Hay
Date
July 14, 2025, 10:38 a.m.
Failure - log-parser-boot/internal-error-oops-oops-smp
[  178.059421] Internal error: Oops: 0000000096000005 [#1]  SMP
[  178.065017] Modules linked in:
[  178.068060] CPU: 3 UID: 0 PID: 617 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  178.079170] Tainted: [B]=BAD_PAGE, [N]=TEST
[  178.083327] Hardware name: WinLink E850-96 board (DT)
[  178.088365] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  178.095306] pc : kunit_test_null_dereference+0x70/0x170
[  178.100515] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  178.106329] sp : ffff80008a777d30
[  178.109627] x29: ffff80008a777d90 x28: 0000000000000000 x27: 0000000000000000
[  178.116745] x26: 1fffe0010032b301 x25: 0000000000000000 x24: 0000000000000004
[  178.123863] x23: ffff00080195980c x22: ffff800081238b58 x21: ffff00080138e508
[  178.130981] x20: 1ffff000114eefa6 x19: ffff800087d07990 x18: 000000004a334020
[  178.138099] x17: 0000000000000001 x16: ffff00085af85da8 x15: ffff8000812294d0
[  178.145217] x14: ffff8000808fff7c x13: 1fffe0010095dd94 x12: ffff600100ceedc4
[  178.152335] x11: 1fffe00100ceedc3 x10: ffff600100ceedc3 x9 : ffff8000812302e8
[  178.159453] x8 : ffff80008a777c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  178.166571] x5 : ffff7000114eefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  178.173689] x2 : dfff800000000000 x1 : ffff000806776540 x0 : ffff800087d07990
[  178.180809] Call trace:
[  178.183241]  kunit_test_null_dereference+0x70/0x170 (P)
[  178.188448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  178.193915]  kthread+0x328/0x630
[  178.197128]  ret_from_fork+0x10/0x20
[  178.200699] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  178.206768] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[  281.045173] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  281.053414] SMP: stopping secondary CPUs
[  281.057338] Kernel Offset: disabled
[  281.060788] CPU features: 0x20000,00000000,10023140,0400721b
[  281.066432] Memory Limit: none
[  281.069503] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  115.433863] ==================================================================
[  115.433997] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[  115.433997] 
[  115.434144] Use-after-free read at 0x(____ptrval____) (in kfence-#213):
[  115.434256]  test_krealloc+0x51c/0x830
[  115.437396]  kunit_try_run_case+0x170/0x3f0
[  115.441563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  115.447031]  kthread+0x328/0x630
[  115.450243]  ret_from_fork+0x10/0x20
[  115.453802] 
[  115.455280] kfence-#213: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[  115.455280] 
[  115.464917] allocated by task 421 on cpu 3 at 115.433767s (0.031145s ago):
[  115.471792]  test_alloc+0x29c/0x628
[  115.475243]  test_krealloc+0xc0/0x830
[  115.478888]  kunit_try_run_case+0x170/0x3f0
[  115.483055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  115.488524]  kthread+0x328/0x630
[  115.491735]  ret_from_fork+0x10/0x20
[  115.495296] 
[  115.496772] freed by task 421 on cpu 3 at 115.433799s (0.062970s ago):
[  115.503302]  krealloc_noprof+0x148/0x360
[  115.507186]  test_krealloc+0x1dc/0x830
[  115.510919]  kunit_try_run_case+0x170/0x3f0
[  115.515086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  115.520554]  kthread+0x328/0x630
[  115.523766]  ret_from_fork+0x10/0x20
[  115.527326] 
[  115.528812] CPU: 3 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  115.539921] Tainted: [B]=BAD_PAGE, [N]=TEST
[  115.544080] Hardware name: WinLink E850-96 board (DT)
[  115.549117] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  115.209340] ==================================================================
[  115.209484] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[  115.209484] 
[  115.209651] Use-after-free read at 0x(____ptrval____) (in kfence-#211):
[  115.210540]  test_memcache_typesafe_by_rcu+0x280/0x560
[  115.215660]  kunit_try_run_case+0x170/0x3f0
[  115.219827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  115.225295]  kthread+0x328/0x630
[  115.228507]  ret_from_fork+0x10/0x20
[  115.232066] 
[  115.233544] kfence-#211: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[  115.233544] 
[  115.242660] allocated by task 419 on cpu 7 at 115.165812s (0.076844s ago):
[  115.249532]  test_alloc+0x230/0x628
[  115.252985]  test_memcache_typesafe_by_rcu+0x15c/0x560
[  115.258107]  kunit_try_run_case+0x170/0x3f0
[  115.262274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  115.267743]  kthread+0x328/0x630
[  115.270954]  ret_from_fork+0x10/0x20
[  115.274515] 
[  115.275991] freed by task 419 on cpu 7 at 115.165830s (0.110158s ago):
[  115.282512]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[  115.287621]  kunit_try_run_case+0x170/0x3f0
[  115.291787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  115.297256]  kthread+0x328/0x630
[  115.300468]  ret_from_fork+0x10/0x20
[  115.304028] 
[  115.305514] CPU: 7 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  115.316622] Tainted: [B]=BAD_PAGE, [N]=TEST
[  115.320781] Hardware name: WinLink E850-96 board (DT)
[  115.325818] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   91.986200] ==================================================================
[   91.986400] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   91.986400] 
[   91.986562] Invalid read at 0x(____ptrval____):
[   91.987666]  test_invalid_access+0xdc/0x1f0
[   91.991892]  kunit_try_run_case+0x170/0x3f0
[   91.996050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   92.001505]  kthread+0x328/0x630
[   92.004730]  ret_from_fork+0x10/0x20
[   92.008287] 
[   92.009771] CPU: 2 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   92.020875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   92.025039] Hardware name: WinLink E850-96 board (DT)
[   92.030074] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   91.637852] ==================================================================
[   91.637984] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   91.637984] 
[   91.638135] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#206):
[   91.641818]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   91.647026]  kunit_try_run_case+0x170/0x3f0
[   91.651193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.656661]  kthread+0x328/0x630
[   91.659873]  ret_from_fork+0x10/0x20
[   91.663432] 
[   91.664911] kfence-#206: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   91.664911] 
[   91.674547] allocated by task 409 on cpu 4 at 91.637775s (0.036770s ago):
[   91.681332]  test_alloc+0x29c/0x628
[   91.684786]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   91.689907]  kunit_try_run_case+0x170/0x3f0
[   91.694073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.699544]  kthread+0x328/0x630
[   91.702754]  ret_from_fork+0x10/0x20
[   91.706315] 
[   91.707791] freed by task 409 on cpu 4 at 91.637790s (0.069999s ago):
[   91.714231]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   91.719421]  kunit_try_run_case+0x170/0x3f0
[   91.723587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.729056]  kthread+0x328/0x630
[   91.732268]  ret_from_fork+0x10/0x20
[   91.735827] 
[   91.737313] CPU: 4 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   91.748423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   91.752581] Hardware name: WinLink E850-96 board (DT)
[   91.757618] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   91.425772] ==================================================================
[   91.425904] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   91.425904] 
[   91.426073] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#204):
[   91.431373]  test_kmalloc_aligned_oob_read+0x238/0x468
[   91.436491]  kunit_try_run_case+0x170/0x3f0
[   91.440658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.446126]  kthread+0x328/0x630
[   91.449338]  ret_from_fork+0x10/0x20
[   91.452897] 
[   91.454375] kfence-#204: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   91.454375] 
[   91.464010] allocated by task 407 on cpu 0 at 91.425736s (0.038272s ago):
[   91.470799]  test_alloc+0x29c/0x628
[   91.474251]  test_kmalloc_aligned_oob_read+0x100/0x468
[   91.479372]  kunit_try_run_case+0x170/0x3f0
[   91.483539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   91.489007]  kthread+0x328/0x630
[   91.492219]  ret_from_fork+0x10/0x20
[   91.495780] 
[   91.497265] CPU: 0 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   91.508373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   91.512533] Hardware name: WinLink E850-96 board (DT)
[   91.517569] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   86.169832] ==================================================================
[   86.169965] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   86.169965] 
[   86.170103] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#154):
[   86.172499]  test_corruption+0x278/0x378
[   86.176404]  kunit_try_run_case+0x170/0x3f0
[   86.180571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.186039]  kthread+0x328/0x630
[   86.189251]  ret_from_fork+0x10/0x20
[   86.192809] 
[   86.194287] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   86.194287] 
[   86.203923] allocated by task 395 on cpu 2 at 86.169757s (0.034163s ago):
[   86.210711]  test_alloc+0x29c/0x628
[   86.214163]  test_corruption+0xdc/0x378
[   86.217982]  kunit_try_run_case+0x170/0x3f0
[   86.222150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.227618]  kthread+0x328/0x630
[   86.230830]  ret_from_fork+0x10/0x20
[   86.234390] 
[   86.235866] freed by task 395 on cpu 2 at 86.169773s (0.066091s ago):
[   86.242312]  test_corruption+0x278/0x378
[   86.246194]  kunit_try_run_case+0x170/0x3f0
[   86.250360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.255829]  kthread+0x328/0x630
[   86.259042]  ret_from_fork+0x10/0x20
[   86.262602] 
[   86.264086] CPU: 2 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   86.275196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.279354] Hardware name: WinLink E850-96 board (DT)
[   86.284391] ==================================================================
[   86.717816] ==================================================================
[   86.717940] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   86.717940] 
[   86.718073] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#159):
[   86.720474]  test_corruption+0x120/0x378
[   86.724379]  kunit_try_run_case+0x170/0x3f0
[   86.728546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.734014]  kthread+0x328/0x630
[   86.737226]  ret_from_fork+0x10/0x20
[   86.740785] 
[   86.742263] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   86.742263] 
[   86.751378] allocated by task 397 on cpu 3 at 86.717744s (0.033631s ago):
[   86.758162]  test_alloc+0x230/0x628
[   86.761618]  test_corruption+0xdc/0x378
[   86.765437]  kunit_try_run_case+0x170/0x3f0
[   86.769605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.775073]  kthread+0x328/0x630
[   86.778285]  ret_from_fork+0x10/0x20
[   86.781845] 
[   86.783323] freed by task 397 on cpu 3 at 86.717761s (0.065558s ago):
[   86.789765]  test_corruption+0x120/0x378
[   86.793649]  kunit_try_run_case+0x170/0x3f0
[   86.797816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.803284]  kthread+0x328/0x630
[   86.806496]  ret_from_fork+0x10/0x20
[   86.810056] 
[   86.811542] CPU: 3 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   86.822649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.826809] Hardware name: WinLink E850-96 board (DT)
[   86.831847] ==================================================================
[   86.497823] ==================================================================
[   86.497956] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   86.497956] 
[   86.498090] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#157):
[   86.498252]  test_corruption+0x284/0x378
[   86.501789]  kunit_try_run_case+0x170/0x3f0
[   86.505955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.511424]  kthread+0x328/0x630
[   86.514636]  ret_from_fork+0x10/0x20
[   86.518195] 
[   86.519673] kfence-#157: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   86.519673] 
[   86.529309] allocated by task 395 on cpu 2 at 86.497746s (0.031561s ago):
[   86.536096]  test_alloc+0x29c/0x628
[   86.539548]  test_corruption+0x198/0x378
[   86.543455]  kunit_try_run_case+0x170/0x3f0
[   86.547621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.553090]  kthread+0x328/0x630
[   86.556304]  ret_from_fork+0x10/0x20
[   86.559862] 
[   86.561341] freed by task 395 on cpu 2 at 86.497761s (0.063575s ago):
[   86.567778]  test_corruption+0x284/0x378
[   86.571669]  kunit_try_run_case+0x170/0x3f0
[   86.575833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.581301]  kthread+0x328/0x630
[   86.584513]  ret_from_fork+0x10/0x20
[   86.588074] 
[   86.589558] CPU: 2 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   86.600668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.604826] Hardware name: WinLink E850-96 board (DT)
[   86.609863] ==================================================================
[   86.941818] ==================================================================
[   86.941943] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   86.941943] 
[   86.942077] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#161):
[   86.942246]  test_corruption+0x1d8/0x378
[   86.945776]  kunit_try_run_case+0x170/0x3f0
[   86.949942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.955411]  kthread+0x328/0x630
[   86.958623]  ret_from_fork+0x10/0x20
[   86.962181] 
[   86.963659] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   86.963659] 
[   86.972774] allocated by task 397 on cpu 3 at 86.941747s (0.031025s ago):
[   86.979559]  test_alloc+0x230/0x628
[   86.983016]  test_corruption+0x198/0x378
[   86.986921]  kunit_try_run_case+0x170/0x3f0
[   86.991087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.996556]  kthread+0x328/0x630
[   86.999768]  ret_from_fork+0x10/0x20
[   87.003328] 
[   87.004805] freed by task 397 on cpu 3 at 86.941761s (0.063041s ago):
[   87.011247]  test_corruption+0x1d8/0x378
[   87.015132]  kunit_try_run_case+0x170/0x3f0
[   87.019299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.024768]  kthread+0x328/0x630
[   87.027979]  ret_from_fork+0x10/0x20
[   87.031540] 
[   87.033024] CPU: 3 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   87.044133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.048293] Hardware name: WinLink E850-96 board (DT)
[   87.053330] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   85.753807] ==================================================================
[   85.753939] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   85.753939] 
[   85.754079] Invalid free of 0x(____ptrval____) (in kfence-#150):
[   85.754183]  test_invalid_addr_free+0x1ac/0x238
[   85.757685]  kunit_try_run_case+0x170/0x3f0
[   85.761852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.767321]  kthread+0x328/0x630
[   85.770532]  ret_from_fork+0x10/0x20
[   85.774091] 
[   85.775570] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   85.775570] 
[   85.785205] allocated by task 391 on cpu 2 at 85.753750s (0.031452s ago):
[   85.791992]  test_alloc+0x29c/0x628
[   85.795445]  test_invalid_addr_free+0xd4/0x238
[   85.799872]  kunit_try_run_case+0x170/0x3f0
[   85.804038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.809509]  kthread+0x328/0x630
[   85.812719]  ret_from_fork+0x10/0x20
[   85.816279] 
[   85.817765] CPU: 2 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   85.828873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.833033] Hardware name: WinLink E850-96 board (DT)
[   85.838069] ==================================================================
[   85.961805] ==================================================================
[   85.961934] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   85.961934] 
[   85.962066] Invalid free of 0x(____ptrval____) (in kfence-#152):
[   85.962176]  test_invalid_addr_free+0xec/0x238
[   85.965507]  kunit_try_run_case+0x170/0x3f0
[   85.969674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.975143]  kthread+0x328/0x630
[   85.978354]  ret_from_fork+0x10/0x20
[   85.981913] 
[   85.983391] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.983391] 
[   85.992506] allocated by task 393 on cpu 3 at 85.961745s (0.030759s ago):
[   85.999292]  test_alloc+0x230/0x628
[   86.002746]  test_invalid_addr_free+0xd4/0x238
[   86.007174]  kunit_try_run_case+0x170/0x3f0
[   86.011340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.016808]  kthread+0x328/0x630
[   86.020020]  ret_from_fork+0x10/0x20
[   86.023580] 
[   86.025066] CPU: 3 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   86.036175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.040334] Hardware name: WinLink E850-96 board (DT)
[   86.045370] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   85.313843] ==================================================================
[   85.313978] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   85.313978] 
[   85.314106] Invalid free of 0x(____ptrval____) (in kfence-#146):
[   85.314210]  test_double_free+0x1bc/0x238
[   85.316683]  kunit_try_run_case+0x170/0x3f0
[   85.320850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.326318]  kthread+0x328/0x630
[   85.329530]  ret_from_fork+0x10/0x20
[   85.333089] 
[   85.334567] kfence-#146: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   85.334567] 
[   85.344202] allocated by task 387 on cpu 5 at 85.313761s (0.030439s ago):
[   85.350986]  test_alloc+0x29c/0x628
[   85.354443]  test_double_free+0xd4/0x238
[   85.358349]  kunit_try_run_case+0x170/0x3f0
[   85.362516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.367984]  kthread+0x328/0x630
[   85.371197]  ret_from_fork+0x10/0x20
[   85.374757] 
[   85.376234] freed by task 387 on cpu 5 at 85.313777s (0.062452s ago):
[   85.382675]  test_double_free+0x1ac/0x238
[   85.386648]  kunit_try_run_case+0x170/0x3f0
[   85.390814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.396283]  kthread+0x328/0x630
[   85.399494]  ret_from_fork+0x10/0x20
[   85.403055] 
[   85.404540] CPU: 5 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   85.415648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.419808] Hardware name: WinLink E850-96 board (DT)
[   85.424845] ==================================================================
[   85.533824] ==================================================================
[   85.533954] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   85.533954] 
[   85.534091] Invalid free of 0x(____ptrval____) (in kfence-#148):
[   85.534196]  test_double_free+0x100/0x238
[   85.536659]  kunit_try_run_case+0x170/0x3f0
[   85.540825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.546294]  kthread+0x328/0x630
[   85.549506]  ret_from_fork+0x10/0x20
[   85.553065] 
[   85.554543] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.554543] 
[   85.563657] allocated by task 389 on cpu 2 at 85.533747s (0.029908s ago):
[   85.570445]  test_alloc+0x230/0x628
[   85.573898]  test_double_free+0xd4/0x238
[   85.577804]  kunit_try_run_case+0x170/0x3f0
[   85.581971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.587440]  kthread+0x328/0x630
[   85.590651]  ret_from_fork+0x10/0x20
[   85.594211] 
[   85.595690] freed by task 389 on cpu 2 at 85.533763s (0.061922s ago):
[   85.602130]  test_double_free+0xf0/0x238
[   85.606016]  kunit_try_run_case+0x170/0x3f0
[   85.610183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.615651]  kthread+0x328/0x630
[   85.618863]  ret_from_fork+0x10/0x20
[   85.622423] 
[   85.623909] CPU: 2 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   85.635018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.639176] Hardware name: WinLink E850-96 board (DT)
[   85.644212] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   84.657811] ==================================================================
[   84.657949] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   84.657949] 
[   84.658108] Use-after-free read at 0x(____ptrval____) (in kfence-#140):
[   84.658570]  test_use_after_free_read+0x114/0x248
[   84.663257]  kunit_try_run_case+0x170/0x3f0
[   84.667423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.672892]  kthread+0x328/0x630
[   84.676104]  ret_from_fork+0x10/0x20
[   84.679664] 
[   84.681142] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   84.681142] 
[   84.690776] allocated by task 379 on cpu 2 at 84.657752s (0.033022s ago):
[   84.697564]  test_alloc+0x29c/0x628
[   84.701017]  test_use_after_free_read+0xd0/0x248
[   84.705617]  kunit_try_run_case+0x170/0x3f0
[   84.709785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.715254]  kthread+0x328/0x630
[   84.718464]  ret_from_fork+0x10/0x20
[   84.722025] 
[   84.723501] freed by task 379 on cpu 2 at 84.657768s (0.065730s ago):
[   84.729942]  test_use_after_free_read+0x1c0/0x248
[   84.734610]  kunit_try_run_case+0x170/0x3f0
[   84.738776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.744245]  kthread+0x328/0x630
[   84.747457]  ret_from_fork+0x10/0x20
[   84.751017] 
[   84.752503] CPU: 2 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   84.763610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.767770] Hardware name: WinLink E850-96 board (DT)
[   84.772807] ==================================================================
[   84.881814] ==================================================================
[   84.881944] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   84.881944] 
[   84.882103] Use-after-free read at 0x(____ptrval____) (in kfence-#142):
[   84.882565]  test_use_after_free_read+0x114/0x248
[   84.887252]  kunit_try_run_case+0x170/0x3f0
[   84.891418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.896887]  kthread+0x328/0x630
[   84.900099]  ret_from_fork+0x10/0x20
[   84.903657] 
[   84.905137] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   84.905137] 
[   84.914251] allocated by task 381 on cpu 3 at 84.881760s (0.032488s ago):
[   84.921040]  test_alloc+0x230/0x628
[   84.924491]  test_use_after_free_read+0xd0/0x248
[   84.929092]  kunit_try_run_case+0x170/0x3f0
[   84.933258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.938728]  kthread+0x328/0x630
[   84.941939]  ret_from_fork+0x10/0x20
[   84.945499] 
[   84.946975] freed by task 381 on cpu 3 at 84.881774s (0.065199s ago):
[   84.953418]  test_use_after_free_read+0xf0/0x248
[   84.957997]  kunit_try_run_case+0x170/0x3f0
[   84.962164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.967632]  kthread+0x328/0x630
[   84.970845]  ret_from_fork+0x10/0x20
[   84.974405] 
[   84.975890] CPU: 3 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   84.987001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.991158] Hardware name: WinLink E850-96 board (DT)
[   84.996195] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   84.449772] ==================================================================
[   84.449900] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   84.449900] 
[   84.450060] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#138):
[   84.451218]  test_out_of_bounds_write+0x100/0x240
[   84.455903]  kunit_try_run_case+0x170/0x3f0
[   84.460069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.465538]  kthread+0x328/0x630
[   84.468750]  ret_from_fork+0x10/0x20
[   84.472309] 
[   84.473788] kfence-#138: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   84.473788] 
[   84.482902] allocated by task 377 on cpu 3 at 84.449738s (0.033160s ago):
[   84.489691]  test_alloc+0x230/0x628
[   84.493142]  test_out_of_bounds_write+0xc8/0x240
[   84.497743]  kunit_try_run_case+0x170/0x3f0
[   84.501909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.507378]  kthread+0x328/0x630
[   84.510589]  ret_from_fork+0x10/0x20
[   84.514150] 
[   84.515634] CPU: 3 UID: 0 PID: 377 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   84.526744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.530903] Hardware name: WinLink E850-96 board (DT)
[   84.535940] ==================================================================
[   84.241786] ==================================================================
[   84.241933] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   84.241933] 
[   84.242091] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#136):
[   84.243249]  test_out_of_bounds_write+0x100/0x240
[   84.247934]  kunit_try_run_case+0x170/0x3f0
[   84.252101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.257570]  kthread+0x328/0x630
[   84.260782]  ret_from_fork+0x10/0x20
[   84.264341] 
[   84.265819] kfence-#136: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   84.265819] 
[   84.275454] allocated by task 375 on cpu 2 at 84.241748s (0.033704s ago):
[   84.282242]  test_alloc+0x29c/0x628
[   84.285695]  test_out_of_bounds_write+0xc8/0x240
[   84.290296]  kunit_try_run_case+0x170/0x3f0
[   84.294462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.299930]  kthread+0x328/0x630
[   84.303142]  ret_from_fork+0x10/0x20
[   84.306703] 
[   84.308188] CPU: 2 UID: 0 PID: 375 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   84.319297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.323456] Hardware name: WinLink E850-96 board (DT)
[   84.328492] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   83.929777] ==================================================================
[   83.929910] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   83.929910] 
[   83.930065] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#133):
[   83.931140]  test_out_of_bounds_read+0x1c8/0x3e0
[   83.935739]  kunit_try_run_case+0x170/0x3f0
[   83.939905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.945374]  kthread+0x328/0x630
[   83.948586]  ret_from_fork+0x10/0x20
[   83.952145] 
[   83.953623] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   83.953623] 
[   83.962736] allocated by task 373 on cpu 2 at 83.929743s (0.032990s ago):
[   83.969525]  test_alloc+0x230/0x628
[   83.972978]  test_out_of_bounds_read+0x198/0x3e0
[   83.977578]  kunit_try_run_case+0x170/0x3f0
[   83.981745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.987214]  kthread+0x328/0x630
[   83.990427]  ret_from_fork+0x10/0x20
[   83.993986] 
[   83.995472] CPU: 2 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   84.006579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.010739] Hardware name: WinLink E850-96 board (DT)
[   84.015776] ==================================================================
[   83.617783] ==================================================================
[   83.617916] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   83.617916] 
[   83.618074] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#130):
[   83.618973]  test_out_of_bounds_read+0x114/0x3e0
[   83.623572]  kunit_try_run_case+0x170/0x3f0
[   83.627739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.633208]  kthread+0x328/0x630
[   83.636419]  ret_from_fork+0x10/0x20
[   83.639978] 
[   83.641458] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   83.641458] 
[   83.650571] allocated by task 373 on cpu 2 at 83.617748s (0.032820s ago):
[   83.657359]  test_alloc+0x230/0x628
[   83.660811]  test_out_of_bounds_read+0xdc/0x3e0
[   83.665325]  kunit_try_run_case+0x170/0x3f0
[   83.669492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.674961]  kthread+0x328/0x630
[   83.678172]  ret_from_fork+0x10/0x20
[   83.681733] 
[   83.683218] CPU: 2 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   83.694328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.698486] Hardware name: WinLink E850-96 board (DT)
[   83.703522] ==================================================================
[   83.097782] ==================================================================
[   83.097903] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   83.097903] 
[   83.098063] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#125):
[   83.098964]  test_out_of_bounds_read+0x114/0x3e0
[   83.103562]  kunit_try_run_case+0x170/0x3f0
[   83.107728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.113197]  kthread+0x328/0x630
[   83.116409]  ret_from_fork+0x10/0x20
[   83.119967] 
[   83.121446] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   83.121446] 
[   83.131083] allocated by task 371 on cpu 3 at 83.097748s (0.033330s ago):
[   83.137870]  test_alloc+0x29c/0x628
[   83.141321]  test_out_of_bounds_read+0xdc/0x3e0
[   83.145835]  kunit_try_run_case+0x170/0x3f0
[   83.150002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.155470]  kthread+0x328/0x630
[   83.158682]  ret_from_fork+0x10/0x20
[   83.162243] 
[   83.163728] CPU: 3 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   83.174836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.178996] Hardware name: WinLink E850-96 board (DT)
[   83.184033] ==================================================================
[   83.305778] ==================================================================
[   83.305902] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   83.305902] 
[   83.306053] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#127):
[   83.307133]  test_out_of_bounds_read+0x1c8/0x3e0
[   83.311732]  kunit_try_run_case+0x170/0x3f0
[   83.315899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.321368]  kthread+0x328/0x630
[   83.324579]  ret_from_fork+0x10/0x20
[   83.328138] 
[   83.329617] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   83.329617] 
[   83.339251] allocated by task 371 on cpu 3 at 83.305747s (0.033503s ago):
[   83.346041]  test_alloc+0x29c/0x628
[   83.349492]  test_out_of_bounds_read+0x198/0x3e0
[   83.354093]  kunit_try_run_case+0x170/0x3f0
[   83.358259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.363728]  kthread+0x328/0x630
[   83.366940]  ret_from_fork+0x10/0x20
[   83.370500] 
[   83.371985] CPU: 3 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   83.383093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.387253] Hardware name: WinLink E850-96 board (DT)
[   83.392290] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-krealloc_less_oob_helper
[   39.780355] ==================================================================
[   39.802609] BUG: KFENCE: memory corruption in krealloc_less_oob_helper+0x4d0/0xc50
[   39.802609] 
[   39.811636] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#66):
[   39.821013]  krealloc_less_oob_helper+0x4d0/0xc50
[   39.825698]  krealloc_less_oob+0x20/0x38
[   39.829604]  kunit_try_run_case+0x170/0x3f0
[   39.833771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.839239]  kthread+0x328/0x630
[   39.842451]  ret_from_fork+0x10/0x20
[   39.846010] 
[   39.847488] kfence-#66: 0x(____ptrval____)-0x(____ptrval____), size=235, cache=kmalloc-256
[   39.847488] 
[   39.857210] allocated by task 242 on cpu 2 at 39.713821s (0.143386s ago):
[   39.863997]  krealloc_less_oob_helper+0x108/0xc50
[   39.868666]  krealloc_less_oob+0x20/0x38
[   39.872572]  kunit_try_run_case+0x170/0x3f0
[   39.876739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.882209]  kthread+0x328/0x630
[   39.885419]  ret_from_fork+0x10/0x20
[   39.888980] 
[   39.890456] freed by task 242 on cpu 2 at 39.780297s (0.110156s ago):
[   39.896902]  krealloc_less_oob_helper+0x4d0/0xc50
[   39.901564]  krealloc_less_oob+0x20/0x38
[   39.905471]  kunit_try_run_case+0x170/0x3f0
[   39.909638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.915108]  kthread+0x328/0x630
[   39.918318]  ret_from_fork+0x10/0x20
[   39.921879] 
[   39.923362] CPU: 2 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.934472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.938631] Hardware name: WinLink E850-96 board (DT)
[   39.943668] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   37.788207] ==================================================================
[   37.810887] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   37.810887] 
[   37.820433] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#58):
[   37.828421]  kmalloc_track_caller_oob_right+0x224/0x488
[   37.833627]  kunit_try_run_case+0x170/0x3f0
[   37.837794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.843262]  kthread+0x328/0x630
[   37.846474]  ret_from_fork+0x10/0x20
[   37.850033] 
[   37.851513] kfence-#58: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   37.851513] 
[   37.861235] allocated by task 226 on cpu 2 at 37.787858s (0.073373s ago):
[   37.868021]  kmalloc_track_caller_oob_right+0x184/0x488
[   37.873209]  kunit_try_run_case+0x170/0x3f0
[   37.877376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.882845]  kthread+0x328/0x630
[   37.886057]  ret_from_fork+0x10/0x20
[   37.889618] 
[   37.891094] freed by task 226 on cpu 2 at 37.788160s (0.102931s ago):
[   37.897536]  kmalloc_track_caller_oob_right+0x224/0x488
[   37.902723]  kunit_try_run_case+0x170/0x3f0
[   37.906890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.912359]  kthread+0x328/0x630
[   37.915572]  ret_from_fork+0x10/0x20
[   37.919131] 
[   37.920614] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   37.931727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.935884] Hardware name: WinLink E850-96 board (DT)
[   37.940920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   82.688843] ==================================================================
[   82.695926] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   82.702870] Write of size 1 at addr ffff0008074f9378 by task kunit_try_catch/369
[   82.710248] 
[   82.711732] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   82.711783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.711800] Hardware name: WinLink E850-96 board (DT)
[   82.711820] Call trace:
[   82.711831]  show_stack+0x20/0x38 (C)
[   82.711862]  dump_stack_lvl+0x8c/0xd0
[   82.711894]  print_report+0x118/0x5d0
[   82.711921]  kasan_report+0xdc/0x128
[   82.711948]  __asan_report_store1_noabort+0x20/0x30
[   82.711982]  strncpy_from_user+0x270/0x2a0
[   82.712017]  copy_user_test_oob+0x5c0/0xec8
[   82.712051]  kunit_try_run_case+0x170/0x3f0
[   82.712086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.712120]  kthread+0x328/0x630
[   82.712151]  ret_from_fork+0x10/0x20
[   82.712181] 
[   82.779951] Allocated by task 369:
[   82.783337]  kasan_save_stack+0x3c/0x68
[   82.787156]  kasan_save_track+0x20/0x40
[   82.790976]  kasan_save_alloc_info+0x40/0x58
[   82.795229]  __kasan_kmalloc+0xd4/0xd8
[   82.798962]  __kmalloc_noprof+0x198/0x4c8
[   82.802955]  kunit_kmalloc_array+0x34/0x88
[   82.807034]  copy_user_test_oob+0xac/0xec8
[   82.811114]  kunit_try_run_case+0x170/0x3f0
[   82.815281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.820750]  kthread+0x328/0x630
[   82.823961]  ret_from_fork+0x10/0x20
[   82.827520] 
[   82.828996] The buggy address belongs to the object at ffff0008074f9300
[   82.828996]  which belongs to the cache kmalloc-128 of size 128
[   82.841498] The buggy address is located 0 bytes to the right of
[   82.841498]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   82.854430] 
[   82.855907] The buggy address belongs to the physical page:
[   82.861462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   82.869447] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.877085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.884030] page_type: f5(slab)
[   82.887163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.894887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.902614] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.910425] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.918238] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   82.926050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.933856] page dumped because: kasan: bad access detected
[   82.939411] 
[   82.940887] Memory state around the buggy address:
[   82.945665]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.952869]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.960074] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.967275]                                                                 ^
[   82.974397]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.981602]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.988803] ==================================================================
[   82.378794] ==================================================================
[   82.385862] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   82.392718] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   82.400270] 
[   82.401754] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   82.401804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.401820] Hardware name: WinLink E850-96 board (DT)
[   82.401841] Call trace:
[   82.401855]  show_stack+0x20/0x38 (C)
[   82.401887]  dump_stack_lvl+0x8c/0xd0
[   82.401920]  print_report+0x118/0x5d0
[   82.401948]  kasan_report+0xdc/0x128
[   82.401975]  kasan_check_range+0x100/0x1a8
[   82.402005]  __kasan_check_write+0x20/0x30
[   82.402036]  strncpy_from_user+0x3c/0x2a0
[   82.402073]  copy_user_test_oob+0x5c0/0xec8
[   82.402108]  kunit_try_run_case+0x170/0x3f0
[   82.402144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.402178]  kthread+0x328/0x630
[   82.402207]  ret_from_fork+0x10/0x20
[   82.402239] 
[   82.473185] Allocated by task 369:
[   82.476572]  kasan_save_stack+0x3c/0x68
[   82.480390]  kasan_save_track+0x20/0x40
[   82.484209]  kasan_save_alloc_info+0x40/0x58
[   82.488463]  __kasan_kmalloc+0xd4/0xd8
[   82.492196]  __kmalloc_noprof+0x198/0x4c8
[   82.496189]  kunit_kmalloc_array+0x34/0x88
[   82.500268]  copy_user_test_oob+0xac/0xec8
[   82.504348]  kunit_try_run_case+0x170/0x3f0
[   82.508515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.513983]  kthread+0x328/0x630
[   82.517195]  ret_from_fork+0x10/0x20
[   82.520754] 
[   82.522229] The buggy address belongs to the object at ffff0008074f9300
[   82.522229]  which belongs to the cache kmalloc-128 of size 128
[   82.534732] The buggy address is located 0 bytes inside of
[   82.534732]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   82.547143] 
[   82.548620] The buggy address belongs to the physical page:
[   82.554176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   82.562160] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.569798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.576743] page_type: f5(slab)
[   82.579878] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.587600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.595326] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.603138] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.610951] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   82.618762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.626569] page dumped because: kasan: bad access detected
[   82.632124] 
[   82.633600] Memory state around the buggy address:
[   82.638379]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.645582]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.652787] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.659988]                                                                 ^
[   82.667110]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.674314]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.681516] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   82.072803] ==================================================================
[   82.079793] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   82.086820] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   82.094285] 
[   82.095770] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   82.095825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.095839] Hardware name: WinLink E850-96 board (DT)
[   82.095859] Call trace:
[   82.095874]  show_stack+0x20/0x38 (C)
[   82.095908]  dump_stack_lvl+0x8c/0xd0
[   82.095940]  print_report+0x118/0x5d0
[   82.095966]  kasan_report+0xdc/0x128
[   82.095991]  kasan_check_range+0x100/0x1a8
[   82.096025]  __kasan_check_read+0x20/0x30
[   82.096055]  copy_user_test_oob+0x4a0/0xec8
[   82.096089]  kunit_try_run_case+0x170/0x3f0
[   82.096123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.096157]  kthread+0x328/0x630
[   82.096186]  ret_from_fork+0x10/0x20
[   82.096219] 
[   82.163120] Allocated by task 369:
[   82.166508]  kasan_save_stack+0x3c/0x68
[   82.170325]  kasan_save_track+0x20/0x40
[   82.174145]  kasan_save_alloc_info+0x40/0x58
[   82.178398]  __kasan_kmalloc+0xd4/0xd8
[   82.182131]  __kmalloc_noprof+0x198/0x4c8
[   82.186123]  kunit_kmalloc_array+0x34/0x88
[   82.190203]  copy_user_test_oob+0xac/0xec8
[   82.194283]  kunit_try_run_case+0x170/0x3f0
[   82.198450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.203918]  kthread+0x328/0x630
[   82.207130]  ret_from_fork+0x10/0x20
[   82.210689] 
[   82.212165] The buggy address belongs to the object at ffff0008074f9300
[   82.212165]  which belongs to the cache kmalloc-128 of size 128
[   82.224666] The buggy address is located 0 bytes inside of
[   82.224666]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   82.237078] 
[   82.238555] The buggy address belongs to the physical page:
[   82.244113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   82.252095] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.259734] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.266678] page_type: f5(slab)
[   82.269812] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.277535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.285262] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   82.293073] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.300886] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   82.308697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.316504] page dumped because: kasan: bad access detected
[   82.322059] 
[   82.323535] Memory state around the buggy address:
[   82.328315]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.335518]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.342722] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.349923]                                                                 ^
[   82.357045]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.364250]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.371451] ==================================================================
[   80.848610] ==================================================================
[   80.855163] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   80.862186] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   80.869650] 
[   80.871136] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   80.871194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.871213] Hardware name: WinLink E850-96 board (DT)
[   80.871235] Call trace:
[   80.871250]  show_stack+0x20/0x38 (C)
[   80.871288]  dump_stack_lvl+0x8c/0xd0
[   80.871322]  print_report+0x118/0x5d0
[   80.871354]  kasan_report+0xdc/0x128
[   80.871382]  kasan_check_range+0x100/0x1a8
[   80.871412]  __kasan_check_read+0x20/0x30
[   80.871446]  copy_user_test_oob+0x728/0xec8
[   80.871480]  kunit_try_run_case+0x170/0x3f0
[   80.871519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.871554]  kthread+0x328/0x630
[   80.871582]  ret_from_fork+0x10/0x20
[   80.871619] 
[   80.938487] Allocated by task 369:
[   80.941873]  kasan_save_stack+0x3c/0x68
[   80.945691]  kasan_save_track+0x20/0x40
[   80.949512]  kasan_save_alloc_info+0x40/0x58
[   80.953764]  __kasan_kmalloc+0xd4/0xd8
[   80.957496]  __kmalloc_noprof+0x198/0x4c8
[   80.961489]  kunit_kmalloc_array+0x34/0x88
[   80.965569]  copy_user_test_oob+0xac/0xec8
[   80.969649]  kunit_try_run_case+0x170/0x3f0
[   80.973816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.979284]  kthread+0x328/0x630
[   80.982496]  ret_from_fork+0x10/0x20
[   80.986055] 
[   80.987532] The buggy address belongs to the object at ffff0008074f9300
[   80.987532]  which belongs to the cache kmalloc-128 of size 128
[   81.000033] The buggy address is located 0 bytes inside of
[   81.000033]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   81.012443] 
[   81.013922] The buggy address belongs to the physical page:
[   81.019479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   81.027461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.035104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.042046] page_type: f5(slab)
[   81.045182] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.052901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.060627] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.068438] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.076252] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   81.084063] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.091869] page dumped because: kasan: bad access detected
[   81.097425] 
[   81.098900] Memory state around the buggy address:
[   81.103680]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   81.110883]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.118088] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.125289]                                                                 ^
[   81.132411]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.139616]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.146816] ==================================================================
[   81.460406] ==================================================================
[   81.467478] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   81.474503] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   81.481968] 
[   81.483453] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   81.483505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.483523] Hardware name: WinLink E850-96 board (DT)
[   81.483543] Call trace:
[   81.483557]  show_stack+0x20/0x38 (C)
[   81.483591]  dump_stack_lvl+0x8c/0xd0
[   81.483623]  print_report+0x118/0x5d0
[   81.483652]  kasan_report+0xdc/0x128
[   81.483680]  kasan_check_range+0x100/0x1a8
[   81.483711]  __kasan_check_read+0x20/0x30
[   81.483743]  copy_user_test_oob+0x3c8/0xec8
[   81.483779]  kunit_try_run_case+0x170/0x3f0
[   81.483818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.483851]  kthread+0x328/0x630
[   81.483882]  ret_from_fork+0x10/0x20
[   81.483917] 
[   81.550803] Allocated by task 369:
[   81.554191]  kasan_save_stack+0x3c/0x68
[   81.558008]  kasan_save_track+0x20/0x40
[   81.561827]  kasan_save_alloc_info+0x40/0x58
[   81.566081]  __kasan_kmalloc+0xd4/0xd8
[   81.569814]  __kmalloc_noprof+0x198/0x4c8
[   81.573807]  kunit_kmalloc_array+0x34/0x88
[   81.577886]  copy_user_test_oob+0xac/0xec8
[   81.581966]  kunit_try_run_case+0x170/0x3f0
[   81.586133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.591602]  kthread+0x328/0x630
[   81.594813]  ret_from_fork+0x10/0x20
[   81.598372] 
[   81.599849] The buggy address belongs to the object at ffff0008074f9300
[   81.599849]  which belongs to the cache kmalloc-128 of size 128
[   81.612351] The buggy address is located 0 bytes inside of
[   81.612351]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   81.624761] 
[   81.626238] The buggy address belongs to the physical page:
[   81.631796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   81.639778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.647419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.654361] page_type: f5(slab)
[   81.657497] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.665218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.672944] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.680756] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.688569] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   81.696381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.704186] page dumped because: kasan: bad access detected
[   81.709742] 
[   81.711217] Memory state around the buggy address:
[   81.715999]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   81.723200]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.730405] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.737606]                                                                 ^
[   81.744728]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.751932]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.759134] ==================================================================
[   80.536556] ==================================================================
[   80.548913] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   80.555940] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   80.563492] 
[   80.564979] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   80.565039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.565058] Hardware name: WinLink E850-96 board (DT)
[   80.565081] Call trace:
[   80.565097]  show_stack+0x20/0x38 (C)
[   80.565136]  dump_stack_lvl+0x8c/0xd0
[   80.565172]  print_report+0x118/0x5d0
[   80.565201]  kasan_report+0xdc/0x128
[   80.565229]  kasan_check_range+0x100/0x1a8
[   80.565262]  __kasan_check_write+0x20/0x30
[   80.565296]  copy_user_test_oob+0x234/0xec8
[   80.565331]  kunit_try_run_case+0x170/0x3f0
[   80.565370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.565405]  kthread+0x328/0x630
[   80.565436]  ret_from_fork+0x10/0x20
[   80.565473] 
[   80.632416] Allocated by task 369:
[   80.635803]  kasan_save_stack+0x3c/0x68
[   80.639619]  kasan_save_track+0x20/0x40
[   80.643440]  kasan_save_alloc_info+0x40/0x58
[   80.647692]  __kasan_kmalloc+0xd4/0xd8
[   80.651424]  __kmalloc_noprof+0x198/0x4c8
[   80.655418]  kunit_kmalloc_array+0x34/0x88
[   80.659497]  copy_user_test_oob+0xac/0xec8
[   80.663577]  kunit_try_run_case+0x170/0x3f0
[   80.667744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.673212]  kthread+0x328/0x630
[   80.676424]  ret_from_fork+0x10/0x20
[   80.679983] 
[   80.681460] The buggy address belongs to the object at ffff0008074f9300
[   80.681460]  which belongs to the cache kmalloc-128 of size 128
[   80.693962] The buggy address is located 0 bytes inside of
[   80.693962]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   80.706371] 
[   80.707850] The buggy address belongs to the physical page:
[   80.713408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   80.721391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   80.729031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   80.735973] page_type: f5(slab)
[   80.739110] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.746829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.754557] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.762367] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.770180] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   80.777992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   80.785799] page dumped because: kasan: bad access detected
[   80.791352] 
[   80.792828] Memory state around the buggy address:
[   80.797607]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   80.804811]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.812018] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   80.819219]                                                                 ^
[   80.826339]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.833545]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.840746] ==================================================================
[   81.154371] ==================================================================
[   81.161230] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   81.168257] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   81.175809] 
[   81.177294] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   81.177347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.177365] Hardware name: WinLink E850-96 board (DT)
[   81.177384] Call trace:
[   81.177398]  show_stack+0x20/0x38 (C)
[   81.177435]  dump_stack_lvl+0x8c/0xd0
[   81.177470]  print_report+0x118/0x5d0
[   81.177498]  kasan_report+0xdc/0x128
[   81.177526]  kasan_check_range+0x100/0x1a8
[   81.177556]  __kasan_check_write+0x20/0x30
[   81.177589]  copy_user_test_oob+0x35c/0xec8
[   81.177622]  kunit_try_run_case+0x170/0x3f0
[   81.177660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.177692]  kthread+0x328/0x630
[   81.177719]  ret_from_fork+0x10/0x20
[   81.177753] 
[   81.244732] Allocated by task 369:
[   81.248119]  kasan_save_stack+0x3c/0x68
[   81.251936]  kasan_save_track+0x20/0x40
[   81.255756]  kasan_save_alloc_info+0x40/0x58
[   81.260009]  __kasan_kmalloc+0xd4/0xd8
[   81.263742]  __kmalloc_noprof+0x198/0x4c8
[   81.267735]  kunit_kmalloc_array+0x34/0x88
[   81.271815]  copy_user_test_oob+0xac/0xec8
[   81.275894]  kunit_try_run_case+0x170/0x3f0
[   81.280061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.285530]  kthread+0x328/0x630
[   81.288741]  ret_from_fork+0x10/0x20
[   81.292300] 
[   81.293777] The buggy address belongs to the object at ffff0008074f9300
[   81.293777]  which belongs to the cache kmalloc-128 of size 128
[   81.306278] The buggy address is located 0 bytes inside of
[   81.306278]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   81.318689] 
[   81.320167] The buggy address belongs to the physical page:
[   81.325725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   81.333707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.341345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.348290] page_type: f5(slab)
[   81.351425] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.359146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.366873] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.374684] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.382497] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   81.390309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.398115] page dumped because: kasan: bad access detected
[   81.403670] 
[   81.405146] Memory state around the buggy address:
[   81.409925]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   81.417128]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.424333] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.431534]                                                                 ^
[   81.438656]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.445860]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.453062] ==================================================================
[   81.766677] ==================================================================
[   81.773551] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   81.780574] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369
[   81.788126] 
[   81.789610] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   81.789666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.789683] Hardware name: WinLink E850-96 board (DT)
[   81.789704] Call trace:
[   81.789720]  show_stack+0x20/0x38 (C)
[   81.789756]  dump_stack_lvl+0x8c/0xd0
[   81.789787]  print_report+0x118/0x5d0
[   81.789815]  kasan_report+0xdc/0x128
[   81.789842]  kasan_check_range+0x100/0x1a8
[   81.789874]  __kasan_check_write+0x20/0x30
[   81.789905]  copy_user_test_oob+0x434/0xec8
[   81.789938]  kunit_try_run_case+0x170/0x3f0
[   81.789974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.790009]  kthread+0x328/0x630
[   81.790038]  ret_from_fork+0x10/0x20
[   81.790073] 
[   81.857049] Allocated by task 369:
[   81.860436]  kasan_save_stack+0x3c/0x68
[   81.864254]  kasan_save_track+0x20/0x40
[   81.868073]  kasan_save_alloc_info+0x40/0x58
[   81.872326]  __kasan_kmalloc+0xd4/0xd8
[   81.876059]  __kmalloc_noprof+0x198/0x4c8
[   81.880052]  kunit_kmalloc_array+0x34/0x88
[   81.884132]  copy_user_test_oob+0xac/0xec8
[   81.888211]  kunit_try_run_case+0x170/0x3f0
[   81.892378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.897847]  kthread+0x328/0x630
[   81.901059]  ret_from_fork+0x10/0x20
[   81.904618] 
[   81.906093] The buggy address belongs to the object at ffff0008074f9300
[   81.906093]  which belongs to the cache kmalloc-128 of size 128
[   81.918596] The buggy address is located 0 bytes inside of
[   81.918596]  allocated 120-byte region [ffff0008074f9300, ffff0008074f9378)
[   81.931006] 
[   81.932483] The buggy address belongs to the physical page:
[   81.938041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   81.946023] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.953665] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.960606] page_type: f5(slab)
[   81.963742] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.971463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.979190] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   81.987001] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.994814] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   82.002626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.010432] page dumped because: kasan: bad access detected
[   82.015987] 
[   82.017463] Memory state around the buggy address:
[   82.022243]  ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.029446]  ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.036651] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.043852]                                                                 ^
[   82.050973]  ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.058178]  ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.065379] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   79.909051] ==================================================================
[   79.923314] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   79.930690] Read of size 8 at addr ffff000801e0bf78 by task kunit_try_catch/365
[   79.937981] 
[   79.939469] CPU: 5 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   79.939525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.939542] Hardware name: WinLink E850-96 board (DT)
[   79.939567] Call trace:
[   79.939581]  show_stack+0x20/0x38 (C)
[   79.939620]  dump_stack_lvl+0x8c/0xd0
[   79.939656]  print_report+0x118/0x5d0
[   79.939686]  kasan_report+0xdc/0x128
[   79.939715]  __asan_report_load8_noabort+0x20/0x30
[   79.939753]  copy_to_kernel_nofault+0x204/0x250
[   79.939789]  copy_to_kernel_nofault_oob+0x158/0x418
[   79.939824]  kunit_try_run_case+0x170/0x3f0
[   79.939864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.939898]  kthread+0x328/0x630
[   79.939930]  ret_from_fork+0x10/0x20
[   79.939969] 
[   80.008727] Allocated by task 365:
[   80.012113]  kasan_save_stack+0x3c/0x68
[   80.015930]  kasan_save_track+0x20/0x40
[   80.019750]  kasan_save_alloc_info+0x40/0x58
[   80.024003]  __kasan_kmalloc+0xd4/0xd8
[   80.027736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.032250]  copy_to_kernel_nofault_oob+0xc8/0x418
[   80.037024]  kunit_try_run_case+0x170/0x3f0
[   80.041190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.046659]  kthread+0x328/0x630
[   80.049871]  ret_from_fork+0x10/0x20
[   80.053430] 
[   80.054907] The buggy address belongs to the object at ffff000801e0bf00
[   80.054907]  which belongs to the cache kmalloc-128 of size 128
[   80.067409] The buggy address is located 0 bytes to the right of
[   80.067409]  allocated 120-byte region [ffff000801e0bf00, ffff000801e0bf78)
[   80.080340] 
[   80.081819] The buggy address belongs to the physical page:
[   80.087376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   80.095359] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   80.102998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   80.109941] page_type: f5(slab)
[   80.113078] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.120797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.128525] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.136334] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.144147] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   80.151960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   80.159767] page dumped because: kasan: bad access detected
[   80.165321] 
[   80.166798] Memory state around the buggy address:
[   80.171578]  ffff000801e0be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   80.178779]  ffff000801e0be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.185985] >ffff000801e0bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   80.193185]                                                                 ^
[   80.200306]  ffff000801e0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.207512]  ffff000801e0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.214714] ==================================================================
[   80.222149] ==================================================================
[   80.229126] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   80.236413] Write of size 8 at addr ffff000801e0bf78 by task kunit_try_catch/365
[   80.243792] 
[   80.245278] CPU: 5 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   80.245335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.245350] Hardware name: WinLink E850-96 board (DT)
[   80.245372] Call trace:
[   80.245387]  show_stack+0x20/0x38 (C)
[   80.245422]  dump_stack_lvl+0x8c/0xd0
[   80.245456]  print_report+0x118/0x5d0
[   80.245486]  kasan_report+0xdc/0x128
[   80.245516]  kasan_check_range+0x100/0x1a8
[   80.245548]  __kasan_check_write+0x20/0x30
[   80.245581]  copy_to_kernel_nofault+0x8c/0x250
[   80.245616]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   80.245650]  kunit_try_run_case+0x170/0x3f0
[   80.245686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.245718]  kthread+0x328/0x630
[   80.245747]  ret_from_fork+0x10/0x20
[   80.245781] 
[   80.317836] Allocated by task 365:
[   80.321223]  kasan_save_stack+0x3c/0x68
[   80.325040]  kasan_save_track+0x20/0x40
[   80.328860]  kasan_save_alloc_info+0x40/0x58
[   80.333113]  __kasan_kmalloc+0xd4/0xd8
[   80.336846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.341360]  copy_to_kernel_nofault_oob+0xc8/0x418
[   80.346134]  kunit_try_run_case+0x170/0x3f0
[   80.350301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.355769]  kthread+0x328/0x630
[   80.358981]  ret_from_fork+0x10/0x20
[   80.362540] 
[   80.364017] The buggy address belongs to the object at ffff000801e0bf00
[   80.364017]  which belongs to the cache kmalloc-128 of size 128
[   80.376517] The buggy address is located 0 bytes to the right of
[   80.376517]  allocated 120-byte region [ffff000801e0bf00, ffff000801e0bf78)
[   80.389449] 
[   80.390928] The buggy address belongs to the physical page:
[   80.396485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   80.404467] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   80.412106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   80.419050] page_type: f5(slab)
[   80.422186] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.429907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.437633] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   80.445445] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.453258] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   80.461070] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   80.468877] page dumped because: kasan: bad access detected
[   80.474431] 
[   80.475908] Memory state around the buggy address:
[   80.480686]  ffff000801e0be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   80.487889]  ffff000801e0be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.495094] >ffff000801e0bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   80.502295]                                                                 ^
[   80.509418]  ffff000801e0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.516623]  ffff000801e0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.523822] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   79.485248] ==================================================================
[   79.499710] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   79.506390] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/353
[   79.513683] 
[   79.515168] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   79.515222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.515239] Hardware name: WinLink E850-96 board (DT)
[   79.515262] Call trace:
[   79.515280]  show_stack+0x20/0x38 (C)
[   79.515317]  dump_stack_lvl+0x8c/0xd0
[   79.515351]  print_report+0x310/0x5d0
[   79.515381]  kasan_report+0xdc/0x128
[   79.515411]  __asan_report_load1_noabort+0x20/0x30
[   79.515446]  vmalloc_oob+0x578/0x5d0
[   79.515479]  kunit_try_run_case+0x170/0x3f0
[   79.515517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.515552]  kthread+0x328/0x630
[   79.515585]  ret_from_fork+0x10/0x20
[   79.515623] 
[   79.578614] The buggy address ffff800087c7d7f3 belongs to a vmalloc virtual mapping
[   79.586253] The buggy address belongs to the physical page:
[   79.591810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847c6
[   79.599793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.606314] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   79.614034] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   79.621753] page dumped because: kasan: bad access detected
[   79.627308] 
[   79.628783] Memory state around the buggy address:
[   79.633565]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   79.640766]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   79.647972] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   79.655172]                                                              ^
[   79.662035]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   79.669238]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   79.676440] ==================================================================
[   79.683837] ==================================================================
[   79.690853] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   79.697534] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/353
[   79.704824] 
[   79.706309] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   79.706362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.706379] Hardware name: WinLink E850-96 board (DT)
[   79.706399] Call trace:
[   79.706413]  show_stack+0x20/0x38 (C)
[   79.706447]  dump_stack_lvl+0x8c/0xd0
[   79.706480]  print_report+0x310/0x5d0
[   79.706508]  kasan_report+0xdc/0x128
[   79.706535]  __asan_report_load1_noabort+0x20/0x30
[   79.706572]  vmalloc_oob+0x51c/0x5d0
[   79.706607]  kunit_try_run_case+0x170/0x3f0
[   79.706644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.706677]  kthread+0x328/0x630
[   79.706708]  ret_from_fork+0x10/0x20
[   79.706744] 
[   79.769756] The buggy address ffff800087c7d7f8 belongs to a vmalloc virtual mapping
[   79.777395] The buggy address belongs to the physical page:
[   79.782949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847c6
[   79.790937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.797456] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   79.805176] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   79.812895] page dumped because: kasan: bad access detected
[   79.818451] 
[   79.819926] Memory state around the buggy address:
[   79.824705]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   79.831909]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   79.839114] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   79.846315]                                                                 ^
[   79.853438]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   79.860641]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   79.867842] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   66.800594] ==================================================================
[   66.807623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   66.814914] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.822292] 
[   66.823773] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.823822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.823838] Hardware name: WinLink E850-96 board (DT)
[   66.823857] Call trace:
[   66.823870]  show_stack+0x20/0x38 (C)
[   66.823902]  dump_stack_lvl+0x8c/0xd0
[   66.823937]  print_report+0x118/0x5d0
[   66.823963]  kasan_report+0xdc/0x128
[   66.823990]  kasan_check_range+0x100/0x1a8
[   66.824020]  __kasan_check_write+0x20/0x30
[   66.824054]  kasan_atomics_helper+0x760/0x4858
[   66.824088]  kasan_atomics+0x198/0x2e0
[   66.824120]  kunit_try_run_case+0x170/0x3f0
[   66.824154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.824188]  kthread+0x328/0x630
[   66.824217]  ret_from_fork+0x10/0x20
[   66.824251] 
[   66.895207] Allocated by task 349:
[   66.898596]  kasan_save_stack+0x3c/0x68
[   66.902412]  kasan_save_track+0x20/0x40
[   66.906232]  kasan_save_alloc_info+0x40/0x58
[   66.910485]  __kasan_kmalloc+0xd4/0xd8
[   66.914217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.918732]  kasan_atomics+0xb8/0x2e0
[   66.922377]  kunit_try_run_case+0x170/0x3f0
[   66.926544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.932013]  kthread+0x328/0x630
[   66.935224]  ret_from_fork+0x10/0x20
[   66.938783] 
[   66.940259] The buggy address belongs to the object at ffff000808448180
[   66.940259]  which belongs to the cache kmalloc-64 of size 64
[   66.952585] The buggy address is located 0 bytes to the right of
[   66.952585]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.965432] 
[   66.966908] The buggy address belongs to the physical page:
[   66.972465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.980449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.986960] page_type: f5(slab)
[   66.990094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.997817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.005536] page dumped because: kasan: bad access detected
[   67.011091] 
[   67.012567] Memory state around the buggy address:
[   67.017347]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.024550]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.031754] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.038955]                                      ^
[   67.043733]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.050938]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.058139] ==================================================================
[   72.867464] ==================================================================
[   72.874546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   72.881836] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.889215] 
[   72.890696] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.890746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.890762] Hardware name: WinLink E850-96 board (DT)
[   72.890781] Call trace:
[   72.890796]  show_stack+0x20/0x38 (C)
[   72.890828]  dump_stack_lvl+0x8c/0xd0
[   72.890862]  print_report+0x118/0x5d0
[   72.890891]  kasan_report+0xdc/0x128
[   72.890918]  kasan_check_range+0x100/0x1a8
[   72.890947]  __kasan_check_write+0x20/0x30
[   72.890980]  kasan_atomics_helper+0xf20/0x4858
[   72.891013]  kasan_atomics+0x198/0x2e0
[   72.891046]  kunit_try_run_case+0x170/0x3f0
[   72.891080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.891116]  kthread+0x328/0x630
[   72.891146]  ret_from_fork+0x10/0x20
[   72.891177] 
[   72.962130] Allocated by task 349:
[   72.965515]  kasan_save_stack+0x3c/0x68
[   72.969335]  kasan_save_track+0x20/0x40
[   72.973155]  kasan_save_alloc_info+0x40/0x58
[   72.977408]  __kasan_kmalloc+0xd4/0xd8
[   72.981140]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.985654]  kasan_atomics+0xb8/0x2e0
[   72.989300]  kunit_try_run_case+0x170/0x3f0
[   72.993467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.998935]  kthread+0x328/0x630
[   73.002147]  ret_from_fork+0x10/0x20
[   73.005706] 
[   73.007181] The buggy address belongs to the object at ffff000808448180
[   73.007181]  which belongs to the cache kmalloc-64 of size 64
[   73.019510] The buggy address is located 0 bytes to the right of
[   73.019510]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.032355] 
[   73.033831] The buggy address belongs to the physical page:
[   73.039388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.047373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.053882] page_type: f5(slab)
[   73.057017] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.064740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.072458] page dumped because: kasan: bad access detected
[   73.078014] 
[   73.079490] Memory state around the buggy address:
[   73.084267]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.091472]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.098677] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.105878]                                      ^
[   73.110656]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.117860]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.125062] ==================================================================
[   63.627851] ==================================================================
[   63.634928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   63.642305] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.649597] 
[   63.651078] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.651132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.651146] Hardware name: WinLink E850-96 board (DT)
[   63.651165] Call trace:
[   63.651178]  show_stack+0x20/0x38 (C)
[   63.651211]  dump_stack_lvl+0x8c/0xd0
[   63.651242]  print_report+0x118/0x5d0
[   63.651268]  kasan_report+0xdc/0x128
[   63.651294]  __asan_report_load4_noabort+0x20/0x30
[   63.651329]  kasan_atomics_helper+0x40fc/0x4858
[   63.651363]  kasan_atomics+0x198/0x2e0
[   63.651397]  kunit_try_run_case+0x170/0x3f0
[   63.651431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.651464]  kthread+0x328/0x630
[   63.651493]  ret_from_fork+0x10/0x20
[   63.651523] 
[   63.719213] Allocated by task 349:
[   63.722599]  kasan_save_stack+0x3c/0x68
[   63.726418]  kasan_save_track+0x20/0x40
[   63.730238]  kasan_save_alloc_info+0x40/0x58
[   63.734491]  __kasan_kmalloc+0xd4/0xd8
[   63.738224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.742737]  kasan_atomics+0xb8/0x2e0
[   63.746384]  kunit_try_run_case+0x170/0x3f0
[   63.750550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.756018]  kthread+0x328/0x630
[   63.759230]  ret_from_fork+0x10/0x20
[   63.762789] 
[   63.764265] The buggy address belongs to the object at ffff000808448180
[   63.764265]  which belongs to the cache kmalloc-64 of size 64
[   63.776592] The buggy address is located 0 bytes to the right of
[   63.776592]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   63.789438] 
[   63.790914] The buggy address belongs to the physical page:
[   63.796470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.804456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.810966] page_type: f5(slab)
[   63.814100] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.821823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.829541] page dumped because: kasan: bad access detected
[   63.835097] 
[   63.836572] Memory state around the buggy address:
[   63.841351]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.848555]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.855760] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.862961]                                      ^
[   63.867740]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.874944]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.882145] ==================================================================
[   71.814213] ==================================================================
[   71.821263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   71.828640] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.835932] 
[   71.837415] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.837464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.837481] Hardware name: WinLink E850-96 board (DT)
[   71.837498] Call trace:
[   71.837511]  show_stack+0x20/0x38 (C)
[   71.837543]  dump_stack_lvl+0x8c/0xd0
[   71.837575]  print_report+0x118/0x5d0
[   71.837603]  kasan_report+0xdc/0x128
[   71.837630]  __asan_report_load8_noabort+0x20/0x30
[   71.837665]  kasan_atomics_helper+0x3f58/0x4858
[   71.837701]  kasan_atomics+0x198/0x2e0
[   71.837733]  kunit_try_run_case+0x170/0x3f0
[   71.837769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.837804]  kthread+0x328/0x630
[   71.837832]  ret_from_fork+0x10/0x20
[   71.837866] 
[   71.905549] Allocated by task 349:
[   71.908936]  kasan_save_stack+0x3c/0x68
[   71.912754]  kasan_save_track+0x20/0x40
[   71.916573]  kasan_save_alloc_info+0x40/0x58
[   71.920826]  __kasan_kmalloc+0xd4/0xd8
[   71.924559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.929073]  kasan_atomics+0xb8/0x2e0
[   71.932719]  kunit_try_run_case+0x170/0x3f0
[   71.936885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.942354]  kthread+0x328/0x630
[   71.945566]  ret_from_fork+0x10/0x20
[   71.949125] 
[   71.950600] The buggy address belongs to the object at ffff000808448180
[   71.950600]  which belongs to the cache kmalloc-64 of size 64
[   71.962927] The buggy address is located 0 bytes to the right of
[   71.962927]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.975774] 
[   71.977251] The buggy address belongs to the physical page:
[   71.982805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.990791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.997301] page_type: f5(slab)
[   72.000434] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.008158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.015877] page dumped because: kasan: bad access detected
[   72.021433] 
[   72.022908] Memory state around the buggy address:
[   72.027686]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.034891]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.042096] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.049297]                                      ^
[   72.054075]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.061279]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.068480] ==================================================================
[   68.916773] ==================================================================
[   68.923740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   68.931028] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.938406] 
[   68.939890] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.939941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.939957] Hardware name: WinLink E850-96 board (DT)
[   68.939980] Call trace:
[   68.939994]  show_stack+0x20/0x38 (C)
[   68.940027]  dump_stack_lvl+0x8c/0xd0
[   68.940060]  print_report+0x118/0x5d0
[   68.940088]  kasan_report+0xdc/0x128
[   68.940115]  kasan_check_range+0x100/0x1a8
[   68.940145]  __kasan_check_write+0x20/0x30
[   68.940176]  kasan_atomics_helper+0xad4/0x4858
[   68.940211]  kasan_atomics+0x198/0x2e0
[   68.940244]  kunit_try_run_case+0x170/0x3f0
[   68.940279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.940312]  kthread+0x328/0x630
[   68.940345]  ret_from_fork+0x10/0x20
[   68.940377] 
[   69.011321] Allocated by task 349:
[   69.014707]  kasan_save_stack+0x3c/0x68
[   69.018526]  kasan_save_track+0x20/0x40
[   69.022346]  kasan_save_alloc_info+0x40/0x58
[   69.026599]  __kasan_kmalloc+0xd4/0xd8
[   69.030332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.034845]  kasan_atomics+0xb8/0x2e0
[   69.038491]  kunit_try_run_case+0x170/0x3f0
[   69.042658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.048128]  kthread+0x328/0x630
[   69.051338]  ret_from_fork+0x10/0x20
[   69.054897] 
[   69.056373] The buggy address belongs to the object at ffff000808448180
[   69.056373]  which belongs to the cache kmalloc-64 of size 64
[   69.068700] The buggy address is located 0 bytes to the right of
[   69.068700]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.081546] 
[   69.083023] The buggy address belongs to the physical page:
[   69.088580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.096565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.103074] page_type: f5(slab)
[   69.106210] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.113931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.121650] page dumped because: kasan: bad access detected
[   69.127205] 
[   69.128681] Memory state around the buggy address:
[   69.133461]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.140664]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.147868] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.155069]                                      ^
[   69.159847]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.167052]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.174253] ==================================================================
[   76.839974] ==================================================================
[   76.847056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   76.854433] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.861812] 
[   76.863295] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.863344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.863358] Hardware name: WinLink E850-96 board (DT)
[   76.863378] Call trace:
[   76.863390]  show_stack+0x20/0x38 (C)
[   76.863424]  dump_stack_lvl+0x8c/0xd0
[   76.863457]  print_report+0x118/0x5d0
[   76.863485]  kasan_report+0xdc/0x128
[   76.863514]  kasan_check_range+0x100/0x1a8
[   76.863545]  __kasan_check_write+0x20/0x30
[   76.863578]  kasan_atomics_helper+0x154c/0x4858
[   76.863615]  kasan_atomics+0x198/0x2e0
[   76.863647]  kunit_try_run_case+0x170/0x3f0
[   76.863683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.863716]  kthread+0x328/0x630
[   76.863746]  ret_from_fork+0x10/0x20
[   76.863781] 
[   76.934814] Allocated by task 349:
[   76.938201]  kasan_save_stack+0x3c/0x68
[   76.942018]  kasan_save_track+0x20/0x40
[   76.945838]  kasan_save_alloc_info+0x40/0x58
[   76.950091]  __kasan_kmalloc+0xd4/0xd8
[   76.953824]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.958338]  kasan_atomics+0xb8/0x2e0
[   76.961983]  kunit_try_run_case+0x170/0x3f0
[   76.966150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.971619]  kthread+0x328/0x630
[   76.974830]  ret_from_fork+0x10/0x20
[   76.978389] 
[   76.979865] The buggy address belongs to the object at ffff000808448180
[   76.979865]  which belongs to the cache kmalloc-64 of size 64
[   76.992192] The buggy address is located 0 bytes to the right of
[   76.992192]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.005038] 
[   77.006514] The buggy address belongs to the physical page:
[   77.012071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.020056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.026566] page_type: f5(slab)
[   77.029699] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.037423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.045142] page dumped because: kasan: bad access detected
[   77.050697] 
[   77.052173] Memory state around the buggy address:
[   77.056951]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.064156]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.071360] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.078562]                                      ^
[   77.083339]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.090544]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.097745] ==================================================================
[   64.681185] ==================================================================
[   64.688212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   64.695501] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.702879] 
[   64.704361] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.704413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.704430] Hardware name: WinLink E850-96 board (DT)
[   64.704450] Call trace:
[   64.704463]  show_stack+0x20/0x38 (C)
[   64.704497]  dump_stack_lvl+0x8c/0xd0
[   64.704529]  print_report+0x118/0x5d0
[   64.704557]  kasan_report+0xdc/0x128
[   64.704584]  kasan_check_range+0x100/0x1a8
[   64.704614]  __kasan_check_write+0x20/0x30
[   64.704644]  kasan_atomics_helper+0x414/0x4858
[   64.704678]  kasan_atomics+0x198/0x2e0
[   64.704710]  kunit_try_run_case+0x170/0x3f0
[   64.704745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.704778]  kthread+0x328/0x630
[   64.704804]  ret_from_fork+0x10/0x20
[   64.704836] 
[   64.775794] Allocated by task 349:
[   64.779182]  kasan_save_stack+0x3c/0x68
[   64.783000]  kasan_save_track+0x20/0x40
[   64.786819]  kasan_save_alloc_info+0x40/0x58
[   64.791073]  __kasan_kmalloc+0xd4/0xd8
[   64.794805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.799319]  kasan_atomics+0xb8/0x2e0
[   64.802964]  kunit_try_run_case+0x170/0x3f0
[   64.807131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.812600]  kthread+0x328/0x630
[   64.815811]  ret_from_fork+0x10/0x20
[   64.819371] 
[   64.820846] The buggy address belongs to the object at ffff000808448180
[   64.820846]  which belongs to the cache kmalloc-64 of size 64
[   64.833172] The buggy address is located 0 bytes to the right of
[   64.833172]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.846019] 
[   64.847495] The buggy address belongs to the physical page:
[   64.853053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.861037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.867547] page_type: f5(slab)
[   64.870680] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.878404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.886123] page dumped because: kasan: bad access detected
[   64.891678] 
[   64.893154] Memory state around the buggy address:
[   64.897932]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.905137]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.912341] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.919543]                                      ^
[   64.924320]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.931525]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.938727] ==================================================================
[   76.044790] ==================================================================
[   76.051757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   76.059133] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.066511] 
[   76.067994] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.068044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.068059] Hardware name: WinLink E850-96 board (DT)
[   76.068082] Call trace:
[   76.068097]  show_stack+0x20/0x38 (C)
[   76.068127]  dump_stack_lvl+0x8c/0xd0
[   76.068160]  print_report+0x118/0x5d0
[   76.068190]  kasan_report+0xdc/0x128
[   76.068219]  kasan_check_range+0x100/0x1a8
[   76.068250]  __kasan_check_write+0x20/0x30
[   76.068284]  kasan_atomics_helper+0x1414/0x4858
[   76.068319]  kasan_atomics+0x198/0x2e0
[   76.068351]  kunit_try_run_case+0x170/0x3f0
[   76.068388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.068421]  kthread+0x328/0x630
[   76.068452]  ret_from_fork+0x10/0x20
[   76.068488] 
[   76.139513] Allocated by task 349:
[   76.142900]  kasan_save_stack+0x3c/0x68
[   76.146718]  kasan_save_track+0x20/0x40
[   76.150537]  kasan_save_alloc_info+0x40/0x58
[   76.154791]  __kasan_kmalloc+0xd4/0xd8
[   76.158523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.163037]  kasan_atomics+0xb8/0x2e0
[   76.166683]  kunit_try_run_case+0x170/0x3f0
[   76.170850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.176319]  kthread+0x328/0x630
[   76.179530]  ret_from_fork+0x10/0x20
[   76.183089] 
[   76.184564] The buggy address belongs to the object at ffff000808448180
[   76.184564]  which belongs to the cache kmalloc-64 of size 64
[   76.196891] The buggy address is located 0 bytes to the right of
[   76.196891]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   76.209738] 
[   76.211214] The buggy address belongs to the physical page:
[   76.216771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   76.224755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.231265] page_type: f5(slab)
[   76.234400] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.242122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.249841] page dumped because: kasan: bad access detected
[   76.255397] 
[   76.256872] Memory state around the buggy address:
[   76.261653]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.268855]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.276060] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.283261]                                      ^
[   76.288040]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.295243]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.302445] ==================================================================
[   68.651764] ==================================================================
[   68.658811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   68.666101] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.673479] 
[   68.674963] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.675012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.675032] Hardware name: WinLink E850-96 board (DT)
[   68.675051] Call trace:
[   68.675063]  show_stack+0x20/0x38 (C)
[   68.675096]  dump_stack_lvl+0x8c/0xd0
[   68.675130]  print_report+0x118/0x5d0
[   68.675158]  kasan_report+0xdc/0x128
[   68.675187]  kasan_check_range+0x100/0x1a8
[   68.675216]  __kasan_check_write+0x20/0x30
[   68.675249]  kasan_atomics_helper+0xa6c/0x4858
[   68.675283]  kasan_atomics+0x198/0x2e0
[   68.675315]  kunit_try_run_case+0x170/0x3f0
[   68.675350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.675386]  kthread+0x328/0x630
[   68.675414]  ret_from_fork+0x10/0x20
[   68.675448] 
[   68.746395] Allocated by task 349:
[   68.749780]  kasan_save_stack+0x3c/0x68
[   68.753600]  kasan_save_track+0x20/0x40
[   68.757419]  kasan_save_alloc_info+0x40/0x58
[   68.761673]  __kasan_kmalloc+0xd4/0xd8
[   68.765405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.769919]  kasan_atomics+0xb8/0x2e0
[   68.773564]  kunit_try_run_case+0x170/0x3f0
[   68.777731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.783201]  kthread+0x328/0x630
[   68.786412]  ret_from_fork+0x10/0x20
[   68.789971] 
[   68.791446] The buggy address belongs to the object at ffff000808448180
[   68.791446]  which belongs to the cache kmalloc-64 of size 64
[   68.803773] The buggy address is located 0 bytes to the right of
[   68.803773]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.816619] 
[   68.818095] The buggy address belongs to the physical page:
[   68.823653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.831637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.838147] page_type: f5(slab)
[   68.841281] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.849004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.856723] page dumped because: kasan: bad access detected
[   68.862278] 
[   68.863754] Memory state around the buggy address:
[   68.868532]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.875737]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.882942] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.890143]                                      ^
[   68.894921]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.902125]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.909327] ==================================================================
[   63.098166] ==================================================================
[   63.105249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   63.112540] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.119917] 
[   63.121400] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.121455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.121473] Hardware name: WinLink E850-96 board (DT)
[   63.121494] Call trace:
[   63.121510]  show_stack+0x20/0x38 (C)
[   63.121544]  dump_stack_lvl+0x8c/0xd0
[   63.121580]  print_report+0x118/0x5d0
[   63.121607]  kasan_report+0xdc/0x128
[   63.121634]  kasan_check_range+0x100/0x1a8
[   63.121663]  __kasan_check_write+0x20/0x30
[   63.121695]  kasan_atomics_helper+0x24c/0x4858
[   63.121730]  kasan_atomics+0x198/0x2e0
[   63.121763]  kunit_try_run_case+0x170/0x3f0
[   63.121801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.121833]  kthread+0x328/0x630
[   63.121862]  ret_from_fork+0x10/0x20
[   63.121894] 
[   63.192832] Allocated by task 349:
[   63.196220]  kasan_save_stack+0x3c/0x68
[   63.200038]  kasan_save_track+0x20/0x40
[   63.203857]  kasan_save_alloc_info+0x40/0x58
[   63.208110]  __kasan_kmalloc+0xd4/0xd8
[   63.211843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.216356]  kasan_atomics+0xb8/0x2e0
[   63.220002]  kunit_try_run_case+0x170/0x3f0
[   63.224169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.229638]  kthread+0x328/0x630
[   63.232849]  ret_from_fork+0x10/0x20
[   63.236408] 
[   63.237884] The buggy address belongs to the object at ffff000808448180
[   63.237884]  which belongs to the cache kmalloc-64 of size 64
[   63.250211] The buggy address is located 0 bytes to the right of
[   63.250211]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   63.263057] 
[   63.264535] The buggy address belongs to the physical page:
[   63.270090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.278075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.284585] page_type: f5(slab)
[   63.287719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.295442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.303161] page dumped because: kasan: bad access detected
[   63.308716] 
[   63.310192] Memory state around the buggy address:
[   63.314970]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.322175]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.329379] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.336580]                                      ^
[   63.341359]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.348563]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.355764] ==================================================================
[   65.740864] ==================================================================
[   65.747917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   65.755207] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   65.762586] 
[   65.764065] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   65.764114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.764132] Hardware name: WinLink E850-96 board (DT)
[   65.764151] Call trace:
[   65.764163]  show_stack+0x20/0x38 (C)
[   65.764195]  dump_stack_lvl+0x8c/0xd0
[   65.764229]  print_report+0x118/0x5d0
[   65.764256]  kasan_report+0xdc/0x128
[   65.764284]  kasan_check_range+0x100/0x1a8
[   65.764313]  __kasan_check_write+0x20/0x30
[   65.764344]  kasan_atomics_helper+0x5b4/0x4858
[   65.764380]  kasan_atomics+0x198/0x2e0
[   65.764411]  kunit_try_run_case+0x170/0x3f0
[   65.764445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.764481]  kthread+0x328/0x630
[   65.764509]  ret_from_fork+0x10/0x20
[   65.764540] 
[   65.835501] Allocated by task 349:
[   65.838886]  kasan_save_stack+0x3c/0x68
[   65.842706]  kasan_save_track+0x20/0x40
[   65.846525]  kasan_save_alloc_info+0x40/0x58
[   65.850779]  __kasan_kmalloc+0xd4/0xd8
[   65.854511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.859025]  kasan_atomics+0xb8/0x2e0
[   65.862671]  kunit_try_run_case+0x170/0x3f0
[   65.866837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.872306]  kthread+0x328/0x630
[   65.875518]  ret_from_fork+0x10/0x20
[   65.879077] 
[   65.880552] The buggy address belongs to the object at ffff000808448180
[   65.880552]  which belongs to the cache kmalloc-64 of size 64
[   65.892879] The buggy address is located 0 bytes to the right of
[   65.892879]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.905726] 
[   65.907202] The buggy address belongs to the physical page:
[   65.912759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.920743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.927253] page_type: f5(slab)
[   65.930386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.938110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.945829] page dumped because: kasan: bad access detected
[   65.951385] 
[   65.952860] Memory state around the buggy address:
[   65.957638]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.964843]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.972048] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.979249]                                      ^
[   65.984027]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.991231]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.998433] ==================================================================
[   77.370202] ==================================================================
[   77.377257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   77.384633] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.391925] 
[   77.393408] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.393457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.393472] Hardware name: WinLink E850-96 board (DT)
[   77.393491] Call trace:
[   77.393506]  show_stack+0x20/0x38 (C)
[   77.393538]  dump_stack_lvl+0x8c/0xd0
[   77.393569]  print_report+0x118/0x5d0
[   77.393597]  kasan_report+0xdc/0x128
[   77.393625]  __asan_report_load8_noabort+0x20/0x30
[   77.393660]  kasan_atomics_helper+0x3db0/0x4858
[   77.393695]  kasan_atomics+0x198/0x2e0
[   77.393730]  kunit_try_run_case+0x170/0x3f0
[   77.393767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.393802]  kthread+0x328/0x630
[   77.393829]  ret_from_fork+0x10/0x20
[   77.393863] 
[   77.461542] Allocated by task 349:
[   77.464929]  kasan_save_stack+0x3c/0x68
[   77.468747]  kasan_save_track+0x20/0x40
[   77.472566]  kasan_save_alloc_info+0x40/0x58
[   77.476819]  __kasan_kmalloc+0xd4/0xd8
[   77.480552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.485066]  kasan_atomics+0xb8/0x2e0
[   77.488712]  kunit_try_run_case+0x170/0x3f0
[   77.492878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.498347]  kthread+0x328/0x630
[   77.501559]  ret_from_fork+0x10/0x20
[   77.505118] 
[   77.506593] The buggy address belongs to the object at ffff000808448180
[   77.506593]  which belongs to the cache kmalloc-64 of size 64
[   77.518920] The buggy address is located 0 bytes to the right of
[   77.518920]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.531766] 
[   77.533242] The buggy address belongs to the physical page:
[   77.538798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.546784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.553294] page_type: f5(slab)
[   77.556428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.564151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.571870] page dumped because: kasan: bad access detected
[   77.577425] 
[   77.578901] Memory state around the buggy address:
[   77.583679]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.590884]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.598089] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.605290]                                      ^
[   77.610068]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.617272]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.624473] ==================================================================
[   74.722703] ==================================================================
[   74.729727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   74.737104] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   74.744482] 
[   74.745964] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   74.746014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.746031] Hardware name: WinLink E850-96 board (DT)
[   74.746052] Call trace:
[   74.746065]  show_stack+0x20/0x38 (C)
[   74.746096]  dump_stack_lvl+0x8c/0xd0
[   74.746128]  print_report+0x118/0x5d0
[   74.746157]  kasan_report+0xdc/0x128
[   74.746183]  kasan_check_range+0x100/0x1a8
[   74.746212]  __kasan_check_write+0x20/0x30
[   74.746247]  kasan_atomics_helper+0x11f8/0x4858
[   74.746283]  kasan_atomics+0x198/0x2e0
[   74.746316]  kunit_try_run_case+0x170/0x3f0
[   74.746351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.746386]  kthread+0x328/0x630
[   74.746416]  ret_from_fork+0x10/0x20
[   74.746450] 
[   74.817484] Allocated by task 349:
[   74.820870]  kasan_save_stack+0x3c/0x68
[   74.824689]  kasan_save_track+0x20/0x40
[   74.828509]  kasan_save_alloc_info+0x40/0x58
[   74.832762]  __kasan_kmalloc+0xd4/0xd8
[   74.836494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.841009]  kasan_atomics+0xb8/0x2e0
[   74.844654]  kunit_try_run_case+0x170/0x3f0
[   74.848820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.854291]  kthread+0x328/0x630
[   74.857501]  ret_from_fork+0x10/0x20
[   74.861060] 
[   74.862535] The buggy address belongs to the object at ffff000808448180
[   74.862535]  which belongs to the cache kmalloc-64 of size 64
[   74.874864] The buggy address is located 0 bytes to the right of
[   74.874864]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.887709] 
[   74.889185] The buggy address belongs to the physical page:
[   74.894741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.902727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.909236] page_type: f5(slab)
[   74.912369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.920093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.927813] page dumped because: kasan: bad access detected
[   74.933368] 
[   74.934844] Memory state around the buggy address:
[   74.939623]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.946826]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.954031] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.961232]                                      ^
[   74.966010]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.973215]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.980416] ==================================================================
[   66.270698] ==================================================================
[   66.277770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   66.285061] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.292439] 
[   66.293922] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.293970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.293988] Hardware name: WinLink E850-96 board (DT)
[   66.294008] Call trace:
[   66.294022]  show_stack+0x20/0x38 (C)
[   66.294055]  dump_stack_lvl+0x8c/0xd0
[   66.294088]  print_report+0x118/0x5d0
[   66.294115]  kasan_report+0xdc/0x128
[   66.294143]  kasan_check_range+0x100/0x1a8
[   66.294172]  __kasan_check_write+0x20/0x30
[   66.294207]  kasan_atomics_helper+0x684/0x4858
[   66.294242]  kasan_atomics+0x198/0x2e0
[   66.294274]  kunit_try_run_case+0x170/0x3f0
[   66.294308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.294343]  kthread+0x328/0x630
[   66.294374]  ret_from_fork+0x10/0x20
[   66.294409] 
[   66.365354] Allocated by task 349:
[   66.368742]  kasan_save_stack+0x3c/0x68
[   66.372559]  kasan_save_track+0x20/0x40
[   66.376379]  kasan_save_alloc_info+0x40/0x58
[   66.380632]  __kasan_kmalloc+0xd4/0xd8
[   66.384365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.388878]  kasan_atomics+0xb8/0x2e0
[   66.392524]  kunit_try_run_case+0x170/0x3f0
[   66.396691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.402159]  kthread+0x328/0x630
[   66.405371]  ret_from_fork+0x10/0x20
[   66.408930] 
[   66.410405] The buggy address belongs to the object at ffff000808448180
[   66.410405]  which belongs to the cache kmalloc-64 of size 64
[   66.422732] The buggy address is located 0 bytes to the right of
[   66.422732]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.435579] 
[   66.437057] The buggy address belongs to the physical page:
[   66.442613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.450598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.457107] page_type: f5(slab)
[   66.460240] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.467964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.475683] page dumped because: kasan: bad access detected
[   66.481238] 
[   66.482714] Memory state around the buggy address:
[   66.487493]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.494696]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.501901] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.509102]                                      ^
[   66.513880]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.521085]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.528286] ==================================================================
[   71.549457] ==================================================================
[   71.556510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   71.563801] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.571092] 
[   71.572577] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.572627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.572642] Hardware name: WinLink E850-96 board (DT)
[   71.572662] Call trace:
[   71.572677]  show_stack+0x20/0x38 (C)
[   71.572708]  dump_stack_lvl+0x8c/0xd0
[   71.572741]  print_report+0x118/0x5d0
[   71.572769]  kasan_report+0xdc/0x128
[   71.572795]  kasan_check_range+0x100/0x1a8
[   71.572827]  __kasan_check_read+0x20/0x30
[   71.572858]  kasan_atomics_helper+0xdd4/0x4858
[   71.572894]  kasan_atomics+0x198/0x2e0
[   71.572925]  kunit_try_run_case+0x170/0x3f0
[   71.572962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.572995]  kthread+0x328/0x630
[   71.573025]  ret_from_fork+0x10/0x20
[   71.573055] 
[   71.643921] Allocated by task 349:
[   71.647308]  kasan_save_stack+0x3c/0x68
[   71.651125]  kasan_save_track+0x20/0x40
[   71.654945]  kasan_save_alloc_info+0x40/0x58
[   71.659198]  __kasan_kmalloc+0xd4/0xd8
[   71.662931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.667445]  kasan_atomics+0xb8/0x2e0
[   71.671091]  kunit_try_run_case+0x170/0x3f0
[   71.675257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.680726]  kthread+0x328/0x630
[   71.683938]  ret_from_fork+0x10/0x20
[   71.687497] 
[   71.688972] The buggy address belongs to the object at ffff000808448180
[   71.688972]  which belongs to the cache kmalloc-64 of size 64
[   71.701299] The buggy address is located 0 bytes to the right of
[   71.701299]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.714146] 
[   71.715623] The buggy address belongs to the physical page:
[   71.721178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.729163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.735673] page_type: f5(slab)
[   71.738806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.746530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.754249] page dumped because: kasan: bad access detected
[   71.759804] 
[   71.761280] Memory state around the buggy address:
[   71.766058]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.773263]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.780468] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.787668]                                      ^
[   71.792446]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.799651]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.806852] ==================================================================
[   70.761273] ==================================================================
[   70.768330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   70.775705] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   70.782996] 
[   70.784479] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   70.784529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.784544] Hardware name: WinLink E850-96 board (DT)
[   70.784565] Call trace:
[   70.784577]  show_stack+0x20/0x38 (C)
[   70.784608]  dump_stack_lvl+0x8c/0xd0
[   70.784640]  print_report+0x118/0x5d0
[   70.784669]  kasan_report+0xdc/0x128
[   70.784698]  __asan_report_load4_noabort+0x20/0x30
[   70.784731]  kasan_atomics_helper+0x3dd8/0x4858
[   70.784766]  kasan_atomics+0x198/0x2e0
[   70.784798]  kunit_try_run_case+0x170/0x3f0
[   70.784834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.784867]  kthread+0x328/0x630
[   70.784897]  ret_from_fork+0x10/0x20
[   70.784929] 
[   70.852613] Allocated by task 349:
[   70.856000]  kasan_save_stack+0x3c/0x68
[   70.859818]  kasan_save_track+0x20/0x40
[   70.863638]  kasan_save_alloc_info+0x40/0x58
[   70.867891]  __kasan_kmalloc+0xd4/0xd8
[   70.871624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.876138]  kasan_atomics+0xb8/0x2e0
[   70.879783]  kunit_try_run_case+0x170/0x3f0
[   70.883949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.889418]  kthread+0x328/0x630
[   70.892630]  ret_from_fork+0x10/0x20
[   70.896189] 
[   70.897664] The buggy address belongs to the object at ffff000808448180
[   70.897664]  which belongs to the cache kmalloc-64 of size 64
[   70.909991] The buggy address is located 0 bytes to the right of
[   70.909991]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.922838] 
[   70.924314] The buggy address belongs to the physical page:
[   70.929870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.937856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.944365] page_type: f5(slab)
[   70.947500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.955223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.962941] page dumped because: kasan: bad access detected
[   70.968497] 
[   70.969972] Memory state around the buggy address:
[   70.974750]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.981955]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.989160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.996361]                                      ^
[   71.001139]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.008344]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.015545] ==================================================================
[   64.946178] ==================================================================
[   64.953141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   64.960428] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.967806] 
[   64.969289] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.969339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.969356] Hardware name: WinLink E850-96 board (DT)
[   64.969377] Call trace:
[   64.969389]  show_stack+0x20/0x38 (C)
[   64.969421]  dump_stack_lvl+0x8c/0xd0
[   64.969456]  print_report+0x118/0x5d0
[   64.969485]  kasan_report+0xdc/0x128
[   64.969513]  kasan_check_range+0x100/0x1a8
[   64.969544]  __kasan_check_write+0x20/0x30
[   64.969575]  kasan_atomics_helper+0x47c/0x4858
[   64.969608]  kasan_atomics+0x198/0x2e0
[   64.969639]  kunit_try_run_case+0x170/0x3f0
[   64.969672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.969705]  kthread+0x328/0x630
[   64.969736]  ret_from_fork+0x10/0x20
[   64.969767] 
[   65.040721] Allocated by task 349:
[   65.044107]  kasan_save_stack+0x3c/0x68
[   65.047926]  kasan_save_track+0x20/0x40
[   65.051746]  kasan_save_alloc_info+0x40/0x58
[   65.055999]  __kasan_kmalloc+0xd4/0xd8
[   65.059732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.064246]  kasan_atomics+0xb8/0x2e0
[   65.067891]  kunit_try_run_case+0x170/0x3f0
[   65.072057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.077526]  kthread+0x328/0x630
[   65.080738]  ret_from_fork+0x10/0x20
[   65.084297] 
[   65.085772] The buggy address belongs to the object at ffff000808448180
[   65.085772]  which belongs to the cache kmalloc-64 of size 64
[   65.098099] The buggy address is located 0 bytes to the right of
[   65.098099]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.110946] 
[   65.112424] The buggy address belongs to the physical page:
[   65.117979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.125965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.132474] page_type: f5(slab)
[   65.135608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.143331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.151050] page dumped because: kasan: bad access detected
[   65.156605] 
[   65.158080] Memory state around the buggy address:
[   65.162859]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.170063]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.177268] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.184469]                                      ^
[   65.189247]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.196452]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.203653] ==================================================================
[   67.595318] ==================================================================
[   67.602405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   67.609780] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.617072] 
[   67.618556] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.618607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.618623] Hardware name: WinLink E850-96 board (DT)
[   67.618643] Call trace:
[   67.618655]  show_stack+0x20/0x38 (C)
[   67.618688]  dump_stack_lvl+0x8c/0xd0
[   67.618723]  print_report+0x118/0x5d0
[   67.618751]  kasan_report+0xdc/0x128
[   67.618777]  __asan_report_load4_noabort+0x20/0x30
[   67.618812]  kasan_atomics_helper+0x42d8/0x4858
[   67.618848]  kasan_atomics+0x198/0x2e0
[   67.618880]  kunit_try_run_case+0x170/0x3f0
[   67.618918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.618953]  kthread+0x328/0x630
[   67.618983]  ret_from_fork+0x10/0x20
[   67.619013] 
[   67.686689] Allocated by task 349:
[   67.690076]  kasan_save_stack+0x3c/0x68
[   67.693894]  kasan_save_track+0x20/0x40
[   67.697713]  kasan_save_alloc_info+0x40/0x58
[   67.701966]  __kasan_kmalloc+0xd4/0xd8
[   67.705699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.710212]  kasan_atomics+0xb8/0x2e0
[   67.713858]  kunit_try_run_case+0x170/0x3f0
[   67.718025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.723494]  kthread+0x328/0x630
[   67.726705]  ret_from_fork+0x10/0x20
[   67.730265] 
[   67.731740] The buggy address belongs to the object at ffff000808448180
[   67.731740]  which belongs to the cache kmalloc-64 of size 64
[   67.744067] The buggy address is located 0 bytes to the right of
[   67.744067]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   67.756913] 
[   67.758389] The buggy address belongs to the physical page:
[   67.763946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   67.771930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.778441] page_type: f5(slab)
[   67.781573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.789298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.797017] page dumped because: kasan: bad access detected
[   67.802572] 
[   67.804048] Memory state around the buggy address:
[   67.808827]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.816031]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.823235] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.830437]                                      ^
[   67.835214]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.842419]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.849620] ==================================================================
[   71.287829] ==================================================================
[   71.294882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   71.302259] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.309551] 
[   71.311036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.311086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.311103] Hardware name: WinLink E850-96 board (DT)
[   71.311122] Call trace:
[   71.311136]  show_stack+0x20/0x38 (C)
[   71.311168]  dump_stack_lvl+0x8c/0xd0
[   71.311201]  print_report+0x118/0x5d0
[   71.311230]  kasan_report+0xdc/0x128
[   71.311258]  __asan_report_load4_noabort+0x20/0x30
[   71.311294]  kasan_atomics_helper+0x3e04/0x4858
[   71.311329]  kasan_atomics+0x198/0x2e0
[   71.311362]  kunit_try_run_case+0x170/0x3f0
[   71.311397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.311431]  kthread+0x328/0x630
[   71.311460]  ret_from_fork+0x10/0x20
[   71.311494] 
[   71.379168] Allocated by task 349:
[   71.382555]  kasan_save_stack+0x3c/0x68
[   71.386372]  kasan_save_track+0x20/0x40
[   71.390192]  kasan_save_alloc_info+0x40/0x58
[   71.394445]  __kasan_kmalloc+0xd4/0xd8
[   71.398178]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.402692]  kasan_atomics+0xb8/0x2e0
[   71.406338]  kunit_try_run_case+0x170/0x3f0
[   71.410504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.415973]  kthread+0x328/0x630
[   71.419185]  ret_from_fork+0x10/0x20
[   71.422744] 
[   71.424219] The buggy address belongs to the object at ffff000808448180
[   71.424219]  which belongs to the cache kmalloc-64 of size 64
[   71.436546] The buggy address is located 0 bytes to the right of
[   71.436546]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.449393] 
[   71.450870] The buggy address belongs to the physical page:
[   71.456424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.464410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.470920] page_type: f5(slab)
[   71.474055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.481777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.489496] page dumped because: kasan: bad access detected
[   71.495051] 
[   71.496527] Memory state around the buggy address:
[   71.501305]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.508510]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.515715] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.522916]                                      ^
[   71.527694]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.534898]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.542100] ==================================================================
[   70.496372] ==================================================================
[   70.503403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   70.510692] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   70.518070] 
[   70.519553] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   70.519604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.519621] Hardware name: WinLink E850-96 board (DT)
[   70.519644] Call trace:
[   70.519658]  show_stack+0x20/0x38 (C)
[   70.519688]  dump_stack_lvl+0x8c/0xd0
[   70.519718]  print_report+0x118/0x5d0
[   70.519746]  kasan_report+0xdc/0x128
[   70.519774]  kasan_check_range+0x100/0x1a8
[   70.519803]  __kasan_check_write+0x20/0x30
[   70.519837]  kasan_atomics_helper+0xca0/0x4858
[   70.519871]  kasan_atomics+0x198/0x2e0
[   70.519904]  kunit_try_run_case+0x170/0x3f0
[   70.519939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.519975]  kthread+0x328/0x630
[   70.520003]  ret_from_fork+0x10/0x20
[   70.520034] 
[   70.590985] Allocated by task 349:
[   70.594372]  kasan_save_stack+0x3c/0x68
[   70.598190]  kasan_save_track+0x20/0x40
[   70.602010]  kasan_save_alloc_info+0x40/0x58
[   70.606263]  __kasan_kmalloc+0xd4/0xd8
[   70.609996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.614509]  kasan_atomics+0xb8/0x2e0
[   70.618155]  kunit_try_run_case+0x170/0x3f0
[   70.622322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.627792]  kthread+0x328/0x630
[   70.631002]  ret_from_fork+0x10/0x20
[   70.634561] 
[   70.636036] The buggy address belongs to the object at ffff000808448180
[   70.636036]  which belongs to the cache kmalloc-64 of size 64
[   70.648363] The buggy address is located 0 bytes to the right of
[   70.648363]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.661210] 
[   70.662686] The buggy address belongs to the physical page:
[   70.668243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.676227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.682737] page_type: f5(slab)
[   70.685870] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.693595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.701314] page dumped because: kasan: bad access detected
[   70.706869] 
[   70.708344] Memory state around the buggy address:
[   70.713124]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.720327]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.727532] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.734733]                                      ^
[   70.739511]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.746716]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.753917] ==================================================================
[   73.662304] ==================================================================
[   73.669326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   73.676703] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.684081] 
[   73.685564] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.685616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.685634] Hardware name: WinLink E850-96 board (DT)
[   73.685655] Call trace:
[   73.685667]  show_stack+0x20/0x38 (C)
[   73.685702]  dump_stack_lvl+0x8c/0xd0
[   73.685734]  print_report+0x118/0x5d0
[   73.685761]  kasan_report+0xdc/0x128
[   73.685788]  kasan_check_range+0x100/0x1a8
[   73.685818]  __kasan_check_write+0x20/0x30
[   73.685850]  kasan_atomics_helper+0x1058/0x4858
[   73.685886]  kasan_atomics+0x198/0x2e0
[   73.685918]  kunit_try_run_case+0x170/0x3f0
[   73.685954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.685990]  kthread+0x328/0x630
[   73.686019]  ret_from_fork+0x10/0x20
[   73.686052] 
[   73.757083] Allocated by task 349:
[   73.760469]  kasan_save_stack+0x3c/0x68
[   73.764289]  kasan_save_track+0x20/0x40
[   73.768108]  kasan_save_alloc_info+0x40/0x58
[   73.772361]  __kasan_kmalloc+0xd4/0xd8
[   73.776094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.780607]  kasan_atomics+0xb8/0x2e0
[   73.784253]  kunit_try_run_case+0x170/0x3f0
[   73.788420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.793889]  kthread+0x328/0x630
[   73.797100]  ret_from_fork+0x10/0x20
[   73.800659] 
[   73.802136] The buggy address belongs to the object at ffff000808448180
[   73.802136]  which belongs to the cache kmalloc-64 of size 64
[   73.814463] The buggy address is located 0 bytes to the right of
[   73.814463]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.827308] 
[   73.828784] The buggy address belongs to the physical page:
[   73.834343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.842326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.848836] page_type: f5(slab)
[   73.851970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.859693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.867412] page dumped because: kasan: bad access detected
[   73.872967] 
[   73.874443] Memory state around the buggy address:
[   73.879221]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.886425]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.893630] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.900831]                                      ^
[   73.905609]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.912814]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.920015] ==================================================================
[   73.132446] ==================================================================
[   73.139475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   73.146763] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.154141] 
[   73.155624] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.155675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.155690] Hardware name: WinLink E850-96 board (DT)
[   73.155712] Call trace:
[   73.155724]  show_stack+0x20/0x38 (C)
[   73.155755]  dump_stack_lvl+0x8c/0xd0
[   73.155788]  print_report+0x118/0x5d0
[   73.155816]  kasan_report+0xdc/0x128
[   73.155844]  kasan_check_range+0x100/0x1a8
[   73.155873]  __kasan_check_write+0x20/0x30
[   73.155906]  kasan_atomics_helper+0xf88/0x4858
[   73.155942]  kasan_atomics+0x198/0x2e0
[   73.155975]  kunit_try_run_case+0x170/0x3f0
[   73.156007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.156041]  kthread+0x328/0x630
[   73.156067]  ret_from_fork+0x10/0x20
[   73.156102] 
[   73.227057] Allocated by task 349:
[   73.230442]  kasan_save_stack+0x3c/0x68
[   73.234262]  kasan_save_track+0x20/0x40
[   73.238081]  kasan_save_alloc_info+0x40/0x58
[   73.242335]  __kasan_kmalloc+0xd4/0xd8
[   73.246067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.250581]  kasan_atomics+0xb8/0x2e0
[   73.254227]  kunit_try_run_case+0x170/0x3f0
[   73.258393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.263863]  kthread+0x328/0x630
[   73.267074]  ret_from_fork+0x10/0x20
[   73.270633] 
[   73.272108] The buggy address belongs to the object at ffff000808448180
[   73.272108]  which belongs to the cache kmalloc-64 of size 64
[   73.284436] The buggy address is located 0 bytes to the right of
[   73.284436]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.297281] 
[   73.298757] The buggy address belongs to the physical page:
[   73.304315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.312299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.318809] page_type: f5(slab)
[   73.321943] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.329666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.337385] page dumped because: kasan: bad access detected
[   73.342940] 
[   73.344416] Memory state around the buggy address:
[   73.349194]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.356399]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.363604] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.370805]                                      ^
[   73.375582]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.382787]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.389988] ==================================================================
[   69.708164] ==================================================================
[   69.715220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   69.722596] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.729887] 
[   69.731370] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.731422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.731437] Hardware name: WinLink E850-96 board (DT)
[   69.731456] Call trace:
[   69.731471]  show_stack+0x20/0x38 (C)
[   69.731503]  dump_stack_lvl+0x8c/0xd0
[   69.731535]  print_report+0x118/0x5d0
[   69.731563]  kasan_report+0xdc/0x128
[   69.731591]  __asan_report_load4_noabort+0x20/0x30
[   69.731626]  kasan_atomics_helper+0x3dbc/0x4858
[   69.731660]  kasan_atomics+0x198/0x2e0
[   69.731693]  kunit_try_run_case+0x170/0x3f0
[   69.731730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.731765]  kthread+0x328/0x630
[   69.731796]  ret_from_fork+0x10/0x20
[   69.731826] 
[   69.799504] Allocated by task 349:
[   69.802891]  kasan_save_stack+0x3c/0x68
[   69.806709]  kasan_save_track+0x20/0x40
[   69.810528]  kasan_save_alloc_info+0x40/0x58
[   69.814782]  __kasan_kmalloc+0xd4/0xd8
[   69.818514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.823028]  kasan_atomics+0xb8/0x2e0
[   69.826674]  kunit_try_run_case+0x170/0x3f0
[   69.830840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.836309]  kthread+0x328/0x630
[   69.839521]  ret_from_fork+0x10/0x20
[   69.843080] 
[   69.844555] The buggy address belongs to the object at ffff000808448180
[   69.844555]  which belongs to the cache kmalloc-64 of size 64
[   69.856882] The buggy address is located 0 bytes to the right of
[   69.856882]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.869729] 
[   69.871205] The buggy address belongs to the physical page:
[   69.876762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.884746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.891256] page_type: f5(slab)
[   69.894391] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.902114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.909832] page dumped because: kasan: bad access detected
[   69.915388] 
[   69.916863] Memory state around the buggy address:
[   69.921643]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.928846]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.936051] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.943252]                                      ^
[   69.948030]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.955234]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.962436] ==================================================================
[   74.192473] ==================================================================
[   74.199527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   74.206904] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   74.214282] 
[   74.215764] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   74.215813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.215831] Hardware name: WinLink E850-96 board (DT)
[   74.215847] Call trace:
[   74.215857]  show_stack+0x20/0x38 (C)
[   74.215889]  dump_stack_lvl+0x8c/0xd0
[   74.215922]  print_report+0x118/0x5d0
[   74.215952]  kasan_report+0xdc/0x128
[   74.215980]  kasan_check_range+0x100/0x1a8
[   74.216011]  __kasan_check_write+0x20/0x30
[   74.216044]  kasan_atomics_helper+0x1128/0x4858
[   74.216080]  kasan_atomics+0x198/0x2e0
[   74.216111]  kunit_try_run_case+0x170/0x3f0
[   74.216145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.216180]  kthread+0x328/0x630
[   74.216208]  ret_from_fork+0x10/0x20
[   74.216240] 
[   74.287284] Allocated by task 349:
[   74.290670]  kasan_save_stack+0x3c/0x68
[   74.294489]  kasan_save_track+0x20/0x40
[   74.298308]  kasan_save_alloc_info+0x40/0x58
[   74.302562]  __kasan_kmalloc+0xd4/0xd8
[   74.306294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.310808]  kasan_atomics+0xb8/0x2e0
[   74.314454]  kunit_try_run_case+0x170/0x3f0
[   74.318620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.324090]  kthread+0x328/0x630
[   74.327301]  ret_from_fork+0x10/0x20
[   74.330860] 
[   74.332335] The buggy address belongs to the object at ffff000808448180
[   74.332335]  which belongs to the cache kmalloc-64 of size 64
[   74.344663] The buggy address is located 0 bytes to the right of
[   74.344663]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.357509] 
[   74.358984] The buggy address belongs to the physical page:
[   74.364542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.372526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.379036] page_type: f5(slab)
[   74.382169] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.389893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.397612] page dumped because: kasan: bad access detected
[   74.403168] 
[   74.404643] Memory state around the buggy address:
[   74.409423]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.416626]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.423831] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.431031]                                      ^
[   74.435811]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.443014]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.450216] ==================================================================
[   76.309827] ==================================================================
[   76.316857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   76.324233] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.331611] 
[   76.333094] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.333143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.333159] Hardware name: WinLink E850-96 board (DT)
[   76.333179] Call trace:
[   76.333193]  show_stack+0x20/0x38 (C)
[   76.333225]  dump_stack_lvl+0x8c/0xd0
[   76.333257]  print_report+0x118/0x5d0
[   76.333285]  kasan_report+0xdc/0x128
[   76.333313]  kasan_check_range+0x100/0x1a8
[   76.333345]  __kasan_check_write+0x20/0x30
[   76.333377]  kasan_atomics_helper+0x147c/0x4858
[   76.333413]  kasan_atomics+0x198/0x2e0
[   76.333447]  kunit_try_run_case+0x170/0x3f0
[   76.333483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.333516]  kthread+0x328/0x630
[   76.333545]  ret_from_fork+0x10/0x20
[   76.333579] 
[   76.404613] Allocated by task 349:
[   76.408000]  kasan_save_stack+0x3c/0x68
[   76.411818]  kasan_save_track+0x20/0x40
[   76.415637]  kasan_save_alloc_info+0x40/0x58
[   76.419891]  __kasan_kmalloc+0xd4/0xd8
[   76.423624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.428137]  kasan_atomics+0xb8/0x2e0
[   76.431783]  kunit_try_run_case+0x170/0x3f0
[   76.435950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.441418]  kthread+0x328/0x630
[   76.444630]  ret_from_fork+0x10/0x20
[   76.448189] 
[   76.449664] The buggy address belongs to the object at ffff000808448180
[   76.449664]  which belongs to the cache kmalloc-64 of size 64
[   76.461991] The buggy address is located 0 bytes to the right of
[   76.461991]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   76.474838] 
[   76.476313] The buggy address belongs to the physical page:
[   76.481870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   76.489856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.496366] page_type: f5(slab)
[   76.499498] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.507222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.514941] page dumped because: kasan: bad access detected
[   76.520497] 
[   76.521972] Memory state around the buggy address:
[   76.526750]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.533956]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.541160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.548361]                                      ^
[   76.553139]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.560343]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.567545] ==================================================================
[   70.234694] ==================================================================
[   70.241775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   70.249150] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   70.256442] 
[   70.257925] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   70.257977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.257993] Hardware name: WinLink E850-96 board (DT)
[   70.258012] Call trace:
[   70.258025]  show_stack+0x20/0x38 (C)
[   70.258057]  dump_stack_lvl+0x8c/0xd0
[   70.258089]  print_report+0x118/0x5d0
[   70.258119]  kasan_report+0xdc/0x128
[   70.258146]  __asan_report_load4_noabort+0x20/0x30
[   70.258182]  kasan_atomics_helper+0x3de4/0x4858
[   70.258221]  kasan_atomics+0x198/0x2e0
[   70.258252]  kunit_try_run_case+0x170/0x3f0
[   70.258288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.258322]  kthread+0x328/0x630
[   70.258350]  ret_from_fork+0x10/0x20
[   70.258381] 
[   70.326058] Allocated by task 349:
[   70.329445]  kasan_save_stack+0x3c/0x68
[   70.333264]  kasan_save_track+0x20/0x40
[   70.337083]  kasan_save_alloc_info+0x40/0x58
[   70.341336]  __kasan_kmalloc+0xd4/0xd8
[   70.345069]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.349583]  kasan_atomics+0xb8/0x2e0
[   70.353229]  kunit_try_run_case+0x170/0x3f0
[   70.357395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.362865]  kthread+0x328/0x630
[   70.366076]  ret_from_fork+0x10/0x20
[   70.369634] 
[   70.371110] The buggy address belongs to the object at ffff000808448180
[   70.371110]  which belongs to the cache kmalloc-64 of size 64
[   70.383437] The buggy address is located 0 bytes to the right of
[   70.383437]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.396283] 
[   70.397759] The buggy address belongs to the physical page:
[   70.403315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.411303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.417811] page_type: f5(slab)
[   70.420947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.428668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.436387] page dumped because: kasan: bad access detected
[   70.441942] 
[   70.443418] Memory state around the buggy address:
[   70.448197]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.455401]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.462605] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.469807]                                      ^
[   70.474584]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.481789]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.488990] ==================================================================
[   73.397352] ==================================================================
[   73.404401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   73.411690] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.419068] 
[   73.420551] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.420601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.420618] Hardware name: WinLink E850-96 board (DT)
[   73.420638] Call trace:
[   73.420651]  show_stack+0x20/0x38 (C)
[   73.420684]  dump_stack_lvl+0x8c/0xd0
[   73.420717]  print_report+0x118/0x5d0
[   73.420746]  kasan_report+0xdc/0x128
[   73.420773]  kasan_check_range+0x100/0x1a8
[   73.420804]  __kasan_check_write+0x20/0x30
[   73.420836]  kasan_atomics_helper+0xff0/0x4858
[   73.420872]  kasan_atomics+0x198/0x2e0
[   73.420904]  kunit_try_run_case+0x170/0x3f0
[   73.420939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.420973]  kthread+0x328/0x630
[   73.421004]  ret_from_fork+0x10/0x20
[   73.421035] 
[   73.491983] Allocated by task 349:
[   73.495369]  kasan_save_stack+0x3c/0x68
[   73.499188]  kasan_save_track+0x20/0x40
[   73.503007]  kasan_save_alloc_info+0x40/0x58
[   73.507261]  __kasan_kmalloc+0xd4/0xd8
[   73.510994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.515507]  kasan_atomics+0xb8/0x2e0
[   73.519153]  kunit_try_run_case+0x170/0x3f0
[   73.523320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.528788]  kthread+0x328/0x630
[   73.532000]  ret_from_fork+0x10/0x20
[   73.535559] 
[   73.537034] The buggy address belongs to the object at ffff000808448180
[   73.537034]  which belongs to the cache kmalloc-64 of size 64
[   73.549363] The buggy address is located 0 bytes to the right of
[   73.549363]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   73.562208] 
[   73.563684] The buggy address belongs to the physical page:
[   73.569243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   73.577226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.583735] page_type: f5(slab)
[   73.586868] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.594593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.602312] page dumped because: kasan: bad access detected
[   73.607867] 
[   73.609342] Memory state around the buggy address:
[   73.614121]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.621326]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.628530] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.635731]                                      ^
[   73.640509]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.647714]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.654915] ==================================================================
[   73.927458] ==================================================================
[   73.934429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   73.941803] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   73.949182] 
[   73.950667] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   73.950719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.950737] Hardware name: WinLink E850-96 board (DT)
[   73.950756] Call trace:
[   73.950770]  show_stack+0x20/0x38 (C)
[   73.950805]  dump_stack_lvl+0x8c/0xd0
[   73.950836]  print_report+0x118/0x5d0
[   73.950864]  kasan_report+0xdc/0x128
[   73.950891]  kasan_check_range+0x100/0x1a8
[   73.950920]  __kasan_check_write+0x20/0x30
[   73.950953]  kasan_atomics_helper+0x10c0/0x4858
[   73.950989]  kasan_atomics+0x198/0x2e0
[   73.951021]  kunit_try_run_case+0x170/0x3f0
[   73.951057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.951092]  kthread+0x328/0x630
[   73.951120]  ret_from_fork+0x10/0x20
[   73.951152] 
[   74.022183] Allocated by task 349:
[   74.025571]  kasan_save_stack+0x3c/0x68
[   74.029389]  kasan_save_track+0x20/0x40
[   74.033208]  kasan_save_alloc_info+0x40/0x58
[   74.037461]  __kasan_kmalloc+0xd4/0xd8
[   74.041194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.045708]  kasan_atomics+0xb8/0x2e0
[   74.049353]  kunit_try_run_case+0x170/0x3f0
[   74.053520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.058990]  kthread+0x328/0x630
[   74.062201]  ret_from_fork+0x10/0x20
[   74.065760] 
[   74.067235] The buggy address belongs to the object at ffff000808448180
[   74.067235]  which belongs to the cache kmalloc-64 of size 64
[   74.079563] The buggy address is located 0 bytes to the right of
[   74.079563]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.092408] 
[   74.093885] The buggy address belongs to the physical page:
[   74.099443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.107427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.113936] page_type: f5(slab)
[   74.117070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.124793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.132512] page dumped because: kasan: bad access detected
[   74.138067] 
[   74.139543] Memory state around the buggy address:
[   74.144323]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.151526]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.158731] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.165932]                                      ^
[   74.170711]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.177914]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.185115] ==================================================================
[   78.685310] ==================================================================
[   78.692343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   78.699718] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.707096] 
[   78.708579] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.708630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.708647] Hardware name: WinLink E850-96 board (DT)
[   78.708667] Call trace:
[   78.708681]  show_stack+0x20/0x38 (C)
[   78.708714]  dump_stack_lvl+0x8c/0xd0
[   78.708746]  print_report+0x118/0x5d0
[   78.708774]  kasan_report+0xdc/0x128
[   78.708801]  kasan_check_range+0x100/0x1a8
[   78.708832]  __kasan_check_write+0x20/0x30
[   78.708866]  kasan_atomics_helper+0x175c/0x4858
[   78.708902]  kasan_atomics+0x198/0x2e0
[   78.708933]  kunit_try_run_case+0x170/0x3f0
[   78.708970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.709005]  kthread+0x328/0x630
[   78.709034]  ret_from_fork+0x10/0x20
[   78.709069] 
[   78.780098] Allocated by task 349:
[   78.783485]  kasan_save_stack+0x3c/0x68
[   78.787303]  kasan_save_track+0x20/0x40
[   78.791123]  kasan_save_alloc_info+0x40/0x58
[   78.795376]  __kasan_kmalloc+0xd4/0xd8
[   78.799109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.803623]  kasan_atomics+0xb8/0x2e0
[   78.807268]  kunit_try_run_case+0x170/0x3f0
[   78.811435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.816905]  kthread+0x328/0x630
[   78.820115]  ret_from_fork+0x10/0x20
[   78.823674] 
[   78.825149] The buggy address belongs to the object at ffff000808448180
[   78.825149]  which belongs to the cache kmalloc-64 of size 64
[   78.837477] The buggy address is located 0 bytes to the right of
[   78.837477]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.850323] 
[   78.851799] The buggy address belongs to the physical page:
[   78.857356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.865341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.871851] page_type: f5(slab)
[   78.874983] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.882708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.890427] page dumped because: kasan: bad access detected
[   78.895982] 
[   78.897458] Memory state around the buggy address:
[   78.902236]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.909441]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.916645] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.923846]                                      ^
[   78.928624]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.935829]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.943030] ==================================================================
[   64.154445] ==================================================================
[   64.161484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   64.168860] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.176238] 
[   64.177719] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.177767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.177784] Hardware name: WinLink E850-96 board (DT)
[   64.177803] Call trace:
[   64.177816]  show_stack+0x20/0x38 (C)
[   64.177851]  dump_stack_lvl+0x8c/0xd0
[   64.177883]  print_report+0x118/0x5d0
[   64.177912]  kasan_report+0xdc/0x128
[   64.177938]  __asan_report_store4_noabort+0x20/0x30
[   64.177974]  kasan_atomics_helper+0x3f94/0x4858
[   64.178009]  kasan_atomics+0x198/0x2e0
[   64.178040]  kunit_try_run_case+0x170/0x3f0
[   64.178075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.178111]  kthread+0x328/0x630
[   64.178140]  ret_from_fork+0x10/0x20
[   64.178172] 
[   64.245941] Allocated by task 349:
[   64.249328]  kasan_save_stack+0x3c/0x68
[   64.253147]  kasan_save_track+0x20/0x40
[   64.256965]  kasan_save_alloc_info+0x40/0x58
[   64.261219]  __kasan_kmalloc+0xd4/0xd8
[   64.264952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.269466]  kasan_atomics+0xb8/0x2e0
[   64.273111]  kunit_try_run_case+0x170/0x3f0
[   64.277278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.282748]  kthread+0x328/0x630
[   64.285958]  ret_from_fork+0x10/0x20
[   64.289518] 
[   64.290993] The buggy address belongs to the object at ffff000808448180
[   64.290993]  which belongs to the cache kmalloc-64 of size 64
[   64.303320] The buggy address is located 0 bytes to the right of
[   64.303320]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.316166] 
[   64.317642] The buggy address belongs to the physical page:
[   64.323200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.331184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.337694] page_type: f5(slab)
[   64.340827] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.348551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.356270] page dumped because: kasan: bad access detected
[   64.361825] 
[   64.363301] Memory state around the buggy address:
[   64.368079]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.375284]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.382488] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.389690]                                      ^
[   64.394467]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.401672]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.408874] ==================================================================
[   79.212046] ==================================================================
[   79.219071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   79.226446] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   79.233824] 
[   79.235308] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   79.235357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.235376] Hardware name: WinLink E850-96 board (DT)
[   79.235395] Call trace:
[   79.235407]  show_stack+0x20/0x38 (C)
[   79.235438]  dump_stack_lvl+0x8c/0xd0
[   79.235472]  print_report+0x118/0x5d0
[   79.235501]  kasan_report+0xdc/0x128
[   79.235529]  kasan_check_range+0x100/0x1a8
[   79.235561]  __kasan_check_write+0x20/0x30
[   79.235594]  kasan_atomics_helper+0x17ec/0x4858
[   79.235627]  kasan_atomics+0x198/0x2e0
[   79.235662]  kunit_try_run_case+0x170/0x3f0
[   79.235698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.235730]  kthread+0x328/0x630
[   79.235761]  ret_from_fork+0x10/0x20
[   79.235794] 
[   79.306828] Allocated by task 349:
[   79.310214]  kasan_save_stack+0x3c/0x68
[   79.314032]  kasan_save_track+0x20/0x40
[   79.317851]  kasan_save_alloc_info+0x40/0x58
[   79.322104]  __kasan_kmalloc+0xd4/0xd8
[   79.325837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.330350]  kasan_atomics+0xb8/0x2e0
[   79.333997]  kunit_try_run_case+0x170/0x3f0
[   79.338163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.343631]  kthread+0x328/0x630
[   79.346843]  ret_from_fork+0x10/0x20
[   79.350403] 
[   79.351878] The buggy address belongs to the object at ffff000808448180
[   79.351878]  which belongs to the cache kmalloc-64 of size 64
[   79.364205] The buggy address is located 0 bytes to the right of
[   79.364205]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   79.377052] 
[   79.378529] The buggy address belongs to the physical page:
[   79.384083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   79.392069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.398579] page_type: f5(slab)
[   79.401712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.409436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.417155] page dumped because: kasan: bad access detected
[   79.422710] 
[   79.424186] Memory state around the buggy address:
[   79.428966]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.436169]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.443373] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.450574]                                      ^
[   79.455354]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.462557]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.469758] ==================================================================
[   74.457572] ==================================================================
[   74.464629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   74.472004] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   74.479382] 
[   74.480864] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   74.480913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.480929] Hardware name: WinLink E850-96 board (DT)
[   74.480946] Call trace:
[   74.480960]  show_stack+0x20/0x38 (C)
[   74.480991]  dump_stack_lvl+0x8c/0xd0
[   74.481025]  print_report+0x118/0x5d0
[   74.481053]  kasan_report+0xdc/0x128
[   74.481080]  kasan_check_range+0x100/0x1a8
[   74.481109]  __kasan_check_write+0x20/0x30
[   74.481141]  kasan_atomics_helper+0x1190/0x4858
[   74.481175]  kasan_atomics+0x198/0x2e0
[   74.481209]  kunit_try_run_case+0x170/0x3f0
[   74.481245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.481278]  kthread+0x328/0x630
[   74.481307]  ret_from_fork+0x10/0x20
[   74.481338] 
[   74.552384] Allocated by task 349:
[   74.555771]  kasan_save_stack+0x3c/0x68
[   74.559589]  kasan_save_track+0x20/0x40
[   74.563408]  kasan_save_alloc_info+0x40/0x58
[   74.567662]  __kasan_kmalloc+0xd4/0xd8
[   74.571394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.575908]  kasan_atomics+0xb8/0x2e0
[   74.579554]  kunit_try_run_case+0x170/0x3f0
[   74.583720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.589190]  kthread+0x328/0x630
[   74.592401]  ret_from_fork+0x10/0x20
[   74.595960] 
[   74.597437] The buggy address belongs to the object at ffff000808448180
[   74.597437]  which belongs to the cache kmalloc-64 of size 64
[   74.609764] The buggy address is located 0 bytes to the right of
[   74.609764]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   74.622609] 
[   74.624084] The buggy address belongs to the physical page:
[   74.629640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   74.637626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.644137] page_type: f5(slab)
[   74.647271] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.654994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.662713] page dumped because: kasan: bad access detected
[   74.668268] 
[   74.669743] Memory state around the buggy address:
[   74.674523]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.681726]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.688931] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.696132]                                      ^
[   74.700911]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.708115]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.715315] ==================================================================
[   75.517946] ==================================================================
[   75.525029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   75.532404] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.539783] 
[   75.541265] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.541317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.541334] Hardware name: WinLink E850-96 board (DT)
[   75.541355] Call trace:
[   75.541369]  show_stack+0x20/0x38 (C)
[   75.541399]  dump_stack_lvl+0x8c/0xd0
[   75.541431]  print_report+0x118/0x5d0
[   75.541461]  kasan_report+0xdc/0x128
[   75.541487]  kasan_check_range+0x100/0x1a8
[   75.541517]  __kasan_check_write+0x20/0x30
[   75.541550]  kasan_atomics_helper+0x1384/0x4858
[   75.541584]  kasan_atomics+0x198/0x2e0
[   75.541616]  kunit_try_run_case+0x170/0x3f0
[   75.541651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.541686]  kthread+0x328/0x630
[   75.541716]  ret_from_fork+0x10/0x20
[   75.541748] 
[   75.612785] Allocated by task 349:
[   75.616170]  kasan_save_stack+0x3c/0x68
[   75.619990]  kasan_save_track+0x20/0x40
[   75.623809]  kasan_save_alloc_info+0x40/0x58
[   75.628062]  __kasan_kmalloc+0xd4/0xd8
[   75.631795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.636309]  kasan_atomics+0xb8/0x2e0
[   75.639955]  kunit_try_run_case+0x170/0x3f0
[   75.644121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.649590]  kthread+0x328/0x630
[   75.652802]  ret_from_fork+0x10/0x20
[   75.656361] 
[   75.657836] The buggy address belongs to the object at ffff000808448180
[   75.657836]  which belongs to the cache kmalloc-64 of size 64
[   75.670163] The buggy address is located 0 bytes to the right of
[   75.670163]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.683010] 
[   75.684486] The buggy address belongs to the physical page:
[   75.690042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.698027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.704537] page_type: f5(slab)
[   75.707672] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.715394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.723113] page dumped because: kasan: bad access detected
[   75.728668] 
[   75.730144] Memory state around the buggy address:
[   75.734924]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.742127]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.749332] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.756533]                                      ^
[   75.761311]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.768515]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.775717] ==================================================================
[   69.443274] ==================================================================
[   69.450292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   69.457582] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.464960] 
[   69.466444] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.466495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.466513] Hardware name: WinLink E850-96 board (DT)
[   69.466532] Call trace:
[   69.466546]  show_stack+0x20/0x38 (C)
[   69.466583]  dump_stack_lvl+0x8c/0xd0
[   69.466615]  print_report+0x118/0x5d0
[   69.466642]  kasan_report+0xdc/0x128
[   69.466669]  kasan_check_range+0x100/0x1a8
[   69.466699]  __kasan_check_write+0x20/0x30
[   69.466733]  kasan_atomics_helper+0xb70/0x4858
[   69.466768]  kasan_atomics+0x198/0x2e0
[   69.466800]  kunit_try_run_case+0x170/0x3f0
[   69.466838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.466871]  kthread+0x328/0x630
[   69.466900]  ret_from_fork+0x10/0x20
[   69.466931] 
[   69.537876] Allocated by task 349:
[   69.541263]  kasan_save_stack+0x3c/0x68
[   69.545081]  kasan_save_track+0x20/0x40
[   69.548900]  kasan_save_alloc_info+0x40/0x58
[   69.553154]  __kasan_kmalloc+0xd4/0xd8
[   69.556886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.561400]  kasan_atomics+0xb8/0x2e0
[   69.565046]  kunit_try_run_case+0x170/0x3f0
[   69.569213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.574683]  kthread+0x328/0x630
[   69.577893]  ret_from_fork+0x10/0x20
[   69.581452] 
[   69.582927] The buggy address belongs to the object at ffff000808448180
[   69.582927]  which belongs to the cache kmalloc-64 of size 64
[   69.595254] The buggy address is located 0 bytes to the right of
[   69.595254]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.608101] 
[   69.609578] The buggy address belongs to the physical page:
[   69.615136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.623119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.629628] page_type: f5(slab)
[   69.632764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.640486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.648204] page dumped because: kasan: bad access detected
[   69.653760] 
[   69.655235] Memory state around the buggy address:
[   69.660015]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.667218]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.674423] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.681624]                                      ^
[   69.686402]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.693606]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.700808] ==================================================================
[   78.950470] ==================================================================
[   78.957443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   78.964818] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.972110] 
[   78.973593] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.973642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.973659] Hardware name: WinLink E850-96 board (DT)
[   78.973679] Call trace:
[   78.973696]  show_stack+0x20/0x38 (C)
[   78.973730]  dump_stack_lvl+0x8c/0xd0
[   78.973765]  print_report+0x118/0x5d0
[   78.973795]  kasan_report+0xdc/0x128
[   78.973821]  __asan_report_load8_noabort+0x20/0x30
[   78.973856]  kasan_atomics_helper+0x3e20/0x4858
[   78.973892]  kasan_atomics+0x198/0x2e0
[   78.973924]  kunit_try_run_case+0x170/0x3f0
[   78.973959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.973993]  kthread+0x328/0x630
[   78.974024]  ret_from_fork+0x10/0x20
[   78.974060] 
[   79.041726] Allocated by task 349:
[   79.045114]  kasan_save_stack+0x3c/0x68
[   79.048931]  kasan_save_track+0x20/0x40
[   79.052751]  kasan_save_alloc_info+0x40/0x58
[   79.057004]  __kasan_kmalloc+0xd4/0xd8
[   79.060737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.065250]  kasan_atomics+0xb8/0x2e0
[   79.068896]  kunit_try_run_case+0x170/0x3f0
[   79.073063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.078533]  kthread+0x328/0x630
[   79.081743]  ret_from_fork+0x10/0x20
[   79.085302] 
[   79.086778] The buggy address belongs to the object at ffff000808448180
[   79.086778]  which belongs to the cache kmalloc-64 of size 64
[   79.099104] The buggy address is located 0 bytes to the right of
[   79.099104]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   79.111951] 
[   79.113428] The buggy address belongs to the physical page:
[   79.118984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   79.126969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.133479] page_type: f5(slab)
[   79.136613] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.144336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.152055] page dumped because: kasan: bad access detected
[   79.157610] 
[   79.159085] Memory state around the buggy address:
[   79.163865]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.171068]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.178273] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.185474]                                      ^
[   79.190254]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.197457]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.204658] ==================================================================
[   77.631858] ==================================================================
[   77.638887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   77.646262] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.653640] 
[   77.655123] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.655172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.655187] Hardware name: WinLink E850-96 board (DT)
[   77.655207] Call trace:
[   77.655220]  show_stack+0x20/0x38 (C)
[   77.655252]  dump_stack_lvl+0x8c/0xd0
[   77.655285]  print_report+0x118/0x5d0
[   77.655313]  kasan_report+0xdc/0x128
[   77.655341]  kasan_check_range+0x100/0x1a8
[   77.655375]  __kasan_check_write+0x20/0x30
[   77.655407]  kasan_atomics_helper+0x1644/0x4858
[   77.655443]  kasan_atomics+0x198/0x2e0
[   77.655476]  kunit_try_run_case+0x170/0x3f0
[   77.655511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.655545]  kthread+0x328/0x630
[   77.655574]  ret_from_fork+0x10/0x20
[   77.655607] 
[   77.726642] Allocated by task 349:
[   77.730029]  kasan_save_stack+0x3c/0x68
[   77.733847]  kasan_save_track+0x20/0x40
[   77.737666]  kasan_save_alloc_info+0x40/0x58
[   77.741920]  __kasan_kmalloc+0xd4/0xd8
[   77.745652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.750166]  kasan_atomics+0xb8/0x2e0
[   77.753812]  kunit_try_run_case+0x170/0x3f0
[   77.757978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.763447]  kthread+0x328/0x630
[   77.766659]  ret_from_fork+0x10/0x20
[   77.770218] 
[   77.771693] The buggy address belongs to the object at ffff000808448180
[   77.771693]  which belongs to the cache kmalloc-64 of size 64
[   77.784020] The buggy address is located 0 bytes to the right of
[   77.784020]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.796867] 
[   77.798343] The buggy address belongs to the physical page:
[   77.803898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.811884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.818394] page_type: f5(slab)
[   77.821529] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.829251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.836970] page dumped because: kasan: bad access detected
[   77.842526] 
[   77.844001] Memory state around the buggy address:
[   77.848779]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.855984]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.863189] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.870390]                                      ^
[   77.875168]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.882373]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.889573] ==================================================================
[   64.416259] ==================================================================
[   64.423286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   64.430575] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   64.437953] 
[   64.439434] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   64.439486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.439503] Hardware name: WinLink E850-96 board (DT)
[   64.439521] Call trace:
[   64.439536]  show_stack+0x20/0x38 (C)
[   64.439568]  dump_stack_lvl+0x8c/0xd0
[   64.439601]  print_report+0x118/0x5d0
[   64.439631]  kasan_report+0xdc/0x128
[   64.439658]  kasan_check_range+0x100/0x1a8
[   64.439687]  __kasan_check_write+0x20/0x30
[   64.439719]  kasan_atomics_helper+0x3ac/0x4858
[   64.439754]  kasan_atomics+0x198/0x2e0
[   64.439785]  kunit_try_run_case+0x170/0x3f0
[   64.439820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.439854]  kthread+0x328/0x630
[   64.439882]  ret_from_fork+0x10/0x20
[   64.439914] 
[   64.510868] Allocated by task 349:
[   64.514255]  kasan_save_stack+0x3c/0x68
[   64.518073]  kasan_save_track+0x20/0x40
[   64.521893]  kasan_save_alloc_info+0x40/0x58
[   64.526146]  __kasan_kmalloc+0xd4/0xd8
[   64.529878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.534392]  kasan_atomics+0xb8/0x2e0
[   64.538038]  kunit_try_run_case+0x170/0x3f0
[   64.542205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.547673]  kthread+0x328/0x630
[   64.550885]  ret_from_fork+0x10/0x20
[   64.554444] 
[   64.555919] The buggy address belongs to the object at ffff000808448180
[   64.555919]  which belongs to the cache kmalloc-64 of size 64
[   64.568246] The buggy address is located 0 bytes to the right of
[   64.568246]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.581093] 
[   64.582568] The buggy address belongs to the physical page:
[   64.588126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.596110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.602621] page_type: f5(slab)
[   64.605753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.613477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.621197] page dumped because: kasan: bad access detected
[   64.626752] 
[   64.628228] Memory state around the buggy address:
[   64.633006]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.640210]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.647415] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.654616]                                      ^
[   64.659394]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.666599]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.673800] ==================================================================
[   71.023019] ==================================================================
[   71.029958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   71.037246] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   71.044624] 
[   71.046108] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   71.046161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.046177] Hardware name: WinLink E850-96 board (DT)
[   71.046197] Call trace:
[   71.046212]  show_stack+0x20/0x38 (C)
[   71.046247]  dump_stack_lvl+0x8c/0xd0
[   71.046279]  print_report+0x118/0x5d0
[   71.046307]  kasan_report+0xdc/0x128
[   71.046334]  kasan_check_range+0x100/0x1a8
[   71.046362]  __kasan_check_write+0x20/0x30
[   71.046396]  kasan_atomics_helper+0xd3c/0x4858
[   71.046433]  kasan_atomics+0x198/0x2e0
[   71.046465]  kunit_try_run_case+0x170/0x3f0
[   71.046502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.046537]  kthread+0x328/0x630
[   71.046566]  ret_from_fork+0x10/0x20
[   71.046602] 
[   71.117540] Allocated by task 349:
[   71.120927]  kasan_save_stack+0x3c/0x68
[   71.124745]  kasan_save_track+0x20/0x40
[   71.128564]  kasan_save_alloc_info+0x40/0x58
[   71.132817]  __kasan_kmalloc+0xd4/0xd8
[   71.136550]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.141064]  kasan_atomics+0xb8/0x2e0
[   71.144710]  kunit_try_run_case+0x170/0x3f0
[   71.148876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.154345]  kthread+0x328/0x630
[   71.157557]  ret_from_fork+0x10/0x20
[   71.161116] 
[   71.162591] The buggy address belongs to the object at ffff000808448180
[   71.162591]  which belongs to the cache kmalloc-64 of size 64
[   71.174918] The buggy address is located 0 bytes to the right of
[   71.174918]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   71.187764] 
[   71.189240] The buggy address belongs to the physical page:
[   71.194798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   71.202782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.209292] page_type: f5(slab)
[   71.212427] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.220149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.227868] page dumped because: kasan: bad access detected
[   71.233423] 
[   71.234899] Memory state around the buggy address:
[   71.239679]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.246882]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.254087] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.261288]                                      ^
[   71.266065]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.273270]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.280472] ==================================================================
[   72.075946] ==================================================================
[   72.082895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   72.090182] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.097560] 
[   72.099044] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.099093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.099111] Hardware name: WinLink E850-96 board (DT)
[   72.099132] Call trace:
[   72.099146]  show_stack+0x20/0x38 (C)
[   72.099179]  dump_stack_lvl+0x8c/0xd0
[   72.099210]  print_report+0x118/0x5d0
[   72.099239]  kasan_report+0xdc/0x128
[   72.099267]  kasan_check_range+0x100/0x1a8
[   72.099298]  __kasan_check_write+0x20/0x30
[   72.099331]  kasan_atomics_helper+0xe44/0x4858
[   72.099365]  kasan_atomics+0x198/0x2e0
[   72.099397]  kunit_try_run_case+0x170/0x3f0
[   72.099432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.099469]  kthread+0x328/0x630
[   72.099498]  ret_from_fork+0x10/0x20
[   72.099532] 
[   72.170475] Allocated by task 349:
[   72.173862]  kasan_save_stack+0x3c/0x68
[   72.177680]  kasan_save_track+0x20/0x40
[   72.181500]  kasan_save_alloc_info+0x40/0x58
[   72.185753]  __kasan_kmalloc+0xd4/0xd8
[   72.189486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.194000]  kasan_atomics+0xb8/0x2e0
[   72.197645]  kunit_try_run_case+0x170/0x3f0
[   72.201812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.207280]  kthread+0x328/0x630
[   72.210492]  ret_from_fork+0x10/0x20
[   72.214051] 
[   72.215527] The buggy address belongs to the object at ffff000808448180
[   72.215527]  which belongs to the cache kmalloc-64 of size 64
[   72.227855] The buggy address is located 0 bytes to the right of
[   72.227855]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   72.240700] 
[   72.242177] The buggy address belongs to the physical page:
[   72.247733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   72.255719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.262228] page_type: f5(slab)
[   72.265364] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.273085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.280804] page dumped because: kasan: bad access detected
[   72.286359] 
[   72.287835] Memory state around the buggy address:
[   72.292616]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.299818]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.307022] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.314223]                                      ^
[   72.319001]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.326206]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.333407] ==================================================================
[   68.386858] ==================================================================
[   68.393886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   68.401174] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.408552] 
[   68.410036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.410087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.410104] Hardware name: WinLink E850-96 board (DT)
[   68.410123] Call trace:
[   68.410136]  show_stack+0x20/0x38 (C)
[   68.410169]  dump_stack_lvl+0x8c/0xd0
[   68.410201]  print_report+0x118/0x5d0
[   68.410232]  kasan_report+0xdc/0x128
[   68.410261]  kasan_check_range+0x100/0x1a8
[   68.410290]  __kasan_check_write+0x20/0x30
[   68.410321]  kasan_atomics_helper+0xa04/0x4858
[   68.410354]  kasan_atomics+0x198/0x2e0
[   68.410385]  kunit_try_run_case+0x170/0x3f0
[   68.410424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.410457]  kthread+0x328/0x630
[   68.410488]  ret_from_fork+0x10/0x20
[   68.410519] 
[   68.481468] Allocated by task 349:
[   68.484855]  kasan_save_stack+0x3c/0x68
[   68.488673]  kasan_save_track+0x20/0x40
[   68.492492]  kasan_save_alloc_info+0x40/0x58
[   68.496746]  __kasan_kmalloc+0xd4/0xd8
[   68.500479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.504992]  kasan_atomics+0xb8/0x2e0
[   68.508638]  kunit_try_run_case+0x170/0x3f0
[   68.512805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.518274]  kthread+0x328/0x630
[   68.521485]  ret_from_fork+0x10/0x20
[   68.525044] 
[   68.526520] The buggy address belongs to the object at ffff000808448180
[   68.526520]  which belongs to the cache kmalloc-64 of size 64
[   68.538846] The buggy address is located 0 bytes to the right of
[   68.538846]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.551693] 
[   68.553170] The buggy address belongs to the physical page:
[   68.558724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.566711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.573221] page_type: f5(slab)
[   68.576353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.584078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.591797] page dumped because: kasan: bad access detected
[   68.597352] 
[   68.598828] Memory state around the buggy address:
[   68.603606]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.610810]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.618015] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.625216]                                      ^
[   68.629994]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.637199]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.644400] ==================================================================
[   63.889571] ==================================================================
[   63.896558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   63.903846] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.911225] 
[   63.912708] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.912760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.912775] Hardware name: WinLink E850-96 board (DT)
[   63.912796] Call trace:
[   63.912809]  show_stack+0x20/0x38 (C)
[   63.912844]  dump_stack_lvl+0x8c/0xd0
[   63.912877]  print_report+0x118/0x5d0
[   63.912904]  kasan_report+0xdc/0x128
[   63.912931]  kasan_check_range+0x100/0x1a8
[   63.912961]  __kasan_check_write+0x20/0x30
[   63.912993]  kasan_atomics_helper+0x32c/0x4858
[   63.913029]  kasan_atomics+0x198/0x2e0
[   63.913061]  kunit_try_run_case+0x170/0x3f0
[   63.913096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.913130]  kthread+0x328/0x630
[   63.913158]  ret_from_fork+0x10/0x20
[   63.913190] 
[   63.984140] Allocated by task 349:
[   63.987527]  kasan_save_stack+0x3c/0x68
[   63.991345]  kasan_save_track+0x20/0x40
[   63.995164]  kasan_save_alloc_info+0x40/0x58
[   63.999418]  __kasan_kmalloc+0xd4/0xd8
[   64.003150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.007664]  kasan_atomics+0xb8/0x2e0
[   64.011310]  kunit_try_run_case+0x170/0x3f0
[   64.015477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.020947]  kthread+0x328/0x630
[   64.024157]  ret_from_fork+0x10/0x20
[   64.027716] 
[   64.029191] The buggy address belongs to the object at ffff000808448180
[   64.029191]  which belongs to the cache kmalloc-64 of size 64
[   64.041518] The buggy address is located 0 bytes to the right of
[   64.041518]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   64.054364] 
[   64.055841] The buggy address belongs to the physical page:
[   64.061398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   64.069382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.075892] page_type: f5(slab)
[   64.079029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.086749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.094468] page dumped because: kasan: bad access detected
[   64.100024] 
[   64.101499] Memory state around the buggy address:
[   64.106278]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.113482]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.120687] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.127888]                                      ^
[   64.132667]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.139871]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.147072] ==================================================================
[   63.363093] ==================================================================
[   63.370175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   63.377465] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   63.384757] 
[   63.386239] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   63.386291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.386309] Hardware name: WinLink E850-96 board (DT)
[   63.386328] Call trace:
[   63.386343]  show_stack+0x20/0x38 (C)
[   63.386379]  dump_stack_lvl+0x8c/0xd0
[   63.386411]  print_report+0x118/0x5d0
[   63.386438]  kasan_report+0xdc/0x128
[   63.386467]  kasan_check_range+0x100/0x1a8
[   63.386496]  __kasan_check_read+0x20/0x30
[   63.386531]  kasan_atomics_helper+0x2b0/0x4858
[   63.386565]  kasan_atomics+0x198/0x2e0
[   63.386598]  kunit_try_run_case+0x170/0x3f0
[   63.386637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.386668]  kthread+0x328/0x630
[   63.386700]  ret_from_fork+0x10/0x20
[   63.386734] 
[   63.457585] Allocated by task 349:
[   63.460973]  kasan_save_stack+0x3c/0x68
[   63.464790]  kasan_save_track+0x20/0x40
[   63.468610]  kasan_save_alloc_info+0x40/0x58
[   63.472863]  __kasan_kmalloc+0xd4/0xd8
[   63.476596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.481109]  kasan_atomics+0xb8/0x2e0
[   63.484755]  kunit_try_run_case+0x170/0x3f0
[   63.488922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.494390]  kthread+0x328/0x630
[   63.497601]  ret_from_fork+0x10/0x20
[   63.501161] 
[   63.502636] The buggy address belongs to the object at ffff000808448180
[   63.502636]  which belongs to the cache kmalloc-64 of size 64
[   63.514964] The buggy address is located 0 bytes to the right of
[   63.514964]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   63.527810] 
[   63.529287] The buggy address belongs to the physical page:
[   63.534842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.542829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.549338] page_type: f5(slab)
[   63.552472] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.560195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.567913] page dumped because: kasan: bad access detected
[   63.573469] 
[   63.574945] Memory state around the buggy address:
[   63.579723]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.586927]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.594132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.601333]                                      ^
[   63.606113]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.613316]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.620517] ==================================================================
[   66.535647] ==================================================================
[   66.542701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   66.549987] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.557365] 
[   66.558846] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.558895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.558912] Hardware name: WinLink E850-96 board (DT)
[   66.558930] Call trace:
[   66.558945]  show_stack+0x20/0x38 (C)
[   66.558978]  dump_stack_lvl+0x8c/0xd0
[   66.559012]  print_report+0x118/0x5d0
[   66.559040]  kasan_report+0xdc/0x128
[   66.559066]  kasan_check_range+0x100/0x1a8
[   66.559097]  __kasan_check_write+0x20/0x30
[   66.559129]  kasan_atomics_helper+0x6ec/0x4858
[   66.559163]  kasan_atomics+0x198/0x2e0
[   66.559195]  kunit_try_run_case+0x170/0x3f0
[   66.559229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.559265]  kthread+0x328/0x630
[   66.559294]  ret_from_fork+0x10/0x20
[   66.559325] 
[   66.630280] Allocated by task 349:
[   66.633668]  kasan_save_stack+0x3c/0x68
[   66.637486]  kasan_save_track+0x20/0x40
[   66.641305]  kasan_save_alloc_info+0x40/0x58
[   66.645558]  __kasan_kmalloc+0xd4/0xd8
[   66.649291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.653805]  kasan_atomics+0xb8/0x2e0
[   66.657451]  kunit_try_run_case+0x170/0x3f0
[   66.661617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.667086]  kthread+0x328/0x630
[   66.670298]  ret_from_fork+0x10/0x20
[   66.673856] 
[   66.675332] The buggy address belongs to the object at ffff000808448180
[   66.675332]  which belongs to the cache kmalloc-64 of size 64
[   66.687659] The buggy address is located 0 bytes to the right of
[   66.687659]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.700505] 
[   66.701981] The buggy address belongs to the physical page:
[   66.707539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.715523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.722033] page_type: f5(slab)
[   66.725166] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.732890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.740609] page dumped because: kasan: bad access detected
[   66.746165] 
[   66.747640] Memory state around the buggy address:
[   66.752419]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.759623]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.766828] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.774029]                                      ^
[   66.778806]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.786011]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.793212] ==================================================================
[   65.211018] ==================================================================
[   65.218064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   65.225354] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   65.232732] 
[   65.234215] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   65.234263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.234281] Hardware name: WinLink E850-96 board (DT)
[   65.234299] Call trace:
[   65.234312]  show_stack+0x20/0x38 (C)
[   65.234344]  dump_stack_lvl+0x8c/0xd0
[   65.234376]  print_report+0x118/0x5d0
[   65.234403]  kasan_report+0xdc/0x128
[   65.234431]  kasan_check_range+0x100/0x1a8
[   65.234460]  __kasan_check_write+0x20/0x30
[   65.234493]  kasan_atomics_helper+0x4e4/0x4858
[   65.234528]  kasan_atomics+0x198/0x2e0
[   65.234561]  kunit_try_run_case+0x170/0x3f0
[   65.234595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.234632]  kthread+0x328/0x630
[   65.234661]  ret_from_fork+0x10/0x20
[   65.234692] 
[   65.305648] Allocated by task 349:
[   65.309033]  kasan_save_stack+0x3c/0x68
[   65.312853]  kasan_save_track+0x20/0x40
[   65.316672]  kasan_save_alloc_info+0x40/0x58
[   65.320926]  __kasan_kmalloc+0xd4/0xd8
[   65.324658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.329172]  kasan_atomics+0xb8/0x2e0
[   65.332818]  kunit_try_run_case+0x170/0x3f0
[   65.336984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.342453]  kthread+0x328/0x630
[   65.345665]  ret_from_fork+0x10/0x20
[   65.349224] 
[   65.350700] The buggy address belongs to the object at ffff000808448180
[   65.350700]  which belongs to the cache kmalloc-64 of size 64
[   65.363026] The buggy address is located 0 bytes to the right of
[   65.363026]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.375873] 
[   65.377348] The buggy address belongs to the physical page:
[   65.382906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.390890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.397400] page_type: f5(slab)
[   65.400535] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.408257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.415976] page dumped because: kasan: bad access detected
[   65.421532] 
[   65.423007] Memory state around the buggy address:
[   65.427785]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.434990]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.442195] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.449396]                                      ^
[   65.454174]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.461378]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.468580] ==================================================================
[   74.987859] ==================================================================
[   74.994828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   75.002204] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.009582] 
[   75.011064] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.011112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.011128] Hardware name: WinLink E850-96 board (DT)
[   75.011147] Call trace:
[   75.011161]  show_stack+0x20/0x38 (C)
[   75.011194]  dump_stack_lvl+0x8c/0xd0
[   75.011228]  print_report+0x118/0x5d0
[   75.011258]  kasan_report+0xdc/0x128
[   75.011284]  kasan_check_range+0x100/0x1a8
[   75.011315]  __kasan_check_write+0x20/0x30
[   75.011348]  kasan_atomics_helper+0x126c/0x4858
[   75.011382]  kasan_atomics+0x198/0x2e0
[   75.011416]  kunit_try_run_case+0x170/0x3f0
[   75.011451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.011486]  kthread+0x328/0x630
[   75.011518]  ret_from_fork+0x10/0x20
[   75.011551] 
[   75.082584] Allocated by task 349:
[   75.085972]  kasan_save_stack+0x3c/0x68
[   75.089789]  kasan_save_track+0x20/0x40
[   75.093609]  kasan_save_alloc_info+0x40/0x58
[   75.097862]  __kasan_kmalloc+0xd4/0xd8
[   75.101595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.106108]  kasan_atomics+0xb8/0x2e0
[   75.109754]  kunit_try_run_case+0x170/0x3f0
[   75.113921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.119390]  kthread+0x328/0x630
[   75.122601]  ret_from_fork+0x10/0x20
[   75.126160] 
[   75.127636] The buggy address belongs to the object at ffff000808448180
[   75.127636]  which belongs to the cache kmalloc-64 of size 64
[   75.139964] The buggy address is located 0 bytes to the right of
[   75.139964]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.152809] 
[   75.154287] The buggy address belongs to the physical page:
[   75.159844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.167828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.174337] page_type: f5(slab)
[   75.177471] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.185194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.192913] page dumped because: kasan: bad access detected
[   75.198468] 
[   75.199944] Memory state around the buggy address:
[   75.204723]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.211927]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.219132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.226332]                                      ^
[   75.231110]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.238315]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.245516] ==================================================================
[   62.571633] ==================================================================
[   62.578697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   62.586071] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   62.593451] 
[   62.594933] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.594988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.595007] Hardware name: WinLink E850-96 board (DT)
[   62.595028] Call trace:
[   62.595043]  show_stack+0x20/0x38 (C)
[   62.595084]  dump_stack_lvl+0x8c/0xd0
[   62.595116]  print_report+0x118/0x5d0
[   62.595144]  kasan_report+0xdc/0x128
[   62.595171]  __asan_report_store4_noabort+0x20/0x30
[   62.595207]  kasan_atomics_helper+0x3f7c/0x4858
[   62.595244]  kasan_atomics+0x198/0x2e0
[   62.595276]  kunit_try_run_case+0x170/0x3f0
[   62.595313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.595348]  kthread+0x328/0x630
[   62.595381]  ret_from_fork+0x10/0x20
[   62.595415] 
[   62.663153] Allocated by task 349:
[   62.666539]  kasan_save_stack+0x3c/0x68
[   62.670359]  kasan_save_track+0x20/0x40
[   62.674177]  kasan_save_alloc_info+0x40/0x58
[   62.678431]  __kasan_kmalloc+0xd4/0xd8
[   62.682163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.686677]  kasan_atomics+0xb8/0x2e0
[   62.690323]  kunit_try_run_case+0x170/0x3f0
[   62.694489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.699959]  kthread+0x328/0x630
[   62.703170]  ret_from_fork+0x10/0x20
[   62.706729] 
[   62.708206] The buggy address belongs to the object at ffff000808448180
[   62.708206]  which belongs to the cache kmalloc-64 of size 64
[   62.720532] The buggy address is located 0 bytes to the right of
[   62.720532]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   62.733378] 
[   62.734855] The buggy address belongs to the physical page:
[   62.740413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   62.748398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.754905] page_type: f5(slab)
[   62.758042] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.765762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.773481] page dumped because: kasan: bad access detected
[   62.779037] 
[   62.780512] Memory state around the buggy address:
[   62.785293]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.792495]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.799700] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.806901]                                      ^
[   62.811680]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.818885]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.826085] ==================================================================
[   68.121907] ==================================================================
[   68.128959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   68.136248] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   68.143626] 
[   68.145109] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   68.145159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.145177] Hardware name: WinLink E850-96 board (DT)
[   68.145195] Call trace:
[   68.145209]  show_stack+0x20/0x38 (C)
[   68.145241]  dump_stack_lvl+0x8c/0xd0
[   68.145274]  print_report+0x118/0x5d0
[   68.145300]  kasan_report+0xdc/0x128
[   68.145327]  kasan_check_range+0x100/0x1a8
[   68.145357]  __kasan_check_write+0x20/0x30
[   68.145389]  kasan_atomics_helper+0x99c/0x4858
[   68.145425]  kasan_atomics+0x198/0x2e0
[   68.145456]  kunit_try_run_case+0x170/0x3f0
[   68.145493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.145527]  kthread+0x328/0x630
[   68.145557]  ret_from_fork+0x10/0x20
[   68.145591] 
[   68.216542] Allocated by task 349:
[   68.219929]  kasan_save_stack+0x3c/0x68
[   68.223746]  kasan_save_track+0x20/0x40
[   68.227566]  kasan_save_alloc_info+0x40/0x58
[   68.231819]  __kasan_kmalloc+0xd4/0xd8
[   68.235552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.240066]  kasan_atomics+0xb8/0x2e0
[   68.243712]  kunit_try_run_case+0x170/0x3f0
[   68.247878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.253347]  kthread+0x328/0x630
[   68.256559]  ret_from_fork+0x10/0x20
[   68.260118] 
[   68.261593] The buggy address belongs to the object at ffff000808448180
[   68.261593]  which belongs to the cache kmalloc-64 of size 64
[   68.273920] The buggy address is located 0 bytes to the right of
[   68.273920]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.286766] 
[   68.288242] The buggy address belongs to the physical page:
[   68.293800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.301786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.308294] page_type: f5(slab)
[   68.311428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.319151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.326870] page dumped because: kasan: bad access detected
[   68.332425] 
[   68.333901] Memory state around the buggy address:
[   68.338679]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.345884]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.353088] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.360289]                                      ^
[   68.365068]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.372272]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.379473] ==================================================================
[   75.783094] ==================================================================
[   75.790129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   75.797505] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.804796] 
[   75.806277] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.806325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.806343] Hardware name: WinLink E850-96 board (DT)
[   75.806364] Call trace:
[   75.806377]  show_stack+0x20/0x38 (C)
[   75.806408]  dump_stack_lvl+0x8c/0xd0
[   75.806440]  print_report+0x118/0x5d0
[   75.806467]  kasan_report+0xdc/0x128
[   75.806495]  __asan_report_load8_noabort+0x20/0x30
[   75.806528]  kasan_atomics_helper+0x3f04/0x4858
[   75.806564]  kasan_atomics+0x198/0x2e0
[   75.806598]  kunit_try_run_case+0x170/0x3f0
[   75.806633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.806668]  kthread+0x328/0x630
[   75.806699]  ret_from_fork+0x10/0x20
[   75.806733] 
[   75.874413] Allocated by task 349:
[   75.877800]  kasan_save_stack+0x3c/0x68
[   75.881618]  kasan_save_track+0x20/0x40
[   75.885437]  kasan_save_alloc_info+0x40/0x58
[   75.889690]  __kasan_kmalloc+0xd4/0xd8
[   75.893423]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.897937]  kasan_atomics+0xb8/0x2e0
[   75.901583]  kunit_try_run_case+0x170/0x3f0
[   75.905749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.911218]  kthread+0x328/0x630
[   75.914430]  ret_from_fork+0x10/0x20
[   75.917989] 
[   75.919466] The buggy address belongs to the object at ffff000808448180
[   75.919466]  which belongs to the cache kmalloc-64 of size 64
[   75.931791] The buggy address is located 0 bytes to the right of
[   75.931791]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.944638] 
[   75.946114] The buggy address belongs to the physical page:
[   75.951671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.959655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.966165] page_type: f5(slab)
[   75.969299] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.977022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.984741] page dumped because: kasan: bad access detected
[   75.990297] 
[   75.991772] Memory state around the buggy address:
[   75.996552]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.003755]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.010959] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.018161]                                      ^
[   76.022938]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.030143]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.037345] ==================================================================
[   77.896930] ==================================================================
[   77.903987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   77.911362] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.918653] 
[   77.920135] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.920188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.920204] Hardware name: WinLink E850-96 board (DT)
[   77.920225] Call trace:
[   77.920239]  show_stack+0x20/0x38 (C)
[   77.920271]  dump_stack_lvl+0x8c/0xd0
[   77.920303]  print_report+0x118/0x5d0
[   77.920333]  kasan_report+0xdc/0x128
[   77.920360]  __asan_report_load8_noabort+0x20/0x30
[   77.920396]  kasan_atomics_helper+0x3df4/0x4858
[   77.920432]  kasan_atomics+0x198/0x2e0
[   77.920464]  kunit_try_run_case+0x170/0x3f0
[   77.920501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.920536]  kthread+0x328/0x630
[   77.920563]  ret_from_fork+0x10/0x20
[   77.920594] 
[   77.988270] Allocated by task 349:
[   77.991657]  kasan_save_stack+0x3c/0x68
[   77.995475]  kasan_save_track+0x20/0x40
[   77.999294]  kasan_save_alloc_info+0x40/0x58
[   78.003548]  __kasan_kmalloc+0xd4/0xd8
[   78.007280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.011794]  kasan_atomics+0xb8/0x2e0
[   78.015440]  kunit_try_run_case+0x170/0x3f0
[   78.019607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.025075]  kthread+0x328/0x630
[   78.028287]  ret_from_fork+0x10/0x20
[   78.031846] 
[   78.033321] The buggy address belongs to the object at ffff000808448180
[   78.033321]  which belongs to the cache kmalloc-64 of size 64
[   78.045648] The buggy address is located 0 bytes to the right of
[   78.045648]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.058495] 
[   78.059973] The buggy address belongs to the physical page:
[   78.065528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.073512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.080022] page_type: f5(slab)
[   78.083157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.090879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.098598] page dumped because: kasan: bad access detected
[   78.104154] 
[   78.105629] Memory state around the buggy address:
[   78.110407]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.117612]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.124817] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.132018]                                      ^
[   78.136796]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.144000]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.151202] ==================================================================
[   76.574902] ==================================================================
[   76.581956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   76.589333] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   76.596711] 
[   76.598194] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   76.598243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.598259] Hardware name: WinLink E850-96 board (DT)
[   76.598277] Call trace:
[   76.598293]  show_stack+0x20/0x38 (C)
[   76.598325]  dump_stack_lvl+0x8c/0xd0
[   76.598357]  print_report+0x118/0x5d0
[   76.598386]  kasan_report+0xdc/0x128
[   76.598414]  kasan_check_range+0x100/0x1a8
[   76.598446]  __kasan_check_write+0x20/0x30
[   76.598479]  kasan_atomics_helper+0x14e4/0x4858
[   76.598513]  kasan_atomics+0x198/0x2e0
[   76.598545]  kunit_try_run_case+0x170/0x3f0
[   76.598581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.598615]  kthread+0x328/0x630
[   76.598645]  ret_from_fork+0x10/0x20
[   76.598678] 
[   76.669713] Allocated by task 349:
[   76.673101]  kasan_save_stack+0x3c/0x68
[   76.676919]  kasan_save_track+0x20/0x40
[   76.680738]  kasan_save_alloc_info+0x40/0x58
[   76.684991]  __kasan_kmalloc+0xd4/0xd8
[   76.688724]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.693237]  kasan_atomics+0xb8/0x2e0
[   76.696883]  kunit_try_run_case+0x170/0x3f0
[   76.701050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.706518]  kthread+0x328/0x630
[   76.709730]  ret_from_fork+0x10/0x20
[   76.713289] 
[   76.714764] The buggy address belongs to the object at ffff000808448180
[   76.714764]  which belongs to the cache kmalloc-64 of size 64
[   76.727093] The buggy address is located 0 bytes to the right of
[   76.727093]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   76.739938] 
[   76.741414] The buggy address belongs to the physical page:
[   76.746970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   76.754956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.761466] page_type: f5(slab)
[   76.764600] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.772323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.780042] page dumped because: kasan: bad access detected
[   76.785597] 
[   76.787073] Memory state around the buggy address:
[   76.791850]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.799055]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.806260] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.813461]                                      ^
[   76.818239]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.825444]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.832645] ==================================================================
[   62.302886] ==================================================================
[   62.317070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   62.324443] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   62.331736] 
[   62.333223] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.333286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.333305] Hardware name: WinLink E850-96 board (DT)
[   62.333329] Call trace:
[   62.333343]  show_stack+0x20/0x38 (C)
[   62.333383]  dump_stack_lvl+0x8c/0xd0
[   62.333420]  print_report+0x118/0x5d0
[   62.333451]  kasan_report+0xdc/0x128
[   62.333479]  __asan_report_load4_noabort+0x20/0x30
[   62.333515]  kasan_atomics_helper+0x40a8/0x4858
[   62.333554]  kasan_atomics+0x198/0x2e0
[   62.333588]  kunit_try_run_case+0x170/0x3f0
[   62.333627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.333662]  kthread+0x328/0x630
[   62.333695]  ret_from_fork+0x10/0x20
[   62.333734] 
[   62.401353] Allocated by task 349:
[   62.404740]  kasan_save_stack+0x3c/0x68
[   62.408556]  kasan_save_track+0x20/0x40
[   62.412376]  kasan_save_alloc_info+0x40/0x58
[   62.416629]  __kasan_kmalloc+0xd4/0xd8
[   62.420362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.424875]  kasan_atomics+0xb8/0x2e0
[   62.428521]  kunit_try_run_case+0x170/0x3f0
[   62.432688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.438158]  kthread+0x328/0x630
[   62.441368]  ret_from_fork+0x10/0x20
[   62.444927] 
[   62.446404] The buggy address belongs to the object at ffff000808448180
[   62.446404]  which belongs to the cache kmalloc-64 of size 64
[   62.458733] The buggy address is located 0 bytes to the right of
[   62.458733]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   62.471576] 
[   62.473055] The buggy address belongs to the physical page:
[   62.478612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   62.486596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.493106] page_type: f5(slab)
[   62.496242] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.503960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.511681] page dumped because: kasan: bad access detected
[   62.517235] 
[   62.518712] Memory state around the buggy address:
[   62.523490]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.530693]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.537900] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.545099]                                      ^
[   62.549878]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.557082]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.564283] ==================================================================
[   65.475968] ==================================================================
[   65.482990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   65.490281] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   65.497659] 
[   65.499138] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   65.499186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.499203] Hardware name: WinLink E850-96 board (DT)
[   65.499221] Call trace:
[   65.499232]  show_stack+0x20/0x38 (C)
[   65.499265]  dump_stack_lvl+0x8c/0xd0
[   65.499299]  print_report+0x118/0x5d0
[   65.499327]  kasan_report+0xdc/0x128
[   65.499354]  kasan_check_range+0x100/0x1a8
[   65.499385]  __kasan_check_write+0x20/0x30
[   65.499417]  kasan_atomics_helper+0x54c/0x4858
[   65.499451]  kasan_atomics+0x198/0x2e0
[   65.499484]  kunit_try_run_case+0x170/0x3f0
[   65.499517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.499550]  kthread+0x328/0x630
[   65.499579]  ret_from_fork+0x10/0x20
[   65.499610] 
[   65.570575] Allocated by task 349:
[   65.573960]  kasan_save_stack+0x3c/0x68
[   65.577779]  kasan_save_track+0x20/0x40
[   65.581599]  kasan_save_alloc_info+0x40/0x58
[   65.585852]  __kasan_kmalloc+0xd4/0xd8
[   65.589585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.594099]  kasan_atomics+0xb8/0x2e0
[   65.597744]  kunit_try_run_case+0x170/0x3f0
[   65.601911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.607380]  kthread+0x328/0x630
[   65.610591]  ret_from_fork+0x10/0x20
[   65.614150] 
[   65.615626] The buggy address belongs to the object at ffff000808448180
[   65.615626]  which belongs to the cache kmalloc-64 of size 64
[   65.627953] The buggy address is located 0 bytes to the right of
[   65.627953]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   65.640799] 
[   65.642275] The buggy address belongs to the physical page:
[   65.647833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   65.655817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.662327] page_type: f5(slab)
[   65.665460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.673184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.680903] page dumped because: kasan: bad access detected
[   65.686458] 
[   65.687934] Memory state around the buggy address:
[   65.692711]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.699916]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.707121] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.714323]                                      ^
[   65.719100]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.726305]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.733506] ==================================================================
[   66.005913] ==================================================================
[   66.012845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   66.020136] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   66.027512] 
[   66.028995] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   66.029044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.029061] Hardware name: WinLink E850-96 board (DT)
[   66.029077] Call trace:
[   66.029091]  show_stack+0x20/0x38 (C)
[   66.029123]  dump_stack_lvl+0x8c/0xd0
[   66.029155]  print_report+0x118/0x5d0
[   66.029183]  kasan_report+0xdc/0x128
[   66.029210]  kasan_check_range+0x100/0x1a8
[   66.029243]  __kasan_check_write+0x20/0x30
[   66.029273]  kasan_atomics_helper+0x61c/0x4858
[   66.029308]  kasan_atomics+0x198/0x2e0
[   66.029340]  kunit_try_run_case+0x170/0x3f0
[   66.029376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.029409]  kthread+0x328/0x630
[   66.029442]  ret_from_fork+0x10/0x20
[   66.029474] 
[   66.100428] Allocated by task 349:
[   66.103815]  kasan_save_stack+0x3c/0x68
[   66.107632]  kasan_save_track+0x20/0x40
[   66.111452]  kasan_save_alloc_info+0x40/0x58
[   66.115705]  __kasan_kmalloc+0xd4/0xd8
[   66.119438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.123952]  kasan_atomics+0xb8/0x2e0
[   66.127598]  kunit_try_run_case+0x170/0x3f0
[   66.131764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.137233]  kthread+0x328/0x630
[   66.140444]  ret_from_fork+0x10/0x20
[   66.144004] 
[   66.145479] The buggy address belongs to the object at ffff000808448180
[   66.145479]  which belongs to the cache kmalloc-64 of size 64
[   66.157806] The buggy address is located 0 bytes to the right of
[   66.157806]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   66.170652] 
[   66.172128] The buggy address belongs to the physical page:
[   66.177686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   66.185670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.192180] page_type: f5(slab)
[   66.195313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.203037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.210756] page dumped because: kasan: bad access detected
[   66.216311] 
[   66.217787] Memory state around the buggy address:
[   66.222565]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.229770]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.236974] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.244176]                                      ^
[   66.248953]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.256158]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.263359] ==================================================================
[   77.105212] ==================================================================
[   77.112158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   77.119533] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   77.126911] 
[   77.128394] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   77.128443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.128459] Hardware name: WinLink E850-96 board (DT)
[   77.128479] Call trace:
[   77.128494]  show_stack+0x20/0x38 (C)
[   77.128530]  dump_stack_lvl+0x8c/0xd0
[   77.128563]  print_report+0x118/0x5d0
[   77.128594]  kasan_report+0xdc/0x128
[   77.128622]  kasan_check_range+0x100/0x1a8
[   77.128652]  __kasan_check_write+0x20/0x30
[   77.128685]  kasan_atomics_helper+0x15b4/0x4858
[   77.128720]  kasan_atomics+0x198/0x2e0
[   77.128752]  kunit_try_run_case+0x170/0x3f0
[   77.128787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.128819]  kthread+0x328/0x630
[   77.128849]  ret_from_fork+0x10/0x20
[   77.128885] 
[   77.199913] Allocated by task 349:
[   77.203301]  kasan_save_stack+0x3c/0x68
[   77.207119]  kasan_save_track+0x20/0x40
[   77.210938]  kasan_save_alloc_info+0x40/0x58
[   77.215191]  __kasan_kmalloc+0xd4/0xd8
[   77.218924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.223438]  kasan_atomics+0xb8/0x2e0
[   77.227084]  kunit_try_run_case+0x170/0x3f0
[   77.231250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.236719]  kthread+0x328/0x630
[   77.239930]  ret_from_fork+0x10/0x20
[   77.243489] 
[   77.244965] The buggy address belongs to the object at ffff000808448180
[   77.244965]  which belongs to the cache kmalloc-64 of size 64
[   77.257293] The buggy address is located 0 bytes to the right of
[   77.257293]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   77.270139] 
[   77.271615] The buggy address belongs to the physical page:
[   77.277172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   77.285157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.291666] page_type: f5(slab)
[   77.294801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.302523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.310242] page dumped because: kasan: bad access detected
[   77.315797] 
[   77.317273] Memory state around the buggy address:
[   77.322052]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.329256]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.336461] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.343662]                                      ^
[   77.348439]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.355644]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.362846] ==================================================================
[   67.857097] ==================================================================
[   67.864034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   67.871322] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.878700] 
[   67.880183] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.880233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.880250] Hardware name: WinLink E850-96 board (DT)
[   67.880269] Call trace:
[   67.880284]  show_stack+0x20/0x38 (C)
[   67.880317]  dump_stack_lvl+0x8c/0xd0
[   67.880351]  print_report+0x118/0x5d0
[   67.880379]  kasan_report+0xdc/0x128
[   67.880409]  kasan_check_range+0x100/0x1a8
[   67.880440]  __kasan_check_write+0x20/0x30
[   67.880471]  kasan_atomics_helper+0x934/0x4858
[   67.880506]  kasan_atomics+0x198/0x2e0
[   67.880539]  kunit_try_run_case+0x170/0x3f0
[   67.880575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.880612]  kthread+0x328/0x630
[   67.880642]  ret_from_fork+0x10/0x20
[   67.880673] 
[   67.951615] Allocated by task 349:
[   67.955003]  kasan_save_stack+0x3c/0x68
[   67.958820]  kasan_save_track+0x20/0x40
[   67.962639]  kasan_save_alloc_info+0x40/0x58
[   67.966893]  __kasan_kmalloc+0xd4/0xd8
[   67.970625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.975139]  kasan_atomics+0xb8/0x2e0
[   67.978785]  kunit_try_run_case+0x170/0x3f0
[   67.982952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.988420]  kthread+0x328/0x630
[   67.991632]  ret_from_fork+0x10/0x20
[   67.995191] 
[   67.996666] The buggy address belongs to the object at ffff000808448180
[   67.996666]  which belongs to the cache kmalloc-64 of size 64
[   68.008993] The buggy address is located 0 bytes to the right of
[   68.008993]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   68.021840] 
[   68.023316] The buggy address belongs to the physical page:
[   68.028873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   68.036857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.043367] page_type: f5(slab)
[   68.046501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.054225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.061943] page dumped because: kasan: bad access detected
[   68.067499] 
[   68.068974] Memory state around the buggy address:
[   68.073754]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.080957]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.088162] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.095363]                                      ^
[   68.100141]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.107346]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.114547] ==================================================================
[   69.969908] ==================================================================
[   69.976850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   69.984137] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.991515] 
[   69.992999] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.993051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.993067] Hardware name: WinLink E850-96 board (DT)
[   69.993088] Call trace:
[   69.993102]  show_stack+0x20/0x38 (C)
[   69.993135]  dump_stack_lvl+0x8c/0xd0
[   69.993168]  print_report+0x118/0x5d0
[   69.993196]  kasan_report+0xdc/0x128
[   69.993221]  kasan_check_range+0x100/0x1a8
[   69.993253]  __kasan_check_write+0x20/0x30
[   69.993283]  kasan_atomics_helper+0xc08/0x4858
[   69.993318]  kasan_atomics+0x198/0x2e0
[   69.993351]  kunit_try_run_case+0x170/0x3f0
[   69.993385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.993421]  kthread+0x328/0x630
[   69.993449]  ret_from_fork+0x10/0x20
[   69.993481] 
[   70.064430] Allocated by task 349:
[   70.067818]  kasan_save_stack+0x3c/0x68
[   70.071636]  kasan_save_track+0x20/0x40
[   70.075455]  kasan_save_alloc_info+0x40/0x58
[   70.079708]  __kasan_kmalloc+0xd4/0xd8
[   70.083441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.087955]  kasan_atomics+0xb8/0x2e0
[   70.091601]  kunit_try_run_case+0x170/0x3f0
[   70.095767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.101237]  kthread+0x328/0x630
[   70.104448]  ret_from_fork+0x10/0x20
[   70.108007] 
[   70.109482] The buggy address belongs to the object at ffff000808448180
[   70.109482]  which belongs to the cache kmalloc-64 of size 64
[   70.121809] The buggy address is located 0 bytes to the right of
[   70.121809]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   70.134655] 
[   70.136132] The buggy address belongs to the physical page:
[   70.141689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   70.149673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.156183] page_type: f5(slab)
[   70.159319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.167040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.174759] page dumped because: kasan: bad access detected
[   70.180314] 
[   70.181790] Memory state around the buggy address:
[   70.186570]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.193773]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.200977] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.208179]                                      ^
[   70.212956]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.220161]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.227362] ==================================================================
[   62.833469] ==================================================================
[   62.840499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   62.847786] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   62.855077] 
[   62.856562] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.856618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.856636] Hardware name: WinLink E850-96 board (DT)
[   62.856658] Call trace:
[   62.856673]  show_stack+0x20/0x38 (C)
[   62.856711]  dump_stack_lvl+0x8c/0xd0
[   62.856745]  print_report+0x118/0x5d0
[   62.856776]  kasan_report+0xdc/0x128
[   62.856804]  kasan_check_range+0x100/0x1a8
[   62.856834]  __kasan_check_read+0x20/0x30
[   62.856868]  kasan_atomics_helper+0x1ec/0x4858
[   62.856905]  kasan_atomics+0x198/0x2e0
[   62.856936]  kunit_try_run_case+0x170/0x3f0
[   62.856973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.857008]  kthread+0x328/0x630
[   62.857038]  ret_from_fork+0x10/0x20
[   62.857074] 
[   62.927906] Allocated by task 349:
[   62.931295]  kasan_save_stack+0x3c/0x68
[   62.935111]  kasan_save_track+0x20/0x40
[   62.938930]  kasan_save_alloc_info+0x40/0x58
[   62.943183]  __kasan_kmalloc+0xd4/0xd8
[   62.946916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.951430]  kasan_atomics+0xb8/0x2e0
[   62.955076]  kunit_try_run_case+0x170/0x3f0
[   62.959243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.964712]  kthread+0x328/0x630
[   62.967923]  ret_from_fork+0x10/0x20
[   62.971483] 
[   62.972959] The buggy address belongs to the object at ffff000808448180
[   62.972959]  which belongs to the cache kmalloc-64 of size 64
[   62.985287] The buggy address is located 0 bytes to the right of
[   62.985287]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   62.998130] 
[   62.999609] The buggy address belongs to the physical page:
[   63.005166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   63.013149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.019658] page_type: f5(slab)
[   63.022794] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.030515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.038235] page dumped because: kasan: bad access detected
[   63.043790] 
[   63.045265] Memory state around the buggy address:
[   63.050044]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.057248]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.064453] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.071654]                                      ^
[   63.076433]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.083636]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.090838] ==================================================================
[   72.340770] ==================================================================
[   72.347820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   72.355195] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.362573] 
[   72.364056] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.364107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.364123] Hardware name: WinLink E850-96 board (DT)
[   72.364143] Call trace:
[   72.364157]  show_stack+0x20/0x38 (C)
[   72.364191]  dump_stack_lvl+0x8c/0xd0
[   72.364223]  print_report+0x118/0x5d0
[   72.364252]  kasan_report+0xdc/0x128
[   72.364281]  __asan_report_store8_noabort+0x20/0x30
[   72.364316]  kasan_atomics_helper+0x3e5c/0x4858
[   72.364351]  kasan_atomics+0x198/0x2e0
[   72.364384]  kunit_try_run_case+0x170/0x3f0
[   72.364417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.364449]  kthread+0x328/0x630
[   72.364478]  ret_from_fork+0x10/0x20
[   72.364510] 
[   72.432277] Allocated by task 349:
[   72.435664]  kasan_save_stack+0x3c/0x68
[   72.439482]  kasan_save_track+0x20/0x40
[   72.443301]  kasan_save_alloc_info+0x40/0x58
[   72.447555]  __kasan_kmalloc+0xd4/0xd8
[   72.451287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.455801]  kasan_atomics+0xb8/0x2e0
[   72.459447]  kunit_try_run_case+0x170/0x3f0
[   72.463613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.469082]  kthread+0x328/0x630
[   72.472294]  ret_from_fork+0x10/0x20
[   72.475853] 
[   72.477328] The buggy address belongs to the object at ffff000808448180
[   72.477328]  which belongs to the cache kmalloc-64 of size 64
[   72.489655] The buggy address is located 0 bytes to the right of
[   72.489655]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   72.502502] 
[   72.503979] The buggy address belongs to the physical page:
[   72.509534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   72.517520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.524029] page_type: f5(slab)
[   72.527162] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.534887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.542605] page dumped because: kasan: bad access detected
[   72.548160] 
[   72.549636] Memory state around the buggy address:
[   72.554416]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.561619]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.568824] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.576025]                                      ^
[   72.580803]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.588007]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.595209] ==================================================================
[   69.181701] ==================================================================
[   69.188667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   69.196041] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   69.203332] 
[   69.204815] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   69.204863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.204880] Hardware name: WinLink E850-96 board (DT)
[   69.204903] Call trace:
[   69.204917]  show_stack+0x20/0x38 (C)
[   69.204951]  dump_stack_lvl+0x8c/0xd0
[   69.204982]  print_report+0x118/0x5d0
[   69.205010]  kasan_report+0xdc/0x128
[   69.205037]  __asan_report_load4_noabort+0x20/0x30
[   69.205072]  kasan_atomics_helper+0x3dcc/0x4858
[   69.205106]  kasan_atomics+0x198/0x2e0
[   69.205138]  kunit_try_run_case+0x170/0x3f0
[   69.205174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.205209]  kthread+0x328/0x630
[   69.205239]  ret_from_fork+0x10/0x20
[   69.205273] 
[   69.272949] Allocated by task 349:
[   69.276337]  kasan_save_stack+0x3c/0x68
[   69.280155]  kasan_save_track+0x20/0x40
[   69.283974]  kasan_save_alloc_info+0x40/0x58
[   69.288227]  __kasan_kmalloc+0xd4/0xd8
[   69.291960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.296474]  kasan_atomics+0xb8/0x2e0
[   69.300120]  kunit_try_run_case+0x170/0x3f0
[   69.304286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.309756]  kthread+0x328/0x630
[   69.312966]  ret_from_fork+0x10/0x20
[   69.316525] 
[   69.318001] The buggy address belongs to the object at ffff000808448180
[   69.318001]  which belongs to the cache kmalloc-64 of size 64
[   69.330327] The buggy address is located 0 bytes to the right of
[   69.330327]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   69.343174] 
[   69.344652] The buggy address belongs to the physical page:
[   69.350207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   69.358192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.364701] page_type: f5(slab)
[   69.367836] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.375559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.383277] page dumped because: kasan: bad access detected
[   69.388833] 
[   69.390309] Memory state around the buggy address:
[   69.395088]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.402292]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.409496] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.416697]                                      ^
[   69.421475]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.428680]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.435881] ==================================================================
[   72.602593] ==================================================================
[   72.609624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   72.616910] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   72.624288] 
[   72.625771] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   72.625822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.625837] Hardware name: WinLink E850-96 board (DT)
[   72.625857] Call trace:
[   72.625871]  show_stack+0x20/0x38 (C)
[   72.625902]  dump_stack_lvl+0x8c/0xd0
[   72.625933]  print_report+0x118/0x5d0
[   72.625961]  kasan_report+0xdc/0x128
[   72.625990]  kasan_check_range+0x100/0x1a8
[   72.626020]  __kasan_check_write+0x20/0x30
[   72.626054]  kasan_atomics_helper+0xeb8/0x4858
[   72.626093]  kasan_atomics+0x198/0x2e0
[   72.626124]  kunit_try_run_case+0x170/0x3f0
[   72.626159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.626194]  kthread+0x328/0x630
[   72.626223]  ret_from_fork+0x10/0x20
[   72.626255] 
[   72.697203] Allocated by task 349:
[   72.700591]  kasan_save_stack+0x3c/0x68
[   72.704408]  kasan_save_track+0x20/0x40
[   72.708228]  kasan_save_alloc_info+0x40/0x58
[   72.712481]  __kasan_kmalloc+0xd4/0xd8
[   72.716214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.720728]  kasan_atomics+0xb8/0x2e0
[   72.724373]  kunit_try_run_case+0x170/0x3f0
[   72.728540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.734008]  kthread+0x328/0x630
[   72.737220]  ret_from_fork+0x10/0x20
[   72.740779] 
[   72.742255] The buggy address belongs to the object at ffff000808448180
[   72.742255]  which belongs to the cache kmalloc-64 of size 64
[   72.754582] The buggy address is located 0 bytes to the right of
[   72.754582]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   72.767428] 
[   72.768904] The buggy address belongs to the physical page:
[   72.774460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   72.782446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.788955] page_type: f5(slab)
[   72.792091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.799813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.807532] page dumped because: kasan: bad access detected
[   72.813087] 
[   72.814563] Memory state around the buggy address:
[   72.819343]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.826545]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.833750] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.840952]                                      ^
[   72.845729]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.852934]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.860135] ==================================================================
[   78.158555] ==================================================================
[   78.165615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   78.172990] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.180368] 
[   78.181851] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.181900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.181918] Hardware name: WinLink E850-96 board (DT)
[   78.181936] Call trace:
[   78.181950]  show_stack+0x20/0x38 (C)
[   78.181983]  dump_stack_lvl+0x8c/0xd0
[   78.182017]  print_report+0x118/0x5d0
[   78.182046]  kasan_report+0xdc/0x128
[   78.182074]  kasan_check_range+0x100/0x1a8
[   78.182105]  __kasan_check_write+0x20/0x30
[   78.182139]  kasan_atomics_helper+0x16d0/0x4858
[   78.182173]  kasan_atomics+0x198/0x2e0
[   78.182204]  kunit_try_run_case+0x170/0x3f0
[   78.182242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.182279]  kthread+0x328/0x630
[   78.182309]  ret_from_fork+0x10/0x20
[   78.182341] 
[   78.253370] Allocated by task 349:
[   78.256757]  kasan_save_stack+0x3c/0x68
[   78.260575]  kasan_save_track+0x20/0x40
[   78.264395]  kasan_save_alloc_info+0x40/0x58
[   78.268648]  __kasan_kmalloc+0xd4/0xd8
[   78.272380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.276894]  kasan_atomics+0xb8/0x2e0
[   78.280540]  kunit_try_run_case+0x170/0x3f0
[   78.284707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.290175]  kthread+0x328/0x630
[   78.293387]  ret_from_fork+0x10/0x20
[   78.296946] 
[   78.298421] The buggy address belongs to the object at ffff000808448180
[   78.298421]  which belongs to the cache kmalloc-64 of size 64
[   78.310748] The buggy address is located 0 bytes to the right of
[   78.310748]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.323595] 
[   78.325072] The buggy address belongs to the physical page:
[   78.330628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.338612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.345122] page_type: f5(slab)
[   78.348255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.355980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.363699] page dumped because: kasan: bad access detected
[   78.369254] 
[   78.370729] Memory state around the buggy address:
[   78.375508]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.382712]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.389917] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.397118]                                      ^
[   78.401896]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.409101]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.416302] ==================================================================
[   75.252911] ==================================================================
[   75.259927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   75.267304] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   75.274683] 
[   75.276166] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   75.276215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.276231] Hardware name: WinLink E850-96 board (DT)
[   75.276253] Call trace:
[   75.276266]  show_stack+0x20/0x38 (C)
[   75.276299]  dump_stack_lvl+0x8c/0xd0
[   75.276332]  print_report+0x118/0x5d0
[   75.276359]  kasan_report+0xdc/0x128
[   75.276387]  kasan_check_range+0x100/0x1a8
[   75.276416]  __kasan_check_write+0x20/0x30
[   75.276449]  kasan_atomics_helper+0x12d8/0x4858
[   75.276487]  kasan_atomics+0x198/0x2e0
[   75.276519]  kunit_try_run_case+0x170/0x3f0
[   75.276554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.276590]  kthread+0x328/0x630
[   75.276619]  ret_from_fork+0x10/0x20
[   75.276651] 
[   75.347685] Allocated by task 349:
[   75.351070]  kasan_save_stack+0x3c/0x68
[   75.354889]  kasan_save_track+0x20/0x40
[   75.358709]  kasan_save_alloc_info+0x40/0x58
[   75.362962]  __kasan_kmalloc+0xd4/0xd8
[   75.366695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.371209]  kasan_atomics+0xb8/0x2e0
[   75.374854]  kunit_try_run_case+0x170/0x3f0
[   75.379021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.384490]  kthread+0x328/0x630
[   75.387701]  ret_from_fork+0x10/0x20
[   75.391260] 
[   75.392736] The buggy address belongs to the object at ffff000808448180
[   75.392736]  which belongs to the cache kmalloc-64 of size 64
[   75.405064] The buggy address is located 0 bytes to the right of
[   75.405064]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   75.417909] 
[   75.419387] The buggy address belongs to the physical page:
[   75.424944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   75.432927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.439437] page_type: f5(slab)
[   75.442571] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.450294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.458013] page dumped because: kasan: bad access detected
[   75.463568] 
[   75.465044] Memory state around the buggy address:
[   75.469824]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.477027]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.484232] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.491433]                                      ^
[   75.496210]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.503415]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.510616] ==================================================================
[   67.330452] ==================================================================
[   67.337477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   67.344767] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.352145] 
[   67.353627] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.353675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.353691] Hardware name: WinLink E850-96 board (DT)
[   67.353710] Call trace:
[   67.353722]  show_stack+0x20/0x38 (C)
[   67.353758]  dump_stack_lvl+0x8c/0xd0
[   67.353789]  print_report+0x118/0x5d0
[   67.353815]  kasan_report+0xdc/0x128
[   67.353844]  kasan_check_range+0x100/0x1a8
[   67.353873]  __kasan_check_write+0x20/0x30
[   67.353906]  kasan_atomics_helper+0x894/0x4858
[   67.353943]  kasan_atomics+0x198/0x2e0
[   67.353975]  kunit_try_run_case+0x170/0x3f0
[   67.354012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.354047]  kthread+0x328/0x630
[   67.354079]  ret_from_fork+0x10/0x20
[   67.354109] 
[   67.425060] Allocated by task 349:
[   67.428447]  kasan_save_stack+0x3c/0x68
[   67.432266]  kasan_save_track+0x20/0x40
[   67.436085]  kasan_save_alloc_info+0x40/0x58
[   67.440338]  __kasan_kmalloc+0xd4/0xd8
[   67.444071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.448585]  kasan_atomics+0xb8/0x2e0
[   67.452230]  kunit_try_run_case+0x170/0x3f0
[   67.456397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.461867]  kthread+0x328/0x630
[   67.465077]  ret_from_fork+0x10/0x20
[   67.468637] 
[   67.470112] The buggy address belongs to the object at ffff000808448180
[   67.470112]  which belongs to the cache kmalloc-64 of size 64
[   67.482440] The buggy address is located 0 bytes to the right of
[   67.482440]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   67.495285] 
[   67.496763] The buggy address belongs to the physical page:
[   67.502318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   67.510303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.516813] page_type: f5(slab)
[   67.519947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.527670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.535389] page dumped because: kasan: bad access detected
[   67.540944] 
[   67.542420] Memory state around the buggy address:
[   67.547201]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.554403]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.561607] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.568808]                                      ^
[   67.573586]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.580791]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.587992] ==================================================================
[   67.065586] ==================================================================
[   67.072553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   67.079840] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349
[   67.087218] 
[   67.088701] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   67.088749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.088765] Hardware name: WinLink E850-96 board (DT)
[   67.088786] Call trace:
[   67.088799]  show_stack+0x20/0x38 (C)
[   67.088835]  dump_stack_lvl+0x8c/0xd0
[   67.088868]  print_report+0x118/0x5d0
[   67.088897]  kasan_report+0xdc/0x128
[   67.088924]  kasan_check_range+0x100/0x1a8
[   67.088955]  __kasan_check_write+0x20/0x30
[   67.088988]  kasan_atomics_helper+0x7cc/0x4858
[   67.089024]  kasan_atomics+0x198/0x2e0
[   67.089057]  kunit_try_run_case+0x170/0x3f0
[   67.089093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.089127]  kthread+0x328/0x630
[   67.089157]  ret_from_fork+0x10/0x20
[   67.089189] 
[   67.160134] Allocated by task 349:
[   67.163521]  kasan_save_stack+0x3c/0x68
[   67.167339]  kasan_save_track+0x20/0x40
[   67.171158]  kasan_save_alloc_info+0x40/0x58
[   67.175412]  __kasan_kmalloc+0xd4/0xd8
[   67.179144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.183658]  kasan_atomics+0xb8/0x2e0
[   67.187304]  kunit_try_run_case+0x170/0x3f0
[   67.191470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.196939]  kthread+0x328/0x630
[   67.200151]  ret_from_fork+0x10/0x20
[   67.203710] 
[   67.205185] The buggy address belongs to the object at ffff000808448180
[   67.205185]  which belongs to the cache kmalloc-64 of size 64
[   67.217512] The buggy address is located 0 bytes to the right of
[   67.217512]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   67.230359] 
[   67.231836] The buggy address belongs to the physical page:
[   67.237392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   67.245376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.251886] page_type: f5(slab)
[   67.255020] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.262743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.270462] page dumped because: kasan: bad access detected
[   67.276018] 
[   67.277493] Memory state around the buggy address:
[   67.282273]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.289476]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.296681] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.303882]                                      ^
[   67.308660]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.315865]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.323066] ==================================================================
[   78.423658] ==================================================================
[   78.430714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   78.438090] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349
[   78.445381] 
[   78.446865] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   78.446917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.446932] Hardware name: WinLink E850-96 board (DT)
[   78.446953] Call trace:
[   78.446967]  show_stack+0x20/0x38 (C)
[   78.447002]  dump_stack_lvl+0x8c/0xd0
[   78.447036]  print_report+0x118/0x5d0
[   78.447062]  kasan_report+0xdc/0x128
[   78.447090]  __asan_report_load8_noabort+0x20/0x30
[   78.447125]  kasan_atomics_helper+0x3e10/0x4858
[   78.447161]  kasan_atomics+0x198/0x2e0
[   78.447194]  kunit_try_run_case+0x170/0x3f0
[   78.447230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.447265]  kthread+0x328/0x630
[   78.447296]  ret_from_fork+0x10/0x20
[   78.447327] 
[   78.514998] Allocated by task 349:
[   78.518385]  kasan_save_stack+0x3c/0x68
[   78.522203]  kasan_save_track+0x20/0x40
[   78.526023]  kasan_save_alloc_info+0x40/0x58
[   78.530276]  __kasan_kmalloc+0xd4/0xd8
[   78.534009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.538522]  kasan_atomics+0xb8/0x2e0
[   78.542168]  kunit_try_run_case+0x170/0x3f0
[   78.546335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.551805]  kthread+0x328/0x630
[   78.555017]  ret_from_fork+0x10/0x20
[   78.558574] 
[   78.560049] The buggy address belongs to the object at ffff000808448180
[   78.560049]  which belongs to the cache kmalloc-64 of size 64
[   78.572376] The buggy address is located 0 bytes to the right of
[   78.572376]  allocated 48-byte region [ffff000808448180, ffff0008084481b0)
[   78.585223] 
[   78.586699] The buggy address belongs to the physical page:
[   78.592256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448
[   78.600241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.606751] page_type: f5(slab)
[   78.609885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.617607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.625327] page dumped because: kasan: bad access detected
[   78.630882] 
[   78.632358] Memory state around the buggy address:
[   78.637136]  ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.644340]  ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.651545] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.658746]                                      ^
[   78.663524]  ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.670729]  ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.677930] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   61.488137] ==================================================================
[   61.495203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   61.504143] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   61.511521] 
[   61.513002] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   61.513047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.513063] Hardware name: WinLink E850-96 board (DT)
[   61.513081] Call trace:
[   61.513092]  show_stack+0x20/0x38 (C)
[   61.513123]  dump_stack_lvl+0x8c/0xd0
[   61.513157]  print_report+0x118/0x5d0
[   61.513186]  kasan_report+0xdc/0x128
[   61.513214]  kasan_check_range+0x100/0x1a8
[   61.513243]  __kasan_check_write+0x20/0x30
[   61.513272]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   61.513311]  kasan_bitops_generic+0x11c/0x1c8
[   61.513345]  kunit_try_run_case+0x170/0x3f0
[   61.513380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.513412]  kthread+0x328/0x630
[   61.513439]  ret_from_fork+0x10/0x20
[   61.513469] 
[   61.586693] Allocated by task 345:
[   61.590079]  kasan_save_stack+0x3c/0x68
[   61.593898]  kasan_save_track+0x20/0x40
[   61.597718]  kasan_save_alloc_info+0x40/0x58
[   61.601971]  __kasan_kmalloc+0xd4/0xd8
[   61.605703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.610218]  kasan_bitops_generic+0xa0/0x1c8
[   61.614471]  kunit_try_run_case+0x170/0x3f0
[   61.618637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.624106]  kthread+0x328/0x630
[   61.627318]  ret_from_fork+0x10/0x20
[   61.630877] 
[   61.632352] The buggy address belongs to the object at ffff000806e5df40
[   61.632352]  which belongs to the cache kmalloc-16 of size 16
[   61.644679] The buggy address is located 8 bytes inside of
[   61.644679]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.656918] 
[   61.658394] The buggy address belongs to the physical page:
[   61.663950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.671937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.678446] page_type: f5(slab)
[   61.681578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.689303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.697022] page dumped because: kasan: bad access detected
[   61.702577] 
[   61.704053] Memory state around the buggy address:
[   61.708831]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.716035]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.723240] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.730441]                                               ^
[   61.736000]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.743205]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.750406] ==================================================================
[   60.952383] ==================================================================
[   60.959447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   60.968387] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.975765] 
[   60.977246] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.977294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.977312] Hardware name: WinLink E850-96 board (DT)
[   60.977331] Call trace:
[   60.977345]  show_stack+0x20/0x38 (C)
[   60.977376]  dump_stack_lvl+0x8c/0xd0
[   60.977407]  print_report+0x118/0x5d0
[   60.977436]  kasan_report+0xdc/0x128
[   60.977463]  kasan_check_range+0x100/0x1a8
[   60.977494]  __kasan_check_write+0x20/0x30
[   60.977525]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   60.977566]  kasan_bitops_generic+0x11c/0x1c8
[   60.977601]  kunit_try_run_case+0x170/0x3f0
[   60.977634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.977668]  kthread+0x328/0x630
[   60.977695]  ret_from_fork+0x10/0x20
[   60.977727] 
[   61.050937] Allocated by task 345:
[   61.054323]  kasan_save_stack+0x3c/0x68
[   61.058142]  kasan_save_track+0x20/0x40
[   61.061962]  kasan_save_alloc_info+0x40/0x58
[   61.066215]  __kasan_kmalloc+0xd4/0xd8
[   61.069948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.074462]  kasan_bitops_generic+0xa0/0x1c8
[   61.078715]  kunit_try_run_case+0x170/0x3f0
[   61.082883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.088350]  kthread+0x328/0x630
[   61.091562]  ret_from_fork+0x10/0x20
[   61.095121] 
[   61.096596] The buggy address belongs to the object at ffff000806e5df40
[   61.096596]  which belongs to the cache kmalloc-16 of size 16
[   61.108923] The buggy address is located 8 bytes inside of
[   61.108923]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.121162] 
[   61.122638] The buggy address belongs to the physical page:
[   61.128194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.136181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.142690] page_type: f5(slab)
[   61.145822] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.153547] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.161266] page dumped because: kasan: bad access detected
[   61.166821] 
[   61.168297] Memory state around the buggy address:
[   61.173075]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.180280]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.187484] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.194685]                                               ^
[   61.200244]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.207449]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.214650] ==================================================================
[   61.221995] ==================================================================
[   61.229061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   61.238001] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   61.245292] 
[   61.246773] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   61.246820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.246835] Hardware name: WinLink E850-96 board (DT)
[   61.246855] Call trace:
[   61.246867]  show_stack+0x20/0x38 (C)
[   61.246898]  dump_stack_lvl+0x8c/0xd0
[   61.246930]  print_report+0x118/0x5d0
[   61.246958]  kasan_report+0xdc/0x128
[   61.246985]  __asan_report_load8_noabort+0x20/0x30
[   61.247018]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   61.247057]  kasan_bitops_generic+0x11c/0x1c8
[   61.247093]  kunit_try_run_case+0x170/0x3f0
[   61.247127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.247158]  kthread+0x328/0x630
[   61.247185]  ret_from_fork+0x10/0x20
[   61.247216] 
[   61.317079] Allocated by task 345:
[   61.320465]  kasan_save_stack+0x3c/0x68
[   61.324284]  kasan_save_track+0x20/0x40
[   61.328105]  kasan_save_alloc_info+0x40/0x58
[   61.332357]  __kasan_kmalloc+0xd4/0xd8
[   61.336089]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.340605]  kasan_bitops_generic+0xa0/0x1c8
[   61.344857]  kunit_try_run_case+0x170/0x3f0
[   61.349024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.354492]  kthread+0x328/0x630
[   61.357704]  ret_from_fork+0x10/0x20
[   61.361263] 
[   61.362738] The buggy address belongs to the object at ffff000806e5df40
[   61.362738]  which belongs to the cache kmalloc-16 of size 16
[   61.375065] The buggy address is located 8 bytes inside of
[   61.375065]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.387304] 
[   61.388780] The buggy address belongs to the physical page:
[   61.394336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.402321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.408831] page_type: f5(slab)
[   61.411964] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.419689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.427408] page dumped because: kasan: bad access detected
[   61.432963] 
[   61.434438] Memory state around the buggy address:
[   61.439217]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.446421]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.453626] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.460827]                                               ^
[   61.466386]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.473591]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.480792] ==================================================================
[   62.023897] ==================================================================
[   62.030959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   62.039898] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   62.047190] 
[   62.048671] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   62.048720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.048737] Hardware name: WinLink E850-96 board (DT)
[   62.048755] Call trace:
[   62.048770]  show_stack+0x20/0x38 (C)
[   62.048801]  dump_stack_lvl+0x8c/0xd0
[   62.048833]  print_report+0x118/0x5d0
[   62.048861]  kasan_report+0xdc/0x128
[   62.048891]  __asan_report_load8_noabort+0x20/0x30
[   62.048928]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   62.048966]  kasan_bitops_generic+0x11c/0x1c8
[   62.049001]  kunit_try_run_case+0x170/0x3f0
[   62.049036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.049070]  kthread+0x328/0x630
[   62.049099]  ret_from_fork+0x10/0x20
[   62.049129] 
[   62.118977] Allocated by task 345:
[   62.122363]  kasan_save_stack+0x3c/0x68
[   62.126182]  kasan_save_track+0x20/0x40
[   62.130001]  kasan_save_alloc_info+0x40/0x58
[   62.134255]  __kasan_kmalloc+0xd4/0xd8
[   62.137987]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.142501]  kasan_bitops_generic+0xa0/0x1c8
[   62.146754]  kunit_try_run_case+0x170/0x3f0
[   62.150921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.156390]  kthread+0x328/0x630
[   62.159601]  ret_from_fork+0x10/0x20
[   62.163160] 
[   62.164636] The buggy address belongs to the object at ffff000806e5df40
[   62.164636]  which belongs to the cache kmalloc-16 of size 16
[   62.176963] The buggy address is located 8 bytes inside of
[   62.176963]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   62.189202] 
[   62.190678] The buggy address belongs to the physical page:
[   62.196234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   62.204221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.210729] page_type: f5(slab)
[   62.213862] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.221586] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.229305] page dumped because: kasan: bad access detected
[   62.234861] 
[   62.236336] Memory state around the buggy address:
[   62.241114]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.248319]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.255524] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   62.262725]                                               ^
[   62.268284]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.275489]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.282690] ==================================================================
[   59.881018] ==================================================================
[   59.888109] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   59.896962] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   59.904340] 
[   59.905821] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   59.905869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.905885] Hardware name: WinLink E850-96 board (DT)
[   59.905904] Call trace:
[   59.905918]  show_stack+0x20/0x38 (C)
[   59.905951]  dump_stack_lvl+0x8c/0xd0
[   59.905980]  print_report+0x118/0x5d0
[   59.906009]  kasan_report+0xdc/0x128
[   59.906037]  kasan_check_range+0x100/0x1a8
[   59.906067]  __kasan_check_write+0x20/0x30
[   59.906098]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   59.906138]  kasan_bitops_generic+0x11c/0x1c8
[   59.906172]  kunit_try_run_case+0x170/0x3f0
[   59.906206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.906239]  kthread+0x328/0x630
[   59.906267]  ret_from_fork+0x10/0x20
[   59.906299] 
[   59.979426] Allocated by task 345:
[   59.982813]  kasan_save_stack+0x3c/0x68
[   59.986631]  kasan_save_track+0x20/0x40
[   59.990450]  kasan_save_alloc_info+0x40/0x58
[   59.994703]  __kasan_kmalloc+0xd4/0xd8
[   59.998436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.002950]  kasan_bitops_generic+0xa0/0x1c8
[   60.007203]  kunit_try_run_case+0x170/0x3f0
[   60.011370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.016838]  kthread+0x328/0x630
[   60.020050]  ret_from_fork+0x10/0x20
[   60.023609] 
[   60.025085] The buggy address belongs to the object at ffff000806e5df40
[   60.025085]  which belongs to the cache kmalloc-16 of size 16
[   60.037411] The buggy address is located 8 bytes inside of
[   60.037411]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.049650] 
[   60.051126] The buggy address belongs to the physical page:
[   60.056682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.064668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.071178] page_type: f5(slab)
[   60.074311] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.082035] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.089754] page dumped because: kasan: bad access detected
[   60.095310] 
[   60.096785] Memory state around the buggy address:
[   60.101563]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.108768]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.115973] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.123174]                                               ^
[   60.128733]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.135938]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.143139] ==================================================================
[   60.416623] ==================================================================
[   60.423692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   60.432631] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.440009] 
[   60.441490] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.441537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.441553] Hardware name: WinLink E850-96 board (DT)
[   60.441571] Call trace:
[   60.441583]  show_stack+0x20/0x38 (C)
[   60.441617]  dump_stack_lvl+0x8c/0xd0
[   60.441647]  print_report+0x118/0x5d0
[   60.441674]  kasan_report+0xdc/0x128
[   60.441701]  kasan_check_range+0x100/0x1a8
[   60.441732]  __kasan_check_write+0x20/0x30
[   60.441761]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   60.441800]  kasan_bitops_generic+0x11c/0x1c8
[   60.441832]  kunit_try_run_case+0x170/0x3f0
[   60.441864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.441899]  kthread+0x328/0x630
[   60.441925]  ret_from_fork+0x10/0x20
[   60.441956] 
[   60.515181] Allocated by task 345:
[   60.518569]  kasan_save_stack+0x3c/0x68
[   60.522387]  kasan_save_track+0x20/0x40
[   60.526206]  kasan_save_alloc_info+0x40/0x58
[   60.530459]  __kasan_kmalloc+0xd4/0xd8
[   60.534192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.538706]  kasan_bitops_generic+0xa0/0x1c8
[   60.542959]  kunit_try_run_case+0x170/0x3f0
[   60.547125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.552594]  kthread+0x328/0x630
[   60.555806]  ret_from_fork+0x10/0x20
[   60.559365] 
[   60.560841] The buggy address belongs to the object at ffff000806e5df40
[   60.560841]  which belongs to the cache kmalloc-16 of size 16
[   60.573167] The buggy address is located 8 bytes inside of
[   60.573167]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.585406] 
[   60.586882] The buggy address belongs to the physical page:
[   60.592438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.600424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.606934] page_type: f5(slab)
[   60.610066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.617791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.625510] page dumped because: kasan: bad access detected
[   60.631065] 
[   60.632541] Memory state around the buggy address:
[   60.637319]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.644524]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.651728] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.658930]                                               ^
[   60.664489]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.671693]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.678894] ==================================================================
[   61.757777] ==================================================================
[   61.764817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   61.773757] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   61.781048] 
[   61.782529] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   61.782578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.782594] Hardware name: WinLink E850-96 board (DT)
[   61.782613] Call trace:
[   61.782628]  show_stack+0x20/0x38 (C)
[   61.782661]  dump_stack_lvl+0x8c/0xd0
[   61.782694]  print_report+0x118/0x5d0
[   61.782721]  kasan_report+0xdc/0x128
[   61.782748]  __asan_report_load8_noabort+0x20/0x30
[   61.782782]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   61.782822]  kasan_bitops_generic+0x11c/0x1c8
[   61.782857]  kunit_try_run_case+0x170/0x3f0
[   61.782892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.782923]  kthread+0x328/0x630
[   61.782951]  ret_from_fork+0x10/0x20
[   61.782983] 
[   61.852835] Allocated by task 345:
[   61.856221]  kasan_save_stack+0x3c/0x68
[   61.860040]  kasan_save_track+0x20/0x40
[   61.863860]  kasan_save_alloc_info+0x40/0x58
[   61.868113]  __kasan_kmalloc+0xd4/0xd8
[   61.871846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.876359]  kasan_bitops_generic+0xa0/0x1c8
[   61.880612]  kunit_try_run_case+0x170/0x3f0
[   61.884779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.890248]  kthread+0x328/0x630
[   61.893460]  ret_from_fork+0x10/0x20
[   61.897018] 
[   61.898494] The buggy address belongs to the object at ffff000806e5df40
[   61.898494]  which belongs to the cache kmalloc-16 of size 16
[   61.910821] The buggy address is located 8 bytes inside of
[   61.910821]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   61.923060] 
[   61.924536] The buggy address belongs to the physical page:
[   61.930091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   61.938078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.944587] page_type: f5(slab)
[   61.947720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.955445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.963163] page dumped because: kasan: bad access detected
[   61.968719] 
[   61.970194] Memory state around the buggy address:
[   61.974972]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.982177]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.989382] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   61.996583]                                               ^
[   62.002142]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.009347]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.016550] ==================================================================
[   60.150511] ==================================================================
[   60.157549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   60.166489] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.173780] 
[   60.175262] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.175312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.175327] Hardware name: WinLink E850-96 board (DT)
[   60.175347] Call trace:
[   60.175361]  show_stack+0x20/0x38 (C)
[   60.175393]  dump_stack_lvl+0x8c/0xd0
[   60.175425]  print_report+0x118/0x5d0
[   60.175455]  kasan_report+0xdc/0x128
[   60.175482]  __asan_report_load8_noabort+0x20/0x30
[   60.175516]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   60.175554]  kasan_bitops_generic+0x11c/0x1c8
[   60.175587]  kunit_try_run_case+0x170/0x3f0
[   60.175624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.175657]  kthread+0x328/0x630
[   60.175686]  ret_from_fork+0x10/0x20
[   60.175717] 
[   60.245568] Allocated by task 345:
[   60.248955]  kasan_save_stack+0x3c/0x68
[   60.252772]  kasan_save_track+0x20/0x40
[   60.256592]  kasan_save_alloc_info+0x40/0x58
[   60.260845]  __kasan_kmalloc+0xd4/0xd8
[   60.264578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.269092]  kasan_bitops_generic+0xa0/0x1c8
[   60.273345]  kunit_try_run_case+0x170/0x3f0
[   60.277512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.282980]  kthread+0x328/0x630
[   60.286192]  ret_from_fork+0x10/0x20
[   60.289751] 
[   60.291227] The buggy address belongs to the object at ffff000806e5df40
[   60.291227]  which belongs to the cache kmalloc-16 of size 16
[   60.303555] The buggy address is located 8 bytes inside of
[   60.303555]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.315792] 
[   60.317268] The buggy address belongs to the physical page:
[   60.322824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.330809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.337320] page_type: f5(slab)
[   60.340452] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.348177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.355896] page dumped because: kasan: bad access detected
[   60.361451] 
[   60.362927] Memory state around the buggy address:
[   60.367705]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.374910]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.382114] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.389316]                                               ^
[   60.394875]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.402079]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.409281] ==================================================================
[   60.686267] ==================================================================
[   60.693306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   60.702245] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   60.709536] 
[   60.711017] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   60.711067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.711085] Hardware name: WinLink E850-96 board (DT)
[   60.711104] Call trace:
[   60.711116]  show_stack+0x20/0x38 (C)
[   60.711149]  dump_stack_lvl+0x8c/0xd0
[   60.711180]  print_report+0x118/0x5d0
[   60.711209]  kasan_report+0xdc/0x128
[   60.711235]  __asan_report_load8_noabort+0x20/0x30
[   60.711269]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   60.711309]  kasan_bitops_generic+0x11c/0x1c8
[   60.711341]  kunit_try_run_case+0x170/0x3f0
[   60.711377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.711409]  kthread+0x328/0x630
[   60.711436]  ret_from_fork+0x10/0x20
[   60.711469] 
[   60.781323] Allocated by task 345:
[   60.784709]  kasan_save_stack+0x3c/0x68
[   60.788530]  kasan_save_track+0x20/0x40
[   60.792348]  kasan_save_alloc_info+0x40/0x58
[   60.796601]  __kasan_kmalloc+0xd4/0xd8
[   60.800334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.804847]  kasan_bitops_generic+0xa0/0x1c8
[   60.809101]  kunit_try_run_case+0x170/0x3f0
[   60.813268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.818736]  kthread+0x328/0x630
[   60.821948]  ret_from_fork+0x10/0x20
[   60.825507] 
[   60.826982] The buggy address belongs to the object at ffff000806e5df40
[   60.826982]  which belongs to the cache kmalloc-16 of size 16
[   60.839309] The buggy address is located 8 bytes inside of
[   60.839309]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   60.851548] 
[   60.853024] The buggy address belongs to the physical page:
[   60.858581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   60.866567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.873076] page_type: f5(slab)
[   60.876208] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.883933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.891652] page dumped because: kasan: bad access detected
[   60.897207] 
[   60.898683] Memory state around the buggy address:
[   60.903461]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.910665]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.917870] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   60.925071]                                               ^
[   60.930630]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.937835]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.945036] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   59.616494] ==================================================================
[   59.623530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   59.631688] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   59.638979] 
[   59.640461] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   59.640508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.640524] Hardware name: WinLink E850-96 board (DT)
[   59.640544] Call trace:
[   59.640556]  show_stack+0x20/0x38 (C)
[   59.640591]  dump_stack_lvl+0x8c/0xd0
[   59.640623]  print_report+0x118/0x5d0
[   59.640652]  kasan_report+0xdc/0x128
[   59.640681]  __asan_report_load8_noabort+0x20/0x30
[   59.640713]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   59.640750]  kasan_bitops_generic+0x110/0x1c8
[   59.640786]  kunit_try_run_case+0x170/0x3f0
[   59.640820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.640853]  kthread+0x328/0x630
[   59.640881]  ret_from_fork+0x10/0x20
[   59.640911] 
[   59.709985] Allocated by task 345:
[   59.713372]  kasan_save_stack+0x3c/0x68
[   59.717190]  kasan_save_track+0x20/0x40
[   59.721010]  kasan_save_alloc_info+0x40/0x58
[   59.725263]  __kasan_kmalloc+0xd4/0xd8
[   59.728996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.733509]  kasan_bitops_generic+0xa0/0x1c8
[   59.737763]  kunit_try_run_case+0x170/0x3f0
[   59.741929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.747398]  kthread+0x328/0x630
[   59.750610]  ret_from_fork+0x10/0x20
[   59.754169] 
[   59.755644] The buggy address belongs to the object at ffff000806e5df40
[   59.755644]  which belongs to the cache kmalloc-16 of size 16
[   59.767971] The buggy address is located 8 bytes inside of
[   59.767971]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   59.780210] 
[   59.781686] The buggy address belongs to the physical page:
[   59.787244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   59.795227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.801737] page_type: f5(slab)
[   59.804870] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.812595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.820314] page dumped because: kasan: bad access detected
[   59.825869] 
[   59.827345] Memory state around the buggy address:
[   59.832123]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.839327]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.846532] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   59.853733]                                               ^
[   59.859292]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.866497]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.873698] ==================================================================
[   59.348420] ==================================================================
[   59.355480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   59.363637] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   59.371015] 
[   59.372495] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   59.372543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.372561] Hardware name: WinLink E850-96 board (DT)
[   59.372580] Call trace:
[   59.372593]  show_stack+0x20/0x38 (C)
[   59.372630]  dump_stack_lvl+0x8c/0xd0
[   59.372662]  print_report+0x118/0x5d0
[   59.372691]  kasan_report+0xdc/0x128
[   59.372720]  kasan_check_range+0x100/0x1a8
[   59.372749]  __kasan_check_write+0x20/0x30
[   59.372779]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   59.372817]  kasan_bitops_generic+0x110/0x1c8
[   59.372852]  kunit_try_run_case+0x170/0x3f0
[   59.372885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.372917]  kthread+0x328/0x630
[   59.372945]  ret_from_fork+0x10/0x20
[   59.372977] 
[   59.445406] Allocated by task 345:
[   59.448793]  kasan_save_stack+0x3c/0x68
[   59.452611]  kasan_save_track+0x20/0x40
[   59.456430]  kasan_save_alloc_info+0x40/0x58
[   59.460684]  __kasan_kmalloc+0xd4/0xd8
[   59.464416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.468930]  kasan_bitops_generic+0xa0/0x1c8
[   59.473183]  kunit_try_run_case+0x170/0x3f0
[   59.477350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.482819]  kthread+0x328/0x630
[   59.486031]  ret_from_fork+0x10/0x20
[   59.489590] 
[   59.491065] The buggy address belongs to the object at ffff000806e5df40
[   59.491065]  which belongs to the cache kmalloc-16 of size 16
[   59.503392] The buggy address is located 8 bytes inside of
[   59.503392]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   59.515631] 
[   59.517106] The buggy address belongs to the physical page:
[   59.522663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   59.530650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.537158] page_type: f5(slab)
[   59.540291] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.548015] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.555735] page dumped because: kasan: bad access detected
[   59.561290] 
[   59.562765] Memory state around the buggy address:
[   59.567543]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.574748]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.581953] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   59.589154]                                               ^
[   59.594713]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.601918]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.609119] ==================================================================
[   58.547673] ==================================================================
[   58.554796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   58.562954] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   58.570333] 
[   58.571815] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   58.571861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.571877] Hardware name: WinLink E850-96 board (DT)
[   58.571896] Call trace:
[   58.571912]  show_stack+0x20/0x38 (C)
[   58.571945]  dump_stack_lvl+0x8c/0xd0
[   58.571979]  print_report+0x118/0x5d0
[   58.572007]  kasan_report+0xdc/0x128
[   58.572036]  kasan_check_range+0x100/0x1a8
[   58.572067]  __kasan_check_write+0x20/0x30
[   58.572097]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   58.572133]  kasan_bitops_generic+0x110/0x1c8
[   58.572168]  kunit_try_run_case+0x170/0x3f0
[   58.572202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.572234]  kthread+0x328/0x630
[   58.572264]  ret_from_fork+0x10/0x20
[   58.572295] 
[   58.644724] Allocated by task 345:
[   58.648111]  kasan_save_stack+0x3c/0x68
[   58.651928]  kasan_save_track+0x20/0x40
[   58.655748]  kasan_save_alloc_info+0x40/0x58
[   58.660001]  __kasan_kmalloc+0xd4/0xd8
[   58.663734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.668248]  kasan_bitops_generic+0xa0/0x1c8
[   58.672501]  kunit_try_run_case+0x170/0x3f0
[   58.676667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.682136]  kthread+0x328/0x630
[   58.685348]  ret_from_fork+0x10/0x20
[   58.688907] 
[   58.690383] The buggy address belongs to the object at ffff000806e5df40
[   58.690383]  which belongs to the cache kmalloc-16 of size 16
[   58.702709] The buggy address is located 8 bytes inside of
[   58.702709]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   58.714948] 
[   58.716424] The buggy address belongs to the physical page:
[   58.721980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   58.729969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.736476] page_type: f5(slab)
[   58.739609] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.747333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.755052] page dumped because: kasan: bad access detected
[   58.760607] 
[   58.762083] Memory state around the buggy address:
[   58.766861]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.774066]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.781270] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   58.788472]                                               ^
[   58.794030]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.801236]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.808437] ==================================================================
[   58.815737] ==================================================================
[   58.822848] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   58.831006] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   58.838297] 
[   58.839778] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   58.839829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.839846] Hardware name: WinLink E850-96 board (DT)
[   58.839867] Call trace:
[   58.839880]  show_stack+0x20/0x38 (C)
[   58.839915]  dump_stack_lvl+0x8c/0xd0
[   58.839947]  print_report+0x118/0x5d0
[   58.839973]  kasan_report+0xdc/0x128
[   58.840000]  __asan_report_load8_noabort+0x20/0x30
[   58.840035]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   58.840074]  kasan_bitops_generic+0x110/0x1c8
[   58.840109]  kunit_try_run_case+0x170/0x3f0
[   58.840141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.840175]  kthread+0x328/0x630
[   58.840204]  ret_from_fork+0x10/0x20
[   58.840238] 
[   58.909303] Allocated by task 345:
[   58.912690]  kasan_save_stack+0x3c/0x68
[   58.916508]  kasan_save_track+0x20/0x40
[   58.920327]  kasan_save_alloc_info+0x40/0x58
[   58.924581]  __kasan_kmalloc+0xd4/0xd8
[   58.928313]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.932827]  kasan_bitops_generic+0xa0/0x1c8
[   58.937080]  kunit_try_run_case+0x170/0x3f0
[   58.941247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.946716]  kthread+0x328/0x630
[   58.949927]  ret_from_fork+0x10/0x20
[   58.953487] 
[   58.954962] The buggy address belongs to the object at ffff000806e5df40
[   58.954962]  which belongs to the cache kmalloc-16 of size 16
[   58.967289] The buggy address is located 8 bytes inside of
[   58.967289]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   58.979528] 
[   58.981004] The buggy address belongs to the physical page:
[   58.986560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   58.994548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.001055] page_type: f5(slab)
[   59.004188] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.011912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.019631] page dumped because: kasan: bad access detected
[   59.025187] 
[   59.026662] Memory state around the buggy address:
[   59.031441]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.038645]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.045850] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   59.053051]                                               ^
[   59.058610]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.065815]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.073016] ==================================================================
[   58.279634] ==================================================================
[   58.286746] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   58.294903] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   58.302281] 
[   58.303763] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   58.303816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.303833] Hardware name: WinLink E850-96 board (DT)
[   58.303853] Call trace:
[   58.303865]  show_stack+0x20/0x38 (C)
[   58.303900]  dump_stack_lvl+0x8c/0xd0
[   58.303933]  print_report+0x118/0x5d0
[   58.303961]  kasan_report+0xdc/0x128
[   58.303990]  kasan_check_range+0x100/0x1a8
[   58.304020]  __kasan_check_write+0x20/0x30
[   58.304051]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   58.304089]  kasan_bitops_generic+0x110/0x1c8
[   58.304122]  kunit_try_run_case+0x170/0x3f0
[   58.304157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.304191]  kthread+0x328/0x630
[   58.304220]  ret_from_fork+0x10/0x20
[   58.304251] 
[   58.376673] Allocated by task 345:
[   58.380059]  kasan_save_stack+0x3c/0x68
[   58.383877]  kasan_save_track+0x20/0x40
[   58.387697]  kasan_save_alloc_info+0x40/0x58
[   58.391950]  __kasan_kmalloc+0xd4/0xd8
[   58.395682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.400196]  kasan_bitops_generic+0xa0/0x1c8
[   58.404449]  kunit_try_run_case+0x170/0x3f0
[   58.408616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.414085]  kthread+0x328/0x630
[   58.417297]  ret_from_fork+0x10/0x20
[   58.420856] 
[   58.422331] The buggy address belongs to the object at ffff000806e5df40
[   58.422331]  which belongs to the cache kmalloc-16 of size 16
[   58.434658] The buggy address is located 8 bytes inside of
[   58.434658]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   58.446897] 
[   58.448373] The buggy address belongs to the physical page:
[   58.453928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   58.461916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.468424] page_type: f5(slab)
[   58.471559] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.479282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.487000] page dumped because: kasan: bad access detected
[   58.492556] 
[   58.494031] Memory state around the buggy address:
[   58.498810]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.506014]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.513219] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   58.520420]                                               ^
[   58.525979]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.533184]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.540385] ==================================================================
[   59.080421] ==================================================================
[   59.087427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   59.095585] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   59.102963] 
[   59.104445] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   59.104493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.104509] Hardware name: WinLink E850-96 board (DT)
[   59.104529] Call trace:
[   59.104543]  show_stack+0x20/0x38 (C)
[   59.104577]  dump_stack_lvl+0x8c/0xd0
[   59.104612]  print_report+0x118/0x5d0
[   59.104641]  kasan_report+0xdc/0x128
[   59.104669]  kasan_check_range+0x100/0x1a8
[   59.104698]  __kasan_check_write+0x20/0x30
[   59.104729]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   59.104766]  kasan_bitops_generic+0x110/0x1c8
[   59.104800]  kunit_try_run_case+0x170/0x3f0
[   59.104833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.104866]  kthread+0x328/0x630
[   59.104895]  ret_from_fork+0x10/0x20
[   59.104928] 
[   59.177355] Allocated by task 345:
[   59.180742]  kasan_save_stack+0x3c/0x68
[   59.184560]  kasan_save_track+0x20/0x40
[   59.188379]  kasan_save_alloc_info+0x40/0x58
[   59.192632]  __kasan_kmalloc+0xd4/0xd8
[   59.196365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.200879]  kasan_bitops_generic+0xa0/0x1c8
[   59.205132]  kunit_try_run_case+0x170/0x3f0
[   59.209298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.214767]  kthread+0x328/0x630
[   59.217979]  ret_from_fork+0x10/0x20
[   59.221538] 
[   59.223014] The buggy address belongs to the object at ffff000806e5df40
[   59.223014]  which belongs to the cache kmalloc-16 of size 16
[   59.235340] The buggy address is located 8 bytes inside of
[   59.235340]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   59.247579] 
[   59.249056] The buggy address belongs to the physical page:
[   59.254611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   59.262598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.269107] page_type: f5(slab)
[   59.272240] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.279964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.287683] page dumped because: kasan: bad access detected
[   59.293238] 
[   59.294714] Memory state around the buggy address:
[   59.299492]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.306696]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.313901] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   59.321103]                                               ^
[   59.326662]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.333866]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.341067] ==================================================================
[   57.482511] ==================================================================
[   57.489537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   57.497692] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   57.504984] 
[   57.506470] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   57.506531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.506550] Hardware name: WinLink E850-96 board (DT)
[   57.506571] Call trace:
[   57.506584]  show_stack+0x20/0x38 (C)
[   57.506619]  dump_stack_lvl+0x8c/0xd0
[   57.506654]  print_report+0x118/0x5d0
[   57.506681]  kasan_report+0xdc/0x128
[   57.506708]  __asan_report_load8_noabort+0x20/0x30
[   57.506745]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   57.506783]  kasan_bitops_generic+0x110/0x1c8
[   57.506818]  kunit_try_run_case+0x170/0x3f0
[   57.506855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.506889]  kthread+0x328/0x630
[   57.506920]  ret_from_fork+0x10/0x20
[   57.506954] 
[   57.575991] Allocated by task 345:
[   57.579377]  kasan_save_stack+0x3c/0x68
[   57.583194]  kasan_save_track+0x20/0x40
[   57.587014]  kasan_save_alloc_info+0x40/0x58
[   57.591267]  __kasan_kmalloc+0xd4/0xd8
[   57.595000]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.599514]  kasan_bitops_generic+0xa0/0x1c8
[   57.603767]  kunit_try_run_case+0x170/0x3f0
[   57.607934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.613402]  kthread+0x328/0x630
[   57.616614]  ret_from_fork+0x10/0x20
[   57.620173] 
[   57.621650] The buggy address belongs to the object at ffff000806e5df40
[   57.621650]  which belongs to the cache kmalloc-16 of size 16
[   57.633975] The buggy address is located 8 bytes inside of
[   57.633975]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   57.646214] 
[   57.647693] The buggy address belongs to the physical page:
[   57.653248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   57.661235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.667742] page_type: f5(slab)
[   57.670878] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   57.678599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   57.686318] page dumped because: kasan: bad access detected
[   57.691873] 
[   57.693349] Memory state around the buggy address:
[   57.698127]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.705332]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.712538] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   57.719738]                                               ^
[   57.725297]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.732503]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.739703] ==================================================================
[   57.747013] ==================================================================
[   57.754113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   57.762272] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   57.769650] 
[   57.771134] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   57.771190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.771210] Hardware name: WinLink E850-96 board (DT)
[   57.771227] Call trace:
[   57.771241]  show_stack+0x20/0x38 (C)
[   57.771275]  dump_stack_lvl+0x8c/0xd0
[   57.771310]  print_report+0x118/0x5d0
[   57.771340]  kasan_report+0xdc/0x128
[   57.771367]  kasan_check_range+0x100/0x1a8
[   57.771399]  __kasan_check_write+0x20/0x30
[   57.771431]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   57.771467]  kasan_bitops_generic+0x110/0x1c8
[   57.771502]  kunit_try_run_case+0x170/0x3f0
[   57.771538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.771572]  kthread+0x328/0x630
[   57.771601]  ret_from_fork+0x10/0x20
[   57.771634] 
[   57.844041] Allocated by task 345:
[   57.847428]  kasan_save_stack+0x3c/0x68
[   57.851246]  kasan_save_track+0x20/0x40
[   57.855066]  kasan_save_alloc_info+0x40/0x58
[   57.859319]  __kasan_kmalloc+0xd4/0xd8
[   57.863051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.867565]  kasan_bitops_generic+0xa0/0x1c8
[   57.871819]  kunit_try_run_case+0x170/0x3f0
[   57.875985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.881454]  kthread+0x328/0x630
[   57.884666]  ret_from_fork+0x10/0x20
[   57.888225] 
[   57.889701] The buggy address belongs to the object at ffff000806e5df40
[   57.889701]  which belongs to the cache kmalloc-16 of size 16
[   57.902027] The buggy address is located 8 bytes inside of
[   57.902027]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   57.914266] 
[   57.915743] The buggy address belongs to the physical page:
[   57.921299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   57.929286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.935793] page_type: f5(slab)
[   57.938928] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   57.946651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   57.954370] page dumped because: kasan: bad access detected
[   57.959925] 
[   57.961401] Memory state around the buggy address:
[   57.966179]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.973383]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.980591] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   57.987789]                                               ^
[   57.993348]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.000553]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.007754] ==================================================================
[   58.015050] ==================================================================
[   58.022165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   58.030323] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   58.037614] 
[   58.039098] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   58.039153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.039172] Hardware name: WinLink E850-96 board (DT)
[   58.039191] Call trace:
[   58.039204]  show_stack+0x20/0x38 (C)
[   58.039243]  dump_stack_lvl+0x8c/0xd0
[   58.039278]  print_report+0x118/0x5d0
[   58.039307]  kasan_report+0xdc/0x128
[   58.039334]  __asan_report_load8_noabort+0x20/0x30
[   58.039368]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   58.039405]  kasan_bitops_generic+0x110/0x1c8
[   58.039440]  kunit_try_run_case+0x170/0x3f0
[   58.039475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.039509]  kthread+0x328/0x630
[   58.039537]  ret_from_fork+0x10/0x20
[   58.039567] 
[   58.108621] Allocated by task 345:
[   58.112007]  kasan_save_stack+0x3c/0x68
[   58.115825]  kasan_save_track+0x20/0x40
[   58.119645]  kasan_save_alloc_info+0x40/0x58
[   58.123898]  __kasan_kmalloc+0xd4/0xd8
[   58.127631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.132145]  kasan_bitops_generic+0xa0/0x1c8
[   58.136398]  kunit_try_run_case+0x170/0x3f0
[   58.140565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.146033]  kthread+0x328/0x630
[   58.149245]  ret_from_fork+0x10/0x20
[   58.152804] 
[   58.154280] The buggy address belongs to the object at ffff000806e5df40
[   58.154280]  which belongs to the cache kmalloc-16 of size 16
[   58.166606] The buggy address is located 8 bytes inside of
[   58.166606]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   58.178845] 
[   58.180321] The buggy address belongs to the physical page:
[   58.185879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   58.193865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.200373] page_type: f5(slab)
[   58.203507] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.211230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.218949] page dumped because: kasan: bad access detected
[   58.224504] 
[   58.225980] Memory state around the buggy address:
[   58.230758]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.237963]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.245168] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   58.252368]                                               ^
[   58.257928]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.265132]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.272334] ==================================================================
[   57.211887] ==================================================================
[   57.221485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   57.229642] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345
[   57.237019] 
[   57.238507] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   57.238566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.238586] Hardware name: WinLink E850-96 board (DT)
[   57.238609] Call trace:
[   57.238624]  show_stack+0x20/0x38 (C)
[   57.238664]  dump_stack_lvl+0x8c/0xd0
[   57.238698]  print_report+0x118/0x5d0
[   57.238729]  kasan_report+0xdc/0x128
[   57.238757]  kasan_check_range+0x100/0x1a8
[   57.238791]  __kasan_check_write+0x20/0x30
[   57.238822]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   57.238858]  kasan_bitops_generic+0x110/0x1c8
[   57.238894]  kunit_try_run_case+0x170/0x3f0
[   57.238935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.238970]  kthread+0x328/0x630
[   57.239001]  ret_from_fork+0x10/0x20
[   57.239037] 
[   57.311412] Allocated by task 345:
[   57.314799]  kasan_save_stack+0x3c/0x68
[   57.318615]  kasan_save_track+0x20/0x40
[   57.322435]  kasan_save_alloc_info+0x40/0x58
[   57.326688]  __kasan_kmalloc+0xd4/0xd8
[   57.330422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.334935]  kasan_bitops_generic+0xa0/0x1c8
[   57.339188]  kunit_try_run_case+0x170/0x3f0
[   57.343354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.348823]  kthread+0x328/0x630
[   57.352035]  ret_from_fork+0x10/0x20
[   57.355594] 
[   57.357072] The buggy address belongs to the object at ffff000806e5df40
[   57.357072]  which belongs to the cache kmalloc-16 of size 16
[   57.369399] The buggy address is located 8 bytes inside of
[   57.369399]  allocated 9-byte region [ffff000806e5df40, ffff000806e5df49)
[   57.381635] 
[   57.383114] The buggy address belongs to the physical page:
[   57.388671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d
[   57.396655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.403164] page_type: f5(slab)
[   57.406300] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   57.414020] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   57.421740] page dumped because: kasan: bad access detected
[   57.427294] 
[   57.428769] Memory state around the buggy address:
[   57.433551]  ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.440753]  ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   57.447959] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   57.455158]                                               ^
[   57.460718]  ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.467923]  ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.475124] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   56.910296] ==================================================================
[   56.917322] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   56.923309] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343
[   56.930600] 
[   56.932085] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   56.932139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.932156] Hardware name: WinLink E850-96 board (DT)
[   56.932178] Call trace:
[   56.932193]  show_stack+0x20/0x38 (C)
[   56.932225]  dump_stack_lvl+0x8c/0xd0
[   56.932257]  print_report+0x118/0x5d0
[   56.932286]  kasan_report+0xdc/0x128
[   56.932314]  __asan_report_load1_noabort+0x20/0x30
[   56.932351]  strnlen+0x80/0x88
[   56.932384]  kasan_strings+0x478/0xb00
[   56.932416]  kunit_try_run_case+0x170/0x3f0
[   56.932452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.932487]  kthread+0x328/0x630
[   56.932518]  ret_from_fork+0x10/0x20
[   56.932552] 
[   56.998741] Allocated by task 343:
[   57.002128]  kasan_save_stack+0x3c/0x68
[   57.005946]  kasan_save_track+0x20/0x40
[   57.009766]  kasan_save_alloc_info+0x40/0x58
[   57.014019]  __kasan_kmalloc+0xd4/0xd8
[   57.017752]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.022265]  kasan_strings+0xc8/0xb00
[   57.025911]  kunit_try_run_case+0x170/0x3f0
[   57.030079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.035547]  kthread+0x328/0x630
[   57.038758]  ret_from_fork+0x10/0x20
[   57.042317] 
[   57.043793] Freed by task 343:
[   57.046831]  kasan_save_stack+0x3c/0x68
[   57.050650]  kasan_save_track+0x20/0x40
[   57.054469]  kasan_save_free_info+0x4c/0x78
[   57.058636]  __kasan_slab_free+0x6c/0x98
[   57.062543]  kfree+0x214/0x3c8
[   57.065581]  kasan_strings+0x24c/0xb00
[   57.069313]  kunit_try_run_case+0x170/0x3f0
[   57.073480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.078948]  kthread+0x328/0x630
[   57.082160]  ret_from_fork+0x10/0x20
[   57.085719] 
[   57.087195] The buggy address belongs to the object at ffff000808564880
[   57.087195]  which belongs to the cache kmalloc-32 of size 32
[   57.099522] The buggy address is located 16 bytes inside of
[   57.099522]  freed 32-byte region [ffff000808564880, ffff0008085648a0)
[   57.111587] 
[   57.113065] The buggy address belongs to the physical page:
[   57.118620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564
[   57.126605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.133114] page_type: f5(slab)
[   57.136249] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   57.143971] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   57.151692] page dumped because: kasan: bad access detected
[   57.157246] 
[   57.158721] Memory state around the buggy address:
[   57.163500]  ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.170704]  ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.177909] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.185110]                          ^
[   57.188846]  ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   57.196051]  ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.203252] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   55.468662] ==================================================================
[   55.478454] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   55.486009] Read of size 1 at addr ffff800089637b4a by task kunit_try_catch/337
[   55.493296] 
[   55.494781] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   55.494835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.494853] Hardware name: WinLink E850-96 board (DT)
[   55.494876] Call trace:
[   55.494890]  show_stack+0x20/0x38 (C)
[   55.494926]  dump_stack_lvl+0x8c/0xd0
[   55.494960]  print_report+0x310/0x5d0
[   55.494990]  kasan_report+0xdc/0x128
[   55.495016]  __asan_report_load1_noabort+0x20/0x30
[   55.495048]  kasan_alloca_oob_right+0x2dc/0x340
[   55.495081]  kunit_try_run_case+0x170/0x3f0
[   55.495119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.495150]  kthread+0x328/0x630
[   55.495181]  ret_from_fork+0x10/0x20
[   55.495215] 
[   55.559182] The buggy address belongs to stack of task kunit_try_catch/337
[   55.566060] 
[   55.567513] The buggy address ffff800089637b4a belongs to a vmalloc virtual mapping
[   55.575156] The buggy address belongs to the physical page:
[   55.580711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847b2
[   55.588696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.595215] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   55.602936] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.610656] page dumped because: kasan: bad access detected
[   55.616209] 
[   55.617686] Memory state around the buggy address:
[   55.622467]  ffff800089637a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.629668]  ffff800089637a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.636875] >ffff800089637b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   55.644074]                                               ^
[   55.649633]  ffff800089637b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   55.656839]  ffff800089637c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   55.664040] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   56.610076] ==================================================================
[   56.617151] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   56.623053] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343
[   56.630344] 
[   56.631829] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   56.631879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.631899] Hardware name: WinLink E850-96 board (DT)
[   56.631919] Call trace:
[   56.631933]  show_stack+0x20/0x38 (C)
[   56.631970]  dump_stack_lvl+0x8c/0xd0
[   56.632001]  print_report+0x118/0x5d0
[   56.632032]  kasan_report+0xdc/0x128
[   56.632060]  __asan_report_load1_noabort+0x20/0x30
[   56.632095]  strlen+0xa8/0xb0
[   56.632127]  kasan_strings+0x418/0xb00
[   56.632159]  kunit_try_run_case+0x170/0x3f0
[   56.632197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.632230]  kthread+0x328/0x630
[   56.632261]  ret_from_fork+0x10/0x20
[   56.632296] 
[   56.698400] Allocated by task 343:
[   56.701786]  kasan_save_stack+0x3c/0x68
[   56.705602]  kasan_save_track+0x20/0x40
[   56.709423]  kasan_save_alloc_info+0x40/0x58
[   56.713676]  __kasan_kmalloc+0xd4/0xd8
[   56.717409]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.721923]  kasan_strings+0xc8/0xb00
[   56.725569]  kunit_try_run_case+0x170/0x3f0
[   56.729735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.735204]  kthread+0x328/0x630
[   56.738416]  ret_from_fork+0x10/0x20
[   56.741974] 
[   56.743450] Freed by task 343:
[   56.746488]  kasan_save_stack+0x3c/0x68
[   56.750308]  kasan_save_track+0x20/0x40
[   56.754127]  kasan_save_free_info+0x4c/0x78
[   56.758294]  __kasan_slab_free+0x6c/0x98
[   56.762200]  kfree+0x214/0x3c8
[   56.765238]  kasan_strings+0x24c/0xb00
[   56.768971]  kunit_try_run_case+0x170/0x3f0
[   56.773137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.778606]  kthread+0x328/0x630
[   56.781818]  ret_from_fork+0x10/0x20
[   56.785377] 
[   56.786852] The buggy address belongs to the object at ffff000808564880
[   56.786852]  which belongs to the cache kmalloc-32 of size 32
[   56.799182] The buggy address is located 16 bytes inside of
[   56.799182]  freed 32-byte region [ffff000808564880, ffff0008085648a0)
[   56.811244] 
[   56.812723] The buggy address belongs to the physical page:
[   56.818278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564
[   56.826263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.832772] page_type: f5(slab)
[   56.835907] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   56.843629] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   56.851348] page dumped because: kasan: bad access detected
[   56.856903] 
[   56.858378] Memory state around the buggy address:
[   56.863160]  ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.870362]  ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.877566] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.884767]                          ^
[   56.888504]  ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   56.895708]  ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.902910] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   56.312095] ==================================================================
[   56.319154] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   56.325837] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343
[   56.333128] 
[   56.334612] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   56.334667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.334686] Hardware name: WinLink E850-96 board (DT)
[   56.334707] Call trace:
[   56.334720]  show_stack+0x20/0x38 (C)
[   56.334755]  dump_stack_lvl+0x8c/0xd0
[   56.334789]  print_report+0x118/0x5d0
[   56.334817]  kasan_report+0xdc/0x128
[   56.334844]  __asan_report_load1_noabort+0x20/0x30
[   56.334879]  kasan_strings+0x95c/0xb00
[   56.334913]  kunit_try_run_case+0x170/0x3f0
[   56.334951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.334983]  kthread+0x328/0x630
[   56.335013]  ret_from_fork+0x10/0x20
[   56.335050] 
[   56.398229] Allocated by task 343:
[   56.401616]  kasan_save_stack+0x3c/0x68
[   56.405435]  kasan_save_track+0x20/0x40
[   56.409254]  kasan_save_alloc_info+0x40/0x58
[   56.413507]  __kasan_kmalloc+0xd4/0xd8
[   56.417240]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.421754]  kasan_strings+0xc8/0xb00
[   56.425399]  kunit_try_run_case+0x170/0x3f0
[   56.429566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.435035]  kthread+0x328/0x630
[   56.438246]  ret_from_fork+0x10/0x20
[   56.441806] 
[   56.443281] Freed by task 343:
[   56.446321]  kasan_save_stack+0x3c/0x68
[   56.450139]  kasan_save_track+0x20/0x40
[   56.453958]  kasan_save_free_info+0x4c/0x78
[   56.458125]  __kasan_slab_free+0x6c/0x98
[   56.462031]  kfree+0x214/0x3c8
[   56.465069]  kasan_strings+0x24c/0xb00
[   56.468802]  kunit_try_run_case+0x170/0x3f0
[   56.472968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.478437]  kthread+0x328/0x630
[   56.481648]  ret_from_fork+0x10/0x20
[   56.485207] 
[   56.486684] The buggy address belongs to the object at ffff000808564880
[   56.486684]  which belongs to the cache kmalloc-32 of size 32
[   56.499011] The buggy address is located 16 bytes inside of
[   56.499011]  freed 32-byte region [ffff000808564880, ffff0008085648a0)
[   56.511075] 
[   56.512553] The buggy address belongs to the physical page:
[   56.518109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564
[   56.526094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.532603] page_type: f5(slab)
[   56.535737] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   56.543460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   56.551179] page dumped because: kasan: bad access detected
[   56.556734] 
[   56.558210] Memory state around the buggy address:
[   56.562989]  ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.570193]  ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.577399] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.584598]                          ^
[   56.588335]  ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   56.595539]  ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.602741] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   55.995299] ==================================================================
[   56.018987] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   56.024885] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343
[   56.032176] 
[   56.033664] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   56.033725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.033744] Hardware name: WinLink E850-96 board (DT)
[   56.033766] Call trace:
[   56.033783]  show_stack+0x20/0x38 (C)
[   56.033823]  dump_stack_lvl+0x8c/0xd0
[   56.033854]  print_report+0x118/0x5d0
[   56.033886]  kasan_report+0xdc/0x128
[   56.033913]  __asan_report_load1_noabort+0x20/0x30
[   56.033951]  strcmp+0xc0/0xc8
[   56.033984]  kasan_strings+0x340/0xb00
[   56.034019]  kunit_try_run_case+0x170/0x3f0
[   56.034058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.034093]  kthread+0x328/0x630
[   56.034124]  ret_from_fork+0x10/0x20
[   56.034162] 
[   56.100232] Allocated by task 343:
[   56.103620]  kasan_save_stack+0x3c/0x68
[   56.107435]  kasan_save_track+0x20/0x40
[   56.111255]  kasan_save_alloc_info+0x40/0x58
[   56.115508]  __kasan_kmalloc+0xd4/0xd8
[   56.119241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.123754]  kasan_strings+0xc8/0xb00
[   56.127402]  kunit_try_run_case+0x170/0x3f0
[   56.131567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.137036]  kthread+0x328/0x630
[   56.140247]  ret_from_fork+0x10/0x20
[   56.143806] 
[   56.145283] Freed by task 343:
[   56.148323]  kasan_save_stack+0x3c/0x68
[   56.152139]  kasan_save_track+0x20/0x40
[   56.155959]  kasan_save_free_info+0x4c/0x78
[   56.160126]  __kasan_slab_free+0x6c/0x98
[   56.164033]  kfree+0x214/0x3c8
[   56.167070]  kasan_strings+0x24c/0xb00
[   56.170803]  kunit_try_run_case+0x170/0x3f0
[   56.174969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.180438]  kthread+0x328/0x630
[   56.183650]  ret_from_fork+0x10/0x20
[   56.187208] 
[   56.188686] The buggy address belongs to the object at ffff000808564880
[   56.188686]  which belongs to the cache kmalloc-32 of size 32
[   56.201012] The buggy address is located 16 bytes inside of
[   56.201012]  freed 32-byte region [ffff000808564880, ffff0008085648a0)
[   56.213076] 
[   56.214556] The buggy address belongs to the physical page:
[   56.220112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564
[   56.228097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.234606] page_type: f5(slab)
[   56.237742] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   56.245461] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   56.253181] page dumped because: kasan: bad access detected
[   56.258735] 
[   56.260212] Memory state around the buggy address:
[   56.264993]  ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.272194]  ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.279399] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.286599]                          ^
[   56.290335]  ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   56.297540]  ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   56.304742] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   55.693497] ==================================================================
[   55.703798] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   55.709787] Read of size 1 at addr ffff000805f39f58 by task kunit_try_catch/341
[   55.717077] 
[   55.718564] CPU: 7 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   55.718622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.718643] Hardware name: WinLink E850-96 board (DT)
[   55.718664] Call trace:
[   55.718678]  show_stack+0x20/0x38 (C)
[   55.718717]  dump_stack_lvl+0x8c/0xd0
[   55.718750]  print_report+0x118/0x5d0
[   55.718784]  kasan_report+0xdc/0x128
[   55.718814]  __asan_report_load1_noabort+0x20/0x30
[   55.718852]  memcmp+0x198/0x1d8
[   55.718886]  kasan_memcmp+0x16c/0x300
[   55.718919]  kunit_try_run_case+0x170/0x3f0
[   55.718962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.718995]  kthread+0x328/0x630
[   55.719026]  ret_from_fork+0x10/0x20
[   55.719067] 
[   55.785220] Allocated by task 341:
[   55.788605]  kasan_save_stack+0x3c/0x68
[   55.792422]  kasan_save_track+0x20/0x40
[   55.796242]  kasan_save_alloc_info+0x40/0x58
[   55.800495]  __kasan_kmalloc+0xd4/0xd8
[   55.804228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.808742]  kasan_memcmp+0xbc/0x300
[   55.812301]  kunit_try_run_case+0x170/0x3f0
[   55.816467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.821936]  kthread+0x328/0x630
[   55.825148]  ret_from_fork+0x10/0x20
[   55.828710] 
[   55.830184] The buggy address belongs to the object at ffff000805f39f40
[   55.830184]  which belongs to the cache kmalloc-32 of size 32
[   55.842512] The buggy address is located 0 bytes to the right of
[   55.842512]  allocated 24-byte region [ffff000805f39f40, ffff000805f39f58)
[   55.855356] 
[   55.856835] The buggy address belongs to the physical page:
[   55.862391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f39
[   55.870377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.876886] page_type: f5(slab)
[   55.880022] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   55.887741] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   55.895461] page dumped because: kasan: bad access detected
[   55.901015] 
[   55.902492] Memory state around the buggy address:
[   55.907274]  ffff000805f39e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   55.914475]  ffff000805f39e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   55.921679] >ffff000805f39f00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   55.928880]                                                     ^
[   55.934959]  ffff000805f39f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.942165]  ffff000805f3a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.949366] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   55.264777] ==================================================================
[   55.273946] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   55.281407] Read of size 1 at addr ffff800089617b5f by task kunit_try_catch/335
[   55.288698] 
[   55.290185] CPU: 6 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   55.290241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.290260] Hardware name: WinLink E850-96 board (DT)
[   55.290281] Call trace:
[   55.290295]  show_stack+0x20/0x38 (C)
[   55.290337]  dump_stack_lvl+0x8c/0xd0
[   55.290372]  print_report+0x310/0x5d0
[   55.290401]  kasan_report+0xdc/0x128
[   55.290429]  __asan_report_load1_noabort+0x20/0x30
[   55.290462]  kasan_alloca_oob_left+0x2b8/0x310
[   55.290494]  kunit_try_run_case+0x170/0x3f0
[   55.290531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.290566]  kthread+0x328/0x630
[   55.290597]  ret_from_fork+0x10/0x20
[   55.290635] 
[   55.354496] The buggy address belongs to stack of task kunit_try_catch/335
[   55.361377] 
[   55.362829] The buggy address ffff800089617b5f belongs to a vmalloc virtual mapping
[   55.370471] The buggy address belongs to the physical page:
[   55.376027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88479d
[   55.384012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.390532] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   55.398252] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.405972] page dumped because: kasan: bad access detected
[   55.411525] 
[   55.413001] Memory state around the buggy address:
[   55.417782]  ffff800089617a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.424984]  ffff800089617a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.432190] >ffff800089617b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   55.439390]                                                     ^
[   55.445470]  ffff800089617b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   55.452676]  ffff800089617c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   55.459877] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   55.030935] ==================================================================
[   55.045304] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   55.052156] Read of size 1 at addr ffff8000895f7c2a by task kunit_try_catch/333
[   55.059448] 
[   55.060933] CPU: 3 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   55.060990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.061008] Hardware name: WinLink E850-96 board (DT)
[   55.061032] Call trace:
[   55.061046]  show_stack+0x20/0x38 (C)
[   55.061083]  dump_stack_lvl+0x8c/0xd0
[   55.061116]  print_report+0x310/0x5d0
[   55.061146]  kasan_report+0xdc/0x128
[   55.061173]  __asan_report_load1_noabort+0x20/0x30
[   55.061206]  kasan_stack_oob+0x238/0x270
[   55.061235]  kunit_try_run_case+0x170/0x3f0
[   55.061276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.061308]  kthread+0x328/0x630
[   55.061337]  ret_from_fork+0x10/0x20
[   55.061370] 
[   55.124727] The buggy address belongs to stack of task kunit_try_catch/333
[   55.131583]  and is located at offset 138 in frame:
[   55.136442]  kasan_stack_oob+0x0/0x270
[   55.140180] 
[   55.141651] This frame has 4 objects:
[   55.145300]  [48, 49) '__assertion'
[   55.145324]  [64, 72) 'array'
[   55.148772]  [96, 112) '__assertion'
[   55.151722]  [128, 138) 'stack_array'
[   55.155279] 
[   55.160401] The buggy address ffff8000895f7c2a belongs to a vmalloc virtual mapping
[   55.168042] The buggy address belongs to the physical page:
[   55.173600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884788
[   55.181584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.188105] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   55.195823] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.203543] page dumped because: kasan: bad access detected
[   55.209098] 
[   55.210574] Memory state around the buggy address:
[   55.215353]  ffff8000895f7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.222556]  ffff8000895f7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   55.229762] >ffff8000895f7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   55.236962]                                   ^
[   55.241479]  ffff8000895f7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   55.248684]  ffff8000895f7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   55.255887] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   54.819916] ==================================================================
[   54.830896] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   54.838444] Read of size 1 at addr ffff800087b4e6cd by task kunit_try_catch/329
[   54.845735] 
[   54.847222] CPU: 6 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   54.847275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.847292] Hardware name: WinLink E850-96 board (DT)
[   54.847315] Call trace:
[   54.847327]  show_stack+0x20/0x38 (C)
[   54.847362]  dump_stack_lvl+0x8c/0xd0
[   54.847397]  print_report+0x310/0x5d0
[   54.847429]  kasan_report+0xdc/0x128
[   54.847456]  __asan_report_load1_noabort+0x20/0x30
[   54.847490]  kasan_global_oob_right+0x230/0x270
[   54.847523]  kunit_try_run_case+0x170/0x3f0
[   54.847564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.847597]  kthread+0x328/0x630
[   54.847625]  ret_from_fork+0x10/0x20
[   54.847661] 
[   54.911620] The buggy address belongs to the variable:
[   54.916741]  global_array+0xd/0x40
[   54.920126] 
[   54.921601] The buggy address ffff800087b4e6cd belongs to a vmalloc virtual mapping
[   54.929245] The buggy address belongs to the physical page:
[   54.934801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b4e
[   54.942699] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   54.950001] raw: 03fffe0000002000 fffffdffc01ed388 fffffdffc01ed388 0000000000000000
[   54.957720] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.965438] page dumped because: kasan: bad access detected
[   54.970994] 
[   54.972469] Memory state around the buggy address:
[   54.977250]  ffff800087b4e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.984454]  ffff800087b4e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.991657] >ffff800087b4e680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   54.998858]                                               ^
[   55.004417]  ffff800087b4e700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   55.011622]  ffff800087b4e780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   55.018823] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   54.579969] ==================================================================
[   54.590099] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.598083] Free of addr ffff000808920001 by task kunit_try_catch/327
[   54.604506] 
[   54.605994] CPU: 4 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   54.606049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.606067] Hardware name: WinLink E850-96 board (DT)
[   54.606089] Call trace:
[   54.606104]  show_stack+0x20/0x38 (C)
[   54.606140]  dump_stack_lvl+0x8c/0xd0
[   54.606177]  print_report+0x118/0x5d0
[   54.606206]  kasan_report_invalid_free+0xc0/0xe8
[   54.606236]  __kasan_mempool_poison_object+0xfc/0x150
[   54.606277]  mempool_free+0x28c/0x328
[   54.606307]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.606346]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   54.606382]  kunit_try_run_case+0x170/0x3f0
[   54.606421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.606453]  kthread+0x328/0x630
[   54.606483]  ret_from_fork+0x10/0x20
[   54.606519] 
[   54.681940] The buggy address belongs to the physical page:
[   54.687497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920
[   54.695479] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.703118] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.710062] page_type: f8(unknown)
[   54.713459] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.721177] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.728904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.736716] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.744529] head: 0bfffe0000000002 fffffdffe0224801 00000000ffffffff 00000000ffffffff
[   54.752341] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   54.760148] page dumped because: kasan: bad access detected
[   54.765702] 
[   54.767179] Memory state around the buggy address:
[   54.771959]  ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.779160]  ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.786365] >ffff000808920000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.793566]                    ^
[   54.796781]  ffff000808920080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.803986]  ffff000808920100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.811189] ==================================================================
[   54.252759] ==================================================================
[   54.263283] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.271265] Free of addr ffff000801e0bd01 by task kunit_try_catch/325
[   54.277688] 
[   54.279175] CPU: 5 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   54.279231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.279249] Hardware name: WinLink E850-96 board (DT)
[   54.279271] Call trace:
[   54.279284]  show_stack+0x20/0x38 (C)
[   54.279320]  dump_stack_lvl+0x8c/0xd0
[   54.279352]  print_report+0x118/0x5d0
[   54.279379]  kasan_report_invalid_free+0xc0/0xe8
[   54.279410]  check_slab_allocation+0xfc/0x108
[   54.279446]  __kasan_mempool_poison_object+0x78/0x150
[   54.279487]  mempool_free+0x28c/0x328
[   54.279522]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   54.279559]  mempool_kmalloc_invalid_free+0xc0/0x118
[   54.279593]  kunit_try_run_case+0x170/0x3f0
[   54.279632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.279666]  kthread+0x328/0x630
[   54.279697]  ret_from_fork+0x10/0x20
[   54.279731] 
[   54.358939] Allocated by task 325:
[   54.362323]  kasan_save_stack+0x3c/0x68
[   54.366142]  kasan_save_track+0x20/0x40
[   54.369961]  kasan_save_alloc_info+0x40/0x58
[   54.374215]  __kasan_mempool_unpoison_object+0x11c/0x180
[   54.379511]  remove_element+0x130/0x1f8
[   54.383329]  mempool_alloc_preallocated+0x58/0xc0
[   54.388017]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   54.393572]  mempool_kmalloc_invalid_free+0xc0/0x118
[   54.398520]  kunit_try_run_case+0x170/0x3f0
[   54.402686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.408155]  kthread+0x328/0x630
[   54.411367]  ret_from_fork+0x10/0x20
[   54.414926] 
[   54.416403] The buggy address belongs to the object at ffff000801e0bd00
[   54.416403]  which belongs to the cache kmalloc-128 of size 128
[   54.428904] The buggy address is located 1 bytes inside of
[   54.428904]  128-byte region [ffff000801e0bd00, ffff000801e0bd80)
[   54.440446] 
[   54.441926] The buggy address belongs to the physical page:
[   54.447483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   54.455466] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.463104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.470048] page_type: f5(slab)
[   54.473184] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.480904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.488630] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.496442] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.504254] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   54.512067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   54.519874] page dumped because: kasan: bad access detected
[   54.525428] 
[   54.526904] Memory state around the buggy address:
[   54.531684]  ffff000801e0bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.538886]  ffff000801e0bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.546092] >ffff000801e0bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.553292]                    ^
[   54.556507]  ffff000801e0bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.563712]  ffff000801e0be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.570913] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   53.443481] ==================================================================
[   53.453398] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   53.460514] Free of addr ffff000801e64400 by task kunit_try_catch/319
[   53.466937] 
[   53.468424] CPU: 6 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   53.468483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.468502] Hardware name: WinLink E850-96 board (DT)
[   53.468523] Call trace:
[   53.468539]  show_stack+0x20/0x38 (C)
[   53.468577]  dump_stack_lvl+0x8c/0xd0
[   53.468612]  print_report+0x118/0x5d0
[   53.468641]  kasan_report_invalid_free+0xc0/0xe8
[   53.468673]  check_slab_allocation+0xd4/0x108
[   53.468713]  __kasan_mempool_poison_object+0x78/0x150
[   53.468753]  mempool_free+0x28c/0x328
[   53.468785]  mempool_double_free_helper+0x150/0x2e8
[   53.468824]  mempool_kmalloc_double_free+0xc0/0x118
[   53.468858]  kunit_try_run_case+0x170/0x3f0
[   53.468897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.468930]  kthread+0x328/0x630
[   53.468959]  ret_from_fork+0x10/0x20
[   53.468994] 
[   53.547319] Allocated by task 319:
[   53.550707]  kasan_save_stack+0x3c/0x68
[   53.554522]  kasan_save_track+0x20/0x40
[   53.558341]  kasan_save_alloc_info+0x40/0x58
[   53.562595]  __kasan_mempool_unpoison_object+0x11c/0x180
[   53.567890]  remove_element+0x130/0x1f8
[   53.571709]  mempool_alloc_preallocated+0x58/0xc0
[   53.576398]  mempool_double_free_helper+0x94/0x2e8
[   53.581171]  mempool_kmalloc_double_free+0xc0/0x118
[   53.586032]  kunit_try_run_case+0x170/0x3f0
[   53.590199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.595667]  kthread+0x328/0x630
[   53.598879]  ret_from_fork+0x10/0x20
[   53.602438] 
[   53.603915] Freed by task 319:
[   53.606953]  kasan_save_stack+0x3c/0x68
[   53.610771]  kasan_save_track+0x20/0x40
[   53.614592]  kasan_save_free_info+0x4c/0x78
[   53.618757]  __kasan_mempool_poison_object+0xc0/0x150
[   53.623792]  mempool_free+0x28c/0x328
[   53.627438]  mempool_double_free_helper+0x100/0x2e8
[   53.632299]  mempool_kmalloc_double_free+0xc0/0x118
[   53.637160]  kunit_try_run_case+0x170/0x3f0
[   53.641326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.646795]  kthread+0x328/0x630
[   53.650008]  ret_from_fork+0x10/0x20
[   53.653566] 
[   53.655043] The buggy address belongs to the object at ffff000801e64400
[   53.655043]  which belongs to the cache kmalloc-128 of size 128
[   53.667544] The buggy address is located 0 bytes inside of
[   53.667544]  128-byte region [ffff000801e64400, ffff000801e64480)
[   53.679086] 
[   53.680566] The buggy address belongs to the physical page:
[   53.686123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e64
[   53.694105] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.701746] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.708688] page_type: f5(slab)
[   53.711825] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   53.719544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.727270] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   53.735081] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.742894] head: 0bfffe0000000001 fffffdffe0079901 00000000ffffffff 00000000ffffffff
[   53.750706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   53.758514] page dumped because: kasan: bad access detected
[   53.764068] 
[   53.765544] Memory state around the buggy address:
[   53.770326]  ffff000801e64300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.777526]  ffff000801e64380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.784732] >ffff000801e64400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.791932]                    ^
[   53.795147]  ffff000801e64480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.802352]  ffff000801e64500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.809555] ==================================================================
[   54.056920] ==================================================================
[   54.067715] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   54.074827] Free of addr ffff000808920000 by task kunit_try_catch/323
[   54.081252] 
[   54.082738] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   54.082794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.082812] Hardware name: WinLink E850-96 board (DT)
[   54.082833] Call trace:
[   54.082846]  show_stack+0x20/0x38 (C)
[   54.082880]  dump_stack_lvl+0x8c/0xd0
[   54.082914]  print_report+0x118/0x5d0
[   54.082942]  kasan_report_invalid_free+0xc0/0xe8
[   54.082973]  __kasan_mempool_poison_pages+0xe0/0xe8
[   54.083014]  mempool_free+0x24c/0x328
[   54.083047]  mempool_double_free_helper+0x150/0x2e8
[   54.083084]  mempool_page_alloc_double_free+0xbc/0x118
[   54.083124]  kunit_try_run_case+0x170/0x3f0
[   54.083160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.083193]  kthread+0x328/0x630
[   54.083223]  ret_from_fork+0x10/0x20
[   54.083258] 
[   54.157381] The buggy address belongs to the physical page:
[   54.162938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920
[   54.170922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.177443] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.185162] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.192881] page dumped because: kasan: bad access detected
[   54.198436] 
[   54.199911] Memory state around the buggy address:
[   54.204692]  ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.211895]  ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.219100] >ffff000808920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.226300]                    ^
[   54.229515]  ffff000808920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.236720]  ffff000808920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.243923] ==================================================================
[   53.818641] ==================================================================
[   53.828653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   53.835770] Free of addr ffff000805f94000 by task kunit_try_catch/321
[   53.842194] 
[   53.843678] CPU: 5 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   53.843730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.843750] Hardware name: WinLink E850-96 board (DT)
[   53.843772] Call trace:
[   53.843785]  show_stack+0x20/0x38 (C)
[   53.843821]  dump_stack_lvl+0x8c/0xd0
[   53.843854]  print_report+0x118/0x5d0
[   53.843882]  kasan_report_invalid_free+0xc0/0xe8
[   53.843913]  __kasan_mempool_poison_object+0x14c/0x150
[   53.843953]  mempool_free+0x28c/0x328
[   53.843985]  mempool_double_free_helper+0x150/0x2e8
[   53.844022]  mempool_kmalloc_large_double_free+0xc0/0x118
[   53.844059]  kunit_try_run_case+0x170/0x3f0
[   53.844100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.844132]  kthread+0x328/0x630
[   53.844160]  ret_from_fork+0x10/0x20
[   53.844195] 
[   53.918842] The buggy address belongs to the physical page:
[   53.924400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f94
[   53.932383] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.940022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.946966] page_type: f8(unknown)
[   53.950363] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.958082] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.965810] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.973618] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.981433] head: 0bfffe0000000002 fffffdffe017e501 00000000ffffffff 00000000ffffffff
[   53.989245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   53.997052] page dumped because: kasan: bad access detected
[   54.002605] 
[   54.004081] Memory state around the buggy address:
[   54.008861]  ffff000805f93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.016064]  ffff000805f93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.023270] >ffff000805f94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.030470]                    ^
[   54.033685]  ffff000805f94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.040890]  ffff000805f94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.048093] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   52.698289] ==================================================================
[   52.707837] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   52.714519] Read of size 1 at addr ffff000805f94000 by task kunit_try_catch/313
[   52.721809] 
[   52.723297] CPU: 5 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   52.723351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.723369] Hardware name: WinLink E850-96 board (DT)
[   52.723392] Call trace:
[   52.723406]  show_stack+0x20/0x38 (C)
[   52.723444]  dump_stack_lvl+0x8c/0xd0
[   52.723478]  print_report+0x118/0x5d0
[   52.723508]  kasan_report+0xdc/0x128
[   52.723535]  __asan_report_load1_noabort+0x20/0x30
[   52.723569]  mempool_uaf_helper+0x314/0x340
[   52.723600]  mempool_kmalloc_large_uaf+0xc4/0x120
[   52.723635]  kunit_try_run_case+0x170/0x3f0
[   52.723675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.723708]  kthread+0x328/0x630
[   52.723739]  ret_from_fork+0x10/0x20
[   52.723778] 
[   52.792035] The buggy address belongs to the physical page:
[   52.797594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f94
[   52.805577] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.813216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   52.820159] page_type: f8(unknown)
[   52.823556] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   52.831276] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   52.839002] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   52.846813] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   52.854626] head: 0bfffe0000000002 fffffdffe017e501 00000000ffffffff 00000000ffffffff
[   52.862438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   52.870246] page dumped because: kasan: bad access detected
[   52.875799] 
[   52.877276] Memory state around the buggy address:
[   52.882054]  ffff000805f93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   52.889258]  ffff000805f93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   52.896464] >ffff000805f94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   52.903664]                    ^
[   52.906879]  ffff000805f94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   52.914084]  ffff000805f94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   52.921287] ==================================================================
[   53.268136] ==================================================================
[   53.268311] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   53.270933] Read of size 1 at addr ffff0008088e4000 by task kunit_try_catch/317
[   53.278226] 
[   53.279711] CPU: 7 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   53.279768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.279785] Hardware name: WinLink E850-96 board (DT)
[   53.279807] Call trace:
[   53.279820]  show_stack+0x20/0x38 (C)
[   53.279857]  dump_stack_lvl+0x8c/0xd0
[   53.279891]  print_report+0x118/0x5d0
[   53.279920]  kasan_report+0xdc/0x128
[   53.279949]  __asan_report_load1_noabort+0x20/0x30
[   53.279985]  mempool_uaf_helper+0x314/0x340
[   53.280020]  mempool_page_alloc_uaf+0xc0/0x118
[   53.280054]  kunit_try_run_case+0x170/0x3f0
[   53.280095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.280128]  kthread+0x328/0x630
[   53.280158]  ret_from_fork+0x10/0x20
[   53.280193] 
[   53.348192] The buggy address belongs to the physical page:
[   53.353749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8888e4
[   53.361733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.368253] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   53.375972] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   53.383693] page dumped because: kasan: bad access detected
[   53.389247] 
[   53.390724] Memory state around the buggy address:
[   53.395503]  ffff0008088e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   53.402705]  ffff0008088e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   53.409911] >ffff0008088e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   53.417111]                    ^
[   53.420326]  ffff0008088e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   53.427531]  ffff0008088e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   53.434734] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   52.348121] ==================================================================
[   52.348302] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   52.352459] Read of size 1 at addr ffff000800dac400 by task kunit_try_catch/311
[   52.359750] 
[   52.361236] CPU: 7 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   52.361293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.361311] Hardware name: WinLink E850-96 board (DT)
[   52.361335] Call trace:
[   52.361348]  show_stack+0x20/0x38 (C)
[   52.361386]  dump_stack_lvl+0x8c/0xd0
[   52.361422]  print_report+0x118/0x5d0
[   52.361450]  kasan_report+0xdc/0x128
[   52.361478]  __asan_report_load1_noabort+0x20/0x30
[   52.361515]  mempool_uaf_helper+0x314/0x340
[   52.361549]  mempool_kmalloc_uaf+0xc4/0x120
[   52.361583]  kunit_try_run_case+0x170/0x3f0
[   52.361621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.361653]  kthread+0x328/0x630
[   52.361683]  ret_from_fork+0x10/0x20
[   52.361718] 
[   52.429453] Allocated by task 311:
[   52.432840]  kasan_save_stack+0x3c/0x68
[   52.436659]  kasan_save_track+0x20/0x40
[   52.440476]  kasan_save_alloc_info+0x40/0x58
[   52.444730]  __kasan_mempool_unpoison_object+0x11c/0x180
[   52.450025]  remove_element+0x130/0x1f8
[   52.453844]  mempool_alloc_preallocated+0x58/0xc0
[   52.458532]  mempool_uaf_helper+0xa4/0x340
[   52.462611]  mempool_kmalloc_uaf+0xc4/0x120
[   52.466779]  kunit_try_run_case+0x170/0x3f0
[   52.470946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.476414]  kthread+0x328/0x630
[   52.479625]  ret_from_fork+0x10/0x20
[   52.483184] 
[   52.484661] Freed by task 311:
[   52.487700]  kasan_save_stack+0x3c/0x68
[   52.491517]  kasan_save_track+0x20/0x40
[   52.495337]  kasan_save_free_info+0x4c/0x78
[   52.499503]  __kasan_mempool_poison_object+0xc0/0x150
[   52.504538]  mempool_free+0x28c/0x328
[   52.508184]  mempool_uaf_helper+0x104/0x340
[   52.512350]  mempool_kmalloc_uaf+0xc4/0x120
[   52.516517]  kunit_try_run_case+0x170/0x3f0
[   52.520685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.526152]  kthread+0x328/0x630
[   52.529364]  ret_from_fork+0x10/0x20
[   52.532923] 
[   52.534400] The buggy address belongs to the object at ffff000800dac400
[   52.534400]  which belongs to the cache kmalloc-128 of size 128
[   52.546902] The buggy address is located 0 bytes inside of
[   52.546902]  freed 128-byte region [ffff000800dac400, ffff000800dac480)
[   52.558964] 
[   52.560444] The buggy address belongs to the physical page:
[   52.566001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   52.573983] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.581623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   52.588566] page_type: f5(slab)
[   52.591704] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   52.599422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.607148] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   52.614960] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.622772] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   52.630584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   52.638391] page dumped because: kasan: bad access detected
[   52.643945] 
[   52.645422] Memory state around the buggy address:
[   52.650203]  ffff000800dac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.657404]  ffff000800dac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.664612] >ffff000800dac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.671810]                    ^
[   52.675025]  ffff000800dac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.682230]  ffff000800dac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.689432] ==================================================================
[   52.930736] ==================================================================
[   52.940212] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   52.947327] Read of size 1 at addr ffff000808765240 by task kunit_try_catch/315
[   52.954618] 
[   52.956106] CPU: 3 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   52.956161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.956178] Hardware name: WinLink E850-96 board (DT)
[   52.956200] Call trace:
[   52.956214]  show_stack+0x20/0x38 (C)
[   52.956250]  dump_stack_lvl+0x8c/0xd0
[   52.956285]  print_report+0x118/0x5d0
[   52.956313]  kasan_report+0xdc/0x128
[   52.956341]  __asan_report_load1_noabort+0x20/0x30
[   52.956376]  mempool_uaf_helper+0x314/0x340
[   52.956407]  mempool_slab_uaf+0xc0/0x118
[   52.956442]  kunit_try_run_case+0x170/0x3f0
[   52.956481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.956514]  kthread+0x328/0x630
[   52.956542]  ret_from_fork+0x10/0x20
[   52.956580] 
[   53.024063] Allocated by task 315:
[   53.027450]  kasan_save_stack+0x3c/0x68
[   53.031266]  kasan_save_track+0x20/0x40
[   53.035085]  kasan_save_alloc_info+0x40/0x58
[   53.039339]  __kasan_mempool_unpoison_object+0xbc/0x180
[   53.044547]  remove_element+0x16c/0x1f8
[   53.048366]  mempool_alloc_preallocated+0x58/0xc0
[   53.053054]  mempool_uaf_helper+0xa4/0x340
[   53.057134]  mempool_slab_uaf+0xc0/0x118
[   53.061040]  kunit_try_run_case+0x170/0x3f0
[   53.065206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.070675]  kthread+0x328/0x630
[   53.073887]  ret_from_fork+0x10/0x20
[   53.077446] 
[   53.078923] Freed by task 315:
[   53.081960]  kasan_save_stack+0x3c/0x68
[   53.085779]  kasan_save_track+0x20/0x40
[   53.089599]  kasan_save_free_info+0x4c/0x78
[   53.093765]  __kasan_mempool_poison_object+0xc0/0x150
[   53.098800]  mempool_free+0x28c/0x328
[   53.102446]  mempool_uaf_helper+0x104/0x340
[   53.106612]  mempool_slab_uaf+0xc0/0x118
[   53.110518]  kunit_try_run_case+0x170/0x3f0
[   53.114685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.120154]  kthread+0x328/0x630
[   53.123365]  ret_from_fork+0x10/0x20
[   53.126924] 
[   53.128400] The buggy address belongs to the object at ffff000808765240
[   53.128400]  which belongs to the cache test_cache of size 123
[   53.140815] The buggy address is located 0 bytes inside of
[   53.140815]  freed 123-byte region [ffff000808765240, ffff0008087652bb)
[   53.152879] 
[   53.154357] The buggy address belongs to the physical page:
[   53.159915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888765
[   53.167899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.174409] page_type: f5(slab)
[   53.177542] raw: 0bfffe0000000000 ffff0008019bc280 dead000000000122 0000000000000000
[   53.185264] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   53.192983] page dumped because: kasan: bad access detected
[   53.198538] 
[   53.200013] Memory state around the buggy address:
[   53.204794]  ffff000808765100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.211996]  ffff000808765180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.219201] >ffff000808765200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   53.226402]                                            ^
[   53.231700]  ffff000808765280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.238906]  ffff000808765300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.246107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   51.822388] ==================================================================
[   51.832329] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   51.839880] Read of size 1 at addr ffff000804a82001 by task kunit_try_catch/307
[   51.847169] 
[   51.848657] CPU: 3 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   51.848713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.848730] Hardware name: WinLink E850-96 board (DT)
[   51.848750] Call trace:
[   51.848765]  show_stack+0x20/0x38 (C)
[   51.848803]  dump_stack_lvl+0x8c/0xd0
[   51.848839]  print_report+0x118/0x5d0
[   51.848868]  kasan_report+0xdc/0x128
[   51.848895]  __asan_report_load1_noabort+0x20/0x30
[   51.848929]  mempool_oob_right_helper+0x2ac/0x2f0
[   51.848962]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   51.849000]  kunit_try_run_case+0x170/0x3f0
[   51.849039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.849072]  kthread+0x328/0x630
[   51.849102]  ret_from_fork+0x10/0x20
[   51.849139] 
[   51.918440] The buggy address belongs to the physical page:
[   51.923996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a80
[   51.931979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.939619] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.946562] page_type: f8(unknown)
[   51.949957] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   51.957678] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   51.965404] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   51.973216] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   51.981029] head: 0bfffe0000000002 fffffdffe012a001 00000000ffffffff 00000000ffffffff
[   51.988840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   51.996647] page dumped because: kasan: bad access detected
[   52.002202] 
[   52.003679] Memory state around the buggy address:
[   52.008457]  ffff000804a81f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.015660]  ffff000804a81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.022866] >ffff000804a82000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.030066]                    ^
[   52.033281]  ffff000804a82080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.040486]  ffff000804a82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.047688] ==================================================================
[   52.057098] ==================================================================
[   52.067140] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   52.074684] Read of size 1 at addr ffff0008088082bb by task kunit_try_catch/309
[   52.081975] 
[   52.083462] CPU: 6 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   52.083520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.083536] Hardware name: WinLink E850-96 board (DT)
[   52.083557] Call trace:
[   52.083572]  show_stack+0x20/0x38 (C)
[   52.083609]  dump_stack_lvl+0x8c/0xd0
[   52.083641]  print_report+0x118/0x5d0
[   52.083669]  kasan_report+0xdc/0x128
[   52.083696]  __asan_report_load1_noabort+0x20/0x30
[   52.083732]  mempool_oob_right_helper+0x2ac/0x2f0
[   52.083767]  mempool_slab_oob_right+0xc0/0x118
[   52.083805]  kunit_try_run_case+0x170/0x3f0
[   52.083846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.083878]  kthread+0x328/0x630
[   52.083906]  ret_from_fork+0x10/0x20
[   52.083941] 
[   52.152463] Allocated by task 309:
[   52.155847]  kasan_save_stack+0x3c/0x68
[   52.159664]  kasan_save_track+0x20/0x40
[   52.163484]  kasan_save_alloc_info+0x40/0x58
[   52.167737]  __kasan_mempool_unpoison_object+0xbc/0x180
[   52.172947]  remove_element+0x16c/0x1f8
[   52.176765]  mempool_alloc_preallocated+0x58/0xc0
[   52.181452]  mempool_oob_right_helper+0x98/0x2f0
[   52.186053]  mempool_slab_oob_right+0xc0/0x118
[   52.190480]  kunit_try_run_case+0x170/0x3f0
[   52.194647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.200115]  kthread+0x328/0x630
[   52.203327]  ret_from_fork+0x10/0x20
[   52.206886] 
[   52.208363] The buggy address belongs to the object at ffff000808808240
[   52.208363]  which belongs to the cache test_cache of size 123
[   52.220777] The buggy address is located 0 bytes to the right of
[   52.220777]  allocated 123-byte region [ffff000808808240, ffff0008088082bb)
[   52.233709] 
[   52.235187] The buggy address belongs to the physical page:
[   52.240745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888808
[   52.248729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.255239] page_type: f5(slab)
[   52.258375] raw: 0bfffe0000000000 ffff000801e66140 dead000000000122 0000000000000000
[   52.266094] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   52.273814] page dumped because: kasan: bad access detected
[   52.279367] 
[   52.280843] Memory state around the buggy address:
[   52.285623]  ffff000808808180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.292827]  ffff000808808200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   52.300031] >ffff000808808280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   52.307232]                                         ^
[   52.312270]  ffff000808808300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.319475]  ffff000808808380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.326676] ==================================================================
[   51.519986] ==================================================================
[   51.520158] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   51.520295] Read of size 1 at addr ffff000801e0b973 by task kunit_try_catch/305
[   51.526861] 
[   51.528350] CPU: 5 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   51.528407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.528426] Hardware name: WinLink E850-96 board (DT)
[   51.528447] Call trace:
[   51.528461]  show_stack+0x20/0x38 (C)
[   51.528499]  dump_stack_lvl+0x8c/0xd0
[   51.528532]  print_report+0x118/0x5d0
[   51.528560]  kasan_report+0xdc/0x128
[   51.528586]  __asan_report_load1_noabort+0x20/0x30
[   51.528624]  mempool_oob_right_helper+0x2ac/0x2f0
[   51.528655]  mempool_kmalloc_oob_right+0xc4/0x120
[   51.528688]  kunit_try_run_case+0x170/0x3f0
[   51.528726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.528759]  kthread+0x328/0x630
[   51.528790]  ret_from_fork+0x10/0x20
[   51.528826] 
[   51.597607] Allocated by task 305:
[   51.600995]  kasan_save_stack+0x3c/0x68
[   51.604812]  kasan_save_track+0x20/0x40
[   51.608633]  kasan_save_alloc_info+0x40/0x58
[   51.612885]  __kasan_mempool_unpoison_object+0x11c/0x180
[   51.618180]  remove_element+0x130/0x1f8
[   51.621999]  mempool_alloc_preallocated+0x58/0xc0
[   51.626687]  mempool_oob_right_helper+0x98/0x2f0
[   51.631287]  mempool_kmalloc_oob_right+0xc4/0x120
[   51.635975]  kunit_try_run_case+0x170/0x3f0
[   51.640141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.645609]  kthread+0x328/0x630
[   51.648821]  ret_from_fork+0x10/0x20
[   51.652381] 
[   51.653858] The buggy address belongs to the object at ffff000801e0b900
[   51.653858]  which belongs to the cache kmalloc-128 of size 128
[   51.666360] The buggy address is located 0 bytes to the right of
[   51.666360]  allocated 115-byte region [ffff000801e0b900, ffff000801e0b973)
[   51.679290] 
[   51.680770] The buggy address belongs to the physical page:
[   51.686326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a
[   51.694309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.701950] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.708891] page_type: f5(slab)
[   51.712029] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   51.719748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.727475] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   51.735285] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.743098] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff
[   51.750910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.758717] page dumped because: kasan: bad access detected
[   51.764271] 
[   51.765748] Memory state around the buggy address:
[   51.770527]  ffff000801e0b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.777730]  ffff000801e0b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.784937] >ffff000801e0b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   51.792135]                                                              ^
[   51.798996]  ffff000801e0b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.806201]  ffff000801e0ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   51.813404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   50.620669] ==================================================================
[   50.620859] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   50.621005] Read of size 1 at addr ffff000801b48640 by task kunit_try_catch/299
[   50.624555] 
[   50.626042] CPU: 4 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   50.626099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.626115] Hardware name: WinLink E850-96 board (DT)
[   50.626139] Call trace:
[   50.626151]  show_stack+0x20/0x38 (C)
[   50.626188]  dump_stack_lvl+0x8c/0xd0
[   50.626223]  print_report+0x118/0x5d0
[   50.626253]  kasan_report+0xdc/0x128
[   50.626281]  __kasan_check_byte+0x54/0x70
[   50.626311]  kmem_cache_destroy+0x34/0x218
[   50.626346]  kmem_cache_double_destroy+0x174/0x300
[   50.626383]  kunit_try_run_case+0x170/0x3f0
[   50.626419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.626454]  kthread+0x328/0x630
[   50.626485]  ret_from_fork+0x10/0x20
[   50.626523] 
[   50.693998] Allocated by task 299:
[   50.697385]  kasan_save_stack+0x3c/0x68
[   50.701202]  kasan_save_track+0x20/0x40
[   50.705023]  kasan_save_alloc_info+0x40/0x58
[   50.709275]  __kasan_slab_alloc+0xa8/0xb0
[   50.713270]  kmem_cache_alloc_noprof+0x10c/0x398
[   50.717869]  __kmem_cache_create_args+0x178/0x280
[   50.722556]  kmem_cache_double_destroy+0xc0/0x300
[   50.727244]  kunit_try_run_case+0x170/0x3f0
[   50.731412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.736879]  kthread+0x328/0x630
[   50.740091]  ret_from_fork+0x10/0x20
[   50.743649] 
[   50.745126] Freed by task 299:
[   50.748165]  kasan_save_stack+0x3c/0x68
[   50.751984]  kasan_save_track+0x20/0x40
[   50.755802]  kasan_save_free_info+0x4c/0x78
[   50.759969]  __kasan_slab_free+0x6c/0x98
[   50.763876]  kmem_cache_free+0x260/0x468
[   50.767781]  slab_kmem_cache_release+0x38/0x50
[   50.772208]  kmem_cache_release+0x1c/0x30
[   50.776201]  kobject_put+0x17c/0x420
[   50.779760]  sysfs_slab_release+0x1c/0x30
[   50.783753]  kmem_cache_destroy+0x118/0x218
[   50.787920]  kmem_cache_double_destroy+0x128/0x300
[   50.792694]  kunit_try_run_case+0x170/0x3f0
[   50.796861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.802329]  kthread+0x328/0x630
[   50.805541]  ret_from_fork+0x10/0x20
[   50.809100] 
[   50.810577] The buggy address belongs to the object at ffff000801b48640
[   50.810577]  which belongs to the cache kmem_cache of size 208
[   50.822991] The buggy address is located 0 bytes inside of
[   50.822991]  freed 208-byte region [ffff000801b48640, ffff000801b48710)
[   50.835054] 
[   50.836534] The buggy address belongs to the physical page:
[   50.842091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b48
[   50.850074] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.857714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.864658] page_type: f5(slab)
[   50.867793] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   50.875512] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   50.883240] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   50.891050] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   50.898863] head: 0bfffe0000000001 fffffdffe006d201 00000000ffffffff 00000000ffffffff
[   50.906675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.914482] page dumped because: kasan: bad access detected
[   50.920036] 
[   50.921513] Memory state around the buggy address:
[   50.926295]  ffff000801b48500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.933494]  ffff000801b48580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   50.940701] >ffff000801b48600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   50.947900]                                            ^
[   50.953198]  ffff000801b48680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.960403]  ffff000801b48700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.967606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   50.205785] ==================================================================
[   50.205983] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   50.206114] Read of size 1 at addr ffff000801e68000 by task kunit_try_catch/297
[   50.209497] 
[   50.210986] CPU: 6 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   50.211044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.211062] Hardware name: WinLink E850-96 board (DT)
[   50.211086] Call trace:
[   50.211100]  show_stack+0x20/0x38 (C)
[   50.211139]  dump_stack_lvl+0x8c/0xd0
[   50.211172]  print_report+0x118/0x5d0
[   50.211202]  kasan_report+0xdc/0x128
[   50.211230]  __asan_report_load1_noabort+0x20/0x30
[   50.211265]  kmem_cache_rcu_uaf+0x388/0x468
[   50.211298]  kunit_try_run_case+0x170/0x3f0
[   50.211337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.211369]  kthread+0x328/0x630
[   50.211398]  ret_from_fork+0x10/0x20
[   50.211435] 
[   50.275036] Allocated by task 297:
[   50.278422]  kasan_save_stack+0x3c/0x68
[   50.282239]  kasan_save_track+0x20/0x40
[   50.286059]  kasan_save_alloc_info+0x40/0x58
[   50.290312]  __kasan_slab_alloc+0xa8/0xb0
[   50.294305]  kmem_cache_alloc_noprof+0x10c/0x398
[   50.298906]  kmem_cache_rcu_uaf+0x12c/0x468
[   50.303073]  kunit_try_run_case+0x170/0x3f0
[   50.307240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.312709]  kthread+0x328/0x630
[   50.315919]  ret_from_fork+0x10/0x20
[   50.319478] 
[   50.320955] Freed by task 0:
[   50.323822]  kasan_save_stack+0x3c/0x68
[   50.327638]  kasan_save_track+0x20/0x40
[   50.331459]  kasan_save_free_info+0x4c/0x78
[   50.335624]  __kasan_slab_free+0x6c/0x98
[   50.339530]  slab_free_after_rcu_debug+0xd4/0x2f8
[   50.344218]  rcu_core+0x9f4/0x1e20
[   50.347603]  rcu_core_si+0x18/0x30
[   50.350988]  handle_softirqs+0x374/0xb28
[   50.354894]  __do_softirq+0x1c/0x28
[   50.358367] 
[   50.359844] Last potentially related work creation:
[   50.364705]  kasan_save_stack+0x3c/0x68
[   50.368523]  kasan_record_aux_stack+0xb4/0xc8
[   50.372864]  kmem_cache_free+0x120/0x468
[   50.376769]  kmem_cache_rcu_uaf+0x16c/0x468
[   50.380936]  kunit_try_run_case+0x170/0x3f0
[   50.385102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.390571]  kthread+0x328/0x630
[   50.393783]  ret_from_fork+0x10/0x20
[   50.397341] 
[   50.398817] The buggy address belongs to the object at ffff000801e68000
[   50.398817]  which belongs to the cache test_cache of size 200
[   50.411234] The buggy address is located 0 bytes inside of
[   50.411234]  freed 200-byte region [ffff000801e68000, ffff000801e680c8)
[   50.423296] 
[   50.424776] The buggy address belongs to the physical page:
[   50.430333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e68
[   50.438316] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.445957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.452898] page_type: f5(slab)
[   50.456035] raw: 0bfffe0000000040 ffff000801e66000 dead000000000122 0000000000000000
[   50.463754] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.471480] head: 0bfffe0000000040 ffff000801e66000 dead000000000122 0000000000000000
[   50.479292] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.487105] head: 0bfffe0000000001 fffffdffe0079a01 00000000ffffffff 00000000ffffffff
[   50.494917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.502724] page dumped because: kasan: bad access detected
[   50.508278] 
[   50.509753] Memory state around the buggy address:
[   50.514533]  ffff000801e67f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.521736]  ffff000801e67f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.528942] >ffff000801e68000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.536142]                    ^
[   50.539357]  ffff000801e68080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   50.546562]  ffff000801e68100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.553765] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   49.801581] ==================================================================
[   49.801766] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   49.808647] Free of addr ffff000801b6c001 by task kunit_try_catch/295
[   49.815069] 
[   49.816556] CPU: 4 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   49.816610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.816629] Hardware name: WinLink E850-96 board (DT)
[   49.816651] Call trace:
[   49.816664]  show_stack+0x20/0x38 (C)
[   49.816701]  dump_stack_lvl+0x8c/0xd0
[   49.816734]  print_report+0x118/0x5d0
[   49.816765]  kasan_report_invalid_free+0xc0/0xe8
[   49.816798]  check_slab_allocation+0xfc/0x108
[   49.816836]  __kasan_slab_pre_free+0x2c/0x48
[   49.816871]  kmem_cache_free+0xf0/0x468
[   49.816909]  kmem_cache_invalid_free+0x184/0x3c8
[   49.816945]  kunit_try_run_case+0x170/0x3f0
[   49.816986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.817018]  kthread+0x328/0x630
[   49.817048]  ret_from_fork+0x10/0x20
[   49.817086] 
[   49.889721] Allocated by task 295:
[   49.893108]  kasan_save_stack+0x3c/0x68
[   49.896925]  kasan_save_track+0x20/0x40
[   49.900746]  kasan_save_alloc_info+0x40/0x58
[   49.904999]  __kasan_slab_alloc+0xa8/0xb0
[   49.908991]  kmem_cache_alloc_noprof+0x10c/0x398
[   49.913591]  kmem_cache_invalid_free+0x12c/0x3c8
[   49.918193]  kunit_try_run_case+0x170/0x3f0
[   49.922358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.927827]  kthread+0x328/0x630
[   49.931038]  ret_from_fork+0x10/0x20
[   49.934598] 
[   49.936076] The buggy address belongs to the object at ffff000801b6c000
[   49.936076]  which belongs to the cache test_cache of size 200
[   49.948489] The buggy address is located 1 bytes inside of
[   49.948489]  200-byte region [ffff000801b6c000, ffff000801b6c0c8)
[   49.960031] 
[   49.961511] The buggy address belongs to the physical page:
[   49.967068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b6c
[   49.975051] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.982690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.989633] page_type: f5(slab)
[   49.992770] raw: 0bfffe0000000040 ffff000801b48500 dead000000000122 0000000000000000
[   50.000489] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.008217] head: 0bfffe0000000040 ffff000801b48500 dead000000000122 0000000000000000
[   50.016027] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.023840] head: 0bfffe0000000001 fffffdffe006db01 00000000ffffffff 00000000ffffffff
[   50.031651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.039460] page dumped because: kasan: bad access detected
[   50.045013] 
[   50.046489] Memory state around the buggy address:
[   50.051268]  ffff000801b6bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.058471]  ffff000801b6bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.065676] >ffff000801b6c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.072877]                    ^
[   50.076092]  ffff000801b6c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   50.083297]  ffff000801b6c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.090501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   49.461016] ==================================================================
[   49.461202] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   49.461328] Free of addr ffff000801b6a000 by task kunit_try_catch/293
[   49.462731] 
[   49.464219] CPU: 4 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   49.464278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.464296] Hardware name: WinLink E850-96 board (DT)
[   49.464319] Call trace:
[   49.464335]  show_stack+0x20/0x38 (C)
[   49.464374]  dump_stack_lvl+0x8c/0xd0
[   49.464409]  print_report+0x118/0x5d0
[   49.464439]  kasan_report_invalid_free+0xc0/0xe8
[   49.464470]  check_slab_allocation+0xd4/0x108
[   49.464509]  __kasan_slab_pre_free+0x2c/0x48
[   49.464543]  kmem_cache_free+0xf0/0x468
[   49.464581]  kmem_cache_double_free+0x190/0x3c8
[   49.464616]  kunit_try_run_case+0x170/0x3f0
[   49.464653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.464687]  kthread+0x328/0x630
[   49.464718]  ret_from_fork+0x10/0x20
[   49.464755] 
[   49.537296] Allocated by task 293:
[   49.540684]  kasan_save_stack+0x3c/0x68
[   49.544499]  kasan_save_track+0x20/0x40
[   49.548319]  kasan_save_alloc_info+0x40/0x58
[   49.552572]  __kasan_slab_alloc+0xa8/0xb0
[   49.556565]  kmem_cache_alloc_noprof+0x10c/0x398
[   49.561166]  kmem_cache_double_free+0x12c/0x3c8
[   49.565680]  kunit_try_run_case+0x170/0x3f0
[   49.569846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.575315]  kthread+0x328/0x630
[   49.578527]  ret_from_fork+0x10/0x20
[   49.582086] 
[   49.583563] Freed by task 293:
[   49.586600]  kasan_save_stack+0x3c/0x68
[   49.590419]  kasan_save_track+0x20/0x40
[   49.594240]  kasan_save_free_info+0x4c/0x78
[   49.598405]  __kasan_slab_free+0x6c/0x98
[   49.602311]  kmem_cache_free+0x260/0x468
[   49.606217]  kmem_cache_double_free+0x140/0x3c8
[   49.610731]  kunit_try_run_case+0x170/0x3f0
[   49.614898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.620366]  kthread+0x328/0x630
[   49.623578]  ret_from_fork+0x10/0x20
[   49.627137] 
[   49.628612] The buggy address belongs to the object at ffff000801b6a000
[   49.628612]  which belongs to the cache test_cache of size 200
[   49.641029] The buggy address is located 0 bytes inside of
[   49.641029]  200-byte region [ffff000801b6a000, ffff000801b6a0c8)
[   49.652571] 
[   49.654050] The buggy address belongs to the physical page:
[   49.659607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b6a
[   49.667590] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.675230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.682174] page_type: f5(slab)
[   49.685310] raw: 0bfffe0000000040 ffff000801b483c0 dead000000000122 0000000000000000
[   49.693028] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   49.700756] head: 0bfffe0000000040 ffff000801b483c0 dead000000000122 0000000000000000
[   49.708566] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   49.716379] head: 0bfffe0000000001 fffffdffe006da81 00000000ffffffff 00000000ffffffff
[   49.724191] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.731998] page dumped because: kasan: bad access detected
[   49.737552] 
[   49.739027] Memory state around the buggy address:
[   49.743809]  ffff000801b69f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.751012]  ffff000801b69f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.758220] >ffff000801b6a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.765416]                    ^
[   49.768632]  ffff000801b6a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   49.775836]  ffff000801b6a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.783041] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   49.116859] ==================================================================
[   49.126352] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   49.133028] Read of size 1 at addr ffff0008019be0c8 by task kunit_try_catch/291
[   49.140320] 
[   49.141807] CPU: 3 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   49.141864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.141884] Hardware name: WinLink E850-96 board (DT)
[   49.141907] Call trace:
[   49.141920]  show_stack+0x20/0x38 (C)
[   49.141957]  dump_stack_lvl+0x8c/0xd0
[   49.141990]  print_report+0x118/0x5d0
[   49.142019]  kasan_report+0xdc/0x128
[   49.142046]  __asan_report_load1_noabort+0x20/0x30
[   49.142080]  kmem_cache_oob+0x344/0x430
[   49.142114]  kunit_try_run_case+0x170/0x3f0
[   49.142150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.142184]  kthread+0x328/0x630
[   49.142218]  ret_from_fork+0x10/0x20
[   49.142253] 
[   49.205508] Allocated by task 291:
[   49.208897]  kasan_save_stack+0x3c/0x68
[   49.212713]  kasan_save_track+0x20/0x40
[   49.216534]  kasan_save_alloc_info+0x40/0x58
[   49.220786]  __kasan_slab_alloc+0xa8/0xb0
[   49.224779]  kmem_cache_alloc_noprof+0x10c/0x398
[   49.229379]  kmem_cache_oob+0x12c/0x430
[   49.233198]  kunit_try_run_case+0x170/0x3f0
[   49.237366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.242835]  kthread+0x328/0x630
[   49.246046]  ret_from_fork+0x10/0x20
[   49.249604] 
[   49.251082] The buggy address belongs to the object at ffff0008019be000
[   49.251082]  which belongs to the cache test_cache of size 200
[   49.263497] The buggy address is located 0 bytes to the right of
[   49.263497]  allocated 200-byte region [ffff0008019be000, ffff0008019be0c8)
[   49.276427] 
[   49.277907] The buggy address belongs to the physical page:
[   49.283464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819be
[   49.291446] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.299086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.306029] page_type: f5(slab)
[   49.309166] raw: 0bfffe0000000040 ffff0008019bc000 dead000000000122 0000000000000000
[   49.316885] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   49.324613] head: 0bfffe0000000040 ffff0008019bc000 dead000000000122 0000000000000000
[   49.332422] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   49.340235] head: 0bfffe0000000001 fffffdffe0066f81 00000000ffffffff 00000000ffffffff
[   49.348047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.355854] page dumped because: kasan: bad access detected
[   49.361408] 
[   49.362884] Memory state around the buggy address:
[   49.367664]  ffff0008019bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.374867]  ffff0008019be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.382073] >ffff0008019be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   49.389273]                                               ^
[   49.394832]  ffff0008019be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.402037]  ffff0008019be180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.409239] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   48.768249] ==================================================================
[   48.776008] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   48.782687] Read of size 8 at addr ffff000808564740 by task kunit_try_catch/284
[   48.789976] 
[   48.791462] CPU: 2 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   48.791517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.791535] Hardware name: WinLink E850-96 board (DT)
[   48.791555] Call trace:
[   48.791571]  show_stack+0x20/0x38 (C)
[   48.791610]  dump_stack_lvl+0x8c/0xd0
[   48.791647]  print_report+0x118/0x5d0
[   48.791679]  kasan_report+0xdc/0x128
[   48.791707]  __asan_report_load8_noabort+0x20/0x30
[   48.791741]  workqueue_uaf+0x480/0x4a8
[   48.791771]  kunit_try_run_case+0x170/0x3f0
[   48.791807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.791842]  kthread+0x328/0x630
[   48.791873]  ret_from_fork+0x10/0x20
[   48.791907] 
[   48.855082] Allocated by task 284:
[   48.858468]  kasan_save_stack+0x3c/0x68
[   48.862285]  kasan_save_track+0x20/0x40
[   48.866106]  kasan_save_alloc_info+0x40/0x58
[   48.870357]  __kasan_kmalloc+0xd4/0xd8
[   48.874091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.878603]  workqueue_uaf+0x13c/0x4a8
[   48.882336]  kunit_try_run_case+0x170/0x3f0
[   48.886504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.891971]  kthread+0x328/0x630
[   48.895183]  ret_from_fork+0x10/0x20
[   48.898742] 
[   48.900217] Freed by task 121:
[   48.903257]  kasan_save_stack+0x3c/0x68
[   48.907075]  kasan_save_track+0x20/0x40
[   48.910895]  kasan_save_free_info+0x4c/0x78
[   48.915061]  __kasan_slab_free+0x6c/0x98
[   48.918967]  kfree+0x214/0x3c8
[   48.922006]  workqueue_uaf_work+0x18/0x30
[   48.926000]  process_one_work+0x530/0xf98
[   48.929991]  worker_thread+0x618/0xf38
[   48.933724]  kthread+0x328/0x630
[   48.936936]  ret_from_fork+0x10/0x20
[   48.940494] 
[   48.941972] Last potentially related work creation:
[   48.946833]  kasan_save_stack+0x3c/0x68
[   48.950651]  kasan_record_aux_stack+0xb4/0xc8
[   48.954991]  __queue_work+0x65c/0xfe0
[   48.958637]  queue_work_on+0xbc/0xf8
[   48.962196]  workqueue_uaf+0x210/0x4a8
[   48.965928]  kunit_try_run_case+0x170/0x3f0
[   48.970095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.975563]  kthread+0x328/0x630
[   48.978775]  ret_from_fork+0x10/0x20
[   48.982334] 
[   48.983811] The buggy address belongs to the object at ffff000808564740
[   48.983811]  which belongs to the cache kmalloc-32 of size 32
[   48.996140] The buggy address is located 0 bytes inside of
[   48.996140]  freed 32-byte region [ffff000808564740, ffff000808564760)
[   49.008117] 
[   49.009596] The buggy address belongs to the physical page:
[   49.015151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564
[   49.023136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.029644] page_type: f5(slab)
[   49.032781] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   49.040500] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   49.048220] page dumped because: kasan: bad access detected
[   49.053774] 
[   49.055249] Memory state around the buggy address:
[   49.060032]  ffff000808564600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.067233]  ffff000808564680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.074439] >ffff000808564700: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   49.081638]                                            ^
[   49.086937]  ffff000808564780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.094143]  ffff000808564800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.101344] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   48.401648] ==================================================================
[   48.401818] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   48.401937] Read of size 4 at addr ffff000807bb5d80 by task swapper/3/0
[   48.403003] 
[   48.404489] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   48.404545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.404561] Hardware name: WinLink E850-96 board (DT)
[   48.404581] Call trace:
[   48.404594]  show_stack+0x20/0x38 (C)
[   48.404630]  dump_stack_lvl+0x8c/0xd0
[   48.404665]  print_report+0x118/0x5d0
[   48.404694]  kasan_report+0xdc/0x128
[   48.404721]  __asan_report_load4_noabort+0x20/0x30
[   48.404755]  rcu_uaf_reclaim+0x64/0x70
[   48.404785]  rcu_core+0x9f4/0x1e20
[   48.404819]  rcu_core_si+0x18/0x30
[   48.404847]  handle_softirqs+0x374/0xb28
[   48.404882]  __do_softirq+0x1c/0x28
[   48.404913]  ____do_softirq+0x18/0x30
[   48.404947]  call_on_irq_stack+0x24/0x30
[   48.404977]  do_softirq_own_stack+0x24/0x38
[   48.405008]  __irq_exit_rcu+0x1fc/0x318
[   48.405038]  irq_exit_rcu+0x1c/0x80
[   48.405066]  el1_interrupt+0x38/0x58
[   48.405100]  el1h_64_irq_handler+0x18/0x28
[   48.405135]  el1h_64_irq+0x6c/0x70
[   48.405164]  arch_local_irq_enable+0x4/0x8 (P)
[   48.405199]  do_idle+0x384/0x4e8
[   48.405231]  cpu_startup_entry+0x68/0x80
[   48.405264]  secondary_start_kernel+0x28c/0x340
[   48.405295]  __secondary_switched+0xc0/0xc8
[   48.405336] 
[   48.515416] Allocated by task 282:
[   48.518802]  kasan_save_stack+0x3c/0x68
[   48.522619]  kasan_save_track+0x20/0x40
[   48.526439]  kasan_save_alloc_info+0x40/0x58
[   48.530692]  __kasan_kmalloc+0xd4/0xd8
[   48.534426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.538938]  rcu_uaf+0xb0/0x2d8
[   48.542065]  kunit_try_run_case+0x170/0x3f0
[   48.546231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.551700]  kthread+0x328/0x630
[   48.554910]  ret_from_fork+0x10/0x20
[   48.558471] 
[   48.559946] Freed by task 0:
[   48.562813]  kasan_save_stack+0x3c/0x68
[   48.566629]  kasan_save_track+0x20/0x40
[   48.570448]  kasan_save_free_info+0x4c/0x78
[   48.574615]  __kasan_slab_free+0x6c/0x98
[   48.578521]  kfree+0x214/0x3c8
[   48.581559]  rcu_uaf_reclaim+0x28/0x70
[   48.585292]  rcu_core+0x9f4/0x1e20
[   48.588677]  rcu_core_si+0x18/0x30
[   48.592064]  handle_softirqs+0x374/0xb28
[   48.595969]  __do_softirq+0x1c/0x28
[   48.599441] 
[   48.600916] Last potentially related work creation:
[   48.605779]  kasan_save_stack+0x3c/0x68
[   48.609597]  kasan_record_aux_stack+0xb4/0xc8
[   48.613937]  __call_rcu_common.constprop.0+0x74/0x8c8
[   48.618972]  call_rcu+0x18/0x30
[   48.622097]  rcu_uaf+0x14c/0x2d8
[   48.625309]  kunit_try_run_case+0x170/0x3f0
[   48.629476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.634944]  kthread+0x328/0x630
[   48.638156]  ret_from_fork+0x10/0x20
[   48.641715] 
[   48.643191] The buggy address belongs to the object at ffff000807bb5d80
[   48.643191]  which belongs to the cache kmalloc-32 of size 32
[   48.655520] The buggy address is located 0 bytes inside of
[   48.655520]  freed 32-byte region [ffff000807bb5d80, ffff000807bb5da0)
[   48.667496] 
[   48.668973] The buggy address belongs to the physical page:
[   48.674531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb5
[   48.682514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.689024] page_type: f5(slab)
[   48.692161] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   48.699880] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   48.707599] page dumped because: kasan: bad access detected
[   48.713154] 
[   48.714631] Memory state around the buggy address:
[   48.719409]  ffff000807bb5c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   48.726613]  ffff000807bb5d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   48.733819] >ffff000807bb5d80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   48.741019]                    ^
[   48.744235]  ffff000807bb5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.751439]  ffff000807bb5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.758641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   47.348264] ==================================================================
[   47.358054] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   47.364387] Read of size 1 at addr ffff0008074f9100 by task kunit_try_catch/280
[   47.371678] 
[   47.373164] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   47.373218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.373235] Hardware name: WinLink E850-96 board (DT)
[   47.373256] Call trace:
[   47.373269]  show_stack+0x20/0x38 (C)
[   47.373304]  dump_stack_lvl+0x8c/0xd0
[   47.373340]  print_report+0x118/0x5d0
[   47.373367]  kasan_report+0xdc/0x128
[   47.373392]  __kasan_check_byte+0x54/0x70
[   47.373420]  ksize+0x30/0x88
[   47.373452]  ksize_uaf+0x168/0x5f8
[   47.373481]  kunit_try_run_case+0x170/0x3f0
[   47.373518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.373551]  kthread+0x328/0x630
[   47.373582]  ret_from_fork+0x10/0x20
[   47.373614] 
[   47.438518] Allocated by task 280:
[   47.441907]  kasan_save_stack+0x3c/0x68
[   47.445722]  kasan_save_track+0x20/0x40
[   47.449542]  kasan_save_alloc_info+0x40/0x58
[   47.453795]  __kasan_kmalloc+0xd4/0xd8
[   47.457528]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.462041]  ksize_uaf+0xb8/0x5f8
[   47.465340]  kunit_try_run_case+0x170/0x3f0
[   47.469506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.474977]  kthread+0x328/0x630
[   47.478187]  ret_from_fork+0x10/0x20
[   47.481746] 
[   47.483221] Freed by task 280:
[   47.486260]  kasan_save_stack+0x3c/0x68
[   47.490079]  kasan_save_track+0x20/0x40
[   47.493900]  kasan_save_free_info+0x4c/0x78
[   47.498065]  __kasan_slab_free+0x6c/0x98
[   47.501972]  kfree+0x214/0x3c8
[   47.505010]  ksize_uaf+0x11c/0x5f8
[   47.508395]  kunit_try_run_case+0x170/0x3f0
[   47.512562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.518030]  kthread+0x328/0x630
[   47.521242]  ret_from_fork+0x10/0x20
[   47.524801] 
[   47.526278] The buggy address belongs to the object at ffff0008074f9100
[   47.526278]  which belongs to the cache kmalloc-128 of size 128
[   47.538780] The buggy address is located 0 bytes inside of
[   47.538780]  freed 128-byte region [ffff0008074f9100, ffff0008074f9180)
[   47.550842] 
[   47.552320] The buggy address belongs to the physical page:
[   47.557878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   47.565861] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.573500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.580444] page_type: f5(slab)
[   47.583581] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.591300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.599026] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.606838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.614651] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   47.622463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   47.630269] page dumped because: kasan: bad access detected
[   47.635824] 
[   47.637301] Memory state around the buggy address:
[   47.642080]  ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.649282]  ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.656488] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.663687]                    ^
[   47.666903]  ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.674109]  ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.681312] ==================================================================
[   48.024250] ==================================================================
[   48.031313] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   48.037641] Read of size 1 at addr ffff0008074f9178 by task kunit_try_catch/280
[   48.044932] 
[   48.046417] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   48.046470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.046486] Hardware name: WinLink E850-96 board (DT)
[   48.046506] Call trace:
[   48.046520]  show_stack+0x20/0x38 (C)
[   48.046555]  dump_stack_lvl+0x8c/0xd0
[   48.046588]  print_report+0x118/0x5d0
[   48.046616]  kasan_report+0xdc/0x128
[   48.046642]  __asan_report_load1_noabort+0x20/0x30
[   48.046674]  ksize_uaf+0x544/0x5f8
[   48.046708]  kunit_try_run_case+0x170/0x3f0
[   48.046743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.046776]  kthread+0x328/0x630
[   48.046805]  ret_from_fork+0x10/0x20
[   48.046839] 
[   48.109688] Allocated by task 280:
[   48.113075]  kasan_save_stack+0x3c/0x68
[   48.116893]  kasan_save_track+0x20/0x40
[   48.120712]  kasan_save_alloc_info+0x40/0x58
[   48.124966]  __kasan_kmalloc+0xd4/0xd8
[   48.128698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.133212]  ksize_uaf+0xb8/0x5f8
[   48.136512]  kunit_try_run_case+0x170/0x3f0
[   48.140677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.146146]  kthread+0x328/0x630
[   48.149357]  ret_from_fork+0x10/0x20
[   48.152916] 
[   48.154392] Freed by task 280:
[   48.157431]  kasan_save_stack+0x3c/0x68
[   48.161250]  kasan_save_track+0x20/0x40
[   48.165069]  kasan_save_free_info+0x4c/0x78
[   48.169236]  __kasan_slab_free+0x6c/0x98
[   48.173142]  kfree+0x214/0x3c8
[   48.176180]  ksize_uaf+0x11c/0x5f8
[   48.179566]  kunit_try_run_case+0x170/0x3f0
[   48.183732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.189201]  kthread+0x328/0x630
[   48.192412]  ret_from_fork+0x10/0x20
[   48.195972] 
[   48.197447] The buggy address belongs to the object at ffff0008074f9100
[   48.197447]  which belongs to the cache kmalloc-128 of size 128
[   48.209950] The buggy address is located 120 bytes inside of
[   48.209950]  freed 128-byte region [ffff0008074f9100, ffff0008074f9180)
[   48.222186] 
[   48.223664] The buggy address belongs to the physical page:
[   48.229222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   48.237204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.244844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.251786] page_type: f5(slab)
[   48.254924] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.262643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.270370] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.278181] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.285994] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   48.293807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.301613] page dumped because: kasan: bad access detected
[   48.307168] 
[   48.308643] Memory state around the buggy address:
[   48.313423]  ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.320626]  ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.327833] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.335032]                                                                 ^
[   48.342153]  ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.349359]  ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.356559] ==================================================================
[   47.688890] ==================================================================
[   47.695725] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   47.702055] Read of size 1 at addr ffff0008074f9100 by task kunit_try_catch/280
[   47.709347] 
[   47.710833] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   47.710886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.710904] Hardware name: WinLink E850-96 board (DT)
[   47.710923] Call trace:
[   47.710938]  show_stack+0x20/0x38 (C)
[   47.710973]  dump_stack_lvl+0x8c/0xd0
[   47.711007]  print_report+0x118/0x5d0
[   47.711035]  kasan_report+0xdc/0x128
[   47.711063]  __asan_report_load1_noabort+0x20/0x30
[   47.711096]  ksize_uaf+0x598/0x5f8
[   47.711125]  kunit_try_run_case+0x170/0x3f0
[   47.711159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.711192]  kthread+0x328/0x630
[   47.711222]  ret_from_fork+0x10/0x20
[   47.711257] 
[   47.774102] Allocated by task 280:
[   47.777490]  kasan_save_stack+0x3c/0x68
[   47.781307]  kasan_save_track+0x20/0x40
[   47.785127]  kasan_save_alloc_info+0x40/0x58
[   47.789380]  __kasan_kmalloc+0xd4/0xd8
[   47.793113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.797626]  ksize_uaf+0xb8/0x5f8
[   47.800925]  kunit_try_run_case+0x170/0x3f0
[   47.805092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.810562]  kthread+0x328/0x630
[   47.813772]  ret_from_fork+0x10/0x20
[   47.817331] 
[   47.818807] Freed by task 280:
[   47.821845]  kasan_save_stack+0x3c/0x68
[   47.825665]  kasan_save_track+0x20/0x40
[   47.829484]  kasan_save_free_info+0x4c/0x78
[   47.833649]  __kasan_slab_free+0x6c/0x98
[   47.837557]  kfree+0x214/0x3c8
[   47.840595]  ksize_uaf+0x11c/0x5f8
[   47.843980]  kunit_try_run_case+0x170/0x3f0
[   47.848147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.853615]  kthread+0x328/0x630
[   47.856829]  ret_from_fork+0x10/0x20
[   47.860386] 
[   47.861863] The buggy address belongs to the object at ffff0008074f9100
[   47.861863]  which belongs to the cache kmalloc-128 of size 128
[   47.874366] The buggy address is located 0 bytes inside of
[   47.874366]  freed 128-byte region [ffff0008074f9100, ffff0008074f9180)
[   47.886427] 
[   47.887906] The buggy address belongs to the physical page:
[   47.893463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   47.901445] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.909085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.916028] page_type: f5(slab)
[   47.919166] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.926885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.934611] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.942423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.950236] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   47.958048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   47.965853] page dumped because: kasan: bad access detected
[   47.971409] 
[   47.972884] Memory state around the buggy address:
[   47.977664]  ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.984867]  ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.992073] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.999273]                    ^
[   48.002488]  ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.009694]  ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.016894] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   47.046004] ==================================================================
[   47.053110] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   47.060488] Read of size 1 at addr ffff0008019add7f by task kunit_try_catch/278
[   47.067779] 
[   47.069260] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   47.069314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.069331] Hardware name: WinLink E850-96 board (DT)
[   47.069349] Call trace:
[   47.069362]  show_stack+0x20/0x38 (C)
[   47.069397]  dump_stack_lvl+0x8c/0xd0
[   47.069431]  print_report+0x118/0x5d0
[   47.069459]  kasan_report+0xdc/0x128
[   47.069485]  __asan_report_load1_noabort+0x20/0x30
[   47.069519]  ksize_unpoisons_memory+0x690/0x740
[   47.069554]  kunit_try_run_case+0x170/0x3f0
[   47.069587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.069619]  kthread+0x328/0x630
[   47.069645]  ret_from_fork+0x10/0x20
[   47.069677] 
[   47.133661] Allocated by task 278:
[   47.137048]  kasan_save_stack+0x3c/0x68
[   47.140866]  kasan_save_track+0x20/0x40
[   47.144685]  kasan_save_alloc_info+0x40/0x58
[   47.148939]  __kasan_kmalloc+0xd4/0xd8
[   47.152671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.157185]  ksize_unpoisons_memory+0xc0/0x740
[   47.161611]  kunit_try_run_case+0x170/0x3f0
[   47.165779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.171247]  kthread+0x328/0x630
[   47.174459]  ret_from_fork+0x10/0x20
[   47.178018] 
[   47.179495] The buggy address belongs to the object at ffff0008019add00
[   47.179495]  which belongs to the cache kmalloc-128 of size 128
[   47.191996] The buggy address is located 12 bytes to the right of
[   47.191996]  allocated 115-byte region [ffff0008019add00, ffff0008019add73)
[   47.205014] 
[   47.206492] The buggy address belongs to the physical page:
[   47.212051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   47.220032] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.227673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.234615] page_type: f5(slab)
[   47.237751] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.245472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.253198] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.261009] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.268822] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   47.276634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   47.284440] page dumped because: kasan: bad access detected
[   47.289995] 
[   47.291471] Memory state around the buggy address:
[   47.296252]  ffff0008019adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.303454]  ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.310659] >ffff0008019add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   47.317860]                                                                 ^
[   47.324981]  ffff0008019add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.332187]  ffff0008019ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.339389] ==================================================================
[   46.745408] ==================================================================
[   46.752508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   46.759882] Read of size 1 at addr ffff0008019add78 by task kunit_try_catch/278
[   46.767174] 
[   46.768660] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   46.768714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.768731] Hardware name: WinLink E850-96 board (DT)
[   46.768751] Call trace:
[   46.768764]  show_stack+0x20/0x38 (C)
[   46.768796]  dump_stack_lvl+0x8c/0xd0
[   46.768827]  print_report+0x118/0x5d0
[   46.768855]  kasan_report+0xdc/0x128
[   46.768882]  __asan_report_load1_noabort+0x20/0x30
[   46.768913]  ksize_unpoisons_memory+0x618/0x740
[   46.768947]  kunit_try_run_case+0x170/0x3f0
[   46.768983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.769014]  kthread+0x328/0x630
[   46.769042]  ret_from_fork+0x10/0x20
[   46.769077] 
[   46.833058] Allocated by task 278:
[   46.836443]  kasan_save_stack+0x3c/0x68
[   46.840263]  kasan_save_track+0x20/0x40
[   46.844082]  kasan_save_alloc_info+0x40/0x58
[   46.848335]  __kasan_kmalloc+0xd4/0xd8
[   46.852068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.856582]  ksize_unpoisons_memory+0xc0/0x740
[   46.861009]  kunit_try_run_case+0x170/0x3f0
[   46.865175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.870644]  kthread+0x328/0x630
[   46.873856]  ret_from_fork+0x10/0x20
[   46.877415] 
[   46.878890] The buggy address belongs to the object at ffff0008019add00
[   46.878890]  which belongs to the cache kmalloc-128 of size 128
[   46.891393] The buggy address is located 5 bytes to the right of
[   46.891393]  allocated 115-byte region [ffff0008019add00, ffff0008019add73)
[   46.904324] 
[   46.905802] The buggy address belongs to the physical page:
[   46.911358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   46.919342] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.926983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.933926] page_type: f5(slab)
[   46.937059] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   46.944782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.952508] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   46.960319] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.968132] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   46.975944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   46.983750] page dumped because: kasan: bad access detected
[   46.989305] 
[   46.990781] Memory state around the buggy address:
[   46.995562]  ffff0008019adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.002764]  ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.009969] >ffff0008019add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   47.017169]                                                                 ^
[   47.024291]  ffff0008019add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.031497]  ffff0008019ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.038697] ==================================================================
[   46.442373] ==================================================================
[   46.452166] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   46.459540] Read of size 1 at addr ffff0008019add73 by task kunit_try_catch/278
[   46.466832] 
[   46.468316] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   46.468371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.468388] Hardware name: WinLink E850-96 board (DT)
[   46.468408] Call trace:
[   46.468420]  show_stack+0x20/0x38 (C)
[   46.468455]  dump_stack_lvl+0x8c/0xd0
[   46.468488]  print_report+0x118/0x5d0
[   46.468517]  kasan_report+0xdc/0x128
[   46.468545]  __asan_report_load1_noabort+0x20/0x30
[   46.468580]  ksize_unpoisons_memory+0x628/0x740
[   46.468612]  kunit_try_run_case+0x170/0x3f0
[   46.468648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.468681]  kthread+0x328/0x630
[   46.468712]  ret_from_fork+0x10/0x20
[   46.468746] 
[   46.532715] Allocated by task 278:
[   46.536104]  kasan_save_stack+0x3c/0x68
[   46.539920]  kasan_save_track+0x20/0x40
[   46.543739]  kasan_save_alloc_info+0x40/0x58
[   46.547993]  __kasan_kmalloc+0xd4/0xd8
[   46.551727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.556239]  ksize_unpoisons_memory+0xc0/0x740
[   46.560667]  kunit_try_run_case+0x170/0x3f0
[   46.564833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.570301]  kthread+0x328/0x630
[   46.573513]  ret_from_fork+0x10/0x20
[   46.577075] 
[   46.578551] The buggy address belongs to the object at ffff0008019add00
[   46.578551]  which belongs to the cache kmalloc-128 of size 128
[   46.591051] The buggy address is located 0 bytes to the right of
[   46.591051]  allocated 115-byte region [ffff0008019add00, ffff0008019add73)
[   46.603981] 
[   46.605459] The buggy address belongs to the physical page:
[   46.611018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   46.619001] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.626641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.633584] page_type: f5(slab)
[   46.636720] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   46.644439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.652165] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   46.659977] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.667790] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   46.675602] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   46.683410] page dumped because: kasan: bad access detected
[   46.688963] 
[   46.690438] Memory state around the buggy address:
[   46.695220]  ffff0008019adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.702421]  ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.709625] >ffff0008019add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.716827]                                                              ^
[   46.723688]  ffff0008019add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.730894]  ffff0008019ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.738095] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   46.126271] ==================================================================
[   46.133245] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   46.139231] Free of addr ffff000802fe65c0 by task kunit_try_catch/276
[   46.145655] 
[   46.147139] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   46.147195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.147213] Hardware name: WinLink E850-96 board (DT)
[   46.147234] Call trace:
[   46.147247]  show_stack+0x20/0x38 (C)
[   46.147280]  dump_stack_lvl+0x8c/0xd0
[   46.147311]  print_report+0x118/0x5d0
[   46.147339]  kasan_report_invalid_free+0xc0/0xe8
[   46.147369]  check_slab_allocation+0xd4/0x108
[   46.147406]  __kasan_slab_pre_free+0x2c/0x48
[   46.147441]  kfree+0xe8/0x3c8
[   46.147473]  kfree_sensitive+0x3c/0xb0
[   46.147507]  kmalloc_double_kzfree+0x168/0x308
[   46.147540]  kunit_try_run_case+0x170/0x3f0
[   46.147576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.147609]  kthread+0x328/0x630
[   46.147638]  ret_from_fork+0x10/0x20
[   46.147675] 
[   46.222997] Allocated by task 276:
[   46.226385]  kasan_save_stack+0x3c/0x68
[   46.230202]  kasan_save_track+0x20/0x40
[   46.234023]  kasan_save_alloc_info+0x40/0x58
[   46.238275]  __kasan_kmalloc+0xd4/0xd8
[   46.242008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.246521]  kmalloc_double_kzfree+0xb8/0x308
[   46.250862]  kunit_try_run_case+0x170/0x3f0
[   46.255028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.260497]  kthread+0x328/0x630
[   46.263709]  ret_from_fork+0x10/0x20
[   46.267268] 
[   46.268743] Freed by task 276:
[   46.271783]  kasan_save_stack+0x3c/0x68
[   46.275601]  kasan_save_track+0x20/0x40
[   46.279420]  kasan_save_free_info+0x4c/0x78
[   46.283587]  __kasan_slab_free+0x6c/0x98
[   46.287494]  kfree+0x214/0x3c8
[   46.290531]  kfree_sensitive+0x80/0xb0
[   46.294264]  kmalloc_double_kzfree+0x11c/0x308
[   46.298691]  kunit_try_run_case+0x170/0x3f0
[   46.302857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.308326]  kthread+0x328/0x630
[   46.311538]  ret_from_fork+0x10/0x20
[   46.315097] 
[   46.316574] The buggy address belongs to the object at ffff000802fe65c0
[   46.316574]  which belongs to the cache kmalloc-16 of size 16
[   46.328899] The buggy address is located 0 bytes inside of
[   46.328899]  16-byte region [ffff000802fe65c0, ffff000802fe65d0)
[   46.340357] 
[   46.341835] The buggy address belongs to the physical page:
[   46.347392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fe6
[   46.355378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.361886] page_type: f5(slab)
[   46.365021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.372742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.380462] page dumped because: kasan: bad access detected
[   46.386016] 
[   46.387491] Memory state around the buggy address:
[   46.392271]  ffff000802fe6480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.399474]  ffff000802fe6500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.406679] >ffff000802fe6580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   46.413880]                                            ^
[   46.419180]  ffff000802fe6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.426383]  ffff000802fe6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.433585] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   45.810611] ==================================================================
[   45.824314] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   45.831686] Read of size 1 at addr ffff000802fe65c0 by task kunit_try_catch/276
[   45.838976] 
[   45.840462] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   45.840518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.840536] Hardware name: WinLink E850-96 board (DT)
[   45.840558] Call trace:
[   45.840572]  show_stack+0x20/0x38 (C)
[   45.840607]  dump_stack_lvl+0x8c/0xd0
[   45.840639]  print_report+0x118/0x5d0
[   45.840668]  kasan_report+0xdc/0x128
[   45.840695]  __kasan_check_byte+0x54/0x70
[   45.840722]  kfree_sensitive+0x30/0xb0
[   45.840760]  kmalloc_double_kzfree+0x168/0x308
[   45.840794]  kunit_try_run_case+0x170/0x3f0
[   45.840834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.840869]  kthread+0x328/0x630
[   45.840898]  ret_from_fork+0x10/0x20
[   45.840933] 
[   45.907726] Allocated by task 276:
[   45.911114]  kasan_save_stack+0x3c/0x68
[   45.914929]  kasan_save_track+0x20/0x40
[   45.918750]  kasan_save_alloc_info+0x40/0x58
[   45.923002]  __kasan_kmalloc+0xd4/0xd8
[   45.926735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.931248]  kmalloc_double_kzfree+0xb8/0x308
[   45.935589]  kunit_try_run_case+0x170/0x3f0
[   45.939756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.945224]  kthread+0x328/0x630
[   45.948436]  ret_from_fork+0x10/0x20
[   45.951996] 
[   45.953471] Freed by task 276:
[   45.956510]  kasan_save_stack+0x3c/0x68
[   45.960328]  kasan_save_track+0x20/0x40
[   45.964149]  kasan_save_free_info+0x4c/0x78
[   45.968314]  __kasan_slab_free+0x6c/0x98
[   45.972222]  kfree+0x214/0x3c8
[   45.975258]  kfree_sensitive+0x80/0xb0
[   45.978991]  kmalloc_double_kzfree+0x11c/0x308
[   45.983418]  kunit_try_run_case+0x170/0x3f0
[   45.987585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.993053]  kthread+0x328/0x630
[   45.996265]  ret_from_fork+0x10/0x20
[   45.999824] 
[   46.001301] The buggy address belongs to the object at ffff000802fe65c0
[   46.001301]  which belongs to the cache kmalloc-16 of size 16
[   46.013626] The buggy address is located 0 bytes inside of
[   46.013626]  freed 16-byte region [ffff000802fe65c0, ffff000802fe65d0)
[   46.025604] 
[   46.027083] The buggy address belongs to the physical page:
[   46.032640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fe6
[   46.040625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.047135] page_type: f5(slab)
[   46.050271] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.057992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.065711] page dumped because: kasan: bad access detected
[   46.071264] 
[   46.072741] Memory state around the buggy address:
[   46.077520]  ffff000802fe6480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.084722]  ffff000802fe6500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.091927] >ffff000802fe6580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   46.099129]                                            ^
[   46.104428]  ffff000802fe6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.111631]  ffff000802fe6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.118835] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   45.505679] ==================================================================
[   45.515289] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   45.521881] Read of size 1 at addr ffff000804a478a8 by task kunit_try_catch/272
[   45.529171] 
[   45.530657] CPU: 2 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   45.530714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.530731] Hardware name: WinLink E850-96 board (DT)
[   45.530753] Call trace:
[   45.530765]  show_stack+0x20/0x38 (C)
[   45.530801]  dump_stack_lvl+0x8c/0xd0
[   45.530832]  print_report+0x118/0x5d0
[   45.530860]  kasan_report+0xdc/0x128
[   45.530888]  __asan_report_load1_noabort+0x20/0x30
[   45.530922]  kmalloc_uaf2+0x3f4/0x468
[   45.530952]  kunit_try_run_case+0x170/0x3f0
[   45.530991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.531022]  kthread+0x328/0x630
[   45.531052]  ret_from_fork+0x10/0x20
[   45.531086] 
[   45.594189] Allocated by task 272:
[   45.597576]  kasan_save_stack+0x3c/0x68
[   45.601393]  kasan_save_track+0x20/0x40
[   45.605213]  kasan_save_alloc_info+0x40/0x58
[   45.609465]  __kasan_kmalloc+0xd4/0xd8
[   45.613197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.617711]  kmalloc_uaf2+0xc4/0x468
[   45.621271]  kunit_try_run_case+0x170/0x3f0
[   45.625437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.630906]  kthread+0x328/0x630
[   45.634118]  ret_from_fork+0x10/0x20
[   45.637677] 
[   45.639153] Freed by task 272:
[   45.642190]  kasan_save_stack+0x3c/0x68
[   45.646009]  kasan_save_track+0x20/0x40
[   45.649829]  kasan_save_free_info+0x4c/0x78
[   45.653996]  __kasan_slab_free+0x6c/0x98
[   45.657902]  kfree+0x214/0x3c8
[   45.660940]  kmalloc_uaf2+0x134/0x468
[   45.664586]  kunit_try_run_case+0x170/0x3f0
[   45.668753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.674221]  kthread+0x328/0x630
[   45.677433]  ret_from_fork+0x10/0x20
[   45.680992] 
[   45.682469] The buggy address belongs to the object at ffff000804a47880
[   45.682469]  which belongs to the cache kmalloc-64 of size 64
[   45.694797] The buggy address is located 40 bytes inside of
[   45.694797]  freed 64-byte region [ffff000804a47880, ffff000804a478c0)
[   45.706859] 
[   45.708337] The buggy address belongs to the physical page:
[   45.713895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a47
[   45.721879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.728390] page_type: f5(slab)
[   45.731525] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.739244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.746964] page dumped because: kasan: bad access detected
[   45.752519] 
[   45.753995] Memory state around the buggy address:
[   45.758774]  ffff000804a47780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.765977]  ffff000804a47800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.773182] >ffff000804a47880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.780382]                                   ^
[   45.784900]  ffff000804a47900: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   45.792105]  ffff000804a47980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.799307] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   45.200165] ==================================================================
[   45.209217] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   45.216331] Write of size 33 at addr ffff000807bb4c00 by task kunit_try_catch/270
[   45.223794] 
[   45.225280] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   45.225337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.225354] Hardware name: WinLink E850-96 board (DT)
[   45.225375] Call trace:
[   45.225388]  show_stack+0x20/0x38 (C)
[   45.225422]  dump_stack_lvl+0x8c/0xd0
[   45.225453]  print_report+0x118/0x5d0
[   45.225479]  kasan_report+0xdc/0x128
[   45.225503]  kasan_check_range+0x100/0x1a8
[   45.225531]  __asan_memset+0x34/0x78
[   45.225560]  kmalloc_uaf_memset+0x170/0x310
[   45.225589]  kunit_try_run_case+0x170/0x3f0
[   45.225625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.225654]  kthread+0x328/0x630
[   45.225685]  ret_from_fork+0x10/0x20
[   45.225720] 
[   45.292195] Allocated by task 270:
[   45.295583]  kasan_save_stack+0x3c/0x68
[   45.299400]  kasan_save_track+0x20/0x40
[   45.303220]  kasan_save_alloc_info+0x40/0x58
[   45.307475]  __kasan_kmalloc+0xd4/0xd8
[   45.311206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.315719]  kmalloc_uaf_memset+0xb8/0x310
[   45.319799]  kunit_try_run_case+0x170/0x3f0
[   45.323966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.329434]  kthread+0x328/0x630
[   45.332646]  ret_from_fork+0x10/0x20
[   45.336205] 
[   45.337681] Freed by task 270:
[   45.340720]  kasan_save_stack+0x3c/0x68
[   45.344539]  kasan_save_track+0x20/0x40
[   45.348358]  kasan_save_free_info+0x4c/0x78
[   45.352524]  __kasan_slab_free+0x6c/0x98
[   45.356431]  kfree+0x214/0x3c8
[   45.359469]  kmalloc_uaf_memset+0x11c/0x310
[   45.363635]  kunit_try_run_case+0x170/0x3f0
[   45.367802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.373272]  kthread+0x328/0x630
[   45.376483]  ret_from_fork+0x10/0x20
[   45.380041] 
[   45.381518] The buggy address belongs to the object at ffff000807bb4c00
[   45.381518]  which belongs to the cache kmalloc-64 of size 64
[   45.393847] The buggy address is located 0 bytes inside of
[   45.393847]  freed 64-byte region [ffff000807bb4c00, ffff000807bb4c40)
[   45.405822] 
[   45.407301] The buggy address belongs to the physical page:
[   45.412858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb4
[   45.420843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.427353] page_type: f5(slab)
[   45.430488] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.438207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.445927] page dumped because: kasan: bad access detected
[   45.451481] 
[   45.452957] Memory state around the buggy address:
[   45.457738]  ffff000807bb4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.464940]  ffff000807bb4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.472145] >ffff000807bb4c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.479346]                    ^
[   45.482561]  ffff000807bb4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.489766]  ffff000807bb4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.496968] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   44.897589] ==================================================================
[   44.907917] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   44.914424] Read of size 1 at addr ffff000804b5a0a8 by task kunit_try_catch/268
[   44.921715] 
[   44.923202] CPU: 2 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   44.923263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.923280] Hardware name: WinLink E850-96 board (DT)
[   44.923299] Call trace:
[   44.923312]  show_stack+0x20/0x38 (C)
[   44.923348]  dump_stack_lvl+0x8c/0xd0
[   44.923380]  print_report+0x118/0x5d0
[   44.923409]  kasan_report+0xdc/0x128
[   44.923436]  __asan_report_load1_noabort+0x20/0x30
[   44.923470]  kmalloc_uaf+0x300/0x338
[   44.923499]  kunit_try_run_case+0x170/0x3f0
[   44.923540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.923572]  kthread+0x328/0x630
[   44.923600]  ret_from_fork+0x10/0x20
[   44.923636] 
[   44.986646] Allocated by task 268:
[   44.990034]  kasan_save_stack+0x3c/0x68
[   44.993849]  kasan_save_track+0x20/0x40
[   44.997670]  kasan_save_alloc_info+0x40/0x58
[   45.001922]  __kasan_kmalloc+0xd4/0xd8
[   45.005655]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.010169]  kmalloc_uaf+0xb8/0x338
[   45.013641]  kunit_try_run_case+0x170/0x3f0
[   45.017807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.023276]  kthread+0x328/0x630
[   45.026488]  ret_from_fork+0x10/0x20
[   45.030047] 
[   45.031525] Freed by task 268:
[   45.034562]  kasan_save_stack+0x3c/0x68
[   45.038380]  kasan_save_track+0x20/0x40
[   45.042199]  kasan_save_free_info+0x4c/0x78
[   45.046366]  __kasan_slab_free+0x6c/0x98
[   45.050272]  kfree+0x214/0x3c8
[   45.053310]  kmalloc_uaf+0x11c/0x338
[   45.056869]  kunit_try_run_case+0x170/0x3f0
[   45.061036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.066504]  kthread+0x328/0x630
[   45.069717]  ret_from_fork+0x10/0x20
[   45.073275] 
[   45.074752] The buggy address belongs to the object at ffff000804b5a0a0
[   45.074752]  which belongs to the cache kmalloc-16 of size 16
[   45.087080] The buggy address is located 8 bytes inside of
[   45.087080]  freed 16-byte region [ffff000804b5a0a0, ffff000804b5a0b0)
[   45.099056] 
[   45.100534] The buggy address belongs to the physical page:
[   45.106092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a
[   45.114076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.120587] page_type: f5(slab)
[   45.123721] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.131441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.139162] page dumped because: kasan: bad access detected
[   45.144715] 
[   45.146192] Memory state around the buggy address:
[   45.150970]  ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.158175]  ffff000804b5a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.165378] >ffff000804b5a080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   45.172579]                                   ^
[   45.177097]  ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.184302]  ffff000804b5a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.191505] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   44.629385] ==================================================================
[   44.639865] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   44.647761] Read of size 64 at addr ffff000804a47804 by task kunit_try_catch/266
[   44.655139] 
[   44.656625] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   44.656679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.656699] Hardware name: WinLink E850-96 board (DT)
[   44.656721] Call trace:
[   44.656733]  show_stack+0x20/0x38 (C)
[   44.656766]  dump_stack_lvl+0x8c/0xd0
[   44.656797]  print_report+0x118/0x5d0
[   44.656825]  kasan_report+0xdc/0x128
[   44.656852]  kasan_check_range+0x100/0x1a8
[   44.656882]  __asan_memmove+0x3c/0x98
[   44.656913]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   44.656950]  kunit_try_run_case+0x170/0x3f0
[   44.656987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.657020]  kthread+0x328/0x630
[   44.657049]  ret_from_fork+0x10/0x20
[   44.657083] 
[   44.724497] Allocated by task 266:
[   44.727885]  kasan_save_stack+0x3c/0x68
[   44.731700]  kasan_save_track+0x20/0x40
[   44.735520]  kasan_save_alloc_info+0x40/0x58
[   44.739773]  __kasan_kmalloc+0xd4/0xd8
[   44.743506]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.748020]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   44.752969]  kunit_try_run_case+0x170/0x3f0
[   44.757134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.762603]  kthread+0x328/0x630
[   44.765815]  ret_from_fork+0x10/0x20
[   44.769375] 
[   44.770850] The buggy address belongs to the object at ffff000804a47800
[   44.770850]  which belongs to the cache kmalloc-64 of size 64
[   44.783179] The buggy address is located 4 bytes inside of
[   44.783179]  allocated 64-byte region [ffff000804a47800, ffff000804a47840)
[   44.795501] 
[   44.796980] The buggy address belongs to the physical page:
[   44.802537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a47
[   44.810521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.817032] page_type: f5(slab)
[   44.820167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.827886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.835605] page dumped because: kasan: bad access detected
[   44.841161] 
[   44.842636] Memory state around the buggy address:
[   44.847416]  ffff000804a47700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.854619]  ffff000804a47780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.861825] >ffff000804a47800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   44.869025]                                            ^
[   44.874324]  ffff000804a47880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.881528]  ffff000804a47900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.888731] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   44.363605] ==================================================================
[   44.373289] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   44.380838] Read of size 18446744073709551614 at addr ffff000807bb4b84 by task kunit_try_catch/264
[   44.389779] 
[   44.391265] CPU: 3 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   44.391319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.391335] Hardware name: WinLink E850-96 board (DT)
[   44.391354] Call trace:
[   44.391368]  show_stack+0x20/0x38 (C)
[   44.391402]  dump_stack_lvl+0x8c/0xd0
[   44.391436]  print_report+0x118/0x5d0
[   44.391463]  kasan_report+0xdc/0x128
[   44.391491]  kasan_check_range+0x100/0x1a8
[   44.391521]  __asan_memmove+0x3c/0x98
[   44.391552]  kmalloc_memmove_negative_size+0x154/0x2e0
[   44.391587]  kunit_try_run_case+0x170/0x3f0
[   44.391625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.391656]  kthread+0x328/0x630
[   44.391685]  ret_from_fork+0x10/0x20
[   44.391717] 
[   44.459224] Allocated by task 264:
[   44.462610]  kasan_save_stack+0x3c/0x68
[   44.466427]  kasan_save_track+0x20/0x40
[   44.470246]  kasan_save_alloc_info+0x40/0x58
[   44.474499]  __kasan_kmalloc+0xd4/0xd8
[   44.478232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.482746]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   44.487781]  kunit_try_run_case+0x170/0x3f0
[   44.491947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.497416]  kthread+0x328/0x630
[   44.500627]  ret_from_fork+0x10/0x20
[   44.504187] 
[   44.505664] The buggy address belongs to the object at ffff000807bb4b80
[   44.505664]  which belongs to the cache kmalloc-64 of size 64
[   44.517991] The buggy address is located 4 bytes inside of
[   44.517991]  64-byte region [ffff000807bb4b80, ffff000807bb4bc0)
[   44.529446] 
[   44.530924] The buggy address belongs to the physical page:
[   44.536482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb4
[   44.544466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.550977] page_type: f5(slab)
[   44.554112] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.561831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.569550] page dumped because: kasan: bad access detected
[   44.575106] 
[   44.576583] Memory state around the buggy address:
[   44.581362]  ffff000807bb4a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.588564]  ffff000807bb4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.595770] >ffff000807bb4b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   44.602970]                    ^
[   44.606186]  ffff000807bb4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.613390]  ffff000807bb4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.620592] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   44.056329] ==================================================================
[   44.066090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   44.073379] Write of size 16 at addr ffff0008074f9069 by task kunit_try_catch/262
[   44.080844] 
[   44.082329] CPU: 2 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   44.082384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.082398] Hardware name: WinLink E850-96 board (DT)
[   44.082417] Call trace:
[   44.082429]  show_stack+0x20/0x38 (C)
[   44.082465]  dump_stack_lvl+0x8c/0xd0
[   44.082496]  print_report+0x118/0x5d0
[   44.082524]  kasan_report+0xdc/0x128
[   44.082551]  kasan_check_range+0x100/0x1a8
[   44.082581]  __asan_memset+0x34/0x78
[   44.082613]  kmalloc_oob_memset_16+0x150/0x2f8
[   44.082645]  kunit_try_run_case+0x170/0x3f0
[   44.082680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.082711]  kthread+0x328/0x630
[   44.082738]  ret_from_fork+0x10/0x20
[   44.082774] 
[   44.149506] Allocated by task 262:
[   44.152892]  kasan_save_stack+0x3c/0x68
[   44.156709]  kasan_save_track+0x20/0x40
[   44.160529]  kasan_save_alloc_info+0x40/0x58
[   44.164782]  __kasan_kmalloc+0xd4/0xd8
[   44.168514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.173028]  kmalloc_oob_memset_16+0xb0/0x2f8
[   44.177370]  kunit_try_run_case+0x170/0x3f0
[   44.181535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.187004]  kthread+0x328/0x630
[   44.190215]  ret_from_fork+0x10/0x20
[   44.193774] 
[   44.195253] The buggy address belongs to the object at ffff0008074f9000
[   44.195253]  which belongs to the cache kmalloc-128 of size 128
[   44.207753] The buggy address is located 105 bytes inside of
[   44.207753]  allocated 120-byte region [ffff0008074f9000, ffff0008074f9078)
[   44.220337] 
[   44.221814] The buggy address belongs to the physical page:
[   44.227372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   44.235355] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.242996] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.249940] page_type: f5(slab)
[   44.253076] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.260794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.268521] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.276332] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.284145] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   44.291957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.299764] page dumped because: kasan: bad access detected
[   44.305318] 
[   44.306793] Memory state around the buggy address:
[   44.311575]  ffff0008074f8f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.318776]  ffff0008074f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.325983] >ffff0008074f9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.333182]                                                                 ^
[   44.340304]  ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.347509]  ffff0008074f9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.354711] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   43.749495] ==================================================================
[   43.759327] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   43.766527] Write of size 8 at addr ffff0008019adc71 by task kunit_try_catch/260
[   43.773903] 
[   43.775389] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   43.775444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.775461] Hardware name: WinLink E850-96 board (DT)
[   43.775482] Call trace:
[   43.775495]  show_stack+0x20/0x38 (C)
[   43.775531]  dump_stack_lvl+0x8c/0xd0
[   43.775564]  print_report+0x118/0x5d0
[   43.775591]  kasan_report+0xdc/0x128
[   43.775620]  kasan_check_range+0x100/0x1a8
[   43.775650]  __asan_memset+0x34/0x78
[   43.775680]  kmalloc_oob_memset_8+0x150/0x2f8
[   43.775712]  kunit_try_run_case+0x170/0x3f0
[   43.775752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.775783]  kthread+0x328/0x630
[   43.775813]  ret_from_fork+0x10/0x20
[   43.775847] 
[   43.842479] Allocated by task 260:
[   43.845865]  kasan_save_stack+0x3c/0x68
[   43.849682]  kasan_save_track+0x20/0x40
[   43.853502]  kasan_save_alloc_info+0x40/0x58
[   43.857755]  __kasan_kmalloc+0xd4/0xd8
[   43.861488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.866002]  kmalloc_oob_memset_8+0xb0/0x2f8
[   43.870255]  kunit_try_run_case+0x170/0x3f0
[   43.874421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.879890]  kthread+0x328/0x630
[   43.883102]  ret_from_fork+0x10/0x20
[   43.886661] 
[   43.888138] The buggy address belongs to the object at ffff0008019adc00
[   43.888138]  which belongs to the cache kmalloc-128 of size 128
[   43.900640] The buggy address is located 113 bytes inside of
[   43.900640]  allocated 120-byte region [ffff0008019adc00, ffff0008019adc78)
[   43.913223] 
[   43.914701] The buggy address belongs to the physical page:
[   43.920259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   43.928242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.935882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.942825] page_type: f5(slab)
[   43.945962] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.953681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.961407] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.969218] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.977031] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   43.984843] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   43.992651] page dumped because: kasan: bad access detected
[   43.998205] 
[   43.999680] Memory state around the buggy address:
[   44.004460]  ffff0008019adb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.011663]  ffff0008019adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.018871] >ffff0008019adc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.026069]                                                                 ^
[   44.033190]  ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.040395]  ffff0008019add00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.047598] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   43.442916] ==================================================================
[   43.452558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   43.459760] Write of size 4 at addr ffff0008074f8f75 by task kunit_try_catch/258
[   43.467136] 
[   43.468623] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   43.468678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.468694] Hardware name: WinLink E850-96 board (DT)
[   43.468715] Call trace:
[   43.468730]  show_stack+0x20/0x38 (C)
[   43.468767]  dump_stack_lvl+0x8c/0xd0
[   43.468800]  print_report+0x118/0x5d0
[   43.468828]  kasan_report+0xdc/0x128
[   43.468853]  kasan_check_range+0x100/0x1a8
[   43.468882]  __asan_memset+0x34/0x78
[   43.468910]  kmalloc_oob_memset_4+0x150/0x300
[   43.468941]  kunit_try_run_case+0x170/0x3f0
[   43.468981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.469013]  kthread+0x328/0x630
[   43.469041]  ret_from_fork+0x10/0x20
[   43.469074] 
[   43.535713] Allocated by task 258:
[   43.539099]  kasan_save_stack+0x3c/0x68
[   43.542918]  kasan_save_track+0x20/0x40
[   43.546735]  kasan_save_alloc_info+0x40/0x58
[   43.550989]  __kasan_kmalloc+0xd4/0xd8
[   43.554722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.559235]  kmalloc_oob_memset_4+0xb0/0x300
[   43.563490]  kunit_try_run_case+0x170/0x3f0
[   43.567656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.573124]  kthread+0x328/0x630
[   43.576336]  ret_from_fork+0x10/0x20
[   43.579895] 
[   43.581372] The buggy address belongs to the object at ffff0008074f8f00
[   43.581372]  which belongs to the cache kmalloc-128 of size 128
[   43.593874] The buggy address is located 117 bytes inside of
[   43.593874]  allocated 120-byte region [ffff0008074f8f00, ffff0008074f8f78)
[   43.606457] 
[   43.607935] The buggy address belongs to the physical page:
[   43.613493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   43.621476] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.629116] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.636059] page_type: f5(slab)
[   43.639196] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.646915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.654641] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.662453] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.670265] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   43.678077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   43.685884] page dumped because: kasan: bad access detected
[   43.691438] 
[   43.692913] Memory state around the buggy address:
[   43.697695]  ffff0008074f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.704896]  ffff0008074f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.712102] >ffff0008074f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.719302]                                                                 ^
[   43.726424]  ffff0008074f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.733630]  ffff0008074f9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.740831] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   43.136024] ==================================================================
[   43.145792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   43.152994] Write of size 2 at addr ffff0008074f8e77 by task kunit_try_catch/256
[   43.160370] 
[   43.161855] CPU: 2 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   43.161909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.161925] Hardware name: WinLink E850-96 board (DT)
[   43.161945] Call trace:
[   43.161957]  show_stack+0x20/0x38 (C)
[   43.161992]  dump_stack_lvl+0x8c/0xd0
[   43.162027]  print_report+0x118/0x5d0
[   43.162055]  kasan_report+0xdc/0x128
[   43.162081]  kasan_check_range+0x100/0x1a8
[   43.162110]  __asan_memset+0x34/0x78
[   43.162141]  kmalloc_oob_memset_2+0x150/0x2f8
[   43.162171]  kunit_try_run_case+0x170/0x3f0
[   43.162209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.162241]  kthread+0x328/0x630
[   43.162270]  ret_from_fork+0x10/0x20
[   43.162305] 
[   43.228947] Allocated by task 256:
[   43.232335]  kasan_save_stack+0x3c/0x68
[   43.236150]  kasan_save_track+0x20/0x40
[   43.239970]  kasan_save_alloc_info+0x40/0x58
[   43.244223]  __kasan_kmalloc+0xd4/0xd8
[   43.247956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.252469]  kmalloc_oob_memset_2+0xb0/0x2f8
[   43.256723]  kunit_try_run_case+0x170/0x3f0
[   43.260889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.266358]  kthread+0x328/0x630
[   43.269570]  ret_from_fork+0x10/0x20
[   43.273129] 
[   43.274606] The buggy address belongs to the object at ffff0008074f8e00
[   43.274606]  which belongs to the cache kmalloc-128 of size 128
[   43.287107] The buggy address is located 119 bytes inside of
[   43.287107]  allocated 120-byte region [ffff0008074f8e00, ffff0008074f8e78)
[   43.299691] 
[   43.301169] The buggy address belongs to the physical page:
[   43.306727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   43.314710] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.322350] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.329293] page_type: f5(slab)
[   43.332429] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.340148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.347876] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.355686] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.363499] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   43.371311] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   43.379118] page dumped because: kasan: bad access detected
[   43.384672] 
[   43.386149] Memory state around the buggy address:
[   43.390927]  ffff0008074f8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.398130]  ffff0008074f8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.405336] >ffff0008074f8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.412536]                                                                 ^
[   43.419658]  ffff0008074f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.426862]  ffff0008074f8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.434064] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   42.829501] ==================================================================
[   42.838677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   42.845967] Write of size 128 at addr ffff0008019adb00 by task kunit_try_catch/254
[   42.853518] 
[   42.855002] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   42.855055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.855071] Hardware name: WinLink E850-96 board (DT)
[   42.855091] Call trace:
[   42.855105]  show_stack+0x20/0x38 (C)
[   42.855142]  dump_stack_lvl+0x8c/0xd0
[   42.855175]  print_report+0x118/0x5d0
[   42.855203]  kasan_report+0xdc/0x128
[   42.855228]  kasan_check_range+0x100/0x1a8
[   42.855258]  __asan_memset+0x34/0x78
[   42.855287]  kmalloc_oob_in_memset+0x144/0x2d0
[   42.855320]  kunit_try_run_case+0x170/0x3f0
[   42.855354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.855386]  kthread+0x328/0x630
[   42.855417]  ret_from_fork+0x10/0x20
[   42.855451] 
[   42.922180] Allocated by task 254:
[   42.925568]  kasan_save_stack+0x3c/0x68
[   42.929384]  kasan_save_track+0x20/0x40
[   42.933203]  kasan_save_alloc_info+0x40/0x58
[   42.937457]  __kasan_kmalloc+0xd4/0xd8
[   42.941189]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.945703]  kmalloc_oob_in_memset+0xb0/0x2d0
[   42.950045]  kunit_try_run_case+0x170/0x3f0
[   42.954211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.959679]  kthread+0x328/0x630
[   42.962890]  ret_from_fork+0x10/0x20
[   42.966449] 
[   42.967928] The buggy address belongs to the object at ffff0008019adb00
[   42.967928]  which belongs to the cache kmalloc-128 of size 128
[   42.980428] The buggy address is located 0 bytes inside of
[   42.980428]  allocated 120-byte region [ffff0008019adb00, ffff0008019adb78)
[   42.992838] 
[   42.994317] The buggy address belongs to the physical page:
[   42.999874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac
[   43.007857] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.015498] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.022439] page_type: f5(slab)
[   43.025576] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.033295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.041022] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   43.048833] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.056646] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff
[   43.064458] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   43.072265] page dumped because: kasan: bad access detected
[   43.077819] 
[   43.079296] Memory state around the buggy address:
[   43.084076]  ffff0008019ada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.091277]  ffff0008019ada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.098482] >ffff0008019adb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.105683]                                                                 ^
[   43.112805]  ffff0008019adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.120011]  ffff0008019adc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.127212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   42.527865] ==================================================================
[   42.537122] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   42.543888] Read of size 16 at addr ffff000804b5a080 by task kunit_try_catch/252
[   42.551265] 
[   42.552750] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   42.552801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.552819] Hardware name: WinLink E850-96 board (DT)
[   42.552839] Call trace:
[   42.552854]  show_stack+0x20/0x38 (C)
[   42.552887]  dump_stack_lvl+0x8c/0xd0
[   42.552919]  print_report+0x118/0x5d0
[   42.552946]  kasan_report+0xdc/0x128
[   42.552973]  __asan_report_load16_noabort+0x20/0x30
[   42.553007]  kmalloc_uaf_16+0x3bc/0x438
[   42.553036]  kunit_try_run_case+0x170/0x3f0
[   42.553073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.553105]  kthread+0x328/0x630
[   42.553135]  ret_from_fork+0x10/0x20
[   42.553168] 
[   42.616542] Allocated by task 252:
[   42.619930]  kasan_save_stack+0x3c/0x68
[   42.623746]  kasan_save_track+0x20/0x40
[   42.627565]  kasan_save_alloc_info+0x40/0x58
[   42.631818]  __kasan_kmalloc+0xd4/0xd8
[   42.635552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.640065]  kmalloc_uaf_16+0x140/0x438
[   42.643884]  kunit_try_run_case+0x170/0x3f0
[   42.648051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.653521]  kthread+0x328/0x630
[   42.656731]  ret_from_fork+0x10/0x20
[   42.660291] 
[   42.661766] Freed by task 252:
[   42.664805]  kasan_save_stack+0x3c/0x68
[   42.668624]  kasan_save_track+0x20/0x40
[   42.672445]  kasan_save_free_info+0x4c/0x78
[   42.676610]  __kasan_slab_free+0x6c/0x98
[   42.680516]  kfree+0x214/0x3c8
[   42.683554]  kmalloc_uaf_16+0x190/0x438
[   42.687374]  kunit_try_run_case+0x170/0x3f0
[   42.691540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.697009]  kthread+0x328/0x630
[   42.700221]  ret_from_fork+0x10/0x20
[   42.703779] 
[   42.705255] The buggy address belongs to the object at ffff000804b5a080
[   42.705255]  which belongs to the cache kmalloc-16 of size 16
[   42.717585] The buggy address is located 0 bytes inside of
[   42.717585]  freed 16-byte region [ffff000804b5a080, ffff000804b5a090)
[   42.729560] 
[   42.731038] The buggy address belongs to the physical page:
[   42.736596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a
[   42.744581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.751091] page_type: f5(slab)
[   42.754226] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.761945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.769666] page dumped because: kasan: bad access detected
[   42.775219] 
[   42.776695] Memory state around the buggy address:
[   42.781477]  ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   42.788679]  ffff000804b5a000: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   42.795883] >ffff000804b5a080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.803084]                    ^
[   42.806299]  ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.813504]  ffff000804b5a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.820706] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   42.267203] ==================================================================
[   42.276359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   42.283041] Write of size 16 at addr ffff0008079d3ec0 by task kunit_try_catch/250
[   42.290506] 
[   42.291990] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   42.292045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.292061] Hardware name: WinLink E850-96 board (DT)
[   42.292081] Call trace:
[   42.292094]  show_stack+0x20/0x38 (C)
[   42.292130]  dump_stack_lvl+0x8c/0xd0
[   42.292164]  print_report+0x118/0x5d0
[   42.292193]  kasan_report+0xdc/0x128
[   42.292224]  __asan_report_store16_noabort+0x20/0x30
[   42.292259]  kmalloc_oob_16+0x3a0/0x3f8
[   42.292288]  kunit_try_run_case+0x170/0x3f0
[   42.292324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.292361]  kthread+0x328/0x630
[   42.292390]  ret_from_fork+0x10/0x20
[   42.292424] 
[   42.355869] Allocated by task 250:
[   42.359258]  kasan_save_stack+0x3c/0x68
[   42.363073]  kasan_save_track+0x20/0x40
[   42.366892]  kasan_save_alloc_info+0x40/0x58
[   42.371146]  __kasan_kmalloc+0xd4/0xd8
[   42.374878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.379392]  kmalloc_oob_16+0xb4/0x3f8
[   42.383125]  kunit_try_run_case+0x170/0x3f0
[   42.387291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.392760]  kthread+0x328/0x630
[   42.395972]  ret_from_fork+0x10/0x20
[   42.399530] 
[   42.401008] The buggy address belongs to the object at ffff0008079d3ec0
[   42.401008]  which belongs to the cache kmalloc-16 of size 16
[   42.413336] The buggy address is located 0 bytes inside of
[   42.413336]  allocated 13-byte region [ffff0008079d3ec0, ffff0008079d3ecd)
[   42.425659] 
[   42.427137] The buggy address belongs to the physical page:
[   42.432694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8879d3
[   42.440679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.447189] page_type: f5(slab)
[   42.450325] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.458043] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.465762] page dumped because: kasan: bad access detected
[   42.471318] 
[   42.472795] Memory state around the buggy address:
[   42.477573]  ffff0008079d3d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.484777]  ffff0008079d3e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   42.491981] >ffff0008079d3e80: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   42.499182]                                               ^
[   42.504741]  ffff0008079d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.511946]  ffff0008079d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.519148] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   41.586779] ==================================================================
[   41.596682] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   41.603275] Read of size 1 at addr ffff0008042d2400 by task kunit_try_catch/248
[   41.610567] 
[   41.612051] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   41.612100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.612116] Hardware name: WinLink E850-96 board (DT)
[   41.612135] Call trace:
[   41.612148]  show_stack+0x20/0x38 (C)
[   41.612184]  dump_stack_lvl+0x8c/0xd0
[   41.612217]  print_report+0x118/0x5d0
[   41.612242]  kasan_report+0xdc/0x128
[   41.612271]  __kasan_check_byte+0x54/0x70
[   41.612297]  krealloc_noprof+0x44/0x360
[   41.612335]  krealloc_uaf+0x180/0x520
[   41.612365]  kunit_try_run_case+0x170/0x3f0
[   41.612401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.612434]  kthread+0x328/0x630
[   41.612464]  ret_from_fork+0x10/0x20
[   41.612497] 
[   41.678623] Allocated by task 248:
[   41.682009]  kasan_save_stack+0x3c/0x68
[   41.685826]  kasan_save_track+0x20/0x40
[   41.689646]  kasan_save_alloc_info+0x40/0x58
[   41.693899]  __kasan_kmalloc+0xd4/0xd8
[   41.697631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.702145]  krealloc_uaf+0xc8/0x520
[   41.705704]  kunit_try_run_case+0x170/0x3f0
[   41.709871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.715339]  kthread+0x328/0x630
[   41.718552]  ret_from_fork+0x10/0x20
[   41.722110] 
[   41.723587] Freed by task 248:
[   41.726624]  kasan_save_stack+0x3c/0x68
[   41.730443]  kasan_save_track+0x20/0x40
[   41.734263]  kasan_save_free_info+0x4c/0x78
[   41.738430]  __kasan_slab_free+0x6c/0x98
[   41.742337]  kfree+0x214/0x3c8
[   41.745374]  krealloc_uaf+0x12c/0x520
[   41.749020]  kunit_try_run_case+0x170/0x3f0
[   41.753186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.758655]  kthread+0x328/0x630
[   41.761867]  ret_from_fork+0x10/0x20
[   41.765426] 
[   41.766903] The buggy address belongs to the object at ffff0008042d2400
[   41.766903]  which belongs to the cache kmalloc-256 of size 256
[   41.779404] The buggy address is located 0 bytes inside of
[   41.779404]  freed 256-byte region [ffff0008042d2400, ffff0008042d2500)
[   41.791467] 
[   41.792945] The buggy address belongs to the physical page:
[   41.798503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8842d0
[   41.806486] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.814126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.821070] page_type: f5(slab)
[   41.824205] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   41.831924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.839651] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   41.847462] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.855275] head: 0bfffe0000000002 fffffdffe010b401 00000000ffffffff 00000000ffffffff
[   41.863087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.870893] page dumped because: kasan: bad access detected
[   41.876448] 
[   41.877925] Memory state around the buggy address:
[   41.882705]  ffff0008042d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.889907]  ffff0008042d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.897111] >ffff0008042d2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.904313]                    ^
[   41.907528]  ffff0008042d2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.914732]  ffff0008042d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.921935] ==================================================================
[   41.929346] ==================================================================
[   41.936348] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   41.942941] Read of size 1 at addr ffff0008042d2400 by task kunit_try_catch/248
[   41.950232] 
[   41.951717] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   41.951768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.951782] Hardware name: WinLink E850-96 board (DT)
[   41.951801] Call trace:
[   41.951814]  show_stack+0x20/0x38 (C)
[   41.951849]  dump_stack_lvl+0x8c/0xd0
[   41.951881]  print_report+0x118/0x5d0
[   41.951908]  kasan_report+0xdc/0x128
[   41.951933]  __asan_report_load1_noabort+0x20/0x30
[   41.951968]  krealloc_uaf+0x4c8/0x520
[   41.951998]  kunit_try_run_case+0x170/0x3f0
[   41.952034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.952065]  kthread+0x328/0x630
[   41.952093]  ret_from_fork+0x10/0x20
[   41.952125] 
[   42.015248] Allocated by task 248:
[   42.018634]  kasan_save_stack+0x3c/0x68
[   42.022453]  kasan_save_track+0x20/0x40
[   42.026273]  kasan_save_alloc_info+0x40/0x58
[   42.030526]  __kasan_kmalloc+0xd4/0xd8
[   42.034258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.038772]  krealloc_uaf+0xc8/0x520
[   42.042331]  kunit_try_run_case+0x170/0x3f0
[   42.046498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.051966]  kthread+0x328/0x630
[   42.055178]  ret_from_fork+0x10/0x20
[   42.058737] 
[   42.060213] Freed by task 248:
[   42.063251]  kasan_save_stack+0x3c/0x68
[   42.067070]  kasan_save_track+0x20/0x40
[   42.070890]  kasan_save_free_info+0x4c/0x78
[   42.075056]  __kasan_slab_free+0x6c/0x98
[   42.078963]  kfree+0x214/0x3c8
[   42.082001]  krealloc_uaf+0x12c/0x520
[   42.085647]  kunit_try_run_case+0x170/0x3f0
[   42.089813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.095282]  kthread+0x328/0x630
[   42.098494]  ret_from_fork+0x10/0x20
[   42.102053] 
[   42.103529] The buggy address belongs to the object at ffff0008042d2400
[   42.103529]  which belongs to the cache kmalloc-256 of size 256
[   42.116031] The buggy address is located 0 bytes inside of
[   42.116031]  freed 256-byte region [ffff0008042d2400, ffff0008042d2500)
[   42.128094] 
[   42.129572] The buggy address belongs to the physical page:
[   42.135127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8842d0
[   42.143113] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.150753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.157695] page_type: f5(slab)
[   42.160830] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   42.168551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.176278] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   42.184089] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.191902] head: 0bfffe0000000002 fffffdffe010b401 00000000ffffffff 00000000ffffffff
[   42.199714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.207519] page dumped because: kasan: bad access detected
[   42.213075] 
[   42.214551] Memory state around the buggy address:
[   42.219330]  ffff0008042d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.226533]  ffff0008042d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.233738] >ffff0008042d2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.240939]                    ^
[   42.244155]  ffff0008042d2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.251359]  ffff0008042d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.258561] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   40.888234] ==================================================================
[   40.895219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   40.902767] Write of size 1 at addr ffff000806cce0da by task kunit_try_catch/246
[   40.910143] 
[   40.911628] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   40.911682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.911697] Hardware name: WinLink E850-96 board (DT)
[   40.911715] Call trace:
[   40.911728]  show_stack+0x20/0x38 (C)
[   40.911760]  dump_stack_lvl+0x8c/0xd0
[   40.911795]  print_report+0x118/0x5d0
[   40.911821]  kasan_report+0xdc/0x128
[   40.911848]  __asan_report_store1_noabort+0x20/0x30
[   40.911883]  krealloc_less_oob_helper+0xa80/0xc50
[   40.911917]  krealloc_large_less_oob+0x20/0x38
[   40.911949]  kunit_try_run_case+0x170/0x3f0
[   40.911987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.912019]  kthread+0x328/0x630
[   40.912047]  ret_from_fork+0x10/0x20
[   40.912081] 
[   40.980717] The buggy address belongs to the physical page:
[   40.986275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc
[   40.994257] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.001898] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.008840] page_type: f8(unknown)
[   41.012236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.019957] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.027684] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.035495] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.043308] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff
[   41.051120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.058926] page dumped because: kasan: bad access detected
[   41.064481] 
[   41.065957] Memory state around the buggy address:
[   41.070738]  ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.077939]  ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.085144] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   41.092345]                                                     ^
[   41.098425]  ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.105630]  ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.112833] ==================================================================
[   41.352722] ==================================================================
[   41.359794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   41.367342] Write of size 1 at addr ffff000806cce0eb by task kunit_try_catch/246
[   41.374719] 
[   41.376205] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   41.376252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.376267] Hardware name: WinLink E850-96 board (DT)
[   41.376283] Call trace:
[   41.376296]  show_stack+0x20/0x38 (C)
[   41.376328]  dump_stack_lvl+0x8c/0xd0
[   41.376360]  print_report+0x118/0x5d0
[   41.376388]  kasan_report+0xdc/0x128
[   41.376415]  __asan_report_store1_noabort+0x20/0x30
[   41.376449]  krealloc_less_oob_helper+0xa58/0xc50
[   41.376483]  krealloc_large_less_oob+0x20/0x38
[   41.376515]  kunit_try_run_case+0x170/0x3f0
[   41.376552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.376586]  kthread+0x328/0x630
[   41.376614]  ret_from_fork+0x10/0x20
[   41.376647] 
[   41.445293] The buggy address belongs to the physical page:
[   41.450850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc
[   41.458833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.466473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.473416] page_type: f8(unknown)
[   41.476813] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.484533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.492260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.500071] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.507884] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff
[   41.515696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.523502] page dumped because: kasan: bad access detected
[   41.529057] 
[   41.530533] Memory state around the buggy address:
[   41.535313]  ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.542516]  ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.549720] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   41.556922]                                                           ^
[   41.563522]  ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.570727]  ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.577928] ==================================================================
[   40.656358] ==================================================================
[   40.663447] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   40.670998] Write of size 1 at addr ffff000806cce0d0 by task kunit_try_catch/246
[   40.678376] 
[   40.679864] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   40.679915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.679931] Hardware name: WinLink E850-96 board (DT)
[   40.679949] Call trace:
[   40.679961]  show_stack+0x20/0x38 (C)
[   40.679995]  dump_stack_lvl+0x8c/0xd0
[   40.680026]  print_report+0x118/0x5d0
[   40.680054]  kasan_report+0xdc/0x128
[   40.680083]  __asan_report_store1_noabort+0x20/0x30
[   40.680115]  krealloc_less_oob_helper+0xb9c/0xc50
[   40.680148]  krealloc_large_less_oob+0x20/0x38
[   40.680180]  kunit_try_run_case+0x170/0x3f0
[   40.680216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.680250]  kthread+0x328/0x630
[   40.680278]  ret_from_fork+0x10/0x20
[   40.680311] 
[   40.748950] The buggy address belongs to the physical page:
[   40.754506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc
[   40.762490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.770130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.777073] page_type: f8(unknown)
[   40.780469] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.788190] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.795916] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.803728] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.811541] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff
[   40.819353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.827158] page dumped because: kasan: bad access detected
[   40.832714] 
[   40.834189] Memory state around the buggy address:
[   40.838969]  ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.846172]  ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.853377] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   40.860578]                                                  ^
[   40.866397]  ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.873601]  ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.880803] ==================================================================
[   40.422036] ==================================================================
[   40.431941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   40.439491] Write of size 1 at addr ffff000806cce0c9 by task kunit_try_catch/246
[   40.446869] 
[   40.448354] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   40.448407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.448424] Hardware name: WinLink E850-96 board (DT)
[   40.448443] Call trace:
[   40.448455]  show_stack+0x20/0x38 (C)
[   40.448489]  dump_stack_lvl+0x8c/0xd0
[   40.448524]  print_report+0x118/0x5d0
[   40.448554]  kasan_report+0xdc/0x128
[   40.448581]  __asan_report_store1_noabort+0x20/0x30
[   40.448615]  krealloc_less_oob_helper+0xa48/0xc50
[   40.448648]  krealloc_large_less_oob+0x20/0x38
[   40.448681]  kunit_try_run_case+0x170/0x3f0
[   40.448719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.448753]  kthread+0x328/0x630
[   40.448783]  ret_from_fork+0x10/0x20
[   40.448816] 
[   40.517443] The buggy address belongs to the physical page:
[   40.522999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc
[   40.530984] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.538623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.545567] page_type: f8(unknown)
[   40.548962] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.556683] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.564409] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.572220] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.580034] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff
[   40.587846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.595651] page dumped because: kasan: bad access detected
[   40.601207] 
[   40.602682] Memory state around the buggy address:
[   40.607463]  ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.614665]  ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.621872] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   40.629071]                                               ^
[   40.634630]  ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.641835]  ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.649038] ==================================================================
[   41.120364] ==================================================================
[   41.127246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   41.134793] Write of size 1 at addr ffff000806cce0ea by task kunit_try_catch/246
[   41.142171] 
[   41.143656] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   41.143705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.143721] Hardware name: WinLink E850-96 board (DT)
[   41.143739] Call trace:
[   41.143752]  show_stack+0x20/0x38 (C)
[   41.143785]  dump_stack_lvl+0x8c/0xd0
[   41.143817]  print_report+0x118/0x5d0
[   41.143844]  kasan_report+0xdc/0x128
[   41.143871]  __asan_report_store1_noabort+0x20/0x30
[   41.143904]  krealloc_less_oob_helper+0xae4/0xc50
[   41.143937]  krealloc_large_less_oob+0x20/0x38
[   41.143971]  kunit_try_run_case+0x170/0x3f0
[   41.144007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.144037]  kthread+0x328/0x630
[   41.144065]  ret_from_fork+0x10/0x20
[   41.144097] 
[   41.212745] The buggy address belongs to the physical page:
[   41.218301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc
[   41.226285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.233926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.240867] page_type: f8(unknown)
[   41.244264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.251985] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.259711] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.267523] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.275336] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff
[   41.283148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.290954] page dumped because: kasan: bad access detected
[   41.296509] 
[   41.297984] Memory state around the buggy address:
[   41.302766]  ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.309967]  ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.317172] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   41.324373]                                                           ^
[   41.330974]  ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.338178]  ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.345380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   39.403911] ==================================================================
[   39.410780] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   39.418326] Write of size 1 at addr ffff000804a77ef0 by task kunit_try_catch/240
[   39.425704] 
[   39.427189] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.427241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.427257] Hardware name: WinLink E850-96 board (DT)
[   39.427276] Call trace:
[   39.427289]  show_stack+0x20/0x38 (C)
[   39.427323]  dump_stack_lvl+0x8c/0xd0
[   39.427355]  print_report+0x118/0x5d0
[   39.427386]  kasan_report+0xdc/0x128
[   39.427413]  __asan_report_store1_noabort+0x20/0x30
[   39.427447]  krealloc_more_oob_helper+0x5c0/0x678
[   39.427483]  krealloc_more_oob+0x20/0x38
[   39.427514]  kunit_try_run_case+0x170/0x3f0
[   39.427549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.427581]  kthread+0x328/0x630
[   39.427611]  ret_from_fork+0x10/0x20
[   39.427645] 
[   39.495755] Allocated by task 240:
[   39.499143]  kasan_save_stack+0x3c/0x68
[   39.502959]  kasan_save_track+0x20/0x40
[   39.506779]  kasan_save_alloc_info+0x40/0x58
[   39.511033]  __kasan_krealloc+0x118/0x178
[   39.515025]  krealloc_noprof+0x128/0x360
[   39.518932]  krealloc_more_oob_helper+0x168/0x678
[   39.523619]  krealloc_more_oob+0x20/0x38
[   39.527525]  kunit_try_run_case+0x170/0x3f0
[   39.531691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.537160]  kthread+0x328/0x630
[   39.540372]  ret_from_fork+0x10/0x20
[   39.543931] 
[   39.545408] The buggy address belongs to the object at ffff000804a77e00
[   39.545408]  which belongs to the cache kmalloc-256 of size 256
[   39.557910] The buggy address is located 5 bytes to the right of
[   39.557910]  allocated 235-byte region [ffff000804a77e00, ffff000804a77eeb)
[   39.570841] 
[   39.572319] The buggy address belongs to the physical page:
[   39.577876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a74
[   39.585858] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.593500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.600441] page_type: f5(slab)
[   39.603577] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.611298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.619024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.626836] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.634649] head: 0bfffe0000000002 fffffdffe0129d01 00000000ffffffff 00000000ffffffff
[   39.642461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.650266] page dumped because: kasan: bad access detected
[   39.655822] 
[   39.657297] Memory state around the buggy address:
[   39.662077]  ffff000804a77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.669282]  ffff000804a77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.676485] >ffff000804a77e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.683686]                                                              ^
[   39.690547]  ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.697752]  ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.704953] ==================================================================
[   39.952469] ==================================================================
[   39.962247] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.969793] Write of size 1 at addr ffff000804a7a0eb by task kunit_try_catch/244
[   39.977173] 
[   39.978657] CPU: 3 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.978713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.978730] Hardware name: WinLink E850-96 board (DT)
[   39.978752] Call trace:
[   39.978764]  show_stack+0x20/0x38 (C)
[   39.978800]  dump_stack_lvl+0x8c/0xd0
[   39.978834]  print_report+0x118/0x5d0
[   39.978865]  kasan_report+0xdc/0x128
[   39.978893]  __asan_report_store1_noabort+0x20/0x30
[   39.978929]  krealloc_more_oob_helper+0x60c/0x678
[   39.978962]  krealloc_large_more_oob+0x20/0x38
[   39.978994]  kunit_try_run_case+0x170/0x3f0
[   39.979034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.979064]  kthread+0x328/0x630
[   39.979093]  ret_from_fork+0x10/0x20
[   39.979126] 
[   40.047746] The buggy address belongs to the physical page:
[   40.053304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78
[   40.061286] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.068926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.075869] page_type: f8(unknown)
[   40.079266] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.086985] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.094711] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.102523] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.110336] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff
[   40.118148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.125955] page dumped because: kasan: bad access detected
[   40.131509] 
[   40.132986] Memory state around the buggy address:
[   40.137765]  ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.144967]  ffff000804a7a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.152174] >ffff000804a7a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   40.159373]                                                           ^
[   40.165974]  ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.173179]  ffff000804a7a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.180381] ==================================================================
[   40.187900] ==================================================================
[   40.194795] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   40.202342] Write of size 1 at addr ffff000804a7a0f0 by task kunit_try_catch/244
[   40.209720] 
[   40.211205] CPU: 3 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   40.211257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.211275] Hardware name: WinLink E850-96 board (DT)
[   40.211292] Call trace:
[   40.211305]  show_stack+0x20/0x38 (C)
[   40.211340]  dump_stack_lvl+0x8c/0xd0
[   40.211373]  print_report+0x118/0x5d0
[   40.211401]  kasan_report+0xdc/0x128
[   40.211432]  __asan_report_store1_noabort+0x20/0x30
[   40.211465]  krealloc_more_oob_helper+0x5c0/0x678
[   40.211498]  krealloc_large_more_oob+0x20/0x38
[   40.211530]  kunit_try_run_case+0x170/0x3f0
[   40.211568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.211599]  kthread+0x328/0x630
[   40.211628]  ret_from_fork+0x10/0x20
[   40.211661] 
[   40.280294] The buggy address belongs to the physical page:
[   40.285851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78
[   40.293835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.301473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.308416] page_type: f8(unknown)
[   40.311814] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.319533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.327260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.335072] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.342885] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff
[   40.350697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.358502] page dumped because: kasan: bad access detected
[   40.364058] 
[   40.365533] Memory state around the buggy address:
[   40.370312]  ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.377516]  ffff000804a7a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.384722] >ffff000804a7a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   40.391922]                                                              ^
[   40.398783]  ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.405988]  ffff000804a7a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.413189] ==================================================================
[   39.093302] ==================================================================
[   39.102453] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.109997] Write of size 1 at addr ffff000804a77eeb by task kunit_try_catch/240
[   39.117375] 
[   39.118861] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.118918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.118935] Hardware name: WinLink E850-96 board (DT)
[   39.118958] Call trace:
[   39.118973]  show_stack+0x20/0x38 (C)
[   39.119008]  dump_stack_lvl+0x8c/0xd0
[   39.119044]  print_report+0x118/0x5d0
[   39.119075]  kasan_report+0xdc/0x128
[   39.119102]  __asan_report_store1_noabort+0x20/0x30
[   39.119137]  krealloc_more_oob_helper+0x60c/0x678
[   39.119171]  krealloc_more_oob+0x20/0x38
[   39.119200]  kunit_try_run_case+0x170/0x3f0
[   39.119236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.119267]  kthread+0x328/0x630
[   39.119294]  ret_from_fork+0x10/0x20
[   39.119329] 
[   39.187428] Allocated by task 240:
[   39.190815]  kasan_save_stack+0x3c/0x68
[   39.194631]  kasan_save_track+0x20/0x40
[   39.198452]  kasan_save_alloc_info+0x40/0x58
[   39.202704]  __kasan_krealloc+0x118/0x178
[   39.206696]  krealloc_noprof+0x128/0x360
[   39.210603]  krealloc_more_oob_helper+0x168/0x678
[   39.215290]  krealloc_more_oob+0x20/0x38
[   39.219197]  kunit_try_run_case+0x170/0x3f0
[   39.223363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.228832]  kthread+0x328/0x630
[   39.232043]  ret_from_fork+0x10/0x20
[   39.235602] 
[   39.237080] The buggy address belongs to the object at ffff000804a77e00
[   39.237080]  which belongs to the cache kmalloc-256 of size 256
[   39.249581] The buggy address is located 0 bytes to the right of
[   39.249581]  allocated 235-byte region [ffff000804a77e00, ffff000804a77eeb)
[   39.262512] 
[   39.263990] The buggy address belongs to the physical page:
[   39.269548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a74
[   39.277531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.285171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.292114] page_type: f5(slab)
[   39.295249] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.302969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.310696] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.318507] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.326320] head: 0bfffe0000000002 fffffdffe0129d01 00000000ffffffff 00000000ffffffff
[   39.334132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.341939] page dumped because: kasan: bad access detected
[   39.347493] 
[   39.348970] Memory state around the buggy address:
[   39.353749]  ffff000804a77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.360953]  ffff000804a77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.368156] >ffff000804a77e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.375357]                                                           ^
[   39.381958]  ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.389163]  ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.396364] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   38.901456] ==================================================================
[   38.915907] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   38.922239] Read of size 1 at addr ffff000808600000 by task kunit_try_catch/238
[   38.929532] 
[   38.931016] CPU: 2 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   38.931069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.931085] Hardware name: WinLink E850-96 board (DT)
[   38.931106] Call trace:
[   38.931122]  show_stack+0x20/0x38 (C)
[   38.931156]  dump_stack_lvl+0x8c/0xd0
[   38.931191]  print_report+0x118/0x5d0
[   38.931221]  kasan_report+0xdc/0x128
[   38.931246]  __asan_report_load1_noabort+0x20/0x30
[   38.931278]  page_alloc_uaf+0x328/0x350
[   38.931311]  kunit_try_run_case+0x170/0x3f0
[   38.931352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.931384]  kthread+0x328/0x630
[   38.931416]  ret_from_fork+0x10/0x20
[   38.931448] 
[   38.994724] The buggy address belongs to the physical page:
[   39.000281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888600
[   39.008264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.014775] page_type: f0(buddy)
[   39.017997] raw: 0bfffe0000000000 ffff00087f61bea8 ffff00087f61bea8 0000000000000000
[   39.025716] raw: 0000000000000000 0000000000000009 00000000f0000000 0000000000000000
[   39.033437] page dumped because: kasan: bad access detected
[   39.038991] 
[   39.040466] Memory state around the buggy address:
[   39.045246]  ffff0008085fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.052449]  ffff0008085fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.059655] >ffff000808600000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.066855]                    ^
[   39.070070]  ffff000808600080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.077275]  ffff000808600100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.084478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   38.664971] ==================================================================
[   38.674414] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   38.679797] Free of addr ffff000804a78001 by task kunit_try_catch/234
[   38.686220] 
[   38.687704] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   38.687762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.687780] Hardware name: WinLink E850-96 board (DT)
[   38.687801] Call trace:
[   38.687813]  show_stack+0x20/0x38 (C)
[   38.687848]  dump_stack_lvl+0x8c/0xd0
[   38.687878]  print_report+0x118/0x5d0
[   38.687907]  kasan_report_invalid_free+0xc0/0xe8
[   38.687939]  __kasan_kfree_large+0x5c/0xa8
[   38.687980]  free_large_kmalloc+0x68/0x150
[   38.688014]  kfree+0x270/0x3c8
[   38.688042]  kmalloc_large_invalid_free+0x108/0x270
[   38.688078]  kunit_try_run_case+0x170/0x3f0
[   38.688114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.688148]  kthread+0x328/0x630
[   38.688179]  ret_from_fork+0x10/0x20
[   38.688211] 
[   38.759917] The buggy address belongs to the physical page:
[   38.765476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78
[   38.773457] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.781097] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.788041] page_type: f8(unknown)
[   38.791438] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.799157] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.806883] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.814695] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.822508] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff
[   38.830320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.838127] page dumped because: kasan: bad access detected
[   38.843681] 
[   38.845157] Memory state around the buggy address:
[   38.849937]  ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.857140]  ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.864345] >ffff000804a78000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.871545]                    ^
[   38.874762]  ffff000804a78080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.881965]  ffff000804a78100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.889168] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   38.480358] ==================================================================
[   38.490393] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   38.496987] Read of size 1 at addr ffff000806cc8000 by task kunit_try_catch/232
[   38.504277] 
[   38.505762] CPU: 2 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   38.505813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.505830] Hardware name: WinLink E850-96 board (DT)
[   38.505851] Call trace:
[   38.505867]  show_stack+0x20/0x38 (C)
[   38.505902]  dump_stack_lvl+0x8c/0xd0
[   38.505935]  print_report+0x118/0x5d0
[   38.505962]  kasan_report+0xdc/0x128
[   38.505989]  __asan_report_load1_noabort+0x20/0x30
[   38.506022]  kmalloc_large_uaf+0x2cc/0x2f8
[   38.506052]  kunit_try_run_case+0x170/0x3f0
[   38.506090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.506124]  kthread+0x328/0x630
[   38.506153]  ret_from_fork+0x10/0x20
[   38.506188] 
[   38.569729] The buggy address belongs to the physical page:
[   38.575287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886cc8
[   38.583272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.589793] raw: 0bfffe0000000000 fffffdffe01b3308 ffff00085af67fc0 0000000000000000
[   38.597511] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   38.605230] page dumped because: kasan: bad access detected
[   38.610785] 
[   38.612262] Memory state around the buggy address:
[   38.617041]  ffff000806cc7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.624244]  ffff000806cc7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.631450] >ffff000806cc8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.638650]                    ^
[   38.641865]  ffff000806cc8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.649070]  ffff000806cc8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.656272] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   38.251501] ==================================================================
[   38.261316] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   38.268777] Write of size 1 at addr ffff000804a7a00a by task kunit_try_catch/230
[   38.276155] 
[   38.277641] CPU: 3 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   38.277694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.277710] Hardware name: WinLink E850-96 board (DT)
[   38.277731] Call trace:
[   38.277743]  show_stack+0x20/0x38 (C)
[   38.277781]  dump_stack_lvl+0x8c/0xd0
[   38.277813]  print_report+0x118/0x5d0
[   38.277840]  kasan_report+0xdc/0x128
[   38.277868]  __asan_report_store1_noabort+0x20/0x30
[   38.277900]  kmalloc_large_oob_right+0x278/0x2b8
[   38.277932]  kunit_try_run_case+0x170/0x3f0
[   38.277968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.278002]  kthread+0x328/0x630
[   38.278034]  ret_from_fork+0x10/0x20
[   38.278068] 
[   38.342216] The buggy address belongs to the physical page:
[   38.347773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78
[   38.355755] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.363396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.370339] page_type: f8(unknown)
[   38.373734] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.381455] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.389181] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.396993] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.404806] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff
[   38.412618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.420423] page dumped because: kasan: bad access detected
[   38.425979] 
[   38.427456] Memory state around the buggy address:
[   38.432235]  ffff000804a79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.439438]  ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.446644] >ffff000804a7a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.453844]                       ^
[   38.457319]  ffff000804a7a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.464524]  ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.471726] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   37.949707] ==================================================================
[   37.960547] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   37.967826] Write of size 1 at addr ffff000807751f00 by task kunit_try_catch/228
[   37.975205] 
[   37.976692] CPU: 2 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   37.976750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.976767] Hardware name: WinLink E850-96 board (DT)
[   37.976788] Call trace:
[   37.976801]  show_stack+0x20/0x38 (C)
[   37.976836]  dump_stack_lvl+0x8c/0xd0
[   37.976868]  print_report+0x118/0x5d0
[   37.976896]  kasan_report+0xdc/0x128
[   37.976922]  __asan_report_store1_noabort+0x20/0x30
[   37.976956]  kmalloc_big_oob_right+0x2a4/0x2f0
[   37.976987]  kunit_try_run_case+0x170/0x3f0
[   37.977024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.977056]  kthread+0x328/0x630
[   37.977087]  ret_from_fork+0x10/0x20
[   37.977122] 
[   38.041091] Allocated by task 228:
[   38.044477]  kasan_save_stack+0x3c/0x68
[   38.048294]  kasan_save_track+0x20/0x40
[   38.052113]  kasan_save_alloc_info+0x40/0x58
[   38.056367]  __kasan_kmalloc+0xd4/0xd8
[   38.060099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.064613]  kmalloc_big_oob_right+0xb8/0x2f0
[   38.068953]  kunit_try_run_case+0x170/0x3f0
[   38.073120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.078589]  kthread+0x328/0x630
[   38.081800]  ret_from_fork+0x10/0x20
[   38.085359] 
[   38.086838] The buggy address belongs to the object at ffff000807750000
[   38.086838]  which belongs to the cache kmalloc-8k of size 8192
[   38.099338] The buggy address is located 0 bytes to the right of
[   38.099338]  allocated 7936-byte region [ffff000807750000, ffff000807751f00)
[   38.112355] 
[   38.113835] The buggy address belongs to the physical page:
[   38.119392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887750
[   38.127377] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.135013] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.141959] page_type: f5(slab)
[   38.145094] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   38.152814] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   38.160539] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   38.168351] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   38.176164] head: 0bfffe0000000003 fffffdffe01dd401 00000000ffffffff 00000000ffffffff
[   38.183976] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   38.191783] page dumped because: kasan: bad access detected
[   38.197336] 
[   38.198812] Memory state around the buggy address:
[   38.203594]  ffff000807751e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.210795]  ffff000807751e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.218001] >ffff000807751f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.225201]                    ^
[   38.228416]  ffff000807751f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.235622]  ffff000807752000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.242824] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   37.480804] ==================================================================
[   37.490756] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   37.498823] Write of size 1 at addr ffff0008074f8778 by task kunit_try_catch/226
[   37.506202] 
[   37.507687] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   37.507742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.507759] Hardware name: WinLink E850-96 board (DT)
[   37.507780] Call trace:
[   37.507792]  show_stack+0x20/0x38 (C)
[   37.507828]  dump_stack_lvl+0x8c/0xd0
[   37.507859]  print_report+0x118/0x5d0
[   37.507888]  kasan_report+0xdc/0x128
[   37.507913]  __asan_report_store1_noabort+0x20/0x30
[   37.507948]  kmalloc_track_caller_oob_right+0x40c/0x488
[   37.507986]  kunit_try_run_case+0x170/0x3f0
[   37.508021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.508053]  kthread+0x328/0x630
[   37.508081]  ret_from_fork+0x10/0x20
[   37.508115] 
[   37.572870] Allocated by task 226:
[   37.576255]  kasan_save_stack+0x3c/0x68
[   37.580072]  kasan_save_track+0x20/0x40
[   37.583891]  kasan_save_alloc_info+0x40/0x58
[   37.588145]  __kasan_kmalloc+0xd4/0xd8
[   37.591877]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   37.597433]  kmalloc_track_caller_oob_right+0xa8/0x488
[   37.602554]  kunit_try_run_case+0x170/0x3f0
[   37.606721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.612191]  kthread+0x328/0x630
[   37.615401]  ret_from_fork+0x10/0x20
[   37.618960] 
[   37.620437] The buggy address belongs to the object at ffff0008074f8700
[   37.620437]  which belongs to the cache kmalloc-128 of size 128
[   37.632939] The buggy address is located 0 bytes to the right of
[   37.632939]  allocated 120-byte region [ffff0008074f8700, ffff0008074f8778)
[   37.645870] 
[   37.647348] The buggy address belongs to the physical page:
[   37.652905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8
[   37.660887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.668528] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.675470] page_type: f5(slab)
[   37.678608] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.686327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.694053] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.701864] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.709678] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff
[   37.717490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.725295] page dumped because: kasan: bad access detected
[   37.730851] 
[   37.732326] Memory state around the buggy address:
[   37.737106]  ffff0008074f8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.744309]  ffff0008074f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.751515] >ffff0008074f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.758715]                                                                 ^
[   37.765836]  ffff0008074f8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.773043]  ffff0008074f8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.780243] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   37.180037] ==================================================================
[   37.189376] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   37.196746] Read of size 1 at addr ffff00080806b000 by task kunit_try_catch/224
[   37.204036] 
[   37.205522] CPU: 3 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   37.205575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.205593] Hardware name: WinLink E850-96 board (DT)
[   37.205610] Call trace:
[   37.205623]  show_stack+0x20/0x38 (C)
[   37.205660]  dump_stack_lvl+0x8c/0xd0
[   37.205693]  print_report+0x118/0x5d0
[   37.205722]  kasan_report+0xdc/0x128
[   37.205747]  __asan_report_load1_noabort+0x20/0x30
[   37.205779]  kmalloc_node_oob_right+0x2f4/0x330
[   37.205813]  kunit_try_run_case+0x170/0x3f0
[   37.205852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.205883]  kthread+0x328/0x630
[   37.205911]  ret_from_fork+0x10/0x20
[   37.205946] 
[   37.269922] Allocated by task 224:
[   37.273309]  kasan_save_stack+0x3c/0x68
[   37.277125]  kasan_save_track+0x20/0x40
[   37.280944]  kasan_save_alloc_info+0x40/0x58
[   37.285198]  __kasan_kmalloc+0xd4/0xd8
[   37.288932]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   37.293878]  kmalloc_node_oob_right+0xbc/0x330
[   37.298305]  kunit_try_run_case+0x170/0x3f0
[   37.302472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.307941]  kthread+0x328/0x630
[   37.311152]  ret_from_fork+0x10/0x20
[   37.314711] 
[   37.316190] The buggy address belongs to the object at ffff00080806a000
[   37.316190]  which belongs to the cache kmalloc-4k of size 4096
[   37.328690] The buggy address is located 0 bytes to the right of
[   37.328690]  allocated 4096-byte region [ffff00080806a000, ffff00080806b000)
[   37.341707] 
[   37.343186] The buggy address belongs to the physical page:
[   37.348744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888068
[   37.356726] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.364365] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.371309] page_type: f5(slab)
[   37.374446] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   37.382165] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   37.389891] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   37.397702] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   37.405516] head: 0bfffe0000000003 fffffdffe0201a01 00000000ffffffff 00000000ffffffff
[   37.413327] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   37.421133] page dumped because: kasan: bad access detected
[   37.426690] 
[   37.428166] Memory state around the buggy address:
[   37.432945]  ffff00080806af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.440147]  ffff00080806af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.447354] >ffff00080806b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.454554]                    ^
[   37.457768]  ffff00080806b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.464973]  ffff00080806b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.472174] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   36.858018] ==================================================================
[   36.867155] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   36.874006] Read of size 1 at addr ffff000804b5a03f by task kunit_try_catch/222
[   36.881298] 
[   36.882784] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   36.882836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.882852] Hardware name: WinLink E850-96 board (DT)
[   36.882874] Call trace:
[   36.882887]  show_stack+0x20/0x38 (C)
[   36.882924]  dump_stack_lvl+0x8c/0xd0
[   36.882959]  print_report+0x118/0x5d0
[   36.882986]  kasan_report+0xdc/0x128
[   36.883013]  __asan_report_load1_noabort+0x20/0x30
[   36.883046]  kmalloc_oob_left+0x2ec/0x320
[   36.883077]  kunit_try_run_case+0x170/0x3f0
[   36.883113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.883144]  kthread+0x328/0x630
[   36.883175]  ret_from_fork+0x10/0x20
[   36.883211] 
[   36.946664] Allocated by task 152:
[   36.950050]  kasan_save_stack+0x3c/0x68
[   36.953867]  kasan_save_track+0x20/0x40
[   36.957687]  kasan_save_alloc_info+0x40/0x58
[   36.961939]  __kasan_kmalloc+0xd4/0xd8
[   36.965671]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   36.971227]  kvasprintf+0xe0/0x180
[   36.974612]  kasprintf+0xd0/0x110
[   36.977910]  miscdev_test_can_open+0xac/0x2c8
[   36.982251]  miscdev_test_conflict+0x1e0/0x338
[   36.986678]  kunit_try_run_case+0x170/0x3f0
[   36.990846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.996313]  kthread+0x328/0x630
[   36.999525]  ret_from_fork+0x10/0x20
[   37.003084] 
[   37.004561] Freed by task 152:
[   37.007601]  kasan_save_stack+0x3c/0x68
[   37.011417]  kasan_save_track+0x20/0x40
[   37.015238]  kasan_save_free_info+0x4c/0x78
[   37.019403]  __kasan_slab_free+0x6c/0x98
[   37.023309]  kfree+0x214/0x3c8
[   37.026347]  miscdev_test_can_open+0x138/0x2c8
[   37.030774]  miscdev_test_conflict+0x1e0/0x338
[   37.035201]  kunit_try_run_case+0x170/0x3f0
[   37.039368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.044837]  kthread+0x328/0x630
[   37.048050]  ret_from_fork+0x10/0x20
[   37.051607] 
[   37.053086] The buggy address belongs to the object at ffff000804b5a020
[   37.053086]  which belongs to the cache kmalloc-16 of size 16
[   37.065413] The buggy address is located 15 bytes to the right of
[   37.065413]  allocated 16-byte region [ffff000804b5a020, ffff000804b5a030)
[   37.078343] 
[   37.079821] The buggy address belongs to the physical page:
[   37.085378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a
[   37.093365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.099872] page_type: f5(slab)
[   37.103009] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   37.110728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   37.118448] page dumped because: kasan: bad access detected
[   37.124002] 
[   37.125478] Memory state around the buggy address:
[   37.130259]  ffff000804b59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.137460]  ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.144667] >ffff000804b5a000: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   37.151866]                                         ^
[   37.156904]  ffff000804b5a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.164109]  ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.171312] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   36.560863] ==================================================================
[   36.567940] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   36.574878] Read of size 1 at addr ffff000801ff7480 by task kunit_try_catch/220
[   36.582170] 
[   36.583655] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   36.583706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.583725] Hardware name: WinLink E850-96 board (DT)
[   36.583743] Call trace:
[   36.583754]  show_stack+0x20/0x38 (C)
[   36.583789]  dump_stack_lvl+0x8c/0xd0
[   36.583820]  print_report+0x118/0x5d0
[   36.583847]  kasan_report+0xdc/0x128
[   36.583873]  __asan_report_load1_noabort+0x20/0x30
[   36.583906]  kmalloc_oob_right+0x5d0/0x660
[   36.583938]  kunit_try_run_case+0x170/0x3f0
[   36.583972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.584003]  kthread+0x328/0x630
[   36.584035]  ret_from_fork+0x10/0x20
[   36.584069] 
[   36.647621] Allocated by task 220:
[   36.651008]  kasan_save_stack+0x3c/0x68
[   36.654825]  kasan_save_track+0x20/0x40
[   36.658645]  kasan_save_alloc_info+0x40/0x58
[   36.662898]  __kasan_kmalloc+0xd4/0xd8
[   36.666630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.671144]  kmalloc_oob_right+0xb0/0x660
[   36.675137]  kunit_try_run_case+0x170/0x3f0
[   36.679304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.684773]  kthread+0x328/0x630
[   36.687985]  ret_from_fork+0x10/0x20
[   36.691544] 
[   36.693020] The buggy address belongs to the object at ffff000801ff7400
[   36.693020]  which belongs to the cache kmalloc-128 of size 128
[   36.705520] The buggy address is located 13 bytes to the right of
[   36.705520]  allocated 115-byte region [ffff000801ff7400, ffff000801ff7473)
[   36.718539] 
[   36.720017] The buggy address belongs to the physical page:
[   36.725575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6
[   36.733557] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.741197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.748140] page_type: f5(slab)
[   36.751277] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.758997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.766724] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.774535] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.782348] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff
[   36.790160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.797965] page dumped because: kasan: bad access detected
[   36.803521] 
[   36.804996] Memory state around the buggy address:
[   36.809775]  ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.816980]  ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.824185] >ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831385]                    ^
[   36.834600]  ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.841805]  ffff000801ff7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.849006] ==================================================================
[   36.261308] ==================================================================
[   36.268464] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   36.275404] Write of size 1 at addr ffff000801ff7478 by task kunit_try_catch/220
[   36.282782] 
[   36.284268] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   36.284321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.284337] Hardware name: WinLink E850-96 board (DT)
[   36.284356] Call trace:
[   36.284370]  show_stack+0x20/0x38 (C)
[   36.284403]  dump_stack_lvl+0x8c/0xd0
[   36.284435]  print_report+0x118/0x5d0
[   36.284465]  kasan_report+0xdc/0x128
[   36.284490]  __asan_report_store1_noabort+0x20/0x30
[   36.284525]  kmalloc_oob_right+0x538/0x660
[   36.284558]  kunit_try_run_case+0x170/0x3f0
[   36.284595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.284625]  kthread+0x328/0x630
[   36.284655]  ret_from_fork+0x10/0x20
[   36.284691] 
[   36.348319] Allocated by task 220:
[   36.351708]  kasan_save_stack+0x3c/0x68
[   36.355524]  kasan_save_track+0x20/0x40
[   36.359343]  kasan_save_alloc_info+0x40/0x58
[   36.363597]  __kasan_kmalloc+0xd4/0xd8
[   36.367330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.371843]  kmalloc_oob_right+0xb0/0x660
[   36.375836]  kunit_try_run_case+0x170/0x3f0
[   36.380003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.385472]  kthread+0x328/0x630
[   36.388683]  ret_from_fork+0x10/0x20
[   36.392243] 
[   36.393719] The buggy address belongs to the object at ffff000801ff7400
[   36.393719]  which belongs to the cache kmalloc-128 of size 128
[   36.406221] The buggy address is located 5 bytes to the right of
[   36.406221]  allocated 115-byte region [ffff000801ff7400, ffff000801ff7473)
[   36.419151] 
[   36.420629] The buggy address belongs to the physical page:
[   36.426187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6
[   36.434169] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.441810] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.448754] page_type: f5(slab)
[   36.451888] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.459609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.467336] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.475147] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.482960] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff
[   36.490772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.498579] page dumped because: kasan: bad access detected
[   36.504133] 
[   36.505608] Memory state around the buggy address:
[   36.510388]  ffff000801ff7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.517591]  ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.524798] >ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.531997]                                                                 ^
[   36.539119]  ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.546324]  ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.553525] ==================================================================
[   35.958593] ==================================================================
[   35.965171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.972111] Write of size 1 at addr ffff000801ff7473 by task kunit_try_catch/220
[   35.979489] 
[   35.980975] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   35.981028] Tainted: [N]=TEST
[   35.981043] Hardware name: WinLink E850-96 board (DT)
[   35.981063] Call trace:
[   35.981080]  show_stack+0x20/0x38 (C)
[   35.981116]  dump_stack_lvl+0x8c/0xd0
[   35.981149]  print_report+0x118/0x5d0
[   35.981178]  kasan_report+0xdc/0x128
[   35.981205]  __asan_report_store1_noabort+0x20/0x30
[   35.981241]  kmalloc_oob_right+0x5a4/0x660
[   35.981271]  kunit_try_run_case+0x170/0x3f0
[   35.981311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.981344]  kthread+0x328/0x630
[   35.981372]  ret_from_fork+0x10/0x20
[   35.981408] 
[   36.043811] Allocated by task 220:
[   36.047198]  kasan_save_stack+0x3c/0x68
[   36.051015]  kasan_save_track+0x20/0x40
[   36.054834]  kasan_save_alloc_info+0x40/0x58
[   36.059088]  __kasan_kmalloc+0xd4/0xd8
[   36.062822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.067336]  kmalloc_oob_right+0xb0/0x660
[   36.071327]  kunit_try_run_case+0x170/0x3f0
[   36.075494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.080962]  kthread+0x328/0x630
[   36.084174]  ret_from_fork+0x10/0x20
[   36.087735] 
[   36.089210] The buggy address belongs to the object at ffff000801ff7400
[   36.089210]  which belongs to the cache kmalloc-128 of size 128
[   36.101711] The buggy address is located 0 bytes to the right of
[   36.101711]  allocated 115-byte region [ffff000801ff7400, ffff000801ff7473)
[   36.114642] 
[   36.116122] The buggy address belongs to the physical page:
[   36.121679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6
[   36.129662] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.137301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.144245] page_type: f5(slab)
[   36.147381] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.155100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.162826] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.170638] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.178450] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff
[   36.186262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.194070] page dumped because: kasan: bad access detected
[   36.199623] 
[   36.201099] Memory state around the buggy address:
[   36.205881]  ffff000801ff7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.213082]  ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.220291] >ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.227488]                                                              ^
[   36.234349]  ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.241554]  ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.248756] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  179.394806] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#3: kunit_try_catch/743
[  179.403312] Modules linked in:
[  179.406359] CPU: 3 UID: 0 PID: 743 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  179.417475] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  179.423276] Hardware name: WinLink E850-96 board (DT)
[  179.428314] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  179.435253] pc : intlog10+0x38/0x48
[  179.438727] lr : intlog10_test+0xe4/0x200
[  179.442718] sp : ffff80008af67c10
[  179.446017] x29: ffff80008af67c90 x28: 0000000000000000 x27: 0000000000000000
[  179.453135] x26: 1fffe00100d59fa1 x25: 0000000000000000 x24: ffff80008af67ce0
[  179.460253] x23: ffff80008af67d00 x22: 0000000000000000 x21: 1ffff000115ecf82
[  179.467371] x20: ffff800083c2f2e0 x19: ffff800087d07990 x18: 00000000e7e12ca6
[  179.474489] x17: 0000000000000001 x16: ffff00085af85da8 x15: 0000000000000000
[  179.481606] x14: 00000000f1f1f1f1 x13: 1fffe0010095dd94 x12: ffff700010f63189
[  179.488725] x11: 1ffff00010f63188 x10: ffff700010f63188 x9 : ffff80008124c0cc
[  179.495843] x8 : ffff800087b18c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  179.502960] x5 : ffff7000115ecf82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e5c
[  179.510079] x2 : 1ffff00010785e5c x1 : 0000000000000003 x0 : 0000000000000000
[  179.517199] Call trace:
[  179.519630]  intlog10+0x38/0x48 (P)
[  179.523101]  kunit_try_run_case+0x170/0x3f0
[  179.527268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  179.532734]  kthread+0x328/0x630
[  179.535948]  ret_from_fork+0x10/0x20
[  179.539509] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  179.190123] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#4: kunit_try_catch/725
[  179.198454] Modules linked in:
[  179.201503] CPU: 4 UID: 0 PID: 725 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[  179.212612] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  179.217550] Hardware name: WinLink E850-96 board (DT)
[  179.222587] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  179.229527] pc : intlog2+0xd8/0xf8
[  179.232913] lr : intlog2_test+0xe4/0x200
[  179.236819] sp : ffff80008ae47c10
[  179.240117] x29: ffff80008ae47c90 x28: 0000000000000000 x27: 0000000000000000
[  179.247236] x26: 1fffe00100d59321 x25: 0000000000000000 x24: ffff80008ae47ce0
[  179.254353] x23: ffff80008ae47d00 x22: 0000000000000000 x21: 1ffff000115c8f82
[  179.261471] x20: ffff800083c2f1e0 x19: ffff800087d07990 x18: 00000000c34a9bf9
[  179.268589] x17: 0000000000000001 x16: ffff00085afa7da8 x15: 0000000000000000
[  179.275707] x14: 00000000f1f1f1f1 x13: 1fffe0010095dd14 x12: ffff700010f63189
[  179.282825] x11: 1ffff00010f63188 x10: ffff700010f63188 x9 : ffff80008124c2cc
[  179.289943] x8 : ffff800087b18c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  179.297061] x5 : ffff7000115c8f82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e3c
[  179.304179] x2 : 1ffff00010785e3c x1 : 0000000000000003 x0 : 0000000000000000
[  179.311299] Call trace:
[  179.313729]  intlog2+0xd8/0xf8 (P)
[  179.317115]  kunit_try_run_case+0x170/0x3f0
[  179.321281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  179.326748]  kthread+0x328/0x630
[  179.329960]  ret_from_fork+0x10/0x20
[  179.333522] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)