Hay
Date
April 20, 2025, 11:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   20.855668] ==================================================================
[   20.856747] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   20.857459] Write of size 1 at addr ffff00000d73600a by task kunit_try_catch/200
[   20.858143] 
[   20.858308] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.858358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.858372] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.858390] Call trace:
[   20.858401]  show_stack+0x20/0x38 (C)
[   20.858434]  dump_stack_lvl+0x8c/0xd0
[   20.858465]  print_report+0x118/0x608
[   20.858495]  kasan_report+0xdc/0x128
[   20.858522]  __asan_report_store1_noabort+0x20/0x30
[   20.858556]  kmalloc_large_oob_right+0x278/0x2b8
[   20.858591]  kunit_try_run_case+0x170/0x3f0
[   20.858626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.858665]  kthread+0x328/0x630
[   20.858699]  ret_from_fork+0x10/0x20
[   20.858731] 
[   20.864361] The buggy address belongs to the physical page:
[   20.864878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734
[   20.865601] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.866306] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.866957] page_type: f8(unknown)
[   20.867293] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.868008] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.868722] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.869444] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.870167] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff
[   20.870890] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.871604] page dumped because: kasan: bad access detected
[   20.872118] 
[   20.872271] Memory state around the buggy address:
[   20.872719]  ffff00000d735f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.873384]  ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.874049] >ffff00000d736000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.874710]                       ^
[   20.875045]  ffff00000d736080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.875710]  ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.876371] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   21.524925] ==================================================================
[   21.525977] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   21.526680] Write of size 8 at addr ffff0000015aae71 by task kunit_try_catch/230
[   21.527367] 
[   21.527532] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.527584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.527598] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.527616] Call trace:
[   21.527627]  show_stack+0x20/0x38 (C)
[   21.527662]  dump_stack_lvl+0x8c/0xd0
[   21.527693]  print_report+0x118/0x608
[   21.527722]  kasan_report+0xdc/0x128
[   21.527750]  kasan_check_range+0x100/0x1a8
[   21.527781]  __asan_memset+0x34/0x78
[   21.527811]  kmalloc_oob_memset_8+0x150/0x2f8
[   21.527845]  kunit_try_run_case+0x170/0x3f0
[   21.527880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.527920]  kthread+0x328/0x630
[   21.527954]  ret_from_fork+0x10/0x20
[   21.527987] 
[   21.533842] Allocated by task 230:
[   21.534168]  kasan_save_stack+0x3c/0x68
[   21.534542]  kasan_save_track+0x20/0x40
[   21.534913]  kasan_save_alloc_info+0x40/0x58
[   21.535325]  __kasan_kmalloc+0xd4/0xd8
[   21.535689]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.536129]  kmalloc_oob_memset_8+0xb0/0x2f8
[   21.536545]  kunit_try_run_case+0x170/0x3f0
[   21.536952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.537476]  kthread+0x328/0x630
[   21.537799]  ret_from_fork+0x10/0x20
[   21.538149] 
[   21.538302] The buggy address belongs to the object at ffff0000015aae00
[   21.538302]  which belongs to the cache kmalloc-128 of size 128
[   21.539436] The buggy address is located 113 bytes inside of
[   21.539436]  allocated 120-byte region [ffff0000015aae00, ffff0000015aae78)
[   21.540580] 
[   21.540734] The buggy address belongs to the physical page:
[   21.541251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15aa
[   21.541977] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.542590] page_type: f5(slab)
[   21.542904] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.543620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.544327] page dumped because: kasan: bad access detected
[   21.544842] 
[   21.544995] Memory state around the buggy address:
[   21.545444]  ffff0000015aad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.546110]  ffff0000015aad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.546777] >ffff0000015aae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.547439]                                                                 ^
[   21.548095]  ffff0000015aae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.548761]  ffff0000015aaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.549423] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   21.497493] ==================================================================
[   21.498571] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   21.499261] Write of size 4 at addr ffff00000df93575 by task kunit_try_catch/228
[   21.499945] 
[   21.500110] CPU: 2 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.500158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.500172] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.500189] Call trace:
[   21.500201]  show_stack+0x20/0x38 (C)
[   21.500234]  dump_stack_lvl+0x8c/0xd0
[   21.500265]  print_report+0x118/0x608
[   21.500294]  kasan_report+0xdc/0x128
[   21.500321]  kasan_check_range+0x100/0x1a8
[   21.500352]  __asan_memset+0x34/0x78
[   21.500382]  kmalloc_oob_memset_4+0x150/0x300
[   21.500416]  kunit_try_run_case+0x170/0x3f0
[   21.500451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.500490]  kthread+0x328/0x630
[   21.500524]  ret_from_fork+0x10/0x20
[   21.500556] 
[   21.506409] Allocated by task 228:
[   21.506735]  kasan_save_stack+0x3c/0x68
[   21.507108]  kasan_save_track+0x20/0x40
[   21.507479]  kasan_save_alloc_info+0x40/0x58
[   21.507892]  __kasan_kmalloc+0xd4/0xd8
[   21.508254]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.508695]  kmalloc_oob_memset_4+0xb0/0x300
[   21.509110]  kunit_try_run_case+0x170/0x3f0
[   21.509516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.510039]  kthread+0x328/0x630
[   21.510362]  ret_from_fork+0x10/0x20
[   21.510711] 
[   21.510866] The buggy address belongs to the object at ffff00000df93500
[   21.510866]  which belongs to the cache kmalloc-128 of size 128
[   21.511999] The buggy address is located 117 bytes inside of
[   21.511999]  allocated 120-byte region [ffff00000df93500, ffff00000df93578)
[   21.513143] 
[   21.513297] The buggy address belongs to the physical page:
[   21.513814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93
[   21.514541] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.515154] page_type: f5(slab)
[   21.515469] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.516184] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.516892] page dumped because: kasan: bad access detected
[   21.517408] 
[   21.517560] Memory state around the buggy address:
[   21.518009]  ffff00000df93400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.518677]  ffff00000df93480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.519344] >ffff00000df93500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.520006]                                                                 ^
[   21.520663]  ffff00000df93580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521329]  ffff00000df93600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521992] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   56.302299] ==================================================================
[   56.302996] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   56.302996] 
[   56.303770] Use-after-free read at 0x(____ptrval____) (in kfence-#155):
[   56.304379]  test_krealloc+0x51c/0x830
[   56.304739]  kunit_try_run_case+0x170/0x3f0
[   56.305141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.305658]  kthread+0x328/0x630
[   56.305978]  ret_from_fork+0x10/0x20
[   56.306324] 
[   56.306477] kfence-#155: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   56.306477] 
[   56.307349] allocated by task 391 on cpu 1 at 56.302204s (0.005143s ago):
[   56.307987]  test_alloc+0x29c/0x628
[   56.308322]  test_krealloc+0xc0/0x830
[   56.308673]  kunit_try_run_case+0x170/0x3f0
[   56.309072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.309587]  kthread+0x328/0x630
[   56.309903]  ret_from_fork+0x10/0x20
[   56.310247] 
[   56.310398] freed by task 391 on cpu 1 at 56.302235s (0.008160s ago):
[   56.311004]  krealloc_noprof+0x148/0x360
[   56.311376]  test_krealloc+0x1dc/0x830
[   56.311735]  kunit_try_run_case+0x170/0x3f0
[   56.312134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.312650]  kthread+0x328/0x630
[   56.312965]  ret_from_fork+0x10/0x20
[   56.313310] 
[   56.313471] CPU: 1 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   56.314380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.314768] Hardware name: Radxa ROCK Pi 4B (DT)
[   56.315196] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   56.233994] ==================================================================
[   56.234664] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   56.234664] 
[   56.235534] Use-after-free read at 0x(____ptrval____) (in kfence-#154):
[   56.236126]  test_memcache_typesafe_by_rcu+0x280/0x560
[   56.236592]  kunit_try_run_case+0x170/0x3f0
[   56.236979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.237477]  kthread+0x328/0x630
[   56.237780]  ret_from_fork+0x10/0x20
[   56.238111] 
[   56.238253] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   56.238253] 
[   56.239065] allocated by task 389 on cpu 5 at 56.197774s (0.041290s ago):
[   56.239679]  test_alloc+0x230/0x628
[   56.240000]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   56.240464]  kunit_try_run_case+0x170/0x3f0
[   56.240847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.241343]  kthread+0x328/0x630
[   56.241643]  ret_from_fork+0x10/0x20
[   56.241972] 
[   56.242112] freed by task 389 on cpu 5 at 56.202312s (0.039799s ago):
[   56.242694]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   56.243158]  kunit_try_run_case+0x170/0x3f0
[   56.243540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.244037]  kthread+0x328/0x630
[   56.244336]  ret_from_fork+0x10/0x20
[   56.244665] 
[   56.244812] CPU: 5 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   56.245698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.246070] Hardware name: Radxa ROCK Pi 4B (DT)
[   56.246480] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   33.012423] ==================================================================
[   33.013535] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   33.013535] 
[   33.014403] Invalid read at 0x(____ptrval____):
[   33.014849]  test_invalid_access+0xdc/0x1f0
[   33.015268]  kunit_try_run_case+0x170/0x3f0
[   33.015689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016225]  kthread+0x328/0x630
[   33.016563]  ret_from_fork+0x10/0x20
[   33.016925] 
[   33.017101] CPU: 0 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   33.018127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.018534] Hardware name: Radxa ROCK Pi 4B (DT)
[   33.018979] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   32.789981] ==================================================================
[   32.790651] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.790651] 
[   32.791498] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#150):
[   32.792398]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.792865]  kunit_try_run_case+0x170/0x3f0
[   32.793245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.793735]  kthread+0x328/0x630
[   32.794032]  ret_from_fork+0x10/0x20
[   32.794356] 
[   32.794494] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   32.794494] 
[   32.795344] allocated by task 379 on cpu 4 at 32.789927s (0.005417s ago):
[   32.795950]  test_alloc+0x29c/0x628
[   32.796264]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   32.796722]  kunit_try_run_case+0x170/0x3f0
[   32.797098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.797588]  kthread+0x328/0x630
[   32.797881]  ret_from_fork+0x10/0x20
[   32.798202] 
[   32.798341] freed by task 379 on cpu 4 at 32.789937s (0.008403s ago):
[   32.798917]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.799382]  kunit_try_run_case+0x170/0x3f0
[   32.799759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.800249]  kthread+0x328/0x630
[   32.800542]  ret_from_fork+0x10/0x20
[   32.800864] 
[   32.801009] CPU: 4 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   32.801887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.802259] Hardware name: Radxa ROCK Pi 4B (DT)
[   32.802669] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   32.581955] ==================================================================
[   32.582633] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   32.582633] 
[   32.583495] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#148):
[   32.584160]  test_kmalloc_aligned_oob_read+0x238/0x468
[   32.584621]  kunit_try_run_case+0x170/0x3f0
[   32.585002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.585494]  kthread+0x328/0x630
[   32.585792]  ret_from_fork+0x10/0x20
[   32.586117] 
[   32.586256] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   32.586256] 
[   32.587106] allocated by task 377 on cpu 4 at 32.581925s (0.005180s ago):
[   32.587714]  test_alloc+0x29c/0x628
[   32.588028]  test_kmalloc_aligned_oob_read+0x100/0x468
[   32.588486]  kunit_try_run_case+0x170/0x3f0
[   32.588862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.589352]  kthread+0x328/0x630
[   32.589645]  ret_from_fork+0x10/0x20
[   32.589968] 
[   32.590111] CPU: 4 UID: 0 PID: 377 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   32.590989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.591362] Hardware name: Radxa ROCK Pi 4B (DT)
[   32.591773] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   28.109930] ==================================================================
[   28.110599] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   28.110599] 
[   28.111332] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#105):
[   28.112233]  test_corruption+0x278/0x378
[   28.112587]  kunit_try_run_case+0x170/0x3f0
[   28.112967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.113457]  kthread+0x328/0x630
[   28.113754]  ret_from_fork+0x10/0x20
[   28.114079] 
[   28.114217] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   28.114217] 
[   28.115068] allocated by task 365 on cpu 4 at 28.109876s (0.005190s ago):
[   28.115673]  test_alloc+0x29c/0x628
[   28.115987]  test_corruption+0xdc/0x378
[   28.116332]  kunit_try_run_case+0x170/0x3f0
[   28.116708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.117198]  kthread+0x328/0x630
[   28.117491]  ret_from_fork+0x10/0x20
[   28.117814] 
[   28.117951] freed by task 365 on cpu 4 at 28.109885s (0.008064s ago):
[   28.118527]  test_corruption+0x278/0x378
[   28.118878]  kunit_try_run_case+0x170/0x3f0
[   28.119254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.119743]  kthread+0x328/0x630
[   28.120036]  ret_from_fork+0x10/0x20
[   28.120358] 
[   28.120501] CPU: 4 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   28.121379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.121752] Hardware name: Radxa ROCK Pi 4B (DT)
[   28.122162] ==================================================================
[   28.318030] ==================================================================
[   28.318696] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   28.318696] 
[   28.319432] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#107):
[   28.320340]  test_corruption+0x120/0x378
[   28.320696]  kunit_try_run_case+0x170/0x3f0
[   28.321078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.321572]  kthread+0x328/0x630
[   28.321871]  ret_from_fork+0x10/0x20
[   28.322197] 
[   28.322336] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   28.322336] 
[   28.323143] allocated by task 367 on cpu 4 at 28.317992s (0.005151s ago):
[   28.323751]  test_alloc+0x230/0x628
[   28.324068]  test_corruption+0xdc/0x378
[   28.324413]  kunit_try_run_case+0x170/0x3f0
[   28.324790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.325281]  kthread+0x328/0x630
[   28.325576]  ret_from_fork+0x10/0x20
[   28.325899] 
[   28.326038] freed by task 367 on cpu 4 at 28.318000s (0.008037s ago):
[   28.326616]  test_corruption+0x120/0x378
[   28.326969]  kunit_try_run_case+0x170/0x3f0
[   28.327346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.327837]  kthread+0x328/0x630
[   28.328131]  ret_from_fork+0x10/0x20
[   28.328455] 
[   28.328600] CPU: 4 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   28.329480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.329852] Hardware name: Radxa ROCK Pi 4B (DT)
[   28.330264] ==================================================================
[   28.213943] ==================================================================
[   28.214608] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   28.214608] 
[   28.215340] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#106):
[   28.215964]  test_corruption+0x284/0x378
[   28.216316]  kunit_try_run_case+0x170/0x3f0
[   28.216695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.217186]  kthread+0x328/0x630
[   28.217481]  ret_from_fork+0x10/0x20
[   28.217805] 
[   28.217943] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   28.217943] 
[   28.218792] allocated by task 365 on cpu 4 at 28.213893s (0.004898s ago):
[   28.219397]  test_alloc+0x29c/0x628
[   28.219711]  test_corruption+0x198/0x378
[   28.220062]  kunit_try_run_case+0x170/0x3f0
[   28.220438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.220928]  kthread+0x328/0x630
[   28.221220]  ret_from_fork+0x10/0x20
[   28.221543] 
[   28.221680] freed by task 365 on cpu 4 at 28.213903s (0.007776s ago):
[   28.222256]  test_corruption+0x284/0x378
[   28.222607]  kunit_try_run_case+0x170/0x3f0
[   28.222982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.223471]  kthread+0x328/0x630
[   28.223763]  ret_from_fork+0x10/0x20
[   28.224085] 
[   28.224228] CPU: 4 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   28.225106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.225478] Hardware name: Radxa ROCK Pi 4B (DT)
[   28.225888] ==================================================================
[   28.421941] ==================================================================
[   28.422611] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   28.422611] 
[   28.423343] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#108):
[   28.423966]  test_corruption+0x1d8/0x378
[   28.424319]  kunit_try_run_case+0x170/0x3f0
[   28.424699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.425190]  kthread+0x328/0x630
[   28.425487]  ret_from_fork+0x10/0x20
[   28.425812] 
[   28.425950] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   28.425950] 
[   28.426755] allocated by task 367 on cpu 4 at 28.421892s (0.004862s ago):
[   28.427359]  test_alloc+0x230/0x628
[   28.427672]  test_corruption+0x198/0x378
[   28.428024]  kunit_try_run_case+0x170/0x3f0
[   28.428399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.428890]  kthread+0x328/0x630
[   28.429183]  ret_from_fork+0x10/0x20
[   28.429504] 
[   28.429641] freed by task 367 on cpu 4 at 28.421901s (0.007739s ago):
[   28.430216]  test_corruption+0x1d8/0x378
[   28.430568]  kunit_try_run_case+0x170/0x3f0
[   28.430943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.431432]  kthread+0x328/0x630
[   28.431725]  ret_from_fork+0x10/0x20
[   28.432047] 
[   28.432189] CPU: 4 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   28.433068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.433439] Hardware name: Radxa ROCK Pi 4B (DT)
[   28.433849] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   27.486100] ==================================================================
[   27.486764] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   27.486764] 
[   27.487505] Invalid free of 0x(____ptrval____) (in kfence-#99):
[   27.488032]  test_invalid_addr_free+0xec/0x238
[   27.488431]  kunit_try_run_case+0x170/0x3f0
[   27.488811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.489303]  kthread+0x328/0x630
[   27.489601]  ret_from_fork+0x10/0x20
[   27.489925] 
[   27.490063] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   27.490063] 
[   27.490860] allocated by task 363 on cpu 4 at 27.486065s (0.004794s ago):
[   27.491464]  test_alloc+0x230/0x628
[   27.491777]  test_invalid_addr_free+0xd4/0x238
[   27.492175]  kunit_try_run_case+0x170/0x3f0
[   27.492551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.493041]  kthread+0x328/0x630
[   27.493335]  ret_from_fork+0x10/0x20
[   27.493657] 
[   27.493801] CPU: 4 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.494679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.495052] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.495462] ==================================================================
[   27.382040] ==================================================================
[   27.382709] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   27.382709] 
[   27.383466] Invalid free of 0x(____ptrval____) (in kfence-#98):
[   27.384000]  test_invalid_addr_free+0x1ac/0x238
[   27.384414]  kunit_try_run_case+0x170/0x3f0
[   27.384801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.385300]  kthread+0x328/0x630
[   27.385603]  ret_from_fork+0x10/0x20
[   27.385934] 
[   27.386076] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   27.386076] 
[   27.386927] allocated by task 361 on cpu 4 at 27.382002s (0.004923s ago):
[   27.387539]  test_alloc+0x29c/0x628
[   27.387860]  test_invalid_addr_free+0xd4/0x238
[   27.388264]  kunit_try_run_case+0x170/0x3f0
[   27.388647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.389144]  kthread+0x328/0x630
[   27.389444]  ret_from_fork+0x10/0x20
[   27.389772] 
[   27.389920] CPU: 4 UID: 0 PID: 361 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.390808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.391185] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.391601] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   27.174074] ==================================================================
[   27.174741] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   27.174741] 
[   27.175449] Invalid free of 0x(____ptrval____) (in kfence-#96):
[   27.175979]  test_double_free+0x1bc/0x238
[   27.176345]  kunit_try_run_case+0x170/0x3f0
[   27.176728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.177224]  kthread+0x328/0x630
[   27.177525]  ret_from_fork+0x10/0x20
[   27.177853] 
[   27.177994] kfence-#96: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   27.177994] 
[   27.178840] allocated by task 357 on cpu 4 at 27.174020s (0.004819s ago):
[   27.179451]  test_alloc+0x29c/0x628
[   27.179768]  test_double_free+0xd4/0x238
[   27.180124]  kunit_try_run_case+0x170/0x3f0
[   27.180503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.180996]  kthread+0x328/0x630
[   27.181295]  ret_from_fork+0x10/0x20
[   27.181619] 
[   27.181759] freed by task 357 on cpu 4 at 27.174029s (0.007729s ago):
[   27.182339]  test_double_free+0x1ac/0x238
[   27.182702]  kunit_try_run_case+0x170/0x3f0
[   27.183082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.183575]  kthread+0x328/0x630
[   27.183871]  ret_from_fork+0x10/0x20
[   27.184198] 
[   27.184344] CPU: 4 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.185227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.185602] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.186016] ==================================================================
[   27.278141] ==================================================================
[   27.278809] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   27.278809] 
[   27.279514] Invalid free of 0x(____ptrval____) (in kfence-#97):
[   27.280043]  test_double_free+0x100/0x238
[   27.280406]  kunit_try_run_case+0x170/0x3f0
[   27.280787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.281281]  kthread+0x328/0x630
[   27.281579]  ret_from_fork+0x10/0x20
[   27.281905] 
[   27.282044] kfence-#97: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   27.282044] 
[   27.282843] allocated by task 359 on cpu 4 at 27.278093s (0.004749s ago):
[   27.283450]  test_alloc+0x230/0x628
[   27.283766]  test_double_free+0xd4/0x238
[   27.284119]  kunit_try_run_case+0x170/0x3f0
[   27.284497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.284987]  kthread+0x328/0x630
[   27.285282]  ret_from_fork+0x10/0x20
[   27.285606] 
[   27.285746] freed by task 359 on cpu 4 at 27.278101s (0.007643s ago):
[   27.286322]  test_double_free+0xf0/0x238
[   27.286676]  kunit_try_run_case+0x170/0x3f0
[   27.287053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.287544]  kthread+0x328/0x630
[   27.287839]  ret_from_fork+0x10/0x20
[   27.288162] 
[   27.288307] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.289188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.289562] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.289973] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   26.758046] ==================================================================
[   26.758715] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.758715] 
[   26.759546] Use-after-free read at 0x(____ptrval____) (in kfence-#92):
[   26.760128]  test_use_after_free_read+0x114/0x248
[   26.760555]  kunit_try_run_case+0x170/0x3f0
[   26.760938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.761433]  kthread+0x328/0x630
[   26.761733]  ret_from_fork+0x10/0x20
[   26.762061] 
[   26.762201] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.762201] 
[   26.763047] allocated by task 349 on cpu 4 at 26.758006s (0.005040s ago):
[   26.763659]  test_alloc+0x29c/0x628
[   26.763978]  test_use_after_free_read+0xd0/0x248
[   26.764393]  kunit_try_run_case+0x170/0x3f0
[   26.764774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.765268]  kthread+0x328/0x630
[   26.765564]  ret_from_fork+0x10/0x20
[   26.765889] 
[   26.766030] freed by task 349 on cpu 4 at 26.758015s (0.008014s ago):
[   26.766612]  test_use_after_free_read+0x1c0/0x248
[   26.767035]  kunit_try_run_case+0x170/0x3f0
[   26.767415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.767907]  kthread+0x328/0x630
[   26.768205]  ret_from_fork+0x10/0x20
[   26.768531] 
[   26.768676] CPU: 4 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.769559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.769933] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.770346] ==================================================================
[   26.862109] ==================================================================
[   26.862774] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.862774] 
[   26.863603] Use-after-free read at 0x(____ptrval____) (in kfence-#93):
[   26.864184]  test_use_after_free_read+0x114/0x248
[   26.864606]  kunit_try_run_case+0x170/0x3f0
[   26.864987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.865479]  kthread+0x328/0x630
[   26.865776]  ret_from_fork+0x10/0x20
[   26.866100] 
[   26.866238] kfence-#93: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.866238] 
[   26.867035] allocated by task 351 on cpu 4 at 26.862070s (0.004964s ago):
[   26.867643]  test_alloc+0x230/0x628
[   26.867958]  test_use_after_free_read+0xd0/0x248
[   26.868370]  kunit_try_run_case+0x170/0x3f0
[   26.868746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.869236]  kthread+0x328/0x630
[   26.869529]  ret_from_fork+0x10/0x20
[   26.869851] 
[   26.869989] freed by task 351 on cpu 4 at 26.862078s (0.007910s ago):
[   26.870564]  test_use_after_free_read+0xf0/0x248
[   26.870977]  kunit_try_run_case+0x170/0x3f0
[   26.871352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.871842]  kthread+0x328/0x630
[   26.872135]  ret_from_fork+0x10/0x20
[   26.872457] 
[   26.872601] CPU: 4 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.873478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.873851] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.874261] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   26.550171] ==================================================================
[   26.550841] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   26.550841] 
[   26.551677] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#90):
[   26.552325]  test_out_of_bounds_write+0x100/0x240
[   26.552755]  kunit_try_run_case+0x170/0x3f0
[   26.553141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.553640]  kthread+0x328/0x630
[   26.553943]  ret_from_fork+0x10/0x20
[   26.554273] 
[   26.554415] kfence-#90: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.554415] 
[   26.555264] allocated by task 345 on cpu 4 at 26.550147s (0.005115s ago):
[   26.555878]  test_alloc+0x29c/0x628
[   26.556199]  test_out_of_bounds_write+0xc8/0x240
[   26.556616]  kunit_try_run_case+0x170/0x3f0
[   26.556999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.557496]  kthread+0x328/0x630
[   26.557796]  ret_from_fork+0x10/0x20
[   26.558124] 
[   26.558271] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.559159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.559535] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.559950] ==================================================================
[   26.654038] ==================================================================
[   26.654707] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   26.654707] 
[   26.655536] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#91):
[   26.656179]  test_out_of_bounds_write+0x100/0x240
[   26.656605]  kunit_try_run_case+0x170/0x3f0
[   26.656987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.657480]  kthread+0x328/0x630
[   26.657779]  ret_from_fork+0x10/0x20
[   26.658106] 
[   26.658245] kfence-#91: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.658245] 
[   26.659043] allocated by task 347 on cpu 4 at 26.654012s (0.005030s ago):
[   26.659654]  test_alloc+0x230/0x628
[   26.659970]  test_out_of_bounds_write+0xc8/0x240
[   26.660384]  kunit_try_run_case+0x170/0x3f0
[   26.660762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.661254]  kthread+0x328/0x630
[   26.661549]  ret_from_fork+0x10/0x20
[   26.661873] 
[   26.662017] CPU: 4 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.662898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.663270] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.663682] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   26.445934] ==================================================================
[   26.446607] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   26.446607] 
[   26.447418] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#89):
[   26.448067]  test_out_of_bounds_read+0x1c8/0x3e0
[   26.448480]  kunit_try_run_case+0x170/0x3f0
[   26.448863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.449354]  kthread+0x328/0x630
[   26.449651]  ret_from_fork+0x10/0x20
[   26.449975] 
[   26.450112] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.450112] 
[   26.450909] allocated by task 343 on cpu 4 at 26.445906s (0.005002s ago):
[   26.451517]  test_alloc+0x230/0x628
[   26.451831]  test_out_of_bounds_read+0x198/0x3e0
[   26.452243]  kunit_try_run_case+0x170/0x3f0
[   26.452618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.453109]  kthread+0x328/0x630
[   26.453402]  ret_from_fork+0x10/0x20
[   26.453725] 
[   26.453870] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.454748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.455118] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.455529] ==================================================================
[   26.237948] ==================================================================
[   26.238618] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   26.238618] 
[   26.239431] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#87):
[   26.240080]  test_out_of_bounds_read+0x1c8/0x3e0
[   26.240493]  kunit_try_run_case+0x170/0x3f0
[   26.240875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.241366]  kthread+0x328/0x630
[   26.241662]  ret_from_fork+0x10/0x20
[   26.241987] 
[   26.242125] kfence-#87: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.242125] 
[   26.242966] allocated by task 341 on cpu 4 at 26.237922s (0.005044s ago):
[   26.243573]  test_alloc+0x29c/0x628
[   26.243888]  test_out_of_bounds_read+0x198/0x3e0
[   26.244301]  kunit_try_run_case+0x170/0x3f0
[   26.244678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.245167]  kthread+0x328/0x630
[   26.245460]  ret_from_fork+0x10/0x20
[   26.245783] 
[   26.245925] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.246802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.247173] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.247584] ==================================================================
[   26.133947] ==================================================================
[   26.134627] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   26.134627] 
[   26.135440] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#86):
[   26.136075]  test_out_of_bounds_read+0x114/0x3e0
[   26.136490]  kunit_try_run_case+0x170/0x3f0
[   26.136871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.137362]  kthread+0x328/0x630
[   26.137660]  ret_from_fork+0x10/0x20
[   26.137985] 
[   26.138123] kfence-#86: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.138123] 
[   26.138966] allocated by task 341 on cpu 4 at 26.133918s (0.005047s ago):
[   26.139574]  test_alloc+0x29c/0x628
[   26.139889]  test_out_of_bounds_read+0xdc/0x3e0
[   26.140293]  kunit_try_run_case+0x170/0x3f0
[   26.140669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.141160]  kthread+0x328/0x630
[   26.141452]  ret_from_fork+0x10/0x20
[   26.141774] 
[   26.141918] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.142796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.143168] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.143578] ==================================================================
[   26.342121] ==================================================================
[   26.342791] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   26.342791] 
[   26.343606] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#88):
[   26.344241]  test_out_of_bounds_read+0x114/0x3e0
[   26.344657]  kunit_try_run_case+0x170/0x3f0
[   26.345037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.345530]  kthread+0x328/0x630
[   26.345828]  ret_from_fork+0x10/0x20
[   26.346155] 
[   26.346294] kfence-#88: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.346294] 
[   26.347093] allocated by task 343 on cpu 4 at 26.342095s (0.004997s ago):
[   26.347703]  test_alloc+0x230/0x628
[   26.348018]  test_out_of_bounds_read+0xdc/0x3e0
[   26.348423]  kunit_try_run_case+0x170/0x3f0
[   26.348801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.349291]  kthread+0x328/0x630
[   26.349586]  ret_from_fork+0x10/0x20
[   26.349909] 
[   26.350054] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.350934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.351308] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.351719] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   20.805606] ==================================================================
[   20.807692] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   20.807692] 
[   20.808569] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#55):
[   20.809555]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.810043]  kunit_try_run_case+0x170/0x3f0
[   20.810439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.810950]  kthread+0x328/0x630
[   20.811263]  ret_from_fork+0x10/0x20
[   20.811603] 
[   20.811750] kfence-#55: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   20.811750] 
[   20.812627] allocated by task 196 on cpu 3 at 20.805281s (0.007345s ago):
[   20.813255]  kmalloc_track_caller_oob_right+0x184/0x488
[   20.813742]  kunit_try_run_case+0x170/0x3f0
[   20.814136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.814647]  kthread+0x328/0x630
[   20.814957]  ret_from_fork+0x10/0x20
[   20.815296] 
[   20.815444] freed by task 196 on cpu 3 at 20.805566s (0.009876s ago):
[   20.816045]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.816533]  kunit_try_run_case+0x170/0x3f0
[   20.816925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.817433]  kthread+0x328/0x630
[   20.817743]  ret_from_fork+0x10/0x20
[   20.818081] 
[   20.818237] CPU: 3 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.819141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.819524] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.819948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[   96.316072] ==================================================================
[   96.317282] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[   96.318128] Read of size 12 at addr ffff800084d44de0 by task kunit_try_catch/3375
[   96.318816] 
[   96.318982] CPU: 1 UID: 0 PID: 3375 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT 
[   96.319028] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   96.319042] Hardware name: Radxa ROCK Pi 4B (DT)
[   96.319057] Call trace:
[   96.319068]  show_stack+0x20/0x38 (C)
[   96.319102]  dump_stack_lvl+0x8c/0xd0
[   96.319133]  print_report+0x310/0x608
[   96.319163]  kasan_report+0xdc/0x128
[   96.319191]  kasan_check_range+0x100/0x1a8
[   96.319221]  __asan_memcpy+0x3c/0x98
[   96.319251]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[   96.319283]  cs_dsp_mock_bin_add_info+0x18/0x30
[   96.319311]  bin_patch_name_and_info+0x168/0x6b0
[   96.319340]  kunit_try_run_case+0x170/0x3f0
[   96.319374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   96.319409]  kthread+0x328/0x630
[   96.319442]  ret_from_fork+0x10/0x20
[   96.319474] 
[   96.326438] The buggy address belongs to the variable:
[   96.326910]  __loc.0+0x2c0/0x3a0
[   96.327237] 
[   96.327404] The buggy address belongs to the virtual mapping at
[   96.327404]  [ffff800083a50000, ffff800085760000) created by:
[   96.327404]  paging_init+0x620/0x7d0
[   96.327670] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode.
[   96.328770] 
[   96.329436] dwmmc_rockchip fe310000.mmc: Using internal DMA controller.
[   96.329536] The buggy address belongs to the physical page:
[   96.330150] dwmmc_rockchip fe310000.mmc: Version ID is 270a
[   96.330613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7544
[   96.331141] dwmmc_rockchip fe310000.mmc: DW MMC controller at irq 49,32 bit host data width,256 deep fifo
[   96.331790] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   96.333285] raw: 03fffe0000002000 fffffdffc01d5108 fffffdffc01d5108 0000000000000000
[   96.333995] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   96.334695] page dumped because: kasan: bad access detected
[   96.335206] 
[   96.335359] Memory state around the buggy address:
[   96.335805]  ffff800084d44c80: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[   96.336465]  ffff800084d44d00: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[   96.337126] >ffff800084d44d80: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   96.337782]                                                           ^
[   96.338387]  ffff800084d44e00: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[   96.339047]  ffff800084d44e80: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[   96.339703] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   25.899034] ==================================================================
[   25.899689] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   25.900320] Write of size 1 at addr ffff0000101ea578 by task kunit_try_catch/339
[   25.900991] 
[   25.901139] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.901171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.901182] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.901192] Call trace:
[   25.901199]  show_stack+0x20/0x38 (C)
[   25.901220]  dump_stack_lvl+0x8c/0xd0
[   25.901239]  print_report+0x118/0x608
[   25.901259]  kasan_report+0xdc/0x128
[   25.901277]  __asan_report_store1_noabort+0x20/0x30
[   25.901300]  strncpy_from_user+0x270/0x2a0
[   25.901318]  copy_user_test_oob+0x5c0/0xec8
[   25.901337]  kunit_try_run_case+0x170/0x3f0
[   25.901359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.901385]  kthread+0x328/0x630
[   25.901407]  ret_from_fork+0x10/0x20
[   25.901428] 
[   25.907322] Allocated by task 339:
[   25.907637]  kasan_save_stack+0x3c/0x68
[   25.907996]  kasan_save_track+0x20/0x40
[   25.908354]  kasan_save_alloc_info+0x40/0x58
[   25.908753]  __kasan_kmalloc+0xd4/0xd8
[   25.909104]  __kmalloc_noprof+0x190/0x4d0
[   25.909479]  kunit_kmalloc_array+0x34/0x88
[   25.909864]  copy_user_test_oob+0xac/0xec8
[   25.910245]  kunit_try_run_case+0x170/0x3f0
[   25.910637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.911146]  kthread+0x328/0x630
[   25.911454]  ret_from_fork+0x10/0x20
[   25.911792] 
[   25.911939] The buggy address belongs to the object at ffff0000101ea500
[   25.911939]  which belongs to the cache kmalloc-128 of size 128
[   25.913053] The buggy address is located 0 bytes to the right of
[   25.913053]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.914210] 
[   25.914357] The buggy address belongs to the physical page:
[   25.914861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.915577] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.916171] page_type: f5(slab)
[   25.916469] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.917169] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.917864] page dumped because: kasan: bad access detected
[   25.918368] 
[   25.918513] Memory state around the buggy address:
[   25.918950]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.919603]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.920256] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.920906]                                                                 ^
[   25.921550]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.922203]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.922853] ==================================================================
[   25.874177] ==================================================================
[   25.874832] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   25.875459] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.876144] 
[   25.876294] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.876326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.876335] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.876346] Call trace:
[   25.876354]  show_stack+0x20/0x38 (C)
[   25.876374]  dump_stack_lvl+0x8c/0xd0
[   25.876392]  print_report+0x118/0x608
[   25.876412]  kasan_report+0xdc/0x128
[   25.876430]  kasan_check_range+0x100/0x1a8
[   25.876451]  __kasan_check_write+0x20/0x30
[   25.876472]  strncpy_from_user+0x3c/0x2a0
[   25.876490]  copy_user_test_oob+0x5c0/0xec8
[   25.876508]  kunit_try_run_case+0x170/0x3f0
[   25.876530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.876557]  kthread+0x328/0x630
[   25.876578]  ret_from_fork+0x10/0x20
[   25.876599] 
[   25.882782] Allocated by task 339:
[   25.883098]  kasan_save_stack+0x3c/0x68
[   25.883457]  kasan_save_track+0x20/0x40
[   25.883815]  kasan_save_alloc_info+0x40/0x58
[   25.884214]  __kasan_kmalloc+0xd4/0xd8
[   25.884565]  __kmalloc_noprof+0x190/0x4d0
[   25.884938]  kunit_kmalloc_array+0x34/0x88
[   25.885323]  copy_user_test_oob+0xac/0xec8
[   25.885703]  kunit_try_run_case+0x170/0x3f0
[   25.886095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.886604]  kthread+0x328/0x630
[   25.886913]  ret_from_fork+0x10/0x20
[   25.887251] 
[   25.887397] The buggy address belongs to the object at ffff0000101ea500
[   25.887397]  which belongs to the cache kmalloc-128 of size 128
[   25.888514] The buggy address is located 0 bytes inside of
[   25.888514]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.889626] 
[   25.889773] The buggy address belongs to the physical page:
[   25.890276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.890991] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.891586] page_type: f5(slab)
[   25.891885] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.892584] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.893280] page dumped because: kasan: bad access detected
[   25.893784] 
[   25.893930] Memory state around the buggy address:
[   25.894367]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.895019]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.895673] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.896322]                                                                 ^
[   25.896967]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.897621]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.898271] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   25.749095] ==================================================================
[   25.749790] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   25.750459] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.751154] 
[   25.751320] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.751372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.751387] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.751405] Call trace:
[   25.751417]  show_stack+0x20/0x38 (C)
[   25.751452]  dump_stack_lvl+0x8c/0xd0
[   25.751483]  print_report+0x118/0x608
[   25.751514]  kasan_report+0xdc/0x128
[   25.751544]  kasan_check_range+0x100/0x1a8
[   25.751576]  __kasan_check_read+0x20/0x30
[   25.751609]  copy_user_test_oob+0x728/0xec8
[   25.751639]  kunit_try_run_case+0x170/0x3f0
[   25.751674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.751716]  kthread+0x328/0x630
[   25.751750]  ret_from_fork+0x10/0x20
[   25.751783] 
[   25.757663] Allocated by task 339:
[   25.757990]  kasan_save_stack+0x3c/0x68
[   25.758366]  kasan_save_track+0x20/0x40
[   25.758739]  kasan_save_alloc_info+0x40/0x58
[   25.759153]  __kasan_kmalloc+0xd4/0xd8
[   25.759517]  __kmalloc_noprof+0x190/0x4d0
[   25.759907]  kunit_kmalloc_array+0x34/0x88
[   25.760308]  copy_user_test_oob+0xac/0xec8
[   25.760704]  kunit_try_run_case+0x170/0x3f0
[   25.761111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.761637]  kthread+0x328/0x630
[   25.761961]  ret_from_fork+0x10/0x20
[   25.762311] 
[   25.762466] The buggy address belongs to the object at ffff0000101ea500
[   25.762466]  which belongs to the cache kmalloc-128 of size 128
[   25.763599] The buggy address is located 0 bytes inside of
[   25.763599]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.764729] 
[   25.764885] The buggy address belongs to the physical page:
[   25.765402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.766135] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.766749] page_type: f5(slab)
[   25.767062] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.767779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.768488] page dumped because: kasan: bad access detected
[   25.769005] 
[   25.769158] Memory state around the buggy address:
[   25.769608]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.770276]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.770944] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.771608]                                                                 ^
[   25.772265]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.772933]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.773597] ==================================================================
[   25.722839] ==================================================================
[   25.724086] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   25.724757] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.725459] 
[   25.725625] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.725676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.725692] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.725712] Call trace:
[   25.725726]  show_stack+0x20/0x38 (C)
[   25.725761]  dump_stack_lvl+0x8c/0xd0
[   25.725795]  print_report+0x118/0x608
[   25.725827]  kasan_report+0xdc/0x128
[   25.725857]  kasan_check_range+0x100/0x1a8
[   25.725891]  __kasan_check_write+0x20/0x30
[   25.725925]  copy_user_test_oob+0x234/0xec8
[   25.725955]  kunit_try_run_case+0x170/0x3f0
[   25.725993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.726033]  kthread+0x328/0x630
[   25.726069]  ret_from_fork+0x10/0x20
[   25.726104] 
[   25.731999] Allocated by task 339:
[   25.732332]  kasan_save_stack+0x3c/0x68
[   25.732710]  kasan_save_track+0x20/0x40
[   25.733083]  kasan_save_alloc_info+0x40/0x58
[   25.733497]  __kasan_kmalloc+0xd4/0xd8
[   25.733861]  __kmalloc_noprof+0x190/0x4d0
[   25.734251]  kunit_kmalloc_array+0x34/0x88
[   25.734654]  copy_user_test_oob+0xac/0xec8
[   25.735048]  kunit_try_run_case+0x170/0x3f0
[   25.735456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.735981]  kthread+0x328/0x630
[   25.736305]  ret_from_fork+0x10/0x20
[   25.736657] 
[   25.736812] The buggy address belongs to the object at ffff0000101ea500
[   25.736812]  which belongs to the cache kmalloc-128 of size 128
[   25.737947] The buggy address is located 0 bytes inside of
[   25.737947]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.739076] 
[   25.739232] The buggy address belongs to the physical page:
[   25.739750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.740482] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.741095] page_type: f5(slab)
[   25.741411] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.742128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.742838] page dumped because: kasan: bad access detected
[   25.743355] 
[   25.743508] Memory state around the buggy address:
[   25.743958]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.744627]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.745294] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.745957]                                                                 ^
[   25.746614]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747282]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747945] ==================================================================
[   25.799636] ==================================================================
[   25.800297] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   25.800945] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.801626] 
[   25.801783] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.801819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.801831] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.801844] Call trace:
[   25.801853]  show_stack+0x20/0x38 (C)
[   25.801876]  dump_stack_lvl+0x8c/0xd0
[   25.801899]  print_report+0x118/0x608
[   25.801922]  kasan_report+0xdc/0x128
[   25.801943]  kasan_check_range+0x100/0x1a8
[   25.801966]  __kasan_check_read+0x20/0x30
[   25.801991]  copy_user_test_oob+0x3c8/0xec8
[   25.802012]  kunit_try_run_case+0x170/0x3f0
[   25.802038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.802067]  kthread+0x328/0x630
[   25.802092]  ret_from_fork+0x10/0x20
[   25.802116] 
[   25.807957] Allocated by task 339:
[   25.808280]  kasan_save_stack+0x3c/0x68
[   25.808649]  kasan_save_track+0x20/0x40
[   25.809009]  kasan_save_alloc_info+0x40/0x58
[   25.809412]  __kasan_kmalloc+0xd4/0xd8
[   25.809765]  __kmalloc_noprof+0x190/0x4d0
[   25.810144]  kunit_kmalloc_array+0x34/0x88
[   25.810534]  copy_user_test_oob+0xac/0xec8
[   25.810918]  kunit_try_run_case+0x170/0x3f0
[   25.811312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.811822]  kthread+0x328/0x630
[   25.812135]  ret_from_fork+0x10/0x20
[   25.812474] 
[   25.812620] The buggy address belongs to the object at ffff0000101ea500
[   25.812620]  which belongs to the cache kmalloc-128 of size 128
[   25.813740] The buggy address is located 0 bytes inside of
[   25.813740]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.814854] 
[   25.815002] The buggy address belongs to the physical page:
[   25.815510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.816230] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.816830] page_type: f5(slab)
[   25.817133] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.817838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.818535] page dumped because: kasan: bad access detected
[   25.819044] 
[   25.819191] Memory state around the buggy address:
[   25.819632]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.820287]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.820942] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.821594]                                                                 ^
[   25.822241]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.822898]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823551] ==================================================================
[   25.824893] ==================================================================
[   25.825570] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   25.826220] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.826909] 
[   25.827064] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.827102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.827112] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.827124] Call trace:
[   25.827133]  show_stack+0x20/0x38 (C)
[   25.827158]  dump_stack_lvl+0x8c/0xd0
[   25.827179]  print_report+0x118/0x608
[   25.827199]  kasan_report+0xdc/0x128
[   25.827217]  kasan_check_range+0x100/0x1a8
[   25.827239]  __kasan_check_write+0x20/0x30
[   25.827260]  copy_user_test_oob+0x434/0xec8
[   25.827278]  kunit_try_run_case+0x170/0x3f0
[   25.827302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.827329]  kthread+0x328/0x630
[   25.827352]  ret_from_fork+0x10/0x20
[   25.827374] 
[   25.833205] Allocated by task 339:
[   25.833523]  kasan_save_stack+0x3c/0x68
[   25.833884]  kasan_save_track+0x20/0x40
[   25.834243]  kasan_save_alloc_info+0x40/0x58
[   25.834641]  __kasan_kmalloc+0xd4/0xd8
[   25.834993]  __kmalloc_noprof+0x190/0x4d0
[   25.835368]  kunit_kmalloc_array+0x34/0x88
[   25.835753]  copy_user_test_oob+0xac/0xec8
[   25.836134]  kunit_try_run_case+0x170/0x3f0
[   25.836526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.837035]  kthread+0x328/0x630
[   25.837345]  ret_from_fork+0x10/0x20
[   25.837682] 
[   25.837829] The buggy address belongs to the object at ffff0000101ea500
[   25.837829]  which belongs to the cache kmalloc-128 of size 128
[   25.838948] The buggy address is located 0 bytes inside of
[   25.838948]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.840061] 
[   25.840208] The buggy address belongs to the physical page:
[   25.840714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.841432] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.842029] page_type: f5(slab)
[   25.842329] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.843031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.843728] page dumped because: kasan: bad access detected
[   25.844232] 
[   25.844378] Memory state around the buggy address:
[   25.844816]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.845470]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.846122] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.846772]                                                                 ^
[   25.847416]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848069]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848718] ==================================================================
[   25.849635] ==================================================================
[   25.850290] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   25.850931] Read of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.851609] 
[   25.851759] CPU: 4 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.851791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.851800] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.851812] Call trace:
[   25.851819]  show_stack+0x20/0x38 (C)
[   25.851840]  dump_stack_lvl+0x8c/0xd0
[   25.851859]  print_report+0x118/0x608
[   25.851878]  kasan_report+0xdc/0x128
[   25.851897]  kasan_check_range+0x100/0x1a8
[   25.851917]  __kasan_check_read+0x20/0x30
[   25.851939]  copy_user_test_oob+0x4a0/0xec8
[   25.851956]  kunit_try_run_case+0x170/0x3f0
[   25.851979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.852005]  kthread+0x328/0x630
[   25.852027]  ret_from_fork+0x10/0x20
[   25.852048] 
[   25.857869] Allocated by task 339:
[   25.858185]  kasan_save_stack+0x3c/0x68
[   25.858546]  kasan_save_track+0x20/0x40
[   25.858905]  kasan_save_alloc_info+0x40/0x58
[   25.859305]  __kasan_kmalloc+0xd4/0xd8
[   25.859654]  __kmalloc_noprof+0x190/0x4d0
[   25.860027]  kunit_kmalloc_array+0x34/0x88
[   25.860412]  copy_user_test_oob+0xac/0xec8
[   25.860793]  kunit_try_run_case+0x170/0x3f0
[   25.861185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.861693]  kthread+0x328/0x630
[   25.862003]  ret_from_fork+0x10/0x20
[   25.862340] 
[   25.862486] The buggy address belongs to the object at ffff0000101ea500
[   25.862486]  which belongs to the cache kmalloc-128 of size 128
[   25.863603] The buggy address is located 0 bytes inside of
[   25.863603]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.864715] 
[   25.864861] The buggy address belongs to the physical page:
[   25.865365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.866080] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.866675] page_type: f5(slab)
[   25.866972] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.867673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.868368] page dumped because: kasan: bad access detected
[   25.868873] 
[   25.869018] Memory state around the buggy address:
[   25.869455]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.870107]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.870761] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.871410]                                                                 ^
[   25.872054]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.872706]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.873355] ==================================================================
[   25.774925] ==================================================================
[   25.775618] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   25.776273] Write of size 121 at addr ffff0000101ea500 by task kunit_try_catch/339
[   25.776962] 
[   25.777119] CPU: 0 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.777157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.777168] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.777181] Call trace:
[   25.777191]  show_stack+0x20/0x38 (C)
[   25.777214]  dump_stack_lvl+0x8c/0xd0
[   25.777237]  print_report+0x118/0x608
[   25.777261]  kasan_report+0xdc/0x128
[   25.777281]  kasan_check_range+0x100/0x1a8
[   25.777305]  __kasan_check_write+0x20/0x30
[   25.777328]  copy_user_test_oob+0x35c/0xec8
[   25.777349]  kunit_try_run_case+0x170/0x3f0
[   25.777376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.777405]  kthread+0x328/0x630
[   25.777430]  ret_from_fork+0x10/0x20
[   25.777455] 
[   25.783298] Allocated by task 339:
[   25.783617]  kasan_save_stack+0x3c/0x68
[   25.783980]  kasan_save_track+0x20/0x40
[   25.784342]  kasan_save_alloc_info+0x40/0x58
[   25.784744]  __kasan_kmalloc+0xd4/0xd8
[   25.785098]  __kmalloc_noprof+0x190/0x4d0
[   25.785475]  kunit_kmalloc_array+0x34/0x88
[   25.785864]  copy_user_test_oob+0xac/0xec8
[   25.786248]  kunit_try_run_case+0x170/0x3f0
[   25.786641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.787152]  kthread+0x328/0x630
[   25.787464]  ret_from_fork+0x10/0x20
[   25.787804] 
[   25.787952] The buggy address belongs to the object at ffff0000101ea500
[   25.787952]  which belongs to the cache kmalloc-128 of size 128
[   25.789072] The buggy address is located 0 bytes inside of
[   25.789072]  allocated 120-byte region [ffff0000101ea500, ffff0000101ea578)
[   25.790186] 
[   25.790334] The buggy address belongs to the physical page:
[   25.790843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   25.791564] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.792165] page_type: f5(slab)
[   25.792468] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.793172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.793871] page dumped because: kasan: bad access detected
[   25.794377] 
[   25.794525] Memory state around the buggy address:
[   25.794965]  ffff0000101ea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.795622]  ffff0000101ea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.796278] >ffff0000101ea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.796929]                                                                 ^
[   25.797576]  ffff0000101ea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.798233]  ffff0000101ea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.798886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   25.667227] ==================================================================
[   25.668612] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   25.669307] Read of size 8 at addr ffff00001019f778 by task kunit_try_catch/335
[   25.669978] 
[   25.670156] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.670210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.670227] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.670246] Call trace:
[   25.670259]  show_stack+0x20/0x38 (C)
[   25.670296]  dump_stack_lvl+0x8c/0xd0
[   25.670330]  print_report+0x118/0x608
[   25.670363]  kasan_report+0xdc/0x128
[   25.670392]  __asan_report_load8_noabort+0x20/0x30
[   25.670428]  copy_to_kernel_nofault+0x204/0x250
[   25.670460]  copy_to_kernel_nofault_oob+0x158/0x418
[   25.670497]  kunit_try_run_case+0x170/0x3f0
[   25.670533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.670574]  kthread+0x328/0x630
[   25.670609]  ret_from_fork+0x10/0x20
[   25.670643] 
[   25.676693] Allocated by task 335:
[   25.677021]  kasan_save_stack+0x3c/0x68
[   25.677396]  kasan_save_track+0x20/0x40
[   25.677768]  kasan_save_alloc_info+0x40/0x58
[   25.678183]  __kasan_kmalloc+0xd4/0xd8
[   25.678546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.678988]  copy_to_kernel_nofault_oob+0xc8/0x418
[   25.679452]  kunit_try_run_case+0x170/0x3f0
[   25.679859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.680385]  kthread+0x328/0x630
[   25.680710]  ret_from_fork+0x10/0x20
[   25.681060] 
[   25.681215] The buggy address belongs to the object at ffff00001019f700
[   25.681215]  which belongs to the cache kmalloc-128 of size 128
[   25.682350] The buggy address is located 0 bytes to the right of
[   25.682350]  allocated 120-byte region [ffff00001019f700, ffff00001019f778)
[   25.683526] 
[   25.683681] The buggy address belongs to the physical page:
[   25.684199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f
[   25.684933] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.685546] page_type: f5(slab)
[   25.685859] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.686576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.687285] page dumped because: kasan: bad access detected
[   25.687802] 
[   25.687955] Memory state around the buggy address:
[   25.688405]  ffff00001019f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.689072]  ffff00001019f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.689740] >ffff00001019f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.690403]                                                                 ^
[   25.691060]  ffff00001019f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.691726]  ffff00001019f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.692390] ==================================================================
[   25.693455] ==================================================================
[   25.694139] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   25.694824] Write of size 8 at addr ffff00001019f778 by task kunit_try_catch/335
[   25.695499] 
[   25.695657] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.695695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.695707] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.695720] Call trace:
[   25.695730]  show_stack+0x20/0x38 (C)
[   25.695755]  dump_stack_lvl+0x8c/0xd0
[   25.695779]  print_report+0x118/0x608
[   25.695802]  kasan_report+0xdc/0x128
[   25.695823]  kasan_check_range+0x100/0x1a8
[   25.695846]  __kasan_check_write+0x20/0x30
[   25.695870]  copy_to_kernel_nofault+0x8c/0x250
[   25.695892]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   25.695918]  kunit_try_run_case+0x170/0x3f0
[   25.695944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.695973]  kthread+0x328/0x630
[   25.695998]  ret_from_fork+0x10/0x20
[   25.696022] 
[   25.702318] Allocated by task 335:
[   25.702636]  kasan_save_stack+0x3c/0x68
[   25.703000]  kasan_save_track+0x20/0x40
[   25.703360]  kasan_save_alloc_info+0x40/0x58
[   25.703763]  __kasan_kmalloc+0xd4/0xd8
[   25.704116]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.704546]  copy_to_kernel_nofault_oob+0xc8/0x418
[   25.704995]  kunit_try_run_case+0x170/0x3f0
[   25.705390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.705902]  kthread+0x328/0x630
[   25.706214]  ret_from_fork+0x10/0x20
[   25.706554] 
[   25.706702] The buggy address belongs to the object at ffff00001019f700
[   25.706702]  which belongs to the cache kmalloc-128 of size 128
[   25.707821] The buggy address is located 0 bytes to the right of
[   25.707821]  allocated 120-byte region [ffff00001019f700, ffff00001019f778)
[   25.708982] 
[   25.709131] The buggy address belongs to the physical page:
[   25.709639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f
[   25.710359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.710960] page_type: f5(slab)
[   25.711262] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   25.711966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.712665] page dumped because: kasan: bad access detected
[   25.713170] 
[   25.713318] Memory state around the buggy address:
[   25.713757]  ffff00001019f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.714415]  ffff00001019f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.715070] >ffff00001019f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.715722]                                                                 ^
[   25.716369]  ffff00001019f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717024]  ffff00001019f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.717678] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   25.632063] ==================================================================
[   25.632739] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   25.633369] Read of size 1 at addr ffff800087e9e7f8 by task kunit_try_catch/323
[   25.634034] 
[   25.634191] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.634230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.634242] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.634256] Call trace:
[   25.634265]  show_stack+0x20/0x38 (C)
[   25.634291]  dump_stack_lvl+0x8c/0xd0
[   25.634315]  print_report+0x310/0x608
[   25.634337]  kasan_report+0xdc/0x128
[   25.634358]  __asan_report_load1_noabort+0x20/0x30
[   25.634383]  vmalloc_oob+0x51c/0x5d0
[   25.634406]  kunit_try_run_case+0x170/0x3f0
[   25.634433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.634462]  kthread+0x328/0x630
[   25.634488]  ret_from_fork+0x10/0x20
[   25.634513] 
[   25.640005] The buggy address belongs to the virtual mapping at
[   25.640005]  [ffff800087e9e000, ffff800087ea0000) created by:
[   25.640005]  vmalloc_oob+0x98/0x5d0
[   25.641363] 
[   25.641512] The buggy address belongs to the physical page:
[   25.642019] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b
[   25.642732] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.643339] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   25.644043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.644742] page dumped because: kasan: bad access detected
[   25.645248] 
[   25.645395] Memory state around the buggy address:
[   25.645834]  ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.646489]  ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.647145] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   25.647796]                                                                 ^
[   25.648443]  ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.649098]  ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.649751] ==================================================================
[   25.612475] ==================================================================
[   25.613876] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   25.614521] Read of size 1 at addr ffff800087e9e7f3 by task kunit_try_catch/323
[   25.615201] 
[   25.615365] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.615414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.615430] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.615447] Call trace:
[   25.615459]  show_stack+0x20/0x38 (C)
[   25.615492]  dump_stack_lvl+0x8c/0xd0
[   25.615524]  print_report+0x310/0x608
[   25.615554]  kasan_report+0xdc/0x128
[   25.615584]  __asan_report_load1_noabort+0x20/0x30
[   25.615619]  vmalloc_oob+0x578/0x5d0
[   25.615651]  kunit_try_run_case+0x170/0x3f0
[   25.615688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.615728]  kthread+0x328/0x630
[   25.615762]  ret_from_fork+0x10/0x20
[   25.615796] 
[   25.621330] The buggy address belongs to the virtual mapping at
[   25.621330]  [ffff800087e9e000, ffff800087ea0000) created by:
[   25.621330]  vmalloc_oob+0x98/0x5d0
[   25.622708] 
[   25.622864] The buggy address belongs to the physical page:
[   25.623381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b
[   25.624107] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.624733] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   25.625449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.626159] page dumped because: kasan: bad access detected
[   25.626677] 
[   25.626830] Memory state around the buggy address:
[   25.627280]  ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.627948]  ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.628616] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   25.629279]                                                              ^
[   25.629914]  ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.630582]  ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.631246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   25.394621] ==================================================================
[   25.395259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   25.395913] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.396566] 
[   25.396704] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.396718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.396723] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.396728] Call trace:
[   25.396731]  show_stack+0x20/0x38 (C)
[   25.396741]  dump_stack_lvl+0x8c/0xd0
[   25.396749]  print_report+0x118/0x608
[   25.396758]  kasan_report+0xdc/0x128
[   25.396766]  kasan_check_range+0x100/0x1a8
[   25.396776]  __kasan_check_write+0x20/0x30
[   25.396786]  kasan_atomics_helper+0x15b4/0x4858
[   25.396794]  kasan_atomics+0x198/0x2e0
[   25.396802]  kunit_try_run_case+0x170/0x3f0
[   25.396812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.396824]  kthread+0x328/0x630
[   25.396834]  ret_from_fork+0x10/0x20
[   25.396843] 
[   25.402973] Allocated by task 319:
[   25.403278]  kasan_save_stack+0x3c/0x68
[   25.403623]  kasan_save_track+0x20/0x40
[   25.403967]  kasan_save_alloc_info+0x40/0x58
[   25.404350]  __kasan_kmalloc+0xd4/0xd8
[   25.404687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.405093]  kasan_atomics+0xb8/0x2e0
[   25.405423]  kunit_try_run_case+0x170/0x3f0
[   25.405799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.406290]  kthread+0x328/0x630
[   25.406583]  ret_from_fork+0x10/0x20
[   25.406905] 
[   25.407042] The buggy address belongs to the object at ffff00000a4bdd00
[   25.407042]  which belongs to the cache kmalloc-64 of size 64
[   25.408125] The buggy address is located 0 bytes to the right of
[   25.408125]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.409254] 
[   25.409391] The buggy address belongs to the physical page:
[   25.409882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.410574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.411153] page_type: f5(slab)
[   25.411437] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.412122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.412803] page dumped because: kasan: bad access detected
[   25.413295] 
[   25.413432] Memory state around the buggy address:
[   25.413858]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.414494]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.415133] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.415769]                                      ^
[   25.416193]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.416830]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.417467] ==================================================================
[   24.312695] ==================================================================
[   24.313350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   24.314015] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.314684] 
[   24.314835] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.314867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.314877] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.314887] Call trace:
[   24.314895]  show_stack+0x20/0x38 (C)
[   24.314915]  dump_stack_lvl+0x8c/0xd0
[   24.314934]  print_report+0x118/0x608
[   24.314953]  kasan_report+0xdc/0x128
[   24.314972]  kasan_check_range+0x100/0x1a8
[   24.314993]  __kasan_check_write+0x20/0x30
[   24.315014]  kasan_atomics_helper+0x47c/0x4858
[   24.315033]  kasan_atomics+0x198/0x2e0
[   24.315050]  kunit_try_run_case+0x170/0x3f0
[   24.315074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.315099]  kthread+0x328/0x630
[   24.315121]  ret_from_fork+0x10/0x20
[   24.315141] 
[   24.321319] Allocated by task 319:
[   24.321635]  kasan_save_stack+0x3c/0x68
[   24.321994]  kasan_save_track+0x20/0x40
[   24.322353]  kasan_save_alloc_info+0x40/0x58
[   24.322752]  __kasan_kmalloc+0xd4/0xd8
[   24.323104]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.323529]  kasan_atomics+0xb8/0x2e0
[   24.323871]  kunit_try_run_case+0x170/0x3f0
[   24.324262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.324771]  kthread+0x328/0x630
[   24.325080]  ret_from_fork+0x10/0x20
[   24.325418] 
[   24.325565] The buggy address belongs to the object at ffff00000a4bdd00
[   24.325565]  which belongs to the cache kmalloc-64 of size 64
[   24.326666] The buggy address is located 0 bytes to the right of
[   24.326666]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.327815] 
[   24.327962] The buggy address belongs to the physical page:
[   24.328466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.329173] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.329767] page_type: f5(slab)
[   24.330064] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.330765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.331461] page dumped because: kasan: bad access detected
[   24.331965] 
[   24.332111] Memory state around the buggy address:
[   24.332547]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.333199]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.333853] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.334502]                                      ^
[   24.334940]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.335593]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.336243] ==================================================================
[   24.093589] ==================================================================
[   24.094262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   24.094966] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.095642] 
[   24.095798] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.095836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.095847] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.095860] Call trace:
[   24.095870]  show_stack+0x20/0x38 (C)
[   24.095894]  dump_stack_lvl+0x8c/0xd0
[   24.095919]  print_report+0x118/0x608
[   24.095941]  kasan_report+0xdc/0x128
[   24.095962]  __asan_report_store4_noabort+0x20/0x30
[   24.095988]  kasan_atomics_helper+0x3f7c/0x4858
[   24.096009]  kasan_atomics+0x198/0x2e0
[   24.096029]  kunit_try_run_case+0x170/0x3f0
[   24.096055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.096085]  kthread+0x328/0x630
[   24.096110]  ret_from_fork+0x10/0x20
[   24.096133] 
[   24.102042] Allocated by task 319:
[   24.102362]  kasan_save_stack+0x3c/0x68
[   24.102724]  kasan_save_track+0x20/0x40
[   24.103085]  kasan_save_alloc_info+0x40/0x58
[   24.103487]  __kasan_kmalloc+0xd4/0xd8
[   24.103840]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.104270]  kasan_atomics+0xb8/0x2e0
[   24.104614]  kunit_try_run_case+0x170/0x3f0
[   24.105009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.105520]  kthread+0x328/0x630
[   24.105832]  ret_from_fork+0x10/0x20
[   24.106172] 
[   24.106320] The buggy address belongs to the object at ffff00000a4bdd00
[   24.106320]  which belongs to the cache kmalloc-64 of size 64
[   24.107426] The buggy address is located 0 bytes to the right of
[   24.107426]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.108578] 
[   24.108727] The buggy address belongs to the physical page:
[   24.109234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.109948] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.110548] page_type: f5(slab)
[   24.110851] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.111555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.112253] page dumped because: kasan: bad access detected
[   24.112760] 
[   24.112907] Memory state around the buggy address:
[   24.113347]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.114001]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.114657] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.115308]                                      ^
[   24.115747]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.116403]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.117055] ==================================================================
[   24.621648] ==================================================================
[   24.622285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   24.622930] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.623584] 
[   24.623723] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.623737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.623742] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.623747] Call trace:
[   24.623750]  show_stack+0x20/0x38 (C)
[   24.623760]  dump_stack_lvl+0x8c/0xd0
[   24.623768]  print_report+0x118/0x608
[   24.623777]  kasan_report+0xdc/0x128
[   24.623786]  kasan_check_range+0x100/0x1a8
[   24.623795]  __kasan_check_write+0x20/0x30
[   24.623805]  kasan_atomics_helper+0xa04/0x4858
[   24.623814]  kasan_atomics+0x198/0x2e0
[   24.623821]  kunit_try_run_case+0x170/0x3f0
[   24.623832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.623843]  kthread+0x328/0x630
[   24.623854]  ret_from_fork+0x10/0x20
[   24.623863] 
[   24.629986] Allocated by task 319:
[   24.630291]  kasan_save_stack+0x3c/0x68
[   24.630635]  kasan_save_track+0x20/0x40
[   24.630979]  kasan_save_alloc_info+0x40/0x58
[   24.631362]  __kasan_kmalloc+0xd4/0xd8
[   24.631699]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.632106]  kasan_atomics+0xb8/0x2e0
[   24.632435]  kunit_try_run_case+0x170/0x3f0
[   24.632811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.633302]  kthread+0x328/0x630
[   24.633594]  ret_from_fork+0x10/0x20
[   24.633916] 
[   24.634053] The buggy address belongs to the object at ffff00000a4bdd00
[   24.634053]  which belongs to the cache kmalloc-64 of size 64
[   24.635136] The buggy address is located 0 bytes to the right of
[   24.635136]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.636265] 
[   24.636402] The buggy address belongs to the physical page:
[   24.636893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.637585] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.638164] page_type: f5(slab)
[   24.638447] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.639131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.639813] page dumped because: kasan: bad access detected
[   24.640305] 
[   24.640442] Memory state around the buggy address:
[   24.640867]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.641506]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.642143] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.642778]                                      ^
[   24.643203]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.643839]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.644475] ==================================================================
[   24.855414] ==================================================================
[   24.856052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   24.856698] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.857352] 
[   24.857490] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.857504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.857508] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.857513] Call trace:
[   24.857516]  show_stack+0x20/0x38 (C)
[   24.857526]  dump_stack_lvl+0x8c/0xd0
[   24.857534]  print_report+0x118/0x608
[   24.857543]  kasan_report+0xdc/0x128
[   24.857552]  kasan_check_range+0x100/0x1a8
[   24.857561]  __kasan_check_write+0x20/0x30
[   24.857570]  kasan_atomics_helper+0xd3c/0x4858
[   24.857579]  kasan_atomics+0x198/0x2e0
[   24.857587]  kunit_try_run_case+0x170/0x3f0
[   24.857597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.857609]  kthread+0x328/0x630
[   24.857618]  ret_from_fork+0x10/0x20
[   24.857627] 
[   24.863746] Allocated by task 319:
[   24.864051]  kasan_save_stack+0x3c/0x68
[   24.864396]  kasan_save_track+0x20/0x40
[   24.864740]  kasan_save_alloc_info+0x40/0x58
[   24.865123]  __kasan_kmalloc+0xd4/0xd8
[   24.865460]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.865867]  kasan_atomics+0xb8/0x2e0
[   24.866195]  kunit_try_run_case+0x170/0x3f0
[   24.866572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.867063]  kthread+0x328/0x630
[   24.867357]  ret_from_fork+0x10/0x20
[   24.867679] 
[   24.867816] The buggy address belongs to the object at ffff00000a4bdd00
[   24.867816]  which belongs to the cache kmalloc-64 of size 64
[   24.868898] The buggy address is located 0 bytes to the right of
[   24.868898]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.870028] 
[   24.870165] The buggy address belongs to the physical page:
[   24.870657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.871349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.871927] page_type: f5(slab)
[   24.872210] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.872894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.873576] page dumped because: kasan: bad access detected
[   24.874068] 
[   24.874206] Memory state around the buggy address:
[   24.874632]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.875268]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.875905] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.876541]                                      ^
[   24.876967]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.877604]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.878241] ==================================================================
[   24.215679] ==================================================================
[   24.216334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   24.216996] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.217666] 
[   24.217816] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.217849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.217859] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.217869] Call trace:
[   24.217877]  show_stack+0x20/0x38 (C)
[   24.217897]  dump_stack_lvl+0x8c/0xd0
[   24.217916]  print_report+0x118/0x608
[   24.217935]  kasan_report+0xdc/0x128
[   24.217954]  kasan_check_range+0x100/0x1a8
[   24.217975]  __kasan_check_write+0x20/0x30
[   24.217996]  kasan_atomics_helper+0x32c/0x4858
[   24.218015]  kasan_atomics+0x198/0x2e0
[   24.218033]  kunit_try_run_case+0x170/0x3f0
[   24.218056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.218082]  kthread+0x328/0x630
[   24.218104]  ret_from_fork+0x10/0x20
[   24.218124] 
[   24.224311] Allocated by task 319:
[   24.224626]  kasan_save_stack+0x3c/0x68
[   24.224986]  kasan_save_track+0x20/0x40
[   24.225344]  kasan_save_alloc_info+0x40/0x58
[   24.225744]  __kasan_kmalloc+0xd4/0xd8
[   24.226095]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.226520]  kasan_atomics+0xb8/0x2e0
[   24.226863]  kunit_try_run_case+0x170/0x3f0
[   24.227256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.227764]  kthread+0x328/0x630
[   24.228073]  ret_from_fork+0x10/0x20
[   24.228412] 
[   24.228557] The buggy address belongs to the object at ffff00000a4bdd00
[   24.228557]  which belongs to the cache kmalloc-64 of size 64
[   24.229658] The buggy address is located 0 bytes to the right of
[   24.229658]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.230807] 
[   24.230954] The buggy address belongs to the physical page:
[   24.231457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.232166] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.232760] page_type: f5(slab)
[   24.233058] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.233758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.234453] page dumped because: kasan: bad access detected
[   24.234957] 
[   24.235102] Memory state around the buggy address:
[   24.235539]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236192]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236844] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.237494]                                      ^
[   24.237933]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.238585]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.239234] ==================================================================
[   24.692137] ==================================================================
[   24.692775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   24.693428] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.694074] 
[   24.694213] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.694227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.694231] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.694236] Call trace:
[   24.694239]  show_stack+0x20/0x38 (C)
[   24.694249]  dump_stack_lvl+0x8c/0xd0
[   24.694257]  print_report+0x118/0x608
[   24.694266]  kasan_report+0xdc/0x128
[   24.694274]  __asan_report_load4_noabort+0x20/0x30
[   24.694285]  kasan_atomics_helper+0x3dcc/0x4858
[   24.694293]  kasan_atomics+0x198/0x2e0
[   24.694301]  kunit_try_run_case+0x170/0x3f0
[   24.694311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.694323]  kthread+0x328/0x630
[   24.694333]  ret_from_fork+0x10/0x20
[   24.694342] 
[   24.700168] Allocated by task 319:
[   24.700473]  kasan_save_stack+0x3c/0x68
[   24.700818]  kasan_save_track+0x20/0x40
[   24.701162]  kasan_save_alloc_info+0x40/0x58
[   24.701545]  __kasan_kmalloc+0xd4/0xd8
[   24.701883]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.702290]  kasan_atomics+0xb8/0x2e0
[   24.702618]  kunit_try_run_case+0x170/0x3f0
[   24.702994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.703485]  kthread+0x328/0x630
[   24.703778]  ret_from_fork+0x10/0x20
[   24.704100] 
[   24.704237] The buggy address belongs to the object at ffff00000a4bdd00
[   24.704237]  which belongs to the cache kmalloc-64 of size 64
[   24.705320] The buggy address is located 0 bytes to the right of
[   24.705320]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.706450] 
[   24.706588] The buggy address belongs to the physical page:
[   24.707080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.707770] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.708348] page_type: f5(slab)
[   24.708631] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.709315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.709997] page dumped because: kasan: bad access detected
[   24.710489] 
[   24.710626] Memory state around the buggy address:
[   24.711051]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.711688]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.712326] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.712963]                                      ^
[   24.713389]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.714028]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.714663] ==================================================================
[   24.167190] ==================================================================
[   24.167846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   24.168511] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.169174] 
[   24.169323] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.169356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.169367] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.169378] Call trace:
[   24.169385]  show_stack+0x20/0x38 (C)
[   24.169406]  dump_stack_lvl+0x8c/0xd0
[   24.169426]  print_report+0x118/0x608
[   24.169445]  kasan_report+0xdc/0x128
[   24.169464]  kasan_check_range+0x100/0x1a8
[   24.169484]  __kasan_check_read+0x20/0x30
[   24.169507]  kasan_atomics_helper+0x2b0/0x4858
[   24.169526]  kasan_atomics+0x198/0x2e0
[   24.169543]  kunit_try_run_case+0x170/0x3f0
[   24.169566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.169592]  kthread+0x328/0x630
[   24.169613]  ret_from_fork+0x10/0x20
[   24.169633] 
[   24.175809] Allocated by task 319:
[   24.176125]  kasan_save_stack+0x3c/0x68
[   24.176484]  kasan_save_track+0x20/0x40
[   24.176844]  kasan_save_alloc_info+0x40/0x58
[   24.177243]  __kasan_kmalloc+0xd4/0xd8
[   24.177595]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.178020]  kasan_atomics+0xb8/0x2e0
[   24.178362]  kunit_try_run_case+0x170/0x3f0
[   24.178755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.179265]  kthread+0x328/0x630
[   24.179574]  ret_from_fork+0x10/0x20
[   24.179911] 
[   24.180057] The buggy address belongs to the object at ffff00000a4bdd00
[   24.180057]  which belongs to the cache kmalloc-64 of size 64
[   24.181159] The buggy address is located 0 bytes to the right of
[   24.181159]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.182308] 
[   24.182454] The buggy address belongs to the physical page:
[   24.182957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.183665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.184261] page_type: f5(slab)
[   24.184560] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.185260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.185955] page dumped because: kasan: bad access detected
[   24.186459] 
[   24.186604] Memory state around the buggy address:
[   24.187042]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.187695]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.188347] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.188996]                                      ^
[   24.189435]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190089]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190738] ==================================================================
[   24.668645] ==================================================================
[   24.669282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   24.669928] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.670582] 
[   24.670721] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.670735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.670740] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.670745] Call trace:
[   24.670748]  show_stack+0x20/0x38 (C)
[   24.670757]  dump_stack_lvl+0x8c/0xd0
[   24.670766]  print_report+0x118/0x608
[   24.670775]  kasan_report+0xdc/0x128
[   24.670783]  kasan_check_range+0x100/0x1a8
[   24.670794]  __kasan_check_write+0x20/0x30
[   24.670804]  kasan_atomics_helper+0xad4/0x4858
[   24.670813]  kasan_atomics+0x198/0x2e0
[   24.670820]  kunit_try_run_case+0x170/0x3f0
[   24.670831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.670843]  kthread+0x328/0x630
[   24.670853]  ret_from_fork+0x10/0x20
[   24.670863] 
[   24.676988] Allocated by task 319:
[   24.677293]  kasan_save_stack+0x3c/0x68
[   24.677637]  kasan_save_track+0x20/0x40
[   24.677980]  kasan_save_alloc_info+0x40/0x58
[   24.678363]  __kasan_kmalloc+0xd4/0xd8
[   24.678701]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.679108]  kasan_atomics+0xb8/0x2e0
[   24.679437]  kunit_try_run_case+0x170/0x3f0
[   24.679814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.680303]  kthread+0x328/0x630
[   24.680596]  ret_from_fork+0x10/0x20
[   24.680918] 
[   24.681055] The buggy address belongs to the object at ffff00000a4bdd00
[   24.681055]  which belongs to the cache kmalloc-64 of size 64
[   24.682137] The buggy address is located 0 bytes to the right of
[   24.682137]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.683267] 
[   24.683405] The buggy address belongs to the physical page:
[   24.683897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.684589] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.685168] page_type: f5(slab)
[   24.685453] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.686137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.686818] page dumped because: kasan: bad access detected
[   24.687310] 
[   24.687447] Memory state around the buggy address:
[   24.687871]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.688508]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.689144] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.689781]                                      ^
[   24.690208]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.690844]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.691480] ==================================================================
[   24.738801] ==================================================================
[   24.739438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   24.740092] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.740737] 
[   24.740875] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.740890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.740894] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.740899] Call trace:
[   24.740902]  show_stack+0x20/0x38 (C)
[   24.740911]  dump_stack_lvl+0x8c/0xd0
[   24.740920]  print_report+0x118/0x608
[   24.740929]  kasan_report+0xdc/0x128
[   24.740937]  __asan_report_load4_noabort+0x20/0x30
[   24.740947]  kasan_atomics_helper+0x3dbc/0x4858
[   24.740956]  kasan_atomics+0x198/0x2e0
[   24.740964]  kunit_try_run_case+0x170/0x3f0
[   24.740974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.740985]  kthread+0x328/0x630
[   24.740995]  ret_from_fork+0x10/0x20
[   24.741005] 
[   24.746837] Allocated by task 319:
[   24.747142]  kasan_save_stack+0x3c/0x68
[   24.747486]  kasan_save_track+0x20/0x40
[   24.747830]  kasan_save_alloc_info+0x40/0x58
[   24.748213]  __kasan_kmalloc+0xd4/0xd8
[   24.748550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.748958]  kasan_atomics+0xb8/0x2e0
[   24.749287]  kunit_try_run_case+0x170/0x3f0
[   24.749663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.750153]  kthread+0x328/0x630
[   24.750446]  ret_from_fork+0x10/0x20
[   24.750768] 
[   24.750905] The buggy address belongs to the object at ffff00000a4bdd00
[   24.750905]  which belongs to the cache kmalloc-64 of size 64
[   24.751987] The buggy address is located 0 bytes to the right of
[   24.751987]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.753117] 
[   24.753254] The buggy address belongs to the physical page:
[   24.753747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.754439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.755017] page_type: f5(slab)
[   24.755302] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.755986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.756668] page dumped because: kasan: bad access detected
[   24.757160] 
[   24.757296] Memory state around the buggy address:
[   24.757721]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.758358]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.758996] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.759633]                                      ^
[   24.760059]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.760696]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.761332] ==================================================================
[   24.808673] ==================================================================
[   24.809310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   24.809956] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.810610] 
[   24.810748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.810762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.810767] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.810771] Call trace:
[   24.810775]  show_stack+0x20/0x38 (C)
[   24.810785]  dump_stack_lvl+0x8c/0xd0
[   24.810793]  print_report+0x118/0x608
[   24.810801]  kasan_report+0xdc/0x128
[   24.810810]  kasan_check_range+0x100/0x1a8
[   24.810819]  __kasan_check_write+0x20/0x30
[   24.810829]  kasan_atomics_helper+0xca0/0x4858
[   24.810838]  kasan_atomics+0x198/0x2e0
[   24.810845]  kunit_try_run_case+0x170/0x3f0
[   24.810856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.810867]  kthread+0x328/0x630
[   24.810877]  ret_from_fork+0x10/0x20
[   24.810887] 
[   24.817010] Allocated by task 319:
[   24.817315]  kasan_save_stack+0x3c/0x68
[   24.817660]  kasan_save_track+0x20/0x40
[   24.818006]  kasan_save_alloc_info+0x40/0x58
[   24.818389]  __kasan_kmalloc+0xd4/0xd8
[   24.818726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.819134]  kasan_atomics+0xb8/0x2e0
[   24.819463]  kunit_try_run_case+0x170/0x3f0
[   24.819840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.820331]  kthread+0x328/0x630
[   24.820623]  ret_from_fork+0x10/0x20
[   24.820946] 
[   24.821082] The buggy address belongs to the object at ffff00000a4bdd00
[   24.821082]  which belongs to the cache kmalloc-64 of size 64
[   24.822165] The buggy address is located 0 bytes to the right of
[   24.822165]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.823294] 
[   24.823433] The buggy address belongs to the physical page:
[   24.823924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.824617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.825195] page_type: f5(slab)
[   24.825480] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.826163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.826845] page dumped because: kasan: bad access detected
[   24.827337] 
[   24.827474] Memory state around the buggy address:
[   24.827899]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.828537]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.829174] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.829810]                                      ^
[   24.830236]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.830873]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.831509] ==================================================================
[   24.925584] ==================================================================
[   24.926222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   24.926876] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.927521] 
[   24.927659] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.927674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.927678] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.927683] Call trace:
[   24.927687]  show_stack+0x20/0x38 (C)
[   24.927696]  dump_stack_lvl+0x8c/0xd0
[   24.927705]  print_report+0x118/0x608
[   24.927713]  kasan_report+0xdc/0x128
[   24.927722]  __asan_report_load8_noabort+0x20/0x30
[   24.927733]  kasan_atomics_helper+0x3f58/0x4858
[   24.927741]  kasan_atomics+0x198/0x2e0
[   24.927749]  kunit_try_run_case+0x170/0x3f0
[   24.927760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.927771]  kthread+0x328/0x630
[   24.927782]  ret_from_fork+0x10/0x20
[   24.927791] 
[   24.933618] Allocated by task 319:
[   24.933921]  kasan_save_stack+0x3c/0x68
[   24.934265]  kasan_save_track+0x20/0x40
[   24.934609]  kasan_save_alloc_info+0x40/0x58
[   24.934992]  __kasan_kmalloc+0xd4/0xd8
[   24.935328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.935735]  kasan_atomics+0xb8/0x2e0
[   24.936064]  kunit_try_run_case+0x170/0x3f0
[   24.936441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.936932]  kthread+0x328/0x630
[   24.937225]  ret_from_fork+0x10/0x20
[   24.937547] 
[   24.937685] The buggy address belongs to the object at ffff00000a4bdd00
[   24.937685]  which belongs to the cache kmalloc-64 of size 64
[   24.938768] The buggy address is located 0 bytes to the right of
[   24.938768]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.939897] 
[   24.940036] The buggy address belongs to the physical page:
[   24.940528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.941218] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.941797] page_type: f5(slab)
[   24.942082] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.942766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.943448] page dumped because: kasan: bad access detected
[   24.943940] 
[   24.944076] Memory state around the buggy address:
[   24.944502]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.945138]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.945775] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.946411]                                      ^
[   24.946837]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.947476]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.948111] ==================================================================
[   24.480221] ==================================================================
[   24.480866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   24.481518] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.482178] 
[   24.482321] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.482342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.482349] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.482356] Call trace:
[   24.482361]  show_stack+0x20/0x38 (C)
[   24.482375]  dump_stack_lvl+0x8c/0xd0
[   24.482387]  print_report+0x118/0x608
[   24.482401]  kasan_report+0xdc/0x128
[   24.482414]  kasan_check_range+0x100/0x1a8
[   24.482428]  __kasan_check_write+0x20/0x30
[   24.482443]  kasan_atomics_helper+0x760/0x4858
[   24.482456]  kasan_atomics+0x198/0x2e0
[   24.482468]  kunit_try_run_case+0x170/0x3f0
[   24.482484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.482502]  kthread+0x328/0x630
[   24.482516]  ret_from_fork+0x10/0x20
[   24.482530] 
[   24.488678] Allocated by task 319:
[   24.488986]  kasan_save_stack+0x3c/0x68
[   24.489338]  kasan_save_track+0x20/0x40
[   24.489688]  kasan_save_alloc_info+0x40/0x58
[   24.490079]  __kasan_kmalloc+0xd4/0xd8
[   24.490422]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.490836]  kasan_atomics+0xb8/0x2e0
[   24.491171]  kunit_try_run_case+0x170/0x3f0
[   24.491554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.492051]  kthread+0x328/0x630
[   24.492351]  ret_from_fork+0x10/0x20
[   24.492679] 
[   24.492819] The buggy address belongs to the object at ffff00000a4bdd00
[   24.492819]  which belongs to the cache kmalloc-64 of size 64
[   24.493909] The buggy address is located 0 bytes to the right of
[   24.493909]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.495046] 
[   24.495187] The buggy address belongs to the physical page:
[   24.495684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.496382] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.496968] page_type: f5(slab)
[   24.497257] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.497947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.498634] page dumped because: kasan: bad access detected
[   24.499131] 
[   24.499272] Memory state around the buggy address:
[   24.499702]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.500345]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.500988] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.501630]                                      ^
[   24.502060]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.502703]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.503345] ==================================================================
[   24.504064] ==================================================================
[   24.504709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   24.505362] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.506022] 
[   24.506166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.506188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.506195] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.506202] Call trace:
[   24.506207]  show_stack+0x20/0x38 (C)
[   24.506221]  dump_stack_lvl+0x8c/0xd0
[   24.506233]  print_report+0x118/0x608
[   24.506247]  kasan_report+0xdc/0x128
[   24.506260]  kasan_check_range+0x100/0x1a8
[   24.506274]  __kasan_check_write+0x20/0x30
[   24.506289]  kasan_atomics_helper+0x7cc/0x4858
[   24.506302]  kasan_atomics+0x198/0x2e0
[   24.506313]  kunit_try_run_case+0x170/0x3f0
[   24.506329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.506347]  kthread+0x328/0x630
[   24.506361]  ret_from_fork+0x10/0x20
[   24.506376] 
[   24.512522] Allocated by task 319:
[   24.512831]  kasan_save_stack+0x3c/0x68
[   24.513182]  kasan_save_track+0x20/0x40
[   24.513533]  kasan_save_alloc_info+0x40/0x58
[   24.513923]  __kasan_kmalloc+0xd4/0xd8
[   24.514265]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.514680]  kasan_atomics+0xb8/0x2e0
[   24.515014]  kunit_try_run_case+0x170/0x3f0
[   24.515397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.515895]  kthread+0x328/0x630
[   24.516194]  ret_from_fork+0x10/0x20
[   24.516522] 
[   24.516663] The buggy address belongs to the object at ffff00000a4bdd00
[   24.516663]  which belongs to the cache kmalloc-64 of size 64
[   24.517752] The buggy address is located 0 bytes to the right of
[   24.517752]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.518889] 
[   24.519030] The buggy address belongs to the physical page:
[   24.519527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.520226] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.520811] page_type: f5(slab)
[   24.521101] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.521791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.522477] page dumped because: kasan: bad access detected
[   24.522975] 
[   24.523115] Memory state around the buggy address:
[   24.523544]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.524188]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.524831] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.525473]                                      ^
[   24.525904]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.526547]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.527189] ==================================================================
[   24.240009] ==================================================================
[   24.240663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   24.241332] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.242002] 
[   24.242151] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.242183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.242193] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.242203] Call trace:
[   24.242210]  show_stack+0x20/0x38 (C)
[   24.242231]  dump_stack_lvl+0x8c/0xd0
[   24.242249]  print_report+0x118/0x608
[   24.242269]  kasan_report+0xdc/0x128
[   24.242287]  __asan_report_store4_noabort+0x20/0x30
[   24.242311]  kasan_atomics_helper+0x3f94/0x4858
[   24.242330]  kasan_atomics+0x198/0x2e0
[   24.242347]  kunit_try_run_case+0x170/0x3f0
[   24.242371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.242396]  kthread+0x328/0x630
[   24.242418]  ret_from_fork+0x10/0x20
[   24.242438] 
[   24.248336] Allocated by task 319:
[   24.248652]  kasan_save_stack+0x3c/0x68
[   24.249011]  kasan_save_track+0x20/0x40
[   24.249370]  kasan_save_alloc_info+0x40/0x58
[   24.249769]  __kasan_kmalloc+0xd4/0xd8
[   24.250119]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.250544]  kasan_atomics+0xb8/0x2e0
[   24.250887]  kunit_try_run_case+0x170/0x3f0
[   24.251280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.251788]  kthread+0x328/0x630
[   24.252098]  ret_from_fork+0x10/0x20
[   24.252435] 
[   24.252582] The buggy address belongs to the object at ffff00000a4bdd00
[   24.252582]  which belongs to the cache kmalloc-64 of size 64
[   24.253683] The buggy address is located 0 bytes to the right of
[   24.253683]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.254832] 
[   24.254978] The buggy address belongs to the physical page:
[   24.255481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.256189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.256782] page_type: f5(slab)
[   24.257080] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.257780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.258476] page dumped because: kasan: bad access detected
[   24.258979] 
[   24.259125] Memory state around the buggy address:
[   24.259562]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.260214]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.260867] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.261517]                                      ^
[   24.261954]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.262606]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.263255] ==================================================================
[   24.598157] ==================================================================
[   24.598794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   24.599440] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.600094] 
[   24.600233] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.600248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.600252] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.600257] Call trace:
[   24.600261]  show_stack+0x20/0x38 (C)
[   24.600270]  dump_stack_lvl+0x8c/0xd0
[   24.600279]  print_report+0x118/0x608
[   24.600288]  kasan_report+0xdc/0x128
[   24.600296]  kasan_check_range+0x100/0x1a8
[   24.600306]  __kasan_check_write+0x20/0x30
[   24.600316]  kasan_atomics_helper+0x99c/0x4858
[   24.600324]  kasan_atomics+0x198/0x2e0
[   24.600332]  kunit_try_run_case+0x170/0x3f0
[   24.600342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.600354]  kthread+0x328/0x630
[   24.600364]  ret_from_fork+0x10/0x20
[   24.600374] 
[   24.606496] Allocated by task 319:
[   24.606800]  kasan_save_stack+0x3c/0x68
[   24.607144]  kasan_save_track+0x20/0x40
[   24.607488]  kasan_save_alloc_info+0x40/0x58
[   24.607871]  __kasan_kmalloc+0xd4/0xd8
[   24.608208]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.608614]  kasan_atomics+0xb8/0x2e0
[   24.608943]  kunit_try_run_case+0x170/0x3f0
[   24.609319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.609808]  kthread+0x328/0x630
[   24.610101]  ret_from_fork+0x10/0x20
[   24.610423] 
[   24.610561] The buggy address belongs to the object at ffff00000a4bdd00
[   24.610561]  which belongs to the cache kmalloc-64 of size 64
[   24.611644] The buggy address is located 0 bytes to the right of
[   24.611644]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.612773] 
[   24.612910] The buggy address belongs to the physical page:
[   24.613402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.614094] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.614673] page_type: f5(slab)
[   24.614956] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.615639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.616321] page dumped because: kasan: bad access detected
[   24.616813] 
[   24.616949] Memory state around the buggy address:
[   24.617375]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.618011]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.618648] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.619284]                                      ^
[   24.619710]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.620348]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.620984] ==================================================================
[   24.785485] ==================================================================
[   24.786122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   24.786776] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.787422] 
[   24.787561] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.787575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.787579] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.787584] Call trace:
[   24.787587]  show_stack+0x20/0x38 (C)
[   24.787596]  dump_stack_lvl+0x8c/0xd0
[   24.787605]  print_report+0x118/0x608
[   24.787614]  kasan_report+0xdc/0x128
[   24.787623]  __asan_report_load4_noabort+0x20/0x30
[   24.787633]  kasan_atomics_helper+0x3de4/0x4858
[   24.787641]  kasan_atomics+0x198/0x2e0
[   24.787650]  kunit_try_run_case+0x170/0x3f0
[   24.787660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.787672]  kthread+0x328/0x630
[   24.787681]  ret_from_fork+0x10/0x20
[   24.787691] 
[   24.793522] Allocated by task 319:
[   24.793826]  kasan_save_stack+0x3c/0x68
[   24.794171]  kasan_save_track+0x20/0x40
[   24.794515]  kasan_save_alloc_info+0x40/0x58
[   24.794898]  __kasan_kmalloc+0xd4/0xd8
[   24.795236]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.795643]  kasan_atomics+0xb8/0x2e0
[   24.795972]  kunit_try_run_case+0x170/0x3f0
[   24.796348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.796838]  kthread+0x328/0x630
[   24.797131]  ret_from_fork+0x10/0x20
[   24.797454] 
[   24.797590] The buggy address belongs to the object at ffff00000a4bdd00
[   24.797590]  which belongs to the cache kmalloc-64 of size 64
[   24.798673] The buggy address is located 0 bytes to the right of
[   24.798673]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.799802] 
[   24.799939] The buggy address belongs to the physical page:
[   24.800432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.801124] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.801701] page_type: f5(slab)
[   24.801986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.802670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.803352] page dumped because: kasan: bad access detected
[   24.803844] 
[   24.803981] Memory state around the buggy address:
[   24.804406]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.805043]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.805681] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.806317]                                      ^
[   24.806742]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.807379]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.808014] ==================================================================
[   24.948763] ==================================================================
[   24.949400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   24.950046] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.950699] 
[   24.950838] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.950852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.950857] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.950862] Call trace:
[   24.950865]  show_stack+0x20/0x38 (C)
[   24.950874]  dump_stack_lvl+0x8c/0xd0
[   24.950883]  print_report+0x118/0x608
[   24.950891]  kasan_report+0xdc/0x128
[   24.950900]  kasan_check_range+0x100/0x1a8
[   24.950909]  __kasan_check_write+0x20/0x30
[   24.950919]  kasan_atomics_helper+0xe44/0x4858
[   24.950928]  kasan_atomics+0x198/0x2e0
[   24.950936]  kunit_try_run_case+0x170/0x3f0
[   24.950946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.950957]  kthread+0x328/0x630
[   24.950967]  ret_from_fork+0x10/0x20
[   24.950976] 
[   24.957095] Allocated by task 319:
[   24.957399]  kasan_save_stack+0x3c/0x68
[   24.957743]  kasan_save_track+0x20/0x40
[   24.958088]  kasan_save_alloc_info+0x40/0x58
[   24.958472]  __kasan_kmalloc+0xd4/0xd8
[   24.958809]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.959215]  kasan_atomics+0xb8/0x2e0
[   24.959544]  kunit_try_run_case+0x170/0x3f0
[   24.959920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.960411]  kthread+0x328/0x630
[   24.960705]  ret_from_fork+0x10/0x20
[   24.961027] 
[   24.961163] The buggy address belongs to the object at ffff00000a4bdd00
[   24.961163]  which belongs to the cache kmalloc-64 of size 64
[   24.962246] The buggy address is located 0 bytes to the right of
[   24.962246]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.963375] 
[   24.963512] The buggy address belongs to the physical page:
[   24.964004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.964696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.965274] page_type: f5(slab)
[   24.965557] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.966241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.966923] page dumped because: kasan: bad access detected
[   24.967415] 
[   24.967552] Memory state around the buggy address:
[   24.967977]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.968616]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.969252] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.969888]                                      ^
[   24.970314]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.970951]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.971587] ==================================================================
[   25.347618] ==================================================================
[   25.348255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   25.348908] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.349561] 
[   25.349700] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.349714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.349719] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.349723] Call trace:
[   25.349726]  show_stack+0x20/0x38 (C)
[   25.349736]  dump_stack_lvl+0x8c/0xd0
[   25.349745]  print_report+0x118/0x608
[   25.349753]  kasan_report+0xdc/0x128
[   25.349762]  kasan_check_range+0x100/0x1a8
[   25.349771]  __kasan_check_write+0x20/0x30
[   25.349781]  kasan_atomics_helper+0x14e4/0x4858
[   25.349789]  kasan_atomics+0x198/0x2e0
[   25.349797]  kunit_try_run_case+0x170/0x3f0
[   25.349808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.349819]  kthread+0x328/0x630
[   25.349829]  ret_from_fork+0x10/0x20
[   25.349838] 
[   25.355966] Allocated by task 319:
[   25.356270]  kasan_save_stack+0x3c/0x68
[   25.356614]  kasan_save_track+0x20/0x40
[   25.356958]  kasan_save_alloc_info+0x40/0x58
[   25.357341]  __kasan_kmalloc+0xd4/0xd8
[   25.357678]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.358085]  kasan_atomics+0xb8/0x2e0
[   25.358413]  kunit_try_run_case+0x170/0x3f0
[   25.358789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.359278]  kthread+0x328/0x630
[   25.359571]  ret_from_fork+0x10/0x20
[   25.359893] 
[   25.360030] The buggy address belongs to the object at ffff00000a4bdd00
[   25.360030]  which belongs to the cache kmalloc-64 of size 64
[   25.361113] The buggy address is located 0 bytes to the right of
[   25.361113]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.362242] 
[   25.362379] The buggy address belongs to the physical page:
[   25.362871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.363563] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.364140] page_type: f5(slab)
[   25.364424] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.365107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.365789] page dumped because: kasan: bad access detected
[   25.366281] 
[   25.366417] Memory state around the buggy address:
[   25.366843]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.367480]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.368117] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.368753]                                      ^
[   25.369179]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.369815]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.370451] ==================================================================
[   24.878899] ==================================================================
[   24.879537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   24.880191] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.880837] 
[   24.880975] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.880989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.880994] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.880998] Call trace:
[   24.881002]  show_stack+0x20/0x38 (C)
[   24.881011]  dump_stack_lvl+0x8c/0xd0
[   24.881019]  print_report+0x118/0x608
[   24.881028]  kasan_report+0xdc/0x128
[   24.881037]  __asan_report_load4_noabort+0x20/0x30
[   24.881047]  kasan_atomics_helper+0x3e04/0x4858
[   24.881056]  kasan_atomics+0x198/0x2e0
[   24.881063]  kunit_try_run_case+0x170/0x3f0
[   24.881074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.881086]  kthread+0x328/0x630
[   24.881095]  ret_from_fork+0x10/0x20
[   24.881105] 
[   24.886935] Allocated by task 319:
[   24.887239]  kasan_save_stack+0x3c/0x68
[   24.887585]  kasan_save_track+0x20/0x40
[   24.887930]  kasan_save_alloc_info+0x40/0x58
[   24.888313]  __kasan_kmalloc+0xd4/0xd8
[   24.888651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.889058]  kasan_atomics+0xb8/0x2e0
[   24.889386]  kunit_try_run_case+0x170/0x3f0
[   24.889763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.890254]  kthread+0x328/0x630
[   24.890547]  ret_from_fork+0x10/0x20
[   24.890869] 
[   24.891006] The buggy address belongs to the object at ffff00000a4bdd00
[   24.891006]  which belongs to the cache kmalloc-64 of size 64
[   24.892089] The buggy address is located 0 bytes to the right of
[   24.892089]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.893218] 
[   24.893355] The buggy address belongs to the physical page:
[   24.893847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.894538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.895117] page_type: f5(slab)
[   24.895402] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.896086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.896768] page dumped because: kasan: bad access detected
[   24.897260] 
[   24.897396] Memory state around the buggy address:
[   24.897822]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.898460]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.899097] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.899732]                                      ^
[   24.900158]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.900797]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.901432] ==================================================================
[   25.277449] ==================================================================
[   25.278086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   25.278740] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.279386] 
[   25.279524] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.279538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.279542] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.279547] Call trace:
[   25.279550]  show_stack+0x20/0x38 (C)
[   25.279560]  dump_stack_lvl+0x8c/0xd0
[   25.279568]  print_report+0x118/0x608
[   25.279577]  kasan_report+0xdc/0x128
[   25.279585]  __asan_report_load8_noabort+0x20/0x30
[   25.279596]  kasan_atomics_helper+0x3f04/0x4858
[   25.279604]  kasan_atomics+0x198/0x2e0
[   25.279612]  kunit_try_run_case+0x170/0x3f0
[   25.279622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.279634]  kthread+0x328/0x630
[   25.279644]  ret_from_fork+0x10/0x20
[   25.279653] 
[   25.285481] Allocated by task 319:
[   25.285785]  kasan_save_stack+0x3c/0x68
[   25.286129]  kasan_save_track+0x20/0x40
[   25.286474]  kasan_save_alloc_info+0x40/0x58
[   25.286857]  __kasan_kmalloc+0xd4/0xd8
[   25.287194]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.287603]  kasan_atomics+0xb8/0x2e0
[   25.287932]  kunit_try_run_case+0x170/0x3f0
[   25.288307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.288797]  kthread+0x328/0x630
[   25.289089]  ret_from_fork+0x10/0x20
[   25.289412] 
[   25.289548] The buggy address belongs to the object at ffff00000a4bdd00
[   25.289548]  which belongs to the cache kmalloc-64 of size 64
[   25.290631] The buggy address is located 0 bytes to the right of
[   25.290631]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.291761] 
[   25.291897] The buggy address belongs to the physical page:
[   25.292389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.293081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.293660] page_type: f5(slab)
[   25.293943] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.294627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.295309] page dumped because: kasan: bad access detected
[   25.295801] 
[   25.295938] Memory state around the buggy address:
[   25.296363]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.297000]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.297637] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.298273]                                      ^
[   25.298699]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.299336]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.299972] ==================================================================
[   25.136431] ==================================================================
[   25.137068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   25.137722] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.138375] 
[   25.138515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.138530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.138534] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.138539] Call trace:
[   25.138542]  show_stack+0x20/0x38 (C)
[   25.138552]  dump_stack_lvl+0x8c/0xd0
[   25.138560]  print_report+0x118/0x608
[   25.138569]  kasan_report+0xdc/0x128
[   25.138578]  kasan_check_range+0x100/0x1a8
[   25.138588]  __kasan_check_write+0x20/0x30
[   25.138598]  kasan_atomics_helper+0x1128/0x4858
[   25.138606]  kasan_atomics+0x198/0x2e0
[   25.138614]  kunit_try_run_case+0x170/0x3f0
[   25.138625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.138636]  kthread+0x328/0x630
[   25.138646]  ret_from_fork+0x10/0x20
[   25.138655] 
[   25.144784] Allocated by task 319:
[   25.145089]  kasan_save_stack+0x3c/0x68
[   25.145434]  kasan_save_track+0x20/0x40
[   25.145778]  kasan_save_alloc_info+0x40/0x58
[   25.146161]  __kasan_kmalloc+0xd4/0xd8
[   25.146498]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.146905]  kasan_atomics+0xb8/0x2e0
[   25.147234]  kunit_try_run_case+0x170/0x3f0
[   25.147609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.148098]  kthread+0x328/0x630
[   25.148391]  ret_from_fork+0x10/0x20
[   25.148714] 
[   25.148851] The buggy address belongs to the object at ffff00000a4bdd00
[   25.148851]  which belongs to the cache kmalloc-64 of size 64
[   25.149934] The buggy address is located 0 bytes to the right of
[   25.149934]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.151064] 
[   25.151200] The buggy address belongs to the physical page:
[   25.151692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.152384] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.152961] page_type: f5(slab)
[   25.153246] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.153929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.154612] page dumped because: kasan: bad access detected
[   25.155104] 
[   25.155241] Memory state around the buggy address:
[   25.155665]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.156301]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.156938] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.157576]                                      ^
[   25.158002]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.158639]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.159275] ==================================================================
[   25.300624] ==================================================================
[   25.301261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   25.301914] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.302567] 
[   25.302705] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.302719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.302724] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.302728] Call trace:
[   25.302732]  show_stack+0x20/0x38 (C)
[   25.302741]  dump_stack_lvl+0x8c/0xd0
[   25.302749]  print_report+0x118/0x608
[   25.302758]  kasan_report+0xdc/0x128
[   25.302766]  kasan_check_range+0x100/0x1a8
[   25.302776]  __kasan_check_write+0x20/0x30
[   25.302786]  kasan_atomics_helper+0x1414/0x4858
[   25.302794]  kasan_atomics+0x198/0x2e0
[   25.302802]  kunit_try_run_case+0x170/0x3f0
[   25.302812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.302824]  kthread+0x328/0x630
[   25.302833]  ret_from_fork+0x10/0x20
[   25.302843] 
[   25.308974] Allocated by task 319:
[   25.309279]  kasan_save_stack+0x3c/0x68
[   25.309623]  kasan_save_track+0x20/0x40
[   25.309966]  kasan_save_alloc_info+0x40/0x58
[   25.310349]  __kasan_kmalloc+0xd4/0xd8
[   25.310687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.311093]  kasan_atomics+0xb8/0x2e0
[   25.311422]  kunit_try_run_case+0x170/0x3f0
[   25.311798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.312288]  kthread+0x328/0x630
[   25.312581]  ret_from_fork+0x10/0x20
[   25.312903] 
[   25.313040] The buggy address belongs to the object at ffff00000a4bdd00
[   25.313040]  which belongs to the cache kmalloc-64 of size 64
[   25.314122] The buggy address is located 0 bytes to the right of
[   25.314122]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.315252] 
[   25.315389] The buggy address belongs to the physical page:
[   25.315882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.316574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.317151] page_type: f5(slab)
[   25.317434] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.318118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.318800] page dumped because: kasan: bad access detected
[   25.319292] 
[   25.319428] Memory state around the buggy address:
[   25.319854]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.320490]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.321129] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.321766]                                      ^
[   25.322192]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.322829]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323466] ==================================================================
[   24.408629] ==================================================================
[   24.409274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   24.409926] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.410586] 
[   24.410730] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.410752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.410759] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.410766] Call trace:
[   24.410771]  show_stack+0x20/0x38 (C)
[   24.410785]  dump_stack_lvl+0x8c/0xd0
[   24.410798]  print_report+0x118/0x608
[   24.410810]  kasan_report+0xdc/0x128
[   24.410823]  kasan_check_range+0x100/0x1a8
[   24.410837]  __kasan_check_write+0x20/0x30
[   24.410852]  kasan_atomics_helper+0x61c/0x4858
[   24.410864]  kasan_atomics+0x198/0x2e0
[   24.410876]  kunit_try_run_case+0x170/0x3f0
[   24.410891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.410908]  kthread+0x328/0x630
[   24.410923]  ret_from_fork+0x10/0x20
[   24.410937] 
[   24.417080] Allocated by task 319:
[   24.417388]  kasan_save_stack+0x3c/0x68
[   24.417739]  kasan_save_track+0x20/0x40
[   24.418089]  kasan_save_alloc_info+0x40/0x58
[   24.418480]  __kasan_kmalloc+0xd4/0xd8
[   24.418822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.419236]  kasan_atomics+0xb8/0x2e0
[   24.419571]  kunit_try_run_case+0x170/0x3f0
[   24.419954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.420451]  kthread+0x328/0x630
[   24.420751]  ret_from_fork+0x10/0x20
[   24.421079] 
[   24.421220] The buggy address belongs to the object at ffff00000a4bdd00
[   24.421220]  which belongs to the cache kmalloc-64 of size 64
[   24.422310] The buggy address is located 0 bytes to the right of
[   24.422310]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.423446] 
[   24.423587] The buggy address belongs to the physical page:
[   24.424083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.424781] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.425366] page_type: f5(slab)
[   24.425656] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.426345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.427032] page dumped because: kasan: bad access detected
[   24.427529] 
[   24.427670] Memory state around the buggy address:
[   24.428099]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.428743]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.429386] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.430028]                                      ^
[   24.430459]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431102]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431744] ==================================================================
[   24.832225] ==================================================================
[   24.832864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   24.833518] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.834163] 
[   24.834303] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.834318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.834322] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.834327] Call trace:
[   24.834330]  show_stack+0x20/0x38 (C)
[   24.834339]  dump_stack_lvl+0x8c/0xd0
[   24.834347]  print_report+0x118/0x608
[   24.834356]  kasan_report+0xdc/0x128
[   24.834364]  __asan_report_load4_noabort+0x20/0x30
[   24.834375]  kasan_atomics_helper+0x3dd8/0x4858
[   24.834384]  kasan_atomics+0x198/0x2e0
[   24.834391]  kunit_try_run_case+0x170/0x3f0
[   24.834401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.834413]  kthread+0x328/0x630
[   24.834423]  ret_from_fork+0x10/0x20
[   24.834432] 
[   24.840262] Allocated by task 319:
[   24.840567]  kasan_save_stack+0x3c/0x68
[   24.840911]  kasan_save_track+0x20/0x40
[   24.841254]  kasan_save_alloc_info+0x40/0x58
[   24.841638]  __kasan_kmalloc+0xd4/0xd8
[   24.841974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.842381]  kasan_atomics+0xb8/0x2e0
[   24.842710]  kunit_try_run_case+0x170/0x3f0
[   24.843087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.843578]  kthread+0x328/0x630
[   24.843871]  ret_from_fork+0x10/0x20
[   24.844193] 
[   24.844330] The buggy address belongs to the object at ffff00000a4bdd00
[   24.844330]  which belongs to the cache kmalloc-64 of size 64
[   24.845413] The buggy address is located 0 bytes to the right of
[   24.845413]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.846542] 
[   24.846680] The buggy address belongs to the physical page:
[   24.847172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.847864] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.848441] page_type: f5(slab)
[   24.848726] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.849409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.850091] page dumped because: kasan: bad access detected
[   24.850583] 
[   24.850719] Memory state around the buggy address:
[   24.851145]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.851782]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.852420] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.853056]                                      ^
[   24.853482]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.854118]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.854754] ==================================================================
[   24.761992] ==================================================================
[   24.762629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   24.763275] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.763928] 
[   24.764066] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.764081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.764085] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.764090] Call trace:
[   24.764094]  show_stack+0x20/0x38 (C)
[   24.764102]  dump_stack_lvl+0x8c/0xd0
[   24.764111]  print_report+0x118/0x608
[   24.764119]  kasan_report+0xdc/0x128
[   24.764128]  kasan_check_range+0x100/0x1a8
[   24.764137]  __kasan_check_write+0x20/0x30
[   24.764147]  kasan_atomics_helper+0xc08/0x4858
[   24.764155]  kasan_atomics+0x198/0x2e0
[   24.764164]  kunit_try_run_case+0x170/0x3f0
[   24.764174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.764185]  kthread+0x328/0x630
[   24.764195]  ret_from_fork+0x10/0x20
[   24.764204] 
[   24.770326] Allocated by task 319:
[   24.770630]  kasan_save_stack+0x3c/0x68
[   24.770974]  kasan_save_track+0x20/0x40
[   24.771319]  kasan_save_alloc_info+0x40/0x58
[   24.771702]  __kasan_kmalloc+0xd4/0xd8
[   24.772039]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.772446]  kasan_atomics+0xb8/0x2e0
[   24.772775]  kunit_try_run_case+0x170/0x3f0
[   24.773150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.773641]  kthread+0x328/0x630
[   24.773934]  ret_from_fork+0x10/0x20
[   24.774256] 
[   24.774394] The buggy address belongs to the object at ffff00000a4bdd00
[   24.774394]  which belongs to the cache kmalloc-64 of size 64
[   24.775476] The buggy address is located 0 bytes to the right of
[   24.775476]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.776606] 
[   24.776743] The buggy address belongs to the physical page:
[   24.777235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.777925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.778503] page_type: f5(slab)
[   24.778787] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.779470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.780152] page dumped because: kasan: bad access detected
[   24.780644] 
[   24.780781] Memory state around the buggy address:
[   24.781207]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.781843]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.782480] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.783116]                                      ^
[   24.783542]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.784178]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.784814] ==================================================================
[   25.018956] ==================================================================
[   25.019594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   25.020240] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.020893] 
[   25.021032] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.021046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.021051] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.021056] Call trace:
[   25.021059]  show_stack+0x20/0x38 (C)
[   25.021068]  dump_stack_lvl+0x8c/0xd0
[   25.021077]  print_report+0x118/0x608
[   25.021086]  kasan_report+0xdc/0x128
[   25.021095]  kasan_check_range+0x100/0x1a8
[   25.021104]  __kasan_check_write+0x20/0x30
[   25.021115]  kasan_atomics_helper+0xf20/0x4858
[   25.021123]  kasan_atomics+0x198/0x2e0
[   25.021132]  kunit_try_run_case+0x170/0x3f0
[   25.021142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.021154]  kthread+0x328/0x630
[   25.021164]  ret_from_fork+0x10/0x20
[   25.021174] 
[   25.027295] Allocated by task 319:
[   25.027598]  kasan_save_stack+0x3c/0x68
[   25.027943]  kasan_save_track+0x20/0x40
[   25.028287]  kasan_save_alloc_info+0x40/0x58
[   25.028670]  __kasan_kmalloc+0xd4/0xd8
[   25.029007]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.029414]  kasan_atomics+0xb8/0x2e0
[   25.029743]  kunit_try_run_case+0x170/0x3f0
[   25.030118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.030608]  kthread+0x328/0x630
[   25.030901]  ret_from_fork+0x10/0x20
[   25.031224] 
[   25.031360] The buggy address belongs to the object at ffff00000a4bdd00
[   25.031360]  which belongs to the cache kmalloc-64 of size 64
[   25.032443] The buggy address is located 0 bytes to the right of
[   25.032443]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.033572] 
[   25.033709] The buggy address belongs to the physical page:
[   25.034202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.034894] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.035472] page_type: f5(slab)
[   25.035755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.036439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.037121] page dumped because: kasan: bad access detected
[   25.037613] 
[   25.037750] Memory state around the buggy address:
[   25.038175]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.038814]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.039450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.040086]                                      ^
[   25.040512]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041150]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041786] ==================================================================
[   24.527967] ==================================================================
[   24.528605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   24.529251] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.529905] 
[   24.530044] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.530059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.530063] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.530068] Call trace:
[   24.530072]  show_stack+0x20/0x38 (C)
[   24.530081]  dump_stack_lvl+0x8c/0xd0
[   24.530089]  print_report+0x118/0x608
[   24.530098]  kasan_report+0xdc/0x128
[   24.530106]  kasan_check_range+0x100/0x1a8
[   24.530116]  __kasan_check_write+0x20/0x30
[   24.530126]  kasan_atomics_helper+0x894/0x4858
[   24.530134]  kasan_atomics+0x198/0x2e0
[   24.530142]  kunit_try_run_case+0x170/0x3f0
[   24.530152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.530164]  kthread+0x328/0x630
[   24.530174]  ret_from_fork+0x10/0x20
[   24.530183] 
[   24.536305] Allocated by task 319:
[   24.536609]  kasan_save_stack+0x3c/0x68
[   24.536954]  kasan_save_track+0x20/0x40
[   24.537297]  kasan_save_alloc_info+0x40/0x58
[   24.537680]  __kasan_kmalloc+0xd4/0xd8
[   24.538017]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.538425]  kasan_atomics+0xb8/0x2e0
[   24.538755]  kunit_try_run_case+0x170/0x3f0
[   24.539130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.539621]  kthread+0x328/0x630
[   24.539913]  ret_from_fork+0x10/0x20
[   24.540236] 
[   24.540372] The buggy address belongs to the object at ffff00000a4bdd00
[   24.540372]  which belongs to the cache kmalloc-64 of size 64
[   24.541455] The buggy address is located 0 bytes to the right of
[   24.541455]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.542585] 
[   24.542722] The buggy address belongs to the physical page:
[   24.543214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.543906] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.544485] page_type: f5(slab)
[   24.544770] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.545454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.546136] page dumped because: kasan: bad access detected
[   24.546628] 
[   24.546764] Memory state around the buggy address:
[   24.547190]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.547826]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.548464] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.549101]                                      ^
[   24.549527]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.550164]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.550800] ==================================================================
[   25.488002] ==================================================================
[   25.488640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   25.489295] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.489948] 
[   25.490088] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.490103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.490108] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.490113] Call trace:
[   25.490116]  show_stack+0x20/0x38 (C)
[   25.490125]  dump_stack_lvl+0x8c/0xd0
[   25.490134]  print_report+0x118/0x608
[   25.490143]  kasan_report+0xdc/0x128
[   25.490152]  kasan_check_range+0x100/0x1a8
[   25.490162]  __kasan_check_write+0x20/0x30
[   25.490172]  kasan_atomics_helper+0x16d0/0x4858
[   25.490180]  kasan_atomics+0x198/0x2e0
[   25.490188]  kunit_try_run_case+0x170/0x3f0
[   25.490199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.490211]  kthread+0x328/0x630
[   25.490221]  ret_from_fork+0x10/0x20
[   25.490231] 
[   25.496359] Allocated by task 319:
[   25.496663]  kasan_save_stack+0x3c/0x68
[   25.497008]  kasan_save_track+0x20/0x40
[   25.497351]  kasan_save_alloc_info+0x40/0x58
[   25.497734]  __kasan_kmalloc+0xd4/0xd8
[   25.498072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.498480]  kasan_atomics+0xb8/0x2e0
[   25.498809]  kunit_try_run_case+0x170/0x3f0
[   25.499185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.499674]  kthread+0x328/0x630
[   25.499967]  ret_from_fork+0x10/0x20
[   25.500289] 
[   25.500426] The buggy address belongs to the object at ffff00000a4bdd00
[   25.500426]  which belongs to the cache kmalloc-64 of size 64
[   25.501508] The buggy address is located 0 bytes to the right of
[   25.501508]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.502638] 
[   25.502776] The buggy address belongs to the physical page:
[   25.503269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.503961] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.504539] page_type: f5(slab)
[   25.504824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.505508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.506190] page dumped because: kasan: bad access detected
[   25.506682] 
[   25.506818] Memory state around the buggy address:
[   25.507244]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.507881]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.508518] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.509155]                                      ^
[   25.509581]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.510218]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.510854] ==================================================================
[   24.288365] ==================================================================
[   24.289019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   24.289682] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.290351] 
[   24.290500] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.290532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.290542] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.290552] Call trace:
[   24.290560]  show_stack+0x20/0x38 (C)
[   24.290580]  dump_stack_lvl+0x8c/0xd0
[   24.290599]  print_report+0x118/0x608
[   24.290618]  kasan_report+0xdc/0x128
[   24.290637]  kasan_check_range+0x100/0x1a8
[   24.290658]  __kasan_check_write+0x20/0x30
[   24.290680]  kasan_atomics_helper+0x414/0x4858
[   24.290699]  kasan_atomics+0x198/0x2e0
[   24.290716]  kunit_try_run_case+0x170/0x3f0
[   24.290738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.290764]  kthread+0x328/0x630
[   24.290785]  ret_from_fork+0x10/0x20
[   24.290806] 
[   24.296989] Allocated by task 319:
[   24.297305]  kasan_save_stack+0x3c/0x68
[   24.297665]  kasan_save_track+0x20/0x40
[   24.298023]  kasan_save_alloc_info+0x40/0x58
[   24.298423]  __kasan_kmalloc+0xd4/0xd8
[   24.298773]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.299198]  kasan_atomics+0xb8/0x2e0
[   24.299539]  kunit_try_run_case+0x170/0x3f0
[   24.299932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.300441]  kthread+0x328/0x630
[   24.300751]  ret_from_fork+0x10/0x20
[   24.301088] 
[   24.301234] The buggy address belongs to the object at ffff00000a4bdd00
[   24.301234]  which belongs to the cache kmalloc-64 of size 64
[   24.302336] The buggy address is located 0 bytes to the right of
[   24.302336]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.303485] 
[   24.303632] The buggy address belongs to the physical page:
[   24.304135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.304843] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.305437] page_type: f5(slab)
[   24.305734] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.306433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.307128] page dumped because: kasan: bad access detected
[   24.307632] 
[   24.307777] Memory state around the buggy address:
[   24.308214]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.308867]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.309519] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.310169]                                      ^
[   24.310608]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.311260]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.311910] ==================================================================
[   25.042443] ==================================================================
[   25.043081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   25.043726] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.044380] 
[   25.044518] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.044532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.044536] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.044541] Call trace:
[   25.044544]  show_stack+0x20/0x38 (C)
[   25.044554]  dump_stack_lvl+0x8c/0xd0
[   25.044562]  print_report+0x118/0x608
[   25.044571]  kasan_report+0xdc/0x128
[   25.044580]  kasan_check_range+0x100/0x1a8
[   25.044589]  __kasan_check_write+0x20/0x30
[   25.044599]  kasan_atomics_helper+0xf88/0x4858
[   25.044607]  kasan_atomics+0x198/0x2e0
[   25.044615]  kunit_try_run_case+0x170/0x3f0
[   25.044625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.044636]  kthread+0x328/0x630
[   25.044646]  ret_from_fork+0x10/0x20
[   25.044656] 
[   25.050780] Allocated by task 319:
[   25.051084]  kasan_save_stack+0x3c/0x68
[   25.051429]  kasan_save_track+0x20/0x40
[   25.051772]  kasan_save_alloc_info+0x40/0x58
[   25.052155]  __kasan_kmalloc+0xd4/0xd8
[   25.052493]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.052899]  kasan_atomics+0xb8/0x2e0
[   25.053229]  kunit_try_run_case+0x170/0x3f0
[   25.053604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.054095]  kthread+0x328/0x630
[   25.054387]  ret_from_fork+0x10/0x20
[   25.054709] 
[   25.054846] The buggy address belongs to the object at ffff00000a4bdd00
[   25.054846]  which belongs to the cache kmalloc-64 of size 64
[   25.055929] The buggy address is located 0 bytes to the right of
[   25.055929]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.057058] 
[   25.057196] The buggy address belongs to the physical page:
[   25.057688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.058379] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.058958] page_type: f5(slab)
[   25.059241] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.059925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.060607] page dumped because: kasan: bad access detected
[   25.061099] 
[   25.061236] Memory state around the buggy address:
[   25.061662]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.062298]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.062935] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.063573]                                      ^
[   25.063997]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.064635]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.065272] ==================================================================
[   25.464799] ==================================================================
[   25.465436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   25.466089] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.466734] 
[   25.466873] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.466887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.466891] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.466896] Call trace:
[   25.466899]  show_stack+0x20/0x38 (C)
[   25.466908]  dump_stack_lvl+0x8c/0xd0
[   25.466917]  print_report+0x118/0x608
[   25.466926]  kasan_report+0xdc/0x128
[   25.466934]  __asan_report_load8_noabort+0x20/0x30
[   25.466944]  kasan_atomics_helper+0x3df4/0x4858
[   25.466953]  kasan_atomics+0x198/0x2e0
[   25.466961]  kunit_try_run_case+0x170/0x3f0
[   25.466971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.466983]  kthread+0x328/0x630
[   25.466992]  ret_from_fork+0x10/0x20
[   25.467002] 
[   25.472835] Allocated by task 319:
[   25.473138]  kasan_save_stack+0x3c/0x68
[   25.473482]  kasan_save_track+0x20/0x40
[   25.473827]  kasan_save_alloc_info+0x40/0x58
[   25.474210]  __kasan_kmalloc+0xd4/0xd8
[   25.474547]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.474954]  kasan_atomics+0xb8/0x2e0
[   25.475283]  kunit_try_run_case+0x170/0x3f0
[   25.475658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.476149]  kthread+0x328/0x630
[   25.476442]  ret_from_fork+0x10/0x20
[   25.476764] 
[   25.476900] The buggy address belongs to the object at ffff00000a4bdd00
[   25.476900]  which belongs to the cache kmalloc-64 of size 64
[   25.477983] The buggy address is located 0 bytes to the right of
[   25.477983]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.479112] 
[   25.479249] The buggy address belongs to the physical page:
[   25.479741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.480433] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.481011] page_type: f5(slab)
[   25.481296] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.481980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.482662] page dumped because: kasan: bad access detected
[   25.483154] 
[   25.483290] Memory state around the buggy address:
[   25.483716]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.484354]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.484991] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.485627]                                      ^
[   25.486053]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.486690]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.487326] ==================================================================
[   24.645141] ==================================================================
[   24.645779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   24.646425] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.647078] 
[   24.647218] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.647232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.647237] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.647242] Call trace:
[   24.647245]  show_stack+0x20/0x38 (C)
[   24.647255]  dump_stack_lvl+0x8c/0xd0
[   24.647263]  print_report+0x118/0x608
[   24.647272]  kasan_report+0xdc/0x128
[   24.647281]  kasan_check_range+0x100/0x1a8
[   24.647290]  __kasan_check_write+0x20/0x30
[   24.647300]  kasan_atomics_helper+0xa6c/0x4858
[   24.647309]  kasan_atomics+0x198/0x2e0
[   24.647317]  kunit_try_run_case+0x170/0x3f0
[   24.647327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.647339]  kthread+0x328/0x630
[   24.647349]  ret_from_fork+0x10/0x20
[   24.647358] 
[   24.653482] Allocated by task 319:
[   24.653787]  kasan_save_stack+0x3c/0x68
[   24.654132]  kasan_save_track+0x20/0x40
[   24.654477]  kasan_save_alloc_info+0x40/0x58
[   24.654861]  __kasan_kmalloc+0xd4/0xd8
[   24.655198]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.655604]  kasan_atomics+0xb8/0x2e0
[   24.655933]  kunit_try_run_case+0x170/0x3f0
[   24.656309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.656800]  kthread+0x328/0x630
[   24.657093]  ret_from_fork+0x10/0x20
[   24.657415] 
[   24.657553] The buggy address belongs to the object at ffff00000a4bdd00
[   24.657553]  which belongs to the cache kmalloc-64 of size 64
[   24.658636] The buggy address is located 0 bytes to the right of
[   24.658636]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.659766] 
[   24.659902] The buggy address belongs to the physical page:
[   24.660394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.661086] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.661663] page_type: f5(slab)
[   24.661948] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.662632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.663313] page dumped because: kasan: bad access detected
[   24.663805] 
[   24.663942] Memory state around the buggy address:
[   24.664368]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.665004]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.665642] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.666279]                                      ^
[   24.666705]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667343]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667979] ==================================================================
[   24.117772] ==================================================================
[   24.118433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   24.119104] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.119768] 
[   24.119923] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.119959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.119969] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.119983] Call trace:
[   24.119992]  show_stack+0x20/0x38 (C)
[   24.120014]  dump_stack_lvl+0x8c/0xd0
[   24.120038]  print_report+0x118/0x608
[   24.120059]  kasan_report+0xdc/0x128
[   24.120080]  kasan_check_range+0x100/0x1a8
[   24.120102]  __kasan_check_read+0x20/0x30
[   24.120126]  kasan_atomics_helper+0x1ec/0x4858
[   24.120148]  kasan_atomics+0x198/0x2e0
[   24.120168]  kunit_try_run_case+0x170/0x3f0
[   24.120193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.120221]  kthread+0x328/0x630
[   24.120245]  ret_from_fork+0x10/0x20
[   24.120269] 
[   24.126456] Allocated by task 319:
[   24.126774]  kasan_save_stack+0x3c/0x68
[   24.127136]  kasan_save_track+0x20/0x40
[   24.127497]  kasan_save_alloc_info+0x40/0x58
[   24.127899]  __kasan_kmalloc+0xd4/0xd8
[   24.128252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.128681]  kasan_atomics+0xb8/0x2e0
[   24.129025]  kunit_try_run_case+0x170/0x3f0
[   24.129420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.129931]  kthread+0x328/0x630
[   24.130242]  ret_from_fork+0x10/0x20
[   24.130582] 
[   24.130730] The buggy address belongs to the object at ffff00000a4bdd00
[   24.130730]  which belongs to the cache kmalloc-64 of size 64
[   24.131836] The buggy address is located 0 bytes to the right of
[   24.131836]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.132987] 
[   24.133135] The buggy address belongs to the physical page:
[   24.133643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.134354] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.134953] page_type: f5(slab)
[   24.135253] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.135956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.136654] page dumped because: kasan: bad access detected
[   24.137160] 
[   24.137308] Memory state around the buggy address:
[   24.137747]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.138402]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.139059] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.139712]                                      ^
[   24.140151]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.140806]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.141458] ==================================================================
[   24.384789] ==================================================================
[   24.385434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   24.386087] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.386746] 
[   24.386889] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.386911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.386917] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.386924] Call trace:
[   24.386929]  show_stack+0x20/0x38 (C)
[   24.386943]  dump_stack_lvl+0x8c/0xd0
[   24.386956]  print_report+0x118/0x608
[   24.386969]  kasan_report+0xdc/0x128
[   24.386982]  kasan_check_range+0x100/0x1a8
[   24.386996]  __kasan_check_write+0x20/0x30
[   24.387011]  kasan_atomics_helper+0x5b4/0x4858
[   24.387023]  kasan_atomics+0x198/0x2e0
[   24.387035]  kunit_try_run_case+0x170/0x3f0
[   24.387051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.387068]  kthread+0x328/0x630
[   24.387083]  ret_from_fork+0x10/0x20
[   24.387097] 
[   24.393242] Allocated by task 319:
[   24.393551]  kasan_save_stack+0x3c/0x68
[   24.393902]  kasan_save_track+0x20/0x40
[   24.394252]  kasan_save_alloc_info+0x40/0x58
[   24.394642]  __kasan_kmalloc+0xd4/0xd8
[   24.394984]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.395398]  kasan_atomics+0xb8/0x2e0
[   24.395733]  kunit_try_run_case+0x170/0x3f0
[   24.396115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.396613]  kthread+0x328/0x630
[   24.396912]  ret_from_fork+0x10/0x20
[   24.397240] 
[   24.397381] The buggy address belongs to the object at ffff00000a4bdd00
[   24.397381]  which belongs to the cache kmalloc-64 of size 64
[   24.398470] The buggy address is located 0 bytes to the right of
[   24.398470]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.399609] 
[   24.399749] The buggy address belongs to the physical page:
[   24.400246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.400944] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.401530] page_type: f5(slab)
[   24.401819] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.402510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.403196] page dumped because: kasan: bad access detected
[   24.403694] 
[   24.403834] Memory state around the buggy address:
[   24.404264]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.404907]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.405551] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.406193]                                      ^
[   24.406623]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.407267]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.407908] ==================================================================
[   25.511524] ==================================================================
[   25.512163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   25.512817] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.513463] 
[   25.513601] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.513615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.513620] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.513624] Call trace:
[   25.513628]  show_stack+0x20/0x38 (C)
[   25.513637]  dump_stack_lvl+0x8c/0xd0
[   25.513646]  print_report+0x118/0x608
[   25.513655]  kasan_report+0xdc/0x128
[   25.513664]  __asan_report_load8_noabort+0x20/0x30
[   25.513674]  kasan_atomics_helper+0x3e10/0x4858
[   25.513682]  kasan_atomics+0x198/0x2e0
[   25.513690]  kunit_try_run_case+0x170/0x3f0
[   25.513701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.513713]  kthread+0x328/0x630
[   25.513723]  ret_from_fork+0x10/0x20
[   25.513732] 
[   25.519563] Allocated by task 319:
[   25.519868]  kasan_save_stack+0x3c/0x68
[   25.520213]  kasan_save_track+0x20/0x40
[   25.520557]  kasan_save_alloc_info+0x40/0x58
[   25.520940]  __kasan_kmalloc+0xd4/0xd8
[   25.521277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.521684]  kasan_atomics+0xb8/0x2e0
[   25.522013]  kunit_try_run_case+0x170/0x3f0
[   25.522389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.522880]  kthread+0x328/0x630
[   25.523173]  ret_from_fork+0x10/0x20
[   25.523495] 
[   25.523632] The buggy address belongs to the object at ffff00000a4bdd00
[   25.523632]  which belongs to the cache kmalloc-64 of size 64
[   25.524714] The buggy address is located 0 bytes to the right of
[   25.524714]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.525844] 
[   25.525981] The buggy address belongs to the physical page:
[   25.526473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.527165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.527742] page_type: f5(slab)
[   25.528027] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.528710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.529392] page dumped because: kasan: bad access detected
[   25.529884] 
[   25.530021] Memory state around the buggy address:
[   25.530445]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.531082]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.531719] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.532355]                                      ^
[   25.532781]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.533418]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.534055] ==================================================================
[   24.191649] ==================================================================
[   24.192306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   24.192977] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.193639] 
[   24.193788] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.193821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.193831] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.193842] Call trace:
[   24.193849]  show_stack+0x20/0x38 (C)
[   24.193869]  dump_stack_lvl+0x8c/0xd0
[   24.193889]  print_report+0x118/0x608
[   24.193909]  kasan_report+0xdc/0x128
[   24.193927]  __asan_report_load4_noabort+0x20/0x30
[   24.193951]  kasan_atomics_helper+0x40fc/0x4858
[   24.193970]  kasan_atomics+0x198/0x2e0
[   24.193987]  kunit_try_run_case+0x170/0x3f0
[   24.194011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.194036]  kthread+0x328/0x630
[   24.194058]  ret_from_fork+0x10/0x20
[   24.194079] 
[   24.199969] Allocated by task 319:
[   24.200285]  kasan_save_stack+0x3c/0x68
[   24.200645]  kasan_save_track+0x20/0x40
[   24.201003]  kasan_save_alloc_info+0x40/0x58
[   24.201403]  __kasan_kmalloc+0xd4/0xd8
[   24.201753]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.202179]  kasan_atomics+0xb8/0x2e0
[   24.202523]  kunit_try_run_case+0x170/0x3f0
[   24.202916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.203425]  kthread+0x328/0x630
[   24.203735]  ret_from_fork+0x10/0x20
[   24.204073] 
[   24.204220] The buggy address belongs to the object at ffff00000a4bdd00
[   24.204220]  which belongs to the cache kmalloc-64 of size 64
[   24.205320] The buggy address is located 0 bytes to the right of
[   24.205320]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.206469] 
[   24.206616] The buggy address belongs to the physical page:
[   24.207120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.207828] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.208421] page_type: f5(slab)
[   24.208719] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.209418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.210113] page dumped because: kasan: bad access detected
[   24.210617] 
[   24.210763] Memory state around the buggy address:
[   24.211201]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.211853]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.212506] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.213156]                                      ^
[   24.213594]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.214246]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.214896] ==================================================================
[   24.574677] ==================================================================
[   24.575314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   24.575960] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.576614] 
[   24.576753] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.576768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.576772] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.576777] Call trace:
[   24.576780]  show_stack+0x20/0x38 (C)
[   24.576789]  dump_stack_lvl+0x8c/0xd0
[   24.576798]  print_report+0x118/0x608
[   24.576806]  kasan_report+0xdc/0x128
[   24.576815]  kasan_check_range+0x100/0x1a8
[   24.576824]  __kasan_check_write+0x20/0x30
[   24.576835]  kasan_atomics_helper+0x934/0x4858
[   24.576843]  kasan_atomics+0x198/0x2e0
[   24.576851]  kunit_try_run_case+0x170/0x3f0
[   24.576861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.576873]  kthread+0x328/0x630
[   24.576883]  ret_from_fork+0x10/0x20
[   24.576892] 
[   24.583018] Allocated by task 319:
[   24.583322]  kasan_save_stack+0x3c/0x68
[   24.583667]  kasan_save_track+0x20/0x40
[   24.584010]  kasan_save_alloc_info+0x40/0x58
[   24.584393]  __kasan_kmalloc+0xd4/0xd8
[   24.584730]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.585138]  kasan_atomics+0xb8/0x2e0
[   24.585467]  kunit_try_run_case+0x170/0x3f0
[   24.585842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.586334]  kthread+0x328/0x630
[   24.586626]  ret_from_fork+0x10/0x20
[   24.586948] 
[   24.587085] The buggy address belongs to the object at ffff00000a4bdd00
[   24.587085]  which belongs to the cache kmalloc-64 of size 64
[   24.588167] The buggy address is located 0 bytes to the right of
[   24.588167]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.589297] 
[   24.589433] The buggy address belongs to the physical page:
[   24.589925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.590617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.591194] page_type: f5(slab)
[   24.591477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.592160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.592842] page dumped because: kasan: bad access detected
[   24.593334] 
[   24.593470] Memory state around the buggy address:
[   24.593896]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.594533]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.595170] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.595806]                                      ^
[   24.596231]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.596868]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.597504] ==================================================================
[   25.581398] ==================================================================
[   25.582034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   25.582687] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.583341] 
[   25.583479] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.583494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.583498] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.583503] Call trace:
[   25.583506]  show_stack+0x20/0x38 (C)
[   25.583515]  dump_stack_lvl+0x8c/0xd0
[   25.583524]  print_report+0x118/0x608
[   25.583532]  kasan_report+0xdc/0x128
[   25.583541]  kasan_check_range+0x100/0x1a8
[   25.583550]  __kasan_check_write+0x20/0x30
[   25.583561]  kasan_atomics_helper+0x17ec/0x4858
[   25.583569]  kasan_atomics+0x198/0x2e0
[   25.583577]  kunit_try_run_case+0x170/0x3f0
[   25.583587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.583599]  kthread+0x328/0x630
[   25.583609]  ret_from_fork+0x10/0x20
[   25.583618] 
[   25.589748] Allocated by task 319:
[   25.590053]  kasan_save_stack+0x3c/0x68
[   25.590398]  kasan_save_track+0x20/0x40
[   25.590743]  kasan_save_alloc_info+0x40/0x58
[   25.591126]  __kasan_kmalloc+0xd4/0xd8
[   25.591463]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.591870]  kasan_atomics+0xb8/0x2e0
[   25.592198]  kunit_try_run_case+0x170/0x3f0
[   25.592574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.593065]  kthread+0x328/0x630
[   25.593357]  ret_from_fork+0x10/0x20
[   25.593680] 
[   25.593816] The buggy address belongs to the object at ffff00000a4bdd00
[   25.593816]  which belongs to the cache kmalloc-64 of size 64
[   25.594899] The buggy address is located 0 bytes to the right of
[   25.594899]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.596028] 
[   25.596165] The buggy address belongs to the physical page:
[   25.596657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.597349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.597926] page_type: f5(slab)
[   25.598209] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.598893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.599575] page dumped because: kasan: bad access detected
[   25.600067] 
[   25.600203] Memory state around the buggy address:
[   25.600627]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.601266]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.601904] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.602540]                                      ^
[   25.602966]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.603602]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604239] ==================================================================
[   25.065933] ==================================================================
[   25.066570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   25.067216] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.067869] 
[   25.068009] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.068023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.068027] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.068032] Call trace:
[   25.068035]  show_stack+0x20/0x38 (C)
[   25.068045]  dump_stack_lvl+0x8c/0xd0
[   25.068053]  print_report+0x118/0x608
[   25.068062]  kasan_report+0xdc/0x128
[   25.068070]  kasan_check_range+0x100/0x1a8
[   25.068079]  __kasan_check_write+0x20/0x30
[   25.068089]  kasan_atomics_helper+0xff0/0x4858
[   25.068098]  kasan_atomics+0x198/0x2e0
[   25.068106]  kunit_try_run_case+0x170/0x3f0
[   25.068116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.068127]  kthread+0x328/0x630
[   25.068137]  ret_from_fork+0x10/0x20
[   25.068146] 
[   25.074265] Allocated by task 319:
[   25.074570]  kasan_save_stack+0x3c/0x68
[   25.074914]  kasan_save_track+0x20/0x40
[   25.075258]  kasan_save_alloc_info+0x40/0x58
[   25.075641]  __kasan_kmalloc+0xd4/0xd8
[   25.075978]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.076384]  kasan_atomics+0xb8/0x2e0
[   25.076714]  kunit_try_run_case+0x170/0x3f0
[   25.077089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.077579]  kthread+0x328/0x630
[   25.077872]  ret_from_fork+0x10/0x20
[   25.078194] 
[   25.078331] The buggy address belongs to the object at ffff00000a4bdd00
[   25.078331]  which belongs to the cache kmalloc-64 of size 64
[   25.079414] The buggy address is located 0 bytes to the right of
[   25.079414]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.080543] 
[   25.080679] The buggy address belongs to the physical page:
[   25.081171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.081862] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.082441] page_type: f5(slab)
[   25.082724] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.083408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.084090] page dumped because: kasan: bad access detected
[   25.084582] 
[   25.084718] Memory state around the buggy address:
[   25.085142]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.085779]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.086416] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.087052]                                      ^
[   25.087477]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.088115]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.088750] ==================================================================
[   24.068083] ==================================================================
[   24.069475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   24.070176] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.070857] 
[   24.071023] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.071075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.071091] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.071109] Call trace:
[   24.071122]  show_stack+0x20/0x38 (C)
[   24.071157]  dump_stack_lvl+0x8c/0xd0
[   24.071190]  print_report+0x118/0x608
[   24.071222]  kasan_report+0xdc/0x128
[   24.071252]  __asan_report_load4_noabort+0x20/0x30
[   24.071288]  kasan_atomics_helper+0x40a8/0x4858
[   24.071318]  kasan_atomics+0x198/0x2e0
[   24.071346]  kunit_try_run_case+0x170/0x3f0
[   24.071383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.071423]  kthread+0x328/0x630
[   24.071459]  ret_from_fork+0x10/0x20
[   24.071493] 
[   24.077442] Allocated by task 319:
[   24.077770]  kasan_save_stack+0x3c/0x68
[   24.078145]  kasan_save_track+0x20/0x40
[   24.078517]  kasan_save_alloc_info+0x40/0x58
[   24.078932]  __kasan_kmalloc+0xd4/0xd8
[   24.079295]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.079738]  kasan_atomics+0xb8/0x2e0
[   24.080095]  kunit_try_run_case+0x170/0x3f0
[   24.080502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.081028]  kthread+0x328/0x630
[   24.081352]  ret_from_fork+0x10/0x20
[   24.081702] 
[   24.081856] The buggy address belongs to the object at ffff00000a4bdd00
[   24.081856]  which belongs to the cache kmalloc-64 of size 64
[   24.082975] The buggy address is located 0 bytes to the right of
[   24.082975]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.084142] 
[   24.084297] The buggy address belongs to the physical page:
[   24.084814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.085539] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.086150] page_type: f5(slab)
[   24.086465] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.087183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.087891] page dumped because: kasan: bad access detected
[   24.088408] 
[   24.088561] Memory state around the buggy address:
[   24.089012]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.089679]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.090346] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.091009]                                      ^
[   24.091460]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.092127]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.092790] ==================================================================
[   25.371123] ==================================================================
[   25.371761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   25.372414] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.373068] 
[   25.373207] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.373221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.373225] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.373230] Call trace:
[   25.373233]  show_stack+0x20/0x38 (C)
[   25.373243]  dump_stack_lvl+0x8c/0xd0
[   25.373251]  print_report+0x118/0x608
[   25.373260]  kasan_report+0xdc/0x128
[   25.373269]  kasan_check_range+0x100/0x1a8
[   25.373278]  __kasan_check_write+0x20/0x30
[   25.373288]  kasan_atomics_helper+0x154c/0x4858
[   25.373297]  kasan_atomics+0x198/0x2e0
[   25.373304]  kunit_try_run_case+0x170/0x3f0
[   25.373315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.373326]  kthread+0x328/0x630
[   25.373336]  ret_from_fork+0x10/0x20
[   25.373346] 
[   25.379473] Allocated by task 319:
[   25.379778]  kasan_save_stack+0x3c/0x68
[   25.380122]  kasan_save_track+0x20/0x40
[   25.380467]  kasan_save_alloc_info+0x40/0x58
[   25.380850]  __kasan_kmalloc+0xd4/0xd8
[   25.381187]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.381594]  kasan_atomics+0xb8/0x2e0
[   25.381923]  kunit_try_run_case+0x170/0x3f0
[   25.382298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.382789]  kthread+0x328/0x630
[   25.383082]  ret_from_fork+0x10/0x20
[   25.383404] 
[   25.383543] The buggy address belongs to the object at ffff00000a4bdd00
[   25.383543]  which belongs to the cache kmalloc-64 of size 64
[   25.384625] The buggy address is located 0 bytes to the right of
[   25.384625]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.385755] 
[   25.385891] The buggy address belongs to the physical page:
[   25.386383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.387075] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.387654] page_type: f5(slab)
[   25.387938] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.388623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.389304] page dumped because: kasan: bad access detected
[   25.389796] 
[   25.389932] Memory state around the buggy address:
[   25.390358]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.390994]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.391633] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.392268]                                      ^
[   25.392693]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.393329]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.393966] ==================================================================
[   24.432493] ==================================================================
[   24.433137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   24.433791] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.434451] 
[   24.434594] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.434616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.434622] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.434630] Call trace:
[   24.434635]  show_stack+0x20/0x38 (C)
[   24.434649]  dump_stack_lvl+0x8c/0xd0
[   24.434661]  print_report+0x118/0x608
[   24.434675]  kasan_report+0xdc/0x128
[   24.434688]  kasan_check_range+0x100/0x1a8
[   24.434702]  __kasan_check_write+0x20/0x30
[   24.434718]  kasan_atomics_helper+0x684/0x4858
[   24.434730]  kasan_atomics+0x198/0x2e0
[   24.434742]  kunit_try_run_case+0x170/0x3f0
[   24.434758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.434776]  kthread+0x328/0x630
[   24.434791]  ret_from_fork+0x10/0x20
[   24.434805] 
[   24.440950] Allocated by task 319:
[   24.441258]  kasan_save_stack+0x3c/0x68
[   24.441609]  kasan_save_track+0x20/0x40
[   24.441960]  kasan_save_alloc_info+0x40/0x58
[   24.442350]  __kasan_kmalloc+0xd4/0xd8
[   24.442692]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.443107]  kasan_atomics+0xb8/0x2e0
[   24.443443]  kunit_try_run_case+0x170/0x3f0
[   24.443826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.444323]  kthread+0x328/0x630
[   24.444623]  ret_from_fork+0x10/0x20
[   24.444951] 
[   24.445091] The buggy address belongs to the object at ffff00000a4bdd00
[   24.445091]  which belongs to the cache kmalloc-64 of size 64
[   24.446182] The buggy address is located 0 bytes to the right of
[   24.446182]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.447318] 
[   24.447459] The buggy address belongs to the physical page:
[   24.447955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.448653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.449238] page_type: f5(slab)
[   24.449528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.450218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.450906] page dumped because: kasan: bad access detected
[   24.451404] 
[   24.451544] Memory state around the buggy address:
[   24.451974]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.452617]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.453261] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.453902]                                      ^
[   24.454333]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.454977]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.455618] ==================================================================
[   25.418128] ==================================================================
[   25.418765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   25.419418] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.420064] 
[   25.420203] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.420217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.420222] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.420227] Call trace:
[   25.420230]  show_stack+0x20/0x38 (C)
[   25.420239]  dump_stack_lvl+0x8c/0xd0
[   25.420247]  print_report+0x118/0x608
[   25.420256]  kasan_report+0xdc/0x128
[   25.420264]  __asan_report_load8_noabort+0x20/0x30
[   25.420275]  kasan_atomics_helper+0x3db0/0x4858
[   25.420284]  kasan_atomics+0x198/0x2e0
[   25.420291]  kunit_try_run_case+0x170/0x3f0
[   25.420302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.420313]  kthread+0x328/0x630
[   25.420323]  ret_from_fork+0x10/0x20
[   25.420333] 
[   25.426163] Allocated by task 319:
[   25.426468]  kasan_save_stack+0x3c/0x68
[   25.426813]  kasan_save_track+0x20/0x40
[   25.427158]  kasan_save_alloc_info+0x40/0x58
[   25.427541]  __kasan_kmalloc+0xd4/0xd8
[   25.427876]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.428283]  kasan_atomics+0xb8/0x2e0
[   25.428612]  kunit_try_run_case+0x170/0x3f0
[   25.428987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.429478]  kthread+0x328/0x630
[   25.429771]  ret_from_fork+0x10/0x20
[   25.430093] 
[   25.430230] The buggy address belongs to the object at ffff00000a4bdd00
[   25.430230]  which belongs to the cache kmalloc-64 of size 64
[   25.431312] The buggy address is located 0 bytes to the right of
[   25.431312]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.432442] 
[   25.432579] The buggy address belongs to the physical page:
[   25.433071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.433763] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.434340] page_type: f5(slab)
[   25.434624] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.435308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.435990] page dumped because: kasan: bad access detected
[   25.436482] 
[   25.436618] Memory state around the buggy address:
[   25.437044]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.437680]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.438317] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.438954]                                      ^
[   25.439380]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.440017]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.440652] ==================================================================
[   24.142591] ==================================================================
[   24.143265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   24.143939] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.144613] 
[   24.144768] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.144805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.144815] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.144827] Call trace:
[   24.144836]  show_stack+0x20/0x38 (C)
[   24.144860]  dump_stack_lvl+0x8c/0xd0
[   24.144881]  print_report+0x118/0x608
[   24.144902]  kasan_report+0xdc/0x128
[   24.144921]  kasan_check_range+0x100/0x1a8
[   24.144941]  __kasan_check_write+0x20/0x30
[   24.144964]  kasan_atomics_helper+0x24c/0x4858
[   24.144982]  kasan_atomics+0x198/0x2e0
[   24.145000]  kunit_try_run_case+0x170/0x3f0
[   24.145024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.145050]  kthread+0x328/0x630
[   24.145073]  ret_from_fork+0x10/0x20
[   24.145094] 
[   24.151282] Allocated by task 319:
[   24.151600]  kasan_save_stack+0x3c/0x68
[   24.151962]  kasan_save_track+0x20/0x40
[   24.152321]  kasan_save_alloc_info+0x40/0x58
[   24.152721]  __kasan_kmalloc+0xd4/0xd8
[   24.153072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.153498]  kasan_atomics+0xb8/0x2e0
[   24.153841]  kunit_try_run_case+0x170/0x3f0
[   24.154232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.154742]  kthread+0x328/0x630
[   24.155050]  ret_from_fork+0x10/0x20
[   24.155388] 
[   24.155535] The buggy address belongs to the object at ffff00000a4bdd00
[   24.155535]  which belongs to the cache kmalloc-64 of size 64
[   24.156637] The buggy address is located 0 bytes to the right of
[   24.156637]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.157787] 
[   24.157935] The buggy address belongs to the physical page:
[   24.158440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.159151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.159748] page_type: f5(slab)
[   24.160050] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.160751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.161448] page dumped because: kasan: bad access detected
[   24.161952] 
[   24.162098] Memory state around the buggy address:
[   24.162536]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163189]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163843] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.164493]                                      ^
[   24.164932]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.165585]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.166236] ==================================================================
[   24.360958] ==================================================================
[   24.361603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   24.362256] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.362915] 
[   24.363058] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.363079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.363086] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.363093] Call trace:
[   24.363098]  show_stack+0x20/0x38 (C)
[   24.363112]  dump_stack_lvl+0x8c/0xd0
[   24.363124]  print_report+0x118/0x608
[   24.363138]  kasan_report+0xdc/0x128
[   24.363150]  kasan_check_range+0x100/0x1a8
[   24.363165]  __kasan_check_write+0x20/0x30
[   24.363179]  kasan_atomics_helper+0x54c/0x4858
[   24.363192]  kasan_atomics+0x198/0x2e0
[   24.363204]  kunit_try_run_case+0x170/0x3f0
[   24.363219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.363237]  kthread+0x328/0x630
[   24.363252]  ret_from_fork+0x10/0x20
[   24.363266] 
[   24.369412] Allocated by task 319:
[   24.369720]  kasan_save_stack+0x3c/0x68
[   24.370071]  kasan_save_track+0x20/0x40
[   24.370422]  kasan_save_alloc_info+0x40/0x58
[   24.370812]  __kasan_kmalloc+0xd4/0xd8
[   24.371155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.371570]  kasan_atomics+0xb8/0x2e0
[   24.371903]  kunit_try_run_case+0x170/0x3f0
[   24.372286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.372783]  kthread+0x328/0x630
[   24.373083]  ret_from_fork+0x10/0x20
[   24.373411] 
[   24.373552] The buggy address belongs to the object at ffff00000a4bdd00
[   24.373552]  which belongs to the cache kmalloc-64 of size 64
[   24.374642] The buggy address is located 0 bytes to the right of
[   24.374642]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.375778] 
[   24.375919] The buggy address belongs to the physical page:
[   24.376415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.377111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.377697] page_type: f5(slab)
[   24.377985] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.378676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.379363] page dumped because: kasan: bad access detected
[   24.379860] 
[   24.380001] Memory state around the buggy address:
[   24.380430]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.381074]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.381718] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.382359]                                      ^
[   24.382791]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.383434]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.384075] ==================================================================
[   25.112904] ==================================================================
[   25.113542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   25.114195] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.114849] 
[   25.114987] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.115001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.115006] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.115010] Call trace:
[   25.115014]  show_stack+0x20/0x38 (C)
[   25.115023]  dump_stack_lvl+0x8c/0xd0
[   25.115032]  print_report+0x118/0x608
[   25.115040]  kasan_report+0xdc/0x128
[   25.115049]  kasan_check_range+0x100/0x1a8
[   25.115058]  __kasan_check_write+0x20/0x30
[   25.115068]  kasan_atomics_helper+0x10c0/0x4858
[   25.115077]  kasan_atomics+0x198/0x2e0
[   25.115085]  kunit_try_run_case+0x170/0x3f0
[   25.115095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.115107]  kthread+0x328/0x630
[   25.115116]  ret_from_fork+0x10/0x20
[   25.115126] 
[   25.121257] Allocated by task 319:
[   25.121562]  kasan_save_stack+0x3c/0x68
[   25.121907]  kasan_save_track+0x20/0x40
[   25.122252]  kasan_save_alloc_info+0x40/0x58
[   25.122635]  __kasan_kmalloc+0xd4/0xd8
[   25.122972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.123380]  kasan_atomics+0xb8/0x2e0
[   25.123709]  kunit_try_run_case+0x170/0x3f0
[   25.124085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.124575]  kthread+0x328/0x630
[   25.124868]  ret_from_fork+0x10/0x20
[   25.125190] 
[   25.125327] The buggy address belongs to the object at ffff00000a4bdd00
[   25.125327]  which belongs to the cache kmalloc-64 of size 64
[   25.126410] The buggy address is located 0 bytes to the right of
[   25.126410]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.127539] 
[   25.127676] The buggy address belongs to the physical page:
[   25.128167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.128860] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.129438] page_type: f5(slab)
[   25.129723] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.130407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.131088] page dumped because: kasan: bad access detected
[   25.131580] 
[   25.131716] Memory state around the buggy address:
[   25.132142]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.132780]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.133417] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.134053]                                      ^
[   25.134479]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.135116]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.135751] ==================================================================
[   24.972242] ==================================================================
[   24.972880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   24.973533] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.974186] 
[   24.974325] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.974339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.974343] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.974348] Call trace:
[   24.974352]  show_stack+0x20/0x38 (C)
[   24.974361]  dump_stack_lvl+0x8c/0xd0
[   24.974369]  print_report+0x118/0x608
[   24.974378]  kasan_report+0xdc/0x128
[   24.974387]  __asan_report_store8_noabort+0x20/0x30
[   24.974397]  kasan_atomics_helper+0x3e5c/0x4858
[   24.974406]  kasan_atomics+0x198/0x2e0
[   24.974414]  kunit_try_run_case+0x170/0x3f0
[   24.974424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.974435]  kthread+0x328/0x630
[   24.974445]  ret_from_fork+0x10/0x20
[   24.974454] 
[   24.980290] Allocated by task 319:
[   24.980594]  kasan_save_stack+0x3c/0x68
[   24.980939]  kasan_save_track+0x20/0x40
[   24.981285]  kasan_save_alloc_info+0x40/0x58
[   24.981668]  __kasan_kmalloc+0xd4/0xd8
[   24.982005]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.982411]  kasan_atomics+0xb8/0x2e0
[   24.982740]  kunit_try_run_case+0x170/0x3f0
[   24.983115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.983606]  kthread+0x328/0x630
[   24.983899]  ret_from_fork+0x10/0x20
[   24.984221] 
[   24.984358] The buggy address belongs to the object at ffff00000a4bdd00
[   24.984358]  which belongs to the cache kmalloc-64 of size 64
[   24.985440] The buggy address is located 0 bytes to the right of
[   24.985440]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.986569] 
[   24.986706] The buggy address belongs to the physical page:
[   24.987197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.987887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.988465] page_type: f5(slab)
[   24.988749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.989433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.990115] page dumped because: kasan: bad access detected
[   24.990607] 
[   24.990743] Memory state around the buggy address:
[   24.991168]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.991805]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.992442] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.993079]                                      ^
[   24.993505]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.994142]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.994778] ==================================================================
[   25.324119] ==================================================================
[   25.324757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   25.325410] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.326064] 
[   25.326202] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.326216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.326220] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.326225] Call trace:
[   25.326228]  show_stack+0x20/0x38 (C)
[   25.326237]  dump_stack_lvl+0x8c/0xd0
[   25.326246]  print_report+0x118/0x608
[   25.326255]  kasan_report+0xdc/0x128
[   25.326263]  kasan_check_range+0x100/0x1a8
[   25.326272]  __kasan_check_write+0x20/0x30
[   25.326283]  kasan_atomics_helper+0x147c/0x4858
[   25.326291]  kasan_atomics+0x198/0x2e0
[   25.326299]  kunit_try_run_case+0x170/0x3f0
[   25.326309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.326321]  kthread+0x328/0x630
[   25.326331]  ret_from_fork+0x10/0x20
[   25.326340] 
[   25.332464] Allocated by task 319:
[   25.332768]  kasan_save_stack+0x3c/0x68
[   25.333112]  kasan_save_track+0x20/0x40
[   25.333456]  kasan_save_alloc_info+0x40/0x58
[   25.333839]  __kasan_kmalloc+0xd4/0xd8
[   25.334176]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.334583]  kasan_atomics+0xb8/0x2e0
[   25.334911]  kunit_try_run_case+0x170/0x3f0
[   25.335287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.335776]  kthread+0x328/0x630
[   25.336069]  ret_from_fork+0x10/0x20
[   25.336391] 
[   25.336528] The buggy address belongs to the object at ffff00000a4bdd00
[   25.336528]  which belongs to the cache kmalloc-64 of size 64
[   25.337611] The buggy address is located 0 bytes to the right of
[   25.337611]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.338741] 
[   25.338878] The buggy address belongs to the physical page:
[   25.339369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.340062] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.340640] page_type: f5(slab)
[   25.340924] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.341609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.342290] page dumped because: kasan: bad access detected
[   25.342782] 
[   25.342919] Memory state around the buggy address:
[   25.343344]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.343981]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.344618] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.345254]                                      ^
[   25.345679]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.346317]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.346952] ==================================================================
[   24.995458] ==================================================================
[   24.996095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   24.996741] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.997394] 
[   24.997533] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.997547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.997552] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.997556] Call trace:
[   24.997560]  show_stack+0x20/0x38 (C)
[   24.997569]  dump_stack_lvl+0x8c/0xd0
[   24.997577]  print_report+0x118/0x608
[   24.997586]  kasan_report+0xdc/0x128
[   24.997595]  kasan_check_range+0x100/0x1a8
[   24.997604]  __kasan_check_write+0x20/0x30
[   24.997614]  kasan_atomics_helper+0xeb8/0x4858
[   24.997622]  kasan_atomics+0x198/0x2e0
[   24.997631]  kunit_try_run_case+0x170/0x3f0
[   24.997640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.997652]  kthread+0x328/0x630
[   24.997662]  ret_from_fork+0x10/0x20
[   24.997672] 
[   25.003794] Allocated by task 319:
[   25.004099]  kasan_save_stack+0x3c/0x68
[   25.004444]  kasan_save_track+0x20/0x40
[   25.004788]  kasan_save_alloc_info+0x40/0x58
[   25.005171]  __kasan_kmalloc+0xd4/0xd8
[   25.005508]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.005915]  kasan_atomics+0xb8/0x2e0
[   25.006243]  kunit_try_run_case+0x170/0x3f0
[   25.006619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.007110]  kthread+0x328/0x630
[   25.007403]  ret_from_fork+0x10/0x20
[   25.007725] 
[   25.007862] The buggy address belongs to the object at ffff00000a4bdd00
[   25.007862]  which belongs to the cache kmalloc-64 of size 64
[   25.008944] The buggy address is located 0 bytes to the right of
[   25.008944]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.010074] 
[   25.010211] The buggy address belongs to the physical page:
[   25.010703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.011393] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.011972] page_type: f5(slab)
[   25.012255] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.012939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.013621] page dumped because: kasan: bad access detected
[   25.014113] 
[   25.014250] Memory state around the buggy address:
[   25.014675]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.015313]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.015952] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.016587]                                      ^
[   25.017013]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.017649]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.018285] ==================================================================
[   25.558212] ==================================================================
[   25.558849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   25.559502] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.560148] 
[   25.560288] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.560302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.560306] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.560311] Call trace:
[   25.560314]  show_stack+0x20/0x38 (C)
[   25.560324]  dump_stack_lvl+0x8c/0xd0
[   25.560332]  print_report+0x118/0x608
[   25.560341]  kasan_report+0xdc/0x128
[   25.560349]  __asan_report_load8_noabort+0x20/0x30
[   25.560360]  kasan_atomics_helper+0x3e20/0x4858
[   25.560369]  kasan_atomics+0x198/0x2e0
[   25.560376]  kunit_try_run_case+0x170/0x3f0
[   25.560387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.560398]  kthread+0x328/0x630
[   25.560408]  ret_from_fork+0x10/0x20
[   25.560417] 
[   25.566248] Allocated by task 319:
[   25.566552]  kasan_save_stack+0x3c/0x68
[   25.566897]  kasan_save_track+0x20/0x40
[   25.567241]  kasan_save_alloc_info+0x40/0x58
[   25.567625]  __kasan_kmalloc+0xd4/0xd8
[   25.567961]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.568368]  kasan_atomics+0xb8/0x2e0
[   25.568697]  kunit_try_run_case+0x170/0x3f0
[   25.569074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.569564]  kthread+0x328/0x630
[   25.569857]  ret_from_fork+0x10/0x20
[   25.570180] 
[   25.570316] The buggy address belongs to the object at ffff00000a4bdd00
[   25.570316]  which belongs to the cache kmalloc-64 of size 64
[   25.571399] The buggy address is located 0 bytes to the right of
[   25.571399]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.572529] 
[   25.572665] The buggy address belongs to the physical page:
[   25.573157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.573849] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.574426] page_type: f5(slab)
[   25.574709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.575393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.576075] page dumped because: kasan: bad access detected
[   25.576567] 
[   25.576704] Memory state around the buggy address:
[   25.577130]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.577767]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.578404] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.579040]                                      ^
[   25.579465]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.580102]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.580738] ==================================================================
[   24.337094] ==================================================================
[   24.337741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   24.338395] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.339054] 
[   24.339197] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.339219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.339225] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.339233] Call trace:
[   24.339238]  show_stack+0x20/0x38 (C)
[   24.339252]  dump_stack_lvl+0x8c/0xd0
[   24.339265]  print_report+0x118/0x608
[   24.339279]  kasan_report+0xdc/0x128
[   24.339291]  kasan_check_range+0x100/0x1a8
[   24.339305]  __kasan_check_write+0x20/0x30
[   24.339321]  kasan_atomics_helper+0x4e4/0x4858
[   24.339333]  kasan_atomics+0x198/0x2e0
[   24.339345]  kunit_try_run_case+0x170/0x3f0
[   24.339360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.339378]  kthread+0x328/0x630
[   24.339393]  ret_from_fork+0x10/0x20
[   24.339407] 
[   24.345552] Allocated by task 319:
[   24.345860]  kasan_save_stack+0x3c/0x68
[   24.346211]  kasan_save_track+0x20/0x40
[   24.346562]  kasan_save_alloc_info+0x40/0x58
[   24.346952]  __kasan_kmalloc+0xd4/0xd8
[   24.347294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.347708]  kasan_atomics+0xb8/0x2e0
[   24.348043]  kunit_try_run_case+0x170/0x3f0
[   24.348426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.348923]  kthread+0x328/0x630
[   24.349223]  ret_from_fork+0x10/0x20
[   24.349551] 
[   24.349691] The buggy address belongs to the object at ffff00000a4bdd00
[   24.349691]  which belongs to the cache kmalloc-64 of size 64
[   24.350782] The buggy address is located 0 bytes to the right of
[   24.350782]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.351920] 
[   24.352061] The buggy address belongs to the physical page:
[   24.352558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.353256] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.353841] page_type: f5(slab)
[   24.354132] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.354822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.355509] page dumped because: kasan: bad access detected
[   24.356007] 
[   24.356147] Memory state around the buggy address:
[   24.356577]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.357221]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.357864] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.358505]                                      ^
[   24.358936]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.359580]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.360221] ==================================================================
[   24.902099] ==================================================================
[   24.902737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   24.903383] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.904029] 
[   24.904167] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.904182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.904186] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.904191] Call trace:
[   24.904194]  show_stack+0x20/0x38 (C)
[   24.904203]  dump_stack_lvl+0x8c/0xd0
[   24.904213]  print_report+0x118/0x608
[   24.904222]  kasan_report+0xdc/0x128
[   24.904230]  kasan_check_range+0x100/0x1a8
[   24.904239]  __kasan_check_read+0x20/0x30
[   24.904250]  kasan_atomics_helper+0xdd4/0x4858
[   24.904259]  kasan_atomics+0x198/0x2e0
[   24.904266]  kunit_try_run_case+0x170/0x3f0
[   24.904277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.904290]  kthread+0x328/0x630
[   24.904300]  ret_from_fork+0x10/0x20
[   24.904309] 
[   24.910423] Allocated by task 319:
[   24.910728]  kasan_save_stack+0x3c/0x68
[   24.911072]  kasan_save_track+0x20/0x40
[   24.911416]  kasan_save_alloc_info+0x40/0x58
[   24.911799]  __kasan_kmalloc+0xd4/0xd8
[   24.912136]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.912543]  kasan_atomics+0xb8/0x2e0
[   24.912870]  kunit_try_run_case+0x170/0x3f0
[   24.913247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.913739]  kthread+0x328/0x630
[   24.914032]  ret_from_fork+0x10/0x20
[   24.914354] 
[   24.914492] The buggy address belongs to the object at ffff00000a4bdd00
[   24.914492]  which belongs to the cache kmalloc-64 of size 64
[   24.915575] The buggy address is located 0 bytes to the right of
[   24.915575]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.916705] 
[   24.916843] The buggy address belongs to the physical page:
[   24.917335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.918027] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.918605] page_type: f5(slab)
[   24.918888] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.919572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.920253] page dumped because: kasan: bad access detected
[   24.920745] 
[   24.920883] Memory state around the buggy address:
[   24.921309]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.921947]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.922584] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.923221]                                      ^
[   24.923647]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.924284]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.924921] ==================================================================
[   25.183431] ==================================================================
[   25.184070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   25.184723] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.185376] 
[   25.185515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.185529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.185533] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.185538] Call trace:
[   25.185541]  show_stack+0x20/0x38 (C)
[   25.185551]  dump_stack_lvl+0x8c/0xd0
[   25.185559]  print_report+0x118/0x608
[   25.185568]  kasan_report+0xdc/0x128
[   25.185576]  kasan_check_range+0x100/0x1a8
[   25.185586]  __kasan_check_write+0x20/0x30
[   25.185595]  kasan_atomics_helper+0x11f8/0x4858
[   25.185604]  kasan_atomics+0x198/0x2e0
[   25.185612]  kunit_try_run_case+0x170/0x3f0
[   25.185622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.185634]  kthread+0x328/0x630
[   25.185644]  ret_from_fork+0x10/0x20
[   25.185653] 
[   25.191780] Allocated by task 319:
[   25.192085]  kasan_save_stack+0x3c/0x68
[   25.192429]  kasan_save_track+0x20/0x40
[   25.192772]  kasan_save_alloc_info+0x40/0x58
[   25.193155]  __kasan_kmalloc+0xd4/0xd8
[   25.193492]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.193899]  kasan_atomics+0xb8/0x2e0
[   25.194228]  kunit_try_run_case+0x170/0x3f0
[   25.194604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.195093]  kthread+0x328/0x630
[   25.195386]  ret_from_fork+0x10/0x20
[   25.195708] 
[   25.195845] The buggy address belongs to the object at ffff00000a4bdd00
[   25.195845]  which belongs to the cache kmalloc-64 of size 64
[   25.196928] The buggy address is located 0 bytes to the right of
[   25.196928]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.198058] 
[   25.198195] The buggy address belongs to the physical page:
[   25.198687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.199378] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.199956] page_type: f5(slab)
[   25.200240] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.200924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.201606] page dumped because: kasan: bad access detected
[   25.202100] 
[   25.202238] Memory state around the buggy address:
[   25.202663]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.203301]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.203937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.204573]                                      ^
[   25.204999]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.205636]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.206272] ==================================================================
[   25.230434] ==================================================================
[   25.231071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   25.231724] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.232377] 
[   25.232515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.232530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.232534] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.232538] Call trace:
[   25.232542]  show_stack+0x20/0x38 (C)
[   25.232551]  dump_stack_lvl+0x8c/0xd0
[   25.232559]  print_report+0x118/0x608
[   25.232567]  kasan_report+0xdc/0x128
[   25.232576]  kasan_check_range+0x100/0x1a8
[   25.232586]  __kasan_check_write+0x20/0x30
[   25.232595]  kasan_atomics_helper+0x12d8/0x4858
[   25.232604]  kasan_atomics+0x198/0x2e0
[   25.232612]  kunit_try_run_case+0x170/0x3f0
[   25.232622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.232633]  kthread+0x328/0x630
[   25.232643]  ret_from_fork+0x10/0x20
[   25.232652] 
[   25.238779] Allocated by task 319:
[   25.239084]  kasan_save_stack+0x3c/0x68
[   25.239429]  kasan_save_track+0x20/0x40
[   25.239774]  kasan_save_alloc_info+0x40/0x58
[   25.240157]  __kasan_kmalloc+0xd4/0xd8
[   25.240494]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.240902]  kasan_atomics+0xb8/0x2e0
[   25.241231]  kunit_try_run_case+0x170/0x3f0
[   25.241607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.242097]  kthread+0x328/0x630
[   25.242390]  ret_from_fork+0x10/0x20
[   25.242712] 
[   25.242850] The buggy address belongs to the object at ffff00000a4bdd00
[   25.242850]  which belongs to the cache kmalloc-64 of size 64
[   25.243932] The buggy address is located 0 bytes to the right of
[   25.243932]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.245062] 
[   25.245198] The buggy address belongs to the physical page:
[   25.245690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.246381] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.246960] page_type: f5(slab)
[   25.247244] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.247927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.248609] page dumped because: kasan: bad access detected
[   25.249101] 
[   25.249238] Memory state around the buggy address:
[   25.249663]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.250300]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.250937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.251573]                                      ^
[   25.251999]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.252635]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.253272] ==================================================================
[   25.089403] ==================================================================
[   25.090040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   25.090693] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.091347] 
[   25.091485] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.091499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.091503] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.091508] Call trace:
[   25.091511]  show_stack+0x20/0x38 (C)
[   25.091520]  dump_stack_lvl+0x8c/0xd0
[   25.091529]  print_report+0x118/0x608
[   25.091537]  kasan_report+0xdc/0x128
[   25.091546]  kasan_check_range+0x100/0x1a8
[   25.091555]  __kasan_check_write+0x20/0x30
[   25.091565]  kasan_atomics_helper+0x1058/0x4858
[   25.091574]  kasan_atomics+0x198/0x2e0
[   25.091582]  kunit_try_run_case+0x170/0x3f0
[   25.091592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.091604]  kthread+0x328/0x630
[   25.091613]  ret_from_fork+0x10/0x20
[   25.091622] 
[   25.097752] Allocated by task 319:
[   25.098057]  kasan_save_stack+0x3c/0x68
[   25.098402]  kasan_save_track+0x20/0x40
[   25.098746]  kasan_save_alloc_info+0x40/0x58
[   25.099128]  __kasan_kmalloc+0xd4/0xd8
[   25.099465]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.099872]  kasan_atomics+0xb8/0x2e0
[   25.100201]  kunit_try_run_case+0x170/0x3f0
[   25.100578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.101067]  kthread+0x328/0x630
[   25.101360]  ret_from_fork+0x10/0x20
[   25.101682] 
[   25.101819] The buggy address belongs to the object at ffff00000a4bdd00
[   25.101819]  which belongs to the cache kmalloc-64 of size 64
[   25.102901] The buggy address is located 0 bytes to the right of
[   25.102901]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.104031] 
[   25.104168] The buggy address belongs to the physical page:
[   25.104659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.105351] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.105929] page_type: f5(slab)
[   25.106213] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.106896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.107578] page dumped because: kasan: bad access detected
[   25.108070] 
[   25.108207] Memory state around the buggy address:
[   25.108632]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.109271]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.109907] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.110545]                                      ^
[   25.110971]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.111608]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.112243] ==================================================================
[   24.456376] ==================================================================
[   24.457023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   24.457677] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.458338] 
[   24.458481] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.458503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.458510] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.458517] Call trace:
[   24.458523]  show_stack+0x20/0x38 (C)
[   24.458537]  dump_stack_lvl+0x8c/0xd0
[   24.458550]  print_report+0x118/0x608
[   24.458563]  kasan_report+0xdc/0x128
[   24.458575]  kasan_check_range+0x100/0x1a8
[   24.458590]  __kasan_check_write+0x20/0x30
[   24.458605]  kasan_atomics_helper+0x6ec/0x4858
[   24.458617]  kasan_atomics+0x198/0x2e0
[   24.458629]  kunit_try_run_case+0x170/0x3f0
[   24.458645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.458663]  kthread+0x328/0x630
[   24.458678]  ret_from_fork+0x10/0x20
[   24.458692] 
[   24.464839] Allocated by task 319:
[   24.465148]  kasan_save_stack+0x3c/0x68
[   24.465499]  kasan_save_track+0x20/0x40
[   24.465849]  kasan_save_alloc_info+0x40/0x58
[   24.466239]  __kasan_kmalloc+0xd4/0xd8
[   24.466581]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.466995]  kasan_atomics+0xb8/0x2e0
[   24.467330]  kunit_try_run_case+0x170/0x3f0
[   24.467712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.468210]  kthread+0x328/0x630
[   24.468509]  ret_from_fork+0x10/0x20
[   24.468838] 
[   24.468979] The buggy address belongs to the object at ffff00000a4bdd00
[   24.468979]  which belongs to the cache kmalloc-64 of size 64
[   24.470069] The buggy address is located 0 bytes to the right of
[   24.470069]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.471205] 
[   24.471346] The buggy address belongs to the physical page:
[   24.471844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.472542] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.473126] page_type: f5(slab)
[   24.473415] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.474106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.474792] page dumped because: kasan: bad access detected
[   24.475289] 
[   24.475430] Memory state around the buggy address:
[   24.475859]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.476503]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.477147] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.477788]                                      ^
[   24.478219]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.478862]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.479504] ==================================================================
[   24.715325] ==================================================================
[   24.715962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   24.716608] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.717261] 
[   24.717400] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.717414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.717418] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.717423] Call trace:
[   24.717426]  show_stack+0x20/0x38 (C)
[   24.717435]  dump_stack_lvl+0x8c/0xd0
[   24.717444]  print_report+0x118/0x608
[   24.717452]  kasan_report+0xdc/0x128
[   24.717461]  kasan_check_range+0x100/0x1a8
[   24.717470]  __kasan_check_write+0x20/0x30
[   24.717480]  kasan_atomics_helper+0xb70/0x4858
[   24.717489]  kasan_atomics+0x198/0x2e0
[   24.717496]  kunit_try_run_case+0x170/0x3f0
[   24.717507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.717518]  kthread+0x328/0x630
[   24.717528]  ret_from_fork+0x10/0x20
[   24.717538] 
[   24.723661] Allocated by task 319:
[   24.723966]  kasan_save_stack+0x3c/0x68
[   24.724311]  kasan_save_track+0x20/0x40
[   24.724655]  kasan_save_alloc_info+0x40/0x58
[   24.725038]  __kasan_kmalloc+0xd4/0xd8
[   24.725375]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.725782]  kasan_atomics+0xb8/0x2e0
[   24.726111]  kunit_try_run_case+0x170/0x3f0
[   24.726488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.726979]  kthread+0x328/0x630
[   24.727272]  ret_from_fork+0x10/0x20
[   24.727594] 
[   24.727730] The buggy address belongs to the object at ffff00000a4bdd00
[   24.727730]  which belongs to the cache kmalloc-64 of size 64
[   24.728813] The buggy address is located 0 bytes to the right of
[   24.728813]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.729943] 
[   24.730080] The buggy address belongs to the physical page:
[   24.730572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.731264] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.731842] page_type: f5(slab)
[   24.732126] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.732809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.733492] page dumped because: kasan: bad access detected
[   24.733983] 
[   24.734120] Memory state around the buggy address:
[   24.734544]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.735180]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.735817] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.736453]                                      ^
[   24.736877]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.737514]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.738150] ==================================================================
[   25.253938] ==================================================================
[   25.254575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   25.255229] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.255883] 
[   25.256021] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.256036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.256040] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.256045] Call trace:
[   25.256048]  show_stack+0x20/0x38 (C)
[   25.256057]  dump_stack_lvl+0x8c/0xd0
[   25.256066]  print_report+0x118/0x608
[   25.256075]  kasan_report+0xdc/0x128
[   25.256083]  kasan_check_range+0x100/0x1a8
[   25.256092]  __kasan_check_write+0x20/0x30
[   25.256103]  kasan_atomics_helper+0x1384/0x4858
[   25.256111]  kasan_atomics+0x198/0x2e0
[   25.256119]  kunit_try_run_case+0x170/0x3f0
[   25.256129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.256141]  kthread+0x328/0x630
[   25.256151]  ret_from_fork+0x10/0x20
[   25.256160] 
[   25.262293] Allocated by task 319:
[   25.262598]  kasan_save_stack+0x3c/0x68
[   25.262942]  kasan_save_track+0x20/0x40
[   25.263286]  kasan_save_alloc_info+0x40/0x58
[   25.263669]  __kasan_kmalloc+0xd4/0xd8
[   25.264006]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.264413]  kasan_atomics+0xb8/0x2e0
[   25.264742]  kunit_try_run_case+0x170/0x3f0
[   25.265117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.265608]  kthread+0x328/0x630
[   25.265901]  ret_from_fork+0x10/0x20
[   25.266223] 
[   25.266361] The buggy address belongs to the object at ffff00000a4bdd00
[   25.266361]  which belongs to the cache kmalloc-64 of size 64
[   25.267445] The buggy address is located 0 bytes to the right of
[   25.267445]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.268575] 
[   25.268713] The buggy address belongs to the physical page:
[   25.269205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.269895] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.270472] page_type: f5(slab)
[   25.270755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.271440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.272121] page dumped because: kasan: bad access detected
[   25.272614] 
[   25.272751] Memory state around the buggy address:
[   25.273176]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.273813]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.274450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.275086]                                      ^
[   25.275512]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.276151]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.276786] ==================================================================
[   25.159928] ==================================================================
[   25.160565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   25.161218] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.161872] 
[   25.162010] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.162024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.162028] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.162033] Call trace:
[   25.162036]  show_stack+0x20/0x38 (C)
[   25.162045]  dump_stack_lvl+0x8c/0xd0
[   25.162054]  print_report+0x118/0x608
[   25.162063]  kasan_report+0xdc/0x128
[   25.162071]  kasan_check_range+0x100/0x1a8
[   25.162080]  __kasan_check_write+0x20/0x30
[   25.162091]  kasan_atomics_helper+0x1190/0x4858
[   25.162099]  kasan_atomics+0x198/0x2e0
[   25.162107]  kunit_try_run_case+0x170/0x3f0
[   25.162117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.162129]  kthread+0x328/0x630
[   25.162139]  ret_from_fork+0x10/0x20
[   25.162148] 
[   25.168276] Allocated by task 319:
[   25.168580]  kasan_save_stack+0x3c/0x68
[   25.168924]  kasan_save_track+0x20/0x40
[   25.169269]  kasan_save_alloc_info+0x40/0x58
[   25.169653]  __kasan_kmalloc+0xd4/0xd8
[   25.169990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.170396]  kasan_atomics+0xb8/0x2e0
[   25.170725]  kunit_try_run_case+0x170/0x3f0
[   25.171102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.171592]  kthread+0x328/0x630
[   25.171884]  ret_from_fork+0x10/0x20
[   25.172206] 
[   25.172344] The buggy address belongs to the object at ffff00000a4bdd00
[   25.172344]  which belongs to the cache kmalloc-64 of size 64
[   25.173427] The buggy address is located 0 bytes to the right of
[   25.173427]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.174557] 
[   25.174695] The buggy address belongs to the physical page:
[   25.175187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.175879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.176456] page_type: f5(slab)
[   25.176739] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.177424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.178105] page dumped because: kasan: bad access detected
[   25.178599] 
[   25.178737] Memory state around the buggy address:
[   25.179162]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.179799]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.180438] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.181074]                                      ^
[   25.181500]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.182136]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.182772] ==================================================================
[   24.551473] ==================================================================
[   24.552112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   24.552767] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.553412] 
[   24.553550] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.553565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.553570] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.553574] Call trace:
[   24.553578]  show_stack+0x20/0x38 (C)
[   24.553587]  dump_stack_lvl+0x8c/0xd0
[   24.553596]  print_report+0x118/0x608
[   24.553605]  kasan_report+0xdc/0x128
[   24.553614]  __asan_report_load4_noabort+0x20/0x30
[   24.553624]  kasan_atomics_helper+0x42d8/0x4858
[   24.553633]  kasan_atomics+0x198/0x2e0
[   24.553640]  kunit_try_run_case+0x170/0x3f0
[   24.553651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.553663]  kthread+0x328/0x630
[   24.553673]  ret_from_fork+0x10/0x20
[   24.553682] 
[   24.559515] Allocated by task 319:
[   24.559819]  kasan_save_stack+0x3c/0x68
[   24.560163]  kasan_save_track+0x20/0x40
[   24.560508]  kasan_save_alloc_info+0x40/0x58
[   24.560891]  __kasan_kmalloc+0xd4/0xd8
[   24.561228]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.561636]  kasan_atomics+0xb8/0x2e0
[   24.561965]  kunit_try_run_case+0x170/0x3f0
[   24.562340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.562831]  kthread+0x328/0x630
[   24.563124]  ret_from_fork+0x10/0x20
[   24.563446] 
[   24.563582] The buggy address belongs to the object at ffff00000a4bdd00
[   24.563582]  which belongs to the cache kmalloc-64 of size 64
[   24.564665] The buggy address is located 0 bytes to the right of
[   24.564665]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.565795] 
[   24.565932] The buggy address belongs to the physical page:
[   24.566424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.567116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.567695] page_type: f5(slab)
[   24.567979] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.568663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.569345] page dumped because: kasan: bad access detected
[   24.569837] 
[   24.569975] Memory state around the buggy address:
[   24.570401]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.571038]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.571675] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.572311]                                      ^
[   24.572737]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.573375]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.574011] ==================================================================
[   25.441303] ==================================================================
[   25.441941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   25.442594] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.443247] 
[   25.443385] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.443400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.443403] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.443408] Call trace:
[   25.443412]  show_stack+0x20/0x38 (C)
[   25.443421]  dump_stack_lvl+0x8c/0xd0
[   25.443430]  print_report+0x118/0x608
[   25.443438]  kasan_report+0xdc/0x128
[   25.443447]  kasan_check_range+0x100/0x1a8
[   25.443456]  __kasan_check_write+0x20/0x30
[   25.443466]  kasan_atomics_helper+0x1644/0x4858
[   25.443475]  kasan_atomics+0x198/0x2e0
[   25.443482]  kunit_try_run_case+0x170/0x3f0
[   25.443492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.443504]  kthread+0x328/0x630
[   25.443514]  ret_from_fork+0x10/0x20
[   25.443523] 
[   25.449654] Allocated by task 319:
[   25.449959]  kasan_save_stack+0x3c/0x68
[   25.450302]  kasan_save_track+0x20/0x40
[   25.450646]  kasan_save_alloc_info+0x40/0x58
[   25.451029]  __kasan_kmalloc+0xd4/0xd8
[   25.451364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.451772]  kasan_atomics+0xb8/0x2e0
[   25.452101]  kunit_try_run_case+0x170/0x3f0
[   25.452477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.452967]  kthread+0x328/0x630
[   25.453260]  ret_from_fork+0x10/0x20
[   25.453582] 
[   25.453720] The buggy address belongs to the object at ffff00000a4bdd00
[   25.453720]  which belongs to the cache kmalloc-64 of size 64
[   25.454803] The buggy address is located 0 bytes to the right of
[   25.454803]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.455932] 
[   25.456069] The buggy address belongs to the physical page:
[   25.456561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.457251] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.457828] page_type: f5(slab)
[   25.458113] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.458797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.459477] page dumped because: kasan: bad access detected
[   25.459969] 
[   25.460106] Memory state around the buggy address:
[   25.460531]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.461168]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.461805] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.462441]                                      ^
[   25.462867]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.463503]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.464139] ==================================================================
[   25.206929] ==================================================================
[   25.207568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   25.208220] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.208874] 
[   25.209014] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.209028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.209032] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.209037] Call trace:
[   25.209040]  show_stack+0x20/0x38 (C)
[   25.209050]  dump_stack_lvl+0x8c/0xd0
[   25.209058]  print_report+0x118/0x608
[   25.209067]  kasan_report+0xdc/0x128
[   25.209075]  kasan_check_range+0x100/0x1a8
[   25.209085]  __kasan_check_write+0x20/0x30
[   25.209094]  kasan_atomics_helper+0x126c/0x4858
[   25.209103]  kasan_atomics+0x198/0x2e0
[   25.209111]  kunit_try_run_case+0x170/0x3f0
[   25.209122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.209133]  kthread+0x328/0x630
[   25.209143]  ret_from_fork+0x10/0x20
[   25.209152] 
[   25.215282] Allocated by task 319:
[   25.215586]  kasan_save_stack+0x3c/0x68
[   25.215931]  kasan_save_track+0x20/0x40
[   25.216275]  kasan_save_alloc_info+0x40/0x58
[   25.216658]  __kasan_kmalloc+0xd4/0xd8
[   25.216995]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.217402]  kasan_atomics+0xb8/0x2e0
[   25.217731]  kunit_try_run_case+0x170/0x3f0
[   25.218106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.218596]  kthread+0x328/0x630
[   25.218888]  ret_from_fork+0x10/0x20
[   25.219211] 
[   25.219347] The buggy address belongs to the object at ffff00000a4bdd00
[   25.219347]  which belongs to the cache kmalloc-64 of size 64
[   25.220430] The buggy address is located 0 bytes to the right of
[   25.220430]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.221559] 
[   25.221696] The buggy address belongs to the physical page:
[   25.222187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.222879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.223457] page_type: f5(slab)
[   25.223741] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.224425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.225107] page dumped because: kasan: bad access detected
[   25.225599] 
[   25.225735] Memory state around the buggy address:
[   25.226159]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.226796]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.227433] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.228069]                                      ^
[   25.228494]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.229132]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.229767] ==================================================================
[   25.534710] ==================================================================
[   25.535347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   25.536000] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.536653] 
[   25.536792] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.536806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.536810] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.536815] Call trace:
[   25.536818]  show_stack+0x20/0x38 (C)
[   25.536827]  dump_stack_lvl+0x8c/0xd0
[   25.536836]  print_report+0x118/0x608
[   25.536844]  kasan_report+0xdc/0x128
[   25.536853]  kasan_check_range+0x100/0x1a8
[   25.536862]  __kasan_check_write+0x20/0x30
[   25.536872]  kasan_atomics_helper+0x175c/0x4858
[   25.536881]  kasan_atomics+0x198/0x2e0
[   25.536889]  kunit_try_run_case+0x170/0x3f0
[   25.536899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.536911]  kthread+0x328/0x630
[   25.536920]  ret_from_fork+0x10/0x20
[   25.536930] 
[   25.543059] Allocated by task 319:
[   25.543364]  kasan_save_stack+0x3c/0x68
[   25.543708]  kasan_save_track+0x20/0x40
[   25.544051]  kasan_save_alloc_info+0x40/0x58
[   25.544434]  __kasan_kmalloc+0xd4/0xd8
[   25.544771]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.545178]  kasan_atomics+0xb8/0x2e0
[   25.545507]  kunit_try_run_case+0x170/0x3f0
[   25.545883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.546373]  kthread+0x328/0x630
[   25.546667]  ret_from_fork+0x10/0x20
[   25.546989] 
[   25.547126] The buggy address belongs to the object at ffff00000a4bdd00
[   25.547126]  which belongs to the cache kmalloc-64 of size 64
[   25.548209] The buggy address is located 0 bytes to the right of
[   25.548209]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.549339] 
[   25.549476] The buggy address belongs to the physical page:
[   25.549968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.550658] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.551237] page_type: f5(slab)
[   25.551522] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.552205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.552887] page dumped because: kasan: bad access detected
[   25.553379] 
[   25.553515] Memory state around the buggy address:
[   25.553941]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.554578]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.555215] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.555851]                                      ^
[   25.556277]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.556915]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557550] ==================================================================
[   24.264029] ==================================================================
[   24.264684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   24.265346] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.266017] 
[   24.266166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.266197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.266207] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.266218] Call trace:
[   24.266225]  show_stack+0x20/0x38 (C)
[   24.266245]  dump_stack_lvl+0x8c/0xd0
[   24.266264]  print_report+0x118/0x608
[   24.266283]  kasan_report+0xdc/0x128
[   24.266301]  kasan_check_range+0x100/0x1a8
[   24.266322]  __kasan_check_write+0x20/0x30
[   24.266344]  kasan_atomics_helper+0x3ac/0x4858
[   24.266363]  kasan_atomics+0x198/0x2e0
[   24.266381]  kunit_try_run_case+0x170/0x3f0
[   24.266404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.266429]  kthread+0x328/0x630
[   24.266451]  ret_from_fork+0x10/0x20
[   24.266472] 
[   24.272649] Allocated by task 319:
[   24.272966]  kasan_save_stack+0x3c/0x68
[   24.273325]  kasan_save_track+0x20/0x40
[   24.273683]  kasan_save_alloc_info+0x40/0x58
[   24.274082]  __kasan_kmalloc+0xd4/0xd8
[   24.274433]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.274858]  kasan_atomics+0xb8/0x2e0
[   24.275200]  kunit_try_run_case+0x170/0x3f0
[   24.275592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.276100]  kthread+0x328/0x630
[   24.276409]  ret_from_fork+0x10/0x20
[   24.276747] 
[   24.276893] The buggy address belongs to the object at ffff00000a4bdd00
[   24.276893]  which belongs to the cache kmalloc-64 of size 64
[   24.277994] The buggy address is located 0 bytes to the right of
[   24.277994]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.279143] 
[   24.279289] The buggy address belongs to the physical page:
[   24.279793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.280500] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.281095] page_type: f5(slab)
[   24.281393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.282093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.282788] page dumped because: kasan: bad access detected
[   24.283292] 
[   24.283437] Memory state around the buggy address:
[   24.283874]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.284528]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.285180] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.285830]                                      ^
[   24.286268]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.286921]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   23.845737] ==================================================================
[   23.846388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   23.847183] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.847847] 
[   23.847992] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.848019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.848027] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.848036] Call trace:
[   23.848042]  show_stack+0x20/0x38 (C)
[   23.848059]  dump_stack_lvl+0x8c/0xd0
[   23.848074]  print_report+0x118/0x608
[   23.848090]  kasan_report+0xdc/0x128
[   23.848105]  kasan_check_range+0x100/0x1a8
[   23.848122]  __kasan_check_write+0x20/0x30
[   23.848138]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   23.848156]  kasan_bitops_generic+0x11c/0x1c8
[   23.848171]  kunit_try_run_case+0x170/0x3f0
[   23.848190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.848211]  kthread+0x328/0x630
[   23.848229]  ret_from_fork+0x10/0x20
[   23.848246] 
[   23.854593] Allocated by task 315:
[   23.854904]  kasan_save_stack+0x3c/0x68
[   23.855258]  kasan_save_track+0x20/0x40
[   23.855611]  kasan_save_alloc_info+0x40/0x58
[   23.856004]  __kasan_kmalloc+0xd4/0xd8
[   23.856349]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.856769]  kasan_bitops_generic+0xa0/0x1c8
[   23.857160]  kunit_try_run_case+0x170/0x3f0
[   23.857547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.858049]  kthread+0x328/0x630
[   23.858352]  ret_from_fork+0x10/0x20
[   23.858683] 
[   23.858827] The buggy address belongs to the object at ffff000001193200
[   23.858827]  which belongs to the cache kmalloc-16 of size 16
[   23.859920] The buggy address is located 8 bytes inside of
[   23.859920]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.861008] 
[   23.861151] The buggy address belongs to the physical page:
[   23.861651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.862353] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.862943] page_type: f5(slab)
[   23.863236] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.863930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.864621] page dumped because: kasan: bad access detected
[   23.865121] 
[   23.865263] Memory state around the buggy address:
[   23.865697]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.866344]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.866992] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.867636]                       ^
[   23.867956]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.868603]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.869248] ==================================================================
[   23.966393] ==================================================================
[   23.967043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   23.967844] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.968501] 
[   23.968647] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.968672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.968680] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.968690] Call trace:
[   23.968695]  show_stack+0x20/0x38 (C)
[   23.968712]  dump_stack_lvl+0x8c/0xd0
[   23.968727]  print_report+0x118/0x608
[   23.968743]  kasan_report+0xdc/0x128
[   23.968758]  __asan_report_load8_noabort+0x20/0x30
[   23.968776]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   23.968794]  kasan_bitops_generic+0x11c/0x1c8
[   23.968809]  kunit_try_run_case+0x170/0x3f0
[   23.968828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.968849]  kthread+0x328/0x630
[   23.968867]  ret_from_fork+0x10/0x20
[   23.968884] 
[   23.974936] Allocated by task 315:
[   23.975248]  kasan_save_stack+0x3c/0x68
[   23.975602]  kasan_save_track+0x20/0x40
[   23.975956]  kasan_save_alloc_info+0x40/0x58
[   23.976349]  __kasan_kmalloc+0xd4/0xd8
[   23.976695]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.977114]  kasan_bitops_generic+0xa0/0x1c8
[   23.977506]  kunit_try_run_case+0x170/0x3f0
[   23.977893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.978395]  kthread+0x328/0x630
[   23.978699]  ret_from_fork+0x10/0x20
[   23.979031] 
[   23.979173] The buggy address belongs to the object at ffff000001193200
[   23.979173]  which belongs to the cache kmalloc-16 of size 16
[   23.980268] The buggy address is located 8 bytes inside of
[   23.980268]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.981358] 
[   23.981500] The buggy address belongs to the physical page:
[   23.981999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.982701] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.983290] page_type: f5(slab)
[   23.983582] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.984276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.984966] page dumped because: kasan: bad access detected
[   23.985467] 
[   23.985609] Memory state around the buggy address:
[   23.986041]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.986689]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.987335] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.987980]                       ^
[   23.988300]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.988947]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.989592] ==================================================================
[   23.869996] ==================================================================
[   23.870646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   23.871445] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.872102] 
[   23.872247] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.872274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.872281] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.872290] Call trace:
[   23.872296]  show_stack+0x20/0x38 (C)
[   23.872312]  dump_stack_lvl+0x8c/0xd0
[   23.872327]  print_report+0x118/0x608
[   23.872342]  kasan_report+0xdc/0x128
[   23.872357]  __asan_report_load8_noabort+0x20/0x30
[   23.872376]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   23.872393]  kasan_bitops_generic+0x11c/0x1c8
[   23.872408]  kunit_try_run_case+0x170/0x3f0
[   23.872426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.872447]  kthread+0x328/0x630
[   23.872465]  ret_from_fork+0x10/0x20
[   23.872482] 
[   23.878535] Allocated by task 315:
[   23.878846]  kasan_save_stack+0x3c/0x68
[   23.879200]  kasan_save_track+0x20/0x40
[   23.879553]  kasan_save_alloc_info+0x40/0x58
[   23.879947]  __kasan_kmalloc+0xd4/0xd8
[   23.880292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.880712]  kasan_bitops_generic+0xa0/0x1c8
[   23.881103]  kunit_try_run_case+0x170/0x3f0
[   23.881489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.881991]  kthread+0x328/0x630
[   23.882295]  ret_from_fork+0x10/0x20
[   23.882627] 
[   23.882769] The buggy address belongs to the object at ffff000001193200
[   23.882769]  which belongs to the cache kmalloc-16 of size 16
[   23.883863] The buggy address is located 8 bytes inside of
[   23.883863]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.884952] 
[   23.885094] The buggy address belongs to the physical page:
[   23.885594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.886297] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.886886] page_type: f5(slab)
[   23.887179] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.887873] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.888564] page dumped because: kasan: bad access detected
[   23.889065] 
[   23.889206] Memory state around the buggy address:
[   23.889639]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.890286]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.890934] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.891579]                       ^
[   23.891899]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.892546]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.893191] ==================================================================
[   24.038037] ==================================================================
[   24.038676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   24.039465] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   24.040110] 
[   24.040248] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.040263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.040267] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.040272] Call trace:
[   24.040276]  show_stack+0x20/0x38 (C)
[   24.040284]  dump_stack_lvl+0x8c/0xd0
[   24.040293]  print_report+0x118/0x608
[   24.040301]  kasan_report+0xdc/0x128
[   24.040310]  __asan_report_load8_noabort+0x20/0x30
[   24.040320]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   24.040330]  kasan_bitops_generic+0x11c/0x1c8
[   24.040338]  kunit_try_run_case+0x170/0x3f0
[   24.040349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.040361]  kthread+0x328/0x630
[   24.040370]  ret_from_fork+0x10/0x20
[   24.040380] 
[   24.046399] Allocated by task 315:
[   24.046704]  kasan_save_stack+0x3c/0x68
[   24.047048]  kasan_save_track+0x20/0x40
[   24.047391]  kasan_save_alloc_info+0x40/0x58
[   24.047774]  __kasan_kmalloc+0xd4/0xd8
[   24.048111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.048518]  kasan_bitops_generic+0xa0/0x1c8
[   24.048899]  kunit_try_run_case+0x170/0x3f0
[   24.049275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.049765]  kthread+0x328/0x630
[   24.050058]  ret_from_fork+0x10/0x20
[   24.050380] 
[   24.050517] The buggy address belongs to the object at ffff000001193200
[   24.050517]  which belongs to the cache kmalloc-16 of size 16
[   24.051599] The buggy address is located 8 bytes inside of
[   24.051599]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   24.052674] 
[   24.052811] The buggy address belongs to the physical page:
[   24.053302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   24.053994] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.054571] page_type: f5(slab)
[   24.054855] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   24.055538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.056220] page dumped because: kasan: bad access detected
[   24.056712] 
[   24.056850] Memory state around the buggy address:
[   24.057275]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.057912]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   24.058549] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.059185]                       ^
[   24.059498]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060135]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060771] ==================================================================
[   23.893918] ==================================================================
[   23.894565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   23.895365] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.896029] 
[   23.896174] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.896200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.896208] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.896216] Call trace:
[   23.896222]  show_stack+0x20/0x38 (C)
[   23.896238]  dump_stack_lvl+0x8c/0xd0
[   23.896253]  print_report+0x118/0x608
[   23.896269]  kasan_report+0xdc/0x128
[   23.896284]  kasan_check_range+0x100/0x1a8
[   23.896300]  __kasan_check_write+0x20/0x30
[   23.896317]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   23.896335]  kasan_bitops_generic+0x11c/0x1c8
[   23.896350]  kunit_try_run_case+0x170/0x3f0
[   23.896368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.896389]  kthread+0x328/0x630
[   23.896406]  ret_from_fork+0x10/0x20
[   23.896423] 
[   23.902778] Allocated by task 315:
[   23.903088]  kasan_save_stack+0x3c/0x68
[   23.903443]  kasan_save_track+0x20/0x40
[   23.903796]  kasan_save_alloc_info+0x40/0x58
[   23.904190]  __kasan_kmalloc+0xd4/0xd8
[   23.904535]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.904954]  kasan_bitops_generic+0xa0/0x1c8
[   23.905346]  kunit_try_run_case+0x170/0x3f0
[   23.905732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.906234]  kthread+0x328/0x630
[   23.906537]  ret_from_fork+0x10/0x20
[   23.906869] 
[   23.907011] The buggy address belongs to the object at ffff000001193200
[   23.907011]  which belongs to the cache kmalloc-16 of size 16
[   23.908105] The buggy address is located 8 bytes inside of
[   23.908105]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.909194] 
[   23.909337] The buggy address belongs to the physical page:
[   23.909836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.910538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.911126] page_type: f5(slab)
[   23.911420] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.912114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.912804] page dumped because: kasan: bad access detected
[   23.913305] 
[   23.913446] Memory state around the buggy address:
[   23.913879]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.914526]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.915173] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.915819]                       ^
[   23.916139]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.916786]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.917431] ==================================================================
[   23.990313] ==================================================================
[   23.990961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   23.991761] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.992425] 
[   23.992570] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.992596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.992604] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.992612] Call trace:
[   23.992618]  show_stack+0x20/0x38 (C)
[   23.992635]  dump_stack_lvl+0x8c/0xd0
[   23.992649]  print_report+0x118/0x608
[   23.992665]  kasan_report+0xdc/0x128
[   23.992680]  kasan_check_range+0x100/0x1a8
[   23.992696]  __kasan_check_write+0x20/0x30
[   23.992714]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   23.992731]  kasan_bitops_generic+0x11c/0x1c8
[   23.992746]  kunit_try_run_case+0x170/0x3f0
[   23.992765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.992785]  kthread+0x328/0x630
[   23.992803]  ret_from_fork+0x10/0x20
[   23.992820] 
[   23.999174] Allocated by task 315:
[   23.999485]  kasan_save_stack+0x3c/0x68
[   23.999839]  kasan_save_track+0x20/0x40
[   24.000192]  kasan_save_alloc_info+0x40/0x58
[   24.000586]  __kasan_kmalloc+0xd4/0xd8
[   24.000932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.001350]  kasan_bitops_generic+0xa0/0x1c8
[   24.001743]  kunit_try_run_case+0x170/0x3f0
[   24.002130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.002631]  kthread+0x328/0x630
[   24.002935]  ret_from_fork+0x10/0x20
[   24.003267] 
[   24.003410] The buggy address belongs to the object at ffff000001193200
[   24.003410]  which belongs to the cache kmalloc-16 of size 16
[   24.004504] The buggy address is located 8 bytes inside of
[   24.004504]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   24.005592] 
[   24.005735] The buggy address belongs to the physical page:
[   24.006235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   24.006935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.007524] page_type: f5(slab)
[   24.007818] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   24.008511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.009201] page dumped because: kasan: bad access detected
[   24.009702] 
[   24.009844] Memory state around the buggy address:
[   24.010277]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.010923]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   24.011570] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.012214]                       ^
[   24.012535]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.013182]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.013826] ==================================================================
[   23.918183] ==================================================================
[   23.918831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   23.919631] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.920288] 
[   23.920434] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.920459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.920467] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.920476] Call trace:
[   23.920482]  show_stack+0x20/0x38 (C)
[   23.920498]  dump_stack_lvl+0x8c/0xd0
[   23.920513]  print_report+0x118/0x608
[   23.920529]  kasan_report+0xdc/0x128
[   23.920544]  __asan_report_load8_noabort+0x20/0x30
[   23.920562]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   23.920580]  kasan_bitops_generic+0x11c/0x1c8
[   23.920594]  kunit_try_run_case+0x170/0x3f0
[   23.920612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.920633]  kthread+0x328/0x630
[   23.920651]  ret_from_fork+0x10/0x20
[   23.920668] 
[   23.926719] Allocated by task 315:
[   23.927031]  kasan_save_stack+0x3c/0x68
[   23.927385]  kasan_save_track+0x20/0x40
[   23.927738]  kasan_save_alloc_info+0x40/0x58
[   23.928132]  __kasan_kmalloc+0xd4/0xd8
[   23.928477]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.928896]  kasan_bitops_generic+0xa0/0x1c8
[   23.929287]  kunit_try_run_case+0x170/0x3f0
[   23.929674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.930176]  kthread+0x328/0x630
[   23.930479]  ret_from_fork+0x10/0x20
[   23.930811] 
[   23.930954] The buggy address belongs to the object at ffff000001193200
[   23.930954]  which belongs to the cache kmalloc-16 of size 16
[   23.932048] The buggy address is located 8 bytes inside of
[   23.932048]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.933137] 
[   23.933279] The buggy address belongs to the physical page:
[   23.933778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.934479] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.935067] page_type: f5(slab)
[   23.935361] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.936054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.936744] page dumped because: kasan: bad access detected
[   23.937245] 
[   23.937387] Memory state around the buggy address:
[   23.937820]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.938466]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.939114] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.939759]                       ^
[   23.940079]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.940726]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.941371] ==================================================================
[   24.014638] ==================================================================
[   24.015277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   24.016066] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   24.016712] 
[   24.016850] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.016865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.016869] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.016875] Call trace:
[   24.016878]  show_stack+0x20/0x38 (C)
[   24.016887]  dump_stack_lvl+0x8c/0xd0
[   24.016896]  print_report+0x118/0x608
[   24.016904]  kasan_report+0xdc/0x128
[   24.016913]  __asan_report_load8_noabort+0x20/0x30
[   24.016923]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   24.016933]  kasan_bitops_generic+0x11c/0x1c8
[   24.016941]  kunit_try_run_case+0x170/0x3f0
[   24.016952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.016963]  kthread+0x328/0x630
[   24.016974]  ret_from_fork+0x10/0x20
[   24.016983] 
[   24.023000] Allocated by task 315:
[   24.023304]  kasan_save_stack+0x3c/0x68
[   24.023650]  kasan_save_track+0x20/0x40
[   24.023993]  kasan_save_alloc_info+0x40/0x58
[   24.024376]  __kasan_kmalloc+0xd4/0xd8
[   24.024713]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.025120]  kasan_bitops_generic+0xa0/0x1c8
[   24.025502]  kunit_try_run_case+0x170/0x3f0
[   24.025879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.026370]  kthread+0x328/0x630
[   24.026663]  ret_from_fork+0x10/0x20
[   24.026985] 
[   24.027123] The buggy address belongs to the object at ffff000001193200
[   24.027123]  which belongs to the cache kmalloc-16 of size 16
[   24.028206] The buggy address is located 8 bytes inside of
[   24.028206]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   24.029282] 
[   24.029419] The buggy address belongs to the physical page:
[   24.029911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   24.030603] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.031181] page_type: f5(slab)
[   24.031465] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   24.032149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.032831] page dumped because: kasan: bad access detected
[   24.033322] 
[   24.033460] Memory state around the buggy address:
[   24.033886]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.034523]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   24.035160] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.035796]                       ^
[   24.036108]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.036745]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.037381] ==================================================================
[   23.942128] ==================================================================
[   23.942776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   23.943576] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.944240] 
[   23.944385] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.944411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.944419] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.944428] Call trace:
[   23.944434]  show_stack+0x20/0x38 (C)
[   23.944450]  dump_stack_lvl+0x8c/0xd0
[   23.944465]  print_report+0x118/0x608
[   23.944480]  kasan_report+0xdc/0x128
[   23.944495]  kasan_check_range+0x100/0x1a8
[   23.944512]  __kasan_check_write+0x20/0x30
[   23.944530]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   23.944547]  kasan_bitops_generic+0x11c/0x1c8
[   23.944562]  kunit_try_run_case+0x170/0x3f0
[   23.944581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.944602]  kthread+0x328/0x630
[   23.944619]  ret_from_fork+0x10/0x20
[   23.944636] 
[   23.950988] Allocated by task 315:
[   23.951299]  kasan_save_stack+0x3c/0x68
[   23.951653]  kasan_save_track+0x20/0x40
[   23.952007]  kasan_save_alloc_info+0x40/0x58
[   23.952401]  __kasan_kmalloc+0xd4/0xd8
[   23.952747]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.953166]  kasan_bitops_generic+0xa0/0x1c8
[   23.953557]  kunit_try_run_case+0x170/0x3f0
[   23.953944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.954446]  kthread+0x328/0x630
[   23.954750]  ret_from_fork+0x10/0x20
[   23.955082] 
[   23.955224] The buggy address belongs to the object at ffff000001193200
[   23.955224]  which belongs to the cache kmalloc-16 of size 16
[   23.956318] The buggy address is located 8 bytes inside of
[   23.956318]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.957407] 
[   23.957550] The buggy address belongs to the physical page:
[   23.958050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.958751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.959340] page_type: f5(slab)
[   23.959633] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.960327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.961017] page dumped because: kasan: bad access detected
[   23.961517] 
[   23.961659] Memory state around the buggy address:
[   23.962092]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.962739]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.963387] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.964032]                       ^
[   23.964351]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.964999]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.965643] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   23.724262] ==================================================================
[   23.724917] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   23.725660] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.726331] 
[   23.726480] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.726513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.726523] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.726533] Call trace:
[   23.726541]  show_stack+0x20/0x38 (C)
[   23.726561]  dump_stack_lvl+0x8c/0xd0
[   23.726579]  print_report+0x118/0x608
[   23.726598]  kasan_report+0xdc/0x128
[   23.726617]  kasan_check_range+0x100/0x1a8
[   23.726637]  __kasan_check_write+0x20/0x30
[   23.726658]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   23.726684]  kasan_bitops_generic+0x110/0x1c8
[   23.726703]  kunit_try_run_case+0x170/0x3f0
[   23.726726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.726751]  kthread+0x328/0x630
[   23.726774]  ret_from_fork+0x10/0x20
[   23.726795] 
[   23.733103] Allocated by task 315:
[   23.733418]  kasan_save_stack+0x3c/0x68
[   23.733778]  kasan_save_track+0x20/0x40
[   23.734136]  kasan_save_alloc_info+0x40/0x58
[   23.734536]  __kasan_kmalloc+0xd4/0xd8
[   23.734886]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.735312]  kasan_bitops_generic+0xa0/0x1c8
[   23.735708]  kunit_try_run_case+0x170/0x3f0
[   23.736101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.736610]  kthread+0x328/0x630
[   23.736920]  ret_from_fork+0x10/0x20
[   23.737258] 
[   23.737404] The buggy address belongs to the object at ffff000001193200
[   23.737404]  which belongs to the cache kmalloc-16 of size 16
[   23.738505] The buggy address is located 8 bytes inside of
[   23.738505]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.739601] 
[   23.739746] The buggy address belongs to the physical page:
[   23.740251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.740958] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.741551] page_type: f5(slab)
[   23.741849] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.742550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.743246] page dumped because: kasan: bad access detected
[   23.743750] 
[   23.743896] Memory state around the buggy address:
[   23.744333]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.744985]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.745637] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.746286]                       ^
[   23.746610]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.747263]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.747912] ==================================================================
[   23.675690] ==================================================================
[   23.676345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   23.677089] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.677753] 
[   23.677902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.677935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.677945] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.677956] Call trace:
[   23.677964]  show_stack+0x20/0x38 (C)
[   23.677984]  dump_stack_lvl+0x8c/0xd0
[   23.678003]  print_report+0x118/0x608
[   23.678022]  kasan_report+0xdc/0x128
[   23.678041]  __asan_report_load8_noabort+0x20/0x30
[   23.678064]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   23.678090]  kasan_bitops_generic+0x110/0x1c8
[   23.678109]  kunit_try_run_case+0x170/0x3f0
[   23.678132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.678158]  kthread+0x328/0x630
[   23.678180]  ret_from_fork+0x10/0x20
[   23.678201] 
[   23.684211] Allocated by task 315:
[   23.684525]  kasan_save_stack+0x3c/0x68
[   23.684884]  kasan_save_track+0x20/0x40
[   23.685244]  kasan_save_alloc_info+0x40/0x58
[   23.685642]  __kasan_kmalloc+0xd4/0xd8
[   23.685993]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.686419]  kasan_bitops_generic+0xa0/0x1c8
[   23.686816]  kunit_try_run_case+0x170/0x3f0
[   23.687208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.687716]  kthread+0x328/0x630
[   23.688026]  ret_from_fork+0x10/0x20
[   23.688364] 
[   23.688510] The buggy address belongs to the object at ffff000001193200
[   23.688510]  which belongs to the cache kmalloc-16 of size 16
[   23.689612] The buggy address is located 8 bytes inside of
[   23.689612]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.690706] 
[   23.690852] The buggy address belongs to the physical page:
[   23.691356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.692064] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.692657] page_type: f5(slab)
[   23.692956] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.693656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.694351] page dumped because: kasan: bad access detected
[   23.694855] 
[   23.695001] Memory state around the buggy address:
[   23.695438]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.696090]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.696743] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.697392]                       ^
[   23.697715]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.698367]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.699017] ==================================================================
[   23.748692] ==================================================================
[   23.749347] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   23.750091] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.750753] 
[   23.750902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.750934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.750944] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.750954] Call trace:
[   23.750962]  show_stack+0x20/0x38 (C)
[   23.750982]  dump_stack_lvl+0x8c/0xd0
[   23.751001]  print_report+0x118/0x608
[   23.751020]  kasan_report+0xdc/0x128
[   23.751039]  __asan_report_load8_noabort+0x20/0x30
[   23.751061]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   23.751087]  kasan_bitops_generic+0x110/0x1c8
[   23.751105]  kunit_try_run_case+0x170/0x3f0
[   23.751128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.751154]  kthread+0x328/0x630
[   23.751176]  ret_from_fork+0x10/0x20
[   23.751197] 
[   23.757201] Allocated by task 315:
[   23.757516]  kasan_save_stack+0x3c/0x68
[   23.757876]  kasan_save_track+0x20/0x40
[   23.758234]  kasan_save_alloc_info+0x40/0x58
[   23.758633]  __kasan_kmalloc+0xd4/0xd8
[   23.758984]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.759409]  kasan_bitops_generic+0xa0/0x1c8
[   23.759806]  kunit_try_run_case+0x170/0x3f0
[   23.760200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.760708]  kthread+0x328/0x630
[   23.761018]  ret_from_fork+0x10/0x20
[   23.761356] 
[   23.761502] The buggy address belongs to the object at ffff000001193200
[   23.761502]  which belongs to the cache kmalloc-16 of size 16
[   23.762603] The buggy address is located 8 bytes inside of
[   23.762603]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.763699] 
[   23.763845] The buggy address belongs to the physical page:
[   23.764349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.765056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.765650] page_type: f5(slab)
[   23.765949] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.766650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.767344] page dumped because: kasan: bad access detected
[   23.767849] 
[   23.767994] Memory state around the buggy address:
[   23.768431]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.769083]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.769734] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.770385]                       ^
[   23.770708]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.771360]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.772009] ==================================================================
[   23.772770] ==================================================================
[   23.773425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   23.774169] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.774838] 
[   23.774988] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.775020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.775029] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.775040] Call trace:
[   23.775047]  show_stack+0x20/0x38 (C)
[   23.775067]  dump_stack_lvl+0x8c/0xd0
[   23.775086]  print_report+0x118/0x608
[   23.775105]  kasan_report+0xdc/0x128
[   23.775123]  kasan_check_range+0x100/0x1a8
[   23.775143]  __kasan_check_write+0x20/0x30
[   23.775165]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   23.775191]  kasan_bitops_generic+0x110/0x1c8
[   23.775210]  kunit_try_run_case+0x170/0x3f0
[   23.775232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.775258]  kthread+0x328/0x630
[   23.775280]  ret_from_fork+0x10/0x20
[   23.775300] 
[   23.781612] Allocated by task 315:
[   23.781928]  kasan_save_stack+0x3c/0x68
[   23.782288]  kasan_save_track+0x20/0x40
[   23.782646]  kasan_save_alloc_info+0x40/0x58
[   23.783045]  __kasan_kmalloc+0xd4/0xd8
[   23.783397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.783823]  kasan_bitops_generic+0xa0/0x1c8
[   23.784220]  kunit_try_run_case+0x170/0x3f0
[   23.784613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.785121]  kthread+0x328/0x630
[   23.785430]  ret_from_fork+0x10/0x20
[   23.785767] 
[   23.785913] The buggy address belongs to the object at ffff000001193200
[   23.785913]  which belongs to the cache kmalloc-16 of size 16
[   23.787014] The buggy address is located 8 bytes inside of
[   23.787014]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.788110] 
[   23.788257] The buggy address belongs to the physical page:
[   23.788761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.789468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.790061] page_type: f5(slab)
[   23.790360] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.791060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.791755] page dumped because: kasan: bad access detected
[   23.792259] 
[   23.792405] Memory state around the buggy address:
[   23.792841]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.793494]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.794146] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.794795]                       ^
[   23.795119]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.795771]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.796420] ==================================================================
[   23.821857] ==================================================================
[   23.822509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   23.823247] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.823904] 
[   23.824050] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.824077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.824084] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.824093] Call trace:
[   23.824099]  show_stack+0x20/0x38 (C)
[   23.824116]  dump_stack_lvl+0x8c/0xd0
[   23.824132]  print_report+0x118/0x608
[   23.824147]  kasan_report+0xdc/0x128
[   23.824162]  __asan_report_load8_noabort+0x20/0x30
[   23.824180]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   23.824201]  kasan_bitops_generic+0x110/0x1c8
[   23.824216]  kunit_try_run_case+0x170/0x3f0
[   23.824235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.824256]  kthread+0x328/0x630
[   23.824274]  ret_from_fork+0x10/0x20
[   23.824291] 
[   23.830277] Allocated by task 315:
[   23.830589]  kasan_save_stack+0x3c/0x68
[   23.830943]  kasan_save_track+0x20/0x40
[   23.831297]  kasan_save_alloc_info+0x40/0x58
[   23.831691]  __kasan_kmalloc+0xd4/0xd8
[   23.832036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.832456]  kasan_bitops_generic+0xa0/0x1c8
[   23.832847]  kunit_try_run_case+0x170/0x3f0
[   23.833233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.833735]  kthread+0x328/0x630
[   23.834039]  ret_from_fork+0x10/0x20
[   23.834370] 
[   23.834513] The buggy address belongs to the object at ffff000001193200
[   23.834513]  which belongs to the cache kmalloc-16 of size 16
[   23.835608] The buggy address is located 8 bytes inside of
[   23.835608]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.836697] 
[   23.836841] The buggy address belongs to the physical page:
[   23.837341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.838044] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.838633] page_type: f5(slab)
[   23.838926] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.839620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.840310] page dumped because: kasan: bad access detected
[   23.840809] 
[   23.840950] Memory state around the buggy address:
[   23.841383]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.842031]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.842678] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.843323]                       ^
[   23.843643]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844290]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844935] ==================================================================
[   23.625892] ==================================================================
[   23.626578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.627354] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.628033] 
[   23.628199] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.628249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.628265] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.628283] Call trace:
[   23.628295]  show_stack+0x20/0x38 (C)
[   23.628329]  dump_stack_lvl+0x8c/0xd0
[   23.628361]  print_report+0x118/0x608
[   23.628392]  kasan_report+0xdc/0x128
[   23.628420]  __asan_report_load8_noabort+0x20/0x30
[   23.628455]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   23.628494]  kasan_bitops_generic+0x110/0x1c8
[   23.628523]  kunit_try_run_case+0x170/0x3f0
[   23.628560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.628600]  kthread+0x328/0x630
[   23.628634]  ret_from_fork+0x10/0x20
[   23.628668] 
[   23.634734] Allocated by task 315:
[   23.635061]  kasan_save_stack+0x3c/0x68
[   23.635435]  kasan_save_track+0x20/0x40
[   23.635808]  kasan_save_alloc_info+0x40/0x58
[   23.636221]  __kasan_kmalloc+0xd4/0xd8
[   23.636585]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.637028]  kasan_bitops_generic+0xa0/0x1c8
[   23.637439]  kunit_try_run_case+0x170/0x3f0
[   23.637848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.638374]  kthread+0x328/0x630
[   23.638697]  ret_from_fork+0x10/0x20
[   23.639049] 
[   23.639203] The buggy address belongs to the object at ffff000001193200
[   23.639203]  which belongs to the cache kmalloc-16 of size 16
[   23.640321] The buggy address is located 8 bytes inside of
[   23.640321]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.641436] 
[   23.641592] The buggy address belongs to the physical page:
[   23.642107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.642834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.643446] page_type: f5(slab)
[   23.643760] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.644476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.645185] page dumped because: kasan: bad access detected
[   23.645701] 
[   23.645856] Memory state around the buggy address:
[   23.646305]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.646974]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.647642] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.648305]                       ^
[   23.648641]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.649308]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.649972] ==================================================================
[   23.699814] ==================================================================
[   23.700470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   23.701214] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.701884] 
[   23.702034] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.702068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.702077] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.702088] Call trace:
[   23.702095]  show_stack+0x20/0x38 (C)
[   23.702116]  dump_stack_lvl+0x8c/0xd0
[   23.702135]  print_report+0x118/0x608
[   23.702154]  kasan_report+0xdc/0x128
[   23.702172]  kasan_check_range+0x100/0x1a8
[   23.702193]  __kasan_check_write+0x20/0x30
[   23.702214]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   23.702240]  kasan_bitops_generic+0x110/0x1c8
[   23.702258]  kunit_try_run_case+0x170/0x3f0
[   23.702281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.702307]  kthread+0x328/0x630
[   23.702329]  ret_from_fork+0x10/0x20
[   23.702350] 
[   23.708660] Allocated by task 315:
[   23.708975]  kasan_save_stack+0x3c/0x68
[   23.709336]  kasan_save_track+0x20/0x40
[   23.709695]  kasan_save_alloc_info+0x40/0x58
[   23.710093]  __kasan_kmalloc+0xd4/0xd8
[   23.710443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.710868]  kasan_bitops_generic+0xa0/0x1c8
[   23.711265]  kunit_try_run_case+0x170/0x3f0
[   23.711657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.712166]  kthread+0x328/0x630
[   23.712476]  ret_from_fork+0x10/0x20
[   23.712812] 
[   23.712958] The buggy address belongs to the object at ffff000001193200
[   23.712958]  which belongs to the cache kmalloc-16 of size 16
[   23.714058] The buggy address is located 8 bytes inside of
[   23.714058]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.715155] 
[   23.715300] The buggy address belongs to the physical page:
[   23.715803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.716510] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.717104] page_type: f5(slab)
[   23.717401] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.718102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.718796] page dumped because: kasan: bad access detected
[   23.719301] 
[   23.719446] Memory state around the buggy address:
[   23.719883]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.720535]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.721187] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.721837]                       ^
[   23.722160]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.722812]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.723462] ==================================================================
[   23.797186] ==================================================================
[   23.797839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   23.798583] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.799253] 
[   23.799402] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.799433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.799442] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.799453] Call trace:
[   23.799460]  show_stack+0x20/0x38 (C)
[   23.799480]  dump_stack_lvl+0x8c/0xd0
[   23.799499]  print_report+0x118/0x608
[   23.799517]  kasan_report+0xdc/0x128
[   23.799535]  kasan_check_range+0x100/0x1a8
[   23.799556]  __kasan_check_write+0x20/0x30
[   23.799577]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   23.799602]  kasan_bitops_generic+0x110/0x1c8
[   23.799621]  kunit_try_run_case+0x170/0x3f0
[   23.799643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.799669]  kthread+0x328/0x630
[   23.799690]  ret_from_fork+0x10/0x20
[   23.799711] 
[   23.806023] Allocated by task 315:
[   23.806339]  kasan_save_stack+0x3c/0x68
[   23.806697]  kasan_save_track+0x20/0x40
[   23.807056]  kasan_save_alloc_info+0x40/0x58
[   23.807455]  __kasan_kmalloc+0xd4/0xd8
[   23.807806]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.808232]  kasan_bitops_generic+0xa0/0x1c8
[   23.808627]  kunit_try_run_case+0x170/0x3f0
[   23.809019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.809527]  kthread+0x328/0x630
[   23.809837]  ret_from_fork+0x10/0x20
[   23.810175] 
[   23.810321] The buggy address belongs to the object at ffff000001193200
[   23.810321]  which belongs to the cache kmalloc-16 of size 16
[   23.811421] The buggy address is located 8 bytes inside of
[   23.811421]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.812516] 
[   23.812662] The buggy address belongs to the physical page:
[   23.813166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.813873] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.814468] page_type: f5(slab)
[   23.814765] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.815465] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.816160] page dumped because: kasan: bad access detected
[   23.816664] 
[   23.816809] Memory state around the buggy address:
[   23.817247]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.817900]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.818552] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.819202]                       ^
[   23.819526]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.820177]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.820826] ==================================================================
[   23.600005] ==================================================================
[   23.601047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.601821] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.602508] 
[   23.602671] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.602722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.602737] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.602756] Call trace:
[   23.602768]  show_stack+0x20/0x38 (C)
[   23.602802]  dump_stack_lvl+0x8c/0xd0
[   23.602834]  print_report+0x118/0x608
[   23.602864]  kasan_report+0xdc/0x128
[   23.602893]  kasan_check_range+0x100/0x1a8
[   23.602925]  __kasan_check_write+0x20/0x30
[   23.602957]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   23.602998]  kasan_bitops_generic+0x110/0x1c8
[   23.603027]  kunit_try_run_case+0x170/0x3f0
[   23.603063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.603103]  kthread+0x328/0x630
[   23.603137]  ret_from_fork+0x10/0x20
[   23.603170] 
[   23.609541] Allocated by task 315:
[   23.609868]  kasan_save_stack+0x3c/0x68
[   23.610242]  kasan_save_track+0x20/0x40
[   23.610615]  kasan_save_alloc_info+0x40/0x58
[   23.611030]  __kasan_kmalloc+0xd4/0xd8
[   23.611395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.611838]  kasan_bitops_generic+0xa0/0x1c8
[   23.612248]  kunit_try_run_case+0x170/0x3f0
[   23.612656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.613182]  kthread+0x328/0x630
[   23.613505]  ret_from_fork+0x10/0x20
[   23.613857] 
[   23.614012] The buggy address belongs to the object at ffff000001193200
[   23.614012]  which belongs to the cache kmalloc-16 of size 16
[   23.615131] The buggy address is located 8 bytes inside of
[   23.615131]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.616246] 
[   23.616401] The buggy address belongs to the physical page:
[   23.616918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.617645] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.618257] page_type: f5(slab)
[   23.618572] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.619289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.619998] page dumped because: kasan: bad access detected
[   23.620513] 
[   23.620666] Memory state around the buggy address:
[   23.621116]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.621784]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.622454] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.623117]                       ^
[   23.623453]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.624121]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.624784] ==================================================================
[   23.651105] ==================================================================
[   23.651779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.652539] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315
[   23.653212] 
[   23.653368] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.653405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.653415] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.653428] Call trace:
[   23.653436]  show_stack+0x20/0x38 (C)
[   23.653460]  dump_stack_lvl+0x8c/0xd0
[   23.653482]  print_report+0x118/0x608
[   23.653502]  kasan_report+0xdc/0x128
[   23.653520]  kasan_check_range+0x100/0x1a8
[   23.653540]  __kasan_check_write+0x20/0x30
[   23.653562]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   23.653588]  kasan_bitops_generic+0x110/0x1c8
[   23.653607]  kunit_try_run_case+0x170/0x3f0
[   23.653631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.653658]  kthread+0x328/0x630
[   23.653681]  ret_from_fork+0x10/0x20
[   23.653703] 
[   23.660014] Allocated by task 315:
[   23.660333]  kasan_save_stack+0x3c/0x68
[   23.660695]  kasan_save_track+0x20/0x40
[   23.661054]  kasan_save_alloc_info+0x40/0x58
[   23.661452]  __kasan_kmalloc+0xd4/0xd8
[   23.661803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.662230]  kasan_bitops_generic+0xa0/0x1c8
[   23.662628]  kunit_try_run_case+0x170/0x3f0
[   23.663021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.663531]  kthread+0x328/0x630
[   23.663840]  ret_from_fork+0x10/0x20
[   23.664179] 
[   23.664326] The buggy address belongs to the object at ffff000001193200
[   23.664326]  which belongs to the cache kmalloc-16 of size 16
[   23.665428] The buggy address is located 8 bytes inside of
[   23.665428]  allocated 9-byte region [ffff000001193200, ffff000001193209)
[   23.666524] 
[   23.666671] The buggy address belongs to the physical page:
[   23.667176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193
[   23.667886] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.668484] page_type: f5(slab)
[   23.668785] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.669487] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.670182] page dumped because: kasan: bad access detected
[   23.670687] 
[   23.670832] Memory state around the buggy address:
[   23.671269]  ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.671923]  ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc
[   23.672575] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.673225]                       ^
[   23.673548]  ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.674201]  ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.674850] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   23.568931] ==================================================================
[   23.569608] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   23.570173] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313
[   23.570839] 
[   23.570994] CPU: 4 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.571032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.571043] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.571056] Call trace:
[   23.571064]  show_stack+0x20/0x38 (C)
[   23.571089]  dump_stack_lvl+0x8c/0xd0
[   23.571110]  print_report+0x118/0x608
[   23.571131]  kasan_report+0xdc/0x128
[   23.571150]  __asan_report_load1_noabort+0x20/0x30
[   23.571173]  strnlen+0x80/0x88
[   23.571194]  kasan_strings+0x478/0xb00
[   23.571218]  kunit_try_run_case+0x170/0x3f0
[   23.571242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.571268]  kthread+0x328/0x630
[   23.571292]  ret_from_fork+0x10/0x20
[   23.571313] 
[   23.577081] Allocated by task 313:
[   23.577398]  kasan_save_stack+0x3c/0x68
[   23.577762]  kasan_save_track+0x20/0x40
[   23.578121]  kasan_save_alloc_info+0x40/0x58
[   23.578521]  __kasan_kmalloc+0xd4/0xd8
[   23.578873]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.579299]  kasan_strings+0xc8/0xb00
[   23.579646]  kunit_try_run_case+0x170/0x3f0
[   23.580039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.580549]  kthread+0x328/0x630
[   23.580858]  ret_from_fork+0x10/0x20
[   23.581196] 
[   23.581343] Freed by task 313:
[   23.581629]  kasan_save_stack+0x3c/0x68
[   23.581987]  kasan_save_track+0x20/0x40
[   23.582346]  kasan_save_free_info+0x4c/0x78
[   23.582737]  __kasan_slab_free+0x6c/0x98
[   23.583104]  kfree+0x214/0x3c8
[   23.583399]  kasan_strings+0x24c/0xb00
[   23.583753]  kunit_try_run_case+0x170/0x3f0
[   23.584145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.584654]  kthread+0x328/0x630
[   23.584964]  ret_from_fork+0x10/0x20
[   23.585300] 
[   23.585447] The buggy address belongs to the object at ffff0000101e8f80
[   23.585447]  which belongs to the cache kmalloc-32 of size 32
[   23.586549] The buggy address is located 16 bytes inside of
[   23.586549]  freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0)
[   23.587631] 
[   23.587777] The buggy address belongs to the physical page:
[   23.588283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8
[   23.589002] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.589601] page_type: f5(slab)
[   23.589902] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   23.590602] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   23.591298] page dumped because: kasan: bad access detected
[   23.591802] 
[   23.591947] Memory state around the buggy address:
[   23.592385]  ffff0000101e8e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.593038]  ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.593691] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.594340]                          ^
[   23.594687]  ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.595340]  ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   23.595989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   23.539683] ==================================================================
[   23.540355] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   23.540926] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313
[   23.541603] 
[   23.541768] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.541818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.541834] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.541852] Call trace:
[   23.541864]  show_stack+0x20/0x38 (C)
[   23.541898]  dump_stack_lvl+0x8c/0xd0
[   23.541930]  print_report+0x118/0x608
[   23.541963]  kasan_report+0xdc/0x128
[   23.541993]  __asan_report_load1_noabort+0x20/0x30
[   23.542029]  strlen+0xa8/0xb0
[   23.542061]  kasan_strings+0x418/0xb00
[   23.542098]  kunit_try_run_case+0x170/0x3f0
[   23.542137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.542178]  kthread+0x328/0x630
[   23.542214]  ret_from_fork+0x10/0x20
[   23.542248] 
[   23.548067] Allocated by task 313:
[   23.548398]  kasan_save_stack+0x3c/0x68
[   23.548773]  kasan_save_track+0x20/0x40
[   23.549146]  kasan_save_alloc_info+0x40/0x58
[   23.549561]  __kasan_kmalloc+0xd4/0xd8
[   23.549925]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.550368]  kasan_strings+0xc8/0xb00
[   23.550731]  kunit_try_run_case+0x170/0x3f0
[   23.551139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.551664]  kthread+0x328/0x630
[   23.551989]  ret_from_fork+0x10/0x20
[   23.552339] 
[   23.552493] Freed by task 313:
[   23.552789]  kasan_save_stack+0x3c/0x68
[   23.553162]  kasan_save_track+0x20/0x40
[   23.553534]  kasan_save_free_info+0x4c/0x78
[   23.553940]  __kasan_slab_free+0x6c/0x98
[   23.554320]  kfree+0x214/0x3c8
[   23.554630]  kasan_strings+0x24c/0xb00
[   23.555000]  kunit_try_run_case+0x170/0x3f0
[   23.555408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.555933]  kthread+0x328/0x630
[   23.556256]  ret_from_fork+0x10/0x20
[   23.556606] 
[   23.556761] The buggy address belongs to the object at ffff0000101e8f80
[   23.556761]  which belongs to the cache kmalloc-32 of size 32
[   23.557882] The buggy address is located 16 bytes inside of
[   23.557882]  freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0)
[   23.558980] 
[   23.559135] The buggy address belongs to the physical page:
[   23.559652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8
[   23.560385] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.560998] page_type: f5(slab)
[   23.561312] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   23.562029] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   23.562738] page dumped because: kasan: bad access detected
[   23.563254] 
[   23.563408] Memory state around the buggy address:
[   23.563856]  ffff0000101e8e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.564524]  ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.565191] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.565854]                          ^
[   23.566212]  ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.566879]  ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   23.567543] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   23.511264] ==================================================================
[   23.511945] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   23.512587] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313
[   23.513266] 
[   23.513431] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.513482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.513496] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.513515] Call trace:
[   23.513527]  show_stack+0x20/0x38 (C)
[   23.513559]  dump_stack_lvl+0x8c/0xd0
[   23.513592]  print_report+0x118/0x608
[   23.513623]  kasan_report+0xdc/0x128
[   23.513652]  __asan_report_load1_noabort+0x20/0x30
[   23.513687]  kasan_strings+0x95c/0xb00
[   23.513720]  kunit_try_run_case+0x170/0x3f0
[   23.513757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.513797]  kthread+0x328/0x630
[   23.513832]  ret_from_fork+0x10/0x20
[   23.513866] 
[   23.519413] Allocated by task 313:
[   23.519742]  kasan_save_stack+0x3c/0x68
[   23.520117]  kasan_save_track+0x20/0x40
[   23.520490]  kasan_save_alloc_info+0x40/0x58
[   23.520905]  __kasan_kmalloc+0xd4/0xd8
[   23.521269]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.521712]  kasan_strings+0xc8/0xb00
[   23.522074]  kunit_try_run_case+0x170/0x3f0
[   23.522482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.523008]  kthread+0x328/0x630
[   23.523332]  ret_from_fork+0x10/0x20
[   23.523683] 
[   23.523837] Freed by task 313:
[   23.524132]  kasan_save_stack+0x3c/0x68
[   23.524506]  kasan_save_track+0x20/0x40
[   23.524878]  kasan_save_free_info+0x4c/0x78
[   23.525284]  __kasan_slab_free+0x6c/0x98
[   23.525663]  kfree+0x214/0x3c8
[   23.525972]  kasan_strings+0x24c/0xb00
[   23.526342]  kunit_try_run_case+0x170/0x3f0
[   23.526750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.527275]  kthread+0x328/0x630
[   23.527599]  ret_from_fork+0x10/0x20
[   23.527950] 
[   23.528105] The buggy address belongs to the object at ffff0000101e8f80
[   23.528105]  which belongs to the cache kmalloc-32 of size 32
[   23.529224] The buggy address is located 16 bytes inside of
[   23.529224]  freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0)
[   23.530321] 
[   23.530476] The buggy address belongs to the physical page:
[   23.530994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8
[   23.531727] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.532341] page_type: f5(slab)
[   23.532655] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   23.533372] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   23.534081] page dumped because: kasan: bad access detected
[   23.534598] 
[   23.534751] Memory state around the buggy address:
[   23.535201]  ffff0000101e8e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.535868]  ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.536535] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.537198]                          ^
[   23.537556]  ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.538223]  ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   23.538886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   23.481062] ==================================================================
[   23.483184] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   23.483756] Read of size 1 at addr ffff0000101e8f90 by task kunit_try_catch/313
[   23.484433] 
[   23.484599] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.484650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.484666] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.484684] Call trace:
[   23.484696]  show_stack+0x20/0x38 (C)
[   23.484731]  dump_stack_lvl+0x8c/0xd0
[   23.484762]  print_report+0x118/0x608
[   23.484795]  kasan_report+0xdc/0x128
[   23.484824]  __asan_report_load1_noabort+0x20/0x30
[   23.484861]  strcmp+0xc0/0xc8
[   23.484891]  kasan_strings+0x340/0xb00
[   23.484925]  kunit_try_run_case+0x170/0x3f0
[   23.484962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.485003]  kthread+0x328/0x630
[   23.485038]  ret_from_fork+0x10/0x20
[   23.485073] 
[   23.490886] Allocated by task 313:
[   23.491214]  kasan_save_stack+0x3c/0x68
[   23.491591]  kasan_save_track+0x20/0x40
[   23.491964]  kasan_save_alloc_info+0x40/0x58
[   23.492379]  __kasan_kmalloc+0xd4/0xd8
[   23.492744]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.493187]  kasan_strings+0xc8/0xb00
[   23.493551]  kunit_try_run_case+0x170/0x3f0
[   23.493960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.494486]  kthread+0x328/0x630
[   23.494812]  ret_from_fork+0x10/0x20
[   23.495163] 
[   23.495317] Freed by task 313:
[   23.495613]  kasan_save_stack+0x3c/0x68
[   23.495987]  kasan_save_track+0x20/0x40
[   23.496360]  kasan_save_free_info+0x4c/0x78
[   23.496766]  __kasan_slab_free+0x6c/0x98
[   23.497146]  kfree+0x214/0x3c8
[   23.497455]  kasan_strings+0x24c/0xb00
[   23.497825]  kunit_try_run_case+0x170/0x3f0
[   23.498233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.498761]  kthread+0x328/0x630
[   23.499086]  ret_from_fork+0x10/0x20
[   23.499438] 
[   23.499592] The buggy address belongs to the object at ffff0000101e8f80
[   23.499592]  which belongs to the cache kmalloc-32 of size 32
[   23.500711] The buggy address is located 16 bytes inside of
[   23.500711]  freed 32-byte region [ffff0000101e8f80, ffff0000101e8fa0)
[   23.501810] 
[   23.501966] The buggy address belongs to the physical page:
[   23.502484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e8
[   23.503217] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.503831] page_type: f5(slab)
[   23.504148] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   23.504864] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   23.505573] page dumped because: kasan: bad access detected
[   23.506089] 
[   23.506242] Memory state around the buggy address:
[   23.506693]  ffff0000101e8e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.507360]  ffff0000101e8f00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.508028] >ffff0000101e8f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.508691]                          ^
[   23.509049]  ffff0000101e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.509716]  ffff0000101e9080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   23.510380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   23.449322] ==================================================================
[   23.450369] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   23.450956] Read of size 1 at addr ffff00000ee4dbd8 by task kunit_try_catch/311
[   23.451635] 
[   23.451801] CPU: 2 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.451853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.451868] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.451886] Call trace:
[   23.451899]  show_stack+0x20/0x38 (C)
[   23.451935]  dump_stack_lvl+0x8c/0xd0
[   23.451966]  print_report+0x118/0x608
[   23.451998]  kasan_report+0xdc/0x128
[   23.452027]  __asan_report_load1_noabort+0x20/0x30
[   23.452064]  memcmp+0x198/0x1d8
[   23.452095]  kasan_memcmp+0x16c/0x300
[   23.452129]  kunit_try_run_case+0x170/0x3f0
[   23.452166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.452206]  kthread+0x328/0x630
[   23.452241]  ret_from_fork+0x10/0x20
[   23.452275] 
[   23.458092] Allocated by task 311:
[   23.458420]  kasan_save_stack+0x3c/0x68
[   23.458795]  kasan_save_track+0x20/0x40
[   23.459168]  kasan_save_alloc_info+0x40/0x58
[   23.459583]  __kasan_kmalloc+0xd4/0xd8
[   23.459947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.460390]  kasan_memcmp+0xbc/0x300
[   23.460744]  kunit_try_run_case+0x170/0x3f0
[   23.461152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.461679]  kthread+0x328/0x630
[   23.462004]  ret_from_fork+0x10/0x20
[   23.462356] 
[   23.462510] The buggy address belongs to the object at ffff00000ee4dbc0
[   23.462510]  which belongs to the cache kmalloc-32 of size 32
[   23.463630] The buggy address is located 0 bytes to the right of
[   23.463630]  allocated 24-byte region [ffff00000ee4dbc0, ffff00000ee4dbd8)
[   23.464798] 
[   23.464953] The buggy address belongs to the physical page:
[   23.465470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xee4d
[   23.466197] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.466811] page_type: f5(slab)
[   23.467127] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   23.467844] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.468553] page dumped because: kasan: bad access detected
[   23.469071] 
[   23.469225] Memory state around the buggy address:
[   23.469675]  ffff00000ee4da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.470345]  ffff00000ee4db00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.471012] >ffff00000ee4db80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.471675]                                                     ^
[   23.472241]  ffff00000ee4dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.472909]  ffff00000ee4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.473572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   23.422847] ==================================================================
[   23.423938] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   23.424661] Read of size 1 at addr ffff800089717b4a by task kunit_try_catch/307
[   23.425340] 
[   23.425506] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.425556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.425572] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.425590] Call trace:
[   23.425604]  show_stack+0x20/0x38 (C)
[   23.425637]  dump_stack_lvl+0x8c/0xd0
[   23.425669]  print_report+0x310/0x608
[   23.425701]  kasan_report+0xdc/0x128
[   23.425731]  __asan_report_load1_noabort+0x20/0x30
[   23.425767]  kasan_alloca_oob_right+0x2dc/0x340
[   23.425804]  kunit_try_run_case+0x170/0x3f0
[   23.425843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.425883]  kthread+0x328/0x630
[   23.425919]  ret_from_fork+0x10/0x20
[   23.425953] 
[   23.431572] The buggy address belongs to stack of task kunit_try_catch/307
[   23.432228] 
[   23.432385] The buggy address belongs to the virtual mapping at
[   23.432385]  [ffff800089710000, ffff800089719000) created by:
[   23.432385]  kernel_clone+0x150/0x7a8
[   23.433778] 
[   23.433934] The buggy address belongs to the physical page:
[   23.434452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfdf2
[   23.435179] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.435804] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.436522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.437231] page dumped because: kasan: bad access detected
[   23.437748] 
[   23.437902] Memory state around the buggy address:
[   23.438351]  ffff800089717a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.439019]  ffff800089717a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.439686] >ffff800089717b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   23.440348]                                               ^
[   23.440868]  ffff800089717b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   23.441535]  ffff800089717c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   23.442198] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   23.400290] ==================================================================
[   23.401333] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   23.402050] Read of size 1 at addr ffff8000896f7b5f by task kunit_try_catch/305
[   23.402730] 
[   23.402895] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.402948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.402964] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.402983] Call trace:
[   23.402996]  show_stack+0x20/0x38 (C)
[   23.403031]  dump_stack_lvl+0x8c/0xd0
[   23.403064]  print_report+0x310/0x608
[   23.403095]  kasan_report+0xdc/0x128
[   23.403123]  __asan_report_load1_noabort+0x20/0x30
[   23.403159]  kasan_alloca_oob_left+0x2b8/0x310
[   23.403195]  kunit_try_run_case+0x170/0x3f0
[   23.403231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.403271]  kthread+0x328/0x630
[   23.403306]  ret_from_fork+0x10/0x20
[   23.403340] 
[   23.408949] The buggy address belongs to stack of task kunit_try_catch/305
[   23.409603] 
[   23.409764] The buggy address belongs to the virtual mapping at
[   23.409764]  [ffff8000896f0000, ffff8000896f9000) created by:
[   23.409764]  kernel_clone+0x150/0x7a8
[   23.411157] 
[   23.411313] The buggy address belongs to the physical page:
[   23.411832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfe83
[   23.412558] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.413183] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.413900] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.414608] page dumped because: kasan: bad access detected
[   23.415125] 
[   23.415278] Memory state around the buggy address:
[   23.415728]  ffff8000896f7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.416395]  ffff8000896f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.417063] >ffff8000896f7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   23.417726]                                                     ^
[   23.418292]  ffff8000896f7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   23.418960]  ffff8000896f7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   23.419623] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   23.374424] ==================================================================
[   23.375842] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   23.376505] Read of size 1 at addr ffff8000896d7c2a by task kunit_try_catch/303
[   23.377184] 
[   23.377350] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.377402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.377417] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.377435] Call trace:
[   23.377449]  show_stack+0x20/0x38 (C)
[   23.377482]  dump_stack_lvl+0x8c/0xd0
[   23.377514]  print_report+0x310/0x608
[   23.377545]  kasan_report+0xdc/0x128
[   23.377573]  __asan_report_load1_noabort+0x20/0x30
[   23.377608]  kasan_stack_oob+0x238/0x270
[   23.377641]  kunit_try_run_case+0x170/0x3f0
[   23.377678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.377721]  kthread+0x328/0x630
[   23.377757]  ret_from_fork+0x10/0x20
[   23.377792] 
[   23.383354] The buggy address belongs to stack of task kunit_try_catch/303
[   23.383988]  and is located at offset 138 in frame:
[   23.384442]  kasan_stack_oob+0x0/0x270
[   23.384815] 
[   23.384970] This frame has 4 objects:
[   23.385321]  [48, 49) '__assertion'
[   23.385344]  [64, 72) 'array'
[   23.385679]  [96, 112) '__assertion'
[   23.385971]  [128, 138) 'stack_array'
[   23.386315] 
[   23.386805] The buggy address belongs to the virtual mapping at
[   23.386805]  [ffff8000896d0000, ffff8000896d9000) created by:
[   23.386805]  kernel_clone+0x150/0x7a8
[   23.388198] 
[   23.388355] The buggy address belongs to the physical page:
[   23.388873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1387
[   23.389600] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.390224] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.390941] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.391650] page dumped because: kasan: bad access detected
[   23.392167] 
[   23.392321] Memory state around the buggy address:
[   23.392770]  ffff8000896d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.393438]  ffff8000896d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   23.394105] >ffff8000896d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   23.394769]                                   ^
[   23.395196]  ffff8000896d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   23.395864]  ffff8000896d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   23.396528] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   23.348348] ==================================================================
[   23.349505] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   23.350219] Read of size 1 at addr ffff800087b3e48d by task kunit_try_catch/299
[   23.350923] 
[   23.351098] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.351164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.351183] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.351206] Call trace:
[   23.351222]  show_stack+0x20/0x38 (C)
[   23.351267]  dump_stack_lvl+0x8c/0xd0
[   23.351307]  print_report+0x310/0x608
[   23.351345]  kasan_report+0xdc/0x128
[   23.351381]  __asan_report_load1_noabort+0x20/0x30
[   23.351424]  kasan_global_oob_right+0x230/0x270
[   23.351468]  kunit_try_run_case+0x170/0x3f0
[   23.351513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.351563]  kthread+0x328/0x630
[   23.351606]  ret_from_fork+0x10/0x20
[   23.351648] 
[   23.357302] The buggy address belongs to the variable:
[   23.357786]  global_array+0xd/0x40
[   23.358132] 
[   23.358305] The buggy address belongs to the virtual mapping at
[   23.358305]  [ffff800085d10000, ffff800087bf1000) created by:
[   23.358305]  paging_init+0x670/0x7d0
[   23.359708] 
[   23.359871] The buggy address belongs to the physical page:
[   23.360397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa33e
[   23.361134] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   23.361844] raw: 03fffe0000002000 fffffdffc028cf88 fffffdffc028cf88 0000000000000000
[   23.362572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.363292] page dumped because: kasan: bad access detected
[   23.363817] 
[   23.363978] Memory state around the buggy address:
[   23.364436]  ffff800087b3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.365114]  ffff800087b3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   23.365791] >ffff800087b3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   23.366465]                       ^
[   23.366808]  ffff800087b3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   23.367486]  ffff800087b3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.368158] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   23.292942] ==================================================================
[   23.294088] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.294860] Free of addr ffff00001019f501 by task kunit_try_catch/295
[   23.295460] 
[   23.295627] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.295678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.295694] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.295713] Call trace:
[   23.295726]  show_stack+0x20/0x38 (C)
[   23.295758]  dump_stack_lvl+0x8c/0xd0
[   23.295791]  print_report+0x118/0x608
[   23.295821]  kasan_report_invalid_free+0xc0/0xe8
[   23.295853]  check_slab_allocation+0xfc/0x108
[   23.295884]  __kasan_mempool_poison_object+0x78/0x150
[   23.295917]  mempool_free+0x28c/0x328
[   23.295954]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.295994]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.296030]  kunit_try_run_case+0x170/0x3f0
[   23.296066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.296107]  kthread+0x328/0x630
[   23.296142]  ret_from_fork+0x10/0x20
[   23.296176] 
[   23.303155] Allocated by task 295:
[   23.303483]  kasan_save_stack+0x3c/0x68
[   23.303859]  kasan_save_track+0x20/0x40
[   23.304231]  kasan_save_alloc_info+0x40/0x58
[   23.304646]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.305152]  remove_element+0x130/0x1f8
[   23.305530]  mempool_alloc_preallocated+0x58/0xc0
[   23.305985]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   23.306520]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.306999]  kunit_try_run_case+0x170/0x3f0
[   23.307406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.307932]  kthread+0x328/0x630
[   23.308256]  ret_from_fork+0x10/0x20
[   23.308607] 
[   23.308762] The buggy address belongs to the object at ffff00001019f500
[   23.308762]  which belongs to the cache kmalloc-128 of size 128
[   23.309898] The buggy address is located 1 bytes inside of
[   23.309898]  128-byte region [ffff00001019f500, ffff00001019f580)
[   23.310950] 
[   23.311105] The buggy address belongs to the physical page:
[   23.311624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f
[   23.312356] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.312969] page_type: f5(slab)
[   23.313285] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.314002] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.314712] page dumped because: kasan: bad access detected
[   23.315225] 
[   23.315380] Memory state around the buggy address:
[   23.315829]  ffff00001019f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.316497]  ffff00001019f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.317164] >ffff00001019f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.317827]                    ^
[   23.318140]  ffff00001019f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.318808]  ffff00001019f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.319470] ==================================================================
[   23.323176] ==================================================================
[   23.324345] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.325107] Free of addr ffff00000dc7c001 by task kunit_try_catch/297
[   23.325706] 
[   23.325875] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.325929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.325945] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.325963] Call trace:
[   23.325976]  show_stack+0x20/0x38 (C)
[   23.326011]  dump_stack_lvl+0x8c/0xd0
[   23.326044]  print_report+0x118/0x608
[   23.326075]  kasan_report_invalid_free+0xc0/0xe8
[   23.326108]  __kasan_mempool_poison_object+0xfc/0x150
[   23.326142]  mempool_free+0x28c/0x328
[   23.326179]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   23.326219]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   23.326258]  kunit_try_run_case+0x170/0x3f0
[   23.326295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.326336]  kthread+0x328/0x630
[   23.326371]  ret_from_fork+0x10/0x20
[   23.326405] 
[   23.333043] The buggy address belongs to the physical page:
[   23.333561] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc7c
[   23.334288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.334996] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   23.335649] page_type: f8(unknown)
[   23.335985] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.336702] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.337419] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.338144] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.338869] head: 03fffe0000000002 fffffdffc0371f01 00000000ffffffff 00000000ffffffff
[   23.339593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.340310] page dumped because: kasan: bad access detected
[   23.340825] 
[   23.340980] Memory state around the buggy address:
[   23.341429]  ffff00000dc7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.342096]  ffff00000dc7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.342764] >ffff00000dc7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.343427]                    ^
[   23.343739]  ffff00000dc7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.344406]  ffff00000dc7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.345069] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   23.246704] ==================================================================
[   23.247836] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   23.248521] Free of addr ffff00000df00000 by task kunit_try_catch/291
[   23.249118] 
[   23.249283] CPU: 2 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.249334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.249347] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.249366] Call trace:
[   23.249378]  show_stack+0x20/0x38 (C)
[   23.249411]  dump_stack_lvl+0x8c/0xd0
[   23.249442]  print_report+0x118/0x608
[   23.249472]  kasan_report_invalid_free+0xc0/0xe8
[   23.249502]  __kasan_mempool_poison_object+0x14c/0x150
[   23.249537]  mempool_free+0x28c/0x328
[   23.249571]  mempool_double_free_helper+0x150/0x2e8
[   23.249607]  mempool_kmalloc_large_double_free+0xc0/0x118
[   23.249645]  kunit_try_run_case+0x170/0x3f0
[   23.249682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.249722]  kthread+0x328/0x630
[   23.249757]  ret_from_fork+0x10/0x20
[   23.249791] 
[   23.256360] The buggy address belongs to the physical page:
[   23.256878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf00
[   23.257603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.258310] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   23.258962] page_type: f8(unknown)
[   23.259298] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.260014] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.260729] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.261452] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.262175] head: 03fffe0000000002 fffffdffc037c001 00000000ffffffff 00000000ffffffff
[   23.262898] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.263613] page dumped because: kasan: bad access detected
[   23.264128] 
[   23.264280] Memory state around the buggy address:
[   23.264729]  ffff00000defff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.265395]  ffff00000defff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.266062] >ffff00000df00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.266723]                    ^
[   23.267034]  ffff00000df00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.267700]  ffff00000df00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.268362] ==================================================================
[   23.212805] ==================================================================
[   23.213872] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   23.214550] Free of addr ffff0000101ea200 by task kunit_try_catch/289
[   23.215143] 
[   23.215303] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.215346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.215359] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.215373] Call trace:
[   23.215384]  show_stack+0x20/0x38 (C)
[   23.215412]  dump_stack_lvl+0x8c/0xd0
[   23.215438]  print_report+0x118/0x608
[   23.215463]  kasan_report_invalid_free+0xc0/0xe8
[   23.215489]  check_slab_allocation+0xd4/0x108
[   23.215514]  __kasan_mempool_poison_object+0x78/0x150
[   23.215542]  mempool_free+0x28c/0x328
[   23.215571]  mempool_double_free_helper+0x150/0x2e8
[   23.215603]  mempool_kmalloc_double_free+0xc0/0x118
[   23.215633]  kunit_try_run_case+0x170/0x3f0
[   23.215664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.215697]  kthread+0x328/0x630
[   23.215727]  ret_from_fork+0x10/0x20
[   23.215754] 
[   23.222625] Allocated by task 289:
[   23.222946]  kasan_save_stack+0x3c/0x68
[   23.223312]  kasan_save_track+0x20/0x40
[   23.223678]  kasan_save_alloc_info+0x40/0x58
[   23.224084]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.224581]  remove_element+0x130/0x1f8
[   23.224951]  mempool_alloc_preallocated+0x58/0xc0
[   23.225397]  mempool_double_free_helper+0x94/0x2e8
[   23.225852]  mempool_kmalloc_double_free+0xc0/0x118
[   23.226313]  kunit_try_run_case+0x170/0x3f0
[   23.226713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.227229]  kthread+0x328/0x630
[   23.227544]  ret_from_fork+0x10/0x20
[   23.227887] 
[   23.228036] Freed by task 289:
[   23.228325]  kasan_save_stack+0x3c/0x68
[   23.228691]  kasan_save_track+0x20/0x40
[   23.229055]  kasan_save_free_info+0x4c/0x78
[   23.229453]  __kasan_mempool_poison_object+0xc0/0x150
[   23.229928]  mempool_free+0x28c/0x328
[   23.230282]  mempool_double_free_helper+0x100/0x2e8
[   23.230744]  mempool_kmalloc_double_free+0xc0/0x118
[   23.231205]  kunit_try_run_case+0x170/0x3f0
[   23.231605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.232120]  kthread+0x328/0x630
[   23.232436]  ret_from_fork+0x10/0x20
[   23.232779] 
[   23.232929] The buggy address belongs to the object at ffff0000101ea200
[   23.232929]  which belongs to the cache kmalloc-128 of size 128
[   23.234053] The buggy address is located 0 bytes inside of
[   23.234053]  128-byte region [ffff0000101ea200, ffff0000101ea280)
[   23.235097] 
[   23.235247] The buggy address belongs to the physical page:
[   23.235758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   23.236484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.237089] page_type: f5(slab)
[   23.237397] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.238106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.238807] page dumped because: kasan: bad access detected
[   23.239317] 
[   23.239466] Memory state around the buggy address:
[   23.239909]  ffff0000101ea100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.240568]  ffff0000101ea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.241228] >ffff0000101ea200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.241884]                    ^
[   23.242189]  ffff0000101ea280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.242849]  ffff0000101ea300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.243505] ==================================================================
[   23.271597] ==================================================================
[   23.272750] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   23.273418] Free of addr ffff00000d73c000 by task kunit_try_catch/293
[   23.274006] 
[   23.274171] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.274223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.274237] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.274254] Call trace:
[   23.274266]  show_stack+0x20/0x38 (C)
[   23.274301]  dump_stack_lvl+0x8c/0xd0
[   23.274331]  print_report+0x118/0x608
[   23.274362]  kasan_report_invalid_free+0xc0/0xe8
[   23.274393]  __kasan_mempool_poison_pages+0xe0/0xe8
[   23.274425]  mempool_free+0x24c/0x328
[   23.274460]  mempool_double_free_helper+0x150/0x2e8
[   23.274498]  mempool_page_alloc_double_free+0xbc/0x118
[   23.274531]  kunit_try_run_case+0x170/0x3f0
[   23.274567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.274607]  kthread+0x328/0x630
[   23.274641]  ret_from_fork+0x10/0x20
[   23.274673] 
[   23.281196] The buggy address belongs to the physical page:
[   23.281713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd73c
[   23.282439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.283063] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.283781] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.284488] page dumped because: kasan: bad access detected
[   23.285002] 
[   23.285154] Memory state around the buggy address:
[   23.285603]  ffff00000d73bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.286269]  ffff00000d73bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.286936] >ffff00000d73c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.287600]                    ^
[   23.287911]  ffff00000d73c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.288578]  ffff00000d73c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.289241] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   23.192697] ==================================================================
[   23.193739] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   23.194391] Read of size 1 at addr ffff00000df00000 by task kunit_try_catch/287
[   23.195069] 
[   23.195234] CPU: 2 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.195285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.195299] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.195317] Call trace:
[   23.195328]  show_stack+0x20/0x38 (C)
[   23.195361]  dump_stack_lvl+0x8c/0xd0
[   23.195393]  print_report+0x118/0x608
[   23.195422]  kasan_report+0xdc/0x128
[   23.195450]  __asan_report_load1_noabort+0x20/0x30
[   23.195484]  mempool_uaf_helper+0x314/0x340
[   23.195517]  mempool_page_alloc_uaf+0xc0/0x118
[   23.195554]  kunit_try_run_case+0x170/0x3f0
[   23.195589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.195629]  kthread+0x328/0x630
[   23.195663]  ret_from_fork+0x10/0x20
[   23.195696] 
[   23.201674] The buggy address belongs to the physical page:
[   23.202191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf00
[   23.202916] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.203539] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.204254] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.204962] page dumped because: kasan: bad access detected
[   23.205477] 
[   23.205630] Memory state around the buggy address:
[   23.206079]  ffff00000defff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.206746]  ffff00000defff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.207412] >ffff00000df00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.208074]                    ^
[   23.208385]  ffff00000df00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.209052]  ffff00000df00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.209714] ==================================================================
[   23.121231] ==================================================================
[   23.122283] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   23.122985] Read of size 1 at addr ffff00000dc7c000 by task kunit_try_catch/283
[   23.123694] 
[   23.123879] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.123963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.123988] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.124015] Call trace:
[   23.124034]  show_stack+0x20/0x38 (C)
[   23.124086]  dump_stack_lvl+0x8c/0xd0
[   23.124137]  print_report+0x118/0x608
[   23.124186]  kasan_report+0xdc/0x128
[   23.124234]  __asan_report_load1_noabort+0x20/0x30
[   23.124289]  mempool_uaf_helper+0x314/0x340
[   23.124347]  mempool_kmalloc_large_uaf+0xc4/0x120
[   23.124408]  kunit_try_run_case+0x170/0x3f0
[   23.124465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.124531]  kthread+0x328/0x630
[   23.124587]  ret_from_fork+0x10/0x20
[   23.124640] 
[   23.130754] The buggy address belongs to the physical page:
[   23.131293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc7c
[   23.132048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.132781] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   23.133467] page_type: f8(unknown)
[   23.133830] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.134578] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.135326] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.136081] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.136837] head: 03fffe0000000002 fffffdffc0371f01 00000000ffffffff 00000000ffffffff
[   23.137593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.138336] page dumped because: kasan: bad access detected
[   23.138872] 
[   23.139042] Memory state around the buggy address:
[   23.139513]  ffff00000dc7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.140209]  ffff00000dc7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.140903] >ffff00000dc7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.141590]                    ^
[   23.141923]  ffff00000dc7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.142617]  ffff00000dc7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.143305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   23.148568] ==================================================================
[   23.149688] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   23.150377] Read of size 1 at addr ffff0000101ea240 by task kunit_try_catch/285
[   23.151056] 
[   23.151222] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.151272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.151287] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.151304] Call trace:
[   23.151317]  show_stack+0x20/0x38 (C)
[   23.151349]  dump_stack_lvl+0x8c/0xd0
[   23.151381]  print_report+0x118/0x608
[   23.151411]  kasan_report+0xdc/0x128
[   23.151439]  __asan_report_load1_noabort+0x20/0x30
[   23.151473]  mempool_uaf_helper+0x314/0x340
[   23.151507]  mempool_slab_uaf+0xc0/0x118
[   23.151536]  kunit_try_run_case+0x170/0x3f0
[   23.151571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.151610]  kthread+0x328/0x630
[   23.151645]  ret_from_fork+0x10/0x20
[   23.151678] 
[   23.157609] Allocated by task 285:
[   23.157935]  kasan_save_stack+0x3c/0x68
[   23.158312]  kasan_save_track+0x20/0x40
[   23.158694]  kasan_save_alloc_info+0x40/0x58
[   23.159119]  __kasan_mempool_unpoison_object+0xbc/0x180
[   23.159628]  remove_element+0x16c/0x1f8
[   23.160017]  mempool_alloc_preallocated+0x58/0xc0
[   23.160483]  mempool_uaf_helper+0xa4/0x340
[   23.160894]  mempool_slab_uaf+0xc0/0x118
[   23.161283]  kunit_try_run_case+0x170/0x3f0
[   23.161701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.162237]  kthread+0x328/0x630
[   23.162572]  ret_from_fork+0x10/0x20
[   23.162933] 
[   23.163093] Freed by task 285:
[   23.163394]  kasan_save_stack+0x3c/0x68
[   23.163774]  kasan_save_track+0x20/0x40
[   23.164155]  kasan_save_free_info+0x4c/0x78
[   23.164570]  __kasan_mempool_poison_object+0xc0/0x150
[   23.165061]  mempool_free+0x28c/0x328
[   23.165432]  mempool_uaf_helper+0x104/0x340
[   23.165850]  mempool_slab_uaf+0xc0/0x118
[   23.166237]  kunit_try_run_case+0x170/0x3f0
[   23.166654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.167191]  kthread+0x328/0x630
[   23.167523]  ret_from_fork+0x10/0x20
[   23.167881] 
[   23.168040] The buggy address belongs to the object at ffff0000101ea240
[   23.168040]  which belongs to the cache test_cache of size 123
[   23.169176] The buggy address is located 0 bytes inside of
[   23.169176]  freed 123-byte region [ffff0000101ea240, ffff0000101ea2bb)
[   23.170288] 
[   23.170448] The buggy address belongs to the physical page:
[   23.170972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ea
[   23.171715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.172337] page_type: f5(slab)
[   23.172660] raw: 03fffe0000000000 ffff000000d1bb80 dead000000000122 0000000000000000
[   23.173389] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   23.174105] page dumped because: kasan: bad access detected
[   23.174629] 
[   23.174787] Memory state around the buggy address:
[   23.175243]  ffff0000101ea100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.175920]  ffff0000101ea180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.176594] >ffff0000101ea200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   23.177265]                                            ^
[   23.177768]  ffff0000101ea280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.178443]  ffff0000101ea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.179113] ==================================================================
[   23.088699] ==================================================================
[   23.089794] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   23.090481] Read of size 1 at addr ffff00000ea7eb00 by task kunit_try_catch/281
[   23.091160] 
[   23.091324] CPU: 3 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.091373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.091388] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.091405] Call trace:
[   23.091417]  show_stack+0x20/0x38 (C)
[   23.091450]  dump_stack_lvl+0x8c/0xd0
[   23.091482]  print_report+0x118/0x608
[   23.091512]  kasan_report+0xdc/0x128
[   23.091539]  __asan_report_load1_noabort+0x20/0x30
[   23.091573]  mempool_uaf_helper+0x314/0x340
[   23.091607]  mempool_kmalloc_uaf+0xc4/0x120
[   23.091641]  kunit_try_run_case+0x170/0x3f0
[   23.091677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.091716]  kthread+0x328/0x630
[   23.091750]  ret_from_fork+0x10/0x20
[   23.091783] 
[   23.097734] Allocated by task 281:
[   23.098060]  kasan_save_stack+0x3c/0x68
[   23.098435]  kasan_save_track+0x20/0x40
[   23.098805]  kasan_save_alloc_info+0x40/0x58
[   23.099219]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.099722]  remove_element+0x130/0x1f8
[   23.100102]  mempool_alloc_preallocated+0x58/0xc0
[   23.100555]  mempool_uaf_helper+0xa4/0x340
[   23.100955]  mempool_kmalloc_uaf+0xc4/0x120
[   23.101363]  kunit_try_run_case+0x170/0x3f0
[   23.101771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.102295]  kthread+0x328/0x630
[   23.102619]  ret_from_fork+0x10/0x20
[   23.102969] 
[   23.103121] Freed by task 281:
[   23.103417]  kasan_save_stack+0x3c/0x68
[   23.103789]  kasan_save_track+0x20/0x40
[   23.104161]  kasan_save_free_info+0x4c/0x78
[   23.104565]  __kasan_mempool_poison_object+0xc0/0x150
[   23.105048]  mempool_free+0x28c/0x328
[   23.105408]  mempool_uaf_helper+0x104/0x340
[   23.105816]  mempool_kmalloc_uaf+0xc4/0x120
[   23.106224]  kunit_try_run_case+0x170/0x3f0
[   23.106630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.107154]  kthread+0x328/0x630
[   23.107477]  ret_from_fork+0x10/0x20
[   23.107827] 
[   23.107980] The buggy address belongs to the object at ffff00000ea7eb00
[   23.107980]  which belongs to the cache kmalloc-128 of size 128
[   23.109115] The buggy address is located 0 bytes inside of
[   23.109115]  freed 128-byte region [ffff00000ea7eb00, ffff00000ea7eb80)
[   23.110214] 
[   23.110368] The buggy address belongs to the physical page:
[   23.110885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   23.111611] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.112223] page_type: f5(slab)
[   23.112538] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.113254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.113962] page dumped because: kasan: bad access detected
[   23.114477] 
[   23.114629] Memory state around the buggy address:
[   23.115078]  ffff00000ea7ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.115745]  ffff00000ea7ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.116411] >ffff00000ea7eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.117073]                    ^
[   23.117383]  ffff00000ea7eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118050]  ffff00000ea7ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.118711] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   23.027135] ==================================================================
[   23.028245] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   23.028967] Read of size 1 at addr ffff00000d73e001 by task kunit_try_catch/277
[   23.029644] 
[   23.029810] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.029859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.029873] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.029891] Call trace:
[   23.029903]  show_stack+0x20/0x38 (C)
[   23.029937]  dump_stack_lvl+0x8c/0xd0
[   23.029968]  print_report+0x118/0x608
[   23.029999]  kasan_report+0xdc/0x128
[   23.030027]  __asan_report_load1_noabort+0x20/0x30
[   23.030062]  mempool_oob_right_helper+0x2ac/0x2f0
[   23.030098]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   23.030136]  kunit_try_run_case+0x170/0x3f0
[   23.030171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.030211]  kthread+0x328/0x630
[   23.030245]  ret_from_fork+0x10/0x20
[   23.030279] 
[   23.036369] The buggy address belongs to the physical page:
[   23.036885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd73c
[   23.037610] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.038317] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   23.038969] page_type: f8(unknown)
[   23.039304] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.040020] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.040735] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.041459] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.042183] head: 03fffe0000000002 fffffdffc035cf01 00000000ffffffff 00000000ffffffff
[   23.042905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.043621] page dumped because: kasan: bad access detected
[   23.044136] 
[   23.044288] Memory state around the buggy address:
[   23.044737]  ffff00000d73df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.045403]  ffff00000d73df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.046069] >ffff00000d73e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.046730]                    ^
[   23.047041]  ffff00000d73e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.047707]  ffff00000d73e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.048369] ==================================================================
[   23.053074] ==================================================================
[   23.054235] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   23.054959] Read of size 1 at addr ffff0000101e72bb by task kunit_try_catch/279
[   23.055638] 
[   23.055804] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.055854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.055869] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.055886] Call trace:
[   23.055898]  show_stack+0x20/0x38 (C)
[   23.055930]  dump_stack_lvl+0x8c/0xd0
[   23.055962]  print_report+0x118/0x608
[   23.055991]  kasan_report+0xdc/0x128
[   23.056020]  __asan_report_load1_noabort+0x20/0x30
[   23.056053]  mempool_oob_right_helper+0x2ac/0x2f0
[   23.056088]  mempool_slab_oob_right+0xc0/0x118
[   23.056118]  kunit_try_run_case+0x170/0x3f0
[   23.056153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.056193]  kthread+0x328/0x630
[   23.056226]  ret_from_fork+0x10/0x20
[   23.056260] 
[   23.062284] Allocated by task 279:
[   23.062612]  kasan_save_stack+0x3c/0x68
[   23.062988]  kasan_save_track+0x20/0x40
[   23.063359]  kasan_save_alloc_info+0x40/0x58
[   23.063771]  __kasan_mempool_unpoison_object+0xbc/0x180
[   23.064269]  remove_element+0x16c/0x1f8
[   23.064648]  mempool_alloc_preallocated+0x58/0xc0
[   23.065101]  mempool_oob_right_helper+0x98/0x2f0
[   23.065549]  mempool_slab_oob_right+0xc0/0x118
[   23.065976]  kunit_try_run_case+0x170/0x3f0
[   23.066384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.066909]  kthread+0x328/0x630
[   23.067232]  ret_from_fork+0x10/0x20
[   23.067582] 
[   23.067736] The buggy address belongs to the object at ffff0000101e7240
[   23.067736]  which belongs to the cache test_cache of size 123
[   23.068863] The buggy address is located 0 bytes to the right of
[   23.068863]  allocated 123-byte region [ffff0000101e7240, ffff0000101e72bb)
[   23.070038] 
[   23.070192] The buggy address belongs to the physical page:
[   23.070709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7
[   23.071441] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.072054] page_type: f5(slab)
[   23.072367] raw: 03fffe0000000000 ffff000000d1ba40 dead000000000122 0000000000000000
[   23.073083] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   23.073791] page dumped because: kasan: bad access detected
[   23.074307] 
[   23.074460] Memory state around the buggy address:
[   23.074908]  ffff0000101e7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.075575]  ffff0000101e7200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   23.076241] >ffff0000101e7280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   23.076903]                                         ^
[   23.077376]  ffff0000101e7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.078043]  ffff0000101e7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.078705] ==================================================================
[   22.997841] ==================================================================
[   22.998889] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   22.999615] Read of size 1 at addr ffff00001019f173 by task kunit_try_catch/275
[   23.000295] 
[   23.000461] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.000512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.000526] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.000545] Call trace:
[   23.000556]  show_stack+0x20/0x38 (C)
[   23.000589]  dump_stack_lvl+0x8c/0xd0
[   23.000621]  print_report+0x118/0x608
[   23.000650]  kasan_report+0xdc/0x128
[   23.000679]  __asan_report_load1_noabort+0x20/0x30
[   23.000713]  mempool_oob_right_helper+0x2ac/0x2f0
[   23.000750]  mempool_kmalloc_oob_right+0xc4/0x120
[   23.000786]  kunit_try_run_case+0x170/0x3f0
[   23.000822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.000862]  kthread+0x328/0x630
[   23.000896]  ret_from_fork+0x10/0x20
[   23.000929] 
[   23.006973] Allocated by task 275:
[   23.007300]  kasan_save_stack+0x3c/0x68
[   23.007675]  kasan_save_track+0x20/0x40
[   23.008046]  kasan_save_alloc_info+0x40/0x58
[   23.008459]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.008964]  remove_element+0x130/0x1f8
[   23.009343]  mempool_alloc_preallocated+0x58/0xc0
[   23.009797]  mempool_oob_right_helper+0x98/0x2f0
[   23.010245]  mempool_kmalloc_oob_right+0xc4/0x120
[   23.010699]  kunit_try_run_case+0x170/0x3f0
[   23.011106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.011630]  kthread+0x328/0x630
[   23.011954]  ret_from_fork+0x10/0x20
[   23.012304] 
[   23.012458] The buggy address belongs to the object at ffff00001019f100
[   23.012458]  which belongs to the cache kmalloc-128 of size 128
[   23.013591] The buggy address is located 0 bytes to the right of
[   23.013591]  allocated 115-byte region [ffff00001019f100, ffff00001019f173)
[   23.014766] 
[   23.014921] The buggy address belongs to the physical page:
[   23.015438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1019f
[   23.016171] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.016783] page_type: f5(slab)
[   23.017096] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   23.017813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.018521] page dumped because: kasan: bad access detected
[   23.019036] 
[   23.019188] Memory state around the buggy address:
[   23.019637]  ffff00001019f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.020304]  ffff00001019f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.020971] >ffff00001019f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.021633]                                                              ^
[   23.022266]  ffff00001019f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.022931]  ffff00001019f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.023592] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   22.407891] ==================================================================
[   22.408958] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   22.409696] Read of size 1 at addr ffff00000b416140 by task kunit_try_catch/269
[   22.410377] 
[   22.410542] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.410592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.410606] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.410624] Call trace:
[   22.410636]  show_stack+0x20/0x38 (C)
[   22.410669]  dump_stack_lvl+0x8c/0xd0
[   22.410701]  print_report+0x118/0x608
[   22.410732]  kasan_report+0xdc/0x128
[   22.410760]  __kasan_check_byte+0x54/0x70
[   22.410789]  kmem_cache_destroy+0x34/0x218
[   22.410819]  kmem_cache_double_destroy+0x174/0x300
[   22.410856]  kunit_try_run_case+0x170/0x3f0
[   22.410891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.410930]  kthread+0x328/0x630
[   22.410965]  ret_from_fork+0x10/0x20
[   22.410998] 
[   22.416928] Allocated by task 269:
[   22.417253]  kasan_save_stack+0x3c/0x68
[   22.417628]  kasan_save_track+0x20/0x40
[   22.418000]  kasan_save_alloc_info+0x40/0x58
[   22.418412]  __kasan_slab_alloc+0xa8/0xb0
[   22.418800]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.419243]  __kmem_cache_create_args+0x178/0x280
[   22.419699]  kmem_cache_double_destroy+0xc0/0x300
[   22.420154]  kunit_try_run_case+0x170/0x3f0
[   22.420561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.421085]  kthread+0x328/0x630
[   22.421408]  ret_from_fork+0x10/0x20
[   22.421758] 
[   22.421912] Freed by task 269:
[   22.422205]  kasan_save_stack+0x3c/0x68
[   22.422577]  kasan_save_track+0x20/0x40
[   22.422949]  kasan_save_free_info+0x4c/0x78
[   22.423354]  __kasan_slab_free+0x6c/0x98
[   22.423735]  kmem_cache_free+0x260/0x470
[   22.424115]  slab_kmem_cache_release+0x38/0x50
[   22.424539]  kmem_cache_release+0x1c/0x30
[   22.424934]  kobject_put+0x17c/0x430
[   22.425286]  sysfs_slab_release+0x1c/0x30
[   22.425674]  kmem_cache_destroy+0x118/0x218
[   22.426075]  kmem_cache_double_destroy+0x128/0x300
[   22.426539]  kunit_try_run_case+0x170/0x3f0
[   22.426945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.427468]  kthread+0x328/0x630
[   22.427790]  ret_from_fork+0x10/0x20
[   22.428140] 
[   22.428293] The buggy address belongs to the object at ffff00000b416140
[   22.428293]  which belongs to the cache kmem_cache of size 208
[   22.429419] The buggy address is located 0 bytes inside of
[   22.429419]  freed 208-byte region [ffff00000b416140, ffff00000b416210)
[   22.430515] 
[   22.430669] The buggy address belongs to the physical page:
[   22.431185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb416
[   22.431910] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.432615] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   22.433268] page_type: f5(slab)
[   22.433580] raw: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000
[   22.434296] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   22.435012] head: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000
[   22.435735] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   22.436458] head: 03fffe0000000001 fffffdffc02d0581 00000000ffffffff 00000000ffffffff
[   22.437182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.437897] page dumped because: kasan: bad access detected
[   22.438412] 
[   22.438564] Memory state around the buggy address:
[   22.439011]  ffff00000b416000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.439678]  ffff00000b416080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   22.440344] >ffff00000b416100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   22.441005]                                            ^
[   22.441499]  ffff00000b416180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.442165]  ffff00000b416200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.442828] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   22.330527] ==================================================================
[   22.331649] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   22.332348] Read of size 1 at addr ffff00000e9c4000 by task kunit_try_catch/267
[   22.333037] 
[   22.333209] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.333268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.333287] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.333307] Call trace:
[   22.333321]  show_stack+0x20/0x38 (C)
[   22.333362]  dump_stack_lvl+0x8c/0xd0
[   22.333400]  print_report+0x118/0x608
[   22.333437]  kasan_report+0xdc/0x128
[   22.333473]  __asan_report_load1_noabort+0x20/0x30
[   22.333514]  kmem_cache_rcu_uaf+0x388/0x468
[   22.333557]  kunit_try_run_case+0x170/0x3f0
[   22.333601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.333649]  kthread+0x328/0x630
[   22.333691]  ret_from_fork+0x10/0x20
[   22.333732] 
[   22.339354] Allocated by task 267:
[   22.339690]  kasan_save_stack+0x3c/0x68
[   22.340073]  kasan_save_track+0x20/0x40
[   22.340455]  kasan_save_alloc_info+0x40/0x58
[   22.340879]  __kasan_slab_alloc+0xa8/0xb0
[   22.341276]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.341729]  kmem_cache_rcu_uaf+0x12c/0x468
[   22.342148]  kunit_try_run_case+0x170/0x3f0
[   22.342569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.343105]  kthread+0x328/0x630
[   22.343438]  ret_from_fork+0x10/0x20
[   22.343799] 
[   22.343958] Freed by task 0:
[   22.344245]  kasan_save_stack+0x3c/0x68
[   22.344627]  kasan_save_track+0x20/0x40
[   22.345009]  kasan_save_free_info+0x4c/0x78
[   22.345422]  __kasan_slab_free+0x6c/0x98
[   22.345811]  slab_free_after_rcu_debug+0xd4/0x2f8
[   22.346269]  rcu_core+0x9f4/0x1e20
[   22.346614]  rcu_core_si+0x18/0x30
[   22.346957]  handle_softirqs+0x374/0xb28
[   22.347348]  __do_softirq+0x1c/0x28
[   22.347697] 
[   22.347856] Last potentially related work creation:
[   22.348315]  kasan_save_stack+0x3c/0x68
[   22.348698]  kasan_record_aux_stack+0xb4/0xc8
[   22.349129]  kmem_cache_free+0x120/0x470
[   22.349517]  kmem_cache_rcu_uaf+0x16c/0x468
[   22.349937]  kunit_try_run_case+0x170/0x3f0
[   22.350354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.350891]  kthread+0x328/0x630
[   22.351225]  ret_from_fork+0x10/0x20
[   22.351585] 
[   22.351744] The buggy address belongs to the object at ffff00000e9c4000
[   22.351744]  which belongs to the cache test_cache of size 200
[   22.352882] The buggy address is located 0 bytes inside of
[   22.352882]  freed 200-byte region [ffff00000e9c4000, ffff00000e9c40c8)
[   22.353992] 
[   22.354154] The buggy address belongs to the physical page:
[   22.354678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe9c4
[   22.355413] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.356130] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   22.356794] page_type: f5(slab)
[   22.357116] raw: 03fffe0000000040 ffff00000e9c2000 dead000000000122 0000000000000000
[   22.357843] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.358571] head: 03fffe0000000040 ffff00000e9c2000 dead000000000122 0000000000000000
[   22.359304] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.360038] head: 03fffe0000000001 fffffdffc03a7101 00000000ffffffff 00000000ffffffff
[   22.360773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.361496] page dumped because: kasan: bad access detected
[   22.362017] 
[   22.362176] Memory state around the buggy address:
[   22.362632]  ffff00000e9c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.363308]  ffff00000e9c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.363983] >ffff00000e9c4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.364654]                    ^
[   22.364973]  ffff00000e9c4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   22.365649]  ffff00000e9c4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.366320] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   22.196119] ==================================================================
[   22.197216] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   22.197884] Free of addr ffff000010130001 by task kunit_try_catch/265
[   22.198483] 
[   22.198648] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.198698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.198713] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.198730] Call trace:
[   22.198743]  show_stack+0x20/0x38 (C)
[   22.198775]  dump_stack_lvl+0x8c/0xd0
[   22.198807]  print_report+0x118/0x608
[   22.198837]  kasan_report_invalid_free+0xc0/0xe8
[   22.198869]  check_slab_allocation+0xfc/0x108
[   22.198898]  __kasan_slab_pre_free+0x2c/0x48
[   22.198928]  kmem_cache_free+0xf0/0x470
[   22.198957]  kmem_cache_invalid_free+0x184/0x3c8
[   22.198994]  kunit_try_run_case+0x170/0x3f0
[   22.199030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.199069]  kthread+0x328/0x630
[   22.199104]  ret_from_fork+0x10/0x20
[   22.199136] 
[   22.205530] Allocated by task 265:
[   22.205857]  kasan_save_stack+0x3c/0x68
[   22.206230]  kasan_save_track+0x20/0x40
[   22.206602]  kasan_save_alloc_info+0x40/0x58
[   22.207014]  __kasan_slab_alloc+0xa8/0xb0
[   22.207401]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.207844]  kmem_cache_invalid_free+0x12c/0x3c8
[   22.208292]  kunit_try_run_case+0x170/0x3f0
[   22.208698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.209222]  kthread+0x328/0x630
[   22.209545]  ret_from_fork+0x10/0x20
[   22.209894] 
[   22.210048] The buggy address belongs to the object at ffff000010130000
[   22.210048]  which belongs to the cache test_cache of size 200
[   22.211175] The buggy address is located 1 bytes inside of
[   22.211175]  200-byte region [ffff000010130000, ffff0000101300c8)
[   22.212226] 
[   22.212380] The buggy address belongs to the physical page:
[   22.212897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10130
[   22.213629] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.214335] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   22.214988] page_type: f5(slab)
[   22.215302] raw: 03fffe0000000040 ffff0000100bc140 dead000000000122 0000000000000000
[   22.216018] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.216734] head: 03fffe0000000040 ffff0000100bc140 dead000000000122 0000000000000000
[   22.217458] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.218181] head: 03fffe0000000001 fffffdffc0404c01 00000000ffffffff 00000000ffffffff
[   22.218904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.219619] page dumped because: kasan: bad access detected
[   22.220134] 
[   22.220286] Memory state around the buggy address:
[   22.220734]  ffff00001012ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.221401]  ffff00001012ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.222068] >ffff000010130000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.222730]                    ^
[   22.223041]  ffff000010130080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.223708]  ffff000010130100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.224371] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   22.147992] ==================================================================
[   22.149030] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   22.149684] Free of addr ffff00000a8a8000 by task kunit_try_catch/263
[   22.150282] 
[   22.150446] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.150498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.150512] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.150529] Call trace:
[   22.150542]  show_stack+0x20/0x38 (C)
[   22.150574]  dump_stack_lvl+0x8c/0xd0
[   22.150606]  print_report+0x118/0x608
[   22.150635]  kasan_report_invalid_free+0xc0/0xe8
[   22.150667]  check_slab_allocation+0xd4/0x108
[   22.150696]  __kasan_slab_pre_free+0x2c/0x48
[   22.150726]  kmem_cache_free+0xf0/0x470
[   22.150754]  kmem_cache_double_free+0x190/0x3c8
[   22.150791]  kunit_try_run_case+0x170/0x3f0
[   22.150826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.150865]  kthread+0x328/0x630
[   22.150899]  ret_from_fork+0x10/0x20
[   22.150933] 
[   22.157320] Allocated by task 263:
[   22.157647]  kasan_save_stack+0x3c/0x68
[   22.158022]  kasan_save_track+0x20/0x40
[   22.158394]  kasan_save_alloc_info+0x40/0x58
[   22.158806]  __kasan_slab_alloc+0xa8/0xb0
[   22.159192]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.159635]  kmem_cache_double_free+0x12c/0x3c8
[   22.160073]  kunit_try_run_case+0x170/0x3f0
[   22.160480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.161004]  kthread+0x328/0x630
[   22.161327]  ret_from_fork+0x10/0x20
[   22.161677] 
[   22.161831] Freed by task 263:
[   22.162125]  kasan_save_stack+0x3c/0x68
[   22.162498]  kasan_save_track+0x20/0x40
[   22.162867]  kasan_save_free_info+0x4c/0x78
[   22.163271]  __kasan_slab_free+0x6c/0x98
[   22.163650]  kmem_cache_free+0x260/0x470
[   22.164028]  kmem_cache_double_free+0x140/0x3c8
[   22.164467]  kunit_try_run_case+0x170/0x3f0
[   22.164873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.165396]  kthread+0x328/0x630
[   22.165720]  ret_from_fork+0x10/0x20
[   22.166070] 
[   22.166223] The buggy address belongs to the object at ffff00000a8a8000
[   22.166223]  which belongs to the cache test_cache of size 200
[   22.167350] The buggy address is located 0 bytes inside of
[   22.167350]  200-byte region [ffff00000a8a8000, ffff00000a8a80c8)
[   22.168402] 
[   22.168557] The buggy address belongs to the physical page:
[   22.169073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa8a8
[   22.169798] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.170505] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   22.171160] page_type: f5(slab)
[   22.171474] raw: 03fffe0000000040 ffff00000b416000 dead000000000122 0000000000000000
[   22.172190] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.172906] head: 03fffe0000000040 ffff00000b416000 dead000000000122 0000000000000000
[   22.173629] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.174353] head: 03fffe0000000001 fffffdffc02a2a01 00000000ffffffff 00000000ffffffff
[   22.175076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.175793] page dumped because: kasan: bad access detected
[   22.176308] 
[   22.176460] Memory state around the buggy address:
[   22.176909]  ffff00000a8a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.177575]  ffff00000a8a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.178241] >ffff00000a8a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.178903]                    ^
[   22.179215]  ffff00000a8a8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   22.179881]  ffff00000a8a8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.180543] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   20.899675] ==================================================================
[   20.900726] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   20.901256] Free of addr ffff00000def4001 by task kunit_try_catch/204
[   20.901853] 
[   20.902018] CPU: 2 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.902068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.902083] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.902100] Call trace:
[   20.902111]  show_stack+0x20/0x38 (C)
[   20.902145]  dump_stack_lvl+0x8c/0xd0
[   20.902176]  print_report+0x118/0x608
[   20.902207]  kasan_report_invalid_free+0xc0/0xe8
[   20.902238]  __kasan_kfree_large+0x5c/0xa8
[   20.902268]  free_large_kmalloc+0x64/0x190
[   20.902303]  kfree+0x270/0x3c8
[   20.902334]  kmalloc_large_invalid_free+0x108/0x270
[   20.902371]  kunit_try_run_case+0x170/0x3f0
[   20.902406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902445]  kthread+0x328/0x630
[   20.902480]  ret_from_fork+0x10/0x20
[   20.902513] 
[   20.908824] The buggy address belongs to the physical page:
[   20.909340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   20.910064] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.910769] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.911420] page_type: f8(unknown)
[   20.911756] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.912470] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.913184] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.913908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.914631] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   20.915353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.916067] page dumped because: kasan: bad access detected
[   20.916581] 
[   20.916734] Memory state around the buggy address:
[   20.917183]  ffff00000def3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.917848]  ffff00000def3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918513] >ffff00000def4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.919173]                    ^
[   20.919484]  ffff00000def4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.920148]  ffff00000def4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.920809] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   22.087341] ==================================================================
[   22.088376] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   22.089024] Read of size 1 at addr ffff0000100be0c8 by task kunit_try_catch/261
[   22.089703] 
[   22.089871] CPU: 3 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.089922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.089936] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.089954] Call trace:
[   22.089966]  show_stack+0x20/0x38 (C)
[   22.090000]  dump_stack_lvl+0x8c/0xd0
[   22.090032]  print_report+0x118/0x608
[   22.090063]  kasan_report+0xdc/0x128
[   22.090091]  __asan_report_load1_noabort+0x20/0x30
[   22.090124]  kmem_cache_oob+0x344/0x430
[   22.090158]  kunit_try_run_case+0x170/0x3f0
[   22.090193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.090233]  kthread+0x328/0x630
[   22.090267]  ret_from_fork+0x10/0x20
[   22.090300] 
[   22.095854] Allocated by task 261:
[   22.096179]  kasan_save_stack+0x3c/0x68
[   22.096552]  kasan_save_track+0x20/0x40
[   22.096924]  kasan_save_alloc_info+0x40/0x58
[   22.097337]  __kasan_slab_alloc+0xa8/0xb0
[   22.097724]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   22.098169]  kmem_cache_oob+0x12c/0x430
[   22.098544]  kunit_try_run_case+0x170/0x3f0
[   22.098951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.099476]  kthread+0x328/0x630
[   22.099798]  ret_from_fork+0x10/0x20
[   22.100149] 
[   22.100302] The buggy address belongs to the object at ffff0000100be000
[   22.100302]  which belongs to the cache test_cache of size 200
[   22.101428] The buggy address is located 0 bytes to the right of
[   22.101428]  allocated 200-byte region [ffff0000100be000, ffff0000100be0c8)
[   22.102604] 
[   22.102758] The buggy address belongs to the physical page:
[   22.103274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100be
[   22.104007] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.104713] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   22.105365] page_type: f5(slab)
[   22.105678] raw: 03fffe0000000040 ffff0000100bc000 dead000000000122 0000000000000000
[   22.106396] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.107111] head: 03fffe0000000040 ffff0000100bc000 dead000000000122 0000000000000000
[   22.107835] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   22.108559] head: 03fffe0000000001 fffffdffc0402f81 00000000ffffffff 00000000ffffffff
[   22.109282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.109997] page dumped because: kasan: bad access detected
[   22.110512] 
[   22.110664] Memory state around the buggy address:
[   22.111114]  ffff0000100bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.111780]  ffff0000100be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.112447] >ffff0000100be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.113109]                                               ^
[   22.113628]  ffff0000100be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.114295]  ffff0000100be180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.114957] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   22.046334] ==================================================================
[   22.047316] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   22.047954] Read of size 8 at addr ffff00000fe3b940 by task kunit_try_catch/254
[   22.048625] 
[   22.048786] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.048829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.048841] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.048856] Call trace:
[   22.048867]  show_stack+0x20/0x38 (C)
[   22.048894]  dump_stack_lvl+0x8c/0xd0
[   22.048922]  print_report+0x118/0x608
[   22.048947]  kasan_report+0xdc/0x128
[   22.048971]  __asan_report_load8_noabort+0x20/0x30
[   22.049000]  workqueue_uaf+0x480/0x4a8
[   22.049028]  kunit_try_run_case+0x170/0x3f0
[   22.049058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.049092]  kthread+0x328/0x630
[   22.049120]  ret_from_fork+0x10/0x20
[   22.049148] 
[   22.054674] Allocated by task 254:
[   22.055005]  kasan_save_stack+0x3c/0x68
[   22.055383]  kasan_save_track+0x20/0x40
[   22.055755]  kasan_save_alloc_info+0x40/0x58
[   22.056168]  __kasan_kmalloc+0xd4/0xd8
[   22.056531]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.056972]  workqueue_uaf+0x13c/0x4a8
[   22.057341]  kunit_try_run_case+0x170/0x3f0
[   22.057748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.058274]  kthread+0x328/0x630
[   22.058598]  ret_from_fork+0x10/0x20
[   22.058949] 
[   22.059102] Freed by task 84:
[   22.059389]  kasan_save_stack+0x3c/0x68
[   22.059761]  kasan_save_track+0x20/0x40
[   22.060132]  kasan_save_free_info+0x4c/0x78
[   22.060536]  __kasan_slab_free+0x6c/0x98
[   22.060914]  kfree+0x214/0x3c8
[   22.061221]  workqueue_uaf_work+0x18/0x30
[   22.061613]  process_one_work+0x530/0xf98
[   22.062000]  worker_thread+0x8ac/0xf28
[   22.062364]  kthread+0x328/0x630
[   22.062686]  ret_from_fork+0x10/0x20
[   22.063036] 
[   22.063189] Last potentially related work creation:
[   22.063639]  kasan_save_stack+0x3c/0x68
[   22.064011]  kasan_record_aux_stack+0xb4/0xc8
[   22.064431]  __queue_work+0x65c/0x1010
[   22.064795]  queue_work_on+0xbc/0xf8
[   22.065144]  workqueue_uaf+0x210/0x4a8
[   22.065512]  kunit_try_run_case+0x170/0x3f0
[   22.065920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.066445]  kthread+0x328/0x630
[   22.066769]  ret_from_fork+0x10/0x20
[   22.067119] 
[   22.067271] The buggy address belongs to the object at ffff00000fe3b940
[   22.067271]  which belongs to the cache kmalloc-32 of size 32
[   22.068391] The buggy address is located 0 bytes inside of
[   22.068391]  freed 32-byte region [ffff00000fe3b940, ffff00000fe3b960)
[   22.069481] 
[   22.069636] The buggy address belongs to the physical page:
[   22.070153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfe3b
[   22.070879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.071492] page_type: f5(slab)
[   22.071805] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   22.072521] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.073228] page dumped because: kasan: bad access detected
[   22.073744] 
[   22.073896] Memory state around the buggy address:
[   22.074345]  ffff00000fe3b800: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.075013]  ffff00000fe3b880: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.075680] >ffff00000fe3b900: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   22.076342]                                            ^
[   22.076837]  ffff00000fe3b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.077503]  ffff00000fe3ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.078166] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   22.002172] ==================================================================
[   22.003214] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   22.003891] Read of size 4 at addr ffff00000ff077c0 by task swapper/1/0
[   22.004537] 
[   22.004721] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.004801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.004825] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.004854] Call trace:
[   22.004873]  show_stack+0x20/0x38 (C)
[   22.004926]  dump_stack_lvl+0x8c/0xd0
[   22.004978]  print_report+0x118/0x608
[   22.005027]  kasan_report+0xdc/0x128
[   22.005075]  __asan_report_load4_noabort+0x20/0x30
[   22.005133]  rcu_uaf_reclaim+0x64/0x70
[   22.005186]  rcu_core+0x9f4/0x1e20
[   22.005234]  rcu_core_si+0x18/0x30
[   22.005279]  handle_softirqs+0x374/0xb28
[   22.005331]  __do_softirq+0x1c/0x28
[   22.005374]  ____do_softirq+0x18/0x30
[   22.005424]  call_on_irq_stack+0x24/0x58
[   22.005477]  do_softirq_own_stack+0x24/0x38
[   22.005528]  __irq_exit_rcu+0x1fc/0x318
[   22.005578]  irq_exit_rcu+0x1c/0x80
[   22.005624]  el1_interrupt+0x38/0x58
[   22.005677]  el1h_64_irq_handler+0x18/0x28
[   22.005729]  el1h_64_irq+0x6c/0x70
[   22.005774]  arch_local_irq_enable+0x4/0x8 (P)
[   22.005839]  cpuidle_enter+0x60/0xb8
[   22.005886]  do_idle+0x36c/0x4e8
[   22.005935]  cpu_startup_entry+0x64/0x80
[   22.005985]  secondary_start_kernel+0x288/0x340
[   22.006047]  __secondary_switched+0xc0/0xc8
[   22.006109] 
[   22.016403] Allocated by task 252:
[   22.016751]  kasan_save_stack+0x3c/0x68
[   22.017152]  kasan_save_track+0x20/0x40
[   22.017553]  kasan_save_alloc_info+0x40/0x58
[   22.017994]  __kasan_kmalloc+0xd4/0xd8
[   22.018385]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.018859]  rcu_uaf+0xb0/0x2d8
[   22.019204]  kunit_try_run_case+0x170/0x3f0
[   22.019643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.020201]  kthread+0x328/0x630
[   22.020556]  ret_from_fork+0x10/0x20
[   22.020935] 
[   22.021104] Freed by task 0:
[   22.021403]  kasan_save_stack+0x3c/0x68
[   22.021800]  kasan_save_track+0x20/0x40
[   22.022199]  kasan_save_free_info+0x4c/0x78
[   22.022632]  __kasan_slab_free+0x6c/0x98
[   22.023039]  kfree+0x214/0x3c8
[   22.023374]  rcu_uaf_reclaim+0x28/0x70
[   22.023772]  rcu_core+0x9f4/0x1e20
[   22.024131]  rcu_core_si+0x18/0x30
[   22.024491]  handle_softirqs+0x374/0xb28
[   22.024900]  __do_softirq+0x1c/0x28
[   22.025264] 
[   22.025432] Last potentially related work creation:
[   22.025903]  kasan_save_stack+0x3c/0x68
[   22.026301]  kasan_record_aux_stack+0xb4/0xc8
[   22.026749]  __call_rcu_common.constprop.0+0x70/0x8b0
[   22.027257]  call_rcu+0x18/0x30
[   22.027590]  rcu_uaf+0x14c/0x2d8
[   22.027941]  kunit_try_run_case+0x170/0x3f0
[   22.028378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028936]  kthread+0x328/0x630
[   22.029289]  ret_from_fork+0x10/0x20
[   22.029667] 
[   22.029835] The buggy address belongs to the object at ffff00000ff077c0
[   22.029835]  which belongs to the cache kmalloc-32 of size 32
[   22.030987] The buggy address is located 0 bytes inside of
[   22.030987]  freed 32-byte region [ffff00000ff077c0, ffff00000ff077e0)
[   22.032112] 
[   22.032283] The buggy address belongs to the physical page:
[   22.032821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff07
[   22.033576] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.034217] page_type: f5(slab)
[   22.034556] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   22.035305] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.036040] page dumped because: kasan: bad access detected
[   22.036576] 
[   22.036745] Memory state around the buggy address:
[   22.037217]  ffff00000ff07680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.037912]  ffff00000ff07700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.038608] >ffff00000ff07780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.039296]                                            ^
[   22.039816]  ffff00000ff07800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.040511]  ffff00000ff07880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.041196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   21.933904] ==================================================================
[   21.934593] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   21.935202] Read of size 1 at addr ffff00000df93778 by task kunit_try_catch/250
[   21.935880] 
[   21.936044] CPU: 2 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.936094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.936108] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.936126] Call trace:
[   21.936138]  show_stack+0x20/0x38 (C)
[   21.936170]  dump_stack_lvl+0x8c/0xd0
[   21.936201]  print_report+0x118/0x608
[   21.936231]  kasan_report+0xdc/0x128
[   21.936260]  __asan_report_load1_noabort+0x20/0x30
[   21.936294]  ksize_uaf+0x544/0x5f8
[   21.936326]  kunit_try_run_case+0x170/0x3f0
[   21.936361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.936401]  kthread+0x328/0x630
[   21.936435]  ret_from_fork+0x10/0x20
[   21.936467] 
[   21.941981] Allocated by task 250:
[   21.942306]  kasan_save_stack+0x3c/0x68
[   21.942678]  kasan_save_track+0x20/0x40
[   21.943049]  kasan_save_alloc_info+0x40/0x58
[   21.943463]  __kasan_kmalloc+0xd4/0xd8
[   21.943826]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.944266]  ksize_uaf+0xb8/0x5f8
[   21.944598]  kunit_try_run_case+0x170/0x3f0
[   21.945003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.945527]  kthread+0x328/0x630
[   21.945850]  ret_from_fork+0x10/0x20
[   21.946200] 
[   21.946353] Freed by task 250:
[   21.946647]  kasan_save_stack+0x3c/0x68
[   21.947018]  kasan_save_track+0x20/0x40
[   21.947390]  kasan_save_free_info+0x4c/0x78
[   21.947795]  __kasan_slab_free+0x6c/0x98
[   21.948174]  kfree+0x214/0x3c8
[   21.948481]  ksize_uaf+0x11c/0x5f8
[   21.948818]  kunit_try_run_case+0x170/0x3f0
[   21.949225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.949748]  kthread+0x328/0x630
[   21.950071]  ret_from_fork+0x10/0x20
[   21.950421] 
[   21.950574] The buggy address belongs to the object at ffff00000df93700
[   21.950574]  which belongs to the cache kmalloc-128 of size 128
[   21.951708] The buggy address is located 120 bytes inside of
[   21.951708]  freed 128-byte region [ffff00000df93700, ffff00000df93780)
[   21.952820] 
[   21.952974] The buggy address belongs to the physical page:
[   21.953490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93
[   21.954214] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.954824] page_type: f5(slab)
[   21.955136] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.955852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.956559] page dumped because: kasan: bad access detected
[   21.957075] 
[   21.957227] Memory state around the buggy address:
[   21.957675]  ffff00000df93600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.958342]  ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.959007] >ffff00000df93700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.959669]                                                                 ^
[   21.960325]  ffff00000df93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.960992]  ffff00000df93800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.961654] ==================================================================
[   21.876364] ==================================================================
[   21.877462] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   21.878078] Read of size 1 at addr ffff00000df93700 by task kunit_try_catch/250
[   21.878759] 
[   21.878924] CPU: 2 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.878976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.878990] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.879008] Call trace:
[   21.879020]  show_stack+0x20/0x38 (C)
[   21.879053]  dump_stack_lvl+0x8c/0xd0
[   21.879086]  print_report+0x118/0x608
[   21.879117]  kasan_report+0xdc/0x128
[   21.879145]  __kasan_check_byte+0x54/0x70
[   21.879174]  ksize+0x30/0x88
[   21.879201]  ksize_uaf+0x168/0x5f8
[   21.879233]  kunit_try_run_case+0x170/0x3f0
[   21.879269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.879308]  kthread+0x328/0x630
[   21.879343]  ret_from_fork+0x10/0x20
[   21.879377] 
[   21.885083] Allocated by task 250:
[   21.885408]  kasan_save_stack+0x3c/0x68
[   21.885782]  kasan_save_track+0x20/0x40
[   21.886154]  kasan_save_alloc_info+0x40/0x58
[   21.886569]  __kasan_kmalloc+0xd4/0xd8
[   21.886930]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.887373]  ksize_uaf+0xb8/0x5f8
[   21.887703]  kunit_try_run_case+0x170/0x3f0
[   21.888111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.888636]  kthread+0x328/0x630
[   21.888958]  ret_from_fork+0x10/0x20
[   21.889308] 
[   21.889460] Freed by task 250:
[   21.889754]  kasan_save_stack+0x3c/0x68
[   21.890127]  kasan_save_track+0x20/0x40
[   21.890498]  kasan_save_free_info+0x4c/0x78
[   21.890903]  __kasan_slab_free+0x6c/0x98
[   21.891281]  kfree+0x214/0x3c8
[   21.891588]  ksize_uaf+0x11c/0x5f8
[   21.891926]  kunit_try_run_case+0x170/0x3f0
[   21.892332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.892856]  kthread+0x328/0x630
[   21.893178]  ret_from_fork+0x10/0x20
[   21.893528] 
[   21.893681] The buggy address belongs to the object at ffff00000df93700
[   21.893681]  which belongs to the cache kmalloc-128 of size 128
[   21.894815] The buggy address is located 0 bytes inside of
[   21.894815]  freed 128-byte region [ffff00000df93700, ffff00000df93780)
[   21.895914] 
[   21.896068] The buggy address belongs to the physical page:
[   21.896586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93
[   21.897310] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.897923] page_type: f5(slab)
[   21.898238] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.898954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.899662] page dumped because: kasan: bad access detected
[   21.900178] 
[   21.900331] Memory state around the buggy address:
[   21.900779]  ffff00000df93600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.901446]  ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.902113] >ffff00000df93700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.902776]                    ^
[   21.903086]  ffff00000df93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.903753]  ffff00000df93800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904414] ==================================================================
[   21.905496] ==================================================================
[   21.906181] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   21.906792] Read of size 1 at addr ffff00000df93700 by task kunit_try_catch/250
[   21.907468] 
[   21.907633] CPU: 2 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.907682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.907696] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.907714] Call trace:
[   21.907726]  show_stack+0x20/0x38 (C)
[   21.907758]  dump_stack_lvl+0x8c/0xd0
[   21.907791]  print_report+0x118/0x608
[   21.907819]  kasan_report+0xdc/0x128
[   21.907848]  __asan_report_load1_noabort+0x20/0x30
[   21.907881]  ksize_uaf+0x598/0x5f8
[   21.907914]  kunit_try_run_case+0x170/0x3f0
[   21.907949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.907988]  kthread+0x328/0x630
[   21.908022]  ret_from_fork+0x10/0x20
[   21.908054] 
[   21.913568] Allocated by task 250:
[   21.913894]  kasan_save_stack+0x3c/0x68
[   21.914268]  kasan_save_track+0x20/0x40
[   21.914638]  kasan_save_alloc_info+0x40/0x58
[   21.915053]  __kasan_kmalloc+0xd4/0xd8
[   21.915415]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.915856]  ksize_uaf+0xb8/0x5f8
[   21.916187]  kunit_try_run_case+0x170/0x3f0
[   21.916594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.917117]  kthread+0x328/0x630
[   21.917441]  ret_from_fork+0x10/0x20
[   21.917789] 
[   21.917942] Freed by task 250:
[   21.918237]  kasan_save_stack+0x3c/0x68
[   21.918609]  kasan_save_track+0x20/0x40
[   21.918980]  kasan_save_free_info+0x4c/0x78
[   21.919385]  __kasan_slab_free+0x6c/0x98
[   21.919765]  kfree+0x214/0x3c8
[   21.920073]  ksize_uaf+0x11c/0x5f8
[   21.920411]  kunit_try_run_case+0x170/0x3f0
[   21.920818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.921342]  kthread+0x328/0x630
[   21.921665]  ret_from_fork+0x10/0x20
[   21.922016] 
[   21.922168] The buggy address belongs to the object at ffff00000df93700
[   21.922168]  which belongs to the cache kmalloc-128 of size 128
[   21.923302] The buggy address is located 0 bytes inside of
[   21.923302]  freed 128-byte region [ffff00000df93700, ffff00000df93780)
[   21.924399] 
[   21.924553] The buggy address belongs to the physical page:
[   21.925069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93
[   21.925794] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.926406] page_type: f5(slab)
[   21.926718] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.927435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.928142] page dumped because: kasan: bad access detected
[   21.928657] 
[   21.928809] Memory state around the buggy address:
[   21.929258]  ffff00000df93600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.929924]  ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.930591] >ffff00000df93700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.931253]                    ^
[   21.931563]  ffff00000df93780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.932230]  ffff00000df93800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.932892] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   21.848186] ==================================================================
[   21.848885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   21.849600] Read of size 1 at addr ffff00000ea7e87f by task kunit_try_catch/248
[   21.850268] 
[   21.850432] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.850473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.850484] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.850498] Call trace:
[   21.850507]  show_stack+0x20/0x38 (C)
[   21.850534]  dump_stack_lvl+0x8c/0xd0
[   21.850557]  print_report+0x118/0x608
[   21.850578]  kasan_report+0xdc/0x128
[   21.850599]  __asan_report_load1_noabort+0x20/0x30
[   21.850623]  ksize_unpoisons_memory+0x690/0x740
[   21.850648]  kunit_try_run_case+0x170/0x3f0
[   21.850674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.850703]  kthread+0x328/0x630
[   21.850729]  ret_from_fork+0x10/0x20
[   21.850753] 
[   21.856323] Allocated by task 248:
[   21.856641]  kasan_save_stack+0x3c/0x68
[   21.857003]  kasan_save_track+0x20/0x40
[   21.857363]  kasan_save_alloc_info+0x40/0x58
[   21.857763]  __kasan_kmalloc+0xd4/0xd8
[   21.858116]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.858544]  ksize_unpoisons_memory+0xc0/0x740
[   21.858962]  kunit_try_run_case+0x170/0x3f0
[   21.859356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859868]  kthread+0x328/0x630
[   21.860177]  ret_from_fork+0x10/0x20
[   21.860517] 
[   21.860664] The buggy address belongs to the object at ffff00000ea7e800
[   21.860664]  which belongs to the cache kmalloc-128 of size 128
[   21.861784] The buggy address is located 12 bytes to the right of
[   21.861784]  allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873)
[   21.862951] 
[   21.863100] The buggy address belongs to the physical page:
[   21.863607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.864317] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.864917] page_type: f5(slab)
[   21.865219] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.865922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.866619] page dumped because: kasan: bad access detected
[   21.867125] 
[   21.867272] Memory state around the buggy address:
[   21.867711]  ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.868366]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.869020] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.869672]                                                                 ^
[   21.870318]  ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.870972]  ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871624] ==================================================================
[   21.797501] ==================================================================
[   21.798571] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   21.799281] Read of size 1 at addr ffff00000ea7e873 by task kunit_try_catch/248
[   21.799953] 
[   21.800115] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.800158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.800172] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.800187] Call trace:
[   21.800198]  show_stack+0x20/0x38 (C)
[   21.800226]  dump_stack_lvl+0x8c/0xd0
[   21.800254]  print_report+0x118/0x608
[   21.800279]  kasan_report+0xdc/0x128
[   21.800303]  __asan_report_load1_noabort+0x20/0x30
[   21.800332]  ksize_unpoisons_memory+0x628/0x740
[   21.800362]  kunit_try_run_case+0x170/0x3f0
[   21.800393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.800427]  kthread+0x328/0x630
[   21.800457]  ret_from_fork+0x10/0x20
[   21.800486] 
[   21.806075] Allocated by task 248:
[   21.806399]  kasan_save_stack+0x3c/0x68
[   21.806767]  kasan_save_track+0x20/0x40
[   21.807133]  kasan_save_alloc_info+0x40/0x58
[   21.807538]  __kasan_kmalloc+0xd4/0xd8
[   21.807896]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.808329]  ksize_unpoisons_memory+0xc0/0x740
[   21.808753]  kunit_try_run_case+0x170/0x3f0
[   21.809154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.809671]  kthread+0x328/0x630
[   21.809987]  ret_from_fork+0x10/0x20
[   21.810331] 
[   21.810480] The buggy address belongs to the object at ffff00000ea7e800
[   21.810480]  which belongs to the cache kmalloc-128 of size 128
[   21.811605] The buggy address is located 0 bytes to the right of
[   21.811605]  allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873)
[   21.812770] 
[   21.812921] The buggy address belongs to the physical page:
[   21.813433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.814150] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.814755] page_type: f5(slab)
[   21.815063] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.815771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.816472] page dumped because: kasan: bad access detected
[   21.816982] 
[   21.817131] Memory state around the buggy address:
[   21.817574]  ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.818232]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.818893] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.819548]                                                              ^
[   21.820176]  ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.820836]  ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.821492] ==================================================================
[   21.822635] ==================================================================
[   21.823359] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   21.824090] Read of size 1 at addr ffff00000ea7e878 by task kunit_try_catch/248
[   21.824779] 
[   21.824950] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.825012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.825029] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.825050] Call trace:
[   21.825065]  show_stack+0x20/0x38 (C)
[   21.825103]  dump_stack_lvl+0x8c/0xd0
[   21.825141]  print_report+0x118/0x608
[   21.825176]  kasan_report+0xdc/0x128
[   21.825211]  __asan_report_load1_noabort+0x20/0x30
[   21.825253]  ksize_unpoisons_memory+0x618/0x740
[   21.825296]  kunit_try_run_case+0x170/0x3f0
[   21.825340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.825389]  kthread+0x328/0x630
[   21.825430]  ret_from_fork+0x10/0x20
[   21.825471] 
[   21.831121] Allocated by task 248:
[   21.831461]  kasan_save_stack+0x3c/0x68
[   21.831847]  kasan_save_track+0x20/0x40
[   21.832228]  kasan_save_alloc_info+0x40/0x58
[   21.832651]  __kasan_kmalloc+0xd4/0xd8
[   21.833023]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.833476]  ksize_unpoisons_memory+0xc0/0x740
[   21.833919]  kunit_try_run_case+0x170/0x3f0
[   21.834339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.834877]  kthread+0x328/0x630
[   21.835211]  ret_from_fork+0x10/0x20
[   21.835572] 
[   21.835732] The buggy address belongs to the object at ffff00000ea7e800
[   21.835732]  which belongs to the cache kmalloc-128 of size 128
[   21.836878] The buggy address is located 5 bytes to the right of
[   21.836878]  allocated 115-byte region [ffff00000ea7e800, ffff00000ea7e873)
[   21.838065] 
[   21.838225] The buggy address belongs to the physical page:
[   21.838749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.839484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.840107] page_type: f5(slab)
[   21.840429] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.841159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.841876] page dumped because: kasan: bad access detected
[   21.842398] 
[   21.842558] Memory state around the buggy address:
[   21.843015]  ffff00000ea7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.843691]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.844368] >ffff00000ea7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.845039]                                                                 ^
[   21.845705]  ffff00000ea7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.846382]  ffff00000ea7e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.847054] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   20.879493] ==================================================================
[   20.880569] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   20.881191] Read of size 1 at addr ffff00000def4000 by task kunit_try_catch/202
[   20.881855] 
[   20.882014] CPU: 2 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.882052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.882062] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.882075] Call trace:
[   20.882084]  show_stack+0x20/0x38 (C)
[   20.882110]  dump_stack_lvl+0x8c/0xd0
[   20.882132]  print_report+0x118/0x608
[   20.882153]  kasan_report+0xdc/0x128
[   20.882173]  __asan_report_load1_noabort+0x20/0x30
[   20.882197]  kmalloc_large_uaf+0x2cc/0x2f8
[   20.882221]  kunit_try_run_case+0x170/0x3f0
[   20.882246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882274]  kthread+0x328/0x630
[   20.882299]  ret_from_fork+0x10/0x20
[   20.882323] 
[   20.887860] The buggy address belongs to the physical page:
[   20.888366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   20.889077] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.889685] raw: 03fffe0000000000 fffffdffc037be08 ffff0000d171c740 0000000000000000
[   20.890389] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.891086] page dumped because: kasan: bad access detected
[   20.891591] 
[   20.891737] Memory state around the buggy address:
[   20.892176]  ffff00000def3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.892831]  ffff00000def3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.893485] >ffff00000def4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.894136]                    ^
[   20.894438]  ffff00000def4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.895091]  ffff00000def4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.895743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   21.469673] ==================================================================
[   21.470748] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   21.471427] Write of size 2 at addr ffff00000df93477 by task kunit_try_catch/226
[   21.472099] 
[   21.472257] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.472291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.472302] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.472314] Call trace:
[   21.472323]  show_stack+0x20/0x38 (C)
[   21.472347]  dump_stack_lvl+0x8c/0xd0
[   21.472370]  print_report+0x118/0x608
[   21.472391]  kasan_report+0xdc/0x128
[   21.472411]  kasan_check_range+0x100/0x1a8
[   21.472433]  __asan_memset+0x34/0x78
[   21.472454]  kmalloc_oob_memset_2+0x150/0x2f8
[   21.472477]  kunit_try_run_case+0x170/0x3f0
[   21.472503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.472531]  kthread+0x328/0x630
[   21.472555]  ret_from_fork+0x10/0x20
[   21.472579] 
[   21.478388] Allocated by task 226:
[   21.478706]  kasan_save_stack+0x3c/0x68
[   21.479069]  kasan_save_track+0x20/0x40
[   21.479428]  kasan_save_alloc_info+0x40/0x58
[   21.479829]  __kasan_kmalloc+0xd4/0xd8
[   21.480181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.480609]  kmalloc_oob_memset_2+0xb0/0x2f8
[   21.481010]  kunit_try_run_case+0x170/0x3f0
[   21.481405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.481916]  kthread+0x328/0x630
[   21.482228]  ret_from_fork+0x10/0x20
[   21.482565] 
[   21.482712] The buggy address belongs to the object at ffff00000df93400
[   21.482712]  which belongs to the cache kmalloc-128 of size 128
[   21.483830] The buggy address is located 119 bytes inside of
[   21.483830]  allocated 120-byte region [ffff00000df93400, ffff00000df93478)
[   21.484957] 
[   21.485104] The buggy address belongs to the physical page:
[   21.485612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93
[   21.486323] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.486920] page_type: f5(slab)
[   21.487222] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.487924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.488620] page dumped because: kasan: bad access detected
[   21.489125] 
[   21.489272] Memory state around the buggy address:
[   21.489710]  ffff00000df93300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.490364]  ffff00000df93380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.491018] >ffff00000df93400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.491668]                                                                 ^
[   21.492311]  ffff00000df93480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.492964]  ffff00000df93500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493615] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   21.766533] ==================================================================
[   21.767203] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   21.767763] Free of addr ffff0000015a8c60 by task kunit_try_catch/246
[   21.768349] 
[   21.768506] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.768542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.768553] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.768565] Call trace:
[   21.768574]  show_stack+0x20/0x38 (C)
[   21.768598]  dump_stack_lvl+0x8c/0xd0
[   21.768621]  print_report+0x118/0x608
[   21.768643]  kasan_report_invalid_free+0xc0/0xe8
[   21.768666]  check_slab_allocation+0xd4/0x108
[   21.768688]  __kasan_slab_pre_free+0x2c/0x48
[   21.768709]  kfree+0xe8/0x3c8
[   21.768732]  kfree_sensitive+0x3c/0xb0
[   21.768752]  kmalloc_double_kzfree+0x168/0x308
[   21.768780]  kunit_try_run_case+0x170/0x3f0
[   21.768805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.768833]  kthread+0x328/0x630
[   21.768857]  ret_from_fork+0x10/0x20
[   21.768880] 
[   21.775471] Allocated by task 246:
[   21.775794]  kasan_save_stack+0x3c/0x68
[   21.776158]  kasan_save_track+0x20/0x40
[   21.776519]  kasan_save_alloc_info+0x40/0x58
[   21.776919]  __kasan_kmalloc+0xd4/0xd8
[   21.777272]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.777700]  kmalloc_double_kzfree+0xb8/0x308
[   21.778111]  kunit_try_run_case+0x170/0x3f0
[   21.778507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.779017]  kthread+0x328/0x630
[   21.779328]  ret_from_fork+0x10/0x20
[   21.779667] 
[   21.779814] Freed by task 246:
[   21.780101]  kasan_save_stack+0x3c/0x68
[   21.780460]  kasan_save_track+0x20/0x40
[   21.780820]  kasan_save_free_info+0x4c/0x78
[   21.781213]  __kasan_slab_free+0x6c/0x98
[   21.781581]  kfree+0x214/0x3c8
[   21.781875]  kfree_sensitive+0x80/0xb0
[   21.782227]  kmalloc_double_kzfree+0x11c/0x308
[   21.782646]  kunit_try_run_case+0x170/0x3f0
[   21.783039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.783549]  kthread+0x328/0x630
[   21.783859]  ret_from_fork+0x10/0x20
[   21.784197] 
[   21.784343] The buggy address belongs to the object at ffff0000015a8c60
[   21.784343]  which belongs to the cache kmalloc-16 of size 16
[   21.785448] The buggy address is located 0 bytes inside of
[   21.785448]  16-byte region [ffff0000015a8c60, ffff0000015a8c70)
[   21.786478] 
[   21.786624] The buggy address belongs to the physical page:
[   21.787132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15a8
[   21.787844] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.788444] page_type: f5(slab)
[   21.788746] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.789448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.790144] page dumped because: kasan: bad access detected
[   21.790649] 
[   21.790795] Memory state around the buggy address:
[   21.791234]  ffff0000015a8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.791889]  ffff0000015a8b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.792543] >ffff0000015a8c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.793196]                                                        ^
[   21.793772]  ffff0000015a8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.794428]  ffff0000015a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.795080] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   21.735942] ==================================================================
[   21.737265] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   21.737972] Read of size 1 at addr ffff0000015a8c60 by task kunit_try_catch/246
[   21.738656] 
[   21.738830] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.738891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.738909] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.738931] Call trace:
[   21.738945]  show_stack+0x20/0x38 (C)
[   21.738987]  dump_stack_lvl+0x8c/0xd0
[   21.739024]  print_report+0x118/0x608
[   21.739062]  kasan_report+0xdc/0x128
[   21.739096]  __kasan_check_byte+0x54/0x70
[   21.739133]  kfree_sensitive+0x30/0xb0
[   21.739169]  kmalloc_double_kzfree+0x168/0x308
[   21.739213]  kunit_try_run_case+0x170/0x3f0
[   21.739257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.739305]  kthread+0x328/0x630
[   21.739346]  ret_from_fork+0x10/0x20
[   21.739387] 
[   21.745297] Allocated by task 246:
[   21.745630]  kasan_save_stack+0x3c/0x68
[   21.746014]  kasan_save_track+0x20/0x40
[   21.746395]  kasan_save_alloc_info+0x40/0x58
[   21.746817]  __kasan_kmalloc+0xd4/0xd8
[   21.747190]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.747644]  kmalloc_double_kzfree+0xb8/0x308
[   21.748081]  kunit_try_run_case+0x170/0x3f0
[   21.748500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.749034]  kthread+0x328/0x630
[   21.749368]  ret_from_fork+0x10/0x20
[   21.749728] 
[   21.749888] Freed by task 246:
[   21.750190]  kasan_save_stack+0x3c/0x68
[   21.750571]  kasan_save_track+0x20/0x40
[   21.750951]  kasan_save_free_info+0x4c/0x78
[   21.751366]  __kasan_slab_free+0x6c/0x98
[   21.751755]  kfree+0x214/0x3c8
[   21.752073]  kfree_sensitive+0x80/0xb0
[   21.752446]  kmalloc_double_kzfree+0x11c/0x308
[   21.752889]  kunit_try_run_case+0x170/0x3f0
[   21.753305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.753841]  kthread+0x328/0x630
[   21.754176]  ret_from_fork+0x10/0x20
[   21.754537] 
[   21.754696] The buggy address belongs to the object at ffff0000015a8c60
[   21.754696]  which belongs to the cache kmalloc-16 of size 16
[   21.755825] The buggy address is located 0 bytes inside of
[   21.755825]  freed 16-byte region [ffff0000015a8c60, ffff0000015a8c70)
[   21.756903] 
[   21.757051] The buggy address belongs to the physical page:
[   21.757559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15a8
[   21.758272] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.758872] page_type: f5(slab)
[   21.759176] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.759880] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.760578] page dumped because: kasan: bad access detected
[   21.761084] 
[   21.761231] Memory state around the buggy address:
[   21.761670]  ffff0000015a8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.762326]  ffff0000015a8b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.762980] >ffff0000015a8c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.763632]                                                        ^
[   21.764209]  ffff0000015a8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.764864]  ffff0000015a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.765515] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   21.701017] ==================================================================
[   21.702078] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   21.702740] Read of size 1 at addr ffff00000ff06928 by task kunit_try_catch/242
[   21.703433] 
[   21.703605] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.703668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.703685] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.703707] Call trace:
[   21.703721]  show_stack+0x20/0x38 (C)
[   21.703763]  dump_stack_lvl+0x8c/0xd0
[   21.703801]  print_report+0x118/0x608
[   21.703838]  kasan_report+0xdc/0x128
[   21.703873]  __asan_report_load1_noabort+0x20/0x30
[   21.703915]  kmalloc_uaf2+0x3f4/0x468
[   21.703954]  kunit_try_run_case+0x170/0x3f0
[   21.703997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.704046]  kthread+0x328/0x630
[   21.704087]  ret_from_fork+0x10/0x20
[   21.704127] 
[   21.709701] Allocated by task 242:
[   21.710036]  kasan_save_stack+0x3c/0x68
[   21.710419]  kasan_save_track+0x20/0x40
[   21.710800]  kasan_save_alloc_info+0x40/0x58
[   21.711223]  __kasan_kmalloc+0xd4/0xd8
[   21.711597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.712051]  kmalloc_uaf2+0xc4/0x468
[   21.712414]  kunit_try_run_case+0x170/0x3f0
[   21.712831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.713367]  kthread+0x328/0x630
[   21.713699]  ret_from_fork+0x10/0x20
[   21.714059] 
[   21.714217] Freed by task 242:
[   21.714519]  kasan_save_stack+0x3c/0x68
[   21.714901]  kasan_save_track+0x20/0x40
[   21.715280]  kasan_save_free_info+0x4c/0x78
[   21.715696]  __kasan_slab_free+0x6c/0x98
[   21.716084]  kfree+0x214/0x3c8
[   21.716400]  kmalloc_uaf2+0x134/0x468
[   21.716771]  kunit_try_run_case+0x170/0x3f0
[   21.717188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.717724]  kthread+0x328/0x630
[   21.718056]  ret_from_fork+0x10/0x20
[   21.718416] 
[   21.718574] The buggy address belongs to the object at ffff00000ff06900
[   21.718574]  which belongs to the cache kmalloc-64 of size 64
[   21.719704] The buggy address is located 40 bytes inside of
[   21.719704]  freed 64-byte region [ffff00000ff06900, ffff00000ff06940)
[   21.720812] 
[   21.720972] The buggy address belongs to the physical page:
[   21.721494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff06
[   21.722227] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.722850] page_type: f5(slab)
[   21.723172] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   21.723900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.724617] page dumped because: kasan: bad access detected
[   21.725139] 
[   21.725296] Memory state around the buggy address:
[   21.725753]  ffff00000ff06800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.726430]  ffff00000ff06880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.727106] >ffff00000ff06900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.727776]                                   ^
[   21.728210]  ffff00000ff06980: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   21.728887]  ffff00000ff06a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.729557] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   21.668439] ==================================================================
[   21.669451] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   21.670133] Write of size 33 at addr ffff00000ff06800 by task kunit_try_catch/240
[   21.670827] 
[   21.670992] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.671042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.671056] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.671074] Call trace:
[   21.671086]  show_stack+0x20/0x38 (C)
[   21.671121]  dump_stack_lvl+0x8c/0xd0
[   21.671152]  print_report+0x118/0x608
[   21.671181]  kasan_report+0xdc/0x128
[   21.671209]  kasan_check_range+0x100/0x1a8
[   21.671241]  __asan_memset+0x34/0x78
[   21.671272]  kmalloc_uaf_memset+0x170/0x310
[   21.671305]  kunit_try_run_case+0x170/0x3f0
[   21.671341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.671381]  kthread+0x328/0x630
[   21.671415]  ret_from_fork+0x10/0x20
[   21.671448] 
[   21.677313] Allocated by task 240:
[   21.677651]  kasan_save_stack+0x3c/0x68
[   21.678037]  kasan_save_track+0x20/0x40
[   21.678419]  kasan_save_alloc_info+0x40/0x58
[   21.678844]  __kasan_kmalloc+0xd4/0xd8
[   21.679217]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.679670]  kmalloc_uaf_memset+0xb8/0x310
[   21.680081]  kunit_try_run_case+0x170/0x3f0
[   21.680498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.681036]  kthread+0x328/0x630
[   21.681370]  ret_from_fork+0x10/0x20
[   21.681731] 
[   21.681889] Freed by task 240:
[   21.682192]  kasan_save_stack+0x3c/0x68
[   21.682574]  kasan_save_track+0x20/0x40
[   21.682955]  kasan_save_free_info+0x4c/0x78
[   21.683368]  __kasan_slab_free+0x6c/0x98
[   21.683758]  kfree+0x214/0x3c8
[   21.684075]  kmalloc_uaf_memset+0x11c/0x310
[   21.684494]  kunit_try_run_case+0x170/0x3f0
[   21.684911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.685447]  kthread+0x328/0x630
[   21.685779]  ret_from_fork+0x10/0x20
[   21.686140] 
[   21.686299] The buggy address belongs to the object at ffff00000ff06800
[   21.686299]  which belongs to the cache kmalloc-64 of size 64
[   21.687429] The buggy address is located 0 bytes inside of
[   21.687429]  freed 64-byte region [ffff00000ff06800, ffff00000ff06840)
[   21.688530] 
[   21.688689] The buggy address belongs to the physical page:
[   21.689214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff06
[   21.689951] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.690573] page_type: f5(slab)
[   21.690895] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   21.691623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.692340] page dumped because: kasan: bad access detected
[   21.692862] 
[   21.693022] Memory state around the buggy address:
[   21.693477]  ffff00000ff06700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.694153]  ffff00000ff06780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.694829] >ffff00000ff06800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.695501]                    ^
[   21.695818]  ffff00000ff06880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.696494]  ffff00000ff06900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.697165] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   21.636650] ==================================================================
[   21.637787] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   21.638421] Read of size 1 at addr ffff00000aa08688 by task kunit_try_catch/238
[   21.639100] 
[   21.639266] CPU: 3 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.639317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.639332] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.639350] Call trace:
[   21.639362]  show_stack+0x20/0x38 (C)
[   21.639394]  dump_stack_lvl+0x8c/0xd0
[   21.639426]  print_report+0x118/0x608
[   21.639456]  kasan_report+0xdc/0x128
[   21.639484]  __asan_report_load1_noabort+0x20/0x30
[   21.639518]  kmalloc_uaf+0x300/0x338
[   21.639551]  kunit_try_run_case+0x170/0x3f0
[   21.639586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.639625]  kthread+0x328/0x630
[   21.639659]  ret_from_fork+0x10/0x20
[   21.639692] 
[   21.645222] Allocated by task 238:
[   21.645549]  kasan_save_stack+0x3c/0x68
[   21.645922]  kasan_save_track+0x20/0x40
[   21.646294]  kasan_save_alloc_info+0x40/0x58
[   21.646707]  __kasan_kmalloc+0xd4/0xd8
[   21.647070]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.647510]  kmalloc_uaf+0xb8/0x338
[   21.647855]  kunit_try_run_case+0x170/0x3f0
[   21.648263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.648787]  kthread+0x328/0x630
[   21.649110]  ret_from_fork+0x10/0x20
[   21.649460] 
[   21.649612] Freed by task 238:
[   21.649907]  kasan_save_stack+0x3c/0x68
[   21.650279]  kasan_save_track+0x20/0x40
[   21.650651]  kasan_save_free_info+0x4c/0x78
[   21.651056]  __kasan_slab_free+0x6c/0x98
[   21.651435]  kfree+0x214/0x3c8
[   21.651742]  kmalloc_uaf+0x11c/0x338
[   21.652095]  kunit_try_run_case+0x170/0x3f0
[   21.652500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.653025]  kthread+0x328/0x630
[   21.653348]  ret_from_fork+0x10/0x20
[   21.653697] 
[   21.653851] The buggy address belongs to the object at ffff00000aa08680
[   21.653851]  which belongs to the cache kmalloc-16 of size 16
[   21.654969] The buggy address is located 8 bytes inside of
[   21.654969]  freed 16-byte region [ffff00000aa08680, ffff00000aa08690)
[   21.656058] 
[   21.656213] The buggy address belongs to the physical page:
[   21.656730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08
[   21.657455] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.658066] page_type: f5(slab)
[   21.658379] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.659095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.659803] page dumped because: kasan: bad access detected
[   21.660317] 
[   21.660470] Memory state around the buggy address:
[   21.660918]  ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.661584]  ffff00000aa08600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.662250] >ffff00000aa08680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.662912]                       ^
[   21.663247]  ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.663913]  ffff00000aa08780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.664576] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   21.608196] ==================================================================
[   21.609311] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   21.610051] Read of size 64 at addr ffff00000ff06504 by task kunit_try_catch/236
[   21.610730] 
[   21.610904] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.610958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.610974] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.610991] Call trace:
[   21.611002]  show_stack+0x20/0x38 (C)
[   21.611039]  dump_stack_lvl+0x8c/0xd0
[   21.611070]  print_report+0x118/0x608
[   21.611100]  kasan_report+0xdc/0x128
[   21.611129]  kasan_check_range+0x100/0x1a8
[   21.611159]  __asan_memmove+0x3c/0x98
[   21.611191]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   21.611228]  kunit_try_run_case+0x170/0x3f0
[   21.611263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.611303]  kthread+0x328/0x630
[   21.611337]  ret_from_fork+0x10/0x20
[   21.611369] 
[   21.617295] Allocated by task 236:
[   21.617621]  kasan_save_stack+0x3c/0x68
[   21.617996]  kasan_save_track+0x20/0x40
[   21.618368]  kasan_save_alloc_info+0x40/0x58
[   21.618780]  __kasan_kmalloc+0xd4/0xd8
[   21.619142]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.619584]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   21.620063]  kunit_try_run_case+0x170/0x3f0
[   21.620470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.620995]  kthread+0x328/0x630
[   21.621318]  ret_from_fork+0x10/0x20
[   21.621668] 
[   21.621822] The buggy address belongs to the object at ffff00000ff06500
[   21.621822]  which belongs to the cache kmalloc-64 of size 64
[   21.622940] The buggy address is located 4 bytes inside of
[   21.622940]  allocated 64-byte region [ffff00000ff06500, ffff00000ff06540)
[   21.624061] 
[   21.624215] The buggy address belongs to the physical page:
[   21.624731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xff06
[   21.625456] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.626069] page_type: f5(slab)
[   21.626382] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   21.627099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.627807] page dumped because: kasan: bad access detected
[   21.628322] 
[   21.628474] Memory state around the buggy address:
[   21.628923]  ffff00000ff06400: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   21.629589]  ffff00000ff06480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.630256] >ffff00000ff06500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.630918]                                            ^
[   21.631414]  ffff00000ff06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.632080]  ffff00000ff06600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.632742] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   21.580514] ==================================================================
[   21.581582] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   21.582295] Read of size 18446744073709551614 at addr ffff00000fdabc04 by task kunit_try_catch/234
[   21.583127] 
[   21.583292] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.583344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.583359] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.583377] Call trace:
[   21.583388]  show_stack+0x20/0x38 (C)
[   21.583423]  dump_stack_lvl+0x8c/0xd0
[   21.583454]  print_report+0x118/0x608
[   21.583485]  kasan_report+0xdc/0x128
[   21.583513]  kasan_check_range+0x100/0x1a8
[   21.583544]  __asan_memmove+0x3c/0x98
[   21.583575]  kmalloc_memmove_negative_size+0x154/0x2e0
[   21.583613]  kunit_try_run_case+0x170/0x3f0
[   21.583648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.583688]  kthread+0x328/0x630
[   21.583723]  ret_from_fork+0x10/0x20
[   21.583756] 
[   21.589691] Allocated by task 234:
[   21.590018]  kasan_save_stack+0x3c/0x68
[   21.590393]  kasan_save_track+0x20/0x40
[   21.590765]  kasan_save_alloc_info+0x40/0x58
[   21.591179]  __kasan_kmalloc+0xd4/0xd8
[   21.591543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.591984]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   21.592471]  kunit_try_run_case+0x170/0x3f0
[   21.592878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.593404]  kthread+0x328/0x630
[   21.593727]  ret_from_fork+0x10/0x20
[   21.594078] 
[   21.594230] The buggy address belongs to the object at ffff00000fdabc00
[   21.594230]  which belongs to the cache kmalloc-64 of size 64
[   21.595348] The buggy address is located 4 bytes inside of
[   21.595348]  64-byte region [ffff00000fdabc00, ffff00000fdabc40)
[   21.596392] 
[   21.596546] The buggy address belongs to the physical page:
[   21.597062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfdab
[   21.597787] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.598399] page_type: f5(slab)
[   21.598713] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   21.599429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.600138] page dumped because: kasan: bad access detected
[   21.600652] 
[   21.600805] Memory state around the buggy address:
[   21.601253]  ffff00000fdabb00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   21.601920]  ffff00000fdabb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.602586] >ffff00000fdabc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.603247]                    ^
[   21.603558]  ffff00000fdabc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.604224]  ffff00000fdabd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.604887] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   21.552501] ==================================================================
[   21.553559] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   21.554243] Write of size 16 at addr ffff00000df93669 by task kunit_try_catch/232
[   21.554925] 
[   21.555083] CPU: 2 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.555119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.555130] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.555143] Call trace:
[   21.555152]  show_stack+0x20/0x38 (C)
[   21.555178]  dump_stack_lvl+0x8c/0xd0
[   21.555201]  print_report+0x118/0x608
[   21.555223]  kasan_report+0xdc/0x128
[   21.555243]  kasan_check_range+0x100/0x1a8
[   21.555265]  __asan_memset+0x34/0x78
[   21.555287]  kmalloc_oob_memset_16+0x150/0x2f8
[   21.555311]  kunit_try_run_case+0x170/0x3f0
[   21.555337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.555366]  kthread+0x328/0x630
[   21.555391]  ret_from_fork+0x10/0x20
[   21.555415] 
[   21.561236] Allocated by task 232:
[   21.561554]  kasan_save_stack+0x3c/0x68
[   21.561915]  kasan_save_track+0x20/0x40
[   21.562276]  kasan_save_alloc_info+0x40/0x58
[   21.562675]  __kasan_kmalloc+0xd4/0xd8
[   21.563027]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.563456]  kmalloc_oob_memset_16+0xb0/0x2f8
[   21.563865]  kunit_try_run_case+0x170/0x3f0
[   21.564259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.564769]  kthread+0x328/0x630
[   21.565081]  ret_from_fork+0x10/0x20
[   21.565419] 
[   21.565566] The buggy address belongs to the object at ffff00000df93600
[   21.565566]  which belongs to the cache kmalloc-128 of size 128
[   21.566685] The buggy address is located 105 bytes inside of
[   21.566685]  allocated 120-byte region [ffff00000df93600, ffff00000df93678)
[   21.567814] 
[   21.567962] The buggy address belongs to the physical page:
[   21.568469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdf93
[   21.569182] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.569782] page_type: f5(slab)
[   21.570085] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.570789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.571487] page dumped because: kasan: bad access detected
[   21.571991] 
[   21.572138] Memory state around the buggy address:
[   21.572577]  ffff00000df93500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.573231]  ffff00000df93580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.573885] >ffff00000df93600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.574537]                                                                 ^
[   21.575182]  ffff00000df93680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.575837]  ffff00000df93700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.576489] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   21.442229] ==================================================================
[   21.443294] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   21.444024] Write of size 128 at addr ffff00000ea7e700 by task kunit_try_catch/224
[   21.444753] 
[   21.444937] CPU: 3 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.445015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.445038] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.445065] Call trace:
[   21.445083]  show_stack+0x20/0x38 (C)
[   21.445135]  dump_stack_lvl+0x8c/0xd0
[   21.445185]  print_report+0x118/0x608
[   21.445232]  kasan_report+0xdc/0x128
[   21.445279]  kasan_check_range+0x100/0x1a8
[   21.445330]  __asan_memset+0x34/0x78
[   21.445380]  kmalloc_oob_in_memset+0x144/0x2d0
[   21.445436]  kunit_try_run_case+0x170/0x3f0
[   21.445493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.445557]  kthread+0x328/0x630
[   21.445611]  ret_from_fork+0x10/0x20
[   21.445664] 
[   21.451548] Allocated by task 224:
[   21.451884]  kasan_save_stack+0x3c/0x68
[   21.452262]  kasan_save_track+0x20/0x40
[   21.452634]  kasan_save_alloc_info+0x40/0x58
[   21.453046]  __kasan_kmalloc+0xd4/0xd8
[   21.453408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.453850]  kmalloc_oob_in_memset+0xb0/0x2d0
[   21.454273]  kunit_try_run_case+0x170/0x3f0
[   21.454680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.455204]  kthread+0x328/0x630
[   21.455527]  ret_from_fork+0x10/0x20
[   21.455877] 
[   21.456030] The buggy address belongs to the object at ffff00000ea7e700
[   21.456030]  which belongs to the cache kmalloc-128 of size 128
[   21.457163] The buggy address is located 0 bytes inside of
[   21.457163]  allocated 120-byte region [ffff00000ea7e700, ffff00000ea7e778)
[   21.458290] 
[   21.458445] The buggy address belongs to the physical page:
[   21.458961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   21.459685] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.460296] page_type: f5(slab)
[   21.460609] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.461324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.462031] page dumped because: kasan: bad access detected
[   21.462545] 
[   21.462697] Memory state around the buggy address:
[   21.463145]  ffff00000ea7e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.463811]  ffff00000ea7e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.464476] >ffff00000ea7e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.465137]                                                                 ^
[   21.465791]  ffff00000ea7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.466457]  ffff00000ea7e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.467118] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   21.410880] ==================================================================
[   21.411917] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   21.412568] Read of size 16 at addr ffff00000aa08660 by task kunit_try_catch/222
[   21.413251] 
[   21.413416] CPU: 3 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.413464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.413478] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.413496] Call trace:
[   21.413507]  show_stack+0x20/0x38 (C)
[   21.413540]  dump_stack_lvl+0x8c/0xd0
[   21.413571]  print_report+0x118/0x608
[   21.413600]  kasan_report+0xdc/0x128
[   21.413628]  __asan_report_load16_noabort+0x20/0x30
[   21.413661]  kmalloc_uaf_16+0x3bc/0x438
[   21.413694]  kunit_try_run_case+0x170/0x3f0
[   21.413729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.413768]  kthread+0x328/0x630
[   21.413802]  ret_from_fork+0x10/0x20
[   21.413834] 
[   21.419390] Allocated by task 222:
[   21.419716]  kasan_save_stack+0x3c/0x68
[   21.420088]  kasan_save_track+0x20/0x40
[   21.420459]  kasan_save_alloc_info+0x40/0x58
[   21.420871]  __kasan_kmalloc+0xd4/0xd8
[   21.421234]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.421674]  kmalloc_uaf_16+0x140/0x438
[   21.422050]  kunit_try_run_case+0x170/0x3f0
[   21.422456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.422979]  kthread+0x328/0x630
[   21.423302]  ret_from_fork+0x10/0x20
[   21.423651] 
[   21.423803] Freed by task 222:
[   21.424097]  kasan_save_stack+0x3c/0x68
[   21.424468]  kasan_save_track+0x20/0x40
[   21.424839]  kasan_save_free_info+0x4c/0x78
[   21.425243]  __kasan_slab_free+0x6c/0x98
[   21.425622]  kfree+0x214/0x3c8
[   21.425929]  kmalloc_uaf_16+0x190/0x438
[   21.426305]  kunit_try_run_case+0x170/0x3f0
[   21.426709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.427232]  kthread+0x328/0x630
[   21.427554]  ret_from_fork+0x10/0x20
[   21.427903] 
[   21.428056] The buggy address belongs to the object at ffff00000aa08660
[   21.428056]  which belongs to the cache kmalloc-16 of size 16
[   21.429172] The buggy address is located 0 bytes inside of
[   21.429172]  freed 16-byte region [ffff00000aa08660, ffff00000aa08670)
[   21.430260] 
[   21.430414] The buggy address belongs to the physical page:
[   21.430929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08
[   21.431653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.432264] page_type: f5(slab)
[   21.432577] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.433292] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.433998] page dumped because: kasan: bad access detected
[   21.434512] 
[   21.434664] Memory state around the buggy address:
[   21.435112]  ffff00000aa08500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.435777]  ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.436442] >ffff00000aa08600: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   21.437103]                                                        ^
[   21.437689]  ffff00000aa08680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.438354]  ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.439015] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   21.384046] ==================================================================
[   21.385091] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   21.385742] Write of size 16 at addr ffff00000aa08600 by task kunit_try_catch/220
[   21.386437] 
[   21.386603] CPU: 3 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.386653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.386667] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.386684] Call trace:
[   21.386696]  show_stack+0x20/0x38 (C)
[   21.386729]  dump_stack_lvl+0x8c/0xd0
[   21.386760]  print_report+0x118/0x608
[   21.386790]  kasan_report+0xdc/0x128
[   21.386818]  __asan_report_store16_noabort+0x20/0x30
[   21.386853]  kmalloc_oob_16+0x3a0/0x3f8
[   21.386885]  kunit_try_run_case+0x170/0x3f0
[   21.386920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.386959]  kthread+0x328/0x630
[   21.386993]  ret_from_fork+0x10/0x20
[   21.387025] 
[   21.392595] Allocated by task 220:
[   21.392921]  kasan_save_stack+0x3c/0x68
[   21.393294]  kasan_save_track+0x20/0x40
[   21.393665]  kasan_save_alloc_info+0x40/0x58
[   21.394076]  __kasan_kmalloc+0xd4/0xd8
[   21.394439]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.394880]  kmalloc_oob_16+0xb4/0x3f8
[   21.395247]  kunit_try_run_case+0x170/0x3f0
[   21.395653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.396177]  kthread+0x328/0x630
[   21.396500]  ret_from_fork+0x10/0x20
[   21.396849] 
[   21.397002] The buggy address belongs to the object at ffff00000aa08600
[   21.397002]  which belongs to the cache kmalloc-16 of size 16
[   21.398119] The buggy address is located 0 bytes inside of
[   21.398119]  allocated 13-byte region [ffff00000aa08600, ffff00000aa0860d)
[   21.399239] 
[   21.399392] The buggy address belongs to the physical page:
[   21.399908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xaa08
[   21.400632] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.401243] page_type: f5(slab)
[   21.401555] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.402270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.402977] page dumped because: kasan: bad access detected
[   21.403490] 
[   21.403643] Memory state around the buggy address:
[   21.404091]  ffff00000aa08500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.404756]  ffff00000aa08580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.405421] >ffff00000aa08600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.406082]                       ^
[   21.406416]  ffff00000aa08680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.407081]  ffff00000aa08700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.407742] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   21.348823] ==================================================================
[   21.349488] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   21.350105] Read of size 1 at addr ffff00000eea2400 by task kunit_try_catch/218
[   21.350769] 
[   21.350926] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.350960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.350971] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.350983] Call trace:
[   21.350992]  show_stack+0x20/0x38 (C)
[   21.351016]  dump_stack_lvl+0x8c/0xd0
[   21.351039]  print_report+0x118/0x608
[   21.351060]  kasan_report+0xdc/0x128
[   21.351080]  __asan_report_load1_noabort+0x20/0x30
[   21.351104]  krealloc_uaf+0x4c8/0x520
[   21.351127]  kunit_try_run_case+0x170/0x3f0
[   21.351153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.351181]  kthread+0x328/0x630
[   21.351204]  ret_from_fork+0x10/0x20
[   21.351227] 
[   21.356723] Allocated by task 218:
[   21.357041]  kasan_save_stack+0x3c/0x68
[   21.357402]  kasan_save_track+0x20/0x40
[   21.357763]  kasan_save_alloc_info+0x40/0x58
[   21.358162]  __kasan_kmalloc+0xd4/0xd8
[   21.358515]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.358943]  krealloc_uaf+0xc8/0x520
[   21.359284]  kunit_try_run_case+0x170/0x3f0
[   21.359677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.360188]  kthread+0x328/0x630
[   21.360498]  ret_from_fork+0x10/0x20
[   21.360836] 
[   21.360982] Freed by task 218:
[   21.361266]  kasan_save_stack+0x3c/0x68
[   21.361626]  kasan_save_track+0x20/0x40
[   21.361986]  kasan_save_free_info+0x4c/0x78
[   21.362378]  __kasan_slab_free+0x6c/0x98
[   21.362745]  kfree+0x214/0x3c8
[   21.363041]  krealloc_uaf+0x12c/0x520
[   21.363389]  kunit_try_run_case+0x170/0x3f0
[   21.363784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.364294]  kthread+0x328/0x630
[   21.364605]  ret_from_fork+0x10/0x20
[   21.364943] 
[   21.365091] The buggy address belongs to the object at ffff00000eea2400
[   21.365091]  which belongs to the cache kmalloc-256 of size 256
[   21.366210] The buggy address is located 0 bytes inside of
[   21.366210]  freed 256-byte region [ffff00000eea2400, ffff00000eea2500)
[   21.367290] 
[   21.367438] The buggy address belongs to the physical page:
[   21.367945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeea2
[   21.368654] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.369347] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.369985] page_type: f5(slab)
[   21.370285] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.370989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.371691] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.372400] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.373111] head: 03fffe0000000001 fffffdffc03ba881 00000000ffffffff 00000000ffffffff
[   21.373820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.374524] page dumped because: kasan: bad access detected
[   21.375028] 
[   21.375174] Memory state around the buggy address:
[   21.375613]  ffff00000eea2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.376267]  ffff00000eea2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.376920] >ffff00000eea2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.377571]                    ^
[   21.377874]  ffff00000eea2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.378528]  ffff00000eea2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.379178] ==================================================================
[   21.316303] ==================================================================
[   21.317404] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   21.318040] Read of size 1 at addr ffff00000eea2400 by task kunit_try_catch/218
[   21.318718] 
[   21.318883] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.318932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.318946] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.318963] Call trace:
[   21.318975]  show_stack+0x20/0x38 (C)
[   21.319008]  dump_stack_lvl+0x8c/0xd0
[   21.319039]  print_report+0x118/0x608
[   21.319069]  kasan_report+0xdc/0x128
[   21.319097]  __kasan_check_byte+0x54/0x70
[   21.319125]  krealloc_noprof+0x44/0x360
[   21.319154]  krealloc_uaf+0x180/0x520
[   21.319187]  kunit_try_run_case+0x170/0x3f0
[   21.319222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.319261]  kthread+0x328/0x630
[   21.319294]  ret_from_fork+0x10/0x20
[   21.319327] 
[   21.325139] Allocated by task 218:
[   21.325465]  kasan_save_stack+0x3c/0x68
[   21.325839]  kasan_save_track+0x20/0x40
[   21.326210]  kasan_save_alloc_info+0x40/0x58
[   21.326623]  __kasan_kmalloc+0xd4/0xd8
[   21.326986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.327427]  krealloc_uaf+0xc8/0x520
[   21.327780]  kunit_try_run_case+0x170/0x3f0
[   21.328186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.328710]  kthread+0x328/0x630
[   21.329033]  ret_from_fork+0x10/0x20
[   21.329382] 
[   21.329535] Freed by task 218:
[   21.329829]  kasan_save_stack+0x3c/0x68
[   21.330201]  kasan_save_track+0x20/0x40
[   21.330571]  kasan_save_free_info+0x4c/0x78
[   21.330975]  __kasan_slab_free+0x6c/0x98
[   21.331353]  kfree+0x214/0x3c8
[   21.331661]  krealloc_uaf+0x12c/0x520
[   21.332022]  kunit_try_run_case+0x170/0x3f0
[   21.332428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.332952]  kthread+0x328/0x630
[   21.333274]  ret_from_fork+0x10/0x20
[   21.333624] 
[   21.333777] The buggy address belongs to the object at ffff00000eea2400
[   21.333777]  which belongs to the cache kmalloc-256 of size 256
[   21.334910] The buggy address is located 0 bytes inside of
[   21.334910]  freed 256-byte region [ffff00000eea2400, ffff00000eea2500)
[   21.336006] 
[   21.336160] The buggy address belongs to the physical page:
[   21.336676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeea2
[   21.337400] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.338106] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.338762] page_type: f5(slab)
[   21.339077] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.339782] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.340485] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.341195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.341905] head: 03fffe0000000001 fffffdffc03ba881 00000000ffffffff 00000000ffffffff
[   21.342613] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.343317] page dumped because: kasan: bad access detected
[   21.343822] 
[   21.343968] Memory state around the buggy address:
[   21.344407]  ffff00000eea2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.345062]  ffff00000eea2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.345716] >ffff00000eea2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.346366]                    ^
[   21.346669]  ffff00000eea2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.347323]  ffff00000eea2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.347975] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   21.067591] ==================================================================
[   21.068266] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   21.068969] Write of size 1 at addr ffff00000dc594da by task kunit_try_catch/212
[   21.069642] 
[   21.069797] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.069833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.069842] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.069853] Call trace:
[   21.069862]  show_stack+0x20/0x38 (C)
[   21.069885]  dump_stack_lvl+0x8c/0xd0
[   21.069905]  print_report+0x118/0x608
[   21.069924]  kasan_report+0xdc/0x128
[   21.069942]  __asan_report_store1_noabort+0x20/0x30
[   21.069964]  krealloc_less_oob_helper+0xa80/0xc50
[   21.069988]  krealloc_less_oob+0x20/0x38
[   21.070010]  kunit_try_run_case+0x170/0x3f0
[   21.070034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.070059]  kthread+0x328/0x630
[   21.070082]  ret_from_fork+0x10/0x20
[   21.070103] 
[   21.076032] Allocated by task 212:
[   21.076349]  kasan_save_stack+0x3c/0x68
[   21.076711]  kasan_save_track+0x20/0x40
[   21.077068]  kasan_save_alloc_info+0x40/0x58
[   21.077467]  __kasan_krealloc+0x118/0x178
[   21.077840]  krealloc_noprof+0x128/0x360
[   21.078207]  krealloc_less_oob_helper+0x168/0xc50
[   21.078645]  krealloc_less_oob+0x20/0x38
[   21.079015]  kunit_try_run_case+0x170/0x3f0
[   21.079407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.079915]  kthread+0x328/0x630
[   21.080223]  ret_from_fork+0x10/0x20
[   21.080560] 
[   21.080706] The buggy address belongs to the object at ffff00000dc59400
[   21.080706]  which belongs to the cache kmalloc-256 of size 256
[   21.081822] The buggy address is located 17 bytes to the right of
[   21.081822]  allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9)
[   21.082987] 
[   21.083133] The buggy address belongs to the physical page:
[   21.083638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58
[   21.084347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.085037] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.085673] page_type: f5(slab)
[   21.085971] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.086671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.087370] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.088076] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.088782] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff
[   21.089488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.090189] page dumped because: kasan: bad access detected
[   21.090693] 
[   21.090837] Memory state around the buggy address:
[   21.091273]  ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.091926]  ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.092578] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.093227]                                                     ^
[   21.093778]  ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.094430]  ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.095079] ==================================================================
[   21.248842] ==================================================================
[   21.249514] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   21.250217] Write of size 1 at addr ffff00000def60da by task kunit_try_catch/216
[   21.250890] 
[   21.251045] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.251081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.251090] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.251102] Call trace:
[   21.251110]  show_stack+0x20/0x38 (C)
[   21.251133]  dump_stack_lvl+0x8c/0xd0
[   21.251154]  print_report+0x118/0x608
[   21.251173]  kasan_report+0xdc/0x128
[   21.251191]  __asan_report_store1_noabort+0x20/0x30
[   21.251213]  krealloc_less_oob_helper+0xa80/0xc50
[   21.251237]  krealloc_large_less_oob+0x20/0x38
[   21.251260]  kunit_try_run_case+0x170/0x3f0
[   21.251283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.251309]  kthread+0x328/0x630
[   21.251332]  ret_from_fork+0x10/0x20
[   21.251353] 
[   21.257329] The buggy address belongs to the physical page:
[   21.257834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   21.258544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.259235] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.259870] page_type: f8(unknown)
[   21.260193] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.260892] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.261592] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.262299] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.263005] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   21.263711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.264412] page dumped because: kasan: bad access detected
[   21.264915] 
[   21.265060] Memory state around the buggy address:
[   21.265497]  ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.266149]  ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.266801] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.267449]                                                     ^
[   21.268001]  ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.268653]  ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.269301] ==================================================================
[   21.124347] ==================================================================
[   21.125001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   21.125692] Write of size 1 at addr ffff00000dc594eb by task kunit_try_catch/212
[   21.126361] 
[   21.126510] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.126542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.126550] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.126560] Call trace:
[   21.126567]  show_stack+0x20/0x38 (C)
[   21.126587]  dump_stack_lvl+0x8c/0xd0
[   21.126605]  print_report+0x118/0x608
[   21.126623]  kasan_report+0xdc/0x128
[   21.126641]  __asan_report_store1_noabort+0x20/0x30
[   21.126663]  krealloc_less_oob_helper+0xa58/0xc50
[   21.126686]  krealloc_less_oob+0x20/0x38
[   21.126708]  kunit_try_run_case+0x170/0x3f0
[   21.126731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.126756]  kthread+0x328/0x630
[   21.126777]  ret_from_fork+0x10/0x20
[   21.126797] 
[   21.132727] Allocated by task 212:
[   21.133042]  kasan_save_stack+0x3c/0x68
[   21.133400]  kasan_save_track+0x20/0x40
[   21.133756]  kasan_save_alloc_info+0x40/0x58
[   21.134155]  __kasan_krealloc+0x118/0x178
[   21.134529]  krealloc_noprof+0x128/0x360
[   21.134894]  krealloc_less_oob_helper+0x168/0xc50
[   21.135333]  krealloc_less_oob+0x20/0x38
[   21.135702]  kunit_try_run_case+0x170/0x3f0
[   21.136095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136602]  kthread+0x328/0x630
[   21.136911]  ret_from_fork+0x10/0x20
[   21.137247] 
[   21.137392] The buggy address belongs to the object at ffff00000dc59400
[   21.137392]  which belongs to the cache kmalloc-256 of size 256
[   21.138507] The buggy address is located 34 bytes to the right of
[   21.138507]  allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9)
[   21.139670] 
[   21.139816] The buggy address belongs to the physical page:
[   21.140319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58
[   21.141026] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.141715] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.142347] page_type: f5(slab)
[   21.142643] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.143343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.144043] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.144750] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.145456] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff
[   21.146162] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.146863] page dumped because: kasan: bad access detected
[   21.147367] 
[   21.147511] Memory state around the buggy address:
[   21.147946]  ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148597]  ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.149249] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.149897]                                                           ^
[   21.150494]  ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.151145]  ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.151793] ==================================================================
[   21.038263] ==================================================================
[   21.038936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   21.039650] Write of size 1 at addr ffff00000dc594d0 by task kunit_try_catch/212
[   21.040334] 
[   21.040497] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.040545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.040559] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.040576] Call trace:
[   21.040586]  show_stack+0x20/0x38 (C)
[   21.040617]  dump_stack_lvl+0x8c/0xd0
[   21.040648]  print_report+0x118/0x608
[   21.040677]  kasan_report+0xdc/0x128
[   21.040704]  __asan_report_store1_noabort+0x20/0x30
[   21.040738]  krealloc_less_oob_helper+0xb9c/0xc50
[   21.040773]  krealloc_less_oob+0x20/0x38
[   21.040806]  kunit_try_run_case+0x170/0x3f0
[   21.040840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.040878]  kthread+0x328/0x630
[   21.040911]  ret_from_fork+0x10/0x20
[   21.040942] 
[   21.046921] Allocated by task 212:
[   21.047247]  kasan_save_stack+0x3c/0x68
[   21.047618]  kasan_save_track+0x20/0x40
[   21.047990]  kasan_save_alloc_info+0x40/0x58
[   21.048401]  __kasan_krealloc+0x118/0x178
[   21.048788]  krealloc_noprof+0x128/0x360
[   21.049168]  krealloc_less_oob_helper+0x168/0xc50
[   21.049622]  krealloc_less_oob+0x20/0x38
[   21.050005]  kunit_try_run_case+0x170/0x3f0
[   21.050409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.050933]  kthread+0x328/0x630
[   21.051255]  ret_from_fork+0x10/0x20
[   21.051604] 
[   21.051757] The buggy address belongs to the object at ffff00000dc59400
[   21.051757]  which belongs to the cache kmalloc-256 of size 256
[   21.052888] The buggy address is located 7 bytes to the right of
[   21.052888]  allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9)
[   21.054061] 
[   21.054214] The buggy address belongs to the physical page:
[   21.054729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58
[   21.055452] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.056156] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.056807] page_type: f5(slab)
[   21.057119] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.057834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.058549] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.059271] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.059994] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff
[   21.060716] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.061431] page dumped because: kasan: bad access detected
[   21.061943] 
[   21.062096] Memory state around the buggy address:
[   21.062543]  ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.063208]  ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.063873] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.064534]                                                  ^
[   21.065073]  ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.065738]  ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.066400] ==================================================================
[   21.096023] ==================================================================
[   21.096676] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   21.097367] Write of size 1 at addr ffff00000dc594ea by task kunit_try_catch/212
[   21.098035] 
[   21.098184] CPU: 4 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.098216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.098224] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.098234] Call trace:
[   21.098241]  show_stack+0x20/0x38 (C)
[   21.098260]  dump_stack_lvl+0x8c/0xd0
[   21.098278]  print_report+0x118/0x608
[   21.098296]  kasan_report+0xdc/0x128
[   21.098314]  __asan_report_store1_noabort+0x20/0x30
[   21.098336]  krealloc_less_oob_helper+0xae4/0xc50
[   21.098359]  krealloc_less_oob+0x20/0x38
[   21.098381]  kunit_try_run_case+0x170/0x3f0
[   21.098403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.098428]  kthread+0x328/0x630
[   21.098450]  ret_from_fork+0x10/0x20
[   21.098470] 
[   21.104398] Allocated by task 212:
[   21.104712]  kasan_save_stack+0x3c/0x68
[   21.105072]  kasan_save_track+0x20/0x40
[   21.105431]  kasan_save_alloc_info+0x40/0x58
[   21.105829]  __kasan_krealloc+0x118/0x178
[   21.106203]  krealloc_noprof+0x128/0x360
[   21.106567]  krealloc_less_oob_helper+0x168/0xc50
[   21.107005]  krealloc_less_oob+0x20/0x38
[   21.107375]  kunit_try_run_case+0x170/0x3f0
[   21.107767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.108274]  kthread+0x328/0x630
[   21.108584]  ret_from_fork+0x10/0x20
[   21.108921] 
[   21.109066] The buggy address belongs to the object at ffff00000dc59400
[   21.109066]  which belongs to the cache kmalloc-256 of size 256
[   21.110182] The buggy address is located 33 bytes to the right of
[   21.110182]  allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9)
[   21.111345] 
[   21.111491] The buggy address belongs to the physical page:
[   21.111993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58
[   21.112700] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.113389] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.114021] page_type: f5(slab)
[   21.114319] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.115018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.115717] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.116424] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.117131] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff
[   21.117836] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.118536] page dumped because: kasan: bad access detected
[   21.119040] 
[   21.119185] Memory state around the buggy address:
[   21.119620]  ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.120271]  ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.120921] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.121570]                                                           ^
[   21.122167]  ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.122818]  ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.123466] ==================================================================
[   21.008896] ==================================================================
[   21.009937] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   21.010658] Write of size 1 at addr ffff00000dc594c9 by task kunit_try_catch/212
[   21.011342] 
[   21.011505] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.011553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.011567] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.011583] Call trace:
[   21.011594]  show_stack+0x20/0x38 (C)
[   21.011626]  dump_stack_lvl+0x8c/0xd0
[   21.011657]  print_report+0x118/0x608
[   21.011686]  kasan_report+0xdc/0x128
[   21.011713]  __asan_report_store1_noabort+0x20/0x30
[   21.011747]  krealloc_less_oob_helper+0xa48/0xc50
[   21.011783]  krealloc_less_oob+0x20/0x38
[   21.011816]  kunit_try_run_case+0x170/0x3f0
[   21.011850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.011889]  kthread+0x328/0x630
[   21.011922]  ret_from_fork+0x10/0x20
[   21.011954] 
[   21.017936] Allocated by task 212:
[   21.018261]  kasan_save_stack+0x3c/0x68
[   21.018634]  kasan_save_track+0x20/0x40
[   21.019005]  kasan_save_alloc_info+0x40/0x58
[   21.019417]  __kasan_krealloc+0x118/0x178
[   21.019804]  krealloc_noprof+0x128/0x360
[   21.020183]  krealloc_less_oob_helper+0x168/0xc50
[   21.020637]  krealloc_less_oob+0x20/0x38
[   21.021021]  kunit_try_run_case+0x170/0x3f0
[   21.021426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.021950]  kthread+0x328/0x630
[   21.022273]  ret_from_fork+0x10/0x20
[   21.022623] 
[   21.022776] The buggy address belongs to the object at ffff00000dc59400
[   21.022776]  which belongs to the cache kmalloc-256 of size 256
[   21.023907] The buggy address is located 0 bytes to the right of
[   21.023907]  allocated 201-byte region [ffff00000dc59400, ffff00000dc594c9)
[   21.025079] 
[   21.025233] The buggy address belongs to the physical page:
[   21.025750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdc58
[   21.026473] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.027178] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.027831] page_type: f5(slab)
[   21.028145] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.028860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.029575] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   21.030297] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.031020] head: 03fffe0000000001 fffffdffc0371601 00000000ffffffff 00000000ffffffff
[   21.031742] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.032457] page dumped because: kasan: bad access detected
[   21.032972] 
[   21.033124] Memory state around the buggy address:
[   21.033572]  ffff00000dc59380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034237]  ffff00000dc59400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.034902] >ffff00000dc59480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.035563]                                               ^
[   21.036081]  ffff00000dc59500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.036746]  ffff00000dc59580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.037407] ==================================================================
[   21.291373] ==================================================================
[   21.292027] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   21.292716] Write of size 1 at addr ffff00000def60eb by task kunit_try_catch/216
[   21.293385] 
[   21.293534] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.293565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.293574] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.293583] Call trace:
[   21.293590]  show_stack+0x20/0x38 (C)
[   21.293610]  dump_stack_lvl+0x8c/0xd0
[   21.293628]  print_report+0x118/0x608
[   21.293646]  kasan_report+0xdc/0x128
[   21.293664]  __asan_report_store1_noabort+0x20/0x30
[   21.293686]  krealloc_less_oob_helper+0xa58/0xc50
[   21.293709]  krealloc_large_less_oob+0x20/0x38
[   21.293732]  kunit_try_run_case+0x170/0x3f0
[   21.293754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.293780]  kthread+0x328/0x630
[   21.293802]  ret_from_fork+0x10/0x20
[   21.293821] 
[   21.299792] The buggy address belongs to the physical page:
[   21.300296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   21.301002] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.301692] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.302323] page_type: f8(unknown)
[   21.302643] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.303342] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.304040] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.304746] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.305453] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   21.306158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.306860] page dumped because: kasan: bad access detected
[   21.307363] 
[   21.307508] Memory state around the buggy address:
[   21.307944]  ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.308596]  ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.309247] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.309895]                                                           ^
[   21.310492]  ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.311142]  ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.311791] ==================================================================
[   21.227232] ==================================================================
[   21.227894] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   21.228594] Write of size 1 at addr ffff00000def60d0 by task kunit_try_catch/216
[   21.229265] 
[   21.229419] CPU: 2 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.229453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.229463] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.229476] Call trace:
[   21.229484]  show_stack+0x20/0x38 (C)
[   21.229507]  dump_stack_lvl+0x8c/0xd0
[   21.229529]  print_report+0x118/0x608
[   21.229550]  kasan_report+0xdc/0x128
[   21.229569]  __asan_report_store1_noabort+0x20/0x30
[   21.229594]  krealloc_less_oob_helper+0xb9c/0xc50
[   21.229619]  krealloc_large_less_oob+0x20/0x38
[   21.229644]  kunit_try_run_case+0x170/0x3f0
[   21.229669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.229697]  kthread+0x328/0x630
[   21.229722]  ret_from_fork+0x10/0x20
[   21.229745] 
[   21.235732] The buggy address belongs to the physical page:
[   21.236238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   21.236948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.237641] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.238278] page_type: f8(unknown)
[   21.238601] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.239302] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.240004] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.240712] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.241422] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   21.242132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.242835] page dumped because: kasan: bad access detected
[   21.243341] 
[   21.243486] Memory state around the buggy address:
[   21.243924]  ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.244577]  ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.245231] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.245882]                                                  ^
[   21.246411]  ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.247064]  ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.247714] ==================================================================
[   21.205424] ==================================================================
[   21.206504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   21.207217] Write of size 1 at addr ffff00000def60c9 by task kunit_try_catch/216
[   21.207889] 
[   21.208046] CPU: 2 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.208082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.208092] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.208104] Call trace:
[   21.208113]  show_stack+0x20/0x38 (C)
[   21.208137]  dump_stack_lvl+0x8c/0xd0
[   21.208160]  print_report+0x118/0x608
[   21.208181]  kasan_report+0xdc/0x128
[   21.208201]  __asan_report_store1_noabort+0x20/0x30
[   21.208226]  krealloc_less_oob_helper+0xa48/0xc50
[   21.208251]  krealloc_large_less_oob+0x20/0x38
[   21.208276]  kunit_try_run_case+0x170/0x3f0
[   21.208302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.208330]  kthread+0x328/0x630
[   21.208355]  ret_from_fork+0x10/0x20
[   21.208379] 
[   21.214365] The buggy address belongs to the physical page:
[   21.214872] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   21.215583] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.216277] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.216914] page_type: f8(unknown)
[   21.217238] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.217941] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.218643] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.219352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.220062] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   21.220772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.221476] page dumped because: kasan: bad access detected
[   21.221982] 
[   21.222128] Memory state around the buggy address:
[   21.222567]  ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.223221]  ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.223875] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.224526]                                               ^
[   21.225034]  ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.225687]  ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.226337] ==================================================================
[   21.270138] ==================================================================
[   21.270790] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   21.271480] Write of size 1 at addr ffff00000def60ea by task kunit_try_catch/216
[   21.272149] 
[   21.272297] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.272329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.272337] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.272347] Call trace:
[   21.272354]  show_stack+0x20/0x38 (C)
[   21.272373]  dump_stack_lvl+0x8c/0xd0
[   21.272392]  print_report+0x118/0x608
[   21.272410]  kasan_report+0xdc/0x128
[   21.272428]  __asan_report_store1_noabort+0x20/0x30
[   21.272450]  krealloc_less_oob_helper+0xae4/0xc50
[   21.272473]  krealloc_large_less_oob+0x20/0x38
[   21.272496]  kunit_try_run_case+0x170/0x3f0
[   21.272518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.272544]  kthread+0x328/0x630
[   21.272565]  ret_from_fork+0x10/0x20
[   21.272586] 
[   21.278561] The buggy address belongs to the physical page:
[   21.279064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xdef4
[   21.279773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.280463] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.281095] page_type: f8(unknown)
[   21.281415] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.282115] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.282814] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.283520] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.284226] head: 03fffe0000000002 fffffdffc037bd01 00000000ffffffff 00000000ffffffff
[   21.284932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.285634] page dumped because: kasan: bad access detected
[   21.286137] 
[   21.286282] Memory state around the buggy address:
[   21.286719]  ffff00000def5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.287370]  ffff00000def6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.288022] >ffff00000def6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.288671]                                                           ^
[   21.289269]  ffff00000def6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.289920]  ffff00000def6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.290568] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   20.946348] ==================================================================
[   20.947383] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   20.948105] Write of size 1 at addr ffff00000240faeb by task kunit_try_catch/210
[   20.948789] 
[   20.948954] CPU: 2 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.949002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.949015] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.949033] Call trace:
[   20.949044]  show_stack+0x20/0x38 (C)
[   20.949076]  dump_stack_lvl+0x8c/0xd0
[   20.949107]  print_report+0x118/0x608
[   20.949136]  kasan_report+0xdc/0x128
[   20.949164]  __asan_report_store1_noabort+0x20/0x30
[   20.949198]  krealloc_more_oob_helper+0x60c/0x678
[   20.949234]  krealloc_more_oob+0x20/0x38
[   20.949267]  kunit_try_run_case+0x170/0x3f0
[   20.949302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949340]  kthread+0x328/0x630
[   20.949374]  ret_from_fork+0x10/0x20
[   20.949407] 
[   20.955392] Allocated by task 210:
[   20.955722]  kasan_save_stack+0x3c/0x68
[   20.956096]  kasan_save_track+0x20/0x40
[   20.956468]  kasan_save_alloc_info+0x40/0x58
[   20.956880]  __kasan_krealloc+0x118/0x178
[   20.957267]  krealloc_noprof+0x128/0x360
[   20.957648]  krealloc_more_oob_helper+0x168/0x678
[   20.958102]  krealloc_more_oob+0x20/0x38
[   20.958486]  kunit_try_run_case+0x170/0x3f0
[   20.958892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.959416]  kthread+0x328/0x630
[   20.959739]  ret_from_fork+0x10/0x20
[   20.960090] 
[   20.960243] The buggy address belongs to the object at ffff00000240fa00
[   20.960243]  which belongs to the cache kmalloc-256 of size 256
[   20.961376] The buggy address is located 0 bytes to the right of
[   20.961376]  allocated 235-byte region [ffff00000240fa00, ffff00000240faeb)
[   20.962549] 
[   20.962704] The buggy address belongs to the physical page:
[   20.963220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x240e
[   20.963945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.964650] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.965301] page_type: f5(slab)
[   20.965615] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.966330] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.967046] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.967768] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.968491] head: 03fffe0000000001 fffffdffc0090381 00000000ffffffff 00000000ffffffff
[   20.969213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.969928] page dumped because: kasan: bad access detected
[   20.970443] 
[   20.970595] Memory state around the buggy address:
[   20.971044]  ffff00000240f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.971708]  ffff00000240fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.972373] >ffff00000240fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.973034]                                                           ^
[   20.973643]  ffff00000240fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.974308]  ffff00000240fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.974969] ==================================================================
[   20.976293] ==================================================================
[   20.976969] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   20.977674] Write of size 1 at addr ffff00000240faf0 by task kunit_try_catch/210
[   20.978347] 
[   20.978501] CPU: 4 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.978537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.978547] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.978558] Call trace:
[   20.978567]  show_stack+0x20/0x38 (C)
[   20.978590]  dump_stack_lvl+0x8c/0xd0
[   20.978610]  print_report+0x118/0x608
[   20.978629]  kasan_report+0xdc/0x128
[   20.978647]  __asan_report_store1_noabort+0x20/0x30
[   20.978670]  krealloc_more_oob_helper+0x5c0/0x678
[   20.978693]  krealloc_more_oob+0x20/0x38
[   20.978715]  kunit_try_run_case+0x170/0x3f0
[   20.978738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.978763]  kthread+0x328/0x630
[   20.978785]  ret_from_fork+0x10/0x20
[   20.978806] 
[   20.984739] Allocated by task 210:
[   20.985055]  kasan_save_stack+0x3c/0x68
[   20.985416]  kasan_save_track+0x20/0x40
[   20.985774]  kasan_save_alloc_info+0x40/0x58
[   20.986172]  __kasan_krealloc+0x118/0x178
[   20.986546]  krealloc_noprof+0x128/0x360
[   20.986913]  krealloc_more_oob_helper+0x168/0x678
[   20.987351]  krealloc_more_oob+0x20/0x38
[   20.987721]  kunit_try_run_case+0x170/0x3f0
[   20.988112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.988620]  kthread+0x328/0x630
[   20.988928]  ret_from_fork+0x10/0x20
[   20.989265] 
[   20.989410] The buggy address belongs to the object at ffff00000240fa00
[   20.989410]  which belongs to the cache kmalloc-256 of size 256
[   20.990528] The buggy address is located 5 bytes to the right of
[   20.990528]  allocated 235-byte region [ffff00000240fa00, ffff00000240faeb)
[   20.991685] 
[   20.991831] The buggy address belongs to the physical page:
[   20.992336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x240e
[   20.993044] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.993734] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.994370] page_type: f5(slab)
[   20.994669] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.995368] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.996068] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   20.996773] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.997479] head: 03fffe0000000001 fffffdffc0090381 00000000ffffffff 00000000ffffffff
[   20.998185] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.998886] page dumped because: kasan: bad access detected
[   20.999388] 
[   20.999533] Memory state around the buggy address:
[   20.999971]  ffff00000240f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.000623]  ffff00000240fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.001274] >ffff00000240fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   21.001923]                                                              ^
[   21.002544]  ffff00000240fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.003194]  ffff00000240fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.003842] ==================================================================
[   21.180096] ==================================================================
[   21.180790] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   21.181536] Write of size 1 at addr ffff00000d7360f0 by task kunit_try_catch/214
[   21.182250] 
[   21.182432] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.182509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.182532] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.182559] Call trace:
[   21.182577]  show_stack+0x20/0x38 (C)
[   21.182626]  dump_stack_lvl+0x8c/0xd0
[   21.182675]  print_report+0x118/0x608
[   21.182723]  kasan_report+0xdc/0x128
[   21.182769]  __asan_report_store1_noabort+0x20/0x30
[   21.182825]  krealloc_more_oob_helper+0x5c0/0x678
[   21.182885]  krealloc_large_more_oob+0x20/0x38
[   21.182943]  kunit_try_run_case+0x170/0x3f0
[   21.182999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.183064]  kthread+0x328/0x630
[   21.183118]  ret_from_fork+0x10/0x20
[   21.183170] 
[   21.189314] The buggy address belongs to the physical page:
[   21.189850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734
[   21.190603] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.191336] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.192017] page_type: f8(unknown)
[   21.192377] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.193122] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.193869] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.194622] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.195376] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff
[   21.196129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.196870] page dumped because: kasan: bad access detected
[   21.197405] 
[   21.197573] Memory state around the buggy address:
[   21.198042]  ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.198735]  ffff00000d736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.199427] >ffff00000d736080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.200113]                                                              ^
[   21.200770]  ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.201462]  ffff00000d736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.202148] ==================================================================
[   21.156729] ==================================================================
[   21.157821] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   21.158582] Write of size 1 at addr ffff00000d7360eb by task kunit_try_catch/214
[   21.159296] 
[   21.159481] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.159559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.159582] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.159609] Call trace:
[   21.159627]  show_stack+0x20/0x38 (C)
[   21.159680]  dump_stack_lvl+0x8c/0xd0
[   21.159730]  print_report+0x118/0x608
[   21.159778]  kasan_report+0xdc/0x128
[   21.159826]  __asan_report_store1_noabort+0x20/0x30
[   21.159882]  krealloc_more_oob_helper+0x60c/0x678
[   21.159943]  krealloc_large_more_oob+0x20/0x38
[   21.160002]  kunit_try_run_case+0x170/0x3f0
[   21.160059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.160123]  kthread+0x328/0x630
[   21.160179]  ret_from_fork+0x10/0x20
[   21.160232] 
[   21.166379] The buggy address belongs to the physical page:
[   21.166916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd734
[   21.167670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.168403] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.169085] page_type: f8(unknown)
[   21.169448] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.170194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.170941] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.171694] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.172449] head: 03fffe0000000002 fffffdffc035cd01 00000000ffffffff 00000000ffffffff
[   21.173203] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.173944] page dumped because: kasan: bad access detected
[   21.174479] 
[   21.174648] Memory state around the buggy address:
[   21.175117]  ffff00000d735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.175810]  ffff00000d736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.176503] >ffff00000d736080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.177188]                                                           ^
[   21.177823]  ffff00000d736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.178515]  ffff00000d736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.179201] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   20.925672] ==================================================================
[   20.927057] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   20.927681] Read of size 1 at addr ffff00000fe90000 by task kunit_try_catch/208
[   20.928360] 
[   20.928525] CPU: 3 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.928574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.928588] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.928605] Call trace:
[   20.928617]  show_stack+0x20/0x38 (C)
[   20.928649]  dump_stack_lvl+0x8c/0xd0
[   20.928680]  print_report+0x118/0x608
[   20.928709]  kasan_report+0xdc/0x128
[   20.928737]  __asan_report_load1_noabort+0x20/0x30
[   20.928771]  page_alloc_uaf+0x328/0x350
[   20.928804]  kunit_try_run_case+0x170/0x3f0
[   20.928839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.928878]  kthread+0x328/0x630
[   20.928912]  ret_from_fork+0x10/0x20
[   20.928945] 
[   20.934499] The buggy address belongs to the physical page:
[   20.935015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfe90
[   20.935738] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.936349] page_type: f0(buddy)
[   20.936670] raw: 03fffe0000000000 ffff0000f75f2620 ffff0000f75f2620 0000000000000000
[   20.937385] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   20.938093] page dumped because: kasan: bad access detected
[   20.938608] 
[   20.938760] Memory state around the buggy address:
[   20.939208]  ffff00000fe8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.939873]  ffff00000fe8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.940539] >ffff00000fe90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.941200]                    ^
[   20.941510]  ffff00000fe90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.942176]  ffff00000fe90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.942837] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   20.824272] ==================================================================
[   20.825454] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   20.826152] Write of size 1 at addr ffff00000d77df00 by task kunit_try_catch/198
[   20.826837] 
[   20.827002] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.827051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.827065] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.827082] Call trace:
[   20.827094]  show_stack+0x20/0x38 (C)
[   20.827128]  dump_stack_lvl+0x8c/0xd0
[   20.827159]  print_report+0x118/0x608
[   20.827189]  kasan_report+0xdc/0x128
[   20.827217]  __asan_report_store1_noabort+0x20/0x30
[   20.827251]  kmalloc_big_oob_right+0x2a4/0x2f0
[   20.827285]  kunit_try_run_case+0x170/0x3f0
[   20.827320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.827358]  kthread+0x328/0x630
[   20.827392]  ret_from_fork+0x10/0x20
[   20.827425] 
[   20.833036] Allocated by task 198:
[   20.833362]  kasan_save_stack+0x3c/0x68
[   20.833735]  kasan_save_track+0x20/0x40
[   20.834107]  kasan_save_alloc_info+0x40/0x58
[   20.834519]  __kasan_kmalloc+0xd4/0xd8
[   20.834882]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.835323]  kmalloc_big_oob_right+0xb8/0x2f0
[   20.835745]  kunit_try_run_case+0x170/0x3f0
[   20.836151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.836674]  kthread+0x328/0x630
[   20.836997]  ret_from_fork+0x10/0x20
[   20.837347] 
[   20.837500] The buggy address belongs to the object at ffff00000d77c000
[   20.837500]  which belongs to the cache kmalloc-8k of size 8192
[   20.838632] The buggy address is located 0 bytes to the right of
[   20.838632]  allocated 7936-byte region [ffff00000d77c000, ffff00000d77df00)
[   20.839812] 
[   20.839966] The buggy address belongs to the physical page:
[   20.840482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd778
[   20.841205] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.841910] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.842562] page_type: f5(slab)
[   20.842876] raw: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000
[   20.843591] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   20.844306] head: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000
[   20.845029] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   20.845752] head: 03fffe0000000003 fffffdffc035de01 00000000ffffffff 00000000ffffffff
[   20.846474] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.847189] page dumped because: kasan: bad access detected
[   20.847703] 
[   20.847855] Memory state around the buggy address:
[   20.848302]  ffff00000d77de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.848968]  ffff00000d77de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.849633] >ffff00000d77df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850294]                    ^
[   20.850605]  ffff00000d77df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.851270]  ffff00000d77e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.851931] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   20.779804] ==================================================================
[   20.780889] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.781656] Write of size 1 at addr ffff00000ea7e578 by task kunit_try_catch/196
[   20.782344] 
[   20.782509] CPU: 3 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.782558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.782572] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.782590] Call trace:
[   20.782601]  show_stack+0x20/0x38 (C)
[   20.782634]  dump_stack_lvl+0x8c/0xd0
[   20.782665]  print_report+0x118/0x608
[   20.782695]  kasan_report+0xdc/0x128
[   20.782722]  __asan_report_store1_noabort+0x20/0x30
[   20.782755]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.782793]  kunit_try_run_case+0x170/0x3f0
[   20.782829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.782868]  kthread+0x328/0x630
[   20.782902]  ret_from_fork+0x10/0x20
[   20.782935] 
[   20.788614] Allocated by task 196:
[   20.788940]  kasan_save_stack+0x3c/0x68
[   20.789313]  kasan_save_track+0x20/0x40
[   20.789685]  kasan_save_alloc_info+0x40/0x58
[   20.790099]  __kasan_kmalloc+0xd4/0xd8
[   20.790465]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   20.790994]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.791487]  kunit_try_run_case+0x170/0x3f0
[   20.791896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.792420]  kthread+0x328/0x630
[   20.792744]  ret_from_fork+0x10/0x20
[   20.793094] 
[   20.793247] The buggy address belongs to the object at ffff00000ea7e500
[   20.793247]  which belongs to the cache kmalloc-128 of size 128
[   20.794380] The buggy address is located 0 bytes to the right of
[   20.794380]  allocated 120-byte region [ffff00000ea7e500, ffff00000ea7e578)
[   20.795554] 
[   20.795708] The buggy address belongs to the physical page:
[   20.796224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea7e
[   20.796949] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.797560] page_type: f5(slab)
[   20.797875] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.798591] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.799298] page dumped because: kasan: bad access detected
[   20.799813] 
[   20.799965] Memory state around the buggy address:
[   20.800413]  ffff00000ea7e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.801079]  ffff00000ea7e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.801744] >ffff00000ea7e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.802406]                                                                 ^
[   20.803062]  ffff00000ea7e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.803728]  ffff00000ea7e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.804390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   20.748153] ==================================================================
[   20.749196] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   20.749903] Read of size 1 at addr ffff00000f447000 by task kunit_try_catch/194
[   20.750584] 
[   20.750752] CPU: 3 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.750803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.750817] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.750835] Call trace:
[   20.750847]  show_stack+0x20/0x38 (C)
[   20.750883]  dump_stack_lvl+0x8c/0xd0
[   20.750915]  print_report+0x118/0x608
[   20.750944]  kasan_report+0xdc/0x128
[   20.750972]  __asan_report_load1_noabort+0x20/0x30
[   20.751005]  kmalloc_node_oob_right+0x2f4/0x330
[   20.751042]  kunit_try_run_case+0x170/0x3f0
[   20.751077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.751116]  kthread+0x328/0x630
[   20.751150]  ret_from_fork+0x10/0x20
[   20.751183] 
[   20.756796] Allocated by task 194:
[   20.757121]  kasan_save_stack+0x3c/0x68
[   20.757494]  kasan_save_track+0x20/0x40
[   20.757866]  kasan_save_alloc_info+0x40/0x58
[   20.758280]  __kasan_kmalloc+0xd4/0xd8
[   20.758643]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   20.759116]  kmalloc_node_oob_right+0xbc/0x330
[   20.759547]  kunit_try_run_case+0x170/0x3f0
[   20.759954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.760479]  kthread+0x328/0x630
[   20.760803]  ret_from_fork+0x10/0x20
[   20.761153] 
[   20.761306] The buggy address belongs to the object at ffff00000f446000
[   20.761306]  which belongs to the cache kmalloc-4k of size 4096
[   20.762439] The buggy address is located 0 bytes to the right of
[   20.762439]  allocated 4096-byte region [ffff00000f446000, ffff00000f447000)
[   20.763620] 
[   20.763774] The buggy address belongs to the physical page:
[   20.764291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf440
[   20.765015] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.765720] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.766371] page_type: f5(slab)
[   20.766683] raw: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000
[   20.767398] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.768114] head: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000
[   20.768836] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.769559] head: 03fffe0000000003 fffffdffc03d1001 00000000ffffffff 00000000ffffffff
[   20.770282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.770996] page dumped because: kasan: bad access detected
[   20.771511] 
[   20.771663] Memory state around the buggy address:
[   20.772111]  ffff00000f446f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.772777]  ffff00000f446f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.773443] >ffff00000f447000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774104]                    ^
[   20.774414]  ffff00000f447080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.775079]  ffff00000f447100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.775740] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   20.704598] ==================================================================
[   20.705648] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   20.706313] Read of size 1 at addr ffff0000025a2dff by task kunit_try_catch/192
[   20.706992] 
[   20.707158] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.707208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.707222] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.707238] Call trace:
[   20.707251]  show_stack+0x20/0x38 (C)
[   20.707285]  dump_stack_lvl+0x8c/0xd0
[   20.707316]  print_report+0x118/0x608
[   20.707347]  kasan_report+0xdc/0x128
[   20.707374]  __asan_report_load1_noabort+0x20/0x30
[   20.707408]  kmalloc_oob_left+0x2ec/0x320
[   20.707441]  kunit_try_run_case+0x170/0x3f0
[   20.707476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.707515]  kthread+0x328/0x630
[   20.707549]  ret_from_fork+0x10/0x20
[   20.707581] 
[   20.713149] Allocated by task 11:
[   20.713468]  kasan_save_stack+0x3c/0x68
[   20.713840]  kasan_save_track+0x20/0x40
[   20.714211]  kasan_save_alloc_info+0x40/0x58
[   20.714623]  __kasan_kmalloc+0xd4/0xd8
[   20.714986]  __kmalloc_noprof+0x190/0x4d0
[   20.715373]  usb_hcd_submit_urb+0x444/0x1a58
[   20.715789]  usb_submit_urb+0x564/0x1198
[   20.716170]  usb_start_wait_urb+0x120/0x3e8
[   20.716574]  usb_control_msg+0x2b4/0x3e0
[   20.716957]  hub_ext_port_status+0x114/0x580
[   20.717374]  hub_activate+0x2a4/0x1340
[   20.717736]  hub_resume+0xa8/0x380
[   20.718068]  usb_resume_interface.isra.0+0x1f8/0x348
[   20.718545]  usb_suspend_both+0x250/0x6f0
[   20.718936]  usb_runtime_suspend+0x3c/0xf8
[   20.719334]  __rpm_callback+0xa0/0x470
[   20.719701]  rpm_callback+0x168/0x1b0
[   20.720058]  rpm_suspend+0x1bc/0xcd8
[   20.720406]  __pm_runtime_suspend+0x5c/0x1e8
[   20.720817]  usb_runtime_idle+0x48/0x68
[   20.721193]  rpm_idle+0x13c/0x708
[   20.721519]  pm_runtime_work+0x110/0x170
[   20.721899]  process_one_work+0x530/0xf98
[   20.722288]  worker_thread+0x8ac/0xf28
[   20.722650]  kthread+0x328/0x630
[   20.722972]  ret_from_fork+0x10/0x20
[   20.723322] 
[   20.723474] Freed by task 11:
[   20.723760]  kasan_save_stack+0x3c/0x68
[   20.724132]  kasan_save_track+0x20/0x40
[   20.724503]  kasan_save_free_info+0x4c/0x78
[   20.724907]  __kasan_slab_free+0x6c/0x98
[   20.725287]  kfree+0x214/0x3c8
[   20.725594]  usb_hcd_submit_urb+0x518/0x1a58
[   20.726007]  usb_submit_urb+0x564/0x1198
[   20.726387]  usb_start_wait_urb+0x120/0x3e8
[   20.726793]  usb_control_msg+0x2b4/0x3e0
[   20.727174]  hub_ext_port_status+0x114/0x580
[   20.727589]  hub_activate+0x2a4/0x1340
[   20.727951]  hub_resume+0xa8/0x380
[   20.728281]  usb_resume_interface.isra.0+0x1f8/0x348
[   20.728757]  usb_suspend_both+0x250/0x6f0
[   20.729148]  usb_runtime_suspend+0x3c/0xf8
[   20.729546]  __rpm_callback+0xa0/0x470
[   20.729911]  rpm_callback+0x168/0x1b0
[   20.730268]  rpm_suspend+0x1bc/0xcd8
[   20.730617]  __pm_runtime_suspend+0x5c/0x1e8
[   20.731028]  usb_runtime_idle+0x48/0x68
[   20.731404]  rpm_idle+0x13c/0x708
[   20.731730]  pm_runtime_work+0x110/0x170
[   20.732111]  process_one_work+0x530/0xf98
[   20.732498]  worker_thread+0x8ac/0xf28
[   20.732860]  kthread+0x328/0x630
[   20.733182]  ret_from_fork+0x10/0x20
[   20.733532] 
[   20.733684] The buggy address belongs to the object at ffff0000025a2de0
[   20.733684]  which belongs to the cache kmalloc-16 of size 16
[   20.734802] The buggy address is located 15 bytes to the right of
[   20.734802]  allocated 16-byte region [ffff0000025a2de0, ffff0000025a2df0)
[   20.735975] 
[   20.736129] The buggy address belongs to the physical page:
[   20.736646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x25a2
[   20.737370] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.737982] page_type: f5(slab)
[   20.738296] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   20.739011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.739718] page dumped because: kasan: bad access detected
[   20.740232] 
[   20.740384] Memory state around the buggy address:
[   20.740832]  ffff0000025a2c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.741498]  ffff0000025a2d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.742162] >ffff0000025a2d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.742823]                                                                 ^
[   20.743479]  ffff0000025a2e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.744144]  ffff0000025a2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.744805] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   20.628685] ==================================================================
[   20.629366] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   20.630026] Write of size 1 at addr ffff00000c9cff73 by task kunit_try_catch/190
[   20.630714] 
[   20.630880] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT 
[   20.630926] Tainted: [N]=TEST
[   20.630938] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.630955] Call trace:
[   20.630967]  show_stack+0x20/0x38 (C)
[   20.631001]  dump_stack_lvl+0x8c/0xd0
[   20.631033]  print_report+0x118/0x608
[   20.631062]  kasan_report+0xdc/0x128
[   20.631090]  __asan_report_store1_noabort+0x20/0x30
[   20.631125]  kmalloc_oob_right+0x5a4/0x660
[   20.631158]  kunit_try_run_case+0x170/0x3f0
[   20.631193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.631231]  kthread+0x328/0x630
[   20.631265]  ret_from_fork+0x10/0x20
[   20.631298] 
[   20.636776] Allocated by task 190:
[   20.637106]  kasan_save_stack+0x3c/0x68
[   20.637484]  kasan_save_track+0x20/0x40
[   20.637855]  kasan_save_alloc_info+0x40/0x58
[   20.638270]  __kasan_kmalloc+0xd4/0xd8
[   20.638632]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.639073]  kmalloc_oob_right+0xb0/0x660
[   20.639466]  kunit_try_run_case+0x170/0x3f0
[   20.639873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.640398]  kthread+0x328/0x630
[   20.640721]  ret_from_fork+0x10/0x20
[   20.641070] 
[   20.641224] The buggy address belongs to the object at ffff00000c9cff00
[   20.641224]  which belongs to the cache kmalloc-128 of size 128
[   20.642356] The buggy address is located 0 bytes to the right of
[   20.642356]  allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73)
[   20.643530] 
[   20.643683] The buggy address belongs to the physical page:
[   20.644200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf
[   20.644924] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.645535] page_type: f5(slab)
[   20.645849] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.646565] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.647272] page dumped because: kasan: bad access detected
[   20.647786] 
[   20.647938] Memory state around the buggy address:
[   20.648386]  ffff00000c9cfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.649052]  ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.649717] >ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.650377]                                                              ^
[   20.651010]  ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.651675]  ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.652336] ==================================================================
[   20.654402] ==================================================================
[   20.655057] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   20.655708] Write of size 1 at addr ffff00000c9cff78 by task kunit_try_catch/190
[   20.656381] 
[   20.656536] CPU: 4 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.656571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.656581] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.656593] Call trace:
[   20.656601]  show_stack+0x20/0x38 (C)
[   20.656625]  dump_stack_lvl+0x8c/0xd0
[   20.656645]  print_report+0x118/0x608
[   20.656664]  kasan_report+0xdc/0x128
[   20.656682]  __asan_report_store1_noabort+0x20/0x30
[   20.656704]  kmalloc_oob_right+0x538/0x660
[   20.656726]  kunit_try_run_case+0x170/0x3f0
[   20.656750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.656775]  kthread+0x328/0x630
[   20.656798]  ret_from_fork+0x10/0x20
[   20.656819] 
[   20.662350] Allocated by task 190:
[   20.662667]  kasan_save_stack+0x3c/0x68
[   20.663028]  kasan_save_track+0x20/0x40
[   20.663387]  kasan_save_alloc_info+0x40/0x58
[   20.663785]  __kasan_kmalloc+0xd4/0xd8
[   20.664136]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.664561]  kmalloc_oob_right+0xb0/0x660
[   20.664939]  kunit_try_run_case+0x170/0x3f0
[   20.665330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.665838]  kthread+0x328/0x630
[   20.666147]  ret_from_fork+0x10/0x20
[   20.666484] 
[   20.666630] The buggy address belongs to the object at ffff00000c9cff00
[   20.666630]  which belongs to the cache kmalloc-128 of size 128
[   20.667746] The buggy address is located 5 bytes to the right of
[   20.667746]  allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73)
[   20.668903] 
[   20.669049] The buggy address belongs to the physical page:
[   20.669553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf
[   20.670262] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.670859] page_type: f5(slab)
[   20.671158] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.671858] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.672552] page dumped because: kasan: bad access detected
[   20.673055] 
[   20.673200] Memory state around the buggy address:
[   20.673637]  ffff00000c9cfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.674289]  ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674941] >ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.675590]                                                                 ^
[   20.676233]  ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676884]  ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.677532] ==================================================================
[   20.678323] ==================================================================
[   20.678976] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   20.679613] Read of size 1 at addr ffff00000c9cff80 by task kunit_try_catch/190
[   20.680276] 
[   20.680425] CPU: 4 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.680457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.680466] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.680476] Call trace:
[   20.680483]  show_stack+0x20/0x38 (C)
[   20.680502]  dump_stack_lvl+0x8c/0xd0
[   20.680520]  print_report+0x118/0x608
[   20.680539]  kasan_report+0xdc/0x128
[   20.680557]  __asan_report_load1_noabort+0x20/0x30
[   20.680579]  kmalloc_oob_right+0x5d0/0x660
[   20.680600]  kunit_try_run_case+0x170/0x3f0
[   20.680623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.680648]  kthread+0x328/0x630
[   20.680669]  ret_from_fork+0x10/0x20
[   20.680688] 
[   20.686211] Allocated by task 190:
[   20.686525]  kasan_save_stack+0x3c/0x68
[   20.686884]  kasan_save_track+0x20/0x40
[   20.687242]  kasan_save_alloc_info+0x40/0x58
[   20.687639]  __kasan_kmalloc+0xd4/0xd8
[   20.687989]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.688414]  kmalloc_oob_right+0xb0/0x660
[   20.688790]  kunit_try_run_case+0x170/0x3f0
[   20.689182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.689689]  kthread+0x328/0x630
[   20.689998]  ret_from_fork+0x10/0x20
[   20.690335] 
[   20.690480] The buggy address belongs to the object at ffff00000c9cff00
[   20.690480]  which belongs to the cache kmalloc-128 of size 128
[   20.691595] The buggy address is located 13 bytes to the right of
[   20.691595]  allocated 115-byte region [ffff00000c9cff00, ffff00000c9cff73)
[   20.692758] 
[   20.692903] The buggy address belongs to the physical page:
[   20.693407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc9cf
[   20.694114] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.694707] page_type: f5(slab)
[   20.695004] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.695703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.696397] page dumped because: kasan: bad access detected
[   20.696901] 
[   20.697045] Memory state around the buggy address:
[   20.697482]  ffff00000c9cfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698134]  ffff00000c9cff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.698785] >ffff00000c9cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.699433]                    ^
[   20.699734]  ffff00000c9d0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.700385]  ffff00000c9d0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.701033] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   67.566809] WARNING: CPU: 5 PID: 711 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   67.567507] Modules linked in:
[   67.567807] CPU: 5 UID: 0 PID: 711 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT 
[   67.568707] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   67.569233] Hardware name: Radxa ROCK Pi 4B (DT)
[   67.569652] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   67.570282] pc : intlog10+0x38/0x48
[   67.570612] lr : intlog10_test+0xe4/0x200
[   67.570987] sp : ffff80008a907c10
[   67.571293] x29: ffff80008a907c90 x28: 0000000000000000 x27: 0000000000000000
[   67.571960] x26: 1fffe00001d23f61 x25: 0000000000000000 x24: ffff80008a907ce0
[   67.572625] x23: ffff80008a907d00 x22: 0000000000000000 x21: 1ffff00011520f82
[   67.573288] x20: ffff800083cc3840 x19: ffff800087cd7990 x18: 00000000e2331d29
[   67.573952] x17: 000000040044ffff x16: 00500074b5503510 x15: 0000000000000000
[   67.574614] x14: ffff000000f0e540 x13: ffff80004bbd3000 x12: ffff700010f61161
[   67.575277] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d60c
[   67.575939] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   67.576601] x5 : ffff700011520f82 x4 : 1ffff00010f9af3a x3 : 1ffff00010798708
[   67.577264] x2 : 1ffff00010798708 x1 : 0000000000000003 x0 : 0000000000000000
[   67.577926] Call trace:
[   67.578158]  intlog10+0x38/0x48 (P)
[   67.578495]  kunit_try_run_case+0x170/0x3f0
[   67.578890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.579401]  kthread+0x328/0x630
[   67.579715]  ret_from_fork+0x10/0x20
[   67.580058] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   67.528731] WARNING: CPU: 1 PID: 693 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   67.529418] Modules linked in:
[   67.529725] CPU: 1 UID: 0 PID: 693 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc3 #1 PREEMPT 
[   67.530631] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   67.531091] Hardware name: Radxa ROCK Pi 4B (DT)
[   67.531522] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   67.532167] pc : intlog2+0xd8/0xf8
[   67.532505] lr : intlog2_test+0xe4/0x200
[   67.532886] sp : ffff80008a937c10
[   67.533202] x29: ffff80008a937c90 x28: 0000000000000000 x27: 0000000000000000
[   67.533894] x26: 1fffe0000047dbc1 x25: 0000000000000000 x24: ffff80008a937ce0
[   67.534581] x23: ffff80008a937d00 x22: 0000000000000000 x21: 1ffff00011526f82
[   67.535268] x20: ffff800083cc3740 x19: ffff800087cd7990 x18: 000000006fe47e91
[   67.535956] x17: 000000040044ffff x16: 00500072b5503510 x15: 0000000000000000
[   67.536644] x14: ffff000000f09440 x13: ffff80004bb4b000 x12: ffff700010f61161
[   67.537331] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d80c
[   67.538019] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   67.538704] x5 : ffff700011526f82 x4 : 1ffff00010f9af3a x3 : 1ffff000107986e8
[   67.539390] x2 : 1ffff000107986e8 x1 : 0000000000000003 x0 : 0000000000000000
[   67.540075] Call trace:
[   67.540315]  intlog2+0xd8/0xf8 (P)
[   67.540658]  kunit_try_run_case+0x170/0x3f0
[   67.541070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.541597]  kthread+0x328/0x630
[   67.541928]  ret_from_fork+0x10/0x20
[   67.542287] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/uboot-action
(no logs available)
Failure - lava/uboot-commands
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
[   67.095965] Internal error: Oops: 0000000096000005 [#1]  SMP
[   67.096476] Modules linked in:
[   67.096770] CPU: 4 UID: 0 PID: 586 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   67.097661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.098038] Hardware name: Radxa ROCK Pi 4B (DT)
[   67.098455] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   67.099080] pc : kunit_test_null_dereference+0x70/0x170
[   67.099563] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.100096] sp : ffff80008a4e7d30
[   67.100399] x29: ffff80008a4e7d90 x28: 0000000000000000 x27: 0000000000000000
[   67.101057] x26: 1fffe000019378a1 x25: 0000000000000000 x24: 0000000000000004
[   67.101712] x23: ffff00000c9bc50c x22: ffff8000811fabe8 x21: ffff00001513ff08
[   67.102368] x20: 1ffff0001149cfa6 x19: ffff800087cd7990 x18: 00000000c730dc2d
[   67.103022] x17: ffff8000811f21d8 x16: ffff8000801f5e0c x15: ffff00000d6c6960
[   67.103677] x14: ffff8000808d3e34 x13: ffff800085ba7700 x12: ffff600001ad8dc4
[   67.104332] x11: 1fffe00001ad8dc3 x10: ffff600001ad8dc3 x9 : ffff8000811f2050
[   67.104986] x8 : ffff80008a4e7c38 x7 : 0000000000000000 x6 : 0000000041b58ab3
[   67.105641] x5 : ffff70001149cfa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   67.106294] x2 : dfff800000000000 x1 : ffff00000d6c6540 x0 : ffff800087cd7990
[   67.106948] Call trace:
[   67.107175]  kunit_test_null_dereference+0x70/0x170 (P)
[   67.107655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.108158]  kthread+0x328/0x630
[   67.108467]  ret_from_fork+0x10/0x20
[   67.108809] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   67.108847] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode.
[   67.109352] ---[ end trace 0000000000000000 ]---