   64.137593]  ret_from_fork+0x10/0x20
[   64.137628] 
[   64.208463] Allocated by task 349:
[   64.211851]  kasan_save_stack+0x3c/0x68
[   64.215668]  kasan_save_track+0x20/0x40
[   64.219487]  kasan_save_alloc_info+0x40/0x58
[   64.223741]  __kasan_kmalloc+0xd4/0xd8
[   64.227473]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.231987]  kasan_atomics+0xb8/0x2e0
[   64.235633]  kunit_try_run_case+0x170/0x3f0
[   64.239799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.245268]  kthread+0x328/0x630
[   64.248480]  ret_from_fork+0x10/0x20
[   64.252039] 
[   64.253516] The buggy address belongs to the object at ffff000807848f80
[   64.253516]  which belongs to the cache kmalloc-64 of size 64
[   64.265841] The buggy address is located 0 bytes to the right of
[   64.265841]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.278689] 
[   64.280165] The buggy address belongs to the physical page:
[   64.285722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.293707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.300216] page_type: f5(slab)
[   64.303350] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.311072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.318791] page dumped because: kasan: bad access detected
[   64.324347] 
[   64.325822] Memory state around the buggy address:
[   64.330603]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.337805]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.345010] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.352211]                                      ^
[   64.356990]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.364193]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.371394] ==================================================================
[   65.961763] ==================================================================
[   65.968771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   65.976058] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.983436] 
[   65.984920] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.984973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.984989] Hardware name: WinLink E850-96 board (DT)
[   65.985008] Call trace:
[   65.985025]  show_stack+0x20/0x38 (C)
[   65.985057]  dump_stack_lvl+0x8c/0xd0
[   65.985090]  print_report+0x118/0x5d0
[   65.985118]  kasan_report+0xdc/0x128
[   65.985146]  kasan_check_range+0x100/0x1a8
[   65.985177]  __kasan_check_write+0x20/0x30
[   65.985208]  kasan_atomics_helper+0x414/0x4858
[   65.985245]  kasan_atomics+0x198/0x2e0
[   65.985279]  kunit_try_run_case+0x170/0x3f0
[   65.985315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.985348]  kthread+0x328/0x630
[   65.985378]  ret_from_fork+0x10/0x20
[   65.985413] 
[   66.056352] Allocated by task 349:
[   66.059737]  kasan_save_stack+0x3c/0x68
[   66.063557]  kasan_save_track+0x20/0x40
[   66.067376]  kasan_save_alloc_info+0x40/0x58
[   66.071630]  __kasan_kmalloc+0xd4/0xd8
[   66.075362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.079876]  kasan_atomics+0xb8/0x2e0
[   66.083522]  kunit_try_run_case+0x170/0x3f0
[   66.087688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.093157]  kthread+0x328/0x630
[   66.096368]  ret_from_fork+0x10/0x20
[   66.099928] 
[   66.101403] The buggy address belongs to the object at ffff000807848f80
[   66.101403]  which belongs to the cache kmalloc-64 of size 64
[   66.113730] The buggy address is located 0 bytes to the right of
[   66.113730]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.126576] 
[   66.128054] The buggy address belongs to the physical page:
[   66.133610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.141597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.148104] page_type: f5(slab)
[   66.151238] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.158961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.166680] page dumped because: kasan: bad access detected
[   66.172235] 
[   66.173711] Memory state around the buggy address:
[   66.178490]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.185694]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.192901] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.200100]                                      ^
[   66.204877]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.212083]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.219283] ==================================================================
[   75.207929] ==================================================================
[   75.214986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   75.222360] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   75.229738] 
[   75.231219] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   75.231268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.231285] Hardware name: WinLink E850-96 board (DT)
[   75.231304] Call trace:
[   75.231317]  show_stack+0x20/0x38 (C)
[   75.231348]  dump_stack_lvl+0x8c/0xd0
[   75.231377]  print_report+0x118/0x5d0
[   75.231407]  kasan_report+0xdc/0x128
[   75.231435]  kasan_check_range+0x100/0x1a8
[   75.231464]  __kasan_check_write+0x20/0x30
[   75.231496]  kasan_atomics_helper+0x10c0/0x4858
[   75.231531]  kasan_atomics+0x198/0x2e0
[   75.231565]  kunit_try_run_case+0x170/0x3f0
[   75.231603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.231635]  kthread+0x328/0x630
[   75.231662]  ret_from_fork+0x10/0x20
[   75.231693] 
[   75.302741] Allocated by task 349:
[   75.306126]  kasan_save_stack+0x3c/0x68
[   75.309946]  kasan_save_track+0x20/0x40
[   75.313765]  kasan_save_alloc_info+0x40/0x58
[   75.318018]  __kasan_kmalloc+0xd4/0xd8
[   75.321751]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.326265]  kasan_atomics+0xb8/0x2e0
[   75.329911]  kunit_try_run_case+0x170/0x3f0
[   75.334077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.339546]  kthread+0x328/0x630
[   75.342758]  ret_from_fork+0x10/0x20
[   75.346317] 
[   75.347792] The buggy address belongs to the object at ffff000807848f80
[   75.347792]  which belongs to the cache kmalloc-64 of size 64
[   75.360119] The buggy address is located 0 bytes to the right of
[   75.360119]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.372965] 
[   75.374441] The buggy address belongs to the physical page:
[   75.379998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.387983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.394493] page_type: f5(slab)
[   75.397627] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.405350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.413069] page dumped because: kasan: bad access detected
[   75.418624] 
[   75.420100] Memory state around the buggy address:
[   75.424878]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.432083]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.439288] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.446489]                                      ^
[   75.451266]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.458471]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.465672] ==================================================================
[   76.798493] ==================================================================
[   76.805585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   76.812962] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.820340] 
[   76.821819] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.821868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.821885] Hardware name: WinLink E850-96 board (DT)
[   76.821902] Call trace:
[   76.821915]  show_stack+0x20/0x38 (C)
[   76.821948]  dump_stack_lvl+0x8c/0xd0
[   76.821979]  print_report+0x118/0x5d0
[   76.822006]  kasan_report+0xdc/0x128
[   76.822035]  kasan_check_range+0x100/0x1a8
[   76.822063]  __kasan_check_write+0x20/0x30
[   76.822095]  kasan_atomics_helper+0x1384/0x4858
[   76.822129]  kasan_atomics+0x198/0x2e0
[   76.822163]  kunit_try_run_case+0x170/0x3f0
[   76.822198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.822232]  kthread+0x328/0x630
[   76.822259]  ret_from_fork+0x10/0x20
[   76.822292] 
[   76.893342] Allocated by task 349:
[   76.896727]  kasan_save_stack+0x3c/0x68
[   76.900547]  kasan_save_track+0x20/0x40
[   76.904366]  kasan_save_alloc_info+0x40/0x58
[   76.908619]  __kasan_kmalloc+0xd4/0xd8
[   76.912352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.916866]  kasan_atomics+0xb8/0x2e0
[   76.920512]  kunit_try_run_case+0x170/0x3f0
[   76.924678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.930147]  kthread+0x328/0x630
[   76.933359]  ret_from_fork+0x10/0x20
[   76.936918] 
[   76.938393] The buggy address belongs to the object at ffff000807848f80
[   76.938393]  which belongs to the cache kmalloc-64 of size 64
[   76.950720] The buggy address is located 0 bytes to the right of
[   76.950720]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.963567] 
[   76.965042] The buggy address belongs to the physical page:
[   76.970598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.978584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.985094] page_type: f5(slab)
[   76.988227] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.995951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.003670] page dumped because: kasan: bad access detected
[   77.009225] 
[   77.010701] Memory state around the buggy address:
[   77.015479]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.022684]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.029889] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.037090]                                      ^
[   77.041868]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.049073]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.056274] ==================================================================
[   69.932304] ==================================================================
[   69.939368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   69.946659] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.954037] 
[   69.955516] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.955567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.955582] Hardware name: WinLink E850-96 board (DT)
[   69.955599] Call trace:
[   69.955611]  show_stack+0x20/0x38 (C)
[   69.955641]  dump_stack_lvl+0x8c/0xd0
[   69.955673]  print_report+0x118/0x5d0
[   69.955699]  kasan_report+0xdc/0x128
[   69.955724]  kasan_check_range+0x100/0x1a8
[   69.955756]  __kasan_check_write+0x20/0x30
[   69.955787]  kasan_atomics_helper+0xa6c/0x4858
[   69.955823]  kasan_atomics+0x198/0x2e0
[   69.955857]  kunit_try_run_case+0x170/0x3f0
[   69.955890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.955923]  kthread+0x328/0x630
[   69.955949]  ret_from_fork+0x10/0x20
[   69.955982] 
[   70.026952] Allocated by task 349:
[   70.030337]  kasan_save_stack+0x3c/0x68
[   70.034157]  kasan_save_track+0x20/0x40
[   70.037976]  kasan_save_alloc_info+0x40/0x58
[   70.042230]  __kasan_kmalloc+0xd4/0xd8
[   70.045962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.050476]  kasan_atomics+0xb8/0x2e0
[   70.054122]  kunit_try_run_case+0x170/0x3f0
[   70.058289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.063757]  kthread+0x328/0x630
[   70.066968]  ret_from_fork+0x10/0x20
[   70.070528] 
[   70.072004] The buggy address belongs to the object at ffff000807848f80
[   70.072004]  which belongs to the cache kmalloc-64 of size 64
[   70.084330] The buggy address is located 0 bytes to the right of
[   70.084330]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.097177] 
[   70.098653] The buggy address belongs to the physical page:
[   70.104208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.112194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.118704] page_type: f5(slab)
[   70.121837] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.129561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.137280] page dumped because: kasan: bad access detected
[   70.142836] 
[   70.144311] Memory state around the buggy address:
[   70.149089]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.156294]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.163499] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.170700]                                      ^
[   70.175478]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.182682]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.189884] ==================================================================
[   77.855473] ==================================================================
[   77.862513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   77.869890] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.877268] 
[   77.878750] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.878800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.878815] Hardware name: WinLink E850-96 board (DT)
[   77.878835] Call trace:
[   77.878848]  show_stack+0x20/0x38 (C)
[   77.878882]  dump_stack_lvl+0x8c/0xd0
[   77.878911]  print_report+0x118/0x5d0
[   77.878941]  kasan_report+0xdc/0x128
[   77.878969]  kasan_check_range+0x100/0x1a8
[   77.879001]  __kasan_check_write+0x20/0x30
[   77.879029]  kasan_atomics_helper+0x14e4/0x4858
[   77.879064]  kasan_atomics+0x198/0x2e0
[   77.879097]  kunit_try_run_case+0x170/0x3f0
[   77.879131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.879165]  kthread+0x328/0x630
[   77.879191]  ret_from_fork+0x10/0x20
[   77.879222] 
[   77.950270] Allocated by task 349:
[   77.953656]  kasan_save_stack+0x3c/0x68
[   77.957475]  kasan_save_track+0x20/0x40
[   77.961295]  kasan_save_alloc_info+0x40/0x58
[   77.965548]  __kasan_kmalloc+0xd4/0xd8
[   77.969281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.973795]  kasan_atomics+0xb8/0x2e0
[   77.977440]  kunit_try_run_case+0x170/0x3f0
[   77.981607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.987076]  kthread+0x328/0x630
[   77.990287]  ret_from_fork+0x10/0x20
[   77.993846] 
[   77.995322] The buggy address belongs to the object at ffff000807848f80
[   77.995322]  which belongs to the cache kmalloc-64 of size 64
[   78.007649] The buggy address is located 0 bytes to the right of
[   78.007649]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.020495] 
[   78.021973] The buggy address belongs to the physical page:
[   78.027527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.035513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.042023] page_type: f5(slab)
[   78.045157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.052879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.060598] page dumped because: kasan: bad access detected
[   78.066154] 
[   78.067630] Memory state around the buggy address:
[   78.072408]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.079613]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.086818] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.094018]                                      ^
[   78.098796]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.106001]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.113202] ==================================================================
[   63.583501] ==================================================================
[   63.597628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   63.605004] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   63.612293] 
[   63.613777] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.613840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.613856] Hardware name: WinLink E850-96 board (DT)
[   63.613879] Call trace:
[   63.613894]  show_stack+0x20/0x38 (C)
[   63.613930]  dump_stack_lvl+0x8c/0xd0
[   63.613964]  print_report+0x118/0x5d0
[   63.613995]  kasan_report+0xdc/0x128
[   63.614022]  __asan_report_load4_noabort+0x20/0x30
[   63.614059]  kasan_atomics_helper+0x40a8/0x4858
[   63.614095]  kasan_atomics+0x198/0x2e0
[   63.614127]  kunit_try_run_case+0x170/0x3f0
[   63.614168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.614203]  kthread+0x328/0x630
[   63.614233]  ret_from_fork+0x10/0x20
[   63.614270] 
[   63.681910] Allocated by task 349:
[   63.685295]  kasan_save_stack+0x3c/0x68
[   63.689113]  kasan_save_track+0x20/0x40
[   63.692932]  kasan_save_alloc_info+0x40/0x58
[   63.697186]  __kasan_kmalloc+0xd4/0xd8
[   63.700920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.705432]  kasan_atomics+0xb8/0x2e0
[   63.709078]  kunit_try_run_case+0x170/0x3f0
[   63.713244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.718713]  kthread+0x328/0x630
[   63.721925]  ret_from_fork+0x10/0x20
[   63.725484] 
[   63.726961] The buggy address belongs to the object at ffff000807848f80
[   63.726961]  which belongs to the cache kmalloc-64 of size 64
[   63.739288] The buggy address is located 0 bytes to the right of
[   63.739288]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   63.752133] 
[   63.753612] The buggy address belongs to the physical page:
[   63.759168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   63.767153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.773663] page_type: f5(slab)
[   63.776798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.784517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.792238] page dumped because: kasan: bad access detected
[   63.797792] 
[   63.799267] Memory state around the buggy address:
[   63.804049]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.811251]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.818457] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.825656]                                      ^
[   63.830435]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.837639]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.844843] ==================================================================
[   79.439102] ==================================================================
[   79.446170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   79.453547] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.460925] 
[   79.462406] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.462457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.462474] Hardware name: WinLink E850-96 board (DT)
[   79.462494] Call trace:
[   79.462505]  show_stack+0x20/0x38 (C)
[   79.462539]  dump_stack_lvl+0x8c/0xd0
[   79.462570]  print_report+0x118/0x5d0
[   79.462597]  kasan_report+0xdc/0x128
[   79.462625]  kasan_check_range+0x100/0x1a8
[   79.462655]  __kasan_check_write+0x20/0x30
[   79.462686]  kasan_atomics_helper+0x16d0/0x4858
[   79.462722]  kasan_atomics+0x198/0x2e0
[   79.462753]  kunit_try_run_case+0x170/0x3f0
[   79.462789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.462821]  kthread+0x328/0x630
[   79.462849]  ret_from_fork+0x10/0x20
[   79.462880] 
[   79.533927] Allocated by task 349:
[   79.537313]  kasan_save_stack+0x3c/0x68
[   79.541132]  kasan_save_track+0x20/0x40
[   79.544952]  kasan_save_alloc_info+0x40/0x58
[   79.549205]  __kasan_kmalloc+0xd4/0xd8
[   79.552937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.557451]  kasan_atomics+0xb8/0x2e0
[   79.561097]  kunit_try_run_case+0x170/0x3f0
[   79.565264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.570732]  kthread+0x328/0x630
[   79.573944]  ret_from_fork+0x10/0x20
[   79.577503] 
[   79.578979] The buggy address belongs to the object at ffff000807848f80
[   79.578979]  which belongs to the cache kmalloc-64 of size 64
[   79.591306] The buggy address is located 0 bytes to the right of
[   79.591306]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.604152] 
[   79.605630] The buggy address belongs to the physical page:
[   79.611184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.619170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.625680] page_type: f5(slab)
[   79.628814] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.636537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.644256] page dumped because: kasan: bad access detected
[   79.649811] 
[   79.651287] Memory state around the buggy address:
[   79.656064]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.663269]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.670474] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.677675]                                      ^
[   79.682453]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.689658]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.696859] ==================================================================
[   69.137553] ==================================================================
[   69.144588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   69.151879] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.159257] 
[   69.160738] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.160785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.160801] Hardware name: WinLink E850-96 board (DT)
[   69.160816] Call trace:
[   69.160830]  show_stack+0x20/0x38 (C)
[   69.160863]  dump_stack_lvl+0x8c/0xd0
[   69.160893]  print_report+0x118/0x5d0
[   69.160920]  kasan_report+0xdc/0x128
[   69.160947]  kasan_check_range+0x100/0x1a8
[   69.160977]  __kasan_check_write+0x20/0x30
[   69.161008]  kasan_atomics_helper+0x934/0x4858
[   69.161043]  kasan_atomics+0x198/0x2e0
[   69.161076]  kunit_try_run_case+0x170/0x3f0
[   69.161113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.161145]  kthread+0x328/0x630
[   69.161172]  ret_from_fork+0x10/0x20
[   69.161203] 
[   69.232172] Allocated by task 349:
[   69.235558]  kasan_save_stack+0x3c/0x68
[   69.239377]  kasan_save_track+0x20/0x40
[   69.243197]  kasan_save_alloc_info+0x40/0x58
[   69.247450]  __kasan_kmalloc+0xd4/0xd8
[   69.251183]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.255696]  kasan_atomics+0xb8/0x2e0
[   69.259342]  kunit_try_run_case+0x170/0x3f0
[   69.263508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.268977]  kthread+0x328/0x630
[   69.272189]  ret_from_fork+0x10/0x20
[   69.275748] 
[   69.277224] The buggy address belongs to the object at ffff000807848f80
[   69.277224]  which belongs to the cache kmalloc-64 of size 64
[   69.289550] The buggy address is located 0 bytes to the right of
[   69.289550]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.302397] 
[   69.303873] The buggy address belongs to the physical page:
[   69.309429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.317416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.323924] page_type: f5(slab)
[   69.327059] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.334781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.342501] page dumped because: kasan: bad access detected
[   69.348056] 
[   69.349531] Memory state around the buggy address:
[   69.354310]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.361515]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.368719] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.375920]                                      ^
[   69.380698]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.387902]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.395104] ==================================================================
[   68.346048] ==================================================================
[   68.353107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   68.360397] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.367776] 
[   68.369255] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.369302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.369318] Hardware name: WinLink E850-96 board (DT)
[   68.369336] Call trace:
[   68.369349]  show_stack+0x20/0x38 (C)
[   68.369380]  dump_stack_lvl+0x8c/0xd0
[   68.369411]  print_report+0x118/0x5d0
[   68.369437]  kasan_report+0xdc/0x128
[   68.369466]  kasan_check_range+0x100/0x1a8
[   68.369494]  __kasan_check_write+0x20/0x30
[   68.369524]  kasan_atomics_helper+0x7cc/0x4858
[   68.369559]  kasan_atomics+0x198/0x2e0
[   68.369592]  kunit_try_run_case+0x170/0x3f0
[   68.369627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.369659]  kthread+0x328/0x630
[   68.369686]  ret_from_fork+0x10/0x20
[   68.369716] 
[   68.440691] Allocated by task 349:
[   68.444077]  kasan_save_stack+0x3c/0x68
[   68.447896]  kasan_save_track+0x20/0x40
[   68.451715]  kasan_save_alloc_info+0x40/0x58
[   68.455969]  __kasan_kmalloc+0xd4/0xd8
[   68.459701]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.464215]  kasan_atomics+0xb8/0x2e0
[   68.467861]  kunit_try_run_case+0x170/0x3f0
[   68.472027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.477496]  kthread+0x328/0x630
[   68.480708]  ret_from_fork+0x10/0x20
[   68.484267] 
[   68.485742] The buggy address belongs to the object at ffff000807848f80
[   68.485742]  which belongs to the cache kmalloc-64 of size 64
[   68.498069] The buggy address is located 0 bytes to the right of
[   68.498069]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   68.510916] 
[   68.512391] The buggy address belongs to the physical page:
[   68.517947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   68.525933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.532443] page_type: f5(slab)
[   68.535578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.543300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.551020] page dumped because: kasan: bad access detected
[   68.556575] 
[   68.558050] Memory state around the buggy address:
[   68.562828]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.570033]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.577238] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.584439]                                      ^
[   68.589217]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.596421]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.603623] ==================================================================
[   71.250340] ==================================================================
[   71.257404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   71.264694] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.272072] 
[   71.273551] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.273601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.273619] Hardware name: WinLink E850-96 board (DT)
[   71.273638] Call trace:
[   71.273653]  show_stack+0x20/0x38 (C)
[   71.273686]  dump_stack_lvl+0x8c/0xd0
[   71.273716]  print_report+0x118/0x5d0
[   71.273746]  kasan_report+0xdc/0x128
[   71.273772]  kasan_check_range+0x100/0x1a8
[   71.273803]  __kasan_check_write+0x20/0x30
[   71.273835]  kasan_atomics_helper+0xc08/0x4858
[   71.273870]  kasan_atomics+0x198/0x2e0
[   71.273903]  kunit_try_run_case+0x170/0x3f0
[   71.273937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.273971]  kthread+0x328/0x630
[   71.273998]  ret_from_fork+0x10/0x20
[   71.274029] 
[   71.344988] Allocated by task 349:
[   71.348373]  kasan_save_stack+0x3c/0x68
[   71.352192]  kasan_save_track+0x20/0x40
[   71.356012]  kasan_save_alloc_info+0x40/0x58
[   71.360266]  __kasan_kmalloc+0xd4/0xd8
[   71.363998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.368512]  kasan_atomics+0xb8/0x2e0
[   71.372157]  kunit_try_run_case+0x170/0x3f0
[   71.376324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.381793]  kthread+0x328/0x630
[   71.385005]  ret_from_fork+0x10/0x20
[   71.388564] 
[   71.390039] The buggy address belongs to the object at ffff000807848f80
[   71.390039]  which belongs to the cache kmalloc-64 of size 64
[   71.402366] The buggy address is located 0 bytes to the right of
[   71.402366]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.415212] 
[   71.416688] The buggy address belongs to the physical page:
[   71.422244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.430230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.436740] page_type: f5(slab)
[   71.439873] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.447597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.455316] page dumped because: kasan: bad access detected
[   71.460871] 
[   71.462347] Memory state around the buggy address:
[   71.467125]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.474330]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.481534] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.488735]                                      ^
[   71.493513]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.500718]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.507920] ==================================================================
[   78.650751] ==================================================================
[   78.657813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   78.665191] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.672482] 
[   78.673962] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.674008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.674026] Hardware name: WinLink E850-96 board (DT)
[   78.674046] Call trace:
[   78.674056]  show_stack+0x20/0x38 (C)
[   78.674091]  dump_stack_lvl+0x8c/0xd0
[   78.674119]  print_report+0x118/0x5d0
[   78.674147]  kasan_report+0xdc/0x128
[   78.674176]  __asan_report_load8_noabort+0x20/0x30
[   78.674208]  kasan_atomics_helper+0x3db0/0x4858
[   78.674243]  kasan_atomics+0x198/0x2e0
[   78.674277]  kunit_try_run_case+0x170/0x3f0
[   78.674312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.674345]  kthread+0x328/0x630
[   78.674372]  ret_from_fork+0x10/0x20
[   78.674404] 
[   78.742099] Allocated by task 349:
[   78.745484]  kasan_save_stack+0x3c/0x68
[   78.749304]  kasan_save_track+0x20/0x40
[   78.753123]  kasan_save_alloc_info+0x40/0x58
[   78.757377]  __kasan_kmalloc+0xd4/0xd8
[   78.761109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.765623]  kasan_atomics+0xb8/0x2e0
[   78.769269]  kunit_try_run_case+0x170/0x3f0
[   78.773435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.778904]  kthread+0x328/0x630
[   78.782116]  ret_from_fork+0x10/0x20
[   78.785675] 
[   78.787150] The buggy address belongs to the object at ffff000807848f80
[   78.787150]  which belongs to the cache kmalloc-64 of size 64
[   78.799477] The buggy address is located 0 bytes to the right of
[   78.799477]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.812324] 
[   78.813799] The buggy address belongs to the physical page:
[   78.819355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.827341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.833851] page_type: f5(slab)
[   78.836984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.844708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.852427] page dumped because: kasan: bad access detected
[   78.857983] 
[   78.859458] Memory state around the buggy address:
[   78.864236]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.871441]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.878646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.885847]                                      ^
[   78.890625]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.897829]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.905031] ==================================================================
[   73.621310] ==================================================================
[   73.628376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   73.635752] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.643130] 
[   73.644611] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.644660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.644677] Hardware name: WinLink E850-96 board (DT)
[   73.644695] Call trace:
[   73.644709]  show_stack+0x20/0x38 (C)
[   73.644743]  dump_stack_lvl+0x8c/0xd0
[   73.644775]  print_report+0x118/0x5d0
[   73.644803]  kasan_report+0xdc/0x128
[   73.644830]  __asan_report_store8_noabort+0x20/0x30
[   73.644862]  kasan_atomics_helper+0x3e5c/0x4858
[   73.644897]  kasan_atomics+0x198/0x2e0
[   73.644931]  kunit_try_run_case+0x170/0x3f0
[   73.644966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.645000]  kthread+0x328/0x630
[   73.645028]  ret_from_fork+0x10/0x20
[   73.645059] 
[   73.712834] Allocated by task 349:
[   73.716219]  kasan_save_stack+0x3c/0x68
[   73.720039]  kasan_save_track+0x20/0x40
[   73.723858]  kasan_save_alloc_info+0x40/0x58
[   73.728112]  __kasan_kmalloc+0xd4/0xd8
[   73.731844]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.736358]  kasan_atomics+0xb8/0x2e0
[   73.740004]  kunit_try_run_case+0x170/0x3f0
[   73.744171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.749639]  kthread+0x328/0x630
[   73.752851]  ret_from_fork+0x10/0x20
[   73.756410] 
[   73.757886] The buggy address belongs to the object at ffff000807848f80
[   73.757886]  which belongs to the cache kmalloc-64 of size 64
[   73.770212] The buggy address is located 0 bytes to the right of
[   73.770212]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   73.783059] 
[   73.784535] The buggy address belongs to the physical page:
[   73.790090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.798076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.804586] page_type: f5(slab)
[   73.807723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.815443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.823163] page dumped because: kasan: bad access detected
[   73.828718] 
[   73.830194] Memory state around the buggy address:
[   73.834971]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.842176]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.849381] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.856582]                                      ^
[   73.861360]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.868565]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.875766] ==================================================================
[   78.120523] ==================================================================
[   78.127614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   78.134991] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.142369] 
[   78.143848] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.143895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.143912] Hardware name: WinLink E850-96 board (DT)
[   78.143930] Call trace:
[   78.143944]  show_stack+0x20/0x38 (C)
[   78.143979]  dump_stack_lvl+0x8c/0xd0
[   78.144007]  print_report+0x118/0x5d0
[   78.144038]  kasan_report+0xdc/0x128
[   78.144067]  kasan_check_range+0x100/0x1a8
[   78.144098]  __kasan_check_write+0x20/0x30
[   78.144129]  kasan_atomics_helper+0x154c/0x4858
[   78.144165]  kasan_atomics+0x198/0x2e0
[   78.144198]  kunit_try_run_case+0x170/0x3f0
[   78.144235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.144267]  kthread+0x328/0x630
[   78.144293]  ret_from_fork+0x10/0x20
[   78.144326] 
[   78.215371] Allocated by task 349:
[   78.218757]  kasan_save_stack+0x3c/0x68
[   78.222575]  kasan_save_track+0x20/0x40
[   78.226395]  kasan_save_alloc_info+0x40/0x58
[   78.230648]  __kasan_kmalloc+0xd4/0xd8
[   78.234381]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.238895]  kasan_atomics+0xb8/0x2e0
[   78.242540]  kunit_try_run_case+0x170/0x3f0
[   78.246707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.252176]  kthread+0x328/0x630
[   78.255387]  ret_from_fork+0x10/0x20
[   78.258946] 
[   78.260422] The buggy address belongs to the object at ffff000807848f80
[   78.260422]  which belongs to the cache kmalloc-64 of size 64
[   78.272749] The buggy address is located 0 bytes to the right of
[   78.272749]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.285595] 
[   78.287071] The buggy address belongs to the physical page:
[   78.292627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.300613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.307123] page_type: f5(slab)
[   78.310256] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.317980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.325699] page dumped because: kasan: bad access detected
[   78.331254] 
[   78.332730] Memory state around the buggy address:
[   78.337508]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.344713]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.351917] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.359119]                                      ^
[   78.363897]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.371101]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.378302] ==================================================================
[   78.912400] ==================================================================
[   78.919442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   78.926819] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.934197] 
[   78.935676] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.935725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.935741] Hardware name: WinLink E850-96 board (DT)
[   78.935758] Call trace:
[   78.935772]  show_stack+0x20/0x38 (C)
[   78.935804]  dump_stack_lvl+0x8c/0xd0
[   78.935834]  print_report+0x118/0x5d0
[   78.935864]  kasan_report+0xdc/0x128
[   78.935891]  kasan_check_range+0x100/0x1a8
[   78.935922]  __kasan_check_write+0x20/0x30
[   78.935955]  kasan_atomics_helper+0x1644/0x4858
[   78.935989]  kasan_atomics+0x198/0x2e0
[   78.936021]  kunit_try_run_case+0x170/0x3f0
[   78.936056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.936088]  kthread+0x328/0x630
[   78.936116]  ret_from_fork+0x10/0x20
[   78.936149] 
[   79.007199] Allocated by task 349:
[   79.010585]  kasan_save_stack+0x3c/0x68
[   79.014404]  kasan_save_track+0x20/0x40
[   79.018223]  kasan_save_alloc_info+0x40/0x58
[   79.022477]  __kasan_kmalloc+0xd4/0xd8
[   79.026209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.030723]  kasan_atomics+0xb8/0x2e0
[   79.034369]  kunit_try_run_case+0x170/0x3f0
[   79.038535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.044004]  kthread+0x328/0x630
[   79.047216]  ret_from_fork+0x10/0x20
[   79.050775] 
[   79.052251] The buggy address belongs to the object at ffff000807848f80
[   79.052251]  which belongs to the cache kmalloc-64 of size 64
[   79.064577] The buggy address is located 0 bytes to the right of
[   79.064577]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.077424] 
[   79.078900] The buggy address belongs to the physical page:
[   79.084455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.092441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.098951] page_type: f5(slab)
[   79.102087] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.109808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.117527] page dumped because: kasan: bad access detected
[   79.123082] 
[   79.124558] Memory state around the buggy address:
[   79.129336]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.136541]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.143746] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.150947]                                      ^
[   79.155725]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.162930]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.170131] ==================================================================
[   65.696840] ==================================================================
[   65.703844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   65.711132] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.718510] 
[   65.719993] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.720046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.720061] Hardware name: WinLink E850-96 board (DT)
[   65.720082] Call trace:
[   65.720096]  show_stack+0x20/0x38 (C)
[   65.720132]  dump_stack_lvl+0x8c/0xd0
[   65.720164]  print_report+0x118/0x5d0
[   65.720193]  kasan_report+0xdc/0x128
[   65.720221]  kasan_check_range+0x100/0x1a8
[   65.720251]  __kasan_check_write+0x20/0x30
[   65.720283]  kasan_atomics_helper+0x3ac/0x4858
[   65.720320]  kasan_atomics+0x198/0x2e0
[   65.720352]  kunit_try_run_case+0x170/0x3f0
[   65.720388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.720420]  kthread+0x328/0x630
[   65.720450]  ret_from_fork+0x10/0x20
[   65.720485] 
[   65.791425] Allocated by task 349:
[   65.794811]  kasan_save_stack+0x3c/0x68
[   65.798630]  kasan_save_track+0x20/0x40
[   65.802449]  kasan_save_alloc_info+0x40/0x58
[   65.806703]  __kasan_kmalloc+0xd4/0xd8
[   65.810435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.814949]  kasan_atomics+0xb8/0x2e0
[   65.818595]  kunit_try_run_case+0x170/0x3f0
[   65.822762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.828230]  kthread+0x328/0x630
[   65.831442]  ret_from_fork+0x10/0x20
[   65.835001] 
[   65.836477] The buggy address belongs to the object at ffff000807848f80
[   65.836477]  which belongs to the cache kmalloc-64 of size 64
[   65.848803] The buggy address is located 0 bytes to the right of
[   65.848803]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.861650] 
[   65.863127] The buggy address belongs to the physical page:
[   65.868683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.876671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.883178] page_type: f5(slab)
[   65.886313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.894035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.901754] page dumped because: kasan: bad access detected
[   65.907309] 
[   65.908784] Memory state around the buggy address:
[   65.913563]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.920767]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.927974] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.935173]                                      ^
[   65.939951]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.947156]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.954357] ==================================================================
[   68.611000] ==================================================================
[   68.618034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   68.625324] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.632702] 
[   68.634183] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.634232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.634247] Hardware name: WinLink E850-96 board (DT)
[   68.634268] Call trace:
[   68.634280]  show_stack+0x20/0x38 (C)
[   68.634311]  dump_stack_lvl+0x8c/0xd0
[   68.634343]  print_report+0x118/0x5d0
[   68.634371]  kasan_report+0xdc/0x128
[   68.634399]  kasan_check_range+0x100/0x1a8
[   68.634430]  __kasan_check_write+0x20/0x30
[   68.634461]  kasan_atomics_helper+0x894/0x4858
[   68.634496]  kasan_atomics+0x198/0x2e0
[   68.634529]  kunit_try_run_case+0x170/0x3f0
[   68.634562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.634594]  kthread+0x328/0x630
[   68.634624]  ret_from_fork+0x10/0x20
[   68.634656] 
[   68.705617] Allocated by task 349:
[   68.709003]  kasan_save_stack+0x3c/0x68
[   68.712822]  kasan_save_track+0x20/0x40
[   68.716642]  kasan_save_alloc_info+0x40/0x58
[   68.720895]  __kasan_kmalloc+0xd4/0xd8
[   68.724628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.729142]  kasan_atomics+0xb8/0x2e0
[   68.732787]  kunit_try_run_case+0x170/0x3f0
[   68.736954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.742423]  kthread+0x328/0x630
[   68.745634]  ret_from_fork+0x10/0x20
[   68.749193] 
[   68.750669] The buggy address belongs to the object at ffff000807848f80
[   68.750669]  which belongs to the cache kmalloc-64 of size 64
[   68.762996] The buggy address is located 0 bytes to the right of
[   68.762996]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   68.775842] 
[   68.777318] The buggy address belongs to the physical page:
[   68.782874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   68.790861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.797370] page_type: f5(slab)
[   68.800503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.808227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.815946] page dumped because: kasan: bad access detected
[   68.821501] 
[   68.822977] Memory state around the buggy address:
[   68.827755]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.834960]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.842165] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.849366]                                      ^
[   68.854143]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.861348]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.868549] ==================================================================
[   72.568401] ==================================================================
[   72.575440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   72.582817] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.590108] 
[   72.591587] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.591639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.591657] Hardware name: WinLink E850-96 board (DT)
[   72.591676] Call trace:
[   72.591689]  show_stack+0x20/0x38 (C)
[   72.591721]  dump_stack_lvl+0x8c/0xd0
[   72.591753]  print_report+0x118/0x5d0
[   72.591782]  kasan_report+0xdc/0x128
[   72.591810]  __asan_report_load4_noabort+0x20/0x30
[   72.591842]  kasan_atomics_helper+0x3e04/0x4858
[   72.591877]  kasan_atomics+0x198/0x2e0
[   72.591911]  kunit_try_run_case+0x170/0x3f0
[   72.591946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.591981]  kthread+0x328/0x630
[   72.592008]  ret_from_fork+0x10/0x20
[   72.592040] 
[   72.659725] Allocated by task 349:
[   72.663110]  kasan_save_stack+0x3c/0x68
[   72.666930]  kasan_save_track+0x20/0x40
[   72.670749]  kasan_save_alloc_info+0x40/0x58
[   72.675003]  __kasan_kmalloc+0xd4/0xd8
[   72.678735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.683249]  kasan_atomics+0xb8/0x2e0
[   72.686895]  kunit_try_run_case+0x170/0x3f0
[   72.691061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.696530]  kthread+0x328/0x630
[   72.699742]  ret_from_fork+0x10/0x20
[   72.703301] 
[   72.704776] The buggy address belongs to the object at ffff000807848f80
[   72.704776]  which belongs to the cache kmalloc-64 of size 64
[   72.717103] The buggy address is located 0 bytes to the right of
[   72.717103]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.729950] 
[   72.731426] The buggy address belongs to the physical page:
[   72.736982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   72.744967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.751477] page_type: f5(slab)
[   72.754610] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.762334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.770053] page dumped because: kasan: bad access detected
[   72.775609] 
[   72.777084] Memory state around the buggy address:
[   72.781862]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.789067]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.796272] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.803473]                                      ^
[   72.808251]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.815455]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.822657] ==================================================================
[   67.286368] ==================================================================
[   67.293401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   67.300691] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.308071] 
[   67.309553] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.309605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.309622] Hardware name: WinLink E850-96 board (DT)
[   67.309642] Call trace:
[   67.309652]  show_stack+0x20/0x38 (C)
[   67.309684]  dump_stack_lvl+0x8c/0xd0
[   67.309716]  print_report+0x118/0x5d0
[   67.309745]  kasan_report+0xdc/0x128
[   67.309773]  kasan_check_range+0x100/0x1a8
[   67.309802]  __kasan_check_write+0x20/0x30
[   67.309833]  kasan_atomics_helper+0x61c/0x4858
[   67.309869]  kasan_atomics+0x198/0x2e0
[   67.309900]  kunit_try_run_case+0x170/0x3f0
[   67.309936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.309969]  kthread+0x328/0x630
[   67.309996]  ret_from_fork+0x10/0x20
[   67.310029] 
[   67.380985] Allocated by task 349:
[   67.384370]  kasan_save_stack+0x3c/0x68
[   67.388190]  kasan_save_track+0x20/0x40
[   67.392009]  kasan_save_alloc_info+0x40/0x58
[   67.396262]  __kasan_kmalloc+0xd4/0xd8
[   67.399995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.404509]  kasan_atomics+0xb8/0x2e0
[   67.408155]  kunit_try_run_case+0x170/0x3f0
[   67.412321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.417790]  kthread+0x328/0x630
[   67.421002]  ret_from_fork+0x10/0x20
[   67.424561] 
[   67.426036] The buggy address belongs to the object at ffff000807848f80
[   67.426036]  which belongs to the cache kmalloc-64 of size 64
[   67.438363] The buggy address is located 0 bytes to the right of
[   67.438363]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.451209] 
[   67.452686] The buggy address belongs to the physical page:
[   67.458241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.466228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.472737] page_type: f5(slab)
[   67.475871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.483594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.491313] page dumped because: kasan: bad access detected
[   67.496869] 
[   67.498344] Memory state around the buggy address:
[   67.503122]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.510327]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.517532] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.524732]                                      ^
[   67.529511]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.536715]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.543916] ==================================================================
[   70.197231] ==================================================================
[   70.204294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   70.211585] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   70.218963] 
[   70.220445] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   70.220494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.220511] Hardware name: WinLink E850-96 board (DT)
[   70.220529] Call trace:
[   70.220540]  show_stack+0x20/0x38 (C)
[   70.220572]  dump_stack_lvl+0x8c/0xd0
[   70.220602]  print_report+0x118/0x5d0
[   70.220630]  kasan_report+0xdc/0x128
[   70.220659]  kasan_check_range+0x100/0x1a8
[   70.220688]  __kasan_check_write+0x20/0x30
[   70.220720]  kasan_atomics_helper+0xad4/0x4858
[   70.220756]  kasan_atomics+0x198/0x2e0
[   70.220791]  kunit_try_run_case+0x170/0x3f0
[   70.220826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.220858]  kthread+0x328/0x630
[   70.220884]  ret_from_fork+0x10/0x20
[   70.220914] 
[   70.291878] Allocated by task 349:
[   70.295264]  kasan_save_stack+0x3c/0x68
[   70.299084]  kasan_save_track+0x20/0x40
[   70.302903]  kasan_save_alloc_info+0x40/0x58
[   70.307156]  __kasan_kmalloc+0xd4/0xd8
[   70.310889]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.315403]  kasan_atomics+0xb8/0x2e0
[   70.319049]  kunit_try_run_case+0x170/0x3f0
[   70.323215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.328684]  kthread+0x328/0x630
[   70.331895]  ret_from_fork+0x10/0x20
[   70.335454] 
[   70.336930] The buggy address belongs to the object at ffff000807848f80
[   70.336930]  which belongs to the cache kmalloc-64 of size 64
[   70.349257] The buggy address is located 0 bytes to the right of
[   70.349257]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.362103] 
[   70.363579] The buggy address belongs to the physical page:
[   70.369135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.377122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.383631] page_type: f5(slab)
[   70.386765] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.394488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.402207] page dumped because: kasan: bad access detected
[   70.407762] 
[   70.409238] Memory state around the buggy address:
[   70.414016]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.421221]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.428425] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.435626]                                      ^
[   70.440405]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.447609]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.454810] ==================================================================
[   72.829982] ==================================================================
[   72.837067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   72.844358] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.851649] 
[   72.853129] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.853179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.853196] Hardware name: WinLink E850-96 board (DT)
[   72.853215] Call trace:
[   72.853227]  show_stack+0x20/0x38 (C)
[   72.853260]  dump_stack_lvl+0x8c/0xd0
[   72.853293]  print_report+0x118/0x5d0
[   72.853322]  kasan_report+0xdc/0x128
[   72.853351]  kasan_check_range+0x100/0x1a8
[   72.853383]  __kasan_check_read+0x20/0x30
[   72.853413]  kasan_atomics_helper+0xdd4/0x4858
[   72.853448]  kasan_atomics+0x198/0x2e0
[   72.853479]  kunit_try_run_case+0x170/0x3f0
[   72.853515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.853549]  kthread+0x328/0x630
[   72.853577]  ret_from_fork+0x10/0x20
[   72.853610] 
[   72.924478] Allocated by task 349:
[   72.927863]  kasan_save_stack+0x3c/0x68
[   72.931683]  kasan_save_track+0x20/0x40
[   72.935502]  kasan_save_alloc_info+0x40/0x58
[   72.939756]  __kasan_kmalloc+0xd4/0xd8
[   72.943488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.948002]  kasan_atomics+0xb8/0x2e0
[   72.951648]  kunit_try_run_case+0x170/0x3f0
[   72.955814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.961283]  kthread+0x328/0x630
[   72.964495]  ret_from_fork+0x10/0x20
[   72.968054] 
[   72.969529] The buggy address belongs to the object at ffff000807848f80
[   72.969529]  which belongs to the cache kmalloc-64 of size 64
[   72.981856] The buggy address is located 0 bytes to the right of
[   72.981856]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.994703] 
[   72.996178] The buggy address belongs to the physical page:
[   73.001734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.009720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.016230] page_type: f5(slab)
[   73.019363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.027087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.034806] page dumped because: kasan: bad access detected
[   73.040362] 
[   73.041837] Memory state around the buggy address:
[   73.046615]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.053820]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.061025] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.068226]                                      ^
[   73.073004]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.080208]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.087409] ==================================================================
[   75.473032] ==================================================================
[   75.480085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   75.487460] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   75.494839] 
[   75.496319] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   75.496370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.496384] Hardware name: WinLink E850-96 board (DT)
[   75.496405] Call trace:
[   75.496418]  show_stack+0x20/0x38 (C)
[   75.496449]  dump_stack_lvl+0x8c/0xd0
[   75.496481]  print_report+0x118/0x5d0
[   75.496510]  kasan_report+0xdc/0x128
[   75.496537]  kasan_check_range+0x100/0x1a8
[   75.496569]  __kasan_check_write+0x20/0x30
[   75.496600]  kasan_atomics_helper+0x1128/0x4858
[   75.496636]  kasan_atomics+0x198/0x2e0
[   75.496668]  kunit_try_run_case+0x170/0x3f0
[   75.496702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.496736]  kthread+0x328/0x630
[   75.496763]  ret_from_fork+0x10/0x20
[   75.496794] 
[   75.567841] Allocated by task 349:
[   75.571226]  kasan_save_stack+0x3c/0x68
[   75.575046]  kasan_save_track+0x20/0x40
[   75.578865]  kasan_save_alloc_info+0x40/0x58
[   75.583119]  __kasan_kmalloc+0xd4/0xd8
[   75.586851]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.591365]  kasan_atomics+0xb8/0x2e0
[   75.595011]  kunit_try_run_case+0x170/0x3f0
[   75.599177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.604646]  kthread+0x328/0x630
[   75.607857]  ret_from_fork+0x10/0x20
[   75.611417] 
[   75.612892] The buggy address belongs to the object at ffff000807848f80
[   75.612892]  which belongs to the cache kmalloc-64 of size 64
[   75.625219] The buggy address is located 0 bytes to the right of
[   75.625219]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.638065] 
[   75.639541] The buggy address belongs to the physical page:
[   75.645098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.653084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.659593] page_type: f5(slab)
[   75.662728] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.670450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.678169] page dumped because: kasan: bad access detected
[   75.683725] 
[   75.685200] Memory state around the buggy address:
[   75.689978]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.697183]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.704388] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.711589]                                      ^
[   75.716367]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.723572]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.730773] ==================================================================
[   67.816194] ==================================================================
[   67.823254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   67.830544] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.837922] 
[   67.839402] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.839450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.839466] Hardware name: WinLink E850-96 board (DT)
[   67.839485] Call trace:
[   67.839497]  show_stack+0x20/0x38 (C)
[   67.839529]  dump_stack_lvl+0x8c/0xd0
[   67.839557]  print_report+0x118/0x5d0
[   67.839584]  kasan_report+0xdc/0x128
[   67.839612]  kasan_check_range+0x100/0x1a8
[   67.839641]  __kasan_check_write+0x20/0x30
[   67.839671]  kasan_atomics_helper+0x6ec/0x4858
[   67.839706]  kasan_atomics+0x198/0x2e0
[   67.839738]  kunit_try_run_case+0x170/0x3f0
[   67.839772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.839807]  kthread+0x328/0x630
[   67.839836]  ret_from_fork+0x10/0x20
[   67.839866] 
[   67.910838] Allocated by task 349:
[   67.914223]  kasan_save_stack+0x3c/0x68
[   67.918043]  kasan_save_track+0x20/0x40
[   67.921862]  kasan_save_alloc_info+0x40/0x58
[   67.926116]  __kasan_kmalloc+0xd4/0xd8
[   67.929848]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.934362]  kasan_atomics+0xb8/0x2e0
[   67.938008]  kunit_try_run_case+0x170/0x3f0
[   67.942175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.947643]  kthread+0x328/0x630
[   67.950855]  ret_from_fork+0x10/0x20
[   67.954413] 
[   67.955889] The buggy address belongs to the object at ffff000807848f80
[   67.955889]  which belongs to the cache kmalloc-64 of size 64
[   67.968216] The buggy address is located 0 bytes to the right of
[   67.968216]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.981063] 
[   67.982538] The buggy address belongs to the physical page:
[   67.988094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.996080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.002590] page_type: f5(slab)
[   68.005724] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.013447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.021166] page dumped because: kasan: bad access detected
[   68.026722] 
[   68.028197] Memory state around the buggy address:
[   68.032975]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.040180]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.047385] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.054586]                                      ^
[   68.059364]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.066568]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.073770] ==================================================================
[   64.378838] ==================================================================
[   64.385808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   64.393097] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.400474] 
[   64.401958] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.402013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.402031] Hardware name: WinLink E850-96 board (DT)
[   64.402050] Call trace:
[   64.402066]  show_stack+0x20/0x38 (C)
[   64.402102]  dump_stack_lvl+0x8c/0xd0
[   64.402135]  print_report+0x118/0x5d0
[   64.402168]  kasan_report+0xdc/0x128
[   64.402196]  kasan_check_range+0x100/0x1a8
[   64.402228]  __kasan_check_write+0x20/0x30
[   64.402260]  kasan_atomics_helper+0x24c/0x4858
[   64.402295]  kasan_atomics+0x198/0x2e0
[   64.402328]  kunit_try_run_case+0x170/0x3f0
[   64.402365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.402399]  kthread+0x328/0x630
[   64.402429]  ret_from_fork+0x10/0x20
[   64.402464] 
[   64.473389] Allocated by task 349:
[   64.476776]  kasan_save_stack+0x3c/0x68
[   64.480594]  kasan_save_track+0x20/0x40
[   64.484414]  kasan_save_alloc_info+0x40/0x58
[   64.488667]  __kasan_kmalloc+0xd4/0xd8
[   64.492400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.496913]  kasan_atomics+0xb8/0x2e0
[   64.500559]  kunit_try_run_case+0x170/0x3f0
[   64.504726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.510194]  kthread+0x328/0x630
[   64.513406]  ret_from_fork+0x10/0x20
[   64.516965] 
[   64.518442] The buggy address belongs to the object at ffff000807848f80
[   64.518442]  which belongs to the cache kmalloc-64 of size 64
[   64.530767] The buggy address is located 0 bytes to the right of
[   64.530767]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.543614] 
[   64.545092] The buggy address belongs to the physical page:
[   64.550648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.558634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.565143] page_type: f5(slab)
[   64.568278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.575999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.583718] page dumped because: kasan: bad access detected
[   64.589274] 
[   64.590749] Memory state around the buggy address:
[   64.595530]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.602732]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.609938] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.617137]                                      ^
[   64.621917]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.629120]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.636323] ==================================================================
[   73.094757] ==================================================================
[   73.101820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   73.109198] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.116489] 
[   73.117969] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.118016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.118033] Hardware name: WinLink E850-96 board (DT)
[   73.118052] Call trace:
[   73.118065]  show_stack+0x20/0x38 (C)
[   73.118097]  dump_stack_lvl+0x8c/0xd0
[   73.118131]  print_report+0x118/0x5d0
[   73.118158]  kasan_report+0xdc/0x128
[   73.118186]  __asan_report_load8_noabort+0x20/0x30
[   73.118219]  kasan_atomics_helper+0x3f58/0x4858
[   73.118254]  kasan_atomics+0x198/0x2e0
[   73.118286]  kunit_try_run_case+0x170/0x3f0
[   73.118322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.118355]  kthread+0x328/0x630
[   73.118384]  ret_from_fork+0x10/0x20
[   73.118414] 
[   73.186106] Allocated by task 349:
[   73.189491]  kasan_save_stack+0x3c/0x68
[   73.193311]  kasan_save_track+0x20/0x40
[   73.197130]  kasan_save_alloc_info+0x40/0x58
[   73.201384]  __kasan_kmalloc+0xd4/0xd8
[   73.205116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.209630]  kasan_atomics+0xb8/0x2e0
[   73.213276]  kunit_try_run_case+0x170/0x3f0
[   73.217442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.222911]  kthread+0x328/0x630
[   73.226123]  ret_from_fork+0x10/0x20
[   73.229682] 
[   73.231157] The buggy address belongs to the object at ffff000807848f80
[   73.231157]  which belongs to the cache kmalloc-64 of size 64
[   73.243484] The buggy address is located 0 bytes to the right of
[   73.243484]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   73.256331] 
[   73.257806] The buggy address belongs to the physical page:
[   73.263362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.271348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.277858] page_type: f5(slab)
[   73.280991] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.288715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.296434] page dumped because: kasan: bad access detected
[   73.301989] 
[   73.303465] Memory state around the buggy address:
[   73.308243]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.315448]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.322653] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.329854]                                      ^
[   73.334632]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.341837]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.349038] ==================================================================
[   66.756510] ==================================================================
[   66.763548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   66.770838] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   66.778216] 
[   66.779699] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   66.779750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.779766] Hardware name: WinLink E850-96 board (DT)
[   66.779786] Call trace:
[   66.779798]  show_stack+0x20/0x38 (C)
[   66.779832]  dump_stack_lvl+0x8c/0xd0
[   66.779864]  print_report+0x118/0x5d0
[   66.779890]  kasan_report+0xdc/0x128
[   66.779918]  kasan_check_range+0x100/0x1a8
[   66.779950]  __kasan_check_write+0x20/0x30
[   66.779980]  kasan_atomics_helper+0x54c/0x4858
[   66.780014]  kasan_atomics+0x198/0x2e0
[   66.780046]  kunit_try_run_case+0x170/0x3f0
[   66.780082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.780115]  kthread+0x328/0x630
[   66.780145]  ret_from_fork+0x10/0x20
[   66.780179] 
[   66.851132] Allocated by task 349:
[   66.854517]  kasan_save_stack+0x3c/0x68
[   66.858337]  kasan_save_track+0x20/0x40
[   66.862156]  kasan_save_alloc_info+0x40/0x58
[   66.866409]  __kasan_kmalloc+0xd4/0xd8
[   66.870142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.874655]  kasan_atomics+0xb8/0x2e0
[   66.878301]  kunit_try_run_case+0x170/0x3f0
[   66.882468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.887936]  kthread+0x328/0x630
[   66.891148]  ret_from_fork+0x10/0x20
[   66.894708] 
[   66.896183] The buggy address belongs to the object at ffff000807848f80
[   66.896183]  which belongs to the cache kmalloc-64 of size 64
[   66.908510] The buggy address is located 0 bytes to the right of
[   66.908510]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.921356] 
[   66.922832] The buggy address belongs to the physical page:
[   66.928388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.936375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.942884] page_type: f5(slab)
[   66.946018] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.953741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.961460] page dumped because: kasan: bad access detected
[   66.967015] 
[   66.968491] Memory state around the buggy address:
[   66.973270]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.980473]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.987679] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.994879]                                      ^
[   66.999658]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.006862]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.014063] ==================================================================
[   79.177475] ==================================================================
[   79.184541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   79.191919] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.199210] 
[   79.200691] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.200739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.200755] Hardware name: WinLink E850-96 board (DT)
[   79.200773] Call trace:
[   79.200787]  show_stack+0x20/0x38 (C)
[   79.200820]  dump_stack_lvl+0x8c/0xd0
[   79.200852]  print_report+0x118/0x5d0
[   79.200882]  kasan_report+0xdc/0x128
[   79.200911]  __asan_report_load8_noabort+0x20/0x30
[   79.200944]  kasan_atomics_helper+0x3df4/0x4858
[   79.200980]  kasan_atomics+0x198/0x2e0
[   79.201012]  kunit_try_run_case+0x170/0x3f0
[   79.201047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.201081]  kthread+0x328/0x630
[   79.201108]  ret_from_fork+0x10/0x20
[   79.201139] 
[   79.268827] Allocated by task 349:
[   79.272212]  kasan_save_stack+0x3c/0x68
[   79.276032]  kasan_save_track+0x20/0x40
[   79.279852]  kasan_save_alloc_info+0x40/0x58
[   79.284105]  __kasan_kmalloc+0xd4/0xd8
[   79.287837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.292351]  kasan_atomics+0xb8/0x2e0
[   79.295997]  kunit_try_run_case+0x170/0x3f0
[   79.300163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.305632]  kthread+0x328/0x630
[   79.308844]  ret_from_fork+0x10/0x20
[   79.312403] 
[   79.313879] The buggy address belongs to the object at ffff000807848f80
[   79.313879]  which belongs to the cache kmalloc-64 of size 64
[   79.326205] The buggy address is located 0 bytes to the right of
[   79.326205]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.339052] 
[   79.340527] The buggy address belongs to the physical page:
[   79.346083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.354069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.360579] page_type: f5(slab)
[   79.363714] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.371436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.379155] page dumped because: kasan: bad access detected
[   79.384711] 
[   79.386186] Memory state around the buggy address:
[   79.390964]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.398169]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.405374] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.412575]                                      ^
[   79.417353]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.424557]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.431759] ==================================================================
[   79.965857] ==================================================================
[   79.972898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   79.980275] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.987653] 
[   79.989134] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.989186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.989201] Hardware name: WinLink E850-96 board (DT)
[   79.989221] Call trace:
[   79.989234]  show_stack+0x20/0x38 (C)
[   79.989266]  dump_stack_lvl+0x8c/0xd0
[   79.989296]  print_report+0x118/0x5d0
[   79.989326]  kasan_report+0xdc/0x128
[   79.989353]  kasan_check_range+0x100/0x1a8
[   79.989383]  __kasan_check_write+0x20/0x30
[   79.989414]  kasan_atomics_helper+0x175c/0x4858
[   79.989451]  kasan_atomics+0x198/0x2e0
[   79.989485]  kunit_try_run_case+0x170/0x3f0
[   79.989520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.989552]  kthread+0x328/0x630
[   79.989579]  ret_from_fork+0x10/0x20
[   79.989610] 
[   80.060655] Allocated by task 349:
[   80.064041]  kasan_save_stack+0x3c/0x68
[   80.067860]  kasan_save_track+0x20/0x40
[   80.071680]  kasan_save_alloc_info+0x40/0x58
[   80.075933]  __kasan_kmalloc+0xd4/0xd8
[   80.079665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.084180]  kasan_atomics+0xb8/0x2e0
[   80.087825]  kunit_try_run_case+0x170/0x3f0
[   80.091992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.097461]  kthread+0x328/0x630
[   80.100673]  ret_from_fork+0x10/0x20
[   80.104231] 
[   80.105707] The buggy address belongs to the object at ffff000807848f80
[   80.105707]  which belongs to the cache kmalloc-64 of size 64
[   80.118034] The buggy address is located 0 bytes to the right of
[   80.118034]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   80.130880] 
[   80.132356] The buggy address belongs to the physical page:
[   80.137912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   80.145897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.152408] page_type: f5(slab)
[   80.155542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.163265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.170984] page dumped because: kasan: bad access detected
[   80.176539] 
[   80.178015] Memory state around the buggy address:
[   80.182794]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.189998]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.197203] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.204403]                                      ^
[   80.209181]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.216386]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.223587] ==================================================================
[   71.515260] ==================================================================
[   71.522331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   71.529707] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.536999] 
[   71.538481] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.538529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.538544] Hardware name: WinLink E850-96 board (DT)
[   71.538566] Call trace:
[   71.538579]  show_stack+0x20/0x38 (C)
[   71.538609]  dump_stack_lvl+0x8c/0xd0
[   71.538643]  print_report+0x118/0x5d0
[   71.538671]  kasan_report+0xdc/0x128
[   71.538700]  __asan_report_load4_noabort+0x20/0x30
[   71.538733]  kasan_atomics_helper+0x3de4/0x4858
[   71.538770]  kasan_atomics+0x198/0x2e0
[   71.538805]  kunit_try_run_case+0x170/0x3f0
[   71.538838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.538870]  kthread+0x328/0x630
[   71.538898]  ret_from_fork+0x10/0x20
[   71.538928] 
[   71.606615] Allocated by task 349:
[   71.610001]  kasan_save_stack+0x3c/0x68
[   71.613820]  kasan_save_track+0x20/0x40
[   71.617640]  kasan_save_alloc_info+0x40/0x58
[   71.621893]  __kasan_kmalloc+0xd4/0xd8
[   71.625626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.630140]  kasan_atomics+0xb8/0x2e0
[   71.633786]  kunit_try_run_case+0x170/0x3f0
[   71.637952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.643421]  kthread+0x328/0x630
[   71.646633]  ret_from_fork+0x10/0x20
[   71.650191] 
[   71.651667] The buggy address belongs to the object at ffff000807848f80
[   71.651667]  which belongs to the cache kmalloc-64 of size 64
[   71.663994] The buggy address is located 0 bytes to the right of
[   71.663994]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.676840] 
[   71.678316] The buggy address belongs to the physical page:
[   71.683874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.691858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.698368] page_type: f5(slab)
[   71.701502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.709225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.716944] page dumped because: kasan: bad access detected
[   71.722499] 
[   71.723975] Memory state around the buggy address:
[   71.728753]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.735958]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.743163] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.750364]                                      ^
[   71.755142]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.762346]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.769547] ==================================================================
[   77.590346] ==================================================================
[   77.597413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   77.604790] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.612168] 
[   77.613650] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.613698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.613715] Hardware name: WinLink E850-96 board (DT)
[   77.613734] Call trace:
[   77.613749]  show_stack+0x20/0x38 (C)
[   77.613779]  dump_stack_lvl+0x8c/0xd0
[   77.613808]  print_report+0x118/0x5d0
[   77.613837]  kasan_report+0xdc/0x128
[   77.613865]  kasan_check_range+0x100/0x1a8
[   77.613894]  __kasan_check_write+0x20/0x30
[   77.613925]  kasan_atomics_helper+0x147c/0x4858
[   77.613960]  kasan_atomics+0x198/0x2e0
[   77.613993]  kunit_try_run_case+0x170/0x3f0
[   77.614027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.614059]  kthread+0x328/0x630
[   77.614084]  ret_from_fork+0x10/0x20
[   77.614119] 
[   77.685170] Allocated by task 349:
[   77.688556]  kasan_save_stack+0x3c/0x68
[   77.692375]  kasan_save_track+0x20/0x40
[   77.696194]  kasan_save_alloc_info+0x40/0x58
[   77.700448]  __kasan_kmalloc+0xd4/0xd8
[   77.704180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.708694]  kasan_atomics+0xb8/0x2e0
[   77.712340]  kunit_try_run_case+0x170/0x3f0
[   77.716507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.721975]  kthread+0x328/0x630
[   77.725187]  ret_from_fork+0x10/0x20
[   77.728746] 
[   77.730222] The buggy address belongs to the object at ffff000807848f80
[   77.730222]  which belongs to the cache kmalloc-64 of size 64
[   77.742548] The buggy address is located 0 bytes to the right of
[   77.742548]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   77.755395] 
[   77.756871] The buggy address belongs to the physical page:
[   77.762427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   77.770412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.776923] page_type: f5(slab)
[   77.780055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.787780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.795498] page dumped because: kasan: bad access detected
[   77.801054] 
[   77.802529] Memory state around the buggy address:
[   77.807308]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.814513]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.821717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.828918]                                      ^
[   77.833696]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.840901]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.848102] ==================================================================
[   68.875868] ==================================================================
[   68.882960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   68.890337] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   68.897629] 
[   68.899108] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   68.899153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.899170] Hardware name: WinLink E850-96 board (DT)
[   68.899189] Call trace:
[   68.899201]  show_stack+0x20/0x38 (C)
[   68.899234]  dump_stack_lvl+0x8c/0xd0
[   68.899265]  print_report+0x118/0x5d0
[   68.899293]  kasan_report+0xdc/0x128
[   68.899322]  __asan_report_load4_noabort+0x20/0x30
[   68.899354]  kasan_atomics_helper+0x42d8/0x4858
[   68.899389]  kasan_atomics+0x198/0x2e0
[   68.899423]  kunit_try_run_case+0x170/0x3f0
[   68.899457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.899491]  kthread+0x328/0x630
[   68.899519]  ret_from_fork+0x10/0x20
[   68.899550] 
[   68.967246] Allocated by task 349:
[   68.970631]  kasan_save_stack+0x3c/0x68
[   68.974451]  kasan_save_track+0x20/0x40
[   68.978270]  kasan_save_alloc_info+0x40/0x58
[   68.982523]  __kasan_kmalloc+0xd4/0xd8
[   68.986256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.990770]  kasan_atomics+0xb8/0x2e0
[   68.994415]  kunit_try_run_case+0x170/0x3f0
[   68.998582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.004050]  kthread+0x328/0x630
[   69.007262]  ret_from_fork+0x10/0x20
[   69.010821] 
[   69.012297] The buggy address belongs to the object at ffff000807848f80
[   69.012297]  which belongs to the cache kmalloc-64 of size 64
[   69.024624] The buggy address is located 0 bytes to the right of
[   69.024624]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.037471] 
[   69.038946] The buggy address belongs to the physical page:
[   69.044502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.052488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.058998] page_type: f5(slab)
[   69.062132] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.069855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.077574] page dumped because: kasan: bad access detected
[   69.083129] 
[   69.084605] Memory state around the buggy address:
[   69.089383]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.096588]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.103793] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.110994]                                      ^
[   69.115771]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.122976]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.130177] ==================================================================
[   77.063623] ==================================================================
[   77.070685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   77.078062] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.085353] 
[   77.086832] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.086881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.086897] Hardware name: WinLink E850-96 board (DT)
[   77.086916] Call trace:
[   77.086929]  show_stack+0x20/0x38 (C)
[   77.086961]  dump_stack_lvl+0x8c/0xd0
[   77.086991]  print_report+0x118/0x5d0
[   77.087019]  kasan_report+0xdc/0x128
[   77.087047]  __asan_report_load8_noabort+0x20/0x30
[   77.087079]  kasan_atomics_helper+0x3f04/0x4858
[   77.087115]  kasan_atomics+0x198/0x2e0
[   77.087149]  kunit_try_run_case+0x170/0x3f0
[   77.087187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.087219]  kthread+0x328/0x630
[   77.087245]  ret_from_fork+0x10/0x20
[   77.087279] 
[   77.154970] Allocated by task 349:
[   77.158355]  kasan_save_stack+0x3c/0x68
[   77.162175]  kasan_save_track+0x20/0x40
[   77.165994]  kasan_save_alloc_info+0x40/0x58
[   77.170247]  __kasan_kmalloc+0xd4/0xd8
[   77.173980]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.178494]  kasan_atomics+0xb8/0x2e0
[   77.182140]  kunit_try_run_case+0x170/0x3f0
[   77.186306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.191775]  kthread+0x328/0x630
[   77.194987]  ret_from_fork+0x10/0x20
[   77.198546] 
[   77.200021] The buggy address belongs to the object at ffff000807848f80
[   77.200021]  which belongs to the cache kmalloc-64 of size 64
[   77.212348] The buggy address is located 0 bytes to the right of
[   77.212348]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   77.225195] 
[   77.226670] The buggy address belongs to the physical page:
[   77.232229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   77.240212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.246722] page_type: f5(slab)
[   77.249855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.257579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.265298] page dumped because: kasan: bad access detected
[   77.270854] 
[   77.272329] Memory state around the buggy address:
[   77.277107]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.284312]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.291517] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.298718]                                      ^
[   77.303496]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.310700]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.317902] ==================================================================
[   65.170085] ==================================================================
[   65.177113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   65.184405] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.191781] 
[   65.193265] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.193316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.193333] Hardware name: WinLink E850-96 board (DT)
[   65.193354] Call trace:
[   65.193368]  show_stack+0x20/0x38 (C)
[   65.193404]  dump_stack_lvl+0x8c/0xd0
[   65.193438]  print_report+0x118/0x5d0
[   65.193466]  kasan_report+0xdc/0x128
[   65.193492]  kasan_check_range+0x100/0x1a8
[   65.193524]  __kasan_check_write+0x20/0x30
[   65.193554]  kasan_atomics_helper+0x32c/0x4858
[   65.193587]  kasan_atomics+0x198/0x2e0
[   65.193623]  kunit_try_run_case+0x170/0x3f0
[   65.193659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.193691]  kthread+0x328/0x630
[   65.193721]  ret_from_fork+0x10/0x20
[   65.193756] 
[   65.264697] Allocated by task 349:
[   65.268083]  kasan_save_stack+0x3c/0x68
[   65.271902]  kasan_save_track+0x20/0x40
[   65.275721]  kasan_save_alloc_info+0x40/0x58
[   65.279975]  __kasan_kmalloc+0xd4/0xd8
[   65.283707]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.288221]  kasan_atomics+0xb8/0x2e0
[   65.291867]  kunit_try_run_case+0x170/0x3f0
[   65.296033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.301502]  kthread+0x328/0x630
[   65.304714]  ret_from_fork+0x10/0x20
[   65.308273] 
[   65.309749] The buggy address belongs to the object at ffff000807848f80
[   65.309749]  which belongs to the cache kmalloc-64 of size 64
[   65.322075] The buggy address is located 0 bytes to the right of
[   65.322075]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.334922] 
[   65.336399] The buggy address belongs to the physical page:
[   65.341955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.349941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.356449] page_type: f5(slab)
[   65.359585] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.367306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.375025] page dumped because: kasan: bad access detected
[   65.380581] 
[   65.382056] Memory state around the buggy address:
[   65.386835]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.394039]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.401244] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.408445]                                      ^
[   65.413223]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.420427]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.427629] ==================================================================
[   67.021420] ==================================================================
[   67.028474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   67.035765] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.043143] 
[   67.044624] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.044674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.044690] Hardware name: WinLink E850-96 board (DT)
[   67.044710] Call trace:
[   67.044722]  show_stack+0x20/0x38 (C)
[   67.044753]  dump_stack_lvl+0x8c/0xd0
[   67.044786]  print_report+0x118/0x5d0
[   67.044814]  kasan_report+0xdc/0x128
[   67.044842]  kasan_check_range+0x100/0x1a8
[   67.044872]  __kasan_check_write+0x20/0x30
[   67.044905]  kasan_atomics_helper+0x5b4/0x4858
[   67.044940]  kasan_atomics+0x198/0x2e0
[   67.044973]  kunit_try_run_case+0x170/0x3f0
[   67.045008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.045040]  kthread+0x328/0x630
[   67.045068]  ret_from_fork+0x10/0x20
[   67.045099] 
[   67.116058] Allocated by task 349:
[   67.119444]  kasan_save_stack+0x3c/0x68
[   67.123263]  kasan_save_track+0x20/0x40
[   67.127082]  kasan_save_alloc_info+0x40/0x58
[   67.131336]  __kasan_kmalloc+0xd4/0xd8
[   67.135068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.139583]  kasan_atomics+0xb8/0x2e0
[   67.143228]  kunit_try_run_case+0x170/0x3f0
[   67.147394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.152863]  kthread+0x328/0x630
[   67.156075]  ret_from_fork+0x10/0x20
[   67.159634] 
[   67.161110] The buggy address belongs to the object at ffff000807848f80
[   67.161110]  which belongs to the cache kmalloc-64 of size 64
[   67.173436] The buggy address is located 0 bytes to the right of
[   67.173436]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.186283] 
[   67.187759] The buggy address belongs to the physical page:
[   67.193315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.201300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.207810] page_type: f5(slab)
[   67.210945] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.218667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.226386] page dumped because: kasan: bad access detected
[   67.231942] 
[   67.233417] Memory state around the buggy address:
[   67.238195]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.245400]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.252605] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.259806]                                      ^
[   67.264584]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.271789]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.278990] ==================================================================
[   70.723788] ==================================================================
[   70.730850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   70.738139] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   70.745518] 
[   70.746997] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   70.747046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.747063] Hardware name: WinLink E850-96 board (DT)
[   70.747081] Call trace:
[   70.747094]  show_stack+0x20/0x38 (C)
[   70.747124]  dump_stack_lvl+0x8c/0xd0
[   70.747155]  print_report+0x118/0x5d0
[   70.747181]  kasan_report+0xdc/0x128
[   70.747210]  kasan_check_range+0x100/0x1a8
[   70.747241]  __kasan_check_write+0x20/0x30
[   70.747270]  kasan_atomics_helper+0xb70/0x4858
[   70.747305]  kasan_atomics+0x198/0x2e0
[   70.747337]  kunit_try_run_case+0x170/0x3f0
[   70.747374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.747407]  kthread+0x328/0x630
[   70.747433]  ret_from_fork+0x10/0x20
[   70.747464] 
[   70.818433] Allocated by task 349:
[   70.821819]  kasan_save_stack+0x3c/0x68
[   70.825638]  kasan_save_track+0x20/0x40
[   70.829457]  kasan_save_alloc_info+0x40/0x58
[   70.833711]  __kasan_kmalloc+0xd4/0xd8
[   70.837443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.841957]  kasan_atomics+0xb8/0x2e0
[   70.845603]  kunit_try_run_case+0x170/0x3f0
[   70.849770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.855238]  kthread+0x328/0x630
[   70.858450]  ret_from_fork+0x10/0x20
[   70.862008] 
[   70.863484] The buggy address belongs to the object at ffff000807848f80
[   70.863484]  which belongs to the cache kmalloc-64 of size 64
[   70.875811] The buggy address is located 0 bytes to the right of
[   70.875811]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.888658] 
[   70.890134] The buggy address belongs to the physical page:
[   70.895691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.903675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.910185] page_type: f5(slab)
[   70.913318] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.921042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.928762] page dumped because: kasan: bad access detected
[   70.934317] 
[   70.935792] Memory state around the buggy address:
[   70.940570]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.947775]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.954980] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.962181]                                      ^
[   70.966959]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.974164]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.981365] ==================================================================
[   77.325273] ==================================================================
[   77.332313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   77.339690] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   77.347068] 
[   77.348547] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   77.348599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.348614] Hardware name: WinLink E850-96 board (DT)
[   77.348633] Call trace:
[   77.348647]  show_stack+0x20/0x38 (C)
[   77.348677]  dump_stack_lvl+0x8c/0xd0
[   77.348707]  print_report+0x118/0x5d0
[   77.348735]  kasan_report+0xdc/0x128
[   77.348764]  kasan_check_range+0x100/0x1a8
[   77.348797]  __kasan_check_write+0x20/0x30
[   77.348826]  kasan_atomics_helper+0x1414/0x4858
[   77.348861]  kasan_atomics+0x198/0x2e0
[   77.348894]  kunit_try_run_case+0x170/0x3f0
[   77.348931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.348965]  kthread+0x328/0x630
[   77.348991]  ret_from_fork+0x10/0x20
[   77.349025] 
[   77.420070] Allocated by task 349:
[   77.423456]  kasan_save_stack+0x3c/0x68
[   77.427275]  kasan_save_track+0x20/0x40
[   77.431094]  kasan_save_alloc_info+0x40/0x58
[   77.435348]  __kasan_kmalloc+0xd4/0xd8
[   77.439080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.443594]  kasan_atomics+0xb8/0x2e0
[   77.447240]  kunit_try_run_case+0x170/0x3f0
[   77.451407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.456875]  kthread+0x328/0x630
[   77.460087]  ret_from_fork+0x10/0x20
[   77.463646] 
[   77.465122] The buggy address belongs to the object at ffff000807848f80
[   77.465122]  which belongs to the cache kmalloc-64 of size 64
[   77.477448] The buggy address is located 0 bytes to the right of
[   77.477448]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   77.490295] 
[   77.491771] The buggy address belongs to the physical page:
[   77.497328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   77.505314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.511823] page_type: f5(slab)
[   77.514957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.522680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.530398] page dumped because: kasan: bad access detected
[   77.535954] 
[   77.537429] Memory state around the buggy address:
[   77.542207]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.549412]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.556617] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.563818]                                      ^
[   77.568596]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.575801]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.583002] ==================================================================
[   71.776921] ==================================================================
[   71.783960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   71.791249] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   71.798627] 
[   71.800107] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   71.800155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.800171] Hardware name: WinLink E850-96 board (DT)
[   71.800189] Call trace:
[   71.800202]  show_stack+0x20/0x38 (C)
[   71.800234]  dump_stack_lvl+0x8c/0xd0
[   71.800266]  print_report+0x118/0x5d0
[   71.800295]  kasan_report+0xdc/0x128
[   71.800324]  kasan_check_range+0x100/0x1a8
[   71.800354]  __kasan_check_write+0x20/0x30
[   71.800385]  kasan_atomics_helper+0xca0/0x4858
[   71.800418]  kasan_atomics+0x198/0x2e0
[   71.800451]  kunit_try_run_case+0x170/0x3f0
[   71.800487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.800520]  kthread+0x328/0x630
[   71.800547]  ret_from_fork+0x10/0x20
[   71.800579] 
[   71.871542] Allocated by task 349:
[   71.874928]  kasan_save_stack+0x3c/0x68
[   71.878748]  kasan_save_track+0x20/0x40
[   71.882566]  kasan_save_alloc_info+0x40/0x58
[   71.886820]  __kasan_kmalloc+0xd4/0xd8
[   71.890552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.895066]  kasan_atomics+0xb8/0x2e0
[   71.898712]  kunit_try_run_case+0x170/0x3f0
[   71.902879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.908348]  kthread+0x328/0x630
[   71.911559]  ret_from_fork+0x10/0x20
[   71.915118] 
[   71.916594] The buggy address belongs to the object at ffff000807848f80
[   71.916594]  which belongs to the cache kmalloc-64 of size 64
[   71.928920] The buggy address is located 0 bytes to the right of
[   71.928920]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   71.941767] 
[   71.943243] The buggy address belongs to the physical page:
[   71.948799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   71.956786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.963295] page_type: f5(slab)
[   71.966428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.974152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.981871] page dumped because: kasan: bad access detected
[   71.987426] 
[   71.988901] Memory state around the buggy address:
[   71.993679]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.000884]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.008089] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.015290]                                      ^
[   72.020068]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.027273]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.034474] ==================================================================
[   74.413031] ==================================================================
[   74.420030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   74.427320] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.434698] 
[   74.436180] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.436230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.436244] Hardware name: WinLink E850-96 board (DT)
[   74.436262] Call trace:
[   74.436276]  show_stack+0x20/0x38 (C)
[   74.436308]  dump_stack_lvl+0x8c/0xd0
[   74.436339]  print_report+0x118/0x5d0
[   74.436369]  kasan_report+0xdc/0x128
[   74.436397]  kasan_check_range+0x100/0x1a8
[   74.436428]  __kasan_check_write+0x20/0x30
[   74.436458]  kasan_atomics_helper+0xf88/0x4858
[   74.436493]  kasan_atomics+0x198/0x2e0
[   74.436528]  kunit_try_run_case+0x170/0x3f0
[   74.436566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.436597]  kthread+0x328/0x630
[   74.436625]  ret_from_fork+0x10/0x20
[   74.436657] 
[   74.507614] Allocated by task 349:
[   74.510999]  kasan_save_stack+0x3c/0x68
[   74.514819]  kasan_save_track+0x20/0x40
[   74.518638]  kasan_save_alloc_info+0x40/0x58
[   74.522891]  __kasan_kmalloc+0xd4/0xd8
[   74.526624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.531138]  kasan_atomics+0xb8/0x2e0
[   74.534784]  kunit_try_run_case+0x170/0x3f0
[   74.538950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.544419]  kthread+0x328/0x630
[   74.547631]  ret_from_fork+0x10/0x20
[   74.551190] 
[   74.552665] The buggy address belongs to the object at ffff000807848f80
[   74.552665]  which belongs to the cache kmalloc-64 of size 64
[   74.564992] The buggy address is located 0 bytes to the right of
[   74.564992]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.577839] 
[   74.579316] The buggy address belongs to the physical page:
[   74.584870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.592857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.599366] page_type: f5(slab)
[   74.602501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.610223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.617942] page dumped because: kasan: bad access detected
[   74.623497] 
[   74.624973] Memory state around the buggy address:
[   74.629751]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.636956]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.644161] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.651362]                                      ^
[   74.656141]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.663344]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.670546] ==================================================================
[   76.268317] ==================================================================
[   76.275384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   76.282761] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.290139] 
[   76.291619] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.291666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.291681] Hardware name: WinLink E850-96 board (DT)
[   76.291699] Call trace:
[   76.291712]  show_stack+0x20/0x38 (C)
[   76.291745]  dump_stack_lvl+0x8c/0xd0
[   76.291775]  print_report+0x118/0x5d0
[   76.291803]  kasan_report+0xdc/0x128
[   76.291831]  kasan_check_range+0x100/0x1a8
[   76.291860]  __kasan_check_write+0x20/0x30
[   76.291893]  kasan_atomics_helper+0x126c/0x4858
[   76.291928]  kasan_atomics+0x198/0x2e0
[   76.291961]  kunit_try_run_case+0x170/0x3f0
[   76.291995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.292029]  kthread+0x328/0x630
[   76.292056]  ret_from_fork+0x10/0x20
[   76.292087] 
[   76.363141] Allocated by task 349:
[   76.366527]  kasan_save_stack+0x3c/0x68
[   76.370346]  kasan_save_track+0x20/0x40
[   76.374166]  kasan_save_alloc_info+0x40/0x58
[   76.378419]  __kasan_kmalloc+0xd4/0xd8
[   76.382152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.386666]  kasan_atomics+0xb8/0x2e0
[   76.390311]  kunit_try_run_case+0x170/0x3f0
[   76.394478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.399947]  kthread+0x328/0x630
[   76.403159]  ret_from_fork+0x10/0x20
[   76.406717] 
[   76.408193] The buggy address belongs to the object at ffff000807848f80
[   76.408193]  which belongs to the cache kmalloc-64 of size 64
[   76.420520] The buggy address is located 0 bytes to the right of
[   76.420520]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.433366] 
[   76.434842] The buggy address belongs to the physical page:
[   76.440398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.448383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.454894] page_type: f5(slab)
[   76.458026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.465751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.473470] page dumped because: kasan: bad access detected
[   76.479025] 
[   76.480501] Memory state around the buggy address:
[   76.485279]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.492484]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.499688] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.506889]                                      ^
[   76.511667]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.518872]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.526073] ==================================================================
[   76.003242] ==================================================================
[   76.010284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   76.017661] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.025039] 
[   76.026521] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.026573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.026590] Hardware name: WinLink E850-96 board (DT)
[   76.026608] Call trace:
[   76.026621]  show_stack+0x20/0x38 (C)
[   76.026653]  dump_stack_lvl+0x8c/0xd0
[   76.026684]  print_report+0x118/0x5d0
[   76.026713]  kasan_report+0xdc/0x128
[   76.026740]  kasan_check_range+0x100/0x1a8
[   76.026772]  __kasan_check_write+0x20/0x30
[   76.026804]  kasan_atomics_helper+0x11f8/0x4858
[   76.026839]  kasan_atomics+0x198/0x2e0
[   76.026872]  kunit_try_run_case+0x170/0x3f0
[   76.026909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.026941]  kthread+0x328/0x630
[   76.026970]  ret_from_fork+0x10/0x20
[   76.027002] 
[   76.098041] Allocated by task 349:
[   76.101426]  kasan_save_stack+0x3c/0x68
[   76.105246]  kasan_save_track+0x20/0x40
[   76.109066]  kasan_save_alloc_info+0x40/0x58
[   76.113319]  __kasan_kmalloc+0xd4/0xd8
[   76.117051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.121565]  kasan_atomics+0xb8/0x2e0
[   76.125211]  kunit_try_run_case+0x170/0x3f0
[   76.129378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.134847]  kthread+0x328/0x630
[   76.138058]  ret_from_fork+0x10/0x20
[   76.141617] 
[   76.143093] The buggy address belongs to the object at ffff000807848f80
[   76.143093]  which belongs to the cache kmalloc-64 of size 64
[   76.155420] The buggy address is located 0 bytes to the right of
[   76.155420]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.168266] 
[   76.169742] The buggy address belongs to the physical page:
[   76.175298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.183285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.189793] page_type: f5(slab)
[   76.192926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.200651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.208370] page dumped because: kasan: bad access detected
[   76.213925] 
[   76.215401] Memory state around the buggy address:
[   76.220179]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.227384]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.234588] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.241789]                                      ^
[   76.246567]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.253772]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.260973] ==================================================================
[   72.303453] ==================================================================
[   72.310513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   72.317803] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.325181] 
[   72.326661] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.326712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.326727] Hardware name: WinLink E850-96 board (DT)
[   72.326746] Call trace:
[   72.326758]  show_stack+0x20/0x38 (C)
[   72.326790]  dump_stack_lvl+0x8c/0xd0
[   72.326824]  print_report+0x118/0x5d0
[   72.326852]  kasan_report+0xdc/0x128
[   72.326880]  kasan_check_range+0x100/0x1a8
[   72.326913]  __kasan_check_write+0x20/0x30
[   72.326943]  kasan_atomics_helper+0xd3c/0x4858
[   72.326977]  kasan_atomics+0x198/0x2e0
[   72.327010]  kunit_try_run_case+0x170/0x3f0
[   72.327046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.327080]  kthread+0x328/0x630
[   72.327106]  ret_from_fork+0x10/0x20
[   72.327138] 
[   72.398097] Allocated by task 349:
[   72.401482]  kasan_save_stack+0x3c/0x68
[   72.405302]  kasan_save_track+0x20/0x40
[   72.409121]  kasan_save_alloc_info+0x40/0x58
[   72.413374]  __kasan_kmalloc+0xd4/0xd8
[   72.417107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.421621]  kasan_atomics+0xb8/0x2e0
[   72.425267]  kunit_try_run_case+0x170/0x3f0
[   72.429433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.434902]  kthread+0x328/0x630
[   72.438113]  ret_from_fork+0x10/0x20
[   72.441673] 
[   72.443148] The buggy address belongs to the object at ffff000807848f80
[   72.443148]  which belongs to the cache kmalloc-64 of size 64
[   72.455475] The buggy address is located 0 bytes to the right of
[   72.455475]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.468322] 
[   72.469798] The buggy address belongs to the physical page:
[   72.475353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   72.483339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.489849] page_type: f5(slab)
[   72.492982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.500706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.508425] page dumped because: kasan: bad access detected
[   72.513980] 
[   72.515456] Memory state around the buggy address:
[   72.520234]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.527439]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.534644] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.541845]                                      ^
[   72.546623]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.553827]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.561029] ==================================================================
[   63.852187] ==================================================================
[   63.859254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   63.866628] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   63.874007] 
[   63.875492] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.875554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.875569] Hardware name: WinLink E850-96 board (DT)
[   63.875591] Call trace:
[   63.875606]  show_stack+0x20/0x38 (C)
[   63.875643]  dump_stack_lvl+0x8c/0xd0
[   63.875677]  print_report+0x118/0x5d0
[   63.875706]  kasan_report+0xdc/0x128
[   63.875732]  __asan_report_store4_noabort+0x20/0x30
[   63.875768]  kasan_atomics_helper+0x3f7c/0x4858
[   63.875806]  kasan_atomics+0x198/0x2e0
[   63.875839]  kunit_try_run_case+0x170/0x3f0
[   63.875877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.875910]  kthread+0x328/0x630
[   63.875943]  ret_from_fork+0x10/0x20
[   63.875978] 
[   63.943710] Allocated by task 349:
[   63.947099]  kasan_save_stack+0x3c/0x68
[   63.950915]  kasan_save_track+0x20/0x40
[   63.954734]  kasan_save_alloc_info+0x40/0x58
[   63.958987]  __kasan_kmalloc+0xd4/0xd8
[   63.962720]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.967234]  kasan_atomics+0xb8/0x2e0
[   63.970880]  kunit_try_run_case+0x170/0x3f0
[   63.975046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.980515]  kthread+0x328/0x630
[   63.983727]  ret_from_fork+0x10/0x20
[   63.987286] 
[   63.988763] The buggy address belongs to the object at ffff000807848f80
[   63.988763]  which belongs to the cache kmalloc-64 of size 64
[   64.001088] The buggy address is located 0 bytes to the right of
[   64.001088]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.013935] 
[   64.015412] The buggy address belongs to the physical page:
[   64.020969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.028956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.035462] page_type: f5(slab)
[   64.038597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.046319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.054040] page dumped because: kasan: bad access detected
[   64.059594] 
[   64.061069] Memory state around the buggy address:
[   64.065849]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.073052]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.080260] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.087458]                                      ^
[   64.092237]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.099441]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.106642] ==================================================================
[   78.385676] ==================================================================
[   78.392714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   78.400090] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   78.407469] 
[   78.408950] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   78.409000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.409016] Hardware name: WinLink E850-96 board (DT)
[   78.409035] Call trace:
[   78.409048]  show_stack+0x20/0x38 (C)
[   78.409078]  dump_stack_lvl+0x8c/0xd0
[   78.409108]  print_report+0x118/0x5d0
[   78.409136]  kasan_report+0xdc/0x128
[   78.409167]  kasan_check_range+0x100/0x1a8
[   78.409197]  __kasan_check_write+0x20/0x30
[   78.409228]  kasan_atomics_helper+0x15b4/0x4858
[   78.409264]  kasan_atomics+0x198/0x2e0
[   78.409297]  kunit_try_run_case+0x170/0x3f0
[   78.409331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.409365]  kthread+0x328/0x630
[   78.409391]  ret_from_fork+0x10/0x20
[   78.409424] 
[   78.480471] Allocated by task 349:
[   78.483857]  kasan_save_stack+0x3c/0x68
[   78.487676]  kasan_save_track+0x20/0x40
[   78.491495]  kasan_save_alloc_info+0x40/0x58
[   78.495748]  __kasan_kmalloc+0xd4/0xd8
[   78.499481]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.503995]  kasan_atomics+0xb8/0x2e0
[   78.507641]  kunit_try_run_case+0x170/0x3f0
[   78.511807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.517276]  kthread+0x328/0x630
[   78.520488]  ret_from_fork+0x10/0x20
[   78.524047] 
[   78.525522] The buggy address belongs to the object at ffff000807848f80
[   78.525522]  which belongs to the cache kmalloc-64 of size 64
[   78.537849] The buggy address is located 0 bytes to the right of
[   78.537849]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   78.550696] 
[   78.552173] The buggy address belongs to the physical page:
[   78.557727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   78.565715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.572223] page_type: f5(slab)
[   78.575358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.583080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.590799] page dumped because: kasan: bad access detected
[   78.596354] 
[   78.597830] Memory state around the buggy address:
[   78.602608]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.609813]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.617018] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.624219]                                      ^
[   78.628997]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.636201]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.643402] ==================================================================
[   73.356409] ==================================================================
[   73.363449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   73.370739] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.378117] 
[   73.379597] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.379646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.379662] Hardware name: WinLink E850-96 board (DT)
[   73.379680] Call trace:
[   73.379692]  show_stack+0x20/0x38 (C)
[   73.379725]  dump_stack_lvl+0x8c/0xd0
[   73.379757]  print_report+0x118/0x5d0
[   73.379786]  kasan_report+0xdc/0x128
[   73.379815]  kasan_check_range+0x100/0x1a8
[   73.379846]  __kasan_check_write+0x20/0x30
[   73.379877]  kasan_atomics_helper+0xe44/0x4858
[   73.379915]  kasan_atomics+0x198/0x2e0
[   73.379946]  kunit_try_run_case+0x170/0x3f0
[   73.379982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.380016]  kthread+0x328/0x630
[   73.380042]  ret_from_fork+0x10/0x20
[   73.380075] 
[   73.451032] Allocated by task 349:
[   73.454418]  kasan_save_stack+0x3c/0x68
[   73.458238]  kasan_save_track+0x20/0x40
[   73.462057]  kasan_save_alloc_info+0x40/0x58
[   73.466310]  __kasan_kmalloc+0xd4/0xd8
[   73.470042]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.474556]  kasan_atomics+0xb8/0x2e0
[   73.478202]  kunit_try_run_case+0x170/0x3f0
[   73.482369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.487838]  kthread+0x328/0x630
[   73.491049]  ret_from_fork+0x10/0x20
[   73.494608] 
[   73.496084] The buggy address belongs to the object at ffff000807848f80
[   73.496084]  which belongs to the cache kmalloc-64 of size 64
[   73.508411] The buggy address is located 0 bytes to the right of
[   73.508411]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   73.521257] 
[   73.522734] The buggy address belongs to the physical page:
[   73.528290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   73.536276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.542785] page_type: f5(slab)
[   73.545920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.553642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.561361] page dumped because: kasan: bad access detected
[   73.566916] 
[   73.568392] Memory state around the buggy address:
[   73.573170]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.580375]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.587579] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.594781]                                      ^
[   73.599558]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.606763]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.613964] ==================================================================
[   66.491564] ==================================================================
[   66.498621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   66.505911] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   66.513290] 
[   66.514774] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   66.514824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.514840] Hardware name: WinLink E850-96 board (DT)
[   66.514858] Call trace:
[   66.514870]  show_stack+0x20/0x38 (C)
[   66.514900]  dump_stack_lvl+0x8c/0xd0
[   66.514934]  print_report+0x118/0x5d0
[   66.514961]  kasan_report+0xdc/0x128
[   66.514988]  kasan_check_range+0x100/0x1a8
[   66.515018]  __kasan_check_write+0x20/0x30
[   66.515050]  kasan_atomics_helper+0x4e4/0x4858
[   66.515087]  kasan_atomics+0x198/0x2e0
[   66.515121]  kunit_try_run_case+0x170/0x3f0
[   66.515156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.515189]  kthread+0x328/0x630
[   66.515215]  ret_from_fork+0x10/0x20
[   66.515248] 
[   66.586205] Allocated by task 349:
[   66.589591]  kasan_save_stack+0x3c/0x68
[   66.593410]  kasan_save_track+0x20/0x40
[   66.597229]  kasan_save_alloc_info+0x40/0x58
[   66.601483]  __kasan_kmalloc+0xd4/0xd8
[   66.605215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.609729]  kasan_atomics+0xb8/0x2e0
[   66.613375]  kunit_try_run_case+0x170/0x3f0
[   66.617541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.623010]  kthread+0x328/0x630
[   66.626222]  ret_from_fork+0x10/0x20
[   66.629781] 
[   66.631256] The buggy address belongs to the object at ffff000807848f80
[   66.631256]  which belongs to the cache kmalloc-64 of size 64
[   66.643583] The buggy address is located 0 bytes to the right of
[   66.643583]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.656430] 
[   66.657907] The buggy address belongs to the physical page:
[   66.663462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.671449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.677957] page_type: f5(slab)
[   66.681091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.688814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.696533] page dumped because: kasan: bad access detected
[   66.702089] 
[   66.703564] Memory state around the buggy address:
[   66.708343]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.715547]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.722752] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.729953]                                      ^
[   66.734730]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.741935]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.749137] ==================================================================
[   70.462153] ==================================================================
[   70.469221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   70.476598] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   70.483890] 
[   70.485370] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   70.485419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.485435] Hardware name: WinLink E850-96 board (DT)
[   70.485453] Call trace:
[   70.485467]  show_stack+0x20/0x38 (C)
[   70.485498]  dump_stack_lvl+0x8c/0xd0
[   70.485531]  print_report+0x118/0x5d0
[   70.485560]  kasan_report+0xdc/0x128
[   70.485589]  __asan_report_load4_noabort+0x20/0x30
[   70.485621]  kasan_atomics_helper+0x3dcc/0x4858
[   70.485656]  kasan_atomics+0x198/0x2e0
[   70.485688]  kunit_try_run_case+0x170/0x3f0
[   70.485724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.485755]  kthread+0x328/0x630
[   70.485782]  ret_from_fork+0x10/0x20
[   70.485812] 
[   70.553506] Allocated by task 349:
[   70.556892]  kasan_save_stack+0x3c/0x68
[   70.560711]  kasan_save_track+0x20/0x40
[   70.564531]  kasan_save_alloc_info+0x40/0x58
[   70.568784]  __kasan_kmalloc+0xd4/0xd8
[   70.572517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.577030]  kasan_atomics+0xb8/0x2e0
[   70.580676]  kunit_try_run_case+0x170/0x3f0
[   70.584843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.590312]  kthread+0x328/0x630
[   70.593523]  ret_from_fork+0x10/0x20
[   70.597082] 
[   70.598558] The buggy address belongs to the object at ffff000807848f80
[   70.598558]  which belongs to the cache kmalloc-64 of size 64
[   70.610884] The buggy address is located 0 bytes to the right of
[   70.610884]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   70.623731] 
[   70.625207] The buggy address belongs to the physical page:
[   70.630763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   70.638748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.645259] page_type: f5(slab)
[   70.648393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.656116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.663835] page dumped because: kasan: bad access detected
[   70.669390] 
[   70.670866] Memory state around the buggy address:
[   70.675644]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.682849]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.690053] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.697254]                                      ^
[   70.702032]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.709237]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.716438] ==================================================================
[   74.677932] ==================================================================
[   74.684957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   74.692247] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.699625] 
[   74.701104] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.701152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.701170] Hardware name: WinLink E850-96 board (DT)
[   74.701187] Call trace:
[   74.701201]  show_stack+0x20/0x38 (C)
[   74.701237]  dump_stack_lvl+0x8c/0xd0
[   74.701265]  print_report+0x118/0x5d0
[   74.701291]  kasan_report+0xdc/0x128
[   74.701319]  kasan_check_range+0x100/0x1a8
[   74.701349]  __kasan_check_write+0x20/0x30
[   74.701379]  kasan_atomics_helper+0xff0/0x4858
[   74.701414]  kasan_atomics+0x198/0x2e0
[   74.701447]  kunit_try_run_case+0x170/0x3f0
[   74.701482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.701514]  kthread+0x328/0x630
[   74.701542]  ret_from_fork+0x10/0x20
[   74.701573] 
[   74.772540] Allocated by task 349:
[   74.775926]  kasan_save_stack+0x3c/0x68
[   74.779745]  kasan_save_track+0x20/0x40
[   74.783564]  kasan_save_alloc_info+0x40/0x58
[   74.787818]  __kasan_kmalloc+0xd4/0xd8
[   74.791551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.796064]  kasan_atomics+0xb8/0x2e0
[   74.799710]  kunit_try_run_case+0x170/0x3f0
[   74.803877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.809346]  kthread+0x328/0x630
[   74.812557]  ret_from_fork+0x10/0x20
[   74.816116] 
[   74.817592] The buggy address belongs to the object at ffff000807848f80
[   74.817592]  which belongs to the cache kmalloc-64 of size 64
[   74.829919] The buggy address is located 0 bytes to the right of
[   74.829919]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.842765] 
[   74.844241] The buggy address belongs to the physical page:
[   74.849797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.857784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.864293] page_type: f5(slab)
[   74.867426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.875150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.882869] page dumped because: kasan: bad access detected
[   74.888424] 
[   74.889900] Memory state around the buggy address:
[   74.894678]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.901883]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.909088] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.916288]                                      ^
[   74.921068]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.928271]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.935472] ==================================================================
[   79.704212] ==================================================================
[   79.711270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   79.718647] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   79.725938] 
[   79.727419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   79.727467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.727485] Hardware name: WinLink E850-96 board (DT)
[   79.727502] Call trace:
[   79.727515]  show_stack+0x20/0x38 (C)
[   79.727546]  dump_stack_lvl+0x8c/0xd0
[   79.727580]  print_report+0x118/0x5d0
[   79.727609]  kasan_report+0xdc/0x128
[   79.727635]  __asan_report_load8_noabort+0x20/0x30
[   79.727669]  kasan_atomics_helper+0x3e10/0x4858
[   79.727704]  kasan_atomics+0x198/0x2e0
[   79.727737]  kunit_try_run_case+0x170/0x3f0
[   79.727772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.727805]  kthread+0x328/0x630
[   79.727833]  ret_from_fork+0x10/0x20
[   79.727864] 
[   79.795555] Allocated by task 349:
[   79.798941]  kasan_save_stack+0x3c/0x68
[   79.802760]  kasan_save_track+0x20/0x40
[   79.806580]  kasan_save_alloc_info+0x40/0x58
[   79.810833]  __kasan_kmalloc+0xd4/0xd8
[   79.814566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.819079]  kasan_atomics+0xb8/0x2e0
[   79.822725]  kunit_try_run_case+0x170/0x3f0
[   79.826892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.832360]  kthread+0x328/0x630
[   79.835572]  ret_from_fork+0x10/0x20
[   79.839131] 
[   79.840607] The buggy address belongs to the object at ffff000807848f80
[   79.840607]  which belongs to the cache kmalloc-64 of size 64
[   79.852934] The buggy address is located 0 bytes to the right of
[   79.852934]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   79.865780] 
[   79.867256] The buggy address belongs to the physical page:
[   79.872812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   79.880797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.887308] page_type: f5(slab)
[   79.890442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.898165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.905884] page dumped because: kasan: bad access detected
[   79.911439] 
[   79.912915] Memory state around the buggy address:
[   79.917693]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.924897]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.932102] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.939303]                                      ^
[   79.944081]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.951286]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.958487] ==================================================================
[   80.492588] ==================================================================
[   80.499626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   80.507003] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   80.514381] 
[   80.515862] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.515915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.515932] Hardware name: WinLink E850-96 board (DT)
[   80.515952] Call trace:
[   80.515966]  show_stack+0x20/0x38 (C)
[   80.515997]  dump_stack_lvl+0x8c/0xd0
[   80.516027]  print_report+0x118/0x5d0
[   80.516057]  kasan_report+0xdc/0x128
[   80.516085]  kasan_check_range+0x100/0x1a8
[   80.516116]  __kasan_check_write+0x20/0x30
[   80.516147]  kasan_atomics_helper+0x17ec/0x4858
[   80.516183]  kasan_atomics+0x198/0x2e0
[   80.516216]  kunit_try_run_case+0x170/0x3f0
[   80.516252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.516284]  kthread+0x328/0x630
[   80.516312]  ret_from_fork+0x10/0x20
[   80.516344] 
[   80.587384] Allocated by task 349:
[   80.590769]  kasan_save_stack+0x3c/0x68
[   80.594589]  kasan_save_track+0x20/0x40
[   80.598408]  kasan_save_alloc_info+0x40/0x58
[   80.602661]  __kasan_kmalloc+0xd4/0xd8
[   80.606394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.610908]  kasan_atomics+0xb8/0x2e0
[   80.614553]  kunit_try_run_case+0x170/0x3f0
[   80.618720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.624189]  kthread+0x328/0x630
[   80.627401]  ret_from_fork+0x10/0x20
[   80.630960] 
[   80.632435] The buggy address belongs to the object at ffff000807848f80
[   80.632435]  which belongs to the cache kmalloc-64 of size 64
[   80.644762] The buggy address is located 0 bytes to the right of
[   80.644762]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   80.657608] 
[   80.659086] The buggy address belongs to the physical page:
[   80.664640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   80.672627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.679136] page_type: f5(slab)
[   80.682269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.689993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.697712] page dumped because: kasan: bad access detected
[   80.703267] 
[   80.704743] Memory state around the buggy address:
[   80.709521]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.716726]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.723930] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.731132]                                      ^
[   80.735909]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.743114]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.750315] ==================================================================
[   75.738121] ==================================================================
[   75.745183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   75.752560] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   75.759939] 
[   75.761419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   75.761465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.761483] Hardware name: WinLink E850-96 board (DT)
[   75.761502] Call trace:
[   75.761514]  show_stack+0x20/0x38 (C)
[   75.761546]  dump_stack_lvl+0x8c/0xd0
[   75.761577]  print_report+0x118/0x5d0
[   75.761605]  kasan_report+0xdc/0x128
[   75.761633]  kasan_check_range+0x100/0x1a8
[   75.761663]  __kasan_check_write+0x20/0x30
[   75.761695]  kasan_atomics_helper+0x1190/0x4858
[   75.761733]  kasan_atomics+0x198/0x2e0
[   75.761765]  kunit_try_run_case+0x170/0x3f0
[   75.761799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.761831]  kthread+0x328/0x630
[   75.761860]  ret_from_fork+0x10/0x20
[   75.761892] 
[   75.832941] Allocated by task 349:
[   75.836326]  kasan_save_stack+0x3c/0x68
[   75.840146]  kasan_save_track+0x20/0x40
[   75.843966]  kasan_save_alloc_info+0x40/0x58
[   75.848219]  __kasan_kmalloc+0xd4/0xd8
[   75.851951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.856465]  kasan_atomics+0xb8/0x2e0
[   75.860111]  kunit_try_run_case+0x170/0x3f0
[   75.864278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.869746]  kthread+0x328/0x630
[   75.872958]  ret_from_fork+0x10/0x20
[   75.876517] 
[   75.877992] The buggy address belongs to the object at ffff000807848f80
[   75.877992]  which belongs to the cache kmalloc-64 of size 64
[   75.890319] The buggy address is located 0 bytes to the right of
[   75.890319]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.903166] 
[   75.904642] The buggy address belongs to the physical page:
[   75.910198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.918183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.924694] page_type: f5(slab)
[   75.927826] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.935550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.943269] page dumped because: kasan: bad access detected
[   75.948825] 
[   75.950300] Memory state around the buggy address:
[   75.955079]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.962284]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.969488] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.976689]                                      ^
[   75.981467]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.988672]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.995873] ==================================================================
[   76.533445] ==================================================================
[   76.540484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   76.547861] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   76.555239] 
[   76.556720] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   76.556770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.556786] Hardware name: WinLink E850-96 board (DT)
[   76.556805] Call trace:
[   76.556820]  show_stack+0x20/0x38 (C)
[   76.556852]  dump_stack_lvl+0x8c/0xd0
[   76.556882]  print_report+0x118/0x5d0
[   76.556911]  kasan_report+0xdc/0x128
[   76.556938]  kasan_check_range+0x100/0x1a8
[   76.556969]  __kasan_check_write+0x20/0x30
[   76.557001]  kasan_atomics_helper+0x12d8/0x4858
[   76.557037]  kasan_atomics+0x198/0x2e0
[   76.557069]  kunit_try_run_case+0x170/0x3f0
[   76.557103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.557135]  kthread+0x328/0x630
[   76.557164]  ret_from_fork+0x10/0x20
[   76.557194] 
[   76.628242] Allocated by task 349:
[   76.631628]  kasan_save_stack+0x3c/0x68
[   76.635447]  kasan_save_track+0x20/0x40
[   76.639266]  kasan_save_alloc_info+0x40/0x58
[   76.643519]  __kasan_kmalloc+0xd4/0xd8
[   76.647252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.651766]  kasan_atomics+0xb8/0x2e0
[   76.655412]  kunit_try_run_case+0x170/0x3f0
[   76.659578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.665047]  kthread+0x328/0x630
[   76.668259]  ret_from_fork+0x10/0x20
[   76.671818] 
[   76.673293] The buggy address belongs to the object at ffff000807848f80
[   76.673293]  which belongs to the cache kmalloc-64 of size 64
[   76.685620] The buggy address is located 0 bytes to the right of
[   76.685620]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   76.698467] 
[   76.699943] The buggy address belongs to the physical page:
[   76.705498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   76.713485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.719994] page_type: f5(slab)
[   76.723127] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.730851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.738570] page dumped because: kasan: bad access detected
[   76.744125] 
[   76.745601] Memory state around the buggy address:
[   76.750379]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.757584]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.764789] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.771990]                                      ^
[   76.776768]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.783972]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.791173] ==================================================================
[   64.643706] ==================================================================
[   64.650736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   64.658024] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   64.665314] 
[   64.666799] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   64.666856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.666872] Hardware name: WinLink E850-96 board (DT)
[   64.666893] Call trace:
[   64.666907]  show_stack+0x20/0x38 (C)
[   64.666945]  dump_stack_lvl+0x8c/0xd0
[   64.666977]  print_report+0x118/0x5d0
[   64.667009]  kasan_report+0xdc/0x128
[   64.667038]  kasan_check_range+0x100/0x1a8
[   64.667071]  __kasan_check_read+0x20/0x30
[   64.667106]  kasan_atomics_helper+0x2b0/0x4858
[   64.667140]  kasan_atomics+0x198/0x2e0
[   64.667174]  kunit_try_run_case+0x170/0x3f0
[   64.667215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.667249]  kthread+0x328/0x630
[   64.667278]  ret_from_fork+0x10/0x20
[   64.667316] 
[   64.738142] Allocated by task 349:
[   64.741531]  kasan_save_stack+0x3c/0x68
[   64.745347]  kasan_save_track+0x20/0x40
[   64.749167]  kasan_save_alloc_info+0x40/0x58
[   64.753420]  __kasan_kmalloc+0xd4/0xd8
[   64.757152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.761667]  kasan_atomics+0xb8/0x2e0
[   64.765312]  kunit_try_run_case+0x170/0x3f0
[   64.769479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.774948]  kthread+0x328/0x630
[   64.778159]  ret_from_fork+0x10/0x20
[   64.781718] 
[   64.783196] The buggy address belongs to the object at ffff000807848f80
[   64.783196]  which belongs to the cache kmalloc-64 of size 64
[   64.795521] The buggy address is located 0 bytes to the right of
[   64.795521]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   64.808367] 
[   64.809845] The buggy address belongs to the physical page:
[   64.815402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   64.823387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.829896] page_type: f5(slab)
[   64.833030] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.840752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.848471] page dumped because: kasan: bad access detected
[   64.854026] 
[   64.855502] Memory state around the buggy address:
[   64.860281]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.867485]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.874691] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.881890]                                      ^
[   64.886670]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.893873]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.901074] ==================================================================
[   74.148017] ==================================================================
[   74.155104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   74.162394] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.169772] 
[   74.171253] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.171305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.171321] Hardware name: WinLink E850-96 board (DT)
[   74.171341] Call trace:
[   74.171353]  show_stack+0x20/0x38 (C)
[   74.171385]  dump_stack_lvl+0x8c/0xd0
[   74.171416]  print_report+0x118/0x5d0
[   74.171446]  kasan_report+0xdc/0x128
[   74.171473]  kasan_check_range+0x100/0x1a8
[   74.171503]  __kasan_check_write+0x20/0x30
[   74.171535]  kasan_atomics_helper+0xf20/0x4858
[   74.171568]  kasan_atomics+0x198/0x2e0
[   74.171604]  kunit_try_run_case+0x170/0x3f0
[   74.171639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.171673]  kthread+0x328/0x630
[   74.171700]  ret_from_fork+0x10/0x20
[   74.171734] 
[   74.242687] Allocated by task 349:
[   74.246073]  kasan_save_stack+0x3c/0x68
[   74.249892]  kasan_save_track+0x20/0x40
[   74.253712]  kasan_save_alloc_info+0x40/0x58
[   74.257965]  __kasan_kmalloc+0xd4/0xd8
[   74.261697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.266211]  kasan_atomics+0xb8/0x2e0
[   74.269857]  kunit_try_run_case+0x170/0x3f0
[   74.274023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.279492]  kthread+0x328/0x630
[   74.282704]  ret_from_fork+0x10/0x20
[   74.286263] 
[   74.287739] The buggy address belongs to the object at ffff000807848f80
[   74.287739]  which belongs to the cache kmalloc-64 of size 64
[   74.300065] The buggy address is located 0 bytes to the right of
[   74.300065]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.312912] 
[   74.314387] The buggy address belongs to the physical page:
[   74.319944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.327929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.334440] page_type: f5(slab)
[   74.337573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.345297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.353016] page dumped because: kasan: bad access detected
[   74.358571] 
[   74.360046] Memory state around the buggy address:
[   74.364825]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.372029]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.379234] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.386435]                                      ^
[   74.391213]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.398418]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.405619] ==================================================================
[   80.230938] ==================================================================
[   80.237998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   80.245375] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   80.252667] 
[   80.254146] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.254194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.254211] Hardware name: WinLink E850-96 board (DT)
[   80.254229] Call trace:
[   80.254241]  show_stack+0x20/0x38 (C)
[   80.254275]  dump_stack_lvl+0x8c/0xd0
[   80.254305]  print_report+0x118/0x5d0
[   80.254334]  kasan_report+0xdc/0x128
[   80.254362]  __asan_report_load8_noabort+0x20/0x30
[   80.254394]  kasan_atomics_helper+0x3e20/0x4858
[   80.254429]  kasan_atomics+0x198/0x2e0
[   80.254462]  kunit_try_run_case+0x170/0x3f0
[   80.254496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.254531]  kthread+0x328/0x630
[   80.254558]  ret_from_fork+0x10/0x20
[   80.254590] 
[   80.322283] Allocated by task 349:
[   80.325669]  kasan_save_stack+0x3c/0x68
[   80.329488]  kasan_save_track+0x20/0x40
[   80.333308]  kasan_save_alloc_info+0x40/0x58
[   80.337561]  __kasan_kmalloc+0xd4/0xd8
[   80.341294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.345808]  kasan_atomics+0xb8/0x2e0
[   80.349453]  kunit_try_run_case+0x170/0x3f0
[   80.353620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.359089]  kthread+0x328/0x630
[   80.362300]  ret_from_fork+0x10/0x20
[   80.365860] 
[   80.367335] The buggy address belongs to the object at ffff000807848f80
[   80.367335]  which belongs to the cache kmalloc-64 of size 64
[   80.379662] The buggy address is located 0 bytes to the right of
[   80.379662]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   80.392508] 
[   80.393984] The buggy address belongs to the physical page:
[   80.399540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   80.407526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.414036] page_type: f5(slab)
[   80.417171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.424893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.432612] page dumped because: kasan: bad access detected
[   80.438167] 
[   80.439643] Memory state around the buggy address:
[   80.444421]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.451625]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.458830] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.466032]                                      ^
[   80.470809]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.478014]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.485215] ==================================================================
[   69.667398] ==================================================================
[   69.674442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   69.681732] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.689110] 
[   69.690589] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.690639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.690656] Hardware name: WinLink E850-96 board (DT)
[   69.690674] Call trace:
[   69.690687]  show_stack+0x20/0x38 (C)
[   69.690722]  dump_stack_lvl+0x8c/0xd0
[   69.690752]  print_report+0x118/0x5d0
[   69.690779]  kasan_report+0xdc/0x128
[   69.690806]  kasan_check_range+0x100/0x1a8
[   69.690835]  __kasan_check_write+0x20/0x30
[   69.690867]  kasan_atomics_helper+0xa04/0x4858
[   69.690901]  kasan_atomics+0x198/0x2e0
[   69.690935]  kunit_try_run_case+0x170/0x3f0
[   69.690971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.691002]  kthread+0x328/0x630
[   69.691030]  ret_from_fork+0x10/0x20
[   69.691063] 
[   69.762025] Allocated by task 349:
[   69.765411]  kasan_save_stack+0x3c/0x68
[   69.769230]  kasan_save_track+0x20/0x40
[   69.773049]  kasan_save_alloc_info+0x40/0x58
[   69.777303]  __kasan_kmalloc+0xd4/0xd8
[   69.781035]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.785549]  kasan_atomics+0xb8/0x2e0
[   69.789195]  kunit_try_run_case+0x170/0x3f0
[   69.793362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.798831]  kthread+0x328/0x630
[   69.802042]  ret_from_fork+0x10/0x20
[   69.805602] 
[   69.807077] The buggy address belongs to the object at ffff000807848f80
[   69.807077]  which belongs to the cache kmalloc-64 of size 64
[   69.819403] The buggy address is located 0 bytes to the right of
[   69.819403]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.832250] 
[   69.833726] The buggy address belongs to the physical page:
[   69.839285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.847269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.853778] page_type: f5(slab)
[   69.856912] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.864635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.872354] page dumped because: kasan: bad access detected
[   69.877909] 
[   69.879385] Memory state around the buggy address:
[   69.884163]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.891368]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.898572] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.905773]                                      ^
[   69.910551]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.917756]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.924957] ==================================================================
[   73.883134] ==================================================================
[   73.890178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   73.897467] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   73.904845] 
[   73.906325] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   73.906379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.906395] Hardware name: WinLink E850-96 board (DT)
[   73.906415] Call trace:
[   73.906428]  show_stack+0x20/0x38 (C)
[   73.906459]  dump_stack_lvl+0x8c/0xd0
[   73.906492]  print_report+0x118/0x5d0
[   73.906520]  kasan_report+0xdc/0x128
[   73.906548]  kasan_check_range+0x100/0x1a8
[   73.906578]  __kasan_check_write+0x20/0x30
[   73.906610]  kasan_atomics_helper+0xeb8/0x4858
[   73.906646]  kasan_atomics+0x198/0x2e0
[   73.906682]  kunit_try_run_case+0x170/0x3f0
[   73.906715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.906748]  kthread+0x328/0x630
[   73.906775]  ret_from_fork+0x10/0x20
[   73.906808] 
[   73.977761] Allocated by task 349:
[   73.981146]  kasan_save_stack+0x3c/0x68
[   73.984966]  kasan_save_track+0x20/0x40
[   73.988785]  kasan_save_alloc_info+0x40/0x58
[   73.993038]  __kasan_kmalloc+0xd4/0xd8
[   73.996771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.001285]  kasan_atomics+0xb8/0x2e0
[   74.004931]  kunit_try_run_case+0x170/0x3f0
[   74.009097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.014566]  kthread+0x328/0x630
[   74.017778]  ret_from_fork+0x10/0x20
[   74.021336] 
[   74.022812] The buggy address belongs to the object at ffff000807848f80
[   74.022812]  which belongs to the cache kmalloc-64 of size 64
[   74.035139] The buggy address is located 0 bytes to the right of
[   74.035139]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   74.047985] 
[   74.049463] The buggy address belongs to the physical page:
[   74.055018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   74.063005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.069513] page_type: f5(slab)
[   74.072649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.080370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.088089] page dumped because: kasan: bad access detected
[   74.093644] 
[   74.095120] Memory state around the buggy address:
[   74.099898]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.107103]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.114308] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.121509]                                      ^
[   74.126287]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.133491]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.140693] ==================================================================
[   74.942849] ==================================================================
[   74.949884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   74.957260] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349
[   74.964638] 
[   74.966122] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   74.966175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.966193] Hardware name: WinLink E850-96 board (DT)
[   74.966211] Call trace:
[   74.966223]  show_stack+0x20/0x38 (C)
[   74.966255]  dump_stack_lvl+0x8c/0xd0
[   74.966284]  print_report+0x118/0x5d0
[   74.966313]  kasan_report+0xdc/0x128
[   74.966342]  kasan_check_range+0x100/0x1a8
[   74.966372]  __kasan_check_write+0x20/0x30
[   74.966403]  kasan_atomics_helper+0x1058/0x4858
[   74.966440]  kasan_atomics+0x198/0x2e0
[   74.966474]  kunit_try_run_case+0x170/0x3f0
[   74.966508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.966542]  kthread+0x328/0x630
[   74.966570]  ret_from_fork+0x10/0x20
[   74.966600] 
[   75.037641] Allocated by task 349:
[   75.041026]  kasan_save_stack+0x3c/0x68
[   75.044845]  kasan_save_track+0x20/0x40
[   75.048665]  kasan_save_alloc_info+0x40/0x58
[   75.052918]  __kasan_kmalloc+0xd4/0xd8
[   75.056651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.061165]  kasan_atomics+0xb8/0x2e0
[   75.064811]  kunit_try_run_case+0x170/0x3f0
[   75.068977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.074446]  kthread+0x328/0x630
[   75.077657]  ret_from_fork+0x10/0x20
[   75.081216] 
[   75.082692] The buggy address belongs to the object at ffff000807848f80
[   75.082692]  which belongs to the cache kmalloc-64 of size 64
[   75.095019] The buggy address is located 0 bytes to the right of
[   75.095019]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   75.107865] 
[   75.109341] The buggy address belongs to the physical page:
[   75.114897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   75.122882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.129393] page_type: f5(slab)
[   75.132527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.140250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.147969] page dumped because: kasan: bad access detected
[   75.153524] 
[   75.155000] Memory state around the buggy address:
[   75.159778]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.166983]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.174188] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.181389]                                      ^
[   75.186168]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.193371]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.200572] ==================================================================
[   69.402450] ==================================================================
[   69.409515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   69.416805] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   69.424183] 
[   69.425663] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   69.425710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.425725] Hardware name: WinLink E850-96 board (DT)
[   69.425745] Call trace:
[   69.425758]  show_stack+0x20/0x38 (C)
[   69.425790]  dump_stack_lvl+0x8c/0xd0
[   69.425821]  print_report+0x118/0x5d0
[   69.425849]  kasan_report+0xdc/0x128
[   69.425877]  kasan_check_range+0x100/0x1a8
[   69.425907]  __kasan_check_write+0x20/0x30
[   69.425937]  kasan_atomics_helper+0x99c/0x4858
[   69.425971]  kasan_atomics+0x198/0x2e0
[   69.426004]  kunit_try_run_case+0x170/0x3f0
[   69.426038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.426072]  kthread+0x328/0x630
[   69.426099]  ret_from_fork+0x10/0x20
[   69.426129] 
[   69.497099] Allocated by task 349:
[   69.500485]  kasan_save_stack+0x3c/0x68
[   69.504304]  kasan_save_track+0x20/0x40
[   69.508123]  kasan_save_alloc_info+0x40/0x58
[   69.512377]  __kasan_kmalloc+0xd4/0xd8
[   69.516109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.520623]  kasan_atomics+0xb8/0x2e0
[   69.524269]  kunit_try_run_case+0x170/0x3f0
[   69.528435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.533904]  kthread+0x328/0x630
[   69.537116]  ret_from_fork+0x10/0x20
[   69.540675] 
[   69.542150] The buggy address belongs to the object at ffff000807848f80
[   69.542150]  which belongs to the cache kmalloc-64 of size 64
[   69.554477] The buggy address is located 0 bytes to the right of
[   69.554477]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   69.567323] 
[   69.568799] The buggy address belongs to the physical page:
[   69.574355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   69.582341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.588851] page_type: f5(slab)
[   69.591984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.599708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.607427] page dumped because: kasan: bad access detected
[   69.612983] 
[   69.614458] Memory state around the buggy address:
[   69.619236]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.626441]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.633646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.640847]                                      ^
[   69.645625]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.652829]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.660031] ==================================================================
[   72.041850] ==================================================================
[   72.048885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   72.056262] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   72.063553] 
[   72.065035] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   72.065084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.065100] Hardware name: WinLink E850-96 board (DT)
[   72.065119] Call trace:
[   72.065133]  show_stack+0x20/0x38 (C)
[   72.065164]  dump_stack_lvl+0x8c/0xd0
[   72.065197]  print_report+0x118/0x5d0
[   72.065226]  kasan_report+0xdc/0x128
[   72.065255]  __asan_report_load4_noabort+0x20/0x30
[   72.065288]  kasan_atomics_helper+0x3dd8/0x4858
[   72.065324]  kasan_atomics+0x198/0x2e0
[   72.065358]  kunit_try_run_case+0x170/0x3f0
[   72.065393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.065425]  kthread+0x328/0x630
[   72.065452]  ret_from_fork+0x10/0x20
[   72.065485] 
[   72.133170] Allocated by task 349:
[   72.136556]  kasan_save_stack+0x3c/0x68
[   72.140375]  kasan_save_track+0x20/0x40
[   72.144195]  kasan_save_alloc_info+0x40/0x58
[   72.148448]  __kasan_kmalloc+0xd4/0xd8
[   72.152180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.156694]  kasan_atomics+0xb8/0x2e0
[   72.160340]  kunit_try_run_case+0x170/0x3f0
[   72.164507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.169975]  kthread+0x328/0x630
[   72.173187]  ret_from_fork+0x10/0x20
[   72.176746] 
[   72.178222] The buggy address belongs to the object at ffff000807848f80
[   72.178222]  which belongs to the cache kmalloc-64 of size 64
[   72.190548] The buggy address is located 0 bytes to the right of
[   72.190548]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   72.203395] 
[   72.204871] The buggy address belongs to the physical page:
[   72.210428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   72.218413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.224923] page_type: f5(slab)
[   72.228057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.235780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.243499] page dumped because: kasan: bad access detected
[   72.249054] 
[   72.250530] Memory state around the buggy address:
[   72.255308]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.262512]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.269717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.276918]                                      ^
[   72.281696]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.288901]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.296102] ==================================================================
[   65.435033] ==================================================================
[   65.442040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   65.449417] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   65.456796] 
[   65.458279] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   65.458330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.458346] Hardware name: WinLink E850-96 board (DT)
[   65.458369] Call trace:
[   65.458382]  show_stack+0x20/0x38 (C)
[   65.458416]  dump_stack_lvl+0x8c/0xd0
[   65.458449]  print_report+0x118/0x5d0
[   65.458477]  kasan_report+0xdc/0x128
[   65.458507]  __asan_report_store4_noabort+0x20/0x30
[   65.458540]  kasan_atomics_helper+0x3f94/0x4858
[   65.458576]  kasan_atomics+0x198/0x2e0
[   65.458608]  kunit_try_run_case+0x170/0x3f0
[   65.458643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.458676]  kthread+0x328/0x630
[   65.458704]  ret_from_fork+0x10/0x20
[   65.458740] 
[   65.526499] Allocated by task 349:
[   65.529884]  kasan_save_stack+0x3c/0x68
[   65.533704]  kasan_save_track+0x20/0x40
[   65.537523]  kasan_save_alloc_info+0x40/0x58
[   65.541776]  __kasan_kmalloc+0xd4/0xd8
[   65.545509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.550023]  kasan_atomics+0xb8/0x2e0
[   65.553668]  kunit_try_run_case+0x170/0x3f0
[   65.557835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.563304]  kthread+0x328/0x630
[   65.566515]  ret_from_fork+0x10/0x20
[   65.570075] 
[   65.571550] The buggy address belongs to the object at ffff000807848f80
[   65.571550]  which belongs to the cache kmalloc-64 of size 64
[   65.583878] The buggy address is located 0 bytes to the right of
[   65.583878]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   65.596723] 
[   65.598202] The buggy address belongs to the physical page:
[   65.603757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   65.611744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.618251] page_type: f5(slab)
[   65.621387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.629108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.636827] page dumped because: kasan: bad access detected
[   65.642382] 
[   65.643858] Memory state around the buggy address:
[   65.648637]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.655841]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.663048] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.670246]                                      ^
[   65.675024]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.682229]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.689430] ==================================================================
[   67.551236] ==================================================================
[   67.558327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   67.565618] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   67.572996] 
[   67.574476] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   67.574526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.574541] Hardware name: WinLink E850-96 board (DT)
[   67.574558] Call trace:
[   67.574571]  show_stack+0x20/0x38 (C)
[   67.574602]  dump_stack_lvl+0x8c/0xd0
[   67.574634]  print_report+0x118/0x5d0
[   67.574663]  kasan_report+0xdc/0x128
[   67.574690]  kasan_check_range+0x100/0x1a8
[   67.574720]  __kasan_check_write+0x20/0x30
[   67.574751]  kasan_atomics_helper+0x684/0x4858
[   67.574786]  kasan_atomics+0x198/0x2e0
[   67.574819]  kunit_try_run_case+0x170/0x3f0
[   67.574856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.574888]  kthread+0x328/0x630
[   67.574916]  ret_from_fork+0x10/0x20
[   67.574948] 
[   67.645911] Allocated by task 349:
[   67.649298]  kasan_save_stack+0x3c/0x68
[   67.653116]  kasan_save_track+0x20/0x40
[   67.656936]  kasan_save_alloc_info+0x40/0x58
[   67.661189]  __kasan_kmalloc+0xd4/0xd8
[   67.664921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.669435]  kasan_atomics+0xb8/0x2e0
[   67.673081]  kunit_try_run_case+0x170/0x3f0
[   67.677248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.682717]  kthread+0x328/0x630
[   67.685928]  ret_from_fork+0x10/0x20
[   67.689487] 
[   67.690963] The buggy address belongs to the object at ffff000807848f80
[   67.690963]  which belongs to the cache kmalloc-64 of size 64
[   67.703289] The buggy address is located 0 bytes to the right of
[   67.703289]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   67.716136] 
[   67.717612] The buggy address belongs to the physical page:
[   67.723168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   67.731153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.737663] page_type: f5(slab)
[   67.740798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.748521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.756239] page dumped because: kasan: bad access detected
[   67.761795] 
[   67.763271] Memory state around the buggy address:
[   67.768049]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.775253]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.782458] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.789659]                                      ^
[   67.794437]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.801642]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.808843] ==================================================================
[   66.226644] ==================================================================
[   66.233694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   66.240985] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349
[   66.248363] 
[   66.249846] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   66.249898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.249913] Hardware name: WinLink E850-96 board (DT)
[   66.249933] Call trace:
[   66.249946]  show_stack+0x20/0x38 (C)
[   66.249978]  dump_stack_lvl+0x8c/0xd0
[   66.250009]  print_report+0x118/0x5d0
[   66.250037]  kasan_report+0xdc/0x128
[   66.250065]  kasan_check_range+0x100/0x1a8
[   66.250093]  __kasan_check_write+0x20/0x30
[   66.250124]  kasan_atomics_helper+0x47c/0x4858
[   66.250158]  kasan_atomics+0x198/0x2e0
[   66.250190]  kunit_try_run_case+0x170/0x3f0
[   66.250226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.250258]  kthread+0x328/0x630
[   66.250286]  ret_from_fork+0x10/0x20
[   66.250321] 
[   66.321278] Allocated by task 349:
[   66.324664]  kasan_save_stack+0x3c/0x68
[   66.328484]  kasan_save_track+0x20/0x40
[   66.332303]  kasan_save_alloc_info+0x40/0x58
[   66.336556]  __kasan_kmalloc+0xd4/0xd8
[   66.340289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.344803]  kasan_atomics+0xb8/0x2e0
[   66.348448]  kunit_try_run_case+0x170/0x3f0
[   66.352615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.358083]  kthread+0x328/0x630
[   66.361295]  ret_from_fork+0x10/0x20
[   66.364854] 
[   66.366330] The buggy address belongs to the object at ffff000807848f80
[   66.366330]  which belongs to the cache kmalloc-64 of size 64
[   66.378657] The buggy address is located 0 bytes to the right of
[   66.378657]  allocated 48-byte region [ffff000807848f80, ffff000807848fb0)
[   66.391503] 
[   66.392980] The buggy address belongs to the physical page:
[   66.398536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848
[   66.406523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.413031] page_type: f5(slab)
[   66.416165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.423888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.431607] page dumped because: kasan: bad access detected
[   66.437162] 
[   66.438638] Memory state around the buggy address:
[   66.443418]  ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.450620]  ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.457825] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.465026]                                      ^
[   66.469804]  ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.477009]  ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.484210] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   61.170990] ==================================================================
[   61.178041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.186894] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.194272] 
[   61.195754] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.195804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.195821] Hardware name: WinLink E850-96 board (DT)
[   61.195838] Call trace:
[   61.195852]  show_stack+0x20/0x38 (C)
[   61.195884]  dump_stack_lvl+0x8c/0xd0
[   61.195915]  print_report+0x118/0x5d0
[   61.195942]  kasan_report+0xdc/0x128
[   61.195971]  kasan_check_range+0x100/0x1a8
[   61.196001]  __kasan_check_write+0x20/0x30
[   61.196031]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.196070]  kasan_bitops_generic+0x11c/0x1c8
[   61.196105]  kunit_try_run_case+0x170/0x3f0
[   61.196141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.196174]  kthread+0x328/0x630
[   61.196200]  ret_from_fork+0x10/0x20
[   61.196233] 
[   61.269358] Allocated by task 345:
[   61.272743]  kasan_save_stack+0x3c/0x68
[   61.276563]  kasan_save_track+0x20/0x40
[   61.280382]  kasan_save_alloc_info+0x40/0x58
[   61.284635]  __kasan_kmalloc+0xd4/0xd8
[   61.288368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.292881]  kasan_bitops_generic+0xa0/0x1c8
[   61.297135]  kunit_try_run_case+0x170/0x3f0
[   61.301302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.306770]  kthread+0x328/0x630
[   61.309982]  ret_from_fork+0x10/0x20
[   61.313541] 
[   61.315017] The buggy address belongs to the object at ffff000800b19520
[   61.315017]  which belongs to the cache kmalloc-16 of size 16
[   61.327344] The buggy address is located 8 bytes inside of
[   61.327344]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.339582] 
[   61.341058] The buggy address belongs to the physical page:
[   61.346615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.354600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.361110] page_type: f5(slab)
[   61.364245] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.371967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.379686] page dumped because: kasan: bad access detected
[   61.385241] 
[   61.386717] Memory state around the buggy address:
[   61.391497]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.398700]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.405906] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.413106]                                   ^
[   61.417623]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.424828]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.432029] ==================================================================
[   61.704453] ==================================================================
[   61.711541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.720480] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.727858] 
[   61.729337] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.729386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.729405] Hardware name: WinLink E850-96 board (DT)
[   61.729423] Call trace:
[   61.729435]  show_stack+0x20/0x38 (C)
[   61.729466]  dump_stack_lvl+0x8c/0xd0
[   61.729499]  print_report+0x118/0x5d0
[   61.729527]  kasan_report+0xdc/0x128
[   61.729553]  kasan_check_range+0x100/0x1a8
[   61.729583]  __kasan_check_write+0x20/0x30
[   61.729614]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.729650]  kasan_bitops_generic+0x11c/0x1c8
[   61.729686]  kunit_try_run_case+0x170/0x3f0
[   61.729718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.729748]  kthread+0x328/0x630
[   61.729775]  ret_from_fork+0x10/0x20
[   61.729804] 
[   61.803030] Allocated by task 345:
[   61.806416]  kasan_save_stack+0x3c/0x68
[   61.810235]  kasan_save_track+0x20/0x40
[   61.814055]  kasan_save_alloc_info+0x40/0x58
[   61.818308]  __kasan_kmalloc+0xd4/0xd8
[   61.822040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.826554]  kasan_bitops_generic+0xa0/0x1c8
[   61.830808]  kunit_try_run_case+0x170/0x3f0
[   61.834974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.840443]  kthread+0x328/0x630
[   61.843655]  ret_from_fork+0x10/0x20
[   61.847214] 
[   61.848689] The buggy address belongs to the object at ffff000800b19520
[   61.848689]  which belongs to the cache kmalloc-16 of size 16
[   61.861016] The buggy address is located 8 bytes inside of
[   61.861016]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.873255] 
[   61.874731] The buggy address belongs to the physical page:
[   61.880287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.888272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.894783] page_type: f5(slab)
[   61.897917] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.905640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.913359] page dumped because: kasan: bad access detected
[   61.918914] 
[   61.920389] Memory state around the buggy address:
[   61.925169]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.932373]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.939577] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.946778]                                   ^
[   61.951296]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.958500]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.965702] ==================================================================
[   63.305497] ==================================================================
[   63.312558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.321498] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   63.328789] 
[   63.330269] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.330318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.330334] Hardware name: WinLink E850-96 board (DT)
[   63.330352] Call trace:
[   63.330364]  show_stack+0x20/0x38 (C)
[   63.330396]  dump_stack_lvl+0x8c/0xd0
[   63.330427]  print_report+0x118/0x5d0
[   63.330456]  kasan_report+0xdc/0x128
[   63.330482]  __asan_report_load8_noabort+0x20/0x30
[   63.330515]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.330555]  kasan_bitops_generic+0x11c/0x1c8
[   63.330589]  kunit_try_run_case+0x170/0x3f0
[   63.330622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.330657]  kthread+0x328/0x630
[   63.330684]  ret_from_fork+0x10/0x20
[   63.330714] 
[   63.400576] Allocated by task 345:
[   63.403961]  kasan_save_stack+0x3c/0x68
[   63.407781]  kasan_save_track+0x20/0x40
[   63.411600]  kasan_save_alloc_info+0x40/0x58
[   63.415853]  __kasan_kmalloc+0xd4/0xd8
[   63.419586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.424100]  kasan_bitops_generic+0xa0/0x1c8
[   63.428353]  kunit_try_run_case+0x170/0x3f0
[   63.432520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.437989]  kthread+0x328/0x630
[   63.441200]  ret_from_fork+0x10/0x20
[   63.444759] 
[   63.446235] The buggy address belongs to the object at ffff000800b19520
[   63.446235]  which belongs to the cache kmalloc-16 of size 16
[   63.458561] The buggy address is located 8 bytes inside of
[   63.458561]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   63.470801] 
[   63.472276] The buggy address belongs to the physical page:
[   63.477832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   63.485818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.492328] page_type: f5(slab)
[   63.495461] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.503185] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.510904] page dumped because: kasan: bad access detected
[   63.516459] 
[   63.517935] Memory state around the buggy address:
[   63.522713]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.529918]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   63.537123] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   63.544324]                                   ^
[   63.548841]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.556046]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.563247] ==================================================================
[   62.506745] ==================================================================
[   62.513786] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.522725] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   62.530016] 
[   62.531497] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.531546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.531562] Hardware name: WinLink E850-96 board (DT)
[   62.531581] Call trace:
[   62.531593]  show_stack+0x20/0x38 (C)
[   62.531623]  dump_stack_lvl+0x8c/0xd0
[   62.531652]  print_report+0x118/0x5d0
[   62.531680]  kasan_report+0xdc/0x128
[   62.531708]  __asan_report_load8_noabort+0x20/0x30
[   62.531743]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.531781]  kasan_bitops_generic+0x11c/0x1c8
[   62.531816]  kunit_try_run_case+0x170/0x3f0
[   62.531853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.531886]  kthread+0x328/0x630
[   62.531913]  ret_from_fork+0x10/0x20
[   62.531944] 
[   62.601803] Allocated by task 345:
[   62.605188]  kasan_save_stack+0x3c/0x68
[   62.609008]  kasan_save_track+0x20/0x40
[   62.612827]  kasan_save_alloc_info+0x40/0x58
[   62.617081]  __kasan_kmalloc+0xd4/0xd8
[   62.620813]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.625327]  kasan_bitops_generic+0xa0/0x1c8
[   62.629581]  kunit_try_run_case+0x170/0x3f0
[   62.633747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.639216]  kthread+0x328/0x630
[   62.642428]  ret_from_fork+0x10/0x20
[   62.645986] 
[   62.647462] The buggy address belongs to the object at ffff000800b19520
[   62.647462]  which belongs to the cache kmalloc-16 of size 16
[   62.659789] The buggy address is located 8 bytes inside of
[   62.659789]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.672028] 
[   62.673504] The buggy address belongs to the physical page:
[   62.679059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.687047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.693555] page_type: f5(slab)
[   62.696690] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.704412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.712131] page dumped because: kasan: bad access detected
[   62.717687] 
[   62.719162] Memory state around the buggy address:
[   62.723941]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.731145]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   62.738350] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   62.745551]                                   ^
[   62.750068]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.757273]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.764474] ==================================================================
[   62.238153] ==================================================================
[   62.245213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.254152] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   62.261530] 
[   62.263011] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.263059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.263077] Hardware name: WinLink E850-96 board (DT)
[   62.263095] Call trace:
[   62.263105]  show_stack+0x20/0x38 (C)
[   62.263138]  dump_stack_lvl+0x8c/0xd0
[   62.263166]  print_report+0x118/0x5d0
[   62.263192]  kasan_report+0xdc/0x128
[   62.263219]  kasan_check_range+0x100/0x1a8
[   62.263248]  __kasan_check_write+0x20/0x30
[   62.263278]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.263317]  kasan_bitops_generic+0x11c/0x1c8
[   62.263352]  kunit_try_run_case+0x170/0x3f0
[   62.263387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.263420]  kthread+0x328/0x630
[   62.263447]  ret_from_fork+0x10/0x20
[   62.263478] 
[   62.336703] Allocated by task 345:
[   62.340088]  kasan_save_stack+0x3c/0x68
[   62.343907]  kasan_save_track+0x20/0x40
[   62.347727]  kasan_save_alloc_info+0x40/0x58
[   62.351980]  __kasan_kmalloc+0xd4/0xd8
[   62.355713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.360227]  kasan_bitops_generic+0xa0/0x1c8
[   62.364480]  kunit_try_run_case+0x170/0x3f0
[   62.368647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.374116]  kthread+0x328/0x630
[   62.377327]  ret_from_fork+0x10/0x20
[   62.380886] 
[   62.382362] The buggy address belongs to the object at ffff000800b19520
[   62.382362]  which belongs to the cache kmalloc-16 of size 16
[   62.394689] The buggy address is located 8 bytes inside of
[   62.394689]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.406928] 
[   62.408403] The buggy address belongs to the physical page:
[   62.413959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.421945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.428455] page_type: f5(slab)
[   62.431589] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.439312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.447031] page dumped because: kasan: bad access detected
[   62.452586] 
[   62.454062] Memory state around the buggy address:
[   62.458840]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.466045]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   62.473250] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   62.480450]                                   ^
[   62.484969]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.492173]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.499374] ==================================================================
[   63.040392] ==================================================================
[   63.047458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.056397] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   63.063689] 
[   63.065170] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   63.065217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.065235] Hardware name: WinLink E850-96 board (DT)
[   63.065251] Call trace:
[   63.065264]  show_stack+0x20/0x38 (C)
[   63.065296]  dump_stack_lvl+0x8c/0xd0
[   63.065324]  print_report+0x118/0x5d0
[   63.065352]  kasan_report+0xdc/0x128
[   63.065379]  __asan_report_load8_noabort+0x20/0x30
[   63.065413]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.065452]  kasan_bitops_generic+0x11c/0x1c8
[   63.065486]  kunit_try_run_case+0x170/0x3f0
[   63.065520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.065555]  kthread+0x328/0x630
[   63.065582]  ret_from_fork+0x10/0x20
[   63.065613] 
[   63.135477] Allocated by task 345:
[   63.138861]  kasan_save_stack+0x3c/0x68
[   63.142680]  kasan_save_track+0x20/0x40
[   63.146500]  kasan_save_alloc_info+0x40/0x58
[   63.150753]  __kasan_kmalloc+0xd4/0xd8
[   63.154486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.158999]  kasan_bitops_generic+0xa0/0x1c8
[   63.163253]  kunit_try_run_case+0x170/0x3f0
[   63.167419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.172888]  kthread+0x328/0x630
[   63.176100]  ret_from_fork+0x10/0x20
[   63.179659] 
[   63.181135] The buggy address belongs to the object at ffff000800b19520
[   63.181135]  which belongs to the cache kmalloc-16 of size 16
[   63.193461] The buggy address is located 8 bytes inside of
[   63.193461]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   63.205700] 
[   63.207176] The buggy address belongs to the physical page:
[   63.212732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   63.220719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.227228] page_type: f5(slab)
[   63.230364] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.238085] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.245804] page dumped because: kasan: bad access detected
[   63.251359] 
[   63.252835] Memory state around the buggy address:
[   63.257613]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.264818]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   63.272023] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   63.279223]                                   ^
[   63.283741]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.290946]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.298147] ==================================================================
[   61.973077] ==================================================================
[   61.980112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.989052] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.996344] 
[   61.997823] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.997874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.997890] Hardware name: WinLink E850-96 board (DT)
[   61.997910] Call trace:
[   61.997922]  show_stack+0x20/0x38 (C)
[   61.997954]  dump_stack_lvl+0x8c/0xd0
[   61.997989]  print_report+0x118/0x5d0
[   61.998018]  kasan_report+0xdc/0x128
[   61.998046]  __asan_report_load8_noabort+0x20/0x30
[   61.998079]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.998119]  kasan_bitops_generic+0x11c/0x1c8
[   61.998153]  kunit_try_run_case+0x170/0x3f0
[   61.998187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.998220]  kthread+0x328/0x630
[   61.998247]  ret_from_fork+0x10/0x20
[   61.998279] 
[   62.068130] Allocated by task 345:
[   62.071516]  kasan_save_stack+0x3c/0x68
[   62.075336]  kasan_save_track+0x20/0x40
[   62.079155]  kasan_save_alloc_info+0x40/0x58
[   62.083408]  __kasan_kmalloc+0xd4/0xd8
[   62.087141]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.091654]  kasan_bitops_generic+0xa0/0x1c8
[   62.095908]  kunit_try_run_case+0x170/0x3f0
[   62.100075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.105543]  kthread+0x328/0x630
[   62.108755]  ret_from_fork+0x10/0x20
[   62.112314] 
[   62.113789] The buggy address belongs to the object at ffff000800b19520
[   62.113789]  which belongs to the cache kmalloc-16 of size 16
[   62.126116] The buggy address is located 8 bytes inside of
[   62.126116]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.138355] 
[   62.139831] The buggy address belongs to the physical page:
[   62.145387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.153375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.159883] page_type: f5(slab)
[   62.163017] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.170740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.178459] page dumped because: kasan: bad access detected
[   62.184014] 
[   62.185490] Memory state around the buggy address:
[   62.190269]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.197472]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   62.204677] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   62.211878]                                   ^
[   62.216396]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.223601]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.230802] ==================================================================
[   62.771819] ==================================================================
[   62.778887] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.787825] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   62.795203] 
[   62.796682] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   62.796731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.796747] Hardware name: WinLink E850-96 board (DT)
[   62.796766] Call trace:
[   62.796778]  show_stack+0x20/0x38 (C)
[   62.796809]  dump_stack_lvl+0x8c/0xd0
[   62.796839]  print_report+0x118/0x5d0
[   62.796867]  kasan_report+0xdc/0x128
[   62.796894]  kasan_check_range+0x100/0x1a8
[   62.796924]  __kasan_check_write+0x20/0x30
[   62.796955]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.796995]  kasan_bitops_generic+0x11c/0x1c8
[   62.797029]  kunit_try_run_case+0x170/0x3f0
[   62.797062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.797095]  kthread+0x328/0x630
[   62.797121]  ret_from_fork+0x10/0x20
[   62.797153] 
[   62.870375] Allocated by task 345:
[   62.873761]  kasan_save_stack+0x3c/0x68
[   62.877580]  kasan_save_track+0x20/0x40
[   62.881400]  kasan_save_alloc_info+0x40/0x58
[   62.885653]  __kasan_kmalloc+0xd4/0xd8
[   62.889386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.893899]  kasan_bitops_generic+0xa0/0x1c8
[   62.898153]  kunit_try_run_case+0x170/0x3f0
[   62.902319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.907788]  kthread+0x328/0x630
[   62.911000]  ret_from_fork+0x10/0x20
[   62.914559] 
[   62.916036] The buggy address belongs to the object at ffff000800b19520
[   62.916036]  which belongs to the cache kmalloc-16 of size 16
[   62.928361] The buggy address is located 8 bytes inside of
[   62.928361]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   62.940600] 
[   62.942076] The buggy address belongs to the physical page:
[   62.947632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   62.955617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.962128] page_type: f5(slab)
[   62.965262] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.972984] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.980704] page dumped because: kasan: bad access detected
[   62.986259] 
[   62.987735] Memory state around the buggy address:
[   62.992513]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.999718]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   63.006922] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   63.014123]                                   ^
[   63.018641]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.025846]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.033047] ==================================================================
[   61.439401] ==================================================================
[   61.446440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.455381] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   61.462671] 
[   61.464153] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   61.464204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.464221] Hardware name: WinLink E850-96 board (DT)
[   61.464239] Call trace:
[   61.464252]  show_stack+0x20/0x38 (C)
[   61.464285]  dump_stack_lvl+0x8c/0xd0
[   61.464314]  print_report+0x118/0x5d0
[   61.464342]  kasan_report+0xdc/0x128
[   61.464369]  __asan_report_load8_noabort+0x20/0x30
[   61.464404]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.464447]  kasan_bitops_generic+0x11c/0x1c8
[   61.464480]  kunit_try_run_case+0x170/0x3f0
[   61.464513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.464548]  kthread+0x328/0x630
[   61.464574]  ret_from_fork+0x10/0x20
[   61.464605] 
[   61.534458] Allocated by task 345:
[   61.537843]  kasan_save_stack+0x3c/0x68
[   61.541663]  kasan_save_track+0x20/0x40
[   61.545482]  kasan_save_alloc_info+0x40/0x58
[   61.549736]  __kasan_kmalloc+0xd4/0xd8
[   61.553468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.557982]  kasan_bitops_generic+0xa0/0x1c8
[   61.562235]  kunit_try_run_case+0x170/0x3f0
[   61.566402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.571870]  kthread+0x328/0x630
[   61.575082]  ret_from_fork+0x10/0x20
[   61.578641] 
[   61.580117] The buggy address belongs to the object at ffff000800b19520
[   61.580117]  which belongs to the cache kmalloc-16 of size 16
[   61.592444] The buggy address is located 8 bytes inside of
[   61.592444]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.604683] 
[   61.606158] The buggy address belongs to the physical page:
[   61.611715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.619702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.626210] page_type: f5(slab)
[   61.629345] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.637067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.644786] page dumped because: kasan: bad access detected
[   61.650342] 
[   61.651817] Memory state around the buggy address:
[   61.656597]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.663800]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.671007] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.678206]                                   ^
[   61.682723]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.689928]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.697129] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   59.575827] ==================================================================
[   59.582927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.591085] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.598463] 
[   59.599946] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.599998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.600014] Hardware name: WinLink E850-96 board (DT)
[   59.600034] Call trace:
[   59.600045]  show_stack+0x20/0x38 (C)
[   59.600076]  dump_stack_lvl+0x8c/0xd0
[   59.600110]  print_report+0x118/0x5d0
[   59.600138]  kasan_report+0xdc/0x128
[   59.600165]  kasan_check_range+0x100/0x1a8
[   59.600196]  __kasan_check_write+0x20/0x30
[   59.600226]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.600261]  kasan_bitops_generic+0x110/0x1c8
[   59.600297]  kunit_try_run_case+0x170/0x3f0
[   59.600331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.600362]  kthread+0x328/0x630
[   59.600391]  ret_from_fork+0x10/0x20
[   59.600426] 
[   59.672854] Allocated by task 345:
[   59.676241]  kasan_save_stack+0x3c/0x68
[   59.680059]  kasan_save_track+0x20/0x40
[   59.683878]  kasan_save_alloc_info+0x40/0x58
[   59.688132]  __kasan_kmalloc+0xd4/0xd8
[   59.691864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.696378]  kasan_bitops_generic+0xa0/0x1c8
[   59.700631]  kunit_try_run_case+0x170/0x3f0
[   59.704798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.710267]  kthread+0x328/0x630
[   59.713478]  ret_from_fork+0x10/0x20
[   59.717037] 
[   59.718514] The buggy address belongs to the object at ffff000800b19520
[   59.718514]  which belongs to the cache kmalloc-16 of size 16
[   59.730840] The buggy address is located 8 bytes inside of
[   59.730840]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   59.743079] 
[   59.744556] The buggy address belongs to the physical page:
[   59.750112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   59.758099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.764607] page_type: f5(slab)
[   59.767741] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.775464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.783182] page dumped because: kasan: bad access detected
[   59.788737] 
[   59.790213] Memory state around the buggy address:
[   59.794993]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.802196]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.809402] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.816602]                                   ^
[   59.821119]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.828324]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.835527] ==================================================================
[   60.109849] ==================================================================
[   60.116949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.125105] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.132396] 
[   60.133880] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.133930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.133948] Hardware name: WinLink E850-96 board (DT)
[   60.133967] Call trace:
[   60.133980]  show_stack+0x20/0x38 (C)
[   60.134012]  dump_stack_lvl+0x8c/0xd0
[   60.134045]  print_report+0x118/0x5d0
[   60.134074]  kasan_report+0xdc/0x128
[   60.134102]  __asan_report_load8_noabort+0x20/0x30
[   60.134135]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.134170]  kasan_bitops_generic+0x110/0x1c8
[   60.134205]  kunit_try_run_case+0x170/0x3f0
[   60.134242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.134274]  kthread+0x328/0x630
[   60.134302]  ret_from_fork+0x10/0x20
[   60.134335] 
[   60.203402] Allocated by task 345:
[   60.206787]  kasan_save_stack+0x3c/0x68
[   60.210607]  kasan_save_track+0x20/0x40
[   60.214426]  kasan_save_alloc_info+0x40/0x58
[   60.218679]  __kasan_kmalloc+0xd4/0xd8
[   60.222412]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.226926]  kasan_bitops_generic+0xa0/0x1c8
[   60.231179]  kunit_try_run_case+0x170/0x3f0
[   60.235346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.240814]  kthread+0x328/0x630
[   60.244026]  ret_from_fork+0x10/0x20
[   60.247585] 
[   60.249062] The buggy address belongs to the object at ffff000800b19520
[   60.249062]  which belongs to the cache kmalloc-16 of size 16
[   60.261387] The buggy address is located 8 bytes inside of
[   60.261387]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.273626] 
[   60.275104] The buggy address belongs to the physical page:
[   60.280662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.288646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.295155] page_type: f5(slab)
[   60.298288] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.306011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.313730] page dumped because: kasan: bad access detected
[   60.319285] 
[   60.320761] Memory state around the buggy address:
[   60.325540]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.332744]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.339950] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.347149]                                   ^
[   60.351667]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.358872]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.366073] ==================================================================
[   59.842838] ==================================================================
[   59.849938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.858095] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.865473] 
[   59.866957] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.867006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.867022] Hardware name: WinLink E850-96 board (DT)
[   59.867044] Call trace:
[   59.867056]  show_stack+0x20/0x38 (C)
[   59.867090]  dump_stack_lvl+0x8c/0xd0
[   59.867121]  print_report+0x118/0x5d0
[   59.867148]  kasan_report+0xdc/0x128
[   59.867175]  kasan_check_range+0x100/0x1a8
[   59.867203]  __kasan_check_write+0x20/0x30
[   59.867234]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.867271]  kasan_bitops_generic+0x110/0x1c8
[   59.867307]  kunit_try_run_case+0x170/0x3f0
[   59.867343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.867377]  kthread+0x328/0x630
[   59.867404]  ret_from_fork+0x10/0x20
[   59.867439] 
[   59.939864] Allocated by task 345:
[   59.943251]  kasan_save_stack+0x3c/0x68
[   59.947069]  kasan_save_track+0x20/0x40
[   59.950888]  kasan_save_alloc_info+0x40/0x58
[   59.955141]  __kasan_kmalloc+0xd4/0xd8
[   59.958874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.963388]  kasan_bitops_generic+0xa0/0x1c8
[   59.967641]  kunit_try_run_case+0x170/0x3f0
[   59.971808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.977276]  kthread+0x328/0x630
[   59.980488]  ret_from_fork+0x10/0x20
[   59.984047] 
[   59.985523] The buggy address belongs to the object at ffff000800b19520
[   59.985523]  which belongs to the cache kmalloc-16 of size 16
[   59.997850] The buggy address is located 8 bytes inside of
[   59.997850]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.010088] 
[   60.011566] The buggy address belongs to the physical page:
[   60.017122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.025108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.031617] page_type: f5(slab)
[   60.034751] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.042473] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.050192] page dumped because: kasan: bad access detected
[   60.055748] 
[   60.057223] Memory state around the buggy address:
[   60.062003]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.069206]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.076412] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.083612]                                   ^
[   60.088129]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.095334]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.102535] ==================================================================
[   58.512551] ==================================================================
[   58.521834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.529992] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   58.537367] 
[   58.538853] CPU: 2 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   58.538910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.538930] Hardware name: WinLink E850-96 board (DT)
[   58.538952] Call trace:
[   58.538965]  show_stack+0x20/0x38 (C)
[   58.539004]  dump_stack_lvl+0x8c/0xd0
[   58.539038]  print_report+0x118/0x5d0
[   58.539068]  kasan_report+0xdc/0x128
[   58.539096]  kasan_check_range+0x100/0x1a8
[   58.539128]  __kasan_check_write+0x20/0x30
[   58.539162]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.539199]  kasan_bitops_generic+0x110/0x1c8
[   58.539237]  kunit_try_run_case+0x170/0x3f0
[   58.539276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.539310]  kthread+0x328/0x630
[   58.539339]  ret_from_fork+0x10/0x20
[   58.539376] 
[   58.611759] Allocated by task 345:
[   58.615148]  kasan_save_stack+0x3c/0x68
[   58.618963]  kasan_save_track+0x20/0x40
[   58.622783]  kasan_save_alloc_info+0x40/0x58
[   58.627037]  __kasan_kmalloc+0xd4/0xd8
[   58.630769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.635283]  kasan_bitops_generic+0xa0/0x1c8
[   58.639536]  kunit_try_run_case+0x170/0x3f0
[   58.643703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.649173]  kthread+0x328/0x630
[   58.652383]  ret_from_fork+0x10/0x20
[   58.655943] 
[   58.657420] The buggy address belongs to the object at ffff000800b19520
[   58.657420]  which belongs to the cache kmalloc-16 of size 16
[   58.669745] The buggy address is located 8 bytes inside of
[   58.669745]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   58.681985] 
[   58.683463] The buggy address belongs to the physical page:
[   58.689019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   58.697003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.703513] page_type: f5(slab)
[   58.706649] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.714368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.722087] page dumped because: kasan: bad access detected
[   58.727642] 
[   58.729118] Memory state around the buggy address:
[   58.733898]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.741101]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   58.748308] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   58.755507]                                   ^
[   58.760024]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.767230]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.774431] ==================================================================
[   60.640394] ==================================================================
[   60.647494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.655652] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.663030] 
[   60.664513] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.664563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.664580] Hardware name: WinLink E850-96 board (DT)
[   60.664597] Call trace:
[   60.664610]  show_stack+0x20/0x38 (C)
[   60.664643]  dump_stack_lvl+0x8c/0xd0
[   60.664674]  print_report+0x118/0x5d0
[   60.664701]  kasan_report+0xdc/0x128
[   60.664731]  kasan_check_range+0x100/0x1a8
[   60.664760]  __kasan_check_write+0x20/0x30
[   60.664792]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.664830]  kasan_bitops_generic+0x110/0x1c8
[   60.664865]  kunit_try_run_case+0x170/0x3f0
[   60.664901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.664934]  kthread+0x328/0x630
[   60.664961]  ret_from_fork+0x10/0x20
[   60.664996] 
[   60.737421] Allocated by task 345:
[   60.740806]  kasan_save_stack+0x3c/0x68
[   60.744626]  kasan_save_track+0x20/0x40
[   60.748446]  kasan_save_alloc_info+0x40/0x58
[   60.752699]  __kasan_kmalloc+0xd4/0xd8
[   60.756431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.760947]  kasan_bitops_generic+0xa0/0x1c8
[   60.765198]  kunit_try_run_case+0x170/0x3f0
[   60.769365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.774834]  kthread+0x328/0x630
[   60.778046]  ret_from_fork+0x10/0x20
[   60.781605] 
[   60.783080] The buggy address belongs to the object at ffff000800b19520
[   60.783080]  which belongs to the cache kmalloc-16 of size 16
[   60.795407] The buggy address is located 8 bytes inside of
[   60.795407]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.807646] 
[   60.809122] The buggy address belongs to the physical page:
[   60.814678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.822665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.829175] page_type: f5(slab)
[   60.832308] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.840031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.847750] page dumped because: kasan: bad access detected
[   60.853305] 
[   60.854780] Memory state around the buggy address:
[   60.859560]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.866763]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.873970] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.881169]                                   ^
[   60.885686]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.892892]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.900092] ==================================================================
[   59.312332] ==================================================================
[   59.319392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.327547] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.334838] 
[   59.336323] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.336375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.336391] Hardware name: WinLink E850-96 board (DT)
[   59.336412] Call trace:
[   59.336427]  show_stack+0x20/0x38 (C)
[   59.336459]  dump_stack_lvl+0x8c/0xd0
[   59.336491]  print_report+0x118/0x5d0
[   59.336522]  kasan_report+0xdc/0x128
[   59.336550]  __asan_report_load8_noabort+0x20/0x30
[   59.336585]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.336622]  kasan_bitops_generic+0x110/0x1c8
[   59.336657]  kunit_try_run_case+0x170/0x3f0
[   59.336695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.336729]  kthread+0x328/0x630
[   59.336758]  ret_from_fork+0x10/0x20
[   59.336793] 
[   59.405844] Allocated by task 345:
[   59.409233]  kasan_save_stack+0x3c/0x68
[   59.413049]  kasan_save_track+0x20/0x40
[   59.416868]  kasan_save_alloc_info+0x40/0x58
[   59.421122]  __kasan_kmalloc+0xd4/0xd8
[   59.424854]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.429368]  kasan_bitops_generic+0xa0/0x1c8
[   59.433622]  kunit_try_run_case+0x170/0x3f0
[   59.437788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.443258]  kthread+0x328/0x630
[   59.446468]  ret_from_fork+0x10/0x20
[   59.450028] 
[   59.451505] The buggy address belongs to the object at ffff000800b19520
[   59.451505]  which belongs to the cache kmalloc-16 of size 16
[   59.463830] The buggy address is located 8 bytes inside of
[   59.463830]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   59.476069] 
[   59.477546] The buggy address belongs to the physical page:
[   59.483102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   59.491088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.497598] page_type: f5(slab)
[   59.500731] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.508453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.516172] page dumped because: kasan: bad access detected
[   59.521728] 
[   59.523203] Memory state around the buggy address:
[   59.527983]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.535186]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.542392] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.549592]                                   ^
[   59.554110]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.561316]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.568516] ==================================================================
[   60.373370] ==================================================================
[   60.380485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.388642] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.396020] 
[   60.397504] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.397557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.397573] Hardware name: WinLink E850-96 board (DT)
[   60.397595] Call trace:
[   60.397608]  show_stack+0x20/0x38 (C)
[   60.397640]  dump_stack_lvl+0x8c/0xd0
[   60.397669]  print_report+0x118/0x5d0
[   60.397698]  kasan_report+0xdc/0x128
[   60.397728]  kasan_check_range+0x100/0x1a8
[   60.397761]  __kasan_check_write+0x20/0x30
[   60.397790]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.397826]  kasan_bitops_generic+0x110/0x1c8
[   60.397859]  kunit_try_run_case+0x170/0x3f0
[   60.397895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.397929]  kthread+0x328/0x630
[   60.397955]  ret_from_fork+0x10/0x20
[   60.397986] 
[   60.470411] Allocated by task 345:
[   60.473797]  kasan_save_stack+0x3c/0x68
[   60.477616]  kasan_save_track+0x20/0x40
[   60.481436]  kasan_save_alloc_info+0x40/0x58
[   60.485689]  __kasan_kmalloc+0xd4/0xd8
[   60.489422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.493935]  kasan_bitops_generic+0xa0/0x1c8
[   60.498189]  kunit_try_run_case+0x170/0x3f0
[   60.502356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.507824]  kthread+0x328/0x630
[   60.511036]  ret_from_fork+0x10/0x20
[   60.514595] 
[   60.516071] The buggy address belongs to the object at ffff000800b19520
[   60.516071]  which belongs to the cache kmalloc-16 of size 16
[   60.528397] The buggy address is located 8 bytes inside of
[   60.528397]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   60.540636] 
[   60.542113] The buggy address belongs to the physical page:
[   60.547668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   60.555655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.562164] page_type: f5(slab)
[   60.565299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.573020] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.580740] page dumped because: kasan: bad access detected
[   60.586295] 
[   60.587771] Memory state around the buggy address:
[   60.592550]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.599753]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   60.606960] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   60.614159]                                   ^
[   60.618677]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.625882]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.633083] ==================================================================
[   58.781942] ==================================================================
[   58.788844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.796999] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   58.804290] 
[   58.805775] CPU: 2 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   58.805832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.805849] Hardware name: WinLink E850-96 board (DT)
[   58.805871] Call trace:
[   58.805884]  show_stack+0x20/0x38 (C)
[   58.805919]  dump_stack_lvl+0x8c/0xd0
[   58.805953]  print_report+0x118/0x5d0
[   58.805979]  kasan_report+0xdc/0x128
[   58.806007]  __asan_report_load8_noabort+0x20/0x30
[   58.806043]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.806080]  kasan_bitops_generic+0x110/0x1c8
[   58.806119]  kunit_try_run_case+0x170/0x3f0
[   58.806156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.806190]  kthread+0x328/0x630
[   58.806221]  ret_from_fork+0x10/0x20
[   58.806255] 
[   58.875297] Allocated by task 345:
[   58.878685]  kasan_save_stack+0x3c/0x68
[   58.882503]  kasan_save_track+0x20/0x40
[   58.886321]  kasan_save_alloc_info+0x40/0x58
[   58.890574]  __kasan_kmalloc+0xd4/0xd8
[   58.894307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.898821]  kasan_bitops_generic+0xa0/0x1c8
[   58.903074]  kunit_try_run_case+0x170/0x3f0
[   58.907241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.912711]  kthread+0x328/0x630
[   58.915921]  ret_from_fork+0x10/0x20
[   58.919480] 
[   58.920957] The buggy address belongs to the object at ffff000800b19520
[   58.920957]  which belongs to the cache kmalloc-16 of size 16
[   58.933283] The buggy address is located 8 bytes inside of
[   58.933283]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   58.945521] 
[   58.946999] The buggy address belongs to the physical page:
[   58.952555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   58.960541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.967050] page_type: f5(slab)
[   58.970185] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.977906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.985624] page dumped because: kasan: bad access detected
[   58.991180] 
[   58.992655] Memory state around the buggy address:
[   58.997437]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.004639]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.011846] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.019044]                                   ^
[   59.023562]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.030768]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.037968] ==================================================================
[   59.045415] ==================================================================
[   59.052381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   59.060537] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   59.067915] 
[   59.069399] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   59.069453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.069471] Hardware name: WinLink E850-96 board (DT)
[   59.069496] Call trace:
[   59.069510]  show_stack+0x20/0x38 (C)
[   59.069548]  dump_stack_lvl+0x8c/0xd0
[   59.069582]  print_report+0x118/0x5d0
[   59.069613]  kasan_report+0xdc/0x128
[   59.069642]  kasan_check_range+0x100/0x1a8
[   59.069672]  __kasan_check_write+0x20/0x30
[   59.069708]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   59.069748]  kasan_bitops_generic+0x110/0x1c8
[   59.069784]  kunit_try_run_case+0x170/0x3f0
[   59.069823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.069857]  kthread+0x328/0x630
[   59.069886]  ret_from_fork+0x10/0x20
[   59.069924] 
[   59.142306] Allocated by task 345:
[   59.145695]  kasan_save_stack+0x3c/0x68
[   59.149511]  kasan_save_track+0x20/0x40
[   59.153331]  kasan_save_alloc_info+0x40/0x58
[   59.157584]  __kasan_kmalloc+0xd4/0xd8
[   59.161317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.165830]  kasan_bitops_generic+0xa0/0x1c8
[   59.170083]  kunit_try_run_case+0x170/0x3f0
[   59.174252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.179720]  kthread+0x328/0x630
[   59.182931]  ret_from_fork+0x10/0x20
[   59.186490] 
[   59.187967] The buggy address belongs to the object at ffff000800b19520
[   59.187967]  which belongs to the cache kmalloc-16 of size 16
[   59.200292] The buggy address is located 8 bytes inside of
[   59.200292]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   59.212531] 
[   59.214009] The buggy address belongs to the physical page:
[   59.219567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   59.227550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.234060] page_type: f5(slab)
[   59.237194] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.244916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.252634] page dumped because: kasan: bad access detected
[   59.258190] 
[   59.259665] Memory state around the buggy address:
[   59.264447]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.271649]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   59.278854] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   59.286054]                                   ^
[   59.290573]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.297778]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.304978] ==================================================================
[   60.907491] ==================================================================
[   60.914504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.922662] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345
[   60.929953] 
[   60.931436] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   60.931485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.931501] Hardware name: WinLink E850-96 board (DT)
[   60.931521] Call trace:
[   60.931533]  show_stack+0x20/0x38 (C)
[   60.931565]  dump_stack_lvl+0x8c/0xd0
[   60.931598]  print_report+0x118/0x5d0
[   60.931627]  kasan_report+0xdc/0x128
[   60.931654]  __asan_report_load8_noabort+0x20/0x30
[   60.931687]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.931724]  kasan_bitops_generic+0x110/0x1c8
[   60.931759]  kunit_try_run_case+0x170/0x3f0
[   60.931793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.931826]  kthread+0x328/0x630
[   60.931855]  ret_from_fork+0x10/0x20
[   60.931888] 
[   61.000959] Allocated by task 345:
[   61.004345]  kasan_save_stack+0x3c/0x68
[   61.008164]  kasan_save_track+0x20/0x40
[   61.011983]  kasan_save_alloc_info+0x40/0x58
[   61.016237]  __kasan_kmalloc+0xd4/0xd8
[   61.019969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.024483]  kasan_bitops_generic+0xa0/0x1c8
[   61.028737]  kunit_try_run_case+0x170/0x3f0
[   61.032903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.038372]  kthread+0x328/0x630
[   61.041583]  ret_from_fork+0x10/0x20
[   61.045143] 
[   61.046618] The buggy address belongs to the object at ffff000800b19520
[   61.046618]  which belongs to the cache kmalloc-16 of size 16
[   61.058945] The buggy address is located 8 bytes inside of
[   61.058945]  allocated 9-byte region [ffff000800b19520, ffff000800b19529)
[   61.071184] 
[   61.072659] The buggy address belongs to the physical page:
[   61.078217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19
[   61.086203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.092711] page_type: f5(slab)
[   61.095846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.103568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.111287] page dumped because: kasan: bad access detected
[   61.116843] 
[   61.118318] Memory state around the buggy address:
[   61.123098]  ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.130301]  ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   61.137506] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   61.144707]                                   ^
[   61.149224]  ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.156429]  ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.163630] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   58.210660] ==================================================================
[   58.217672] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   58.223658] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343
[   58.230949] 
[   58.232432] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   58.232486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.232503] Hardware name: WinLink E850-96 board (DT)
[   58.232522] Call trace:
[   58.232536]  show_stack+0x20/0x38 (C)
[   58.232569]  dump_stack_lvl+0x8c/0xd0
[   58.232601]  print_report+0x118/0x5d0
[   58.232631]  kasan_report+0xdc/0x128
[   58.232660]  __asan_report_load1_noabort+0x20/0x30
[   58.232694]  strnlen+0x80/0x88
[   58.232729]  kasan_strings+0x478/0xb00
[   58.232760]  kunit_try_run_case+0x170/0x3f0
[   58.232798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.232832]  kthread+0x328/0x630
[   58.232860]  ret_from_fork+0x10/0x20
[   58.232894] 
[   58.299089] Allocated by task 343:
[   58.302478]  kasan_save_stack+0x3c/0x68
[   58.306295]  kasan_save_track+0x20/0x40
[   58.310114]  kasan_save_alloc_info+0x40/0x58
[   58.314367]  __kasan_kmalloc+0xd4/0xd8
[   58.318100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.322614]  kasan_strings+0xc8/0xb00
[   58.326259]  kunit_try_run_case+0x170/0x3f0
[   58.330426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.335895]  kthread+0x328/0x630
[   58.339107]  ret_from_fork+0x10/0x20
[   58.342666] 
[   58.344143] Freed by task 343:
[   58.347180]  kasan_save_stack+0x3c/0x68
[   58.350999]  kasan_save_track+0x20/0x40
[   58.354818]  kasan_save_free_info+0x4c/0x78
[   58.358985]  __kasan_slab_free+0x6c/0x98
[   58.362891]  kfree+0x214/0x3c8
[   58.365929]  kasan_strings+0x24c/0xb00
[   58.369662]  kunit_try_run_case+0x170/0x3f0
[   58.373828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.379297]  kthread+0x328/0x630
[   58.382509]  ret_from_fork+0x10/0x20
[   58.386068] 
[   58.387543] The buggy address belongs to the object at ffff0008016ffe00
[   58.387543]  which belongs to the cache kmalloc-32 of size 32
[   58.399870] The buggy address is located 16 bytes inside of
[   58.399870]  freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20)
[   58.411936] 
[   58.413413] The buggy address belongs to the physical page:
[   58.418971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff
[   58.426955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.433464] page_type: f5(slab)
[   58.436602] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122
[   58.444320] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   58.452039] page dumped because: kasan: bad access detected
[   58.457594] 
[   58.459070] Memory state around the buggy address:
[   58.463851]  ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc
[   58.471053]  ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.478258] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.485459]                          ^
[   58.489195]  ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   58.496400]  ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.503601] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   57.910466] ==================================================================
[   57.917501] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   57.923401] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343
[   57.930693] 
[   57.932176] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   57.932232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.932247] Hardware name: WinLink E850-96 board (DT)
[   57.932268] Call trace:
[   57.932282]  show_stack+0x20/0x38 (C)
[   57.932317]  dump_stack_lvl+0x8c/0xd0
[   57.932353]  print_report+0x118/0x5d0
[   57.932382]  kasan_report+0xdc/0x128
[   57.932411]  __asan_report_load1_noabort+0x20/0x30
[   57.932445]  strlen+0xa8/0xb0
[   57.932475]  kasan_strings+0x418/0xb00
[   57.932507]  kunit_try_run_case+0x170/0x3f0
[   57.932543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.932577]  kthread+0x328/0x630
[   57.932605]  ret_from_fork+0x10/0x20
[   57.932640] 
[   57.998747] Allocated by task 343:
[   58.002134]  kasan_save_stack+0x3c/0x68
[   58.005952]  kasan_save_track+0x20/0x40
[   58.009771]  kasan_save_alloc_info+0x40/0x58
[   58.014025]  __kasan_kmalloc+0xd4/0xd8
[   58.017757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.022271]  kasan_strings+0xc8/0xb00
[   58.025917]  kunit_try_run_case+0x170/0x3f0
[   58.030084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.035552]  kthread+0x328/0x630
[   58.038764]  ret_from_fork+0x10/0x20
[   58.042323] 
[   58.043798] Freed by task 343:
[   58.046837]  kasan_save_stack+0x3c/0x68
[   58.050657]  kasan_save_track+0x20/0x40
[   58.054476]  kasan_save_free_info+0x4c/0x78
[   58.058642]  __kasan_slab_free+0x6c/0x98
[   58.062548]  kfree+0x214/0x3c8
[   58.065586]  kasan_strings+0x24c/0xb00
[   58.069319]  kunit_try_run_case+0x170/0x3f0
[   58.073485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.078954]  kthread+0x328/0x630
[   58.082166]  ret_from_fork+0x10/0x20
[   58.085725] 
[   58.087201] The buggy address belongs to the object at ffff0008016ffe00
[   58.087201]  which belongs to the cache kmalloc-32 of size 32
[   58.099527] The buggy address is located 16 bytes inside of
[   58.099527]  freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20)
[   58.111593] 
[   58.113070] The buggy address belongs to the physical page:
[   58.118628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff
[   58.126612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.133122] page_type: f5(slab)
[   58.136255] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122
[   58.143977] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   58.151696] page dumped because: kasan: bad access detected
[   58.157252] 
[   58.158727] Memory state around the buggy address:
[   58.163506]  ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc
[   58.170710]  ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.177916] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.185116]                          ^
[   58.188852]  ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   58.196057]  ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.203258] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   57.612515] ==================================================================
[   57.619506] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   57.626183] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343
[   57.633475] 
[   57.634960] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   57.635017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.635035] Hardware name: WinLink E850-96 board (DT)
[   57.635061] Call trace:
[   57.635074]  show_stack+0x20/0x38 (C)
[   57.635111]  dump_stack_lvl+0x8c/0xd0
[   57.635146]  print_report+0x118/0x5d0
[   57.635174]  kasan_report+0xdc/0x128
[   57.635200]  __asan_report_load1_noabort+0x20/0x30
[   57.635232]  kasan_strings+0x95c/0xb00
[   57.635261]  kunit_try_run_case+0x170/0x3f0
[   57.635301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.635334]  kthread+0x328/0x630
[   57.635363]  ret_from_fork+0x10/0x20
[   57.635400] 
[   57.698579] Allocated by task 343:
[   57.701966]  kasan_save_stack+0x3c/0x68
[   57.705783]  kasan_save_track+0x20/0x40
[   57.709602]  kasan_save_alloc_info+0x40/0x58
[   57.713856]  __kasan_kmalloc+0xd4/0xd8
[   57.717588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.722102]  kasan_strings+0xc8/0xb00
[   57.725748]  kunit_try_run_case+0x170/0x3f0
[   57.729914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.735384]  kthread+0x328/0x630
[   57.738595]  ret_from_fork+0x10/0x20
[   57.742154] 
[   57.743631] Freed by task 343:
[   57.746670]  kasan_save_stack+0x3c/0x68
[   57.750487]  kasan_save_track+0x20/0x40
[   57.754306]  kasan_save_free_info+0x4c/0x78
[   57.758473]  __kasan_slab_free+0x6c/0x98
[   57.762379]  kfree+0x214/0x3c8
[   57.765417]  kasan_strings+0x24c/0xb00
[   57.769151]  kunit_try_run_case+0x170/0x3f0
[   57.773317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.778785]  kthread+0x328/0x630
[   57.781997]  ret_from_fork+0x10/0x20
[   57.785556] 
[   57.787033] The buggy address belongs to the object at ffff0008016ffe00
[   57.787033]  which belongs to the cache kmalloc-32 of size 32
[   57.799358] The buggy address is located 16 bytes inside of
[   57.799358]  freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20)
[   57.811423] 
[   57.812900] The buggy address belongs to the physical page:
[   57.818458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff
[   57.826443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.832952] page_type: f5(slab)
[   57.836087] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122
[   57.843808] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   57.851529] page dumped because: kasan: bad access detected
[   57.857083] 
[   57.858559] Memory state around the buggy address:
[   57.863338]  ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc
[   57.870541]  ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.877747] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.884947]                          ^
[   57.888683]  ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   57.895888]  ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.903089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   57.295711] ==================================================================
[   57.319335] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   57.325235] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343
[   57.332524] 
[   57.334013] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   57.334069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.334086] Hardware name: WinLink E850-96 board (DT)
[   57.334109] Call trace:
[   57.334125]  show_stack+0x20/0x38 (C)
[   57.334163]  dump_stack_lvl+0x8c/0xd0
[   57.334194]  print_report+0x118/0x5d0
[   57.334226]  kasan_report+0xdc/0x128
[   57.334254]  __asan_report_load1_noabort+0x20/0x30
[   57.334289]  strcmp+0xc0/0xc8
[   57.334321]  kasan_strings+0x340/0xb00
[   57.334357]  kunit_try_run_case+0x170/0x3f0
[   57.334394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.334430]  kthread+0x328/0x630
[   57.334461]  ret_from_fork+0x10/0x20
[   57.334494] 
[   57.400580] Allocated by task 343:
[   57.403968]  kasan_save_stack+0x3c/0x68
[   57.407784]  kasan_save_track+0x20/0x40
[   57.411603]  kasan_save_alloc_info+0x40/0x58
[   57.415857]  __kasan_kmalloc+0xd4/0xd8
[   57.419589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.424103]  kasan_strings+0xc8/0xb00
[   57.427749]  kunit_try_run_case+0x170/0x3f0
[   57.431915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.437385]  kthread+0x328/0x630
[   57.440596]  ret_from_fork+0x10/0x20
[   57.444155] 
[   57.445632] Freed by task 343:
[   57.448670]  kasan_save_stack+0x3c/0x68
[   57.452488]  kasan_save_track+0x20/0x40
[   57.456309]  kasan_save_free_info+0x4c/0x78
[   57.460474]  __kasan_slab_free+0x6c/0x98
[   57.464380]  kfree+0x214/0x3c8
[   57.467418]  kasan_strings+0x24c/0xb00
[   57.471152]  kunit_try_run_case+0x170/0x3f0
[   57.475317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.480786]  kthread+0x328/0x630
[   57.483998]  ret_from_fork+0x10/0x20
[   57.487557] 
[   57.489034] The buggy address belongs to the object at ffff0008016ffe00
[   57.489034]  which belongs to the cache kmalloc-32 of size 32
[   57.501360] The buggy address is located 16 bytes inside of
[   57.501360]  freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20)
[   57.513426] 
[   57.514902] The buggy address belongs to the physical page:
[   57.520460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff
[   57.528446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.534954] page_type: f5(slab)
[   57.538089] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122
[   57.545809] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   57.553529] page dumped because: kasan: bad access detected
[   57.559083] 
[   57.560559] Memory state around the buggy address:
[   57.565342]  ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc
[   57.572542]  ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.579750] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.586948]                          ^
[   57.590684]  ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   57.597889]  ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.605091] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   56.994016] ==================================================================
[   57.004148] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   57.010138] Read of size 1 at addr ffff000806058358 by task kunit_try_catch/341
[   57.017425] 
[   57.018914] CPU: 6 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   57.018975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.018993] Hardware name: WinLink E850-96 board (DT)
[   57.019017] Call trace:
[   57.019034]  show_stack+0x20/0x38 (C)
[   57.019077]  dump_stack_lvl+0x8c/0xd0
[   57.019111]  print_report+0x118/0x5d0
[   57.019144]  kasan_report+0xdc/0x128
[   57.019173]  __asan_report_load1_noabort+0x20/0x30
[   57.019209]  memcmp+0x198/0x1d8
[   57.019243]  kasan_memcmp+0x16c/0x300
[   57.019276]  kunit_try_run_case+0x170/0x3f0
[   57.019317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.019352]  kthread+0x328/0x630
[   57.019384]  ret_from_fork+0x10/0x20
[   57.019420] 
[   57.085568] Allocated by task 341:
[   57.088955]  kasan_save_stack+0x3c/0x68
[   57.092771]  kasan_save_track+0x20/0x40
[   57.096591]  kasan_save_alloc_info+0x40/0x58
[   57.100844]  __kasan_kmalloc+0xd4/0xd8
[   57.104577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.109090]  kasan_memcmp+0xbc/0x300
[   57.112650]  kunit_try_run_case+0x170/0x3f0
[   57.116816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.122286]  kthread+0x328/0x630
[   57.125497]  ret_from_fork+0x10/0x20
[   57.129055] 
[   57.130534] The buggy address belongs to the object at ffff000806058340
[   57.130534]  which belongs to the cache kmalloc-32 of size 32
[   57.142860] The buggy address is located 0 bytes to the right of
[   57.142860]  allocated 24-byte region [ffff000806058340, ffff000806058358)
[   57.155706] 
[   57.157183] The buggy address belongs to the physical page:
[   57.162740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886058
[   57.170724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.177235] page_type: f5(slab)
[   57.180369] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   57.188089] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   57.195809] page dumped because: kasan: bad access detected
[   57.201363] 
[   57.202839] Memory state around the buggy address:
[   57.207619]  ffff000806058200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.214822]  ffff000806058280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.222028] >ffff000806058300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   57.229228]                                                     ^
[   57.235307]  ffff000806058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.242514]  ffff000806058400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.249713] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   56.769068] ==================================================================
[   56.778808] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   56.786355] Read of size 1 at addr ffff800089687b4a by task kunit_try_catch/337
[   56.793646] 
[   56.795129] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   56.795189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.795208] Hardware name: WinLink E850-96 board (DT)
[   56.795230] Call trace:
[   56.795247]  show_stack+0x20/0x38 (C)
[   56.795285]  dump_stack_lvl+0x8c/0xd0
[   56.795321]  print_report+0x310/0x5d0
[   56.795353]  kasan_report+0xdc/0x128
[   56.795381]  __asan_report_load1_noabort+0x20/0x30
[   56.795414]  kasan_alloca_oob_right+0x2dc/0x340
[   56.795448]  kunit_try_run_case+0x170/0x3f0
[   56.795492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.795527]  kthread+0x328/0x630
[   56.795557]  ret_from_fork+0x10/0x20
[   56.795596] 
[   56.859533] The buggy address belongs to stack of task kunit_try_catch/337
[   56.866409] 
[   56.867863] The buggy address ffff800089687b4a belongs to a vmalloc virtual mapping
[   56.875506] The buggy address belongs to the physical page:
[   56.881061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88883a
[   56.889045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.895566] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   56.903284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.911005] page dumped because: kasan: bad access detected
[   56.916559] 
[   56.918035] Memory state around the buggy address:
[   56.922814]  ffff800089687a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.930017]  ffff800089687a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.937223] >ffff800089687b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   56.944423]                                               ^
[   56.949982]  ffff800089687b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   56.957187]  ffff800089687c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   56.964390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   56.565085] ==================================================================
[   56.574296] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   56.581755] Read of size 1 at addr ffff800089667b5f by task kunit_try_catch/335
[   56.589047] 
[   56.590530] CPU: 5 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   56.590591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.590609] Hardware name: WinLink E850-96 board (DT)
[   56.590632] Call trace:
[   56.590647]  show_stack+0x20/0x38 (C)
[   56.590683]  dump_stack_lvl+0x8c/0xd0
[   56.590718]  print_report+0x310/0x5d0
[   56.590747]  kasan_report+0xdc/0x128
[   56.590775]  __asan_report_load1_noabort+0x20/0x30
[   56.590811]  kasan_alloca_oob_left+0x2b8/0x310
[   56.590845]  kunit_try_run_case+0x170/0x3f0
[   56.590886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.590919]  kthread+0x328/0x630
[   56.590949]  ret_from_fork+0x10/0x20
[   56.590986] 
[   56.654848] The buggy address belongs to stack of task kunit_try_catch/335
[   56.661720] 
[   56.663177] The buggy address ffff800089667b5f belongs to a vmalloc virtual mapping
[   56.670820] The buggy address belongs to the physical page:
[   56.676375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888826
[   56.684359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.690878] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   56.698599] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.706318] page dumped because: kasan: bad access detected
[   56.711874] 
[   56.713350] Memory state around the buggy address:
[   56.718131]  ffff800089667a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.725333]  ffff800089667a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.732539] >ffff800089667b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   56.739738]                                                     ^
[   56.745818]  ffff800089667b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   56.753023]  ffff800089667c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   56.760225] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   56.331217] ==================================================================
[   56.345656] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   56.352508] Read of size 1 at addr ffff800089647c2a by task kunit_try_catch/333
[   56.359797] 
[   56.361283] CPU: 7 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   56.361346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.361361] Hardware name: WinLink E850-96 board (DT)
[   56.361386] Call trace:
[   56.361403]  show_stack+0x20/0x38 (C)
[   56.361445]  dump_stack_lvl+0x8c/0xd0
[   56.361478]  print_report+0x310/0x5d0
[   56.361509]  kasan_report+0xdc/0x128
[   56.361536]  __asan_report_load1_noabort+0x20/0x30
[   56.361570]  kasan_stack_oob+0x238/0x270
[   56.361601]  kunit_try_run_case+0x170/0x3f0
[   56.361642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.361676]  kthread+0x328/0x630
[   56.361704]  ret_from_fork+0x10/0x20
[   56.361741] 
[   56.425076] The buggy address belongs to stack of task kunit_try_catch/333
[   56.431932]  and is located at offset 138 in frame:
[   56.436792]  kasan_stack_oob+0x0/0x270
[   56.440530] 
[   56.441999] This frame has 4 objects:
[   56.445652]  [48, 49) '__assertion'
[   56.445678]  [64, 72) 'array'
[   56.449121]  [96, 112) '__assertion'
[   56.452071]  [128, 138) 'stack_array'
[   56.455628] 
[   56.460751] The buggy address ffff800089647c2a belongs to a vmalloc virtual mapping
[   56.468393] The buggy address belongs to the physical page:
[   56.473948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888812
[   56.481933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.488452] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   56.496172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.503893] page dumped because: kasan: bad access detected
[   56.509446] 
[   56.510922] Memory state around the buggy address:
[   56.515702]  ffff800089647b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.522905]  ffff800089647b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   56.530111] >ffff800089647c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   56.537311]                                   ^
[   56.541829]  ffff800089647c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   56.549032]  ffff800089647d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   56.556234] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   56.120463] ==================================================================
[   56.131245] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   56.138793] Read of size 1 at addr ffff800087b4d6cd by task kunit_try_catch/329
[   56.146084] 
[   56.147569] CPU: 4 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   56.147629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.147645] Hardware name: WinLink E850-96 board (DT)
[   56.147669] Call trace:
[   56.147687]  show_stack+0x20/0x38 (C)
[   56.147722]  dump_stack_lvl+0x8c/0xd0
[   56.147759]  print_report+0x310/0x5d0
[   56.147786]  kasan_report+0xdc/0x128
[   56.147814]  __asan_report_load1_noabort+0x20/0x30
[   56.147849]  kasan_global_oob_right+0x230/0x270
[   56.147879]  kunit_try_run_case+0x170/0x3f0
[   56.147919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.147952]  kthread+0x328/0x630
[   56.147985]  ret_from_fork+0x10/0x20
[   56.148022] 
[   56.211968] The buggy address belongs to the variable:
[   56.217090]  global_array+0xd/0x40
[   56.220475] 
[   56.221950] The buggy address ffff800087b4d6cd belongs to a vmalloc virtual mapping
[   56.229594] The buggy address belongs to the physical page:
[   56.235150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b4d
[   56.243048] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   56.250347] raw: 03fffe0000002000 fffffdffc01ed348 fffffdffc01ed348 0000000000000000
[   56.258068] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.265787] page dumped because: kasan: bad access detected
[   56.271342] 
[   56.272818] Memory state around the buggy address:
[   56.277600]  ffff800087b4d580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.284802]  ffff800087b4d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.292007] >ffff800087b4d680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   56.299206]                                               ^
[   56.304766]  ffff800087b4d700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   56.311971]  ffff800087b4d780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   56.319172] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   55.553471] ==================================================================
[   55.563636] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.571613] Free of addr ffff0008019ace01 by task kunit_try_catch/325
[   55.578037] 
[   55.579524] CPU: 3 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   55.579588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.579605] Hardware name: WinLink E850-96 board (DT)
[   55.579628] Call trace:
[   55.579641]  show_stack+0x20/0x38 (C)
[   55.579677]  dump_stack_lvl+0x8c/0xd0
[   55.579710]  print_report+0x118/0x5d0
[   55.579739]  kasan_report_invalid_free+0xc0/0xe8
[   55.579773]  check_slab_allocation+0xfc/0x108
[   55.579816]  __kasan_mempool_poison_object+0x78/0x150
[   55.579854]  mempool_free+0x28c/0x328
[   55.579888]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.579926]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.579960]  kunit_try_run_case+0x170/0x3f0
[   55.580001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.580034]  kthread+0x328/0x630
[   55.580066]  ret_from_fork+0x10/0x20
[   55.580104] 
[   55.659287] Allocated by task 325:
[   55.662675]  kasan_save_stack+0x3c/0x68
[   55.666491]  kasan_save_track+0x20/0x40
[   55.670310]  kasan_save_alloc_info+0x40/0x58
[   55.674563]  __kasan_mempool_unpoison_object+0x11c/0x180
[   55.679859]  remove_element+0x130/0x1f8
[   55.683678]  mempool_alloc_preallocated+0x58/0xc0
[   55.688367]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   55.693921]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.698868]  kunit_try_run_case+0x170/0x3f0
[   55.703035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.708504]  kthread+0x328/0x630
[   55.711715]  ret_from_fork+0x10/0x20
[   55.715275] 
[   55.716752] The buggy address belongs to the object at ffff0008019ace00
[   55.716752]  which belongs to the cache kmalloc-128 of size 128
[   55.729252] The buggy address is located 1 bytes inside of
[   55.729252]  128-byte region [ffff0008019ace00, ffff0008019ace80)
[   55.740795] 
[   55.742273] The buggy address belongs to the physical page:
[   55.747831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   55.755815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.763453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.770396] page_type: f5(slab)
[   55.773534] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.781252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.788981] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.796791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.804603] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   55.812415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   55.820221] page dumped because: kasan: bad access detected
[   55.825776] 
[   55.827251] Memory state around the buggy address:
[   55.832030]  ffff0008019acd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.839235]  ffff0008019acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.846441] >ffff0008019ace00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.853641]                    ^
[   55.856856]  ffff0008019ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.864061]  ffff0008019acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.871263] ==================================================================
[   55.880310] ==================================================================
[   55.890452] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.898433] Free of addr ffff000805b50001 by task kunit_try_catch/327
[   55.904856] 
[   55.906342] CPU: 5 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   55.906405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.906424] Hardware name: WinLink E850-96 board (DT)
[   55.906449] Call trace:
[   55.906463]  show_stack+0x20/0x38 (C)
[   55.906498]  dump_stack_lvl+0x8c/0xd0
[   55.906533]  print_report+0x118/0x5d0
[   55.906564]  kasan_report_invalid_free+0xc0/0xe8
[   55.906597]  __kasan_mempool_poison_object+0xfc/0x150
[   55.906639]  mempool_free+0x28c/0x328
[   55.906675]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.906713]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   55.906753]  kunit_try_run_case+0x170/0x3f0
[   55.906794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.906827]  kthread+0x328/0x630
[   55.906858]  ret_from_fork+0x10/0x20
[   55.906897] 
[   55.982287] The buggy address belongs to the physical page:
[   55.987844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50
[   55.995828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   56.003467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   56.010410] page_type: f8(unknown)
[   56.013807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   56.021526] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   56.029253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   56.037064] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   56.044878] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff
[   56.052689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   56.060495] page dumped because: kasan: bad access detected
[   56.066050] 
[   56.067526] Memory state around the buggy address:
[   56.072305]  ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.079509]  ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.086715] >ffff000805b50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.093915]                    ^
[   56.097130]  ffff000805b50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.104335]  ffff000805b50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.111537] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   55.119539] ==================================================================
[   55.129002] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   55.136118] Free of addr ffff000806dcc000 by task kunit_try_catch/321
[   55.142541] 
[   55.144027] CPU: 4 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   55.144089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.144106] Hardware name: WinLink E850-96 board (DT)
[   55.144128] Call trace:
[   55.144144]  show_stack+0x20/0x38 (C)
[   55.144184]  dump_stack_lvl+0x8c/0xd0
[   55.144218]  print_report+0x118/0x5d0
[   55.144248]  kasan_report_invalid_free+0xc0/0xe8
[   55.144276]  __kasan_mempool_poison_object+0x14c/0x150
[   55.144318]  mempool_free+0x28c/0x328
[   55.144351]  mempool_double_free_helper+0x150/0x2e8
[   55.144390]  mempool_kmalloc_large_double_free+0xc0/0x118
[   55.144428]  kunit_try_run_case+0x170/0x3f0
[   55.144465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.144498]  kthread+0x328/0x630
[   55.144526]  ret_from_fork+0x10/0x20
[   55.144560] 
[   55.219191] The buggy address belongs to the physical page:
[   55.224748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dcc
[   55.232731] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.240370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.247315] page_type: f8(unknown)
[   55.250710] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.258430] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.266156] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.273968] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.281781] head: 0bfffe0000000002 fffffdffe01b7301 00000000ffffffff 00000000ffffffff
[   55.289593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   55.297399] page dumped because: kasan: bad access detected
[   55.302954] 
[   55.304429] Memory state around the buggy address:
[   55.309208]  ffff000806dcbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.316412]  ffff000806dcbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.323619] >ffff000806dcc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.330818]                    ^
[   55.334034]  ffff000806dcc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.341239]  ffff000806dcc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.348440] ==================================================================
[   55.357511] ==================================================================
[   55.368061] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   55.375176] Free of addr ffff000808748000 by task kunit_try_catch/323
[   55.381600] 
[   55.383085] CPU: 3 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   55.383146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.383160] Hardware name: WinLink E850-96 board (DT)
[   55.383183] Call trace:
[   55.383196]  show_stack+0x20/0x38 (C)
[   55.383231]  dump_stack_lvl+0x8c/0xd0
[   55.383266]  print_report+0x118/0x5d0
[   55.383292]  kasan_report_invalid_free+0xc0/0xe8
[   55.383321]  __kasan_mempool_poison_pages+0xe0/0xe8
[   55.383366]  mempool_free+0x24c/0x328
[   55.383399]  mempool_double_free_helper+0x150/0x2e8
[   55.383433]  mempool_page_alloc_double_free+0xbc/0x118
[   55.383470]  kunit_try_run_case+0x170/0x3f0
[   55.383505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.383539]  kthread+0x328/0x630
[   55.383569]  ret_from_fork+0x10/0x20
[   55.383607] 
[   55.457729] The buggy address belongs to the physical page:
[   55.463285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888748
[   55.471270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.477789] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   55.485510] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.493229] page dumped because: kasan: bad access detected
[   55.498784] 
[   55.500260] Memory state around the buggy address:
[   55.505040]  ffff000808747f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.512243]  ffff000808747f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.519450] >ffff000808748000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.526649]                    ^
[   55.529864]  ffff000808748080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.537068]  ffff000808748100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.544270] ==================================================================
[   54.744006] ==================================================================
[   54.753748] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   54.760862] Free of addr ffff000803b8ae00 by task kunit_try_catch/319
[   54.767287] 
[   54.768772] CPU: 5 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   54.768827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.768843] Hardware name: WinLink E850-96 board (DT)
[   54.768866] Call trace:
[   54.768879]  show_stack+0x20/0x38 (C)
[   54.768912]  dump_stack_lvl+0x8c/0xd0
[   54.768947]  print_report+0x118/0x5d0
[   54.768976]  kasan_report_invalid_free+0xc0/0xe8
[   54.769007]  check_slab_allocation+0xd4/0x108
[   54.769045]  __kasan_mempool_poison_object+0x78/0x150
[   54.769086]  mempool_free+0x28c/0x328
[   54.769119]  mempool_double_free_helper+0x150/0x2e8
[   54.769153]  mempool_kmalloc_double_free+0xc0/0x118
[   54.769186]  kunit_try_run_case+0x170/0x3f0
[   54.769227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.769260]  kthread+0x328/0x630
[   54.769291]  ret_from_fork+0x10/0x20
[   54.769324] 
[   54.847667] Allocated by task 319:
[   54.851055]  kasan_save_stack+0x3c/0x68
[   54.854871]  kasan_save_track+0x20/0x40
[   54.858690]  kasan_save_alloc_info+0x40/0x58
[   54.862944]  __kasan_mempool_unpoison_object+0x11c/0x180
[   54.868240]  remove_element+0x130/0x1f8
[   54.872058]  mempool_alloc_preallocated+0x58/0xc0
[   54.876745]  mempool_double_free_helper+0x94/0x2e8
[   54.881520]  mempool_kmalloc_double_free+0xc0/0x118
[   54.886381]  kunit_try_run_case+0x170/0x3f0
[   54.890547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.896016]  kthread+0x328/0x630
[   54.899228]  ret_from_fork+0x10/0x20
[   54.902787] 
[   54.904264] Freed by task 319:
[   54.907300]  kasan_save_stack+0x3c/0x68
[   54.911120]  kasan_save_track+0x20/0x40
[   54.914939]  kasan_save_free_info+0x4c/0x78
[   54.919106]  __kasan_mempool_poison_object+0xc0/0x150
[   54.924140]  mempool_free+0x28c/0x328
[   54.927786]  mempool_double_free_helper+0x100/0x2e8
[   54.932647]  mempool_kmalloc_double_free+0xc0/0x118
[   54.937508]  kunit_try_run_case+0x170/0x3f0
[   54.941675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.947143]  kthread+0x328/0x630
[   54.950355]  ret_from_fork+0x10/0x20
[   54.953915] 
[   54.955391] The buggy address belongs to the object at ffff000803b8ae00
[   54.955391]  which belongs to the cache kmalloc-128 of size 128
[   54.967892] The buggy address is located 0 bytes inside of
[   54.967892]  128-byte region [ffff000803b8ae00, ffff000803b8ae80)
[   54.979435] 
[   54.980914] The buggy address belongs to the physical page:
[   54.986470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b8a
[   54.994454] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.002093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.009036] page_type: f5(slab)
[   55.012172] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.019892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.027619] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.035430] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.043243] head: 0bfffe0000000001 fffffdffe00ee281 00000000ffffffff 00000000ffffffff
[   55.051055] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   55.058860] page dumped because: kasan: bad access detected
[   55.064416] 
[   55.065891] Memory state around the buggy address:
[   55.070670]  ffff000803b8ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.077875]  ffff000803b8ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.085081] >ffff000803b8ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.092280]                    ^
[   55.095496]  ffff000803b8ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.102700]  ffff000803b8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.109903] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   54.565178] ==================================================================
[   54.565370] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   54.571283] Read of size 1 at addr ffff000806dcc000 by task kunit_try_catch/317
[   54.578573] 
[   54.580061] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   54.580117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.580135] Hardware name: WinLink E850-96 board (DT)
[   54.580158] Call trace:
[   54.580173]  show_stack+0x20/0x38 (C)
[   54.580211]  dump_stack_lvl+0x8c/0xd0
[   54.580245]  print_report+0x118/0x5d0
[   54.580276]  kasan_report+0xdc/0x128
[   54.580304]  __asan_report_load1_noabort+0x20/0x30
[   54.580337]  mempool_uaf_helper+0x314/0x340
[   54.580372]  mempool_page_alloc_uaf+0xc0/0x118
[   54.580408]  kunit_try_run_case+0x170/0x3f0
[   54.580449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.580482]  kthread+0x328/0x630
[   54.580512]  ret_from_fork+0x10/0x20
[   54.580546] 
[   54.648541] The buggy address belongs to the physical page:
[   54.654096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dcc
[   54.662084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.668605] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.676321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.684041] page dumped because: kasan: bad access detected
[   54.689595] 
[   54.691071] Memory state around the buggy address:
[   54.695851]  ffff000806dcbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.703054]  ffff000806dcbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.710260] >ffff000806dcc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.717459]                    ^
[   54.720675]  ffff000806dcc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.727880]  ffff000806dcc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.735084] ==================================================================
[   53.998812] ==================================================================
[   54.008188] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   54.014870] Read of size 1 at addr ffff000805b50000 by task kunit_try_catch/313
[   54.022158] 
[   54.023645] CPU: 3 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   54.023704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.023721] Hardware name: WinLink E850-96 board (DT)
[   54.023743] Call trace:
[   54.023759]  show_stack+0x20/0x38 (C)
[   54.023797]  dump_stack_lvl+0x8c/0xd0
[   54.023830]  print_report+0x118/0x5d0
[   54.023861]  kasan_report+0xdc/0x128
[   54.023888]  __asan_report_load1_noabort+0x20/0x30
[   54.023923]  mempool_uaf_helper+0x314/0x340
[   54.023954]  mempool_kmalloc_large_uaf+0xc4/0x120
[   54.023986]  kunit_try_run_case+0x170/0x3f0
[   54.024028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.024060]  kthread+0x328/0x630
[   54.024091]  ret_from_fork+0x10/0x20
[   54.024129] 
[   54.092387] The buggy address belongs to the physical page:
[   54.097942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50
[   54.105926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.113566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.120508] page_type: f8(unknown)
[   54.123906] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.131625] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.139351] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.147162] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.154975] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff
[   54.162787] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   54.170593] page dumped because: kasan: bad access detected
[   54.176148] 
[   54.177624] Memory state around the buggy address:
[   54.182407]  ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.189607]  ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.196815] >ffff000805b50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.204012]                    ^
[   54.207228]  ffff000805b50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.214433]  ffff000805b50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.221634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   53.645850] ==================================================================
[   53.646037] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   53.652808] Read of size 1 at addr ffff000803b8aa00 by task kunit_try_catch/311
[   53.660097] 
[   53.661584] CPU: 5 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   53.661640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.661657] Hardware name: WinLink E850-96 board (DT)
[   53.661680] Call trace:
[   53.661694]  show_stack+0x20/0x38 (C)
[   53.661731]  dump_stack_lvl+0x8c/0xd0
[   53.661763]  print_report+0x118/0x5d0
[   53.661793]  kasan_report+0xdc/0x128
[   53.661821]  __asan_report_load1_noabort+0x20/0x30
[   53.661852]  mempool_uaf_helper+0x314/0x340
[   53.661885]  mempool_kmalloc_uaf+0xc4/0x120
[   53.661916]  kunit_try_run_case+0x170/0x3f0
[   53.661958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.661990]  kthread+0x328/0x630
[   53.662020]  ret_from_fork+0x10/0x20
[   53.662054] 
[   53.729802] Allocated by task 311:
[   53.733190]  kasan_save_stack+0x3c/0x68
[   53.737006]  kasan_save_track+0x20/0x40
[   53.740826]  kasan_save_alloc_info+0x40/0x58
[   53.745079]  __kasan_mempool_unpoison_object+0x11c/0x180
[   53.750373]  remove_element+0x130/0x1f8
[   53.754193]  mempool_alloc_preallocated+0x58/0xc0
[   53.758880]  mempool_uaf_helper+0xa4/0x340
[   53.762960]  mempool_kmalloc_uaf+0xc4/0x120
[   53.767127]  kunit_try_run_case+0x170/0x3f0
[   53.771293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.776763]  kthread+0x328/0x630
[   53.779973]  ret_from_fork+0x10/0x20
[   53.783532] 
[   53.785010] Freed by task 311:
[   53.788046]  kasan_save_stack+0x3c/0x68
[   53.791866]  kasan_save_track+0x20/0x40
[   53.795687]  kasan_save_free_info+0x4c/0x78
[   53.799852]  __kasan_mempool_poison_object+0xc0/0x150
[   53.804886]  mempool_free+0x28c/0x328
[   53.808532]  mempool_uaf_helper+0x104/0x340
[   53.812699]  mempool_kmalloc_uaf+0xc4/0x120
[   53.816865]  kunit_try_run_case+0x170/0x3f0
[   53.821032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.826500]  kthread+0x328/0x630
[   53.829712]  ret_from_fork+0x10/0x20
[   53.833272] 
[   53.834750] The buggy address belongs to the object at ffff000803b8aa00
[   53.834750]  which belongs to the cache kmalloc-128 of size 128
[   53.847249] The buggy address is located 0 bytes inside of
[   53.847249]  freed 128-byte region [ffff000803b8aa00, ffff000803b8aa80)
[   53.859312] 
[   53.860791] The buggy address belongs to the physical page:
[   53.866348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b8a
[   53.874332] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.881971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.888915] page_type: f5(slab)
[   53.892050] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   53.899770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.907496] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   53.915308] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.923121] head: 0bfffe0000000001 fffffdffe00ee281 00000000ffffffff 00000000ffffffff
[   53.930933] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   53.938738] page dumped because: kasan: bad access detected
[   53.944294] 
[   53.945769] Memory state around the buggy address:
[   53.950549]  ffff000803b8a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.957752]  ffff000803b8a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.964960] >ffff000803b8aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.972158]                    ^
[   53.975374]  ffff000803b8aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.982579]  ffff000803b8ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.989779] ==================================================================
[   54.231369] ==================================================================
[   54.240563] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   54.247678] Read of size 1 at addr ffff000801da7240 by task kunit_try_catch/315
[   54.254966] 
[   54.256455] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   54.256513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.256532] Hardware name: WinLink E850-96 board (DT)
[   54.256554] Call trace:
[   54.256570]  show_stack+0x20/0x38 (C)
[   54.256607]  dump_stack_lvl+0x8c/0xd0
[   54.256639]  print_report+0x118/0x5d0
[   54.256669]  kasan_report+0xdc/0x128
[   54.256698]  __asan_report_load1_noabort+0x20/0x30
[   54.256732]  mempool_uaf_helper+0x314/0x340
[   54.256766]  mempool_slab_uaf+0xc0/0x118
[   54.256799]  kunit_try_run_case+0x170/0x3f0
[   54.256841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.256875]  kthread+0x328/0x630
[   54.256904]  ret_from_fork+0x10/0x20
[   54.256940] 
[   54.324410] Allocated by task 315:
[   54.327799]  kasan_save_stack+0x3c/0x68
[   54.331615]  kasan_save_track+0x20/0x40
[   54.335434]  kasan_save_alloc_info+0x40/0x58
[   54.339688]  __kasan_mempool_unpoison_object+0xbc/0x180
[   54.344895]  remove_element+0x16c/0x1f8
[   54.348715]  mempool_alloc_preallocated+0x58/0xc0
[   54.353402]  mempool_uaf_helper+0xa4/0x340
[   54.357482]  mempool_slab_uaf+0xc0/0x118
[   54.361390]  kunit_try_run_case+0x170/0x3f0
[   54.365555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.371024]  kthread+0x328/0x630
[   54.374235]  ret_from_fork+0x10/0x20
[   54.377795] 
[   54.379271] Freed by task 315:
[   54.382310]  kasan_save_stack+0x3c/0x68
[   54.386127]  kasan_save_track+0x20/0x40
[   54.389947]  kasan_save_free_info+0x4c/0x78
[   54.394113]  __kasan_mempool_poison_object+0xc0/0x150
[   54.399148]  mempool_free+0x28c/0x328
[   54.402794]  mempool_uaf_helper+0x104/0x340
[   54.406960]  mempool_slab_uaf+0xc0/0x118
[   54.410867]  kunit_try_run_case+0x170/0x3f0
[   54.415035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.420502]  kthread+0x328/0x630
[   54.423714]  ret_from_fork+0x10/0x20
[   54.427273] 
[   54.428750] The buggy address belongs to the object at ffff000801da7240
[   54.428750]  which belongs to the cache test_cache of size 123
[   54.441164] The buggy address is located 0 bytes inside of
[   54.441164]  freed 123-byte region [ffff000801da7240, ffff000801da72bb)
[   54.453227] 
[   54.454706] The buggy address belongs to the physical page:
[   54.460262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881da7
[   54.468247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.474756] page_type: f5(slab)
[   54.477893] raw: 0bfffe0000000000 ffff000801b70500 dead000000000122 0000000000000000
[   54.485612] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   54.493332] page dumped because: kasan: bad access detected
[   54.498886] 
[   54.500362] Memory state around the buggy address:
[   54.505143]  ffff000801da7100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.512345]  ffff000801da7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.519554] >ffff000801da7200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   54.526750]                                            ^
[   54.532049]  ffff000801da7280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.539254]  ffff000801da7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.546455] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   52.820447] ==================================================================
[   52.820618] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   52.820754] Read of size 1 at addr ffff000800de6373 by task kunit_try_catch/305
[   52.827212] 
[   52.828697] CPU: 7 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   52.828754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.828769] Hardware name: WinLink E850-96 board (DT)
[   52.828793] Call trace:
[   52.828808]  show_stack+0x20/0x38 (C)
[   52.828844]  dump_stack_lvl+0x8c/0xd0
[   52.828878]  print_report+0x118/0x5d0
[   52.828906]  kasan_report+0xdc/0x128
[   52.828933]  __asan_report_load1_noabort+0x20/0x30
[   52.828963]  mempool_oob_right_helper+0x2ac/0x2f0
[   52.828995]  mempool_kmalloc_oob_right+0xc4/0x120
[   52.829027]  kunit_try_run_case+0x170/0x3f0
[   52.829061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.829092]  kthread+0x328/0x630
[   52.829119]  ret_from_fork+0x10/0x20
[   52.829150] 
[   52.897957] Allocated by task 305:
[   52.901346]  kasan_save_stack+0x3c/0x68
[   52.905162]  kasan_save_track+0x20/0x40
[   52.908979]  kasan_save_alloc_info+0x40/0x58
[   52.913233]  __kasan_mempool_unpoison_object+0x11c/0x180
[   52.918528]  remove_element+0x130/0x1f8
[   52.922348]  mempool_alloc_preallocated+0x58/0xc0
[   52.927035]  mempool_oob_right_helper+0x98/0x2f0
[   52.931636]  mempool_kmalloc_oob_right+0xc4/0x120
[   52.936323]  kunit_try_run_case+0x170/0x3f0
[   52.940489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.945958]  kthread+0x328/0x630
[   52.949170]  ret_from_fork+0x10/0x20
[   52.952729] 
[   52.954207] The buggy address belongs to the object at ffff000800de6300
[   52.954207]  which belongs to the cache kmalloc-128 of size 128
[   52.966708] The buggy address is located 0 bytes to the right of
[   52.966708]  allocated 115-byte region [ffff000800de6300, ffff000800de6373)
[   52.979638] 
[   52.981118] The buggy address belongs to the physical page:
[   52.986674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6
[   52.994657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.002298] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.009241] page_type: f5(slab)
[   53.012379] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   53.020099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.027826] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   53.035634] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.043447] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff
[   53.051258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   53.059064] page dumped because: kasan: bad access detected
[   53.064619] 
[   53.066095] Memory state around the buggy address:
[   53.070877]  ffff000800de6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.078078]  ffff000800de6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.085284] >ffff000800de6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   53.092484]                                                              ^
[   53.099345]  ffff000800de6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.106551]  ffff000800de6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   53.113753] ==================================================================
[   53.122842] ==================================================================
[   53.132678] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   53.140228] Read of size 1 at addr ffff0008078d6001 by task kunit_try_catch/307
[   53.147518] 
[   53.149005] CPU: 5 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   53.149062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.149080] Hardware name: WinLink E850-96 board (DT)
[   53.149103] Call trace:
[   53.149115]  show_stack+0x20/0x38 (C)
[   53.149150]  dump_stack_lvl+0x8c/0xd0
[   53.149181]  print_report+0x118/0x5d0
[   53.149212]  kasan_report+0xdc/0x128
[   53.149238]  __asan_report_load1_noabort+0x20/0x30
[   53.149274]  mempool_oob_right_helper+0x2ac/0x2f0
[   53.149310]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   53.149344]  kunit_try_run_case+0x170/0x3f0
[   53.149383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.149415]  kthread+0x328/0x630
[   53.149446]  ret_from_fork+0x10/0x20
[   53.149484] 
[   53.218787] The buggy address belongs to the physical page:
[   53.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8878d4
[   53.232328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.239966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.246910] page_type: f8(unknown)
[   53.250308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.258026] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.265754] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.273564] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.281377] head: 0bfffe0000000002 fffffdffe01e3501 00000000ffffffff 00000000ffffffff
[   53.289189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   53.296994] page dumped because: kasan: bad access detected
[   53.302550] 
[   53.304025] Memory state around the buggy address:
[   53.308804]  ffff0008078d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.316008]  ffff0008078d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.323215] >ffff0008078d6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.330414]                    ^
[   53.333630]  ffff0008078d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.340835]  ffff0008078d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.348035] ==================================================================
[   53.357540] ==================================================================
[   53.367486] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   53.375032] Read of size 1 at addr ffff0008084ed2bb by task kunit_try_catch/309
[   53.382325] 
[   53.383809] CPU: 3 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   53.383870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.383888] Hardware name: WinLink E850-96 board (DT)
[   53.383909] Call trace:
[   53.383923]  show_stack+0x20/0x38 (C)
[   53.383959]  dump_stack_lvl+0x8c/0xd0
[   53.383993]  print_report+0x118/0x5d0
[   53.384023]  kasan_report+0xdc/0x128
[   53.384050]  __asan_report_load1_noabort+0x20/0x30
[   53.384087]  mempool_oob_right_helper+0x2ac/0x2f0
[   53.384123]  mempool_slab_oob_right+0xc0/0x118
[   53.384159]  kunit_try_run_case+0x170/0x3f0
[   53.384197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.384234]  kthread+0x328/0x630
[   53.384264]  ret_from_fork+0x10/0x20
[   53.384299] 
[   53.452810] Allocated by task 309:
[   53.456196]  kasan_save_stack+0x3c/0x68
[   53.460013]  kasan_save_track+0x20/0x40
[   53.463832]  kasan_save_alloc_info+0x40/0x58
[   53.468086]  __kasan_mempool_unpoison_object+0xbc/0x180
[   53.473294]  remove_element+0x16c/0x1f8
[   53.477114]  mempool_alloc_preallocated+0x58/0xc0
[   53.481802]  mempool_oob_right_helper+0x98/0x2f0
[   53.486402]  mempool_slab_oob_right+0xc0/0x118
[   53.490829]  kunit_try_run_case+0x170/0x3f0
[   53.494995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.500464]  kthread+0x328/0x630
[   53.503675]  ret_from_fork+0x10/0x20
[   53.507235] 
[   53.508712] The buggy address belongs to the object at ffff0008084ed240
[   53.508712]  which belongs to the cache test_cache of size 123
[   53.521126] The buggy address is located 0 bytes to the right of
[   53.521126]  allocated 123-byte region [ffff0008084ed240, ffff0008084ed2bb)
[   53.534057] 
[   53.535536] The buggy address belongs to the physical page:
[   53.541092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884ed
[   53.549077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.555586] page_type: f5(slab)
[   53.558722] raw: 0bfffe0000000000 ffff0008019cc140 dead000000000122 0000000000000000
[   53.566442] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   53.574161] page dumped because: kasan: bad access detected
[   53.579716] 
[   53.581191] Memory state around the buggy address:
[   53.585975]  ffff0008084ed180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.593176]  ffff0008084ed200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   53.600381] >ffff0008084ed280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   53.607580]                                         ^
[   53.612619]  ffff0008084ed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.619823]  ffff0008084ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.627025] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   51.923970] ==================================================================
[   51.924161] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   51.924305] Read of size 1 at addr ffff000801b70280 by task kunit_try_catch/299
[   51.927856] 
[   51.929344] CPU: 4 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   51.929405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.929423] Hardware name: WinLink E850-96 board (DT)
[   51.929446] Call trace:
[   51.929459]  show_stack+0x20/0x38 (C)
[   51.929496]  dump_stack_lvl+0x8c/0xd0
[   51.929530]  print_report+0x118/0x5d0
[   51.929565]  kasan_report+0xdc/0x128
[   51.929592]  __kasan_check_byte+0x54/0x70
[   51.929629]  kmem_cache_destroy+0x34/0x218
[   51.929666]  kmem_cache_double_destroy+0x174/0x300
[   51.929700]  kunit_try_run_case+0x170/0x3f0
[   51.929737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.929770]  kthread+0x328/0x630
[   51.929801]  ret_from_fork+0x10/0x20
[   51.929840] 
[   51.997301] Allocated by task 299:
[   52.000688]  kasan_save_stack+0x3c/0x68
[   52.004504]  kasan_save_track+0x20/0x40
[   52.008324]  kasan_save_alloc_info+0x40/0x58
[   52.012577]  __kasan_slab_alloc+0xa8/0xb0
[   52.016570]  kmem_cache_alloc_noprof+0x10c/0x398
[   52.021171]  __kmem_cache_create_args+0x178/0x280
[   52.025858]  kmem_cache_double_destroy+0xc0/0x300
[   52.030546]  kunit_try_run_case+0x170/0x3f0
[   52.034714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.040181]  kthread+0x328/0x630
[   52.043393]  ret_from_fork+0x10/0x20
[   52.046951] 
[   52.048429] Freed by task 299:
[   52.051467]  kasan_save_stack+0x3c/0x68
[   52.055285]  kasan_save_track+0x20/0x40
[   52.059104]  kasan_save_free_info+0x4c/0x78
[   52.063271]  __kasan_slab_free+0x6c/0x98
[   52.067178]  kmem_cache_free+0x260/0x468
[   52.071083]  slab_kmem_cache_release+0x38/0x50
[   52.075510]  kmem_cache_release+0x1c/0x30
[   52.079503]  kobject_put+0x17c/0x420
[   52.083062]  sysfs_slab_release+0x1c/0x30
[   52.087055]  kmem_cache_destroy+0x118/0x218
[   52.091222]  kmem_cache_double_destroy+0x128/0x300
[   52.095996]  kunit_try_run_case+0x170/0x3f0
[   52.100164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.105632]  kthread+0x328/0x630
[   52.108843]  ret_from_fork+0x10/0x20
[   52.112402] 
[   52.113880] The buggy address belongs to the object at ffff000801b70280
[   52.113880]  which belongs to the cache kmem_cache of size 208
[   52.126295] The buggy address is located 0 bytes inside of
[   52.126295]  freed 208-byte region [ffff000801b70280, ffff000801b70350)
[   52.138358] 
[   52.139835] The buggy address belongs to the physical page:
[   52.145391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b70
[   52.153376] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.161015] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   52.167959] page_type: f5(slab)
[   52.171095] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   52.178814] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   52.186542] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   52.194352] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   52.202164] head: 0bfffe0000000001 fffffdffe006dc01 00000000ffffffff 00000000ffffffff
[   52.209977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   52.217782] page dumped because: kasan: bad access detected
[   52.223338] 
[   52.224813] Memory state around the buggy address:
[   52.229593]  ffff000801b70180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.236796]  ffff000801b70200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.244003] >ffff000801b70280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.251202]                    ^
[   52.254417]  ffff000801b70300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   52.261622]  ffff000801b70380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.268825] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   51.509089] ==================================================================
[   51.509284] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   51.509418] Read of size 1 at addr ffff000801b74000 by task kunit_try_catch/297
[   51.512800] 
[   51.514289] CPU: 4 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   51.514346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.514363] Hardware name: WinLink E850-96 board (DT)
[   51.514386] Call trace:
[   51.514401]  show_stack+0x20/0x38 (C)
[   51.514438]  dump_stack_lvl+0x8c/0xd0
[   51.514470]  print_report+0x118/0x5d0
[   51.514501]  kasan_report+0xdc/0x128
[   51.514531]  __asan_report_load1_noabort+0x20/0x30
[   51.514567]  kmem_cache_rcu_uaf+0x388/0x468
[   51.514602]  kunit_try_run_case+0x170/0x3f0
[   51.514639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.514675]  kthread+0x328/0x630
[   51.514703]  ret_from_fork+0x10/0x20
[   51.514738] 
[   51.578339] Allocated by task 297:
[   51.581725]  kasan_save_stack+0x3c/0x68
[   51.585542]  kasan_save_track+0x20/0x40
[   51.589362]  kasan_save_alloc_info+0x40/0x58
[   51.593615]  __kasan_slab_alloc+0xa8/0xb0
[   51.597608]  kmem_cache_alloc_noprof+0x10c/0x398
[   51.602209]  kmem_cache_rcu_uaf+0x12c/0x468
[   51.606376]  kunit_try_run_case+0x170/0x3f0
[   51.610542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.616012]  kthread+0x328/0x630
[   51.619223]  ret_from_fork+0x10/0x20
[   51.622781] 
[   51.624258] Freed by task 0:
[   51.627124]  kasan_save_stack+0x3c/0x68
[   51.630941]  kasan_save_track+0x20/0x40
[   51.634760]  kasan_save_free_info+0x4c/0x78
[   51.638927]  __kasan_slab_free+0x6c/0x98
[   51.642833]  slab_free_after_rcu_debug+0xd4/0x2f8
[   51.647521]  rcu_core+0x9f4/0x1e20
[   51.650906]  rcu_core_si+0x18/0x30
[   51.654292]  handle_softirqs+0x374/0xb28
[   51.658197]  __do_softirq+0x1c/0x28
[   51.661670] 
[   51.663147] Last potentially related work creation:
[   51.668008]  kasan_save_stack+0x3c/0x68
[   51.671826]  kasan_record_aux_stack+0xb4/0xc8
[   51.676168]  kmem_cache_free+0x120/0x468
[   51.680072]  kmem_cache_rcu_uaf+0x16c/0x468
[   51.684239]  kunit_try_run_case+0x170/0x3f0
[   51.688406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.693874]  kthread+0x328/0x630
[   51.697086]  ret_from_fork+0x10/0x20
[   51.700645] 
[   51.702120] The buggy address belongs to the object at ffff000801b74000
[   51.702120]  which belongs to the cache test_cache of size 200
[   51.714537] The buggy address is located 0 bytes inside of
[   51.714537]  freed 200-byte region [ffff000801b74000, ffff000801b740c8)
[   51.726603] 
[   51.728079] The buggy address belongs to the physical page:
[   51.733635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b74
[   51.741619] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.749258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.756201] page_type: f5(slab)
[   51.759337] raw: 0bfffe0000000040 ffff000801b70140 dead000000000122 0000000000000000
[   51.767057] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.774785] head: 0bfffe0000000040 ffff000801b70140 dead000000000122 0000000000000000
[   51.782595] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.790408] head: 0bfffe0000000001 fffffdffe006dd01 00000000ffffffff 00000000ffffffff
[   51.798220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.806025] page dumped because: kasan: bad access detected
[   51.811581] 
[   51.813056] Memory state around the buggy address:
[   51.817837]  ffff000801b73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   51.825039]  ffff000801b73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   51.832246] >ffff000801b74000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.839446]                    ^
[   51.842660]  ffff000801b74080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   51.849865]  ffff000801b74100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.857068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   51.141783] ==================================================================
[   51.141983] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   51.148275] Free of addr ffff000803b98001 by task kunit_try_catch/295
[   51.154699] 
[   51.156184] CPU: 5 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   51.156236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.156253] Hardware name: WinLink E850-96 board (DT)
[   51.156278] Call trace:
[   51.156291]  show_stack+0x20/0x38 (C)
[   51.156328]  dump_stack_lvl+0x8c/0xd0
[   51.156363]  print_report+0x118/0x5d0
[   51.156392]  kasan_report_invalid_free+0xc0/0xe8
[   51.156425]  check_slab_allocation+0xfc/0x108
[   51.156460]  __kasan_slab_pre_free+0x2c/0x48
[   51.156493]  kmem_cache_free+0xf0/0x468
[   51.156527]  kmem_cache_invalid_free+0x184/0x3c8
[   51.156560]  kunit_try_run_case+0x170/0x3f0
[   51.156597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.156634]  kthread+0x328/0x630
[   51.156663]  ret_from_fork+0x10/0x20
[   51.156699] 
[   51.229350] Allocated by task 295:
[   51.232737]  kasan_save_stack+0x3c/0x68
[   51.236553]  kasan_save_track+0x20/0x40
[   51.240373]  kasan_save_alloc_info+0x40/0x58
[   51.244626]  __kasan_slab_alloc+0xa8/0xb0
[   51.248619]  kmem_cache_alloc_noprof+0x10c/0x398
[   51.253219]  kmem_cache_invalid_free+0x12c/0x3c8
[   51.257821]  kunit_try_run_case+0x170/0x3f0
[   51.261987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.267455]  kthread+0x328/0x630
[   51.270667]  ret_from_fork+0x10/0x20
[   51.274226] 
[   51.275705] The buggy address belongs to the object at ffff000803b98000
[   51.275705]  which belongs to the cache test_cache of size 200
[   51.288116] The buggy address is located 1 bytes inside of
[   51.288116]  200-byte region [ffff000803b98000, ffff000803b980c8)
[   51.299662] 
[   51.301139] The buggy address belongs to the physical page:
[   51.306695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98
[   51.314679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.322319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.329261] page_type: f5(slab)
[   51.332399] raw: 0bfffe0000000040 ffff000801e59900 dead000000000122 0000000000000000
[   51.340117] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.347846] head: 0bfffe0000000040 ffff000801e59900 dead000000000122 0000000000000000
[   51.355655] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.363470] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff
[   51.371280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.379085] page dumped because: kasan: bad access detected
[   51.384641] 
[   51.386116] Memory state around the buggy address:
[   51.390898]  ffff000803b97f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   51.398099]  ffff000803b97f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   51.405305] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.412506]                    ^
[   51.415721]  ffff000803b98080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   51.422926]  ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.430128] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   50.800644] ==================================================================
[   50.800829] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   50.800958] Free of addr ffff000801b72000 by task kunit_try_catch/293
[   50.802358] 
[   50.803847] CPU: 4 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   50.803907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.803925] Hardware name: WinLink E850-96 board (DT)
[   50.803949] Call trace:
[   50.803962]  show_stack+0x20/0x38 (C)
[   50.804001]  dump_stack_lvl+0x8c/0xd0
[   50.804036]  print_report+0x118/0x5d0
[   50.804066]  kasan_report_invalid_free+0xc0/0xe8
[   50.804096]  check_slab_allocation+0xd4/0x108
[   50.804136]  __kasan_slab_pre_free+0x2c/0x48
[   50.804170]  kmem_cache_free+0xf0/0x468
[   50.804206]  kmem_cache_double_free+0x190/0x3c8
[   50.804242]  kunit_try_run_case+0x170/0x3f0
[   50.804280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.804311]  kthread+0x328/0x630
[   50.804343]  ret_from_fork+0x10/0x20
[   50.804379] 
[   50.876923] Allocated by task 293:
[   50.880312]  kasan_save_stack+0x3c/0x68
[   50.884131]  kasan_save_track+0x20/0x40
[   50.887947]  kasan_save_alloc_info+0x40/0x58
[   50.892202]  __kasan_slab_alloc+0xa8/0xb0
[   50.896193]  kmem_cache_alloc_noprof+0x10c/0x398
[   50.900794]  kmem_cache_double_free+0x12c/0x3c8
[   50.905308]  kunit_try_run_case+0x170/0x3f0
[   50.909474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.914945]  kthread+0x328/0x630
[   50.918155]  ret_from_fork+0x10/0x20
[   50.921714] 
[   50.923191] Freed by task 293:
[   50.926228]  kasan_save_stack+0x3c/0x68
[   50.930049]  kasan_save_track+0x20/0x40
[   50.933868]  kasan_save_free_info+0x4c/0x78
[   50.938033]  __kasan_slab_free+0x6c/0x98
[   50.941939]  kmem_cache_free+0x260/0x468
[   50.945846]  kmem_cache_double_free+0x140/0x3c8
[   50.950359]  kunit_try_run_case+0x170/0x3f0
[   50.954526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.959995]  kthread+0x328/0x630
[   50.963206]  ret_from_fork+0x10/0x20
[   50.966765] 
[   50.968242] The buggy address belongs to the object at ffff000801b72000
[   50.968242]  which belongs to the cache test_cache of size 200
[   50.980656] The buggy address is located 0 bytes inside of
[   50.980656]  200-byte region [ffff000801b72000, ffff000801b720c8)
[   50.992201] 
[   50.993678] The buggy address belongs to the physical page:
[   50.999234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b72
[   51.007218] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.014858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.021801] page_type: f5(slab)
[   51.024936] raw: 0bfffe0000000040 ffff000801b70000 dead000000000122 0000000000000000
[   51.032656] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.040385] head: 0bfffe0000000040 ffff000801b70000 dead000000000122 0000000000000000
[   51.048194] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.056007] head: 0bfffe0000000001 fffffdffe006dc81 00000000ffffffff 00000000ffffffff
[   51.063819] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.071627] page dumped because: kasan: bad access detected
[   51.077180] 
[   51.078655] Memory state around the buggy address:
[   51.083435]  ffff000801b71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.090639]  ffff000801b71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.097845] >ffff000801b72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.105045]                    ^
[   51.108260]  ffff000801b72080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   51.115465]  ffff000801b72100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.122667] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   50.462033] ==================================================================
[   50.471582] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   50.478260] Read of size 1 at addr ffff000803b960c8 by task kunit_try_catch/291
[   50.485550] 
[   50.487035] CPU: 5 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   50.487096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.487112] Hardware name: WinLink E850-96 board (DT)
[   50.487136] Call trace:
[   50.487154]  show_stack+0x20/0x38 (C)
[   50.487188]  dump_stack_lvl+0x8c/0xd0
[   50.487220]  print_report+0x118/0x5d0
[   50.487248]  kasan_report+0xdc/0x128
[   50.487275]  __asan_report_load1_noabort+0x20/0x30
[   50.487307]  kmem_cache_oob+0x344/0x430
[   50.487339]  kunit_try_run_case+0x170/0x3f0
[   50.487380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.487415]  kthread+0x328/0x630
[   50.487444]  ret_from_fork+0x10/0x20
[   50.487478] 
[   50.550740] Allocated by task 291:
[   50.554127]  kasan_save_stack+0x3c/0x68
[   50.557943]  kasan_save_track+0x20/0x40
[   50.561763]  kasan_save_alloc_info+0x40/0x58
[   50.566016]  __kasan_slab_alloc+0xa8/0xb0
[   50.570009]  kmem_cache_alloc_noprof+0x10c/0x398
[   50.574610]  kmem_cache_oob+0x12c/0x430
[   50.578429]  kunit_try_run_case+0x170/0x3f0
[   50.582596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.588064]  kthread+0x328/0x630
[   50.591276]  ret_from_fork+0x10/0x20
[   50.594835] 
[   50.596313] The buggy address belongs to the object at ffff000803b96000
[   50.596313]  which belongs to the cache test_cache of size 200
[   50.608726] The buggy address is located 0 bytes to the right of
[   50.608726]  allocated 200-byte region [ffff000803b96000, ffff000803b960c8)
[   50.621658] 
[   50.623136] The buggy address belongs to the physical page:
[   50.628693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b96
[   50.636676] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.644317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.651259] page_type: f5(slab)
[   50.654397] raw: 0bfffe0000000040 ffff000801e597c0 dead000000000122 0000000000000000
[   50.662116] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.669843] head: 0bfffe0000000040 ffff000801e597c0 dead000000000122 0000000000000000
[   50.677653] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.685466] head: 0bfffe0000000001 fffffdffe00ee581 00000000ffffffff 00000000ffffffff
[   50.693278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.701084] page dumped because: kasan: bad access detected
[   50.706639] 
[   50.708115] Memory state around the buggy address:
[   50.712894]  ffff000803b95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.720099]  ffff000803b96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.727306] >ffff000803b96080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   50.734503]                                               ^
[   50.740063]  ffff000803b96100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.747267]  ffff000803b96180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.754470] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   50.115917] ==================================================================
[   50.123322] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   50.130001] Read of size 8 at addr ffff0008084f7700 by task kunit_try_catch/284
[   50.137292] 
[   50.138778] CPU: 7 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   50.138836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.138851] Hardware name: WinLink E850-96 board (DT)
[   50.138875] Call trace:
[   50.138889]  show_stack+0x20/0x38 (C)
[   50.138924]  dump_stack_lvl+0x8c/0xd0
[   50.138958]  print_report+0x118/0x5d0
[   50.138985]  kasan_report+0xdc/0x128
[   50.139014]  __asan_report_load8_noabort+0x20/0x30
[   50.139047]  workqueue_uaf+0x480/0x4a8
[   50.139079]  kunit_try_run_case+0x170/0x3f0
[   50.139117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.139148]  kthread+0x328/0x630
[   50.139180]  ret_from_fork+0x10/0x20
[   50.139216] 
[   50.202395] Allocated by task 284:
[   50.205783]  kasan_save_stack+0x3c/0x68
[   50.209598]  kasan_save_track+0x20/0x40
[   50.213419]  kasan_save_alloc_info+0x40/0x58
[   50.217671]  __kasan_kmalloc+0xd4/0xd8
[   50.221403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.225917]  workqueue_uaf+0x13c/0x4a8
[   50.229650]  kunit_try_run_case+0x170/0x3f0
[   50.233816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.239285]  kthread+0x328/0x630
[   50.242497]  ret_from_fork+0x10/0x20
[   50.246056] 
[   50.247533] Freed by task 121:
[   50.250570]  kasan_save_stack+0x3c/0x68
[   50.254389]  kasan_save_track+0x20/0x40
[   50.258208]  kasan_save_free_info+0x4c/0x78
[   50.262375]  __kasan_slab_free+0x6c/0x98
[   50.266281]  kfree+0x214/0x3c8
[   50.269319]  workqueue_uaf_work+0x18/0x30
[   50.273312]  process_one_work+0x530/0xf98
[   50.277305]  worker_thread+0x618/0xf38
[   50.281038]  kthread+0x328/0x630
[   50.284250]  ret_from_fork+0x10/0x20
[   50.287809] 
[   50.289286] Last potentially related work creation:
[   50.294146]  kasan_save_stack+0x3c/0x68
[   50.297965]  kasan_record_aux_stack+0xb4/0xc8
[   50.302305]  __queue_work+0x65c/0xfe0
[   50.305951]  queue_work_on+0xbc/0xf8
[   50.309510]  workqueue_uaf+0x210/0x4a8
[   50.313242]  kunit_try_run_case+0x170/0x3f0
[   50.317409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.322877]  kthread+0x328/0x630
[   50.326089]  ret_from_fork+0x10/0x20
[   50.329648] 
[   50.331125] The buggy address belongs to the object at ffff0008084f7700
[   50.331125]  which belongs to the cache kmalloc-32 of size 32
[   50.343453] The buggy address is located 0 bytes inside of
[   50.343453]  freed 32-byte region [ffff0008084f7700, ffff0008084f7720)
[   50.355431] 
[   50.356906] The buggy address belongs to the physical page:
[   50.362465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884f7
[   50.370451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.376958] page_type: f5(slab)
[   50.380094] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   50.387814] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   50.395534] page dumped because: kasan: bad access detected
[   50.401088] 
[   50.402563] Memory state around the buggy address:
[   50.407344]  ffff0008084f7600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.414547]  ffff0008084f7680: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   50.421754] >ffff0008084f7700: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.428951]                    ^
[   50.432168]  ffff0008084f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.439374]  ffff0008084f7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.446575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   49.748957] ==================================================================
[   49.749131] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   49.749253] Read of size 4 at addr ffff000806d0df80 by task swapper/4/0
[   49.750317] 
[   49.751805] CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   49.751861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.751876] Hardware name: WinLink E850-96 board (DT)
[   49.751897] Call trace:
[   49.751910]  show_stack+0x20/0x38 (C)
[   49.751953]  dump_stack_lvl+0x8c/0xd0
[   49.751985]  print_report+0x118/0x5d0
[   49.752017]  kasan_report+0xdc/0x128
[   49.752044]  __asan_report_load4_noabort+0x20/0x30
[   49.752078]  rcu_uaf_reclaim+0x64/0x70
[   49.752109]  rcu_core+0x9f4/0x1e20
[   49.752145]  rcu_core_si+0x18/0x30
[   49.752174]  handle_softirqs+0x374/0xb28
[   49.752210]  __do_softirq+0x1c/0x28
[   49.752239]  ____do_softirq+0x18/0x30
[   49.752276]  call_on_irq_stack+0x24/0x30
[   49.752307]  do_softirq_own_stack+0x24/0x38
[   49.752336]  __irq_exit_rcu+0x1fc/0x318
[   49.752367]  irq_exit_rcu+0x1c/0x80
[   49.752396]  el1_interrupt+0x38/0x58
[   49.752430]  el1h_64_irq_handler+0x18/0x28
[   49.752461]  el1h_64_irq+0x6c/0x70
[   49.752489]  arch_local_irq_enable+0x4/0x8 (P)
[   49.752525]  do_idle+0x384/0x4e8
[   49.752560]  cpu_startup_entry+0x64/0x80
[   49.752589]  secondary_start_kernel+0x28c/0x340
[   49.752622]  __secondary_switched+0xc0/0xc8
[   49.752663] 
[   49.862730] Allocated by task 282:
[   49.866117]  kasan_save_stack+0x3c/0x68
[   49.869934]  kasan_save_track+0x20/0x40
[   49.873752]  kasan_save_alloc_info+0x40/0x58
[   49.878006]  __kasan_kmalloc+0xd4/0xd8
[   49.881740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.886252]  rcu_uaf+0xb0/0x2d8
[   49.889378]  kunit_try_run_case+0x170/0x3f0
[   49.893544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.899012]  kthread+0x328/0x630
[   49.902224]  ret_from_fork+0x10/0x20
[   49.905783] 
[   49.907259] Freed by task 0:
[   49.910125]  kasan_save_stack+0x3c/0x68
[   49.913944]  kasan_save_track+0x20/0x40
[   49.917762]  kasan_save_free_info+0x4c/0x78
[   49.921929]  __kasan_slab_free+0x6c/0x98
[   49.925835]  kfree+0x214/0x3c8
[   49.928873]  rcu_uaf_reclaim+0x28/0x70
[   49.932606]  rcu_core+0x9f4/0x1e20
[   49.935991]  rcu_core_si+0x18/0x30
[   49.939378]  handle_softirqs+0x374/0xb28
[   49.943282]  __do_softirq+0x1c/0x28
[   49.946755] 
[   49.948232] Last potentially related work creation:
[   49.953093]  kasan_save_stack+0x3c/0x68
[   49.956911]  kasan_record_aux_stack+0xb4/0xc8
[   49.961251]  __call_rcu_common.constprop.0+0x74/0x8c8
[   49.966286]  call_rcu+0x18/0x30
[   49.969410]  rcu_uaf+0x14c/0x2d8
[   49.972622]  kunit_try_run_case+0x170/0x3f0
[   49.976789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.982258]  kthread+0x328/0x630
[   49.985469]  ret_from_fork+0x10/0x20
[   49.989028] 
[   49.990505] The buggy address belongs to the object at ffff000806d0df80
[   49.990505]  which belongs to the cache kmalloc-32 of size 32
[   50.002832] The buggy address is located 0 bytes inside of
[   50.002832]  freed 32-byte region [ffff000806d0df80, ffff000806d0dfa0)
[   50.014809] 
[   50.016290] The buggy address belongs to the physical page:
[   50.021844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886d0d
[   50.029829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.036339] page_type: f5(slab)
[   50.039474] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   50.047195] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   50.054913] page dumped because: kasan: bad access detected
[   50.060468] 
[   50.061944] Memory state around the buggy address:
[   50.066724]  ffff000806d0de80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.073926]  ffff000806d0df00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.081133] >ffff000806d0df80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   50.088334]                    ^
[   50.091549]  ffff000806d0e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.098753]  ffff000806d0e080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.105955] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   48.697141] ==================================================================
[   48.706786] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   48.713118] Read of size 1 at addr ffff00080193b000 by task kunit_try_catch/280
[   48.720408] 
[   48.721896] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   48.721959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.721976] Hardware name: WinLink E850-96 board (DT)
[   48.722001] Call trace:
[   48.722015]  show_stack+0x20/0x38 (C)
[   48.722050]  dump_stack_lvl+0x8c/0xd0
[   48.722085]  print_report+0x118/0x5d0
[   48.722115]  kasan_report+0xdc/0x128
[   48.722143]  __kasan_check_byte+0x54/0x70
[   48.722181]  ksize+0x30/0x88
[   48.722216]  ksize_uaf+0x168/0x5f8
[   48.722249]  kunit_try_run_case+0x170/0x3f0
[   48.722288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.722322]  kthread+0x328/0x630
[   48.722349]  ret_from_fork+0x10/0x20
[   48.722387] 
[   48.787249] Allocated by task 280:
[   48.790634]  kasan_save_stack+0x3c/0x68
[   48.794454]  kasan_save_track+0x20/0x40
[   48.798272]  kasan_save_alloc_info+0x40/0x58
[   48.802525]  __kasan_kmalloc+0xd4/0xd8
[   48.806257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.810771]  ksize_uaf+0xb8/0x5f8
[   48.814070]  kunit_try_run_case+0x170/0x3f0
[   48.818236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.823708]  kthread+0x328/0x630
[   48.826917]  ret_from_fork+0x10/0x20
[   48.830476] 
[   48.831952] Freed by task 280:
[   48.834990]  kasan_save_stack+0x3c/0x68
[   48.838809]  kasan_save_track+0x20/0x40
[   48.842630]  kasan_save_free_info+0x4c/0x78
[   48.846795]  __kasan_slab_free+0x6c/0x98
[   48.850701]  kfree+0x214/0x3c8
[   48.853740]  ksize_uaf+0x11c/0x5f8
[   48.857125]  kunit_try_run_case+0x170/0x3f0
[   48.861291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.866760]  kthread+0x328/0x630
[   48.869972]  ret_from_fork+0x10/0x20
[   48.873531] 
[   48.875008] The buggy address belongs to the object at ffff00080193b000
[   48.875008]  which belongs to the cache kmalloc-128 of size 128
[   48.887512] The buggy address is located 0 bytes inside of
[   48.887512]  freed 128-byte region [ffff00080193b000, ffff00080193b080)
[   48.899573] 
[   48.901051] The buggy address belongs to the physical page:
[   48.906609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   48.914591] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.922230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.929174] page_type: f5(slab)
[   48.932310] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.940030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.947756] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.955567] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.963380] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   48.971192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.978998] page dumped because: kasan: bad access detected
[   48.984553] 
[   48.986029] Memory state around the buggy address:
[   48.990810]  ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.998012]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.005218] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.012418]                    ^
[   49.015633]  ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.022838]  ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.030041] ==================================================================
[   49.037366] ==================================================================
[   49.044455] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   49.050786] Read of size 1 at addr ffff00080193b000 by task kunit_try_catch/280
[   49.058077] 
[   49.059559] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   49.059612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.059627] Hardware name: WinLink E850-96 board (DT)
[   49.059649] Call trace:
[   49.059662]  show_stack+0x20/0x38 (C)
[   49.059696]  dump_stack_lvl+0x8c/0xd0
[   49.059729]  print_report+0x118/0x5d0
[   49.059755]  kasan_report+0xdc/0x128
[   49.059782]  __asan_report_load1_noabort+0x20/0x30
[   49.059814]  ksize_uaf+0x598/0x5f8
[   49.059844]  kunit_try_run_case+0x170/0x3f0
[   49.059882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.059914]  kthread+0x328/0x630
[   49.059944]  ret_from_fork+0x10/0x20
[   49.059979] 
[   49.122833] Allocated by task 280:
[   49.126221]  kasan_save_stack+0x3c/0x68
[   49.130037]  kasan_save_track+0x20/0x40
[   49.133857]  kasan_save_alloc_info+0x40/0x58
[   49.138110]  __kasan_kmalloc+0xd4/0xd8
[   49.141843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.146357]  ksize_uaf+0xb8/0x5f8
[   49.149655]  kunit_try_run_case+0x170/0x3f0
[   49.153822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.159292]  kthread+0x328/0x630
[   49.162502]  ret_from_fork+0x10/0x20
[   49.166061] 
[   49.167537] Freed by task 280:
[   49.170575]  kasan_save_stack+0x3c/0x68
[   49.174394]  kasan_save_track+0x20/0x40
[   49.178213]  kasan_save_free_info+0x4c/0x78
[   49.182381]  __kasan_slab_free+0x6c/0x98
[   49.186287]  kfree+0x214/0x3c8
[   49.189325]  ksize_uaf+0x11c/0x5f8
[   49.192710]  kunit_try_run_case+0x170/0x3f0
[   49.196877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.202345]  kthread+0x328/0x630
[   49.205557]  ret_from_fork+0x10/0x20
[   49.209116] 
[   49.210593] The buggy address belongs to the object at ffff00080193b000
[   49.210593]  which belongs to the cache kmalloc-128 of size 128
[   49.223092] The buggy address is located 0 bytes inside of
[   49.223092]  freed 128-byte region [ffff00080193b000, ffff00080193b080)
[   49.235157] 
[   49.236636] The buggy address belongs to the physical page:
[   49.242193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   49.250176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.257815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.264759] page_type: f5(slab)
[   49.267897] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.275615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.283341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.291152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.298966] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   49.306778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.314583] page dumped because: kasan: bad access detected
[   49.320139] 
[   49.321614] Memory state around the buggy address:
[   49.326394]  ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.333597]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.340803] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.348003]                    ^
[   49.351219]  ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.358423]  ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.365624] ==================================================================
[   49.373019] ==================================================================
[   49.380042] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   49.386371] Read of size 1 at addr ffff00080193b078 by task kunit_try_catch/280
[   49.393662] 
[   49.395146] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   49.395196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.395212] Hardware name: WinLink E850-96 board (DT)
[   49.395234] Call trace:
[   49.395246]  show_stack+0x20/0x38 (C)
[   49.395282]  dump_stack_lvl+0x8c/0xd0
[   49.395314]  print_report+0x118/0x5d0
[   49.395340]  kasan_report+0xdc/0x128
[   49.395368]  __asan_report_load1_noabort+0x20/0x30
[   49.395399]  ksize_uaf+0x544/0x5f8
[   49.395429]  kunit_try_run_case+0x170/0x3f0
[   49.395465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.395498]  kthread+0x328/0x630
[   49.395528]  ret_from_fork+0x10/0x20
[   49.395563] 
[   49.458418] Allocated by task 280:
[   49.461807]  kasan_save_stack+0x3c/0x68
[   49.465624]  kasan_save_track+0x20/0x40
[   49.469442]  kasan_save_alloc_info+0x40/0x58
[   49.473695]  __kasan_kmalloc+0xd4/0xd8
[   49.477428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.481942]  ksize_uaf+0xb8/0x5f8
[   49.485240]  kunit_try_run_case+0x170/0x3f0
[   49.489407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.494877]  kthread+0x328/0x630
[   49.498088]  ret_from_fork+0x10/0x20
[   49.501647] 
[   49.503122] Freed by task 280:
[   49.506160]  kasan_save_stack+0x3c/0x68
[   49.509980]  kasan_save_track+0x20/0x40
[   49.513799]  kasan_save_free_info+0x4c/0x78
[   49.517965]  __kasan_slab_free+0x6c/0x98
[   49.521872]  kfree+0x214/0x3c8
[   49.524909]  ksize_uaf+0x11c/0x5f8
[   49.528295]  kunit_try_run_case+0x170/0x3f0
[   49.532462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.537931]  kthread+0x328/0x630
[   49.541142]  ret_from_fork+0x10/0x20
[   49.544701] 
[   49.546178] The buggy address belongs to the object at ffff00080193b000
[   49.546178]  which belongs to the cache kmalloc-128 of size 128
[   49.558677] The buggy address is located 120 bytes inside of
[   49.558677]  freed 128-byte region [ffff00080193b000, ffff00080193b080)
[   49.570916] 
[   49.572395] The buggy address belongs to the physical page:
[   49.577950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   49.585935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.593574] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.600518] page_type: f5(slab)
[   49.603654] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.611373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.619100] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.626911] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.634724] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   49.642536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.650342] page dumped because: kasan: bad access detected
[   49.655897] 
[   49.657373] Memory state around the buggy address:
[   49.662153]  ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.669356]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.676562] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.683762]                                                                 ^
[   49.690883]  ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.698088]  ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.705289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   48.094290] ==================================================================
[   48.101240] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   48.108612] Read of size 1 at addr ffff00080193af78 by task kunit_try_catch/278
[   48.115903] 
[   48.117388] CPU: 2 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   48.117446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.117461] Hardware name: WinLink E850-96 board (DT)
[   48.117481] Call trace:
[   48.117494]  show_stack+0x20/0x38 (C)
[   48.117527]  dump_stack_lvl+0x8c/0xd0
[   48.117560]  print_report+0x118/0x5d0
[   48.117587]  kasan_report+0xdc/0x128
[   48.117616]  __asan_report_load1_noabort+0x20/0x30
[   48.117651]  ksize_unpoisons_memory+0x618/0x740
[   48.117683]  kunit_try_run_case+0x170/0x3f0
[   48.117721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.117753]  kthread+0x328/0x630
[   48.117783]  ret_from_fork+0x10/0x20
[   48.117819] 
[   48.181787] Allocated by task 278:
[   48.185175]  kasan_save_stack+0x3c/0x68
[   48.188993]  kasan_save_track+0x20/0x40
[   48.192812]  kasan_save_alloc_info+0x40/0x58
[   48.197064]  __kasan_kmalloc+0xd4/0xd8
[   48.200799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.205312]  ksize_unpoisons_memory+0xc0/0x740
[   48.209739]  kunit_try_run_case+0x170/0x3f0
[   48.213905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.219374]  kthread+0x328/0x630
[   48.222586]  ret_from_fork+0x10/0x20
[   48.226145] 
[   48.227621] The buggy address belongs to the object at ffff00080193af00
[   48.227621]  which belongs to the cache kmalloc-128 of size 128
[   48.240124] The buggy address is located 5 bytes to the right of
[   48.240124]  allocated 115-byte region [ffff00080193af00, ffff00080193af73)
[   48.253054] 
[   48.254532] The buggy address belongs to the physical page:
[   48.260091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   48.268073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.275712] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.282656] page_type: f5(slab)
[   48.285791] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.293512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.301238] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.309049] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.316862] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   48.324674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.332480] page dumped because: kasan: bad access detected
[   48.338035] 
[   48.339511] Memory state around the buggy address:
[   48.344290]  ffff00080193ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.351494]  ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.358700] >ffff00080193af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.365899]                                                                 ^
[   48.373022]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.380227]  ffff00080193b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.387427] ==================================================================
[   48.394819] ==================================================================
[   48.401843] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   48.409217] Read of size 1 at addr ffff00080193af7f by task kunit_try_catch/278
[   48.416507] 
[   48.417992] CPU: 4 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   48.418050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.418067] Hardware name: WinLink E850-96 board (DT)
[   48.418091] Call trace:
[   48.418104]  show_stack+0x20/0x38 (C)
[   48.418141]  dump_stack_lvl+0x8c/0xd0
[   48.418174]  print_report+0x118/0x5d0
[   48.418203]  kasan_report+0xdc/0x128
[   48.418231]  __asan_report_load1_noabort+0x20/0x30
[   48.418263]  ksize_unpoisons_memory+0x690/0x740
[   48.418300]  kunit_try_run_case+0x170/0x3f0
[   48.418340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.418375]  kthread+0x328/0x630
[   48.418407]  ret_from_fork+0x10/0x20
[   48.418441] 
[   48.482391] Allocated by task 278:
[   48.485780]  kasan_save_stack+0x3c/0x68
[   48.489596]  kasan_save_track+0x20/0x40
[   48.493415]  kasan_save_alloc_info+0x40/0x58
[   48.497668]  __kasan_kmalloc+0xd4/0xd8
[   48.501401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.505915]  ksize_unpoisons_memory+0xc0/0x740
[   48.510342]  kunit_try_run_case+0x170/0x3f0
[   48.514509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.519977]  kthread+0x328/0x630
[   48.523189]  ret_from_fork+0x10/0x20
[   48.526748] 
[   48.528225] The buggy address belongs to the object at ffff00080193af00
[   48.528225]  which belongs to the cache kmalloc-128 of size 128
[   48.540727] The buggy address is located 12 bytes to the right of
[   48.540727]  allocated 115-byte region [ffff00080193af00, ffff00080193af73)
[   48.553744] 
[   48.555222] The buggy address belongs to the physical page:
[   48.560779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   48.568763] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.576402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.583345] page_type: f5(slab)
[   48.586481] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.594202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.601928] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.609739] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.617552] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   48.625364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.633170] page dumped because: kasan: bad access detected
[   48.638725] 
[   48.640200] Memory state around the buggy address:
[   48.644979]  ffff00080193ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.652183]  ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.659389] >ffff00080193af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.666589]                                                                 ^
[   48.673711]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.680917]  ffff00080193b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.688118] ==================================================================
[   47.791257] ==================================================================
[   47.800894] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   47.808269] Read of size 1 at addr ffff00080193af73 by task kunit_try_catch/278
[   47.815562] 
[   47.817047] CPU: 2 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   47.817102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.817119] Hardware name: WinLink E850-96 board (DT)
[   47.817140] Call trace:
[   47.817154]  show_stack+0x20/0x38 (C)
[   47.817192]  dump_stack_lvl+0x8c/0xd0
[   47.817225]  print_report+0x118/0x5d0
[   47.817254]  kasan_report+0xdc/0x128
[   47.817282]  __asan_report_load1_noabort+0x20/0x30
[   47.817317]  ksize_unpoisons_memory+0x628/0x740
[   47.817350]  kunit_try_run_case+0x170/0x3f0
[   47.817389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.817421]  kthread+0x328/0x630
[   47.817450]  ret_from_fork+0x10/0x20
[   47.817485] 
[   47.881445] Allocated by task 278:
[   47.884836]  kasan_save_stack+0x3c/0x68
[   47.888650]  kasan_save_track+0x20/0x40
[   47.892469]  kasan_save_alloc_info+0x40/0x58
[   47.896722]  __kasan_kmalloc+0xd4/0xd8
[   47.900456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.904969]  ksize_unpoisons_memory+0xc0/0x740
[   47.909396]  kunit_try_run_case+0x170/0x3f0
[   47.913563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.919031]  kthread+0x328/0x630
[   47.922243]  ret_from_fork+0x10/0x20
[   47.925802] 
[   47.927280] The buggy address belongs to the object at ffff00080193af00
[   47.927280]  which belongs to the cache kmalloc-128 of size 128
[   47.939781] The buggy address is located 0 bytes to the right of
[   47.939781]  allocated 115-byte region [ffff00080193af00, ffff00080193af73)
[   47.952711] 
[   47.954191] The buggy address belongs to the physical page:
[   47.959747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   47.967731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.975370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.982313] page_type: f5(slab)
[   47.985450] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.993169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.000894] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.008707] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.016520] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   48.024331] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.032137] page dumped because: kasan: bad access detected
[   48.037693] 
[   48.039168] Memory state around the buggy address:
[   48.043948]  ffff00080193ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.051151]  ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.058357] >ffff00080193af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.065557]                                                              ^
[   48.072418]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.079624]  ffff00080193b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.086824] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   47.475274] ==================================================================
[   47.481976] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   47.487962] Free of addr ffff0008030dafc0 by task kunit_try_catch/276
[   47.494385] 
[   47.495870] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   47.495925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.495942] Hardware name: WinLink E850-96 board (DT)
[   47.495963] Call trace:
[   47.495977]  show_stack+0x20/0x38 (C)
[   47.496009]  dump_stack_lvl+0x8c/0xd0
[   47.496041]  print_report+0x118/0x5d0
[   47.496068]  kasan_report_invalid_free+0xc0/0xe8
[   47.496098]  check_slab_allocation+0xd4/0x108
[   47.496134]  __kasan_slab_pre_free+0x2c/0x48
[   47.496168]  kfree+0xe8/0x3c8
[   47.496200]  kfree_sensitive+0x3c/0xb0
[   47.496233]  kmalloc_double_kzfree+0x168/0x308
[   47.496268]  kunit_try_run_case+0x170/0x3f0
[   47.496303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.496336]  kthread+0x328/0x630
[   47.496364]  ret_from_fork+0x10/0x20
[   47.496395] 
[   47.571729] Allocated by task 276:
[   47.575115]  kasan_save_stack+0x3c/0x68
[   47.578932]  kasan_save_track+0x20/0x40
[   47.582752]  kasan_save_alloc_info+0x40/0x58
[   47.587005]  __kasan_kmalloc+0xd4/0xd8
[   47.590738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.595251]  kmalloc_double_kzfree+0xb8/0x308
[   47.599592]  kunit_try_run_case+0x170/0x3f0
[   47.603758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.609227]  kthread+0x328/0x630
[   47.612439]  ret_from_fork+0x10/0x20
[   47.615998] 
[   47.617473] Freed by task 276:
[   47.620511]  kasan_save_stack+0x3c/0x68
[   47.624331]  kasan_save_track+0x20/0x40
[   47.628150]  kasan_save_free_info+0x4c/0x78
[   47.632317]  __kasan_slab_free+0x6c/0x98
[   47.636223]  kfree+0x214/0x3c8
[   47.639261]  kfree_sensitive+0x80/0xb0
[   47.642995]  kmalloc_double_kzfree+0x11c/0x308
[   47.647421]  kunit_try_run_case+0x170/0x3f0
[   47.651587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.657056]  kthread+0x328/0x630
[   47.660268]  ret_from_fork+0x10/0x20
[   47.663827] 
[   47.665304] The buggy address belongs to the object at ffff0008030dafc0
[   47.665304]  which belongs to the cache kmalloc-16 of size 16
[   47.677630] The buggy address is located 0 bytes inside of
[   47.677630]  16-byte region [ffff0008030dafc0, ffff0008030dafd0)
[   47.689086] 
[   47.690566] The buggy address belongs to the physical page:
[   47.696121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830da
[   47.704106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.710616] page_type: f5(slab)
[   47.713753] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   47.721472] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.729192] page dumped because: kasan: bad access detected
[   47.734746] 
[   47.736221] Memory state around the buggy address:
[   47.741001]  ffff0008030dae80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.748204]  ffff0008030daf00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.755412] >ffff0008030daf80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   47.762610]                                            ^
[   47.767910]  ffff0008030db000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.775113]  ffff0008030db080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   47.782315] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   47.159218] ==================================================================
[   47.173041] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   47.180414] Read of size 1 at addr ffff0008030dafc0 by task kunit_try_catch/276
[   47.187705] 
[   47.189191] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   47.189252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.189268] Hardware name: WinLink E850-96 board (DT)
[   47.189291] Call trace:
[   47.189306]  show_stack+0x20/0x38 (C)
[   47.189344]  dump_stack_lvl+0x8c/0xd0
[   47.189377]  print_report+0x118/0x5d0
[   47.189406]  kasan_report+0xdc/0x128
[   47.189431]  __kasan_check_byte+0x54/0x70
[   47.189468]  kfree_sensitive+0x30/0xb0
[   47.189507]  kmalloc_double_kzfree+0x168/0x308
[   47.189542]  kunit_try_run_case+0x170/0x3f0
[   47.189582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.189614]  kthread+0x328/0x630
[   47.189644]  ret_from_fork+0x10/0x20
[   47.189679] 
[   47.256456] Allocated by task 276:
[   47.259844]  kasan_save_stack+0x3c/0x68
[   47.263659]  kasan_save_track+0x20/0x40
[   47.267480]  kasan_save_alloc_info+0x40/0x58
[   47.271732]  __kasan_kmalloc+0xd4/0xd8
[   47.275465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.279978]  kmalloc_double_kzfree+0xb8/0x308
[   47.284319]  kunit_try_run_case+0x170/0x3f0
[   47.288485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.293954]  kthread+0x328/0x630
[   47.297166]  ret_from_fork+0x10/0x20
[   47.300725] 
[   47.302202] Freed by task 276:
[   47.305240]  kasan_save_stack+0x3c/0x68
[   47.309058]  kasan_save_track+0x20/0x40
[   47.312877]  kasan_save_free_info+0x4c/0x78
[   47.317044]  __kasan_slab_free+0x6c/0x98
[   47.320951]  kfree+0x214/0x3c8
[   47.323988]  kfree_sensitive+0x80/0xb0
[   47.327721]  kmalloc_double_kzfree+0x11c/0x308
[   47.332148]  kunit_try_run_case+0x170/0x3f0
[   47.336314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.341783]  kthread+0x328/0x630
[   47.344995]  ret_from_fork+0x10/0x20
[   47.348554] 
[   47.350032] The buggy address belongs to the object at ffff0008030dafc0
[   47.350032]  which belongs to the cache kmalloc-16 of size 16
[   47.362359] The buggy address is located 0 bytes inside of
[   47.362359]  freed 16-byte region [ffff0008030dafc0, ffff0008030dafd0)
[   47.374335] 
[   47.375814] The buggy address belongs to the physical page:
[   47.381370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830da
[   47.389354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.395865] page_type: f5(slab)
[   47.398999] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   47.406719] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.414438] page dumped because: kasan: bad access detected
[   47.419994] 
[   47.421469] Memory state around the buggy address:
[   47.426248]  ffff0008030dae80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.433452]  ffff0008030daf00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.440658] >ffff0008030daf80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   47.447858]                                            ^
[   47.453158]  ffff0008030db000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.460362]  ffff0008030db080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00
[   47.467565] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   46.854687] ==================================================================
[   46.864021] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   46.870617] Read of size 1 at addr ffff0008083ca9a8 by task kunit_try_catch/272
[   46.877903] 
[   46.879389] CPU: 2 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   46.879446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.879465] Hardware name: WinLink E850-96 board (DT)
[   46.879488] Call trace:
[   46.879503]  show_stack+0x20/0x38 (C)
[   46.879538]  dump_stack_lvl+0x8c/0xd0
[   46.879569]  print_report+0x118/0x5d0
[   46.879599]  kasan_report+0xdc/0x128
[   46.879624]  __asan_report_load1_noabort+0x20/0x30
[   46.879656]  kmalloc_uaf2+0x3f4/0x468
[   46.879685]  kunit_try_run_case+0x170/0x3f0
[   46.879726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.879761]  kthread+0x328/0x630
[   46.879792]  ret_from_fork+0x10/0x20
[   46.879829] 
[   46.942919] Allocated by task 272:
[   46.946306]  kasan_save_stack+0x3c/0x68
[   46.950122]  kasan_save_track+0x20/0x40
[   46.953943]  kasan_save_alloc_info+0x40/0x58
[   46.958195]  __kasan_kmalloc+0xd4/0xd8
[   46.961927]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.966441]  kmalloc_uaf2+0xc4/0x468
[   46.970000]  kunit_try_run_case+0x170/0x3f0
[   46.974167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.979635]  kthread+0x328/0x630
[   46.982848]  ret_from_fork+0x10/0x20
[   46.986407] 
[   46.987883] Freed by task 272:
[   46.990922]  kasan_save_stack+0x3c/0x68
[   46.994739]  kasan_save_track+0x20/0x40
[   46.998559]  kasan_save_free_info+0x4c/0x78
[   47.002726]  __kasan_slab_free+0x6c/0x98
[   47.006633]  kfree+0x214/0x3c8
[   47.009670]  kmalloc_uaf2+0x134/0x468
[   47.013316]  kunit_try_run_case+0x170/0x3f0
[   47.017484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.022951]  kthread+0x328/0x630
[   47.026163]  ret_from_fork+0x10/0x20
[   47.029722] 
[   47.031199] The buggy address belongs to the object at ffff0008083ca980
[   47.031199]  which belongs to the cache kmalloc-64 of size 64
[   47.043526] The buggy address is located 40 bytes inside of
[   47.043526]  freed 64-byte region [ffff0008083ca980, ffff0008083ca9c0)
[   47.055589] 
[   47.057067] The buggy address belongs to the physical page:
[   47.062624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8883ca
[   47.070609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.077120] page_type: f5(slab)
[   47.080254] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.087976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.095694] page dumped because: kasan: bad access detected
[   47.101248] 
[   47.102724] Memory state around the buggy address:
[   47.107505]  ffff0008083ca880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.114707]  ffff0008083ca900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.121913] >ffff0008083ca980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.129113]                                   ^
[   47.133631]  ffff0008083caa00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   47.140834]  ffff0008083caa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.148037] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   46.549329] ==================================================================
[   46.557946] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   46.565062] Write of size 33 at addr ffff0008083fc280 by task kunit_try_catch/270
[   46.572524] 
[   46.574012] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   46.574068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.574085] Hardware name: WinLink E850-96 board (DT)
[   46.574109] Call trace:
[   46.574123]  show_stack+0x20/0x38 (C)
[   46.574161]  dump_stack_lvl+0x8c/0xd0
[   46.574194]  print_report+0x118/0x5d0
[   46.574222]  kasan_report+0xdc/0x128
[   46.574252]  kasan_check_range+0x100/0x1a8
[   46.574282]  __asan_memset+0x34/0x78
[   46.574313]  kmalloc_uaf_memset+0x170/0x310
[   46.574346]  kunit_try_run_case+0x170/0x3f0
[   46.574387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.574420]  kthread+0x328/0x630
[   46.574451]  ret_from_fork+0x10/0x20
[   46.574483] 
[   46.640927] Allocated by task 270:
[   46.644313]  kasan_save_stack+0x3c/0x68
[   46.648130]  kasan_save_track+0x20/0x40
[   46.651950]  kasan_save_alloc_info+0x40/0x58
[   46.656203]  __kasan_kmalloc+0xd4/0xd8
[   46.659936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.664449]  kmalloc_uaf_memset+0xb8/0x310
[   46.668531]  kunit_try_run_case+0x170/0x3f0
[   46.672696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.678164]  kthread+0x328/0x630
[   46.681376]  ret_from_fork+0x10/0x20
[   46.684935] 
[   46.686412] Freed by task 270:
[   46.689450]  kasan_save_stack+0x3c/0x68
[   46.693269]  kasan_save_track+0x20/0x40
[   46.697088]  kasan_save_free_info+0x4c/0x78
[   46.701254]  __kasan_slab_free+0x6c/0x98
[   46.705161]  kfree+0x214/0x3c8
[   46.708199]  kmalloc_uaf_memset+0x11c/0x310
[   46.712366]  kunit_try_run_case+0x170/0x3f0
[   46.716532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.722002]  kthread+0x328/0x630
[   46.725212]  ret_from_fork+0x10/0x20
[   46.728771] 
[   46.730249] The buggy address belongs to the object at ffff0008083fc280
[   46.730249]  which belongs to the cache kmalloc-64 of size 64
[   46.742575] The buggy address is located 0 bytes inside of
[   46.742575]  freed 64-byte region [ffff0008083fc280, ffff0008083fc2c0)
[   46.754552] 
[   46.756031] The buggy address belongs to the physical page:
[   46.761587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8883fc
[   46.769573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.776082] page_type: f5(slab)
[   46.779217] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.786937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.794656] page dumped because: kasan: bad access detected
[   46.800211] 
[   46.801686] Memory state around the buggy address:
[   46.806467]  ffff0008083fc180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.813669]  ffff0008083fc200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.820876] >ffff0008083fc280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.828075]                    ^
[   46.831291]  ffff0008083fc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.838496]  ffff0008083fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.845698] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   46.244174] ==================================================================
[   46.254567] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   46.261072] Read of size 1 at addr ffff000806d01568 by task kunit_try_catch/268
[   46.268362] 
[   46.269848] CPU: 4 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   46.269909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.269929] Hardware name: WinLink E850-96 board (DT)
[   46.269953] Call trace:
[   46.269966]  show_stack+0x20/0x38 (C)
[   46.270003]  dump_stack_lvl+0x8c/0xd0
[   46.270036]  print_report+0x118/0x5d0
[   46.270067]  kasan_report+0xdc/0x128
[   46.270095]  __asan_report_load1_noabort+0x20/0x30
[   46.270128]  kmalloc_uaf+0x300/0x338
[   46.270159]  kunit_try_run_case+0x170/0x3f0
[   46.270199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.270232]  kthread+0x328/0x630
[   46.270263]  ret_from_fork+0x10/0x20
[   46.270298] 
[   46.333293] Allocated by task 268:
[   46.336680]  kasan_save_stack+0x3c/0x68
[   46.340498]  kasan_save_track+0x20/0x40
[   46.344317]  kasan_save_alloc_info+0x40/0x58
[   46.348568]  __kasan_kmalloc+0xd4/0xd8
[   46.352301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.356815]  kmalloc_uaf+0xb8/0x338
[   46.360288]  kunit_try_run_case+0x170/0x3f0
[   46.364454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.369923]  kthread+0x328/0x630
[   46.373134]  ret_from_fork+0x10/0x20
[   46.376694] 
[   46.378170] Freed by task 268:
[   46.381209]  kasan_save_stack+0x3c/0x68
[   46.385026]  kasan_save_track+0x20/0x40
[   46.388846]  kasan_save_free_info+0x4c/0x78
[   46.393012]  __kasan_slab_free+0x6c/0x98
[   46.396918]  kfree+0x214/0x3c8
[   46.399957]  kmalloc_uaf+0x11c/0x338
[   46.403516]  kunit_try_run_case+0x170/0x3f0
[   46.407682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.413151]  kthread+0x328/0x630
[   46.416363]  ret_from_fork+0x10/0x20
[   46.419922] 
[   46.421399] The buggy address belongs to the object at ffff000806d01560
[   46.421399]  which belongs to the cache kmalloc-16 of size 16
[   46.433725] The buggy address is located 8 bytes inside of
[   46.433725]  freed 16-byte region [ffff000806d01560, ffff000806d01570)
[   46.445703] 
[   46.447181] The buggy address belongs to the physical page:
[   46.452737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886d01
[   46.460722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.467232] page_type: f5(slab)
[   46.470368] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.478087] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.485807] page dumped because: kasan: bad access detected
[   46.491362] 
[   46.492837] Memory state around the buggy address:
[   46.497617]  ffff000806d01400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.504820]  ffff000806d01480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.512027] >ffff000806d01500: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.519226]                                                           ^
[   46.525827]  ffff000806d01580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.533033]  ffff000806d01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.540234] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   45.975989] ==================================================================
[   45.986516] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   45.994408] Read of size 64 at addr ffff0008083ca904 by task kunit_try_catch/266
[   46.001787] 
[   46.003274] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   46.003333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.003351] Hardware name: WinLink E850-96 board (DT)
[   46.003373] Call trace:
[   46.003386]  show_stack+0x20/0x38 (C)
[   46.003422]  dump_stack_lvl+0x8c/0xd0
[   46.003455]  print_report+0x118/0x5d0
[   46.003487]  kasan_report+0xdc/0x128
[   46.003515]  kasan_check_range+0x100/0x1a8
[   46.003544]  __asan_memmove+0x3c/0x98
[   46.003573]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   46.003608]  kunit_try_run_case+0x170/0x3f0
[   46.003646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.003680]  kthread+0x328/0x630
[   46.003712]  ret_from_fork+0x10/0x20
[   46.003745] 
[   46.071143] Allocated by task 266:
[   46.074531]  kasan_save_stack+0x3c/0x68
[   46.078347]  kasan_save_track+0x20/0x40
[   46.082167]  kasan_save_alloc_info+0x40/0x58
[   46.086420]  __kasan_kmalloc+0xd4/0xd8
[   46.090153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.094666]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   46.099614]  kunit_try_run_case+0x170/0x3f0
[   46.103781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.109249]  kthread+0x328/0x630
[   46.112461]  ret_from_fork+0x10/0x20
[   46.116020] 
[   46.117497] The buggy address belongs to the object at ffff0008083ca900
[   46.117497]  which belongs to the cache kmalloc-64 of size 64
[   46.129823] The buggy address is located 4 bytes inside of
[   46.129823]  allocated 64-byte region [ffff0008083ca900, ffff0008083ca940)
[   46.142150] 
[   46.143626] The buggy address belongs to the physical page:
[   46.149183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8883ca
[   46.157169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.163676] page_type: f5(slab)
[   46.166814] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.174534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.182253] page dumped because: kasan: bad access detected
[   46.187807] 
[   46.189283] Memory state around the buggy address:
[   46.194064]  ffff0008083ca800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.201265]  ffff0008083ca880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.208473] >ffff0008083ca900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   46.215672]                                            ^
[   46.220970]  ffff0008083ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.228176]  ffff0008083caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.235376] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   45.710346] ==================================================================
[   45.719937] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   45.727486] Read of size 18446744073709551614 at addr ffff0008081c9284 by task kunit_try_catch/264
[   45.736425] 
[   45.737912] CPU: 4 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   45.737972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.737989] Hardware name: WinLink E850-96 board (DT)
[   45.738012] Call trace:
[   45.738025]  show_stack+0x20/0x38 (C)
[   45.738059]  dump_stack_lvl+0x8c/0xd0
[   45.738092]  print_report+0x118/0x5d0
[   45.738121]  kasan_report+0xdc/0x128
[   45.738148]  kasan_check_range+0x100/0x1a8
[   45.738181]  __asan_memmove+0x3c/0x98
[   45.738215]  kmalloc_memmove_negative_size+0x154/0x2e0
[   45.738249]  kunit_try_run_case+0x170/0x3f0
[   45.738288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.738322]  kthread+0x328/0x630
[   45.738352]  ret_from_fork+0x10/0x20
[   45.738388] 
[   45.805868] Allocated by task 264:
[   45.809257]  kasan_save_stack+0x3c/0x68
[   45.813073]  kasan_save_track+0x20/0x40
[   45.816893]  kasan_save_alloc_info+0x40/0x58
[   45.821146]  __kasan_kmalloc+0xd4/0xd8
[   45.824879]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.829393]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   45.834427]  kunit_try_run_case+0x170/0x3f0
[   45.838594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.844063]  kthread+0x328/0x630
[   45.847274]  ret_from_fork+0x10/0x20
[   45.850833] 
[   45.852311] The buggy address belongs to the object at ffff0008081c9280
[   45.852311]  which belongs to the cache kmalloc-64 of size 64
[   45.864638] The buggy address is located 4 bytes inside of
[   45.864638]  64-byte region [ffff0008081c9280, ffff0008081c92c0)
[   45.876093] 
[   45.877572] The buggy address belongs to the physical page:
[   45.883128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8881c9
[   45.891113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.897622] page_type: f5(slab)
[   45.900758] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.908478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.916197] page dumped because: kasan: bad access detected
[   45.921752] 
[   45.923228] Memory state around the buggy address:
[   45.928008]  ffff0008081c9180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.935212]  ffff0008081c9200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.942417] >ffff0008081c9280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   45.949616]                    ^
[   45.952832]  ffff0008081c9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.960037]  ffff0008081c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.967238] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   45.403157] ==================================================================
[   45.412737] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   45.420028] Write of size 16 at addr ffff00080193ae69 by task kunit_try_catch/262
[   45.427490] 
[   45.428974] CPU: 2 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   45.429027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.429045] Hardware name: WinLink E850-96 board (DT)
[   45.429071] Call trace:
[   45.429083]  show_stack+0x20/0x38 (C)
[   45.429119]  dump_stack_lvl+0x8c/0xd0
[   45.429151]  print_report+0x118/0x5d0
[   45.429180]  kasan_report+0xdc/0x128
[   45.429210]  kasan_check_range+0x100/0x1a8
[   45.429239]  __asan_memset+0x34/0x78
[   45.429269]  kmalloc_oob_memset_16+0x150/0x2f8
[   45.429302]  kunit_try_run_case+0x170/0x3f0
[   45.429339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.429372]  kthread+0x328/0x630
[   45.429402]  ret_from_fork+0x10/0x20
[   45.429436] 
[   45.496151] Allocated by task 262:
[   45.499540]  kasan_save_stack+0x3c/0x68
[   45.503356]  kasan_save_track+0x20/0x40
[   45.507175]  kasan_save_alloc_info+0x40/0x58
[   45.511428]  __kasan_kmalloc+0xd4/0xd8
[   45.515161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.519675]  kmalloc_oob_memset_16+0xb0/0x2f8
[   45.524016]  kunit_try_run_case+0x170/0x3f0
[   45.528181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.533651]  kthread+0x328/0x630
[   45.536862]  ret_from_fork+0x10/0x20
[   45.540421] 
[   45.541898] The buggy address belongs to the object at ffff00080193ae00
[   45.541898]  which belongs to the cache kmalloc-128 of size 128
[   45.554399] The buggy address is located 105 bytes inside of
[   45.554399]  allocated 120-byte region [ffff00080193ae00, ffff00080193ae78)
[   45.566983] 
[   45.568463] The buggy address belongs to the physical page:
[   45.574018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   45.582003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   45.589643] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   45.596585] page_type: f5(slab)
[   45.599721] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.607441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.615167] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.622978] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.630791] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   45.638603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.646409] page dumped because: kasan: bad access detected
[   45.651964] 
[   45.653440] Memory state around the buggy address:
[   45.658220]  ffff00080193ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.665423]  ffff00080193ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.672632] >ffff00080193ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.679829]                                                                 ^
[   45.686950]  ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.694155]  ffff00080193af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.701356] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   45.096505] ==================================================================
[   45.105973] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   45.113176] Write of size 8 at addr ffff0008019acb71 by task kunit_try_catch/260
[   45.120550] 
[   45.122036] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   45.122091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.122107] Hardware name: WinLink E850-96 board (DT)
[   45.122130] Call trace:
[   45.122144]  show_stack+0x20/0x38 (C)
[   45.122176]  dump_stack_lvl+0x8c/0xd0
[   45.122209]  print_report+0x118/0x5d0
[   45.122238]  kasan_report+0xdc/0x128
[   45.122264]  kasan_check_range+0x100/0x1a8
[   45.122293]  __asan_memset+0x34/0x78
[   45.122322]  kmalloc_oob_memset_8+0x150/0x2f8
[   45.122354]  kunit_try_run_case+0x170/0x3f0
[   45.122391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.122423]  kthread+0x328/0x630
[   45.122453]  ret_from_fork+0x10/0x20
[   45.122489] 
[   45.189126] Allocated by task 260:
[   45.192513]  kasan_save_stack+0x3c/0x68
[   45.196330]  kasan_save_track+0x20/0x40
[   45.200150]  kasan_save_alloc_info+0x40/0x58
[   45.204402]  __kasan_kmalloc+0xd4/0xd8
[   45.208134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.212648]  kmalloc_oob_memset_8+0xb0/0x2f8
[   45.216901]  kunit_try_run_case+0x170/0x3f0
[   45.221068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.226537]  kthread+0x328/0x630
[   45.229749]  ret_from_fork+0x10/0x20
[   45.233308] 
[   45.234785] The buggy address belongs to the object at ffff0008019acb00
[   45.234785]  which belongs to the cache kmalloc-128 of size 128
[   45.247287] The buggy address is located 113 bytes inside of
[   45.247287]  allocated 120-byte region [ffff0008019acb00, ffff0008019acb78)
[   45.259870] 
[   45.261350] The buggy address belongs to the physical page:
[   45.266906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   45.274889] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   45.282530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   45.289471] page_type: f5(slab)
[   45.292609] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.300327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.308054] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.315865] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.323678] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   45.331490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.339296] page dumped because: kasan: bad access detected
[   45.344851] 
[   45.346326] Memory state around the buggy address:
[   45.351108]  ffff0008019aca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.358310]  ffff0008019aca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.365516] >ffff0008019acb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.372715]                                                                 ^
[   45.379837]  ffff0008019acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.387043]  ffff0008019acc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.394244] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   44.789705] ==================================================================
[   44.799206] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   44.806408] Write of size 4 at addr ffff00080193ad75 by task kunit_try_catch/258
[   44.813783] 
[   44.815271] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   44.815328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.815344] Hardware name: WinLink E850-96 board (DT)
[   44.815365] Call trace:
[   44.815378]  show_stack+0x20/0x38 (C)
[   44.815414]  dump_stack_lvl+0x8c/0xd0
[   44.815444]  print_report+0x118/0x5d0
[   44.815472]  kasan_report+0xdc/0x128
[   44.815499]  kasan_check_range+0x100/0x1a8
[   44.815528]  __asan_memset+0x34/0x78
[   44.815558]  kmalloc_oob_memset_4+0x150/0x300
[   44.815589]  kunit_try_run_case+0x170/0x3f0
[   44.815626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.815659]  kthread+0x328/0x630
[   44.815689]  ret_from_fork+0x10/0x20
[   44.815722] 
[   44.882358] Allocated by task 258:
[   44.885747]  kasan_save_stack+0x3c/0x68
[   44.889563]  kasan_save_track+0x20/0x40
[   44.893382]  kasan_save_alloc_info+0x40/0x58
[   44.897636]  __kasan_kmalloc+0xd4/0xd8
[   44.901368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.905882]  kmalloc_oob_memset_4+0xb0/0x300
[   44.910137]  kunit_try_run_case+0x170/0x3f0
[   44.914302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.919771]  kthread+0x328/0x630
[   44.922983]  ret_from_fork+0x10/0x20
[   44.926542] 
[   44.928019] The buggy address belongs to the object at ffff00080193ad00
[   44.928019]  which belongs to the cache kmalloc-128 of size 128
[   44.940519] The buggy address is located 117 bytes inside of
[   44.940519]  allocated 120-byte region [ffff00080193ad00, ffff00080193ad78)
[   44.953104] 
[   44.954582] The buggy address belongs to the physical page:
[   44.960139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   44.968124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.975762] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.982706] page_type: f5(slab)
[   44.985843] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.993561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.001288] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.009099] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.016911] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   45.024724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.032529] page dumped because: kasan: bad access detected
[   45.038085] 
[   45.039560] Memory state around the buggy address:
[   45.044340]  ffff00080193ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.051543]  ffff00080193ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.058750] >ffff00080193ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.065949]                                                                 ^
[   45.073071]  ffff00080193ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.080277]  ffff00080193ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.087478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   44.482651] ==================================================================
[   44.492439] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   44.499641] Write of size 2 at addr ffff0008019aca77 by task kunit_try_catch/256
[   44.507017] 
[   44.508505] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   44.508560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.508574] Hardware name: WinLink E850-96 board (DT)
[   44.508595] Call trace:
[   44.508607]  show_stack+0x20/0x38 (C)
[   44.508642]  dump_stack_lvl+0x8c/0xd0
[   44.508676]  print_report+0x118/0x5d0
[   44.508704]  kasan_report+0xdc/0x128
[   44.508731]  kasan_check_range+0x100/0x1a8
[   44.508761]  __asan_memset+0x34/0x78
[   44.508790]  kmalloc_oob_memset_2+0x150/0x2f8
[   44.508821]  kunit_try_run_case+0x170/0x3f0
[   44.508857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.508889]  kthread+0x328/0x630
[   44.508916]  ret_from_fork+0x10/0x20
[   44.508946] 
[   44.575593] Allocated by task 256:
[   44.578981]  kasan_save_stack+0x3c/0x68
[   44.582797]  kasan_save_track+0x20/0x40
[   44.586617]  kasan_save_alloc_info+0x40/0x58
[   44.590869]  __kasan_kmalloc+0xd4/0xd8
[   44.594602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.599116]  kmalloc_oob_memset_2+0xb0/0x2f8
[   44.603369]  kunit_try_run_case+0x170/0x3f0
[   44.607537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.613005]  kthread+0x328/0x630
[   44.616216]  ret_from_fork+0x10/0x20
[   44.619775] 
[   44.621252] The buggy address belongs to the object at ffff0008019aca00
[   44.621252]  which belongs to the cache kmalloc-128 of size 128
[   44.633754] The buggy address is located 119 bytes inside of
[   44.633754]  allocated 120-byte region [ffff0008019aca00, ffff0008019aca78)
[   44.646337] 
[   44.647817] The buggy address belongs to the physical page:
[   44.653373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   44.661356] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.668995] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.675939] page_type: f5(slab)
[   44.679076] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.686795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.694523] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.702333] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.710145] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   44.717957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.725763] page dumped because: kasan: bad access detected
[   44.731319] 
[   44.732794] Memory state around the buggy address:
[   44.737574]  ffff0008019ac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.744777]  ffff0008019ac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.751983] >ffff0008019aca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.759183]                                                                 ^
[   44.766304]  ffff0008019aca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.773509]  ffff0008019acb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.780712] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   44.176135] ==================================================================
[   44.185329] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   44.192613] Write of size 128 at addr ffff00080193ac00 by task kunit_try_catch/254
[   44.200163] 
[   44.201652] CPU: 2 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   44.201710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.201727] Hardware name: WinLink E850-96 board (DT)
[   44.201747] Call trace:
[   44.201761]  show_stack+0x20/0x38 (C)
[   44.201798]  dump_stack_lvl+0x8c/0xd0
[   44.201830]  print_report+0x118/0x5d0
[   44.201859]  kasan_report+0xdc/0x128
[   44.201887]  kasan_check_range+0x100/0x1a8
[   44.201916]  __asan_memset+0x34/0x78
[   44.201943]  kmalloc_oob_in_memset+0x144/0x2d0
[   44.201974]  kunit_try_run_case+0x170/0x3f0
[   44.202013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.202048]  kthread+0x328/0x630
[   44.202079]  ret_from_fork+0x10/0x20
[   44.202113] 
[   44.268827] Allocated by task 254:
[   44.272215]  kasan_save_stack+0x3c/0x68
[   44.276030]  kasan_save_track+0x20/0x40
[   44.279850]  kasan_save_alloc_info+0x40/0x58
[   44.284103]  __kasan_kmalloc+0xd4/0xd8
[   44.287836]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.292350]  kmalloc_oob_in_memset+0xb0/0x2d0
[   44.296691]  kunit_try_run_case+0x170/0x3f0
[   44.300856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.306325]  kthread+0x328/0x630
[   44.309537]  ret_from_fork+0x10/0x20
[   44.313096] 
[   44.314573] The buggy address belongs to the object at ffff00080193ac00
[   44.314573]  which belongs to the cache kmalloc-128 of size 128
[   44.327073] The buggy address is located 0 bytes inside of
[   44.327073]  allocated 120-byte region [ffff00080193ac00, ffff00080193ac78)
[   44.339484] 
[   44.340963] The buggy address belongs to the physical page:
[   44.346521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   44.354505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.362143] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.369085] page_type: f5(slab)
[   44.372222] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.379942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.387668] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.395480] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.403293] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   44.411104] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.418912] page dumped because: kasan: bad access detected
[   44.424465] 
[   44.425941] Memory state around the buggy address:
[   44.430721]  ffff00080193ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.437924]  ffff00080193ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.445130] >ffff00080193ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.452330]                                                                 ^
[   44.459452]  ffff00080193ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.466656]  ffff00080193ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.473858] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   43.873609] ==================================================================
[   43.882727] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   43.889493] Read of size 16 at addr ffff000800ba16a0 by task kunit_try_catch/252
[   43.896871] 
[   43.898356] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   43.898416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.898432] Hardware name: WinLink E850-96 board (DT)
[   43.898453] Call trace:
[   43.898466]  show_stack+0x20/0x38 (C)
[   43.898500]  dump_stack_lvl+0x8c/0xd0
[   43.898534]  print_report+0x118/0x5d0
[   43.898563]  kasan_report+0xdc/0x128
[   43.898593]  __asan_report_load16_noabort+0x20/0x30
[   43.898628]  kmalloc_uaf_16+0x3bc/0x438
[   43.898658]  kunit_try_run_case+0x170/0x3f0
[   43.898698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.898728]  kthread+0x328/0x630
[   43.898759]  ret_from_fork+0x10/0x20
[   43.898795] 
[   43.962148] Allocated by task 252:
[   43.965534]  kasan_save_stack+0x3c/0x68
[   43.969351]  kasan_save_track+0x20/0x40
[   43.973171]  kasan_save_alloc_info+0x40/0x58
[   43.977424]  __kasan_kmalloc+0xd4/0xd8
[   43.981157]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.985670]  kmalloc_uaf_16+0x140/0x438
[   43.989489]  kunit_try_run_case+0x170/0x3f0
[   43.993656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.999126]  kthread+0x328/0x630
[   44.002336]  ret_from_fork+0x10/0x20
[   44.005896] 
[   44.007373] Freed by task 252:
[   44.010409]  kasan_save_stack+0x3c/0x68
[   44.014229]  kasan_save_track+0x20/0x40
[   44.018049]  kasan_save_free_info+0x4c/0x78
[   44.022215]  __kasan_slab_free+0x6c/0x98
[   44.026121]  kfree+0x214/0x3c8
[   44.029159]  kmalloc_uaf_16+0x190/0x438
[   44.032978]  kunit_try_run_case+0x170/0x3f0
[   44.037145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.042614]  kthread+0x328/0x630
[   44.045826]  ret_from_fork+0x10/0x20
[   44.049384] 
[   44.050863] The buggy address belongs to the object at ffff000800ba16a0
[   44.050863]  which belongs to the cache kmalloc-16 of size 16
[   44.063188] The buggy address is located 0 bytes inside of
[   44.063188]  freed 16-byte region [ffff000800ba16a0, ffff000800ba16b0)
[   44.075165] 
[   44.076644] The buggy address belongs to the physical page:
[   44.082201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ba1
[   44.090185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.096694] page_type: f5(slab)
[   44.099832] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.107550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.115269] page dumped because: kasan: bad access detected
[   44.120824] 
[   44.122300] Memory state around the buggy address:
[   44.127083]  ffff000800ba1580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.134284]  ffff000800ba1600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.141491] >ffff000800ba1680: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   44.148688]                                ^
[   44.152946]  ffff000800ba1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.160152]  ffff000800ba1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.167353] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   43.613999] ==================================================================
[   43.623006] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   43.629686] Write of size 16 at addr ffff000806d01520 by task kunit_try_catch/250
[   43.637151] 
[   43.638637] CPU: 4 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   43.638696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.638710] Hardware name: WinLink E850-96 board (DT)
[   43.638731] Call trace:
[   43.638748]  show_stack+0x20/0x38 (C)
[   43.638786]  dump_stack_lvl+0x8c/0xd0
[   43.638818]  print_report+0x118/0x5d0
[   43.638845]  kasan_report+0xdc/0x128
[   43.638870]  __asan_report_store16_noabort+0x20/0x30
[   43.638904]  kmalloc_oob_16+0x3a0/0x3f8
[   43.638933]  kunit_try_run_case+0x170/0x3f0
[   43.638972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.639003]  kthread+0x328/0x630
[   43.639032]  ret_from_fork+0x10/0x20
[   43.639068] 
[   43.702516] Allocated by task 250:
[   43.705902]  kasan_save_stack+0x3c/0x68
[   43.709720]  kasan_save_track+0x20/0x40
[   43.713539]  kasan_save_alloc_info+0x40/0x58
[   43.717792]  __kasan_kmalloc+0xd4/0xd8
[   43.721525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.726039]  kmalloc_oob_16+0xb4/0x3f8
[   43.729771]  kunit_try_run_case+0x170/0x3f0
[   43.733938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.739407]  kthread+0x328/0x630
[   43.742618]  ret_from_fork+0x10/0x20
[   43.746178] 
[   43.747656] The buggy address belongs to the object at ffff000806d01520
[   43.747656]  which belongs to the cache kmalloc-16 of size 16
[   43.759980] The buggy address is located 0 bytes inside of
[   43.759980]  allocated 13-byte region [ffff000806d01520, ffff000806d0152d)
[   43.772305] 
[   43.773783] The buggy address belongs to the physical page:
[   43.779340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886d01
[   43.787325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.793834] page_type: f5(slab)
[   43.796970] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.804690] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.812409] page dumped because: kasan: bad access detected
[   43.817964] 
[   43.819441] Memory state around the buggy address:
[   43.824220]  ffff000806d01400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.831423]  ffff000806d01480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.838629] >ffff000806d01500: 00 05 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   43.845830]                                   ^
[   43.850346]  ffff000806d01580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.857553]  ffff000806d01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.864752] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   42.933526] ==================================================================
[   42.943331] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   42.949922] Read of size 1 at addr ffff0008030fd200 by task kunit_try_catch/248
[   42.957213] 
[   42.958700] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   42.958761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.958776] Hardware name: WinLink E850-96 board (DT)
[   42.958796] Call trace:
[   42.958809]  show_stack+0x20/0x38 (C)
[   42.958844]  dump_stack_lvl+0x8c/0xd0
[   42.958874]  print_report+0x118/0x5d0
[   42.958901]  kasan_report+0xdc/0x128
[   42.958929]  __kasan_check_byte+0x54/0x70
[   42.958965]  krealloc_noprof+0x44/0x360
[   42.959002]  krealloc_uaf+0x180/0x520
[   42.959033]  kunit_try_run_case+0x170/0x3f0
[   42.959072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.959104]  kthread+0x328/0x630
[   42.959135]  ret_from_fork+0x10/0x20
[   42.959171] 
[   43.025270] Allocated by task 248:
[   43.028657]  kasan_save_stack+0x3c/0x68
[   43.032473]  kasan_save_track+0x20/0x40
[   43.036294]  kasan_save_alloc_info+0x40/0x58
[   43.040546]  __kasan_kmalloc+0xd4/0xd8
[   43.044278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.048792]  krealloc_uaf+0xc8/0x520
[   43.052351]  kunit_try_run_case+0x170/0x3f0
[   43.056518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.061986]  kthread+0x328/0x630
[   43.065198]  ret_from_fork+0x10/0x20
[   43.068757] 
[   43.070234] Freed by task 248:
[   43.073273]  kasan_save_stack+0x3c/0x68
[   43.077090]  kasan_save_track+0x20/0x40
[   43.080908]  kasan_save_free_info+0x4c/0x78
[   43.085076]  __kasan_slab_free+0x6c/0x98
[   43.088984]  kfree+0x214/0x3c8
[   43.092020]  krealloc_uaf+0x12c/0x520
[   43.095666]  kunit_try_run_case+0x170/0x3f0
[   43.099833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.105302]  kthread+0x328/0x630
[   43.108513]  ret_from_fork+0x10/0x20
[   43.112072] 
[   43.113550] The buggy address belongs to the object at ffff0008030fd200
[   43.113550]  which belongs to the cache kmalloc-256 of size 256
[   43.126052] The buggy address is located 0 bytes inside of
[   43.126052]  freed 256-byte region [ffff0008030fd200, ffff0008030fd300)
[   43.138115] 
[   43.139593] The buggy address belongs to the physical page:
[   43.145149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   43.153133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.160772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.167714] page_type: f5(slab)
[   43.170853] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.178571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.186298] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.194109] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.201922] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   43.209734] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   43.217539] page dumped because: kasan: bad access detected
[   43.223094] 
[   43.224570] Memory state around the buggy address:
[   43.229352]  ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.236553]  ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.243758] >ffff0008030fd200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.250959]                    ^
[   43.254175]  ffff0008030fd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.261379]  ffff0008030fd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.268582] ==================================================================
[   43.275964] ==================================================================
[   43.283000] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   43.289587] Read of size 1 at addr ffff0008030fd200 by task kunit_try_catch/248
[   43.296879] 
[   43.298363] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   43.298416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.298431] Hardware name: WinLink E850-96 board (DT)
[   43.298452] Call trace:
[   43.298467]  show_stack+0x20/0x38 (C)
[   43.298498]  dump_stack_lvl+0x8c/0xd0
[   43.298531]  print_report+0x118/0x5d0
[   43.298558]  kasan_report+0xdc/0x128
[   43.298585]  __asan_report_load1_noabort+0x20/0x30
[   43.298614]  krealloc_uaf+0x4c8/0x520
[   43.298644]  kunit_try_run_case+0x170/0x3f0
[   43.298681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.298713]  kthread+0x328/0x630
[   43.298741]  ret_from_fork+0x10/0x20
[   43.298776] 
[   43.361894] Allocated by task 248:
[   43.365283]  kasan_save_stack+0x3c/0x68
[   43.369100]  kasan_save_track+0x20/0x40
[   43.372919]  kasan_save_alloc_info+0x40/0x58
[   43.377172]  __kasan_kmalloc+0xd4/0xd8
[   43.380905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.385419]  krealloc_uaf+0xc8/0x520
[   43.388978]  kunit_try_run_case+0x170/0x3f0
[   43.393145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.398613]  kthread+0x328/0x630
[   43.401825]  ret_from_fork+0x10/0x20
[   43.405384] 
[   43.406860] Freed by task 248:
[   43.409899]  kasan_save_stack+0x3c/0x68
[   43.413717]  kasan_save_track+0x20/0x40
[   43.417536]  kasan_save_free_info+0x4c/0x78
[   43.421703]  __kasan_slab_free+0x6c/0x98
[   43.425609]  kfree+0x214/0x3c8
[   43.428648]  krealloc_uaf+0x12c/0x520
[   43.432293]  kunit_try_run_case+0x170/0x3f0
[   43.436460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.441928]  kthread+0x328/0x630
[   43.445140]  ret_from_fork+0x10/0x20
[   43.448699] 
[   43.450175] The buggy address belongs to the object at ffff0008030fd200
[   43.450175]  which belongs to the cache kmalloc-256 of size 256
[   43.462677] The buggy address is located 0 bytes inside of
[   43.462677]  freed 256-byte region [ffff0008030fd200, ffff0008030fd300)
[   43.474740] 
[   43.476220] The buggy address belongs to the physical page:
[   43.481776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   43.489759] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.497399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.504342] page_type: f5(slab)
[   43.507476] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.515198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.522924] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.530736] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.538549] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   43.546361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   43.554166] page dumped because: kasan: bad access detected
[   43.559721] 
[   43.561197] Memory state around the buggy address:
[   43.565977]  ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.573180]  ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.580385] >ffff0008030fd200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.587586]                    ^
[   43.590801]  ffff0008030fd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.598006]  ffff0008030fd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.605207] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   40.065834] ==================================================================
[   40.072802] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   40.080347] Write of size 1 at addr ffff000801b81cd0 by task kunit_try_catch/242
[   40.087725] 
[   40.089210] CPU: 2 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   40.089261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.089275] Hardware name: WinLink E850-96 board (DT)
[   40.089296] Call trace:
[   40.089307]  show_stack+0x20/0x38 (C)
[   40.089341]  dump_stack_lvl+0x8c/0xd0
[   40.089373]  print_report+0x118/0x5d0
[   40.089401]  kasan_report+0xdc/0x128
[   40.089428]  __asan_report_store1_noabort+0x20/0x30
[   40.089461]  krealloc_less_oob_helper+0xb9c/0xc50
[   40.089494]  krealloc_less_oob+0x20/0x38
[   40.089525]  kunit_try_run_case+0x170/0x3f0
[   40.089563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.089595]  kthread+0x328/0x630
[   40.089627]  ret_from_fork+0x10/0x20
[   40.089664] 
[   40.157776] Allocated by task 242:
[   40.161165]  kasan_save_stack+0x3c/0x68
[   40.164981]  kasan_save_track+0x20/0x40
[   40.168802]  kasan_save_alloc_info+0x40/0x58
[   40.173054]  __kasan_krealloc+0x118/0x178
[   40.177047]  krealloc_noprof+0x128/0x360
[   40.180953]  krealloc_less_oob_helper+0x168/0xc50
[   40.185640]  krealloc_less_oob+0x20/0x38
[   40.189547]  kunit_try_run_case+0x170/0x3f0
[   40.193714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.199182]  kthread+0x328/0x630
[   40.202394]  ret_from_fork+0x10/0x20
[   40.205953] 
[   40.207430] The buggy address belongs to the object at ffff000801b81c00
[   40.207430]  which belongs to the cache kmalloc-256 of size 256
[   40.219931] The buggy address is located 7 bytes to the right of
[   40.219931]  allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9)
[   40.232862] 
[   40.234340] The buggy address belongs to the physical page:
[   40.239898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80
[   40.247881] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.255520] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.262462] page_type: f5(slab)
[   40.265600] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.273320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.281046] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.288857] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.296670] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff
[   40.304482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.312288] page dumped because: kasan: bad access detected
[   40.317843] 
[   40.319319] Memory state around the buggy address:
[   40.324099]  ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.331302]  ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.338508] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.345707]                                                  ^
[   40.351527]  ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.358732]  ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.365933] ==================================================================
[   41.768554] ==================================================================
[   41.778591] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   41.786138] Write of size 1 at addr ffff000805b420c9 by task kunit_try_catch/246
[   41.793516] 
[   41.795001] CPU: 3 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   41.795059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.795073] Hardware name: WinLink E850-96 board (DT)
[   41.795096] Call trace:
[   41.795111]  show_stack+0x20/0x38 (C)
[   41.795147]  dump_stack_lvl+0x8c/0xd0
[   41.795180]  print_report+0x118/0x5d0
[   41.795210]  kasan_report+0xdc/0x128
[   41.795235]  __asan_report_store1_noabort+0x20/0x30
[   41.795271]  krealloc_less_oob_helper+0xa48/0xc50
[   41.795306]  krealloc_large_less_oob+0x20/0x38
[   41.795338]  kunit_try_run_case+0x170/0x3f0
[   41.795375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.795407]  kthread+0x328/0x630
[   41.795437]  ret_from_fork+0x10/0x20
[   41.795474] 
[   41.864090] The buggy address belongs to the physical page:
[   41.869648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40
[   41.877631] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.885271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.892213] page_type: f8(unknown)
[   41.895609] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.903329] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.911056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.918867] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.926680] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff
[   41.934493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.942298] page dumped because: kasan: bad access detected
[   41.947853] 
[   41.949329] Memory state around the buggy address:
[   41.954110]  ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.961312]  ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.968520] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   41.975717]                                               ^
[   41.981277]  ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.988481]  ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.995684] ==================================================================
[   42.003187] ==================================================================
[   42.010100] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   42.017645] Write of size 1 at addr ffff000805b420d0 by task kunit_try_catch/246
[   42.025023] 
[   42.026507] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   42.026561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.026577] Hardware name: WinLink E850-96 board (DT)
[   42.026597] Call trace:
[   42.026613]  show_stack+0x20/0x38 (C)
[   42.026649]  dump_stack_lvl+0x8c/0xd0
[   42.026682]  print_report+0x118/0x5d0
[   42.026711]  kasan_report+0xdc/0x128
[   42.026738]  __asan_report_store1_noabort+0x20/0x30
[   42.026771]  krealloc_less_oob_helper+0xb9c/0xc50
[   42.026806]  krealloc_large_less_oob+0x20/0x38
[   42.026838]  kunit_try_run_case+0x170/0x3f0
[   42.026878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.026912]  kthread+0x328/0x630
[   42.026944]  ret_from_fork+0x10/0x20
[   42.026980] 
[   42.095596] The buggy address belongs to the physical page:
[   42.101154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40
[   42.109138] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.116777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.123719] page_type: f8(unknown)
[   42.127116] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.134836] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.142563] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.150374] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.158187] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff
[   42.165999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.173805] page dumped because: kasan: bad access detected
[   42.179360] 
[   42.180836] Memory state around the buggy address:
[   42.185618]  ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.192819]  ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.200027] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.207225]                                                  ^
[   42.213044]  ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.220249]  ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.227450] ==================================================================
[   40.681150] ==================================================================
[   40.688244] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   40.695789] Write of size 1 at addr ffff000801b81cea by task kunit_try_catch/242
[   40.703167] 
[   40.704652] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   40.704702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.704717] Hardware name: WinLink E850-96 board (DT)
[   40.704736] Call trace:
[   40.704750]  show_stack+0x20/0x38 (C)
[   40.704784]  dump_stack_lvl+0x8c/0xd0
[   40.704815]  print_report+0x118/0x5d0
[   40.704842]  kasan_report+0xdc/0x128
[   40.704868]  __asan_report_store1_noabort+0x20/0x30
[   40.704899]  krealloc_less_oob_helper+0xae4/0xc50
[   40.704934]  krealloc_less_oob+0x20/0x38
[   40.704966]  kunit_try_run_case+0x170/0x3f0
[   40.705002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.705036]  kthread+0x328/0x630
[   40.705066]  ret_from_fork+0x10/0x20
[   40.705100] 
[   40.773218] Allocated by task 242:
[   40.776605]  kasan_save_stack+0x3c/0x68
[   40.780423]  kasan_save_track+0x20/0x40
[   40.784243]  kasan_save_alloc_info+0x40/0x58
[   40.788496]  __kasan_krealloc+0x118/0x178
[   40.792489]  krealloc_noprof+0x128/0x360
[   40.796395]  krealloc_less_oob_helper+0x168/0xc50
[   40.801082]  krealloc_less_oob+0x20/0x38
[   40.804989]  kunit_try_run_case+0x170/0x3f0
[   40.809155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.814624]  kthread+0x328/0x630
[   40.817836]  ret_from_fork+0x10/0x20
[   40.821395] 
[   40.822874] The buggy address belongs to the object at ffff000801b81c00
[   40.822874]  which belongs to the cache kmalloc-256 of size 256
[   40.835371] The buggy address is located 33 bytes to the right of
[   40.835371]  allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9)
[   40.848391] 
[   40.849869] The buggy address belongs to the physical page:
[   40.855425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80
[   40.863410] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.871048] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.877992] page_type: f5(slab)
[   40.881128] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.888848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.896575] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.904386] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.912199] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff
[   40.920011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.927817] page dumped because: kasan: bad access detected
[   40.933372] 
[   40.934848] Memory state around the buggy address:
[   40.939627]  ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.946831]  ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.954037] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.961237]                                                           ^
[   40.967837]  ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.975042]  ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.982243] ==================================================================
[   42.234771] ==================================================================
[   42.241862] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   42.249412] Write of size 1 at addr ffff000805b420da by task kunit_try_catch/246
[   42.256790] 
[   42.258273] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   42.258322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.258337] Hardware name: WinLink E850-96 board (DT)
[   42.258353] Call trace:
[   42.258367]  show_stack+0x20/0x38 (C)
[   42.258401]  dump_stack_lvl+0x8c/0xd0
[   42.258433]  print_report+0x118/0x5d0
[   42.258460]  kasan_report+0xdc/0x128
[   42.258488]  __asan_report_store1_noabort+0x20/0x30
[   42.258520]  krealloc_less_oob_helper+0xa80/0xc50
[   42.258553]  krealloc_large_less_oob+0x20/0x38
[   42.258585]  kunit_try_run_case+0x170/0x3f0
[   42.258621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.258653]  kthread+0x328/0x630
[   42.258682]  ret_from_fork+0x10/0x20
[   42.258717] 
[   42.327363] The buggy address belongs to the physical page:
[   42.332920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40
[   42.340903] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.348544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.355486] page_type: f8(unknown)
[   42.358882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.366604] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.374330] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.382142] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.389955] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff
[   42.397767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.405573] page dumped because: kasan: bad access detected
[   42.411128] 
[   42.412603] Memory state around the buggy address:
[   42.417383]  ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.424586]  ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.431793] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.438992]                                                     ^
[   42.445072]  ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.452277]  ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.459478] ==================================================================
[   42.466762] ==================================================================
[   42.473890] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   42.481440] Write of size 1 at addr ffff000805b420ea by task kunit_try_catch/246
[   42.488818] 
[   42.490300] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   42.490347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.490363] Hardware name: WinLink E850-96 board (DT)
[   42.490381] Call trace:
[   42.490391]  show_stack+0x20/0x38 (C)
[   42.490423]  dump_stack_lvl+0x8c/0xd0
[   42.490452]  print_report+0x118/0x5d0
[   42.490479]  kasan_report+0xdc/0x128
[   42.490505]  __asan_report_store1_noabort+0x20/0x30
[   42.490539]  krealloc_less_oob_helper+0xae4/0xc50
[   42.490573]  krealloc_large_less_oob+0x20/0x38
[   42.490605]  kunit_try_run_case+0x170/0x3f0
[   42.490643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.490675]  kthread+0x328/0x630
[   42.490703]  ret_from_fork+0x10/0x20
[   42.490735] 
[   42.559391] The buggy address belongs to the physical page:
[   42.564947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40
[   42.572931] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.580572] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.587514] page_type: f8(unknown)
[   42.590909] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.598631] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.606358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.614170] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.621982] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff
[   42.629794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.637600] page dumped because: kasan: bad access detected
[   42.643155] 
[   42.644631] Memory state around the buggy address:
[   42.649410]  ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.656614]  ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.663820] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.671020]                                                           ^
[   42.677621]  ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.684825]  ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.692027] ==================================================================
[   42.699325] ==================================================================
[   42.706438] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   42.713988] Write of size 1 at addr ffff000805b420eb by task kunit_try_catch/246
[   42.721366] 
[   42.722847] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   42.722893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.722908] Hardware name: WinLink E850-96 board (DT)
[   42.722925] Call trace:
[   42.722936]  show_stack+0x20/0x38 (C)
[   42.722967]  dump_stack_lvl+0x8c/0xd0
[   42.722995]  print_report+0x118/0x5d0
[   42.723021]  kasan_report+0xdc/0x128
[   42.723047]  __asan_report_store1_noabort+0x20/0x30
[   42.723080]  krealloc_less_oob_helper+0xa58/0xc50
[   42.723114]  krealloc_large_less_oob+0x20/0x38
[   42.723148]  kunit_try_run_case+0x170/0x3f0
[   42.723184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.723215]  kthread+0x328/0x630
[   42.723241]  ret_from_fork+0x10/0x20
[   42.723271] 
[   42.791940] The buggy address belongs to the physical page:
[   42.797496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40
[   42.805480] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.813120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.820063] page_type: f8(unknown)
[   42.823459] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.831180] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.838907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.846718] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.854531] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff
[   42.862343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.870149] page dumped because: kasan: bad access detected
[   42.875704] 
[   42.877180] Memory state around the buggy address:
[   42.881959]  ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.889163]  ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.896368] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.903568]                                                           ^
[   42.910169]  ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.917374]  ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.924575] ==================================================================
[   40.373322] ==================================================================
[   40.380349] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   40.387895] Write of size 1 at addr ffff000801b81cda by task kunit_try_catch/242
[   40.395273] 
[   40.396756] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   40.396812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.396826] Hardware name: WinLink E850-96 board (DT)
[   40.396847] Call trace:
[   40.396864]  show_stack+0x20/0x38 (C)
[   40.396899]  dump_stack_lvl+0x8c/0xd0
[   40.396929]  print_report+0x118/0x5d0
[   40.396955]  kasan_report+0xdc/0x128
[   40.396979]  __asan_report_store1_noabort+0x20/0x30
[   40.397012]  krealloc_less_oob_helper+0xa80/0xc50
[   40.397045]  krealloc_less_oob+0x20/0x38
[   40.397076]  kunit_try_run_case+0x170/0x3f0
[   40.397112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.397145]  kthread+0x328/0x630
[   40.397174]  ret_from_fork+0x10/0x20
[   40.397211] 
[   40.465325] Allocated by task 242:
[   40.468712]  kasan_save_stack+0x3c/0x68
[   40.472529]  kasan_save_track+0x20/0x40
[   40.476348]  kasan_save_alloc_info+0x40/0x58
[   40.480601]  __kasan_krealloc+0x118/0x178
[   40.484594]  krealloc_noprof+0x128/0x360
[   40.488500]  krealloc_less_oob_helper+0x168/0xc50
[   40.493188]  krealloc_less_oob+0x20/0x38
[   40.497094]  kunit_try_run_case+0x170/0x3f0
[   40.501260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.506729]  kthread+0x328/0x630
[   40.509941]  ret_from_fork+0x10/0x20
[   40.513500] 
[   40.514979] The buggy address belongs to the object at ffff000801b81c00
[   40.514979]  which belongs to the cache kmalloc-256 of size 256
[   40.527476] The buggy address is located 17 bytes to the right of
[   40.527476]  allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9)
[   40.540496] 
[   40.541974] The buggy address belongs to the physical page:
[   40.547531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80
[   40.555515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.563155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.570098] page_type: f5(slab)
[   40.573232] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.580953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.588680] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.596491] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.604304] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff
[   40.612116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.619922] page dumped because: kasan: bad access detected
[   40.625477] 
[   40.626953] Memory state around the buggy address:
[   40.631732]  ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.638936]  ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.646142] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.653342]                                                     ^
[   40.659422]  ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.666627]  ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.673828] ==================================================================
[   40.989552] ==================================================================
[   40.996657] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   41.004205] Write of size 1 at addr ffff000801b81ceb by task kunit_try_catch/242
[   41.011583] 
[   41.013068] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   41.013122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.013136] Hardware name: WinLink E850-96 board (DT)
[   41.013155] Call trace:
[   41.013169]  show_stack+0x20/0x38 (C)
[   41.013202]  dump_stack_lvl+0x8c/0xd0
[   41.013235]  print_report+0x118/0x5d0
[   41.013263]  kasan_report+0xdc/0x128
[   41.013288]  __asan_report_store1_noabort+0x20/0x30
[   41.013319]  krealloc_less_oob_helper+0xa58/0xc50
[   41.013352]  krealloc_less_oob+0x20/0x38
[   41.013384]  kunit_try_run_case+0x170/0x3f0
[   41.013423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.013454]  kthread+0x328/0x630
[   41.013482]  ret_from_fork+0x10/0x20
[   41.013515] 
[   41.081634] Allocated by task 242:
[   41.085021]  kasan_save_stack+0x3c/0x68
[   41.088839]  kasan_save_track+0x20/0x40
[   41.092658]  kasan_save_alloc_info+0x40/0x58
[   41.096912]  __kasan_krealloc+0x118/0x178
[   41.100904]  krealloc_noprof+0x128/0x360
[   41.104811]  krealloc_less_oob_helper+0x168/0xc50
[   41.109498]  krealloc_less_oob+0x20/0x38
[   41.113404]  kunit_try_run_case+0x170/0x3f0
[   41.117571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.123040]  kthread+0x328/0x630
[   41.126251]  ret_from_fork+0x10/0x20
[   41.129810] 
[   41.131289] The buggy address belongs to the object at ffff000801b81c00
[   41.131289]  which belongs to the cache kmalloc-256 of size 256
[   41.143789] The buggy address is located 34 bytes to the right of
[   41.143789]  allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9)
[   41.156807] 
[   41.158284] The buggy address belongs to the physical page:
[   41.163840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80
[   41.171827] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.179464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.186407] page_type: f5(slab)
[   41.189543] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   41.197264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.204990] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   41.212801] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.220614] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff
[   41.228426] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.236234] page dumped because: kasan: bad access detected
[   41.241787] 
[   41.243263] Memory state around the buggy address:
[   41.248043]  ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.255246]  ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.262454] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   41.269652]                                                           ^
[   41.276253]  ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.283457]  ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.290659] ==================================================================
[   39.756188] ==================================================================
[   39.765512] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   39.773063] Write of size 1 at addr ffff000801b81cc9 by task kunit_try_catch/242
[   39.780441] 
[   39.781924] CPU: 2 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   39.781980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.781995] Hardware name: WinLink E850-96 board (DT)
[   39.782017] Call trace:
[   39.782029]  show_stack+0x20/0x38 (C)
[   39.782063]  dump_stack_lvl+0x8c/0xd0
[   39.782098]  print_report+0x118/0x5d0
[   39.782129]  kasan_report+0xdc/0x128
[   39.782158]  __asan_report_store1_noabort+0x20/0x30
[   39.782193]  krealloc_less_oob_helper+0xa48/0xc50
[   39.782229]  krealloc_less_oob+0x20/0x38
[   39.782261]  kunit_try_run_case+0x170/0x3f0
[   39.782299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.782331]  kthread+0x328/0x630
[   39.782361]  ret_from_fork+0x10/0x20
[   39.782394] 
[   39.850489] Allocated by task 242:
[   39.853878]  kasan_save_stack+0x3c/0x68
[   39.857696]  kasan_save_track+0x20/0x40
[   39.861515]  kasan_save_alloc_info+0x40/0x58
[   39.865767]  __kasan_krealloc+0x118/0x178
[   39.869761]  krealloc_noprof+0x128/0x360
[   39.873666]  krealloc_less_oob_helper+0x168/0xc50
[   39.878353]  krealloc_less_oob+0x20/0x38
[   39.882259]  kunit_try_run_case+0x170/0x3f0
[   39.886426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.891895]  kthread+0x328/0x630
[   39.895106]  ret_from_fork+0x10/0x20
[   39.898665] 
[   39.900144] The buggy address belongs to the object at ffff000801b81c00
[   39.900144]  which belongs to the cache kmalloc-256 of size 256
[   39.912646] The buggy address is located 0 bytes to the right of
[   39.912646]  allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9)
[   39.925577] 
[   39.927055] The buggy address belongs to the physical page:
[   39.932611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80
[   39.940594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.948235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.955178] page_type: f5(slab)
[   39.958313] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.966032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.973760] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.981570] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.989383] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff
[   39.997195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.005001] page dumped because: kasan: bad access detected
[   40.010556] 
[   40.012031] Memory state around the buggy address:
[   40.016812]  ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.024016]  ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.031221] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.038421]                                               ^
[   40.043979]  ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.051185]  ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.058386] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   39.135661] ==================================================================
[   39.144778] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.152325] Write of size 1 at addr ffff0008030fd0eb by task kunit_try_catch/240
[   39.159701] 
[   39.161189] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   39.161249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.161267] Hardware name: WinLink E850-96 board (DT)
[   39.161288] Call trace:
[   39.161300]  show_stack+0x20/0x38 (C)
[   39.161339]  dump_stack_lvl+0x8c/0xd0
[   39.161372]  print_report+0x118/0x5d0
[   39.161401]  kasan_report+0xdc/0x128
[   39.161429]  __asan_report_store1_noabort+0x20/0x30
[   39.161464]  krealloc_more_oob_helper+0x60c/0x678
[   39.161499]  krealloc_more_oob+0x20/0x38
[   39.161531]  kunit_try_run_case+0x170/0x3f0
[   39.161570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.161602]  kthread+0x328/0x630
[   39.161633]  ret_from_fork+0x10/0x20
[   39.161668] 
[   39.229754] Allocated by task 240:
[   39.233141]  kasan_save_stack+0x3c/0x68
[   39.236957]  kasan_save_track+0x20/0x40
[   39.240776]  kasan_save_alloc_info+0x40/0x58
[   39.245030]  __kasan_krealloc+0x118/0x178
[   39.249022]  krealloc_noprof+0x128/0x360
[   39.252929]  krealloc_more_oob_helper+0x168/0x678
[   39.257616]  krealloc_more_oob+0x20/0x38
[   39.261522]  kunit_try_run_case+0x170/0x3f0
[   39.265689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.271158]  kthread+0x328/0x630
[   39.274370]  ret_from_fork+0x10/0x20
[   39.277928] 
[   39.279406] The buggy address belongs to the object at ffff0008030fd000
[   39.279406]  which belongs to the cache kmalloc-256 of size 256
[   39.291908] The buggy address is located 0 bytes to the right of
[   39.291908]  allocated 235-byte region [ffff0008030fd000, ffff0008030fd0eb)
[   39.304838] 
[   39.306316] The buggy address belongs to the physical page:
[   39.311873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   39.319857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.327496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.334441] page_type: f5(slab)
[   39.337576] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.345295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.353024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.360833] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.368646] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   39.376458] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.384264] page dumped because: kasan: bad access detected
[   39.389819] 
[   39.391295] Memory state around the buggy address:
[   39.396074]  ffff0008030fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.403280]  ffff0008030fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.410485] >ffff0008030fd080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.417683]                                                           ^
[   39.424284]  ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.431489]  ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.438691] ==================================================================
[   41.299455] ==================================================================
[   41.308891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   41.316440] Write of size 1 at addr ffff0008057ce0eb by task kunit_try_catch/244
[   41.323821] 
[   41.325304] CPU: 2 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   41.325362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.325378] Hardware name: WinLink E850-96 board (DT)
[   41.325401] Call trace:
[   41.325415]  show_stack+0x20/0x38 (C)
[   41.325449]  dump_stack_lvl+0x8c/0xd0
[   41.325482]  print_report+0x118/0x5d0
[   41.325511]  kasan_report+0xdc/0x128
[   41.325536]  __asan_report_store1_noabort+0x20/0x30
[   41.325570]  krealloc_more_oob_helper+0x60c/0x678
[   41.325605]  krealloc_large_more_oob+0x20/0x38
[   41.325637]  kunit_try_run_case+0x170/0x3f0
[   41.325674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.325706]  kthread+0x328/0x630
[   41.325737]  ret_from_fork+0x10/0x20
[   41.325774] 
[   41.394393] The buggy address belongs to the physical page:
[   41.399949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8857cc
[   41.407933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.415572] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.422515] page_type: f8(unknown)
[   41.425912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.433632] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.441358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.449170] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.456983] head: 0bfffe0000000002 fffffdffe015f301 00000000ffffffff 00000000ffffffff
[   41.464794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.472600] page dumped because: kasan: bad access detected
[   41.478156] 
[   41.479631] Memory state around the buggy address:
[   41.484413]  ffff0008057cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.491614]  ffff0008057ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.498822] >ffff0008057ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.506020]                                                           ^
[   41.512621]  ffff0008057ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.519825]  ffff0008057ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.527026] ==================================================================
[   39.446147] ==================================================================
[   39.453105] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   39.460652] Write of size 1 at addr ffff0008030fd0f0 by task kunit_try_catch/240
[   39.468030] 
[   39.469514] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   39.469569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.469584] Hardware name: WinLink E850-96 board (DT)
[   39.469606] Call trace:
[   39.469618]  show_stack+0x20/0x38 (C)
[   39.469653]  dump_stack_lvl+0x8c/0xd0
[   39.469685]  print_report+0x118/0x5d0
[   39.469715]  kasan_report+0xdc/0x128
[   39.469740]  __asan_report_store1_noabort+0x20/0x30
[   39.469774]  krealloc_more_oob_helper+0x5c0/0x678
[   39.469810]  krealloc_more_oob+0x20/0x38
[   39.469840]  kunit_try_run_case+0x170/0x3f0
[   39.469878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.469909]  kthread+0x328/0x630
[   39.469937]  ret_from_fork+0x10/0x20
[   39.469973] 
[   39.538081] Allocated by task 240:
[   39.541468]  kasan_save_stack+0x3c/0x68
[   39.545285]  kasan_save_track+0x20/0x40
[   39.549105]  kasan_save_alloc_info+0x40/0x58
[   39.553358]  __kasan_krealloc+0x118/0x178
[   39.557351]  krealloc_noprof+0x128/0x360
[   39.561257]  krealloc_more_oob_helper+0x168/0x678
[   39.565945]  krealloc_more_oob+0x20/0x38
[   39.569851]  kunit_try_run_case+0x170/0x3f0
[   39.574018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.579486]  kthread+0x328/0x630
[   39.582698]  ret_from_fork+0x10/0x20
[   39.586257] 
[   39.587734] The buggy address belongs to the object at ffff0008030fd000
[   39.587734]  which belongs to the cache kmalloc-256 of size 256
[   39.600234] The buggy address is located 5 bytes to the right of
[   39.600234]  allocated 235-byte region [ffff0008030fd000, ffff0008030fd0eb)
[   39.613168] 
[   39.614644] The buggy address belongs to the physical page:
[   39.620202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   39.628185] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.635825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.642768] page_type: f5(slab)
[   39.645902] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.653624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.661350] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.669161] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.676975] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   39.684786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.692592] page dumped because: kasan: bad access detected
[   39.698148] 
[   39.699624] Memory state around the buggy address:
[   39.704404]  ffff0008030fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.711606]  ffff0008030fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.718812] >ffff0008030fd080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.726012]                                                              ^
[   39.732873]  ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.740078]  ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.747279] ==================================================================
[   41.534367] ==================================================================
[   41.541442] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   41.548988] Write of size 1 at addr ffff0008057ce0f0 by task kunit_try_catch/244
[   41.556366] 
[   41.557849] CPU: 2 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   41.557900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.557914] Hardware name: WinLink E850-96 board (DT)
[   41.557934] Call trace:
[   41.557948]  show_stack+0x20/0x38 (C)
[   41.557979]  dump_stack_lvl+0x8c/0xd0
[   41.558011]  print_report+0x118/0x5d0
[   41.558037]  kasan_report+0xdc/0x128
[   41.558063]  __asan_report_store1_noabort+0x20/0x30
[   41.558095]  krealloc_more_oob_helper+0x5c0/0x678
[   41.558128]  krealloc_large_more_oob+0x20/0x38
[   41.558162]  kunit_try_run_case+0x170/0x3f0
[   41.558198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.558230]  kthread+0x328/0x630
[   41.558260]  ret_from_fork+0x10/0x20
[   41.558294] 
[   41.626940] The buggy address belongs to the physical page:
[   41.632498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8857cc
[   41.640481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.648121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.655063] page_type: f8(unknown)
[   41.658460] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.666180] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.673906] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.681718] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.689531] head: 0bfffe0000000002 fffffdffe015f301 00000000ffffffff 00000000ffffffff
[   41.697343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.705149] page dumped because: kasan: bad access detected
[   41.710704] 
[   41.712180] Memory state around the buggy address:
[   41.716961]  ffff0008057cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.724163]  ffff0008057ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.731369] >ffff0008057ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.738568]                                                              ^
[   41.745430]  ffff0008057ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.752634]  ffff0008057ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.759836] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   38.943837] ==================================================================
[   38.958235] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   38.964566] Read of size 1 at addr ffff0008084e0000 by task kunit_try_catch/238
[   38.971857] 
[   38.973346] CPU: 5 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   38.973406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.973421] Hardware name: WinLink E850-96 board (DT)
[   38.973442] Call trace:
[   38.973455]  show_stack+0x20/0x38 (C)
[   38.973492]  dump_stack_lvl+0x8c/0xd0
[   38.973525]  print_report+0x118/0x5d0
[   38.973553]  kasan_report+0xdc/0x128
[   38.973580]  __asan_report_load1_noabort+0x20/0x30
[   38.973613]  page_alloc_uaf+0x328/0x350
[   38.973646]  kunit_try_run_case+0x170/0x3f0
[   38.973684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.973718]  kthread+0x328/0x630
[   38.973748]  ret_from_fork+0x10/0x20
[   38.973782] 
[   39.037049] The buggy address belongs to the physical page:
[   39.042606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884e0
[   39.050592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.057100] page_type: f0(buddy)
[   39.060322] raw: 0bfffe0000000000 ffff00087f61bd08 ffff00087f61bd08 0000000000000000
[   39.068042] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   39.075762] page dumped because: kasan: bad access detected
[   39.081317] 
[   39.082792] Memory state around the buggy address:
[   39.087572]  ffff0008084dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.094775]  ffff0008084dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.101982] >ffff0008084e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.109181]                    ^
[   39.112396]  ffff0008084e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.119601]  ffff0008084e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.126805] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   38.707386] ==================================================================
[   38.716742] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   38.722124] Free of addr ffff000805b3c001 by task kunit_try_catch/234
[   38.728546] 
[   38.730033] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   38.730092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.730109] Hardware name: WinLink E850-96 board (DT)
[   38.730132] Call trace:
[   38.730148]  show_stack+0x20/0x38 (C)
[   38.730184]  dump_stack_lvl+0x8c/0xd0
[   38.730216]  print_report+0x118/0x5d0
[   38.730245]  kasan_report_invalid_free+0xc0/0xe8
[   38.730276]  __kasan_kfree_large+0x5c/0xa8
[   38.730313]  free_large_kmalloc+0x68/0x150
[   38.730347]  kfree+0x270/0x3c8
[   38.730376]  kmalloc_large_invalid_free+0x108/0x270
[   38.730412]  kunit_try_run_case+0x170/0x3f0
[   38.730451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.730483]  kthread+0x328/0x630
[   38.730512]  ret_from_fork+0x10/0x20
[   38.730547] 
[   38.802245] The buggy address belongs to the physical page:
[   38.807801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b3c
[   38.815784] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.823424] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.830368] page_type: f8(unknown)
[   38.833766] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.841483] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.849212] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.857021] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.864836] head: 0bfffe0000000002 fffffdffe016cf01 00000000ffffffff 00000000ffffffff
[   38.872646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.880452] page dumped because: kasan: bad access detected
[   38.886007] 
[   38.887483] Memory state around the buggy address:
[   38.892266]  ffff000805b3bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.899467]  ffff000805b3bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.906674] >ffff000805b3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.913871]                    ^
[   38.917086]  ffff000805b3c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.924293]  ffff000805b3c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.931493] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   38.522743] ==================================================================
[   38.532718] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   38.539313] Read of size 1 at addr ffff000806dc4000 by task kunit_try_catch/232
[   38.546603] 
[   38.548089] CPU: 4 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   38.548146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.548163] Hardware name: WinLink E850-96 board (DT)
[   38.548185] Call trace:
[   38.548200]  show_stack+0x20/0x38 (C)
[   38.548236]  dump_stack_lvl+0x8c/0xd0
[   38.548271]  print_report+0x118/0x5d0
[   38.548303]  kasan_report+0xdc/0x128
[   38.548330]  __asan_report_load1_noabort+0x20/0x30
[   38.548366]  kmalloc_large_uaf+0x2cc/0x2f8
[   38.548399]  kunit_try_run_case+0x170/0x3f0
[   38.548437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.548469]  kthread+0x328/0x630
[   38.548499]  ret_from_fork+0x10/0x20
[   38.548535] 
[   38.612057] The buggy address belongs to the physical page:
[   38.617612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dc4
[   38.625596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.632117] raw: 0bfffe0000000000 fffffdffe01b7208 ffff00085afabfc0 0000000000000000
[   38.639837] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   38.647558] page dumped because: kasan: bad access detected
[   38.653111] 
[   38.654587] Memory state around the buggy address:
[   38.659367]  ffff000806dc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.666570]  ffff000806dc3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.673777] >ffff000806dc4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.680976]                    ^
[   38.684191]  ffff000806dc4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.691396]  ffff000806dc4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.698597] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   38.294314] ==================================================================
[   38.303645] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   38.311106] Write of size 1 at addr ffff000805b3e00a by task kunit_try_catch/230
[   38.318481] 
[   38.319967] CPU: 3 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   38.320026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.320040] Hardware name: WinLink E850-96 board (DT)
[   38.320061] Call trace:
[   38.320074]  show_stack+0x20/0x38 (C)
[   38.320112]  dump_stack_lvl+0x8c/0xd0
[   38.320145]  print_report+0x118/0x5d0
[   38.320176]  kasan_report+0xdc/0x128
[   38.320203]  __asan_report_store1_noabort+0x20/0x30
[   38.320239]  kmalloc_large_oob_right+0x278/0x2b8
[   38.320274]  kunit_try_run_case+0x170/0x3f0
[   38.320312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.320343]  kthread+0x328/0x630
[   38.320372]  ret_from_fork+0x10/0x20
[   38.320407] 
[   38.384543] The buggy address belongs to the physical page:
[   38.390098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b3c
[   38.398082] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.405722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.412664] page_type: f8(unknown)
[   38.416061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.423781] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.431509] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.439319] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.447132] head: 0bfffe0000000002 fffffdffe016cf01 00000000ffffffff 00000000ffffffff
[   38.454944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.462749] page dumped because: kasan: bad access detected
[   38.468305] 
[   38.469780] Memory state around the buggy address:
[   38.474561]  ffff000805b3df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.481765]  ffff000805b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.488971] >ffff000805b3e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.496169]                       ^
[   38.499645]  ffff000805b3e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.506849]  ffff000805b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.514051] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   37.992072] ==================================================================
[   38.002873] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   38.010155] Write of size 1 at addr ffff000800df1f00 by task kunit_try_catch/228
[   38.017530] 
[   38.019017] CPU: 4 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   38.019070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.019087] Hardware name: WinLink E850-96 board (DT)
[   38.019109] Call trace:
[   38.019122]  show_stack+0x20/0x38 (C)
[   38.019158]  dump_stack_lvl+0x8c/0xd0
[   38.019189]  print_report+0x118/0x5d0
[   38.019219]  kasan_report+0xdc/0x128
[   38.019248]  __asan_report_store1_noabort+0x20/0x30
[   38.019284]  kmalloc_big_oob_right+0x2a4/0x2f0
[   38.019315]  kunit_try_run_case+0x170/0x3f0
[   38.019353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.019386]  kthread+0x328/0x630
[   38.019415]  ret_from_fork+0x10/0x20
[   38.019452] 
[   38.083417] Allocated by task 228:
[   38.086804]  kasan_save_stack+0x3c/0x68
[   38.090620]  kasan_save_track+0x20/0x40
[   38.094439]  kasan_save_alloc_info+0x40/0x58
[   38.098693]  __kasan_kmalloc+0xd4/0xd8
[   38.102427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.106939]  kmalloc_big_oob_right+0xb8/0x2f0
[   38.111279]  kunit_try_run_case+0x170/0x3f0
[   38.115446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.120914]  kthread+0x328/0x630
[   38.124126]  ret_from_fork+0x10/0x20
[   38.127685] 
[   38.129162] The buggy address belongs to the object at ffff000800df0000
[   38.129162]  which belongs to the cache kmalloc-8k of size 8192
[   38.141665] The buggy address is located 0 bytes to the right of
[   38.141665]  allocated 7936-byte region [ffff000800df0000, ffff000800df1f00)
[   38.154683] 
[   38.156161] The buggy address belongs to the physical page:
[   38.161716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880df0
[   38.169701] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.177340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.184283] page_type: f5(slab)
[   38.187419] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   38.195139] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   38.202865] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   38.210677] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   38.218490] head: 0bfffe0000000003 fffffdffe0037c01 00000000ffffffff 00000000ffffffff
[   38.226303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   38.234107] page dumped because: kasan: bad access detected
[   38.239663] 
[   38.241138] Memory state around the buggy address:
[   38.245918]  ffff000800df1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.253121]  ffff000800df1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.260327] >ffff000800df1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.267527]                    ^
[   38.270743]  ffff000800df1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.277948]  ffff000800df2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.285150] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   37.523285] ==================================================================
[   37.533081] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   37.541150] Write of size 1 at addr ffff00080193aa78 by task kunit_try_catch/226
[   37.548527] 
[   37.550015] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   37.550073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.550089] Hardware name: WinLink E850-96 board (DT)
[   37.550111] Call trace:
[   37.550126]  show_stack+0x20/0x38 (C)
[   37.550159]  dump_stack_lvl+0x8c/0xd0
[   37.550194]  print_report+0x118/0x5d0
[   37.550223]  kasan_report+0xdc/0x128
[   37.550249]  __asan_report_store1_noabort+0x20/0x30
[   37.550289]  kmalloc_track_caller_oob_right+0x40c/0x488
[   37.550325]  kunit_try_run_case+0x170/0x3f0
[   37.550362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.550395]  kthread+0x328/0x630
[   37.550425]  ret_from_fork+0x10/0x20
[   37.550461] 
[   37.615194] Allocated by task 226:
[   37.618584]  kasan_save_stack+0x3c/0x68
[   37.622398]  kasan_save_track+0x20/0x40
[   37.626217]  kasan_save_alloc_info+0x40/0x58
[   37.630470]  __kasan_kmalloc+0xd4/0xd8
[   37.634203]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   37.639758]  kmalloc_track_caller_oob_right+0xa8/0x488
[   37.644880]  kunit_try_run_case+0x170/0x3f0
[   37.649046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.654517]  kthread+0x328/0x630
[   37.657727]  ret_from_fork+0x10/0x20
[   37.661286] 
[   37.662764] The buggy address belongs to the object at ffff00080193aa00
[   37.662764]  which belongs to the cache kmalloc-128 of size 128
[   37.675264] The buggy address is located 0 bytes to the right of
[   37.675264]  allocated 120-byte region [ffff00080193aa00, ffff00080193aa78)
[   37.688195] 
[   37.689674] The buggy address belongs to the physical page:
[   37.695232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   37.703214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.710853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.717797] page_type: f5(slab)
[   37.720931] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.728652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.736381] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.744191] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.752004] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   37.759816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.767621] page dumped because: kasan: bad access detected
[   37.773176] 
[   37.774652] Memory state around the buggy address:
[   37.779431]  ffff00080193a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.786635]  ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.793842] >ffff00080193aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.801041]                                                                 ^
[   37.808163]  ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.815367]  ffff00080193ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.822570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   37.222461] ==================================================================
[   37.231700] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   37.239072] Read of size 1 at addr ffff000807c37000 by task kunit_try_catch/224
[   37.246362] 
[   37.247848] CPU: 4 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   37.247908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.247922] Hardware name: WinLink E850-96 board (DT)
[   37.247944] Call trace:
[   37.247959]  show_stack+0x20/0x38 (C)
[   37.247995]  dump_stack_lvl+0x8c/0xd0
[   37.248029]  print_report+0x118/0x5d0
[   37.248058]  kasan_report+0xdc/0x128
[   37.248084]  __asan_report_load1_noabort+0x20/0x30
[   37.248116]  kmalloc_node_oob_right+0x2f4/0x330
[   37.248148]  kunit_try_run_case+0x170/0x3f0
[   37.248191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.248225]  kthread+0x328/0x630
[   37.248254]  ret_from_fork+0x10/0x20
[   37.248289] 
[   37.312248] Allocated by task 224:
[   37.315636]  kasan_save_stack+0x3c/0x68
[   37.319451]  kasan_save_track+0x20/0x40
[   37.323270]  kasan_save_alloc_info+0x40/0x58
[   37.327524]  __kasan_kmalloc+0xd4/0xd8
[   37.331256]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   37.336204]  kmalloc_node_oob_right+0xbc/0x330
[   37.340631]  kunit_try_run_case+0x170/0x3f0
[   37.344798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.350266]  kthread+0x328/0x630
[   37.353478]  ret_from_fork+0x10/0x20
[   37.357037] 
[   37.358514] The buggy address belongs to the object at ffff000807c36000
[   37.358514]  which belongs to the cache kmalloc-4k of size 4096
[   37.371015] The buggy address is located 0 bytes to the right of
[   37.371015]  allocated 4096-byte region [ffff000807c36000, ffff000807c37000)
[   37.384033] 
[   37.385511] The buggy address belongs to the physical page:
[   37.391069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887c30
[   37.399052] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.406692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.413635] page_type: f5(slab)
[   37.416771] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   37.424490] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   37.432218] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   37.440028] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   37.447842] head: 0bfffe0000000003 fffffdffe01f0c01 00000000ffffffff 00000000ffffffff
[   37.455654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   37.463459] page dumped because: kasan: bad access detected
[   37.469015] 
[   37.470490] Memory state around the buggy address:
[   37.475270]  ffff000807c36f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.482473]  ffff000807c36f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.489679] >ffff000807c37000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.496879]                    ^
[   37.500095]  ffff000807c37080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.507299]  ffff000807c37100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.514501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   36.826608] ==================================================================
[   36.835869] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   36.842723] Read of size 1 at addr ffff000800ba165f by task kunit_try_catch/222
[   36.850015] 
[   36.851499] CPU: 3 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.851551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.851569] Hardware name: WinLink E850-96 board (DT)
[   36.851591] Call trace:
[   36.851605]  show_stack+0x20/0x38 (C)
[   36.851642]  dump_stack_lvl+0x8c/0xd0
[   36.851673]  print_report+0x118/0x5d0
[   36.851701]  kasan_report+0xdc/0x128
[   36.851729]  __asan_report_load1_noabort+0x20/0x30
[   36.851763]  kmalloc_oob_left+0x2ec/0x320
[   36.851795]  kunit_try_run_case+0x170/0x3f0
[   36.851833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.851865]  kthread+0x328/0x630
[   36.851893]  ret_from_fork+0x10/0x20
[   36.851926] 
[   36.915377] Allocated by task 12:
[   36.918680]  kasan_save_stack+0x3c/0x68
[   36.922495]  kasan_save_track+0x20/0x40
[   36.926314]  kasan_save_alloc_info+0x40/0x58
[   36.930568]  __kasan_kmalloc+0xd4/0xd8
[   36.934302]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   36.939856]  kstrdup+0x54/0xc8
[   36.942894]  kstrdup_const+0x48/0x60
[   36.946453]  __kernfs_new_node+0xb0/0x578
[   36.950446]  kernfs_new_node+0x128/0x1a8
[   36.954352]  kernfs_create_link+0xac/0x228
[   36.958432]  sysfs_do_create_link_sd+0x8c/0x128
[   36.962946]  sysfs_create_link_nowarn+0x48/0xb8
[   36.967461]  link_and_create_debugfs+0x70/0x440
[   36.971974]  _regulator_get_common+0x2ac/0x8d0
[   36.976400]  _regulator_get+0x48/0xa0
[   36.980046]  _devm_regulator_get+0x60/0xd0
[   36.984126]  devm_regulator_get_optional+0x1c/0x30
[   36.988900]  usb_conn_probe+0x21c/0xa80
[   36.992719]  platform_probe+0xcc/0x180
[   36.996452]  really_probe+0x188/0x7f0
[   37.000100]  __driver_probe_device+0x164/0x378
[   37.004525]  driver_probe_device+0x64/0x180
[   37.008692]  __device_attach_driver+0x174/0x280
[   37.013205]  bus_for_each_drv+0x118/0x1b0
[   37.017198]  __device_attach+0x174/0x378
[   37.021105]  device_initial_probe+0x1c/0x30
[   37.025271]  bus_probe_device+0x12c/0x170
[   37.029264]  deferred_probe_work_func+0x140/0x208
[   37.033953]  process_one_work+0x530/0xf98
[   37.037945]  worker_thread+0x618/0xf38
[   37.041677]  kthread+0x328/0x630
[   37.044889]  ret_from_fork+0x10/0x20
[   37.048448] 
[   37.049925] Freed by task 0:
[   37.052792]  kasan_save_stack+0x3c/0x68
[   37.056608]  kasan_save_track+0x20/0x40
[   37.060428]  kasan_save_free_info+0x4c/0x78
[   37.064593]  __kasan_slab_free+0x6c/0x98
[   37.068500]  kfree+0x214/0x3c8
[   37.071538]  kfree_const+0x3c/0x50
[   37.074923]  kernfs_free_rcu+0x4c/0x120
[   37.078743]  rcu_core+0x9f4/0x1e20
[   37.082128]  rcu_core_si+0x18/0x30
[   37.085513]  handle_softirqs+0x374/0xb28
[   37.089421]  __do_softirq+0x1c/0x28
[   37.092892] 
[   37.094371] The buggy address belongs to the object at ffff000800ba1640
[   37.094371]  which belongs to the cache kmalloc-16 of size 16
[   37.106695] The buggy address is located 15 bytes to the right of
[   37.106695]  allocated 16-byte region [ffff000800ba1640, ffff000800ba1650)
[   37.119627] 
[   37.121108] The buggy address belongs to the physical page:
[   37.126663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ba1
[   37.134647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.141158] page_type: f5(slab)
[   37.144293] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   37.152013] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   37.159733] page dumped because: kasan: bad access detected
[   37.165286] 
[   37.166762] Memory state around the buggy address:
[   37.171542]  ffff000800ba1500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.178745]  ffff000800ba1580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.185954] >ffff000800ba1600: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   37.193151]                                                     ^
[   37.199231]  ffff000800ba1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.206435]  ffff000800ba1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.213638] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   35.927442] ==================================================================
[   35.933889] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.940828] Write of size 1 at addr ffff00080193a973 by task kunit_try_catch/220
[   35.948204] 
[   35.949692] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   35.949746] Tainted: [N]=TEST
[   35.949760] Hardware name: WinLink E850-96 board (DT)
[   35.949783] Call trace:
[   35.949796]  show_stack+0x20/0x38 (C)
[   35.949830]  dump_stack_lvl+0x8c/0xd0
[   35.949861]  print_report+0x118/0x5d0
[   35.949890]  kasan_report+0xdc/0x128
[   35.949918]  __asan_report_store1_noabort+0x20/0x30
[   35.949953]  kmalloc_oob_right+0x5a4/0x660
[   35.949987]  kunit_try_run_case+0x170/0x3f0
[   35.950024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.950057]  kthread+0x328/0x630
[   35.950087]  ret_from_fork+0x10/0x20
[   35.950123] 
[   36.012527] Allocated by task 220:
[   36.015915]  kasan_save_stack+0x3c/0x68
[   36.019731]  kasan_save_track+0x20/0x40
[   36.023550]  kasan_save_alloc_info+0x40/0x58
[   36.027804]  __kasan_kmalloc+0xd4/0xd8
[   36.031537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.036050]  kmalloc_oob_right+0xb0/0x660
[   36.040043]  kunit_try_run_case+0x170/0x3f0
[   36.044210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.049678]  kthread+0x328/0x630
[   36.052890]  ret_from_fork+0x10/0x20
[   36.056449] 
[   36.057926] The buggy address belongs to the object at ffff00080193a900
[   36.057926]  which belongs to the cache kmalloc-128 of size 128
[   36.070427] The buggy address is located 0 bytes to the right of
[   36.070427]  allocated 115-byte region [ffff00080193a900, ffff00080193a973)
[   36.083358] 
[   36.084836] The buggy address belongs to the physical page:
[   36.090394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   36.098379] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.106016] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.112960] page_type: f5(slab)
[   36.116097] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.123815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.131544] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.139353] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.147167] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   36.154978] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.162784] page dumped because: kasan: bad access detected
[   36.168340] 
[   36.169815] Memory state around the buggy address:
[   36.174595]  ffff00080193a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.181798]  ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.189005] >ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.196204]                                                              ^
[   36.203065]  ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.210271]  ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217471] ==================================================================
[   36.529555] ==================================================================
[   36.536656] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   36.543594] Read of size 1 at addr ffff00080193a980 by task kunit_try_catch/220
[   36.550886] 
[   36.552370] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.552423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.552439] Hardware name: WinLink E850-96 board (DT)
[   36.552458] Call trace:
[   36.552468]  show_stack+0x20/0x38 (C)
[   36.552502]  dump_stack_lvl+0x8c/0xd0
[   36.552534]  print_report+0x118/0x5d0
[   36.552563]  kasan_report+0xdc/0x128
[   36.552589]  __asan_report_load1_noabort+0x20/0x30
[   36.552621]  kmalloc_oob_right+0x5d0/0x660
[   36.552652]  kunit_try_run_case+0x170/0x3f0
[   36.552687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.552718]  kthread+0x328/0x630
[   36.552746]  ret_from_fork+0x10/0x20
[   36.552779] 
[   36.616336] Allocated by task 220:
[   36.619723]  kasan_save_stack+0x3c/0x68
[   36.623541]  kasan_save_track+0x20/0x40
[   36.627361]  kasan_save_alloc_info+0x40/0x58
[   36.631614]  __kasan_kmalloc+0xd4/0xd8
[   36.635347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.639860]  kmalloc_oob_right+0xb0/0x660
[   36.643853]  kunit_try_run_case+0x170/0x3f0
[   36.648020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.653490]  kthread+0x328/0x630
[   36.656700]  ret_from_fork+0x10/0x20
[   36.660260] 
[   36.661736] The buggy address belongs to the object at ffff00080193a900
[   36.661736]  which belongs to the cache kmalloc-128 of size 128
[   36.674235] The buggy address is located 13 bytes to the right of
[   36.674235]  allocated 115-byte region [ffff00080193a900, ffff00080193a973)
[   36.687256] 
[   36.688734] The buggy address belongs to the physical page:
[   36.694291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   36.702273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.709914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.716857] page_type: f5(slab)
[   36.719990] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.727713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.735440] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.743251] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.751064] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   36.758876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.766681] page dumped because: kasan: bad access detected
[   36.772236] 
[   36.773712] Memory state around the buggy address:
[   36.778490]  ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.785695]  ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.792901] >ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.800101]                    ^
[   36.803318]  ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.810521]  ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.817722] ==================================================================
[   36.230044] ==================================================================
[   36.237179] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   36.244120] Write of size 1 at addr ffff00080193a978 by task kunit_try_catch/220
[   36.251498] 
[   36.252983] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   36.253037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.253052] Hardware name: WinLink E850-96 board (DT)
[   36.253073] Call trace:
[   36.253086]  show_stack+0x20/0x38 (C)
[   36.253118]  dump_stack_lvl+0x8c/0xd0
[   36.253149]  print_report+0x118/0x5d0
[   36.253176]  kasan_report+0xdc/0x128
[   36.253202]  __asan_report_store1_noabort+0x20/0x30
[   36.253235]  kmalloc_oob_right+0x538/0x660
[   36.253263]  kunit_try_run_case+0x170/0x3f0
[   36.253299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.253331]  kthread+0x328/0x630
[   36.253360]  ret_from_fork+0x10/0x20
[   36.253396] 
[   36.317035] Allocated by task 220:
[   36.320422]  kasan_save_stack+0x3c/0x68
[   36.324240]  kasan_save_track+0x20/0x40
[   36.328059]  kasan_save_alloc_info+0x40/0x58
[   36.332313]  __kasan_kmalloc+0xd4/0xd8
[   36.336045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.340559]  kmalloc_oob_right+0xb0/0x660
[   36.344553]  kunit_try_run_case+0x170/0x3f0
[   36.348719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.354187]  kthread+0x328/0x630
[   36.357399]  ret_from_fork+0x10/0x20
[   36.360958] 
[   36.362435] The buggy address belongs to the object at ffff00080193a900
[   36.362435]  which belongs to the cache kmalloc-128 of size 128
[   36.374935] The buggy address is located 5 bytes to the right of
[   36.374935]  allocated 115-byte region [ffff00080193a900, ffff00080193a973)
[   36.387869] 
[   36.389347] The buggy address belongs to the physical page:
[   36.394902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   36.402887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.410525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.417471] page_type: f5(slab)
[   36.420604] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.428325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.436051] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.443863] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.451676] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   36.459488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.467293] page dumped because: kasan: bad access detected
[   36.472849] 
[   36.474325] Memory state around the buggy address:
[   36.479104]  ffff00080193a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.486307]  ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.493515] >ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.500713]                                                                 ^
[   36.507835]  ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515041]  ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.522241] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  182.095976] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#4: kunit_try_catch/742
[  182.104483] Modules linked in:
[  182.107528] CPU: 4 UID: 0 PID: 742 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  182.118642] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  182.124446] Hardware name: WinLink E850-96 board (DT)
[  182.129483] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  182.136423] pc : intlog10+0x38/0x48
[  182.139897] lr : intlog10_test+0xe4/0x200
[  182.143888] sp : ffff80008af67c10
[  182.147187] x29: ffff80008af67c90 x28: 0000000000000000 x27: 0000000000000000
[  182.154305] x26: 1fffe00100208481 x25: 0000000000000000 x24: ffff80008af67ce0
[  182.161424] x23: ffff80008af67d00 x22: 0000000000000000 x21: 1ffff000115ecf82
[  182.168541] x20: ffff800083c2f1e0 x19: ffff800087d07990 x18: ffff800087d07b08
[  182.175659] x17: 0000000000000000 x16: ffff00085afa7da8 x15: ffff800081229698
[  182.182777] x14: ffff8000808ffa0c x13: 1fffe0010b5f4f99 x12: ffff700010f62f89
[  182.189895] x11: 1ffff00010f62f88 x10: ffff700010f62f88 x9 : ffff800081249824
[  182.197012] x8 : ffff800087b17c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  182.204130] x5 : ffff7000115ecf82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e3c
[  182.211248] x2 : 1ffff00010785e3c x1 : 0000000000000003 x0 : 0000000000000000
[  182.218369] Call trace:
[  182.220800]  intlog10+0x38/0x48 (P)
[  182.224271]  kunit_try_run_case+0x170/0x3f0
[  182.228437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  182.233906]  kthread+0x328/0x630
[  182.237118]  ret_from_fork+0x10/0x20
[  182.240678] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  181.891292] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/724
[  181.899625] Modules linked in:
[  181.902673] CPU: 0 UID: 0 PID: 724 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  181.913782] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  181.918720] Hardware name: WinLink E850-96 board (DT)
[  181.923758] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  181.930697] pc : intlog2+0xd8/0xf8
[  181.934083] lr : intlog2_test+0xe4/0x200
[  181.937989] sp : ffff80008ae47c10
[  181.941287] x29: ffff80008ae47c90 x28: 0000000000000000 x27: 0000000000000000
[  181.948405] x26: 1fffe001002086c1 x25: 0000000000000000 x24: ffff80008ae47ce0
[  181.955525] x23: ffff80008ae47d00 x22: 0000000000000000 x21: 1ffff000115c8f82
[  181.962641] x20: ffff800083c2f0e0 x19: ffff800087d07990 x18: 000000001639443b
[  181.969759] x17: 0000000000000000 x16: ffff00085af1fda8 x15: 0000000000000000
[  181.976877] x14: 00000000f1f1f1f1 x13: 1fffe0010b5e3f99 x12: ffff700010f62f89
[  181.983995] x11: 1ffff00010f62f88 x10: ffff700010f62f88 x9 : ffff800081249a24
[  181.991113] x8 : ffff800087b17c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  181.998231] x5 : ffff7000115c8f82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e1c
[  182.005349] x2 : 1ffff00010785e1c x1 : 0000000000000003 x0 : 0000000000000000
[  182.012469] Call trace:
[  182.014901]  intlog2+0xd8/0xf8 (P)
[  182.018285]  kunit_try_run_case+0x170/0x3f0
[  182.022449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  182.027918]  kthread+0x328/0x630
[  182.031131]  ret_from_fork+0x10/0x20
[  182.034692] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
[  180.761768] Internal error: Oops: 0000000096000005 [#1]  SMP
[  180.767374] Modules linked in:
[  180.770418] CPU: 2 UID: 0 PID: 616 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[  180.781529] Tainted: [B]=BAD_PAGE, [N]=TEST
[  180.785685] Hardware name: WinLink E850-96 board (DT)
[  180.790723] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  180.797664] pc : kunit_test_null_dereference+0x70/0x170
[  180.802873] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  180.808687] sp : ffff80008a7b7d30
[  180.811985] x29: ffff80008a7b7d90 x28: 0000000000000000 x27: 0000000000000000
[  180.819103] x26: 1fffe0010047c181 x25: 0000000000000000 x24: 0000000000000004
[  180.826221] x23: ffff0008023e0c0c x22: ffff8000812362b0 x21: ffff000800c80508
[  180.833339] x20: 1ffff000114f6fa6 x19: ffff800087d07990 x18: 00000000feebf614
[  180.840458] x17: 0000000000000001 x16: ffff00085af63da8 x15: ffff800081229380
[  180.847575] x14: ffff8000812344b0 x13: 1fffe0010b5ec799 x12: ffff6001011e962c
[  180.854693] x11: 1fffe001011e962b x10: ffff6001011e962b x9 : ffff80008122da40
[  180.861811] x8 : ffff80008a7b7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  180.868929] x5 : ffff7000114f6fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  180.876047] x2 : dfff800000000000 x1 : ffff000808f4a880 x0 : ffff800087d07990
[  180.883167] Call trace:
[  180.885598]  kunit_test_null_dereference+0x70/0x170 (P)
[  180.890806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  180.896273]  kthread+0x328/0x630
[  180.899485]  ret_from_fork+0x10/0x20
[  180.903057] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  180.909124] ---[ end trace 0000000000000000 ]---