Hay
Date
July 15, 2025, 11:35 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   81.158794] ==================================================================
[   81.172996] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   81.180370] Read of size 8 at addr ffff000800de4878 by task kunit_try_catch/362
[   81.187661] 
[   81.189146] CPU: 6 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   81.189205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.189223] Hardware name: WinLink E850-96 board (DT)
[   81.189250] Call trace:
[   81.189265]  show_stack+0x20/0x38 (C)
[   81.189303]  dump_stack_lvl+0x8c/0xd0
[   81.189340]  print_report+0x118/0x5d0
[   81.189371]  kasan_report+0xdc/0x128
[   81.189400]  __asan_report_load8_noabort+0x20/0x30
[   81.189435]  copy_to_kernel_nofault+0x204/0x250
[   81.189472]  copy_to_kernel_nofault_oob+0x158/0x418
[   81.189509]  kunit_try_run_case+0x170/0x3f0
[   81.189541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.189579]  kthread+0x328/0x630
[   81.189609]  ret_from_fork+0x10/0x20
[   81.189643] 
[   81.258406] Allocated by task 362:
[   81.261793]  kasan_save_stack+0x3c/0x68
[   81.265610]  kasan_save_track+0x20/0x40
[   81.269429]  kasan_save_alloc_info+0x40/0x58
[   81.273683]  __kasan_kmalloc+0xd4/0xd8
[   81.277415]  __kmalloc_cache_noprof+0x16c/0x3c0
[   81.281929]  copy_to_kernel_nofault_oob+0xc8/0x418
[   81.286704]  kunit_try_run_case+0x170/0x3f0
[   81.290870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.296340]  kthread+0x328/0x630
[   81.299550]  ret_from_fork+0x10/0x20
[   81.303109] 
[   81.304587] The buggy address belongs to the object at ffff000800de4800
[   81.304587]  which belongs to the cache kmalloc-128 of size 128
[   81.317089] The buggy address is located 0 bytes to the right of
[   81.317089]  allocated 120-byte region [ffff000800de4800, ffff000800de4878)
[   81.330019] 
[   81.331498] The buggy address belongs to the physical page:
[   81.337056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   81.345038] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.352676] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.359620] page_type: f5(slab)
[   81.362757] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.370476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.378206] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.386014] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.393827] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   81.401639] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.409446] page dumped because: kasan: bad access detected
[   81.415000] 
[   81.416476] Memory state around the buggy address:
[   81.421257]  ffff000800de4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.428460]  ffff000800de4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.435666] >ffff000800de4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.442864]                                                                 ^
[   81.449986]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.457191]  ffff000800de4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.464392] ==================================================================
[   81.471836] ==================================================================
[   81.478804] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   81.486095] Write of size 8 at addr ffff000800de4878 by task kunit_try_catch/362
[   81.493471] 
[   81.494956] CPU: 6 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   81.495016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.495034] Hardware name: WinLink E850-96 board (DT)
[   81.495053] Call trace:
[   81.495063]  show_stack+0x20/0x38 (C)
[   81.495097]  dump_stack_lvl+0x8c/0xd0
[   81.495133]  print_report+0x118/0x5d0
[   81.495164]  kasan_report+0xdc/0x128
[   81.495189]  kasan_check_range+0x100/0x1a8
[   81.495220]  __kasan_check_write+0x20/0x30
[   81.495252]  copy_to_kernel_nofault+0x8c/0x250
[   81.495287]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   81.495323]  kunit_try_run_case+0x170/0x3f0
[   81.495356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.495391]  kthread+0x328/0x630
[   81.495420]  ret_from_fork+0x10/0x20
[   81.495455] 
[   81.567515] Allocated by task 362:
[   81.570903]  kasan_save_stack+0x3c/0x68
[   81.574720]  kasan_save_track+0x20/0x40
[   81.578539]  kasan_save_alloc_info+0x40/0x58
[   81.582793]  __kasan_kmalloc+0xd4/0xd8
[   81.586526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   81.591039]  copy_to_kernel_nofault_oob+0xc8/0x418
[   81.595814]  kunit_try_run_case+0x170/0x3f0
[   81.599980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.605450]  kthread+0x328/0x630
[   81.608660]  ret_from_fork+0x10/0x20
[   81.612220] 
[   81.613697] The buggy address belongs to the object at ffff000800de4800
[   81.613697]  which belongs to the cache kmalloc-128 of size 128
[   81.626195] The buggy address is located 0 bytes to the right of
[   81.626195]  allocated 120-byte region [ffff000800de4800, ffff000800de4878)
[   81.639128] 
[   81.640608] The buggy address belongs to the physical page:
[   81.646164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   81.654147] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.661788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.668729] page_type: f5(slab)
[   81.671866] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.679586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.687313] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.695124] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   81.702937] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   81.710749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   81.718554] page dumped because: kasan: bad access detected
[   81.724111] 
[   81.725585] Memory state around the buggy address:
[   81.730367]  ffff000800de4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.737570]  ffff000800de4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.744773] >ffff000800de4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   81.751974]                                                                 ^
[   81.759096]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.766301]  ffff000800de4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.773502] ==================================================================
Failure - log-parser-boot/internal-error-oops-oops-smp
[  182.195535] Internal error: Oops: 0000000096000005 [#1]  SMP
[  182.201142] Modules linked in:
[  182.204188] CPU: 3 UID: 0 PID: 613 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  182.215296] Tainted: [B]=BAD_PAGE, [N]=TEST
[  182.219454] Hardware name: WinLink E850-96 board (DT)
[  182.224492] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  182.231433] pc : kunit_test_null_dereference+0x70/0x170
[  182.236640] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  182.242456] sp : ffff80008a6c7d30
[  182.245754] x29: ffff80008a6c7d90 x28: 0000000000000000 x27: 0000000000000000
[  182.252872] x26: 1fffe00100316de1 x25: 0000000000000000 x24: 0000000000000004
[  182.259990] x23: ffff0008018b6f0c x22: ffff80008123e580 x21: ffff000800340008
[  182.267108] x20: 1ffff000114d8fa6 x19: ffff800087d17990 x18: 00000000e3524fe5
[  182.274225] x17: ffff8000812401e0 x16: ffff80008123c9b0 x15: ffff80008123260c
[  182.281343] x14: ffff8000809033ec x13: ffff800080018ef8 x12: ffff6001011d111c
[  182.288461] x11: 1fffe001011d111b x10: ffff6001011d111b x9 : ffff800081235d10
[  182.295579] x8 : ffff80008a6c7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  182.302697] x5 : ffff7000114d8fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  182.309815] x2 : dfff800000000000 x1 : ffff000808e88000 x0 : ffff800087d17990
[  182.316936] Call trace:
[  182.319367]  kunit_test_null_dereference+0x70/0x170 (P)
[  182.324575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  182.330041]  kthread+0x328/0x630
[  182.333253]  ret_from_fork+0x10/0x20
[  182.336826] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  182.342892] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[  286.944104] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  286.952347] SMP: stopping secondary CPUs
[  286.956269] Kernel Offset: disabled
[  286.959719] CPU features: 0x20000,00000000,10023140,0400721b
[  286.965362] Memory Limit: none
[  286.968434] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  117.548904] ==================================================================
[  117.549024] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[  117.549024] 
[  117.549170] Use-after-free read at 0x(____ptrval____) (in kfence-#221):
[  117.554172]  test_krealloc+0x51c/0x830
[  117.557904]  kunit_try_run_case+0x170/0x3f0
[  117.562071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.567539]  kthread+0x328/0x630
[  117.570751]  ret_from_fork+0x10/0x20
[  117.574310] 
[  117.575789] kfence-#221: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[  117.575789] 
[  117.585426] allocated by task 418 on cpu 5 at 117.548811s (0.036611s ago):
[  117.592300]  test_alloc+0x29c/0x628
[  117.595750]  test_krealloc+0xc0/0x830
[  117.599396]  kunit_try_run_case+0x170/0x3f0
[  117.603563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.609031]  kthread+0x328/0x630
[  117.612246]  ret_from_fork+0x10/0x20
[  117.615804] 
[  117.617280] freed by task 418 on cpu 5 at 117.548840s (0.068438s ago):
[  117.623810]  krealloc_noprof+0x148/0x360
[  117.627696]  test_krealloc+0x1dc/0x830
[  117.631427]  kunit_try_run_case+0x170/0x3f0
[  117.635594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.641062]  kthread+0x328/0x630
[  117.644274]  ret_from_fork+0x10/0x20
[  117.647834] 
[  117.649320] CPU: 5 UID: 0 PID: 418 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  117.660433] Tainted: [B]=BAD_PAGE, [N]=TEST
[  117.664587] Hardware name: WinLink E850-96 board (DT)
[  117.669624] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  117.324505] ==================================================================
[  117.324652] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[  117.324652] 
[  117.324810] Use-after-free read at 0x(____ptrval____) (in kfence-#219):
[  117.325707]  test_memcache_typesafe_by_rcu+0x280/0x560
[  117.330827]  kunit_try_run_case+0x170/0x3f0
[  117.334993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.340462]  kthread+0x328/0x630
[  117.343674]  ret_from_fork+0x10/0x20
[  117.347233] 
[  117.348711] kfence-#219: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[  117.348711] 
[  117.357827] allocated by task 416 on cpu 5 at 117.264810s (0.093014s ago):
[  117.364702]  test_alloc+0x230/0x628
[  117.368153]  test_memcache_typesafe_by_rcu+0x15c/0x560
[  117.373274]  kunit_try_run_case+0x170/0x3f0
[  117.377441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.382910]  kthread+0x328/0x630
[  117.386121]  ret_from_fork+0x10/0x20
[  117.389682] 
[  117.391158] freed by task 416 on cpu 5 at 117.264827s (0.126329s ago):
[  117.397683]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[  117.402788]  kunit_try_run_case+0x170/0x3f0
[  117.406955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  117.412423]  kthread+0x328/0x630
[  117.415636]  ret_from_fork+0x10/0x20
[  117.419196] 
[  117.420681] CPU: 5 UID: 0 PID: 416 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  117.431793] Tainted: [B]=BAD_PAGE, [N]=TEST
[  117.435948] Hardware name: WinLink E850-96 board (DT)
[  117.440986] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   93.882439] ==================================================================
[   93.882638] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   93.882638] 
[   93.882788] Invalid read at 0x(____ptrval____):
[   93.883903]  test_invalid_access+0xdc/0x1f0
[   93.888128]  kunit_try_run_case+0x170/0x3f0
[   93.892264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.897733]  kthread+0x328/0x630
[   93.900943]  ret_from_fork+0x10/0x20
[   93.904474] 
[   93.905990] CPU: 3 UID: 0 PID: 412 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   93.917101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   93.921258] Hardware name: WinLink E850-96 board (DT)
[   93.926291] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   93.528887] ==================================================================
[   93.529030] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   93.529030] 
[   93.529179] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#214):
[   93.532862]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   93.538069]  kunit_try_run_case+0x170/0x3f0
[   93.542235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.547704]  kthread+0x328/0x630
[   93.550916]  ret_from_fork+0x10/0x20
[   93.554475] 
[   93.555954] kfence-#214: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   93.555954] 
[   93.565590] allocated by task 406 on cpu 4 at 93.528808s (0.036780s ago):
[   93.572375]  test_alloc+0x29c/0x628
[   93.575829]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   93.580950]  kunit_try_run_case+0x170/0x3f0
[   93.585117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.590586]  kthread+0x328/0x630
[   93.593797]  ret_from_fork+0x10/0x20
[   93.597358] 
[   93.598836] freed by task 406 on cpu 4 at 93.528823s (0.070009s ago):
[   93.605276]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   93.610464]  kunit_try_run_case+0x170/0x3f0
[   93.614630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.620099]  kthread+0x328/0x630
[   93.623311]  ret_from_fork+0x10/0x20
[   93.626871] 
[   93.628357] CPU: 4 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   93.639469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   93.643623] Hardware name: WinLink E850-96 board (DT)
[   93.648660] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   92.796855] ==================================================================
[   92.796996] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   92.796996] 
[   92.797154] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#207):
[   92.798834]  test_kmalloc_aligned_oob_read+0x238/0x468
[   92.803953]  kunit_try_run_case+0x170/0x3f0
[   92.808120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   92.813589]  kthread+0x328/0x630
[   92.816801]  ret_from_fork+0x10/0x20
[   92.820359] 
[   92.821839] kfence-#207: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   92.821839] 
[   92.831476] allocated by task 404 on cpu 3 at 92.796818s (0.034654s ago):
[   92.838263]  test_alloc+0x29c/0x628
[   92.841713]  test_kmalloc_aligned_oob_read+0x100/0x468
[   92.846835]  kunit_try_run_case+0x170/0x3f0
[   92.851002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   92.856470]  kthread+0x328/0x630
[   92.859682]  ret_from_fork+0x10/0x20
[   92.863242] 
[   92.864728] CPU: 3 UID: 0 PID: 404 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   92.875840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   92.879995] Hardware name: WinLink E850-96 board (DT)
[   92.885032] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   88.208893] ==================================================================
[   88.209032] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   88.209032] 
[   88.209166] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#163):
[   88.209330]  test_corruption+0x1d8/0x378
[   88.212863]  kunit_try_run_case+0x170/0x3f0
[   88.217030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.222499]  kthread+0x328/0x630
[   88.225710]  ret_from_fork+0x10/0x20
[   88.229270] 
[   88.230749] kfence-#163: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   88.230749] 
[   88.239863] allocated by task 394 on cpu 4 at 88.208814s (0.031047s ago):
[   88.246646]  test_alloc+0x230/0x628
[   88.250103]  test_corruption+0x198/0x378
[   88.254009]  kunit_try_run_case+0x170/0x3f0
[   88.258176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.263644]  kthread+0x328/0x630
[   88.266856]  ret_from_fork+0x10/0x20
[   88.270416] 
[   88.271893] freed by task 394 on cpu 4 at 88.208830s (0.063060s ago):
[   88.278332]  test_corruption+0x1d8/0x378
[   88.282220]  kunit_try_run_case+0x170/0x3f0
[   88.286387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.291856]  kthread+0x328/0x630
[   88.295067]  ret_from_fork+0x10/0x20
[   88.298628] 
[   88.300113] CPU: 4 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   88.311223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.315381] Hardware name: WinLink E850-96 board (DT)
[   88.320418] ==================================================================
[   87.436857] ==================================================================
[   87.436991] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   87.436991] 
[   87.437126] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#156):
[   87.439522]  test_corruption+0x278/0x378
[   87.443427]  kunit_try_run_case+0x170/0x3f0
[   87.447594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.453062]  kthread+0x328/0x630
[   87.456275]  ret_from_fork+0x10/0x20
[   87.459833] 
[   87.461313] kfence-#156: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   87.461313] 
[   87.470950] allocated by task 392 on cpu 3 at 87.436784s (0.034162s ago):
[   87.477730]  test_alloc+0x29c/0x628
[   87.481187]  test_corruption+0xdc/0x378
[   87.485007]  kunit_try_run_case+0x170/0x3f0
[   87.489173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.494642]  kthread+0x328/0x630
[   87.497854]  ret_from_fork+0x10/0x20
[   87.501414] 
[   87.502889] freed by task 392 on cpu 3 at 87.436800s (0.066087s ago):
[   87.509329]  test_corruption+0x278/0x378
[   87.513218]  kunit_try_run_case+0x170/0x3f0
[   87.517385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.522853]  kthread+0x328/0x630
[   87.526065]  ret_from_fork+0x10/0x20
[   87.529626] 
[   87.531111] CPU: 3 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   87.542218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.546379] Hardware name: WinLink E850-96 board (DT)
[   87.551416] ==================================================================
[   87.984899] ==================================================================
[   87.985037] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   87.985037] 
[   87.985171] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#161):
[   87.987570]  test_corruption+0x120/0x378
[   87.991473]  kunit_try_run_case+0x170/0x3f0
[   87.995639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.001108]  kthread+0x328/0x630
[   88.004319]  ret_from_fork+0x10/0x20
[   88.007878] 
[   88.009358] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   88.009358] 
[   88.018472] allocated by task 394 on cpu 4 at 87.984825s (0.033645s ago):
[   88.025254]  test_alloc+0x230/0x628
[   88.028712]  test_corruption+0xdc/0x378
[   88.032531]  kunit_try_run_case+0x170/0x3f0
[   88.036698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.042167]  kthread+0x328/0x630
[   88.045378]  ret_from_fork+0x10/0x20
[   88.048939] 
[   88.050417] freed by task 394 on cpu 4 at 87.984841s (0.065572s ago):
[   88.056854]  test_corruption+0x120/0x378
[   88.060743]  kunit_try_run_case+0x170/0x3f0
[   88.064909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   88.070378]  kthread+0x328/0x630
[   88.073590]  ret_from_fork+0x10/0x20
[   88.077150] 
[   88.078636] CPU: 4 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   88.089747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.093903] Hardware name: WinLink E850-96 board (DT)
[   88.098940] ==================================================================
[   87.764907] ==================================================================
[   87.765042] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   87.765042] 
[   87.765179] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#159):
[   87.765339]  test_corruption+0x284/0x378
[   87.768874]  kunit_try_run_case+0x170/0x3f0
[   87.773041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.778509]  kthread+0x328/0x630
[   87.781721]  ret_from_fork+0x10/0x20
[   87.785280] 
[   87.786759] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   87.786759] 
[   87.796395] allocated by task 392 on cpu 3 at 87.764832s (0.031561s ago):
[   87.803177]  test_alloc+0x29c/0x628
[   87.806634]  test_corruption+0x198/0x378
[   87.810540]  kunit_try_run_case+0x170/0x3f0
[   87.814707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.820175]  kthread+0x328/0x630
[   87.823387]  ret_from_fork+0x10/0x20
[   87.826948] 
[   87.828426] freed by task 392 on cpu 3 at 87.764848s (0.063574s ago):
[   87.834863]  test_corruption+0x284/0x378
[   87.838751]  kunit_try_run_case+0x170/0x3f0
[   87.842918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.848387]  kthread+0x328/0x630
[   87.851598]  ret_from_fork+0x10/0x20
[   87.855159] 
[   87.856645] CPU: 3 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   87.867753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.871912] Hardware name: WinLink E850-96 board (DT)
[   87.876949] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   87.228879] ==================================================================
[   87.229019] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   87.229019] 
[   87.229153] Invalid free of 0x(____ptrval____) (in kfence-#154):
[   87.229256]  test_invalid_addr_free+0xec/0x238
[   87.232589]  kunit_try_run_case+0x170/0x3f0
[   87.236756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.242224]  kthread+0x328/0x630
[   87.245436]  ret_from_fork+0x10/0x20
[   87.248995] 
[   87.250474] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   87.250474] 
[   87.259591] allocated by task 390 on cpu 4 at 87.228820s (0.030767s ago):
[   87.266371]  test_alloc+0x230/0x628
[   87.269829]  test_invalid_addr_free+0xd4/0x238
[   87.274255]  kunit_try_run_case+0x170/0x3f0
[   87.278422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.283890]  kthread+0x328/0x630
[   87.287102]  ret_from_fork+0x10/0x20
[   87.290663] 
[   87.292147] CPU: 4 UID: 0 PID: 390 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   87.303255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.307415] Hardware name: WinLink E850-96 board (DT)
[   87.312453] ==================================================================
[   87.020880] ==================================================================
[   87.021010] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   87.021010] 
[   87.021150] Invalid free of 0x(____ptrval____) (in kfence-#152):
[   87.021253]  test_invalid_addr_free+0x1ac/0x238
[   87.024755]  kunit_try_run_case+0x170/0x3f0
[   87.028921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.034390]  kthread+0x328/0x630
[   87.037601]  ret_from_fork+0x10/0x20
[   87.041161] 
[   87.042641] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   87.042641] 
[   87.052274] allocated by task 388 on cpu 3 at 87.020822s (0.031450s ago):
[   87.059059]  test_alloc+0x29c/0x628
[   87.062515]  test_invalid_addr_free+0xd4/0x238
[   87.066942]  kunit_try_run_case+0x170/0x3f0
[   87.071108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   87.076577]  kthread+0x328/0x630
[   87.079789]  ret_from_fork+0x10/0x20
[   87.083349] 
[   87.084835] CPU: 3 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   87.095947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   87.100102] Hardware name: WinLink E850-96 board (DT)
[   87.105139] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   86.580891] ==================================================================
[   86.581033] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   86.581033] 
[   86.581164] Invalid free of 0x(____ptrval____) (in kfence-#148):
[   86.581267]  test_double_free+0x1bc/0x238
[   86.583736]  kunit_try_run_case+0x170/0x3f0
[   86.587903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.593371]  kthread+0x328/0x630
[   86.596582]  ret_from_fork+0x10/0x20
[   86.600141] 
[   86.601621] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   86.601621] 
[   86.611258] allocated by task 384 on cpu 4 at 86.580809s (0.030445s ago):
[   86.618039]  test_alloc+0x29c/0x628
[   86.621495]  test_double_free+0xd4/0x238
[   86.625402]  kunit_try_run_case+0x170/0x3f0
[   86.629568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.635037]  kthread+0x328/0x630
[   86.638249]  ret_from_fork+0x10/0x20
[   86.641809] 
[   86.643285] freed by task 384 on cpu 4 at 86.580825s (0.062458s ago):
[   86.649724]  test_double_free+0x1ac/0x238
[   86.653700]  kunit_try_run_case+0x170/0x3f0
[   86.657866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.663335]  kthread+0x328/0x630
[   86.666546]  ret_from_fork+0x10/0x20
[   86.670107] 
[   86.671593] CPU: 4 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   86.682703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.686860] Hardware name: WinLink E850-96 board (DT)
[   86.691897] ==================================================================
[   86.800892] ==================================================================
[   86.801018] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   86.801018] 
[   86.801149] Invalid free of 0x(____ptrval____) (in kfence-#150):
[   86.801250]  test_double_free+0x100/0x238
[   86.803723]  kunit_try_run_case+0x170/0x3f0
[   86.807889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.813358]  kthread+0x328/0x630
[   86.816570]  ret_from_fork+0x10/0x20
[   86.820129] 
[   86.821609] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   86.821609] 
[   86.830720] allocated by task 386 on cpu 3 at 86.800816s (0.029902s ago):
[   86.837506]  test_alloc+0x230/0x628
[   86.840962]  test_double_free+0xd4/0x238
[   86.844868]  kunit_try_run_case+0x170/0x3f0
[   86.849035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.854503]  kthread+0x328/0x630
[   86.857715]  ret_from_fork+0x10/0x20
[   86.861276] 
[   86.862751] freed by task 386 on cpu 3 at 86.800831s (0.061917s ago):
[   86.869192]  test_double_free+0xf0/0x238
[   86.873080]  kunit_try_run_case+0x170/0x3f0
[   86.877246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.882715]  kthread+0x328/0x630
[   86.885927]  ret_from_fork+0x10/0x20
[   86.889486] 
[   86.890971] CPU: 3 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   86.902084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.906240] Hardware name: WinLink E850-96 board (DT)
[   86.911277] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   85.924874] ==================================================================
[   85.925009] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   85.925009] 
[   85.925172] Use-after-free read at 0x(____ptrval____) (in kfence-#142):
[   85.925631]  test_use_after_free_read+0x114/0x248
[   85.930317]  kunit_try_run_case+0x170/0x3f0
[   85.934484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.939952]  kthread+0x328/0x630
[   85.943164]  ret_from_fork+0x10/0x20
[   85.946723] 
[   85.948203] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   85.948203] 
[   85.957836] allocated by task 376 on cpu 3 at 85.924814s (0.033020s ago):
[   85.964625]  test_alloc+0x29c/0x628
[   85.968077]  test_use_after_free_read+0xd0/0x248
[   85.972678]  kunit_try_run_case+0x170/0x3f0
[   85.976844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.982313]  kthread+0x328/0x630
[   85.985525]  ret_from_fork+0x10/0x20
[   85.989085] 
[   85.990563] freed by task 376 on cpu 3 at 85.924831s (0.065728s ago):
[   85.997002]  test_use_after_free_read+0x1c0/0x248
[   86.001670]  kunit_try_run_case+0x170/0x3f0
[   86.005837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.011306]  kthread+0x328/0x630
[   86.014517]  ret_from_fork+0x10/0x20
[   86.018078] 
[   86.019564] CPU: 3 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   86.030675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.034831] Hardware name: WinLink E850-96 board (DT)
[   86.039866] ==================================================================
[   86.148882] ==================================================================
[   86.149024] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   86.149024] 
[   86.149184] Use-after-free read at 0x(____ptrval____) (in kfence-#144):
[   86.149646]  test_use_after_free_read+0x114/0x248
[   86.154332]  kunit_try_run_case+0x170/0x3f0
[   86.158499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.163967]  kthread+0x328/0x630
[   86.167179]  ret_from_fork+0x10/0x20
[   86.170738] 
[   86.172218] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   86.172218] 
[   86.181331] allocated by task 378 on cpu 4 at 86.148822s (0.032507s ago):
[   86.188119]  test_alloc+0x230/0x628
[   86.191572]  test_use_after_free_read+0xd0/0x248
[   86.196172]  kunit_try_run_case+0x170/0x3f0
[   86.200338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.205807]  kthread+0x328/0x630
[   86.209019]  ret_from_fork+0x10/0x20
[   86.212580] 
[   86.214056] freed by task 378 on cpu 4 at 86.148838s (0.065216s ago):
[   86.220497]  test_use_after_free_read+0xf0/0x248
[   86.225078]  kunit_try_run_case+0x170/0x3f0
[   86.229245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   86.234713]  kthread+0x328/0x630
[   86.237924]  ret_from_fork+0x10/0x20
[   86.241485] 
[   86.242970] CPU: 4 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   86.254078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   86.258238] Hardware name: WinLink E850-96 board (DT)
[   86.263274] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   85.508858] ==================================================================
[   85.508995] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   85.508995] 
[   85.509158] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#138):
[   85.510310]  test_out_of_bounds_write+0x100/0x240
[   85.514997]  kunit_try_run_case+0x170/0x3f0
[   85.519163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.524632]  kthread+0x328/0x630
[   85.527843]  ret_from_fork+0x10/0x20
[   85.531402] 
[   85.532882] kfence-#138: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   85.532882] 
[   85.542514] allocated by task 372 on cpu 3 at 85.508821s (0.033691s ago):
[   85.549303]  test_alloc+0x29c/0x628
[   85.552756]  test_out_of_bounds_write+0xc8/0x240
[   85.557357]  kunit_try_run_case+0x170/0x3f0
[   85.561524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.566992]  kthread+0x328/0x630
[   85.570204]  ret_from_fork+0x10/0x20
[   85.573765] 
[   85.575251] CPU: 3 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   85.586363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.590518] Hardware name: WinLink E850-96 board (DT)
[   85.595555] ==================================================================
[   85.716864] ==================================================================
[   85.717008] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   85.717008] 
[   85.717165] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#140):
[   85.718324]  test_out_of_bounds_write+0x100/0x240
[   85.723010]  kunit_try_run_case+0x170/0x3f0
[   85.727177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.732645]  kthread+0x328/0x630
[   85.735857]  ret_from_fork+0x10/0x20
[   85.739416] 
[   85.740895] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.740895] 
[   85.750009] allocated by task 374 on cpu 5 at 85.716828s (0.033178s ago):
[   85.756797]  test_alloc+0x230/0x628
[   85.760249]  test_out_of_bounds_write+0xc8/0x240
[   85.764850]  kunit_try_run_case+0x170/0x3f0
[   85.769016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.774485]  kthread+0x328/0x630
[   85.777697]  ret_from_fork+0x10/0x20
[   85.781257] 
[   85.782742] CPU: 5 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   85.793854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.798010] Hardware name: WinLink E850-96 board (DT)
[   85.803047] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   84.660823] ==================================================================
[   84.666113] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   84.666113] 
[   84.675139] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#130):
[   84.682516]  test_out_of_bounds_read+0x1c8/0x3e0
[   84.687116]  kunit_try_run_case+0x170/0x3f0
[   84.691283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.696751]  kthread+0x328/0x630
[   84.699963]  ret_from_fork+0x10/0x20
[   84.703522] 
[   84.704999] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   84.704999] 
[   84.714634] allocated by task 368 on cpu 6 at 84.660792s (0.053839s ago):
[   84.721423]  test_alloc+0x29c/0x628
[   84.724876]  test_out_of_bounds_read+0x198/0x3e0
[   84.729477]  kunit_try_run_case+0x170/0x3f0
[   84.733644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.739112]  kthread+0x328/0x630
[   84.742324]  ret_from_fork+0x10/0x20
[   84.745883] 
[   84.747367] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   84.758478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.762637] Hardware name: WinLink E850-96 board (DT)
[   84.767674] ==================================================================
[   85.188812] ==================================================================
[   85.194370] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   85.194370] 
[   85.203397] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#135):
[   85.210774]  test_out_of_bounds_read+0x1c8/0x3e0
[   85.215375]  kunit_try_run_case+0x170/0x3f0
[   85.219541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.225010]  kthread+0x328/0x630
[   85.228221]  ret_from_fork+0x10/0x20
[   85.231780] 
[   85.233256] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.233256] 
[   85.242371] allocated by task 370 on cpu 0 at 85.188786s (0.053583s ago):
[   85.249157]  test_alloc+0x230/0x628
[   85.252613]  test_out_of_bounds_read+0x198/0x3e0
[   85.257214]  kunit_try_run_case+0x170/0x3f0
[   85.261381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.266849]  kthread+0x328/0x630
[   85.270061]  ret_from_fork+0x10/0x20
[   85.273621] 
[   85.275103] CPU: 0 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   85.286215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.290373] Hardware name: WinLink E850-96 board (DT)
[   85.295409] ==================================================================
[   85.084839] ==================================================================
[   85.084983] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   85.084983] 
[   85.085139] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#134):
[   85.086037]  test_out_of_bounds_read+0x114/0x3e0
[   85.090637]  kunit_try_run_case+0x170/0x3f0
[   85.094803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.100272]  kthread+0x328/0x630
[   85.103484]  ret_from_fork+0x10/0x20
[   85.107043] 
[   85.108523] kfence-#134: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   85.108523] 
[   85.117636] allocated by task 370 on cpu 0 at 85.084803s (0.032832s ago):
[   85.124423]  test_alloc+0x230/0x628
[   85.127876]  test_out_of_bounds_read+0xdc/0x3e0
[   85.132390]  kunit_try_run_case+0x170/0x3f0
[   85.136556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   85.142025]  kthread+0x328/0x630
[   85.145237]  ret_from_fork+0x10/0x20
[   85.148797] 
[   85.150282] CPU: 0 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   85.161390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   85.165550] Hardware name: WinLink E850-96 board (DT)
[   85.170587] ==================================================================
[   84.556840] ==================================================================
[   84.556985] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   84.556985] 
[   84.557144] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#129):
[   84.558039]  test_out_of_bounds_read+0x114/0x3e0
[   84.562639]  kunit_try_run_case+0x170/0x3f0
[   84.566805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.572274]  kthread+0x328/0x630
[   84.575486]  ret_from_fork+0x10/0x20
[   84.579045] 
[   84.580524] kfence-#129: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   84.580524] 
[   84.590158] allocated by task 368 on cpu 6 at 84.556804s (0.033352s ago):
[   84.596946]  test_alloc+0x29c/0x628
[   84.600399]  test_out_of_bounds_read+0xdc/0x3e0
[   84.604913]  kunit_try_run_case+0x170/0x3f0
[   84.609079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.614548]  kthread+0x328/0x630
[   84.617760]  ret_from_fork+0x10/0x20
[   84.621320] 
[   84.622805] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   84.633918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   84.638073] Hardware name: WinLink E850-96 board (DT)
[   84.643110] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   37.728318] ==================================================================
[   37.751012] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   37.751012] 
[   37.760559] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#60):
[   37.768545]  kmalloc_track_caller_oob_right+0x224/0x488
[   37.773753]  kunit_try_run_case+0x170/0x3f0
[   37.777920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.783388]  kthread+0x328/0x630
[   37.786600]  ret_from_fork+0x10/0x20
[   37.790159] 
[   37.791638] kfence-#60: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   37.791638] 
[   37.801362] allocated by task 223 on cpu 3 at 37.727961s (0.073397s ago):
[   37.808144]  kmalloc_track_caller_oob_right+0x184/0x488
[   37.813336]  kunit_try_run_case+0x170/0x3f0
[   37.817502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.822971]  kthread+0x328/0x630
[   37.826183]  ret_from_fork+0x10/0x20
[   37.829743] 
[   37.831218] freed by task 223 on cpu 3 at 37.728272s (0.102944s ago):
[   37.837661]  kmalloc_track_caller_oob_right+0x224/0x488
[   37.842849]  kunit_try_run_case+0x170/0x3f0
[   37.847016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.852485]  kthread+0x328/0x630
[   37.855696]  ret_from_fork+0x10/0x20
[   37.859257] 
[   37.860741] CPU: 3 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   37.871850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.876009] Hardware name: WinLink E850-96 board (DT)
[   37.881047] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   83.628439] ==================================================================
[   83.635543] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   83.642398] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   83.649949] 
[   83.651432] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.651481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.651497] Hardware name: WinLink E850-96 board (DT)
[   83.651517] Call trace:
[   83.651531]  show_stack+0x20/0x38 (C)
[   83.651567]  dump_stack_lvl+0x8c/0xd0
[   83.651599]  print_report+0x118/0x5d0
[   83.651628]  kasan_report+0xdc/0x128
[   83.651656]  kasan_check_range+0x100/0x1a8
[   83.651685]  __kasan_check_write+0x20/0x30
[   83.651715]  strncpy_from_user+0x3c/0x2a0
[   83.651748]  copy_user_test_oob+0x5c0/0xec8
[   83.651783]  kunit_try_run_case+0x170/0x3f0
[   83.651811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.651844]  kthread+0x328/0x630
[   83.651873]  ret_from_fork+0x10/0x20
[   83.651907] 
[   83.722865] Allocated by task 366:
[   83.726252]  kasan_save_stack+0x3c/0x68
[   83.730070]  kasan_save_track+0x20/0x40
[   83.733889]  kasan_save_alloc_info+0x40/0x58
[   83.738143]  __kasan_kmalloc+0xd4/0xd8
[   83.741875]  __kmalloc_noprof+0x198/0x4c8
[   83.745867]  kunit_kmalloc_array+0x34/0x88
[   83.749948]  copy_user_test_oob+0xac/0xec8
[   83.754028]  kunit_try_run_case+0x170/0x3f0
[   83.758194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.763663]  kthread+0x328/0x630
[   83.766874]  ret_from_fork+0x10/0x20
[   83.770434] 
[   83.771909] The buggy address belongs to the object at ffff000800de4900
[   83.771909]  which belongs to the cache kmalloc-128 of size 128
[   83.784409] The buggy address is located 0 bytes inside of
[   83.784409]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   83.796822] 
[   83.798299] The buggy address belongs to the physical page:
[   83.803857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   83.811839] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.819477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.826422] page_type: f5(slab)
[   83.829557] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.837279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.845006] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.852817] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.860630] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   83.868442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.876248] page dumped because: kasan: bad access detected
[   83.881803] 
[   83.883279] Memory state around the buggy address:
[   83.888057]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.895262]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.902467] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.909667]                                                                 ^
[   83.916789]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.923994]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.931195] ==================================================================
[   83.938678] ==================================================================
[   83.945607] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   83.952551] Write of size 1 at addr ffff000800de4978 by task kunit_try_catch/366
[   83.959927] 
[   83.961408] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.961460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.961477] Hardware name: WinLink E850-96 board (DT)
[   83.961496] Call trace:
[   83.961510]  show_stack+0x20/0x38 (C)
[   83.961544]  dump_stack_lvl+0x8c/0xd0
[   83.961580]  print_report+0x118/0x5d0
[   83.961607]  kasan_report+0xdc/0x128
[   83.961636]  __asan_report_store1_noabort+0x20/0x30
[   83.961669]  strncpy_from_user+0x270/0x2a0
[   83.961700]  copy_user_test_oob+0x5c0/0xec8
[   83.961735]  kunit_try_run_case+0x170/0x3f0
[   83.961766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.961799]  kthread+0x328/0x630
[   83.961828]  ret_from_fork+0x10/0x20
[   83.961859] 
[   84.029631] Allocated by task 366:
[   84.033021]  kasan_save_stack+0x3c/0x68
[   84.036836]  kasan_save_track+0x20/0x40
[   84.040655]  kasan_save_alloc_info+0x40/0x58
[   84.044909]  __kasan_kmalloc+0xd4/0xd8
[   84.048641]  __kmalloc_noprof+0x198/0x4c8
[   84.052634]  kunit_kmalloc_array+0x34/0x88
[   84.056714]  copy_user_test_oob+0xac/0xec8
[   84.060794]  kunit_try_run_case+0x170/0x3f0
[   84.064960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   84.070429]  kthread+0x328/0x630
[   84.073641]  ret_from_fork+0x10/0x20
[   84.077200] 
[   84.078675] The buggy address belongs to the object at ffff000800de4900
[   84.078675]  which belongs to the cache kmalloc-128 of size 128
[   84.091177] The buggy address is located 0 bytes to the right of
[   84.091177]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   84.104109] 
[   84.105588] The buggy address belongs to the physical page:
[   84.111144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   84.119126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   84.126766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   84.133709] page_type: f5(slab)
[   84.136845] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   84.144567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.152293] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   84.160104] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   84.167917] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   84.175729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   84.183535] page dumped because: kasan: bad access detected
[   84.189090] 
[   84.190566] Memory state around the buggy address:
[   84.195344]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   84.202549]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.209753] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   84.216955]                                                                 ^
[   84.224076]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.231281]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.238482] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   83.322358] ==================================================================
[   83.329470] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   83.336501] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   83.343964] 
[   83.345446] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.345500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.345517] Hardware name: WinLink E850-96 board (DT)
[   83.345537] Call trace:
[   83.345550]  show_stack+0x20/0x38 (C)
[   83.345580]  dump_stack_lvl+0x8c/0xd0
[   83.345614]  print_report+0x118/0x5d0
[   83.345640]  kasan_report+0xdc/0x128
[   83.345665]  kasan_check_range+0x100/0x1a8
[   83.345698]  __kasan_check_read+0x20/0x30
[   83.345727]  copy_user_test_oob+0x4a0/0xec8
[   83.345761]  kunit_try_run_case+0x170/0x3f0
[   83.345795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.345828]  kthread+0x328/0x630
[   83.345856]  ret_from_fork+0x10/0x20
[   83.345888] 
[   83.412800] Allocated by task 366:
[   83.416185]  kasan_save_stack+0x3c/0x68
[   83.420005]  kasan_save_track+0x20/0x40
[   83.423824]  kasan_save_alloc_info+0x40/0x58
[   83.428078]  __kasan_kmalloc+0xd4/0xd8
[   83.431810]  __kmalloc_noprof+0x198/0x4c8
[   83.435803]  kunit_kmalloc_array+0x34/0x88
[   83.439883]  copy_user_test_oob+0xac/0xec8
[   83.443963]  kunit_try_run_case+0x170/0x3f0
[   83.448129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.453598]  kthread+0x328/0x630
[   83.456810]  ret_from_fork+0x10/0x20
[   83.460369] 
[   83.461846] The buggy address belongs to the object at ffff000800de4900
[   83.461846]  which belongs to the cache kmalloc-128 of size 128
[   83.474345] The buggy address is located 0 bytes inside of
[   83.474345]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   83.486757] 
[   83.488235] The buggy address belongs to the physical page:
[   83.493792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   83.501775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.509413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.516357] page_type: f5(slab)
[   83.519490] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.527215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.534941] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.542753] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.550565] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   83.558377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.566183] page dumped because: kasan: bad access detected
[   83.571738] 
[   83.573214] Memory state around the buggy address:
[   83.577992]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.585197]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.592402] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.599603]                                                                 ^
[   83.606724]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.613929]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.621130] ==================================================================
[   81.786197] ==================================================================
[   81.798593] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   81.805621] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   81.813171] 
[   81.814659] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   81.814721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.814740] Hardware name: WinLink E850-96 board (DT)
[   81.814763] Call trace:
[   81.814777]  show_stack+0x20/0x38 (C)
[   81.814817]  dump_stack_lvl+0x8c/0xd0
[   81.814854]  print_report+0x118/0x5d0
[   81.814884]  kasan_report+0xdc/0x128
[   81.814911]  kasan_check_range+0x100/0x1a8
[   81.814944]  __kasan_check_write+0x20/0x30
[   81.814978]  copy_user_test_oob+0x234/0xec8
[   81.815014]  kunit_try_run_case+0x170/0x3f0
[   81.815045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.815082]  kthread+0x328/0x630
[   81.815111]  ret_from_fork+0x10/0x20
[   81.815147] 
[   81.882096] Allocated by task 366:
[   81.885480]  kasan_save_stack+0x3c/0x68
[   81.889298]  kasan_save_track+0x20/0x40
[   81.893118]  kasan_save_alloc_info+0x40/0x58
[   81.897371]  __kasan_kmalloc+0xd4/0xd8
[   81.901104]  __kmalloc_noprof+0x198/0x4c8
[   81.905097]  kunit_kmalloc_array+0x34/0x88
[   81.909178]  copy_user_test_oob+0xac/0xec8
[   81.913256]  kunit_try_run_case+0x170/0x3f0
[   81.917423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.922892]  kthread+0x328/0x630
[   81.926104]  ret_from_fork+0x10/0x20
[   81.929662] 
[   81.931140] The buggy address belongs to the object at ffff000800de4900
[   81.931140]  which belongs to the cache kmalloc-128 of size 128
[   81.943641] The buggy address is located 0 bytes inside of
[   81.943641]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   81.956051] 
[   81.957531] The buggy address belongs to the physical page:
[   81.963087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   81.971070] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   81.978711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   81.985652] page_type: f5(slab)
[   81.988789] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   81.996509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.004238] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.012046] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.019859] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.027671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.035478] page dumped because: kasan: bad access detected
[   82.041032] 
[   82.042508] Memory state around the buggy address:
[   82.047289]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.054492]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.061695] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.068896]                                                                 ^
[   82.076018]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.083224]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.090426] ==================================================================
[   82.710049] ==================================================================
[   82.717152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   82.724183] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   82.731647] 
[   82.733131] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   82.733183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.733200] Hardware name: WinLink E850-96 board (DT)
[   82.733222] Call trace:
[   82.733234]  show_stack+0x20/0x38 (C)
[   82.733269]  dump_stack_lvl+0x8c/0xd0
[   82.733304]  print_report+0x118/0x5d0
[   82.733332]  kasan_report+0xdc/0x128
[   82.733358]  kasan_check_range+0x100/0x1a8
[   82.733388]  __kasan_check_read+0x20/0x30
[   82.733417]  copy_user_test_oob+0x3c8/0xec8
[   82.733451]  kunit_try_run_case+0x170/0x3f0
[   82.733482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.733516]  kthread+0x328/0x630
[   82.733542]  ret_from_fork+0x10/0x20
[   82.733572] 
[   82.800483] Allocated by task 366:
[   82.803869]  kasan_save_stack+0x3c/0x68
[   82.807688]  kasan_save_track+0x20/0x40
[   82.811507]  kasan_save_alloc_info+0x40/0x58
[   82.815760]  __kasan_kmalloc+0xd4/0xd8
[   82.819493]  __kmalloc_noprof+0x198/0x4c8
[   82.823486]  kunit_kmalloc_array+0x34/0x88
[   82.827566]  copy_user_test_oob+0xac/0xec8
[   82.831646]  kunit_try_run_case+0x170/0x3f0
[   82.835812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.841281]  kthread+0x328/0x630
[   82.844493]  ret_from_fork+0x10/0x20
[   82.848052] 
[   82.849529] The buggy address belongs to the object at ffff000800de4900
[   82.849529]  which belongs to the cache kmalloc-128 of size 128
[   82.862028] The buggy address is located 0 bytes inside of
[   82.862028]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   82.874440] 
[   82.875918] The buggy address belongs to the physical page:
[   82.881475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   82.889457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.897096] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.904040] page_type: f5(slab)
[   82.907175] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.914898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.922624] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.930435] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.938248] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.946060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.953865] page dumped because: kasan: bad access detected
[   82.959421] 
[   82.960897] Memory state around the buggy address:
[   82.965679]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.972880]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.980085] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.987286]                                                                 ^
[   82.994407]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.001612]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.008813] ==================================================================
[   82.097926] ==================================================================
[   82.104841] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   82.111865] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   82.119330] 
[   82.120815] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   82.120870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.120891] Hardware name: WinLink E850-96 board (DT)
[   82.120911] Call trace:
[   82.120926]  show_stack+0x20/0x38 (C)
[   82.120963]  dump_stack_lvl+0x8c/0xd0
[   82.121000]  print_report+0x118/0x5d0
[   82.121030]  kasan_report+0xdc/0x128
[   82.121059]  kasan_check_range+0x100/0x1a8
[   82.121090]  __kasan_check_read+0x20/0x30
[   82.121121]  copy_user_test_oob+0x728/0xec8
[   82.121155]  kunit_try_run_case+0x170/0x3f0
[   82.121187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.121225]  kthread+0x328/0x630
[   82.121254]  ret_from_fork+0x10/0x20
[   82.121290] 
[   82.188167] Allocated by task 366:
[   82.191554]  kasan_save_stack+0x3c/0x68
[   82.195372]  kasan_save_track+0x20/0x40
[   82.199190]  kasan_save_alloc_info+0x40/0x58
[   82.203443]  __kasan_kmalloc+0xd4/0xd8
[   82.207176]  __kmalloc_noprof+0x198/0x4c8
[   82.211169]  kunit_kmalloc_array+0x34/0x88
[   82.215248]  copy_user_test_oob+0xac/0xec8
[   82.219328]  kunit_try_run_case+0x170/0x3f0
[   82.223495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.228964]  kthread+0x328/0x630
[   82.232175]  ret_from_fork+0x10/0x20
[   82.235735] 
[   82.237211] The buggy address belongs to the object at ffff000800de4900
[   82.237211]  which belongs to the cache kmalloc-128 of size 128
[   82.249711] The buggy address is located 0 bytes inside of
[   82.249711]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   82.262123] 
[   82.263602] The buggy address belongs to the physical page:
[   82.269159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   82.277142] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.284781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.291724] page_type: f5(slab)
[   82.294860] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.302580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.310308] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.318118] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.325931] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.333743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.341550] page dumped because: kasan: bad access detected
[   82.347104] 
[   82.348580] Memory state around the buggy address:
[   82.353359]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.360563]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.367768] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.374968]                                                                 ^
[   82.382090]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.389294]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.396496] ==================================================================
[   82.404010] ==================================================================
[   82.410910] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   82.417938] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   82.425488] 
[   82.426973] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   82.427033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.427051] Hardware name: WinLink E850-96 board (DT)
[   82.427073] Call trace:
[   82.427087]  show_stack+0x20/0x38 (C)
[   82.427121]  dump_stack_lvl+0x8c/0xd0
[   82.427158]  print_report+0x118/0x5d0
[   82.427186]  kasan_report+0xdc/0x128
[   82.427211]  kasan_check_range+0x100/0x1a8
[   82.427242]  __kasan_check_write+0x20/0x30
[   82.427271]  copy_user_test_oob+0x35c/0xec8
[   82.427306]  kunit_try_run_case+0x170/0x3f0
[   82.427338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.427373]  kthread+0x328/0x630
[   82.427401]  ret_from_fork+0x10/0x20
[   82.427436] 
[   82.494414] Allocated by task 366:
[   82.497800]  kasan_save_stack+0x3c/0x68
[   82.501616]  kasan_save_track+0x20/0x40
[   82.505435]  kasan_save_alloc_info+0x40/0x58
[   82.509689]  __kasan_kmalloc+0xd4/0xd8
[   82.513421]  __kmalloc_noprof+0x198/0x4c8
[   82.517414]  kunit_kmalloc_array+0x34/0x88
[   82.521494]  copy_user_test_oob+0xac/0xec8
[   82.525574]  kunit_try_run_case+0x170/0x3f0
[   82.529740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   82.535209]  kthread+0x328/0x630
[   82.538421]  ret_from_fork+0x10/0x20
[   82.541979] 
[   82.543457] The buggy address belongs to the object at ffff000800de4900
[   82.543457]  which belongs to the cache kmalloc-128 of size 128
[   82.555955] The buggy address is located 0 bytes inside of
[   82.555955]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   82.568368] 
[   82.569847] The buggy address belongs to the physical page:
[   82.575404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   82.583387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   82.591027] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   82.597970] page_type: f5(slab)
[   82.601107] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.608826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.616552] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   82.624363] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   82.632176] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   82.639988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   82.647795] page dumped because: kasan: bad access detected
[   82.653349] 
[   82.654825] Memory state around the buggy address:
[   82.659606]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   82.666810]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.674012] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   82.681214]                                                                 ^
[   82.688335]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.695541]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.702743] ==================================================================
[   83.016199] ==================================================================
[   83.023225] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   83.030256] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366
[   83.037806] 
[   83.039289] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   83.039341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.039360] Hardware name: WinLink E850-96 board (DT)
[   83.039379] Call trace:
[   83.039392]  show_stack+0x20/0x38 (C)
[   83.039425]  dump_stack_lvl+0x8c/0xd0
[   83.039460]  print_report+0x118/0x5d0
[   83.039486]  kasan_report+0xdc/0x128
[   83.039513]  kasan_check_range+0x100/0x1a8
[   83.039543]  __kasan_check_write+0x20/0x30
[   83.039572]  copy_user_test_oob+0x434/0xec8
[   83.039606]  kunit_try_run_case+0x170/0x3f0
[   83.039637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.039675]  kthread+0x328/0x630
[   83.039703]  ret_from_fork+0x10/0x20
[   83.039735] 
[   83.106728] Allocated by task 366:
[   83.110117]  kasan_save_stack+0x3c/0x68
[   83.113933]  kasan_save_track+0x20/0x40
[   83.117752]  kasan_save_alloc_info+0x40/0x58
[   83.122006]  __kasan_kmalloc+0xd4/0xd8
[   83.125738]  __kmalloc_noprof+0x198/0x4c8
[   83.129731]  kunit_kmalloc_array+0x34/0x88
[   83.133811]  copy_user_test_oob+0xac/0xec8
[   83.137891]  kunit_try_run_case+0x170/0x3f0
[   83.142057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   83.147526]  kthread+0x328/0x630
[   83.150738]  ret_from_fork+0x10/0x20
[   83.154297] 
[   83.155774] The buggy address belongs to the object at ffff000800de4900
[   83.155774]  which belongs to the cache kmalloc-128 of size 128
[   83.168274] The buggy address is located 0 bytes inside of
[   83.168274]  allocated 120-byte region [ffff000800de4900, ffff000800de4978)
[   83.180685] 
[   83.182163] The buggy address belongs to the physical page:
[   83.187721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4
[   83.195704] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   83.203341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   83.210286] page_type: f5(slab)
[   83.213419] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.221143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.228870] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   83.236681] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   83.244494] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff
[   83.252305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   83.260112] page dumped because: kasan: bad access detected
[   83.265667] 
[   83.267142] Memory state around the buggy address:
[   83.271920]  ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   83.279125]  ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.286330] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   83.293531]                                                                 ^
[   83.300652]  ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.307857]  ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.315058] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   80.734994] ==================================================================
[   80.749391] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   80.756071] Read of size 1 at addr ffff800087c8d7f3 by task kunit_try_catch/350
[   80.763361] 
[   80.764845] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.764902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.764920] Hardware name: WinLink E850-96 board (DT)
[   80.764942] Call trace:
[   80.764959]  show_stack+0x20/0x38 (C)
[   80.764996]  dump_stack_lvl+0x8c/0xd0
[   80.765032]  print_report+0x310/0x5d0
[   80.765061]  kasan_report+0xdc/0x128
[   80.765089]  __asan_report_load1_noabort+0x20/0x30
[   80.765124]  vmalloc_oob+0x578/0x5d0
[   80.765158]  kunit_try_run_case+0x170/0x3f0
[   80.765191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.765229]  kthread+0x328/0x630
[   80.765258]  ret_from_fork+0x10/0x20
[   80.765295] 
[   80.828294] The buggy address ffff800087c8d7f3 belongs to a vmalloc virtual mapping
[   80.835933] The buggy address belongs to the physical page:
[   80.841489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   80.849473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.855995] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   80.863713] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   80.871434] page dumped because: kasan: bad access detected
[   80.876987] 
[   80.878463] Memory state around the buggy address:
[   80.883242]  ffff800087c8d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.890446]  ffff800087c8d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.897650] >ffff800087c8d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   80.904852]                                                              ^
[   80.911714]  ffff800087c8d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.918917]  ffff800087c8d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.926120] ==================================================================
[   80.933433] ==================================================================
[   80.940531] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   80.947212] Read of size 1 at addr ffff800087c8d7f8 by task kunit_try_catch/350
[   80.954504] 
[   80.955986] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.956042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.956057] Hardware name: WinLink E850-96 board (DT)
[   80.956076] Call trace:
[   80.956088]  show_stack+0x20/0x38 (C)
[   80.956119]  dump_stack_lvl+0x8c/0xd0
[   80.956156]  print_report+0x310/0x5d0
[   80.956185]  kasan_report+0xdc/0x128
[   80.956212]  __asan_report_load1_noabort+0x20/0x30
[   80.956244]  vmalloc_oob+0x51c/0x5d0
[   80.956275]  kunit_try_run_case+0x170/0x3f0
[   80.956306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.956342]  kthread+0x328/0x630
[   80.956373]  ret_from_fork+0x10/0x20
[   80.956408] 
[   81.019435] The buggy address ffff800087c8d7f8 belongs to a vmalloc virtual mapping
[   81.027076] The buggy address belongs to the physical page:
[   81.032632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   81.040615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   81.047135] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   81.054856] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   81.062575] page dumped because: kasan: bad access detected
[   81.068130] 
[   81.069606] Memory state around the buggy address:
[   81.074387]  ffff800087c8d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.081589]  ffff800087c8d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.088793] >ffff800087c8d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   81.095995]                                                                 ^
[   81.103116]  ffff800087c8d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.110321]  ffff800087c8d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.117522] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   75.442131] ==================================================================
[   75.449206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   75.456583] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.463961] 
[   75.465442] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.465492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.465508] Hardware name: WinLink E850-96 board (DT)
[   75.465525] Call trace:
[   75.465537]  show_stack+0x20/0x38 (C)
[   75.465569]  dump_stack_lvl+0x8c/0xd0
[   75.465600]  print_report+0x118/0x5d0
[   75.465627]  kasan_report+0xdc/0x128
[   75.465655]  kasan_check_range+0x100/0x1a8
[   75.465684]  __kasan_check_write+0x20/0x30
[   75.465713]  kasan_atomics_helper+0x1128/0x4858
[   75.465749]  kasan_atomics+0x198/0x2e0
[   75.465780]  kunit_try_run_case+0x170/0x3f0
[   75.465811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.465848]  kthread+0x328/0x630
[   75.465874]  ret_from_fork+0x10/0x20
[   75.465904] 
[   75.536964] Allocated by task 346:
[   75.540350]  kasan_save_stack+0x3c/0x68
[   75.544168]  kasan_save_track+0x20/0x40
[   75.547988]  kasan_save_alloc_info+0x40/0x58
[   75.552241]  __kasan_kmalloc+0xd4/0xd8
[   75.555973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.560487]  kasan_atomics+0xb8/0x2e0
[   75.564133]  kunit_try_run_case+0x170/0x3f0
[   75.568300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.573768]  kthread+0x328/0x630
[   75.576980]  ret_from_fork+0x10/0x20
[   75.580539] 
[   75.582014] The buggy address belongs to the object at ffff00080851b080
[   75.582014]  which belongs to the cache kmalloc-64 of size 64
[   75.594342] The buggy address is located 0 bytes to the right of
[   75.594342]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.607188] 
[   75.608664] The buggy address belongs to the physical page:
[   75.614222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.628716] page_type: f5(slab)
[   75.631848] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.639573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.647291] page dumped because: kasan: bad access detected
[   75.652847] 
[   75.654322] Memory state around the buggy address:
[   75.659101]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.666305]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.673511] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.680711]                                      ^
[   75.685489]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.692694]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.699895] ==================================================================
[   67.255472] ==================================================================
[   67.262523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   67.269815] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.277192] 
[   67.278673] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.278724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.278741] Hardware name: WinLink E850-96 board (DT)
[   67.278760] Call trace:
[   67.278773]  show_stack+0x20/0x38 (C)
[   67.278804]  dump_stack_lvl+0x8c/0xd0
[   67.278837]  print_report+0x118/0x5d0
[   67.278864]  kasan_report+0xdc/0x128
[   67.278890]  kasan_check_range+0x100/0x1a8
[   67.278920]  __kasan_check_write+0x20/0x30
[   67.278951]  kasan_atomics_helper+0x61c/0x4858
[   67.278982]  kasan_atomics+0x198/0x2e0
[   67.279015]  kunit_try_run_case+0x170/0x3f0
[   67.279046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.279080]  kthread+0x328/0x630
[   67.279106]  ret_from_fork+0x10/0x20
[   67.279135] 
[   67.350107] Allocated by task 346:
[   67.353494]  kasan_save_stack+0x3c/0x68
[   67.357312]  kasan_save_track+0x20/0x40
[   67.361131]  kasan_save_alloc_info+0x40/0x58
[   67.365385]  __kasan_kmalloc+0xd4/0xd8
[   67.369117]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.373631]  kasan_atomics+0xb8/0x2e0
[   67.377277]  kunit_try_run_case+0x170/0x3f0
[   67.381443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.386912]  kthread+0x328/0x630
[   67.390124]  ret_from_fork+0x10/0x20
[   67.393683] 
[   67.395158] The buggy address belongs to the object at ffff00080851b080
[   67.395158]  which belongs to the cache kmalloc-64 of size 64
[   67.407485] The buggy address is located 0 bytes to the right of
[   67.407485]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.420332] 
[   67.421809] The buggy address belongs to the physical page:
[   67.427365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.435350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.441859] page_type: f5(slab)
[   67.444994] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.452716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.460435] page dumped because: kasan: bad access detected
[   67.465991] 
[   67.467466] Memory state around the buggy address:
[   67.472244]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.479449]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.486654] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.493855]                                      ^
[   67.498633]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.505838]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.513039] ==================================================================
[   69.106637] ==================================================================
[   69.113711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   69.121001] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.128379] 
[   69.129860] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.129910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.129927] Hardware name: WinLink E850-96 board (DT)
[   69.129944] Call trace:
[   69.129957]  show_stack+0x20/0x38 (C)
[   69.129988]  dump_stack_lvl+0x8c/0xd0
[   69.130021]  print_report+0x118/0x5d0
[   69.130048]  kasan_report+0xdc/0x128
[   69.130077]  kasan_check_range+0x100/0x1a8
[   69.130107]  __kasan_check_write+0x20/0x30
[   69.130137]  kasan_atomics_helper+0x934/0x4858
[   69.130172]  kasan_atomics+0x198/0x2e0
[   69.130204]  kunit_try_run_case+0x170/0x3f0
[   69.130233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.130267]  kthread+0x328/0x630
[   69.130293]  ret_from_fork+0x10/0x20
[   69.130323] 
[   69.201294] Allocated by task 346:
[   69.204682]  kasan_save_stack+0x3c/0x68
[   69.208499]  kasan_save_track+0x20/0x40
[   69.212318]  kasan_save_alloc_info+0x40/0x58
[   69.216572]  __kasan_kmalloc+0xd4/0xd8
[   69.220305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.224819]  kasan_atomics+0xb8/0x2e0
[   69.228464]  kunit_try_run_case+0x170/0x3f0
[   69.232631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.238100]  kthread+0x328/0x630
[   69.241311]  ret_from_fork+0x10/0x20
[   69.244870] 
[   69.246346] The buggy address belongs to the object at ffff00080851b080
[   69.246346]  which belongs to the cache kmalloc-64 of size 64
[   69.258672] The buggy address is located 0 bytes to the right of
[   69.258672]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.271519] 
[   69.272995] The buggy address belongs to the physical page:
[   69.278551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.286538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.293046] page_type: f5(slab)
[   69.296179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.303904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.311623] page dumped because: kasan: bad access detected
[   69.317178] 
[   69.318654] Memory state around the buggy address:
[   69.323432]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.330637]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.337841] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.345042]                                      ^
[   69.349821]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.357025]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.364226] ==================================================================
[   73.063867] ==================================================================
[   73.070943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   73.078320] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.085611] 
[   73.087093] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.087141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.087156] Hardware name: WinLink E850-96 board (DT)
[   73.087175] Call trace:
[   73.087186]  show_stack+0x20/0x38 (C)
[   73.087216]  dump_stack_lvl+0x8c/0xd0
[   73.087249]  print_report+0x118/0x5d0
[   73.087277]  kasan_report+0xdc/0x128
[   73.087304]  __asan_report_load8_noabort+0x20/0x30
[   73.087337]  kasan_atomics_helper+0x3f58/0x4858
[   73.087374]  kasan_atomics+0x198/0x2e0
[   73.087405]  kunit_try_run_case+0x170/0x3f0
[   73.087435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.087468]  kthread+0x328/0x630
[   73.087494]  ret_from_fork+0x10/0x20
[   73.087527] 
[   73.155228] Allocated by task 346:
[   73.158615]  kasan_save_stack+0x3c/0x68
[   73.162433]  kasan_save_track+0x20/0x40
[   73.166253]  kasan_save_alloc_info+0x40/0x58
[   73.170506]  __kasan_kmalloc+0xd4/0xd8
[   73.174238]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.178752]  kasan_atomics+0xb8/0x2e0
[   73.182398]  kunit_try_run_case+0x170/0x3f0
[   73.186565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.192034]  kthread+0x328/0x630
[   73.195245]  ret_from_fork+0x10/0x20
[   73.198804] 
[   73.200280] The buggy address belongs to the object at ffff00080851b080
[   73.200280]  which belongs to the cache kmalloc-64 of size 64
[   73.212606] The buggy address is located 0 bytes to the right of
[   73.212606]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   73.225453] 
[   73.226929] The buggy address belongs to the physical page:
[   73.232485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   73.240470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.246980] page_type: f5(slab)
[   73.250113] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.257838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.265557] page dumped because: kasan: bad access detected
[   73.271112] 
[   73.272588] Memory state around the buggy address:
[   73.277366]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.284570]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.291775] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.298976]                                      ^
[   73.303754]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.310959]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.318160] ==================================================================
[   76.237430] ==================================================================
[   76.244506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   76.251884] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   76.259261] 
[   76.260742] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   76.260791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.260806] Hardware name: WinLink E850-96 board (DT)
[   76.260825] Call trace:
[   76.260838]  show_stack+0x20/0x38 (C)
[   76.260869]  dump_stack_lvl+0x8c/0xd0
[   76.260901]  print_report+0x118/0x5d0
[   76.260929]  kasan_report+0xdc/0x128
[   76.260957]  kasan_check_range+0x100/0x1a8
[   76.260987]  __kasan_check_write+0x20/0x30
[   76.261019]  kasan_atomics_helper+0x126c/0x4858
[   76.261055]  kasan_atomics+0x198/0x2e0
[   76.261088]  kunit_try_run_case+0x170/0x3f0
[   76.261117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.261150]  kthread+0x328/0x630
[   76.261176]  ret_from_fork+0x10/0x20
[   76.261204] 
[   76.332264] Allocated by task 346:
[   76.335651]  kasan_save_stack+0x3c/0x68
[   76.339469]  kasan_save_track+0x20/0x40
[   76.343288]  kasan_save_alloc_info+0x40/0x58
[   76.347541]  __kasan_kmalloc+0xd4/0xd8
[   76.351274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.355788]  kasan_atomics+0xb8/0x2e0
[   76.359434]  kunit_try_run_case+0x170/0x3f0
[   76.363600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.369069]  kthread+0x328/0x630
[   76.372281]  ret_from_fork+0x10/0x20
[   76.375840] 
[   76.377315] The buggy address belongs to the object at ffff00080851b080
[   76.377315]  which belongs to the cache kmalloc-64 of size 64
[   76.389642] The buggy address is located 0 bytes to the right of
[   76.389642]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.402488] 
[   76.403964] The buggy address belongs to the physical page:
[   76.409523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.417506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.424016] page_type: f5(slab)
[   76.427149] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.434873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.442592] page dumped because: kasan: bad access detected
[   76.448148] 
[   76.449623] Memory state around the buggy address:
[   76.454401]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.461606]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.468811] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.476012]                                      ^
[   76.480790]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.487995]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.495196] ==================================================================
[   67.785320] ==================================================================
[   67.792376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   67.799667] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.807045] 
[   67.808527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.808577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.808591] Hardware name: WinLink E850-96 board (DT)
[   67.808609] Call trace:
[   67.808622]  show_stack+0x20/0x38 (C)
[   67.808652]  dump_stack_lvl+0x8c/0xd0
[   67.808684]  print_report+0x118/0x5d0
[   67.808712]  kasan_report+0xdc/0x128
[   67.808739]  kasan_check_range+0x100/0x1a8
[   67.808769]  __kasan_check_write+0x20/0x30
[   67.808799]  kasan_atomics_helper+0x6ec/0x4858
[   67.808834]  kasan_atomics+0x198/0x2e0
[   67.808866]  kunit_try_run_case+0x170/0x3f0
[   67.808896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.808929]  kthread+0x328/0x630
[   67.808956]  ret_from_fork+0x10/0x20
[   67.808989] 
[   67.879960] Allocated by task 346:
[   67.883347]  kasan_save_stack+0x3c/0x68
[   67.887165]  kasan_save_track+0x20/0x40
[   67.890985]  kasan_save_alloc_info+0x40/0x58
[   67.895238]  __kasan_kmalloc+0xd4/0xd8
[   67.898971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.903484]  kasan_atomics+0xb8/0x2e0
[   67.907130]  kunit_try_run_case+0x170/0x3f0
[   67.911297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.916765]  kthread+0x328/0x630
[   67.919977]  ret_from_fork+0x10/0x20
[   67.923536] 
[   67.925012] The buggy address belongs to the object at ffff00080851b080
[   67.925012]  which belongs to the cache kmalloc-64 of size 64
[   67.937338] The buggy address is located 0 bytes to the right of
[   67.937338]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.950185] 
[   67.951661] The buggy address belongs to the physical page:
[   67.957218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.965202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.971712] page_type: f5(slab)
[   67.974845] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.982570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.990288] page dumped because: kasan: bad access detected
[   67.995844] 
[   67.997319] Memory state around the buggy address:
[   68.002099]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.009302]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.016507] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.023708]                                      ^
[   68.028486]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.035691]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.042892] ==================================================================
[   77.032856] ==================================================================
[   77.039809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   77.047186] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.054475] 
[   77.055959] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.056008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.056025] Hardware name: WinLink E850-96 board (DT)
[   77.056044] Call trace:
[   77.056058]  show_stack+0x20/0x38 (C)
[   77.056093]  dump_stack_lvl+0x8c/0xd0
[   77.056127]  print_report+0x118/0x5d0
[   77.056157]  kasan_report+0xdc/0x128
[   77.056185]  __asan_report_load8_noabort+0x20/0x30
[   77.056216]  kasan_atomics_helper+0x3f04/0x4858
[   77.056251]  kasan_atomics+0x198/0x2e0
[   77.056283]  kunit_try_run_case+0x170/0x3f0
[   77.056313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.056346]  kthread+0x328/0x630
[   77.056372]  ret_from_fork+0x10/0x20
[   77.056404] 
[   77.124093] Allocated by task 346:
[   77.127479]  kasan_save_stack+0x3c/0x68
[   77.131297]  kasan_save_track+0x20/0x40
[   77.135117]  kasan_save_alloc_info+0x40/0x58
[   77.139370]  __kasan_kmalloc+0xd4/0xd8
[   77.143103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.147616]  kasan_atomics+0xb8/0x2e0
[   77.151262]  kunit_try_run_case+0x170/0x3f0
[   77.155429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.160898]  kthread+0x328/0x630
[   77.164109]  ret_from_fork+0x10/0x20
[   77.167668] 
[   77.169144] The buggy address belongs to the object at ffff00080851b080
[   77.169144]  which belongs to the cache kmalloc-64 of size 64
[   77.181470] The buggy address is located 0 bytes to the right of
[   77.181470]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.194317] 
[   77.195795] The buggy address belongs to the physical page:
[   77.201351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   77.209334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.215844] page_type: f5(slab)
[   77.218979] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.226702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.234420] page dumped because: kasan: bad access detected
[   77.239976] 
[   77.241451] Memory state around the buggy address:
[   77.246230]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.253434]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.260639] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.267840]                                      ^
[   77.272618]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.279823]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.287024] ==================================================================
[   79.408197] ==================================================================
[   79.415292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   79.422671] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.430047] 
[   79.431527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.431575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.431592] Hardware name: WinLink E850-96 board (DT)
[   79.431610] Call trace:
[   79.431623]  show_stack+0x20/0x38 (C)
[   79.431654]  dump_stack_lvl+0x8c/0xd0
[   79.431688]  print_report+0x118/0x5d0
[   79.431716]  kasan_report+0xdc/0x128
[   79.431743]  kasan_check_range+0x100/0x1a8
[   79.431772]  __kasan_check_write+0x20/0x30
[   79.431803]  kasan_atomics_helper+0x16d0/0x4858
[   79.431838]  kasan_atomics+0x198/0x2e0
[   79.431869]  kunit_try_run_case+0x170/0x3f0
[   79.431897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.431933]  kthread+0x328/0x630
[   79.431959]  ret_from_fork+0x10/0x20
[   79.431988] 
[   79.503050] Allocated by task 346:
[   79.506437]  kasan_save_stack+0x3c/0x68
[   79.510255]  kasan_save_track+0x20/0x40
[   79.514074]  kasan_save_alloc_info+0x40/0x58
[   79.518327]  __kasan_kmalloc+0xd4/0xd8
[   79.522060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.526574]  kasan_atomics+0xb8/0x2e0
[   79.530220]  kunit_try_run_case+0x170/0x3f0
[   79.534386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.539855]  kthread+0x328/0x630
[   79.543067]  ret_from_fork+0x10/0x20
[   79.546625] 
[   79.548101] The buggy address belongs to the object at ffff00080851b080
[   79.548101]  which belongs to the cache kmalloc-64 of size 64
[   79.560427] The buggy address is located 0 bytes to the right of
[   79.560427]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.573274] 
[   79.574750] The buggy address belongs to the physical page:
[   79.580307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.588293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.594802] page_type: f5(slab)
[   79.597934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.605659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.613378] page dumped because: kasan: bad access detected
[   79.618933] 
[   79.620409] Memory state around the buggy address:
[   79.625187]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.632392]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.639596] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.646797]                                      ^
[   79.651576]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.658780]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.665981] ==================================================================
[   73.325521] ==================================================================
[   73.332571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   73.339861] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.347239] 
[   73.348722] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.348769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.348784] Hardware name: WinLink E850-96 board (DT)
[   73.348801] Call trace:
[   73.348813]  show_stack+0x20/0x38 (C)
[   73.348843]  dump_stack_lvl+0x8c/0xd0
[   73.348876]  print_report+0x118/0x5d0
[   73.348906]  kasan_report+0xdc/0x128
[   73.348932]  kasan_check_range+0x100/0x1a8
[   73.348961]  __kasan_check_write+0x20/0x30
[   73.348991]  kasan_atomics_helper+0xe44/0x4858
[   73.349025]  kasan_atomics+0x198/0x2e0
[   73.349058]  kunit_try_run_case+0x170/0x3f0
[   73.349088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.349124]  kthread+0x328/0x630
[   73.349150]  ret_from_fork+0x10/0x20
[   73.349179] 
[   73.420155] Allocated by task 346:
[   73.423542]  kasan_save_stack+0x3c/0x68
[   73.427360]  kasan_save_track+0x20/0x40
[   73.431179]  kasan_save_alloc_info+0x40/0x58
[   73.435433]  __kasan_kmalloc+0xd4/0xd8
[   73.439165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.443679]  kasan_atomics+0xb8/0x2e0
[   73.447325]  kunit_try_run_case+0x170/0x3f0
[   73.451491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.456960]  kthread+0x328/0x630
[   73.460172]  ret_from_fork+0x10/0x20
[   73.463731] 
[   73.465206] The buggy address belongs to the object at ffff00080851b080
[   73.465206]  which belongs to the cache kmalloc-64 of size 64
[   73.477533] The buggy address is located 0 bytes to the right of
[   73.477533]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   73.490379] 
[   73.491855] The buggy address belongs to the physical page:
[   73.497413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   73.505397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.511907] page_type: f5(slab)
[   73.515040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.522764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.530483] page dumped because: kasan: bad access detected
[   73.536038] 
[   73.537514] Memory state around the buggy address:
[   73.542292]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.549497]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.556702] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.563903]                                      ^
[   73.568681]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.575885]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.583087] ==================================================================
[   64.347843] ==================================================================
[   64.354928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   64.362220] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.369596] 
[   64.371079] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.371132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.371148] Hardware name: WinLink E850-96 board (DT)
[   64.371168] Call trace:
[   64.371182]  show_stack+0x20/0x38 (C)
[   64.371216]  dump_stack_lvl+0x8c/0xd0
[   64.371252]  print_report+0x118/0x5d0
[   64.371279]  kasan_report+0xdc/0x128
[   64.371306]  kasan_check_range+0x100/0x1a8
[   64.371337]  __kasan_check_write+0x20/0x30
[   64.371367]  kasan_atomics_helper+0x24c/0x4858
[   64.371400]  kasan_atomics+0x198/0x2e0
[   64.371431]  kunit_try_run_case+0x170/0x3f0
[   64.371464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.371498]  kthread+0x328/0x630
[   64.371524]  ret_from_fork+0x10/0x20
[   64.371553] 
[   64.442512] Allocated by task 346:
[   64.445901]  kasan_save_stack+0x3c/0x68
[   64.449717]  kasan_save_track+0x20/0x40
[   64.453536]  kasan_save_alloc_info+0x40/0x58
[   64.457789]  __kasan_kmalloc+0xd4/0xd8
[   64.461522]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.466036]  kasan_atomics+0xb8/0x2e0
[   64.469681]  kunit_try_run_case+0x170/0x3f0
[   64.473848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.479317]  kthread+0x328/0x630
[   64.482529]  ret_from_fork+0x10/0x20
[   64.486088] 
[   64.487565] The buggy address belongs to the object at ffff00080851b080
[   64.487565]  which belongs to the cache kmalloc-64 of size 64
[   64.499890] The buggy address is located 0 bytes to the right of
[   64.499890]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   64.512737] 
[   64.514214] The buggy address belongs to the physical page:
[   64.519771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   64.527754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.534264] page_type: f5(slab)
[   64.537397] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.545121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.552840] page dumped because: kasan: bad access detected
[   64.558395] 
[   64.559872] Memory state around the buggy address:
[   64.564654]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.571854]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.579059] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.586260]                                      ^
[   64.591037]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.598242]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.605443] ==================================================================
[   77.824557] ==================================================================
[   77.831636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   77.839013] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.846391] 
[   77.847873] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.847920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.847937] Hardware name: WinLink E850-96 board (DT)
[   77.847954] Call trace:
[   77.847969]  show_stack+0x20/0x38 (C)
[   77.848000]  dump_stack_lvl+0x8c/0xd0
[   77.848031]  print_report+0x118/0x5d0
[   77.848060]  kasan_report+0xdc/0x128
[   77.848089]  kasan_check_range+0x100/0x1a8
[   77.848120]  __kasan_check_write+0x20/0x30
[   77.848151]  kasan_atomics_helper+0x14e4/0x4858
[   77.848186]  kasan_atomics+0x198/0x2e0
[   77.848218]  kunit_try_run_case+0x170/0x3f0
[   77.848248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.848282]  kthread+0x328/0x630
[   77.848309]  ret_from_fork+0x10/0x20
[   77.848339] 
[   77.919393] Allocated by task 346:
[   77.922781]  kasan_save_stack+0x3c/0x68
[   77.926598]  kasan_save_track+0x20/0x40
[   77.930417]  kasan_save_alloc_info+0x40/0x58
[   77.934670]  __kasan_kmalloc+0xd4/0xd8
[   77.938403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.942917]  kasan_atomics+0xb8/0x2e0
[   77.946563]  kunit_try_run_case+0x170/0x3f0
[   77.950729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.956198]  kthread+0x328/0x630
[   77.959410]  ret_from_fork+0x10/0x20
[   77.962969] 
[   77.964444] The buggy address belongs to the object at ffff00080851b080
[   77.964444]  which belongs to the cache kmalloc-64 of size 64
[   77.976771] The buggy address is located 0 bytes to the right of
[   77.976771]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.989617] 
[   77.991093] The buggy address belongs to the physical page:
[   77.996649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.004635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.011145] page_type: f5(slab)
[   78.014278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.022002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.029721] page dumped because: kasan: bad access detected
[   78.035277] 
[   78.036752] Memory state around the buggy address:
[   78.041530]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.048735]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.055940] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.063141]                                      ^
[   78.067919]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.075124]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.082324] ==================================================================
[   68.050234] ==================================================================
[   68.057303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   68.064593] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.071971] 
[   68.073451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.073500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.073516] Hardware name: WinLink E850-96 board (DT)
[   68.073534] Call trace:
[   68.073545]  show_stack+0x20/0x38 (C)
[   68.073576]  dump_stack_lvl+0x8c/0xd0
[   68.073608]  print_report+0x118/0x5d0
[   68.073636]  kasan_report+0xdc/0x128
[   68.073664]  kasan_check_range+0x100/0x1a8
[   68.073692]  __kasan_check_write+0x20/0x30
[   68.073723]  kasan_atomics_helper+0x760/0x4858
[   68.073756]  kasan_atomics+0x198/0x2e0
[   68.073791]  kunit_try_run_case+0x170/0x3f0
[   68.073820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.073852]  kthread+0x328/0x630
[   68.073879]  ret_from_fork+0x10/0x20
[   68.073911] 
[   68.144887] Allocated by task 346:
[   68.148274]  kasan_save_stack+0x3c/0x68
[   68.152092]  kasan_save_track+0x20/0x40
[   68.155911]  kasan_save_alloc_info+0x40/0x58
[   68.160164]  __kasan_kmalloc+0xd4/0xd8
[   68.163897]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.168411]  kasan_atomics+0xb8/0x2e0
[   68.172057]  kunit_try_run_case+0x170/0x3f0
[   68.176223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.181692]  kthread+0x328/0x630
[   68.184904]  ret_from_fork+0x10/0x20
[   68.188462] 
[   68.189938] The buggy address belongs to the object at ffff00080851b080
[   68.189938]  which belongs to the cache kmalloc-64 of size 64
[   68.202265] The buggy address is located 0 bytes to the right of
[   68.202265]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   68.215111] 
[   68.216587] The buggy address belongs to the physical page:
[   68.222145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   68.230129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.236639] page_type: f5(slab)
[   68.239772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.247496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.255215] page dumped because: kasan: bad access detected
[   68.260770] 
[   68.262246] Memory state around the buggy address:
[   68.267024]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.274229]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.281434] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.288635]                                      ^
[   68.293413]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.300617]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.307818] ==================================================================
[   70.431290] ==================================================================
[   70.438344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   70.445721] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.453012] 
[   70.454493] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.454540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.454557] Hardware name: WinLink E850-96 board (DT)
[   70.454575] Call trace:
[   70.454588]  show_stack+0x20/0x38 (C)
[   70.454618]  dump_stack_lvl+0x8c/0xd0
[   70.454649]  print_report+0x118/0x5d0
[   70.454675]  kasan_report+0xdc/0x128
[   70.454702]  __asan_report_load4_noabort+0x20/0x30
[   70.454735]  kasan_atomics_helper+0x3dcc/0x4858
[   70.454769]  kasan_atomics+0x198/0x2e0
[   70.454801]  kunit_try_run_case+0x170/0x3f0
[   70.454831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.454865]  kthread+0x328/0x630
[   70.454891]  ret_from_fork+0x10/0x20
[   70.454921] 
[   70.522629] Allocated by task 346:
[   70.526016]  kasan_save_stack+0x3c/0x68
[   70.529833]  kasan_save_track+0x20/0x40
[   70.533653]  kasan_save_alloc_info+0x40/0x58
[   70.537907]  __kasan_kmalloc+0xd4/0xd8
[   70.541639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.546153]  kasan_atomics+0xb8/0x2e0
[   70.549799]  kunit_try_run_case+0x170/0x3f0
[   70.553965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.559434]  kthread+0x328/0x630
[   70.562645]  ret_from_fork+0x10/0x20
[   70.566205] 
[   70.567680] The buggy address belongs to the object at ffff00080851b080
[   70.567680]  which belongs to the cache kmalloc-64 of size 64
[   70.580007] The buggy address is located 0 bytes to the right of
[   70.580007]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.592853] 
[   70.594329] The buggy address belongs to the physical page:
[   70.599888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.607871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.614381] page_type: f5(slab)
[   70.617516] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.625238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.632957] page dumped because: kasan: bad access detected
[   70.638513] 
[   70.639988] Memory state around the buggy address:
[   70.644768]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.651971]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.659176] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.666377]                                      ^
[   70.671155]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.678359]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.685560] ==================================================================
[   71.484380] ==================================================================
[   71.491453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   71.498830] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   71.506121] 
[   71.507604] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   71.507655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.507671] Hardware name: WinLink E850-96 board (DT)
[   71.507690] Call trace:
[   71.507703]  show_stack+0x20/0x38 (C)
[   71.507732]  dump_stack_lvl+0x8c/0xd0
[   71.507765]  print_report+0x118/0x5d0
[   71.507794]  kasan_report+0xdc/0x128
[   71.507821]  __asan_report_load4_noabort+0x20/0x30
[   71.507852]  kasan_atomics_helper+0x3de4/0x4858
[   71.507887]  kasan_atomics+0x198/0x2e0
[   71.507918]  kunit_try_run_case+0x170/0x3f0
[   71.507948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.507983]  kthread+0x328/0x630
[   71.508007]  ret_from_fork+0x10/0x20
[   71.508040] 
[   71.575738] Allocated by task 346:
[   71.579126]  kasan_save_stack+0x3c/0x68
[   71.582943]  kasan_save_track+0x20/0x40
[   71.586763]  kasan_save_alloc_info+0x40/0x58
[   71.591016]  __kasan_kmalloc+0xd4/0xd8
[   71.594748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.599262]  kasan_atomics+0xb8/0x2e0
[   71.602908]  kunit_try_run_case+0x170/0x3f0
[   71.607074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.612543]  kthread+0x328/0x630
[   71.615755]  ret_from_fork+0x10/0x20
[   71.619314] 
[   71.620790] The buggy address belongs to the object at ffff00080851b080
[   71.620790]  which belongs to the cache kmalloc-64 of size 64
[   71.633116] The buggy address is located 0 bytes to the right of
[   71.633116]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.645963] 
[   71.647440] The buggy address belongs to the physical page:
[   71.652997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.660980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.667490] page_type: f5(slab)
[   71.670624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.678348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.686066] page dumped because: kasan: bad access detected
[   71.691622] 
[   71.693097] Memory state around the buggy address:
[   71.697876]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.705080]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.712285] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.719486]                                      ^
[   71.724264]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.731469]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.738670] ==================================================================
[   64.612779] ==================================================================
[   64.619857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   64.627146] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.634436] 
[   64.635918] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.635972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.635990] Hardware name: WinLink E850-96 board (DT)
[   64.636011] Call trace:
[   64.636023]  show_stack+0x20/0x38 (C)
[   64.636057]  dump_stack_lvl+0x8c/0xd0
[   64.636092]  print_report+0x118/0x5d0
[   64.636120]  kasan_report+0xdc/0x128
[   64.636147]  kasan_check_range+0x100/0x1a8
[   64.636178]  __kasan_check_read+0x20/0x30
[   64.636207]  kasan_atomics_helper+0x2b0/0x4858
[   64.636240]  kasan_atomics+0x198/0x2e0
[   64.636272]  kunit_try_run_case+0x170/0x3f0
[   64.636301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.636337]  kthread+0x328/0x630
[   64.636365]  ret_from_fork+0x10/0x20
[   64.636396] 
[   64.707265] Allocated by task 346:
[   64.710654]  kasan_save_stack+0x3c/0x68
[   64.714470]  kasan_save_track+0x20/0x40
[   64.718289]  kasan_save_alloc_info+0x40/0x58
[   64.722542]  __kasan_kmalloc+0xd4/0xd8
[   64.726275]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.730789]  kasan_atomics+0xb8/0x2e0
[   64.734435]  kunit_try_run_case+0x170/0x3f0
[   64.738601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.744070]  kthread+0x328/0x630
[   64.747282]  ret_from_fork+0x10/0x20
[   64.750841] 
[   64.752318] The buggy address belongs to the object at ffff00080851b080
[   64.752318]  which belongs to the cache kmalloc-64 of size 64
[   64.764643] The buggy address is located 0 bytes to the right of
[   64.764643]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   64.777489] 
[   64.778967] The buggy address belongs to the physical page:
[   64.784525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   64.792508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.799017] page_type: f5(slab)
[   64.802153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.809874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.817593] page dumped because: kasan: bad access detected
[   64.823149] 
[   64.824624] Memory state around the buggy address:
[   64.829407]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.836607]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.843812] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.851012]                                      ^
[   64.855791]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.862995]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.870196] ==================================================================
[   65.665882] ==================================================================
[   65.672967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   65.680254] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.687632] 
[   65.689115] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.689165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.689180] Hardware name: WinLink E850-96 board (DT)
[   65.689199] Call trace:
[   65.689211]  show_stack+0x20/0x38 (C)
[   65.689242]  dump_stack_lvl+0x8c/0xd0
[   65.689275]  print_report+0x118/0x5d0
[   65.689302]  kasan_report+0xdc/0x128
[   65.689328]  kasan_check_range+0x100/0x1a8
[   65.689359]  __kasan_check_write+0x20/0x30
[   65.689390]  kasan_atomics_helper+0x3ac/0x4858
[   65.689425]  kasan_atomics+0x198/0x2e0
[   65.689459]  kunit_try_run_case+0x170/0x3f0
[   65.689490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.689527]  kthread+0x328/0x630
[   65.689553]  ret_from_fork+0x10/0x20
[   65.689584] 
[   65.760548] Allocated by task 346:
[   65.763935]  kasan_save_stack+0x3c/0x68
[   65.767753]  kasan_save_track+0x20/0x40
[   65.771572]  kasan_save_alloc_info+0x40/0x58
[   65.775825]  __kasan_kmalloc+0xd4/0xd8
[   65.779558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.784071]  kasan_atomics+0xb8/0x2e0
[   65.787717]  kunit_try_run_case+0x170/0x3f0
[   65.791884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.797353]  kthread+0x328/0x630
[   65.800564]  ret_from_fork+0x10/0x20
[   65.804123] 
[   65.805599] The buggy address belongs to the object at ffff00080851b080
[   65.805599]  which belongs to the cache kmalloc-64 of size 64
[   65.817926] The buggy address is located 0 bytes to the right of
[   65.817926]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.830772] 
[   65.832251] The buggy address belongs to the physical page:
[   65.837807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.845790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.852299] page_type: f5(slab)
[   65.855433] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.863157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.870879] page dumped because: kasan: bad access detected
[   65.876431] 
[   65.877907] Memory state around the buggy address:
[   65.882688]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.889890]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.897095] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.904296]                                      ^
[   65.909073]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.916278]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.923479] ==================================================================
[   73.590418] ==================================================================
[   73.597497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   73.604875] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.612253] 
[   73.613734] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.613780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.613799] Hardware name: WinLink E850-96 board (DT)
[   73.613817] Call trace:
[   73.613828]  show_stack+0x20/0x38 (C)
[   73.613858]  dump_stack_lvl+0x8c/0xd0
[   73.613890]  print_report+0x118/0x5d0
[   73.613917]  kasan_report+0xdc/0x128
[   73.613946]  __asan_report_store8_noabort+0x20/0x30
[   73.613980]  kasan_atomics_helper+0x3e5c/0x4858
[   73.614015]  kasan_atomics+0x198/0x2e0
[   73.614049]  kunit_try_run_case+0x170/0x3f0
[   73.614077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.614111]  kthread+0x328/0x630
[   73.614138]  ret_from_fork+0x10/0x20
[   73.614169] 
[   73.681956] Allocated by task 346:
[   73.685343]  kasan_save_stack+0x3c/0x68
[   73.689161]  kasan_save_track+0x20/0x40
[   73.692981]  kasan_save_alloc_info+0x40/0x58
[   73.697234]  __kasan_kmalloc+0xd4/0xd8
[   73.700967]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.705480]  kasan_atomics+0xb8/0x2e0
[   73.709126]  kunit_try_run_case+0x170/0x3f0
[   73.713293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.718762]  kthread+0x328/0x630
[   73.721974]  ret_from_fork+0x10/0x20
[   73.725532] 
[   73.727008] The buggy address belongs to the object at ffff00080851b080
[   73.727008]  which belongs to the cache kmalloc-64 of size 64
[   73.739334] The buggy address is located 0 bytes to the right of
[   73.739334]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   73.752181] 
[   73.753657] The buggy address belongs to the physical page:
[   73.759214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   73.767198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.773708] page_type: f5(slab)
[   73.776842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   73.784566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.792284] page dumped because: kasan: bad access detected
[   73.797840] 
[   73.799316] Memory state around the buggy address:
[   73.804094]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.811299]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.818503] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.825704]                                      ^
[   73.830482]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.837687]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.844888] ==================================================================
[   73.852243] ==================================================================
[   73.859299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   73.866591] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   73.873968] 
[   73.875451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   73.875502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.875519] Hardware name: WinLink E850-96 board (DT)
[   73.875538] Call trace:
[   73.875550]  show_stack+0x20/0x38 (C)
[   73.875580]  dump_stack_lvl+0x8c/0xd0
[   73.875612]  print_report+0x118/0x5d0
[   73.875641]  kasan_report+0xdc/0x128
[   73.875669]  kasan_check_range+0x100/0x1a8
[   73.875699]  __kasan_check_write+0x20/0x30
[   73.875729]  kasan_atomics_helper+0xeb8/0x4858
[   73.875763]  kasan_atomics+0x198/0x2e0
[   73.875795]  kunit_try_run_case+0x170/0x3f0
[   73.875825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.875862]  kthread+0x328/0x630
[   73.875889]  ret_from_fork+0x10/0x20
[   73.875920] 
[   73.946883] Allocated by task 346:
[   73.950270]  kasan_save_stack+0x3c/0x68
[   73.954088]  kasan_save_track+0x20/0x40
[   73.957907]  kasan_save_alloc_info+0x40/0x58
[   73.962161]  __kasan_kmalloc+0xd4/0xd8
[   73.965893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.970407]  kasan_atomics+0xb8/0x2e0
[   73.974053]  kunit_try_run_case+0x170/0x3f0
[   73.978220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.983688]  kthread+0x328/0x630
[   73.986900]  ret_from_fork+0x10/0x20
[   73.990459] 
[   73.991934] The buggy address belongs to the object at ffff00080851b080
[   73.991934]  which belongs to the cache kmalloc-64 of size 64
[   74.004261] The buggy address is located 0 bytes to the right of
[   74.004261]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.017108] 
[   74.018585] The buggy address belongs to the physical page:
[   74.024142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.032126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.038635] page_type: f5(slab)
[   74.041770] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.049492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.057211] page dumped because: kasan: bad access detected
[   74.062767] 
[   74.064242] Memory state around the buggy address:
[   74.069021]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.076225]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.083430] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.090631]                                      ^
[   74.095409]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.102614]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.109815] ==================================================================
[   69.901434] ==================================================================
[   69.908490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   69.915781] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.923159] 
[   69.924639] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.924688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.924705] Hardware name: WinLink E850-96 board (DT)
[   69.924722] Call trace:
[   69.924735]  show_stack+0x20/0x38 (C)
[   69.924767]  dump_stack_lvl+0x8c/0xd0
[   69.924799]  print_report+0x118/0x5d0
[   69.924825]  kasan_report+0xdc/0x128
[   69.924852]  kasan_check_range+0x100/0x1a8
[   69.924881]  __kasan_check_write+0x20/0x30
[   69.924913]  kasan_atomics_helper+0xa6c/0x4858
[   69.924948]  kasan_atomics+0x198/0x2e0
[   69.924980]  kunit_try_run_case+0x170/0x3f0
[   69.925014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.925048]  kthread+0x328/0x630
[   69.925076]  ret_from_fork+0x10/0x20
[   69.925107] 
[   69.996074] Allocated by task 346:
[   69.999462]  kasan_save_stack+0x3c/0x68
[   70.003279]  kasan_save_track+0x20/0x40
[   70.007099]  kasan_save_alloc_info+0x40/0x58
[   70.011352]  __kasan_kmalloc+0xd4/0xd8
[   70.015085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.019598]  kasan_atomics+0xb8/0x2e0
[   70.023244]  kunit_try_run_case+0x170/0x3f0
[   70.027411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.032880]  kthread+0x328/0x630
[   70.036091]  ret_from_fork+0x10/0x20
[   70.039650] 
[   70.041125] The buggy address belongs to the object at ffff00080851b080
[   70.041125]  which belongs to the cache kmalloc-64 of size 64
[   70.053452] The buggy address is located 0 bytes to the right of
[   70.053452]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.066299] 
[   70.067775] The buggy address belongs to the physical page:
[   70.073332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.081318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.087826] page_type: f5(slab)
[   70.090963] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.098684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.106402] page dumped because: kasan: bad access detected
[   70.111958] 
[   70.113433] Memory state around the buggy address:
[   70.118212]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.125416]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.132621] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.139822]                                      ^
[   70.144600]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.151805]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.159006] ==================================================================
[   64.877495] ==================================================================
[   64.884610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   64.891986] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.899276] 
[   64.900758] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.900811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.900825] Hardware name: WinLink E850-96 board (DT)
[   64.900846] Call trace:
[   64.900862]  show_stack+0x20/0x38 (C)
[   64.900896]  dump_stack_lvl+0x8c/0xd0
[   64.900932]  print_report+0x118/0x5d0
[   64.900959]  kasan_report+0xdc/0x128
[   64.900985]  __asan_report_load4_noabort+0x20/0x30
[   64.901016]  kasan_atomics_helper+0x40fc/0x4858
[   64.901051]  kasan_atomics+0x198/0x2e0
[   64.901086]  kunit_try_run_case+0x170/0x3f0
[   64.901117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.901152]  kthread+0x328/0x630
[   64.901180]  ret_from_fork+0x10/0x20
[   64.901214] 
[   64.968892] Allocated by task 346:
[   64.972280]  kasan_save_stack+0x3c/0x68
[   64.976098]  kasan_save_track+0x20/0x40
[   64.979917]  kasan_save_alloc_info+0x40/0x58
[   64.984171]  __kasan_kmalloc+0xd4/0xd8
[   64.987903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.992417]  kasan_atomics+0xb8/0x2e0
[   64.996063]  kunit_try_run_case+0x170/0x3f0
[   65.000229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.005698]  kthread+0x328/0x630
[   65.008910]  ret_from_fork+0x10/0x20
[   65.012469] 
[   65.013946] The buggy address belongs to the object at ffff00080851b080
[   65.013946]  which belongs to the cache kmalloc-64 of size 64
[   65.026270] The buggy address is located 0 bytes to the right of
[   65.026270]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.039117] 
[   65.040596] The buggy address belongs to the physical page:
[   65.046152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.054135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.060645] page_type: f5(slab)
[   65.063781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.071502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.079222] page dumped because: kasan: bad access detected
[   65.084776] 
[   65.086252] Memory state around the buggy address:
[   65.091036]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.098235]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.105440] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.112641]                                      ^
[   65.117419]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.124623]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.131824] ==================================================================
[   67.520354] ==================================================================
[   67.527450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   67.534740] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.542118] 
[   67.543599] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.543646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.543660] Hardware name: WinLink E850-96 board (DT)
[   67.543679] Call trace:
[   67.543690]  show_stack+0x20/0x38 (C)
[   67.543723]  dump_stack_lvl+0x8c/0xd0
[   67.543753]  print_report+0x118/0x5d0
[   67.543778]  kasan_report+0xdc/0x128
[   67.543805]  kasan_check_range+0x100/0x1a8
[   67.543834]  __kasan_check_write+0x20/0x30
[   67.543865]  kasan_atomics_helper+0x684/0x4858
[   67.543900]  kasan_atomics+0x198/0x2e0
[   67.543932]  kunit_try_run_case+0x170/0x3f0
[   67.543960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.543994]  kthread+0x328/0x630
[   67.544021]  ret_from_fork+0x10/0x20
[   67.544051] 
[   67.615034] Allocated by task 346:
[   67.618421]  kasan_save_stack+0x3c/0x68
[   67.622239]  kasan_save_track+0x20/0x40
[   67.626058]  kasan_save_alloc_info+0x40/0x58
[   67.630311]  __kasan_kmalloc+0xd4/0xd8
[   67.634044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.638558]  kasan_atomics+0xb8/0x2e0
[   67.642204]  kunit_try_run_case+0x170/0x3f0
[   67.646370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.651839]  kthread+0x328/0x630
[   67.655050]  ret_from_fork+0x10/0x20
[   67.658610] 
[   67.660085] The buggy address belongs to the object at ffff00080851b080
[   67.660085]  which belongs to the cache kmalloc-64 of size 64
[   67.672412] The buggy address is located 0 bytes to the right of
[   67.672412]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.685258] 
[   67.686734] The buggy address belongs to the physical page:
[   67.692291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.700276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.706786] page_type: f5(slab)
[   67.709919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.717643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.725362] page dumped because: kasan: bad access detected
[   67.730917] 
[   67.732393] Memory state around the buggy address:
[   67.737171]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.744376]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.751581] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.758782]                                      ^
[   67.763560]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.770764]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.777965] ==================================================================
[   66.725664] ==================================================================
[   66.732672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   66.739962] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   66.747338] 
[   66.748824] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   66.748877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.748892] Hardware name: WinLink E850-96 board (DT)
[   66.748912] Call trace:
[   66.748924]  show_stack+0x20/0x38 (C)
[   66.748956]  dump_stack_lvl+0x8c/0xd0
[   66.748989]  print_report+0x118/0x5d0
[   66.749018]  kasan_report+0xdc/0x128
[   66.749044]  kasan_check_range+0x100/0x1a8
[   66.749075]  __kasan_check_write+0x20/0x30
[   66.749107]  kasan_atomics_helper+0x54c/0x4858
[   66.749142]  kasan_atomics+0x198/0x2e0
[   66.749174]  kunit_try_run_case+0x170/0x3f0
[   66.749204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.749240]  kthread+0x328/0x630
[   66.749267]  ret_from_fork+0x10/0x20
[   66.749296] 
[   66.820255] Allocated by task 346:
[   66.823641]  kasan_save_stack+0x3c/0x68
[   66.827459]  kasan_save_track+0x20/0x40
[   66.831278]  kasan_save_alloc_info+0x40/0x58
[   66.835532]  __kasan_kmalloc+0xd4/0xd8
[   66.839264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.843778]  kasan_atomics+0xb8/0x2e0
[   66.847424]  kunit_try_run_case+0x170/0x3f0
[   66.851590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.857059]  kthread+0x328/0x630
[   66.860271]  ret_from_fork+0x10/0x20
[   66.863830] 
[   66.865305] The buggy address belongs to the object at ffff00080851b080
[   66.865305]  which belongs to the cache kmalloc-64 of size 64
[   66.877632] The buggy address is located 0 bytes to the right of
[   66.877632]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.890479] 
[   66.891956] The buggy address belongs to the physical page:
[   66.897513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.905496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.912006] page_type: f5(slab)
[   66.915143] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.922863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.930582] page dumped because: kasan: bad access detected
[   66.936137] 
[   66.937613] Memory state around the buggy address:
[   66.942393]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.949596]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.956801] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.964002]                                      ^
[   66.968780]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.975984]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.983186] ==================================================================
[   65.139165] ==================================================================
[   65.146240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   65.153526] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.160904] 
[   65.162386] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.162439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.162455] Hardware name: WinLink E850-96 board (DT)
[   65.162476] Call trace:
[   65.162489]  show_stack+0x20/0x38 (C)
[   65.162524]  dump_stack_lvl+0x8c/0xd0
[   65.162558]  print_report+0x118/0x5d0
[   65.162585]  kasan_report+0xdc/0x128
[   65.162613]  kasan_check_range+0x100/0x1a8
[   65.162642]  __kasan_check_write+0x20/0x30
[   65.162674]  kasan_atomics_helper+0x32c/0x4858
[   65.162710]  kasan_atomics+0x198/0x2e0
[   65.162742]  kunit_try_run_case+0x170/0x3f0
[   65.162773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.162809]  kthread+0x328/0x630
[   65.162837]  ret_from_fork+0x10/0x20
[   65.162868] 
[   65.233819] Allocated by task 346:
[   65.237207]  kasan_save_stack+0x3c/0x68
[   65.241024]  kasan_save_track+0x20/0x40
[   65.244844]  kasan_save_alloc_info+0x40/0x58
[   65.249097]  __kasan_kmalloc+0xd4/0xd8
[   65.252830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.257343]  kasan_atomics+0xb8/0x2e0
[   65.260989]  kunit_try_run_case+0x170/0x3f0
[   65.265156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.270625]  kthread+0x328/0x630
[   65.273836]  ret_from_fork+0x10/0x20
[   65.277395] 
[   65.278872] The buggy address belongs to the object at ffff00080851b080
[   65.278872]  which belongs to the cache kmalloc-64 of size 64
[   65.291198] The buggy address is located 0 bytes to the right of
[   65.291198]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.304044] 
[   65.305522] The buggy address belongs to the physical page:
[   65.311079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.319061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.325571] page_type: f5(slab)
[   65.328704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.336429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.344148] page dumped because: kasan: bad access detected
[   65.349703] 
[   65.351179] Memory state around the buggy address:
[   65.355962]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.363161]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.370366] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.377567]                                      ^
[   65.382345]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.389550]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.396751] ==================================================================
[   65.930841] ==================================================================
[   65.937891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   65.945180] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.952559] 
[   65.954042] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.954093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.954109] Hardware name: WinLink E850-96 board (DT)
[   65.954127] Call trace:
[   65.954139]  show_stack+0x20/0x38 (C)
[   65.954170]  dump_stack_lvl+0x8c/0xd0
[   65.954202]  print_report+0x118/0x5d0
[   65.954229]  kasan_report+0xdc/0x128
[   65.954257]  kasan_check_range+0x100/0x1a8
[   65.954285]  __kasan_check_write+0x20/0x30
[   65.954314]  kasan_atomics_helper+0x414/0x4858
[   65.954348]  kasan_atomics+0x198/0x2e0
[   65.954380]  kunit_try_run_case+0x170/0x3f0
[   65.954409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.954445]  kthread+0x328/0x630
[   65.954472]  ret_from_fork+0x10/0x20
[   65.954502] 
[   66.025474] Allocated by task 346:
[   66.028862]  kasan_save_stack+0x3c/0x68
[   66.032679]  kasan_save_track+0x20/0x40
[   66.036498]  kasan_save_alloc_info+0x40/0x58
[   66.040752]  __kasan_kmalloc+0xd4/0xd8
[   66.044484]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.048998]  kasan_atomics+0xb8/0x2e0
[   66.052644]  kunit_try_run_case+0x170/0x3f0
[   66.056810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.062279]  kthread+0x328/0x630
[   66.065491]  ret_from_fork+0x10/0x20
[   66.069050] 
[   66.070525] The buggy address belongs to the object at ffff00080851b080
[   66.070525]  which belongs to the cache kmalloc-64 of size 64
[   66.082852] The buggy address is located 0 bytes to the right of
[   66.082852]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.095699] 
[   66.097176] The buggy address belongs to the physical page:
[   66.102732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.110716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.117226] page_type: f5(slab)
[   66.120360] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.128084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.135802] page dumped because: kasan: bad access detected
[   66.141358] 
[   66.142833] Memory state around the buggy address:
[   66.147614]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.154816]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.162022] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.169222]                                      ^
[   66.174000]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.181205]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.188406] ==================================================================
[   64.083106] ==================================================================
[   64.090179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   64.097467] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   64.104756] 
[   64.106240] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   64.106297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.106314] Hardware name: WinLink E850-96 board (DT)
[   64.106335] Call trace:
[   64.106347]  show_stack+0x20/0x38 (C)
[   64.106382]  dump_stack_lvl+0x8c/0xd0
[   64.106416]  print_report+0x118/0x5d0
[   64.106445]  kasan_report+0xdc/0x128
[   64.106473]  kasan_check_range+0x100/0x1a8
[   64.106505]  __kasan_check_read+0x20/0x30
[   64.106538]  kasan_atomics_helper+0x1ec/0x4858
[   64.106572]  kasan_atomics+0x198/0x2e0
[   64.106604]  kunit_try_run_case+0x170/0x3f0
[   64.106638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.106674]  kthread+0x328/0x630
[   64.106704]  ret_from_fork+0x10/0x20
[   64.106736] 
[   64.177585] Allocated by task 346:
[   64.180973]  kasan_save_stack+0x3c/0x68
[   64.184790]  kasan_save_track+0x20/0x40
[   64.188610]  kasan_save_alloc_info+0x40/0x58
[   64.192863]  __kasan_kmalloc+0xd4/0xd8
[   64.196596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.201109]  kasan_atomics+0xb8/0x2e0
[   64.204755]  kunit_try_run_case+0x170/0x3f0
[   64.208921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.214390]  kthread+0x328/0x630
[   64.217602]  ret_from_fork+0x10/0x20
[   64.221161] 
[   64.222638] The buggy address belongs to the object at ffff00080851b080
[   64.222638]  which belongs to the cache kmalloc-64 of size 64
[   64.234965] The buggy address is located 0 bytes to the right of
[   64.234965]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   64.247810] 
[   64.249288] The buggy address belongs to the physical page:
[   64.254845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   64.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.269339] page_type: f5(slab)
[   64.272476] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.280194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.287913] page dumped because: kasan: bad access detected
[   64.293469] 
[   64.294944] Memory state around the buggy address:
[   64.299726]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.306927]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.314132] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.321333]                                      ^
[   64.326111]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.333316]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.340517] ==================================================================
[   76.502548] ==================================================================
[   76.509607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   76.516983] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   76.524362] 
[   76.525843] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   76.525897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.525911] Hardware name: WinLink E850-96 board (DT)
[   76.525931] Call trace:
[   76.525944]  show_stack+0x20/0x38 (C)
[   76.525976]  dump_stack_lvl+0x8c/0xd0
[   76.526010]  print_report+0x118/0x5d0
[   76.526040]  kasan_report+0xdc/0x128
[   76.526068]  kasan_check_range+0x100/0x1a8
[   76.526097]  __kasan_check_write+0x20/0x30
[   76.526127]  kasan_atomics_helper+0x12d8/0x4858
[   76.526161]  kasan_atomics+0x198/0x2e0
[   76.526194]  kunit_try_run_case+0x170/0x3f0
[   76.526227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.526261]  kthread+0x328/0x630
[   76.526288]  ret_from_fork+0x10/0x20
[   76.526319] 
[   76.597364] Allocated by task 346:
[   76.600751]  kasan_save_stack+0x3c/0x68
[   76.604569]  kasan_save_track+0x20/0x40
[   76.608388]  kasan_save_alloc_info+0x40/0x58
[   76.612642]  __kasan_kmalloc+0xd4/0xd8
[   76.616374]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.620888]  kasan_atomics+0xb8/0x2e0
[   76.624534]  kunit_try_run_case+0x170/0x3f0
[   76.628700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.634169]  kthread+0x328/0x630
[   76.637381]  ret_from_fork+0x10/0x20
[   76.640940] 
[   76.642415] The buggy address belongs to the object at ffff00080851b080
[   76.642415]  which belongs to the cache kmalloc-64 of size 64
[   76.654742] The buggy address is located 0 bytes to the right of
[   76.654742]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.667589] 
[   76.669064] The buggy address belongs to the physical page:
[   76.674622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.682606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.689116] page_type: f5(slab)
[   76.692249] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.699973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.707692] page dumped because: kasan: bad access detected
[   76.713248] 
[   76.714723] Memory state around the buggy address:
[   76.719501]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.726706]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.733911] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.741112]                                      ^
[   76.745890]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.753095]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.760296] ==================================================================
[   78.089662] ==================================================================
[   78.096735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   78.104114] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.111491] 
[   78.112973] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.113022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.113038] Hardware name: WinLink E850-96 board (DT)
[   78.113054] Call trace:
[   78.113067]  show_stack+0x20/0x38 (C)
[   78.113097]  dump_stack_lvl+0x8c/0xd0
[   78.113130]  print_report+0x118/0x5d0
[   78.113156]  kasan_report+0xdc/0x128
[   78.113183]  kasan_check_range+0x100/0x1a8
[   78.113213]  __kasan_check_write+0x20/0x30
[   78.113243]  kasan_atomics_helper+0x154c/0x4858
[   78.113277]  kasan_atomics+0x198/0x2e0
[   78.113311]  kunit_try_run_case+0x170/0x3f0
[   78.113342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.113376]  kthread+0x328/0x630
[   78.113402]  ret_from_fork+0x10/0x20
[   78.113436] 
[   78.184493] Allocated by task 346:
[   78.187880]  kasan_save_stack+0x3c/0x68
[   78.191698]  kasan_save_track+0x20/0x40
[   78.195517]  kasan_save_alloc_info+0x40/0x58
[   78.199771]  __kasan_kmalloc+0xd4/0xd8
[   78.203503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.208017]  kasan_atomics+0xb8/0x2e0
[   78.211663]  kunit_try_run_case+0x170/0x3f0
[   78.215829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.221298]  kthread+0x328/0x630
[   78.224510]  ret_from_fork+0x10/0x20
[   78.228069] 
[   78.229545] The buggy address belongs to the object at ffff00080851b080
[   78.229545]  which belongs to the cache kmalloc-64 of size 64
[   78.241871] The buggy address is located 0 bytes to the right of
[   78.241871]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   78.254718] 
[   78.256194] The buggy address belongs to the physical page:
[   78.261752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.269735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.276245] page_type: f5(slab)
[   78.279380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.287102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.294821] page dumped because: kasan: bad access detected
[   78.300377] 
[   78.301852] Memory state around the buggy address:
[   78.306635]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.313835]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.321040] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.328241]                                      ^
[   78.333019]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.340223]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.347424] ==================================================================
[   63.552524] ==================================================================
[   63.566748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   63.574123] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   63.581413] 
[   63.582901] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.582957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.582977] Hardware name: WinLink E850-96 board (DT)
[   63.582998] Call trace:
[   63.583011]  show_stack+0x20/0x38 (C)
[   63.583050]  dump_stack_lvl+0x8c/0xd0
[   63.583088]  print_report+0x118/0x5d0
[   63.583122]  kasan_report+0xdc/0x128
[   63.583150]  __asan_report_load4_noabort+0x20/0x30
[   63.583182]  kasan_atomics_helper+0x40a8/0x4858
[   63.583216]  kasan_atomics+0x198/0x2e0
[   63.583249]  kunit_try_run_case+0x170/0x3f0
[   63.583283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.583319]  kthread+0x328/0x630
[   63.583349]  ret_from_fork+0x10/0x20
[   63.583388] 
[   63.651034] Allocated by task 346:
[   63.654420]  kasan_save_stack+0x3c/0x68
[   63.658235]  kasan_save_track+0x20/0x40
[   63.662055]  kasan_save_alloc_info+0x40/0x58
[   63.666308]  __kasan_kmalloc+0xd4/0xd8
[   63.670041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.674554]  kasan_atomics+0xb8/0x2e0
[   63.678202]  kunit_try_run_case+0x170/0x3f0
[   63.682367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.687836]  kthread+0x328/0x630
[   63.691047]  ret_from_fork+0x10/0x20
[   63.694607] 
[   63.696085] The buggy address belongs to the object at ffff00080851b080
[   63.696085]  which belongs to the cache kmalloc-64 of size 64
[   63.708412] The buggy address is located 0 bytes to the right of
[   63.708412]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   63.721255] 
[   63.722735] The buggy address belongs to the physical page:
[   63.728290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   63.736275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.742784] page_type: f5(slab)
[   63.745920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.753640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.761362] page dumped because: kasan: bad access detected
[   63.766914] 
[   63.768391] Memory state around the buggy address:
[   63.773171]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.780373]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.787579] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.794778]                                      ^
[   63.799557]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.806761]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.813964] ==================================================================
[   68.580085] ==================================================================
[   68.587156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   68.594446] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.601825] 
[   68.603305] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.603353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.603368] Hardware name: WinLink E850-96 board (DT)
[   68.603386] Call trace:
[   68.603397]  show_stack+0x20/0x38 (C)
[   68.603430]  dump_stack_lvl+0x8c/0xd0
[   68.603460]  print_report+0x118/0x5d0
[   68.603489]  kasan_report+0xdc/0x128
[   68.603517]  kasan_check_range+0x100/0x1a8
[   68.603545]  __kasan_check_write+0x20/0x30
[   68.603575]  kasan_atomics_helper+0x894/0x4858
[   68.603610]  kasan_atomics+0x198/0x2e0
[   68.603643]  kunit_try_run_case+0x170/0x3f0
[   68.603674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.603708]  kthread+0x328/0x630
[   68.603735]  ret_from_fork+0x10/0x20
[   68.603766] 
[   68.674740] Allocated by task 346:
[   68.678127]  kasan_save_stack+0x3c/0x68
[   68.681945]  kasan_save_track+0x20/0x40
[   68.685764]  kasan_save_alloc_info+0x40/0x58
[   68.690018]  __kasan_kmalloc+0xd4/0xd8
[   68.693750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.698264]  kasan_atomics+0xb8/0x2e0
[   68.701910]  kunit_try_run_case+0x170/0x3f0
[   68.706076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.711545]  kthread+0x328/0x630
[   68.714757]  ret_from_fork+0x10/0x20
[   68.718316] 
[   68.719791] The buggy address belongs to the object at ffff00080851b080
[   68.719791]  which belongs to the cache kmalloc-64 of size 64
[   68.732118] The buggy address is located 0 bytes to the right of
[   68.732118]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   68.744965] 
[   68.746440] The buggy address belongs to the physical page:
[   68.751998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   68.759982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.766493] page_type: f5(slab)
[   68.769625] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.777349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.785068] page dumped because: kasan: bad access detected
[   68.790623] 
[   68.792099] Memory state around the buggy address:
[   68.796879]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.804082]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.811287] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.818488]                                      ^
[   68.823266]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.830471]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.837672] ==================================================================
[   70.957844] ==================================================================
[   70.964898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   70.972277] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.979567] 
[   70.981049] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.981096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.981112] Hardware name: WinLink E850-96 board (DT)
[   70.981131] Call trace:
[   70.981144]  show_stack+0x20/0x38 (C)
[   70.981177]  dump_stack_lvl+0x8c/0xd0
[   70.981211]  print_report+0x118/0x5d0
[   70.981238]  kasan_report+0xdc/0x128
[   70.981264]  __asan_report_load4_noabort+0x20/0x30
[   70.981296]  kasan_atomics_helper+0x3dbc/0x4858
[   70.981329]  kasan_atomics+0x198/0x2e0
[   70.981364]  kunit_try_run_case+0x170/0x3f0
[   70.981393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.981426]  kthread+0x328/0x630
[   70.981451]  ret_from_fork+0x10/0x20
[   70.981482] 
[   71.049184] Allocated by task 346:
[   71.052571]  kasan_save_stack+0x3c/0x68
[   71.056388]  kasan_save_track+0x20/0x40
[   71.060208]  kasan_save_alloc_info+0x40/0x58
[   71.064461]  __kasan_kmalloc+0xd4/0xd8
[   71.068194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.072707]  kasan_atomics+0xb8/0x2e0
[   71.076353]  kunit_try_run_case+0x170/0x3f0
[   71.080520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.085988]  kthread+0x328/0x630
[   71.089200]  ret_from_fork+0x10/0x20
[   71.092759] 
[   71.094235] The buggy address belongs to the object at ffff00080851b080
[   71.094235]  which belongs to the cache kmalloc-64 of size 64
[   71.106562] The buggy address is located 0 bytes to the right of
[   71.106562]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.119408] 
[   71.120885] The buggy address belongs to the physical page:
[   71.126442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.134425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.140935] page_type: f5(slab)
[   71.144070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.151793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.159512] page dumped because: kasan: bad access detected
[   71.165067] 
[   71.166543] Memory state around the buggy address:
[   71.171321]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.178526]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.185730] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.192931]                                      ^
[   71.197709]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.204914]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.212115] ==================================================================
[   72.537508] ==================================================================
[   72.544562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   72.551939] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.559230] 
[   72.560712] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.560765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.560780] Hardware name: WinLink E850-96 board (DT)
[   72.560799] Call trace:
[   72.560812]  show_stack+0x20/0x38 (C)
[   72.560843]  dump_stack_lvl+0x8c/0xd0
[   72.560877]  print_report+0x118/0x5d0
[   72.560902]  kasan_report+0xdc/0x128
[   72.560928]  __asan_report_load4_noabort+0x20/0x30
[   72.560959]  kasan_atomics_helper+0x3e04/0x4858
[   72.560994]  kasan_atomics+0x198/0x2e0
[   72.561026]  kunit_try_run_case+0x170/0x3f0
[   72.561058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.561091]  kthread+0x328/0x630
[   72.561117]  ret_from_fork+0x10/0x20
[   72.561147] 
[   72.628848] Allocated by task 346:
[   72.632234]  kasan_save_stack+0x3c/0x68
[   72.636052]  kasan_save_track+0x20/0x40
[   72.639871]  kasan_save_alloc_info+0x40/0x58
[   72.644125]  __kasan_kmalloc+0xd4/0xd8
[   72.647858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.652371]  kasan_atomics+0xb8/0x2e0
[   72.656017]  kunit_try_run_case+0x170/0x3f0
[   72.660184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.665652]  kthread+0x328/0x630
[   72.668864]  ret_from_fork+0x10/0x20
[   72.672423] 
[   72.673898] The buggy address belongs to the object at ffff00080851b080
[   72.673898]  which belongs to the cache kmalloc-64 of size 64
[   72.686225] The buggy address is located 0 bytes to the right of
[   72.686225]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.699072] 
[   72.700549] The buggy address belongs to the physical page:
[   72.706106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.714091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.720599] page_type: f5(slab)
[   72.723735] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.731457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.739176] page dumped because: kasan: bad access detected
[   72.744731] 
[   72.746206] Memory state around the buggy address:
[   72.750985]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.758189]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.765394] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.772595]                                      ^
[   72.777373]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.784578]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.791779] ==================================================================
[   76.767609] ==================================================================
[   76.774707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   76.782084] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   76.789462] 
[   76.790944] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   76.790991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.791005] Hardware name: WinLink E850-96 board (DT)
[   76.791024] Call trace:
[   76.791037]  show_stack+0x20/0x38 (C)
[   76.791068]  dump_stack_lvl+0x8c/0xd0
[   76.791101]  print_report+0x118/0x5d0
[   76.791129]  kasan_report+0xdc/0x128
[   76.791157]  kasan_check_range+0x100/0x1a8
[   76.791186]  __kasan_check_write+0x20/0x30
[   76.791217]  kasan_atomics_helper+0x1384/0x4858
[   76.791254]  kasan_atomics+0x198/0x2e0
[   76.791287]  kunit_try_run_case+0x170/0x3f0
[   76.791316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.791350]  kthread+0x328/0x630
[   76.791376]  ret_from_fork+0x10/0x20
[   76.791406] 
[   76.862464] Allocated by task 346:
[   76.865851]  kasan_save_stack+0x3c/0x68
[   76.869669]  kasan_save_track+0x20/0x40
[   76.873488]  kasan_save_alloc_info+0x40/0x58
[   76.877742]  __kasan_kmalloc+0xd4/0xd8
[   76.881475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.885988]  kasan_atomics+0xb8/0x2e0
[   76.889634]  kunit_try_run_case+0x170/0x3f0
[   76.893801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.899269]  kthread+0x328/0x630
[   76.902481]  ret_from_fork+0x10/0x20
[   76.906040] 
[   76.907515] The buggy address belongs to the object at ffff00080851b080
[   76.907515]  which belongs to the cache kmalloc-64 of size 64
[   76.919842] The buggy address is located 0 bytes to the right of
[   76.919842]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.932689] 
[   76.934165] The buggy address belongs to the physical page:
[   76.939722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.947706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.954216] page_type: f5(slab)
[   76.957349] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.965074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.972792] page dumped because: kasan: bad access detected
[   76.978348] 
[   76.979823] Memory state around the buggy address:
[   76.984602]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.991807]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.999011] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.006212]                                      ^
[   77.010990]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.018195]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.025396] ==================================================================
[   72.010956] ==================================================================
[   72.018010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   72.025384] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.032676] 
[   72.034157] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.034204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.034220] Hardware name: WinLink E850-96 board (DT)
[   72.034239] Call trace:
[   72.034252]  show_stack+0x20/0x38 (C)
[   72.034286]  dump_stack_lvl+0x8c/0xd0
[   72.034319]  print_report+0x118/0x5d0
[   72.034347]  kasan_report+0xdc/0x128
[   72.034375]  __asan_report_load4_noabort+0x20/0x30
[   72.034407]  kasan_atomics_helper+0x3dd8/0x4858
[   72.034441]  kasan_atomics+0x198/0x2e0
[   72.034473]  kunit_try_run_case+0x170/0x3f0
[   72.034502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.034536]  kthread+0x328/0x630
[   72.034562]  ret_from_fork+0x10/0x20
[   72.034593] 
[   72.102292] Allocated by task 346:
[   72.105680]  kasan_save_stack+0x3c/0x68
[   72.109498]  kasan_save_track+0x20/0x40
[   72.113317]  kasan_save_alloc_info+0x40/0x58
[   72.117570]  __kasan_kmalloc+0xd4/0xd8
[   72.121303]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.125817]  kasan_atomics+0xb8/0x2e0
[   72.129463]  kunit_try_run_case+0x170/0x3f0
[   72.133629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.139098]  kthread+0x328/0x630
[   72.142310]  ret_from_fork+0x10/0x20
[   72.145868] 
[   72.147345] The buggy address belongs to the object at ffff00080851b080
[   72.147345]  which belongs to the cache kmalloc-64 of size 64
[   72.159671] The buggy address is located 0 bytes to the right of
[   72.159671]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.172517] 
[   72.173995] The buggy address belongs to the physical page:
[   72.179551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.187536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.194045] page_type: f5(slab)
[   72.197178] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.204902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.212621] page dumped because: kasan: bad access detected
[   72.218176] 
[   72.219652] Memory state around the buggy address:
[   72.224430]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.231635]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.238840] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.246040]                                      ^
[   72.250818]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.258023]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.265224] ==================================================================
[   79.146609] ==================================================================
[   79.153664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   79.161043] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.168332] 
[   79.169815] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.169864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.169880] Hardware name: WinLink E850-96 board (DT)
[   79.169897] Call trace:
[   79.169910]  show_stack+0x20/0x38 (C)
[   79.169940]  dump_stack_lvl+0x8c/0xd0
[   79.169973]  print_report+0x118/0x5d0
[   79.170002]  kasan_report+0xdc/0x128
[   79.170030]  __asan_report_load8_noabort+0x20/0x30
[   79.170063]  kasan_atomics_helper+0x3df4/0x4858
[   79.170098]  kasan_atomics+0x198/0x2e0
[   79.170130]  kunit_try_run_case+0x170/0x3f0
[   79.170160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.170194]  kthread+0x328/0x630
[   79.170221]  ret_from_fork+0x10/0x20
[   79.170251] 
[   79.237949] Allocated by task 346:
[   79.241336]  kasan_save_stack+0x3c/0x68
[   79.245154]  kasan_save_track+0x20/0x40
[   79.248974]  kasan_save_alloc_info+0x40/0x58
[   79.253227]  __kasan_kmalloc+0xd4/0xd8
[   79.256960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.261474]  kasan_atomics+0xb8/0x2e0
[   79.265119]  kunit_try_run_case+0x170/0x3f0
[   79.269286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.274755]  kthread+0x328/0x630
[   79.277966]  ret_from_fork+0x10/0x20
[   79.281525] 
[   79.283001] The buggy address belongs to the object at ffff00080851b080
[   79.283001]  which belongs to the cache kmalloc-64 of size 64
[   79.295327] The buggy address is located 0 bytes to the right of
[   79.295327]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.308174] 
[   79.309650] The buggy address belongs to the physical page:
[   79.315207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.323193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.329701] page_type: f5(slab)
[   79.332835] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.340559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.348278] page dumped because: kasan: bad access detected
[   79.353833] 
[   79.355309] Memory state around the buggy address:
[   79.360088]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.367292]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.374497] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.381697]                                      ^
[   79.386475]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.393680]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.400881] ==================================================================
[   69.371579] ==================================================================
[   69.378637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   69.385927] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.393306] 
[   69.394787] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.394834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.394850] Hardware name: WinLink E850-96 board (DT)
[   69.394868] Call trace:
[   69.394878]  show_stack+0x20/0x38 (C)
[   69.394909]  dump_stack_lvl+0x8c/0xd0
[   69.394940]  print_report+0x118/0x5d0
[   69.394970]  kasan_report+0xdc/0x128
[   69.394997]  kasan_check_range+0x100/0x1a8
[   69.395027]  __kasan_check_write+0x20/0x30
[   69.395057]  kasan_atomics_helper+0x99c/0x4858
[   69.395091]  kasan_atomics+0x198/0x2e0
[   69.395124]  kunit_try_run_case+0x170/0x3f0
[   69.395154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.395186]  kthread+0x328/0x630
[   69.395212]  ret_from_fork+0x10/0x20
[   69.395243] 
[   69.466221] Allocated by task 346:
[   69.469608]  kasan_save_stack+0x3c/0x68
[   69.473426]  kasan_save_track+0x20/0x40
[   69.477245]  kasan_save_alloc_info+0x40/0x58
[   69.481499]  __kasan_kmalloc+0xd4/0xd8
[   69.485231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.489745]  kasan_atomics+0xb8/0x2e0
[   69.493391]  kunit_try_run_case+0x170/0x3f0
[   69.497558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.503026]  kthread+0x328/0x630
[   69.506238]  ret_from_fork+0x10/0x20
[   69.509797] 
[   69.511272] The buggy address belongs to the object at ffff00080851b080
[   69.511272]  which belongs to the cache kmalloc-64 of size 64
[   69.523599] The buggy address is located 0 bytes to the right of
[   69.523599]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.536446] 
[   69.537923] The buggy address belongs to the physical page:
[   69.543480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.551465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.557973] page_type: f5(slab)
[   69.561106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.568831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.576549] page dumped because: kasan: bad access detected
[   69.582105] 
[   69.583580] Memory state around the buggy address:
[   69.588362]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.595563]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.602768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.609969]                                      ^
[   69.614747]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.621952]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.629153] ==================================================================
[   77.294358] ==================================================================
[   77.301435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   77.308812] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.316190] 
[   77.317672] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.317722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.317738] Hardware name: WinLink E850-96 board (DT)
[   77.317756] Call trace:
[   77.317771]  show_stack+0x20/0x38 (C)
[   77.317803]  dump_stack_lvl+0x8c/0xd0
[   77.317835]  print_report+0x118/0x5d0
[   77.317864]  kasan_report+0xdc/0x128
[   77.317892]  kasan_check_range+0x100/0x1a8
[   77.317923]  __kasan_check_write+0x20/0x30
[   77.317954]  kasan_atomics_helper+0x1414/0x4858
[   77.317988]  kasan_atomics+0x198/0x2e0
[   77.318021]  kunit_try_run_case+0x170/0x3f0
[   77.318050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.318084]  kthread+0x328/0x630
[   77.318109]  ret_from_fork+0x10/0x20
[   77.318139] 
[   77.389193] Allocated by task 346:
[   77.392579]  kasan_save_stack+0x3c/0x68
[   77.396397]  kasan_save_track+0x20/0x40
[   77.400217]  kasan_save_alloc_info+0x40/0x58
[   77.404470]  __kasan_kmalloc+0xd4/0xd8
[   77.408203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.412716]  kasan_atomics+0xb8/0x2e0
[   77.416362]  kunit_try_run_case+0x170/0x3f0
[   77.420529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.425997]  kthread+0x328/0x630
[   77.429209]  ret_from_fork+0x10/0x20
[   77.432768] 
[   77.434243] The buggy address belongs to the object at ffff00080851b080
[   77.434243]  which belongs to the cache kmalloc-64 of size 64
[   77.446571] The buggy address is located 0 bytes to the right of
[   77.446571]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.459417] 
[   77.460893] The buggy address belongs to the physical page:
[   77.466450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   77.474435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.480944] page_type: f5(slab)
[   77.484077] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.491802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.499521] page dumped because: kasan: bad access detected
[   77.505076] 
[   77.506552] Memory state around the buggy address:
[   77.511330]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.518535]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.525739] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.532940]                                      ^
[   77.537718]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.544923]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.552124] ==================================================================
[   70.692895] ==================================================================
[   70.699971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   70.707262] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.714640] 
[   70.716124] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.716174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.716190] Hardware name: WinLink E850-96 board (DT)
[   70.716207] Call trace:
[   70.716221]  show_stack+0x20/0x38 (C)
[   70.716252]  dump_stack_lvl+0x8c/0xd0
[   70.716283]  print_report+0x118/0x5d0
[   70.716311]  kasan_report+0xdc/0x128
[   70.716337]  kasan_check_range+0x100/0x1a8
[   70.716367]  __kasan_check_write+0x20/0x30
[   70.716398]  kasan_atomics_helper+0xb70/0x4858
[   70.716431]  kasan_atomics+0x198/0x2e0
[   70.716463]  kunit_try_run_case+0x170/0x3f0
[   70.716493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.716526]  kthread+0x328/0x630
[   70.716553]  ret_from_fork+0x10/0x20
[   70.716586] 
[   70.787556] Allocated by task 346:
[   70.790942]  kasan_save_stack+0x3c/0x68
[   70.794760]  kasan_save_track+0x20/0x40
[   70.798579]  kasan_save_alloc_info+0x40/0x58
[   70.802833]  __kasan_kmalloc+0xd4/0xd8
[   70.806566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.811079]  kasan_atomics+0xb8/0x2e0
[   70.814725]  kunit_try_run_case+0x170/0x3f0
[   70.818892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.824361]  kthread+0x328/0x630
[   70.827572]  ret_from_fork+0x10/0x20
[   70.831131] 
[   70.832607] The buggy address belongs to the object at ffff00080851b080
[   70.832607]  which belongs to the cache kmalloc-64 of size 64
[   70.844934] The buggy address is located 0 bytes to the right of
[   70.844934]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.857780] 
[   70.859256] The buggy address belongs to the physical page:
[   70.864813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.872797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.879308] page_type: f5(slab)
[   70.882441] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.890165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.897884] page dumped because: kasan: bad access detected
[   70.903439] 
[   70.904915] Memory state around the buggy address:
[   70.909694]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.916898]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.924103] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.931303]                                      ^
[   70.936082]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.943286]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.950487] ==================================================================
[   75.972350] ==================================================================
[   75.979407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   75.986783] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.994161] 
[   75.995645] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.995693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.995708] Hardware name: WinLink E850-96 board (DT)
[   75.995726] Call trace:
[   75.995739]  show_stack+0x20/0x38 (C)
[   75.995769]  dump_stack_lvl+0x8c/0xd0
[   75.995803]  print_report+0x118/0x5d0
[   75.995831]  kasan_report+0xdc/0x128
[   75.995856]  kasan_check_range+0x100/0x1a8
[   75.995885]  __kasan_check_write+0x20/0x30
[   75.995915]  kasan_atomics_helper+0x11f8/0x4858
[   75.995951]  kasan_atomics+0x198/0x2e0
[   75.995984]  kunit_try_run_case+0x170/0x3f0
[   75.996013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.996047]  kthread+0x328/0x630
[   75.996074]  ret_from_fork+0x10/0x20
[   75.996104] 
[   76.067164] Allocated by task 346:
[   76.070551]  kasan_save_stack+0x3c/0x68
[   76.074369]  kasan_save_track+0x20/0x40
[   76.078188]  kasan_save_alloc_info+0x40/0x58
[   76.082441]  __kasan_kmalloc+0xd4/0xd8
[   76.086174]  __kmalloc_cache_noprof+0x16c/0x3c0
[   76.090688]  kasan_atomics+0xb8/0x2e0
[   76.094334]  kunit_try_run_case+0x170/0x3f0
[   76.098500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.103969]  kthread+0x328/0x630
[   76.107181]  ret_from_fork+0x10/0x20
[   76.110740] 
[   76.112215] The buggy address belongs to the object at ffff00080851b080
[   76.112215]  which belongs to the cache kmalloc-64 of size 64
[   76.124542] The buggy address is located 0 bytes to the right of
[   76.124542]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   76.137389] 
[   76.138864] The buggy address belongs to the physical page:
[   76.144423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   76.152407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.158916] page_type: f5(slab)
[   76.162049] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   76.169773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   76.177492] page dumped because: kasan: bad access detected
[   76.183047] 
[   76.184523] Memory state around the buggy address:
[   76.189301]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   76.196506]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   76.203711] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.210912]                                      ^
[   76.215690]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.222894]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.230095] ==================================================================
[   72.799096] ==================================================================
[   72.806190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   72.813480] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.820771] 
[   72.822253] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.822301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.822318] Hardware name: WinLink E850-96 board (DT)
[   72.822336] Call trace:
[   72.822350]  show_stack+0x20/0x38 (C)
[   72.822380]  dump_stack_lvl+0x8c/0xd0
[   72.822412]  print_report+0x118/0x5d0
[   72.822437]  kasan_report+0xdc/0x128
[   72.822464]  kasan_check_range+0x100/0x1a8
[   72.822493]  __kasan_check_read+0x20/0x30
[   72.822523]  kasan_atomics_helper+0xdd4/0x4858
[   72.822558]  kasan_atomics+0x198/0x2e0
[   72.822590]  kunit_try_run_case+0x170/0x3f0
[   72.822621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.822655]  kthread+0x328/0x630
[   72.822680]  ret_from_fork+0x10/0x20
[   72.822709] 
[   72.893600] Allocated by task 346:
[   72.896987]  kasan_save_stack+0x3c/0x68
[   72.900805]  kasan_save_track+0x20/0x40
[   72.904625]  kasan_save_alloc_info+0x40/0x58
[   72.908878]  __kasan_kmalloc+0xd4/0xd8
[   72.912610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.917124]  kasan_atomics+0xb8/0x2e0
[   72.920770]  kunit_try_run_case+0x170/0x3f0
[   72.924937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.930405]  kthread+0x328/0x630
[   72.933617]  ret_from_fork+0x10/0x20
[   72.937176] 
[   72.938652] The buggy address belongs to the object at ffff00080851b080
[   72.938652]  which belongs to the cache kmalloc-64 of size 64
[   72.950980] The buggy address is located 0 bytes to the right of
[   72.950980]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.963825] 
[   72.965301] The buggy address belongs to the physical page:
[   72.970858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.978842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.985352] page_type: f5(slab)
[   72.988485] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.996210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.003928] page dumped because: kasan: bad access detected
[   73.009484] 
[   73.010959] Memory state around the buggy address:
[   73.015738]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.022942]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.030147] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.037348]                                      ^
[   73.042126]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.049331]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.056532] ==================================================================
[   74.117132] ==================================================================
[   74.124226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   74.131516] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.138894] 
[   74.140378] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.140426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.140443] Hardware name: WinLink E850-96 board (DT)
[   74.140462] Call trace:
[   74.140474]  show_stack+0x20/0x38 (C)
[   74.140505]  dump_stack_lvl+0x8c/0xd0
[   74.140537]  print_report+0x118/0x5d0
[   74.140565]  kasan_report+0xdc/0x128
[   74.140591]  kasan_check_range+0x100/0x1a8
[   74.140621]  __kasan_check_write+0x20/0x30
[   74.140653]  kasan_atomics_helper+0xf20/0x4858
[   74.140689]  kasan_atomics+0x198/0x2e0
[   74.140721]  kunit_try_run_case+0x170/0x3f0
[   74.140750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.140783]  kthread+0x328/0x630
[   74.140810]  ret_from_fork+0x10/0x20
[   74.140840] 
[   74.211810] Allocated by task 346:
[   74.215196]  kasan_save_stack+0x3c/0x68
[   74.219014]  kasan_save_track+0x20/0x40
[   74.222834]  kasan_save_alloc_info+0x40/0x58
[   74.227087]  __kasan_kmalloc+0xd4/0xd8
[   74.230820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.235334]  kasan_atomics+0xb8/0x2e0
[   74.238979]  kunit_try_run_case+0x170/0x3f0
[   74.243146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.248615]  kthread+0x328/0x630
[   74.251826]  ret_from_fork+0x10/0x20
[   74.255385] 
[   74.256861] The buggy address belongs to the object at ffff00080851b080
[   74.256861]  which belongs to the cache kmalloc-64 of size 64
[   74.269188] The buggy address is located 0 bytes to the right of
[   74.269188]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.282034] 
[   74.283510] The buggy address belongs to the physical page:
[   74.289067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.297053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.303562] page_type: f5(slab)
[   74.306695] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.314419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.322138] page dumped because: kasan: bad access detected
[   74.327693] 
[   74.329169] Memory state around the buggy address:
[   74.333947]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.341152]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.348356] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.355557]                                      ^
[   74.360336]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.367540]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.374741] ==================================================================
[   66.195751] ==================================================================
[   66.202817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   66.210107] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   66.217485] 
[   66.218966] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   66.219015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.219032] Hardware name: WinLink E850-96 board (DT)
[   66.219051] Call trace:
[   66.219064]  show_stack+0x20/0x38 (C)
[   66.219096]  dump_stack_lvl+0x8c/0xd0
[   66.219128]  print_report+0x118/0x5d0
[   66.219156]  kasan_report+0xdc/0x128
[   66.219183]  kasan_check_range+0x100/0x1a8
[   66.219213]  __kasan_check_write+0x20/0x30
[   66.219243]  kasan_atomics_helper+0x47c/0x4858
[   66.219276]  kasan_atomics+0x198/0x2e0
[   66.219308]  kunit_try_run_case+0x170/0x3f0
[   66.219336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.219370]  kthread+0x328/0x630
[   66.219398]  ret_from_fork+0x10/0x20
[   66.219426] 
[   66.290401] Allocated by task 346:
[   66.293788]  kasan_save_stack+0x3c/0x68
[   66.297606]  kasan_save_track+0x20/0x40
[   66.301425]  kasan_save_alloc_info+0x40/0x58
[   66.305678]  __kasan_kmalloc+0xd4/0xd8
[   66.309411]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.313925]  kasan_atomics+0xb8/0x2e0
[   66.317571]  kunit_try_run_case+0x170/0x3f0
[   66.321737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.327206]  kthread+0x328/0x630
[   66.330418]  ret_from_fork+0x10/0x20
[   66.333977] 
[   66.335452] The buggy address belongs to the object at ffff00080851b080
[   66.335452]  which belongs to the cache kmalloc-64 of size 64
[   66.347779] The buggy address is located 0 bytes to the right of
[   66.347779]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.360625] 
[   66.362103] The buggy address belongs to the physical page:
[   66.367659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.375643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.382153] page_type: f5(slab)
[   66.385286] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.393010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.400730] page dumped because: kasan: bad access detected
[   66.406285] 
[   66.407760] Memory state around the buggy address:
[   66.412540]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.419743]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.426948] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.434149]                                      ^
[   66.438926]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.446131]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.453332] ==================================================================
[   80.461693] ==================================================================
[   80.468748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   80.476126] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   80.483504] 
[   80.484986] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.485035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.485049] Hardware name: WinLink E850-96 board (DT)
[   80.485067] Call trace:
[   80.485080]  show_stack+0x20/0x38 (C)
[   80.485110]  dump_stack_lvl+0x8c/0xd0
[   80.485146]  print_report+0x118/0x5d0
[   80.485173]  kasan_report+0xdc/0x128
[   80.485201]  kasan_check_range+0x100/0x1a8
[   80.485232]  __kasan_check_write+0x20/0x30
[   80.485261]  kasan_atomics_helper+0x17ec/0x4858
[   80.485297]  kasan_atomics+0x198/0x2e0
[   80.485331]  kunit_try_run_case+0x170/0x3f0
[   80.485363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.485397]  kthread+0x328/0x630
[   80.485424]  ret_from_fork+0x10/0x20
[   80.485455] 
[   80.556506] Allocated by task 346:
[   80.559893]  kasan_save_stack+0x3c/0x68
[   80.563711]  kasan_save_track+0x20/0x40
[   80.567531]  kasan_save_alloc_info+0x40/0x58
[   80.571784]  __kasan_kmalloc+0xd4/0xd8
[   80.575516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.580030]  kasan_atomics+0xb8/0x2e0
[   80.583676]  kunit_try_run_case+0x170/0x3f0
[   80.587842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.593311]  kthread+0x328/0x630
[   80.596523]  ret_from_fork+0x10/0x20
[   80.600082] 
[   80.601558] The buggy address belongs to the object at ffff00080851b080
[   80.601558]  which belongs to the cache kmalloc-64 of size 64
[   80.613884] The buggy address is located 0 bytes to the right of
[   80.613884]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   80.626730] 
[   80.628207] The buggy address belongs to the physical page:
[   80.633765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   80.641748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.648258] page_type: f5(slab)
[   80.651394] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.659115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.666834] page dumped because: kasan: bad access detected
[   80.672389] 
[   80.673865] Memory state around the buggy address:
[   80.678644]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.685848]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.693052] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.700254]                                      ^
[   80.705032]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.712237]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.719437] ==================================================================
[   63.821307] ==================================================================
[   63.828374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   63.835751] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   63.843128] 
[   63.844613] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.844669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.844684] Hardware name: WinLink E850-96 board (DT)
[   63.844705] Call trace:
[   63.844715]  show_stack+0x20/0x38 (C)
[   63.844749]  dump_stack_lvl+0x8c/0xd0
[   63.844784]  print_report+0x118/0x5d0
[   63.844813]  kasan_report+0xdc/0x128
[   63.844842]  __asan_report_store4_noabort+0x20/0x30
[   63.844877]  kasan_atomics_helper+0x3f7c/0x4858
[   63.844911]  kasan_atomics+0x198/0x2e0
[   63.844944]  kunit_try_run_case+0x170/0x3f0
[   63.844976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.845010]  kthread+0x328/0x630
[   63.845038]  ret_from_fork+0x10/0x20
[   63.845069] 
[   63.912832] Allocated by task 346:
[   63.916219]  kasan_save_stack+0x3c/0x68
[   63.920037]  kasan_save_track+0x20/0x40
[   63.923856]  kasan_save_alloc_info+0x40/0x58
[   63.928110]  __kasan_kmalloc+0xd4/0xd8
[   63.931842]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.936356]  kasan_atomics+0xb8/0x2e0
[   63.940004]  kunit_try_run_case+0x170/0x3f0
[   63.944169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.949637]  kthread+0x328/0x630
[   63.952849]  ret_from_fork+0x10/0x20
[   63.956408] 
[   63.957885] The buggy address belongs to the object at ffff00080851b080
[   63.957885]  which belongs to the cache kmalloc-64 of size 64
[   63.970210] The buggy address is located 0 bytes to the right of
[   63.970210]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   63.983057] 
[   63.984535] The buggy address belongs to the physical page:
[   63.990092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   63.998076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.004584] page_type: f5(slab)
[   64.007719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   64.015442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.023162] page dumped because: kasan: bad access detected
[   64.028716] 
[   64.030192] Memory state around the buggy address:
[   64.034970]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.042174]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.049379] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.056580]                                      ^
[   64.061358]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.068563]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.075765] ==================================================================
[   71.219457] ==================================================================
[   71.226526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   71.233817] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   71.241195] 
[   71.242677] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   71.242726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.242742] Hardware name: WinLink E850-96 board (DT)
[   71.242762] Call trace:
[   71.242773]  show_stack+0x20/0x38 (C)
[   71.242803]  dump_stack_lvl+0x8c/0xd0
[   71.242837]  print_report+0x118/0x5d0
[   71.242865]  kasan_report+0xdc/0x128
[   71.242891]  kasan_check_range+0x100/0x1a8
[   71.242918]  __kasan_check_write+0x20/0x30
[   71.242949]  kasan_atomics_helper+0xc08/0x4858
[   71.242984]  kasan_atomics+0x198/0x2e0
[   71.243016]  kunit_try_run_case+0x170/0x3f0
[   71.243044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.243078]  kthread+0x328/0x630
[   71.243101]  ret_from_fork+0x10/0x20
[   71.243132] 
[   71.314110] Allocated by task 346:
[   71.317497]  kasan_save_stack+0x3c/0x68
[   71.321315]  kasan_save_track+0x20/0x40
[   71.325134]  kasan_save_alloc_info+0x40/0x58
[   71.329388]  __kasan_kmalloc+0xd4/0xd8
[   71.333120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.337634]  kasan_atomics+0xb8/0x2e0
[   71.341280]  kunit_try_run_case+0x170/0x3f0
[   71.345446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.350915]  kthread+0x328/0x630
[   71.354127]  ret_from_fork+0x10/0x20
[   71.357686] 
[   71.359161] The buggy address belongs to the object at ffff00080851b080
[   71.359161]  which belongs to the cache kmalloc-64 of size 64
[   71.371488] The buggy address is located 0 bytes to the right of
[   71.371488]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.384335] 
[   71.385811] The buggy address belongs to the physical page:
[   71.391367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.399352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.405862] page_type: f5(slab)
[   71.408995] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.416719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.424438] page dumped because: kasan: bad access detected
[   71.429993] 
[   71.431469] Memory state around the buggy address:
[   71.436248]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.443452]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.450657] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.457858]                                      ^
[   71.462636]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.469841]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.477041] ==================================================================
[   79.934944] ==================================================================
[   79.942020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   79.949397] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.956775] 
[   79.958258] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.958304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.958322] Hardware name: WinLink E850-96 board (DT)
[   79.958340] Call trace:
[   79.958354]  show_stack+0x20/0x38 (C)
[   79.958385]  dump_stack_lvl+0x8c/0xd0
[   79.958415]  print_report+0x118/0x5d0
[   79.958443]  kasan_report+0xdc/0x128
[   79.958470]  kasan_check_range+0x100/0x1a8
[   79.958499]  __kasan_check_write+0x20/0x30
[   79.958530]  kasan_atomics_helper+0x175c/0x4858
[   79.958565]  kasan_atomics+0x198/0x2e0
[   79.958596]  kunit_try_run_case+0x170/0x3f0
[   79.958625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.958658]  kthread+0x328/0x630
[   79.958685]  ret_from_fork+0x10/0x20
[   79.958714] 
[   80.029779] Allocated by task 346:
[   80.033165]  kasan_save_stack+0x3c/0x68
[   80.036983]  kasan_save_track+0x20/0x40
[   80.040802]  kasan_save_alloc_info+0x40/0x58
[   80.045055]  __kasan_kmalloc+0xd4/0xd8
[   80.048788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.053302]  kasan_atomics+0xb8/0x2e0
[   80.056947]  kunit_try_run_case+0x170/0x3f0
[   80.061114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.066583]  kthread+0x328/0x630
[   80.069795]  ret_from_fork+0x10/0x20
[   80.073354] 
[   80.074829] The buggy address belongs to the object at ffff00080851b080
[   80.074829]  which belongs to the cache kmalloc-64 of size 64
[   80.087156] The buggy address is located 0 bytes to the right of
[   80.087156]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   80.100003] 
[   80.101479] The buggy address belongs to the physical page:
[   80.107036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   80.115020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.121530] page_type: f5(slab)
[   80.124662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.132387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.140106] page dumped because: kasan: bad access detected
[   80.145662] 
[   80.147137] Memory state around the buggy address:
[   80.151916]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.159120]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.166325] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.173526]                                      ^
[   80.178304]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.185508]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.192710] ==================================================================
[   65.404077] ==================================================================
[   65.411163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   65.418541] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   65.425917] 
[   65.427400] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   65.427449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.427464] Hardware name: WinLink E850-96 board (DT)
[   65.427484] Call trace:
[   65.427495]  show_stack+0x20/0x38 (C)
[   65.427524]  dump_stack_lvl+0x8c/0xd0
[   65.427559]  print_report+0x118/0x5d0
[   65.427588]  kasan_report+0xdc/0x128
[   65.427614]  __asan_report_store4_noabort+0x20/0x30
[   65.427647]  kasan_atomics_helper+0x3f94/0x4858
[   65.427681]  kasan_atomics+0x198/0x2e0
[   65.427713]  kunit_try_run_case+0x170/0x3f0
[   65.427747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.427781]  kthread+0x328/0x630
[   65.427806]  ret_from_fork+0x10/0x20
[   65.427836] 
[   65.495621] Allocated by task 346:
[   65.499008]  kasan_save_stack+0x3c/0x68
[   65.502826]  kasan_save_track+0x20/0x40
[   65.506645]  kasan_save_alloc_info+0x40/0x58
[   65.510899]  __kasan_kmalloc+0xd4/0xd8
[   65.514631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.519145]  kasan_atomics+0xb8/0x2e0
[   65.522791]  kunit_try_run_case+0x170/0x3f0
[   65.526958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.532426]  kthread+0x328/0x630
[   65.535638]  ret_from_fork+0x10/0x20
[   65.539197] 
[   65.540672] The buggy address belongs to the object at ffff00080851b080
[   65.540672]  which belongs to the cache kmalloc-64 of size 64
[   65.552999] The buggy address is located 0 bytes to the right of
[   65.552999]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   65.565845] 
[   65.567325] The buggy address belongs to the physical page:
[   65.572880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   65.580863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.587373] page_type: f5(slab)
[   65.590507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   65.598231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.605949] page dumped because: kasan: bad access detected
[   65.611505] 
[   65.612980] Memory state around the buggy address:
[   65.617761]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.624963]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.632168] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.639369]                                      ^
[   65.644147]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.651352]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.658553] ==================================================================
[   80.200043] ==================================================================
[   80.207121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   80.214498] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   80.221789] 
[   80.223270] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.223319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.223334] Hardware name: WinLink E850-96 board (DT)
[   80.223349] Call trace:
[   80.223362]  show_stack+0x20/0x38 (C)
[   80.223393]  dump_stack_lvl+0x8c/0xd0
[   80.223426]  print_report+0x118/0x5d0
[   80.223455]  kasan_report+0xdc/0x128
[   80.223482]  __asan_report_load8_noabort+0x20/0x30
[   80.223514]  kasan_atomics_helper+0x3e20/0x4858
[   80.223551]  kasan_atomics+0x198/0x2e0
[   80.223583]  kunit_try_run_case+0x170/0x3f0
[   80.223611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.223644]  kthread+0x328/0x630
[   80.223670]  ret_from_fork+0x10/0x20
[   80.223702] 
[   80.291406] Allocated by task 346:
[   80.294793]  kasan_save_stack+0x3c/0x68
[   80.298611]  kasan_save_track+0x20/0x40
[   80.302430]  kasan_save_alloc_info+0x40/0x58
[   80.306683]  __kasan_kmalloc+0xd4/0xd8
[   80.310416]  __kmalloc_cache_noprof+0x16c/0x3c0
[   80.314930]  kasan_atomics+0xb8/0x2e0
[   80.318576]  kunit_try_run_case+0x170/0x3f0
[   80.322742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.328211]  kthread+0x328/0x630
[   80.331423]  ret_from_fork+0x10/0x20
[   80.334982] 
[   80.336457] The buggy address belongs to the object at ffff00080851b080
[   80.336457]  which belongs to the cache kmalloc-64 of size 64
[   80.348784] The buggy address is located 0 bytes to the right of
[   80.348784]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   80.361630] 
[   80.363106] The buggy address belongs to the physical page:
[   80.368662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   80.376648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.383158] page_type: f5(slab)
[   80.386291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   80.394015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   80.401734] page dumped because: kasan: bad access detected
[   80.407289] 
[   80.408765] Memory state around the buggy address:
[   80.413543]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   80.420748]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   80.427953] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.435154]                                      ^
[   80.439932]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.447137]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.454338] ==================================================================
[   68.315174] ==================================================================
[   68.322230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   68.329520] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.336898] 
[   68.338379] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.338432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.338449] Hardware name: WinLink E850-96 board (DT)
[   68.338466] Call trace:
[   68.338478]  show_stack+0x20/0x38 (C)
[   68.338509]  dump_stack_lvl+0x8c/0xd0
[   68.338543]  print_report+0x118/0x5d0
[   68.338570]  kasan_report+0xdc/0x128
[   68.338596]  kasan_check_range+0x100/0x1a8
[   68.338627]  __kasan_check_write+0x20/0x30
[   68.338656]  kasan_atomics_helper+0x7cc/0x4858
[   68.338690]  kasan_atomics+0x198/0x2e0
[   68.338721]  kunit_try_run_case+0x170/0x3f0
[   68.338751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.338782]  kthread+0x328/0x630
[   68.338808]  ret_from_fork+0x10/0x20
[   68.338837] 
[   68.409813] Allocated by task 346:
[   68.413200]  kasan_save_stack+0x3c/0x68
[   68.417018]  kasan_save_track+0x20/0x40
[   68.420838]  kasan_save_alloc_info+0x40/0x58
[   68.425091]  __kasan_kmalloc+0xd4/0xd8
[   68.428823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.433337]  kasan_atomics+0xb8/0x2e0
[   68.436983]  kunit_try_run_case+0x170/0x3f0
[   68.441150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.446618]  kthread+0x328/0x630
[   68.449830]  ret_from_fork+0x10/0x20
[   68.453389] 
[   68.454865] The buggy address belongs to the object at ffff00080851b080
[   68.454865]  which belongs to the cache kmalloc-64 of size 64
[   68.467191] The buggy address is located 0 bytes to the right of
[   68.467191]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   68.480038] 
[   68.481516] The buggy address belongs to the physical page:
[   68.487072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   68.495055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.501566] page_type: f5(slab)
[   68.504700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   68.512423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.520142] page dumped because: kasan: bad access detected
[   68.525697] 
[   68.527172] Memory state around the buggy address:
[   68.531951]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   68.539156]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.546360] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.553561]                                      ^
[   68.558339]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.565544]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.572745] ==================================================================
[   74.647003] ==================================================================
[   74.654079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   74.661369] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.668747] 
[   74.670229] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.670276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.670293] Hardware name: WinLink E850-96 board (DT)
[   74.670312] Call trace:
[   74.670325]  show_stack+0x20/0x38 (C)
[   74.670355]  dump_stack_lvl+0x8c/0xd0
[   74.670386]  print_report+0x118/0x5d0
[   74.670414]  kasan_report+0xdc/0x128
[   74.670441]  kasan_check_range+0x100/0x1a8
[   74.670470]  __kasan_check_write+0x20/0x30
[   74.670502]  kasan_atomics_helper+0xff0/0x4858
[   74.670537]  kasan_atomics+0x198/0x2e0
[   74.670571]  kunit_try_run_case+0x170/0x3f0
[   74.670600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.670635]  kthread+0x328/0x630
[   74.670661]  ret_from_fork+0x10/0x20
[   74.670691] 
[   74.741663] Allocated by task 346:
[   74.745050]  kasan_save_stack+0x3c/0x68
[   74.748868]  kasan_save_track+0x20/0x40
[   74.752687]  kasan_save_alloc_info+0x40/0x58
[   74.756940]  __kasan_kmalloc+0xd4/0xd8
[   74.760673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.765187]  kasan_atomics+0xb8/0x2e0
[   74.768832]  kunit_try_run_case+0x170/0x3f0
[   74.772999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.778468]  kthread+0x328/0x630
[   74.781680]  ret_from_fork+0x10/0x20
[   74.785239] 
[   74.786714] The buggy address belongs to the object at ffff00080851b080
[   74.786714]  which belongs to the cache kmalloc-64 of size 64
[   74.799041] The buggy address is located 0 bytes to the right of
[   74.799041]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.811887] 
[   74.813363] The buggy address belongs to the physical page:
[   74.818920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.826905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.833415] page_type: f5(slab)
[   74.836549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.844272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.851992] page dumped because: kasan: bad access detected
[   74.857546] 
[   74.859022] Memory state around the buggy address:
[   74.863800]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.871005]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.878210] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.885411]                                      ^
[   74.890189]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.897393]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.904595] ==================================================================
[   75.177033] ==================================================================
[   75.184106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   75.191483] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.198861] 
[   75.200342] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.200392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.200407] Hardware name: WinLink E850-96 board (DT)
[   75.200426] Call trace:
[   75.200441]  show_stack+0x20/0x38 (C)
[   75.200472]  dump_stack_lvl+0x8c/0xd0
[   75.200505]  print_report+0x118/0x5d0
[   75.200533]  kasan_report+0xdc/0x128
[   75.200559]  kasan_check_range+0x100/0x1a8
[   75.200588]  __kasan_check_write+0x20/0x30
[   75.200620]  kasan_atomics_helper+0x10c0/0x4858
[   75.200656]  kasan_atomics+0x198/0x2e0
[   75.200689]  kunit_try_run_case+0x170/0x3f0
[   75.200716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.200749]  kthread+0x328/0x630
[   75.200776]  ret_from_fork+0x10/0x20
[   75.200807] 
[   75.271863] Allocated by task 346:
[   75.275250]  kasan_save_stack+0x3c/0x68
[   75.279068]  kasan_save_track+0x20/0x40
[   75.282887]  kasan_save_alloc_info+0x40/0x58
[   75.287141]  __kasan_kmalloc+0xd4/0xd8
[   75.290874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.295387]  kasan_atomics+0xb8/0x2e0
[   75.299033]  kunit_try_run_case+0x170/0x3f0
[   75.303200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.308668]  kthread+0x328/0x630
[   75.311880]  ret_from_fork+0x10/0x20
[   75.315439] 
[   75.316914] The buggy address belongs to the object at ffff00080851b080
[   75.316914]  which belongs to the cache kmalloc-64 of size 64
[   75.329241] The buggy address is located 0 bytes to the right of
[   75.329241]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.342088] 
[   75.343564] The buggy address belongs to the physical page:
[   75.349121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.357105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.363615] page_type: f5(slab)
[   75.366748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.374472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.382191] page dumped because: kasan: bad access detected
[   75.387747] 
[   75.389223] Memory state around the buggy address:
[   75.394001]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.401206]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.408410] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.415611]                                      ^
[   75.420389]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.427594]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.434795] ==================================================================
[   69.636484] ==================================================================
[   69.643564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   69.650854] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   69.658232] 
[   69.659713] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   69.659763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.659778] Hardware name: WinLink E850-96 board (DT)
[   69.659796] Call trace:
[   69.659809]  show_stack+0x20/0x38 (C)
[   69.659839]  dump_stack_lvl+0x8c/0xd0
[   69.659870]  print_report+0x118/0x5d0
[   69.659898]  kasan_report+0xdc/0x128
[   69.659924]  kasan_check_range+0x100/0x1a8
[   69.659954]  __kasan_check_write+0x20/0x30
[   69.659984]  kasan_atomics_helper+0xa04/0x4858
[   69.660020]  kasan_atomics+0x198/0x2e0
[   69.660051]  kunit_try_run_case+0x170/0x3f0
[   69.660079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.660115]  kthread+0x328/0x630
[   69.660142]  ret_from_fork+0x10/0x20
[   69.660173] 
[   69.731148] Allocated by task 346:
[   69.734535]  kasan_save_stack+0x3c/0x68
[   69.738353]  kasan_save_track+0x20/0x40
[   69.742172]  kasan_save_alloc_info+0x40/0x58
[   69.746426]  __kasan_kmalloc+0xd4/0xd8
[   69.750158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.754672]  kasan_atomics+0xb8/0x2e0
[   69.758318]  kunit_try_run_case+0x170/0x3f0
[   69.762484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.767953]  kthread+0x328/0x630
[   69.771164]  ret_from_fork+0x10/0x20
[   69.774724] 
[   69.776199] The buggy address belongs to the object at ffff00080851b080
[   69.776199]  which belongs to the cache kmalloc-64 of size 64
[   69.788526] The buggy address is located 0 bytes to the right of
[   69.788526]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.801372] 
[   69.802848] The buggy address belongs to the physical page:
[   69.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.816390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.822900] page_type: f5(slab)
[   69.826033] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.833757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.841476] page dumped because: kasan: bad access detected
[   69.847031] 
[   69.848507] Memory state around the buggy address:
[   69.853287]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.860490]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.867695] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.874896]                                      ^
[   69.879674]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.886879]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.894079] ==================================================================
[   66.460722] ==================================================================
[   66.467745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   66.475034] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   66.482412] 
[   66.483893] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   66.483943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.483960] Hardware name: WinLink E850-96 board (DT)
[   66.483981] Call trace:
[   66.483995]  show_stack+0x20/0x38 (C)
[   66.484026]  dump_stack_lvl+0x8c/0xd0
[   66.484058]  print_report+0x118/0x5d0
[   66.484087]  kasan_report+0xdc/0x128
[   66.484114]  kasan_check_range+0x100/0x1a8
[   66.484143]  __kasan_check_write+0x20/0x30
[   66.484173]  kasan_atomics_helper+0x4e4/0x4858
[   66.484207]  kasan_atomics+0x198/0x2e0
[   66.484238]  kunit_try_run_case+0x170/0x3f0
[   66.484270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.484306]  kthread+0x328/0x630
[   66.484334]  ret_from_fork+0x10/0x20
[   66.484365] 
[   66.555327] Allocated by task 346:
[   66.558714]  kasan_save_stack+0x3c/0x68
[   66.562532]  kasan_save_track+0x20/0x40
[   66.566351]  kasan_save_alloc_info+0x40/0x58
[   66.570605]  __kasan_kmalloc+0xd4/0xd8
[   66.574338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.578851]  kasan_atomics+0xb8/0x2e0
[   66.582497]  kunit_try_run_case+0x170/0x3f0
[   66.586664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.592132]  kthread+0x328/0x630
[   66.595344]  ret_from_fork+0x10/0x20
[   66.598903] 
[   66.600379] The buggy address belongs to the object at ffff00080851b080
[   66.600379]  which belongs to the cache kmalloc-64 of size 64
[   66.612705] The buggy address is located 0 bytes to the right of
[   66.612705]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   66.625552] 
[   66.627029] The buggy address belongs to the physical page:
[   66.632585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   66.640571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.647079] page_type: f5(slab)
[   66.650212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   66.657936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.665656] page dumped because: kasan: bad access detected
[   66.671211] 
[   66.672687] Memory state around the buggy address:
[   66.677468]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   66.684669]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.691874] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.699075]                                      ^
[   66.703853]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.711058]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.718259] ==================================================================
[   75.707229] ==================================================================
[   75.714306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   75.721683] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   75.729061] 
[   75.730543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   75.730590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.730604] Hardware name: WinLink E850-96 board (DT)
[   75.730622] Call trace:
[   75.730634]  show_stack+0x20/0x38 (C)
[   75.730665]  dump_stack_lvl+0x8c/0xd0
[   75.730699]  print_report+0x118/0x5d0
[   75.730727]  kasan_report+0xdc/0x128
[   75.730755]  kasan_check_range+0x100/0x1a8
[   75.730785]  __kasan_check_write+0x20/0x30
[   75.730814]  kasan_atomics_helper+0x1190/0x4858
[   75.730850]  kasan_atomics+0x198/0x2e0
[   75.730883]  kunit_try_run_case+0x170/0x3f0
[   75.730912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.730944]  kthread+0x328/0x630
[   75.730970]  ret_from_fork+0x10/0x20
[   75.731002] 
[   75.802064] Allocated by task 346:
[   75.805451]  kasan_save_stack+0x3c/0x68
[   75.809268]  kasan_save_track+0x20/0x40
[   75.813088]  kasan_save_alloc_info+0x40/0x58
[   75.817341]  __kasan_kmalloc+0xd4/0xd8
[   75.821074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.825587]  kasan_atomics+0xb8/0x2e0
[   75.829233]  kunit_try_run_case+0x170/0x3f0
[   75.833400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.838868]  kthread+0x328/0x630
[   75.842080]  ret_from_fork+0x10/0x20
[   75.845639] 
[   75.847115] The buggy address belongs to the object at ffff00080851b080
[   75.847115]  which belongs to the cache kmalloc-64 of size 64
[   75.859442] The buggy address is located 0 bytes to the right of
[   75.859442]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.872288] 
[   75.873764] The buggy address belongs to the physical page:
[   75.879323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.887307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.893816] page_type: f5(slab)
[   75.896950] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.904673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.912392] page dumped because: kasan: bad access detected
[   75.917947] 
[   75.919423] Memory state around the buggy address:
[   75.924201]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.931406]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.938610] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.945811]                                      ^
[   75.950589]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.957794]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.964995] ==================================================================
[   74.382103] ==================================================================
[   74.389152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   74.396444] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.403821] 
[   74.405302] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.405350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.405366] Hardware name: WinLink E850-96 board (DT)
[   74.405384] Call trace:
[   74.405397]  show_stack+0x20/0x38 (C)
[   74.405428]  dump_stack_lvl+0x8c/0xd0
[   74.405460]  print_report+0x118/0x5d0
[   74.405488]  kasan_report+0xdc/0x128
[   74.405515]  kasan_check_range+0x100/0x1a8
[   74.405544]  __kasan_check_write+0x20/0x30
[   74.405576]  kasan_atomics_helper+0xf88/0x4858
[   74.405611]  kasan_atomics+0x198/0x2e0
[   74.405644]  kunit_try_run_case+0x170/0x3f0
[   74.405674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.405708]  kthread+0x328/0x630
[   74.405735]  ret_from_fork+0x10/0x20
[   74.405768] 
[   74.476736] Allocated by task 346:
[   74.480123]  kasan_save_stack+0x3c/0x68
[   74.483941]  kasan_save_track+0x20/0x40
[   74.487760]  kasan_save_alloc_info+0x40/0x58
[   74.492014]  __kasan_kmalloc+0xd4/0xd8
[   74.495746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.500260]  kasan_atomics+0xb8/0x2e0
[   74.503906]  kunit_try_run_case+0x170/0x3f0
[   74.508073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.513541]  kthread+0x328/0x630
[   74.516753]  ret_from_fork+0x10/0x20
[   74.520312] 
[   74.521788] The buggy address belongs to the object at ffff00080851b080
[   74.521788]  which belongs to the cache kmalloc-64 of size 64
[   74.534114] The buggy address is located 0 bytes to the right of
[   74.534114]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   74.546961] 
[   74.548437] The buggy address belongs to the physical page:
[   74.553996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   74.561979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.568488] page_type: f5(slab)
[   74.571624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   74.579346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.587065] page dumped because: kasan: bad access detected
[   74.592620] 
[   74.594095] Memory state around the buggy address:
[   74.598876]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.606078]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.613283] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.620484]                                      ^
[   74.625262]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.632467]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.639669] ==================================================================
[   74.911950] ==================================================================
[   74.919008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   74.926384] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   74.933761] 
[   74.935241] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   74.935290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.935306] Hardware name: WinLink E850-96 board (DT)
[   74.935324] Call trace:
[   74.935337]  show_stack+0x20/0x38 (C)
[   74.935370]  dump_stack_lvl+0x8c/0xd0
[   74.935402]  print_report+0x118/0x5d0
[   74.935432]  kasan_report+0xdc/0x128
[   74.935458]  kasan_check_range+0x100/0x1a8
[   74.935487]  __kasan_check_write+0x20/0x30
[   74.935517]  kasan_atomics_helper+0x1058/0x4858
[   74.935552]  kasan_atomics+0x198/0x2e0
[   74.935582]  kunit_try_run_case+0x170/0x3f0
[   74.935612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.935645]  kthread+0x328/0x630
[   74.935669]  ret_from_fork+0x10/0x20
[   74.935700] 
[   75.006763] Allocated by task 346:
[   75.010150]  kasan_save_stack+0x3c/0x68
[   75.013968]  kasan_save_track+0x20/0x40
[   75.017787]  kasan_save_alloc_info+0x40/0x58
[   75.022040]  __kasan_kmalloc+0xd4/0xd8
[   75.025773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.030287]  kasan_atomics+0xb8/0x2e0
[   75.033933]  kunit_try_run_case+0x170/0x3f0
[   75.038099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.043568]  kthread+0x328/0x630
[   75.046780]  ret_from_fork+0x10/0x20
[   75.050339] 
[   75.051814] The buggy address belongs to the object at ffff00080851b080
[   75.051814]  which belongs to the cache kmalloc-64 of size 64
[   75.064141] The buggy address is located 0 bytes to the right of
[   75.064141]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   75.076988] 
[   75.078463] The buggy address belongs to the physical page:
[   75.084021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   75.092005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.098515] page_type: f5(slab)
[   75.101650] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   75.109372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.117091] page dumped because: kasan: bad access detected
[   75.122646] 
[   75.124122] Memory state around the buggy address:
[   75.128900]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.136105]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.143310] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.150511]                                      ^
[   75.155289]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.162494]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.169695] ==================================================================
[   78.354760] ==================================================================
[   78.361836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   78.369215] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.376591] 
[   78.378073] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.378121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.378137] Hardware name: WinLink E850-96 board (DT)
[   78.378156] Call trace:
[   78.378170]  show_stack+0x20/0x38 (C)
[   78.378202]  dump_stack_lvl+0x8c/0xd0
[   78.378235]  print_report+0x118/0x5d0
[   78.378263]  kasan_report+0xdc/0x128
[   78.378290]  kasan_check_range+0x100/0x1a8
[   78.378319]  __kasan_check_write+0x20/0x30
[   78.378350]  kasan_atomics_helper+0x15b4/0x4858
[   78.378385]  kasan_atomics+0x198/0x2e0
[   78.378417]  kunit_try_run_case+0x170/0x3f0
[   78.378447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.378480]  kthread+0x328/0x630
[   78.378506]  ret_from_fork+0x10/0x20
[   78.378537] 
[   78.449593] Allocated by task 346:
[   78.452980]  kasan_save_stack+0x3c/0x68
[   78.456798]  kasan_save_track+0x20/0x40
[   78.460618]  kasan_save_alloc_info+0x40/0x58
[   78.464871]  __kasan_kmalloc+0xd4/0xd8
[   78.468604]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.473117]  kasan_atomics+0xb8/0x2e0
[   78.476763]  kunit_try_run_case+0x170/0x3f0
[   78.480930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.486398]  kthread+0x328/0x630
[   78.489610]  ret_from_fork+0x10/0x20
[   78.493169] 
[   78.494644] The buggy address belongs to the object at ffff00080851b080
[   78.494644]  which belongs to the cache kmalloc-64 of size 64
[   78.506971] The buggy address is located 0 bytes to the right of
[   78.506971]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   78.519818] 
[   78.521294] The buggy address belongs to the physical page:
[   78.526851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.534835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.541345] page_type: f5(slab)
[   78.544478] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.552202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.559921] page dumped because: kasan: bad access detected
[   78.565477] 
[   78.566952] Memory state around the buggy address:
[   78.571731]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.578935]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.586140] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.593341]                                      ^
[   78.598119]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.605324]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.612525] ==================================================================
[   66.990526] ==================================================================
[   66.997597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   67.004888] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   67.012265] 
[   67.013748] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   67.013795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.013811] Hardware name: WinLink E850-96 board (DT)
[   67.013830] Call trace:
[   67.013842]  show_stack+0x20/0x38 (C)
[   67.013873]  dump_stack_lvl+0x8c/0xd0
[   67.013906]  print_report+0x118/0x5d0
[   67.013934]  kasan_report+0xdc/0x128
[   67.013961]  kasan_check_range+0x100/0x1a8
[   67.013990]  __kasan_check_write+0x20/0x30
[   67.014021]  kasan_atomics_helper+0x5b4/0x4858
[   67.014056]  kasan_atomics+0x198/0x2e0
[   67.014087]  kunit_try_run_case+0x170/0x3f0
[   67.014117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.014149]  kthread+0x328/0x630
[   67.014177]  ret_from_fork+0x10/0x20
[   67.014207] 
[   67.085182] Allocated by task 346:
[   67.088568]  kasan_save_stack+0x3c/0x68
[   67.092385]  kasan_save_track+0x20/0x40
[   67.096205]  kasan_save_alloc_info+0x40/0x58
[   67.100458]  __kasan_kmalloc+0xd4/0xd8
[   67.104191]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.108705]  kasan_atomics+0xb8/0x2e0
[   67.112350]  kunit_try_run_case+0x170/0x3f0
[   67.116517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.121986]  kthread+0x328/0x630
[   67.125198]  ret_from_fork+0x10/0x20
[   67.128757] 
[   67.130232] The buggy address belongs to the object at ffff00080851b080
[   67.130232]  which belongs to the cache kmalloc-64 of size 64
[   67.142558] The buggy address is located 0 bytes to the right of
[   67.142558]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   67.155405] 
[   67.156883] The buggy address belongs to the physical page:
[   67.162439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   67.170422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.176933] page_type: f5(slab)
[   67.180066] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   67.187790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.195509] page dumped because: kasan: bad access detected
[   67.201064] 
[   67.202540] Memory state around the buggy address:
[   67.207318]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   67.214523]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.221728] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.228928]                                      ^
[   67.233706]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.240911]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.248112] ==================================================================
[   77.559481] ==================================================================
[   77.566535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   77.573912] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   77.581291] 
[   77.582773] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   77.582822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.582838] Hardware name: WinLink E850-96 board (DT)
[   77.582858] Call trace:
[   77.582870]  show_stack+0x20/0x38 (C)
[   77.582902]  dump_stack_lvl+0x8c/0xd0
[   77.582935]  print_report+0x118/0x5d0
[   77.582964]  kasan_report+0xdc/0x128
[   77.582992]  kasan_check_range+0x100/0x1a8
[   77.583023]  __kasan_check_write+0x20/0x30
[   77.583053]  kasan_atomics_helper+0x147c/0x4858
[   77.583088]  kasan_atomics+0x198/0x2e0
[   77.583122]  kunit_try_run_case+0x170/0x3f0
[   77.583151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.583184]  kthread+0x328/0x630
[   77.583212]  ret_from_fork+0x10/0x20
[   77.583242] 
[   77.654293] Allocated by task 346:
[   77.657680]  kasan_save_stack+0x3c/0x68
[   77.661498]  kasan_save_track+0x20/0x40
[   77.665317]  kasan_save_alloc_info+0x40/0x58
[   77.669570]  __kasan_kmalloc+0xd4/0xd8
[   77.673303]  __kmalloc_cache_noprof+0x16c/0x3c0
[   77.677817]  kasan_atomics+0xb8/0x2e0
[   77.681462]  kunit_try_run_case+0x170/0x3f0
[   77.685629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.691097]  kthread+0x328/0x630
[   77.694309]  ret_from_fork+0x10/0x20
[   77.697868] 
[   77.699344] The buggy address belongs to the object at ffff00080851b080
[   77.699344]  which belongs to the cache kmalloc-64 of size 64
[   77.711671] The buggy address is located 0 bytes to the right of
[   77.711671]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   77.724517] 
[   77.725993] The buggy address belongs to the physical page:
[   77.731552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   77.739535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   77.746045] page_type: f5(slab)
[   77.749179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   77.756902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   77.764621] page dumped because: kasan: bad access detected
[   77.770176] 
[   77.771652] Memory state around the buggy address:
[   77.776434]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.783635]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   77.790839] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.798040]                                      ^
[   77.802818]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.810023]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.817224] ==================================================================
[   68.845010] ==================================================================
[   68.852083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   68.859461] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   68.866751] 
[   68.868231] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   68.868280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.868297] Hardware name: WinLink E850-96 board (DT)
[   68.868315] Call trace:
[   68.868329]  show_stack+0x20/0x38 (C)
[   68.868359]  dump_stack_lvl+0x8c/0xd0
[   68.868393]  print_report+0x118/0x5d0
[   68.868422]  kasan_report+0xdc/0x128
[   68.868449]  __asan_report_load4_noabort+0x20/0x30
[   68.868481]  kasan_atomics_helper+0x42d8/0x4858
[   68.868515]  kasan_atomics+0x198/0x2e0
[   68.868550]  kunit_try_run_case+0x170/0x3f0
[   68.868582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.868616]  kthread+0x328/0x630
[   68.868641]  ret_from_fork+0x10/0x20
[   68.868672] 
[   68.936368] Allocated by task 346:
[   68.939755]  kasan_save_stack+0x3c/0x68
[   68.943573]  kasan_save_track+0x20/0x40
[   68.947392]  kasan_save_alloc_info+0x40/0x58
[   68.951646]  __kasan_kmalloc+0xd4/0xd8
[   68.955378]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.959892]  kasan_atomics+0xb8/0x2e0
[   68.963538]  kunit_try_run_case+0x170/0x3f0
[   68.967704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.973173]  kthread+0x328/0x630
[   68.976385]  ret_from_fork+0x10/0x20
[   68.979944] 
[   68.981419] The buggy address belongs to the object at ffff00080851b080
[   68.981419]  which belongs to the cache kmalloc-64 of size 64
[   68.993746] The buggy address is located 0 bytes to the right of
[   68.993746]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   69.006592] 
[   69.008070] The buggy address belongs to the physical page:
[   69.013626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   69.021611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.028120] page_type: f5(slab)
[   69.031254] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   69.038977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.046696] page dumped because: kasan: bad access detected
[   69.052251] 
[   69.053727] Memory state around the buggy address:
[   69.058506]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   69.065710]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.072915] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.080116]                                      ^
[   69.084894]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.092099]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.099300] ==================================================================
[   70.166324] ==================================================================
[   70.173417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   70.180707] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   70.188085] 
[   70.189568] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   70.189619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.189634] Hardware name: WinLink E850-96 board (DT)
[   70.189652] Call trace:
[   70.189666]  show_stack+0x20/0x38 (C)
[   70.189698]  dump_stack_lvl+0x8c/0xd0
[   70.189730]  print_report+0x118/0x5d0
[   70.189757]  kasan_report+0xdc/0x128
[   70.189785]  kasan_check_range+0x100/0x1a8
[   70.189816]  __kasan_check_write+0x20/0x30
[   70.189845]  kasan_atomics_helper+0xad4/0x4858
[   70.189879]  kasan_atomics+0x198/0x2e0
[   70.189910]  kunit_try_run_case+0x170/0x3f0
[   70.189940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.189974]  kthread+0x328/0x630
[   70.190000]  ret_from_fork+0x10/0x20
[   70.190030] 
[   70.261001] Allocated by task 346:
[   70.264388]  kasan_save_stack+0x3c/0x68
[   70.268205]  kasan_save_track+0x20/0x40
[   70.272025]  kasan_save_alloc_info+0x40/0x58
[   70.276279]  __kasan_kmalloc+0xd4/0xd8
[   70.280011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.284525]  kasan_atomics+0xb8/0x2e0
[   70.288171]  kunit_try_run_case+0x170/0x3f0
[   70.292337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.297806]  kthread+0x328/0x630
[   70.301018]  ret_from_fork+0x10/0x20
[   70.304577] 
[   70.306052] The buggy address belongs to the object at ffff00080851b080
[   70.306052]  which belongs to the cache kmalloc-64 of size 64
[   70.318379] The buggy address is located 0 bytes to the right of
[   70.318379]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   70.331225] 
[   70.332701] The buggy address belongs to the physical page:
[   70.338258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   70.346243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.352753] page_type: f5(slab)
[   70.355886] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   70.363610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.371329] page dumped because: kasan: bad access detected
[   70.376884] 
[   70.378360] Memory state around the buggy address:
[   70.383138]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   70.390343]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.397548] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.404749]                                      ^
[   70.409526]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.416731]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.423933] ==================================================================
[   72.272557] ==================================================================
[   72.279635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   72.286926] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   72.294304] 
[   72.295785] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   72.295832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.295848] Hardware name: WinLink E850-96 board (DT)
[   72.295866] Call trace:
[   72.295880]  show_stack+0x20/0x38 (C)
[   72.295913]  dump_stack_lvl+0x8c/0xd0
[   72.295945]  print_report+0x118/0x5d0
[   72.295971]  kasan_report+0xdc/0x128
[   72.296000]  kasan_check_range+0x100/0x1a8
[   72.296029]  __kasan_check_write+0x20/0x30
[   72.296060]  kasan_atomics_helper+0xd3c/0x4858
[   72.296095]  kasan_atomics+0x198/0x2e0
[   72.296129]  kunit_try_run_case+0x170/0x3f0
[   72.296160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.296192]  kthread+0x328/0x630
[   72.296218]  ret_from_fork+0x10/0x20
[   72.296247] 
[   72.367219] Allocated by task 346:
[   72.370606]  kasan_save_stack+0x3c/0x68
[   72.374424]  kasan_save_track+0x20/0x40
[   72.378244]  kasan_save_alloc_info+0x40/0x58
[   72.382497]  __kasan_kmalloc+0xd4/0xd8
[   72.386229]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.390743]  kasan_atomics+0xb8/0x2e0
[   72.394389]  kunit_try_run_case+0x170/0x3f0
[   72.398555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.404025]  kthread+0x328/0x630
[   72.407236]  ret_from_fork+0x10/0x20
[   72.410795] 
[   72.412270] The buggy address belongs to the object at ffff00080851b080
[   72.412270]  which belongs to the cache kmalloc-64 of size 64
[   72.424597] The buggy address is located 0 bytes to the right of
[   72.424597]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   72.437444] 
[   72.438920] The buggy address belongs to the physical page:
[   72.444477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   72.452464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.458971] page_type: f5(slab)
[   72.462104] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   72.469829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.477548] page dumped because: kasan: bad access detected
[   72.483103] 
[   72.484578] Memory state around the buggy address:
[   72.489358]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.496562]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.503766] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.510967]                                      ^
[   72.515745]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.522950]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.530151] ==================================================================
[   78.881488] ==================================================================
[   78.888564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   78.895941] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.903319] 
[   78.904800] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.904850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.904865] Hardware name: WinLink E850-96 board (DT)
[   78.904883] Call trace:
[   78.904894]  show_stack+0x20/0x38 (C)
[   78.904924]  dump_stack_lvl+0x8c/0xd0
[   78.904956]  print_report+0x118/0x5d0
[   78.904984]  kasan_report+0xdc/0x128
[   78.905009]  kasan_check_range+0x100/0x1a8
[   78.905039]  __kasan_check_write+0x20/0x30
[   78.905069]  kasan_atomics_helper+0x1644/0x4858
[   78.905106]  kasan_atomics+0x198/0x2e0
[   78.905137]  kunit_try_run_case+0x170/0x3f0
[   78.905167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.905201]  kthread+0x328/0x630
[   78.905225]  ret_from_fork+0x10/0x20
[   78.905255] 
[   78.976322] Allocated by task 346:
[   78.979708]  kasan_save_stack+0x3c/0x68
[   78.983526]  kasan_save_track+0x20/0x40
[   78.987346]  kasan_save_alloc_info+0x40/0x58
[   78.991599]  __kasan_kmalloc+0xd4/0xd8
[   78.995332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.999846]  kasan_atomics+0xb8/0x2e0
[   79.003491]  kunit_try_run_case+0x170/0x3f0
[   79.007658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.013127]  kthread+0x328/0x630
[   79.016338]  ret_from_fork+0x10/0x20
[   79.019898] 
[   79.021373] The buggy address belongs to the object at ffff00080851b080
[   79.021373]  which belongs to the cache kmalloc-64 of size 64
[   79.033699] The buggy address is located 0 bytes to the right of
[   79.033699]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.046546] 
[   79.048023] The buggy address belongs to the physical page:
[   79.053579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.061565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.068074] page_type: f5(slab)
[   79.071207] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.078931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.086649] page dumped because: kasan: bad access detected
[   79.092205] 
[   79.093680] Memory state around the buggy address:
[   79.098459]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.105664]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.112868] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.120069]                                      ^
[   79.124847]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.132052]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.139253] ==================================================================
[   71.746008] ==================================================================
[   71.753081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   71.760371] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   71.767749] 
[   71.769230] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   71.769277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.769293] Hardware name: WinLink E850-96 board (DT)
[   71.769311] Call trace:
[   71.769323]  show_stack+0x20/0x38 (C)
[   71.769354]  dump_stack_lvl+0x8c/0xd0
[   71.769388]  print_report+0x118/0x5d0
[   71.769416]  kasan_report+0xdc/0x128
[   71.769444]  kasan_check_range+0x100/0x1a8
[   71.769473]  __kasan_check_write+0x20/0x30
[   71.769502]  kasan_atomics_helper+0xca0/0x4858
[   71.769537]  kasan_atomics+0x198/0x2e0
[   71.769568]  kunit_try_run_case+0x170/0x3f0
[   71.769596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.769628]  kthread+0x328/0x630
[   71.769655]  ret_from_fork+0x10/0x20
[   71.769685] 
[   71.840665] Allocated by task 346:
[   71.844052]  kasan_save_stack+0x3c/0x68
[   71.847870]  kasan_save_track+0x20/0x40
[   71.851689]  kasan_save_alloc_info+0x40/0x58
[   71.855942]  __kasan_kmalloc+0xd4/0xd8
[   71.859675]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.864189]  kasan_atomics+0xb8/0x2e0
[   71.867835]  kunit_try_run_case+0x170/0x3f0
[   71.872001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.877470]  kthread+0x328/0x630
[   71.880682]  ret_from_fork+0x10/0x20
[   71.884240] 
[   71.885716] The buggy address belongs to the object at ffff00080851b080
[   71.885716]  which belongs to the cache kmalloc-64 of size 64
[   71.898043] The buggy address is located 0 bytes to the right of
[   71.898043]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   71.910889] 
[   71.912365] The buggy address belongs to the physical page:
[   71.917922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   71.925907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.932417] page_type: f5(slab)
[   71.935550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   71.943274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.950993] page dumped because: kasan: bad access detected
[   71.956548] 
[   71.958024] Memory state around the buggy address:
[   71.962802]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   71.970007]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.977212] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.984412]                                      ^
[   71.989190]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.996395]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.003596] ==================================================================
[   78.619883] ==================================================================
[   78.626936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   78.634313] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   78.641604] 
[   78.643086] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   78.643136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.643150] Hardware name: WinLink E850-96 board (DT)
[   78.643168] Call trace:
[   78.643182]  show_stack+0x20/0x38 (C)
[   78.643214]  dump_stack_lvl+0x8c/0xd0
[   78.643248]  print_report+0x118/0x5d0
[   78.643276]  kasan_report+0xdc/0x128
[   78.643304]  __asan_report_load8_noabort+0x20/0x30
[   78.643337]  kasan_atomics_helper+0x3db0/0x4858
[   78.643372]  kasan_atomics+0x198/0x2e0
[   78.643403]  kunit_try_run_case+0x170/0x3f0
[   78.643435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.643470]  kthread+0x328/0x630
[   78.643496]  ret_from_fork+0x10/0x20
[   78.643526] 
[   78.711221] Allocated by task 346:
[   78.714608]  kasan_save_stack+0x3c/0x68
[   78.718426]  kasan_save_track+0x20/0x40
[   78.722246]  kasan_save_alloc_info+0x40/0x58
[   78.726499]  __kasan_kmalloc+0xd4/0xd8
[   78.730231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   78.734745]  kasan_atomics+0xb8/0x2e0
[   78.738391]  kunit_try_run_case+0x170/0x3f0
[   78.742558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.748026]  kthread+0x328/0x630
[   78.751238]  ret_from_fork+0x10/0x20
[   78.754797] 
[   78.756273] The buggy address belongs to the object at ffff00080851b080
[   78.756273]  which belongs to the cache kmalloc-64 of size 64
[   78.768599] The buggy address is located 0 bytes to the right of
[   78.768599]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   78.781446] 
[   78.782922] The buggy address belongs to the physical page:
[   78.788479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   78.796465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   78.802973] page_type: f5(slab)
[   78.806106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   78.813831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   78.821549] page dumped because: kasan: bad access detected
[   78.827105] 
[   78.828580] Memory state around the buggy address:
[   78.833360]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   78.840563]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   78.847768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.854969]                                      ^
[   78.859747]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.866952]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.874153] ==================================================================
[   79.673345] ==================================================================
[   79.680392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   79.687771] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346
[   79.695061] 
[   79.696543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   79.696592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.696608] Hardware name: WinLink E850-96 board (DT)
[   79.696628] Call trace:
[   79.696641]  show_stack+0x20/0x38 (C)
[   79.696673]  dump_stack_lvl+0x8c/0xd0
[   79.696706]  print_report+0x118/0x5d0
[   79.696735]  kasan_report+0xdc/0x128
[   79.696762]  __asan_report_load8_noabort+0x20/0x30
[   79.696794]  kasan_atomics_helper+0x3e10/0x4858
[   79.696830]  kasan_atomics+0x198/0x2e0
[   79.696864]  kunit_try_run_case+0x170/0x3f0
[   79.696895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.696929]  kthread+0x328/0x630
[   79.696956]  ret_from_fork+0x10/0x20
[   79.696988] 
[   79.764679] Allocated by task 346:
[   79.768065]  kasan_save_stack+0x3c/0x68
[   79.771883]  kasan_save_track+0x20/0x40
[   79.775702]  kasan_save_alloc_info+0x40/0x58
[   79.779955]  __kasan_kmalloc+0xd4/0xd8
[   79.783688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   79.788201]  kasan_atomics+0xb8/0x2e0
[   79.791847]  kunit_try_run_case+0x170/0x3f0
[   79.796014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.801483]  kthread+0x328/0x630
[   79.804695]  ret_from_fork+0x10/0x20
[   79.808254] 
[   79.809729] The buggy address belongs to the object at ffff00080851b080
[   79.809729]  which belongs to the cache kmalloc-64 of size 64
[   79.822056] The buggy address is located 0 bytes to the right of
[   79.822056]  allocated 48-byte region [ffff00080851b080, ffff00080851b0b0)
[   79.834902] 
[   79.836378] The buggy address belongs to the physical page:
[   79.841936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   79.849921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   79.856430] page_type: f5(slab)
[   79.859563] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   79.867287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.875006] page dumped because: kasan: bad access detected
[   79.880561] 
[   79.882037] Memory state around the buggy address:
[   79.886818]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   79.894020]  ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   79.901225] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.908426]                                      ^
[   79.913204]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.920408]  ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.927609] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   61.391854] ==================================================================
[   61.398896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.407837] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.415127] 
[   61.416609] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.416658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.416672] Hardware name: WinLink E850-96 board (DT)
[   61.416691] Call trace:
[   61.416702]  show_stack+0x20/0x38 (C)
[   61.416735]  dump_stack_lvl+0x8c/0xd0
[   61.416766]  print_report+0x118/0x5d0
[   61.416793]  kasan_report+0xdc/0x128
[   61.416821]  __asan_report_load8_noabort+0x20/0x30
[   61.416853]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   61.416891]  kasan_bitops_generic+0x11c/0x1c8
[   61.416925]  kunit_try_run_case+0x170/0x3f0
[   61.416954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.416988]  kthread+0x328/0x630
[   61.417015]  ret_from_fork+0x10/0x20
[   61.417045] 
[   61.486914] Allocated by task 342:
[   61.490300]  kasan_save_stack+0x3c/0x68
[   61.494119]  kasan_save_track+0x20/0x40
[   61.497938]  kasan_save_alloc_info+0x40/0x58
[   61.502192]  __kasan_kmalloc+0xd4/0xd8
[   61.505924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.510438]  kasan_bitops_generic+0xa0/0x1c8
[   61.514691]  kunit_try_run_case+0x170/0x3f0
[   61.518858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.524326]  kthread+0x328/0x630
[   61.527538]  ret_from_fork+0x10/0x20
[   61.531098] 
[   61.532573] The buggy address belongs to the object at ffff000806093fe0
[   61.532573]  which belongs to the cache kmalloc-16 of size 16
[   61.544899] The buggy address is located 8 bytes inside of
[   61.544899]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.557138] 
[   61.558616] The buggy address belongs to the physical page:
[   61.564171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.572157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.578666] page_type: f5(slab)
[   61.581798] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.589523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.597242] page dumped because: kasan: bad access detected
[   61.602798] 
[   61.604273] Memory state around the buggy address:
[   61.609052]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.616256]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.623461] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.630662]                                                           ^
[   61.637263]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.644467]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.651668] ==================================================================
[   62.196825] ==================================================================
[   62.203920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.212860] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   62.220236] 
[   62.221717] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   62.221765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.221781] Hardware name: WinLink E850-96 board (DT)
[   62.221800] Call trace:
[   62.221813]  show_stack+0x20/0x38 (C)
[   62.221844]  dump_stack_lvl+0x8c/0xd0
[   62.221875]  print_report+0x118/0x5d0
[   62.221905]  kasan_report+0xdc/0x128
[   62.221933]  kasan_check_range+0x100/0x1a8
[   62.221962]  __kasan_check_write+0x20/0x30
[   62.221993]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   62.222033]  kasan_bitops_generic+0x11c/0x1c8
[   62.222068]  kunit_try_run_case+0x170/0x3f0
[   62.222095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.222129]  kthread+0x328/0x630
[   62.222156]  ret_from_fork+0x10/0x20
[   62.222188] 
[   62.295409] Allocated by task 342:
[   62.298794]  kasan_save_stack+0x3c/0x68
[   62.302614]  kasan_save_track+0x20/0x40
[   62.306433]  kasan_save_alloc_info+0x40/0x58
[   62.310686]  __kasan_kmalloc+0xd4/0xd8
[   62.314419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.318933]  kasan_bitops_generic+0xa0/0x1c8
[   62.323186]  kunit_try_run_case+0x170/0x3f0
[   62.327353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.332821]  kthread+0x328/0x630
[   62.336033]  ret_from_fork+0x10/0x20
[   62.339592] 
[   62.341068] The buggy address belongs to the object at ffff000806093fe0
[   62.341068]  which belongs to the cache kmalloc-16 of size 16
[   62.353394] The buggy address is located 8 bytes inside of
[   62.353394]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.365633] 
[   62.367112] The buggy address belongs to the physical page:
[   62.372667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.380651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.387161] page_type: f5(slab)
[   62.390294] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.398018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.405737] page dumped because: kasan: bad access detected
[   62.411292] 
[   62.412768] Memory state around the buggy address:
[   62.417546]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.424751]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.431955] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.439157]                                                           ^
[   62.445757]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.452962]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.460163] ==================================================================
[   62.734692] ==================================================================
[   62.741757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.750699] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   62.758075] 
[   62.759560] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   62.759608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.759626] Hardware name: WinLink E850-96 board (DT)
[   62.759642] Call trace:
[   62.759655]  show_stack+0x20/0x38 (C)
[   62.759686]  dump_stack_lvl+0x8c/0xd0
[   62.759718]  print_report+0x118/0x5d0
[   62.759745]  kasan_report+0xdc/0x128
[   62.759771]  kasan_check_range+0x100/0x1a8
[   62.759799]  __kasan_check_write+0x20/0x30
[   62.759830]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   62.759868]  kasan_bitops_generic+0x11c/0x1c8
[   62.759903]  kunit_try_run_case+0x170/0x3f0
[   62.759933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.759965]  kthread+0x328/0x630
[   62.759991]  ret_from_fork+0x10/0x20
[   62.760022] 
[   62.833248] Allocated by task 342:
[   62.836634]  kasan_save_stack+0x3c/0x68
[   62.840453]  kasan_save_track+0x20/0x40
[   62.844272]  kasan_save_alloc_info+0x40/0x58
[   62.848525]  __kasan_kmalloc+0xd4/0xd8
[   62.852258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.856772]  kasan_bitops_generic+0xa0/0x1c8
[   62.861025]  kunit_try_run_case+0x170/0x3f0
[   62.865192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.870661]  kthread+0x328/0x630
[   62.873872]  ret_from_fork+0x10/0x20
[   62.877431] 
[   62.878907] The buggy address belongs to the object at ffff000806093fe0
[   62.878907]  which belongs to the cache kmalloc-16 of size 16
[   62.891233] The buggy address is located 8 bytes inside of
[   62.891233]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.903472] 
[   62.904950] The buggy address belongs to the physical page:
[   62.910507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.918490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.925000] page_type: f5(slab)
[   62.928134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.935857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.943576] page dumped because: kasan: bad access detected
[   62.949131] 
[   62.950607] Memory state around the buggy address:
[   62.955386]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.962590]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.969795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.976996]                                                           ^
[   62.983596]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.990801]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.998002] ==================================================================
[   63.005373] ==================================================================
[   63.012413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.021353] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   63.028644] 
[   63.030126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.030175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.030190] Hardware name: WinLink E850-96 board (DT)
[   63.030207] Call trace:
[   63.030221]  show_stack+0x20/0x38 (C)
[   63.030253]  dump_stack_lvl+0x8c/0xd0
[   63.030285]  print_report+0x118/0x5d0
[   63.030315]  kasan_report+0xdc/0x128
[   63.030343]  __asan_report_load8_noabort+0x20/0x30
[   63.030377]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   63.030415]  kasan_bitops_generic+0x11c/0x1c8
[   63.030448]  kunit_try_run_case+0x170/0x3f0
[   63.030478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.030512]  kthread+0x328/0x630
[   63.030537]  ret_from_fork+0x10/0x20
[   63.030566] 
[   63.100431] Allocated by task 342:
[   63.103817]  kasan_save_stack+0x3c/0x68
[   63.107636]  kasan_save_track+0x20/0x40
[   63.111455]  kasan_save_alloc_info+0x40/0x58
[   63.115709]  __kasan_kmalloc+0xd4/0xd8
[   63.119442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.123955]  kasan_bitops_generic+0xa0/0x1c8
[   63.128209]  kunit_try_run_case+0x170/0x3f0
[   63.132375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.137844]  kthread+0x328/0x630
[   63.141056]  ret_from_fork+0x10/0x20
[   63.144614] 
[   63.146090] The buggy address belongs to the object at ffff000806093fe0
[   63.146090]  which belongs to the cache kmalloc-16 of size 16
[   63.158417] The buggy address is located 8 bytes inside of
[   63.158417]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   63.170656] 
[   63.172133] The buggy address belongs to the physical page:
[   63.177689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   63.185673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.192183] page_type: f5(slab)
[   63.195317] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.203041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.210760] page dumped because: kasan: bad access detected
[   63.216315] 
[   63.217791] Memory state around the buggy address:
[   63.222570]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.229773]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.236978] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   63.244179]                                                           ^
[   63.250780]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.257985]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   63.265186] ==================================================================
[   63.272531] ==================================================================
[   63.279597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.288536] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   63.295828] 
[   63.297308] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   63.297358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.297375] Hardware name: WinLink E850-96 board (DT)
[   63.297394] Call trace:
[   63.297406]  show_stack+0x20/0x38 (C)
[   63.297437]  dump_stack_lvl+0x8c/0xd0
[   63.297470]  print_report+0x118/0x5d0
[   63.297497]  kasan_report+0xdc/0x128
[   63.297524]  __asan_report_load8_noabort+0x20/0x30
[   63.297555]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   63.297594]  kasan_bitops_generic+0x11c/0x1c8
[   63.297628]  kunit_try_run_case+0x170/0x3f0
[   63.297657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.297689]  kthread+0x328/0x630
[   63.297716]  ret_from_fork+0x10/0x20
[   63.297746] 
[   63.367614] Allocated by task 342:
[   63.371000]  kasan_save_stack+0x3c/0x68
[   63.374819]  kasan_save_track+0x20/0x40
[   63.378639]  kasan_save_alloc_info+0x40/0x58
[   63.382892]  __kasan_kmalloc+0xd4/0xd8
[   63.386625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.391139]  kasan_bitops_generic+0xa0/0x1c8
[   63.395392]  kunit_try_run_case+0x170/0x3f0
[   63.399559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.405027]  kthread+0x328/0x630
[   63.408239]  ret_from_fork+0x10/0x20
[   63.411798] 
[   63.413274] The buggy address belongs to the object at ffff000806093fe0
[   63.413274]  which belongs to the cache kmalloc-16 of size 16
[   63.425600] The buggy address is located 8 bytes inside of
[   63.425600]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   63.437839] 
[   63.439317] The buggy address belongs to the physical page:
[   63.444873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   63.452857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.459367] page_type: f5(slab)
[   63.462500] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   63.470224] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   63.477943] page dumped because: kasan: bad access detected
[   63.483499] 
[   63.484974] Memory state around the buggy address:
[   63.489752]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.496957]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   63.504162] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   63.511362]                                                           ^
[   63.517963]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.525168]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   63.532369] ==================================================================
[   61.929693] ==================================================================
[   61.936735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.945675] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.952966] 
[   61.954447] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.954495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.954512] Hardware name: WinLink E850-96 board (DT)
[   61.954529] Call trace:
[   61.954541]  show_stack+0x20/0x38 (C)
[   61.954572]  dump_stack_lvl+0x8c/0xd0
[   61.954604]  print_report+0x118/0x5d0
[   61.954632]  kasan_report+0xdc/0x128
[   61.954658]  __asan_report_load8_noabort+0x20/0x30
[   61.954692]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   61.954730]  kasan_bitops_generic+0x11c/0x1c8
[   61.954763]  kunit_try_run_case+0x170/0x3f0
[   61.954792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.954824]  kthread+0x328/0x630
[   61.954851]  ret_from_fork+0x10/0x20
[   61.954884] 
[   62.024753] Allocated by task 342:
[   62.028139]  kasan_save_stack+0x3c/0x68
[   62.031958]  kasan_save_track+0x20/0x40
[   62.035777]  kasan_save_alloc_info+0x40/0x58
[   62.040031]  __kasan_kmalloc+0xd4/0xd8
[   62.043763]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.048277]  kasan_bitops_generic+0xa0/0x1c8
[   62.052531]  kunit_try_run_case+0x170/0x3f0
[   62.056697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.062166]  kthread+0x328/0x630
[   62.065377]  ret_from_fork+0x10/0x20
[   62.068936] 
[   62.070412] The buggy address belongs to the object at ffff000806093fe0
[   62.070412]  which belongs to the cache kmalloc-16 of size 16
[   62.082738] The buggy address is located 8 bytes inside of
[   62.082738]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.094977] 
[   62.096455] The buggy address belongs to the physical page:
[   62.102011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.109995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.116505] page_type: f5(slab)
[   62.119638] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.127363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.135081] page dumped because: kasan: bad access detected
[   62.140637] 
[   62.142112] Memory state around the buggy address:
[   62.146892]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.154095]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.161300] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.168501]                                                           ^
[   62.175102]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.182307]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.189508] ==================================================================
[   62.467535] ==================================================================
[   62.474574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.483515] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   62.490805] 
[   62.492288] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   62.492334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.492352] Hardware name: WinLink E850-96 board (DT)
[   62.492370] Call trace:
[   62.492382]  show_stack+0x20/0x38 (C)
[   62.492413]  dump_stack_lvl+0x8c/0xd0
[   62.492446]  print_report+0x118/0x5d0
[   62.492473]  kasan_report+0xdc/0x128
[   62.492501]  __asan_report_load8_noabort+0x20/0x30
[   62.492532]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   62.492570]  kasan_bitops_generic+0x11c/0x1c8
[   62.492605]  kunit_try_run_case+0x170/0x3f0
[   62.492632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.492667]  kthread+0x328/0x630
[   62.492693]  ret_from_fork+0x10/0x20
[   62.492726] 
[   62.562592] Allocated by task 342:
[   62.565978]  kasan_save_stack+0x3c/0x68
[   62.569797]  kasan_save_track+0x20/0x40
[   62.573616]  kasan_save_alloc_info+0x40/0x58
[   62.577870]  __kasan_kmalloc+0xd4/0xd8
[   62.581602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.586116]  kasan_bitops_generic+0xa0/0x1c8
[   62.590369]  kunit_try_run_case+0x170/0x3f0
[   62.594537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.600005]  kthread+0x328/0x630
[   62.603217]  ret_from_fork+0x10/0x20
[   62.606775] 
[   62.608251] The buggy address belongs to the object at ffff000806093fe0
[   62.608251]  which belongs to the cache kmalloc-16 of size 16
[   62.620578] The buggy address is located 8 bytes inside of
[   62.620578]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   62.632817] 
[   62.634296] The buggy address belongs to the physical page:
[   62.639851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   62.647834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.654344] page_type: f5(slab)
[   62.657477] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   62.665202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   62.672920] page dumped because: kasan: bad access detected
[   62.678476] 
[   62.679951] Memory state around the buggy address:
[   62.684730]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.691934]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   62.699139] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   62.706340]                                                           ^
[   62.712941]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.720145]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   62.727346] ==================================================================
[   61.659020] ==================================================================
[   61.666079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.675020] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.682397] 
[   61.683878] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.683924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.683940] Hardware name: WinLink E850-96 board (DT)
[   61.683958] Call trace:
[   61.683968]  show_stack+0x20/0x38 (C)
[   61.683997]  dump_stack_lvl+0x8c/0xd0
[   61.684028]  print_report+0x118/0x5d0
[   61.684055]  kasan_report+0xdc/0x128
[   61.684082]  kasan_check_range+0x100/0x1a8
[   61.684110]  __kasan_check_write+0x20/0x30
[   61.684141]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   61.684180]  kasan_bitops_generic+0x11c/0x1c8
[   61.684213]  kunit_try_run_case+0x170/0x3f0
[   61.684243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.684277]  kthread+0x328/0x630
[   61.684302]  ret_from_fork+0x10/0x20
[   61.684332] 
[   61.757569] Allocated by task 342:
[   61.760956]  kasan_save_stack+0x3c/0x68
[   61.764774]  kasan_save_track+0x20/0x40
[   61.768594]  kasan_save_alloc_info+0x40/0x58
[   61.772847]  __kasan_kmalloc+0xd4/0xd8
[   61.776580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.781093]  kasan_bitops_generic+0xa0/0x1c8
[   61.785347]  kunit_try_run_case+0x170/0x3f0
[   61.789514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.794982]  kthread+0x328/0x630
[   61.798194]  ret_from_fork+0x10/0x20
[   61.801753] 
[   61.803229] The buggy address belongs to the object at ffff000806093fe0
[   61.803229]  which belongs to the cache kmalloc-16 of size 16
[   61.815555] The buggy address is located 8 bytes inside of
[   61.815555]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.827794] 
[   61.829272] The buggy address belongs to the physical page:
[   61.834827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.842811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.849321] page_type: f5(slab)
[   61.852454] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.860179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.867898] page dumped because: kasan: bad access detected
[   61.873453] 
[   61.874929] Memory state around the buggy address:
[   61.879707]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.886911]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.894117] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.901317]                                                           ^
[   61.907918]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.915123]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.922324] ==================================================================
[   61.121365] ==================================================================
[   61.128414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.137267] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   61.144645] 
[   61.146126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   61.146176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.146194] Hardware name: WinLink E850-96 board (DT)
[   61.146212] Call trace:
[   61.146223]  show_stack+0x20/0x38 (C)
[   61.146257]  dump_stack_lvl+0x8c/0xd0
[   61.146291]  print_report+0x118/0x5d0
[   61.146320]  kasan_report+0xdc/0x128
[   61.146348]  kasan_check_range+0x100/0x1a8
[   61.146377]  __kasan_check_write+0x20/0x30
[   61.146408]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   61.146446]  kasan_bitops_generic+0x11c/0x1c8
[   61.146479]  kunit_try_run_case+0x170/0x3f0
[   61.146509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.146542]  kthread+0x328/0x630
[   61.146568]  ret_from_fork+0x10/0x20
[   61.146599] 
[   61.219730] Allocated by task 342:
[   61.223116]  kasan_save_stack+0x3c/0x68
[   61.226935]  kasan_save_track+0x20/0x40
[   61.230755]  kasan_save_alloc_info+0x40/0x58
[   61.235008]  __kasan_kmalloc+0xd4/0xd8
[   61.238740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.243254]  kasan_bitops_generic+0xa0/0x1c8
[   61.247508]  kunit_try_run_case+0x170/0x3f0
[   61.251674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.257143]  kthread+0x328/0x630
[   61.260355]  ret_from_fork+0x10/0x20
[   61.263914] 
[   61.265389] The buggy address belongs to the object at ffff000806093fe0
[   61.265389]  which belongs to the cache kmalloc-16 of size 16
[   61.277716] The buggy address is located 8 bytes inside of
[   61.277716]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.289955] 
[   61.291432] The buggy address belongs to the physical page:
[   61.296989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.304973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.311482] page_type: f5(slab)
[   61.314615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.322340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.330058] page dumped because: kasan: bad access detected
[   61.335614] 
[   61.337090] Memory state around the buggy address:
[   61.341868]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.349073]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.356277] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.363478]                                                           ^
[   61.370079]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.377284]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.384485] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   59.782788] ==================================================================
[   59.789893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.798052] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.805429] 
[   59.806912] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.806963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.806981] Hardware name: WinLink E850-96 board (DT)
[   59.807001] Call trace:
[   59.807014]  show_stack+0x20/0x38 (C)
[   59.807047]  dump_stack_lvl+0x8c/0xd0
[   59.807081]  print_report+0x118/0x5d0
[   59.807109]  kasan_report+0xdc/0x128
[   59.807134]  kasan_check_range+0x100/0x1a8
[   59.807165]  __kasan_check_write+0x20/0x30
[   59.807196]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   59.807234]  kasan_bitops_generic+0x110/0x1c8
[   59.807268]  kunit_try_run_case+0x170/0x3f0
[   59.807298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.807333]  kthread+0x328/0x630
[   59.807359]  ret_from_fork+0x10/0x20
[   59.807392] 
[   59.879820] Allocated by task 342:
[   59.883207]  kasan_save_stack+0x3c/0x68
[   59.887025]  kasan_save_track+0x20/0x40
[   59.890844]  kasan_save_alloc_info+0x40/0x58
[   59.895098]  __kasan_kmalloc+0xd4/0xd8
[   59.898830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.903344]  kasan_bitops_generic+0xa0/0x1c8
[   59.907597]  kunit_try_run_case+0x170/0x3f0
[   59.911764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.917233]  kthread+0x328/0x630
[   59.920444]  ret_from_fork+0x10/0x20
[   59.924003] 
[   59.925479] The buggy address belongs to the object at ffff000806093fe0
[   59.925479]  which belongs to the cache kmalloc-16 of size 16
[   59.937806] The buggy address is located 8 bytes inside of
[   59.937806]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.950044] 
[   59.951523] The buggy address belongs to the physical page:
[   59.957079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.965063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.971572] page_type: f5(slab)
[   59.974707] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.982429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.990148] page dumped because: kasan: bad access detected
[   59.995704] 
[   59.997179] Memory state around the buggy address:
[   60.001959]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.009162]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.016367] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.023568]                                                           ^
[   60.030168]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.037373]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.044575] ==================================================================
[   59.248090] ==================================================================
[   59.255178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.263337] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.270628] 
[   59.272111] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.272164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.272178] Hardware name: WinLink E850-96 board (DT)
[   59.272198] Call trace:
[   59.272209]  show_stack+0x20/0x38 (C)
[   59.272239]  dump_stack_lvl+0x8c/0xd0
[   59.272276]  print_report+0x118/0x5d0
[   59.272303]  kasan_report+0xdc/0x128
[   59.272331]  __asan_report_load8_noabort+0x20/0x30
[   59.272361]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   59.272399]  kasan_bitops_generic+0x110/0x1c8
[   59.272434]  kunit_try_run_case+0x170/0x3f0
[   59.272463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.272498]  kthread+0x328/0x630
[   59.272525]  ret_from_fork+0x10/0x20
[   59.272558] 
[   59.341634] Allocated by task 342:
[   59.345021]  kasan_save_stack+0x3c/0x68
[   59.348838]  kasan_save_track+0x20/0x40
[   59.352658]  kasan_save_alloc_info+0x40/0x58
[   59.356911]  __kasan_kmalloc+0xd4/0xd8
[   59.360644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.365157]  kasan_bitops_generic+0xa0/0x1c8
[   59.369411]  kunit_try_run_case+0x170/0x3f0
[   59.373578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.379046]  kthread+0x328/0x630
[   59.382258]  ret_from_fork+0x10/0x20
[   59.385817] 
[   59.387293] The buggy address belongs to the object at ffff000806093fe0
[   59.387293]  which belongs to the cache kmalloc-16 of size 16
[   59.399619] The buggy address is located 8 bytes inside of
[   59.399619]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.411858] 
[   59.413336] The buggy address belongs to the physical page:
[   59.418893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.426877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.433386] page_type: f5(slab)
[   59.436520] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.444243] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.451963] page dumped because: kasan: bad access detected
[   59.457517] 
[   59.458992] Memory state around the buggy address:
[   59.463771]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.470976]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.478180] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   59.485381]                                                           ^
[   59.491984]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.499188]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   59.506388] ==================================================================
[   60.051887] ==================================================================
[   60.058986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.067145] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.074435] 
[   60.075918] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.075970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.075986] Hardware name: WinLink E850-96 board (DT)
[   60.076004] Call trace:
[   60.076016]  show_stack+0x20/0x38 (C)
[   60.076047]  dump_stack_lvl+0x8c/0xd0
[   60.076080]  print_report+0x118/0x5d0
[   60.076108]  kasan_report+0xdc/0x128
[   60.076136]  __asan_report_load8_noabort+0x20/0x30
[   60.076168]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   60.076203]  kasan_bitops_generic+0x110/0x1c8
[   60.076237]  kunit_try_run_case+0x170/0x3f0
[   60.076268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.076303]  kthread+0x328/0x630
[   60.076328]  ret_from_fork+0x10/0x20
[   60.076361] 
[   60.145441] Allocated by task 342:
[   60.148827]  kasan_save_stack+0x3c/0x68
[   60.152646]  kasan_save_track+0x20/0x40
[   60.156465]  kasan_save_alloc_info+0x40/0x58
[   60.160719]  __kasan_kmalloc+0xd4/0xd8
[   60.164451]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.168965]  kasan_bitops_generic+0xa0/0x1c8
[   60.173218]  kunit_try_run_case+0x170/0x3f0
[   60.177385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.182854]  kthread+0x328/0x630
[   60.186065]  ret_from_fork+0x10/0x20
[   60.189624] 
[   60.191100] The buggy address belongs to the object at ffff000806093fe0
[   60.191100]  which belongs to the cache kmalloc-16 of size 16
[   60.203427] The buggy address is located 8 bytes inside of
[   60.203427]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   60.215665] 
[   60.217145] The buggy address belongs to the physical page:
[   60.222700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   60.230684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.237193] page_type: f5(slab)
[   60.240327] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.248050] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.255769] page dumped because: kasan: bad access detected
[   60.261324] 
[   60.262800] Memory state around the buggy address:
[   60.267582]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.274783]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.281988] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.289189]                                                           ^
[   60.295790]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.302995]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.310195] ==================================================================
[   58.978986] ==================================================================
[   58.986087] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   58.994243] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.001623] 
[   59.003106] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.003158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.003175] Hardware name: WinLink E850-96 board (DT)
[   59.003195] Call trace:
[   59.003210]  show_stack+0x20/0x38 (C)
[   59.003242]  dump_stack_lvl+0x8c/0xd0
[   59.003276]  print_report+0x118/0x5d0
[   59.003306]  kasan_report+0xdc/0x128
[   59.003332]  kasan_check_range+0x100/0x1a8
[   59.003361]  __kasan_check_write+0x20/0x30
[   59.003391]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   59.003427]  kasan_bitops_generic+0x110/0x1c8
[   59.003461]  kunit_try_run_case+0x170/0x3f0
[   59.003494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.003530]  kthread+0x328/0x630
[   59.003558]  ret_from_fork+0x10/0x20
[   59.003591] 
[   59.076012] Allocated by task 342:
[   59.079400]  kasan_save_stack+0x3c/0x68
[   59.083218]  kasan_save_track+0x20/0x40
[   59.087037]  kasan_save_alloc_info+0x40/0x58
[   59.091290]  __kasan_kmalloc+0xd4/0xd8
[   59.095023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.099536]  kasan_bitops_generic+0xa0/0x1c8
[   59.103790]  kunit_try_run_case+0x170/0x3f0
[   59.107956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.113426]  kthread+0x328/0x630
[   59.116637]  ret_from_fork+0x10/0x20
[   59.120196] 
[   59.121672] The buggy address belongs to the object at ffff000806093fe0
[   59.121672]  which belongs to the cache kmalloc-16 of size 16
[   59.133998] The buggy address is located 8 bytes inside of
[   59.133998]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.146237] 
[   59.147717] The buggy address belongs to the physical page:
[   59.153272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.161256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.167764] page_type: f5(slab)
[   59.170901] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.178622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.186342] page dumped because: kasan: bad access detected
[   59.191897] 
[   59.193371] Memory state around the buggy address:
[   59.198150]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.205354]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.212559] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   59.219760]                                                           ^
[   59.226361]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.233566]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   59.240767] ==================================================================
[   58.442024] ==================================================================
[   58.451373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.459529] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   58.466908] 
[   58.468392] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   58.468446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.468463] Hardware name: WinLink E850-96 board (DT)
[   58.468484] Call trace:
[   58.468497]  show_stack+0x20/0x38 (C)
[   58.468534]  dump_stack_lvl+0x8c/0xd0
[   58.468569]  print_report+0x118/0x5d0
[   58.468597]  kasan_report+0xdc/0x128
[   58.468625]  kasan_check_range+0x100/0x1a8
[   58.468654]  __kasan_check_write+0x20/0x30
[   58.468685]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   58.468722]  kasan_bitops_generic+0x110/0x1c8
[   58.468754]  kunit_try_run_case+0x170/0x3f0
[   58.468787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.468823]  kthread+0x328/0x630
[   58.468849]  ret_from_fork+0x10/0x20
[   58.468884] 
[   58.541299] Allocated by task 342:
[   58.544684]  kasan_save_stack+0x3c/0x68
[   58.548504]  kasan_save_track+0x20/0x40
[   58.552323]  kasan_save_alloc_info+0x40/0x58
[   58.556576]  __kasan_kmalloc+0xd4/0xd8
[   58.560308]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.564822]  kasan_bitops_generic+0xa0/0x1c8
[   58.569076]  kunit_try_run_case+0x170/0x3f0
[   58.573242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.578711]  kthread+0x328/0x630
[   58.581923]  ret_from_fork+0x10/0x20
[   58.585482] 
[   58.586960] The buggy address belongs to the object at ffff000806093fe0
[   58.586960]  which belongs to the cache kmalloc-16 of size 16
[   58.599286] The buggy address is located 8 bytes inside of
[   58.599286]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   58.611523] 
[   58.613001] The buggy address belongs to the physical page:
[   58.618559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   58.626542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.633052] page_type: f5(slab)
[   58.636189] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.643908] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.651627] page dumped because: kasan: bad access detected
[   58.657182] 
[   58.658657] Memory state around the buggy address:
[   58.663436]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.670641]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.677845] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   58.685046]                                                           ^
[   58.691648]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.698852]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   58.706053] ==================================================================
[   59.513707] ==================================================================
[   59.520800] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.528959] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   59.536335] 
[   59.537818] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   59.537871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.537889] Hardware name: WinLink E850-96 board (DT)
[   59.537908] Call trace:
[   59.537919]  show_stack+0x20/0x38 (C)
[   59.537952]  dump_stack_lvl+0x8c/0xd0
[   59.537986]  print_report+0x118/0x5d0
[   59.538014]  kasan_report+0xdc/0x128
[   59.538042]  kasan_check_range+0x100/0x1a8
[   59.538070]  __kasan_check_write+0x20/0x30
[   59.538101]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   59.538138]  kasan_bitops_generic+0x110/0x1c8
[   59.538172]  kunit_try_run_case+0x170/0x3f0
[   59.538202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.538239]  kthread+0x328/0x630
[   59.538265]  ret_from_fork+0x10/0x20
[   59.538299] 
[   59.610728] Allocated by task 342:
[   59.614113]  kasan_save_stack+0x3c/0x68
[   59.617932]  kasan_save_track+0x20/0x40
[   59.621751]  kasan_save_alloc_info+0x40/0x58
[   59.626004]  __kasan_kmalloc+0xd4/0xd8
[   59.629737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.634251]  kasan_bitops_generic+0xa0/0x1c8
[   59.638504]  kunit_try_run_case+0x170/0x3f0
[   59.642671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.648140]  kthread+0x328/0x630
[   59.651351]  ret_from_fork+0x10/0x20
[   59.654910] 
[   59.656386] The buggy address belongs to the object at ffff000806093fe0
[   59.656386]  which belongs to the cache kmalloc-16 of size 16
[   59.668712] The buggy address is located 8 bytes inside of
[   59.668712]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   59.680951] 
[   59.682429] The buggy address belongs to the physical page:
[   59.687987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   59.695970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.702479] page_type: f5(slab)
[   59.705614] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   59.713336] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   59.721055] page dumped because: kasan: bad access detected
[   59.726610] 
[   59.728086] Memory state around the buggy address:
[   59.732864]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.740069]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   59.747274] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   59.754475]                                                           ^
[   59.761075]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.768280]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   59.775482] ==================================================================
[   58.713374] ==================================================================
[   58.720466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.728623] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   58.735913] 
[   58.737398] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   58.737453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.737472] Hardware name: WinLink E850-96 board (DT)
[   58.737491] Call trace:
[   58.737505]  show_stack+0x20/0x38 (C)
[   58.737540]  dump_stack_lvl+0x8c/0xd0
[   58.737575]  print_report+0x118/0x5d0
[   58.737605]  kasan_report+0xdc/0x128
[   58.737631]  __asan_report_load8_noabort+0x20/0x30
[   58.737664]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   58.737702]  kasan_bitops_generic+0x110/0x1c8
[   58.737736]  kunit_try_run_case+0x170/0x3f0
[   58.737768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.737805]  kthread+0x328/0x630
[   58.737833]  ret_from_fork+0x10/0x20
[   58.737868] 
[   58.806919] Allocated by task 342:
[   58.810307]  kasan_save_stack+0x3c/0x68
[   58.814124]  kasan_save_track+0x20/0x40
[   58.817943]  kasan_save_alloc_info+0x40/0x58
[   58.822197]  __kasan_kmalloc+0xd4/0xd8
[   58.825930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.830443]  kasan_bitops_generic+0xa0/0x1c8
[   58.834697]  kunit_try_run_case+0x170/0x3f0
[   58.838864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.844332]  kthread+0x328/0x630
[   58.847544]  ret_from_fork+0x10/0x20
[   58.851103] 
[   58.852578] The buggy address belongs to the object at ffff000806093fe0
[   58.852578]  which belongs to the cache kmalloc-16 of size 16
[   58.864908] The buggy address is located 8 bytes inside of
[   58.864908]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   58.877144] 
[   58.878623] The buggy address belongs to the physical page:
[   58.884179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   58.892164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.898671] page_type: f5(slab)
[   58.901807] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   58.909529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   58.917249] page dumped because: kasan: bad access detected
[   58.922803] 
[   58.924279] Memory state around the buggy address:
[   58.929060]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.936261]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   58.943466] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   58.950667]                                                           ^
[   58.957268]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.964473]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   58.971674] ==================================================================
[   60.317502] ==================================================================
[   60.324606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.332766] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.340143] 
[   60.341625] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.341674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.341689] Hardware name: WinLink E850-96 board (DT)
[   60.341706] Call trace:
[   60.341716]  show_stack+0x20/0x38 (C)
[   60.341747]  dump_stack_lvl+0x8c/0xd0
[   60.341778]  print_report+0x118/0x5d0
[   60.341807]  kasan_report+0xdc/0x128
[   60.341833]  kasan_check_range+0x100/0x1a8
[   60.341862]  __kasan_check_write+0x20/0x30
[   60.341893]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   60.341929]  kasan_bitops_generic+0x110/0x1c8
[   60.341963]  kunit_try_run_case+0x170/0x3f0
[   60.341993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.342026]  kthread+0x328/0x630
[   60.342051]  ret_from_fork+0x10/0x20
[   60.342081] 
[   60.414534] Allocated by task 342:
[   60.417921]  kasan_save_stack+0x3c/0x68
[   60.421739]  kasan_save_track+0x20/0x40
[   60.425558]  kasan_save_alloc_info+0x40/0x58
[   60.429812]  __kasan_kmalloc+0xd4/0xd8
[   60.433544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.438058]  kasan_bitops_generic+0xa0/0x1c8
[   60.442312]  kunit_try_run_case+0x170/0x3f0
[   60.446478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.451947]  kthread+0x328/0x630
[   60.455159]  ret_from_fork+0x10/0x20
[   60.458718] 
[   60.460193] The buggy address belongs to the object at ffff000806093fe0
[   60.460193]  which belongs to the cache kmalloc-16 of size 16
[   60.472520] The buggy address is located 8 bytes inside of
[   60.472520]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   60.484759] 
[   60.486238] The buggy address belongs to the physical page:
[   60.491794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   60.499777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.506286] page_type: f5(slab)
[   60.509419] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.517144] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.524862] page dumped because: kasan: bad access detected
[   60.530418] 
[   60.531893] Memory state around the buggy address:
[   60.536672]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.543876]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.551081] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.558282]                                                           ^
[   60.564883]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.572087]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.579289] ==================================================================
[   60.855751] ==================================================================
[   60.862794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.870953] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.878242] 
[   60.879724] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.879773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.879790] Hardware name: WinLink E850-96 board (DT)
[   60.879808] Call trace:
[   60.879821]  show_stack+0x20/0x38 (C)
[   60.879853]  dump_stack_lvl+0x8c/0xd0
[   60.879885]  print_report+0x118/0x5d0
[   60.879913]  kasan_report+0xdc/0x128
[   60.879941]  __asan_report_load8_noabort+0x20/0x30
[   60.879973]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   60.880010]  kasan_bitops_generic+0x110/0x1c8
[   60.880045]  kunit_try_run_case+0x170/0x3f0
[   60.880077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.880110]  kthread+0x328/0x630
[   60.880135]  ret_from_fork+0x10/0x20
[   60.880166] 
[   60.949248] Allocated by task 342:
[   60.952634]  kasan_save_stack+0x3c/0x68
[   60.956453]  kasan_save_track+0x20/0x40
[   60.960272]  kasan_save_alloc_info+0x40/0x58
[   60.964526]  __kasan_kmalloc+0xd4/0xd8
[   60.968258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.972773]  kasan_bitops_generic+0xa0/0x1c8
[   60.977026]  kunit_try_run_case+0x170/0x3f0
[   60.981192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.986661]  kthread+0x328/0x630
[   60.989872]  ret_from_fork+0x10/0x20
[   60.993432] 
[   60.994907] The buggy address belongs to the object at ffff000806093fe0
[   60.994907]  which belongs to the cache kmalloc-16 of size 16
[   61.007234] The buggy address is located 8 bytes inside of
[   61.007234]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   61.019473] 
[   61.020950] The buggy address belongs to the physical page:
[   61.026508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   61.034492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.041000] page_type: f5(slab)
[   61.044137] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   61.051858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   61.059576] page dumped because: kasan: bad access detected
[   61.065132] 
[   61.066607] Memory state around the buggy address:
[   61.071386]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.078590]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   61.085795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   61.092996]                                                           ^
[   61.099597]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.106802]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   61.114003] ==================================================================
[   60.586604] ==================================================================
[   60.593700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.601858] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342
[   60.609236] 
[   60.610719] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   60.610768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.610782] Hardware name: WinLink E850-96 board (DT)
[   60.610800] Call trace:
[   60.610813]  show_stack+0x20/0x38 (C)
[   60.610847]  dump_stack_lvl+0x8c/0xd0
[   60.610881]  print_report+0x118/0x5d0
[   60.610909]  kasan_report+0xdc/0x128
[   60.610935]  kasan_check_range+0x100/0x1a8
[   60.610967]  __kasan_check_write+0x20/0x30
[   60.610997]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   60.611034]  kasan_bitops_generic+0x110/0x1c8
[   60.611066]  kunit_try_run_case+0x170/0x3f0
[   60.611095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.611131]  kthread+0x328/0x630
[   60.611157]  ret_from_fork+0x10/0x20
[   60.611190] 
[   60.683627] Allocated by task 342:
[   60.687013]  kasan_save_stack+0x3c/0x68
[   60.690832]  kasan_save_track+0x20/0x40
[   60.694652]  kasan_save_alloc_info+0x40/0x58
[   60.698905]  __kasan_kmalloc+0xd4/0xd8
[   60.702638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.707151]  kasan_bitops_generic+0xa0/0x1c8
[   60.711405]  kunit_try_run_case+0x170/0x3f0
[   60.715571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.721040]  kthread+0x328/0x630
[   60.724252]  ret_from_fork+0x10/0x20
[   60.727811] 
[   60.729286] The buggy address belongs to the object at ffff000806093fe0
[   60.729286]  which belongs to the cache kmalloc-16 of size 16
[   60.741613] The buggy address is located 8 bytes inside of
[   60.741613]  allocated 9-byte region [ffff000806093fe0, ffff000806093fe9)
[   60.753852] 
[   60.755332] The buggy address belongs to the physical page:
[   60.760887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093
[   60.768871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.775379] page_type: f5(slab)
[   60.778514] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   60.786237] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   60.793955] page dumped because: kasan: bad access detected
[   60.799511] 
[   60.800987] Memory state around the buggy address:
[   60.805768]  ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.812969]  ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   60.820174] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   60.827375]                                                           ^
[   60.833976]  ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.841181]  ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   60.848382] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   58.138114] ==================================================================
[   58.145128] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   58.151115] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340
[   58.158405] 
[   58.159887] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   58.159942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.159957] Hardware name: WinLink E850-96 board (DT)
[   58.159974] Call trace:
[   58.159988]  show_stack+0x20/0x38 (C)
[   58.160022]  dump_stack_lvl+0x8c/0xd0
[   58.160057]  print_report+0x118/0x5d0
[   58.160084]  kasan_report+0xdc/0x128
[   58.160112]  __asan_report_load1_noabort+0x20/0x30
[   58.160145]  strnlen+0x80/0x88
[   58.160172]  kasan_strings+0x478/0xb00
[   58.160206]  kunit_try_run_case+0x170/0x3f0
[   58.160237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.160271]  kthread+0x328/0x630
[   58.160299]  ret_from_fork+0x10/0x20
[   58.160330] 
[   58.226546] Allocated by task 340:
[   58.229934]  kasan_save_stack+0x3c/0x68
[   58.233751]  kasan_save_track+0x20/0x40
[   58.237570]  kasan_save_alloc_info+0x40/0x58
[   58.241824]  __kasan_kmalloc+0xd4/0xd8
[   58.245556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.250070]  kasan_strings+0xc8/0xb00
[   58.253716]  kunit_try_run_case+0x170/0x3f0
[   58.257883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.263351]  kthread+0x328/0x630
[   58.266563]  ret_from_fork+0x10/0x20
[   58.270122] 
[   58.271598] Freed by task 340:
[   58.274638]  kasan_save_stack+0x3c/0x68
[   58.278455]  kasan_save_track+0x20/0x40
[   58.282274]  kasan_save_free_info+0x4c/0x78
[   58.286441]  __kasan_slab_free+0x6c/0x98
[   58.290347]  kfree+0x214/0x3c8
[   58.293385]  kasan_strings+0x24c/0xb00
[   58.297118]  kunit_try_run_case+0x170/0x3f0
[   58.301285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.306755]  kthread+0x328/0x630
[   58.309965]  ret_from_fork+0x10/0x20
[   58.313524] 
[   58.315000] The buggy address belongs to the object at ffff0008085305c0
[   58.315000]  which belongs to the cache kmalloc-32 of size 32
[   58.327326] The buggy address is located 16 bytes inside of
[   58.327326]  freed 32-byte region [ffff0008085305c0, ffff0008085305e0)
[   58.339392] 
[   58.340870] The buggy address belongs to the physical page:
[   58.346426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530
[   58.354409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.360919] page_type: f5(slab)
[   58.364052] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   58.371777] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   58.379495] page dumped because: kasan: bad access detected
[   58.385051] 
[   58.386526] Memory state around the buggy address:
[   58.391306]  ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.398509]  ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.405714] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.412915]                                                  ^
[   58.418735]  ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.425939]  ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   58.433140] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   57.835942] ==================================================================
[   57.842874] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   57.848774] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340
[   57.856065] 
[   57.857549] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   57.857600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.857616] Hardware name: WinLink E850-96 board (DT)
[   57.857635] Call trace:
[   57.857649]  show_stack+0x20/0x38 (C)
[   57.857683]  dump_stack_lvl+0x8c/0xd0
[   57.857717]  print_report+0x118/0x5d0
[   57.857744]  kasan_report+0xdc/0x128
[   57.857774]  __asan_report_load1_noabort+0x20/0x30
[   57.857805]  strlen+0xa8/0xb0
[   57.857832]  kasan_strings+0x418/0xb00
[   57.857862]  kunit_try_run_case+0x170/0x3f0
[   57.857895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.857929]  kthread+0x328/0x630
[   57.857956]  ret_from_fork+0x10/0x20
[   57.857987] 
[   57.924120] Allocated by task 340:
[   57.927507]  kasan_save_stack+0x3c/0x68
[   57.931325]  kasan_save_track+0x20/0x40
[   57.935144]  kasan_save_alloc_info+0x40/0x58
[   57.939398]  __kasan_kmalloc+0xd4/0xd8
[   57.943130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.947644]  kasan_strings+0xc8/0xb00
[   57.951290]  kunit_try_run_case+0x170/0x3f0
[   57.955457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.960925]  kthread+0x328/0x630
[   57.964137]  ret_from_fork+0x10/0x20
[   57.967696] 
[   57.969171] Freed by task 340:
[   57.972213]  kasan_save_stack+0x3c/0x68
[   57.976029]  kasan_save_track+0x20/0x40
[   57.979849]  kasan_save_free_info+0x4c/0x78
[   57.984015]  __kasan_slab_free+0x6c/0x98
[   57.987921]  kfree+0x214/0x3c8
[   57.990960]  kasan_strings+0x24c/0xb00
[   57.994692]  kunit_try_run_case+0x170/0x3f0
[   57.998859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.004329]  kthread+0x328/0x630
[   58.007539]  ret_from_fork+0x10/0x20
[   58.011098] 
[   58.012573] The buggy address belongs to the object at ffff0008085305c0
[   58.012573]  which belongs to the cache kmalloc-32 of size 32
[   58.024900] The buggy address is located 16 bytes inside of
[   58.024900]  freed 32-byte region [ffff0008085305c0, ffff0008085305e0)
[   58.036966] 
[   58.038443] The buggy address belongs to the physical page:
[   58.044000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530
[   58.051985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.058494] page_type: f5(slab)
[   58.061630] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   58.069352] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   58.077069] page dumped because: kasan: bad access detected
[   58.082625] 
[   58.084100] Memory state around the buggy address:
[   58.088881]  ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.096083]  ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.103288] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.110489]                                                  ^
[   58.116308]  ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   58.123513]  ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   58.130714] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   57.535778] ==================================================================
[   57.542794] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   57.549475] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340
[   57.556765] 
[   57.558250] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   57.558305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.558322] Hardware name: WinLink E850-96 board (DT)
[   57.558344] Call trace:
[   57.558358]  show_stack+0x20/0x38 (C)
[   57.558392]  dump_stack_lvl+0x8c/0xd0
[   57.558425]  print_report+0x118/0x5d0
[   57.558454]  kasan_report+0xdc/0x128
[   57.558482]  __asan_report_load1_noabort+0x20/0x30
[   57.558516]  kasan_strings+0x95c/0xb00
[   57.558547]  kunit_try_run_case+0x170/0x3f0
[   57.558577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.558610]  kthread+0x328/0x630
[   57.558639]  ret_from_fork+0x10/0x20
[   57.558674] 
[   57.621869] Allocated by task 340:
[   57.625255]  kasan_save_stack+0x3c/0x68
[   57.629072]  kasan_save_track+0x20/0x40
[   57.632892]  kasan_save_alloc_info+0x40/0x58
[   57.637145]  __kasan_kmalloc+0xd4/0xd8
[   57.640878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.645392]  kasan_strings+0xc8/0xb00
[   57.649037]  kunit_try_run_case+0x170/0x3f0
[   57.653204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.658673]  kthread+0x328/0x630
[   57.661885]  ret_from_fork+0x10/0x20
[   57.665444] 
[   57.666919] Freed by task 340:
[   57.669959]  kasan_save_stack+0x3c/0x68
[   57.673777]  kasan_save_track+0x20/0x40
[   57.677596]  kasan_save_free_info+0x4c/0x78
[   57.681763]  __kasan_slab_free+0x6c/0x98
[   57.685669]  kfree+0x214/0x3c8
[   57.688707]  kasan_strings+0x24c/0xb00
[   57.692440]  kunit_try_run_case+0x170/0x3f0
[   57.696606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.702076]  kthread+0x328/0x630
[   57.705287]  ret_from_fork+0x10/0x20
[   57.708846] 
[   57.710321] The buggy address belongs to the object at ffff0008085305c0
[   57.710321]  which belongs to the cache kmalloc-32 of size 32
[   57.722648] The buggy address is located 16 bytes inside of
[   57.722648]  freed 32-byte region [ffff0008085305c0, ffff0008085305e0)
[   57.734713] 
[   57.736193] The buggy address belongs to the physical page:
[   57.741748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530
[   57.749732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.756241] page_type: f5(slab)
[   57.759376] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   57.767098] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   57.774817] page dumped because: kasan: bad access detected
[   57.780372] 
[   57.781848] Memory state around the buggy address:
[   57.786629]  ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.793831]  ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.801036] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.808236]                                                  ^
[   57.814056]  ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.821261]  ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   57.828462] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   57.216899] ==================================================================
[   57.240543] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   57.246440] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340
[   57.253731] 
[   57.255218] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   57.255274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.255293] Hardware name: WinLink E850-96 board (DT)
[   57.255316] Call trace:
[   57.255332]  show_stack+0x20/0x38 (C)
[   57.255369]  dump_stack_lvl+0x8c/0xd0
[   57.255406]  print_report+0x118/0x5d0
[   57.255437]  kasan_report+0xdc/0x128
[   57.255465]  __asan_report_load1_noabort+0x20/0x30
[   57.255501]  strcmp+0xc0/0xc8
[   57.255526]  kasan_strings+0x340/0xb00
[   57.255559]  kunit_try_run_case+0x170/0x3f0
[   57.255591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.255628]  kthread+0x328/0x630
[   57.255654]  ret_from_fork+0x10/0x20
[   57.255690] 
[   57.321788] Allocated by task 340:
[   57.325175]  kasan_save_stack+0x3c/0x68
[   57.328990]  kasan_save_track+0x20/0x40
[   57.332811]  kasan_save_alloc_info+0x40/0x58
[   57.337063]  __kasan_kmalloc+0xd4/0xd8
[   57.340796]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.345309]  kasan_strings+0xc8/0xb00
[   57.348955]  kunit_try_run_case+0x170/0x3f0
[   57.353122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.358591]  kthread+0x328/0x630
[   57.361802]  ret_from_fork+0x10/0x20
[   57.365361] 
[   57.366838] Freed by task 340:
[   57.369876]  kasan_save_stack+0x3c/0x68
[   57.373694]  kasan_save_track+0x20/0x40
[   57.377514]  kasan_save_free_info+0x4c/0x78
[   57.381680]  __kasan_slab_free+0x6c/0x98
[   57.385587]  kfree+0x214/0x3c8
[   57.388625]  kasan_strings+0x24c/0xb00
[   57.392357]  kunit_try_run_case+0x170/0x3f0
[   57.396524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.401994]  kthread+0x328/0x630
[   57.405204]  ret_from_fork+0x10/0x20
[   57.408763] 
[   57.410240] The buggy address belongs to the object at ffff0008085305c0
[   57.410240]  which belongs to the cache kmalloc-32 of size 32
[   57.422567] The buggy address is located 16 bytes inside of
[   57.422567]  freed 32-byte region [ffff0008085305c0, ffff0008085305e0)
[   57.434631] 
[   57.436110] The buggy address belongs to the physical page:
[   57.441666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530
[   57.449651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.456160] page_type: f5(slab)
[   57.459294] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   57.467016] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   57.474737] page dumped because: kasan: bad access detected
[   57.480290] 
[   57.481765] Memory state around the buggy address:
[   57.486545]  ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.493748]  ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.500953] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.508154]                                                  ^
[   57.513974]  ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.521178]  ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   57.528379] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   56.915088] ==================================================================
[   56.925355] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   56.931342] Read of size 1 at addr ffff00080851c558 by task kunit_try_catch/338
[   56.938631] 
[   56.940117] CPU: 2 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   56.940176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.940193] Hardware name: WinLink E850-96 board (DT)
[   56.940215] Call trace:
[   56.940229]  show_stack+0x20/0x38 (C)
[   56.940265]  dump_stack_lvl+0x8c/0xd0
[   56.940299]  print_report+0x118/0x5d0
[   56.940329]  kasan_report+0xdc/0x128
[   56.940357]  __asan_report_load1_noabort+0x20/0x30
[   56.940394]  memcmp+0x198/0x1d8
[   56.940421]  kasan_memcmp+0x16c/0x300
[   56.940456]  kunit_try_run_case+0x170/0x3f0
[   56.940490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.940527]  kthread+0x328/0x630
[   56.940557]  ret_from_fork+0x10/0x20
[   56.940594] 
[   57.006778] Allocated by task 338:
[   57.010162]  kasan_save_stack+0x3c/0x68
[   57.013979]  kasan_save_track+0x20/0x40
[   57.017797]  kasan_save_alloc_info+0x40/0x58
[   57.022050]  __kasan_kmalloc+0xd4/0xd8
[   57.025783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.030297]  kasan_memcmp+0xbc/0x300
[   57.033857]  kunit_try_run_case+0x170/0x3f0
[   57.038023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.043491]  kthread+0x328/0x630
[   57.046703]  ret_from_fork+0x10/0x20
[   57.050262] 
[   57.051741] The buggy address belongs to the object at ffff00080851c540
[   57.051741]  which belongs to the cache kmalloc-32 of size 32
[   57.064067] The buggy address is located 0 bytes to the right of
[   57.064067]  allocated 24-byte region [ffff00080851c540, ffff00080851c558)
[   57.076911] 
[   57.078389] The buggy address belongs to the physical page:
[   57.083947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851c
[   57.091930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.098441] page_type: f5(slab)
[   57.101576] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   57.109295] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   57.117017] page dumped because: kasan: bad access detected
[   57.122569] 
[   57.124045] Memory state around the buggy address:
[   57.128827]  ffff00080851c400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.136030]  ffff00080851c480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   57.143233] >ffff00080851c500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   57.150434]                                                     ^
[   57.156514]  ffff00080851c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.163720]  ffff00080851c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.170921] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   56.690341] ==================================================================
[   56.700010] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   56.707562] Read of size 1 at addr ffff800089667b4a by task kunit_try_catch/334
[   56.714850] 
[   56.716336] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   56.716390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.716408] Hardware name: WinLink E850-96 board (DT)
[   56.716430] Call trace:
[   56.716441]  show_stack+0x20/0x38 (C)
[   56.716478]  dump_stack_lvl+0x8c/0xd0
[   56.716518]  print_report+0x310/0x5d0
[   56.716545]  kasan_report+0xdc/0x128
[   56.716569]  __asan_report_load1_noabort+0x20/0x30
[   56.716604]  kasan_alloca_oob_right+0x2dc/0x340
[   56.716635]  kunit_try_run_case+0x170/0x3f0
[   56.716667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.716702]  kthread+0x328/0x630
[   56.716731]  ret_from_fork+0x10/0x20
[   56.716766] 
[   56.780737] The buggy address belongs to stack of task kunit_try_catch/334
[   56.787612] 
[   56.789068] The buggy address ffff800089667b4a belongs to a vmalloc virtual mapping
[   56.796711] The buggy address belongs to the physical page:
[   56.802267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8887ec
[   56.810250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.816770] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   56.824491] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.832211] page dumped because: kasan: bad access detected
[   56.837765] 
[   56.839240] Memory state around the buggy address:
[   56.844022]  ffff800089667a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.851225]  ffff800089667a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.858428] >ffff800089667b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   56.865629]                                               ^
[   56.871189]  ffff800089667b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   56.878393]  ffff800089667c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   56.885596] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   56.486244] ==================================================================
[   56.495499] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   56.502962] Read of size 1 at addr ffff800089647b5f by task kunit_try_catch/332
[   56.510253] 
[   56.511737] CPU: 0 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   56.511800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.511818] Hardware name: WinLink E850-96 board (DT)
[   56.511840] Call trace:
[   56.511853]  show_stack+0x20/0x38 (C)
[   56.511888]  dump_stack_lvl+0x8c/0xd0
[   56.511926]  print_report+0x310/0x5d0
[   56.511955]  kasan_report+0xdc/0x128
[   56.511981]  __asan_report_load1_noabort+0x20/0x30
[   56.512013]  kasan_alloca_oob_left+0x2b8/0x310
[   56.512046]  kunit_try_run_case+0x170/0x3f0
[   56.512079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.512115]  kthread+0x328/0x630
[   56.512145]  ret_from_fork+0x10/0x20
[   56.512179] 
[   56.576054] The buggy address belongs to stack of task kunit_try_catch/332
[   56.582930] 
[   56.584383] The buggy address ffff800089647b5f belongs to a vmalloc virtual mapping
[   56.592025] The buggy address belongs to the physical page:
[   56.597582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8887d7
[   56.605566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.612088] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   56.619806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.627528] page dumped because: kasan: bad access detected
[   56.633080] 
[   56.634556] Memory state around the buggy address:
[   56.639337]  ffff800089647a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.646539]  ffff800089647a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.653743] >ffff800089647b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   56.660945]                                                     ^
[   56.667024]  ffff800089647b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   56.674230]  ffff800089647c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   56.681431] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   38.420473] ==================================================================
[   38.430518] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   38.437113] Read of size 1 at addr ffff0008062c4000 by task kunit_try_catch/229
[   38.444403] 
[   38.445889] CPU: 2 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   38.445942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.445957] Hardware name: WinLink E850-96 board (DT)
[   38.445977] Call trace:
[   38.445992]  show_stack+0x20/0x38 (C)
[   38.446025]  dump_stack_lvl+0x8c/0xd0
[   38.446059]  print_report+0x118/0x5d0
[   38.446085]  kasan_report+0xdc/0x128
[   38.446111]  __asan_report_load1_noabort+0x20/0x30
[   38.446143]  kmalloc_large_uaf+0x2cc/0x2f8
[   38.446174]  kunit_try_run_case+0x170/0x3f0
[   38.446207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.446243]  kthread+0x328/0x630
[   38.446270]  ret_from_fork+0x10/0x20
[   38.446302] 
[   38.509857] The buggy address belongs to the physical page:
[   38.515413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   38.523397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.529919] raw: 0bfffe0000000000 fffffdffe018b208 ffff00085af65fc0 0000000000000000
[   38.537637] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   38.545357] page dumped because: kasan: bad access detected
[   38.550912] 
[   38.552387] Memory state around the buggy address:
[   38.557170]  ffff0008062c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.564370]  ffff0008062c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.571576] >ffff0008062c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.578775]                    ^
[   38.581991]  ffff0008062c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.589196]  ffff0008062c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.596398] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   56.252390] ==================================================================
[   56.266860] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   56.273712] Read of size 1 at addr ffff800089627c2a by task kunit_try_catch/330
[   56.281002] 
[   56.282488] CPU: 3 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   56.282544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.282561] Hardware name: WinLink E850-96 board (DT)
[   56.282583] Call trace:
[   56.282597]  show_stack+0x20/0x38 (C)
[   56.282635]  dump_stack_lvl+0x8c/0xd0
[   56.282671]  print_report+0x310/0x5d0
[   56.282699]  kasan_report+0xdc/0x128
[   56.282726]  __asan_report_load1_noabort+0x20/0x30
[   56.282758]  kasan_stack_oob+0x238/0x270
[   56.282789]  kunit_try_run_case+0x170/0x3f0
[   56.282819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.282856]  kthread+0x328/0x630
[   56.282889]  ret_from_fork+0x10/0x20
[   56.282923] 
[   56.346282] The buggy address belongs to stack of task kunit_try_catch/330
[   56.353139]  and is located at offset 138 in frame:
[   56.357998]  kasan_stack_oob+0x0/0x270
[   56.361736] 
[   56.363206] This frame has 4 objects:
[   56.366857]  [48, 49) '__assertion'
[   56.366881]  [64, 72) 'array'
[   56.370325]  [96, 112) '__assertion'
[   56.373279]  [128, 138) 'stack_array'
[   56.376835] 
[   56.381957] The buggy address ffff800089627c2a belongs to a vmalloc virtual mapping
[   56.389599] The buggy address belongs to the physical page:
[   56.395155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8887c2
[   56.403139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.409660] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   56.417378] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.425100] page dumped because: kasan: bad access detected
[   56.430653] 
[   56.432128] Memory state around the buggy address:
[   56.436909]  ffff800089627b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.444111]  ffff800089627b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   56.451318] >ffff800089627c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   56.458517]                                   ^
[   56.463035]  ffff800089627c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   56.470239]  ffff800089627d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   56.477440] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   56.043920] ==================================================================
[   56.054535] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   56.062084] Read of size 1 at addr ffff800087b5870d by task kunit_try_catch/326
[   56.069374] 
[   56.070858] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   56.070914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.070933] Hardware name: WinLink E850-96 board (DT)
[   56.070957] Call trace:
[   56.070972]  show_stack+0x20/0x38 (C)
[   56.071006]  dump_stack_lvl+0x8c/0xd0
[   56.071041]  print_report+0x310/0x5d0
[   56.071069]  kasan_report+0xdc/0x128
[   56.071096]  __asan_report_load1_noabort+0x20/0x30
[   56.071132]  kasan_global_oob_right+0x230/0x270
[   56.071164]  kunit_try_run_case+0x170/0x3f0
[   56.071198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.071235]  kthread+0x328/0x630
[   56.071268]  ret_from_fork+0x10/0x20
[   56.071302] 
[   56.135260] The buggy address belongs to the variable:
[   56.140380]  global_array+0xd/0x40
[   56.143765] 
[   56.145241] The buggy address ffff800087b5870d belongs to a vmalloc virtual mapping
[   56.152883] The buggy address belongs to the physical page:
[   56.158441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b58
[   56.166336] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   56.173639] raw: 03fffe0000002000 fffffdffc01ed608 fffffdffc01ed608 0000000000000000
[   56.181358] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   56.189080] page dumped because: kasan: bad access detected
[   56.194632] 
[   56.196108] Memory state around the buggy address:
[   56.200887]  ffff800087b58600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.208091]  ffff800087b58680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   56.215295] >ffff800087b58700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   56.222496]                       ^
[   56.225972]  ffff800087b58780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   56.233179]  ffff800087b58800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.240378] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   55.803572] ==================================================================
[   55.813740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.821723] Free of addr ffff0008062cc001 by task kunit_try_catch/324
[   55.828144] 
[   55.829631] CPU: 2 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.829686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.829702] Hardware name: WinLink E850-96 board (DT)
[   55.829724] Call trace:
[   55.829738]  show_stack+0x20/0x38 (C)
[   55.829773]  dump_stack_lvl+0x8c/0xd0
[   55.829809]  print_report+0x118/0x5d0
[   55.829843]  kasan_report_invalid_free+0xc0/0xe8
[   55.829873]  __kasan_mempool_poison_object+0xfc/0x150
[   55.829904]  mempool_free+0x28c/0x328
[   55.829939]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.829978]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   55.830016]  kunit_try_run_case+0x170/0x3f0
[   55.830050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.830086]  kthread+0x328/0x630
[   55.830115]  ret_from_fork+0x10/0x20
[   55.830152] 
[   55.905578] The buggy address belongs to the physical page:
[   55.911134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc
[   55.919117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.926757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.933700] page_type: f8(unknown)
[   55.937096] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.944816] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.952544] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.960354] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.968167] head: 0bfffe0000000002 fffffdffe018b301 00000000ffffffff 00000000ffffffff
[   55.975979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   55.983787] page dumped because: kasan: bad access detected
[   55.989340] 
[   55.990816] Memory state around the buggy address:
[   55.995596]  ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.002799]  ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.010004] >ffff0008062cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.017204]                    ^
[   56.020420]  ffff0008062cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.027625]  ffff0008062cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.034827] ==================================================================
[   55.476400] ==================================================================
[   55.486920] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.494903] Free of addr ffff00080245a301 by task kunit_try_catch/322
[   55.501326] 
[   55.502813] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.502872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.502888] Hardware name: WinLink E850-96 board (DT)
[   55.502912] Call trace:
[   55.502924]  show_stack+0x20/0x38 (C)
[   55.502958]  dump_stack_lvl+0x8c/0xd0
[   55.502992]  print_report+0x118/0x5d0
[   55.503023]  kasan_report_invalid_free+0xc0/0xe8
[   55.503052]  check_slab_allocation+0xfc/0x108
[   55.503091]  __kasan_mempool_poison_object+0x78/0x150
[   55.503122]  mempool_free+0x28c/0x328
[   55.503154]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.503190]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.503222]  kunit_try_run_case+0x170/0x3f0
[   55.503253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.503289]  kthread+0x328/0x630
[   55.503319]  ret_from_fork+0x10/0x20
[   55.503353] 
[   55.582577] Allocated by task 322:
[   55.585964]  kasan_save_stack+0x3c/0x68
[   55.589780]  kasan_save_track+0x20/0x40
[   55.593600]  kasan_save_alloc_info+0x40/0x58
[   55.597853]  __kasan_mempool_unpoison_object+0x11c/0x180
[   55.603148]  remove_element+0x130/0x1f8
[   55.606967]  mempool_alloc_preallocated+0x58/0xc0
[   55.611656]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   55.617210]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.622158]  kunit_try_run_case+0x170/0x3f0
[   55.626325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.631793]  kthread+0x328/0x630
[   55.635005]  ret_from_fork+0x10/0x20
[   55.638564] 
[   55.640042] The buggy address belongs to the object at ffff00080245a300
[   55.640042]  which belongs to the cache kmalloc-128 of size 128
[   55.652542] The buggy address is located 1 bytes inside of
[   55.652542]  128-byte region [ffff00080245a300, ffff00080245a380)
[   55.664084] 
[   55.665565] The buggy address belongs to the physical page:
[   55.671123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88245a
[   55.679104] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.686745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.693686] page_type: f5(slab)
[   55.696823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.704542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.712269] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.720080] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.727893] head: 0bfffe0000000001 fffffdffe0091681 00000000ffffffff 00000000ffffffff
[   55.735705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   55.743512] page dumped because: kasan: bad access detected
[   55.749066] 
[   55.750543] Memory state around the buggy address:
[   55.755322]  ffff00080245a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.762524]  ffff00080245a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.769729] >ffff00080245a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.776930]                    ^
[   55.780145]  ffff00080245a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.787352]  ffff00080245a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.794553] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   55.042254] ==================================================================
[   55.052293] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   55.059407] Free of addr ffff000808728000 by task kunit_try_catch/318
[   55.065830] 
[   55.067316] CPU: 7 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.067372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.067389] Hardware name: WinLink E850-96 board (DT)
[   55.067410] Call trace:
[   55.067423]  show_stack+0x20/0x38 (C)
[   55.067455]  dump_stack_lvl+0x8c/0xd0
[   55.067490]  print_report+0x118/0x5d0
[   55.067519]  kasan_report_invalid_free+0xc0/0xe8
[   55.067550]  __kasan_mempool_poison_object+0x14c/0x150
[   55.067582]  mempool_free+0x28c/0x328
[   55.067614]  mempool_double_free_helper+0x150/0x2e8
[   55.067647]  mempool_kmalloc_large_double_free+0xc0/0x118
[   55.067682]  kunit_try_run_case+0x170/0x3f0
[   55.067713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.067747]  kthread+0x328/0x630
[   55.067775]  ret_from_fork+0x10/0x20
[   55.067812] 
[   55.142481] The buggy address belongs to the physical page:
[   55.148038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888728
[   55.156021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.163661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.170603] page_type: f8(unknown)
[   55.174000] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.181719] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.189447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.197257] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.205071] head: 0bfffe0000000002 fffffdffe021ca01 00000000ffffffff 00000000ffffffff
[   55.212883] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   55.220688] page dumped because: kasan: bad access detected
[   55.226244] 
[   55.227719] Memory state around the buggy address:
[   55.232501]  ffff000808727f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.239702]  ffff000808727f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.246909] >ffff000808728000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.254108]                    ^
[   55.257323]  ffff000808728080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.264528]  ffff000808728100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.271730] ==================================================================
[   54.667233] ==================================================================
[   54.677037] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   54.684155] Free of addr ffff00080244df00 by task kunit_try_catch/316
[   54.690575] 
[   54.692060] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   54.692115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.692133] Hardware name: WinLink E850-96 board (DT)
[   54.692154] Call trace:
[   54.692167]  show_stack+0x20/0x38 (C)
[   54.692203]  dump_stack_lvl+0x8c/0xd0
[   54.692236]  print_report+0x118/0x5d0
[   54.692263]  kasan_report_invalid_free+0xc0/0xe8
[   54.692294]  check_slab_allocation+0xd4/0x108
[   54.692333]  __kasan_mempool_poison_object+0x78/0x150
[   54.692365]  mempool_free+0x28c/0x328
[   54.692397]  mempool_double_free_helper+0x150/0x2e8
[   54.692431]  mempool_kmalloc_double_free+0xc0/0x118
[   54.692466]  kunit_try_run_case+0x170/0x3f0
[   54.692496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.692531]  kthread+0x328/0x630
[   54.692561]  ret_from_fork+0x10/0x20
[   54.692596] 
[   54.770958] Allocated by task 316:
[   54.774345]  kasan_save_stack+0x3c/0x68
[   54.778160]  kasan_save_track+0x20/0x40
[   54.781980]  kasan_save_alloc_info+0x40/0x58
[   54.786233]  __kasan_mempool_unpoison_object+0x11c/0x180
[   54.791530]  remove_element+0x130/0x1f8
[   54.795348]  mempool_alloc_preallocated+0x58/0xc0
[   54.800035]  mempool_double_free_helper+0x94/0x2e8
[   54.804809]  mempool_kmalloc_double_free+0xc0/0x118
[   54.809670]  kunit_try_run_case+0x170/0x3f0
[   54.813837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.819306]  kthread+0x328/0x630
[   54.822517]  ret_from_fork+0x10/0x20
[   54.826076] 
[   54.827552] Freed by task 316:
[   54.830592]  kasan_save_stack+0x3c/0x68
[   54.834409]  kasan_save_track+0x20/0x40
[   54.838229]  kasan_save_free_info+0x4c/0x78
[   54.842395]  __kasan_mempool_poison_object+0xc0/0x150
[   54.847430]  mempool_free+0x28c/0x328
[   54.851076]  mempool_double_free_helper+0x100/0x2e8
[   54.855937]  mempool_kmalloc_double_free+0xc0/0x118
[   54.860798]  kunit_try_run_case+0x170/0x3f0
[   54.864964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.870433]  kthread+0x328/0x630
[   54.873645]  ret_from_fork+0x10/0x20
[   54.877204] 
[   54.878681] The buggy address belongs to the object at ffff00080244df00
[   54.878681]  which belongs to the cache kmalloc-128 of size 128
[   54.891182] The buggy address is located 0 bytes inside of
[   54.891182]  128-byte region [ffff00080244df00, ffff00080244df80)
[   54.902724] 
[   54.904204] The buggy address belongs to the physical page:
[   54.909760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   54.917744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.925384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.932326] page_type: f5(slab)
[   54.935464] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.943182] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   54.950909] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   54.958720] head: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   54.966533] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   54.974344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   54.982152] page dumped because: kasan: bad access detected
[   54.987706] 
[   54.989181] Memory state around the buggy address:
[   54.993965]  ffff00080244de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.001166]  ffff00080244de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.008369] >ffff00080244df00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.015570]                    ^
[   55.018785]  ffff00080244df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.025992]  ffff00080244e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.033191] ==================================================================
[   55.281456] ==================================================================
[   55.291350] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   55.298466] Free of addr ffff0008062cc000 by task kunit_try_catch/320
[   55.304889] 
[   55.306377] CPU: 2 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.306433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.306451] Hardware name: WinLink E850-96 board (DT)
[   55.306477] Call trace:
[   55.306491]  show_stack+0x20/0x38 (C)
[   55.306527]  dump_stack_lvl+0x8c/0xd0
[   55.306564]  print_report+0x118/0x5d0
[   55.306592]  kasan_report_invalid_free+0xc0/0xe8
[   55.306623]  __kasan_mempool_poison_pages+0xe0/0xe8
[   55.306656]  mempool_free+0x24c/0x328
[   55.306688]  mempool_double_free_helper+0x150/0x2e8
[   55.306723]  mempool_page_alloc_double_free+0xbc/0x118
[   55.306762]  kunit_try_run_case+0x170/0x3f0
[   55.306794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.306830]  kthread+0x328/0x630
[   55.306860]  ret_from_fork+0x10/0x20
[   55.306893] 
[   55.381020] The buggy address belongs to the physical page:
[   55.386575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc
[   55.394560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.401082] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   55.408800] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.416521] page dumped because: kasan: bad access detected
[   55.422074] 
[   55.423550] Memory state around the buggy address:
[   55.428331]  ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.435532]  ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.442739] >ffff0008062cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.449938]                    ^
[   55.453154]  ffff0008062cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.460358]  ffff0008062cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.467561] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   54.499193] ==================================================================
[   54.499379] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   54.499503] Read of size 1 at addr ffff00080506c000 by task kunit_try_catch/314
[   54.501862] 
[   54.503351] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   54.503414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.503431] Hardware name: WinLink E850-96 board (DT)
[   54.503455] Call trace:
[   54.503468]  show_stack+0x20/0x38 (C)
[   54.503505]  dump_stack_lvl+0x8c/0xd0
[   54.503541]  print_report+0x118/0x5d0
[   54.503570]  kasan_report+0xdc/0x128
[   54.503598]  __asan_report_load1_noabort+0x20/0x30
[   54.503635]  mempool_uaf_helper+0x314/0x340
[   54.503667]  mempool_page_alloc_uaf+0xc0/0x118
[   54.503705]  kunit_try_run_case+0x170/0x3f0
[   54.503734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.503768]  kthread+0x328/0x630
[   54.503796]  ret_from_fork+0x10/0x20
[   54.503830] 
[   54.571831] The buggy address belongs to the physical page:
[   54.577386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88506c
[   54.585371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.591891] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.599611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.607331] page dumped because: kasan: bad access detected
[   54.612885] 
[   54.614360] Memory state around the buggy address:
[   54.619144]  ffff00080506bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.626343]  ffff00080506bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.633548] >ffff00080506c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.640749]                    ^
[   54.643964]  ffff00080506c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.651169]  ffff00080506c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.658372] ==================================================================
[   53.918341] ==================================================================
[   53.927805] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   53.934488] Read of size 1 at addr ffff000803ec8000 by task kunit_try_catch/310
[   53.941778] 
[   53.943263] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   53.943321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.943337] Hardware name: WinLink E850-96 board (DT)
[   53.943361] Call trace:
[   53.943374]  show_stack+0x20/0x38 (C)
[   53.943409]  dump_stack_lvl+0x8c/0xd0
[   53.943445]  print_report+0x118/0x5d0
[   53.943471]  kasan_report+0xdc/0x128
[   53.943497]  __asan_report_load1_noabort+0x20/0x30
[   53.943531]  mempool_uaf_helper+0x314/0x340
[   53.943565]  mempool_kmalloc_large_uaf+0xc4/0x120
[   53.943602]  kunit_try_run_case+0x170/0x3f0
[   53.943634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.943667]  kthread+0x328/0x630
[   53.943694]  ret_from_fork+0x10/0x20
[   53.943729] 
[   54.012003] The buggy address belongs to the physical page:
[   54.017560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883ec8
[   54.025544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   54.033183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   54.040126] page_type: f8(unknown)
[   54.043522] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.051243] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.058970] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   54.066780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   54.074593] head: 0bfffe0000000002 fffffdffe00fb201 00000000ffffffff 00000000ffffffff
[   54.082405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   54.090213] page dumped because: kasan: bad access detected
[   54.095766] 
[   54.097241] Memory state around the buggy address:
[   54.102025]  ffff000803ec7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.109224]  ffff000803ec7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.116429] >ffff000803ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.123630]                    ^
[   54.126846]  ffff000803ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.134050]  ffff000803ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   54.141253] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   53.565724] ==================================================================
[   53.565908] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   53.572425] Read of size 1 at addr ffff000801af8400 by task kunit_try_catch/308
[   53.579716] 
[   53.581204] CPU: 3 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   53.581262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.581281] Hardware name: WinLink E850-96 board (DT)
[   53.581308] Call trace:
[   53.581322]  show_stack+0x20/0x38 (C)
[   53.581358]  dump_stack_lvl+0x8c/0xd0
[   53.581394]  print_report+0x118/0x5d0
[   53.581424]  kasan_report+0xdc/0x128
[   53.581453]  __asan_report_load1_noabort+0x20/0x30
[   53.581485]  mempool_uaf_helper+0x314/0x340
[   53.581516]  mempool_kmalloc_uaf+0xc4/0x120
[   53.581548]  kunit_try_run_case+0x170/0x3f0
[   53.581579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.581615]  kthread+0x328/0x630
[   53.581644]  ret_from_fork+0x10/0x20
[   53.581679] 
[   53.649421] Allocated by task 308:
[   53.652805]  kasan_save_stack+0x3c/0x68
[   53.656623]  kasan_save_track+0x20/0x40
[   53.660443]  kasan_save_alloc_info+0x40/0x58
[   53.664696]  __kasan_mempool_unpoison_object+0x11c/0x180
[   53.669991]  remove_element+0x130/0x1f8
[   53.673810]  mempool_alloc_preallocated+0x58/0xc0
[   53.678498]  mempool_uaf_helper+0xa4/0x340
[   53.682578]  mempool_kmalloc_uaf+0xc4/0x120
[   53.686744]  kunit_try_run_case+0x170/0x3f0
[   53.690911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.696380]  kthread+0x328/0x630
[   53.699591]  ret_from_fork+0x10/0x20
[   53.703150] 
[   53.704627] Freed by task 308:
[   53.707666]  kasan_save_stack+0x3c/0x68
[   53.711484]  kasan_save_track+0x20/0x40
[   53.715303]  kasan_save_free_info+0x4c/0x78
[   53.719470]  __kasan_mempool_poison_object+0xc0/0x150
[   53.724504]  mempool_free+0x28c/0x328
[   53.728150]  mempool_uaf_helper+0x104/0x340
[   53.732316]  mempool_kmalloc_uaf+0xc4/0x120
[   53.736483]  kunit_try_run_case+0x170/0x3f0
[   53.740650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.746119]  kthread+0x328/0x630
[   53.749332]  ret_from_fork+0x10/0x20
[   53.752889] 
[   53.754368] The buggy address belongs to the object at ffff000801af8400
[   53.754368]  which belongs to the cache kmalloc-128 of size 128
[   53.766867] The buggy address is located 0 bytes inside of
[   53.766867]  freed 128-byte region [ffff000801af8400, ffff000801af8480)
[   53.778930] 
[   53.780410] The buggy address belongs to the physical page:
[   53.785967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8
[   53.793950] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.801589] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.808532] page_type: f5(slab)
[   53.811669] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   53.819388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.827116] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   53.834926] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.842739] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff
[   53.850551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   53.858357] page dumped because: kasan: bad access detected
[   53.863911] 
[   53.865387] Memory state around the buggy address:
[   53.870169]  ffff000801af8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.877372]  ffff000801af8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.884575] >ffff000801af8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.891776]                    ^
[   53.894991]  ffff000801af8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.902196]  ffff000801af8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.909399] ==================================================================
[   54.150847] ==================================================================
[   54.160182] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   54.167295] Read of size 1 at addr ffff0008048cd240 by task kunit_try_catch/312
[   54.174584] 
[   54.176071] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   54.176126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.176143] Hardware name: WinLink E850-96 board (DT)
[   54.176166] Call trace:
[   54.176181]  show_stack+0x20/0x38 (C)
[   54.176215]  dump_stack_lvl+0x8c/0xd0
[   54.176251]  print_report+0x118/0x5d0
[   54.176279]  kasan_report+0xdc/0x128
[   54.176304]  __asan_report_load1_noabort+0x20/0x30
[   54.176340]  mempool_uaf_helper+0x314/0x340
[   54.176373]  mempool_slab_uaf+0xc0/0x118
[   54.176407]  kunit_try_run_case+0x170/0x3f0
[   54.176440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.176474]  kthread+0x328/0x630
[   54.176504]  ret_from_fork+0x10/0x20
[   54.176542] 
[   54.244030] Allocated by task 312:
[   54.247417]  kasan_save_stack+0x3c/0x68
[   54.251233]  kasan_save_track+0x20/0x40
[   54.255052]  kasan_save_alloc_info+0x40/0x58
[   54.259305]  __kasan_mempool_unpoison_object+0xbc/0x180
[   54.264513]  remove_element+0x16c/0x1f8
[   54.268334]  mempool_alloc_preallocated+0x58/0xc0
[   54.273020]  mempool_uaf_helper+0xa4/0x340
[   54.277100]  mempool_slab_uaf+0xc0/0x118
[   54.281006]  kunit_try_run_case+0x170/0x3f0
[   54.285173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.290642]  kthread+0x328/0x630
[   54.293853]  ret_from_fork+0x10/0x20
[   54.297412] 
[   54.298889] Freed by task 312:
[   54.301927]  kasan_save_stack+0x3c/0x68
[   54.305746]  kasan_save_track+0x20/0x40
[   54.309565]  kasan_save_free_info+0x4c/0x78
[   54.313731]  __kasan_mempool_poison_object+0xc0/0x150
[   54.318766]  mempool_free+0x28c/0x328
[   54.322412]  mempool_uaf_helper+0x104/0x340
[   54.326579]  mempool_slab_uaf+0xc0/0x118
[   54.330484]  kunit_try_run_case+0x170/0x3f0
[   54.334651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.340120]  kthread+0x328/0x630
[   54.343332]  ret_from_fork+0x10/0x20
[   54.346891] 
[   54.348368] The buggy address belongs to the object at ffff0008048cd240
[   54.348368]  which belongs to the cache test_cache of size 123
[   54.360781] The buggy address is located 0 bytes inside of
[   54.360781]  freed 123-byte region [ffff0008048cd240, ffff0008048cd2bb)
[   54.372845] 
[   54.374324] The buggy address belongs to the physical page:
[   54.379881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cd
[   54.387865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.394374] page_type: f5(slab)
[   54.397511] raw: 0bfffe0000000000 ffff00080188e640 dead000000000122 0000000000000000
[   54.405230] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   54.412950] page dumped because: kasan: bad access detected
[   54.418504] 
[   54.419979] Memory state around the buggy address:
[   54.424761]  ffff0008048cd100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.431964]  ffff0008048cd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.439167] >ffff0008048cd200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   54.446368]                                            ^
[   54.451667]  ffff0008048cd280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.458872]  ffff0008048cd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.466074] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   53.277156] ==================================================================
[   53.287105] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   53.294653] Read of size 1 at addr ffff0008086382bb by task kunit_try_catch/306
[   53.301941] 
[   53.303428] CPU: 5 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   53.303489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.303507] Hardware name: WinLink E850-96 board (DT)
[   53.303531] Call trace:
[   53.303545]  show_stack+0x20/0x38 (C)
[   53.303581]  dump_stack_lvl+0x8c/0xd0
[   53.303616]  print_report+0x118/0x5d0
[   53.303646]  kasan_report+0xdc/0x128
[   53.303673]  __asan_report_load1_noabort+0x20/0x30
[   53.303707]  mempool_oob_right_helper+0x2ac/0x2f0
[   53.303742]  mempool_slab_oob_right+0xc0/0x118
[   53.303775]  kunit_try_run_case+0x170/0x3f0
[   53.303807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.303842]  kthread+0x328/0x630
[   53.303870]  ret_from_fork+0x10/0x20
[   53.303904] 
[   53.372428] Allocated by task 306:
[   53.375815]  kasan_save_stack+0x3c/0x68
[   53.379631]  kasan_save_track+0x20/0x40
[   53.383450]  kasan_save_alloc_info+0x40/0x58
[   53.387704]  __kasan_mempool_unpoison_object+0xbc/0x180
[   53.392912]  remove_element+0x16c/0x1f8
[   53.396731]  mempool_alloc_preallocated+0x58/0xc0
[   53.401419]  mempool_oob_right_helper+0x98/0x2f0
[   53.406019]  mempool_slab_oob_right+0xc0/0x118
[   53.410446]  kunit_try_run_case+0x170/0x3f0
[   53.414613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.420082]  kthread+0x328/0x630
[   53.423293]  ret_from_fork+0x10/0x20
[   53.426852] 
[   53.428330] The buggy address belongs to the object at ffff000808638240
[   53.428330]  which belongs to the cache test_cache of size 123
[   53.440744] The buggy address is located 0 bytes to the right of
[   53.440744]  allocated 123-byte region [ffff000808638240, ffff0008086382bb)
[   53.453675] 
[   53.455154] The buggy address belongs to the physical page:
[   53.460710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888638
[   53.468693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.475204] page_type: f5(slab)
[   53.478341] raw: 0bfffe0000000000 ffff000801e0a640 dead000000000122 0000000000000000
[   53.486060] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   53.493780] page dumped because: kasan: bad access detected
[   53.499334] 
[   53.500810] Memory state around the buggy address:
[   53.505593]  ffff000808638180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.512792]  ffff000808638200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   53.519997] >ffff000808638280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   53.527198]                                         ^
[   53.532237]  ffff000808638300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.539441]  ffff000808638380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.546642] ==================================================================
[   52.740078] ==================================================================
[   52.740248] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   52.740386] Read of size 1 at addr ffff000801b9e273 by task kunit_try_catch/302
[   52.746828] 
[   52.748315] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   52.748374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.748389] Hardware name: WinLink E850-96 board (DT)
[   52.748413] Call trace:
[   52.748428]  show_stack+0x20/0x38 (C)
[   52.748465]  dump_stack_lvl+0x8c/0xd0
[   52.748502]  print_report+0x118/0x5d0
[   52.748531]  kasan_report+0xdc/0x128
[   52.748560]  __asan_report_load1_noabort+0x20/0x30
[   52.748595]  mempool_oob_right_helper+0x2ac/0x2f0
[   52.748627]  mempool_kmalloc_oob_right+0xc4/0x120
[   52.748659]  kunit_try_run_case+0x170/0x3f0
[   52.748689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.748724]  kthread+0x328/0x630
[   52.748752]  ret_from_fork+0x10/0x20
[   52.748786] 
[   52.817575] Allocated by task 302:
[   52.820962]  kasan_save_stack+0x3c/0x68
[   52.824778]  kasan_save_track+0x20/0x40
[   52.828598]  kasan_save_alloc_info+0x40/0x58
[   52.832851]  __kasan_mempool_unpoison_object+0x11c/0x180
[   52.838146]  remove_element+0x130/0x1f8
[   52.841965]  mempool_alloc_preallocated+0x58/0xc0
[   52.846653]  mempool_oob_right_helper+0x98/0x2f0
[   52.851253]  mempool_kmalloc_oob_right+0xc4/0x120
[   52.855941]  kunit_try_run_case+0x170/0x3f0
[   52.860108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.865576]  kthread+0x328/0x630
[   52.868788]  ret_from_fork+0x10/0x20
[   52.872347] 
[   52.873825] The buggy address belongs to the object at ffff000801b9e200
[   52.873825]  which belongs to the cache kmalloc-128 of size 128
[   52.886326] The buggy address is located 0 bytes to the right of
[   52.886326]  allocated 115-byte region [ffff000801b9e200, ffff000801b9e273)
[   52.899256] 
[   52.900736] The buggy address belongs to the physical page:
[   52.906294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b9e
[   52.914275] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.921916] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   52.928858] page_type: f5(slab)
[   52.931995] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   52.939714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.947442] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   52.955252] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.963064] head: 0bfffe0000000001 fffffdffe006e781 00000000ffffffff 00000000ffffffff
[   52.970876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   52.978683] page dumped because: kasan: bad access detected
[   52.984237] 
[   52.985713] Memory state around the buggy address:
[   52.990496]  ffff000801b9e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.997698]  ffff000801b9e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.004902] >ffff000801b9e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   53.012102]                                                              ^
[   53.018963]  ffff000801b9e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.026167]  ffff000801b9e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   53.033368] ==================================================================
[   53.042274] ==================================================================
[   53.052296] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   53.059845] Read of size 1 at addr ffff00080506e001 by task kunit_try_catch/304
[   53.067136] 
[   53.068624] CPU: 3 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   53.068675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.068692] Hardware name: WinLink E850-96 board (DT)
[   53.068714] Call trace:
[   53.068727]  show_stack+0x20/0x38 (C)
[   53.068764]  dump_stack_lvl+0x8c/0xd0
[   53.068800]  print_report+0x118/0x5d0
[   53.068829]  kasan_report+0xdc/0x128
[   53.068854]  __asan_report_load1_noabort+0x20/0x30
[   53.068887]  mempool_oob_right_helper+0x2ac/0x2f0
[   53.068923]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   53.068960]  kunit_try_run_case+0x170/0x3f0
[   53.068990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.069027]  kthread+0x328/0x630
[   53.069059]  ret_from_fork+0x10/0x20
[   53.069097] 
[   53.138404] The buggy address belongs to the physical page:
[   53.143962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88506c
[   53.151948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.159585] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   53.166527] page_type: f8(unknown)
[   53.169926] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.177644] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.185372] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   53.193181] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   53.200995] head: 0bfffe0000000002 fffffdffe0141b01 00000000ffffffff 00000000ffffffff
[   53.208807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   53.216614] page dumped because: kasan: bad access detected
[   53.222168] 
[   53.223643] Memory state around the buggy address:
[   53.228425]  ffff00080506df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.235626]  ffff00080506df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   53.242833] >ffff00080506e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.250032]                    ^
[   53.253248]  ffff00080506e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.260452]  ffff00080506e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   53.267655] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   51.843655] ==================================================================
[   51.843841] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   51.843977] Read of size 1 at addr ffff000801afa140 by task kunit_try_catch/296
[   51.847538] 
[   51.849025] CPU: 3 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   51.849082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.849101] Hardware name: WinLink E850-96 board (DT)
[   51.849124] Call trace:
[   51.849138]  show_stack+0x20/0x38 (C)
[   51.849175]  dump_stack_lvl+0x8c/0xd0
[   51.849210]  print_report+0x118/0x5d0
[   51.849238]  kasan_report+0xdc/0x128
[   51.849262]  __kasan_check_byte+0x54/0x70
[   51.849289]  kmem_cache_destroy+0x34/0x218
[   51.849323]  kmem_cache_double_destroy+0x174/0x300
[   51.849359]  kunit_try_run_case+0x170/0x3f0
[   51.849391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.849428]  kthread+0x328/0x630
[   51.849456]  ret_from_fork+0x10/0x20
[   51.849491] 
[   51.916981] Allocated by task 296:
[   51.920369]  kasan_save_stack+0x3c/0x68
[   51.924184]  kasan_save_track+0x20/0x40
[   51.928004]  kasan_save_alloc_info+0x40/0x58
[   51.932258]  __kasan_slab_alloc+0xa8/0xb0
[   51.936250]  kmem_cache_alloc_noprof+0x10c/0x398
[   51.940851]  __kmem_cache_create_args+0x178/0x280
[   51.945538]  kmem_cache_double_destroy+0xc0/0x300
[   51.950226]  kunit_try_run_case+0x170/0x3f0
[   51.954394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.959861]  kthread+0x328/0x630
[   51.963072]  ret_from_fork+0x10/0x20
[   51.966632] 
[   51.968109] Freed by task 296:
[   51.971147]  kasan_save_stack+0x3c/0x68
[   51.974965]  kasan_save_track+0x20/0x40
[   51.978785]  kasan_save_free_info+0x4c/0x78
[   51.982951]  __kasan_slab_free+0x6c/0x98
[   51.986857]  kmem_cache_free+0x260/0x468
[   51.990763]  slab_kmem_cache_release+0x38/0x50
[   51.995190]  kmem_cache_release+0x1c/0x30
[   51.999183]  kobject_put+0x17c/0x420
[   52.002742]  sysfs_slab_release+0x1c/0x30
[   52.006735]  kmem_cache_destroy+0x118/0x218
[   52.010902]  kmem_cache_double_destroy+0x128/0x300
[   52.015676]  kunit_try_run_case+0x170/0x3f0
[   52.019843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.025312]  kthread+0x328/0x630
[   52.028524]  ret_from_fork+0x10/0x20
[   52.032082] 
[   52.033559] The buggy address belongs to the object at ffff000801afa140
[   52.033559]  which belongs to the cache kmem_cache of size 208
[   52.045974] The buggy address is located 0 bytes inside of
[   52.045974]  freed 208-byte region [ffff000801afa140, ffff000801afa210)
[   52.058037] 
[   52.059517] The buggy address belongs to the physical page:
[   52.065073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881afa
[   52.073056] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.080697] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   52.087638] page_type: f5(slab)
[   52.090775] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   52.098494] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   52.106222] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   52.114032] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   52.121845] head: 0bfffe0000000001 fffffdffe006be81 00000000ffffffff 00000000ffffffff
[   52.129657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   52.137465] page dumped because: kasan: bad access detected
[   52.143018] 
[   52.144493] Memory state around the buggy address:
[   52.149277]  ffff000801afa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.156476]  ffff000801afa080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   52.163681] >ffff000801afa100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   52.170882]                                            ^
[   52.176181]  ffff000801afa180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.183386]  ffff000801afa200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.190587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   51.436853] ==================================================================
[   51.437046] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   51.437175] Read of size 1 at addr ffff000801b9e000 by task kunit_try_catch/294
[   51.440560] 
[   51.442047] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   51.442112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.442128] Hardware name: WinLink E850-96 board (DT)
[   51.442149] Call trace:
[   51.442163]  show_stack+0x20/0x38 (C)
[   51.442197]  dump_stack_lvl+0x8c/0xd0
[   51.442237]  print_report+0x118/0x5d0
[   51.442266]  kasan_report+0xdc/0x128
[   51.442295]  __asan_report_load1_noabort+0x20/0x30
[   51.442329]  kmem_cache_rcu_uaf+0x388/0x468
[   51.442360]  kunit_try_run_case+0x170/0x3f0
[   51.442393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.442429]  kthread+0x328/0x630
[   51.442458]  ret_from_fork+0x10/0x20
[   51.442493] 
[   51.506099] Allocated by task 294:
[   51.509488]  kasan_save_stack+0x3c/0x68
[   51.513302]  kasan_save_track+0x20/0x40
[   51.517123]  kasan_save_alloc_info+0x40/0x58
[   51.521375]  __kasan_slab_alloc+0xa8/0xb0
[   51.525368]  kmem_cache_alloc_noprof+0x10c/0x398
[   51.529968]  kmem_cache_rcu_uaf+0x12c/0x468
[   51.534135]  kunit_try_run_case+0x170/0x3f0
[   51.538302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.543772]  kthread+0x328/0x630
[   51.546982]  ret_from_fork+0x10/0x20
[   51.550541] 
[   51.552018] Freed by task 0:
[   51.554885]  kasan_save_stack+0x3c/0x68
[   51.558700]  kasan_save_track+0x20/0x40
[   51.562520]  kasan_save_free_info+0x4c/0x78
[   51.566687]  __kasan_slab_free+0x6c/0x98
[   51.570593]  slab_free_after_rcu_debug+0xd4/0x2f8
[   51.575280]  rcu_core+0x9f4/0x1e20
[   51.578666]  rcu_core_si+0x18/0x30
[   51.582051]  handle_softirqs+0x374/0xb28
[   51.585957]  __do_softirq+0x1c/0x28
[   51.589429] 
[   51.590906] Last potentially related work creation:
[   51.595768]  kasan_save_stack+0x3c/0x68
[   51.599585]  kasan_record_aux_stack+0xb4/0xc8
[   51.603927]  kmem_cache_free+0x120/0x468
[   51.607833]  kmem_cache_rcu_uaf+0x16c/0x468
[   51.611999]  kunit_try_run_case+0x170/0x3f0
[   51.616165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.621634]  kthread+0x328/0x630
[   51.624846]  ret_from_fork+0x10/0x20
[   51.628404] 
[   51.629881] The buggy address belongs to the object at ffff000801b9e000
[   51.629881]  which belongs to the cache test_cache of size 200
[   51.642297] The buggy address is located 0 bytes inside of
[   51.642297]  freed 200-byte region [ffff000801b9e000, ffff000801b9e0c8)
[   51.654359] 
[   51.655839] The buggy address belongs to the physical page:
[   51.661395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b9e
[   51.669378] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.677018] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.683961] page_type: f5(slab)
[   51.687097] raw: 0bfffe0000000040 ffff000801b9c000 dead000000000122 0000000000000000
[   51.694818] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.702546] head: 0bfffe0000000040 ffff000801b9c000 dead000000000122 0000000000000000
[   51.710354] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.718167] head: 0bfffe0000000001 fffffdffe006e781 00000000ffffffff 00000000ffffffff
[   51.725979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.733786] page dumped because: kasan: bad access detected
[   51.739342] 
[   51.740816] Memory state around the buggy address:
[   51.745596]  ffff000801b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.752800]  ffff000801b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.760005] >ffff000801b9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.767205]                    ^
[   51.770420]  ffff000801b9e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   51.777625]  ffff000801b9e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.784827] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   51.037951] ==================================================================
[   51.038150] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   51.044256] Free of addr ffff000801afc001 by task kunit_try_catch/292
[   51.050680] 
[   51.052165] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   51.052226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.052242] Hardware name: WinLink E850-96 board (DT)
[   51.052265] Call trace:
[   51.052277]  show_stack+0x20/0x38 (C)
[   51.052311]  dump_stack_lvl+0x8c/0xd0
[   51.052347]  print_report+0x118/0x5d0
[   51.052376]  kasan_report_invalid_free+0xc0/0xe8
[   51.052406]  check_slab_allocation+0xfc/0x108
[   51.052443]  __kasan_slab_pre_free+0x2c/0x48
[   51.052478]  kmem_cache_free+0xf0/0x468
[   51.052513]  kmem_cache_invalid_free+0x184/0x3c8
[   51.052545]  kunit_try_run_case+0x170/0x3f0
[   51.052578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.052613]  kthread+0x328/0x630
[   51.052638]  ret_from_fork+0x10/0x20
[   51.052671] 
[   51.125331] Allocated by task 292:
[   51.128717]  kasan_save_stack+0x3c/0x68
[   51.132535]  kasan_save_track+0x20/0x40
[   51.136353]  kasan_save_alloc_info+0x40/0x58
[   51.140607]  __kasan_slab_alloc+0xa8/0xb0
[   51.144600]  kmem_cache_alloc_noprof+0x10c/0x398
[   51.149200]  kmem_cache_invalid_free+0x12c/0x3c8
[   51.153801]  kunit_try_run_case+0x170/0x3f0
[   51.157967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.163436]  kthread+0x328/0x630
[   51.166648]  ret_from_fork+0x10/0x20
[   51.170206] 
[   51.171684] The buggy address belongs to the object at ffff000801afc000
[   51.171684]  which belongs to the cache test_cache of size 200
[   51.184099] The buggy address is located 1 bytes inside of
[   51.184099]  200-byte region [ffff000801afc000, ffff000801afc0c8)
[   51.195640] 
[   51.197120] The buggy address belongs to the physical page:
[   51.202675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881afc
[   51.210659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.218299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.225242] page_type: f5(slab)
[   51.228377] raw: 0bfffe0000000040 ffff000801afa000 dead000000000122 0000000000000000
[   51.236098] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.243826] head: 0bfffe0000000040 ffff000801afa000 dead000000000122 0000000000000000
[   51.251636] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   51.259449] head: 0bfffe0000000001 fffffdffe006bf01 00000000ffffffff 00000000ffffffff
[   51.267260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.275068] page dumped because: kasan: bad access detected
[   51.280621] 
[   51.282097] Memory state around the buggy address:
[   51.286879]  ffff000801afbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.294080]  ffff000801afbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.301288] >ffff000801afc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.308486]                    ^
[   51.311701]  ffff000801afc080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   51.318906]  ffff000801afc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.326108] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   50.696627] ==================================================================
[   50.696807] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   50.696933] Free of addr ffff000802458000 by task kunit_try_catch/290
[   50.698339] 
[   50.699827] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   50.699886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.699905] Hardware name: WinLink E850-96 board (DT)
[   50.699927] Call trace:
[   50.699941]  show_stack+0x20/0x38 (C)
[   50.699977]  dump_stack_lvl+0x8c/0xd0
[   50.700011]  print_report+0x118/0x5d0
[   50.700041]  kasan_report_invalid_free+0xc0/0xe8
[   50.700072]  check_slab_allocation+0xd4/0x108
[   50.700110]  __kasan_slab_pre_free+0x2c/0x48
[   50.700143]  kmem_cache_free+0xf0/0x468
[   50.700177]  kmem_cache_double_free+0x190/0x3c8
[   50.700208]  kunit_try_run_case+0x170/0x3f0
[   50.700240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.700275]  kthread+0x328/0x630
[   50.700303]  ret_from_fork+0x10/0x20
[   50.700342] 
[   50.772906] Allocated by task 290:
[   50.776292]  kasan_save_stack+0x3c/0x68
[   50.780108]  kasan_save_track+0x20/0x40
[   50.783928]  kasan_save_alloc_info+0x40/0x58
[   50.788181]  __kasan_slab_alloc+0xa8/0xb0
[   50.792174]  kmem_cache_alloc_noprof+0x10c/0x398
[   50.796775]  kmem_cache_double_free+0x12c/0x3c8
[   50.801289]  kunit_try_run_case+0x170/0x3f0
[   50.805455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.810924]  kthread+0x328/0x630
[   50.814135]  ret_from_fork+0x10/0x20
[   50.817694] 
[   50.819170] Freed by task 290:
[   50.822208]  kasan_save_stack+0x3c/0x68
[   50.826027]  kasan_save_track+0x20/0x40
[   50.829847]  kasan_save_free_info+0x4c/0x78
[   50.834014]  __kasan_slab_free+0x6c/0x98
[   50.837920]  kmem_cache_free+0x260/0x468
[   50.841826]  kmem_cache_double_free+0x140/0x3c8
[   50.846340]  kunit_try_run_case+0x170/0x3f0
[   50.850507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.855975]  kthread+0x328/0x630
[   50.859187]  ret_from_fork+0x10/0x20
[   50.862746] 
[   50.864223] The buggy address belongs to the object at ffff000802458000
[   50.864223]  which belongs to the cache test_cache of size 200
[   50.876638] The buggy address is located 0 bytes inside of
[   50.876638]  200-byte region [ffff000802458000, ffff0008024580c8)
[   50.888180] 
[   50.889659] The buggy address belongs to the physical page:
[   50.895215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882458
[   50.903199] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.910839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.917781] page_type: f5(slab)
[   50.920918] raw: 0bfffe0000000040 ffff000802435e00 dead000000000122 0000000000000000
[   50.928637] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.936365] head: 0bfffe0000000040 ffff000802435e00 dead000000000122 0000000000000000
[   50.944175] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.951988] head: 0bfffe0000000001 fffffdffe0091601 00000000ffffffff 00000000ffffffff
[   50.959800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.967607] page dumped because: kasan: bad access detected
[   50.973161] 
[   50.974638] Memory state around the buggy address:
[   50.979416]  ffff000802457f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.986619]  ffff000802457f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.993826] >ffff000802458000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.001025]                    ^
[   51.004241]  ffff000802458080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   51.011446]  ffff000802458100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.018648] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   45.611029] ==================================================================
[   45.620863] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   45.628410] Read of size 18446744073709551614 at addr ffff00080696ef84 by task kunit_try_catch/261
[   45.637351] 
[   45.638837] CPU: 2 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   45.638891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.638909] Hardware name: WinLink E850-96 board (DT)
[   45.638930] Call trace:
[   45.638942]  show_stack+0x20/0x38 (C)
[   45.638977]  dump_stack_lvl+0x8c/0xd0
[   45.639016]  print_report+0x118/0x5d0
[   45.639048]  kasan_report+0xdc/0x128
[   45.639075]  kasan_check_range+0x100/0x1a8
[   45.639105]  __asan_memmove+0x3c/0x98
[   45.639135]  kmalloc_memmove_negative_size+0x154/0x2e0
[   45.639169]  kunit_try_run_case+0x170/0x3f0
[   45.639200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.639234]  kthread+0x328/0x630
[   45.639261]  ret_from_fork+0x10/0x20
[   45.639296] 
[   45.706795] Allocated by task 261:
[   45.710183]  kasan_save_stack+0x3c/0x68
[   45.713998]  kasan_save_track+0x20/0x40
[   45.717818]  kasan_save_alloc_info+0x40/0x58
[   45.722071]  __kasan_kmalloc+0xd4/0xd8
[   45.725804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.730317]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   45.735352]  kunit_try_run_case+0x170/0x3f0
[   45.739521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.744988]  kthread+0x328/0x630
[   45.748199]  ret_from_fork+0x10/0x20
[   45.751758] 
[   45.753237] The buggy address belongs to the object at ffff00080696ef80
[   45.753237]  which belongs to the cache kmalloc-64 of size 64
[   45.765563] The buggy address is located 4 bytes inside of
[   45.765563]  64-byte region [ffff00080696ef80, ffff00080696efc0)
[   45.777018] 
[   45.778497] The buggy address belongs to the physical page:
[   45.784054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88696e
[   45.792038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.798547] page_type: f5(slab)
[   45.801683] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.809403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.817123] page dumped because: kasan: bad access detected
[   45.822677] 
[   45.824153] Memory state around the buggy address:
[   45.828934]  ffff00080696ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.836137]  ffff00080696ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.843341] >ffff00080696ef80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   45.850541]                    ^
[   45.853759]  ffff00080696f000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   45.860962]  ffff00080696f080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   45.868164] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   50.350922] ==================================================================
[   50.360462] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   50.367141] Read of size 1 at addr ffff0008024560c8 by task kunit_try_catch/288
[   50.374432] 
[   50.375918] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   50.375972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.375988] Hardware name: WinLink E850-96 board (DT)
[   50.376009] Call trace:
[   50.376022]  show_stack+0x20/0x38 (C)
[   50.376057]  dump_stack_lvl+0x8c/0xd0
[   50.376092]  print_report+0x118/0x5d0
[   50.376120]  kasan_report+0xdc/0x128
[   50.376149]  __asan_report_load1_noabort+0x20/0x30
[   50.376180]  kmem_cache_oob+0x344/0x430
[   50.376209]  kunit_try_run_case+0x170/0x3f0
[   50.376239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.376274]  kthread+0x328/0x630
[   50.376302]  ret_from_fork+0x10/0x20
[   50.376335] 
[   50.439625] Allocated by task 288:
[   50.443011]  kasan_save_stack+0x3c/0x68
[   50.446827]  kasan_save_track+0x20/0x40
[   50.450646]  kasan_save_alloc_info+0x40/0x58
[   50.454899]  __kasan_slab_alloc+0xa8/0xb0
[   50.458892]  kmem_cache_alloc_noprof+0x10c/0x398
[   50.463493]  kmem_cache_oob+0x12c/0x430
[   50.467312]  kunit_try_run_case+0x170/0x3f0
[   50.471479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.476949]  kthread+0x328/0x630
[   50.480159]  ret_from_fork+0x10/0x20
[   50.483718] 
[   50.485196] The buggy address belongs to the object at ffff000802456000
[   50.485196]  which belongs to the cache test_cache of size 200
[   50.497609] The buggy address is located 0 bytes to the right of
[   50.497609]  allocated 200-byte region [ffff000802456000, ffff0008024560c8)
[   50.510541] 
[   50.512021] The buggy address belongs to the physical page:
[   50.517577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882456
[   50.525560] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.533201] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.540143] page_type: f5(slab)
[   50.543279] raw: 0bfffe0000000040 ffff000802435cc0 dead000000000122 0000000000000000
[   50.550998] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.558727] head: 0bfffe0000000040 ffff000802435cc0 dead000000000122 0000000000000000
[   50.566536] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   50.574349] head: 0bfffe0000000001 fffffdffe0091581 00000000ffffffff 00000000ffffffff
[   50.582161] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.589968] page dumped because: kasan: bad access detected
[   50.595522] 
[   50.596997] Memory state around the buggy address:
[   50.601778]  ffff000802455f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.608982]  ffff000802456000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.616185] >ffff000802456080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   50.623386]                                               ^
[   50.628947]  ffff000802456100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.636151]  ffff000802456180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.643351] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   50.005093] ==================================================================
[   50.012380] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   50.019058] Read of size 8 at addr ffff000808530100 by task kunit_try_catch/281
[   50.026347] 
[   50.027834] CPU: 3 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   50.027898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.027915] Hardware name: WinLink E850-96 board (DT)
[   50.027937] Call trace:
[   50.027954]  show_stack+0x20/0x38 (C)
[   50.027989]  dump_stack_lvl+0x8c/0xd0
[   50.028025]  print_report+0x118/0x5d0
[   50.028052]  kasan_report+0xdc/0x128
[   50.028078]  __asan_report_load8_noabort+0x20/0x30
[   50.028112]  workqueue_uaf+0x480/0x4a8
[   50.028142]  kunit_try_run_case+0x170/0x3f0
[   50.028174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.028212]  kthread+0x328/0x630
[   50.028242]  ret_from_fork+0x10/0x20
[   50.028274] 
[   50.091453] Allocated by task 281:
[   50.094839]  kasan_save_stack+0x3c/0x68
[   50.098655]  kasan_save_track+0x20/0x40
[   50.102476]  kasan_save_alloc_info+0x40/0x58
[   50.106728]  __kasan_kmalloc+0xd4/0xd8
[   50.110460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.114974]  workqueue_uaf+0x13c/0x4a8
[   50.118706]  kunit_try_run_case+0x170/0x3f0
[   50.122873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.128342]  kthread+0x328/0x630
[   50.131553]  ret_from_fork+0x10/0x20
[   50.135112] 
[   50.136589] Freed by task 9:
[   50.139456]  kasan_save_stack+0x3c/0x68
[   50.143272]  kasan_save_track+0x20/0x40
[   50.147092]  kasan_save_free_info+0x4c/0x78
[   50.151258]  __kasan_slab_free+0x6c/0x98
[   50.155165]  kfree+0x214/0x3c8
[   50.158203]  workqueue_uaf_work+0x18/0x30
[   50.162195]  process_one_work+0x530/0xf98
[   50.166189]  worker_thread+0x618/0xf38
[   50.169921]  kthread+0x328/0x630
[   50.173133]  ret_from_fork+0x10/0x20
[   50.176691] 
[   50.178169] Last potentially related work creation:
[   50.183031]  kasan_save_stack+0x3c/0x68
[   50.186848]  kasan_record_aux_stack+0xb4/0xc8
[   50.191188]  __queue_work+0x65c/0xfe0
[   50.194833]  queue_work_on+0xbc/0xf8
[   50.198393]  workqueue_uaf+0x210/0x4a8
[   50.202126]  kunit_try_run_case+0x170/0x3f0
[   50.206292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.211761]  kthread+0x328/0x630
[   50.214972]  ret_from_fork+0x10/0x20
[   50.218531] 
[   50.220007] The buggy address belongs to the object at ffff000808530100
[   50.220007]  which belongs to the cache kmalloc-32 of size 32
[   50.232337] The buggy address is located 0 bytes inside of
[   50.232337]  freed 32-byte region [ffff000808530100, ffff000808530120)
[   50.244312] 
[   50.245792] The buggy address belongs to the physical page:
[   50.251348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530
[   50.259332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.265841] page_type: f5(slab)
[   50.268978] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   50.276696] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   50.284419] page dumped because: kasan: bad access detected
[   50.289971] 
[   50.291446] Memory state around the buggy address:
[   50.296227]  ffff000808530000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   50.303429]  ffff000808530080: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   50.310634] >ffff000808530100: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   50.317835]                    ^
[   50.321051]  ffff000808530180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.328257]  ffff000808530200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.335457] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   49.632706] ==================================================================
[   49.632875] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   49.632992] Read of size 4 at addr ffff000808530040 by task swapper/0/0
[   49.634946] 
[   49.636433] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   49.636486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.636503] Hardware name: WinLink E850-96 board (DT)
[   49.636524] Call trace:
[   49.636539]  show_stack+0x20/0x38 (C)
[   49.636575]  dump_stack_lvl+0x8c/0xd0
[   49.636609]  print_report+0x118/0x5d0
[   49.636639]  kasan_report+0xdc/0x128
[   49.636666]  __asan_report_load4_noabort+0x20/0x30
[   49.636698]  rcu_uaf_reclaim+0x64/0x70
[   49.636726]  rcu_core+0x9f4/0x1e20
[   49.636758]  rcu_core_si+0x18/0x30
[   49.636788]  handle_softirqs+0x374/0xb28
[   49.636822]  __do_softirq+0x1c/0x28
[   49.636850]  ____do_softirq+0x18/0x30
[   49.636882]  call_on_irq_stack+0x24/0x30
[   49.636909]  do_softirq_own_stack+0x24/0x38
[   49.636939]  __irq_exit_rcu+0x1fc/0x318
[   49.636968]  irq_exit_rcu+0x1c/0x80
[   49.636997]  el1_interrupt+0x38/0x58
[   49.637033]  el1h_64_irq_handler+0x18/0x28
[   49.637067]  el1h_64_irq+0x6c/0x70
[   49.637093]  arch_local_irq_enable+0x4/0x8 (P)
[   49.637128]  do_idle+0x384/0x4e8
[   49.637158]  cpu_startup_entry+0x64/0x80
[   49.637189]  rest_init+0x160/0x188
[   49.637218]  start_kernel+0x30c/0x3d0
[   49.637251]  __primary_switched+0x8c/0xa0
[   49.637283] 
[   49.749703] Allocated by task 279:
[   49.753091]  kasan_save_stack+0x3c/0x68
[   49.756906]  kasan_save_track+0x20/0x40
[   49.760726]  kasan_save_alloc_info+0x40/0x58
[   49.764979]  __kasan_kmalloc+0xd4/0xd8
[   49.768712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.773226]  rcu_uaf+0xb0/0x2d8
[   49.776350]  kunit_try_run_case+0x170/0x3f0
[   49.780517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.785986]  kthread+0x328/0x630
[   49.789197]  ret_from_fork+0x10/0x20
[   49.792757] 
[   49.794233] Freed by task 0:
[   49.797097]  kasan_save_stack+0x3c/0x68
[   49.800916]  kasan_save_track+0x20/0x40
[   49.804736]  kasan_save_free_info+0x4c/0x78
[   49.808902]  __kasan_slab_free+0x6c/0x98
[   49.812808]  kfree+0x214/0x3c8
[   49.815847]  rcu_uaf_reclaim+0x28/0x70
[   49.819579]  rcu_core+0x9f4/0x1e20
[   49.822965]  rcu_core_si+0x18/0x30
[   49.826351]  handle_softirqs+0x374/0xb28
[   49.830256]  __do_softirq+0x1c/0x28
[   49.833728] 
[   49.835204] Last potentially related work creation:
[   49.840064]  kasan_save_stack+0x3c/0x68
[   49.843884]  kasan_record_aux_stack+0xb4/0xc8
[   49.848225]  __call_rcu_common.constprop.0+0x74/0x8c8
[   49.853259]  call_rcu+0x18/0x30
[   49.856384]  rcu_uaf+0x14c/0x2d8
[   49.859596]  kunit_try_run_case+0x170/0x3f0
[   49.863763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.869231]  kthread+0x328/0x630
[   49.872443]  ret_from_fork+0x10/0x20
[   49.876002] 
[   49.877479] The buggy address belongs to the object at ffff000808530040
[   49.877479]  which belongs to the cache kmalloc-32 of size 32
[   49.889806] The buggy address is located 0 bytes inside of
[   49.889806]  freed 32-byte region [ffff000808530040, ffff000808530060)
[   49.901783] 
[   49.903261] The buggy address belongs to the physical page:
[   49.908819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530
[   49.916803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.923312] page_type: f5(slab)
[   49.926450] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   49.934167] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   49.941889] page dumped because: kasan: bad access detected
[   49.947441] 
[   49.948917] Memory state around the buggy address:
[   49.953700]  ffff00080852ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.960900]  ffff00080852ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.968105] >ffff000808530000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   49.975306]                                            ^
[   49.980605]  ffff000808530080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.987809]  ffff000808530100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.995012] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   48.595577] ==================================================================
[   48.605627] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   48.611962] Read of size 1 at addr ffff00080244dc00 by task kunit_try_catch/277
[   48.619250] 
[   48.620736] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   48.620790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.620806] Hardware name: WinLink E850-96 board (DT)
[   48.620826] Call trace:
[   48.620842]  show_stack+0x20/0x38 (C)
[   48.620875]  dump_stack_lvl+0x8c/0xd0
[   48.620911]  print_report+0x118/0x5d0
[   48.620941]  kasan_report+0xdc/0x128
[   48.620967]  __kasan_check_byte+0x54/0x70
[   48.620995]  ksize+0x30/0x88
[   48.621030]  ksize_uaf+0x168/0x5f8
[   48.621058]  kunit_try_run_case+0x170/0x3f0
[   48.621087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.621122]  kthread+0x328/0x630
[   48.621151]  ret_from_fork+0x10/0x20
[   48.621182] 
[   48.686091] Allocated by task 277:
[   48.689478]  kasan_save_stack+0x3c/0x68
[   48.693294]  kasan_save_track+0x20/0x40
[   48.697113]  kasan_save_alloc_info+0x40/0x58
[   48.701367]  __kasan_kmalloc+0xd4/0xd8
[   48.705099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.709613]  ksize_uaf+0xb8/0x5f8
[   48.712912]  kunit_try_run_case+0x170/0x3f0
[   48.717078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.722548]  kthread+0x328/0x630
[   48.725759]  ret_from_fork+0x10/0x20
[   48.729318] 
[   48.730793] Freed by task 277:
[   48.733833]  kasan_save_stack+0x3c/0x68
[   48.737651]  kasan_save_track+0x20/0x40
[   48.741470]  kasan_save_free_info+0x4c/0x78
[   48.745637]  __kasan_slab_free+0x6c/0x98
[   48.749543]  kfree+0x214/0x3c8
[   48.752581]  ksize_uaf+0x11c/0x5f8
[   48.755967]  kunit_try_run_case+0x170/0x3f0
[   48.760133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.765602]  kthread+0x328/0x630
[   48.768814]  ret_from_fork+0x10/0x20
[   48.772373] 
[   48.773850] The buggy address belongs to the object at ffff00080244dc00
[   48.773850]  which belongs to the cache kmalloc-128 of size 128
[   48.786348] The buggy address is located 0 bytes inside of
[   48.786348]  freed 128-byte region [ffff00080244dc00, ffff00080244dc80)
[   48.798414] 
[   48.799894] The buggy address belongs to the physical page:
[   48.805449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   48.813433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.821073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.828016] page_type: f5(slab)
[   48.831153] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.838872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.846599] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.854410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.862222] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   48.870034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.877842] page dumped because: kasan: bad access detected
[   48.883395] 
[   48.884871] Memory state around the buggy address:
[   48.889654]  ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.896855]  ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.904058] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.911259]                    ^
[   48.914475]  ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.921679]  ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.928882] ==================================================================
[   49.271892] ==================================================================
[   49.278880] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   49.285215] Read of size 1 at addr ffff00080244dc78 by task kunit_try_catch/277
[   49.292504] 
[   49.293989] CPU: 6 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   49.294042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.294057] Hardware name: WinLink E850-96 board (DT)
[   49.294081] Call trace:
[   49.294095]  show_stack+0x20/0x38 (C)
[   49.294128]  dump_stack_lvl+0x8c/0xd0
[   49.294165]  print_report+0x118/0x5d0
[   49.294193]  kasan_report+0xdc/0x128
[   49.294220]  __asan_report_load1_noabort+0x20/0x30
[   49.294254]  ksize_uaf+0x544/0x5f8
[   49.294283]  kunit_try_run_case+0x170/0x3f0
[   49.294316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.294351]  kthread+0x328/0x630
[   49.294378]  ret_from_fork+0x10/0x20
[   49.294410] 
[   49.357261] Allocated by task 277:
[   49.360648]  kasan_save_stack+0x3c/0x68
[   49.364464]  kasan_save_track+0x20/0x40
[   49.368284]  kasan_save_alloc_info+0x40/0x58
[   49.372537]  __kasan_kmalloc+0xd4/0xd8
[   49.376269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.380784]  ksize_uaf+0xb8/0x5f8
[   49.384082]  kunit_try_run_case+0x170/0x3f0
[   49.388249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.393718]  kthread+0x328/0x630
[   49.396930]  ret_from_fork+0x10/0x20
[   49.400488] 
[   49.401964] Freed by task 277:
[   49.405002]  kasan_save_stack+0x3c/0x68
[   49.408822]  kasan_save_track+0x20/0x40
[   49.412641]  kasan_save_free_info+0x4c/0x78
[   49.416808]  __kasan_slab_free+0x6c/0x98
[   49.420714]  kfree+0x214/0x3c8
[   49.423752]  ksize_uaf+0x11c/0x5f8
[   49.427137]  kunit_try_run_case+0x170/0x3f0
[   49.431304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.436772]  kthread+0x328/0x630
[   49.439984]  ret_from_fork+0x10/0x20
[   49.443543] 
[   49.445019] The buggy address belongs to the object at ffff00080244dc00
[   49.445019]  which belongs to the cache kmalloc-128 of size 128
[   49.457520] The buggy address is located 120 bytes inside of
[   49.457520]  freed 128-byte region [ffff00080244dc00, ffff00080244dc80)
[   49.469758] 
[   49.471236] The buggy address belongs to the physical page:
[   49.476795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   49.484778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.492416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.499359] page_type: f5(slab)
[   49.502494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.510215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.517942] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.525753] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.533566] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   49.541378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.549184] page dumped because: kasan: bad access detected
[   49.554739] 
[   49.556215] Memory state around the buggy address:
[   49.560994]  ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.568198]  ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.575404] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.582604]                                                                 ^
[   49.589725]  ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.596930]  ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.604131] ==================================================================
[   48.936266] ==================================================================
[   48.943294] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   48.949629] Read of size 1 at addr ffff00080244dc00 by task kunit_try_catch/277
[   48.956918] 
[   48.958403] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   48.958456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.958473] Hardware name: WinLink E850-96 board (DT)
[   48.958493] Call trace:
[   48.958507]  show_stack+0x20/0x38 (C)
[   48.958538]  dump_stack_lvl+0x8c/0xd0
[   48.958572]  print_report+0x118/0x5d0
[   48.958599]  kasan_report+0xdc/0x128
[   48.958626]  __asan_report_load1_noabort+0x20/0x30
[   48.958657]  ksize_uaf+0x598/0x5f8
[   48.958687]  kunit_try_run_case+0x170/0x3f0
[   48.958717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.958753]  kthread+0x328/0x630
[   48.958779]  ret_from_fork+0x10/0x20
[   48.958807] 
[   49.021674] Allocated by task 277:
[   49.025061]  kasan_save_stack+0x3c/0x68
[   49.028879]  kasan_save_track+0x20/0x40
[   49.032698]  kasan_save_alloc_info+0x40/0x58
[   49.036952]  __kasan_kmalloc+0xd4/0xd8
[   49.040684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.045199]  ksize_uaf+0xb8/0x5f8
[   49.048497]  kunit_try_run_case+0x170/0x3f0
[   49.052663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.058134]  kthread+0x328/0x630
[   49.061344]  ret_from_fork+0x10/0x20
[   49.064903] 
[   49.066379] Freed by task 277:
[   49.069417]  kasan_save_stack+0x3c/0x68
[   49.073236]  kasan_save_track+0x20/0x40
[   49.077055]  kasan_save_free_info+0x4c/0x78
[   49.081222]  __kasan_slab_free+0x6c/0x98
[   49.085128]  kfree+0x214/0x3c8
[   49.088167]  ksize_uaf+0x11c/0x5f8
[   49.091552]  kunit_try_run_case+0x170/0x3f0
[   49.095718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.101187]  kthread+0x328/0x630
[   49.104399]  ret_from_fork+0x10/0x20
[   49.107958] 
[   49.109433] The buggy address belongs to the object at ffff00080244dc00
[   49.109433]  which belongs to the cache kmalloc-128 of size 128
[   49.121934] The buggy address is located 0 bytes inside of
[   49.121934]  freed 128-byte region [ffff00080244dc00, ffff00080244dc80)
[   49.133999] 
[   49.135477] The buggy address belongs to the physical page:
[   49.141035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   49.149018] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.156658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.163600] page_type: f5(slab)
[   49.166735] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.174457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.182183] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.189994] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.197808] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   49.205620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.213425] page dumped because: kasan: bad access detected
[   49.218981] 
[   49.220456] Memory state around the buggy address:
[   49.225237]  ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.232439]  ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.239643] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.246845]                    ^
[   49.250060]  ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.257265]  ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.264468] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   48.293796] ==================================================================
[   48.300682] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   48.308057] Read of size 1 at addr ffff00080244db7f by task kunit_try_catch/275
[   48.315348] 
[   48.316834] CPU: 3 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   48.316890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.316908] Hardware name: WinLink E850-96 board (DT)
[   48.316927] Call trace:
[   48.316939]  show_stack+0x20/0x38 (C)
[   48.316974]  dump_stack_lvl+0x8c/0xd0
[   48.317008]  print_report+0x118/0x5d0
[   48.317035]  kasan_report+0xdc/0x128
[   48.317060]  __asan_report_load1_noabort+0x20/0x30
[   48.317090]  ksize_unpoisons_memory+0x690/0x740
[   48.317123]  kunit_try_run_case+0x170/0x3f0
[   48.317152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.317185]  kthread+0x328/0x630
[   48.317211]  ret_from_fork+0x10/0x20
[   48.317242] 
[   48.381234] Allocated by task 275:
[   48.384620]  kasan_save_stack+0x3c/0x68
[   48.388437]  kasan_save_track+0x20/0x40
[   48.392257]  kasan_save_alloc_info+0x40/0x58
[   48.396510]  __kasan_kmalloc+0xd4/0xd8
[   48.400244]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.404757]  ksize_unpoisons_memory+0xc0/0x740
[   48.409183]  kunit_try_run_case+0x170/0x3f0
[   48.413350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.418819]  kthread+0x328/0x630
[   48.422031]  ret_from_fork+0x10/0x20
[   48.425591] 
[   48.427066] The buggy address belongs to the object at ffff00080244db00
[   48.427066]  which belongs to the cache kmalloc-128 of size 128
[   48.439568] The buggy address is located 12 bytes to the right of
[   48.439568]  allocated 115-byte region [ffff00080244db00, ffff00080244db73)
[   48.452586] 
[   48.454064] The buggy address belongs to the physical page:
[   48.459622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   48.467605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.475245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.482186] page_type: f5(slab)
[   48.485324] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.493043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.500770] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.508581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.516394] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   48.524206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.532013] page dumped because: kasan: bad access detected
[   48.537567] 
[   48.539043] Memory state around the buggy address:
[   48.543824]  ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.551026]  ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.558230] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.565431]                                                                 ^
[   48.572553]  ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.579758]  ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.586959] ==================================================================
[   47.993134] ==================================================================
[   48.000083] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   48.007457] Read of size 1 at addr ffff00080244db78 by task kunit_try_catch/275
[   48.014747] 
[   48.016232] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   48.016285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.016304] Hardware name: WinLink E850-96 board (DT)
[   48.016325] Call trace:
[   48.016337]  show_stack+0x20/0x38 (C)
[   48.016368]  dump_stack_lvl+0x8c/0xd0
[   48.016404]  print_report+0x118/0x5d0
[   48.016431]  kasan_report+0xdc/0x128
[   48.016458]  __asan_report_load1_noabort+0x20/0x30
[   48.016489]  ksize_unpoisons_memory+0x618/0x740
[   48.016521]  kunit_try_run_case+0x170/0x3f0
[   48.016553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.016585]  kthread+0x328/0x630
[   48.016615]  ret_from_fork+0x10/0x20
[   48.016649] 
[   48.080631] Allocated by task 275:
[   48.084018]  kasan_save_stack+0x3c/0x68
[   48.087835]  kasan_save_track+0x20/0x40
[   48.091654]  kasan_save_alloc_info+0x40/0x58
[   48.095907]  __kasan_kmalloc+0xd4/0xd8
[   48.099640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.104154]  ksize_unpoisons_memory+0xc0/0x740
[   48.108581]  kunit_try_run_case+0x170/0x3f0
[   48.112747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.118216]  kthread+0x328/0x630
[   48.121428]  ret_from_fork+0x10/0x20
[   48.124986] 
[   48.126465] The buggy address belongs to the object at ffff00080244db00
[   48.126465]  which belongs to the cache kmalloc-128 of size 128
[   48.138965] The buggy address is located 5 bytes to the right of
[   48.138965]  allocated 115-byte region [ffff00080244db00, ffff00080244db73)
[   48.151896] 
[   48.153374] The buggy address belongs to the physical page:
[   48.158932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   48.166915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.174555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.181496] page_type: f5(slab)
[   48.184633] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.192353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.200080] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.207891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.215704] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   48.223516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.231323] page dumped because: kasan: bad access detected
[   48.236877] 
[   48.238354] Memory state around the buggy address:
[   48.243132]  ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.250336]  ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.257540] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.264741]                                                                 ^
[   48.271863]  ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.279068]  ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.286270] ==================================================================
[   47.690046] ==================================================================
[   47.699739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   47.707112] Read of size 1 at addr ffff00080244db73 by task kunit_try_catch/275
[   47.714404] 
[   47.715890] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   47.715947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.715966] Hardware name: WinLink E850-96 board (DT)
[   47.715988] Call trace:
[   47.716001]  show_stack+0x20/0x38 (C)
[   47.716036]  dump_stack_lvl+0x8c/0xd0
[   47.716074]  print_report+0x118/0x5d0
[   47.716100]  kasan_report+0xdc/0x128
[   47.716126]  __asan_report_load1_noabort+0x20/0x30
[   47.716160]  ksize_unpoisons_memory+0x628/0x740
[   47.716194]  kunit_try_run_case+0x170/0x3f0
[   47.716224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.716261]  kthread+0x328/0x630
[   47.716290]  ret_from_fork+0x10/0x20
[   47.716325] 
[   47.780288] Allocated by task 275:
[   47.783676]  kasan_save_stack+0x3c/0x68
[   47.787492]  kasan_save_track+0x20/0x40
[   47.791311]  kasan_save_alloc_info+0x40/0x58
[   47.795564]  __kasan_kmalloc+0xd4/0xd8
[   47.799298]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.803811]  ksize_unpoisons_memory+0xc0/0x740
[   47.808238]  kunit_try_run_case+0x170/0x3f0
[   47.812404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.817873]  kthread+0x328/0x630
[   47.821086]  ret_from_fork+0x10/0x20
[   47.824644] 
[   47.826121] The buggy address belongs to the object at ffff00080244db00
[   47.826121]  which belongs to the cache kmalloc-128 of size 128
[   47.838623] The buggy address is located 0 bytes to the right of
[   47.838623]  allocated 115-byte region [ffff00080244db00, ffff00080244db73)
[   47.851553] 
[   47.853033] The buggy address belongs to the physical page:
[   47.858590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   47.866572] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.874212] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.881155] page_type: f5(slab)
[   47.884291] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.892011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.899739] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   47.907548] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.915361] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   47.923173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   47.930981] page dumped because: kasan: bad access detected
[   47.936534] 
[   47.938010] Memory state around the buggy address:
[   47.942792]  ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.949995]  ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.957199] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   47.964399]                                                              ^
[   47.971260]  ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.978466]  ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.985667] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   47.373723] ==================================================================
[   47.380817] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   47.386804] Free of addr ffff000806c788c0 by task kunit_try_catch/273
[   47.393227] 
[   47.394710] CPU: 5 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   47.394762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.394779] Hardware name: WinLink E850-96 board (DT)
[   47.394796] Call trace:
[   47.394809]  show_stack+0x20/0x38 (C)
[   47.394840]  dump_stack_lvl+0x8c/0xd0
[   47.394875]  print_report+0x118/0x5d0
[   47.394902]  kasan_report_invalid_free+0xc0/0xe8
[   47.394932]  check_slab_allocation+0xd4/0x108
[   47.394968]  __kasan_slab_pre_free+0x2c/0x48
[   47.395001]  kfree+0xe8/0x3c8
[   47.395030]  kfree_sensitive+0x3c/0xb0
[   47.395060]  kmalloc_double_kzfree+0x168/0x308
[   47.395095]  kunit_try_run_case+0x170/0x3f0
[   47.395123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.395158]  kthread+0x328/0x630
[   47.395186]  ret_from_fork+0x10/0x20
[   47.395215] 
[   47.470569] Allocated by task 273:
[   47.473955]  kasan_save_stack+0x3c/0x68
[   47.477774]  kasan_save_track+0x20/0x40
[   47.481594]  kasan_save_alloc_info+0x40/0x58
[   47.485847]  __kasan_kmalloc+0xd4/0xd8
[   47.489579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.494093]  kmalloc_double_kzfree+0xb8/0x308
[   47.498433]  kunit_try_run_case+0x170/0x3f0
[   47.502600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.508069]  kthread+0x328/0x630
[   47.511280]  ret_from_fork+0x10/0x20
[   47.514840] 
[   47.516315] Freed by task 273:
[   47.519353]  kasan_save_stack+0x3c/0x68
[   47.523173]  kasan_save_track+0x20/0x40
[   47.526992]  kasan_save_free_info+0x4c/0x78
[   47.531159]  __kasan_slab_free+0x6c/0x98
[   47.535065]  kfree+0x214/0x3c8
[   47.538103]  kfree_sensitive+0x80/0xb0
[   47.541835]  kmalloc_double_kzfree+0x11c/0x308
[   47.546263]  kunit_try_run_case+0x170/0x3f0
[   47.550429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.555898]  kthread+0x328/0x630
[   47.559110]  ret_from_fork+0x10/0x20
[   47.562669] 
[   47.564144] The buggy address belongs to the object at ffff000806c788c0
[   47.564144]  which belongs to the cache kmalloc-16 of size 16
[   47.576471] The buggy address is located 0 bytes inside of
[   47.576471]  16-byte region [ffff000806c788c0, ffff000806c788d0)
[   47.587928] 
[   47.589406] The buggy address belongs to the physical page:
[   47.594963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886c78
[   47.602946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.609456] page_type: f5(slab)
[   47.612591] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   47.620313] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.628032] page dumped because: kasan: bad access detected
[   47.633588] 
[   47.635063] Memory state around the buggy address:
[   47.639842]  ffff000806c78780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.647046]  ffff000806c78800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.654251] >ffff000806c78880: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   47.661452]                                            ^
[   47.666751]  ffff000806c78900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.673955]  ffff000806c78980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.681156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   47.058133] ==================================================================
[   47.071883] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   47.079259] Read of size 1 at addr ffff000806c788c0 by task kunit_try_catch/273
[   47.086547] 
[   47.088033] CPU: 5 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   47.088090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.088108] Hardware name: WinLink E850-96 board (DT)
[   47.088133] Call trace:
[   47.088149]  show_stack+0x20/0x38 (C)
[   47.088183]  dump_stack_lvl+0x8c/0xd0
[   47.088217]  print_report+0x118/0x5d0
[   47.088246]  kasan_report+0xdc/0x128
[   47.088273]  __kasan_check_byte+0x54/0x70
[   47.088302]  kfree_sensitive+0x30/0xb0
[   47.088336]  kmalloc_double_kzfree+0x168/0x308
[   47.088369]  kunit_try_run_case+0x170/0x3f0
[   47.088398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.088437]  kthread+0x328/0x630
[   47.088464]  ret_from_fork+0x10/0x20
[   47.088498] 
[   47.155298] Allocated by task 273:
[   47.158685]  kasan_save_stack+0x3c/0x68
[   47.162501]  kasan_save_track+0x20/0x40
[   47.166322]  kasan_save_alloc_info+0x40/0x58
[   47.170574]  __kasan_kmalloc+0xd4/0xd8
[   47.174306]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.178820]  kmalloc_double_kzfree+0xb8/0x308
[   47.183162]  kunit_try_run_case+0x170/0x3f0
[   47.187328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.192796]  kthread+0x328/0x630
[   47.196008]  ret_from_fork+0x10/0x20
[   47.199566] 
[   47.201043] Freed by task 273:
[   47.204080]  kasan_save_stack+0x3c/0x68
[   47.207900]  kasan_save_track+0x20/0x40
[   47.211719]  kasan_save_free_info+0x4c/0x78
[   47.215886]  __kasan_slab_free+0x6c/0x98
[   47.219793]  kfree+0x214/0x3c8
[   47.222830]  kfree_sensitive+0x80/0xb0
[   47.226563]  kmalloc_double_kzfree+0x11c/0x308
[   47.230990]  kunit_try_run_case+0x170/0x3f0
[   47.235156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.240625]  kthread+0x328/0x630
[   47.243836]  ret_from_fork+0x10/0x20
[   47.247395] 
[   47.248873] The buggy address belongs to the object at ffff000806c788c0
[   47.248873]  which belongs to the cache kmalloc-16 of size 16
[   47.261201] The buggy address is located 0 bytes inside of
[   47.261201]  freed 16-byte region [ffff000806c788c0, ffff000806c788d0)
[   47.273176] 
[   47.274654] The buggy address belongs to the physical page:
[   47.280213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886c78
[   47.288196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.294707] page_type: f5(slab)
[   47.297843] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   47.305561] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.313283] page dumped because: kasan: bad access detected
[   47.318835] 
[   47.320311] Memory state around the buggy address:
[   47.325091]  ffff000806c78780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.332294]  ffff000806c78800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.339498] >ffff000806c78880: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   47.346699]                                            ^
[   47.351998]  ffff000806c78900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.359203]  ffff000806c78980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.366404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   38.605328] ==================================================================
[   38.614542] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   38.619924] Free of addr ffff0008062c4001 by task kunit_try_catch/231
[   38.626344] 
[   38.627831] CPU: 2 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   38.627889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.627904] Hardware name: WinLink E850-96 board (DT)
[   38.627928] Call trace:
[   38.627940]  show_stack+0x20/0x38 (C)
[   38.627973]  dump_stack_lvl+0x8c/0xd0
[   38.628007]  print_report+0x118/0x5d0
[   38.628037]  kasan_report_invalid_free+0xc0/0xe8
[   38.628067]  __kasan_kfree_large+0x5c/0xa8
[   38.628096]  free_large_kmalloc+0x68/0x150
[   38.628127]  kfree+0x270/0x3c8
[   38.628154]  kmalloc_large_invalid_free+0x108/0x270
[   38.628186]  kunit_try_run_case+0x170/0x3f0
[   38.628217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.628252]  kthread+0x328/0x630
[   38.628282]  ret_from_fork+0x10/0x20
[   38.628314] 
[   38.700044] The buggy address belongs to the physical page:
[   38.705601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   38.713585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.721225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.728167] page_type: f8(unknown)
[   38.731564] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.739283] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.747011] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.754821] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.762634] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff
[   38.770446] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.778253] page dumped because: kasan: bad access detected
[   38.783807] 
[   38.785282] Memory state around the buggy address:
[   38.790063]  ffff0008062c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.797266]  ffff0008062c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.804472] >ffff0008062c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.811671]                    ^
[   38.814887]  ffff0008062c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.822092]  ffff0008062c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.829293] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   46.753329] ==================================================================
[   46.762858] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   46.769453] Read of size 1 at addr ffff000807fd0228 by task kunit_try_catch/269
[   46.776744] 
[   46.778230] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   46.778283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.778300] Hardware name: WinLink E850-96 board (DT)
[   46.778323] Call trace:
[   46.778337]  show_stack+0x20/0x38 (C)
[   46.778371]  dump_stack_lvl+0x8c/0xd0
[   46.778404]  print_report+0x118/0x5d0
[   46.778435]  kasan_report+0xdc/0x128
[   46.778462]  __asan_report_load1_noabort+0x20/0x30
[   46.778495]  kmalloc_uaf2+0x3f4/0x468
[   46.778524]  kunit_try_run_case+0x170/0x3f0
[   46.778555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.778590]  kthread+0x328/0x630
[   46.778620]  ret_from_fork+0x10/0x20
[   46.778654] 
[   46.841762] Allocated by task 269:
[   46.845149]  kasan_save_stack+0x3c/0x68
[   46.848964]  kasan_save_track+0x20/0x40
[   46.852783]  kasan_save_alloc_info+0x40/0x58
[   46.857037]  __kasan_kmalloc+0xd4/0xd8
[   46.860769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.865283]  kmalloc_uaf2+0xc4/0x468
[   46.868843]  kunit_try_run_case+0x170/0x3f0
[   46.873009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.878477]  kthread+0x328/0x630
[   46.881689]  ret_from_fork+0x10/0x20
[   46.885248] 
[   46.886724] Freed by task 269:
[   46.889764]  kasan_save_stack+0x3c/0x68
[   46.893581]  kasan_save_track+0x20/0x40
[   46.897401]  kasan_save_free_info+0x4c/0x78
[   46.901567]  __kasan_slab_free+0x6c/0x98
[   46.905475]  kfree+0x214/0x3c8
[   46.908511]  kmalloc_uaf2+0x134/0x468
[   46.912158]  kunit_try_run_case+0x170/0x3f0
[   46.916324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.921793]  kthread+0x328/0x630
[   46.925005]  ret_from_fork+0x10/0x20
[   46.928563] 
[   46.930041] The buggy address belongs to the object at ffff000807fd0200
[   46.930041]  which belongs to the cache kmalloc-64 of size 64
[   46.942369] The buggy address is located 40 bytes inside of
[   46.942369]  freed 64-byte region [ffff000807fd0200, ffff000807fd0240)
[   46.954431] 
[   46.955911] The buggy address belongs to the physical page:
[   46.961466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887fd0
[   46.969450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.975961] page_type: f5(slab)
[   46.979097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.986816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.994537] page dumped because: kasan: bad access detected
[   47.000090] 
[   47.001566] Memory state around the buggy address:
[   47.006348]  ffff000807fd0100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.013550]  ffff000807fd0180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.020753] >ffff000807fd0200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.027954]                                   ^
[   47.032472]  ffff000807fd0280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   47.039677]  ffff000807fd0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.046879] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   46.447763] ==================================================================
[   46.456789] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   46.463903] Write of size 33 at addr ffff00080851b000 by task kunit_try_catch/267
[   46.471367] 
[   46.472852] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   46.472907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.472925] Hardware name: WinLink E850-96 board (DT)
[   46.472946] Call trace:
[   46.472959]  show_stack+0x20/0x38 (C)
[   46.472992]  dump_stack_lvl+0x8c/0xd0
[   46.473027]  print_report+0x118/0x5d0
[   46.473058]  kasan_report+0xdc/0x128
[   46.473085]  kasan_check_range+0x100/0x1a8
[   46.473114]  __asan_memset+0x34/0x78
[   46.473142]  kmalloc_uaf_memset+0x170/0x310
[   46.473172]  kunit_try_run_case+0x170/0x3f0
[   46.473203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.473237]  kthread+0x328/0x630
[   46.473270]  ret_from_fork+0x10/0x20
[   46.473302] 
[   46.539768] Allocated by task 267:
[   46.543156]  kasan_save_stack+0x3c/0x68
[   46.546972]  kasan_save_track+0x20/0x40
[   46.550791]  kasan_save_alloc_info+0x40/0x58
[   46.555045]  __kasan_kmalloc+0xd4/0xd8
[   46.558777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.563291]  kmalloc_uaf_memset+0xb8/0x310
[   46.567371]  kunit_try_run_case+0x170/0x3f0
[   46.571538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.577006]  kthread+0x328/0x630
[   46.580218]  ret_from_fork+0x10/0x20
[   46.583777] 
[   46.585252] Freed by task 267:
[   46.588292]  kasan_save_stack+0x3c/0x68
[   46.592110]  kasan_save_track+0x20/0x40
[   46.595930]  kasan_save_free_info+0x4c/0x78
[   46.600096]  __kasan_slab_free+0x6c/0x98
[   46.604003]  kfree+0x214/0x3c8
[   46.607040]  kmalloc_uaf_memset+0x11c/0x310
[   46.611207]  kunit_try_run_case+0x170/0x3f0
[   46.615374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.620844]  kthread+0x328/0x630
[   46.624054]  ret_from_fork+0x10/0x20
[   46.627613] 
[   46.629089] The buggy address belongs to the object at ffff00080851b000
[   46.629089]  which belongs to the cache kmalloc-64 of size 64
[   46.641418] The buggy address is located 0 bytes inside of
[   46.641418]  freed 64-byte region [ffff00080851b000, ffff00080851b040)
[   46.653394] 
[   46.654873] The buggy address belongs to the physical page:
[   46.660429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b
[   46.668415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.674923] page_type: f5(slab)
[   46.678060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.685779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.693501] page dumped because: kasan: bad access detected
[   46.699054] 
[   46.700528] Memory state around the buggy address:
[   46.705310]  ffff00080851af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.712513]  ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.719718] >ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.726917]                    ^
[   46.730133]  ffff00080851b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.737337]  ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.744540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   46.145603] ==================================================================
[   46.155489] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   46.161996] Read of size 1 at addr ffff000802754728 by task kunit_try_catch/265
[   46.169287] 
[   46.170774] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   46.170827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.170845] Hardware name: WinLink E850-96 board (DT)
[   46.170869] Call trace:
[   46.170884]  show_stack+0x20/0x38 (C)
[   46.170920]  dump_stack_lvl+0x8c/0xd0
[   46.170957]  print_report+0x118/0x5d0
[   46.170986]  kasan_report+0xdc/0x128
[   46.171014]  __asan_report_load1_noabort+0x20/0x30
[   46.171046]  kmalloc_uaf+0x300/0x338
[   46.171076]  kunit_try_run_case+0x170/0x3f0
[   46.171107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.171143]  kthread+0x328/0x630
[   46.171171]  ret_from_fork+0x10/0x20
[   46.171208] 
[   46.234218] Allocated by task 265:
[   46.237606]  kasan_save_stack+0x3c/0x68
[   46.241421]  kasan_save_track+0x20/0x40
[   46.245242]  kasan_save_alloc_info+0x40/0x58
[   46.249494]  __kasan_kmalloc+0xd4/0xd8
[   46.253227]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.257740]  kmalloc_uaf+0xb8/0x338
[   46.261212]  kunit_try_run_case+0x170/0x3f0
[   46.265379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.270848]  kthread+0x328/0x630
[   46.274059]  ret_from_fork+0x10/0x20
[   46.277618] 
[   46.279095] Freed by task 265:
[   46.282132]  kasan_save_stack+0x3c/0x68
[   46.285952]  kasan_save_track+0x20/0x40
[   46.289771]  kasan_save_free_info+0x4c/0x78
[   46.293938]  __kasan_slab_free+0x6c/0x98
[   46.297844]  kfree+0x214/0x3c8
[   46.300882]  kmalloc_uaf+0x11c/0x338
[   46.304441]  kunit_try_run_case+0x170/0x3f0
[   46.308608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.314076]  kthread+0x328/0x630
[   46.317288]  ret_from_fork+0x10/0x20
[   46.320847] 
[   46.322326] The buggy address belongs to the object at ffff000802754720
[   46.322326]  which belongs to the cache kmalloc-16 of size 16
[   46.334652] The buggy address is located 8 bytes inside of
[   46.334652]  freed 16-byte region [ffff000802754720, ffff000802754730)
[   46.346628] 
[   46.348106] The buggy address belongs to the physical page:
[   46.353663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882754
[   46.361647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.368156] page_type: f5(slab)
[   46.371293] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.379013] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.386734] page dumped because: kasan: bad access detected
[   46.392287] 
[   46.393762] Memory state around the buggy address:
[   46.398543]  ffff000802754600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.405745]  ffff000802754680: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   46.412950] >ffff000802754700: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   46.420151]                                   ^
[   46.424668]  ffff000802754780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.431875]  ffff000802754800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.439076] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   45.877147] ==================================================================
[   45.887439] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   45.895336] Read of size 64 at addr ffff000805d6fd84 by task kunit_try_catch/263
[   45.902714] 
[   45.904198] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   45.904252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.904269] Hardware name: WinLink E850-96 board (DT)
[   45.904291] Call trace:
[   45.904304]  show_stack+0x20/0x38 (C)
[   45.904336]  dump_stack_lvl+0x8c/0xd0
[   45.904373]  print_report+0x118/0x5d0
[   45.904400]  kasan_report+0xdc/0x128
[   45.904426]  kasan_check_range+0x100/0x1a8
[   45.904456]  __asan_memmove+0x3c/0x98
[   45.904485]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   45.904523]  kunit_try_run_case+0x170/0x3f0
[   45.904555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.904591]  kthread+0x328/0x630
[   45.904620]  ret_from_fork+0x10/0x20
[   45.904656] 
[   45.972068] Allocated by task 263:
[   45.975456]  kasan_save_stack+0x3c/0x68
[   45.979272]  kasan_save_track+0x20/0x40
[   45.983091]  kasan_save_alloc_info+0x40/0x58
[   45.987345]  __kasan_kmalloc+0xd4/0xd8
[   45.991078]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.995591]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   46.000539]  kunit_try_run_case+0x170/0x3f0
[   46.004706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.010175]  kthread+0x328/0x630
[   46.013386]  ret_from_fork+0x10/0x20
[   46.016945] 
[   46.018423] The buggy address belongs to the object at ffff000805d6fd80
[   46.018423]  which belongs to the cache kmalloc-64 of size 64
[   46.030750] The buggy address is located 4 bytes inside of
[   46.030750]  allocated 64-byte region [ffff000805d6fd80, ffff000805d6fdc0)
[   46.043073] 
[   46.044553] The buggy address belongs to the physical page:
[   46.050109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d6f
[   46.058094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.064602] page_type: f5(slab)
[   46.067738] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.075458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.083178] page dumped because: kasan: bad access detected
[   46.088732] 
[   46.090208] Memory state around the buggy address:
[   46.094991]  ffff000805d6fc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.102192]  ffff000805d6fd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.109396] >ffff000805d6fd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   46.116596]                                            ^
[   46.121897]  ffff000805d6fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.129100]  ffff000805d6fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.136302] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   45.303861] ==================================================================
[   45.313664] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   45.320951] Write of size 16 at addr ffff000801af8169 by task kunit_try_catch/259
[   45.328415] 
[   45.329901] CPU: 3 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   45.329958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.329976] Hardware name: WinLink E850-96 board (DT)
[   45.329997] Call trace:
[   45.330009]  show_stack+0x20/0x38 (C)
[   45.330043]  dump_stack_lvl+0x8c/0xd0
[   45.330078]  print_report+0x118/0x5d0
[   45.330107]  kasan_report+0xdc/0x128
[   45.330134]  kasan_check_range+0x100/0x1a8
[   45.330164]  __asan_memset+0x34/0x78
[   45.330193]  kmalloc_oob_memset_16+0x150/0x2f8
[   45.330225]  kunit_try_run_case+0x170/0x3f0
[   45.330255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.330289]  kthread+0x328/0x630
[   45.330317]  ret_from_fork+0x10/0x20
[   45.330354] 
[   45.397078] Allocated by task 259:
[   45.400465]  kasan_save_stack+0x3c/0x68
[   45.404281]  kasan_save_track+0x20/0x40
[   45.408100]  kasan_save_alloc_info+0x40/0x58
[   45.412354]  __kasan_kmalloc+0xd4/0xd8
[   45.416086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.420600]  kmalloc_oob_memset_16+0xb0/0x2f8
[   45.424940]  kunit_try_run_case+0x170/0x3f0
[   45.429107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.434576]  kthread+0x328/0x630
[   45.437788]  ret_from_fork+0x10/0x20
[   45.441346] 
[   45.442825] The buggy address belongs to the object at ffff000801af8100
[   45.442825]  which belongs to the cache kmalloc-128 of size 128
[   45.455324] The buggy address is located 105 bytes inside of
[   45.455324]  allocated 120-byte region [ffff000801af8100, ffff000801af8178)
[   45.467910] 
[   45.469387] The buggy address belongs to the physical page:
[   45.474944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8
[   45.482928] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   45.490568] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   45.497510] page_type: f5(slab)
[   45.500648] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.508366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.516094] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.523904] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.531717] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff
[   45.539528] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.547337] page dumped because: kasan: bad access detected
[   45.552889] 
[   45.554365] Memory state around the buggy address:
[   45.559148]  ffff000801af8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.566348]  ffff000801af8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.573553] >ffff000801af8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.580754]                                                                 ^
[   45.587875]  ffff000801af8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.595082]  ffff000801af8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.602283] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   44.997342] ==================================================================
[   45.006897] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   45.014099] Write of size 8 at addr ffff000801889f71 by task kunit_try_catch/257
[   45.021474] 
[   45.022961] CPU: 2 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   45.023016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.023032] Hardware name: WinLink E850-96 board (DT)
[   45.023054] Call trace:
[   45.023068]  show_stack+0x20/0x38 (C)
[   45.023101]  dump_stack_lvl+0x8c/0xd0
[   45.023135]  print_report+0x118/0x5d0
[   45.023164]  kasan_report+0xdc/0x128
[   45.023189]  kasan_check_range+0x100/0x1a8
[   45.023222]  __asan_memset+0x34/0x78
[   45.023250]  kmalloc_oob_memset_8+0x150/0x2f8
[   45.023280]  kunit_try_run_case+0x170/0x3f0
[   45.023311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.023343]  kthread+0x328/0x630
[   45.023371]  ret_from_fork+0x10/0x20
[   45.023405] 
[   45.090052] Allocated by task 257:
[   45.093438]  kasan_save_stack+0x3c/0x68
[   45.097254]  kasan_save_track+0x20/0x40
[   45.101075]  kasan_save_alloc_info+0x40/0x58
[   45.105327]  __kasan_kmalloc+0xd4/0xd8
[   45.109059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.113573]  kmalloc_oob_memset_8+0xb0/0x2f8
[   45.117827]  kunit_try_run_case+0x170/0x3f0
[   45.121993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.127462]  kthread+0x328/0x630
[   45.130674]  ret_from_fork+0x10/0x20
[   45.134233] 
[   45.135710] The buggy address belongs to the object at ffff000801889f00
[   45.135710]  which belongs to the cache kmalloc-128 of size 128
[   45.148211] The buggy address is located 113 bytes inside of
[   45.148211]  allocated 120-byte region [ffff000801889f00, ffff000801889f78)
[   45.160795] 
[   45.162273] The buggy address belongs to the physical page:
[   45.167832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   45.175814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   45.183454] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   45.190397] page_type: f5(slab)
[   45.193534] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.201252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.208980] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   45.216790] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.224603] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   45.232415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   45.240222] page dumped because: kasan: bad access detected
[   45.245776] 
[   45.247252] Memory state around the buggy address:
[   45.252035]  ffff000801889e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   45.259235]  ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.266439] >ffff000801889f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   45.273640]                                                                 ^
[   45.280762]  ffff000801889f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.287968]  ffff00080188a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   45.295168] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   44.690535] ==================================================================
[   44.700132] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   44.707331] Write of size 4 at addr ffff000801889e75 by task kunit_try_catch/255
[   44.714709] 
[   44.716195] CPU: 2 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   44.716249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.716266] Hardware name: WinLink E850-96 board (DT)
[   44.716285] Call trace:
[   44.716298]  show_stack+0x20/0x38 (C)
[   44.716332]  dump_stack_lvl+0x8c/0xd0
[   44.716367]  print_report+0x118/0x5d0
[   44.716396]  kasan_report+0xdc/0x128
[   44.716423]  kasan_check_range+0x100/0x1a8
[   44.716452]  __asan_memset+0x34/0x78
[   44.716484]  kmalloc_oob_memset_4+0x150/0x300
[   44.716514]  kunit_try_run_case+0x170/0x3f0
[   44.716543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.716577]  kthread+0x328/0x630
[   44.716606]  ret_from_fork+0x10/0x20
[   44.716638] 
[   44.783286] Allocated by task 255:
[   44.786673]  kasan_save_stack+0x3c/0x68
[   44.790490]  kasan_save_track+0x20/0x40
[   44.794307]  kasan_save_alloc_info+0x40/0x58
[   44.798561]  __kasan_kmalloc+0xd4/0xd8
[   44.802293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.806807]  kmalloc_oob_memset_4+0xb0/0x300
[   44.811062]  kunit_try_run_case+0x170/0x3f0
[   44.815227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.820696]  kthread+0x328/0x630
[   44.823907]  ret_from_fork+0x10/0x20
[   44.827466] 
[   44.828944] The buggy address belongs to the object at ffff000801889e00
[   44.828944]  which belongs to the cache kmalloc-128 of size 128
[   44.841445] The buggy address is located 117 bytes inside of
[   44.841445]  allocated 120-byte region [ffff000801889e00, ffff000801889e78)
[   44.854029] 
[   44.855508] The buggy address belongs to the physical page:
[   44.861067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   44.869048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.876686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.883630] page_type: f5(slab)
[   44.886767] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.894486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.902214] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.910024] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.917837] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   44.925649] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.933454] page dumped because: kasan: bad access detected
[   44.939011] 
[   44.940487] Memory state around the buggy address:
[   44.945267]  ffff000801889d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.952468]  ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.959675] >ffff000801889e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.966874]                                                                 ^
[   44.973996]  ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.981201]  ffff000801889f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.988404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   44.383695] ==================================================================
[   44.393363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   44.400567] Write of size 2 at addr ffff000801af8077 by task kunit_try_catch/253
[   44.407943] 
[   44.409428] CPU: 3 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   44.409485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.409502] Hardware name: WinLink E850-96 board (DT)
[   44.409525] Call trace:
[   44.409539]  show_stack+0x20/0x38 (C)
[   44.409574]  dump_stack_lvl+0x8c/0xd0
[   44.409607]  print_report+0x118/0x5d0
[   44.409636]  kasan_report+0xdc/0x128
[   44.409660]  kasan_check_range+0x100/0x1a8
[   44.409686]  __asan_memset+0x34/0x78
[   44.409717]  kmalloc_oob_memset_2+0x150/0x2f8
[   44.409749]  kunit_try_run_case+0x170/0x3f0
[   44.409778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.409815]  kthread+0x328/0x630
[   44.409842]  ret_from_fork+0x10/0x20
[   44.409876] 
[   44.476518] Allocated by task 253:
[   44.479906]  kasan_save_stack+0x3c/0x68
[   44.483722]  kasan_save_track+0x20/0x40
[   44.487542]  kasan_save_alloc_info+0x40/0x58
[   44.491794]  __kasan_kmalloc+0xd4/0xd8
[   44.495527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.500041]  kmalloc_oob_memset_2+0xb0/0x2f8
[   44.504294]  kunit_try_run_case+0x170/0x3f0
[   44.508461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.513930]  kthread+0x328/0x630
[   44.517142]  ret_from_fork+0x10/0x20
[   44.520700] 
[   44.522177] The buggy address belongs to the object at ffff000801af8000
[   44.522177]  which belongs to the cache kmalloc-128 of size 128
[   44.534679] The buggy address is located 119 bytes inside of
[   44.534679]  allocated 120-byte region [ffff000801af8000, ffff000801af8078)
[   44.547262] 
[   44.548742] The buggy address belongs to the physical page:
[   44.554298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8
[   44.562281] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.569921] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.576864] page_type: f5(slab)
[   44.580003] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.587720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.595448] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.603258] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.611071] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff
[   44.618882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.626688] page dumped because: kasan: bad access detected
[   44.632243] 
[   44.633719] Memory state around the buggy address:
[   44.638504]  ffff000801af7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.645704]  ffff000801af7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.652908] >ffff000801af8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.660108]                                                                 ^
[   44.667230]  ffff000801af8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.674434]  ffff000801af8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.681637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   44.077211] ==================================================================
[   44.086249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   44.093537] Write of size 128 at addr ffff00080244da00 by task kunit_try_catch/251
[   44.101088] 
[   44.102575] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   44.102630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.102645] Hardware name: WinLink E850-96 board (DT)
[   44.102668] Call trace:
[   44.102683]  show_stack+0x20/0x38 (C)
[   44.102715]  dump_stack_lvl+0x8c/0xd0
[   44.102750]  print_report+0x118/0x5d0
[   44.102779]  kasan_report+0xdc/0x128
[   44.102804]  kasan_check_range+0x100/0x1a8
[   44.102832]  __asan_memset+0x34/0x78
[   44.102860]  kmalloc_oob_in_memset+0x144/0x2d0
[   44.102891]  kunit_try_run_case+0x170/0x3f0
[   44.102922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.102955]  kthread+0x328/0x630
[   44.102981]  ret_from_fork+0x10/0x20
[   44.103012] 
[   44.169750] Allocated by task 251:
[   44.173139]  kasan_save_stack+0x3c/0x68
[   44.176955]  kasan_save_track+0x20/0x40
[   44.180775]  kasan_save_alloc_info+0x40/0x58
[   44.185028]  __kasan_kmalloc+0xd4/0xd8
[   44.188761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.193275]  kmalloc_oob_in_memset+0xb0/0x2d0
[   44.197616]  kunit_try_run_case+0x170/0x3f0
[   44.201781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.207250]  kthread+0x328/0x630
[   44.210462]  ret_from_fork+0x10/0x20
[   44.214021] 
[   44.215498] The buggy address belongs to the object at ffff00080244da00
[   44.215498]  which belongs to the cache kmalloc-128 of size 128
[   44.227998] The buggy address is located 0 bytes inside of
[   44.227998]  allocated 120-byte region [ffff00080244da00, ffff00080244da78)
[   44.240409] 
[   44.241890] The buggy address belongs to the physical page:
[   44.247446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c
[   44.255429] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.263068] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.270011] page_type: f5(slab)
[   44.273148] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.280867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.288595] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   44.296405] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.304218] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff
[   44.312030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.319835] page dumped because: kasan: bad access detected
[   44.325391] 
[   44.326866] Memory state around the buggy address:
[   44.331648]  ffff00080244d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.338849]  ffff00080244d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.346054] >ffff00080244da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   44.353255]                                                                 ^
[   44.360376]  ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.367581]  ffff00080244db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.374784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   43.773501] ==================================================================
[   43.782609] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   43.789376] Read of size 16 at addr ffff000802d259c0 by task kunit_try_catch/249
[   43.796753] 
[   43.798240] CPU: 2 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   43.798293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.798308] Hardware name: WinLink E850-96 board (DT)
[   43.798329] Call trace:
[   43.798341]  show_stack+0x20/0x38 (C)
[   43.798375]  dump_stack_lvl+0x8c/0xd0
[   43.798411]  print_report+0x118/0x5d0
[   43.798438]  kasan_report+0xdc/0x128
[   43.798464]  __asan_report_load16_noabort+0x20/0x30
[   43.798496]  kmalloc_uaf_16+0x3bc/0x438
[   43.798526]  kunit_try_run_case+0x170/0x3f0
[   43.798558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.798592]  kthread+0x328/0x630
[   43.798618]  ret_from_fork+0x10/0x20
[   43.798651] 
[   43.862031] Allocated by task 249:
[   43.865419]  kasan_save_stack+0x3c/0x68
[   43.869235]  kasan_save_track+0x20/0x40
[   43.873054]  kasan_save_alloc_info+0x40/0x58
[   43.877307]  __kasan_kmalloc+0xd4/0xd8
[   43.881040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.885554]  kmalloc_uaf_16+0x140/0x438
[   43.889373]  kunit_try_run_case+0x170/0x3f0
[   43.893540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.899010]  kthread+0x328/0x630
[   43.902220]  ret_from_fork+0x10/0x20
[   43.905779] 
[   43.907255] Freed by task 249:
[   43.910294]  kasan_save_stack+0x3c/0x68
[   43.914112]  kasan_save_track+0x20/0x40
[   43.917933]  kasan_save_free_info+0x4c/0x78
[   43.922098]  __kasan_slab_free+0x6c/0x98
[   43.926004]  kfree+0x214/0x3c8
[   43.929042]  kmalloc_uaf_16+0x190/0x438
[   43.932862]  kunit_try_run_case+0x170/0x3f0
[   43.937029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.942497]  kthread+0x328/0x630
[   43.945709]  ret_from_fork+0x10/0x20
[   43.949268] 
[   43.950745] The buggy address belongs to the object at ffff000802d259c0
[   43.950745]  which belongs to the cache kmalloc-16 of size 16
[   43.963073] The buggy address is located 0 bytes inside of
[   43.963073]  freed 16-byte region [ffff000802d259c0, ffff000802d259d0)
[   43.975049] 
[   43.976529] The buggy address belongs to the physical page:
[   43.982084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d25
[   43.990069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.996578] page_type: f5(slab)
[   43.999714] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.007434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.015155] page dumped because: kasan: bad access detected
[   44.020707] 
[   44.022183] Memory state around the buggy address:
[   44.026963]  ffff000802d25880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.034166]  ffff000802d25900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.041373] >ffff000802d25980: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   44.048572]                                            ^
[   44.053872]  ffff000802d25a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.061076]  ffff000802d25a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.068276] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   43.511740] ==================================================================
[   43.520806] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   43.527488] Write of size 16 at addr ffff000802d25960 by task kunit_try_catch/247
[   43.534951] 
[   43.536437] CPU: 2 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   43.536493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.536508] Hardware name: WinLink E850-96 board (DT)
[   43.536529] Call trace:
[   43.536541]  show_stack+0x20/0x38 (C)
[   43.536575]  dump_stack_lvl+0x8c/0xd0
[   43.536610]  print_report+0x118/0x5d0
[   43.536638]  kasan_report+0xdc/0x128
[   43.536662]  __asan_report_store16_noabort+0x20/0x30
[   43.536695]  kmalloc_oob_16+0x3a0/0x3f8
[   43.536725]  kunit_try_run_case+0x170/0x3f0
[   43.536755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.536788]  kthread+0x328/0x630
[   43.536815]  ret_from_fork+0x10/0x20
[   43.536849] 
[   43.600316] Allocated by task 247:
[   43.603704]  kasan_save_stack+0x3c/0x68
[   43.607520]  kasan_save_track+0x20/0x40
[   43.611339]  kasan_save_alloc_info+0x40/0x58
[   43.615593]  __kasan_kmalloc+0xd4/0xd8
[   43.619325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.623839]  kmalloc_oob_16+0xb4/0x3f8
[   43.627571]  kunit_try_run_case+0x170/0x3f0
[   43.631738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.637207]  kthread+0x328/0x630
[   43.640418]  ret_from_fork+0x10/0x20
[   43.643977] 
[   43.645455] The buggy address belongs to the object at ffff000802d25960
[   43.645455]  which belongs to the cache kmalloc-16 of size 16
[   43.657782] The buggy address is located 0 bytes inside of
[   43.657782]  allocated 13-byte region [ffff000802d25960, ffff000802d2596d)
[   43.670105] 
[   43.671583] The buggy address belongs to the physical page:
[   43.677142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d25
[   43.685125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.691634] page_type: f5(slab)
[   43.694771] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.702490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.710210] page dumped because: kasan: bad access detected
[   43.715764] 
[   43.717240] Memory state around the buggy address:
[   43.722023]  ffff000802d25800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.729224]  ffff000802d25880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   43.736428] >ffff000802d25900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   43.743629]                                                           ^
[   43.750229]  ffff000802d25980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.757436]  ffff000802d25a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.764635] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   42.831204] ==================================================================
[   42.841133] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   42.847723] Read of size 1 at addr ffff000805058400 by task kunit_try_catch/245
[   42.855013] 
[   42.856500] CPU: 3 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.856555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.856570] Hardware name: WinLink E850-96 board (DT)
[   42.856591] Call trace:
[   42.856605]  show_stack+0x20/0x38 (C)
[   42.856641]  dump_stack_lvl+0x8c/0xd0
[   42.856676]  print_report+0x118/0x5d0
[   42.856702]  kasan_report+0xdc/0x128
[   42.856726]  __kasan_check_byte+0x54/0x70
[   42.856752]  krealloc_noprof+0x44/0x360
[   42.856785]  krealloc_uaf+0x180/0x520
[   42.856817]  kunit_try_run_case+0x170/0x3f0
[   42.856846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.856880]  kthread+0x328/0x630
[   42.856907]  ret_from_fork+0x10/0x20
[   42.856942] 
[   42.923069] Allocated by task 245:
[   42.926457]  kasan_save_stack+0x3c/0x68
[   42.930273]  kasan_save_track+0x20/0x40
[   42.934093]  kasan_save_alloc_info+0x40/0x58
[   42.938346]  __kasan_kmalloc+0xd4/0xd8
[   42.942079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.946592]  krealloc_uaf+0xc8/0x520
[   42.950151]  kunit_try_run_case+0x170/0x3f0
[   42.954318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.959786]  kthread+0x328/0x630
[   42.962998]  ret_from_fork+0x10/0x20
[   42.966557] 
[   42.968034] Freed by task 245:
[   42.971073]  kasan_save_stack+0x3c/0x68
[   42.974890]  kasan_save_track+0x20/0x40
[   42.978710]  kasan_save_free_info+0x4c/0x78
[   42.982876]  __kasan_slab_free+0x6c/0x98
[   42.986784]  kfree+0x214/0x3c8
[   42.989821]  krealloc_uaf+0x12c/0x520
[   42.993467]  kunit_try_run_case+0x170/0x3f0
[   42.997633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.003102]  kthread+0x328/0x630
[   43.006313]  ret_from_fork+0x10/0x20
[   43.009873] 
[   43.011350] The buggy address belongs to the object at ffff000805058400
[   43.011350]  which belongs to the cache kmalloc-256 of size 256
[   43.023851] The buggy address is located 0 bytes inside of
[   43.023851]  freed 256-byte region [ffff000805058400, ffff000805058500)
[   43.035913] 
[   43.037392] The buggy address belongs to the physical page:
[   43.042949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   43.050933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.058573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.065515] page_type: f5(slab)
[   43.068653] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.076371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.084099] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.091909] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.099722] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   43.107534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   43.115342] page dumped because: kasan: bad access detected
[   43.120895] 
[   43.122370] Memory state around the buggy address:
[   43.127151]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.134355]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.141558] >ffff000805058400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.148759]                    ^
[   43.151975]  ffff000805058480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.159179]  ffff000805058500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.166382] ==================================================================
[   43.173919] ==================================================================
[   43.180797] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   43.187388] Read of size 1 at addr ffff000805058400 by task kunit_try_catch/245
[   43.194679] 
[   43.196165] CPU: 3 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   43.196218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.196234] Hardware name: WinLink E850-96 board (DT)
[   43.196254] Call trace:
[   43.196266]  show_stack+0x20/0x38 (C)
[   43.196298]  dump_stack_lvl+0x8c/0xd0
[   43.196332]  print_report+0x118/0x5d0
[   43.196361]  kasan_report+0xdc/0x128
[   43.196386]  __asan_report_load1_noabort+0x20/0x30
[   43.196415]  krealloc_uaf+0x4c8/0x520
[   43.196446]  kunit_try_run_case+0x170/0x3f0
[   43.196475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.196507]  kthread+0x328/0x630
[   43.196535]  ret_from_fork+0x10/0x20
[   43.196565] 
[   43.259696] Allocated by task 245:
[   43.263084]  kasan_save_stack+0x3c/0x68
[   43.266900]  kasan_save_track+0x20/0x40
[   43.270719]  kasan_save_alloc_info+0x40/0x58
[   43.274973]  __kasan_kmalloc+0xd4/0xd8
[   43.278705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.283220]  krealloc_uaf+0xc8/0x520
[   43.286778]  kunit_try_run_case+0x170/0x3f0
[   43.290945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.296413]  kthread+0x328/0x630
[   43.299625]  ret_from_fork+0x10/0x20
[   43.303184] 
[   43.304659] Freed by task 245:
[   43.307699]  kasan_save_stack+0x3c/0x68
[   43.311517]  kasan_save_track+0x20/0x40
[   43.315337]  kasan_save_free_info+0x4c/0x78
[   43.319503]  __kasan_slab_free+0x6c/0x98
[   43.323409]  kfree+0x214/0x3c8
[   43.326448]  krealloc_uaf+0x12c/0x520
[   43.330093]  kunit_try_run_case+0x170/0x3f0
[   43.334260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.339729]  kthread+0x328/0x630
[   43.342940]  ret_from_fork+0x10/0x20
[   43.346500] 
[   43.347976] The buggy address belongs to the object at ffff000805058400
[   43.347976]  which belongs to the cache kmalloc-256 of size 256
[   43.360477] The buggy address is located 0 bytes inside of
[   43.360477]  freed 256-byte region [ffff000805058400, ffff000805058500)
[   43.372540] 
[   43.374020] The buggy address belongs to the physical page:
[   43.379575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   43.387559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.395199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.402141] page_type: f5(slab)
[   43.405279] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.412998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.420726] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.428536] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.436349] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   43.444161] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   43.451969] page dumped because: kasan: bad access detected
[   43.457521] 
[   43.458997] Memory state around the buggy address:
[   43.463780]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.470980]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.478185] >ffff000805058400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.485387]                    ^
[   43.488602]  ffff000805058480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.495806]  ffff000805058500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.503007] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   39.963642] ==================================================================
[   39.970601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   39.978147] Write of size 1 at addr ffff0008030f84d0 by task kunit_try_catch/239
[   39.985525] 
[   39.987011] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   39.987063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.987079] Hardware name: WinLink E850-96 board (DT)
[   39.987097] Call trace:
[   39.987112]  show_stack+0x20/0x38 (C)
[   39.987144]  dump_stack_lvl+0x8c/0xd0
[   39.987178]  print_report+0x118/0x5d0
[   39.987206]  kasan_report+0xdc/0x128
[   39.987231]  __asan_report_store1_noabort+0x20/0x30
[   39.987261]  krealloc_less_oob_helper+0xb9c/0xc50
[   39.987294]  krealloc_less_oob+0x20/0x38
[   39.987325]  kunit_try_run_case+0x170/0x3f0
[   39.987357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.987392]  kthread+0x328/0x630
[   39.987419]  ret_from_fork+0x10/0x20
[   39.987454] 
[   40.055576] Allocated by task 239:
[   40.058964]  kasan_save_stack+0x3c/0x68
[   40.062781]  kasan_save_track+0x20/0x40
[   40.066601]  kasan_save_alloc_info+0x40/0x58
[   40.070854]  __kasan_krealloc+0x118/0x178
[   40.074847]  krealloc_noprof+0x128/0x360
[   40.078753]  krealloc_less_oob_helper+0x168/0xc50
[   40.083441]  krealloc_less_oob+0x20/0x38
[   40.087347]  kunit_try_run_case+0x170/0x3f0
[   40.091513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.096982]  kthread+0x328/0x630
[   40.100194]  ret_from_fork+0x10/0x20
[   40.103753] 
[   40.105230] The buggy address belongs to the object at ffff0008030f8400
[   40.105230]  which belongs to the cache kmalloc-256 of size 256
[   40.117730] The buggy address is located 7 bytes to the right of
[   40.117730]  allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9)
[   40.130662] 
[   40.132141] The buggy address belongs to the physical page:
[   40.137697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8
[   40.145681] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.153319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.160262] page_type: f5(slab)
[   40.163397] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.171120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.178845] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.186657] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.194470] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff
[   40.202282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.210088] page dumped because: kasan: bad access detected
[   40.215643] 
[   40.217119] Memory state around the buggy address:
[   40.221899]  ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.229103]  ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.236307] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.243508]                                                  ^
[   40.249327]  ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.256532]  ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.263733] ==================================================================
[   40.579009] ==================================================================
[   40.586039] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   40.593591] Write of size 1 at addr ffff0008030f84ea by task kunit_try_catch/239
[   40.600968] 
[   40.602452] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   40.602505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.602521] Hardware name: WinLink E850-96 board (DT)
[   40.602540] Call trace:
[   40.602553]  show_stack+0x20/0x38 (C)
[   40.602584]  dump_stack_lvl+0x8c/0xd0
[   40.602616]  print_report+0x118/0x5d0
[   40.602642]  kasan_report+0xdc/0x128
[   40.602667]  __asan_report_store1_noabort+0x20/0x30
[   40.602698]  krealloc_less_oob_helper+0xae4/0xc50
[   40.602730]  krealloc_less_oob+0x20/0x38
[   40.602761]  kunit_try_run_case+0x170/0x3f0
[   40.602789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.602822]  kthread+0x328/0x630
[   40.602848]  ret_from_fork+0x10/0x20
[   40.602877] 
[   40.671018] Allocated by task 239:
[   40.674406]  kasan_save_stack+0x3c/0x68
[   40.678223]  kasan_save_track+0x20/0x40
[   40.682044]  kasan_save_alloc_info+0x40/0x58
[   40.686296]  __kasan_krealloc+0x118/0x178
[   40.690289]  krealloc_noprof+0x128/0x360
[   40.694195]  krealloc_less_oob_helper+0x168/0xc50
[   40.698883]  krealloc_less_oob+0x20/0x38
[   40.702789]  kunit_try_run_case+0x170/0x3f0
[   40.706956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.712424]  kthread+0x328/0x630
[   40.715636]  ret_from_fork+0x10/0x20
[   40.719195] 
[   40.720671] The buggy address belongs to the object at ffff0008030f8400
[   40.720671]  which belongs to the cache kmalloc-256 of size 256
[   40.733171] The buggy address is located 33 bytes to the right of
[   40.733171]  allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9)
[   40.746191] 
[   40.747669] The buggy address belongs to the physical page:
[   40.753226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8
[   40.761210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.768848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.775791] page_type: f5(slab)
[   40.778924] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.786650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.794375] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.802186] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.810000] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff
[   40.817811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.825618] page dumped because: kasan: bad access detected
[   40.831174] 
[   40.832648] Memory state around the buggy address:
[   40.837427]  ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.844632]  ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.851835] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.859037]                                                           ^
[   40.865637]  ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.872844]  ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.880043] ==================================================================
[   42.597173] ==================================================================
[   42.604238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   42.611790] Write of size 1 at addr ffff0008062c60eb by task kunit_try_catch/243
[   42.619166] 
[   42.620650] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.620698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.620712] Hardware name: WinLink E850-96 board (DT)
[   42.620730] Call trace:
[   42.620742]  show_stack+0x20/0x38 (C)
[   42.620776]  dump_stack_lvl+0x8c/0xd0
[   42.620808]  print_report+0x118/0x5d0
[   42.620834]  kasan_report+0xdc/0x128
[   42.620864]  __asan_report_store1_noabort+0x20/0x30
[   42.620895]  krealloc_less_oob_helper+0xa58/0xc50
[   42.620927]  krealloc_large_less_oob+0x20/0x38
[   42.620959]  kunit_try_run_case+0x170/0x3f0
[   42.620987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.621020]  kthread+0x328/0x630
[   42.621046]  ret_from_fork+0x10/0x20
[   42.621078] 
[   42.689740] The buggy address belongs to the physical page:
[   42.695298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   42.703279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.710920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.717863] page_type: f8(unknown)
[   42.721256] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.728980] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.736707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.744518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.752331] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff
[   42.760143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.767949] page dumped because: kasan: bad access detected
[   42.773504] 
[   42.774980] Memory state around the buggy address:
[   42.779759]  ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.786963]  ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.794167] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.801368]                                                           ^
[   42.807969]  ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.815174]  ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.822375] ==================================================================
[   42.132586] ==================================================================
[   42.139663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   42.147213] Write of size 1 at addr ffff0008062c60da by task kunit_try_catch/243
[   42.154590] 
[   42.156075] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.156131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.156148] Hardware name: WinLink E850-96 board (DT)
[   42.156166] Call trace:
[   42.156179]  show_stack+0x20/0x38 (C)
[   42.156211]  dump_stack_lvl+0x8c/0xd0
[   42.156245]  print_report+0x118/0x5d0
[   42.156273]  kasan_report+0xdc/0x128
[   42.156298]  __asan_report_store1_noabort+0x20/0x30
[   42.156331]  krealloc_less_oob_helper+0xa80/0xc50
[   42.156366]  krealloc_large_less_oob+0x20/0x38
[   42.156397]  kunit_try_run_case+0x170/0x3f0
[   42.156427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.156460]  kthread+0x328/0x630
[   42.156487]  ret_from_fork+0x10/0x20
[   42.156521] 
[   42.225164] The buggy address belongs to the physical page:
[   42.230722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   42.238705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.246345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.253287] page_type: f8(unknown)
[   42.256681] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.264404] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.272130] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.279942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.287755] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff
[   42.295567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.303372] page dumped because: kasan: bad access detected
[   42.308928] 
[   42.310405] Memory state around the buggy address:
[   42.315185]  ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.322388]  ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.329591] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.336792]                                                     ^
[   42.342872]  ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.350077]  ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.357279] ==================================================================
[   40.887399] ==================================================================
[   40.894456] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   40.902006] Write of size 1 at addr ffff0008030f84eb by task kunit_try_catch/239
[   40.909383] 
[   40.910868] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   40.910921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.910936] Hardware name: WinLink E850-96 board (DT)
[   40.910956] Call trace:
[   40.910970]  show_stack+0x20/0x38 (C)
[   40.911001]  dump_stack_lvl+0x8c/0xd0
[   40.911036]  print_report+0x118/0x5d0
[   40.911062]  kasan_report+0xdc/0x128
[   40.911088]  __asan_report_store1_noabort+0x20/0x30
[   40.911118]  krealloc_less_oob_helper+0xa58/0xc50
[   40.911151]  krealloc_less_oob+0x20/0x38
[   40.911180]  kunit_try_run_case+0x170/0x3f0
[   40.911208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.911239]  kthread+0x328/0x630
[   40.911262]  ret_from_fork+0x10/0x20
[   40.911293] 
[   40.979434] Allocated by task 239:
[   40.982820]  kasan_save_stack+0x3c/0x68
[   40.986639]  kasan_save_track+0x20/0x40
[   40.990458]  kasan_save_alloc_info+0x40/0x58
[   40.994712]  __kasan_krealloc+0x118/0x178
[   40.998705]  krealloc_noprof+0x128/0x360
[   41.002611]  krealloc_less_oob_helper+0x168/0xc50
[   41.007298]  krealloc_less_oob+0x20/0x38
[   41.011204]  kunit_try_run_case+0x170/0x3f0
[   41.015371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.020840]  kthread+0x328/0x630
[   41.024052]  ret_from_fork+0x10/0x20
[   41.027610] 
[   41.029088] The buggy address belongs to the object at ffff0008030f8400
[   41.029088]  which belongs to the cache kmalloc-256 of size 256
[   41.041586] The buggy address is located 34 bytes to the right of
[   41.041586]  allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9)
[   41.054606] 
[   41.056086] The buggy address belongs to the physical page:
[   41.061642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8
[   41.069625] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.077264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.084208] page_type: f5(slab)
[   41.087341] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   41.095064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.102790] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   41.110602] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.118415] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff
[   41.126227] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.134033] page dumped because: kasan: bad access detected
[   41.139588] 
[   41.141063] Memory state around the buggy address:
[   41.145843]  ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.153046]  ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.160251] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   41.167452]                                                           ^
[   41.174053]  ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.181258]  ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.188459] ==================================================================
[   41.666304] ==================================================================
[   41.676389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   41.683939] Write of size 1 at addr ffff0008062c60c9 by task kunit_try_catch/243
[   41.691316] 
[   41.692804] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   41.692859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.692876] Hardware name: WinLink E850-96 board (DT)
[   41.692896] Call trace:
[   41.692911]  show_stack+0x20/0x38 (C)
[   41.692946]  dump_stack_lvl+0x8c/0xd0
[   41.692984]  print_report+0x118/0x5d0
[   41.693013]  kasan_report+0xdc/0x128
[   41.693040]  __asan_report_store1_noabort+0x20/0x30
[   41.693073]  krealloc_less_oob_helper+0xa48/0xc50
[   41.693105]  krealloc_large_less_oob+0x20/0x38
[   41.693136]  kunit_try_run_case+0x170/0x3f0
[   41.693168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.693202]  kthread+0x328/0x630
[   41.693230]  ret_from_fork+0x10/0x20
[   41.693263] 
[   41.761893] The buggy address belongs to the physical page:
[   41.767448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   41.775431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.783071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.790012] page_type: f8(unknown)
[   41.793411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.801130] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.808859] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.816667] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.824481] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff
[   41.832292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.840100] page dumped because: kasan: bad access detected
[   41.845655] 
[   41.847130] Memory state around the buggy address:
[   41.851910]  ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.859113]  ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.866317] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   41.873518]                                               ^
[   41.879077]  ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.886282]  ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.893484] ==================================================================
[   41.901051] ==================================================================
[   41.907898] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   41.915445] Write of size 1 at addr ffff0008062c60d0 by task kunit_try_catch/243
[   41.922822] 
[   41.924308] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   41.924363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.924380] Hardware name: WinLink E850-96 board (DT)
[   41.924399] Call trace:
[   41.924413]  show_stack+0x20/0x38 (C)
[   41.924446]  dump_stack_lvl+0x8c/0xd0
[   41.924480]  print_report+0x118/0x5d0
[   41.924508]  kasan_report+0xdc/0x128
[   41.924533]  __asan_report_store1_noabort+0x20/0x30
[   41.924565]  krealloc_less_oob_helper+0xb9c/0xc50
[   41.924598]  krealloc_large_less_oob+0x20/0x38
[   41.924632]  kunit_try_run_case+0x170/0x3f0
[   41.924663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.924695]  kthread+0x328/0x630
[   41.924722]  ret_from_fork+0x10/0x20
[   41.924753] 
[   41.993397] The buggy address belongs to the physical page:
[   41.998956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   42.006938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.014578] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.021521] page_type: f8(unknown)
[   42.024914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.032637] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.040364] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.048175] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.055987] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff
[   42.063799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.071605] page dumped because: kasan: bad access detected
[   42.077161] 
[   42.078637] Memory state around the buggy address:
[   42.083418]  ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.090619]  ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.097824] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.105025]                                                  ^
[   42.110844]  ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.118049]  ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.125250] ==================================================================
[   40.271112] ==================================================================
[   40.278150] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   40.285698] Write of size 1 at addr ffff0008030f84da by task kunit_try_catch/239
[   40.293075] 
[   40.294558] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   40.294611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.294628] Hardware name: WinLink E850-96 board (DT)
[   40.294646] Call trace:
[   40.294660]  show_stack+0x20/0x38 (C)
[   40.294694]  dump_stack_lvl+0x8c/0xd0
[   40.294729]  print_report+0x118/0x5d0
[   40.294757]  kasan_report+0xdc/0x128
[   40.294782]  __asan_report_store1_noabort+0x20/0x30
[   40.294814]  krealloc_less_oob_helper+0xa80/0xc50
[   40.294846]  krealloc_less_oob+0x20/0x38
[   40.294877]  kunit_try_run_case+0x170/0x3f0
[   40.294908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.294942]  kthread+0x328/0x630
[   40.294970]  ret_from_fork+0x10/0x20
[   40.295003] 
[   40.363125] Allocated by task 239:
[   40.366511]  kasan_save_stack+0x3c/0x68
[   40.370329]  kasan_save_track+0x20/0x40
[   40.374148]  kasan_save_alloc_info+0x40/0x58
[   40.378401]  __kasan_krealloc+0x118/0x178
[   40.382394]  krealloc_noprof+0x128/0x360
[   40.386301]  krealloc_less_oob_helper+0x168/0xc50
[   40.390988]  krealloc_less_oob+0x20/0x38
[   40.394894]  kunit_try_run_case+0x170/0x3f0
[   40.399061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.404529]  kthread+0x328/0x630
[   40.407741]  ret_from_fork+0x10/0x20
[   40.411300] 
[   40.412777] The buggy address belongs to the object at ffff0008030f8400
[   40.412777]  which belongs to the cache kmalloc-256 of size 256
[   40.425277] The buggy address is located 17 bytes to the right of
[   40.425277]  allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9)
[   40.438296] 
[   40.439776] The buggy address belongs to the physical page:
[   40.445332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8
[   40.453315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.460955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.467898] page_type: f5(slab)
[   40.471034] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.478755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.486482] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   40.494292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.502104] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff
[   40.509917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.517724] page dumped because: kasan: bad access detected
[   40.523277] 
[   40.524753] Memory state around the buggy address:
[   40.529534]  ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.536736]  ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.543941] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   40.551142]                                                     ^
[   40.557222]  ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.564426]  ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.571628] ==================================================================
[   42.364610] ==================================================================
[   42.371691] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   42.379241] Write of size 1 at addr ffff0008062c60ea by task kunit_try_catch/243
[   42.386619] 
[   42.388102] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.388156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.388171] Hardware name: WinLink E850-96 board (DT)
[   42.388187] Call trace:
[   42.388199]  show_stack+0x20/0x38 (C)
[   42.388229]  dump_stack_lvl+0x8c/0xd0
[   42.388262]  print_report+0x118/0x5d0
[   42.388288]  kasan_report+0xdc/0x128
[   42.388314]  __asan_report_store1_noabort+0x20/0x30
[   42.388347]  krealloc_less_oob_helper+0xae4/0xc50
[   42.388380]  krealloc_large_less_oob+0x20/0x38
[   42.388412]  kunit_try_run_case+0x170/0x3f0
[   42.388441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.388474]  kthread+0x328/0x630
[   42.388502]  ret_from_fork+0x10/0x20
[   42.388531] 
[   42.457191] The buggy address belongs to the physical page:
[   42.462749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4
[   42.470733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.478371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.485314] page_type: f8(unknown)
[   42.488707] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.496432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.504158] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   42.511969] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   42.519783] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff
[   42.527594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   42.535400] page dumped because: kasan: bad access detected
[   42.540956] 
[   42.542431] Memory state around the buggy address:
[   42.547210]  ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.554414]  ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   42.561619] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   42.568820]                                                           ^
[   42.575421]  ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.582625]  ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   42.589828] ==================================================================
[   39.653995] ==================================================================
[   39.663312] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   39.670862] Write of size 1 at addr ffff0008030f84c9 by task kunit_try_catch/239
[   39.678238] 
[   39.679725] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   39.679783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.679800] Hardware name: WinLink E850-96 board (DT)
[   39.679820] Call trace:
[   39.679833]  show_stack+0x20/0x38 (C)
[   39.679870]  dump_stack_lvl+0x8c/0xd0
[   39.679904]  print_report+0x118/0x5d0
[   39.679931]  kasan_report+0xdc/0x128
[   39.679960]  __asan_report_store1_noabort+0x20/0x30
[   39.679992]  krealloc_less_oob_helper+0xa48/0xc50
[   39.680027]  krealloc_less_oob+0x20/0x38
[   39.680056]  kunit_try_run_case+0x170/0x3f0
[   39.680086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.680121]  kthread+0x328/0x630
[   39.680149]  ret_from_fork+0x10/0x20
[   39.680183] 
[   39.748292] Allocated by task 239:
[   39.751677]  kasan_save_stack+0x3c/0x68
[   39.755494]  kasan_save_track+0x20/0x40
[   39.759314]  kasan_save_alloc_info+0x40/0x58
[   39.763567]  __kasan_krealloc+0x118/0x178
[   39.767560]  krealloc_noprof+0x128/0x360
[   39.771466]  krealloc_less_oob_helper+0x168/0xc50
[   39.776154]  krealloc_less_oob+0x20/0x38
[   39.780060]  kunit_try_run_case+0x170/0x3f0
[   39.784226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.789695]  kthread+0x328/0x630
[   39.792907]  ret_from_fork+0x10/0x20
[   39.796466] 
[   39.797944] The buggy address belongs to the object at ffff0008030f8400
[   39.797944]  which belongs to the cache kmalloc-256 of size 256
[   39.810445] The buggy address is located 0 bytes to the right of
[   39.810445]  allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9)
[   39.823375] 
[   39.824855] The buggy address belongs to the physical page:
[   39.830412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8
[   39.838394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.846035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.852976] page_type: f5(slab)
[   39.856114] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.863832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.871561] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.879370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.887183] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff
[   39.894995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.902801] page dumped because: kasan: bad access detected
[   39.908356] 
[   39.909832] Memory state around the buggy address:
[   39.914614]  ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.921818]  ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.929021] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   39.936220]                                               ^
[   39.941780]  ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.948985]  ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.956187] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   41.197351] ==================================================================
[   41.206694] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   41.214240] Write of size 1 at addr ffff0008050620eb by task kunit_try_catch/241
[   41.221618] 
[   41.223104] CPU: 3 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   41.223157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.223173] Hardware name: WinLink E850-96 board (DT)
[   41.223191] Call trace:
[   41.223205]  show_stack+0x20/0x38 (C)
[   41.223238]  dump_stack_lvl+0x8c/0xd0
[   41.223273]  print_report+0x118/0x5d0
[   41.223303]  kasan_report+0xdc/0x128
[   41.223328]  __asan_report_store1_noabort+0x20/0x30
[   41.223362]  krealloc_more_oob_helper+0x60c/0x678
[   41.223394]  krealloc_large_more_oob+0x20/0x38
[   41.223424]  kunit_try_run_case+0x170/0x3f0
[   41.223455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.223490]  kthread+0x328/0x630
[   41.223516]  ret_from_fork+0x10/0x20
[   41.223549] 
[   41.292193] The buggy address belongs to the physical page:
[   41.297750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060
[   41.305733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.313373] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.320314] page_type: f8(unknown)
[   41.323712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.331432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.339160] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.346970] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.354783] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff
[   41.362595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.370403] page dumped because: kasan: bad access detected
[   41.375956] 
[   41.377431] Memory state around the buggy address:
[   41.382216]  ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.389414]  ffff000805062000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.396621] >ffff000805062080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.403820]                                                           ^
[   41.410421]  ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.417626]  ffff000805062180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.424828] ==================================================================
[   41.432329] ==================================================================
[   41.439239] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   41.446790] Write of size 1 at addr ffff0008050620f0 by task kunit_try_catch/241
[   41.454166] 
[   41.455652] CPU: 3 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   41.455704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.455718] Hardware name: WinLink E850-96 board (DT)
[   41.455737] Call trace:
[   41.455750]  show_stack+0x20/0x38 (C)
[   41.455782]  dump_stack_lvl+0x8c/0xd0
[   41.455818]  print_report+0x118/0x5d0
[   41.455847]  kasan_report+0xdc/0x128
[   41.455871]  __asan_report_store1_noabort+0x20/0x30
[   41.455902]  krealloc_more_oob_helper+0x5c0/0x678
[   41.455934]  krealloc_large_more_oob+0x20/0x38
[   41.455966]  kunit_try_run_case+0x170/0x3f0
[   41.455996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.456029]  kthread+0x328/0x630
[   41.456061]  ret_from_fork+0x10/0x20
[   41.456092] 
[   41.524740] The buggy address belongs to the physical page:
[   41.530300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060
[   41.538282] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.545922] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.552863] page_type: f8(unknown)
[   41.556261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.563980] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.571707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.579518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.587331] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff
[   41.595143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.602952] page dumped because: kasan: bad access detected
[   41.608504] 
[   41.609980] Memory state around the buggy address:
[   41.614762]  ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.621963]  ffff000805062000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.629168] >ffff000805062080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.636369]                                                              ^
[   41.643230]  ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.650435]  ffff000805062180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.657636] ==================================================================
[   39.033478] ==================================================================
[   39.042577] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.050125] Write of size 1 at addr ffff0008050582eb by task kunit_try_catch/237
[   39.057501] 
[   39.058987] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   39.059043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.059058] Hardware name: WinLink E850-96 board (DT)
[   39.059079] Call trace:
[   39.059091]  show_stack+0x20/0x38 (C)
[   39.059125]  dump_stack_lvl+0x8c/0xd0
[   39.059159]  print_report+0x118/0x5d0
[   39.059186]  kasan_report+0xdc/0x128
[   39.059212]  __asan_report_store1_noabort+0x20/0x30
[   39.059245]  krealloc_more_oob_helper+0x60c/0x678
[   39.059278]  krealloc_more_oob+0x20/0x38
[   39.059309]  kunit_try_run_case+0x170/0x3f0
[   39.059340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.059374]  kthread+0x328/0x630
[   39.059402]  ret_from_fork+0x10/0x20
[   39.059436] 
[   39.127554] Allocated by task 237:
[   39.130941]  kasan_save_stack+0x3c/0x68
[   39.134757]  kasan_save_track+0x20/0x40
[   39.138576]  kasan_save_alloc_info+0x40/0x58
[   39.142830]  __kasan_krealloc+0x118/0x178
[   39.146824]  krealloc_noprof+0x128/0x360
[   39.150729]  krealloc_more_oob_helper+0x168/0x678
[   39.155416]  krealloc_more_oob+0x20/0x38
[   39.159322]  kunit_try_run_case+0x170/0x3f0
[   39.163489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.168958]  kthread+0x328/0x630
[   39.172170]  ret_from_fork+0x10/0x20
[   39.175728] 
[   39.177207] The buggy address belongs to the object at ffff000805058200
[   39.177207]  which belongs to the cache kmalloc-256 of size 256
[   39.189707] The buggy address is located 0 bytes to the right of
[   39.189707]  allocated 235-byte region [ffff000805058200, ffff0008050582eb)
[   39.202637] 
[   39.204118] The buggy address belongs to the physical page:
[   39.209674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   39.217657] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.225297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.232240] page_type: f5(slab)
[   39.235375] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.243095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.250823] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.258633] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.266446] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   39.274258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.282065] page dumped because: kasan: bad access detected
[   39.287619] 
[   39.289094] Memory state around the buggy address:
[   39.293874]  ffff000805058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.301079]  ffff000805058200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.308282] >ffff000805058280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.315483]                                                           ^
[   39.322084]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.329289]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.336491] ==================================================================
[   39.343824] ==================================================================
[   39.350903] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   39.358453] Write of size 1 at addr ffff0008050582f0 by task kunit_try_catch/237
[   39.365829] 
[   39.367315] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   39.367369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.367384] Hardware name: WinLink E850-96 board (DT)
[   39.367404] Call trace:
[   39.367418]  show_stack+0x20/0x38 (C)
[   39.367451]  dump_stack_lvl+0x8c/0xd0
[   39.367485]  print_report+0x118/0x5d0
[   39.367512]  kasan_report+0xdc/0x128
[   39.367537]  __asan_report_store1_noabort+0x20/0x30
[   39.367567]  krealloc_more_oob_helper+0x5c0/0x678
[   39.367600]  krealloc_more_oob+0x20/0x38
[   39.367629]  kunit_try_run_case+0x170/0x3f0
[   39.367657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.367690]  kthread+0x328/0x630
[   39.367714]  ret_from_fork+0x10/0x20
[   39.367745] 
[   39.435881] Allocated by task 237:
[   39.439268]  kasan_save_stack+0x3c/0x68
[   39.443086]  kasan_save_track+0x20/0x40
[   39.446905]  kasan_save_alloc_info+0x40/0x58
[   39.451159]  __kasan_krealloc+0x118/0x178
[   39.455152]  krealloc_noprof+0x128/0x360
[   39.459058]  krealloc_more_oob_helper+0x168/0x678
[   39.463745]  krealloc_more_oob+0x20/0x38
[   39.467651]  kunit_try_run_case+0x170/0x3f0
[   39.471818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.477286]  kthread+0x328/0x630
[   39.480498]  ret_from_fork+0x10/0x20
[   39.484057] 
[   39.485534] The buggy address belongs to the object at ffff000805058200
[   39.485534]  which belongs to the cache kmalloc-256 of size 256
[   39.498033] The buggy address is located 5 bytes to the right of
[   39.498033]  allocated 235-byte region [ffff000805058200, ffff0008050582eb)
[   39.510966] 
[   39.512444] The buggy address belongs to the physical page:
[   39.518001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   39.525987] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.533623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.540568] page_type: f5(slab)
[   39.543702] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.551424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.559150] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.566962] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.574775] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   39.582586] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.590392] page dumped because: kasan: bad access detected
[   39.595948] 
[   39.597423] Memory state around the buggy address:
[   39.602204]  ffff000805058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.609406]  ffff000805058200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.616611] >ffff000805058280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.623812]                                                              ^
[   39.630673]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.637878]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.645079] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   38.841736] ==================================================================
[   38.856032] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   38.862366] Read of size 1 at addr ffff0008084c0000 by task kunit_try_catch/235
[   38.869659] 
[   38.871144] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   38.871202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.871220] Hardware name: WinLink E850-96 board (DT)
[   38.871242] Call trace:
[   38.871254]  show_stack+0x20/0x38 (C)
[   38.871292]  dump_stack_lvl+0x8c/0xd0
[   38.871327]  print_report+0x118/0x5d0
[   38.871356]  kasan_report+0xdc/0x128
[   38.871380]  __asan_report_load1_noabort+0x20/0x30
[   38.871412]  page_alloc_uaf+0x328/0x350
[   38.871443]  kunit_try_run_case+0x170/0x3f0
[   38.871475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.871511]  kthread+0x328/0x630
[   38.871542]  ret_from_fork+0x10/0x20
[   38.871576] 
[   38.934851] The buggy address belongs to the physical page:
[   38.940407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884c0
[   38.948390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.954901] page_type: f0(buddy)
[   38.958122] raw: 0bfffe0000000000 ffff00087f61bd70 ffff00087f61bd70 0000000000000000
[   38.965842] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   38.973563] page dumped because: kasan: bad access detected
[   38.979117] 
[   38.980592] Memory state around the buggy address:
[   38.985373]  ffff0008084bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.992576]  ffff0008084bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.999782] >ffff0008084c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.006981]                    ^
[   39.010196]  ffff0008084c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.017401]  ffff0008084c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.024604] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   38.191889] ==================================================================
[   38.201443] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   38.208905] Write of size 1 at addr ffff00080506200a by task kunit_try_catch/227
[   38.216281] 
[   38.217768] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   38.217823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.217841] Hardware name: WinLink E850-96 board (DT)
[   38.217861] Call trace:
[   38.217877]  show_stack+0x20/0x38 (C)
[   38.217912]  dump_stack_lvl+0x8c/0xd0
[   38.217946]  print_report+0x118/0x5d0
[   38.217974]  kasan_report+0xdc/0x128
[   38.218001]  __asan_report_store1_noabort+0x20/0x30
[   38.218032]  kmalloc_large_oob_right+0x278/0x2b8
[   38.218063]  kunit_try_run_case+0x170/0x3f0
[   38.218093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.218129]  kthread+0x328/0x630
[   38.218157]  ret_from_fork+0x10/0x20
[   38.218193] 
[   38.282343] The buggy address belongs to the physical page:
[   38.287899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060
[   38.295883] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.303523] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.310465] page_type: f8(unknown)
[   38.313862] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.321581] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.329309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.337119] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   38.344932] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff
[   38.352744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.360551] page dumped because: kasan: bad access detected
[   38.366105] 
[   38.367581] Memory state around the buggy address:
[   38.372362]  ffff000805061f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.379564]  ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.386768] >ffff000805062000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.393969]                       ^
[   38.397445]  ffff000805062080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.404650]  ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.411853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   37.889910] ==================================================================
[   37.900671] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   37.907954] Write of size 1 at addr ffff000808119f00 by task kunit_try_catch/225
[   37.915331] 
[   37.916817] CPU: 2 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   37.916875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.916891] Hardware name: WinLink E850-96 board (DT)
[   37.916911] Call trace:
[   37.916924]  show_stack+0x20/0x38 (C)
[   37.916959]  dump_stack_lvl+0x8c/0xd0
[   37.916993]  print_report+0x118/0x5d0
[   37.917021]  kasan_report+0xdc/0x128
[   37.917046]  __asan_report_store1_noabort+0x20/0x30
[   37.917077]  kmalloc_big_oob_right+0x2a4/0x2f0
[   37.917107]  kunit_try_run_case+0x170/0x3f0
[   37.917141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.917175]  kthread+0x328/0x630
[   37.917202]  ret_from_fork+0x10/0x20
[   37.917236] 
[   37.981217] Allocated by task 225:
[   37.984603]  kasan_save_stack+0x3c/0x68
[   37.988420]  kasan_save_track+0x20/0x40
[   37.992239]  kasan_save_alloc_info+0x40/0x58
[   37.996492]  __kasan_kmalloc+0xd4/0xd8
[   38.000226]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.004739]  kmalloc_big_oob_right+0xb8/0x2f0
[   38.009079]  kunit_try_run_case+0x170/0x3f0
[   38.013246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.018715]  kthread+0x328/0x630
[   38.021927]  ret_from_fork+0x10/0x20
[   38.025486] 
[   38.026964] The buggy address belongs to the object at ffff000808118000
[   38.026964]  which belongs to the cache kmalloc-8k of size 8192
[   38.039463] The buggy address is located 0 bytes to the right of
[   38.039463]  allocated 7936-byte region [ffff000808118000, ffff000808119f00)
[   38.052481] 
[   38.053961] The buggy address belongs to the physical page:
[   38.059517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888118
[   38.067500] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.075141] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.082083] page_type: f5(slab)
[   38.085221] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   38.092939] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   38.100668] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   38.108477] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   38.116290] head: 0bfffe0000000003 fffffdffe0204601 00000000ffffffff 00000000ffffffff
[   38.124102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   38.131907] page dumped because: kasan: bad access detected
[   38.137463] 
[   38.138938] Memory state around the buggy address:
[   38.143721]  ffff000808119e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.150921]  ffff000808119e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.158126] >ffff000808119f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.165327]                    ^
[   38.168542]  ffff000808119f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.175748]  ffff00080811a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.182948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   37.421278] ==================================================================
[   37.430881] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   37.438952] Write of size 1 at addr ffff000801adde78 by task kunit_try_catch/223
[   37.446327] 
[   37.447814] CPU: 3 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   37.447872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.447889] Hardware name: WinLink E850-96 board (DT)
[   37.447910] Call trace:
[   37.447923]  show_stack+0x20/0x38 (C)
[   37.447956]  dump_stack_lvl+0x8c/0xd0
[   37.447990]  print_report+0x118/0x5d0
[   37.448019]  kasan_report+0xdc/0x128
[   37.448043]  __asan_report_store1_noabort+0x20/0x30
[   37.448076]  kmalloc_track_caller_oob_right+0x40c/0x488
[   37.448110]  kunit_try_run_case+0x170/0x3f0
[   37.448140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.448175]  kthread+0x328/0x630
[   37.448203]  ret_from_fork+0x10/0x20
[   37.448237] 
[   37.512994] Allocated by task 223:
[   37.516381]  kasan_save_stack+0x3c/0x68
[   37.520199]  kasan_save_track+0x20/0x40
[   37.524017]  kasan_save_alloc_info+0x40/0x58
[   37.528271]  __kasan_kmalloc+0xd4/0xd8
[   37.532003]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   37.537559]  kmalloc_track_caller_oob_right+0xa8/0x488
[   37.542680]  kunit_try_run_case+0x170/0x3f0
[   37.546847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.552315]  kthread+0x328/0x630
[   37.555527]  ret_from_fork+0x10/0x20
[   37.559086] 
[   37.560563] The buggy address belongs to the object at ffff000801adde00
[   37.560563]  which belongs to the cache kmalloc-128 of size 128
[   37.573063] The buggy address is located 0 bytes to the right of
[   37.573063]  allocated 120-byte region [ffff000801adde00, ffff000801adde78)
[   37.585995] 
[   37.587474] The buggy address belongs to the physical page:
[   37.593033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc
[   37.601014] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.608655] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.615597] page_type: f5(slab)
[   37.618734] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.626453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.634181] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.641991] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.649804] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff
[   37.657616] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.665424] page dumped because: kasan: bad access detected
[   37.670976] 
[   37.672452] Memory state around the buggy address:
[   37.677232]  ffff000801addd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.684435]  ffff000801addd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.691641] >ffff000801adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.698841]                                                                 ^
[   37.705963]  ffff000801adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.713167]  ffff000801addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.720370] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   37.120237] ==================================================================
[   37.129501] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   37.136872] Read of size 1 at addr ffff0008080fd000 by task kunit_try_catch/221
[   37.144162] 
[   37.145649] CPU: 2 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   37.145706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.145723] Hardware name: WinLink E850-96 board (DT)
[   37.145743] Call trace:
[   37.145757]  show_stack+0x20/0x38 (C)
[   37.145794]  dump_stack_lvl+0x8c/0xd0
[   37.145826]  print_report+0x118/0x5d0
[   37.145854]  kasan_report+0xdc/0x128
[   37.145880]  __asan_report_load1_noabort+0x20/0x30
[   37.145913]  kmalloc_node_oob_right+0x2f4/0x330
[   37.145944]  kunit_try_run_case+0x170/0x3f0
[   37.145974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.146009]  kthread+0x328/0x630
[   37.146037]  ret_from_fork+0x10/0x20
[   37.146070] 
[   37.210047] Allocated by task 221:
[   37.213435]  kasan_save_stack+0x3c/0x68
[   37.217251]  kasan_save_track+0x20/0x40
[   37.221071]  kasan_save_alloc_info+0x40/0x58
[   37.225324]  __kasan_kmalloc+0xd4/0xd8
[   37.229056]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   37.234004]  kmalloc_node_oob_right+0xbc/0x330
[   37.238431]  kunit_try_run_case+0x170/0x3f0
[   37.242598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.248066]  kthread+0x328/0x630
[   37.251278]  ret_from_fork+0x10/0x20
[   37.254837] 
[   37.256315] The buggy address belongs to the object at ffff0008080fc000
[   37.256315]  which belongs to the cache kmalloc-4k of size 4096
[   37.268816] The buggy address is located 0 bytes to the right of
[   37.268816]  allocated 4096-byte region [ffff0008080fc000, ffff0008080fd000)
[   37.281833] 
[   37.283312] The buggy address belongs to the physical page:
[   37.288870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8880f8
[   37.296852] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.304493] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.311435] page_type: f5(slab)
[   37.314572] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   37.322291] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   37.330019] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   37.337828] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   37.345642] head: 0bfffe0000000003 fffffdffe0203e01 00000000ffffffff 00000000ffffffff
[   37.353453] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   37.361260] page dumped because: kasan: bad access detected
[   37.366815] 
[   37.368290] Memory state around the buggy address:
[   37.373072]  ffff0008080fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.380273]  ffff0008080fcf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.387479] >ffff0008080fd000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.394679]                    ^
[   37.397894]  ffff0008080fd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.405099]  ffff0008080fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.412301] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   36.849810] ==================================================================
[   36.858927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   36.865785] Read of size 1 at addr ffff0008027546ff by task kunit_try_catch/219
[   36.873073] 
[   36.874559] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.874612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.874630] Hardware name: WinLink E850-96 board (DT)
[   36.874649] Call trace:
[   36.874666]  show_stack+0x20/0x38 (C)
[   36.874701]  dump_stack_lvl+0x8c/0xd0
[   36.874737]  print_report+0x118/0x5d0
[   36.874766]  kasan_report+0xdc/0x128
[   36.874792]  __asan_report_load1_noabort+0x20/0x30
[   36.874826]  kmalloc_oob_left+0x2ec/0x320
[   36.874855]  kunit_try_run_case+0x170/0x3f0
[   36.874886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.874919]  kthread+0x328/0x630
[   36.874949]  ret_from_fork+0x10/0x20
[   36.874985] 
[   36.938436] Allocated by task 35:
[   36.941738]  kasan_save_stack+0x3c/0x68
[   36.945554]  kasan_save_track+0x20/0x40
[   36.949373]  kasan_save_alloc_info+0x40/0x58
[   36.953626]  __kasan_kmalloc+0xd4/0xd8
[   36.957359]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   36.962914]  kvasprintf+0xe0/0x180
[   36.966300]  __kthread_create_on_node+0x16c/0x350
[   36.970987]  kthread_create_on_node+0xe4/0x130
[   36.975414]  create_worker+0x380/0x6b8
[   36.979147]  worker_thread+0x808/0xf38
[   36.982879]  kthread+0x328/0x630
[   36.986091]  ret_from_fork+0x10/0x20
[   36.989650] 
[   36.991128] The buggy address belongs to the object at ffff0008027546e0
[   36.991128]  which belongs to the cache kmalloc-16 of size 16
[   37.003454] The buggy address is located 18 bytes to the right of
[   37.003454]  allocated 13-byte region [ffff0008027546e0, ffff0008027546ed)
[   37.016386] 
[   37.017865] The buggy address belongs to the physical page:
[   37.023423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882754
[   37.031405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.037915] page_type: f5(slab)
[   37.041052] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   37.048770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   37.056491] page dumped because: kasan: bad access detected
[   37.062045] 
[   37.063520] Memory state around the buggy address:
[   37.068301]  ffff000802754580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.075506]  ffff000802754600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   37.082708] >ffff000802754680: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   37.089909]                                                                 ^
[   37.097031]  ffff000802754700: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.104235]  ffff000802754780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.111437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   35.950369] ==================================================================
[   35.956948] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.963887] Write of size 1 at addr ffff000801889d73 by task kunit_try_catch/217
[   35.971264] 
[   35.972750] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   35.972800] Tainted: [N]=TEST
[   35.972813] Hardware name: WinLink E850-96 board (DT)
[   35.972837] Call trace:
[   35.972851]  show_stack+0x20/0x38 (C)
[   35.972886]  dump_stack_lvl+0x8c/0xd0
[   35.972921]  print_report+0x118/0x5d0
[   35.972948]  kasan_report+0xdc/0x128
[   35.972973]  __asan_report_store1_noabort+0x20/0x30
[   35.973006]  kmalloc_oob_right+0x5a4/0x660
[   35.973039]  kunit_try_run_case+0x170/0x3f0
[   35.973070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.973105]  kthread+0x328/0x630
[   35.973133]  ret_from_fork+0x10/0x20
[   35.973168] 
[   36.035586] Allocated by task 217:
[   36.038974]  kasan_save_stack+0x3c/0x68
[   36.042789]  kasan_save_track+0x20/0x40
[   36.046609]  kasan_save_alloc_info+0x40/0x58
[   36.050862]  __kasan_kmalloc+0xd4/0xd8
[   36.054595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.059109]  kmalloc_oob_right+0xb0/0x660
[   36.063102]  kunit_try_run_case+0x170/0x3f0
[   36.067268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.072737]  kthread+0x328/0x630
[   36.075949]  ret_from_fork+0x10/0x20
[   36.079507] 
[   36.080985] The buggy address belongs to the object at ffff000801889d00
[   36.080985]  which belongs to the cache kmalloc-128 of size 128
[   36.093487] The buggy address is located 0 bytes to the right of
[   36.093487]  allocated 115-byte region [ffff000801889d00, ffff000801889d73)
[   36.106417] 
[   36.107896] The buggy address belongs to the physical page:
[   36.113454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   36.121438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.129075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.136019] page_type: f5(slab)
[   36.139155] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.146875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.154603] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.162412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.170225] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   36.178038] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.185844] page dumped because: kasan: bad access detected
[   36.191398] 
[   36.192874] Memory state around the buggy address:
[   36.197654]  ffff000801889c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.204858]  ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.212062] >ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.219263]                                                              ^
[   36.226124]  ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.233330]  ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.240531] ==================================================================
[   36.253106] ==================================================================
[   36.260241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   36.267179] Write of size 1 at addr ffff000801889d78 by task kunit_try_catch/217
[   36.274557] 
[   36.276043] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.276099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.276117] Hardware name: WinLink E850-96 board (DT)
[   36.276135] Call trace:
[   36.276148]  show_stack+0x20/0x38 (C)
[   36.276182]  dump_stack_lvl+0x8c/0xd0
[   36.276216]  print_report+0x118/0x5d0
[   36.276243]  kasan_report+0xdc/0x128
[   36.276268]  __asan_report_store1_noabort+0x20/0x30
[   36.276300]  kmalloc_oob_right+0x538/0x660
[   36.276329]  kunit_try_run_case+0x170/0x3f0
[   36.276358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.276392]  kthread+0x328/0x630
[   36.276420]  ret_from_fork+0x10/0x20
[   36.276453] 
[   36.340095] Allocated by task 217:
[   36.343483]  kasan_save_stack+0x3c/0x68
[   36.347299]  kasan_save_track+0x20/0x40
[   36.351118]  kasan_save_alloc_info+0x40/0x58
[   36.355371]  __kasan_kmalloc+0xd4/0xd8
[   36.359104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.363618]  kmalloc_oob_right+0xb0/0x660
[   36.367611]  kunit_try_run_case+0x170/0x3f0
[   36.371778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.377246]  kthread+0x328/0x630
[   36.380458]  ret_from_fork+0x10/0x20
[   36.384017] 
[   36.385494] The buggy address belongs to the object at ffff000801889d00
[   36.385494]  which belongs to the cache kmalloc-128 of size 128
[   36.397994] The buggy address is located 5 bytes to the right of
[   36.397994]  allocated 115-byte region [ffff000801889d00, ffff000801889d73)
[   36.410926] 
[   36.412405] The buggy address belongs to the physical page:
[   36.417962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   36.425943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.433584] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.440528] page_type: f5(slab)
[   36.443662] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.451384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.459110] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.466922] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.474734] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   36.482546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.490352] page dumped because: kasan: bad access detected
[   36.495908] 
[   36.497383] Memory state around the buggy address:
[   36.502161]  ffff000801889c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.509366]  ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.516571] >ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.523772]                                                                 ^
[   36.530894]  ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.538100]  ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.545299] ==================================================================
[   36.552714] ==================================================================
[   36.559712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   36.566655] Read of size 1 at addr ffff000801889d80 by task kunit_try_catch/217
[   36.573945] 
[   36.575429] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   36.575486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.575503] Hardware name: WinLink E850-96 board (DT)
[   36.575520] Call trace:
[   36.575534]  show_stack+0x20/0x38 (C)
[   36.575565]  dump_stack_lvl+0x8c/0xd0
[   36.575602]  print_report+0x118/0x5d0
[   36.575630]  kasan_report+0xdc/0x128
[   36.575654]  __asan_report_load1_noabort+0x20/0x30
[   36.575684]  kmalloc_oob_right+0x5d0/0x660
[   36.575715]  kunit_try_run_case+0x170/0x3f0
[   36.575746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.575779]  kthread+0x328/0x630
[   36.575804]  ret_from_fork+0x10/0x20
[   36.575837] 
[   36.639397] Allocated by task 217:
[   36.642783]  kasan_save_stack+0x3c/0x68
[   36.646600]  kasan_save_track+0x20/0x40
[   36.650419]  kasan_save_alloc_info+0x40/0x58
[   36.654673]  __kasan_kmalloc+0xd4/0xd8
[   36.658405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.662919]  kmalloc_oob_right+0xb0/0x660
[   36.666912]  kunit_try_run_case+0x170/0x3f0
[   36.671079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.676548]  kthread+0x328/0x630
[   36.679759]  ret_from_fork+0x10/0x20
[   36.683318] 
[   36.684795] The buggy address belongs to the object at ffff000801889d00
[   36.684795]  which belongs to the cache kmalloc-128 of size 128
[   36.697294] The buggy address is located 13 bytes to the right of
[   36.697294]  allocated 115-byte region [ffff000801889d00, ffff000801889d73)
[   36.710314] 
[   36.711793] The buggy address belongs to the physical page:
[   36.717349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888
[   36.725331] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.732973] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.739916] page_type: f5(slab)
[   36.743050] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.750772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.758498] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.766309] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.774123] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff
[   36.781934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.789740] page dumped because: kasan: bad access detected
[   36.795295] 
[   36.796771] Memory state around the buggy address:
[   36.801549]  ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.808754]  ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.815959] >ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.823160]                    ^
[   36.826376]  ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.833580]  ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.840781] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------
[  183.536592] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#3: kunit_try_catch/739
[  183.545097] Modules linked in:
[  183.548144] CPU: 3 UID: 0 PID: 739 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  183.559257] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  183.565061] Hardware name: WinLink E850-96 board (DT)
[  183.570098] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  183.577038] pc : intlog10+0x38/0x48
[  183.580511] lr : intlog10_test+0xe4/0x200
[  183.584503] sp : ffff80008af07c10
[  183.587802] x29: ffff80008af07c90 x28: 0000000000000000 x27: 0000000000000000
[  183.594920] x26: 1fffe001004e6101 x25: 0000000000000000 x24: ffff80008af07ce0
[  183.602038] x23: ffff80008af07d00 x22: 0000000000000000 x21: 1ffff000115e0f82
[  183.609156] x20: ffff800083c30220 x19: ffff800087d17990 x18: 000000009ee89b57
[  183.616274] x17: 0000000000000001 x16: ffff00085af83da8 x15: 000000002a2b7ef7
[  183.623391] x14: 0000000065e19d21 x13: 1fffe0010102e104 x12: ffff700010f64589
[  183.630510] x11: 1ffff00010f64588 x10: ffff700010f64588 x9 : ffff800081251af4
[  183.637627] x8 : ffff800087b22c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  183.644745] x5 : ffff7000115e0f82 x4 : 1ffff00010fa2f3b x3 : 1ffff00010786044
[  183.651863] x2 : 1ffff00010786044 x1 : 0000000000000003 x0 : 0000000000000000
[  183.658983] Call trace:
[  183.661415]  intlog10+0x38/0x48 (P)
[  183.664886]  kunit_try_run_case+0x170/0x3f0
[  183.669052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  183.674520]  kthread+0x328/0x630
[  183.677733]  ret_from_fork+0x10/0x20
[  183.681295] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------
[  183.331905] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#6: kunit_try_catch/721
[  183.340239] Modules linked in:
[  183.343287] CPU: 6 UID: 0 PID: 721 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[  183.354400] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  183.359335] Hardware name: WinLink E850-96 board (DT)
[  183.364372] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  183.371312] pc : intlog2+0xd8/0xf8
[  183.374700] lr : intlog2_test+0xe4/0x200
[  183.378604] sp : ffff80008ade7c10
[  183.381902] x29: ffff80008ade7c90 x28: 0000000000000000 x27: 0000000000000000
[  183.389020] x26: 1fffe0010094b2c1 x25: 0000000000000000 x24: ffff80008ade7ce0
[  183.396140] x23: ffff80008ade7d00 x22: 0000000000000000 x21: 1ffff000115bcf82
[  183.403256] x20: ffff800083c30120 x19: ffff800087d17990 x18: 000000006c55860b
[  183.410374] x17: 0000000000000000 x16: ffff00085afe9da8 x15: 0000000000000000
[  183.417492] x14: 00000000f1f1f1f1 x13: 1fffe0010102e084 x12: ffff700010f64589
[  183.424610] x11: 1ffff00010f64588 x10: ffff700010f64588 x9 : ffff800081251cf4
[  183.431728] x8 : ffff800087b22c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  183.438846] x5 : ffff7000115bcf82 x4 : 1ffff00010fa2f3b x3 : 1ffff00010786024
[  183.445964] x2 : 1ffff00010786024 x1 : 0000000000000003 x0 : 0000000000000000
[  183.453083] Call trace:
[  183.455516]  intlog2+0xd8/0xf8 (P)
[  183.458901]  kunit_try_run_case+0x170/0x3f0
[  183.463064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  183.468534]  kthread+0x328/0x630
[  183.471746]  ret_from_fork+0x10/0x20
[  183.475307] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)