Hay
Date
April 22, 2025, 11:09 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   22.154540] ==================================================================
[   22.155193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.155938] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.156599] 
[   22.156748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.156780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.156789] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.156800] Call trace:
[   22.156807]  show_stack+0x20/0x38 (C)
[   22.156827]  dump_stack_lvl+0x8c/0xd0
[   22.156846]  print_report+0x118/0x608
[   22.156865]  kasan_report+0xdc/0x128
[   22.156884]  __asan_report_load8_noabort+0x20/0x30
[   22.156906]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.156932]  kasan_bitops_generic+0x110/0x1c8
[   22.156951]  kunit_try_run_case+0x170/0x3f0
[   22.156973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.156999]  kthread+0x328/0x630
[   22.157020]  ret_from_fork+0x10/0x20
[   22.157041] 
[   22.163048] Allocated by task 319:
[   22.163363]  kasan_save_stack+0x3c/0x68
[   22.163724]  kasan_save_track+0x20/0x40
[   22.164082]  kasan_save_alloc_info+0x40/0x58
[   22.164481]  __kasan_kmalloc+0xd4/0xd8
[   22.164830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.165254]  kasan_bitops_generic+0xa0/0x1c8
[   22.165650]  kunit_try_run_case+0x170/0x3f0
[   22.166044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.166552]  kthread+0x328/0x630
[   22.166861]  ret_from_fork+0x10/0x20
[   22.167199] 
[   22.167345] The buggy address belongs to the object at ffff00000a7446c0
[   22.167345]  which belongs to the cache kmalloc-16 of size 16
[   22.168446] The buggy address is located 8 bytes inside of
[   22.168446]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.169541] 
[   22.169688] The buggy address belongs to the physical page:
[   22.170191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.170899] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.171493] page_type: f5(slab)
[   22.171791] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.172491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.173186] page dumped because: kasan: bad access detected
[   22.173690] 
[   22.173836] Memory state around the buggy address:
[   22.174274]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.174927]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.175579] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.176229]                                               ^
[   22.176735]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.177388]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.178038] ==================================================================
[   21.957544] ==================================================================
[   21.958221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.958998] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   21.959667] 
[   21.959824] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.959862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.959874] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.959887] Call trace:
[   21.959897]  show_stack+0x20/0x38 (C)
[   21.959921]  dump_stack_lvl+0x8c/0xd0
[   21.959945]  print_report+0x118/0x608
[   21.959967]  kasan_report+0xdc/0x128
[   21.959988]  __asan_report_load8_noabort+0x20/0x30
[   21.960012]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.960040]  kasan_bitops_generic+0x110/0x1c8
[   21.960061]  kunit_try_run_case+0x170/0x3f0
[   21.960088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.960118]  kthread+0x328/0x630
[   21.960143]  ret_from_fork+0x10/0x20
[   21.960168] 
[   21.966189] Allocated by task 319:
[   21.966507]  kasan_save_stack+0x3c/0x68
[   21.966869]  kasan_save_track+0x20/0x40
[   21.967231]  kasan_save_alloc_info+0x40/0x58
[   21.967633]  __kasan_kmalloc+0xd4/0xd8
[   21.967986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.968414]  kasan_bitops_generic+0xa0/0x1c8
[   21.968813]  kunit_try_run_case+0x170/0x3f0
[   21.969209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.969719]  kthread+0x328/0x630
[   21.970030]  ret_from_fork+0x10/0x20
[   21.970371] 
[   21.970518] The buggy address belongs to the object at ffff00000a7446c0
[   21.970518]  which belongs to the cache kmalloc-16 of size 16
[   21.971623] The buggy address is located 8 bytes inside of
[   21.971623]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   21.972721] 
[   21.972870] The buggy address belongs to the physical page:
[   21.973377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   21.974089] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.974689] page_type: f5(slab)
[   21.974993] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.975698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.976397] page dumped because: kasan: bad access detected
[   21.976903] 
[   21.977050] Memory state around the buggy address:
[   21.977489]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.978145]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   21.978800] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.979452]                                               ^
[   21.979961]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.980616]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.981269] ==================================================================
[   22.056343] ==================================================================
[   22.056999] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   22.057743] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.058414] 
[   22.058563] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.058597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.058606] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.058617] Call trace:
[   22.058625]  show_stack+0x20/0x38 (C)
[   22.058645]  dump_stack_lvl+0x8c/0xd0
[   22.058664]  print_report+0x118/0x608
[   22.058683]  kasan_report+0xdc/0x128
[   22.058701]  kasan_check_range+0x100/0x1a8
[   22.058722]  __kasan_check_write+0x20/0x30
[   22.058743]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   22.058769]  kasan_bitops_generic+0x110/0x1c8
[   22.058787]  kunit_try_run_case+0x170/0x3f0
[   22.058811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.058836]  kthread+0x328/0x630
[   22.058858]  ret_from_fork+0x10/0x20
[   22.058879] 
[   22.065191] Allocated by task 319:
[   22.065508]  kasan_save_stack+0x3c/0x68
[   22.065867]  kasan_save_track+0x20/0x40
[   22.066227]  kasan_save_alloc_info+0x40/0x58
[   22.066627]  __kasan_kmalloc+0xd4/0xd8
[   22.066978]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.067404]  kasan_bitops_generic+0xa0/0x1c8
[   22.067800]  kunit_try_run_case+0x170/0x3f0
[   22.068193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.068702]  kthread+0x328/0x630
[   22.069011]  ret_from_fork+0x10/0x20
[   22.069349] 
[   22.069495] The buggy address belongs to the object at ffff00000a7446c0
[   22.069495]  which belongs to the cache kmalloc-16 of size 16
[   22.070596] The buggy address is located 8 bytes inside of
[   22.070596]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.071693] 
[   22.071838] The buggy address belongs to the physical page:
[   22.072342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.073049] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.073644] page_type: f5(slab)
[   22.073941] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.074642] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.075336] page dumped because: kasan: bad access detected
[   22.075841] 
[   22.075986] Memory state around the buggy address:
[   22.076424]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.077075]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.077728] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.078377]                                               ^
[   22.078884]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.079536]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.080186] ==================================================================
[   22.031604] ==================================================================
[   22.032258] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   22.033004] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.033674] 
[   22.033823] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.033856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.033866] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.033877] Call trace:
[   22.033884]  show_stack+0x20/0x38 (C)
[   22.033905]  dump_stack_lvl+0x8c/0xd0
[   22.033924]  print_report+0x118/0x608
[   22.033942]  kasan_report+0xdc/0x128
[   22.033961]  kasan_check_range+0x100/0x1a8
[   22.033981]  __kasan_check_write+0x20/0x30
[   22.034003]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   22.034028]  kasan_bitops_generic+0x110/0x1c8
[   22.034047]  kunit_try_run_case+0x170/0x3f0
[   22.034069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034096]  kthread+0x328/0x630
[   22.034118]  ret_from_fork+0x10/0x20
[   22.034139] 
[   22.040450] Allocated by task 319:
[   22.040765]  kasan_save_stack+0x3c/0x68
[   22.041126]  kasan_save_track+0x20/0x40
[   22.041485]  kasan_save_alloc_info+0x40/0x58
[   22.041885]  __kasan_kmalloc+0xd4/0xd8
[   22.042235]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.042660]  kasan_bitops_generic+0xa0/0x1c8
[   22.043056]  kunit_try_run_case+0x170/0x3f0
[   22.043449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043958]  kthread+0x328/0x630
[   22.044267]  ret_from_fork+0x10/0x20
[   22.044604] 
[   22.044750] The buggy address belongs to the object at ffff00000a7446c0
[   22.044750]  which belongs to the cache kmalloc-16 of size 16
[   22.045852] The buggy address is located 8 bytes inside of
[   22.045852]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.046947] 
[   22.047093] The buggy address belongs to the physical page:
[   22.047596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.048304] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.048898] page_type: f5(slab)
[   22.049196] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.049896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.050592] page dumped because: kasan: bad access detected
[   22.051095] 
[   22.051241] Memory state around the buggy address:
[   22.051678]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.052330]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.052983] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.053632]                                               ^
[   22.054139]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.054791]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.055442] ==================================================================
[   21.982009] ==================================================================
[   21.982672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.983423] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   21.984095] 
[   21.984252] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.984287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.984298] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.984312] Call trace:
[   21.984320]  show_stack+0x20/0x38 (C)
[   21.984344]  dump_stack_lvl+0x8c/0xd0
[   21.984368]  print_report+0x118/0x608
[   21.984390]  kasan_report+0xdc/0x128
[   21.984410]  kasan_check_range+0x100/0x1a8
[   21.984432]  __kasan_check_write+0x20/0x30
[   21.984456]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.984484]  kasan_bitops_generic+0x110/0x1c8
[   21.984505]  kunit_try_run_case+0x170/0x3f0
[   21.984530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.984559]  kthread+0x328/0x630
[   21.984583]  ret_from_fork+0x10/0x20
[   21.984607] 
[   21.990925] Allocated by task 319:
[   21.991243]  kasan_save_stack+0x3c/0x68
[   21.991605]  kasan_save_track+0x20/0x40
[   21.991966]  kasan_save_alloc_info+0x40/0x58
[   21.992368]  __kasan_kmalloc+0xd4/0xd8
[   21.992720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.993148]  kasan_bitops_generic+0xa0/0x1c8
[   21.993547]  kunit_try_run_case+0x170/0x3f0
[   21.993942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.994453]  kthread+0x328/0x630
[   21.994764]  ret_from_fork+0x10/0x20
[   21.995103] 
[   21.995250] The buggy address belongs to the object at ffff00000a7446c0
[   21.995250]  which belongs to the cache kmalloc-16 of size 16
[   21.996353] The buggy address is located 8 bytes inside of
[   21.996353]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   21.997452] 
[   21.997600] The buggy address belongs to the physical page:
[   21.998108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   21.998819] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.999418] page_type: f5(slab)
[   21.999718] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.000422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.001119] page dumped because: kasan: bad access detected
[   22.001626] 
[   22.001773] Memory state around the buggy address:
[   22.002212]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.002867]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.003522] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.004175]                                               ^
[   22.004683]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.005338]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.005990] ==================================================================
[   21.931736] ==================================================================
[   21.932799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.933572] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   21.934260] 
[   21.934425] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.934476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.934492] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.934510] Call trace:
[   21.934523]  show_stack+0x20/0x38 (C)
[   21.934557]  dump_stack_lvl+0x8c/0xd0
[   21.934589]  print_report+0x118/0x608
[   21.934619]  kasan_report+0xdc/0x128
[   21.934648]  kasan_check_range+0x100/0x1a8
[   21.934680]  __kasan_check_write+0x20/0x30
[   21.934712]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.934752]  kasan_bitops_generic+0x110/0x1c8
[   21.934782]  kunit_try_run_case+0x170/0x3f0
[   21.934817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.934857]  kthread+0x328/0x630
[   21.934891]  ret_from_fork+0x10/0x20
[   21.934924] 
[   21.941297] Allocated by task 319:
[   21.941627]  kasan_save_stack+0x3c/0x68
[   21.942003]  kasan_save_track+0x20/0x40
[   21.942376]  kasan_save_alloc_info+0x40/0x58
[   21.942788]  __kasan_kmalloc+0xd4/0xd8
[   21.943153]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.943595]  kasan_bitops_generic+0xa0/0x1c8
[   21.944006]  kunit_try_run_case+0x170/0x3f0
[   21.944415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.944940]  kthread+0x328/0x630
[   21.945265]  ret_from_fork+0x10/0x20
[   21.945616] 
[   21.945772] The buggy address belongs to the object at ffff00000a7446c0
[   21.945772]  which belongs to the cache kmalloc-16 of size 16
[   21.946890] The buggy address is located 8 bytes inside of
[   21.946890]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   21.948003] 
[   21.948159] The buggy address belongs to the physical page:
[   21.948677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   21.949404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.950018] page_type: f5(slab)
[   21.950331] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.951048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.951757] page dumped because: kasan: bad access detected
[   21.952273] 
[   21.952427] Memory state around the buggy address:
[   21.952877]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.953545]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   21.954213] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.954877]                                               ^
[   21.955397]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956064]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956728] ==================================================================
[   22.105340] ==================================================================
[   22.105993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   22.106736] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.107407] 
[   22.107556] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.107588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.107598] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.107608] Call trace:
[   22.107616]  show_stack+0x20/0x38 (C)
[   22.107636]  dump_stack_lvl+0x8c/0xd0
[   22.107655]  print_report+0x118/0x608
[   22.107673]  kasan_report+0xdc/0x128
[   22.107692]  kasan_check_range+0x100/0x1a8
[   22.107712]  __kasan_check_write+0x20/0x30
[   22.107733]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   22.107759]  kasan_bitops_generic+0x110/0x1c8
[   22.107778]  kunit_try_run_case+0x170/0x3f0
[   22.107799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.107825]  kthread+0x328/0x630
[   22.107847]  ret_from_fork+0x10/0x20
[   22.107868] 
[   22.114177] Allocated by task 319:
[   22.114493]  kasan_save_stack+0x3c/0x68
[   22.114853]  kasan_save_track+0x20/0x40
[   22.115211]  kasan_save_alloc_info+0x40/0x58
[   22.115611]  __kasan_kmalloc+0xd4/0xd8
[   22.115962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.116387]  kasan_bitops_generic+0xa0/0x1c8
[   22.116784]  kunit_try_run_case+0x170/0x3f0
[   22.117177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.117685]  kthread+0x328/0x630
[   22.117993]  ret_from_fork+0x10/0x20
[   22.118330] 
[   22.118476] The buggy address belongs to the object at ffff00000a7446c0
[   22.118476]  which belongs to the cache kmalloc-16 of size 16
[   22.119577] The buggy address is located 8 bytes inside of
[   22.119577]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.120673] 
[   22.120819] The buggy address belongs to the physical page:
[   22.121323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.122030] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.122625] page_type: f5(slab)
[   22.122923] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.123624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.124319] page dumped because: kasan: bad access detected
[   22.124822] 
[   22.124968] Memory state around the buggy address:
[   22.125406]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.126058]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.126710] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.127360]                                               ^
[   22.127866]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128519]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.129168] ==================================================================
[   22.081066] ==================================================================
[   22.081723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   22.082469] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.083130] 
[   22.083279] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.083312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.083322] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.083332] Call trace:
[   22.083340]  show_stack+0x20/0x38 (C)
[   22.083360]  dump_stack_lvl+0x8c/0xd0
[   22.083381]  print_report+0x118/0x608
[   22.083399]  kasan_report+0xdc/0x128
[   22.083417]  __asan_report_load8_noabort+0x20/0x30
[   22.083439]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   22.083465]  kasan_bitops_generic+0x110/0x1c8
[   22.083484]  kunit_try_run_case+0x170/0x3f0
[   22.083507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.083533]  kthread+0x328/0x630
[   22.083554]  ret_from_fork+0x10/0x20
[   22.083576] 
[   22.089588] Allocated by task 319:
[   22.089904]  kasan_save_stack+0x3c/0x68
[   22.090262]  kasan_save_track+0x20/0x40
[   22.090620]  kasan_save_alloc_info+0x40/0x58
[   22.091018]  __kasan_kmalloc+0xd4/0xd8
[   22.091368]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.091794]  kasan_bitops_generic+0xa0/0x1c8
[   22.092189]  kunit_try_run_case+0x170/0x3f0
[   22.092582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.093091]  kthread+0x328/0x630
[   22.093400]  ret_from_fork+0x10/0x20
[   22.093737] 
[   22.093883] The buggy address belongs to the object at ffff00000a7446c0
[   22.093883]  which belongs to the cache kmalloc-16 of size 16
[   22.094984] The buggy address is located 8 bytes inside of
[   22.094984]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.096080] 
[   22.096226] The buggy address belongs to the physical page:
[   22.096729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.097437] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.098032] page_type: f5(slab)
[   22.098330] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.099031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.099725] page dumped because: kasan: bad access detected
[   22.100229] 
[   22.100375] Memory state around the buggy address:
[   22.100812]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.101464]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.102117] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.102766]                                               ^
[   22.103271]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.103924]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.104574] ==================================================================
[   22.007156] ==================================================================
[   22.007832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.008593] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.009258] 
[   22.009414] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.009452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.009463] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.009475] Call trace:
[   22.009484]  show_stack+0x20/0x38 (C)
[   22.009508]  dump_stack_lvl+0x8c/0xd0
[   22.009530]  print_report+0x118/0x608
[   22.009549]  kasan_report+0xdc/0x128
[   22.009568]  __asan_report_load8_noabort+0x20/0x30
[   22.009592]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.009618]  kasan_bitops_generic+0x110/0x1c8
[   22.009637]  kunit_try_run_case+0x170/0x3f0
[   22.009661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.009687]  kthread+0x328/0x630
[   22.009711]  ret_from_fork+0x10/0x20
[   22.009733] 
[   22.015743] Allocated by task 319:
[   22.016061]  kasan_save_stack+0x3c/0x68
[   22.016423]  kasan_save_track+0x20/0x40
[   22.016782]  kasan_save_alloc_info+0x40/0x58
[   22.017181]  __kasan_kmalloc+0xd4/0xd8
[   22.017533]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.017959]  kasan_bitops_generic+0xa0/0x1c8
[   22.018356]  kunit_try_run_case+0x170/0x3f0
[   22.018747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.019255]  kthread+0x328/0x630
[   22.019563]  ret_from_fork+0x10/0x20
[   22.019902] 
[   22.020047] The buggy address belongs to the object at ffff00000a7446c0
[   22.020047]  which belongs to the cache kmalloc-16 of size 16
[   22.021149] The buggy address is located 8 bytes inside of
[   22.021149]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.022247] 
[   22.022395] The buggy address belongs to the physical page:
[   22.022900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.023613] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.024211] page_type: f5(slab)
[   22.024512] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.025215] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.025909] page dumped because: kasan: bad access detected
[   22.026414] 
[   22.026559] Memory state around the buggy address:
[   22.026996]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.027649]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.028303] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.028951]                                               ^
[   22.029458]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.030110]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.030760] ==================================================================
[   22.129931] ==================================================================
[   22.130585] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.131329] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.131999] 
[   22.132148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.132180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.132190] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.132200] Call trace:
[   22.132208]  show_stack+0x20/0x38 (C)
[   22.132227]  dump_stack_lvl+0x8c/0xd0
[   22.132246]  print_report+0x118/0x608
[   22.132265]  kasan_report+0xdc/0x128
[   22.132284]  kasan_check_range+0x100/0x1a8
[   22.132304]  __kasan_check_write+0x20/0x30
[   22.132325]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.132351]  kasan_bitops_generic+0x110/0x1c8
[   22.132370]  kunit_try_run_case+0x170/0x3f0
[   22.132392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.132418]  kthread+0x328/0x630
[   22.132440]  ret_from_fork+0x10/0x20
[   22.132460] 
[   22.138770] Allocated by task 319:
[   22.139084]  kasan_save_stack+0x3c/0x68
[   22.139442]  kasan_save_track+0x20/0x40
[   22.139801]  kasan_save_alloc_info+0x40/0x58
[   22.140200]  __kasan_kmalloc+0xd4/0xd8
[   22.140550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.140975]  kasan_bitops_generic+0xa0/0x1c8
[   22.141370]  kunit_try_run_case+0x170/0x3f0
[   22.141762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.142271]  kthread+0x328/0x630
[   22.142579]  ret_from_fork+0x10/0x20
[   22.142917] 
[   22.143063] The buggy address belongs to the object at ffff00000a7446c0
[   22.143063]  which belongs to the cache kmalloc-16 of size 16
[   22.144164] The buggy address is located 8 bytes inside of
[   22.144164]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.145259] 
[   22.145405] The buggy address belongs to the physical page:
[   22.145909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.146617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.147211] page_type: f5(slab)
[   22.147508] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.148208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.148903] page dumped because: kasan: bad access detected
[   22.149407] 
[   22.149554] Memory state around the buggy address:
[   22.149990]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.150642]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.151294] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.151944]                                               ^
[   22.152451]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.153104]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.153753] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   56.265833] ==================================================================
[   56.266502] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   56.266502] 
[   56.267251] Use-after-free read at 0x(____ptrval____) (in kfence-#175):
[   56.267842]  test_krealloc+0x51c/0x830
[   56.268184]  kunit_try_run_case+0x170/0x3f0
[   56.268570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.269067]  kthread+0x328/0x630
[   56.269366]  ret_from_fork+0x10/0x20
[   56.269695] 
[   56.269836] kfence-#175: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   56.269836] 
[   56.270689] allocated by task 395 on cpu 4 at 56.265781s (0.004907s ago):
[   56.271301]  test_alloc+0x29c/0x628
[   56.271619]  test_krealloc+0xc0/0x830
[   56.271952]  kunit_try_run_case+0x170/0x3f0
[   56.272332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.272825]  kthread+0x328/0x630
[   56.273121]  ret_from_fork+0x10/0x20
[   56.273449] 
[   56.273587] freed by task 395 on cpu 4 at 56.265799s (0.007788s ago):
[   56.274168]  krealloc_noprof+0x148/0x360
[   56.274523]  test_krealloc+0x1dc/0x830
[   56.274862]  kunit_try_run_case+0x170/0x3f0
[   56.275242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.275736]  kthread+0x328/0x630
[   56.276032]  ret_from_fork+0x10/0x20
[   56.276359] 
[   56.276504] CPU: 4 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   56.277387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.277762] Hardware name: Radxa ROCK Pi 4B (DT)
[   56.278174] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   56.122925] ==================================================================
[   56.123605] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   56.123605] 
[   56.124479] Use-after-free read at 0x(____ptrval____) (in kfence-#173):
[   56.125070]  test_memcache_typesafe_by_rcu+0x280/0x560
[   56.125534]  kunit_try_run_case+0x170/0x3f0
[   56.125914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.126406]  kthread+0x328/0x630
[   56.126702]  ret_from_fork+0x10/0x20
[   56.127027] 
[   56.127165] kfence-#173: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   56.127165] 
[   56.127970] allocated by task 393 on cpu 4 at 56.057740s (0.070229s ago):
[   56.128578]  test_alloc+0x230/0x628
[   56.128893]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   56.129351]  kunit_try_run_case+0x170/0x3f0
[   56.129727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.130216]  kthread+0x328/0x630
[   56.130509]  ret_from_fork+0x10/0x20
[   56.130831] 
[   56.130968] freed by task 393 on cpu 4 at 56.057748s (0.073219s ago):
[   56.131542]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   56.131999]  kunit_try_run_case+0x170/0x3f0
[   56.132375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.132865]  kthread+0x328/0x630
[   56.133157]  ret_from_fork+0x10/0x20
[   56.133479] 
[   56.133623] CPU: 5 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   56.134501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.134872] Hardware name: Radxa ROCK Pi 4B (DT)
[   56.135282] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   32.880554] ==================================================================
[   32.881678] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   32.881678] 
[   32.882458] Invalid read at 0x(____ptrval____):
[   32.882898]  test_invalid_access+0xdc/0x1f0
[   32.883315]  kunit_try_run_case+0x170/0x3f0
[   32.883736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.884273]  kthread+0x328/0x630
[   32.884609]  ret_from_fork+0x10/0x20
[   32.884973] 
[   32.885149] CPU: 2 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   32.886348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.886966] Hardware name: Radxa ROCK Pi 4B (DT)
[   32.887405] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   32.658573] ==================================================================
[   32.659236] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.659236] 
[   32.660081] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#169):
[   32.660980]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.661447]  kunit_try_run_case+0x170/0x3f0
[   32.661826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.662316]  kthread+0x328/0x630
[   32.662612]  ret_from_fork+0x10/0x20
[   32.662936] 
[   32.663074] kfence-#169: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   32.663074] 
[   32.663925] allocated by task 383 on cpu 4 at 32.658531s (0.005393s ago):
[   32.664530]  test_alloc+0x29c/0x628
[   32.664844]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   32.665302]  kunit_try_run_case+0x170/0x3f0
[   32.665679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.666170]  kthread+0x328/0x630
[   32.666462]  ret_from_fork+0x10/0x20
[   32.666784] 
[   32.666921] freed by task 383 on cpu 4 at 32.658539s (0.008381s ago):
[   32.667498]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   32.667963]  kunit_try_run_case+0x170/0x3f0
[   32.668338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.668827]  kthread+0x328/0x630
[   32.669120]  ret_from_fork+0x10/0x20
[   32.669442] 
[   32.669587] CPU: 4 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   32.670465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.670838] Hardware name: Radxa ROCK Pi 4B (DT)
[   32.671248] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   32.241704] ==================================================================
[   32.242385] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   32.242385] 
[   32.243244] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#165):
[   32.243909]  test_kmalloc_aligned_oob_read+0x238/0x468
[   32.244370]  kunit_try_run_case+0x170/0x3f0
[   32.244751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.245241]  kthread+0x328/0x630
[   32.245538]  ret_from_fork+0x10/0x20
[   32.245862] 
[   32.246000] kfence-#165: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   32.246000] 
[   32.246850] allocated by task 381 on cpu 4 at 32.241677s (0.005172s ago):
[   32.247459]  test_alloc+0x29c/0x628
[   32.247773]  test_kmalloc_aligned_oob_read+0x100/0x468
[   32.248231]  kunit_try_run_case+0x170/0x3f0
[   32.248606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249097]  kthread+0x328/0x630
[   32.249390]  ret_from_fork+0x10/0x20
[   32.249712] 
[   32.249855] CPU: 4 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   32.250733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.251106] Hardware name: Radxa ROCK Pi 4B (DT)
[   32.251516] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   27.457882] ==================================================================
[   27.458548] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   27.458548] 
[   27.459283] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#119):
[   27.460193]  test_corruption+0x120/0x378
[   27.460548]  kunit_try_run_case+0x170/0x3f0
[   27.460930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.461424]  kthread+0x328/0x630
[   27.461722]  ret_from_fork+0x10/0x20
[   27.462048] 
[   27.462187] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   27.462187] 
[   27.462994] allocated by task 371 on cpu 4 at 27.457841s (0.005153s ago):
[   27.463600]  test_alloc+0x230/0x628
[   27.463915]  test_corruption+0xdc/0x378
[   27.464262]  kunit_try_run_case+0x170/0x3f0
[   27.464639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.465130]  kthread+0x328/0x630
[   27.465424]  ret_from_fork+0x10/0x20
[   27.465748] 
[   27.465886] freed by task 371 on cpu 4 at 27.457849s (0.008036s ago):
[   27.466462]  test_corruption+0x120/0x378
[   27.466815]  kunit_try_run_case+0x170/0x3f0
[   27.467193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.467685]  kthread+0x328/0x630
[   27.467980]  ret_from_fork+0x10/0x20
[   27.468303] 
[   27.468448] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.469328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.469701] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.470112] ==================================================================
[   27.353706] ==================================================================
[   27.354377] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   27.354377] 
[   27.355109] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#118):
[   27.355733]  test_corruption+0x284/0x378
[   27.356086]  kunit_try_run_case+0x170/0x3f0
[   27.356466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.356957]  kthread+0x328/0x630
[   27.357253]  ret_from_fork+0x10/0x20
[   27.357577] 
[   27.357715] kfence-#118: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   27.357715] 
[   27.358566] allocated by task 369 on cpu 4 at 27.353654s (0.004911s ago):
[   27.359172]  test_alloc+0x29c/0x628
[   27.359485]  test_corruption+0x198/0x378
[   27.359837]  kunit_try_run_case+0x170/0x3f0
[   27.360212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.360702]  kthread+0x328/0x630
[   27.360995]  ret_from_fork+0x10/0x20
[   27.361317] 
[   27.361454] freed by task 369 on cpu 4 at 27.353663s (0.007790s ago):
[   27.362030]  test_corruption+0x284/0x378
[   27.362382]  kunit_try_run_case+0x170/0x3f0
[   27.362758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.363247]  kthread+0x328/0x630
[   27.363540]  ret_from_fork+0x10/0x20
[   27.363862] 
[   27.364006] CPU: 4 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.364883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.365254] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.365665] ==================================================================
[   27.041704] ==================================================================
[   27.042373] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   27.042373] 
[   27.043107] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#115):
[   27.044008]  test_corruption+0x278/0x378
[   27.044362]  kunit_try_run_case+0x170/0x3f0
[   27.044743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.045234]  kthread+0x328/0x630
[   27.045530]  ret_from_fork+0x10/0x20
[   27.045855] 
[   27.045993] kfence-#115: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   27.045993] 
[   27.046843] allocated by task 369 on cpu 4 at 27.041652s (0.005189s ago):
[   27.047449]  test_alloc+0x29c/0x628
[   27.047763]  test_corruption+0xdc/0x378
[   27.048108]  kunit_try_run_case+0x170/0x3f0
[   27.048484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.048974]  kthread+0x328/0x630
[   27.049267]  ret_from_fork+0x10/0x20
[   27.049589] 
[   27.049727] freed by task 369 on cpu 4 at 27.041662s (0.008063s ago):
[   27.050303]  test_corruption+0x278/0x378
[   27.050654]  kunit_try_run_case+0x170/0x3f0
[   27.051030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.051519]  kthread+0x328/0x630
[   27.051812]  ret_from_fork+0x10/0x20
[   27.052133] 
[   27.052277] CPU: 4 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.053155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.053526] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.053936] ==================================================================
[   27.561612] ==================================================================
[   27.562274] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   27.562274] 
[   27.563004] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#120):
[   27.563627]  test_corruption+0x1d8/0x378
[   27.563980]  kunit_try_run_case+0x170/0x3f0
[   27.564359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.564850]  kthread+0x328/0x630
[   27.565146]  ret_from_fork+0x10/0x20
[   27.565471] 
[   27.565609] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   27.565609] 
[   27.566414] allocated by task 371 on cpu 4 at 27.561570s (0.004843s ago):
[   27.567020]  test_alloc+0x230/0x628
[   27.567335]  test_corruption+0x198/0x378
[   27.567686]  kunit_try_run_case+0x170/0x3f0
[   27.568062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.568552]  kthread+0x328/0x630
[   27.568845]  ret_from_fork+0x10/0x20
[   27.569167] 
[   27.569304] freed by task 371 on cpu 4 at 27.561579s (0.007725s ago):
[   27.569879]  test_corruption+0x1d8/0x378
[   27.570231]  kunit_try_run_case+0x170/0x3f0
[   27.570606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.571097]  kthread+0x328/0x630
[   27.571390]  ret_from_fork+0x10/0x20
[   27.571712] 
[   27.571855] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.572732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.573105] Hardware name: Radxa ROCK Pi 4B (DT)
[   27.573515] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   26.729858] ==================================================================
[   26.730524] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   26.730524] 
[   26.731270] Invalid free of 0x(____ptrval____) (in kfence-#112):
[   26.731808]  test_invalid_addr_free+0xec/0x238
[   26.732212]  kunit_try_run_case+0x170/0x3f0
[   26.732596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.733092]  kthread+0x328/0x630
[   26.733393]  ret_from_fork+0x10/0x20
[   26.733721] 
[   26.733861] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.733861] 
[   26.734670] allocated by task 367 on cpu 4 at 26.729822s (0.004847s ago):
[   26.735280]  test_alloc+0x230/0x628
[   26.735598]  test_invalid_addr_free+0xd4/0x238
[   26.735999]  kunit_try_run_case+0x170/0x3f0
[   26.736378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.736871]  kthread+0x328/0x630
[   26.737168]  ret_from_fork+0x10/0x20
[   26.737493] 
[   26.737639] CPU: 4 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.738522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.738896] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.739309] ==================================================================
[   26.625929] ==================================================================
[   26.626597] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   26.626597] 
[   26.627355] Invalid free of 0x(____ptrval____) (in kfence-#111):
[   26.627897]  test_invalid_addr_free+0x1ac/0x238
[   26.628311]  kunit_try_run_case+0x170/0x3f0
[   26.628698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.629198]  kthread+0x328/0x630
[   26.629500]  ret_from_fork+0x10/0x20
[   26.629831] 
[   26.629973] kfence-#111: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.629973] 
[   26.630830] allocated by task 365 on cpu 4 at 26.625892s (0.004937s ago):
[   26.631442]  test_alloc+0x29c/0x628
[   26.631763]  test_invalid_addr_free+0xd4/0x238
[   26.632168]  kunit_try_run_case+0x170/0x3f0
[   26.632551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.633048]  kthread+0x328/0x630
[   26.633348]  ret_from_fork+0x10/0x20
[   26.633678] 
[   26.633825] CPU: 4 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.634713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.635089] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.635504] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   26.522171] ==================================================================
[   26.522838] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   26.522838] 
[   26.523543] Invalid free of 0x(____ptrval____) (in kfence-#110):
[   26.524080]  test_double_free+0x100/0x238
[   26.524443]  kunit_try_run_case+0x170/0x3f0
[   26.524826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.525318]  kthread+0x328/0x630
[   26.525618]  ret_from_fork+0x10/0x20
[   26.525945] 
[   26.526084] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.526084] 
[   26.526891] allocated by task 363 on cpu 4 at 26.522121s (0.004769s ago):
[   26.527499]  test_alloc+0x230/0x628
[   26.527814]  test_double_free+0xd4/0x238
[   26.528167]  kunit_try_run_case+0x170/0x3f0
[   26.528545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.529037]  kthread+0x328/0x630
[   26.529331]  ret_from_fork+0x10/0x20
[   26.529655] 
[   26.529794] freed by task 363 on cpu 4 at 26.522130s (0.007663s ago):
[   26.530372]  test_double_free+0xf0/0x238
[   26.530724]  kunit_try_run_case+0x170/0x3f0
[   26.531101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.531594]  kthread+0x328/0x630
[   26.531888]  ret_from_fork+0x10/0x20
[   26.532212] 
[   26.532357] CPU: 4 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.533238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.533612] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.534023] ==================================================================
[   26.417880] ==================================================================
[   26.418549] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   26.418549] 
[   26.419256] Invalid free of 0x(____ptrval____) (in kfence-#109):
[   26.419796]  test_double_free+0x1bc/0x238
[   26.420162]  kunit_try_run_case+0x170/0x3f0
[   26.420545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.421041]  kthread+0x328/0x630
[   26.421341]  ret_from_fork+0x10/0x20
[   26.421670] 
[   26.421810] kfence-#109: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.421810] 
[   26.422664] allocated by task 361 on cpu 4 at 26.417827s (0.004835s ago):
[   26.423274]  test_alloc+0x29c/0x628
[   26.423591]  test_double_free+0xd4/0x238
[   26.423946]  kunit_try_run_case+0x170/0x3f0
[   26.424325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.424818]  kthread+0x328/0x630
[   26.425115]  ret_from_fork+0x10/0x20
[   26.425442] 
[   26.425581] freed by task 361 on cpu 4 at 26.417837s (0.007743s ago):
[   26.426162]  test_double_free+0x1ac/0x238
[   26.426526]  kunit_try_run_case+0x170/0x3f0
[   26.426905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.427399]  kthread+0x328/0x630
[   26.427697]  ret_from_fork+0x10/0x20
[   26.428022] 
[   26.428168] CPU: 4 UID: 0 PID: 361 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.429052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.429426] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.429840] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   26.001999] ==================================================================
[   26.002668] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.002668] 
[   26.003503] Use-after-free read at 0x(____ptrval____) (in kfence-#105):
[   26.004097]  test_use_after_free_read+0x114/0x248
[   26.004526]  kunit_try_run_case+0x170/0x3f0
[   26.004913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.005411]  kthread+0x328/0x630
[   26.005715]  ret_from_fork+0x10/0x20
[   26.006045] 
[   26.006187] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   26.006187] 
[   26.007043] allocated by task 353 on cpu 4 at 26.001960s (0.005081s ago):
[   26.007659]  test_alloc+0x29c/0x628
[   26.007979]  test_use_after_free_read+0xd0/0x248
[   26.008398]  kunit_try_run_case+0x170/0x3f0
[   26.008781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.009278]  kthread+0x328/0x630
[   26.009577]  ret_from_fork+0x10/0x20
[   26.009905] 
[   26.010046] freed by task 353 on cpu 4 at 26.001969s (0.008076s ago):
[   26.010631]  test_use_after_free_read+0x1c0/0x248
[   26.011057]  kunit_try_run_case+0x170/0x3f0
[   26.011440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.011936]  kthread+0x328/0x630
[   26.012236]  ret_from_fork+0x10/0x20
[   26.012564] 
[   26.012711] CPU: 4 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.013599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.013976] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.014391] ==================================================================
[   26.105972] ==================================================================
[   26.106640] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.106640] 
[   26.107470] Use-after-free read at 0x(____ptrval____) (in kfence-#106):
[   26.108058]  test_use_after_free_read+0x114/0x248
[   26.108483]  kunit_try_run_case+0x170/0x3f0
[   26.108865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.109359]  kthread+0x328/0x630
[   26.109657]  ret_from_fork+0x10/0x20
[   26.109983] 
[   26.110123] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   26.110123] 
[   26.110929] allocated by task 355 on cpu 4 at 26.105931s (0.004997s ago):
[   26.111539]  test_alloc+0x230/0x628
[   26.111856]  test_use_after_free_read+0xd0/0x248
[   26.112270]  kunit_try_run_case+0x170/0x3f0
[   26.112649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.113140]  kthread+0x328/0x630
[   26.113435]  ret_from_fork+0x10/0x20
[   26.113759] 
[   26.113896] freed by task 355 on cpu 4 at 26.105939s (0.007956s ago):
[   26.114474]  test_use_after_free_read+0xf0/0x248
[   26.114887]  kunit_try_run_case+0x170/0x3f0
[   26.115264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.115755]  kthread+0x328/0x630
[   26.116049]  ret_from_fork+0x10/0x20
[   26.116373] 
[   26.116518] CPU: 4 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   26.117398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.117770] Hardware name: Radxa ROCK Pi 4B (DT)
[   26.118181] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   25.897705] ==================================================================
[   25.898381] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   25.898381] 
[   25.899210] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#104):
[   25.899859]  test_out_of_bounds_write+0x100/0x240
[   25.900282]  kunit_try_run_case+0x170/0x3f0
[   25.900664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.901155]  kthread+0x328/0x630
[   25.901452]  ret_from_fork+0x10/0x20
[   25.901777] 
[   25.901915] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   25.901915] 
[   25.902720] allocated by task 351 on cpu 4 at 25.897674s (0.005044s ago):
[   25.903328]  test_alloc+0x230/0x628
[   25.903643]  test_out_of_bounds_write+0xc8/0x240
[   25.904056]  kunit_try_run_case+0x170/0x3f0
[   25.904432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.904923]  kthread+0x328/0x630
[   25.905216]  ret_from_fork+0x10/0x20
[   25.905539] 
[   25.905682] CPU: 4 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.906560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.906931] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.907341] ==================================================================
[   25.689706] ==================================================================
[   25.690381] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   25.690381] 
[   25.691208] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#102):
[   25.691857]  test_out_of_bounds_write+0x100/0x240
[   25.692280]  kunit_try_run_case+0x170/0x3f0
[   25.692661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.693154]  kthread+0x328/0x630
[   25.693451]  ret_from_fork+0x10/0x20
[   25.693776] 
[   25.693915] kfence-#102: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   25.693915] 
[   25.694765] allocated by task 349 on cpu 4 at 25.689678s (0.005086s ago):
[   25.695372]  test_alloc+0x29c/0x628
[   25.695686]  test_out_of_bounds_write+0xc8/0x240
[   25.696098]  kunit_try_run_case+0x170/0x3f0
[   25.696474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.696964]  kthread+0x328/0x630
[   25.697257]  ret_from_fork+0x10/0x20
[   25.697579] 
[   25.697723] CPU: 4 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.698602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.698973] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.699383] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   19.166114] ==================================================================
[   19.167191] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   19.167902] Write of size 1 at addr ffff00000e7be00a by task kunit_try_catch/204
[   19.168586] 
[   19.168749] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.168798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.168812] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.168828] Call trace:
[   19.168840]  show_stack+0x20/0x38 (C)
[   19.168871]  dump_stack_lvl+0x8c/0xd0
[   19.168902]  print_report+0x118/0x608
[   19.168931]  kasan_report+0xdc/0x128
[   19.168959]  __asan_report_store1_noabort+0x20/0x30
[   19.168993]  kmalloc_large_oob_right+0x278/0x2b8
[   19.169027]  kunit_try_run_case+0x170/0x3f0
[   19.169062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.169101]  kthread+0x328/0x630
[   19.169135]  ret_from_fork+0x10/0x20
[   19.169168] 
[   19.174797] The buggy address belongs to the physical page:
[   19.175313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe7bc
[   19.176037] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.176740] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.177391] page_type: f8(unknown)
[   19.177728] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.178442] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.179156] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.179877] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.180600] head: 03fffe0000000002 fffffdffc039ef01 00000000ffffffff 00000000ffffffff
[   19.181322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.182037] page dumped because: kasan: bad access detected
[   19.182551] 
[   19.182703] Memory state around the buggy address:
[   19.183151]  ffff00000e7bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.183816]  ffff00000e7bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.184481] >ffff00000e7be000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.185141]                       ^
[   19.185476]  ffff00000e7be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.186141]  ffff00000e7be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.186802] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   24.337846] ==================================================================
[   24.338519] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   24.338519] 
[   24.339344] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#89):
[   24.339987]  test_out_of_bounds_read+0x114/0x3e0
[   24.340414]  kunit_try_run_case+0x170/0x3f0
[   24.340805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.341309]  kthread+0x328/0x630
[   24.341615]  ret_from_fork+0x10/0x20
[   24.341950] 
[   24.342094] kfence-#89: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   24.342094] 
[   24.342947] allocated by task 345 on cpu 4 at 24.337819s (0.005127s ago):
[   24.343568]  test_alloc+0x29c/0x628
[   24.343892]  test_out_of_bounds_read+0xdc/0x3e0
[   24.344307]  kunit_try_run_case+0x170/0x3f0
[   24.344693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.345195]  kthread+0x328/0x630
[   24.345499]  ret_from_fork+0x10/0x20
[   24.345832] 
[   24.345982] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.346875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.347254] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.347673] ==================================================================
[   24.753870] ==================================================================
[   24.754538] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   24.754538] 
[   24.755353] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#93):
[   24.755989]  test_out_of_bounds_read+0x114/0x3e0
[   24.756406]  kunit_try_run_case+0x170/0x3f0
[   24.756789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.757283]  kthread+0x328/0x630
[   24.757581]  ret_from_fork+0x10/0x20
[   24.757907] 
[   24.758046] kfence-#93: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   24.758046] 
[   24.758844] allocated by task 347 on cpu 4 at 24.753845s (0.004998s ago):
[   24.759454]  test_alloc+0x230/0x628
[   24.759771]  test_out_of_bounds_read+0xdc/0x3e0
[   24.760176]  kunit_try_run_case+0x170/0x3f0
[   24.760553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.761046]  kthread+0x328/0x630
[   24.761340]  ret_from_fork+0x10/0x20
[   24.761664] 
[   24.761809] CPU: 4 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.762689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.763063] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.763474] ==================================================================
[   24.649707] ==================================================================
[   24.650379] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   24.650379] 
[   24.651192] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#92):
[   24.651840]  test_out_of_bounds_read+0x1c8/0x3e0
[   24.652253]  kunit_try_run_case+0x170/0x3f0
[   24.652635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.653127]  kthread+0x328/0x630
[   24.653424]  ret_from_fork+0x10/0x20
[   24.653748] 
[   24.653886] kfence-#92: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   24.653886] 
[   24.654727] allocated by task 345 on cpu 4 at 24.649676s (0.005050s ago):
[   24.655335]  test_alloc+0x29c/0x628
[   24.655648]  test_out_of_bounds_read+0x198/0x3e0
[   24.656061]  kunit_try_run_case+0x170/0x3f0
[   24.656438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.656929]  kthread+0x328/0x630
[   24.657222]  ret_from_fork+0x10/0x20
[   24.657544] 
[   24.657688] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.658566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.658938] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.659348] ==================================================================
[   25.377675] ==================================================================
[   25.378348] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   25.378348] 
[   25.379162] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#99):
[   25.379810]  test_out_of_bounds_read+0x1c8/0x3e0
[   25.380224]  kunit_try_run_case+0x170/0x3f0
[   25.380606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.381097]  kthread+0x328/0x630
[   25.381395]  ret_from_fork+0x10/0x20
[   25.381719] 
[   25.381857] kfence-#99: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   25.381857] 
[   25.382654] allocated by task 347 on cpu 4 at 25.377648s (0.005005s ago):
[   25.383262]  test_alloc+0x230/0x628
[   25.383576]  test_out_of_bounds_read+0x198/0x3e0
[   25.383988]  kunit_try_run_case+0x170/0x3f0
[   25.384364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.384854]  kthread+0x328/0x630
[   25.385147]  ret_from_fork+0x10/0x20
[   25.385470] 
[   25.385613] CPU: 4 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.386490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.386861] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.387271] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   19.114689] ==================================================================
[   19.116779] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   19.116779] 
[   19.117667] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#59):
[   19.118721]  kmalloc_track_caller_oob_right+0x224/0x488
[   19.119225]  kunit_try_run_case+0x170/0x3f0
[   19.119634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.120159]  kthread+0x328/0x630
[   19.120484]  ret_from_fork+0x10/0x20
[   19.120834] 
[   19.120988] kfence-#59: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   19.120988] 
[   19.121877] allocated by task 200 on cpu 2 at 19.114273s (0.007602s ago):
[   19.122520]  kmalloc_track_caller_oob_right+0x184/0x488
[   19.123023]  kunit_try_run_case+0x170/0x3f0
[   19.123428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.123951]  kthread+0x328/0x630
[   19.124273]  ret_from_fork+0x10/0x20
[   19.124623] 
[   19.124775] freed by task 200 on cpu 2 at 19.114647s (0.010126s ago):
[   19.125390]  kmalloc_track_caller_oob_right+0x224/0x488
[   19.125891]  kunit_try_run_case+0x170/0x3f0
[   19.126296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.126819]  kthread+0x328/0x630
[   19.127140]  ret_from_fork+0x10/0x20
[   19.127489] 
[   19.127652] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.128573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.128965] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.129397] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[   94.668110] ==================================================================
[   94.669311] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[   94.670155] Read of size 12 at addr ffff800084d44de0 by task kunit_try_catch/3379
[   94.670849] 
[   94.671016] CPU: 0 UID: 0 PID: 3379 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT 
[   94.671061] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   94.671075] Hardware name: Radxa ROCK Pi 4B (DT)
[   94.671089] Call trace:
[   94.671101]  show_stack+0x20/0x38 (C)
[   94.671136]  dump_stack_lvl+0x8c/0xd0
[   94.671166]  print_report+0x310/0x608
[   94.671196]  kasan_report+0xdc/0x128
[   94.671223]  kasan_check_range+0x100/0x1a8
[   94.671253]  __asan_memcpy+0x3c/0x98
[   94.671283]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[   94.671315]  cs_dsp_mock_bin_add_info+0x18/0x30
[   94.671342]  bin_patch_name_and_info+0x168/0x6b0
[   94.671373]  kunit_try_run_case+0x170/0x3f0
[   94.671406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.671441]  kthread+0x328/0x630
[   94.671475]  ret_from_fork+0x10/0x20
[   94.671506] 
[   94.678469] The buggy address belongs to the variable:
[   94.678943]  __loc.0+0x2c0/0x3a0
[   94.679268] 
[   94.679435] The buggy address belongs to the virtual mapping at
[   94.679435]  [ffff800083a50000, ffff800085760000) created by:
[   94.679435]  paging_init+0x620/0x7d0
[   94.680808] 
[   94.680885] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode.
[   94.680960] The buggy address belongs to the physical page:
[   94.681669] dwmmc_rockchip fe310000.mmc: Using internal DMA controller.
[   94.682081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7544
[   94.682669] dwmmc_rockchip fe310000.mmc: Version ID is 270a
[   94.683350] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   94.683897] dwmmc_rockchip fe310000.mmc: DW MMC controller at irq 49,32 bit host data width,256 deep fifo
[   94.684496] raw: 03fffe0000002000 fffffdffc01d5108 fffffdffc01d5108 0000000000000000
[   94.686014] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   94.686714] page dumped because: kasan: bad access detected
[   94.687225] 
[   94.687379] Memory state around the buggy address:
[   94.687826]  ffff800084d44c80: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[   94.688486]  ffff800084d44d00: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[   94.689147] >ffff800084d44d80: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   94.689802]                                                           ^
[   94.690407]  ffff800084d44e00: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[   94.691066]  ffff800084d44e80: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[   94.691722] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   24.206382] ==================================================================
[   24.207037] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   24.207663] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.208348] 
[   24.208498] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.208529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.208539] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.208550] Call trace:
[   24.208557]  show_stack+0x20/0x38 (C)
[   24.208578]  dump_stack_lvl+0x8c/0xd0
[   24.208596]  print_report+0x118/0x608
[   24.208615]  kasan_report+0xdc/0x128
[   24.208633]  kasan_check_range+0x100/0x1a8
[   24.208654]  __kasan_check_write+0x20/0x30
[   24.208675]  strncpy_from_user+0x3c/0x2a0
[   24.208693]  copy_user_test_oob+0x5c0/0xec8
[   24.208711]  kunit_try_run_case+0x170/0x3f0
[   24.208733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.208760]  kthread+0x328/0x630
[   24.208782]  ret_from_fork+0x10/0x20
[   24.208802] 
[   24.214984] Allocated by task 343:
[   24.215300]  kasan_save_stack+0x3c/0x68
[   24.215659]  kasan_save_track+0x20/0x40
[   24.216016]  kasan_save_alloc_info+0x40/0x58
[   24.216415]  __kasan_kmalloc+0xd4/0xd8
[   24.216766]  __kmalloc_noprof+0x190/0x4d0
[   24.217140]  kunit_kmalloc_array+0x34/0x88
[   24.217525]  copy_user_test_oob+0xac/0xec8
[   24.217905]  kunit_try_run_case+0x170/0x3f0
[   24.218297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.218805]  kthread+0x328/0x630
[   24.219114]  ret_from_fork+0x10/0x20
[   24.219451] 
[   24.219598] The buggy address belongs to the object at ffff00000c98ed00
[   24.219598]  which belongs to the cache kmalloc-128 of size 128
[   24.220714] The buggy address is located 0 bytes inside of
[   24.220714]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.221824] 
[   24.221971] The buggy address belongs to the physical page:
[   24.222475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.223182] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.223776] page_type: f5(slab)
[   24.224075] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.224776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.225472] page dumped because: kasan: bad access detected
[   24.225975] 
[   24.226122] Memory state around the buggy address:
[   24.226559]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.227211]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.227863] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.228512]                                                                 ^
[   24.229157]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.229810]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.230460] ==================================================================
[   24.231238] ==================================================================
[   24.231893] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   24.232524] Write of size 1 at addr ffff00000c98ed78 by task kunit_try_catch/343
[   24.233194] 
[   24.233343] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.233376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.233386] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.233396] Call trace:
[   24.233404]  show_stack+0x20/0x38 (C)
[   24.233424]  dump_stack_lvl+0x8c/0xd0
[   24.233443]  print_report+0x118/0x608
[   24.233462]  kasan_report+0xdc/0x128
[   24.233480]  __asan_report_store1_noabort+0x20/0x30
[   24.233503]  strncpy_from_user+0x270/0x2a0
[   24.233521]  copy_user_test_oob+0x5c0/0xec8
[   24.233539]  kunit_try_run_case+0x170/0x3f0
[   24.233562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.233588]  kthread+0x328/0x630
[   24.233610]  ret_from_fork+0x10/0x20
[   24.233631] 
[   24.239527] Allocated by task 343:
[   24.239843]  kasan_save_stack+0x3c/0x68
[   24.240203]  kasan_save_track+0x20/0x40
[   24.240561]  kasan_save_alloc_info+0x40/0x58
[   24.240961]  __kasan_kmalloc+0xd4/0xd8
[   24.241311]  __kmalloc_noprof+0x190/0x4d0
[   24.241685]  kunit_kmalloc_array+0x34/0x88
[   24.242069]  copy_user_test_oob+0xac/0xec8
[   24.242449]  kunit_try_run_case+0x170/0x3f0
[   24.242840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.243349]  kthread+0x328/0x630
[   24.243659]  ret_from_fork+0x10/0x20
[   24.243996] 
[   24.244143] The buggy address belongs to the object at ffff00000c98ed00
[   24.244143]  which belongs to the cache kmalloc-128 of size 128
[   24.245259] The buggy address is located 0 bytes to the right of
[   24.245259]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.246415] 
[   24.246561] The buggy address belongs to the physical page:
[   24.247065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.247772] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.248367] page_type: f5(slab)
[   24.248665] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.249366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.250060] page dumped because: kasan: bad access detected
[   24.250565] 
[   24.250710] Memory state around the buggy address:
[   24.251147]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.251799]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.252451] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.253101]                                                                 ^
[   24.253744]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.254397]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.255047] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   24.056969] ==================================================================
[   24.058211] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   24.058898] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.059602] 
[   24.059768] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.059821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.059837] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.059855] Call trace:
[   24.059868]  show_stack+0x20/0x38 (C)
[   24.059901]  dump_stack_lvl+0x8c/0xd0
[   24.059934]  print_report+0x118/0x608
[   24.059964]  kasan_report+0xdc/0x128
[   24.059993]  kasan_check_range+0x100/0x1a8
[   24.060027]  __kasan_check_write+0x20/0x30
[   24.060060]  copy_user_test_oob+0x234/0xec8
[   24.060088]  kunit_try_run_case+0x170/0x3f0
[   24.060125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.060165]  kthread+0x328/0x630
[   24.060201]  ret_from_fork+0x10/0x20
[   24.060235] 
[   24.066123] Allocated by task 343:
[   24.066453]  kasan_save_stack+0x3c/0x68
[   24.066831]  kasan_save_track+0x20/0x40
[   24.067204]  kasan_save_alloc_info+0x40/0x58
[   24.067620]  __kasan_kmalloc+0xd4/0xd8
[   24.067984]  __kmalloc_noprof+0x190/0x4d0
[   24.068373]  kunit_kmalloc_array+0x34/0x88
[   24.068776]  copy_user_test_oob+0xac/0xec8
[   24.069171]  kunit_try_run_case+0x170/0x3f0
[   24.069579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.070106]  kthread+0x328/0x630
[   24.070430]  ret_from_fork+0x10/0x20
[   24.070781] 
[   24.070936] The buggy address belongs to the object at ffff00000c98ed00
[   24.070936]  which belongs to the cache kmalloc-128 of size 128
[   24.072072] The buggy address is located 0 bytes inside of
[   24.072072]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.073201] 
[   24.073356] The buggy address belongs to the physical page:
[   24.073875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.074600] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.075213] page_type: f5(slab)
[   24.075528] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.076246] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.076956] page dumped because: kasan: bad access detected
[   24.077472] 
[   24.077627] Memory state around the buggy address:
[   24.078078]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.078746]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.079414] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.080078]                                                                 ^
[   24.080735]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.081403]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.082068] ==================================================================
[   24.107767] ==================================================================
[   24.108430] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   24.109078] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.109766] 
[   24.109923] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.109961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.109972] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.109985] Call trace:
[   24.109995]  show_stack+0x20/0x38 (C)
[   24.110019]  dump_stack_lvl+0x8c/0xd0
[   24.110042]  print_report+0x118/0x608
[   24.110064]  kasan_report+0xdc/0x128
[   24.110085]  kasan_check_range+0x100/0x1a8
[   24.110109]  __kasan_check_write+0x20/0x30
[   24.110133]  copy_user_test_oob+0x35c/0xec8
[   24.110153]  kunit_try_run_case+0x170/0x3f0
[   24.110179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.110208]  kthread+0x328/0x630
[   24.110232]  ret_from_fork+0x10/0x20
[   24.110257] 
[   24.116095] Allocated by task 343:
[   24.116412]  kasan_save_stack+0x3c/0x68
[   24.116775]  kasan_save_track+0x20/0x40
[   24.117136]  kasan_save_alloc_info+0x40/0x58
[   24.117538]  __kasan_kmalloc+0xd4/0xd8
[   24.117893]  __kmalloc_noprof+0x190/0x4d0
[   24.118270]  kunit_kmalloc_array+0x34/0x88
[   24.118658]  copy_user_test_oob+0xac/0xec8
[   24.119042]  kunit_try_run_case+0x170/0x3f0
[   24.119436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.119947]  kthread+0x328/0x630
[   24.120258]  ret_from_fork+0x10/0x20
[   24.120598] 
[   24.120744] The buggy address belongs to the object at ffff00000c98ed00
[   24.120744]  which belongs to the cache kmalloc-128 of size 128
[   24.121864] The buggy address is located 0 bytes inside of
[   24.121864]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.122978] 
[   24.123126] The buggy address belongs to the physical page:
[   24.123634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.124347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.124947] page_type: f5(slab)
[   24.125249] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.125953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.126653] page dumped because: kasan: bad access detected
[   24.127161] 
[   24.127308] Memory state around the buggy address:
[   24.127747]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.128404]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.129059] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.129711]                                                                 ^
[   24.130358]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.131014]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.131666] ==================================================================
[   24.082940] ==================================================================
[   24.083619] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   24.084281] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.084963] 
[   24.085119] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.085157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.085168] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.085181] Call trace:
[   24.085191]  show_stack+0x20/0x38 (C)
[   24.085215]  dump_stack_lvl+0x8c/0xd0
[   24.085239]  print_report+0x118/0x608
[   24.085261]  kasan_report+0xdc/0x128
[   24.085282]  kasan_check_range+0x100/0x1a8
[   24.085305]  __kasan_check_read+0x20/0x30
[   24.085329]  copy_user_test_oob+0x728/0xec8
[   24.085349]  kunit_try_run_case+0x170/0x3f0
[   24.085375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.085404]  kthread+0x328/0x630
[   24.085429]  ret_from_fork+0x10/0x20
[   24.085455] 
[   24.091289] Allocated by task 343:
[   24.091611]  kasan_save_stack+0x3c/0x68
[   24.091976]  kasan_save_track+0x20/0x40
[   24.092338]  kasan_save_alloc_info+0x40/0x58
[   24.092740]  __kasan_kmalloc+0xd4/0xd8
[   24.093094]  __kmalloc_noprof+0x190/0x4d0
[   24.093473]  kunit_kmalloc_array+0x34/0x88
[   24.093862]  copy_user_test_oob+0xac/0xec8
[   24.094247]  kunit_try_run_case+0x170/0x3f0
[   24.094642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.095152]  kthread+0x328/0x630
[   24.095466]  ret_from_fork+0x10/0x20
[   24.095804] 
[   24.095952] The buggy address belongs to the object at ffff00000c98ed00
[   24.095952]  which belongs to the cache kmalloc-128 of size 128
[   24.097072] The buggy address is located 0 bytes inside of
[   24.097072]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.098186] 
[   24.098334] The buggy address belongs to the physical page:
[   24.098843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.099555] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.100156] page_type: f5(slab)
[   24.100459] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.101162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.101860] page dumped because: kasan: bad access detected
[   24.102367] 
[   24.102515] Memory state around the buggy address:
[   24.102955]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.103611]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.104266] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.104918]                                                                 ^
[   24.105564]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.106219]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.106872] ==================================================================
[   24.181822] ==================================================================
[   24.182477] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   24.183117] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.183794] 
[   24.183942] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.183974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.183984] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.183995] Call trace:
[   24.184002]  show_stack+0x20/0x38 (C)
[   24.184023]  dump_stack_lvl+0x8c/0xd0
[   24.184042]  print_report+0x118/0x608
[   24.184061]  kasan_report+0xdc/0x128
[   24.184079]  kasan_check_range+0x100/0x1a8
[   24.184100]  __kasan_check_read+0x20/0x30
[   24.184121]  copy_user_test_oob+0x4a0/0xec8
[   24.184139]  kunit_try_run_case+0x170/0x3f0
[   24.184161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.184188]  kthread+0x328/0x630
[   24.184209]  ret_from_fork+0x10/0x20
[   24.184230] 
[   24.190052] Allocated by task 343:
[   24.190368]  kasan_save_stack+0x3c/0x68
[   24.190726]  kasan_save_track+0x20/0x40
[   24.191084]  kasan_save_alloc_info+0x40/0x58
[   24.191483]  __kasan_kmalloc+0xd4/0xd8
[   24.191834]  __kmalloc_noprof+0x190/0x4d0
[   24.192207]  kunit_kmalloc_array+0x34/0x88
[   24.192591]  copy_user_test_oob+0xac/0xec8
[   24.192971]  kunit_try_run_case+0x170/0x3f0
[   24.193363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.193872]  kthread+0x328/0x630
[   24.194181]  ret_from_fork+0x10/0x20
[   24.194519] 
[   24.194664] The buggy address belongs to the object at ffff00000c98ed00
[   24.194664]  which belongs to the cache kmalloc-128 of size 128
[   24.195780] The buggy address is located 0 bytes inside of
[   24.195780]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.196892] 
[   24.197038] The buggy address belongs to the physical page:
[   24.197542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.198250] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.198845] page_type: f5(slab)
[   24.199143] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.199844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.200539] page dumped because: kasan: bad access detected
[   24.201043] 
[   24.201189] Memory state around the buggy address:
[   24.201626]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.202278]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.202931] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.203580]                                                                 ^
[   24.204225]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.204878]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.205528] ==================================================================
[   24.157295] ==================================================================
[   24.157950] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   24.158588] Write of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.159273] 
[   24.159423] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.159456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.159465] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.159476] Call trace:
[   24.159483]  show_stack+0x20/0x38 (C)
[   24.159505]  dump_stack_lvl+0x8c/0xd0
[   24.159523]  print_report+0x118/0x608
[   24.159542]  kasan_report+0xdc/0x128
[   24.159561]  kasan_check_range+0x100/0x1a8
[   24.159581]  __kasan_check_write+0x20/0x30
[   24.159602]  copy_user_test_oob+0x434/0xec8
[   24.159620]  kunit_try_run_case+0x170/0x3f0
[   24.159642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.159669]  kthread+0x328/0x630
[   24.159691]  ret_from_fork+0x10/0x20
[   24.159712] 
[   24.165545] Allocated by task 343:
[   24.165862]  kasan_save_stack+0x3c/0x68
[   24.166223]  kasan_save_track+0x20/0x40
[   24.166581]  kasan_save_alloc_info+0x40/0x58
[   24.166980]  __kasan_kmalloc+0xd4/0xd8
[   24.167331]  __kmalloc_noprof+0x190/0x4d0
[   24.167706]  kunit_kmalloc_array+0x34/0x88
[   24.168091]  copy_user_test_oob+0xac/0xec8
[   24.168470]  kunit_try_run_case+0x170/0x3f0
[   24.168862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.169371]  kthread+0x328/0x630
[   24.169680]  ret_from_fork+0x10/0x20
[   24.170018] 
[   24.170165] The buggy address belongs to the object at ffff00000c98ed00
[   24.170165]  which belongs to the cache kmalloc-128 of size 128
[   24.171281] The buggy address is located 0 bytes inside of
[   24.171281]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.172393] 
[   24.172539] The buggy address belongs to the physical page:
[   24.173043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.173751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.174346] page_type: f5(slab)
[   24.174644] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.175345] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.176041] page dumped because: kasan: bad access detected
[   24.176546] 
[   24.176692] Memory state around the buggy address:
[   24.177130]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.177782]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.178434] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.179084]                                                                 ^
[   24.179727]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.180381]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.181030] ==================================================================
[   24.132667] ==================================================================
[   24.133343] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   24.133993] Read of size 121 at addr ffff00000c98ed00 by task kunit_try_catch/343
[   24.134675] 
[   24.134830] CPU: 4 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.134867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.134877] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.134890] Call trace:
[   24.134898]  show_stack+0x20/0x38 (C)
[   24.134922]  dump_stack_lvl+0x8c/0xd0
[   24.134944]  print_report+0x118/0x608
[   24.134964]  kasan_report+0xdc/0x128
[   24.134983]  kasan_check_range+0x100/0x1a8
[   24.135003]  __kasan_check_read+0x20/0x30
[   24.135025]  copy_user_test_oob+0x3c8/0xec8
[   24.135043]  kunit_try_run_case+0x170/0x3f0
[   24.135067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.135094]  kthread+0x328/0x630
[   24.135117]  ret_from_fork+0x10/0x20
[   24.135138] 
[   24.140969] Allocated by task 343:
[   24.141286]  kasan_save_stack+0x3c/0x68
[   24.141649]  kasan_save_track+0x20/0x40
[   24.142008]  kasan_save_alloc_info+0x40/0x58
[   24.142408]  __kasan_kmalloc+0xd4/0xd8
[   24.142759]  __kmalloc_noprof+0x190/0x4d0
[   24.143135]  kunit_kmalloc_array+0x34/0x88
[   24.143520]  copy_user_test_oob+0xac/0xec8
[   24.143901]  kunit_try_run_case+0x170/0x3f0
[   24.144293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.144802]  kthread+0x328/0x630
[   24.145111]  ret_from_fork+0x10/0x20
[   24.145448] 
[   24.145595] The buggy address belongs to the object at ffff00000c98ed00
[   24.145595]  which belongs to the cache kmalloc-128 of size 128
[   24.146713] The buggy address is located 0 bytes inside of
[   24.146713]  allocated 120-byte region [ffff00000c98ed00, ffff00000c98ed78)
[   24.147825] 
[   24.147972] The buggy address belongs to the physical page:
[   24.148477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   24.149189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.149785] page_type: f5(slab)
[   24.150086] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.150788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.151484] page dumped because: kasan: bad access detected
[   24.151989] 
[   24.152136] Memory state around the buggy address:
[   24.152574]  ffff00000c98ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.153226]  ffff00000c98ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.153879] >ffff00000c98ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.154528]                                                                 ^
[   24.155174]  ffff00000c98ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.155827]  ffff00000c98ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.156478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   24.026331] ==================================================================
[   24.027007] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   24.027699] Write of size 8 at addr ffff00000c992d78 by task kunit_try_catch/339
[   24.028373] 
[   24.028531] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.028568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.028579] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.028593] Call trace:
[   24.028602]  show_stack+0x20/0x38 (C)
[   24.028627]  dump_stack_lvl+0x8c/0xd0
[   24.028651]  print_report+0x118/0x608
[   24.028674]  kasan_report+0xdc/0x128
[   24.028695]  kasan_check_range+0x100/0x1a8
[   24.028718]  __kasan_check_write+0x20/0x30
[   24.028742]  copy_to_kernel_nofault+0x8c/0x250
[   24.028763]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   24.028790]  kunit_try_run_case+0x170/0x3f0
[   24.028816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.028845]  kthread+0x328/0x630
[   24.028870]  ret_from_fork+0x10/0x20
[   24.028895] 
[   24.035188] Allocated by task 339:
[   24.035509]  kasan_save_stack+0x3c/0x68
[   24.035873]  kasan_save_track+0x20/0x40
[   24.036234]  kasan_save_alloc_info+0x40/0x58
[   24.036637]  __kasan_kmalloc+0xd4/0xd8
[   24.036989]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.037418]  copy_to_kernel_nofault_oob+0xc8/0x418
[   24.037867]  kunit_try_run_case+0x170/0x3f0
[   24.038262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.038773]  kthread+0x328/0x630
[   24.039084]  ret_from_fork+0x10/0x20
[   24.039425] 
[   24.039573] The buggy address belongs to the object at ffff00000c992d00
[   24.039573]  which belongs to the cache kmalloc-128 of size 128
[   24.040692] The buggy address is located 0 bytes to the right of
[   24.040692]  allocated 120-byte region [ffff00000c992d00, ffff00000c992d78)
[   24.041851] 
[   24.041999] The buggy address belongs to the physical page:
[   24.042507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   24.043220] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.043819] page_type: f5(slab)
[   24.044120] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.044823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.045522] page dumped because: kasan: bad access detected
[   24.046029] 
[   24.046175] Memory state around the buggy address:
[   24.046615]  ffff00000c992c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.047271]  ffff00000c992c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.047926] >ffff00000c992d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.048578]                                                                 ^
[   24.049224]  ffff00000c992d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.049879]  ffff00000c992e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.050533] ==================================================================
[   24.000387] ==================================================================
[   24.001759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   24.002463] Read of size 8 at addr ffff00000c992d78 by task kunit_try_catch/339
[   24.003142] 
[   24.003309] CPU: 3 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.003360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.003376] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.003395] Call trace:
[   24.003408]  show_stack+0x20/0x38 (C)
[   24.003442]  dump_stack_lvl+0x8c/0xd0
[   24.003475]  print_report+0x118/0x608
[   24.003508]  kasan_report+0xdc/0x128
[   24.003537]  __asan_report_load8_noabort+0x20/0x30
[   24.003572]  copy_to_kernel_nofault+0x204/0x250
[   24.003603]  copy_to_kernel_nofault_oob+0x158/0x418
[   24.003640]  kunit_try_run_case+0x170/0x3f0
[   24.003677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.003717]  kthread+0x328/0x630
[   24.003752]  ret_from_fork+0x10/0x20
[   24.003786] 
[   24.009829] Allocated by task 339:
[   24.010165]  kasan_save_stack+0x3c/0x68
[   24.010544]  kasan_save_track+0x20/0x40
[   24.010919]  kasan_save_alloc_info+0x40/0x58
[   24.011333]  __kasan_kmalloc+0xd4/0xd8
[   24.011698]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.012141]  copy_to_kernel_nofault_oob+0xc8/0x418
[   24.012604]  kunit_try_run_case+0x170/0x3f0
[   24.013013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.013539]  kthread+0x328/0x630
[   24.013867]  ret_from_fork+0x10/0x20
[   24.014218] 
[   24.014372] The buggy address belongs to the object at ffff00000c992d00
[   24.014372]  which belongs to the cache kmalloc-128 of size 128
[   24.015507] The buggy address is located 0 bytes to the right of
[   24.015507]  allocated 120-byte region [ffff00000c992d00, ffff00000c992d78)
[   24.016683] 
[   24.016839] The buggy address belongs to the physical page:
[   24.017357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   24.018081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.018697] page_type: f5(slab)
[   24.019012] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   24.019729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.020438] page dumped because: kasan: bad access detected
[   24.020955] 
[   24.021108] Memory state around the buggy address:
[   24.021559]  ffff00000c992c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.022227]  ffff00000c992c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.022896] >ffff00000c992d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.023560]                                                                 ^
[   24.024216]  ffff00000c992d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.024884]  ffff00000c992e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.025547] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   23.965501] ==================================================================
[   23.966174] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   23.966817] Read of size 1 at addr ffff800087e9c7f8 by task kunit_try_catch/327
[   23.967496] 
[   23.967661] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.967713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.967728] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.967745] Call trace:
[   23.967758]  show_stack+0x20/0x38 (C)
[   23.967790]  dump_stack_lvl+0x8c/0xd0
[   23.967822]  print_report+0x310/0x608
[   23.967852]  kasan_report+0xdc/0x128
[   23.967882]  __asan_report_load1_noabort+0x20/0x30
[   23.967917]  vmalloc_oob+0x51c/0x5d0
[   23.967950]  kunit_try_run_case+0x170/0x3f0
[   23.967986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.968026]  kthread+0x328/0x630
[   23.968063]  ret_from_fork+0x10/0x20
[   23.968096] 
[   23.973633] The buggy address belongs to the virtual mapping at
[   23.973633]  [ffff800087e9c000, ffff800087e9e000) created by:
[   23.973633]  vmalloc_oob+0x98/0x5d0
[   23.975011] 
[   23.975166] The buggy address belongs to the physical page:
[   23.975685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c0c
[   23.976418] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.977041] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.977758] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.978468] page dumped because: kasan: bad access detected
[   23.978983] 
[   23.979137] Memory state around the buggy address:
[   23.979586]  ffff800087e9c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.980253]  ffff800087e9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.980920] >ffff800087e9c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   23.981583]                                                                 ^
[   23.982242]  ffff800087e9c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.982909]  ffff800087e9c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.983572] ==================================================================
[   23.945889] ==================================================================
[   23.947296] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   23.947939] Read of size 1 at addr ffff800087e9c7f3 by task kunit_try_catch/327
[   23.948619] 
[   23.948784] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.948834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.948849] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.948867] Call trace:
[   23.948881]  show_stack+0x20/0x38 (C)
[   23.948914]  dump_stack_lvl+0x8c/0xd0
[   23.948946]  print_report+0x310/0x608
[   23.948977]  kasan_report+0xdc/0x128
[   23.949007]  __asan_report_load1_noabort+0x20/0x30
[   23.949042]  vmalloc_oob+0x578/0x5d0
[   23.949074]  kunit_try_run_case+0x170/0x3f0
[   23.949111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.949152]  kthread+0x328/0x630
[   23.949186]  ret_from_fork+0x10/0x20
[   23.949220] 
[   23.954756] The buggy address belongs to the virtual mapping at
[   23.954756]  [ffff800087e9c000, ffff800087e9e000) created by:
[   23.954756]  vmalloc_oob+0x98/0x5d0
[   23.956135] 
[   23.956291] The buggy address belongs to the physical page:
[   23.956808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10c0c
[   23.957541] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.958168] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.958883] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.959592] page dumped because: kasan: bad access detected
[   23.960109] 
[   23.960263] Memory state around the buggy address:
[   23.960714]  ffff800087e9c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.961382]  ffff800087e9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.962050] >ffff800087e9c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   23.962713]                                                              ^
[   23.963348]  ffff800087e9c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.964015]  ffff800087e9c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.964679] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   22.477909] ==================================================================
[   22.478584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   22.479258] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.479932] 
[   22.480087] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.480124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.480134] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.480146] Call trace:
[   22.480155]  show_stack+0x20/0x38 (C)
[   22.480178]  dump_stack_lvl+0x8c/0xd0
[   22.480200]  print_report+0x118/0x608
[   22.480219]  kasan_report+0xdc/0x128
[   22.480238]  kasan_check_range+0x100/0x1a8
[   22.480259]  __kasan_check_write+0x20/0x30
[   22.480281]  kasan_atomics_helper+0x24c/0x4858
[   22.480299]  kasan_atomics+0x198/0x2e0
[   22.480317]  kunit_try_run_case+0x170/0x3f0
[   22.480342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.480368]  kthread+0x328/0x630
[   22.480391]  ret_from_fork+0x10/0x20
[   22.480413] 
[   22.486599] Allocated by task 323:
[   22.486917]  kasan_save_stack+0x3c/0x68
[   22.487278]  kasan_save_track+0x20/0x40
[   22.487637]  kasan_save_alloc_info+0x40/0x58
[   22.488037]  __kasan_kmalloc+0xd4/0xd8
[   22.488388]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.488815]  kasan_atomics+0xb8/0x2e0
[   22.489157]  kunit_try_run_case+0x170/0x3f0
[   22.489550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.490058]  kthread+0x328/0x630
[   22.490368]  ret_from_fork+0x10/0x20
[   22.490705] 
[   22.490852] The buggy address belongs to the object at ffff00000ea09200
[   22.490852]  which belongs to the cache kmalloc-64 of size 64
[   22.491953] The buggy address is located 0 bytes to the right of
[   22.491953]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.493104] 
[   22.493251] The buggy address belongs to the physical page:
[   22.493757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.494468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.495066] page_type: f5(slab)
[   22.495367] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.496068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.496764] page dumped because: kasan: bad access detected
[   22.497269] 
[   22.497414] Memory state around the buggy address:
[   22.497853]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.498505]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.499158] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.499809]                                      ^
[   22.500247]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.500901]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.501551] ==================================================================
[   22.862340] ==================================================================
[   22.862980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   22.863626] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.864280] 
[   22.864420] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.864434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.864438] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.864444] Call trace:
[   22.864447]  show_stack+0x20/0x38 (C)
[   22.864457]  dump_stack_lvl+0x8c/0xd0
[   22.864466]  print_report+0x118/0x608
[   22.864475]  kasan_report+0xdc/0x128
[   22.864483]  kasan_check_range+0x100/0x1a8
[   22.864492]  __kasan_check_write+0x20/0x30
[   22.864502]  kasan_atomics_helper+0x894/0x4858
[   22.864510]  kasan_atomics+0x198/0x2e0
[   22.864518]  kunit_try_run_case+0x170/0x3f0
[   22.864529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.864541]  kthread+0x328/0x630
[   22.864551]  ret_from_fork+0x10/0x20
[   22.864561] 
[   22.870686] Allocated by task 323:
[   22.870990]  kasan_save_stack+0x3c/0x68
[   22.871334]  kasan_save_track+0x20/0x40
[   22.871678]  kasan_save_alloc_info+0x40/0x58
[   22.872060]  __kasan_kmalloc+0xd4/0xd8
[   22.872397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.872805]  kasan_atomics+0xb8/0x2e0
[   22.873134]  kunit_try_run_case+0x170/0x3f0
[   22.873509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.874000]  kthread+0x328/0x630
[   22.874293]  ret_from_fork+0x10/0x20
[   22.874615] 
[   22.874752] The buggy address belongs to the object at ffff00000ea09200
[   22.874752]  which belongs to the cache kmalloc-64 of size 64
[   22.875834] The buggy address is located 0 bytes to the right of
[   22.875834]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.876963] 
[   22.877102] The buggy address belongs to the physical page:
[   22.877593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.878285] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.878862] page_type: f5(slab)
[   22.879147] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.879831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.880513] page dumped because: kasan: bad access detected
[   22.881005] 
[   22.881143] Memory state around the buggy address:
[   22.881568]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.882206]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.882843] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.883481]                                      ^
[   22.883907]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.884543]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.885180] ==================================================================
[   23.096545] ==================================================================
[   23.097183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   23.097829] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.098483] 
[   23.098621] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.098636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.098641] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.098646] Call trace:
[   23.098649]  show_stack+0x20/0x38 (C)
[   23.098658]  dump_stack_lvl+0x8c/0xd0
[   23.098667]  print_report+0x118/0x608
[   23.098676]  kasan_report+0xdc/0x128
[   23.098684]  kasan_check_range+0x100/0x1a8
[   23.098694]  __kasan_check_write+0x20/0x30
[   23.098704]  kasan_atomics_helper+0xc08/0x4858
[   23.098712]  kasan_atomics+0x198/0x2e0
[   23.098720]  kunit_try_run_case+0x170/0x3f0
[   23.098732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.098744]  kthread+0x328/0x630
[   23.098754]  ret_from_fork+0x10/0x20
[   23.098764] 
[   23.104885] Allocated by task 323:
[   23.105189]  kasan_save_stack+0x3c/0x68
[   23.105535]  kasan_save_track+0x20/0x40
[   23.105878]  kasan_save_alloc_info+0x40/0x58
[   23.106261]  __kasan_kmalloc+0xd4/0xd8
[   23.106598]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.107005]  kasan_atomics+0xb8/0x2e0
[   23.107334]  kunit_try_run_case+0x170/0x3f0
[   23.107710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.108199]  kthread+0x328/0x630
[   23.108492]  ret_from_fork+0x10/0x20
[   23.108814] 
[   23.108952] The buggy address belongs to the object at ffff00000ea09200
[   23.108952]  which belongs to the cache kmalloc-64 of size 64
[   23.110034] The buggy address is located 0 bytes to the right of
[   23.110034]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.111164] 
[   23.111301] The buggy address belongs to the physical page:
[   23.111794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.112485] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.113063] page_type: f5(slab)
[   23.113346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.114030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.114712] page dumped because: kasan: bad access detected
[   23.115204] 
[   23.115341] Memory state around the buggy address:
[   23.115765]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.116401]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.117038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.117674]                                      ^
[   23.118098]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118735]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.119370] ==================================================================
[   22.401964] ==================================================================
[   22.403347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   22.404047] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.404727] 
[   22.404894] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.404944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.404959] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.404978] Call trace:
[   22.404991]  show_stack+0x20/0x38 (C)
[   22.405024]  dump_stack_lvl+0x8c/0xd0
[   22.405058]  print_report+0x118/0x608
[   22.405090]  kasan_report+0xdc/0x128
[   22.405119]  __asan_report_load4_noabort+0x20/0x30
[   22.405154]  kasan_atomics_helper+0x40a8/0x4858
[   22.405184]  kasan_atomics+0x198/0x2e0
[   22.405211]  kunit_try_run_case+0x170/0x3f0
[   22.405247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.405288]  kthread+0x328/0x630
[   22.405323]  ret_from_fork+0x10/0x20
[   22.405358] 
[   22.411305] Allocated by task 323:
[   22.411632]  kasan_save_stack+0x3c/0x68
[   22.412008]  kasan_save_track+0x20/0x40
[   22.412380]  kasan_save_alloc_info+0x40/0x58
[   22.412794]  __kasan_kmalloc+0xd4/0xd8
[   22.413159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.413602]  kasan_atomics+0xb8/0x2e0
[   22.413959]  kunit_try_run_case+0x170/0x3f0
[   22.414367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.414893]  kthread+0x328/0x630
[   22.415219]  ret_from_fork+0x10/0x20
[   22.415570] 
[   22.415725] The buggy address belongs to the object at ffff00000ea09200
[   22.415725]  which belongs to the cache kmalloc-64 of size 64
[   22.416845] The buggy address is located 0 bytes to the right of
[   22.416845]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.418012] 
[   22.418168] The buggy address belongs to the physical page:
[   22.418685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.419412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.420025] page_type: f5(slab)
[   22.420340] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.421057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.421766] page dumped because: kasan: bad access detected
[   22.422283] 
[   22.422436] Memory state around the buggy address:
[   22.422886]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.423554]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.424222] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.424886]                                      ^
[   22.425336]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.426004]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.426667] ==================================================================
[   22.909039] ==================================================================
[   22.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   22.910322] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.910975] 
[   22.911114] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.911128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.911132] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.911137] Call trace:
[   22.911140]  show_stack+0x20/0x38 (C)
[   22.911149]  dump_stack_lvl+0x8c/0xd0
[   22.911158]  print_report+0x118/0x608
[   22.911167]  kasan_report+0xdc/0x128
[   22.911175]  kasan_check_range+0x100/0x1a8
[   22.911184]  __kasan_check_write+0x20/0x30
[   22.911194]  kasan_atomics_helper+0x934/0x4858
[   22.911203]  kasan_atomics+0x198/0x2e0
[   22.911211]  kunit_try_run_case+0x170/0x3f0
[   22.911221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.911233]  kthread+0x328/0x630
[   22.911242]  ret_from_fork+0x10/0x20
[   22.911252] 
[   22.917372] Allocated by task 323:
[   22.917676]  kasan_save_stack+0x3c/0x68
[   22.918021]  kasan_save_track+0x20/0x40
[   22.918365]  kasan_save_alloc_info+0x40/0x58
[   22.918747]  __kasan_kmalloc+0xd4/0xd8
[   22.919084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.919491]  kasan_atomics+0xb8/0x2e0
[   22.919820]  kunit_try_run_case+0x170/0x3f0
[   22.920195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.920685]  kthread+0x328/0x630
[   22.920978]  ret_from_fork+0x10/0x20
[   22.921300] 
[   22.921436] The buggy address belongs to the object at ffff00000ea09200
[   22.921436]  which belongs to the cache kmalloc-64 of size 64
[   22.922519] The buggy address is located 0 bytes to the right of
[   22.922519]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.923648] 
[   22.923785] The buggy address belongs to the physical page:
[   22.924276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.924968] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.925547] page_type: f5(slab)
[   22.925831] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.926515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.927197] page dumped because: kasan: bad access detected
[   22.927689] 
[   22.927825] Memory state around the buggy address:
[   22.928251]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.928888]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.929525] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.930161]                                      ^
[   22.930586]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.931225]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.931862] ==================================================================
[   23.588495] ==================================================================
[   23.589132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   23.589785] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.590439] 
[   23.590577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.590591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.590595] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.590601] Call trace:
[   23.590604]  show_stack+0x20/0x38 (C)
[   23.590613]  dump_stack_lvl+0x8c/0xd0
[   23.590621]  print_report+0x118/0x608
[   23.590630]  kasan_report+0xdc/0x128
[   23.590638]  kasan_check_range+0x100/0x1a8
[   23.590648]  __kasan_check_write+0x20/0x30
[   23.590657]  kasan_atomics_helper+0x1384/0x4858
[   23.590666]  kasan_atomics+0x198/0x2e0
[   23.590674]  kunit_try_run_case+0x170/0x3f0
[   23.590684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.590695]  kthread+0x328/0x630
[   23.590705]  ret_from_fork+0x10/0x20
[   23.590715] 
[   23.596845] Allocated by task 323:
[   23.597149]  kasan_save_stack+0x3c/0x68
[   23.597495]  kasan_save_track+0x20/0x40
[   23.597838]  kasan_save_alloc_info+0x40/0x58
[   23.598221]  __kasan_kmalloc+0xd4/0xd8
[   23.598558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.598965]  kasan_atomics+0xb8/0x2e0
[   23.599293]  kunit_try_run_case+0x170/0x3f0
[   23.599671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.600161]  kthread+0x328/0x630
[   23.600454]  ret_from_fork+0x10/0x20
[   23.600777] 
[   23.600913] The buggy address belongs to the object at ffff00000ea09200
[   23.600913]  which belongs to the cache kmalloc-64 of size 64
[   23.601996] The buggy address is located 0 bytes to the right of
[   23.601996]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.603125] 
[   23.603262] The buggy address belongs to the physical page:
[   23.603754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.604445] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.605024] page_type: f5(slab)
[   23.605307] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.605991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.606673] page dumped because: kasan: bad access detected
[   23.607166] 
[   23.607302] Memory state around the buggy address:
[   23.607727]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.608364]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.609001] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.609637]                                      ^
[   23.610063]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.610700]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.611336] ==================================================================
[   22.599189] ==================================================================
[   22.599843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   22.600505] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.601174] 
[   22.601323] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.601355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.601365] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.601376] Call trace:
[   22.601383]  show_stack+0x20/0x38 (C)
[   22.601403]  dump_stack_lvl+0x8c/0xd0
[   22.601422]  print_report+0x118/0x608
[   22.601442]  kasan_report+0xdc/0x128
[   22.601461]  kasan_check_range+0x100/0x1a8
[   22.601481]  __kasan_check_write+0x20/0x30
[   22.601502]  kasan_atomics_helper+0x3ac/0x4858
[   22.601522]  kasan_atomics+0x198/0x2e0
[   22.601539]  kunit_try_run_case+0x170/0x3f0
[   22.601561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.601588]  kthread+0x328/0x630
[   22.601610]  ret_from_fork+0x10/0x20
[   22.601631] 
[   22.607813] Allocated by task 323:
[   22.608129]  kasan_save_stack+0x3c/0x68
[   22.608489]  kasan_save_track+0x20/0x40
[   22.608847]  kasan_save_alloc_info+0x40/0x58
[   22.609246]  __kasan_kmalloc+0xd4/0xd8
[   22.609597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.610023]  kasan_atomics+0xb8/0x2e0
[   22.610365]  kunit_try_run_case+0x170/0x3f0
[   22.610757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.611266]  kthread+0x328/0x630
[   22.611575]  ret_from_fork+0x10/0x20
[   22.611913] 
[   22.612059] The buggy address belongs to the object at ffff00000ea09200
[   22.612059]  which belongs to the cache kmalloc-64 of size 64
[   22.613160] The buggy address is located 0 bytes to the right of
[   22.613160]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.614309] 
[   22.614455] The buggy address belongs to the physical page:
[   22.614958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.615665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.616258] page_type: f5(slab)
[   22.616555] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.617254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.617949] page dumped because: kasan: bad access detected
[   22.618453] 
[   22.618598] Memory state around the buggy address:
[   22.619035]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.619688]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.620340] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.620990]                                      ^
[   22.621427]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.622080]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.622729] ==================================================================
[   22.695668] ==================================================================
[   22.696312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   22.696965] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.697625] 
[   22.697768] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.697790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.697796] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.697804] Call trace:
[   22.697809]  show_stack+0x20/0x38 (C)
[   22.697823]  dump_stack_lvl+0x8c/0xd0
[   22.697836]  print_report+0x118/0x608
[   22.697849]  kasan_report+0xdc/0x128
[   22.697861]  kasan_check_range+0x100/0x1a8
[   22.697875]  __kasan_check_write+0x20/0x30
[   22.697890]  kasan_atomics_helper+0x54c/0x4858
[   22.697903]  kasan_atomics+0x198/0x2e0
[   22.697915]  kunit_try_run_case+0x170/0x3f0
[   22.697930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.697948]  kthread+0x328/0x630
[   22.697963]  ret_from_fork+0x10/0x20
[   22.697978] 
[   22.704121] Allocated by task 323:
[   22.704430]  kasan_save_stack+0x3c/0x68
[   22.704781]  kasan_save_track+0x20/0x40
[   22.705131]  kasan_save_alloc_info+0x40/0x58
[   22.705520]  __kasan_kmalloc+0xd4/0xd8
[   22.705862]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.706277]  kasan_atomics+0xb8/0x2e0
[   22.706612]  kunit_try_run_case+0x170/0x3f0
[   22.706994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707492]  kthread+0x328/0x630
[   22.707792]  ret_from_fork+0x10/0x20
[   22.708120] 
[   22.708260] The buggy address belongs to the object at ffff00000ea09200
[   22.708260]  which belongs to the cache kmalloc-64 of size 64
[   22.709350] The buggy address is located 0 bytes to the right of
[   22.709350]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.710487] 
[   22.710627] The buggy address belongs to the physical page:
[   22.711124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.711822] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.712407] page_type: f5(slab)
[   22.712697] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.713387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.714073] page dumped because: kasan: bad access detected
[   22.714571] 
[   22.714711] Memory state around the buggy address:
[   22.715141]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.715784]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.716428] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.717069]                                      ^
[   22.717500]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718144]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718785] ==================================================================
[   23.120032] ==================================================================
[   23.120670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   23.121323] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.121968] 
[   23.122108] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.122122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.122126] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.122131] Call trace:
[   23.122135]  show_stack+0x20/0x38 (C)
[   23.122144]  dump_stack_lvl+0x8c/0xd0
[   23.122153]  print_report+0x118/0x608
[   23.122161]  kasan_report+0xdc/0x128
[   23.122170]  __asan_report_load4_noabort+0x20/0x30
[   23.122180]  kasan_atomics_helper+0x3de4/0x4858
[   23.122189]  kasan_atomics+0x198/0x2e0
[   23.122197]  kunit_try_run_case+0x170/0x3f0
[   23.122207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.122219]  kthread+0x328/0x630
[   23.122229]  ret_from_fork+0x10/0x20
[   23.122239] 
[   23.128068] Allocated by task 323:
[   23.128373]  kasan_save_stack+0x3c/0x68
[   23.128717]  kasan_save_track+0x20/0x40
[   23.129061]  kasan_save_alloc_info+0x40/0x58
[   23.129444]  __kasan_kmalloc+0xd4/0xd8
[   23.129781]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.130188]  kasan_atomics+0xb8/0x2e0
[   23.130517]  kunit_try_run_case+0x170/0x3f0
[   23.130893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.131383]  kthread+0x328/0x630
[   23.131677]  ret_from_fork+0x10/0x20
[   23.131999] 
[   23.132136] The buggy address belongs to the object at ffff00000ea09200
[   23.132136]  which belongs to the cache kmalloc-64 of size 64
[   23.133219] The buggy address is located 0 bytes to the right of
[   23.133219]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.134348] 
[   23.134485] The buggy address belongs to the physical page:
[   23.134977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.135669] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.136247] page_type: f5(slab)
[   23.136532] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.137216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.137897] page dumped because: kasan: bad access detected
[   23.138389] 
[   23.138526] Memory state around the buggy address:
[   23.138951]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.139590]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.140226] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.140862]                                      ^
[   23.141288]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.141925]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.142560] ==================================================================
[   22.452586] ==================================================================
[   22.453260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   22.453941] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.454620] 
[   22.454785] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.454836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.454851] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.454869] Call trace:
[   22.454882]  show_stack+0x20/0x38 (C)
[   22.454914]  dump_stack_lvl+0x8c/0xd0
[   22.454947]  print_report+0x118/0x608
[   22.454978]  kasan_report+0xdc/0x128
[   22.455007]  kasan_check_range+0x100/0x1a8
[   22.455040]  __kasan_check_read+0x20/0x30
[   22.455073]  kasan_atomics_helper+0x1ec/0x4858
[   22.455103]  kasan_atomics+0x198/0x2e0
[   22.455131]  kunit_try_run_case+0x170/0x3f0
[   22.455167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.455207]  kthread+0x328/0x630
[   22.455242]  ret_from_fork+0x10/0x20
[   22.455275] 
[   22.461516] Allocated by task 323:
[   22.461844]  kasan_save_stack+0x3c/0x68
[   22.462219]  kasan_save_track+0x20/0x40
[   22.462592]  kasan_save_alloc_info+0x40/0x58
[   22.463007]  __kasan_kmalloc+0xd4/0xd8
[   22.463371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.463815]  kasan_atomics+0xb8/0x2e0
[   22.464171]  kunit_try_run_case+0x170/0x3f0
[   22.464580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.465105]  kthread+0x328/0x630
[   22.465430]  ret_from_fork+0x10/0x20
[   22.465782] 
[   22.465937] The buggy address belongs to the object at ffff00000ea09200
[   22.465937]  which belongs to the cache kmalloc-64 of size 64
[   22.467057] The buggy address is located 0 bytes to the right of
[   22.467057]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.468224] 
[   22.468380] The buggy address belongs to the physical page:
[   22.468897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.469624] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.470238] page_type: f5(slab)
[   22.470551] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.471268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.471977] page dumped because: kasan: bad access detected
[   22.472494] 
[   22.472648] Memory state around the buggy address:
[   22.473096]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.473764]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.474432] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.475094]                                      ^
[   22.475543]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.476211]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.476874] ==================================================================
[   23.705677] ==================================================================
[   23.706315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   23.706967] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.707621] 
[   23.707759] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.707773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.707778] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.707783] Call trace:
[   23.707786]  show_stack+0x20/0x38 (C)
[   23.707795]  dump_stack_lvl+0x8c/0xd0
[   23.707803]  print_report+0x118/0x608
[   23.707812]  kasan_report+0xdc/0x128
[   23.707821]  kasan_check_range+0x100/0x1a8
[   23.707830]  __kasan_check_write+0x20/0x30
[   23.707840]  kasan_atomics_helper+0x154c/0x4858
[   23.707848]  kasan_atomics+0x198/0x2e0
[   23.707856]  kunit_try_run_case+0x170/0x3f0
[   23.707867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.707878]  kthread+0x328/0x630
[   23.707888]  ret_from_fork+0x10/0x20
[   23.707898] 
[   23.714025] Allocated by task 323:
[   23.714330]  kasan_save_stack+0x3c/0x68
[   23.714674]  kasan_save_track+0x20/0x40
[   23.715018]  kasan_save_alloc_info+0x40/0x58
[   23.715401]  __kasan_kmalloc+0xd4/0xd8
[   23.715738]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.716145]  kasan_atomics+0xb8/0x2e0
[   23.716474]  kunit_try_run_case+0x170/0x3f0
[   23.716849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.717339]  kthread+0x328/0x630
[   23.717632]  ret_from_fork+0x10/0x20
[   23.717954] 
[   23.718090] The buggy address belongs to the object at ffff00000ea09200
[   23.718090]  which belongs to the cache kmalloc-64 of size 64
[   23.719173] The buggy address is located 0 bytes to the right of
[   23.719173]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.720303] 
[   23.720440] The buggy address belongs to the physical page:
[   23.720931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.721623] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.722200] page_type: f5(slab)
[   23.722485] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.723169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.723851] page dumped because: kasan: bad access detected
[   23.724343] 
[   23.724481] Memory state around the buggy address:
[   23.724906]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.725544]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.726182] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.726818]                                      ^
[   23.727243]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.727880]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.728515] ==================================================================
[   23.143222] ==================================================================
[   23.143859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   23.144504] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.145158] 
[   23.145296] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.145311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.145315] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.145320] Call trace:
[   23.145323]  show_stack+0x20/0x38 (C)
[   23.145332]  dump_stack_lvl+0x8c/0xd0
[   23.145341]  print_report+0x118/0x608
[   23.145350]  kasan_report+0xdc/0x128
[   23.145358]  kasan_check_range+0x100/0x1a8
[   23.145367]  __kasan_check_write+0x20/0x30
[   23.145377]  kasan_atomics_helper+0xca0/0x4858
[   23.145385]  kasan_atomics+0x198/0x2e0
[   23.145393]  kunit_try_run_case+0x170/0x3f0
[   23.145404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.145416]  kthread+0x328/0x630
[   23.145426]  ret_from_fork+0x10/0x20
[   23.145436] 
[   23.151559] Allocated by task 323:
[   23.151863]  kasan_save_stack+0x3c/0x68
[   23.152207]  kasan_save_track+0x20/0x40
[   23.152552]  kasan_save_alloc_info+0x40/0x58
[   23.152935]  __kasan_kmalloc+0xd4/0xd8
[   23.153272]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.153679]  kasan_atomics+0xb8/0x2e0
[   23.154008]  kunit_try_run_case+0x170/0x3f0
[   23.154384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.154875]  kthread+0x328/0x630
[   23.155168]  ret_from_fork+0x10/0x20
[   23.155490] 
[   23.155627] The buggy address belongs to the object at ffff00000ea09200
[   23.155627]  which belongs to the cache kmalloc-64 of size 64
[   23.156709] The buggy address is located 0 bytes to the right of
[   23.156709]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.157838] 
[   23.157976] The buggy address belongs to the physical page:
[   23.158467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.159159] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.159738] page_type: f5(slab)
[   23.160022] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.160706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.161388] page dumped because: kasan: bad access detected
[   23.161879] 
[   23.162016] Memory state around the buggy address:
[   23.162441]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.163078]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.163715] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.164350]                                      ^
[   23.164775]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.165413]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.166049] ==================================================================
[   23.541475] ==================================================================
[   23.542112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   23.542765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.543419] 
[   23.543557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.543571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.543575] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.543581] Call trace:
[   23.543584]  show_stack+0x20/0x38 (C)
[   23.543593]  dump_stack_lvl+0x8c/0xd0
[   23.543601]  print_report+0x118/0x608
[   23.543610]  kasan_report+0xdc/0x128
[   23.543618]  kasan_check_range+0x100/0x1a8
[   23.543627]  __kasan_check_write+0x20/0x30
[   23.543637]  kasan_atomics_helper+0x126c/0x4858
[   23.543646]  kasan_atomics+0x198/0x2e0
[   23.543654]  kunit_try_run_case+0x170/0x3f0
[   23.543664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.543675]  kthread+0x328/0x630
[   23.543685]  ret_from_fork+0x10/0x20
[   23.543695] 
[   23.549823] Allocated by task 323:
[   23.550127]  kasan_save_stack+0x3c/0x68
[   23.550471]  kasan_save_track+0x20/0x40
[   23.550815]  kasan_save_alloc_info+0x40/0x58
[   23.551198]  __kasan_kmalloc+0xd4/0xd8
[   23.551534]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.551942]  kasan_atomics+0xb8/0x2e0
[   23.552270]  kunit_try_run_case+0x170/0x3f0
[   23.552646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.553137]  kthread+0x328/0x630
[   23.553429]  ret_from_fork+0x10/0x20
[   23.553752] 
[   23.553888] The buggy address belongs to the object at ffff00000ea09200
[   23.553888]  which belongs to the cache kmalloc-64 of size 64
[   23.554971] The buggy address is located 0 bytes to the right of
[   23.554971]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.556100] 
[   23.556238] The buggy address belongs to the physical page:
[   23.556729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.557421] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.558000] page_type: f5(slab)
[   23.558284] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.558968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.559650] page dumped because: kasan: bad access detected
[   23.560142] 
[   23.560280] Memory state around the buggy address:
[   23.560705]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.561344]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.561981] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.562618]                                      ^
[   23.563044]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.563681]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.564316] ==================================================================
[   23.729167] ==================================================================
[   23.729804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   23.730457] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.731111] 
[   23.731249] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.731263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.731268] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.731273] Call trace:
[   23.731276]  show_stack+0x20/0x38 (C)
[   23.731285]  dump_stack_lvl+0x8c/0xd0
[   23.731294]  print_report+0x118/0x608
[   23.731302]  kasan_report+0xdc/0x128
[   23.731311]  kasan_check_range+0x100/0x1a8
[   23.731320]  __kasan_check_write+0x20/0x30
[   23.731329]  kasan_atomics_helper+0x15b4/0x4858
[   23.731338]  kasan_atomics+0x198/0x2e0
[   23.731346]  kunit_try_run_case+0x170/0x3f0
[   23.731356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.731368]  kthread+0x328/0x630
[   23.731378]  ret_from_fork+0x10/0x20
[   23.731388] 
[   23.737512] Allocated by task 323:
[   23.737816]  kasan_save_stack+0x3c/0x68
[   23.738161]  kasan_save_track+0x20/0x40
[   23.738505]  kasan_save_alloc_info+0x40/0x58
[   23.738888]  __kasan_kmalloc+0xd4/0xd8
[   23.739225]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.739632]  kasan_atomics+0xb8/0x2e0
[   23.739961]  kunit_try_run_case+0x170/0x3f0
[   23.740337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.740827]  kthread+0x328/0x630
[   23.741120]  ret_from_fork+0x10/0x20
[   23.741443] 
[   23.741579] The buggy address belongs to the object at ffff00000ea09200
[   23.741579]  which belongs to the cache kmalloc-64 of size 64
[   23.742662] The buggy address is located 0 bytes to the right of
[   23.742662]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.743791] 
[   23.743928] The buggy address belongs to the physical page:
[   23.744419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.745111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.745688] page_type: f5(slab)
[   23.745972] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.746656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.747338] page dumped because: kasan: bad access detected
[   23.747830] 
[   23.747966] Memory state around the buggy address:
[   23.748392]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.749029]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.749666] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.750302]                                      ^
[   23.750726]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.751363]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.752000] ==================================================================
[   22.502445] ==================================================================
[   22.503102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   22.503765] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.504428] 
[   22.504577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.504611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.504621] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.504631] Call trace:
[   22.504640]  show_stack+0x20/0x38 (C)
[   22.504660]  dump_stack_lvl+0x8c/0xd0
[   22.504678]  print_report+0x118/0x608
[   22.504697]  kasan_report+0xdc/0x128
[   22.504716]  kasan_check_range+0x100/0x1a8
[   22.504737]  __kasan_check_read+0x20/0x30
[   22.504757]  kasan_atomics_helper+0x2b0/0x4858
[   22.504776]  kasan_atomics+0x198/0x2e0
[   22.504793]  kunit_try_run_case+0x170/0x3f0
[   22.504816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.504843]  kthread+0x328/0x630
[   22.504864]  ret_from_fork+0x10/0x20
[   22.504885] 
[   22.511057] Allocated by task 323:
[   22.511373]  kasan_save_stack+0x3c/0x68
[   22.511733]  kasan_save_track+0x20/0x40
[   22.512091]  kasan_save_alloc_info+0x40/0x58
[   22.512490]  __kasan_kmalloc+0xd4/0xd8
[   22.512841]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.513268]  kasan_atomics+0xb8/0x2e0
[   22.513609]  kunit_try_run_case+0x170/0x3f0
[   22.514002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.514509]  kthread+0x328/0x630
[   22.514818]  ret_from_fork+0x10/0x20
[   22.515156] 
[   22.515302] The buggy address belongs to the object at ffff00000ea09200
[   22.515302]  which belongs to the cache kmalloc-64 of size 64
[   22.516403] The buggy address is located 0 bytes to the right of
[   22.516403]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.517551] 
[   22.517697] The buggy address belongs to the physical page:
[   22.518201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.518909] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.519503] page_type: f5(slab)
[   22.519802] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.520502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.521196] page dumped because: kasan: bad access detected
[   22.521700] 
[   22.521845] Memory state around the buggy address:
[   22.522282]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.522934]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.523587] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.524237]                                      ^
[   22.524675]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.525327]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.525976] ==================================================================
[   23.049795] ==================================================================
[   23.050434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   23.051079] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.051733] 
[   23.051871] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.051886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.051890] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.051895] Call trace:
[   23.051898]  show_stack+0x20/0x38 (C)
[   23.051909]  dump_stack_lvl+0x8c/0xd0
[   23.051917]  print_report+0x118/0x608
[   23.051926]  kasan_report+0xdc/0x128
[   23.051934]  kasan_check_range+0x100/0x1a8
[   23.051943]  __kasan_check_write+0x20/0x30
[   23.051953]  kasan_atomics_helper+0xb70/0x4858
[   23.051962]  kasan_atomics+0x198/0x2e0
[   23.051970]  kunit_try_run_case+0x170/0x3f0
[   23.051980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.051993]  kthread+0x328/0x630
[   23.052003]  ret_from_fork+0x10/0x20
[   23.052012] 
[   23.058133] Allocated by task 323:
[   23.058437]  kasan_save_stack+0x3c/0x68
[   23.058783]  kasan_save_track+0x20/0x40
[   23.059127]  kasan_save_alloc_info+0x40/0x58
[   23.059510]  __kasan_kmalloc+0xd4/0xd8
[   23.059847]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.060255]  kasan_atomics+0xb8/0x2e0
[   23.060584]  kunit_try_run_case+0x170/0x3f0
[   23.060960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.061449]  kthread+0x328/0x630
[   23.061742]  ret_from_fork+0x10/0x20
[   23.062064] 
[   23.062202] The buggy address belongs to the object at ffff00000ea09200
[   23.062202]  which belongs to the cache kmalloc-64 of size 64
[   23.063285] The buggy address is located 0 bytes to the right of
[   23.063285]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.064414] 
[   23.064553] The buggy address belongs to the physical page:
[   23.065044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.065735] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.066312] page_type: f5(slab)
[   23.066597] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.067281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.067963] page dumped because: kasan: bad access detected
[   23.068454] 
[   23.068591] Memory state around the buggy address:
[   23.069017]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.069653]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.070290] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.070927]                                      ^
[   23.071353]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071990]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.072627] ==================================================================
[   23.775847] ==================================================================
[   23.776484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   23.777137] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.777791] 
[   23.777929] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.777943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.777947] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.777952] Call trace:
[   23.777955]  show_stack+0x20/0x38 (C)
[   23.777965]  dump_stack_lvl+0x8c/0xd0
[   23.777973]  print_report+0x118/0x608
[   23.777982]  kasan_report+0xdc/0x128
[   23.777990]  kasan_check_range+0x100/0x1a8
[   23.777999]  __kasan_check_write+0x20/0x30
[   23.778010]  kasan_atomics_helper+0x1644/0x4858
[   23.778018]  kasan_atomics+0x198/0x2e0
[   23.778026]  kunit_try_run_case+0x170/0x3f0
[   23.778037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.778048]  kthread+0x328/0x630
[   23.778058]  ret_from_fork+0x10/0x20
[   23.778067] 
[   23.784197] Allocated by task 323:
[   23.784502]  kasan_save_stack+0x3c/0x68
[   23.784847]  kasan_save_track+0x20/0x40
[   23.785191]  kasan_save_alloc_info+0x40/0x58
[   23.785574]  __kasan_kmalloc+0xd4/0xd8
[   23.785911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.786318]  kasan_atomics+0xb8/0x2e0
[   23.786646]  kunit_try_run_case+0x170/0x3f0
[   23.787022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.787513]  kthread+0x328/0x630
[   23.787805]  ret_from_fork+0x10/0x20
[   23.788128] 
[   23.788265] The buggy address belongs to the object at ffff00000ea09200
[   23.788265]  which belongs to the cache kmalloc-64 of size 64
[   23.789347] The buggy address is located 0 bytes to the right of
[   23.789347]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.790477] 
[   23.790613] The buggy address belongs to the physical page:
[   23.791105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.791796] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.792375] page_type: f5(slab)
[   23.792660] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.793344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.794026] page dumped because: kasan: bad access detected
[   23.794518] 
[   23.794656] Memory state around the buggy address:
[   23.795081]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.795720]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.796357] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.796993]                                      ^
[   23.797419]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.798055]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.798690] ==================================================================
[   22.932516] ==================================================================
[   22.933154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.933800] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.934454] 
[   22.934592] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.934607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.934611] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.934617] Call trace:
[   22.934620]  show_stack+0x20/0x38 (C)
[   22.934629]  dump_stack_lvl+0x8c/0xd0
[   22.934638]  print_report+0x118/0x608
[   22.934647]  kasan_report+0xdc/0x128
[   22.934655]  kasan_check_range+0x100/0x1a8
[   22.934664]  __kasan_check_write+0x20/0x30
[   22.934674]  kasan_atomics_helper+0x99c/0x4858
[   22.934683]  kasan_atomics+0x198/0x2e0
[   22.934690]  kunit_try_run_case+0x170/0x3f0
[   22.934701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.934712]  kthread+0x328/0x630
[   22.934722]  ret_from_fork+0x10/0x20
[   22.934732] 
[   22.940855] Allocated by task 323:
[   22.941159]  kasan_save_stack+0x3c/0x68
[   22.941503]  kasan_save_track+0x20/0x40
[   22.941847]  kasan_save_alloc_info+0x40/0x58
[   22.942229]  __kasan_kmalloc+0xd4/0xd8
[   22.942567]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.942973]  kasan_atomics+0xb8/0x2e0
[   22.943302]  kunit_try_run_case+0x170/0x3f0
[   22.943677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.944167]  kthread+0x328/0x630
[   22.944459]  ret_from_fork+0x10/0x20
[   22.944781] 
[   22.944918] The buggy address belongs to the object at ffff00000ea09200
[   22.944918]  which belongs to the cache kmalloc-64 of size 64
[   22.946000] The buggy address is located 0 bytes to the right of
[   22.946000]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.947130] 
[   22.947266] The buggy address belongs to the physical page:
[   22.947758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.948449] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.949027] page_type: f5(slab)
[   22.949311] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.949995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.950677] page dumped because: kasan: bad access detected
[   22.951168] 
[   22.951305] Memory state around the buggy address:
[   22.951730]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.952367]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.953004] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.953641]                                      ^
[   22.954065]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.954702]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.955337] ==================================================================
[   23.494474] ==================================================================
[   23.495112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   23.495765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.496419] 
[   23.496557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.496572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.496577] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.496581] Call trace:
[   23.496585]  show_stack+0x20/0x38 (C)
[   23.496594]  dump_stack_lvl+0x8c/0xd0
[   23.496603]  print_report+0x118/0x608
[   23.496611]  kasan_report+0xdc/0x128
[   23.496619]  kasan_check_range+0x100/0x1a8
[   23.496629]  __kasan_check_write+0x20/0x30
[   23.496638]  kasan_atomics_helper+0x1190/0x4858
[   23.496647]  kasan_atomics+0x198/0x2e0
[   23.496655]  kunit_try_run_case+0x170/0x3f0
[   23.496666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.496678]  kthread+0x328/0x630
[   23.496687]  ret_from_fork+0x10/0x20
[   23.496697] 
[   23.502825] Allocated by task 323:
[   23.503129]  kasan_save_stack+0x3c/0x68
[   23.503475]  kasan_save_track+0x20/0x40
[   23.503820]  kasan_save_alloc_info+0x40/0x58
[   23.504203]  __kasan_kmalloc+0xd4/0xd8
[   23.504540]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.504947]  kasan_atomics+0xb8/0x2e0
[   23.505276]  kunit_try_run_case+0x170/0x3f0
[   23.505652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.506144]  kthread+0x328/0x630
[   23.506436]  ret_from_fork+0x10/0x20
[   23.506758] 
[   23.506895] The buggy address belongs to the object at ffff00000ea09200
[   23.506895]  which belongs to the cache kmalloc-64 of size 64
[   23.507978] The buggy address is located 0 bytes to the right of
[   23.507978]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.509107] 
[   23.509245] The buggy address belongs to the physical page:
[   23.509737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.510428] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.511006] page_type: f5(slab)
[   23.511290] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.511974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.512656] page dumped because: kasan: bad access detected
[   23.513147] 
[   23.513284] Memory state around the buggy address:
[   23.513709]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.514346]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.514983] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.515619]                                      ^
[   23.516044]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.516681]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.517318] ==================================================================
[   22.955995] ==================================================================
[   22.956632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   22.957277] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.957932] 
[   22.958070] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.958084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.958088] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.958093] Call trace:
[   22.958097]  show_stack+0x20/0x38 (C)
[   22.958106]  dump_stack_lvl+0x8c/0xd0
[   22.958114]  print_report+0x118/0x608
[   22.958123]  kasan_report+0xdc/0x128
[   22.958131]  kasan_check_range+0x100/0x1a8
[   22.958140]  __kasan_check_write+0x20/0x30
[   22.958150]  kasan_atomics_helper+0xa04/0x4858
[   22.958159]  kasan_atomics+0x198/0x2e0
[   22.958167]  kunit_try_run_case+0x170/0x3f0
[   22.958177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.958189]  kthread+0x328/0x630
[   22.958199]  ret_from_fork+0x10/0x20
[   22.958209] 
[   22.964332] Allocated by task 323:
[   22.964636]  kasan_save_stack+0x3c/0x68
[   22.964980]  kasan_save_track+0x20/0x40
[   22.965324]  kasan_save_alloc_info+0x40/0x58
[   22.965707]  __kasan_kmalloc+0xd4/0xd8
[   22.966044]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.966451]  kasan_atomics+0xb8/0x2e0
[   22.966780]  kunit_try_run_case+0x170/0x3f0
[   22.967155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.967646]  kthread+0x328/0x630
[   22.967939]  ret_from_fork+0x10/0x20
[   22.968261] 
[   22.968398] The buggy address belongs to the object at ffff00000ea09200
[   22.968398]  which belongs to the cache kmalloc-64 of size 64
[   22.969480] The buggy address is located 0 bytes to the right of
[   22.969480]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.970609] 
[   22.970746] The buggy address belongs to the physical page:
[   22.971237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.971927] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.972506] page_type: f5(slab)
[   22.972789] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.973472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.974154] page dumped because: kasan: bad access detected
[   22.974646] 
[   22.974782] Memory state around the buggy address:
[   22.975208]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.975844]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.976483] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.977118]                                      ^
[   22.977544]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.978181]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.978817] ==================================================================
[   23.447434] ==================================================================
[   23.448071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   23.448724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.449377] 
[   23.449517] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.449531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.449536] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.449541] Call trace:
[   23.449544]  show_stack+0x20/0x38 (C)
[   23.449554]  dump_stack_lvl+0x8c/0xd0
[   23.449562]  print_report+0x118/0x608
[   23.449571]  kasan_report+0xdc/0x128
[   23.449579]  kasan_check_range+0x100/0x1a8
[   23.449589]  __kasan_check_write+0x20/0x30
[   23.449599]  kasan_atomics_helper+0x10c0/0x4858
[   23.449607]  kasan_atomics+0x198/0x2e0
[   23.449615]  kunit_try_run_case+0x170/0x3f0
[   23.449626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.449638]  kthread+0x328/0x630
[   23.449648]  ret_from_fork+0x10/0x20
[   23.449657] 
[   23.455784] Allocated by task 323:
[   23.456089]  kasan_save_stack+0x3c/0x68
[   23.456432]  kasan_save_track+0x20/0x40
[   23.456777]  kasan_save_alloc_info+0x40/0x58
[   23.457160]  __kasan_kmalloc+0xd4/0xd8
[   23.457497]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.457904]  kasan_atomics+0xb8/0x2e0
[   23.458233]  kunit_try_run_case+0x170/0x3f0
[   23.458608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.459099]  kthread+0x328/0x630
[   23.459392]  ret_from_fork+0x10/0x20
[   23.459714] 
[   23.459851] The buggy address belongs to the object at ffff00000ea09200
[   23.459851]  which belongs to the cache kmalloc-64 of size 64
[   23.460933] The buggy address is located 0 bytes to the right of
[   23.460933]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.462062] 
[   23.462199] The buggy address belongs to the physical page:
[   23.462691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.463383] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.463960] page_type: f5(slab)
[   23.464245] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.464929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.465611] page dumped because: kasan: bad access detected
[   23.466103] 
[   23.466239] Memory state around the buggy address:
[   23.466665]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.467302]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.467940] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.468578]                                      ^
[   23.469002]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.469639]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.470274] ==================================================================
[   23.236622] ==================================================================
[   23.237259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   23.237905] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.238550] 
[   23.238688] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.238702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.238707] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.238712] Call trace:
[   23.238715]  show_stack+0x20/0x38 (C)
[   23.238724]  dump_stack_lvl+0x8c/0xd0
[   23.238733]  print_report+0x118/0x608
[   23.238741]  kasan_report+0xdc/0x128
[   23.238750]  kasan_check_range+0x100/0x1a8
[   23.238759]  __kasan_check_read+0x20/0x30
[   23.238769]  kasan_atomics_helper+0xdd4/0x4858
[   23.238778]  kasan_atomics+0x198/0x2e0
[   23.238786]  kunit_try_run_case+0x170/0x3f0
[   23.238796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.238808]  kthread+0x328/0x630
[   23.238818]  ret_from_fork+0x10/0x20
[   23.238827] 
[   23.244941] Allocated by task 323:
[   23.245245]  kasan_save_stack+0x3c/0x68
[   23.245589]  kasan_save_track+0x20/0x40
[   23.245933]  kasan_save_alloc_info+0x40/0x58
[   23.246316]  __kasan_kmalloc+0xd4/0xd8
[   23.246652]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.247059]  kasan_atomics+0xb8/0x2e0
[   23.247387]  kunit_try_run_case+0x170/0x3f0
[   23.247763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.248253]  kthread+0x328/0x630
[   23.248546]  ret_from_fork+0x10/0x20
[   23.248868] 
[   23.249005] The buggy address belongs to the object at ffff00000ea09200
[   23.249005]  which belongs to the cache kmalloc-64 of size 64
[   23.250087] The buggy address is located 0 bytes to the right of
[   23.250087]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.251217] 
[   23.251353] The buggy address belongs to the physical page:
[   23.251845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.252537] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.253114] page_type: f5(slab)
[   23.253399] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.254082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.254764] page dumped because: kasan: bad access detected
[   23.255255] 
[   23.255393] Memory state around the buggy address:
[   23.255819]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.256457]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.257096] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.257731]                                      ^
[   23.258157]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.258795]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.259431] ==================================================================
[   22.814929] ==================================================================
[   22.815574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   22.816228] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.816888] 
[   22.817030] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.817052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.817059] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.817067] Call trace:
[   22.817072]  show_stack+0x20/0x38 (C)
[   22.817085]  dump_stack_lvl+0x8c/0xd0
[   22.817098]  print_report+0x118/0x608
[   22.817111]  kasan_report+0xdc/0x128
[   22.817124]  kasan_check_range+0x100/0x1a8
[   22.817138]  __kasan_check_write+0x20/0x30
[   22.817153]  kasan_atomics_helper+0x760/0x4858
[   22.817166]  kasan_atomics+0x198/0x2e0
[   22.817178]  kunit_try_run_case+0x170/0x3f0
[   22.817193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.817210]  kthread+0x328/0x630
[   22.817225]  ret_from_fork+0x10/0x20
[   22.817240] 
[   22.823384] Allocated by task 323:
[   22.823692]  kasan_save_stack+0x3c/0x68
[   22.824043]  kasan_save_track+0x20/0x40
[   22.824393]  kasan_save_alloc_info+0x40/0x58
[   22.824783]  __kasan_kmalloc+0xd4/0xd8
[   22.825125]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.825540]  kasan_atomics+0xb8/0x2e0
[   22.825874]  kunit_try_run_case+0x170/0x3f0
[   22.826257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826754]  kthread+0x328/0x630
[   22.827054]  ret_from_fork+0x10/0x20
[   22.827383] 
[   22.827523] The buggy address belongs to the object at ffff00000ea09200
[   22.827523]  which belongs to the cache kmalloc-64 of size 64
[   22.828613] The buggy address is located 0 bytes to the right of
[   22.828613]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.829749] 
[   22.829891] The buggy address belongs to the physical page:
[   22.830389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.831087] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.831672] page_type: f5(slab)
[   22.831960] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.832651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.833339] page dumped because: kasan: bad access detected
[   22.833836] 
[   22.833976] Memory state around the buggy address:
[   22.834405]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835049]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835692] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.836334]                                      ^
[   22.836764]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.837408]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.838050] ==================================================================
[   23.213418] ==================================================================
[   23.214057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   23.214711] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.215356] 
[   23.215495] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.215509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.215513] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.215518] Call trace:
[   23.215521]  show_stack+0x20/0x38 (C)
[   23.215530]  dump_stack_lvl+0x8c/0xd0
[   23.215539]  print_report+0x118/0x608
[   23.215548]  kasan_report+0xdc/0x128
[   23.215556]  __asan_report_load4_noabort+0x20/0x30
[   23.215566]  kasan_atomics_helper+0x3e04/0x4858
[   23.215575]  kasan_atomics+0x198/0x2e0
[   23.215583]  kunit_try_run_case+0x170/0x3f0
[   23.215593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.215605]  kthread+0x328/0x630
[   23.215615]  ret_from_fork+0x10/0x20
[   23.215625] 
[   23.221456] Allocated by task 323:
[   23.221760]  kasan_save_stack+0x3c/0x68
[   23.222104]  kasan_save_track+0x20/0x40
[   23.222449]  kasan_save_alloc_info+0x40/0x58
[   23.222832]  __kasan_kmalloc+0xd4/0xd8
[   23.223169]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.223577]  kasan_atomics+0xb8/0x2e0
[   23.223906]  kunit_try_run_case+0x170/0x3f0
[   23.224282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.224772]  kthread+0x328/0x630
[   23.225064]  ret_from_fork+0x10/0x20
[   23.225387] 
[   23.225523] The buggy address belongs to the object at ffff00000ea09200
[   23.225523]  which belongs to the cache kmalloc-64 of size 64
[   23.226606] The buggy address is located 0 bytes to the right of
[   23.226606]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.227735] 
[   23.227873] The buggy address belongs to the physical page:
[   23.228364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.229056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.229635] page_type: f5(slab)
[   23.229918] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.230602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.231283] page dumped because: kasan: bad access detected
[   23.231775] 
[   23.231911] Memory state around the buggy address:
[   23.232336]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.232973]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.233610] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.234246]                                      ^
[   23.234671]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.235307]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.235943] ==================================================================
[   23.752658] ==================================================================
[   23.753295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   23.753948] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.754594] 
[   23.754732] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.754746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.754751] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.754755] Call trace:
[   23.754759]  show_stack+0x20/0x38 (C)
[   23.754768]  dump_stack_lvl+0x8c/0xd0
[   23.754776]  print_report+0x118/0x608
[   23.754784]  kasan_report+0xdc/0x128
[   23.754793]  __asan_report_load8_noabort+0x20/0x30
[   23.754803]  kasan_atomics_helper+0x3db0/0x4858
[   23.754812]  kasan_atomics+0x198/0x2e0
[   23.754820]  kunit_try_run_case+0x170/0x3f0
[   23.754830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.754842]  kthread+0x328/0x630
[   23.754852]  ret_from_fork+0x10/0x20
[   23.754861] 
[   23.760691] Allocated by task 323:
[   23.760995]  kasan_save_stack+0x3c/0x68
[   23.761341]  kasan_save_track+0x20/0x40
[   23.761685]  kasan_save_alloc_info+0x40/0x58
[   23.762067]  __kasan_kmalloc+0xd4/0xd8
[   23.762405]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.762812]  kasan_atomics+0xb8/0x2e0
[   23.763140]  kunit_try_run_case+0x170/0x3f0
[   23.763516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.764007]  kthread+0x328/0x630
[   23.764299]  ret_from_fork+0x10/0x20
[   23.764622] 
[   23.764760] The buggy address belongs to the object at ffff00000ea09200
[   23.764760]  which belongs to the cache kmalloc-64 of size 64
[   23.765842] The buggy address is located 0 bytes to the right of
[   23.765842]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.766972] 
[   23.767109] The buggy address belongs to the physical page:
[   23.767600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.768291] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.768869] page_type: f5(slab)
[   23.769154] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.769838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.770519] page dumped because: kasan: bad access detected
[   23.771011] 
[   23.771148] Memory state around the buggy address:
[   23.771574]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.772210]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.772847] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.773483]                                      ^
[   23.773908]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.774546]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.775182] ==================================================================
[   23.353479] ==================================================================
[   23.354115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   23.354760] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.355414] 
[   23.355552] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.355567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.355571] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.355576] Call trace:
[   23.355579]  show_stack+0x20/0x38 (C)
[   23.355588]  dump_stack_lvl+0x8c/0xd0
[   23.355597]  print_report+0x118/0x608
[   23.355605]  kasan_report+0xdc/0x128
[   23.355614]  kasan_check_range+0x100/0x1a8
[   23.355622]  __kasan_check_write+0x20/0x30
[   23.355632]  kasan_atomics_helper+0xf20/0x4858
[   23.355641]  kasan_atomics+0x198/0x2e0
[   23.355648]  kunit_try_run_case+0x170/0x3f0
[   23.355659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.355671]  kthread+0x328/0x630
[   23.355681]  ret_from_fork+0x10/0x20
[   23.355690] 
[   23.361813] Allocated by task 323:
[   23.362118]  kasan_save_stack+0x3c/0x68
[   23.362463]  kasan_save_track+0x20/0x40
[   23.362806]  kasan_save_alloc_info+0x40/0x58
[   23.363189]  __kasan_kmalloc+0xd4/0xd8
[   23.363526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.363933]  kasan_atomics+0xb8/0x2e0
[   23.364262]  kunit_try_run_case+0x170/0x3f0
[   23.364637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.365128]  kthread+0x328/0x630
[   23.365421]  ret_from_fork+0x10/0x20
[   23.365743] 
[   23.365881] The buggy address belongs to the object at ffff00000ea09200
[   23.365881]  which belongs to the cache kmalloc-64 of size 64
[   23.366964] The buggy address is located 0 bytes to the right of
[   23.366964]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.368093] 
[   23.368230] The buggy address belongs to the physical page:
[   23.368722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.369412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.369990] page_type: f5(slab)
[   23.370274] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.370958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.371640] page dumped because: kasan: bad access detected
[   23.372132] 
[   23.372269] Memory state around the buggy address:
[   23.372693]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.373330]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.373966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.374603]                                      ^
[   23.375029]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375666]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.376303] ==================================================================
[   22.427702] ==================================================================
[   22.428388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   22.429083] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.429768] 
[   22.429936] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.429988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.430003] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.430021] Call trace:
[   22.430035]  show_stack+0x20/0x38 (C)
[   22.430068]  dump_stack_lvl+0x8c/0xd0
[   22.430100]  print_report+0x118/0x608
[   22.430133]  kasan_report+0xdc/0x128
[   22.430163]  __asan_report_store4_noabort+0x20/0x30
[   22.430199]  kasan_atomics_helper+0x3f7c/0x4858
[   22.430230]  kasan_atomics+0x198/0x2e0
[   22.430257]  kunit_try_run_case+0x170/0x3f0
[   22.430294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.430335]  kthread+0x328/0x630
[   22.430370]  ret_from_fork+0x10/0x20
[   22.430404] 
[   22.436361] Allocated by task 323:
[   22.436690]  kasan_save_stack+0x3c/0x68
[   22.437065]  kasan_save_track+0x20/0x40
[   22.437439]  kasan_save_alloc_info+0x40/0x58
[   22.437854]  __kasan_kmalloc+0xd4/0xd8
[   22.438218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.438659]  kasan_atomics+0xb8/0x2e0
[   22.439016]  kunit_try_run_case+0x170/0x3f0
[   22.439424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.439951]  kthread+0x328/0x630
[   22.440275]  ret_from_fork+0x10/0x20
[   22.440626] 
[   22.440781] The buggy address belongs to the object at ffff00000ea09200
[   22.440781]  which belongs to the cache kmalloc-64 of size 64
[   22.441900] The buggy address is located 0 bytes to the right of
[   22.441900]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.443067] 
[   22.443223] The buggy address belongs to the physical page:
[   22.443740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.444465] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.445078] page_type: f5(slab)
[   22.445393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.446111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.446820] page dumped because: kasan: bad access detected
[   22.447336] 
[   22.447490] Memory state around the buggy address:
[   22.447939]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.448608]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.449276] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.449939]                                      ^
[   22.450388]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451056]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451719] ==================================================================
[   22.719496] ==================================================================
[   22.720140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   22.720793] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.721452] 
[   22.721595] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.721616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.721623] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.721630] Call trace:
[   22.721635]  show_stack+0x20/0x38 (C)
[   22.721649]  dump_stack_lvl+0x8c/0xd0
[   22.721662]  print_report+0x118/0x608
[   22.721675]  kasan_report+0xdc/0x128
[   22.721687]  kasan_check_range+0x100/0x1a8
[   22.721701]  __kasan_check_write+0x20/0x30
[   22.721716]  kasan_atomics_helper+0x5b4/0x4858
[   22.721728]  kasan_atomics+0x198/0x2e0
[   22.721741]  kunit_try_run_case+0x170/0x3f0
[   22.721756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.721773]  kthread+0x328/0x630
[   22.721788]  ret_from_fork+0x10/0x20
[   22.721803] 
[   22.727949] Allocated by task 323:
[   22.728258]  kasan_save_stack+0x3c/0x68
[   22.728609]  kasan_save_track+0x20/0x40
[   22.728959]  kasan_save_alloc_info+0x40/0x58
[   22.729349]  __kasan_kmalloc+0xd4/0xd8
[   22.729691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.730106]  kasan_atomics+0xb8/0x2e0
[   22.730441]  kunit_try_run_case+0x170/0x3f0
[   22.730824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.731321]  kthread+0x328/0x630
[   22.731621]  ret_from_fork+0x10/0x20
[   22.731950] 
[   22.732090] The buggy address belongs to the object at ffff00000ea09200
[   22.732090]  which belongs to the cache kmalloc-64 of size 64
[   22.733180] The buggy address is located 0 bytes to the right of
[   22.733180]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.734317] 
[   22.734457] The buggy address belongs to the physical page:
[   22.734954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.735652] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.736237] page_type: f5(slab)
[   22.736528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.737218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.737904] page dumped because: kasan: bad access detected
[   22.738402] 
[   22.738542] Memory state around the buggy address:
[   22.738972]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.739615]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.740259] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.740901]                                      ^
[   22.741331]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.741974]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.742616] ==================================================================
[   23.846081] ==================================================================
[   23.846719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   23.847372] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.848018] 
[   23.848156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.848170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.848175] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.848179] Call trace:
[   23.848183]  show_stack+0x20/0x38 (C)
[   23.848192]  dump_stack_lvl+0x8c/0xd0
[   23.848201]  print_report+0x118/0x608
[   23.848210]  kasan_report+0xdc/0x128
[   23.848218]  __asan_report_load8_noabort+0x20/0x30
[   23.848229]  kasan_atomics_helper+0x3e10/0x4858
[   23.848237]  kasan_atomics+0x198/0x2e0
[   23.848245]  kunit_try_run_case+0x170/0x3f0
[   23.848255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.848267]  kthread+0x328/0x630
[   23.848277]  ret_from_fork+0x10/0x20
[   23.848287] 
[   23.854112] Allocated by task 323:
[   23.854415]  kasan_save_stack+0x3c/0x68
[   23.854760]  kasan_save_track+0x20/0x40
[   23.855104]  kasan_save_alloc_info+0x40/0x58
[   23.855487]  __kasan_kmalloc+0xd4/0xd8
[   23.855824]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.856231]  kasan_atomics+0xb8/0x2e0
[   23.856560]  kunit_try_run_case+0x170/0x3f0
[   23.856937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.857427]  kthread+0x328/0x630
[   23.857721]  ret_from_fork+0x10/0x20
[   23.858043] 
[   23.858181] The buggy address belongs to the object at ffff00000ea09200
[   23.858181]  which belongs to the cache kmalloc-64 of size 64
[   23.859265] The buggy address is located 0 bytes to the right of
[   23.859265]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.860395] 
[   23.860531] The buggy address belongs to the physical page:
[   23.861023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.861715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.862294] page_type: f5(slab)
[   23.862578] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.863262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.863944] page dumped because: kasan: bad access detected
[   23.864436] 
[   23.864573] Memory state around the buggy address:
[   23.864998]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.865635]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.866272] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.866909]                                      ^
[   23.867335]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.867972]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.868609] ==================================================================
[   23.799355] ==================================================================
[   23.799993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   23.800647] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.801293] 
[   23.801432] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.801446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.801450] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.801455] Call trace:
[   23.801458]  show_stack+0x20/0x38 (C)
[   23.801468]  dump_stack_lvl+0x8c/0xd0
[   23.801476]  print_report+0x118/0x608
[   23.801485]  kasan_report+0xdc/0x128
[   23.801493]  __asan_report_load8_noabort+0x20/0x30
[   23.801504]  kasan_atomics_helper+0x3df4/0x4858
[   23.801512]  kasan_atomics+0x198/0x2e0
[   23.801520]  kunit_try_run_case+0x170/0x3f0
[   23.801531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.801543]  kthread+0x328/0x630
[   23.801553]  ret_from_fork+0x10/0x20
[   23.801563] 
[   23.807390] Allocated by task 323:
[   23.807694]  kasan_save_stack+0x3c/0x68
[   23.808039]  kasan_save_track+0x20/0x40
[   23.808382]  kasan_save_alloc_info+0x40/0x58
[   23.808765]  __kasan_kmalloc+0xd4/0xd8
[   23.809102]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.809509]  kasan_atomics+0xb8/0x2e0
[   23.809838]  kunit_try_run_case+0x170/0x3f0
[   23.810213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.810703]  kthread+0x328/0x630
[   23.810996]  ret_from_fork+0x10/0x20
[   23.811318] 
[   23.811455] The buggy address belongs to the object at ffff00000ea09200
[   23.811455]  which belongs to the cache kmalloc-64 of size 64
[   23.812538] The buggy address is located 0 bytes to the right of
[   23.812538]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.813667] 
[   23.813804] The buggy address belongs to the physical page:
[   23.814296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.814988] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.815565] page_type: f5(slab)
[   23.815850] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.816532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.817214] page dumped because: kasan: bad access detected
[   23.817706] 
[   23.817843] Memory state around the buggy address:
[   23.818268]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.818907]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.819546] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.820181]                                      ^
[   23.820607]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.821244]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.821880] ==================================================================
[   23.915986] ==================================================================
[   23.916623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   23.917277] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.917931] 
[   23.918069] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.918084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.918088] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.918093] Call trace:
[   23.918096]  show_stack+0x20/0x38 (C)
[   23.918105]  dump_stack_lvl+0x8c/0xd0
[   23.918114]  print_report+0x118/0x608
[   23.918123]  kasan_report+0xdc/0x128
[   23.918132]  kasan_check_range+0x100/0x1a8
[   23.918141]  __kasan_check_write+0x20/0x30
[   23.918150]  kasan_atomics_helper+0x17ec/0x4858
[   23.918159]  kasan_atomics+0x198/0x2e0
[   23.918166]  kunit_try_run_case+0x170/0x3f0
[   23.918178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.918190]  kthread+0x328/0x630
[   23.918200]  ret_from_fork+0x10/0x20
[   23.918209] 
[   23.924336] Allocated by task 323:
[   23.924641]  kasan_save_stack+0x3c/0x68
[   23.924985]  kasan_save_track+0x20/0x40
[   23.925329]  kasan_save_alloc_info+0x40/0x58
[   23.925711]  __kasan_kmalloc+0xd4/0xd8
[   23.926048]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.926456]  kasan_atomics+0xb8/0x2e0
[   23.926785]  kunit_try_run_case+0x170/0x3f0
[   23.927160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.927651]  kthread+0x328/0x630
[   23.927944]  ret_from_fork+0x10/0x20
[   23.928266] 
[   23.928403] The buggy address belongs to the object at ffff00000ea09200
[   23.928403]  which belongs to the cache kmalloc-64 of size 64
[   23.929485] The buggy address is located 0 bytes to the right of
[   23.929485]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.930615] 
[   23.930751] The buggy address belongs to the physical page:
[   23.931243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.931935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.932514] page_type: f5(slab)
[   23.932799] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.933482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.934164] page dumped because: kasan: bad access detected
[   23.934657] 
[   23.934793] Memory state around the buggy address:
[   23.935219]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.935856]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.936493] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.937129]                                      ^
[   23.937553]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938190]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938826] ==================================================================
[   22.623537] ==================================================================
[   22.624194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   22.624857] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.625526] 
[   22.625675] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.625707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.625717] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.625727] Call trace:
[   22.625735]  show_stack+0x20/0x38 (C)
[   22.625755]  dump_stack_lvl+0x8c/0xd0
[   22.625775]  print_report+0x118/0x608
[   22.625794]  kasan_report+0xdc/0x128
[   22.625812]  kasan_check_range+0x100/0x1a8
[   22.625832]  __kasan_check_write+0x20/0x30
[   22.625854]  kasan_atomics_helper+0x414/0x4858
[   22.625873]  kasan_atomics+0x198/0x2e0
[   22.625890]  kunit_try_run_case+0x170/0x3f0
[   22.625913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.625940]  kthread+0x328/0x630
[   22.625962]  ret_from_fork+0x10/0x20
[   22.625984] 
[   22.632166] Allocated by task 323:
[   22.632482]  kasan_save_stack+0x3c/0x68
[   22.632842]  kasan_save_track+0x20/0x40
[   22.633200]  kasan_save_alloc_info+0x40/0x58
[   22.633598]  __kasan_kmalloc+0xd4/0xd8
[   22.633949]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.634376]  kasan_atomics+0xb8/0x2e0
[   22.634718]  kunit_try_run_case+0x170/0x3f0
[   22.635109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.635618]  kthread+0x328/0x630
[   22.635927]  ret_from_fork+0x10/0x20
[   22.636266] 
[   22.636411] The buggy address belongs to the object at ffff00000ea09200
[   22.636411]  which belongs to the cache kmalloc-64 of size 64
[   22.637512] The buggy address is located 0 bytes to the right of
[   22.637512]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.638660] 
[   22.638806] The buggy address belongs to the physical page:
[   22.639311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.640019] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.640612] page_type: f5(slab)
[   22.640910] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.641610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.642305] page dumped because: kasan: bad access detected
[   22.642809] 
[   22.642955] Memory state around the buggy address:
[   22.643393]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.644046]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.644698] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.645348]                                      ^
[   22.645786]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.646438]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.647088] ==================================================================
[   22.526768] ==================================================================
[   22.527421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   22.528092] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.528754] 
[   22.528904] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.528937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.528946] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.528958] Call trace:
[   22.528965]  show_stack+0x20/0x38 (C)
[   22.528986]  dump_stack_lvl+0x8c/0xd0
[   22.529005]  print_report+0x118/0x608
[   22.529024]  kasan_report+0xdc/0x128
[   22.529042]  __asan_report_load4_noabort+0x20/0x30
[   22.529065]  kasan_atomics_helper+0x40fc/0x4858
[   22.529084]  kasan_atomics+0x198/0x2e0
[   22.529102]  kunit_try_run_case+0x170/0x3f0
[   22.529125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.529151]  kthread+0x328/0x630
[   22.529173]  ret_from_fork+0x10/0x20
[   22.529193] 
[   22.535082] Allocated by task 323:
[   22.535398]  kasan_save_stack+0x3c/0x68
[   22.535757]  kasan_save_track+0x20/0x40
[   22.536116]  kasan_save_alloc_info+0x40/0x58
[   22.536514]  __kasan_kmalloc+0xd4/0xd8
[   22.536864]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.537290]  kasan_atomics+0xb8/0x2e0
[   22.537631]  kunit_try_run_case+0x170/0x3f0
[   22.538024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.538532]  kthread+0x328/0x630
[   22.538841]  ret_from_fork+0x10/0x20
[   22.539178] 
[   22.539325] The buggy address belongs to the object at ffff00000ea09200
[   22.539325]  which belongs to the cache kmalloc-64 of size 64
[   22.540426] The buggy address is located 0 bytes to the right of
[   22.540426]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.541575] 
[   22.541721] The buggy address belongs to the physical page:
[   22.542224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.542931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.543526] page_type: f5(slab)
[   22.543824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.544524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.545220] page dumped because: kasan: bad access detected
[   22.545723] 
[   22.545868] Memory state around the buggy address:
[   22.546305]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.546958]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.547611] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.548260]                                      ^
[   22.548698]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.549350]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.550000] ==================================================================
[   23.283297] ==================================================================
[   23.283934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   23.284579] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.285232] 
[   23.285371] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.285385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.285389] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.285394] Call trace:
[   23.285397]  show_stack+0x20/0x38 (C)
[   23.285406]  dump_stack_lvl+0x8c/0xd0
[   23.285415]  print_report+0x118/0x608
[   23.285424]  kasan_report+0xdc/0x128
[   23.285432]  kasan_check_range+0x100/0x1a8
[   23.285441]  __kasan_check_write+0x20/0x30
[   23.285451]  kasan_atomics_helper+0xe44/0x4858
[   23.285460]  kasan_atomics+0x198/0x2e0
[   23.285467]  kunit_try_run_case+0x170/0x3f0
[   23.285478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.285489]  kthread+0x328/0x630
[   23.285499]  ret_from_fork+0x10/0x20
[   23.285509] 
[   23.291630] Allocated by task 323:
[   23.291934]  kasan_save_stack+0x3c/0x68
[   23.292278]  kasan_save_track+0x20/0x40
[   23.292622]  kasan_save_alloc_info+0x40/0x58
[   23.293004]  __kasan_kmalloc+0xd4/0xd8
[   23.293342]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.293748]  kasan_atomics+0xb8/0x2e0
[   23.294077]  kunit_try_run_case+0x170/0x3f0
[   23.294454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.294943]  kthread+0x328/0x630
[   23.295236]  ret_from_fork+0x10/0x20
[   23.295558] 
[   23.295695] The buggy address belongs to the object at ffff00000ea09200
[   23.295695]  which belongs to the cache kmalloc-64 of size 64
[   23.296778] The buggy address is located 0 bytes to the right of
[   23.296778]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.297907] 
[   23.298044] The buggy address belongs to the physical page:
[   23.298537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.299228] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.299806] page_type: f5(slab)
[   23.300089] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.300773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.301455] page dumped because: kasan: bad access detected
[   23.301947] 
[   23.302084] Memory state around the buggy address:
[   23.302509]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.303146]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.303783] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.304419]                                      ^
[   23.304845]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.305483]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.306119] ==================================================================
[   23.306770] ==================================================================
[   23.307407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   23.308060] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.308714] 
[   23.308851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.308866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.308870] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.308875] Call trace:
[   23.308878]  show_stack+0x20/0x38 (C)
[   23.308887]  dump_stack_lvl+0x8c/0xd0
[   23.308896]  print_report+0x118/0x608
[   23.308905]  kasan_report+0xdc/0x128
[   23.308913]  __asan_report_store8_noabort+0x20/0x30
[   23.308923]  kasan_atomics_helper+0x3e5c/0x4858
[   23.308932]  kasan_atomics+0x198/0x2e0
[   23.308940]  kunit_try_run_case+0x170/0x3f0
[   23.308950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.308961]  kthread+0x328/0x630
[   23.308971]  ret_from_fork+0x10/0x20
[   23.308981] 
[   23.314818] Allocated by task 323:
[   23.315123]  kasan_save_stack+0x3c/0x68
[   23.315467]  kasan_save_track+0x20/0x40
[   23.315811]  kasan_save_alloc_info+0x40/0x58
[   23.316194]  __kasan_kmalloc+0xd4/0xd8
[   23.316531]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.316939]  kasan_atomics+0xb8/0x2e0
[   23.317268]  kunit_try_run_case+0x170/0x3f0
[   23.317643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.318133]  kthread+0x328/0x630
[   23.318426]  ret_from_fork+0x10/0x20
[   23.318748] 
[   23.318886] The buggy address belongs to the object at ffff00000ea09200
[   23.318886]  which belongs to the cache kmalloc-64 of size 64
[   23.319969] The buggy address is located 0 bytes to the right of
[   23.319969]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.321098] 
[   23.321235] The buggy address belongs to the physical page:
[   23.321727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.322419] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.322997] page_type: f5(slab)
[   23.323282] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.323966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.324648] page dumped because: kasan: bad access detected
[   23.325139] 
[   23.325276] Memory state around the buggy address:
[   23.325701]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.326340]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.326978] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.327614]                                      ^
[   23.328039]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.328678]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.329313] ==================================================================
[   23.376955] ==================================================================
[   23.377591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   23.378237] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.378890] 
[   23.379028] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.379042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.379046] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.379051] Call trace:
[   23.379054]  show_stack+0x20/0x38 (C)
[   23.379063]  dump_stack_lvl+0x8c/0xd0
[   23.379072]  print_report+0x118/0x608
[   23.379081]  kasan_report+0xdc/0x128
[   23.379089]  kasan_check_range+0x100/0x1a8
[   23.379099]  __kasan_check_write+0x20/0x30
[   23.379108]  kasan_atomics_helper+0xf88/0x4858
[   23.379117]  kasan_atomics+0x198/0x2e0
[   23.379124]  kunit_try_run_case+0x170/0x3f0
[   23.379135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.379146]  kthread+0x328/0x630
[   23.379156]  ret_from_fork+0x10/0x20
[   23.379166] 
[   23.385289] Allocated by task 323:
[   23.385594]  kasan_save_stack+0x3c/0x68
[   23.385938]  kasan_save_track+0x20/0x40
[   23.386282]  kasan_save_alloc_info+0x40/0x58
[   23.386665]  __kasan_kmalloc+0xd4/0xd8
[   23.387002]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.387409]  kasan_atomics+0xb8/0x2e0
[   23.387738]  kunit_try_run_case+0x170/0x3f0
[   23.388113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.388602]  kthread+0x328/0x630
[   23.388896]  ret_from_fork+0x10/0x20
[   23.389218] 
[   23.389356] The buggy address belongs to the object at ffff00000ea09200
[   23.389356]  which belongs to the cache kmalloc-64 of size 64
[   23.390438] The buggy address is located 0 bytes to the right of
[   23.390438]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.391568] 
[   23.391705] The buggy address belongs to the physical page:
[   23.392196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.392887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.393465] page_type: f5(slab)
[   23.393749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.394433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.395115] page dumped because: kasan: bad access detected
[   23.395607] 
[   23.395745] Memory state around the buggy address:
[   23.396170]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.396807]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.397446] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.398083]                                      ^
[   23.398508]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399145]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399781] ==================================================================
[   23.822556] ==================================================================
[   23.823194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   23.823847] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.824501] 
[   23.824640] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.824655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.824659] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.824664] Call trace:
[   23.824667]  show_stack+0x20/0x38 (C)
[   23.824676]  dump_stack_lvl+0x8c/0xd0
[   23.824685]  print_report+0x118/0x608
[   23.824694]  kasan_report+0xdc/0x128
[   23.824702]  kasan_check_range+0x100/0x1a8
[   23.824712]  __kasan_check_write+0x20/0x30
[   23.824721]  kasan_atomics_helper+0x16d0/0x4858
[   23.824730]  kasan_atomics+0x198/0x2e0
[   23.824738]  kunit_try_run_case+0x170/0x3f0
[   23.824748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.824760]  kthread+0x328/0x630
[   23.824770]  ret_from_fork+0x10/0x20
[   23.824779] 
[   23.830906] Allocated by task 323:
[   23.831210]  kasan_save_stack+0x3c/0x68
[   23.831554]  kasan_save_track+0x20/0x40
[   23.831897]  kasan_save_alloc_info+0x40/0x58
[   23.832280]  __kasan_kmalloc+0xd4/0xd8
[   23.832617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.833024]  kasan_atomics+0xb8/0x2e0
[   23.833353]  kunit_try_run_case+0x170/0x3f0
[   23.833729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.834220]  kthread+0x328/0x630
[   23.834513]  ret_from_fork+0x10/0x20
[   23.834835] 
[   23.834971] The buggy address belongs to the object at ffff00000ea09200
[   23.834971]  which belongs to the cache kmalloc-64 of size 64
[   23.836054] The buggy address is located 0 bytes to the right of
[   23.836054]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.837183] 
[   23.837320] The buggy address belongs to the physical page:
[   23.837813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.838505] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.839084] page_type: f5(slab)
[   23.839368] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.840052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.840734] page dumped because: kasan: bad access detected
[   23.841226] 
[   23.841362] Memory state around the buggy address:
[   23.841788]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.842424]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.843062] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.843699]                                      ^
[   23.844125]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844763]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845399] ==================================================================
[   22.767203] ==================================================================
[   22.767847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   22.768498] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.769158] 
[   22.769301] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.769323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.769329] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.769336] Call trace:
[   22.769341]  show_stack+0x20/0x38 (C)
[   22.769355]  dump_stack_lvl+0x8c/0xd0
[   22.769368]  print_report+0x118/0x608
[   22.769381]  kasan_report+0xdc/0x128
[   22.769394]  kasan_check_range+0x100/0x1a8
[   22.769408]  __kasan_check_write+0x20/0x30
[   22.769422]  kasan_atomics_helper+0x684/0x4858
[   22.769435]  kasan_atomics+0x198/0x2e0
[   22.769447]  kunit_try_run_case+0x170/0x3f0
[   22.769463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.769480]  kthread+0x328/0x630
[   22.769495]  ret_from_fork+0x10/0x20
[   22.769510] 
[   22.775656] Allocated by task 323:
[   22.775965]  kasan_save_stack+0x3c/0x68
[   22.776316]  kasan_save_track+0x20/0x40
[   22.776667]  kasan_save_alloc_info+0x40/0x58
[   22.777057]  __kasan_kmalloc+0xd4/0xd8
[   22.777398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.777815]  kasan_atomics+0xb8/0x2e0
[   22.778149]  kunit_try_run_case+0x170/0x3f0
[   22.778532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.779029]  kthread+0x328/0x630
[   22.779329]  ret_from_fork+0x10/0x20
[   22.779658] 
[   22.779798] The buggy address belongs to the object at ffff00000ea09200
[   22.779798]  which belongs to the cache kmalloc-64 of size 64
[   22.780888] The buggy address is located 0 bytes to the right of
[   22.780888]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.782024] 
[   22.782165] The buggy address belongs to the physical page:
[   22.782661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.783359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.783945] page_type: f5(slab)
[   22.784235] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.784925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.785611] page dumped because: kasan: bad access detected
[   22.786109] 
[   22.786249] Memory state around the buggy address:
[   22.786679]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.787322]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.787966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.788608]                                      ^
[   22.789038]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.789681]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.790323] ==================================================================
[   23.517978] ==================================================================
[   23.518616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   23.519269] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.519923] 
[   23.520061] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.520075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.520079] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.520084] Call trace:
[   23.520088]  show_stack+0x20/0x38 (C)
[   23.520097]  dump_stack_lvl+0x8c/0xd0
[   23.520105]  print_report+0x118/0x608
[   23.520114]  kasan_report+0xdc/0x128
[   23.520122]  kasan_check_range+0x100/0x1a8
[   23.520131]  __kasan_check_write+0x20/0x30
[   23.520141]  kasan_atomics_helper+0x11f8/0x4858
[   23.520150]  kasan_atomics+0x198/0x2e0
[   23.520158]  kunit_try_run_case+0x170/0x3f0
[   23.520168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.520179]  kthread+0x328/0x630
[   23.520189]  ret_from_fork+0x10/0x20
[   23.520198] 
[   23.526326] Allocated by task 323:
[   23.526631]  kasan_save_stack+0x3c/0x68
[   23.526975]  kasan_save_track+0x20/0x40
[   23.527320]  kasan_save_alloc_info+0x40/0x58
[   23.527702]  __kasan_kmalloc+0xd4/0xd8
[   23.528039]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.528446]  kasan_atomics+0xb8/0x2e0
[   23.528775]  kunit_try_run_case+0x170/0x3f0
[   23.529151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.529641]  kthread+0x328/0x630
[   23.529934]  ret_from_fork+0x10/0x20
[   23.530257] 
[   23.530393] The buggy address belongs to the object at ffff00000ea09200
[   23.530393]  which belongs to the cache kmalloc-64 of size 64
[   23.531475] The buggy address is located 0 bytes to the right of
[   23.531475]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.532605] 
[   23.532742] The buggy address belongs to the physical page:
[   23.533233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.533925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.534503] page_type: f5(slab)
[   23.534788] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.535472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.536154] page dumped because: kasan: bad access detected
[   23.536646] 
[   23.536782] Memory state around the buggy address:
[   23.537208]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.537844]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.538481] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.539117]                                      ^
[   23.539543]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540181]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540817] ==================================================================
[   22.885851] ==================================================================
[   22.886488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.887141] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.887787] 
[   22.887925] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.887939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.887944] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.887948] Call trace:
[   22.887952]  show_stack+0x20/0x38 (C)
[   22.887961]  dump_stack_lvl+0x8c/0xd0
[   22.887970]  print_report+0x118/0x608
[   22.887978]  kasan_report+0xdc/0x128
[   22.887987]  __asan_report_load4_noabort+0x20/0x30
[   22.887997]  kasan_atomics_helper+0x42d8/0x4858
[   22.888005]  kasan_atomics+0x198/0x2e0
[   22.888013]  kunit_try_run_case+0x170/0x3f0
[   22.888024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.888035]  kthread+0x328/0x630
[   22.888045]  ret_from_fork+0x10/0x20
[   22.888055] 
[   22.893887] Allocated by task 323:
[   22.894192]  kasan_save_stack+0x3c/0x68
[   22.894536]  kasan_save_track+0x20/0x40
[   22.894880]  kasan_save_alloc_info+0x40/0x58
[   22.895262]  __kasan_kmalloc+0xd4/0xd8
[   22.895598]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.896005]  kasan_atomics+0xb8/0x2e0
[   22.896334]  kunit_try_run_case+0x170/0x3f0
[   22.896710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.897200]  kthread+0x328/0x630
[   22.897493]  ret_from_fork+0x10/0x20
[   22.897816] 
[   22.897952] The buggy address belongs to the object at ffff00000ea09200
[   22.897952]  which belongs to the cache kmalloc-64 of size 64
[   22.899035] The buggy address is located 0 bytes to the right of
[   22.899035]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.900163] 
[   22.900300] The buggy address belongs to the physical page:
[   22.900792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.901484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.902061] page_type: f5(slab)
[   22.902346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.903030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.903711] page dumped because: kasan: bad access detected
[   22.904203] 
[   22.904340] Memory state around the buggy address:
[   22.904764]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.905400]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.906038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.906673]                                      ^
[   22.907099]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.907736]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.908372] ==================================================================
[   23.611997] ==================================================================
[   23.612635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   23.613289] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.613935] 
[   23.614073] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.614087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.614091] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.614096] Call trace:
[   23.614100]  show_stack+0x20/0x38 (C)
[   23.614108]  dump_stack_lvl+0x8c/0xd0
[   23.614117]  print_report+0x118/0x608
[   23.614126]  kasan_report+0xdc/0x128
[   23.614134]  __asan_report_load8_noabort+0x20/0x30
[   23.614145]  kasan_atomics_helper+0x3f04/0x4858
[   23.614153]  kasan_atomics+0x198/0x2e0
[   23.614161]  kunit_try_run_case+0x170/0x3f0
[   23.614172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.614183]  kthread+0x328/0x630
[   23.614193]  ret_from_fork+0x10/0x20
[   23.614202] 
[   23.620032] Allocated by task 323:
[   23.620336]  kasan_save_stack+0x3c/0x68
[   23.620680]  kasan_save_track+0x20/0x40
[   23.621024]  kasan_save_alloc_info+0x40/0x58
[   23.621407]  __kasan_kmalloc+0xd4/0xd8
[   23.621744]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.622151]  kasan_atomics+0xb8/0x2e0
[   23.622480]  kunit_try_run_case+0x170/0x3f0
[   23.622857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.623346]  kthread+0x328/0x630
[   23.623639]  ret_from_fork+0x10/0x20
[   23.623961] 
[   23.624098] The buggy address belongs to the object at ffff00000ea09200
[   23.624098]  which belongs to the cache kmalloc-64 of size 64
[   23.625180] The buggy address is located 0 bytes to the right of
[   23.625180]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.626310] 
[   23.626446] The buggy address belongs to the physical page:
[   23.626938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.627629] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.628208] page_type: f5(slab)
[   23.628491] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.629175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.629857] page dumped because: kasan: bad access detected
[   23.630349] 
[   23.630487] Memory state around the buggy address:
[   23.630913]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631549]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.632186] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.632822]                                      ^
[   23.633248]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.633886]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.634522] ==================================================================
[   23.260109] ==================================================================
[   23.260748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   23.261400] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.262045] 
[   23.262184] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.262198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.262202] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.262207] Call trace:
[   23.262210]  show_stack+0x20/0x38 (C)
[   23.262219]  dump_stack_lvl+0x8c/0xd0
[   23.262228]  print_report+0x118/0x608
[   23.262236]  kasan_report+0xdc/0x128
[   23.262245]  __asan_report_load8_noabort+0x20/0x30
[   23.262256]  kasan_atomics_helper+0x3f58/0x4858
[   23.262264]  kasan_atomics+0x198/0x2e0
[   23.262272]  kunit_try_run_case+0x170/0x3f0
[   23.262282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.262294]  kthread+0x328/0x630
[   23.262304]  ret_from_fork+0x10/0x20
[   23.262313] 
[   23.268147] Allocated by task 323:
[   23.268452]  kasan_save_stack+0x3c/0x68
[   23.268796]  kasan_save_track+0x20/0x40
[   23.269140]  kasan_save_alloc_info+0x40/0x58
[   23.269523]  __kasan_kmalloc+0xd4/0xd8
[   23.269860]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.270268]  kasan_atomics+0xb8/0x2e0
[   23.270597]  kunit_try_run_case+0x170/0x3f0
[   23.270973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.271464]  kthread+0x328/0x630
[   23.271757]  ret_from_fork+0x10/0x20
[   23.272080] 
[   23.272216] The buggy address belongs to the object at ffff00000ea09200
[   23.272216]  which belongs to the cache kmalloc-64 of size 64
[   23.273299] The buggy address is located 0 bytes to the right of
[   23.273299]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.274428] 
[   23.274565] The buggy address belongs to the physical page:
[   23.275058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.275749] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.276327] page_type: f5(slab)
[   23.276612] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.277295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.277978] page dumped because: kasan: bad access detected
[   23.278470] 
[   23.278606] Memory state around the buggy address:
[   23.279032]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.279670]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.280307] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.280942]                                      ^
[   23.281367]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.282004]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.282641] ==================================================================
[   23.400442] ==================================================================
[   23.401079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   23.401724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.402377] 
[   23.402515] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.402530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.402534] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.402539] Call trace:
[   23.402542]  show_stack+0x20/0x38 (C)
[   23.402551]  dump_stack_lvl+0x8c/0xd0
[   23.402560]  print_report+0x118/0x608
[   23.402568]  kasan_report+0xdc/0x128
[   23.402577]  kasan_check_range+0x100/0x1a8
[   23.402586]  __kasan_check_write+0x20/0x30
[   23.402596]  kasan_atomics_helper+0xff0/0x4858
[   23.402605]  kasan_atomics+0x198/0x2e0
[   23.402612]  kunit_try_run_case+0x170/0x3f0
[   23.402622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402634]  kthread+0x328/0x630
[   23.402644]  ret_from_fork+0x10/0x20
[   23.402653] 
[   23.408776] Allocated by task 323:
[   23.409079]  kasan_save_stack+0x3c/0x68
[   23.409423]  kasan_save_track+0x20/0x40
[   23.409768]  kasan_save_alloc_info+0x40/0x58
[   23.410151]  __kasan_kmalloc+0xd4/0xd8
[   23.410489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.410895]  kasan_atomics+0xb8/0x2e0
[   23.411224]  kunit_try_run_case+0x170/0x3f0
[   23.411600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.412090]  kthread+0x328/0x630
[   23.412384]  ret_from_fork+0x10/0x20
[   23.412706] 
[   23.412843] The buggy address belongs to the object at ffff00000ea09200
[   23.412843]  which belongs to the cache kmalloc-64 of size 64
[   23.413926] The buggy address is located 0 bytes to the right of
[   23.413926]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.415055] 
[   23.415192] The buggy address belongs to the physical page:
[   23.415683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.416375] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.416952] page_type: f5(slab)
[   23.417237] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.417920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.418602] page dumped because: kasan: bad access detected
[   23.419095] 
[   23.419232] Memory state around the buggy address:
[   23.419657]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.420294]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.420931] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.421568]                                      ^
[   23.421994]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.422631]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.423267] ==================================================================
[   23.026463] ==================================================================
[   23.027099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   23.027752] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.028398] 
[   23.028537] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.028552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.028556] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.028561] Call trace:
[   23.028564]  show_stack+0x20/0x38 (C)
[   23.028573]  dump_stack_lvl+0x8c/0xd0
[   23.028582]  print_report+0x118/0x608
[   23.028591]  kasan_report+0xdc/0x128
[   23.028599]  __asan_report_load4_noabort+0x20/0x30
[   23.028610]  kasan_atomics_helper+0x3dcc/0x4858
[   23.028618]  kasan_atomics+0x198/0x2e0
[   23.028626]  kunit_try_run_case+0x170/0x3f0
[   23.028637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.028649]  kthread+0x328/0x630
[   23.028659]  ret_from_fork+0x10/0x20
[   23.028668] 
[   23.034499] Allocated by task 323:
[   23.034804]  kasan_save_stack+0x3c/0x68
[   23.035149]  kasan_save_track+0x20/0x40
[   23.035493]  kasan_save_alloc_info+0x40/0x58
[   23.035876]  __kasan_kmalloc+0xd4/0xd8
[   23.036213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.036620]  kasan_atomics+0xb8/0x2e0
[   23.036948]  kunit_try_run_case+0x170/0x3f0
[   23.037324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.037815]  kthread+0x328/0x630
[   23.038108]  ret_from_fork+0x10/0x20
[   23.038431] 
[   23.038567] The buggy address belongs to the object at ffff00000ea09200
[   23.038567]  which belongs to the cache kmalloc-64 of size 64
[   23.039650] The buggy address is located 0 bytes to the right of
[   23.039650]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.040780] 
[   23.040917] The buggy address belongs to the physical page:
[   23.041408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.042099] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.042676] page_type: f5(slab)
[   23.042959] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.043643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.044325] page dumped because: kasan: bad access detected
[   23.044817] 
[   23.044955] Memory state around the buggy address:
[   23.045380]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.046017]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.046653] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.047289]                                      ^
[   23.047715]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.048353]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.048989] ==================================================================
[   23.423934] ==================================================================
[   23.424571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   23.425224] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.425878] 
[   23.426016] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.426030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.426035] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.426040] Call trace:
[   23.426043]  show_stack+0x20/0x38 (C)
[   23.426052]  dump_stack_lvl+0x8c/0xd0
[   23.426061]  print_report+0x118/0x608
[   23.426069]  kasan_report+0xdc/0x128
[   23.426078]  kasan_check_range+0x100/0x1a8
[   23.426087]  __kasan_check_write+0x20/0x30
[   23.426097]  kasan_atomics_helper+0x1058/0x4858
[   23.426105]  kasan_atomics+0x198/0x2e0
[   23.426113]  kunit_try_run_case+0x170/0x3f0
[   23.426123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.426135]  kthread+0x328/0x630
[   23.426145]  ret_from_fork+0x10/0x20
[   23.426155] 
[   23.432281] Allocated by task 323:
[   23.432586]  kasan_save_stack+0x3c/0x68
[   23.432930]  kasan_save_track+0x20/0x40
[   23.433273]  kasan_save_alloc_info+0x40/0x58
[   23.433656]  __kasan_kmalloc+0xd4/0xd8
[   23.433993]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.434400]  kasan_atomics+0xb8/0x2e0
[   23.434729]  kunit_try_run_case+0x170/0x3f0
[   23.435104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.435594]  kthread+0x328/0x630
[   23.435887]  ret_from_fork+0x10/0x20
[   23.436209] 
[   23.436346] The buggy address belongs to the object at ffff00000ea09200
[   23.436346]  which belongs to the cache kmalloc-64 of size 64
[   23.437429] The buggy address is located 0 bytes to the right of
[   23.437429]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.438558] 
[   23.438695] The buggy address belongs to the physical page:
[   23.439186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.439878] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.440457] page_type: f5(slab)
[   23.440740] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.441424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.442105] page dumped because: kasan: bad access detected
[   23.442597] 
[   23.442734] Memory state around the buggy address:
[   23.443159]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.443796]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.444433] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.445069]                                      ^
[   23.445495]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.446132]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.446768] ==================================================================
[   23.564985] ==================================================================
[   23.565623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   23.566276] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.566930] 
[   23.567068] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.567082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.567087] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.567092] Call trace:
[   23.567095]  show_stack+0x20/0x38 (C)
[   23.567105]  dump_stack_lvl+0x8c/0xd0
[   23.567113]  print_report+0x118/0x608
[   23.567122]  kasan_report+0xdc/0x128
[   23.567130]  kasan_check_range+0x100/0x1a8
[   23.567140]  __kasan_check_write+0x20/0x30
[   23.567149]  kasan_atomics_helper+0x12d8/0x4858
[   23.567158]  kasan_atomics+0x198/0x2e0
[   23.567165]  kunit_try_run_case+0x170/0x3f0
[   23.567176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.567188]  kthread+0x328/0x630
[   23.567198]  ret_from_fork+0x10/0x20
[   23.567207] 
[   23.573335] Allocated by task 323:
[   23.573640]  kasan_save_stack+0x3c/0x68
[   23.573983]  kasan_save_track+0x20/0x40
[   23.574327]  kasan_save_alloc_info+0x40/0x58
[   23.574710]  __kasan_kmalloc+0xd4/0xd8
[   23.575047]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.575454]  kasan_atomics+0xb8/0x2e0
[   23.575782]  kunit_try_run_case+0x170/0x3f0
[   23.576158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.576648]  kthread+0x328/0x630
[   23.576940]  ret_from_fork+0x10/0x20
[   23.577262] 
[   23.577400] The buggy address belongs to the object at ffff00000ea09200
[   23.577400]  which belongs to the cache kmalloc-64 of size 64
[   23.578483] The buggy address is located 0 bytes to the right of
[   23.578483]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.579612] 
[   23.579749] The buggy address belongs to the physical page:
[   23.580241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.580932] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.581512] page_type: f5(slab)
[   23.581795] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.582479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.583161] page dumped because: kasan: bad access detected
[   23.583653] 
[   23.583791] Memory state around the buggy address:
[   23.584216]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.584853]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.585491] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.586127]                                      ^
[   23.586553]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.587190]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.587828] ==================================================================
[   22.979490] ==================================================================
[   22.980127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.980773] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.981427] 
[   22.981565] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.981580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.981584] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.981589] Call trace:
[   22.981592]  show_stack+0x20/0x38 (C)
[   22.981601]  dump_stack_lvl+0x8c/0xd0
[   22.981610]  print_report+0x118/0x608
[   22.981619]  kasan_report+0xdc/0x128
[   22.981628]  kasan_check_range+0x100/0x1a8
[   22.981637]  __kasan_check_write+0x20/0x30
[   22.981647]  kasan_atomics_helper+0xa6c/0x4858
[   22.981655]  kasan_atomics+0x198/0x2e0
[   22.981663]  kunit_try_run_case+0x170/0x3f0
[   22.981674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.981686]  kthread+0x328/0x630
[   22.981696]  ret_from_fork+0x10/0x20
[   22.981706] 
[   22.987831] Allocated by task 323:
[   22.988135]  kasan_save_stack+0x3c/0x68
[   22.988480]  kasan_save_track+0x20/0x40
[   22.988823]  kasan_save_alloc_info+0x40/0x58
[   22.989206]  __kasan_kmalloc+0xd4/0xd8
[   22.989542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.989949]  kasan_atomics+0xb8/0x2e0
[   22.990279]  kunit_try_run_case+0x170/0x3f0
[   22.990654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.991145]  kthread+0x328/0x630
[   22.991438]  ret_from_fork+0x10/0x20
[   22.991760] 
[   22.991897] The buggy address belongs to the object at ffff00000ea09200
[   22.991897]  which belongs to the cache kmalloc-64 of size 64
[   22.992979] The buggy address is located 0 bytes to the right of
[   22.992979]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.994109] 
[   22.994246] The buggy address belongs to the physical page:
[   22.994738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.995429] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.996008] page_type: f5(slab)
[   22.996292] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.996976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.997658] page dumped because: kasan: bad access detected
[   22.998150] 
[   22.998287] Memory state around the buggy address:
[   22.998712]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.999350]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.999987] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.000623]                                      ^
[   23.001049]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.001686]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.002322] ==================================================================
[   23.470955] ==================================================================
[   23.471593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   23.472248] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.472902] 
[   23.473040] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.473055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.473059] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.473064] Call trace:
[   23.473067]  show_stack+0x20/0x38 (C)
[   23.473077]  dump_stack_lvl+0x8c/0xd0
[   23.473085]  print_report+0x118/0x608
[   23.473094]  kasan_report+0xdc/0x128
[   23.473102]  kasan_check_range+0x100/0x1a8
[   23.473112]  __kasan_check_write+0x20/0x30
[   23.473122]  kasan_atomics_helper+0x1128/0x4858
[   23.473130]  kasan_atomics+0x198/0x2e0
[   23.473138]  kunit_try_run_case+0x170/0x3f0
[   23.473148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.473160]  kthread+0x328/0x630
[   23.473170]  ret_from_fork+0x10/0x20
[   23.473179] 
[   23.479312] Allocated by task 323:
[   23.479617]  kasan_save_stack+0x3c/0x68
[   23.479961]  kasan_save_track+0x20/0x40
[   23.480304]  kasan_save_alloc_info+0x40/0x58
[   23.480687]  __kasan_kmalloc+0xd4/0xd8
[   23.481024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.481432]  kasan_atomics+0xb8/0x2e0
[   23.481760]  kunit_try_run_case+0x170/0x3f0
[   23.482136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.482625]  kthread+0x328/0x630
[   23.482918]  ret_from_fork+0x10/0x20
[   23.483240] 
[   23.483377] The buggy address belongs to the object at ffff00000ea09200
[   23.483377]  which belongs to the cache kmalloc-64 of size 64
[   23.484459] The buggy address is located 0 bytes to the right of
[   23.484459]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.485589] 
[   23.485726] The buggy address belongs to the physical page:
[   23.486218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.486910] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.487489] page_type: f5(slab)
[   23.487774] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.488457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.489139] page dumped because: kasan: bad access detected
[   23.489632] 
[   23.489769] Memory state around the buggy address:
[   23.490195]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.490832]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491469] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.492105]                                      ^
[   23.492530]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493168]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493804] ==================================================================
[   22.575161] ==================================================================
[   22.575816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   22.576487] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.577156] 
[   22.577306] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.577338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.577347] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.577358] Call trace:
[   22.577366]  show_stack+0x20/0x38 (C)
[   22.577386]  dump_stack_lvl+0x8c/0xd0
[   22.577405]  print_report+0x118/0x608
[   22.577424]  kasan_report+0xdc/0x128
[   22.577442]  __asan_report_store4_noabort+0x20/0x30
[   22.577466]  kasan_atomics_helper+0x3f94/0x4858
[   22.577484]  kasan_atomics+0x198/0x2e0
[   22.577502]  kunit_try_run_case+0x170/0x3f0
[   22.577525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.577551]  kthread+0x328/0x630
[   22.577572]  ret_from_fork+0x10/0x20
[   22.577593] 
[   22.583486] Allocated by task 323:
[   22.583801]  kasan_save_stack+0x3c/0x68
[   22.584160]  kasan_save_track+0x20/0x40
[   22.584519]  kasan_save_alloc_info+0x40/0x58
[   22.584917]  __kasan_kmalloc+0xd4/0xd8
[   22.585267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.585693]  kasan_atomics+0xb8/0x2e0
[   22.586035]  kunit_try_run_case+0x170/0x3f0
[   22.586428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.586936]  kthread+0x328/0x630
[   22.587245]  ret_from_fork+0x10/0x20
[   22.587583] 
[   22.587728] The buggy address belongs to the object at ffff00000ea09200
[   22.587728]  which belongs to the cache kmalloc-64 of size 64
[   22.588828] The buggy address is located 0 bytes to the right of
[   22.588828]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.589976] 
[   22.590122] The buggy address belongs to the physical page:
[   22.590627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.591335] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.591927] page_type: f5(slab)
[   22.592225] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.592925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.593621] page dumped because: kasan: bad access detected
[   22.594125] 
[   22.594270] Memory state around the buggy address:
[   22.594707]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.595360]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.596012] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.596661]                                      ^
[   22.597098]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.597751]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.598402] ==================================================================
[   23.635174] ==================================================================
[   23.635812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   23.636465] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.637119] 
[   23.637256] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.637271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.637275] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.637280] Call trace:
[   23.637283]  show_stack+0x20/0x38 (C)
[   23.637292]  dump_stack_lvl+0x8c/0xd0
[   23.637301]  print_report+0x118/0x608
[   23.637310]  kasan_report+0xdc/0x128
[   23.637318]  kasan_check_range+0x100/0x1a8
[   23.637327]  __kasan_check_write+0x20/0x30
[   23.637337]  kasan_atomics_helper+0x1414/0x4858
[   23.637345]  kasan_atomics+0x198/0x2e0
[   23.637353]  kunit_try_run_case+0x170/0x3f0
[   23.637364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.637375]  kthread+0x328/0x630
[   23.637385]  ret_from_fork+0x10/0x20
[   23.637394] 
[   23.643524] Allocated by task 323:
[   23.643828]  kasan_save_stack+0x3c/0x68
[   23.644172]  kasan_save_track+0x20/0x40
[   23.644516]  kasan_save_alloc_info+0x40/0x58
[   23.644899]  __kasan_kmalloc+0xd4/0xd8
[   23.645236]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.645644]  kasan_atomics+0xb8/0x2e0
[   23.645973]  kunit_try_run_case+0x170/0x3f0
[   23.646349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.646839]  kthread+0x328/0x630
[   23.647132]  ret_from_fork+0x10/0x20
[   23.647454] 
[   23.647592] The buggy address belongs to the object at ffff00000ea09200
[   23.647592]  which belongs to the cache kmalloc-64 of size 64
[   23.648675] The buggy address is located 0 bytes to the right of
[   23.648675]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.649804] 
[   23.649941] The buggy address belongs to the physical page:
[   23.650434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.651125] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.651703] page_type: f5(slab)
[   23.651986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.652670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.653352] page dumped because: kasan: bad access detected
[   23.653843] 
[   23.653980] Memory state around the buggy address:
[   23.654405]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.655042]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.655679] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.656315]                                      ^
[   23.656741]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.657377]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.658013] ==================================================================
[   23.073335] ==================================================================
[   23.073974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   23.074628] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.075273] 
[   23.075412] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.075426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.075431] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.075435] Call trace:
[   23.075439]  show_stack+0x20/0x38 (C)
[   23.075448]  dump_stack_lvl+0x8c/0xd0
[   23.075457]  print_report+0x118/0x608
[   23.075466]  kasan_report+0xdc/0x128
[   23.075474]  __asan_report_load4_noabort+0x20/0x30
[   23.075485]  kasan_atomics_helper+0x3dbc/0x4858
[   23.075494]  kasan_atomics+0x198/0x2e0
[   23.075502]  kunit_try_run_case+0x170/0x3f0
[   23.075512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.075524]  kthread+0x328/0x630
[   23.075534]  ret_from_fork+0x10/0x20
[   23.075544] 
[   23.081376] Allocated by task 323:
[   23.081680]  kasan_save_stack+0x3c/0x68
[   23.082025]  kasan_save_track+0x20/0x40
[   23.082369]  kasan_save_alloc_info+0x40/0x58
[   23.082752]  __kasan_kmalloc+0xd4/0xd8
[   23.083090]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.083498]  kasan_atomics+0xb8/0x2e0
[   23.083827]  kunit_try_run_case+0x170/0x3f0
[   23.084204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.084694]  kthread+0x328/0x630
[   23.084987]  ret_from_fork+0x10/0x20
[   23.085309] 
[   23.085446] The buggy address belongs to the object at ffff00000ea09200
[   23.085446]  which belongs to the cache kmalloc-64 of size 64
[   23.086529] The buggy address is located 0 bytes to the right of
[   23.086529]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.087658] 
[   23.087796] The buggy address belongs to the physical page:
[   23.088288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.088979] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.089558] page_type: f5(slab)
[   23.089842] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.090526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.091207] page dumped because: kasan: bad access detected
[   23.091699] 
[   23.091836] Memory state around the buggy address:
[   23.092261]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.092900]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.093536] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.094172]                                      ^
[   23.094598]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095235]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095872] ==================================================================
[   22.671795] ==================================================================
[   22.672439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   22.673092] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.673752] 
[   22.673894] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.673916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.673922] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.673930] Call trace:
[   22.673935]  show_stack+0x20/0x38 (C)
[   22.673948]  dump_stack_lvl+0x8c/0xd0
[   22.673961]  print_report+0x118/0x608
[   22.673974]  kasan_report+0xdc/0x128
[   22.673986]  kasan_check_range+0x100/0x1a8
[   22.674000]  __kasan_check_write+0x20/0x30
[   22.674015]  kasan_atomics_helper+0x4e4/0x4858
[   22.674028]  kasan_atomics+0x198/0x2e0
[   22.674039]  kunit_try_run_case+0x170/0x3f0
[   22.674054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.674072]  kthread+0x328/0x630
[   22.674087]  ret_from_fork+0x10/0x20
[   22.674101] 
[   22.680249] Allocated by task 323:
[   22.680557]  kasan_save_stack+0x3c/0x68
[   22.680907]  kasan_save_track+0x20/0x40
[   22.681258]  kasan_save_alloc_info+0x40/0x58
[   22.681648]  __kasan_kmalloc+0xd4/0xd8
[   22.681990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.682405]  kasan_atomics+0xb8/0x2e0
[   22.682740]  kunit_try_run_case+0x170/0x3f0
[   22.683123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.683621]  kthread+0x328/0x630
[   22.683920]  ret_from_fork+0x10/0x20
[   22.684249] 
[   22.684391] The buggy address belongs to the object at ffff00000ea09200
[   22.684391]  which belongs to the cache kmalloc-64 of size 64
[   22.685481] The buggy address is located 0 bytes to the right of
[   22.685481]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.686618] 
[   22.686758] The buggy address belongs to the physical page:
[   22.687255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.687952] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.688538] page_type: f5(slab)
[   22.688826] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.689518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.690204] page dumped because: kasan: bad access detected
[   22.690702] 
[   22.690842] Memory state around the buggy address:
[   22.691272]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.691915]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.692558] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.693200]                                      ^
[   22.693631]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694274]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694915] ==================================================================
[   23.166716] ==================================================================
[   23.167353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   23.168006] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.168652] 
[   23.168791] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.168804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.168809] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.168814] Call trace:
[   23.168817]  show_stack+0x20/0x38 (C)
[   23.168826]  dump_stack_lvl+0x8c/0xd0
[   23.168834]  print_report+0x118/0x608
[   23.168842]  kasan_report+0xdc/0x128
[   23.168851]  __asan_report_load4_noabort+0x20/0x30
[   23.168861]  kasan_atomics_helper+0x3dd8/0x4858
[   23.168870]  kasan_atomics+0x198/0x2e0
[   23.168877]  kunit_try_run_case+0x170/0x3f0
[   23.168888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.168900]  kthread+0x328/0x630
[   23.168910]  ret_from_fork+0x10/0x20
[   23.168919] 
[   23.174751] Allocated by task 323:
[   23.175055]  kasan_save_stack+0x3c/0x68
[   23.175400]  kasan_save_track+0x20/0x40
[   23.175743]  kasan_save_alloc_info+0x40/0x58
[   23.176126]  __kasan_kmalloc+0xd4/0xd8
[   23.176462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.176869]  kasan_atomics+0xb8/0x2e0
[   23.177196]  kunit_try_run_case+0x170/0x3f0
[   23.177572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.178063]  kthread+0x328/0x630
[   23.178356]  ret_from_fork+0x10/0x20
[   23.178678] 
[   23.178815] The buggy address belongs to the object at ffff00000ea09200
[   23.178815]  which belongs to the cache kmalloc-64 of size 64
[   23.179897] The buggy address is located 0 bytes to the right of
[   23.179897]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.181027] 
[   23.181165] The buggy address belongs to the physical page:
[   23.181656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.182347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.182924] page_type: f5(slab)
[   23.183207] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.183891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.184572] page dumped because: kasan: bad access detected
[   23.185064] 
[   23.185202] Memory state around the buggy address:
[   23.185627]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.186264]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.186902] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.187538]                                      ^
[   23.187964]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.188601]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.189238] ==================================================================
[   23.869275] ==================================================================
[   23.869912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   23.870565] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.871219] 
[   23.871357] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.871371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.871375] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.871380] Call trace:
[   23.871383]  show_stack+0x20/0x38 (C)
[   23.871393]  dump_stack_lvl+0x8c/0xd0
[   23.871401]  print_report+0x118/0x608
[   23.871410]  kasan_report+0xdc/0x128
[   23.871418]  kasan_check_range+0x100/0x1a8
[   23.871427]  __kasan_check_write+0x20/0x30
[   23.871437]  kasan_atomics_helper+0x175c/0x4858
[   23.871445]  kasan_atomics+0x198/0x2e0
[   23.871453]  kunit_try_run_case+0x170/0x3f0
[   23.871463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.871475]  kthread+0x328/0x630
[   23.871485]  ret_from_fork+0x10/0x20
[   23.871494] 
[   23.877622] Allocated by task 323:
[   23.877926]  kasan_save_stack+0x3c/0x68
[   23.878271]  kasan_save_track+0x20/0x40
[   23.878615]  kasan_save_alloc_info+0x40/0x58
[   23.878998]  __kasan_kmalloc+0xd4/0xd8
[   23.879335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.879742]  kasan_atomics+0xb8/0x2e0
[   23.880071]  kunit_try_run_case+0x170/0x3f0
[   23.880448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.880939]  kthread+0x328/0x630
[   23.881232]  ret_from_fork+0x10/0x20
[   23.881554] 
[   23.881691] The buggy address belongs to the object at ffff00000ea09200
[   23.881691]  which belongs to the cache kmalloc-64 of size 64
[   23.882773] The buggy address is located 0 bytes to the right of
[   23.882773]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.883903] 
[   23.884039] The buggy address belongs to the physical page:
[   23.884531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.885223] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.885800] page_type: f5(slab)
[   23.886084] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.886767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.887449] page dumped because: kasan: bad access detected
[   23.887941] 
[   23.888078] Memory state around the buggy address:
[   23.888504]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.889140]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.889779] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.890416]                                      ^
[   23.890842]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.891479]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.892116] ==================================================================
[   22.647949] ==================================================================
[   22.648596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   22.649250] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.649910] 
[   22.650053] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.650075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.650082] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.650089] Call trace:
[   22.650094]  show_stack+0x20/0x38 (C)
[   22.650108]  dump_stack_lvl+0x8c/0xd0
[   22.650121]  print_report+0x118/0x608
[   22.650135]  kasan_report+0xdc/0x128
[   22.650147]  kasan_check_range+0x100/0x1a8
[   22.650161]  __kasan_check_write+0x20/0x30
[   22.650176]  kasan_atomics_helper+0x47c/0x4858
[   22.650189]  kasan_atomics+0x198/0x2e0
[   22.650201]  kunit_try_run_case+0x170/0x3f0
[   22.650216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.650234]  kthread+0x328/0x630
[   22.650249]  ret_from_fork+0x10/0x20
[   22.650264] 
[   22.656407] Allocated by task 323:
[   22.656716]  kasan_save_stack+0x3c/0x68
[   22.657067]  kasan_save_track+0x20/0x40
[   22.657417]  kasan_save_alloc_info+0x40/0x58
[   22.657807]  __kasan_kmalloc+0xd4/0xd8
[   22.658149]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.658564]  kasan_atomics+0xb8/0x2e0
[   22.658899]  kunit_try_run_case+0x170/0x3f0
[   22.659282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.659779]  kthread+0x328/0x630
[   22.660079]  ret_from_fork+0x10/0x20
[   22.660407] 
[   22.660548] The buggy address belongs to the object at ffff00000ea09200
[   22.660548]  which belongs to the cache kmalloc-64 of size 64
[   22.661638] The buggy address is located 0 bytes to the right of
[   22.661638]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.662777] 
[   22.662917] The buggy address belongs to the physical page:
[   22.663415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.664112] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.664698] page_type: f5(slab)
[   22.664987] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.665677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.666364] page dumped because: kasan: bad access detected
[   22.666861] 
[   22.667002] Memory state around the buggy address:
[   22.667431]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.668074]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.668718] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.669360]                                      ^
[   22.669790]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.670433]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671075] ==================================================================
[   22.838831] ==================================================================
[   22.839471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   22.840117] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.840771] 
[   22.840909] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.840924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.840928] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.840934] Call trace:
[   22.840937]  show_stack+0x20/0x38 (C)
[   22.840946]  dump_stack_lvl+0x8c/0xd0
[   22.840955]  print_report+0x118/0x608
[   22.840964]  kasan_report+0xdc/0x128
[   22.840972]  kasan_check_range+0x100/0x1a8
[   22.840981]  __kasan_check_write+0x20/0x30
[   22.840991]  kasan_atomics_helper+0x7cc/0x4858
[   22.840999]  kasan_atomics+0x198/0x2e0
[   22.841008]  kunit_try_run_case+0x170/0x3f0
[   22.841018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.841030]  kthread+0x328/0x630
[   22.841040]  ret_from_fork+0x10/0x20
[   22.841049] 
[   22.847172] Allocated by task 323:
[   22.847477]  kasan_save_stack+0x3c/0x68
[   22.847821]  kasan_save_track+0x20/0x40
[   22.848165]  kasan_save_alloc_info+0x40/0x58
[   22.848547]  __kasan_kmalloc+0xd4/0xd8
[   22.848884]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.849293]  kasan_atomics+0xb8/0x2e0
[   22.849622]  kunit_try_run_case+0x170/0x3f0
[   22.849998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.850489]  kthread+0x328/0x630
[   22.850782]  ret_from_fork+0x10/0x20
[   22.851104] 
[   22.851240] The buggy address belongs to the object at ffff00000ea09200
[   22.851240]  which belongs to the cache kmalloc-64 of size 64
[   22.852323] The buggy address is located 0 bytes to the right of
[   22.852323]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.853452] 
[   22.853589] The buggy address belongs to the physical page:
[   22.854080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.854773] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.855351] page_type: f5(slab)
[   22.855636] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.856319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.857001] page dumped because: kasan: bad access detected
[   22.857493] 
[   22.857631] Memory state around the buggy address:
[   22.858057]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.858693]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.859332] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.859968]                                      ^
[   22.860394]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.861031]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.861667] ==================================================================
[   23.002978] ==================================================================
[   23.003616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   23.004262] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.004916] 
[   23.005054] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.005069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.005073] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.005078] Call trace:
[   23.005082]  show_stack+0x20/0x38 (C)
[   23.005091]  dump_stack_lvl+0x8c/0xd0
[   23.005099]  print_report+0x118/0x608
[   23.005108]  kasan_report+0xdc/0x128
[   23.005117]  kasan_check_range+0x100/0x1a8
[   23.005126]  __kasan_check_write+0x20/0x30
[   23.005136]  kasan_atomics_helper+0xad4/0x4858
[   23.005144]  kasan_atomics+0x198/0x2e0
[   23.005152]  kunit_try_run_case+0x170/0x3f0
[   23.005162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.005174]  kthread+0x328/0x630
[   23.005184]  ret_from_fork+0x10/0x20
[   23.005194] 
[   23.011317] Allocated by task 323:
[   23.011622]  kasan_save_stack+0x3c/0x68
[   23.011967]  kasan_save_track+0x20/0x40
[   23.012311]  kasan_save_alloc_info+0x40/0x58
[   23.012694]  __kasan_kmalloc+0xd4/0xd8
[   23.013030]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.013437]  kasan_atomics+0xb8/0x2e0
[   23.013766]  kunit_try_run_case+0x170/0x3f0
[   23.014142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.014633]  kthread+0x328/0x630
[   23.014926]  ret_from_fork+0x10/0x20
[   23.015248] 
[   23.015385] The buggy address belongs to the object at ffff00000ea09200
[   23.015385]  which belongs to the cache kmalloc-64 of size 64
[   23.016468] The buggy address is located 0 bytes to the right of
[   23.016468]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.017597] 
[   23.017735] The buggy address belongs to the physical page:
[   23.018227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.018918] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.019496] page_type: f5(slab)
[   23.019780] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.020464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.021146] page dumped because: kasan: bad access detected
[   23.021638] 
[   23.021774] Memory state around the buggy address:
[   23.022200]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.022838]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.023475] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.024112]                                      ^
[   23.024537]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.025174]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.025810] ==================================================================
[   23.189913] ==================================================================
[   23.190551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   23.191197] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.191850] 
[   23.191989] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.192003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.192007] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.192012] Call trace:
[   23.192015]  show_stack+0x20/0x38 (C)
[   23.192024]  dump_stack_lvl+0x8c/0xd0
[   23.192033]  print_report+0x118/0x608
[   23.192041]  kasan_report+0xdc/0x128
[   23.192049]  kasan_check_range+0x100/0x1a8
[   23.192059]  __kasan_check_write+0x20/0x30
[   23.192068]  kasan_atomics_helper+0xd3c/0x4858
[   23.192077]  kasan_atomics+0x198/0x2e0
[   23.192085]  kunit_try_run_case+0x170/0x3f0
[   23.192095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.192107]  kthread+0x328/0x630
[   23.192117]  ret_from_fork+0x10/0x20
[   23.192126] 
[   23.198249] Allocated by task 323:
[   23.198553]  kasan_save_stack+0x3c/0x68
[   23.198897]  kasan_save_track+0x20/0x40
[   23.199242]  kasan_save_alloc_info+0x40/0x58
[   23.199625]  __kasan_kmalloc+0xd4/0xd8
[   23.199962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.200369]  kasan_atomics+0xb8/0x2e0
[   23.200698]  kunit_try_run_case+0x170/0x3f0
[   23.201073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.201562]  kthread+0x328/0x630
[   23.201855]  ret_from_fork+0x10/0x20
[   23.202178] 
[   23.202316] The buggy address belongs to the object at ffff00000ea09200
[   23.202316]  which belongs to the cache kmalloc-64 of size 64
[   23.203399] The buggy address is located 0 bytes to the right of
[   23.203399]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.204527] 
[   23.204664] The buggy address belongs to the physical page:
[   23.205155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.205847] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.206426] page_type: f5(slab)
[   23.206709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.207393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.208074] page dumped because: kasan: bad access detected
[   23.208566] 
[   23.208702] Memory state around the buggy address:
[   23.209128]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.209766]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.210403] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.211039]                                      ^
[   23.211465]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.212103]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.212739] ==================================================================
[   22.550825] ==================================================================
[   22.551479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   22.552141] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.552812] 
[   22.552961] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.552993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.553003] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.553013] Call trace:
[   22.553021]  show_stack+0x20/0x38 (C)
[   22.553041]  dump_stack_lvl+0x8c/0xd0
[   22.553060]  print_report+0x118/0x608
[   22.553079]  kasan_report+0xdc/0x128
[   22.553097]  kasan_check_range+0x100/0x1a8
[   22.553117]  __kasan_check_write+0x20/0x30
[   22.553139]  kasan_atomics_helper+0x32c/0x4858
[   22.553158]  kasan_atomics+0x198/0x2e0
[   22.553175]  kunit_try_run_case+0x170/0x3f0
[   22.553198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.553224]  kthread+0x328/0x630
[   22.553246]  ret_from_fork+0x10/0x20
[   22.553267] 
[   22.559446] Allocated by task 323:
[   22.559762]  kasan_save_stack+0x3c/0x68
[   22.560121]  kasan_save_track+0x20/0x40
[   22.560480]  kasan_save_alloc_info+0x40/0x58
[   22.560879]  __kasan_kmalloc+0xd4/0xd8
[   22.561230]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.561656]  kasan_atomics+0xb8/0x2e0
[   22.561999]  kunit_try_run_case+0x170/0x3f0
[   22.562390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.562899]  kthread+0x328/0x630
[   22.563207]  ret_from_fork+0x10/0x20
[   22.563545] 
[   22.563691] The buggy address belongs to the object at ffff00000ea09200
[   22.563691]  which belongs to the cache kmalloc-64 of size 64
[   22.564791] The buggy address is located 0 bytes to the right of
[   22.564791]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.565941] 
[   22.566086] The buggy address belongs to the physical page:
[   22.566590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.567299] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.567892] page_type: f5(slab)
[   22.568189] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.568889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.569583] page dumped because: kasan: bad access detected
[   22.570088] 
[   22.570233] Memory state around the buggy address:
[   22.570670]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.571322]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.571974] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.572623]                                      ^
[   22.573060]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.573712]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.574362] ==================================================================
[   22.791057] ==================================================================
[   22.791701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   22.792354] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.793014] 
[   22.793156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.793178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.793184] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.793191] Call trace:
[   22.793196]  show_stack+0x20/0x38 (C)
[   22.793210]  dump_stack_lvl+0x8c/0xd0
[   22.793223]  print_report+0x118/0x608
[   22.793236]  kasan_report+0xdc/0x128
[   22.793249]  kasan_check_range+0x100/0x1a8
[   22.793262]  __kasan_check_write+0x20/0x30
[   22.793277]  kasan_atomics_helper+0x6ec/0x4858
[   22.793290]  kasan_atomics+0x198/0x2e0
[   22.793301]  kunit_try_run_case+0x170/0x3f0
[   22.793317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.793335]  kthread+0x328/0x630
[   22.793350]  ret_from_fork+0x10/0x20
[   22.793364] 
[   22.799511] Allocated by task 323:
[   22.799820]  kasan_save_stack+0x3c/0x68
[   22.800171]  kasan_save_track+0x20/0x40
[   22.800521]  kasan_save_alloc_info+0x40/0x58
[   22.800911]  __kasan_kmalloc+0xd4/0xd8
[   22.801254]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.801668]  kasan_atomics+0xb8/0x2e0
[   22.802003]  kunit_try_run_case+0x170/0x3f0
[   22.802386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.802883]  kthread+0x328/0x630
[   22.803183]  ret_from_fork+0x10/0x20
[   22.803511] 
[   22.803652] The buggy address belongs to the object at ffff00000ea09200
[   22.803652]  which belongs to the cache kmalloc-64 of size 64
[   22.804741] The buggy address is located 0 bytes to the right of
[   22.804741]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.805877] 
[   22.806018] The buggy address belongs to the physical page:
[   22.806515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.807213] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.807798] page_type: f5(slab)
[   22.808088] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.808778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.809464] page dumped because: kasan: bad access detected
[   22.809961] 
[   22.810101] Memory state around the buggy address:
[   22.810531]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811175]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811818] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.812460]                                      ^
[   22.812890]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.813534]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.814175] ==================================================================
[   23.329990] ==================================================================
[   23.330628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   23.331274] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.331927] 
[   23.332067] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.332081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.332086] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.332091] Call trace:
[   23.332094]  show_stack+0x20/0x38 (C)
[   23.332103]  dump_stack_lvl+0x8c/0xd0
[   23.332112]  print_report+0x118/0x608
[   23.332122]  kasan_report+0xdc/0x128
[   23.332130]  kasan_check_range+0x100/0x1a8
[   23.332139]  __kasan_check_write+0x20/0x30
[   23.332150]  kasan_atomics_helper+0xeb8/0x4858
[   23.332158]  kasan_atomics+0x198/0x2e0
[   23.332166]  kunit_try_run_case+0x170/0x3f0
[   23.332177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.332189]  kthread+0x328/0x630
[   23.332199]  ret_from_fork+0x10/0x20
[   23.332209] 
[   23.338330] Allocated by task 323:
[   23.338634]  kasan_save_stack+0x3c/0x68
[   23.338978]  kasan_save_track+0x20/0x40
[   23.339323]  kasan_save_alloc_info+0x40/0x58
[   23.339706]  __kasan_kmalloc+0xd4/0xd8
[   23.340043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.340451]  kasan_atomics+0xb8/0x2e0
[   23.340779]  kunit_try_run_case+0x170/0x3f0
[   23.341155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.341646]  kthread+0x328/0x630
[   23.341939]  ret_from_fork+0x10/0x20
[   23.342261] 
[   23.342398] The buggy address belongs to the object at ffff00000ea09200
[   23.342398]  which belongs to the cache kmalloc-64 of size 64
[   23.343481] The buggy address is located 0 bytes to the right of
[   23.343481]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.344610] 
[   23.344747] The buggy address belongs to the physical page:
[   23.345239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.345931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.346509] page_type: f5(slab)
[   23.346793] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.347477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.348158] page dumped because: kasan: bad access detected
[   23.348651] 
[   23.348787] Memory state around the buggy address:
[   23.349213]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.349851]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.350488] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.351123]                                      ^
[   23.351549]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352186]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352822] ==================================================================
[   22.743350] ==================================================================
[   22.743995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   22.744650] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.745310] 
[   22.745453] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.745474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.745481] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.745488] Call trace:
[   22.745493]  show_stack+0x20/0x38 (C)
[   22.745507]  dump_stack_lvl+0x8c/0xd0
[   22.745521]  print_report+0x118/0x608
[   22.745534]  kasan_report+0xdc/0x128
[   22.745546]  kasan_check_range+0x100/0x1a8
[   22.745560]  __kasan_check_write+0x20/0x30
[   22.745575]  kasan_atomics_helper+0x61c/0x4858
[   22.745588]  kasan_atomics+0x198/0x2e0
[   22.745600]  kunit_try_run_case+0x170/0x3f0
[   22.745615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.745633]  kthread+0x328/0x630
[   22.745649]  ret_from_fork+0x10/0x20
[   22.745664] 
[   22.751808] Allocated by task 323:
[   22.752116]  kasan_save_stack+0x3c/0x68
[   22.752468]  kasan_save_track+0x20/0x40
[   22.752818]  kasan_save_alloc_info+0x40/0x58
[   22.753208]  __kasan_kmalloc+0xd4/0xd8
[   22.753549]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.753964]  kasan_atomics+0xb8/0x2e0
[   22.754299]  kunit_try_run_case+0x170/0x3f0
[   22.754681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.755179]  kthread+0x328/0x630
[   22.755479]  ret_from_fork+0x10/0x20
[   22.755807] 
[   22.755947] The buggy address belongs to the object at ffff00000ea09200
[   22.755947]  which belongs to the cache kmalloc-64 of size 64
[   22.757037] The buggy address is located 0 bytes to the right of
[   22.757037]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.758173] 
[   22.758314] The buggy address belongs to the physical page:
[   22.758810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.759508] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.760093] page_type: f5(slab)
[   22.760383] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.761073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.761760] page dumped because: kasan: bad access detected
[   22.762257] 
[   22.762397] Memory state around the buggy address:
[   22.762828]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.763471]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.764115] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.764756]                                      ^
[   22.765187]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.765831]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.766472] ==================================================================
[   23.658664] ==================================================================
[   23.659302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   23.659955] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.660609] 
[   23.660747] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.660761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.660765] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.660770] Call trace:
[   23.660773]  show_stack+0x20/0x38 (C)
[   23.660783]  dump_stack_lvl+0x8c/0xd0
[   23.660791]  print_report+0x118/0x608
[   23.660800]  kasan_report+0xdc/0x128
[   23.660808]  kasan_check_range+0x100/0x1a8
[   23.660817]  __kasan_check_write+0x20/0x30
[   23.660827]  kasan_atomics_helper+0x147c/0x4858
[   23.660836]  kasan_atomics+0x198/0x2e0
[   23.660844]  kunit_try_run_case+0x170/0x3f0
[   23.660854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.660865]  kthread+0x328/0x630
[   23.660875]  ret_from_fork+0x10/0x20
[   23.660885] 
[   23.667016] Allocated by task 323:
[   23.667320]  kasan_save_stack+0x3c/0x68
[   23.667664]  kasan_save_track+0x20/0x40
[   23.668007]  kasan_save_alloc_info+0x40/0x58
[   23.668390]  __kasan_kmalloc+0xd4/0xd8
[   23.668728]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.669135]  kasan_atomics+0xb8/0x2e0
[   23.669463]  kunit_try_run_case+0x170/0x3f0
[   23.669840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.670329]  kthread+0x328/0x630
[   23.670623]  ret_from_fork+0x10/0x20
[   23.670945] 
[   23.671083] The buggy address belongs to the object at ffff00000ea09200
[   23.671083]  which belongs to the cache kmalloc-64 of size 64
[   23.672165] The buggy address is located 0 bytes to the right of
[   23.672165]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.673295] 
[   23.673433] The buggy address belongs to the physical page:
[   23.673926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.674617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.675194] page_type: f5(slab)
[   23.675477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.676162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.676843] page dumped because: kasan: bad access detected
[   23.677335] 
[   23.677472] Memory state around the buggy address:
[   23.677898]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.678534]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.679171] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.679807]                                      ^
[   23.680233]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.680870]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.681505] ==================================================================
[   23.892776] ==================================================================
[   23.893413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   23.894066] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.894712] 
[   23.894851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.894866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.894870] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.894875] Call trace:
[   23.894878]  show_stack+0x20/0x38 (C)
[   23.894887]  dump_stack_lvl+0x8c/0xd0
[   23.894896]  print_report+0x118/0x608
[   23.894905]  kasan_report+0xdc/0x128
[   23.894913]  __asan_report_load8_noabort+0x20/0x30
[   23.894923]  kasan_atomics_helper+0x3e20/0x4858
[   23.894932]  kasan_atomics+0x198/0x2e0
[   23.894940]  kunit_try_run_case+0x170/0x3f0
[   23.894951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.894963]  kthread+0x328/0x630
[   23.894973]  ret_from_fork+0x10/0x20
[   23.894982] 
[   23.900816] Allocated by task 323:
[   23.901121]  kasan_save_stack+0x3c/0x68
[   23.901464]  kasan_save_track+0x20/0x40
[   23.901809]  kasan_save_alloc_info+0x40/0x58
[   23.902192]  __kasan_kmalloc+0xd4/0xd8
[   23.902529]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.902937]  kasan_atomics+0xb8/0x2e0
[   23.903266]  kunit_try_run_case+0x170/0x3f0
[   23.903641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.904132]  kthread+0x328/0x630
[   23.904425]  ret_from_fork+0x10/0x20
[   23.904748] 
[   23.904884] The buggy address belongs to the object at ffff00000ea09200
[   23.904884]  which belongs to the cache kmalloc-64 of size 64
[   23.905966] The buggy address is located 0 bytes to the right of
[   23.905966]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.907096] 
[   23.907233] The buggy address belongs to the physical page:
[   23.907725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.908417] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.908995] page_type: f5(slab)
[   23.909278] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.909962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.910644] page dumped because: kasan: bad access detected
[   23.911136] 
[   23.911273] Memory state around the buggy address:
[   23.911697]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912334]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912973] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.913610]                                      ^
[   23.914036]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.914674]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.915311] ==================================================================
[   23.682175] ==================================================================
[   23.682812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   23.683466] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.684120] 
[   23.684258] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.684273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.684277] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.684282] Call trace:
[   23.684285]  show_stack+0x20/0x38 (C)
[   23.684295]  dump_stack_lvl+0x8c/0xd0
[   23.684303]  print_report+0x118/0x608
[   23.684312]  kasan_report+0xdc/0x128
[   23.684320]  kasan_check_range+0x100/0x1a8
[   23.684330]  __kasan_check_write+0x20/0x30
[   23.684339]  kasan_atomics_helper+0x14e4/0x4858
[   23.684348]  kasan_atomics+0x198/0x2e0
[   23.684356]  kunit_try_run_case+0x170/0x3f0
[   23.684367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.684379]  kthread+0x328/0x630
[   23.684389]  ret_from_fork+0x10/0x20
[   23.684398] 
[   23.690526] Allocated by task 323:
[   23.690831]  kasan_save_stack+0x3c/0x68
[   23.691176]  kasan_save_track+0x20/0x40
[   23.691520]  kasan_save_alloc_info+0x40/0x58
[   23.691903]  __kasan_kmalloc+0xd4/0xd8
[   23.692240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.692647]  kasan_atomics+0xb8/0x2e0
[   23.692975]  kunit_try_run_case+0x170/0x3f0
[   23.693351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.693842]  kthread+0x328/0x630
[   23.694135]  ret_from_fork+0x10/0x20
[   23.694457] 
[   23.694595] The buggy address belongs to the object at ffff00000ea09200
[   23.694595]  which belongs to the cache kmalloc-64 of size 64
[   23.695677] The buggy address is located 0 bytes to the right of
[   23.695677]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.696807] 
[   23.696943] The buggy address belongs to the physical page:
[   23.697435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.698127] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.698705] page_type: f5(slab)
[   23.698988] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.699672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.700354] page dumped because: kasan: bad access detected
[   23.700846] 
[   23.700983] Memory state around the buggy address:
[   23.701407]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.702045]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.702682] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.703318]                                      ^
[   23.703743]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.704381]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.705016] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   22.227511] ==================================================================
[   22.228156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.228953] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.229613] 
[   22.229755] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.229777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.229784] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.229791] Call trace:
[   22.229796]  show_stack+0x20/0x38 (C)
[   22.229809]  dump_stack_lvl+0x8c/0xd0
[   22.229822]  print_report+0x118/0x608
[   22.229835]  kasan_report+0xdc/0x128
[   22.229848]  kasan_check_range+0x100/0x1a8
[   22.229862]  __kasan_check_write+0x20/0x30
[   22.229876]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.229891]  kasan_bitops_generic+0x11c/0x1c8
[   22.229904]  kunit_try_run_case+0x170/0x3f0
[   22.229919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.229937]  kthread+0x328/0x630
[   22.229952]  ret_from_fork+0x10/0x20
[   22.229965] 
[   22.236308] Allocated by task 319:
[   22.236616]  kasan_save_stack+0x3c/0x68
[   22.236967]  kasan_save_track+0x20/0x40
[   22.237317]  kasan_save_alloc_info+0x40/0x58
[   22.237705]  __kasan_kmalloc+0xd4/0xd8
[   22.238048]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.238462]  kasan_bitops_generic+0xa0/0x1c8
[   22.238850]  kunit_try_run_case+0x170/0x3f0
[   22.239233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.239730]  kthread+0x328/0x630
[   22.240030]  ret_from_fork+0x10/0x20
[   22.240358] 
[   22.240498] The buggy address belongs to the object at ffff00000a7446c0
[   22.240498]  which belongs to the cache kmalloc-16 of size 16
[   22.241588] The buggy address is located 8 bytes inside of
[   22.241588]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.242673] 
[   22.242814] The buggy address belongs to the physical page:
[   22.243311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.244009] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.244594] page_type: f5(slab)
[   22.244884] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.245574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.246261] page dumped because: kasan: bad access detected
[   22.246759] 
[   22.246899] Memory state around the buggy address:
[   22.247329]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.247972]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.248616] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.249258]                                               ^
[   22.249757]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.250400]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.251042] ==================================================================
[   22.323907] ==================================================================
[   22.324551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   22.325347] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.326006] 
[   22.326148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.326170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.326177] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.326185] Call trace:
[   22.326189]  show_stack+0x20/0x38 (C)
[   22.326203]  dump_stack_lvl+0x8c/0xd0
[   22.326216]  print_report+0x118/0x608
[   22.326228]  kasan_report+0xdc/0x128
[   22.326241]  kasan_check_range+0x100/0x1a8
[   22.326255]  __kasan_check_write+0x20/0x30
[   22.326269]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   22.326285]  kasan_bitops_generic+0x11c/0x1c8
[   22.326297]  kunit_try_run_case+0x170/0x3f0
[   22.326313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.326330]  kthread+0x328/0x630
[   22.326345]  ret_from_fork+0x10/0x20
[   22.326359] 
[   22.332699] Allocated by task 319:
[   22.333007]  kasan_save_stack+0x3c/0x68
[   22.333358]  kasan_save_track+0x20/0x40
[   22.333708]  kasan_save_alloc_info+0x40/0x58
[   22.334098]  __kasan_kmalloc+0xd4/0xd8
[   22.334442]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.334856]  kasan_bitops_generic+0xa0/0x1c8
[   22.335245]  kunit_try_run_case+0x170/0x3f0
[   22.335628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.336125]  kthread+0x328/0x630
[   22.336425]  ret_from_fork+0x10/0x20
[   22.336754] 
[   22.336894] The buggy address belongs to the object at ffff00000a7446c0
[   22.336894]  which belongs to the cache kmalloc-16 of size 16
[   22.337984] The buggy address is located 8 bytes inside of
[   22.337984]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.339069] 
[   22.339209] The buggy address belongs to the physical page:
[   22.339706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.340404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.340989] page_type: f5(slab)
[   22.341280] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.341971] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.342658] page dumped because: kasan: bad access detected
[   22.343156] 
[   22.343296] Memory state around the buggy address:
[   22.343726]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.344369]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.345013] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.345655]                                               ^
[   22.346154]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.346797]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.347439] ==================================================================
[   22.372155] ==================================================================
[   22.372794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.373583] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.374229] 
[   22.374366] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.374381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.374385] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.374390] Call trace:
[   22.374394]  show_stack+0x20/0x38 (C)
[   22.374403]  dump_stack_lvl+0x8c/0xd0
[   22.374411]  print_report+0x118/0x608
[   22.374420]  kasan_report+0xdc/0x128
[   22.374428]  __asan_report_load8_noabort+0x20/0x30
[   22.374439]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.374449]  kasan_bitops_generic+0x11c/0x1c8
[   22.374457]  kunit_try_run_case+0x170/0x3f0
[   22.374467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.374479]  kthread+0x328/0x630
[   22.374489]  ret_from_fork+0x10/0x20
[   22.374499] 
[   22.380517] Allocated by task 319:
[   22.380822]  kasan_save_stack+0x3c/0x68
[   22.381166]  kasan_save_track+0x20/0x40
[   22.381509]  kasan_save_alloc_info+0x40/0x58
[   22.381892]  __kasan_kmalloc+0xd4/0xd8
[   22.382229]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.382636]  kasan_bitops_generic+0xa0/0x1c8
[   22.383018]  kunit_try_run_case+0x170/0x3f0
[   22.383394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.383883]  kthread+0x328/0x630
[   22.384176]  ret_from_fork+0x10/0x20
[   22.384498] 
[   22.384635] The buggy address belongs to the object at ffff00000a7446c0
[   22.384635]  which belongs to the cache kmalloc-16 of size 16
[   22.385717] The buggy address is located 8 bytes inside of
[   22.385717]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.386794] 
[   22.386932] The buggy address belongs to the physical page:
[   22.387424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.388116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.388693] page_type: f5(slab)
[   22.388978] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.389662] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.390343] page dumped because: kasan: bad access detected
[   22.390835] 
[   22.390973] Memory state around the buggy address:
[   22.391399]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.392036]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.392672] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.393310]                                               ^
[   22.393804]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.394442]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.395077] ==================================================================
[   22.299984] ==================================================================
[   22.300629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   22.301426] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.302079] 
[   22.302221] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.302243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.302250] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.302258] Call trace:
[   22.302262]  show_stack+0x20/0x38 (C)
[   22.302276]  dump_stack_lvl+0x8c/0xd0
[   22.302290]  print_report+0x118/0x608
[   22.302302]  kasan_report+0xdc/0x128
[   22.302315]  __asan_report_load8_noabort+0x20/0x30
[   22.302331]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   22.302346]  kasan_bitops_generic+0x11c/0x1c8
[   22.302358]  kunit_try_run_case+0x170/0x3f0
[   22.302374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.302392]  kthread+0x328/0x630
[   22.302407]  ret_from_fork+0x10/0x20
[   22.302421] 
[   22.308463] Allocated by task 319:
[   22.308772]  kasan_save_stack+0x3c/0x68
[   22.309123]  kasan_save_track+0x20/0x40
[   22.309473]  kasan_save_alloc_info+0x40/0x58
[   22.309864]  __kasan_kmalloc+0xd4/0xd8
[   22.310206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.310620]  kasan_bitops_generic+0xa0/0x1c8
[   22.311007]  kunit_try_run_case+0x170/0x3f0
[   22.311390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.311887]  kthread+0x328/0x630
[   22.312187]  ret_from_fork+0x10/0x20
[   22.312515] 
[   22.312656] The buggy address belongs to the object at ffff00000a7446c0
[   22.312656]  which belongs to the cache kmalloc-16 of size 16
[   22.313746] The buggy address is located 8 bytes inside of
[   22.313746]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.314830] 
[   22.314970] The buggy address belongs to the physical page:
[   22.315467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.316165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.316750] page_type: f5(slab)
[   22.317039] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.317728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.318417] page dumped because: kasan: bad access detected
[   22.318915] 
[   22.319055] Memory state around the buggy address:
[   22.319484]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.320128]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.320771] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.321412]                                               ^
[   22.321911]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.322555]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.323196] ==================================================================
[   22.275717] ==================================================================
[   22.276363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   22.277162] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.277822] 
[   22.277965] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.277988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.277994] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.278001] Call trace:
[   22.278007]  show_stack+0x20/0x38 (C)
[   22.278021]  dump_stack_lvl+0x8c/0xd0
[   22.278034]  print_report+0x118/0x608
[   22.278048]  kasan_report+0xdc/0x128
[   22.278060]  kasan_check_range+0x100/0x1a8
[   22.278074]  __kasan_check_write+0x20/0x30
[   22.278088]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   22.278103]  kasan_bitops_generic+0x11c/0x1c8
[   22.278115]  kunit_try_run_case+0x170/0x3f0
[   22.278131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.278149]  kthread+0x328/0x630
[   22.278164]  ret_from_fork+0x10/0x20
[   22.278178] 
[   22.284518] Allocated by task 319:
[   22.284827]  kasan_save_stack+0x3c/0x68
[   22.285177]  kasan_save_track+0x20/0x40
[   22.285525]  kasan_save_alloc_info+0x40/0x58
[   22.285916]  __kasan_kmalloc+0xd4/0xd8
[   22.286257]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.286674]  kasan_bitops_generic+0xa0/0x1c8
[   22.287062]  kunit_try_run_case+0x170/0x3f0
[   22.287445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.287942]  kthread+0x328/0x630
[   22.288241]  ret_from_fork+0x10/0x20
[   22.288570] 
[   22.288710] The buggy address belongs to the object at ffff00000a7446c0
[   22.288710]  which belongs to the cache kmalloc-16 of size 16
[   22.289800] The buggy address is located 8 bytes inside of
[   22.289800]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.290883] 
[   22.291023] The buggy address belongs to the physical page:
[   22.291521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.292219] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.292803] page_type: f5(slab)
[   22.293093] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.293783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.294469] page dumped because: kasan: bad access detected
[   22.294967] 
[   22.295107] Memory state around the buggy address:
[   22.295537]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.296181]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.296824] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.297466]                                               ^
[   22.297965]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.298608]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.299250] ==================================================================
[   22.348145] ==================================================================
[   22.348790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   22.349586] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.350239] 
[   22.350381] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.350403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.350410] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.350417] Call trace:
[   22.350422]  show_stack+0x20/0x38 (C)
[   22.350435]  dump_stack_lvl+0x8c/0xd0
[   22.350448]  print_report+0x118/0x608
[   22.350461]  kasan_report+0xdc/0x128
[   22.350474]  __asan_report_load8_noabort+0x20/0x30
[   22.350489]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   22.350504]  kasan_bitops_generic+0x11c/0x1c8
[   22.350516]  kunit_try_run_case+0x170/0x3f0
[   22.350531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.350549]  kthread+0x328/0x630
[   22.350564]  ret_from_fork+0x10/0x20
[   22.350578] 
[   22.356620] Allocated by task 319:
[   22.356928]  kasan_save_stack+0x3c/0x68
[   22.357279]  kasan_save_track+0x20/0x40
[   22.357629]  kasan_save_alloc_info+0x40/0x58
[   22.358020]  __kasan_kmalloc+0xd4/0xd8
[   22.358362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.358776]  kasan_bitops_generic+0xa0/0x1c8
[   22.359164]  kunit_try_run_case+0x170/0x3f0
[   22.359547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.360044]  kthread+0x328/0x630
[   22.360344]  ret_from_fork+0x10/0x20
[   22.360672] 
[   22.360814] The buggy address belongs to the object at ffff00000a7446c0
[   22.360814]  which belongs to the cache kmalloc-16 of size 16
[   22.361904] The buggy address is located 8 bytes inside of
[   22.361904]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.362989] 
[   22.363129] The buggy address belongs to the physical page:
[   22.363626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.364325] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.364908] page_type: f5(slab)
[   22.365198] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.365888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.366576] page dumped because: kasan: bad access detected
[   22.367074] 
[   22.367215] Memory state around the buggy address:
[   22.367644]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.368288]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.368932] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.369573]                                               ^
[   22.370073]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.370716]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.371357] ==================================================================
[   22.251755] ==================================================================
[   22.252400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.253196] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.253849] 
[   22.253991] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.254013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.254019] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.254027] Call trace:
[   22.254032]  show_stack+0x20/0x38 (C)
[   22.254045]  dump_stack_lvl+0x8c/0xd0
[   22.254058]  print_report+0x118/0x608
[   22.254071]  kasan_report+0xdc/0x128
[   22.254083]  __asan_report_load8_noabort+0x20/0x30
[   22.254099]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.254114]  kasan_bitops_generic+0x11c/0x1c8
[   22.254126]  kunit_try_run_case+0x170/0x3f0
[   22.254141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.254159]  kthread+0x328/0x630
[   22.254174]  ret_from_fork+0x10/0x20
[   22.254188] 
[   22.260229] Allocated by task 319:
[   22.260537]  kasan_save_stack+0x3c/0x68
[   22.260889]  kasan_save_track+0x20/0x40
[   22.261239]  kasan_save_alloc_info+0x40/0x58
[   22.261629]  __kasan_kmalloc+0xd4/0xd8
[   22.261971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.262385]  kasan_bitops_generic+0xa0/0x1c8
[   22.262772]  kunit_try_run_case+0x170/0x3f0
[   22.263154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.263652]  kthread+0x328/0x630
[   22.263951]  ret_from_fork+0x10/0x20
[   22.264279] 
[   22.264420] The buggy address belongs to the object at ffff00000a7446c0
[   22.264420]  which belongs to the cache kmalloc-16 of size 16
[   22.265510] The buggy address is located 8 bytes inside of
[   22.265510]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.266593] 
[   22.266733] The buggy address belongs to the physical page:
[   22.267230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.267928] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.268512] page_type: f5(slab)
[   22.268803] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.269493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.270180] page dumped because: kasan: bad access detected
[   22.270678] 
[   22.270818] Memory state around the buggy address:
[   22.271247]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.271891]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.272534] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.273176]                                               ^
[   22.273676]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.274320]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.274962] ==================================================================
[   22.178781] ==================================================================
[   22.179434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.180232] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.180902] 
[   22.181052] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.181084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.181093] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.181103] Call trace:
[   22.181110]  show_stack+0x20/0x38 (C)
[   22.181131]  dump_stack_lvl+0x8c/0xd0
[   22.181150]  print_report+0x118/0x608
[   22.181169]  kasan_report+0xdc/0x128
[   22.181187]  kasan_check_range+0x100/0x1a8
[   22.181207]  __kasan_check_write+0x20/0x30
[   22.181229]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.181250]  kasan_bitops_generic+0x11c/0x1c8
[   22.181269]  kunit_try_run_case+0x170/0x3f0
[   22.181291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181316]  kthread+0x328/0x630
[   22.181338]  ret_from_fork+0x10/0x20
[   22.181359] 
[   22.187727] Allocated by task 319:
[   22.188043]  kasan_save_stack+0x3c/0x68
[   22.188402]  kasan_save_track+0x20/0x40
[   22.188761]  kasan_save_alloc_info+0x40/0x58
[   22.189160]  __kasan_kmalloc+0xd4/0xd8
[   22.189510]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.189936]  kasan_bitops_generic+0xa0/0x1c8
[   22.190332]  kunit_try_run_case+0x170/0x3f0
[   22.190726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.191235]  kthread+0x328/0x630
[   22.191544]  ret_from_fork+0x10/0x20
[   22.191882] 
[   22.192028] The buggy address belongs to the object at ffff00000a7446c0
[   22.192028]  which belongs to the cache kmalloc-16 of size 16
[   22.193129] The buggy address is located 8 bytes inside of
[   22.193129]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.194226] 
[   22.194372] The buggy address belongs to the physical page:
[   22.194875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.195583] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.196178] page_type: f5(slab)
[   22.196475] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.197176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.197872] page dumped because: kasan: bad access detected
[   22.198376] 
[   22.198520] Memory state around the buggy address:
[   22.198957]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.199610]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.200263] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.200913]                                               ^
[   22.201419]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.202071]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.202720] ==================================================================
[   22.203570] ==================================================================
[   22.204216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.205013] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.205665] 
[   22.205808] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.205830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.205837] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.205844] Call trace:
[   22.205850]  show_stack+0x20/0x38 (C)
[   22.205863]  dump_stack_lvl+0x8c/0xd0
[   22.205876]  print_report+0x118/0x608
[   22.205889]  kasan_report+0xdc/0x128
[   22.205902]  __asan_report_load8_noabort+0x20/0x30
[   22.205917]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.205932]  kasan_bitops_generic+0x11c/0x1c8
[   22.205945]  kunit_try_run_case+0x170/0x3f0
[   22.205960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.205978]  kthread+0x328/0x630
[   22.205993]  ret_from_fork+0x10/0x20
[   22.206007] 
[   22.212049] Allocated by task 319:
[   22.212358]  kasan_save_stack+0x3c/0x68
[   22.212709]  kasan_save_track+0x20/0x40
[   22.213059]  kasan_save_alloc_info+0x40/0x58
[   22.213450]  __kasan_kmalloc+0xd4/0xd8
[   22.213791]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.214206]  kasan_bitops_generic+0xa0/0x1c8
[   22.214593]  kunit_try_run_case+0x170/0x3f0
[   22.214976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.215473]  kthread+0x328/0x630
[   22.215773]  ret_from_fork+0x10/0x20
[   22.216101] 
[   22.216242] The buggy address belongs to the object at ffff00000a7446c0
[   22.216242]  which belongs to the cache kmalloc-16 of size 16
[   22.217332] The buggy address is located 8 bytes inside of
[   22.217332]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.218417] 
[   22.218558] The buggy address belongs to the physical page:
[   22.219055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.219753] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.220338] page_type: f5(slab)
[   22.220629] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.221319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.222006] page dumped because: kasan: bad access detected
[   22.222503] 
[   22.222644] Memory state around the buggy address:
[   22.223074]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.223717]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.224361] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.225003]                                               ^
[   22.225502]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.226144]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.226786] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   21.899707] ==================================================================
[   21.900362] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   21.900917] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317
[   21.901579] 
[   21.901729] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.901762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.901772] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.901783] Call trace:
[   21.901791]  show_stack+0x20/0x38 (C)
[   21.901812]  dump_stack_lvl+0x8c/0xd0
[   21.901830]  print_report+0x118/0x608
[   21.901850]  kasan_report+0xdc/0x128
[   21.901868]  __asan_report_load1_noabort+0x20/0x30
[   21.901891]  strnlen+0x80/0x88
[   21.901912]  kasan_strings+0x478/0xb00
[   21.901934]  kunit_try_run_case+0x170/0x3f0
[   21.901956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.901983]  kthread+0x328/0x630
[   21.902004]  ret_from_fork+0x10/0x20
[   21.902025] 
[   21.907782] Allocated by task 317:
[   21.908098]  kasan_save_stack+0x3c/0x68
[   21.908458]  kasan_save_track+0x20/0x40
[   21.908817]  kasan_save_alloc_info+0x40/0x58
[   21.909215]  __kasan_kmalloc+0xd4/0xd8
[   21.909565]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.909992]  kasan_strings+0xc8/0xb00
[   21.910339]  kunit_try_run_case+0x170/0x3f0
[   21.910732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.911241]  kthread+0x328/0x630
[   21.911549]  ret_from_fork+0x10/0x20
[   21.911888] 
[   21.912033] Freed by task 317:
[   21.912318]  kasan_save_stack+0x3c/0x68
[   21.912677]  kasan_save_track+0x20/0x40
[   21.913035]  kasan_save_free_info+0x4c/0x78
[   21.913425]  __kasan_slab_free+0x6c/0x98
[   21.913791]  kfree+0x214/0x3c8
[   21.914086]  kasan_strings+0x24c/0xb00
[   21.914441]  kunit_try_run_case+0x170/0x3f0
[   21.914834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.915342]  kthread+0x328/0x630
[   21.915652]  ret_from_fork+0x10/0x20
[   21.915990] 
[   21.916135] The buggy address belongs to the object at ffff000010ac0b00
[   21.916135]  which belongs to the cache kmalloc-32 of size 32
[   21.917237] The buggy address is located 16 bytes inside of
[   21.917237]  freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20)
[   21.918317] 
[   21.918464] The buggy address belongs to the physical page:
[   21.918967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0
[   21.919683] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.920278] page_type: f5(slab)
[   21.920576] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   21.921278] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.921972] page dumped because: kasan: bad access detected
[   21.922477] 
[   21.922622] Memory state around the buggy address:
[   21.923059]  ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.923712]  ffff000010ac0a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.924365] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.925014]                          ^
[   21.925361]  ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.926012]  ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.926662] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   21.871818] ==================================================================
[   21.872494] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   21.873053] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317
[   21.873720] 
[   21.873876] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.873914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.873925] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.873937] Call trace:
[   21.873946]  show_stack+0x20/0x38 (C)
[   21.873971]  dump_stack_lvl+0x8c/0xd0
[   21.873992]  print_report+0x118/0x608
[   21.874013]  kasan_report+0xdc/0x128
[   21.874032]  __asan_report_load1_noabort+0x20/0x30
[   21.874055]  strlen+0xa8/0xb0
[   21.874075]  kasan_strings+0x418/0xb00
[   21.874098]  kunit_try_run_case+0x170/0x3f0
[   21.874122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.874149]  kthread+0x328/0x630
[   21.874174]  ret_from_fork+0x10/0x20
[   21.874196] 
[   21.879953] Allocated by task 317:
[   21.880271]  kasan_save_stack+0x3c/0x68
[   21.880633]  kasan_save_track+0x20/0x40
[   21.880994]  kasan_save_alloc_info+0x40/0x58
[   21.881393]  __kasan_kmalloc+0xd4/0xd8
[   21.881744]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.882171]  kasan_strings+0xc8/0xb00
[   21.882518]  kunit_try_run_case+0x170/0x3f0
[   21.882911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.883420]  kthread+0x328/0x630
[   21.883731]  ret_from_fork+0x10/0x20
[   21.884068] 
[   21.884215] Freed by task 317:
[   21.884500]  kasan_save_stack+0x3c/0x68
[   21.884860]  kasan_save_track+0x20/0x40
[   21.885218]  kasan_save_free_info+0x4c/0x78
[   21.885608]  __kasan_slab_free+0x6c/0x98
[   21.885975]  kfree+0x214/0x3c8
[   21.886269]  kasan_strings+0x24c/0xb00
[   21.886623]  kunit_try_run_case+0x170/0x3f0
[   21.887015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.887524]  kthread+0x328/0x630
[   21.887834]  ret_from_fork+0x10/0x20
[   21.888171] 
[   21.888318] The buggy address belongs to the object at ffff000010ac0b00
[   21.888318]  which belongs to the cache kmalloc-32 of size 32
[   21.889421] The buggy address is located 16 bytes inside of
[   21.889421]  freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20)
[   21.890503] 
[   21.890650] The buggy address belongs to the physical page:
[   21.891155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0
[   21.891873] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.892470] page_type: f5(slab)
[   21.892771] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   21.893473] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.894169] page dumped because: kasan: bad access detected
[   21.894674] 
[   21.894820] Memory state around the buggy address:
[   21.895258]  ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.895911]  ffff000010ac0a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.896563] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.897214]                          ^
[   21.897560]  ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.898213]  ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.898862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   21.843317] ==================================================================
[   21.843994] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   21.844625] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317
[   21.845296] 
[   21.845458] CPU: 2 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.845502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.845514] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.845530] Call trace:
[   21.845541]  show_stack+0x20/0x38 (C)
[   21.845570]  dump_stack_lvl+0x8c/0xd0
[   21.845598]  print_report+0x118/0x608
[   21.845624]  kasan_report+0xdc/0x128
[   21.845649]  __asan_report_load1_noabort+0x20/0x30
[   21.845679]  kasan_strings+0x95c/0xb00
[   21.845708]  kunit_try_run_case+0x170/0x3f0
[   21.845739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.845773]  kthread+0x328/0x630
[   21.845803]  ret_from_fork+0x10/0x20
[   21.845832] 
[   21.851353] Allocated by task 317:
[   21.851682]  kasan_save_stack+0x3c/0x68
[   21.852052]  kasan_save_track+0x20/0x40
[   21.852420]  kasan_save_alloc_info+0x40/0x58
[   21.852827]  __kasan_kmalloc+0xd4/0xd8
[   21.853185]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.853620]  kasan_strings+0xc8/0xb00
[   21.853976]  kunit_try_run_case+0x170/0x3f0
[   21.854377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.854895]  kthread+0x328/0x630
[   21.855214]  ret_from_fork+0x10/0x20
[   21.855558] 
[   21.855708] Freed by task 317:
[   21.855999]  kasan_save_stack+0x3c/0x68
[   21.856366]  kasan_save_track+0x20/0x40
[   21.856733]  kasan_save_free_info+0x4c/0x78
[   21.857132]  __kasan_slab_free+0x6c/0x98
[   21.857506]  kfree+0x214/0x3c8
[   21.857807]  kasan_strings+0x24c/0xb00
[   21.858169]  kunit_try_run_case+0x170/0x3f0
[   21.858569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859085]  kthread+0x328/0x630
[   21.859402]  ret_from_fork+0x10/0x20
[   21.859747] 
[   21.859897] The buggy address belongs to the object at ffff000010ac0b00
[   21.859897]  which belongs to the cache kmalloc-32 of size 32
[   21.861009] The buggy address is located 16 bytes inside of
[   21.861009]  freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20)
[   21.862098] 
[   21.862249] The buggy address belongs to the physical page:
[   21.862762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0
[   21.863487] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.864094] page_type: f5(slab)
[   21.864402] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   21.865112] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.865816] page dumped because: kasan: bad access detected
[   21.866327] 
[   21.866477] Memory state around the buggy address:
[   21.866922]  ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.867583]  ffff000010ac0a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.868243] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.868900]                          ^
[   21.869252]  ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.869913]  ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.870570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   21.813391] ==================================================================
[   21.815507] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   21.816074] Read of size 1 at addr ffff000010ac0b10 by task kunit_try_catch/317
[   21.816746] 
[   21.816910] CPU: 2 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.816954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.816968] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.816984] Call trace:
[   21.816995]  show_stack+0x20/0x38 (C)
[   21.817025]  dump_stack_lvl+0x8c/0xd0
[   21.817051]  print_report+0x118/0x608
[   21.817079]  kasan_report+0xdc/0x128
[   21.817103]  __asan_report_load1_noabort+0x20/0x30
[   21.817135]  strcmp+0xc0/0xc8
[   21.817160]  kasan_strings+0x340/0xb00
[   21.817189]  kunit_try_run_case+0x170/0x3f0
[   21.817220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.817255]  kthread+0x328/0x630
[   21.817285]  ret_from_fork+0x10/0x20
[   21.817315] 
[   21.823100] Allocated by task 317:
[   21.823422]  kasan_save_stack+0x3c/0x68
[   21.823791]  kasan_save_track+0x20/0x40
[   21.824157]  kasan_save_alloc_info+0x40/0x58
[   21.824565]  __kasan_kmalloc+0xd4/0xd8
[   21.824924]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.825358]  kasan_strings+0xc8/0xb00
[   21.825713]  kunit_try_run_case+0x170/0x3f0
[   21.826114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.826632]  kthread+0x328/0x630
[   21.826949]  ret_from_fork+0x10/0x20
[   21.827293] 
[   21.827444] Freed by task 317:
[   21.827735]  kasan_save_stack+0x3c/0x68
[   21.828102]  kasan_save_track+0x20/0x40
[   21.828467]  kasan_save_free_info+0x4c/0x78
[   21.828867]  __kasan_slab_free+0x6c/0x98
[   21.829240]  kfree+0x214/0x3c8
[   21.829541]  kasan_strings+0x24c/0xb00
[   21.829904]  kunit_try_run_case+0x170/0x3f0
[   21.830304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.830822]  kthread+0x328/0x630
[   21.831138]  ret_from_fork+0x10/0x20
[   21.831484] 
[   21.831634] The buggy address belongs to the object at ffff000010ac0b00
[   21.831634]  which belongs to the cache kmalloc-32 of size 32
[   21.832745] The buggy address is located 16 bytes inside of
[   21.832745]  freed 32-byte region [ffff000010ac0b00, ffff000010ac0b20)
[   21.833835] 
[   21.833988] The buggy address belongs to the physical page:
[   21.834501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ac0
[   21.835229] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.835836] page_type: f5(slab)
[   21.836144] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   21.836855] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.837557] page dumped because: kasan: bad access detected
[   21.838068] 
[   21.838218] Memory state around the buggy address:
[   21.838663]  ffff000010ac0a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.839323]  ffff000010ac0a80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.839984] >ffff000010ac0b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.840640]                          ^
[   21.840994]  ffff000010ac0b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.841654]  ffff000010ac0c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.842312] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   21.781367] ==================================================================
[   21.782405] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   21.782981] Read of size 1 at addr ffff00000257b298 by task kunit_try_catch/315
[   21.783648] 
[   21.783805] CPU: 3 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.783843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.783854] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.783868] Call trace:
[   21.783878]  show_stack+0x20/0x38 (C)
[   21.783904]  dump_stack_lvl+0x8c/0xd0
[   21.783928]  print_report+0x118/0x608
[   21.783952]  kasan_report+0xdc/0x128
[   21.783973]  __asan_report_load1_noabort+0x20/0x30
[   21.783999]  memcmp+0x198/0x1d8
[   21.784022]  kasan_memcmp+0x16c/0x300
[   21.784046]  kunit_try_run_case+0x170/0x3f0
[   21.784073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.784102]  kthread+0x328/0x630
[   21.784128]  ret_from_fork+0x10/0x20
[   21.784153] 
[   21.789926] Allocated by task 315:
[   21.790244]  kasan_save_stack+0x3c/0x68
[   21.790608]  kasan_save_track+0x20/0x40
[   21.790969]  kasan_save_alloc_info+0x40/0x58
[   21.791372]  __kasan_kmalloc+0xd4/0xd8
[   21.791725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.792153]  kasan_memcmp+0xbc/0x300
[   21.792497]  kunit_try_run_case+0x170/0x3f0
[   21.792892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.793403]  kthread+0x328/0x630
[   21.793715]  ret_from_fork+0x10/0x20
[   21.794055] 
[   21.794202] The buggy address belongs to the object at ffff00000257b280
[   21.794202]  which belongs to the cache kmalloc-32 of size 32
[   21.795308] The buggy address is located 0 bytes to the right of
[   21.795308]  allocated 24-byte region [ffff00000257b280, ffff00000257b298)
[   21.796459] 
[   21.796607] The buggy address belongs to the physical page:
[   21.797115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x257b
[   21.797829] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.798430] page_type: f5(slab)
[   21.798735] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   21.799438] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.800136] page dumped because: kasan: bad access detected
[   21.800643] 
[   21.800790] Memory state around the buggy address:
[   21.801231]  ffff00000257b180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.801885]  ffff00000257b200: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   21.802541] >ffff00000257b280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.803192]                             ^
[   21.803564]  ffff00000257b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.804218]  ffff00000257b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.804871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   21.754623] ==================================================================
[   21.755711] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   21.756433] Read of size 1 at addr ffff8000896d7b4a by task kunit_try_catch/311
[   21.757112] 
[   21.757278] CPU: 2 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.757328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.757344] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.757363] Call trace:
[   21.757375]  show_stack+0x20/0x38 (C)
[   21.757409]  dump_stack_lvl+0x8c/0xd0
[   21.757441]  print_report+0x310/0x608
[   21.757475]  kasan_report+0xdc/0x128
[   21.757506]  __asan_report_load1_noabort+0x20/0x30
[   21.757541]  kasan_alloca_oob_right+0x2dc/0x340
[   21.757578]  kunit_try_run_case+0x170/0x3f0
[   21.757616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.757657]  kthread+0x328/0x630
[   21.757692]  ret_from_fork+0x10/0x20
[   21.757727] 
[   21.763344] The buggy address belongs to stack of task kunit_try_catch/311
[   21.764004] 
[   21.764166] The buggy address belongs to the virtual mapping at
[   21.764166]  [ffff8000896d0000, ffff8000896d9000) created by:
[   21.764166]  kernel_clone+0x150/0x7a8
[   21.765562] 
[   21.765721] The buggy address belongs to the physical page:
[   21.766239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea46
[   21.766966] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.767591] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.768308] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.769018] page dumped because: kasan: bad access detected
[   21.769535] 
[   21.769689] Memory state around the buggy address:
[   21.770138]  ffff8000896d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.770805]  ffff8000896d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.771473] >ffff8000896d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   21.772136]                                               ^
[   21.772656]  ffff8000896d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   21.773323]  ffff8000896d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   21.773987] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   21.731641] ==================================================================
[   21.732656] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   21.733357] Read of size 1 at addr ffff8000896b7b5f by task kunit_try_catch/309
[   21.734029] 
[   21.734209] CPU: 3 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.734268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.734285] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.734304] Call trace:
[   21.734318]  show_stack+0x20/0x38 (C)
[   21.734357]  dump_stack_lvl+0x8c/0xd0
[   21.734390]  print_report+0x310/0x608
[   21.734421]  kasan_report+0xdc/0x128
[   21.734450]  __asan_report_load1_noabort+0x20/0x30
[   21.734485]  kasan_alloca_oob_left+0x2b8/0x310
[   21.734521]  kunit_try_run_case+0x170/0x3f0
[   21.734559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.734598]  kthread+0x328/0x630
[   21.734633]  ret_from_fork+0x10/0x20
[   21.734667] 
[   21.740282] The buggy address belongs to stack of task kunit_try_catch/309
[   21.740937] 
[   21.741098] The buggy address belongs to the virtual mapping at
[   21.741098]  [ffff8000896b0000, ffff8000896b9000) created by:
[   21.741098]  kernel_clone+0x150/0x7a8
[   21.742491] 
[   21.742648] The buggy address belongs to the physical page:
[   21.743166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea32
[   21.743895] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.744520] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.745237] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.745948] page dumped because: kasan: bad access detected
[   21.746464] 
[   21.746618] Memory state around the buggy address:
[   21.747068]  ffff8000896b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.747735]  ffff8000896b7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.748402] >ffff8000896b7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   21.749066]                                                     ^
[   21.749632]  ffff8000896b7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   21.750300]  ffff8000896b7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   21.750964] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   21.706168] ==================================================================
[   21.707570] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   21.708230] Read of size 1 at addr ffff800089697c2a by task kunit_try_catch/307
[   21.708909] 
[   21.709075] CPU: 2 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.709126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.709141] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.709159] Call trace:
[   21.709171]  show_stack+0x20/0x38 (C)
[   21.709205]  dump_stack_lvl+0x8c/0xd0
[   21.709237]  print_report+0x310/0x608
[   21.709268]  kasan_report+0xdc/0x128
[   21.709296]  __asan_report_load1_noabort+0x20/0x30
[   21.709332]  kasan_stack_oob+0x238/0x270
[   21.709364]  kunit_try_run_case+0x170/0x3f0
[   21.709401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.709441]  kthread+0x328/0x630
[   21.709478]  ret_from_fork+0x10/0x20
[   21.709514] 
[   21.715078] The buggy address belongs to stack of task kunit_try_catch/307
[   21.715714]  and is located at offset 138 in frame:
[   21.716169]  kasan_stack_oob+0x0/0x270
[   21.716543] 
[   21.716698] This frame has 4 objects:
[   21.717050]  [48, 49) '__assertion'
[   21.717072]  [64, 72) 'array'
[   21.717409]  [96, 112) '__assertion'
[   21.717702]  [128, 138) 'stack_array'
[   21.718044] 
[   21.718532] The buggy address belongs to the virtual mapping at
[   21.718532]  [ffff800089690000, ffff800089699000) created by:
[   21.718532]  kernel_clone+0x150/0x7a8
[   21.719924] 
[   21.720081] The buggy address belongs to the physical page:
[   21.720597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea1e
[   21.721324] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.721947] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.722664] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.723373] page dumped because: kasan: bad access detected
[   21.723890] 
[   21.724044] Memory state around the buggy address:
[   21.724493]  ffff800089697b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.725161]  ffff800089697b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   21.725829] >ffff800089697c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   21.726493]                                   ^
[   21.726921]  ffff800089697c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   21.727588]  ffff800089697d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   21.728253] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   21.681071] ==================================================================
[   21.682227] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   21.682936] Read of size 1 at addr ffff800087b3e48d by task kunit_try_catch/303
[   21.683600] 
[   21.683758] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.683795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.683806] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.683820] Call trace:
[   21.683830]  show_stack+0x20/0x38 (C)
[   21.683855]  dump_stack_lvl+0x8c/0xd0
[   21.683880]  print_report+0x310/0x608
[   21.683902]  kasan_report+0xdc/0x128
[   21.683924]  __asan_report_load1_noabort+0x20/0x30
[   21.683949]  kasan_global_oob_right+0x230/0x270
[   21.683974]  kunit_try_run_case+0x170/0x3f0
[   21.684002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.684032]  kthread+0x328/0x630
[   21.684058]  ret_from_fork+0x10/0x20
[   21.684083] 
[   21.689654] The buggy address belongs to the variable:
[   21.690120]  global_array+0xd/0x40
[   21.690446] 
[   21.690605] The buggy address belongs to the virtual mapping at
[   21.690605]  [ffff800085d10000, ffff800087bf1000) created by:
[   21.690605]  paging_init+0x670/0x7d0
[   21.691973] 
[   21.692123] The buggy address belongs to the physical page:
[   21.692631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa33e
[   21.693345] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   21.694025] raw: 03fffe0000002000 fffffdffc028cf88 fffffdffc028cf88 0000000000000000
[   21.694730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.695427] page dumped because: kasan: bad access detected
[   21.695934] 
[   21.696081] Memory state around the buggy address:
[   21.696520]  ffff800087b3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.697176]  ffff800087b3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   21.697831] >ffff800087b3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   21.698483]                       ^
[   21.698808]  ffff800087b3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   21.699464]  ffff800087b3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.700115] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   21.625176] ==================================================================
[   21.626328] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.627093] Free of addr ffff00000e73aa01 by task kunit_try_catch/299
[   21.627694] 
[   21.627861] CPU: 2 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.627911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.627926] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.627944] Call trace:
[   21.627958]  show_stack+0x20/0x38 (C)
[   21.627991]  dump_stack_lvl+0x8c/0xd0
[   21.628023]  print_report+0x118/0x608
[   21.628053]  kasan_report_invalid_free+0xc0/0xe8
[   21.628086]  check_slab_allocation+0xfc/0x108
[   21.628116]  __kasan_mempool_poison_object+0x78/0x150
[   21.628150]  mempool_free+0x28c/0x328
[   21.628186]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.628225]  mempool_kmalloc_invalid_free+0xc0/0x118
[   21.628262]  kunit_try_run_case+0x170/0x3f0
[   21.628299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.628339]  kthread+0x328/0x630
[   21.628375]  ret_from_fork+0x10/0x20
[   21.628409] 
[   21.635386] Allocated by task 299:
[   21.635713]  kasan_save_stack+0x3c/0x68
[   21.636087]  kasan_save_track+0x20/0x40
[   21.636460]  kasan_save_alloc_info+0x40/0x58
[   21.636875]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.637381]  remove_element+0x130/0x1f8
[   21.637760]  mempool_alloc_preallocated+0x58/0xc0
[   21.638215]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   21.638750]  mempool_kmalloc_invalid_free+0xc0/0x118
[   21.639228]  kunit_try_run_case+0x170/0x3f0
[   21.639637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.640162]  kthread+0x328/0x630
[   21.640486]  ret_from_fork+0x10/0x20
[   21.640838] 
[   21.640992] The buggy address belongs to the object at ffff00000e73aa00
[   21.640992]  which belongs to the cache kmalloc-128 of size 128
[   21.642128] The buggy address is located 1 bytes inside of
[   21.642128]  128-byte region [ffff00000e73aa00, ffff00000e73aa80)
[   21.643180] 
[   21.643335] The buggy address belongs to the physical page:
[   21.643854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a
[   21.644579] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.645193] page_type: f5(slab)
[   21.645508] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.646226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.646934] page dumped because: kasan: bad access detected
[   21.647451] 
[   21.647604] Memory state around the buggy address:
[   21.648055]  ffff00000e73a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.648723]  ffff00000e73a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.649390] >ffff00000e73aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.650053]                    ^
[   21.650365]  ffff00000e73aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.651032]  ffff00000e73ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.651696] ==================================================================
[   21.656442] ==================================================================
[   21.657584] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.658350] Free of addr ffff00000eb18001 by task kunit_try_catch/301
[   21.658950] 
[   21.659117] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.659168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.659183] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.659202] Call trace:
[   21.659214]  show_stack+0x20/0x38 (C)
[   21.659249]  dump_stack_lvl+0x8c/0xd0
[   21.659281]  print_report+0x118/0x608
[   21.659312]  kasan_report_invalid_free+0xc0/0xe8
[   21.659344]  __kasan_mempool_poison_object+0xfc/0x150
[   21.659378]  mempool_free+0x28c/0x328
[   21.659415]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   21.659454]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   21.659494]  kunit_try_run_case+0x170/0x3f0
[   21.659532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.659572]  kthread+0x328/0x630
[   21.659608]  ret_from_fork+0x10/0x20
[   21.659641] 
[   21.666277] The buggy address belongs to the physical page:
[   21.666797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeb18
[   21.667521] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.668228] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.668882] page_type: f8(unknown)
[   21.669218] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.669937] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.670655] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.671380] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.672104] head: 03fffe0000000002 fffffdffc03ac601 00000000ffffffff 00000000ffffffff
[   21.672828] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.673545] page dumped because: kasan: bad access detected
[   21.674061] 
[   21.674214] Memory state around the buggy address:
[   21.674663]  ffff00000eb17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.675330]  ffff00000eb17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.675998] >ffff00000eb18000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.676661]                    ^
[   21.676973]  ffff00000eb18080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.677640]  ffff00000eb18100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.678303] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   21.579152] ==================================================================
[   21.580310] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.580996] Free of addr ffff00000eb18000 by task kunit_try_catch/295
[   21.581594] 
[   21.581760] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.581811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.581825] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.581843] Call trace:
[   21.581855]  show_stack+0x20/0x38 (C)
[   21.581889]  dump_stack_lvl+0x8c/0xd0
[   21.581920]  print_report+0x118/0x608
[   21.581949]  kasan_report_invalid_free+0xc0/0xe8
[   21.581981]  __kasan_mempool_poison_object+0x14c/0x150
[   21.582015]  mempool_free+0x28c/0x328
[   21.582050]  mempool_double_free_helper+0x150/0x2e8
[   21.582086]  mempool_kmalloc_large_double_free+0xc0/0x118
[   21.582125]  kunit_try_run_case+0x170/0x3f0
[   21.582162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.582202]  kthread+0x328/0x630
[   21.582236]  ret_from_fork+0x10/0x20
[   21.582270] 
[   21.588840] The buggy address belongs to the physical page:
[   21.589358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeb18
[   21.590083] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.590789] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.591441] page_type: f8(unknown)
[   21.591778] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.592494] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.593210] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.593933] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.594657] head: 03fffe0000000002 fffffdffc03ac601 00000000ffffffff 00000000ffffffff
[   21.595380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.596095] page dumped because: kasan: bad access detected
[   21.596611] 
[   21.596763] Memory state around the buggy address:
[   21.597212]  ffff00000eb17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.597878]  ffff00000eb17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.598543] >ffff00000eb18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.599205]                    ^
[   21.599516]  ffff00000eb18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.600182]  ffff00000eb18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.600844] ==================================================================
[   21.543815] ==================================================================
[   21.544897] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.545577] Free of addr ffff00000e73a600 by task kunit_try_catch/293
[   21.546175] 
[   21.546339] CPU: 2 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.546388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.546402] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.546419] Call trace:
[   21.546430]  show_stack+0x20/0x38 (C)
[   21.546463]  dump_stack_lvl+0x8c/0xd0
[   21.546493]  print_report+0x118/0x608
[   21.546523]  kasan_report_invalid_free+0xc0/0xe8
[   21.546554]  check_slab_allocation+0xd4/0x108
[   21.546584]  __kasan_mempool_poison_object+0x78/0x150
[   21.546616]  mempool_free+0x28c/0x328
[   21.546651]  mempool_double_free_helper+0x150/0x2e8
[   21.546689]  mempool_kmalloc_double_free+0xc0/0x118
[   21.546725]  kunit_try_run_case+0x170/0x3f0
[   21.546760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.546799]  kthread+0x328/0x630
[   21.546832]  ret_from_fork+0x10/0x20
[   21.546864] 
[   21.553764] Allocated by task 293:
[   21.554090]  kasan_save_stack+0x3c/0x68
[   21.554463]  kasan_save_track+0x20/0x40
[   21.554835]  kasan_save_alloc_info+0x40/0x58
[   21.555248]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.555752]  remove_element+0x130/0x1f8
[   21.556129]  mempool_alloc_preallocated+0x58/0xc0
[   21.556582]  mempool_double_free_helper+0x94/0x2e8
[   21.557045]  mempool_kmalloc_double_free+0xc0/0x118
[   21.557514]  kunit_try_run_case+0x170/0x3f0
[   21.557919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.558444]  kthread+0x328/0x630
[   21.558766]  ret_from_fork+0x10/0x20
[   21.559117] 
[   21.559270] Freed by task 293:
[   21.559564]  kasan_save_stack+0x3c/0x68
[   21.559937]  kasan_save_track+0x20/0x40
[   21.560308]  kasan_save_free_info+0x4c/0x78
[   21.560712]  __kasan_mempool_poison_object+0xc0/0x150
[   21.561193]  mempool_free+0x28c/0x328
[   21.561554]  mempool_double_free_helper+0x100/0x2e8
[   21.562025]  mempool_kmalloc_double_free+0xc0/0x118
[   21.562495]  kunit_try_run_case+0x170/0x3f0
[   21.562901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.563426]  kthread+0x328/0x630
[   21.563748]  ret_from_fork+0x10/0x20
[   21.564098] 
[   21.564250] The buggy address belongs to the object at ffff00000e73a600
[   21.564250]  which belongs to the cache kmalloc-128 of size 128
[   21.565384] The buggy address is located 0 bytes inside of
[   21.565384]  128-byte region [ffff00000e73a600, ffff00000e73a680)
[   21.566435] 
[   21.566590] The buggy address belongs to the physical page:
[   21.567108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a
[   21.567834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.568446] page_type: f5(slab)
[   21.568761] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.569478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.570185] page dumped because: kasan: bad access detected
[   21.570700] 
[   21.570852] Memory state around the buggy address:
[   21.571301]  ffff00000e73a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.571968]  ffff00000e73a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.572634] >ffff00000e73a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.573296]                    ^
[   21.573606]  ffff00000e73a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.574272]  ffff00000e73a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.574935] ==================================================================
[   21.603877] ==================================================================
[   21.605032] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   21.605702] Free of addr ffff000002598000 by task kunit_try_catch/297
[   21.606289] 
[   21.606445] CPU: 2 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.606482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.606493] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.606506] Call trace:
[   21.606515]  show_stack+0x20/0x38 (C)
[   21.606539]  dump_stack_lvl+0x8c/0xd0
[   21.606562]  print_report+0x118/0x608
[   21.606583]  kasan_report_invalid_free+0xc0/0xe8
[   21.606606]  __kasan_mempool_poison_pages+0xe0/0xe8
[   21.606628]  mempool_free+0x24c/0x328
[   21.606655]  mempool_double_free_helper+0x150/0x2e8
[   21.606681]  mempool_page_alloc_double_free+0xbc/0x118
[   21.606704]  kunit_try_run_case+0x170/0x3f0
[   21.606731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.606759]  kthread+0x328/0x630
[   21.606785]  ret_from_fork+0x10/0x20
[   21.606809] 
[   21.613281] The buggy address belongs to the physical page:
[   21.613788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2598
[   21.614501] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.615109] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.615813] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.616509] page dumped because: kasan: bad access detected
[   21.617015] 
[   21.617161] Memory state around the buggy address:
[   21.617600]  ffff000002597f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.618254]  ffff000002597f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.618909] >ffff000002598000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.619560]                    ^
[   21.619861]  ffff000002598080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.620515]  ffff000002598100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.621165] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   21.452408] ==================================================================
[   21.453479] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   21.454129] Read of size 1 at addr ffff000002598000 by task kunit_try_catch/287
[   21.454808] 
[   21.454973] CPU: 2 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.455024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.455038] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.455056] Call trace:
[   21.455068]  show_stack+0x20/0x38 (C)
[   21.455101]  dump_stack_lvl+0x8c/0xd0
[   21.455132]  print_report+0x118/0x608
[   21.455162]  kasan_report+0xdc/0x128
[   21.455190]  __asan_report_load1_noabort+0x20/0x30
[   21.455224]  mempool_uaf_helper+0x314/0x340
[   21.455259]  mempool_kmalloc_large_uaf+0xc4/0x120
[   21.455295]  kunit_try_run_case+0x170/0x3f0
[   21.455331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.455370]  kthread+0x328/0x630
[   21.455404]  ret_from_fork+0x10/0x20
[   21.455437] 
[   21.461436] The buggy address belongs to the physical page:
[   21.461953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2598
[   21.462677] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.463384] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.464035] page_type: f8(unknown)
[   21.464371] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.465087] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.465803] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.466527] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.467251] head: 03fffe0000000002 fffffdffc0096601 00000000ffffffff 00000000ffffffff
[   21.467975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.468692] page dumped because: kasan: bad access detected
[   21.469207] 
[   21.469360] Memory state around the buggy address:
[   21.469809]  ffff000002597f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.470476]  ffff000002597f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.471142] >ffff000002598000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.471805]                    ^
[   21.472116]  ffff000002598080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.472782]  ffff000002598100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.473444] ==================================================================
[   21.522232] ==================================================================
[   21.523243] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   21.523873] Read of size 1 at addr ffff0000103c4000 by task kunit_try_catch/291
[   21.524538] 
[   21.524693] CPU: 4 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.524729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.524739] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.524751] Call trace:
[   21.524760]  show_stack+0x20/0x38 (C)
[   21.524783]  dump_stack_lvl+0x8c/0xd0
[   21.524804]  print_report+0x118/0x608
[   21.524823]  kasan_report+0xdc/0x128
[   21.524842]  __asan_report_load1_noabort+0x20/0x30
[   21.524863]  mempool_uaf_helper+0x314/0x340
[   21.524886]  mempool_page_alloc_uaf+0xc0/0x118
[   21.524912]  kunit_try_run_case+0x170/0x3f0
[   21.524934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.524960]  kthread+0x328/0x630
[   21.524982]  ret_from_fork+0x10/0x20
[   21.525003] 
[   21.530926] The buggy address belongs to the physical page:
[   21.531431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c4
[   21.532148] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.532754] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.533454] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.534150] page dumped because: kasan: bad access detected
[   21.534655] 
[   21.534800] Memory state around the buggy address:
[   21.535238]  ffff0000103c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.535891]  ffff0000103c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.536543] >ffff0000103c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.537191]                    ^
[   21.537493]  ffff0000103c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.538146]  ffff0000103c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.538795] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   21.477063] ==================================================================
[   21.478161] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   21.478861] Read of size 1 at addr ffff000010b98240 by task kunit_try_catch/289
[   21.479532] 
[   21.479694] CPU: 3 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.479738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.479750] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.479766] Call trace:
[   21.479776]  show_stack+0x20/0x38 (C)
[   21.479804]  dump_stack_lvl+0x8c/0xd0
[   21.479830]  print_report+0x118/0x608
[   21.479855]  kasan_report+0xdc/0x128
[   21.479880]  __asan_report_load1_noabort+0x20/0x30
[   21.479908]  mempool_uaf_helper+0x314/0x340
[   21.479937]  mempool_slab_uaf+0xc0/0x118
[   21.479960]  kunit_try_run_case+0x170/0x3f0
[   21.479991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.480024]  kthread+0x328/0x630
[   21.480053]  ret_from_fork+0x10/0x20
[   21.480082] 
[   21.485989] Allocated by task 289:
[   21.486312]  kasan_save_stack+0x3c/0x68
[   21.486682]  kasan_save_track+0x20/0x40
[   21.487046]  kasan_save_alloc_info+0x40/0x58
[   21.487453]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.487943]  remove_element+0x16c/0x1f8
[   21.488316]  mempool_alloc_preallocated+0x58/0xc0
[   21.488762]  mempool_uaf_helper+0xa4/0x340
[   21.489156]  mempool_slab_uaf+0xc0/0x118
[   21.489530]  kunit_try_run_case+0x170/0x3f0
[   21.489930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.490447]  kthread+0x328/0x630
[   21.490763]  ret_from_fork+0x10/0x20
[   21.491106] 
[   21.491255] Freed by task 289:
[   21.491545]  kasan_save_stack+0x3c/0x68
[   21.491910]  kasan_save_track+0x20/0x40
[   21.492276]  kasan_save_free_info+0x4c/0x78
[   21.492673]  __kasan_mempool_poison_object+0xc0/0x150
[   21.493147]  mempool_free+0x28c/0x328
[   21.493501]  mempool_uaf_helper+0x104/0x340
[   21.493902]  mempool_slab_uaf+0xc0/0x118
[   21.494274]  kunit_try_run_case+0x170/0x3f0
[   21.494674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.495190]  kthread+0x328/0x630
[   21.495506]  ret_from_fork+0x10/0x20
[   21.495849] 
[   21.495998] The buggy address belongs to the object at ffff000010b98240
[   21.495998]  which belongs to the cache test_cache of size 123
[   21.497117] The buggy address is located 0 bytes inside of
[   21.497117]  freed 123-byte region [ffff000010b98240, ffff000010b982bb)
[   21.498208] 
[   21.498358] The buggy address belongs to the physical page:
[   21.498870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b98
[   21.499595] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.500201] page_type: f5(slab)
[   21.500509] raw: 03fffe0000000000 ffff00000ca9e640 dead000000000122 0000000000000000
[   21.501219] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.501920] page dumped because: kasan: bad access detected
[   21.502430] 
[   21.502579] Memory state around the buggy address:
[   21.503023]  ffff000010b98100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.503683]  ffff000010b98180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.504342] >ffff000010b98200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   21.504998]                                            ^
[   21.505487]  ffff000010b98280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.506147]  ffff000010b98300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.506804] ==================================================================
[   21.418212] ==================================================================
[   21.419310] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   21.419995] Read of size 1 at addr ffff00000c98eb00 by task kunit_try_catch/285
[   21.420673] 
[   21.420838] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.420888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.420903] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.420920] Call trace:
[   21.420932]  show_stack+0x20/0x38 (C)
[   21.420965]  dump_stack_lvl+0x8c/0xd0
[   21.420997]  print_report+0x118/0x608
[   21.421027]  kasan_report+0xdc/0x128
[   21.421055]  __asan_report_load1_noabort+0x20/0x30
[   21.421089]  mempool_uaf_helper+0x314/0x340
[   21.421123]  mempool_kmalloc_uaf+0xc4/0x120
[   21.421157]  kunit_try_run_case+0x170/0x3f0
[   21.421193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.421232]  kthread+0x328/0x630
[   21.421267]  ret_from_fork+0x10/0x20
[   21.421299] 
[   21.427255] Allocated by task 285:
[   21.427582]  kasan_save_stack+0x3c/0x68
[   21.427955]  kasan_save_track+0x20/0x40
[   21.428328]  kasan_save_alloc_info+0x40/0x58
[   21.428741]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.429245]  remove_element+0x130/0x1f8
[   21.429625]  mempool_alloc_preallocated+0x58/0xc0
[   21.430078]  mempool_uaf_helper+0xa4/0x340
[   21.430479]  mempool_kmalloc_uaf+0xc4/0x120
[   21.430887]  kunit_try_run_case+0x170/0x3f0
[   21.431295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.431819]  kthread+0x328/0x630
[   21.432143]  ret_from_fork+0x10/0x20
[   21.432493] 
[   21.432646] Freed by task 285:
[   21.432940]  kasan_save_stack+0x3c/0x68
[   21.433313]  kasan_save_track+0x20/0x40
[   21.433685]  kasan_save_free_info+0x4c/0x78
[   21.434090]  __kasan_mempool_poison_object+0xc0/0x150
[   21.434572]  mempool_free+0x28c/0x328
[   21.434933]  mempool_uaf_helper+0x104/0x340
[   21.435340]  mempool_kmalloc_uaf+0xc4/0x120
[   21.435748]  kunit_try_run_case+0x170/0x3f0
[   21.436156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.436680]  kthread+0x328/0x630
[   21.437002]  ret_from_fork+0x10/0x20
[   21.437352] 
[   21.437507] The buggy address belongs to the object at ffff00000c98eb00
[   21.437507]  which belongs to the cache kmalloc-128 of size 128
[   21.438641] The buggy address is located 0 bytes inside of
[   21.438641]  freed 128-byte region [ffff00000c98eb00, ffff00000c98eb80)
[   21.439739] 
[   21.439893] The buggy address belongs to the physical page:
[   21.440410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   21.441137] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.441749] page_type: f5(slab)
[   21.442064] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.442781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.443487] page dumped because: kasan: bad access detected
[   21.444001] 
[   21.444153] Memory state around the buggy address:
[   21.444600]  ffff00000c98ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.445267]  ffff00000c98ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.445933] >ffff00000c98eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.446595]                    ^
[   21.446907]  ffff00000c98eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.447573]  ffff00000c98ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.448235] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   21.366781] ==================================================================
[   21.367945] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.368668] Read of size 1 at addr ffff000010b842bb by task kunit_try_catch/283
[   21.369347] 
[   21.369513] CPU: 3 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.369565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.369579] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.369597] Call trace:
[   21.369609]  show_stack+0x20/0x38 (C)
[   21.369643]  dump_stack_lvl+0x8c/0xd0
[   21.369675]  print_report+0x118/0x608
[   21.369705]  kasan_report+0xdc/0x128
[   21.369734]  __asan_report_load1_noabort+0x20/0x30
[   21.369768]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.369805]  mempool_slab_oob_right+0xc0/0x118
[   21.369834]  kunit_try_run_case+0x170/0x3f0
[   21.369872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.369911]  kthread+0x328/0x630
[   21.369945]  ret_from_fork+0x10/0x20
[   21.369978] 
[   21.375998] Allocated by task 283:
[   21.376324]  kasan_save_stack+0x3c/0x68
[   21.376698]  kasan_save_track+0x20/0x40
[   21.377069]  kasan_save_alloc_info+0x40/0x58
[   21.377481]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.377977]  remove_element+0x16c/0x1f8
[   21.378357]  mempool_alloc_preallocated+0x58/0xc0
[   21.378811]  mempool_oob_right_helper+0x98/0x2f0
[   21.379259]  mempool_slab_oob_right+0xc0/0x118
[   21.379684]  kunit_try_run_case+0x170/0x3f0
[   21.380091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.380615]  kthread+0x328/0x630
[   21.380938]  ret_from_fork+0x10/0x20
[   21.381288] 
[   21.381441] The buggy address belongs to the object at ffff000010b84240
[   21.381441]  which belongs to the cache test_cache of size 123
[   21.382568] The buggy address is located 0 bytes to the right of
[   21.382568]  allocated 123-byte region [ffff000010b84240, ffff000010b842bb)
[   21.383745] 
[   21.383900] The buggy address belongs to the physical page:
[   21.384417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b84
[   21.385151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.385765] page_type: f5(slab)
[   21.386080] raw: 03fffe0000000000 ffff00000ca9e500 dead000000000122 0000000000000000
[   21.386797] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.387505] page dumped because: kasan: bad access detected
[   21.388020] 
[   21.388173] Memory state around the buggy address:
[   21.388621]  ffff000010b84180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.389288]  ffff000010b84200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.389954] >ffff000010b84280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.390617]                                         ^
[   21.391089]  ffff000010b84300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.391755]  ffff000010b84380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.392417] ==================================================================
[   21.341424] ==================================================================
[   21.342519] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.343229] Read of size 1 at addr ffff0000103b2001 by task kunit_try_catch/281
[   21.343894] 
[   21.344052] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.344089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.344099] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.344112] Call trace:
[   21.344121]  show_stack+0x20/0x38 (C)
[   21.344145]  dump_stack_lvl+0x8c/0xd0
[   21.344169]  print_report+0x118/0x608
[   21.344191]  kasan_report+0xdc/0x128
[   21.344211]  __asan_report_load1_noabort+0x20/0x30
[   21.344236]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.344262]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.344289]  kunit_try_run_case+0x170/0x3f0
[   21.344315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.344344]  kthread+0x328/0x630
[   21.344369]  ret_from_fork+0x10/0x20
[   21.344393] 
[   21.350435] The buggy address belongs to the physical page:
[   21.350943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b0
[   21.351664] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.352358] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.352998] page_type: f8(unknown)
[   21.353323] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.354027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.354730] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.355440] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.356150] head: 03fffe0000000002 fffffdffc040ec01 00000000ffffffff 00000000ffffffff
[   21.356860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.357565] page dumped because: kasan: bad access detected
[   21.358071] 
[   21.358216] Memory state around the buggy address:
[   21.358656]  ffff0000103b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.359311]  ffff0000103b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.359965] >ffff0000103b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.360615]                    ^
[   21.360917]  ffff0000103b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.361571]  ffff0000103b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.362223] ==================================================================
[   21.312441] ==================================================================
[   21.313482] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.314209] Read of size 1 at addr ffff00000c992a73 by task kunit_try_catch/279
[   21.314887] 
[   21.315052] CPU: 3 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.315104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315118] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.315137] Call trace:
[   21.315149]  show_stack+0x20/0x38 (C)
[   21.315181]  dump_stack_lvl+0x8c/0xd0
[   21.315213]  print_report+0x118/0x608
[   21.315243]  kasan_report+0xdc/0x128
[   21.315272]  __asan_report_load1_noabort+0x20/0x30
[   21.315306]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.315342]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.315379]  kunit_try_run_case+0x170/0x3f0
[   21.315416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.315455]  kthread+0x328/0x630
[   21.315489]  ret_from_fork+0x10/0x20
[   21.315523] 
[   21.321566] Allocated by task 279:
[   21.321893]  kasan_save_stack+0x3c/0x68
[   21.322265]  kasan_save_track+0x20/0x40
[   21.322637]  kasan_save_alloc_info+0x40/0x58
[   21.323049]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.323554]  remove_element+0x130/0x1f8
[   21.323933]  mempool_alloc_preallocated+0x58/0xc0
[   21.324387]  mempool_oob_right_helper+0x98/0x2f0
[   21.324834]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.325288]  kunit_try_run_case+0x170/0x3f0
[   21.325694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326218]  kthread+0x328/0x630
[   21.326540]  ret_from_fork+0x10/0x20
[   21.326890] 
[   21.327043] The buggy address belongs to the object at ffff00000c992a00
[   21.327043]  which belongs to the cache kmalloc-128 of size 128
[   21.328175] The buggy address is located 0 bytes to the right of
[   21.328175]  allocated 115-byte region [ffff00000c992a00, ffff00000c992a73)
[   21.329350] 
[   21.329503] The buggy address belongs to the physical page:
[   21.330020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   21.330746] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.331358] page_type: f5(slab)
[   21.331672] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.332388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.333096] page dumped because: kasan: bad access detected
[   21.333611] 
[   21.333763] Memory state around the buggy address:
[   21.334211]  ffff00000c992900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.334877]  ffff00000c992980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.335544] >ffff00000c992a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.336206]                                                              ^
[   21.336839]  ffff00000c992a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337505]  ffff00000c992b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.338166] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   20.724052] ==================================================================
[   20.725120] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   20.725857] Read of size 1 at addr ffff000010ae2140 by task kunit_try_catch/273
[   20.726534] 
[   20.726700] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.726750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.726765] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.726783] Call trace:
[   20.726795]  show_stack+0x20/0x38 (C)
[   20.726828]  dump_stack_lvl+0x8c/0xd0
[   20.726860]  print_report+0x118/0x608
[   20.726889]  kasan_report+0xdc/0x128
[   20.726918]  __kasan_check_byte+0x54/0x70
[   20.726947]  kmem_cache_destroy+0x34/0x218
[   20.726976]  kmem_cache_double_destroy+0x174/0x300
[   20.727013]  kunit_try_run_case+0x170/0x3f0
[   20.727050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.727089]  kthread+0x328/0x630
[   20.727124]  ret_from_fork+0x10/0x20
[   20.727157] 
[   20.733088] Allocated by task 273:
[   20.733415]  kasan_save_stack+0x3c/0x68
[   20.733788]  kasan_save_track+0x20/0x40
[   20.734160]  kasan_save_alloc_info+0x40/0x58
[   20.734575]  __kasan_slab_alloc+0xa8/0xb0
[   20.734962]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.735405]  __kmem_cache_create_args+0x178/0x280
[   20.735863]  kmem_cache_double_destroy+0xc0/0x300
[   20.736318]  kunit_try_run_case+0x170/0x3f0
[   20.736727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.737253]  kthread+0x328/0x630
[   20.737576]  ret_from_fork+0x10/0x20
[   20.737930] 
[   20.738083] Freed by task 273:
[   20.738380]  kasan_save_stack+0x3c/0x68
[   20.738752]  kasan_save_track+0x20/0x40
[   20.739124]  kasan_save_free_info+0x4c/0x78
[   20.739529]  __kasan_slab_free+0x6c/0x98
[   20.739908]  kmem_cache_free+0x260/0x470
[   20.740287]  slab_kmem_cache_release+0x38/0x50
[   20.740714]  kmem_cache_release+0x1c/0x30
[   20.741108]  kobject_put+0x17c/0x430
[   20.741467]  sysfs_slab_release+0x1c/0x30
[   20.741855]  kmem_cache_destroy+0x118/0x218
[   20.742257]  kmem_cache_double_destroy+0x128/0x300
[   20.742720]  kunit_try_run_case+0x170/0x3f0
[   20.743127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.743651]  kthread+0x328/0x630
[   20.743973]  ret_from_fork+0x10/0x20
[   20.744323] 
[   20.744477] The buggy address belongs to the object at ffff000010ae2140
[   20.744477]  which belongs to the cache kmem_cache of size 208
[   20.745602] The buggy address is located 0 bytes inside of
[   20.745602]  freed 208-byte region [ffff000010ae2140, ffff000010ae2210)
[   20.746700] 
[   20.746854] The buggy address belongs to the physical page:
[   20.747370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ae2
[   20.748102] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.748807] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.749460] page_type: f5(slab)
[   20.749775] raw: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000
[   20.750491] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   20.751208] head: 03fffe0000000040 ffff000000402000 dead000000000122 0000000000000000
[   20.751932] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   20.752656] head: 03fffe0000000001 fffffdffc042b881 00000000ffffffff 00000000ffffffff
[   20.753379] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.754096] page dumped because: kasan: bad access detected
[   20.754611] 
[   20.754764] Memory state around the buggy address:
[   20.755213]  ffff000010ae2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.755879]  ffff000010ae2080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   20.756545] >ffff000010ae2100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.757207]                                            ^
[   20.757702]  ffff000010ae2180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.758367]  ffff000010ae2200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.759030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   20.634095] ==================================================================
[   20.635244] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   20.635965] Read of size 1 at addr ffff00000c884000 by task kunit_try_catch/271
[   20.636674] 
[   20.636858] CPU: 3 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.636938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.636963] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.636991] Call trace:
[   20.637009]  show_stack+0x20/0x38 (C)
[   20.637062]  dump_stack_lvl+0x8c/0xd0
[   20.637113]  print_report+0x118/0x608
[   20.637163]  kasan_report+0xdc/0x128
[   20.637209]  __asan_report_load1_noabort+0x20/0x30
[   20.637266]  kmem_cache_rcu_uaf+0x388/0x468
[   20.637325]  kunit_try_run_case+0x170/0x3f0
[   20.637382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.637447]  kthread+0x328/0x630
[   20.637503]  ret_from_fork+0x10/0x20
[   20.637558] 
[   20.643169] Allocated by task 271:
[   20.643506]  kasan_save_stack+0x3c/0x68
[   20.643888]  kasan_save_track+0x20/0x40
[   20.644260]  kasan_save_alloc_info+0x40/0x58
[   20.644675]  __kasan_slab_alloc+0xa8/0xb0
[   20.645061]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.645505]  kmem_cache_rcu_uaf+0x12c/0x468
[   20.645914]  kunit_try_run_case+0x170/0x3f0
[   20.646324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.646848]  kthread+0x328/0x630
[   20.647171]  ret_from_fork+0x10/0x20
[   20.647521] 
[   20.647674] Freed by task 0:
[   20.647954]  kasan_save_stack+0x3c/0x68
[   20.648324]  kasan_save_track+0x20/0x40
[   20.648696]  kasan_save_free_info+0x4c/0x78
[   20.649101]  __kasan_slab_free+0x6c/0x98
[   20.649479]  slab_free_after_rcu_debug+0xd4/0x2f8
[   20.649928]  rcu_core+0x9f4/0x1e20
[   20.650263]  rcu_core_si+0x18/0x30
[   20.650595]  handle_softirqs+0x374/0xb28
[   20.650978]  __do_softirq+0x1c/0x28
[   20.651318] 
[   20.651471] Last potentially related work creation:
[   20.651923]  kasan_save_stack+0x3c/0x68
[   20.652295]  kasan_record_aux_stack+0xb4/0xc8
[   20.652713]  kmem_cache_free+0x120/0x470
[   20.653092]  kmem_cache_rcu_uaf+0x16c/0x468
[   20.653501]  kunit_try_run_case+0x170/0x3f0
[   20.653908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.654434]  kthread+0x328/0x630
[   20.654758]  ret_from_fork+0x10/0x20
[   20.655108] 
[   20.655261] The buggy address belongs to the object at ffff00000c884000
[   20.655261]  which belongs to the cache test_cache of size 200
[   20.656389] The buggy address is located 0 bytes inside of
[   20.656389]  freed 200-byte region [ffff00000c884000, ffff00000c8840c8)
[   20.657486] 
[   20.657641] The buggy address belongs to the physical page:
[   20.658157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc884
[   20.658882] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.659589] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.660241] page_type: f5(slab)
[   20.660555] raw: 03fffe0000000040 ffff00000ca9e280 dead000000000122 0000000000000000
[   20.661271] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.661986] head: 03fffe0000000040 ffff00000ca9e280 dead000000000122 0000000000000000
[   20.662711] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.663435] head: 03fffe0000000001 fffffdffc0322101 00000000ffffffff 00000000ffffffff
[   20.664158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.664873] page dumped because: kasan: bad access detected
[   20.665388] 
[   20.665541] Memory state around the buggy address:
[   20.665990]  ffff00000c883f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.666658]  ffff00000c883f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.667325] >ffff00000c884000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.667986]                    ^
[   20.668297]  ffff00000c884080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.668963]  ffff00000c884100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.669625] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   20.511270] ==================================================================
[   20.512366] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   20.513036] Free of addr ffff00000c882001 by task kunit_try_catch/269
[   20.513633] 
[   20.513799] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.513849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.513864] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.513882] Call trace:
[   20.513894]  show_stack+0x20/0x38 (C)
[   20.513927]  dump_stack_lvl+0x8c/0xd0
[   20.513958]  print_report+0x118/0x608
[   20.513988]  kasan_report_invalid_free+0xc0/0xe8
[   20.514020]  check_slab_allocation+0xfc/0x108
[   20.514049]  __kasan_slab_pre_free+0x2c/0x48
[   20.514079]  kmem_cache_free+0xf0/0x470
[   20.514108]  kmem_cache_invalid_free+0x184/0x3c8
[   20.514144]  kunit_try_run_case+0x170/0x3f0
[   20.514181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.514220]  kthread+0x328/0x630
[   20.514254]  ret_from_fork+0x10/0x20
[   20.514287] 
[   20.520683] Allocated by task 269:
[   20.521008]  kasan_save_stack+0x3c/0x68
[   20.521381]  kasan_save_track+0x20/0x40
[   20.521752]  kasan_save_alloc_info+0x40/0x58
[   20.522165]  __kasan_slab_alloc+0xa8/0xb0
[   20.522551]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.522994]  kmem_cache_invalid_free+0x12c/0x3c8
[   20.523440]  kunit_try_run_case+0x170/0x3f0
[   20.523847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.524371]  kthread+0x328/0x630
[   20.524694]  ret_from_fork+0x10/0x20
[   20.525044] 
[   20.525197] The buggy address belongs to the object at ffff00000c882000
[   20.525197]  which belongs to the cache test_cache of size 200
[   20.526322] The buggy address is located 1 bytes inside of
[   20.526322]  200-byte region [ffff00000c882000, ffff00000c8820c8)
[   20.527373] 
[   20.527526] The buggy address belongs to the physical page:
[   20.528043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc882
[   20.528768] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.529474] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.530128] page_type: f5(slab)
[   20.530442] raw: 03fffe0000000040 ffff00000ca9e140 dead000000000122 0000000000000000
[   20.531158] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.531874] head: 03fffe0000000040 ffff00000ca9e140 dead000000000122 0000000000000000
[   20.532598] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.533322] head: 03fffe0000000001 fffffdffc0322081 00000000ffffffff 00000000ffffffff
[   20.534045] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.534760] page dumped because: kasan: bad access detected
[   20.535275] 
[   20.535428] Memory state around the buggy address:
[   20.535877]  ffff00000c881f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.536544]  ffff00000c881f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.537210] >ffff00000c882000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.537872]                    ^
[   20.538182]  ffff00000c882080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.538849]  ffff00000c882100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.539510] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   20.463539] ==================================================================
[   20.464580] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   20.465234] Free of addr ffff00000c880000 by task kunit_try_catch/267
[   20.465830] 
[   20.465995] CPU: 3 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.466045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.466059] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.466077] Call trace:
[   20.466089]  show_stack+0x20/0x38 (C)
[   20.466121]  dump_stack_lvl+0x8c/0xd0
[   20.466152]  print_report+0x118/0x608
[   20.466181]  kasan_report_invalid_free+0xc0/0xe8
[   20.466212]  check_slab_allocation+0xd4/0x108
[   20.466242]  __kasan_slab_pre_free+0x2c/0x48
[   20.466271]  kmem_cache_free+0xf0/0x470
[   20.466300]  kmem_cache_double_free+0x190/0x3c8
[   20.466335]  kunit_try_run_case+0x170/0x3f0
[   20.466371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.466410]  kthread+0x328/0x630
[   20.466444]  ret_from_fork+0x10/0x20
[   20.466477] 
[   20.472863] Allocated by task 267:
[   20.473189]  kasan_save_stack+0x3c/0x68
[   20.473562]  kasan_save_track+0x20/0x40
[   20.473934]  kasan_save_alloc_info+0x40/0x58
[   20.474347]  __kasan_slab_alloc+0xa8/0xb0
[   20.474735]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.475175]  kmem_cache_double_free+0x12c/0x3c8
[   20.475614]  kunit_try_run_case+0x170/0x3f0
[   20.476020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.476544]  kthread+0x328/0x630
[   20.476867]  ret_from_fork+0x10/0x20
[   20.477217] 
[   20.477370] Freed by task 267:
[   20.477664]  kasan_save_stack+0x3c/0x68
[   20.478036]  kasan_save_track+0x20/0x40
[   20.478407]  kasan_save_free_info+0x4c/0x78
[   20.478813]  __kasan_slab_free+0x6c/0x98
[   20.479193]  kmem_cache_free+0x260/0x470
[   20.479572]  kmem_cache_double_free+0x140/0x3c8
[   20.480011]  kunit_try_run_case+0x170/0x3f0
[   20.480415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.480939]  kthread+0x328/0x630
[   20.481262]  ret_from_fork+0x10/0x20
[   20.481612] 
[   20.481765] The buggy address belongs to the object at ffff00000c880000
[   20.481765]  which belongs to the cache test_cache of size 200
[   20.482890] The buggy address is located 0 bytes inside of
[   20.482890]  200-byte region [ffff00000c880000, ffff00000c8800c8)
[   20.483942] 
[   20.484095] The buggy address belongs to the physical page:
[   20.484611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc880
[   20.485336] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.486042] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.486695] page_type: f5(slab)
[   20.487008] raw: 03fffe0000000040 ffff00000ca9e000 dead000000000122 0000000000000000
[   20.487724] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.488440] head: 03fffe0000000040 ffff00000ca9e000 dead000000000122 0000000000000000
[   20.489164] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.489887] head: 03fffe0000000001 fffffdffc0322001 00000000ffffffff 00000000ffffffff
[   20.490611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.491327] page dumped because: kasan: bad access detected
[   20.491842] 
[   20.491994] Memory state around the buggy address:
[   20.492444]  ffff00000c87ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.493110]  ffff00000c87ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.493776] >ffff00000c880000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.494438]                    ^
[   20.494749]  ffff00000c880080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.495414]  ffff00000c880100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.496076] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   20.389844] ==================================================================
[   20.390898] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   20.391559] Read of size 1 at addr ffff000010ae40c8 by task kunit_try_catch/265
[   20.392247] 
[   20.392420] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.392481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.392499] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.392520] Call trace:
[   20.392535]  show_stack+0x20/0x38 (C)
[   20.392575]  dump_stack_lvl+0x8c/0xd0
[   20.392614]  print_report+0x118/0x608
[   20.392650]  kasan_report+0xdc/0x128
[   20.392685]  __asan_report_load1_noabort+0x20/0x30
[   20.392726]  kmem_cache_oob+0x344/0x430
[   20.392768]  kunit_try_run_case+0x170/0x3f0
[   20.392810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.392858]  kthread+0x328/0x630
[   20.392901]  ret_from_fork+0x10/0x20
[   20.392941] 
[   20.398529] Allocated by task 265:
[   20.398866]  kasan_save_stack+0x3c/0x68
[   20.399249]  kasan_save_track+0x20/0x40
[   20.399631]  kasan_save_alloc_info+0x40/0x58
[   20.400054]  __kasan_slab_alloc+0xa8/0xb0
[   20.400451]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   20.400904]  kmem_cache_oob+0x12c/0x430
[   20.401292]  kunit_try_run_case+0x170/0x3f0
[   20.401712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.402250]  kthread+0x328/0x630
[   20.402586]  ret_from_fork+0x10/0x20
[   20.402947] 
[   20.403107] The buggy address belongs to the object at ffff000010ae4000
[   20.403107]  which belongs to the cache test_cache of size 200
[   20.404245] The buggy address is located 0 bytes to the right of
[   20.404245]  allocated 200-byte region [ffff000010ae4000, ffff000010ae40c8)
[   20.405432] 
[   20.405593] The buggy address belongs to the physical page:
[   20.406117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ae4
[   20.406859] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.407574] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   20.408237] page_type: f5(slab)
[   20.408560] raw: 03fffe0000000040 ffff000010ae2000 dead000000000122 0000000000000000
[   20.409288] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.410016] head: 03fffe0000000040 ffff000010ae2000 dead000000000122 0000000000000000
[   20.410749] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   20.411484] head: 03fffe0000000001 fffffdffc042b901 00000000ffffffff 00000000ffffffff
[   20.412218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.412942] page dumped because: kasan: bad access detected
[   20.413464] 
[   20.413623] Memory state around the buggy address:
[   20.414080]  ffff000010ae3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.414756]  ffff000010ae4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.415431] >ffff000010ae4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.416102]                                               ^
[   20.416629]  ffff000010ae4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.417306]  ffff000010ae4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.417976] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   20.346602] ==================================================================
[   20.347591] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   20.348237] Read of size 8 at addr ffff00000e73bac0 by task kunit_try_catch/258
[   20.348916] 
[   20.349081] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.349129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.349144] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.349161] Call trace:
[   20.349173]  show_stack+0x20/0x38 (C)
[   20.349206]  dump_stack_lvl+0x8c/0xd0
[   20.349238]  print_report+0x118/0x608
[   20.349268]  kasan_report+0xdc/0x128
[   20.349297]  __asan_report_load8_noabort+0x20/0x30
[   20.349330]  workqueue_uaf+0x480/0x4a8
[   20.349365]  kunit_try_run_case+0x170/0x3f0
[   20.349400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.349440]  kthread+0x328/0x630
[   20.349475]  ret_from_fork+0x10/0x20
[   20.349508] 
[   20.355054] Allocated by task 258:
[   20.355383]  kasan_save_stack+0x3c/0x68
[   20.355757]  kasan_save_track+0x20/0x40
[   20.356129]  kasan_save_alloc_info+0x40/0x58
[   20.356543]  __kasan_kmalloc+0xd4/0xd8
[   20.356906]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.357348]  workqueue_uaf+0x13c/0x4a8
[   20.357716]  kunit_try_run_case+0x170/0x3f0
[   20.358124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.358647]  kthread+0x328/0x630
[   20.358973]  ret_from_fork+0x10/0x20
[   20.359323] 
[   20.359476] Freed by task 72:
[   20.359764]  kasan_save_stack+0x3c/0x68
[   20.360136]  kasan_save_track+0x20/0x40
[   20.360507]  kasan_save_free_info+0x4c/0x78
[   20.360911]  __kasan_slab_free+0x6c/0x98
[   20.361289]  kfree+0x214/0x3c8
[   20.361596]  workqueue_uaf_work+0x18/0x30
[   20.361988]  process_one_work+0x530/0xf98
[   20.362375]  worker_thread+0x8ac/0xf28
[   20.362738]  kthread+0x328/0x630
[   20.363061]  ret_from_fork+0x10/0x20
[   20.363411] 
[   20.363564] Last potentially related work creation:
[   20.364015]  kasan_save_stack+0x3c/0x68
[   20.364387]  kasan_record_aux_stack+0xb4/0xc8
[   20.364807]  __queue_work+0x65c/0x1010
[   20.365170]  queue_work_on+0xbc/0xf8
[   20.365518]  workqueue_uaf+0x210/0x4a8
[   20.365888]  kunit_try_run_case+0x170/0x3f0
[   20.366295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.366821]  kthread+0x328/0x630
[   20.367143]  ret_from_fork+0x10/0x20
[   20.367494] 
[   20.367647] The buggy address belongs to the object at ffff00000e73bac0
[   20.367647]  which belongs to the cache kmalloc-32 of size 32
[   20.368766] The buggy address is located 0 bytes inside of
[   20.368766]  freed 32-byte region [ffff00000e73bac0, ffff00000e73bae0)
[   20.369857] 
[   20.370011] The buggy address belongs to the physical page:
[   20.370529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73b
[   20.371254] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.371867] page_type: f5(slab)
[   20.372180] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   20.372897] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.373605] page dumped because: kasan: bad access detected
[   20.374120] 
[   20.374273] Memory state around the buggy address:
[   20.374721]  ffff00000e73b980: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.375388]  ffff00000e73ba00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.376053] >ffff00000e73ba80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   20.376715]                                            ^
[   20.377210]  ffff00000e73bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.377877]  ffff00000e73bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.378540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   20.301985] ==================================================================
[   20.303028] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   20.303704] Read of size 4 at addr ffff00000a7c1fc0 by task swapper/3/0
[   20.304351] 
[   20.304536] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.304615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.304640] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.304668] Call trace:
[   20.304688]  show_stack+0x20/0x38 (C)
[   20.304741]  dump_stack_lvl+0x8c/0xd0
[   20.304792]  print_report+0x118/0x608
[   20.304841]  kasan_report+0xdc/0x128
[   20.304889]  __asan_report_load4_noabort+0x20/0x30
[   20.304946]  rcu_uaf_reclaim+0x64/0x70
[   20.305000]  rcu_core+0x9f4/0x1e20
[   20.305048]  rcu_core_si+0x18/0x30
[   20.305093]  handle_softirqs+0x374/0xb28
[   20.305145]  __do_softirq+0x1c/0x28
[   20.305189]  ____do_softirq+0x18/0x30
[   20.305239]  call_on_irq_stack+0x24/0x58
[   20.305289]  do_softirq_own_stack+0x24/0x38
[   20.305342]  __irq_exit_rcu+0x1fc/0x318
[   20.305392]  irq_exit_rcu+0x1c/0x80
[   20.305438]  el1_interrupt+0x38/0x58
[   20.305489]  el1h_64_irq_handler+0x18/0x28
[   20.305543]  el1h_64_irq+0x6c/0x70
[   20.305587]  arch_local_irq_enable+0x4/0x8 (P)
[   20.305653]  cpuidle_enter+0x60/0xb8
[   20.305699]  do_idle+0x36c/0x4e8
[   20.305748]  cpu_startup_entry+0x64/0x80
[   20.305797]  secondary_start_kernel+0x288/0x340
[   20.305860]  __secondary_switched+0xc0/0xc8
[   20.305921] 
[   20.316222] Allocated by task 256:
[   20.316571]  kasan_save_stack+0x3c/0x68
[   20.316973]  kasan_save_track+0x20/0x40
[   20.317371]  kasan_save_alloc_info+0x40/0x58
[   20.317813]  __kasan_kmalloc+0xd4/0xd8
[   20.318204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.318677]  rcu_uaf+0xb0/0x2d8
[   20.319023]  kunit_try_run_case+0x170/0x3f0
[   20.319462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.320024]  kthread+0x328/0x630
[   20.320377]  ret_from_fork+0x10/0x20
[   20.320756] 
[   20.320925] Freed by task 0:
[   20.321225]  kasan_save_stack+0x3c/0x68
[   20.321622]  kasan_save_track+0x20/0x40
[   20.322023]  kasan_save_free_info+0x4c/0x78
[   20.322455]  __kasan_slab_free+0x6c/0x98
[   20.322861]  kfree+0x214/0x3c8
[   20.323197]  rcu_uaf_reclaim+0x28/0x70
[   20.323595]  rcu_core+0x9f4/0x1e20
[   20.323957]  rcu_core_si+0x18/0x30
[   20.324316]  handle_softirqs+0x374/0xb28
[   20.324723]  __do_softirq+0x1c/0x28
[   20.325088] 
[   20.325257] Last potentially related work creation:
[   20.325728]  kasan_save_stack+0x3c/0x68
[   20.326127]  kasan_record_aux_stack+0xb4/0xc8
[   20.326577]  __call_rcu_common.constprop.0+0x70/0x8b0
[   20.327086]  call_rcu+0x18/0x30
[   20.327419]  rcu_uaf+0x14c/0x2d8
[   20.327771]  kunit_try_run_case+0x170/0x3f0
[   20.328208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.328765]  kthread+0x328/0x630
[   20.329117]  ret_from_fork+0x10/0x20
[   20.329496] 
[   20.329664] The buggy address belongs to the object at ffff00000a7c1fc0
[   20.329664]  which belongs to the cache kmalloc-32 of size 32
[   20.330816] The buggy address is located 0 bytes inside of
[   20.330816]  freed 32-byte region [ffff00000a7c1fc0, ffff00000a7c1fe0)
[   20.331942] 
[   20.332112] The buggy address belongs to the physical page:
[   20.332649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa7c1
[   20.333405] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.334047] page_type: f5(slab)
[   20.334388] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   20.335135] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.335871] page dumped because: kasan: bad access detected
[   20.336409] 
[   20.336576] Memory state around the buggy address:
[   20.337047]  ffff00000a7c1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.337743]  ffff00000a7c1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.338437] >ffff00000a7c1f80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.339125]                                            ^
[   20.339645]  ffff00000a7c2000: fa fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   20.340340]  ffff00000a7c2080: fa fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   20.341026] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   20.213891] ==================================================================
[   20.214591] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   20.215203] Read of size 1 at addr ffff00000c992700 by task kunit_try_catch/254
[   20.215870] 
[   20.216027] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.216065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.216075] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.216088] Call trace:
[   20.216096]  show_stack+0x20/0x38 (C)
[   20.216121]  dump_stack_lvl+0x8c/0xd0
[   20.216144]  print_report+0x118/0x608
[   20.216166]  kasan_report+0xdc/0x128
[   20.216186]  __asan_report_load1_noabort+0x20/0x30
[   20.216210]  ksize_uaf+0x598/0x5f8
[   20.216233]  kunit_try_run_case+0x170/0x3f0
[   20.216259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.216288]  kthread+0x328/0x630
[   20.216313]  ret_from_fork+0x10/0x20
[   20.216337] 
[   20.221807] Allocated by task 254:
[   20.222127]  kasan_save_stack+0x3c/0x68
[   20.222495]  kasan_save_track+0x20/0x40
[   20.222855]  kasan_save_alloc_info+0x40/0x58
[   20.223257]  __kasan_kmalloc+0xd4/0xd8
[   20.223610]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.224038]  ksize_uaf+0xb8/0x5f8
[   20.224357]  kunit_try_run_case+0x170/0x3f0
[   20.224752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.225263]  kthread+0x328/0x630
[   20.225573]  ret_from_fork+0x10/0x20
[   20.225913] 
[   20.226061] Freed by task 254:
[   20.226347]  kasan_save_stack+0x3c/0x68
[   20.226708]  kasan_save_track+0x20/0x40
[   20.227069]  kasan_save_free_info+0x4c/0x78
[   20.227461]  __kasan_slab_free+0x6c/0x98
[   20.227829]  kfree+0x214/0x3c8
[   20.228124]  ksize_uaf+0x11c/0x5f8
[   20.228450]  kunit_try_run_case+0x170/0x3f0
[   20.228845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.229356]  kthread+0x328/0x630
[   20.229666]  ret_from_fork+0x10/0x20
[   20.230005] 
[   20.230152] The buggy address belongs to the object at ffff00000c992700
[   20.230152]  which belongs to the cache kmalloc-128 of size 128
[   20.231272] The buggy address is located 0 bytes inside of
[   20.231272]  freed 128-byte region [ffff00000c992700, ffff00000c992780)
[   20.232356] 
[   20.232503] The buggy address belongs to the physical page:
[   20.233012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.233723] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.234323] page_type: f5(slab)
[   20.234626] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.235331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.236028] page dumped because: kasan: bad access detected
[   20.236534] 
[   20.236681] Memory state around the buggy address:
[   20.237121]  ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.237775]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.238430] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.239082]                    ^
[   20.239384]  ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.240039]  ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.240690] ==================================================================
[   20.241882] ==================================================================
[   20.242561] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   20.243160] Read of size 1 at addr ffff00000c992778 by task kunit_try_catch/254
[   20.243826] 
[   20.243981] CPU: 4 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.244018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.244028] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.244039] Call trace:
[   20.244048]  show_stack+0x20/0x38 (C)
[   20.244071]  dump_stack_lvl+0x8c/0xd0
[   20.244092]  print_report+0x118/0x608
[   20.244111]  kasan_report+0xdc/0x128
[   20.244130]  __asan_report_load1_noabort+0x20/0x30
[   20.244152]  ksize_uaf+0x544/0x5f8
[   20.244174]  kunit_try_run_case+0x170/0x3f0
[   20.244198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.244224]  kthread+0x328/0x630
[   20.244247]  ret_from_fork+0x10/0x20
[   20.244268] 
[   20.249733] Allocated by task 254:
[   20.250050]  kasan_save_stack+0x3c/0x68
[   20.250411]  kasan_save_track+0x20/0x40
[   20.250770]  kasan_save_alloc_info+0x40/0x58
[   20.251168]  __kasan_kmalloc+0xd4/0xd8
[   20.251519]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.251945]  ksize_uaf+0xb8/0x5f8
[   20.252262]  kunit_try_run_case+0x170/0x3f0
[   20.252654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.253163]  kthread+0x328/0x630
[   20.253471]  ret_from_fork+0x10/0x20
[   20.253809] 
[   20.253955] Freed by task 254:
[   20.254240]  kasan_save_stack+0x3c/0x68
[   20.254598]  kasan_save_track+0x20/0x40
[   20.254956]  kasan_save_free_info+0x4c/0x78
[   20.255347]  __kasan_slab_free+0x6c/0x98
[   20.255713]  kfree+0x214/0x3c8
[   20.256008]  ksize_uaf+0x11c/0x5f8
[   20.256332]  kunit_try_run_case+0x170/0x3f0
[   20.256723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.257232]  kthread+0x328/0x630
[   20.257540]  ret_from_fork+0x10/0x20
[   20.257877] 
[   20.258024] The buggy address belongs to the object at ffff00000c992700
[   20.258024]  which belongs to the cache kmalloc-128 of size 128
[   20.259142] The buggy address is located 120 bytes inside of
[   20.259142]  freed 128-byte region [ffff00000c992700, ffff00000c992780)
[   20.260239] 
[   20.260384] The buggy address belongs to the physical page:
[   20.260888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.261599] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.262197] page_type: f5(slab)
[   20.262497] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.263196] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.263891] page dumped because: kasan: bad access detected
[   20.264396] 
[   20.264540] Memory state around the buggy address:
[   20.264978]  ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.265630]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.266283] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.266932]                                                                 ^
[   20.267576]  ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.268228]  ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.268877] ==================================================================
[   20.184728] ==================================================================
[   20.185839] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   20.186466] Read of size 1 at addr ffff00000c992700 by task kunit_try_catch/254
[   20.187144] 
[   20.187309] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.187358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.187373] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.187390] Call trace:
[   20.187402]  show_stack+0x20/0x38 (C)
[   20.187435]  dump_stack_lvl+0x8c/0xd0
[   20.187467]  print_report+0x118/0x608
[   20.187497]  kasan_report+0xdc/0x128
[   20.187525]  __kasan_check_byte+0x54/0x70
[   20.187554]  ksize+0x30/0x88
[   20.187580]  ksize_uaf+0x168/0x5f8
[   20.187613]  kunit_try_run_case+0x170/0x3f0
[   20.187648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.187687]  kthread+0x328/0x630
[   20.187722]  ret_from_fork+0x10/0x20
[   20.187755] 
[   20.193462] Allocated by task 254:
[   20.193789]  kasan_save_stack+0x3c/0x68
[   20.194163]  kasan_save_track+0x20/0x40
[   20.194535]  kasan_save_alloc_info+0x40/0x58
[   20.194949]  __kasan_kmalloc+0xd4/0xd8
[   20.195312]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.195755]  ksize_uaf+0xb8/0x5f8
[   20.196084]  kunit_try_run_case+0x170/0x3f0
[   20.196492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.197016]  kthread+0x328/0x630
[   20.197340]  ret_from_fork+0x10/0x20
[   20.197690] 
[   20.197843] Freed by task 254:
[   20.198138]  kasan_save_stack+0x3c/0x68
[   20.198510]  kasan_save_track+0x20/0x40
[   20.198880]  kasan_save_free_info+0x4c/0x78
[   20.199284]  __kasan_slab_free+0x6c/0x98
[   20.199665]  kfree+0x214/0x3c8
[   20.199972]  ksize_uaf+0x11c/0x5f8
[   20.200310]  kunit_try_run_case+0x170/0x3f0
[   20.200716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.201242]  kthread+0x328/0x630
[   20.201564]  ret_from_fork+0x10/0x20
[   20.201914] 
[   20.202068] The buggy address belongs to the object at ffff00000c992700
[   20.202068]  which belongs to the cache kmalloc-128 of size 128
[   20.203203] The buggy address is located 0 bytes inside of
[   20.203203]  freed 128-byte region [ffff00000c992700, ffff00000c992780)
[   20.204300] 
[   20.204454] The buggy address belongs to the physical page:
[   20.204971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.205696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.206309] page_type: f5(slab)
[   20.206624] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.207341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.208050] page dumped because: kasan: bad access detected
[   20.208566] 
[   20.208718] Memory state around the buggy address:
[   20.209167]  ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.209834]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.210501] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.211164]                    ^
[   20.211475]  ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212140]  ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212802] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   20.156249] ==================================================================
[   20.156909] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   20.157590] Read of size 1 at addr ffff00000c99267f by task kunit_try_catch/252
[   20.158254] 
[   20.158408] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.158442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.158453] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.158464] Call trace:
[   20.158473]  show_stack+0x20/0x38 (C)
[   20.158495]  dump_stack_lvl+0x8c/0xd0
[   20.158518]  print_report+0x118/0x608
[   20.158539]  kasan_report+0xdc/0x128
[   20.158559]  __asan_report_load1_noabort+0x20/0x30
[   20.158583]  ksize_unpoisons_memory+0x690/0x740
[   20.158608]  kunit_try_run_case+0x170/0x3f0
[   20.158634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.158662]  kthread+0x328/0x630
[   20.158685]  ret_from_fork+0x10/0x20
[   20.158708] 
[   20.164275] Allocated by task 252:
[   20.164592]  kasan_save_stack+0x3c/0x68
[   20.164952]  kasan_save_track+0x20/0x40
[   20.165313]  kasan_save_alloc_info+0x40/0x58
[   20.165713]  __kasan_kmalloc+0xd4/0xd8
[   20.166066]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.166493]  ksize_unpoisons_memory+0xc0/0x740
[   20.166912]  kunit_try_run_case+0x170/0x3f0
[   20.167307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.167816]  kthread+0x328/0x630
[   20.168128]  ret_from_fork+0x10/0x20
[   20.168466] 
[   20.168612] The buggy address belongs to the object at ffff00000c992600
[   20.168612]  which belongs to the cache kmalloc-128 of size 128
[   20.169731] The buggy address is located 12 bytes to the right of
[   20.169731]  allocated 115-byte region [ffff00000c992600, ffff00000c992673)
[   20.170899] 
[   20.171046] The buggy address belongs to the physical page:
[   20.171553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.172263] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.172860] page_type: f5(slab)
[   20.173162] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.173864] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.174561] page dumped because: kasan: bad access detected
[   20.175068] 
[   20.175213] Memory state around the buggy address:
[   20.175651]  ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.176305]  ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.176960] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.177612]                                                                 ^
[   20.178258]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.178912]  ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179564] ==================================================================
[   20.132071] ==================================================================
[   20.132743] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   20.133434] Read of size 1 at addr ffff00000c992678 by task kunit_try_catch/252
[   20.134104] 
[   20.134267] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.134308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.134319] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.134333] Call trace:
[   20.134342]  show_stack+0x20/0x38 (C)
[   20.134368]  dump_stack_lvl+0x8c/0xd0
[   20.134391]  print_report+0x118/0x608
[   20.134413]  kasan_report+0xdc/0x128
[   20.134433]  __asan_report_load1_noabort+0x20/0x30
[   20.134457]  ksize_unpoisons_memory+0x618/0x740
[   20.134483]  kunit_try_run_case+0x170/0x3f0
[   20.134509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.134538]  kthread+0x328/0x630
[   20.134562]  ret_from_fork+0x10/0x20
[   20.134586] 
[   20.140155] Allocated by task 252:
[   20.140473]  kasan_save_stack+0x3c/0x68
[   20.140836]  kasan_save_track+0x20/0x40
[   20.141195]  kasan_save_alloc_info+0x40/0x58
[   20.141595]  __kasan_kmalloc+0xd4/0xd8
[   20.141947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.142374]  ksize_unpoisons_memory+0xc0/0x740
[   20.142794]  kunit_try_run_case+0x170/0x3f0
[   20.143188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.143699]  kthread+0x328/0x630
[   20.144009]  ret_from_fork+0x10/0x20
[   20.144348] 
[   20.144495] The buggy address belongs to the object at ffff00000c992600
[   20.144495]  which belongs to the cache kmalloc-128 of size 128
[   20.145616] The buggy address is located 5 bytes to the right of
[   20.145616]  allocated 115-byte region [ffff00000c992600, ffff00000c992673)
[   20.146775] 
[   20.146922] The buggy address belongs to the physical page:
[   20.147429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.148142] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.148743] page_type: f5(slab)
[   20.149044] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.149747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.150444] page dumped because: kasan: bad access detected
[   20.150950] 
[   20.151095] Memory state around the buggy address:
[   20.151534]  ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.152189]  ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.152844] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.153495]                                                                 ^
[   20.154141]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.154796]  ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.155448] ==================================================================
[   20.106980] ==================================================================
[   20.108064] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   20.108770] Read of size 1 at addr ffff00000c992673 by task kunit_try_catch/252
[   20.109449] 
[   20.109615] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.109667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.109683] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.109702] Call trace:
[   20.109714]  show_stack+0x20/0x38 (C)
[   20.109749]  dump_stack_lvl+0x8c/0xd0
[   20.109780]  print_report+0x118/0x608
[   20.109810]  kasan_report+0xdc/0x128
[   20.109839]  __asan_report_load1_noabort+0x20/0x30
[   20.109873]  ksize_unpoisons_memory+0x628/0x740
[   20.109909]  kunit_try_run_case+0x170/0x3f0
[   20.109946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.109986]  kthread+0x328/0x630
[   20.110020]  ret_from_fork+0x10/0x20
[   20.110054] 
[   20.115666] Allocated by task 252:
[   20.115993]  kasan_save_stack+0x3c/0x68
[   20.116368]  kasan_save_track+0x20/0x40
[   20.116740]  kasan_save_alloc_info+0x40/0x58
[   20.117153]  __kasan_kmalloc+0xd4/0xd8
[   20.117516]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.117958]  ksize_unpoisons_memory+0xc0/0x740
[   20.118391]  kunit_try_run_case+0x170/0x3f0
[   20.118797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.119322]  kthread+0x328/0x630
[   20.119646]  ret_from_fork+0x10/0x20
[   20.119997] 
[   20.120151] The buggy address belongs to the object at ffff00000c992600
[   20.120151]  which belongs to the cache kmalloc-128 of size 128
[   20.121284] The buggy address is located 0 bytes to the right of
[   20.121284]  allocated 115-byte region [ffff00000c992600, ffff00000c992673)
[   20.122458] 
[   20.122613] The buggy address belongs to the physical page:
[   20.123129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.123853] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.124465] page_type: f5(slab)
[   20.124780] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.125495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.126202] page dumped because: kasan: bad access detected
[   20.126717] 
[   20.126870] Memory state around the buggy address:
[   20.127318]  ffff00000c992500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.127984]  ffff00000c992580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.128650] >ffff00000c992600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.129313]                                                              ^
[   20.129945]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.130613]  ffff00000c992700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.131275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   20.075441] ==================================================================
[   20.076125] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   20.076704] Free of addr ffff00000a7446a0 by task kunit_try_catch/250
[   20.077290] 
[   20.077448] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.077486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.077497] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.077510] Call trace:
[   20.077519]  show_stack+0x20/0x38 (C)
[   20.077546]  dump_stack_lvl+0x8c/0xd0
[   20.077568]  print_report+0x118/0x608
[   20.077591]  kasan_report_invalid_free+0xc0/0xe8
[   20.077614]  check_slab_allocation+0xd4/0x108
[   20.077634]  __kasan_slab_pre_free+0x2c/0x48
[   20.077656]  kfree+0xe8/0x3c8
[   20.077680]  kfree_sensitive+0x3c/0xb0
[   20.077701]  kmalloc_double_kzfree+0x168/0x308
[   20.077728]  kunit_try_run_case+0x170/0x3f0
[   20.077754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.077782]  kthread+0x328/0x630
[   20.077807]  ret_from_fork+0x10/0x20
[   20.077831] 
[   20.084416] Allocated by task 250:
[   20.084735]  kasan_save_stack+0x3c/0x68
[   20.085097]  kasan_save_track+0x20/0x40
[   20.085457]  kasan_save_alloc_info+0x40/0x58
[   20.085858]  __kasan_kmalloc+0xd4/0xd8
[   20.086212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.086639]  kmalloc_double_kzfree+0xb8/0x308
[   20.087049]  kunit_try_run_case+0x170/0x3f0
[   20.087444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.087953]  kthread+0x328/0x630
[   20.088263]  ret_from_fork+0x10/0x20
[   20.088602] 
[   20.088749] Freed by task 250:
[   20.089034]  kasan_save_stack+0x3c/0x68
[   20.089395]  kasan_save_track+0x20/0x40
[   20.089755]  kasan_save_free_info+0x4c/0x78
[   20.090148]  __kasan_slab_free+0x6c/0x98
[   20.090517]  kfree+0x214/0x3c8
[   20.090812]  kfree_sensitive+0x80/0xb0
[   20.091164]  kmalloc_double_kzfree+0x11c/0x308
[   20.091583]  kunit_try_run_case+0x170/0x3f0
[   20.091976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.092486]  kthread+0x328/0x630
[   20.092795]  ret_from_fork+0x10/0x20
[   20.093133] 
[   20.093280] The buggy address belongs to the object at ffff00000a7446a0
[   20.093280]  which belongs to the cache kmalloc-16 of size 16
[   20.094384] The buggy address is located 0 bytes inside of
[   20.094384]  16-byte region [ffff00000a7446a0, ffff00000a7446b0)
[   20.095412] 
[   20.095560] The buggy address belongs to the physical page:
[   20.096067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   20.096778] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.097378] page_type: f5(slab)
[   20.097680] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   20.098384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.099083] page dumped because: kasan: bad access detected
[   20.099589] 
[   20.099735] Memory state around the buggy address:
[   20.100174]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.100829]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   20.101484] >ffff00000a744680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   20.102136]                                ^
[   20.102529]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.103184]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.103834] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   20.044817] ==================================================================
[   20.046145] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   20.046881] Read of size 1 at addr ffff00000a7446a0 by task kunit_try_catch/250
[   20.047570] 
[   20.047743] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.047806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.047823] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.047845] Call trace:
[   20.047859]  show_stack+0x20/0x38 (C)
[   20.047897]  dump_stack_lvl+0x8c/0xd0
[   20.047936]  print_report+0x118/0x608
[   20.047972]  kasan_report+0xdc/0x128
[   20.048007]  __kasan_check_byte+0x54/0x70
[   20.048042]  kfree_sensitive+0x30/0xb0
[   20.048078]  kmalloc_double_kzfree+0x168/0x308
[   20.048122]  kunit_try_run_case+0x170/0x3f0
[   20.048166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.048214]  kthread+0x328/0x630
[   20.048256]  ret_from_fork+0x10/0x20
[   20.048296] 
[   20.054210] Allocated by task 250:
[   20.054547]  kasan_save_stack+0x3c/0x68
[   20.054931]  kasan_save_track+0x20/0x40
[   20.055314]  kasan_save_alloc_info+0x40/0x58
[   20.055739]  __kasan_kmalloc+0xd4/0xd8
[   20.056110]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.056564]  kmalloc_double_kzfree+0xb8/0x308
[   20.056998]  kunit_try_run_case+0x170/0x3f0
[   20.057416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.057953]  kthread+0x328/0x630
[   20.058286]  ret_from_fork+0x10/0x20
[   20.058647] 
[   20.058805] Freed by task 250:
[   20.059106]  kasan_save_stack+0x3c/0x68
[   20.059487]  kasan_save_track+0x20/0x40
[   20.059868]  kasan_save_free_info+0x4c/0x78
[   20.060284]  __kasan_slab_free+0x6c/0x98
[   20.060674]  kfree+0x214/0x3c8
[   20.060991]  kfree_sensitive+0x80/0xb0
[   20.061365]  kmalloc_double_kzfree+0x11c/0x308
[   20.061807]  kunit_try_run_case+0x170/0x3f0
[   20.062225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.062762]  kthread+0x328/0x630
[   20.063094]  ret_from_fork+0x10/0x20
[   20.063455] 
[   20.063614] The buggy address belongs to the object at ffff00000a7446a0
[   20.063614]  which belongs to the cache kmalloc-16 of size 16
[   20.064744] The buggy address is located 0 bytes inside of
[   20.064744]  freed 16-byte region [ffff00000a7446a0, ffff00000a7446b0)
[   20.065847] 
[   20.066007] The buggy address belongs to the physical page:
[   20.066530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   20.067266] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.067888] page_type: f5(slab)
[   20.068211] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   20.068939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.069655] page dumped because: kasan: bad access detected
[   20.070178] 
[   20.070337] Memory state around the buggy address:
[   20.070794]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.071470]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   20.072146] >ffff00000a744680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   20.072816]                                ^
[   20.073226]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.073901]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.074572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   20.011921] ==================================================================
[   20.012980] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   20.013617] Read of size 1 at addr ffff00000c8fe228 by task kunit_try_catch/246
[   20.014296] 
[   20.014460] CPU: 3 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.014512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.014527] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.014544] Call trace:
[   20.014556]  show_stack+0x20/0x38 (C)
[   20.014590]  dump_stack_lvl+0x8c/0xd0
[   20.014621]  print_report+0x118/0x608
[   20.014651]  kasan_report+0xdc/0x128
[   20.014680]  __asan_report_load1_noabort+0x20/0x30
[   20.014714]  kmalloc_uaf2+0x3f4/0x468
[   20.014746]  kunit_try_run_case+0x170/0x3f0
[   20.014782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.014821]  kthread+0x328/0x630
[   20.014855]  ret_from_fork+0x10/0x20
[   20.014887] 
[   20.020426] Allocated by task 246:
[   20.020751]  kasan_save_stack+0x3c/0x68
[   20.021125]  kasan_save_track+0x20/0x40
[   20.021497]  kasan_save_alloc_info+0x40/0x58
[   20.021909]  __kasan_kmalloc+0xd4/0xd8
[   20.022272]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.022713]  kmalloc_uaf2+0xc4/0x468
[   20.023065]  kunit_try_run_case+0x170/0x3f0
[   20.023471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.023996]  kthread+0x328/0x630
[   20.024318]  ret_from_fork+0x10/0x20
[   20.024668] 
[   20.024821] Freed by task 246:
[   20.025114]  kasan_save_stack+0x3c/0x68
[   20.025486]  kasan_save_track+0x20/0x40
[   20.025859]  kasan_save_free_info+0x4c/0x78
[   20.026263]  __kasan_slab_free+0x6c/0x98
[   20.026643]  kfree+0x214/0x3c8
[   20.026950]  kmalloc_uaf2+0x134/0x468
[   20.027311]  kunit_try_run_case+0x170/0x3f0
[   20.027717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.028242]  kthread+0x328/0x630
[   20.028563]  ret_from_fork+0x10/0x20
[   20.028913] 
[   20.029067] The buggy address belongs to the object at ffff00000c8fe200
[   20.029067]  which belongs to the cache kmalloc-64 of size 64
[   20.030185] The buggy address is located 40 bytes inside of
[   20.030185]  freed 64-byte region [ffff00000c8fe200, ffff00000c8fe240)
[   20.031284] 
[   20.031438] The buggy address belongs to the physical page:
[   20.031953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc8fe
[   20.032679] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.033291] page_type: f5(slab)
[   20.033605] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   20.034320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.035028] page dumped because: kasan: bad access detected
[   20.035542] 
[   20.035695] Memory state around the buggy address:
[   20.036143]  ffff00000c8fe100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.036810]  ffff00000c8fe180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.037475] >ffff00000c8fe200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.038138]                                   ^
[   20.038563]  ffff00000c8fe280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   20.039229]  ffff00000c8fe300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.039891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   19.980248] ==================================================================
[   19.981259] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   19.981941] Write of size 33 at addr ffff000010957800 by task kunit_try_catch/244
[   19.982635] 
[   19.982800] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.982851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.982864] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.982882] Call trace:
[   19.982894]  show_stack+0x20/0x38 (C)
[   19.982928]  dump_stack_lvl+0x8c/0xd0
[   19.982959]  print_report+0x118/0x608
[   19.982988]  kasan_report+0xdc/0x128
[   19.983016]  kasan_check_range+0x100/0x1a8
[   19.983047]  __asan_memset+0x34/0x78
[   19.983077]  kmalloc_uaf_memset+0x170/0x310
[   19.983112]  kunit_try_run_case+0x170/0x3f0
[   19.983147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.983187]  kthread+0x328/0x630
[   19.983220]  ret_from_fork+0x10/0x20
[   19.983254] 
[   19.989094] Allocated by task 244:
[   19.989420]  kasan_save_stack+0x3c/0x68
[   19.989794]  kasan_save_track+0x20/0x40
[   19.990166]  kasan_save_alloc_info+0x40/0x58
[   19.990578]  __kasan_kmalloc+0xd4/0xd8
[   19.990941]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.991382]  kmalloc_uaf_memset+0xb8/0x310
[   19.991783]  kunit_try_run_case+0x170/0x3f0
[   19.992189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.992714]  kthread+0x328/0x630
[   19.993036]  ret_from_fork+0x10/0x20
[   19.993386] 
[   19.993539] Freed by task 244:
[   19.993833]  kasan_save_stack+0x3c/0x68
[   19.994205]  kasan_save_track+0x20/0x40
[   19.994577]  kasan_save_free_info+0x4c/0x78
[   19.994982]  __kasan_slab_free+0x6c/0x98
[   19.995361]  kfree+0x214/0x3c8
[   19.995669]  kmalloc_uaf_memset+0x11c/0x310
[   19.996076]  kunit_try_run_case+0x170/0x3f0
[   19.996483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.997007]  kthread+0x328/0x630
[   19.997329]  ret_from_fork+0x10/0x20
[   19.997679] 
[   19.997833] The buggy address belongs to the object at ffff000010957800
[   19.997833]  which belongs to the cache kmalloc-64 of size 64
[   19.998950] The buggy address is located 0 bytes inside of
[   19.998950]  freed 64-byte region [ffff000010957800, ffff000010957840)
[   20.000039] 
[   20.000194] The buggy address belongs to the physical page:
[   20.000710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10957
[   20.001442] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.002054] page_type: f5(slab)
[   20.002368] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   20.003084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.003793] page dumped because: kasan: bad access detected
[   20.004308] 
[   20.004461] Memory state around the buggy address:
[   20.004908]  ffff000010957700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.005575]  ffff000010957780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.006240] >ffff000010957800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.006903]                    ^
[   20.007213]  ffff000010957880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.007878]  ffff000010957900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.008540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   19.948286] ==================================================================
[   19.949424] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   19.950060] Read of size 1 at addr ffff00000107ef48 by task kunit_try_catch/242
[   19.950739] 
[   19.950905] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.950955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.950970] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.950988] Call trace:
[   19.951000]  show_stack+0x20/0x38 (C)
[   19.951034]  dump_stack_lvl+0x8c/0xd0
[   19.951066]  print_report+0x118/0x608
[   19.951096]  kasan_report+0xdc/0x128
[   19.951124]  __asan_report_load1_noabort+0x20/0x30
[   19.951159]  kmalloc_uaf+0x300/0x338
[   19.951191]  kunit_try_run_case+0x170/0x3f0
[   19.951227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.951266]  kthread+0x328/0x630
[   19.951301]  ret_from_fork+0x10/0x20
[   19.951334] 
[   19.956863] Allocated by task 242:
[   19.957188]  kasan_save_stack+0x3c/0x68
[   19.957562]  kasan_save_track+0x20/0x40
[   19.957934]  kasan_save_alloc_info+0x40/0x58
[   19.958346]  __kasan_kmalloc+0xd4/0xd8
[   19.958709]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.959151]  kmalloc_uaf+0xb8/0x338
[   19.959495]  kunit_try_run_case+0x170/0x3f0
[   19.959901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960425]  kthread+0x328/0x630
[   19.960748]  ret_from_fork+0x10/0x20
[   19.961099] 
[   19.961251] Freed by task 242:
[   19.961545]  kasan_save_stack+0x3c/0x68
[   19.961916]  kasan_save_track+0x20/0x40
[   19.962287]  kasan_save_free_info+0x4c/0x78
[   19.962693]  __kasan_slab_free+0x6c/0x98
[   19.963072]  kfree+0x214/0x3c8
[   19.963380]  kmalloc_uaf+0x11c/0x338
[   19.963731]  kunit_try_run_case+0x170/0x3f0
[   19.964137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.964661]  kthread+0x328/0x630
[   19.964983]  ret_from_fork+0x10/0x20
[   19.965333] 
[   19.965486] The buggy address belongs to the object at ffff00000107ef40
[   19.965486]  which belongs to the cache kmalloc-16 of size 16
[   19.966604] The buggy address is located 8 bytes inside of
[   19.966604]  freed 16-byte region [ffff00000107ef40, ffff00000107ef50)
[   19.967693] 
[   19.967847] The buggy address belongs to the physical page:
[   19.968363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107e
[   19.969085] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.969698] page_type: f5(slab)
[   19.970010] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   19.970727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.971434] page dumped because: kasan: bad access detected
[   19.971950] 
[   19.972102] Memory state around the buggy address:
[   19.972551]  ffff00000107ee00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.973217]  ffff00000107ee80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.973883] >ffff00000107ef00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   19.974545]                                               ^
[   19.975062]  ffff00000107ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.975729]  ffff00000107f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.976391] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   19.920661] ==================================================================
[   19.921778] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.922526] Read of size 64 at addr ffff00000e72f904 by task kunit_try_catch/240
[   19.923199] 
[   19.923358] CPU: 2 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.923395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.923406] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.923419] Call trace:
[   19.923428]  show_stack+0x20/0x38 (C)
[   19.923452]  dump_stack_lvl+0x8c/0xd0
[   19.923474]  print_report+0x118/0x608
[   19.923496]  kasan_report+0xdc/0x128
[   19.923516]  kasan_check_range+0x100/0x1a8
[   19.923539]  __asan_memmove+0x3c/0x98
[   19.923561]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.923588]  kunit_try_run_case+0x170/0x3f0
[   19.923614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.923642]  kthread+0x328/0x630
[   19.923668]  ret_from_fork+0x10/0x20
[   19.923691] 
[   19.929569] Allocated by task 240:
[   19.929886]  kasan_save_stack+0x3c/0x68
[   19.930248]  kasan_save_track+0x20/0x40
[   19.930609]  kasan_save_alloc_info+0x40/0x58
[   19.931010]  __kasan_kmalloc+0xd4/0xd8
[   19.931362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.931790]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   19.932254]  kunit_try_run_case+0x170/0x3f0
[   19.932648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.933158]  kthread+0x328/0x630
[   19.933467]  ret_from_fork+0x10/0x20
[   19.933805] 
[   19.933954] The buggy address belongs to the object at ffff00000e72f900
[   19.933954]  which belongs to the cache kmalloc-64 of size 64
[   19.935056] The buggy address is located 4 bytes inside of
[   19.935056]  allocated 64-byte region [ffff00000e72f900, ffff00000e72f940)
[   19.936161] 
[   19.936308] The buggy address belongs to the physical page:
[   19.936815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe72f
[   19.937526] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.938126] page_type: f5(slab)
[   19.938428] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   19.939131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.939828] page dumped because: kasan: bad access detected
[   19.940333] 
[   19.940479] Memory state around the buggy address:
[   19.940918]  ffff00000e72f800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.941572]  ffff00000e72f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.942226] >ffff00000e72f900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.942878]                                            ^
[   19.943363]  ffff00000e72f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.944017]  ffff00000e72fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.944668] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   19.893182] ==================================================================
[   19.894272] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   19.894999] Read of size 18446744073709551614 at addr ffff000010864484 by task kunit_try_catch/238
[   19.895824] 
[   19.895990] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.896040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.896055] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.896073] Call trace:
[   19.896084]  show_stack+0x20/0x38 (C)
[   19.896116]  dump_stack_lvl+0x8c/0xd0
[   19.896148]  print_report+0x118/0x608
[   19.896178]  kasan_report+0xdc/0x128
[   19.896207]  kasan_check_range+0x100/0x1a8
[   19.896238]  __asan_memmove+0x3c/0x98
[   19.896269]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.896305]  kunit_try_run_case+0x170/0x3f0
[   19.896342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.896381]  kthread+0x328/0x630
[   19.896415]  ret_from_fork+0x10/0x20
[   19.896448] 
[   19.902377] Allocated by task 238:
[   19.902704]  kasan_save_stack+0x3c/0x68
[   19.903077]  kasan_save_track+0x20/0x40
[   19.903449]  kasan_save_alloc_info+0x40/0x58
[   19.903864]  __kasan_kmalloc+0xd4/0xd8
[   19.904226]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.904668]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   19.905153]  kunit_try_run_case+0x170/0x3f0
[   19.905560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.906086]  kthread+0x328/0x630
[   19.906410]  ret_from_fork+0x10/0x20
[   19.906760] 
[   19.906913] The buggy address belongs to the object at ffff000010864480
[   19.906913]  which belongs to the cache kmalloc-64 of size 64
[   19.908032] The buggy address is located 4 bytes inside of
[   19.908032]  64-byte region [ffff000010864480, ffff0000108644c0)
[   19.909076] 
[   19.909230] The buggy address belongs to the physical page:
[   19.909747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10864
[   19.910478] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.911091] page_type: f5(slab)
[   19.911404] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   19.912119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.912827] page dumped because: kasan: bad access detected
[   19.913341] 
[   19.913494] Memory state around the buggy address:
[   19.913943]  ffff000010864380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.914609]  ffff000010864400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.915276] >ffff000010864480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.915938]                    ^
[   19.916248]  ffff000010864500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.916914]  ffff000010864580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.917576] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   19.865412] ==================================================================
[   19.866462] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   19.867146] Write of size 16 at addr ffff00000e73a369 by task kunit_try_catch/236
[   19.867826] 
[   19.867982] CPU: 2 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.868018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.868030] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.868043] Call trace:
[   19.868052]  show_stack+0x20/0x38 (C)
[   19.868076]  dump_stack_lvl+0x8c/0xd0
[   19.868100]  print_report+0x118/0x608
[   19.868121]  kasan_report+0xdc/0x128
[   19.868141]  kasan_check_range+0x100/0x1a8
[   19.868163]  __asan_memset+0x34/0x78
[   19.868184]  kmalloc_oob_memset_16+0x150/0x2f8
[   19.868209]  kunit_try_run_case+0x170/0x3f0
[   19.868235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868264]  kthread+0x328/0x630
[   19.868288]  ret_from_fork+0x10/0x20
[   19.868312] 
[   19.874129] Allocated by task 236:
[   19.874448]  kasan_save_stack+0x3c/0x68
[   19.874810]  kasan_save_track+0x20/0x40
[   19.875170]  kasan_save_alloc_info+0x40/0x58
[   19.875571]  __kasan_kmalloc+0xd4/0xd8
[   19.875922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.876349]  kmalloc_oob_memset_16+0xb0/0x2f8
[   19.876759]  kunit_try_run_case+0x170/0x3f0
[   19.877153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.877665]  kthread+0x328/0x630
[   19.877976]  ret_from_fork+0x10/0x20
[   19.878314] 
[   19.878461] The buggy address belongs to the object at ffff00000e73a300
[   19.878461]  which belongs to the cache kmalloc-128 of size 128
[   19.879580] The buggy address is located 105 bytes inside of
[   19.879580]  allocated 120-byte region [ffff00000e73a300, ffff00000e73a378)
[   19.880709] 
[   19.880856] The buggy address belongs to the physical page:
[   19.881363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a
[   19.882074] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.882674] page_type: f5(slab)
[   19.882978] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.883682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.884378] page dumped because: kasan: bad access detected
[   19.884884] 
[   19.885031] Memory state around the buggy address:
[   19.885469]  ffff00000e73a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.886123]  ffff00000e73a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886778] >ffff00000e73a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.887429]                                                                 ^
[   19.888075]  ffff00000e73a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.888729]  ffff00000e73a400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.889380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   19.838417] ==================================================================
[   19.839501] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   19.840192] Write of size 8 at addr ffff00000c98e871 by task kunit_try_catch/234
[   19.840876] 
[   19.841041] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.841091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.841105] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.841123] Call trace:
[   19.841135]  show_stack+0x20/0x38 (C)
[   19.841168]  dump_stack_lvl+0x8c/0xd0
[   19.841201]  print_report+0x118/0x608
[   19.841230]  kasan_report+0xdc/0x128
[   19.841259]  kasan_check_range+0x100/0x1a8
[   19.841289]  __asan_memset+0x34/0x78
[   19.841319]  kmalloc_oob_memset_8+0x150/0x2f8
[   19.841354]  kunit_try_run_case+0x170/0x3f0
[   19.841390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.841429]  kthread+0x328/0x630
[   19.841463]  ret_from_fork+0x10/0x20
[   19.841497] 
[   19.847354] Allocated by task 234:
[   19.847681]  kasan_save_stack+0x3c/0x68
[   19.848055]  kasan_save_track+0x20/0x40
[   19.848426]  kasan_save_alloc_info+0x40/0x58
[   19.848839]  __kasan_kmalloc+0xd4/0xd8
[   19.849202]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.849643]  kmalloc_oob_memset_8+0xb0/0x2f8
[   19.850060]  kunit_try_run_case+0x170/0x3f0
[   19.850467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.850992]  kthread+0x328/0x630
[   19.851315]  ret_from_fork+0x10/0x20
[   19.851665] 
[   19.851817] The buggy address belongs to the object at ffff00000c98e800
[   19.851817]  which belongs to the cache kmalloc-128 of size 128
[   19.852952] The buggy address is located 113 bytes inside of
[   19.852952]  allocated 120-byte region [ffff00000c98e800, ffff00000c98e878)
[   19.854096] 
[   19.854250] The buggy address belongs to the physical page:
[   19.854766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   19.855493] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.856104] page_type: f5(slab)
[   19.856417] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.857133] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.857841] page dumped because: kasan: bad access detected
[   19.858357] 
[   19.858509] Memory state around the buggy address:
[   19.858958]  ffff00000c98e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.859625]  ffff00000c98e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.860292] >ffff00000c98e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.860954]                                                                 ^
[   19.861612]  ffff00000c98e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.862277]  ffff00000c98e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.862940] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   19.807788] ==================================================================
[   19.808866] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   19.809556] Write of size 4 at addr ffff00000c98e775 by task kunit_try_catch/232
[   19.810241] 
[   19.810405] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.810455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.810468] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.810485] Call trace:
[   19.810497]  show_stack+0x20/0x38 (C)
[   19.810530]  dump_stack_lvl+0x8c/0xd0
[   19.810561]  print_report+0x118/0x608
[   19.810591]  kasan_report+0xdc/0x128
[   19.810619]  kasan_check_range+0x100/0x1a8
[   19.810649]  __asan_memset+0x34/0x78
[   19.810680]  kmalloc_oob_memset_4+0x150/0x300
[   19.810713]  kunit_try_run_case+0x170/0x3f0
[   19.810748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810786]  kthread+0x328/0x630
[   19.810821]  ret_from_fork+0x10/0x20
[   19.810853] 
[   19.816770] Allocated by task 232:
[   19.817118]  kasan_save_stack+0x3c/0x68
[   19.817520]  kasan_save_track+0x20/0x40
[   19.817920]  kasan_save_alloc_info+0x40/0x58
[   19.818364]  __kasan_kmalloc+0xd4/0xd8
[   19.818753]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.819227]  kmalloc_oob_memset_4+0xb0/0x300
[   19.819671]  kunit_try_run_case+0x170/0x3f0
[   19.820109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.820666]  kthread+0x328/0x630
[   19.821018]  ret_from_fork+0x10/0x20
[   19.821395] 
[   19.821565] The buggy address belongs to the object at ffff00000c98e700
[   19.821565]  which belongs to the cache kmalloc-128 of size 128
[   19.822731] The buggy address is located 117 bytes inside of
[   19.822731]  allocated 120-byte region [ffff00000c98e700, ffff00000c98e778)
[   19.823910] 
[   19.824080] The buggy address belongs to the physical page:
[   19.824616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   19.825372] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.826015] page_type: f5(slab)
[   19.826355] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.827102] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.827836] page dumped because: kasan: bad access detected
[   19.828373] 
[   19.828542] Memory state around the buggy address:
[   19.829014]  ffff00000c98e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.829709]  ffff00000c98e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.830404] >ffff00000c98e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.831091]                                                                 ^
[   19.831773]  ffff00000c98e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.832468]  ffff00000c98e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.833157] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   19.779582] ==================================================================
[   19.780668] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   19.781357] Write of size 2 at addr ffff00000e73a277 by task kunit_try_catch/230
[   19.782042] 
[   19.782207] CPU: 2 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.782257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.782271] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.782288] Call trace:
[   19.782300]  show_stack+0x20/0x38 (C)
[   19.782333]  dump_stack_lvl+0x8c/0xd0
[   19.782364]  print_report+0x118/0x608
[   19.782394]  kasan_report+0xdc/0x128
[   19.782422]  kasan_check_range+0x100/0x1a8
[   19.782452]  __asan_memset+0x34/0x78
[   19.782482]  kmalloc_oob_memset_2+0x150/0x2f8
[   19.782515]  kunit_try_run_case+0x170/0x3f0
[   19.782551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.782590]  kthread+0x328/0x630
[   19.782623]  ret_from_fork+0x10/0x20
[   19.782655] 
[   19.788513] Allocated by task 230:
[   19.788840]  kasan_save_stack+0x3c/0x68
[   19.789214]  kasan_save_track+0x20/0x40
[   19.789585]  kasan_save_alloc_info+0x40/0x58
[   19.789998]  __kasan_kmalloc+0xd4/0xd8
[   19.790360]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.790800]  kmalloc_oob_memset_2+0xb0/0x2f8
[   19.791215]  kunit_try_run_case+0x170/0x3f0
[   19.791622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792146]  kthread+0x328/0x630
[   19.792469]  ret_from_fork+0x10/0x20
[   19.792819] 
[   19.792972] The buggy address belongs to the object at ffff00000e73a200
[   19.792972]  which belongs to the cache kmalloc-128 of size 128
[   19.794105] The buggy address is located 119 bytes inside of
[   19.794105]  allocated 120-byte region [ffff00000e73a200, ffff00000e73a278)
[   19.795248] 
[   19.795402] The buggy address belongs to the physical page:
[   19.795918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a
[   19.796641] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.797253] page_type: f5(slab)
[   19.797568] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.798284] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.798991] page dumped because: kasan: bad access detected
[   19.799505] 
[   19.799657] Memory state around the buggy address:
[   19.800105]  ffff00000e73a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.800770]  ffff00000e73a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.801435] >ffff00000e73a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.802097]                                                                 ^
[   19.802752]  ffff00000e73a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.803417]  ffff00000e73a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.804078] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   19.750798] ==================================================================
[   19.751835] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   19.752533] Write of size 128 at addr ffff00000c98e600 by task kunit_try_catch/228
[   19.753232] 
[   19.753396] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.753444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.753461] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.753479] Call trace:
[   19.753492]  show_stack+0x20/0x38 (C)
[   19.753524]  dump_stack_lvl+0x8c/0xd0
[   19.753556]  print_report+0x118/0x608
[   19.753586]  kasan_report+0xdc/0x128
[   19.753614]  kasan_check_range+0x100/0x1a8
[   19.753645]  __asan_memset+0x34/0x78
[   19.753675]  kmalloc_oob_in_memset+0x144/0x2d0
[   19.753709]  kunit_try_run_case+0x170/0x3f0
[   19.753745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.753792]  kthread+0x328/0x630
[   19.753839]  ret_from_fork+0x10/0x20
[   19.753880] 
[   19.759786] Allocated by task 228:
[   19.760122]  kasan_save_stack+0x3c/0x68
[   19.760508]  kasan_save_track+0x20/0x40
[   19.760889]  kasan_save_alloc_info+0x40/0x58
[   19.761311]  __kasan_kmalloc+0xd4/0xd8
[   19.761683]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.762136]  kmalloc_oob_in_memset+0xb0/0x2d0
[   19.762569]  kunit_try_run_case+0x170/0x3f0
[   19.762985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.763522]  kthread+0x328/0x630
[   19.763853]  ret_from_fork+0x10/0x20
[   19.764214] 
[   19.764372] The buggy address belongs to the object at ffff00000c98e600
[   19.764372]  which belongs to the cache kmalloc-128 of size 128
[   19.765516] The buggy address is located 0 bytes inside of
[   19.765516]  allocated 120-byte region [ffff00000c98e600, ffff00000c98e678)
[   19.766655] 
[   19.766815] The buggy address belongs to the physical page:
[   19.767339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc98e
[   19.768075] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.768695] page_type: f5(slab)
[   19.769017] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.769743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.770458] page dumped because: kasan: bad access detected
[   19.770980] 
[   19.771137] Memory state around the buggy address:
[   19.771592]  ffff00000c98e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.772267]  ffff00000c98e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.772942] >ffff00000c98e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.773611]                                                                 ^
[   19.774275]  ffff00000c98e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.774951]  ffff00000c98e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775621] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   19.719335] ==================================================================
[   19.720345] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   19.720983] Read of size 16 at addr ffff00000a744680 by task kunit_try_catch/226
[   19.721655] 
[   19.721817] CPU: 3 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.721868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.721882] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.721900] Call trace:
[   19.721912]  show_stack+0x20/0x38 (C)
[   19.721947]  dump_stack_lvl+0x8c/0xd0
[   19.721979]  print_report+0x118/0x608
[   19.722008]  kasan_report+0xdc/0x128
[   19.722037]  __asan_report_load16_noabort+0x20/0x30
[   19.722071]  kmalloc_uaf_16+0x3bc/0x438
[   19.722104]  kunit_try_run_case+0x170/0x3f0
[   19.722140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.722179]  kthread+0x328/0x630
[   19.722213]  ret_from_fork+0x10/0x20
[   19.722247] 
[   19.727814] Allocated by task 226:
[   19.728140]  kasan_save_stack+0x3c/0x68
[   19.728514]  kasan_save_track+0x20/0x40
[   19.728886]  kasan_save_alloc_info+0x40/0x58
[   19.729299]  __kasan_kmalloc+0xd4/0xd8
[   19.729661]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.730102]  kmalloc_uaf_16+0x140/0x438
[   19.730477]  kunit_try_run_case+0x170/0x3f0
[   19.730884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.731407]  kthread+0x328/0x630
[   19.731728]  ret_from_fork+0x10/0x20
[   19.732078] 
[   19.732231] Freed by task 226:
[   19.732525]  kasan_save_stack+0x3c/0x68
[   19.732897]  kasan_save_track+0x20/0x40
[   19.733266]  kasan_save_free_info+0x4c/0x78
[   19.733670]  __kasan_slab_free+0x6c/0x98
[   19.734048]  kfree+0x214/0x3c8
[   19.734355]  kmalloc_uaf_16+0x190/0x438
[   19.734731]  kunit_try_run_case+0x170/0x3f0
[   19.735137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.735660]  kthread+0x328/0x630
[   19.735982]  ret_from_fork+0x10/0x20
[   19.736331] 
[   19.736484] The buggy address belongs to the object at ffff00000a744680
[   19.736484]  which belongs to the cache kmalloc-16 of size 16
[   19.737601] The buggy address is located 0 bytes inside of
[   19.737601]  freed 16-byte region [ffff00000a744680, ffff00000a744690)
[   19.738689] 
[   19.738843] The buggy address belongs to the physical page:
[   19.739360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   19.740084] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.740695] page_type: f5(slab)
[   19.741008] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   19.741723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.742429] page dumped because: kasan: bad access detected
[   19.742944] 
[   19.743096] Memory state around the buggy address:
[   19.743542]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.744208]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   19.744874] >ffff00000a744680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.745534]                    ^
[   19.745845]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.746510]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.747171] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   19.692516] ==================================================================
[   19.693509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   19.694150] Write of size 16 at addr ffff00000107ef00 by task kunit_try_catch/224
[   19.694849] 
[   19.695015] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.695065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.695080] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.695097] Call trace:
[   19.695109]  show_stack+0x20/0x38 (C)
[   19.695143]  dump_stack_lvl+0x8c/0xd0
[   19.695174]  print_report+0x118/0x608
[   19.695203]  kasan_report+0xdc/0x128
[   19.695231]  __asan_report_store16_noabort+0x20/0x30
[   19.695266]  kmalloc_oob_16+0x3a0/0x3f8
[   19.695298]  kunit_try_run_case+0x170/0x3f0
[   19.695333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.695371]  kthread+0x328/0x630
[   19.695405]  ret_from_fork+0x10/0x20
[   19.695438] 
[   19.701010] Allocated by task 224:
[   19.701337]  kasan_save_stack+0x3c/0x68
[   19.701711]  kasan_save_track+0x20/0x40
[   19.702082]  kasan_save_alloc_info+0x40/0x58
[   19.702494]  __kasan_kmalloc+0xd4/0xd8
[   19.702857]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.703298]  kmalloc_oob_16+0xb4/0x3f8
[   19.703665]  kunit_try_run_case+0x170/0x3f0
[   19.704072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704596]  kthread+0x328/0x630
[   19.704919]  ret_from_fork+0x10/0x20
[   19.705268] 
[   19.705422] The buggy address belongs to the object at ffff00000107ef00
[   19.705422]  which belongs to the cache kmalloc-16 of size 16
[   19.706539] The buggy address is located 0 bytes inside of
[   19.706539]  allocated 13-byte region [ffff00000107ef00, ffff00000107ef0d)
[   19.707658] 
[   19.707812] The buggy address belongs to the physical page:
[   19.708328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107e
[   19.709052] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.709663] page_type: f5(slab)
[   19.709976] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   19.710692] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.711398] page dumped because: kasan: bad access detected
[   19.711912] 
[   19.712065] Memory state around the buggy address:
[   19.712513]  ffff00000107ee00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.713178]  ffff00000107ee80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.713844] >ffff00000107ef00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.714505]                       ^
[   19.714838]  ffff00000107ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.715504]  ffff00000107f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.716165] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   19.656324] ==================================================================
[   19.657027] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   19.657690] Read of size 1 at addr ffff00000219ce00 by task kunit_try_catch/222
[   19.658396] 
[   19.658579] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.658657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.658680] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.658707] Call trace:
[   19.658725]  show_stack+0x20/0x38 (C)
[   19.658776]  dump_stack_lvl+0x8c/0xd0
[   19.658826]  print_report+0x118/0x608
[   19.658874]  kasan_report+0xdc/0x128
[   19.658920]  __asan_report_load1_noabort+0x20/0x30
[   19.658975]  krealloc_uaf+0x4c8/0x520
[   19.659030]  kunit_try_run_case+0x170/0x3f0
[   19.659086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659149]  kthread+0x328/0x630
[   19.659203]  ret_from_fork+0x10/0x20
[   19.659255] 
[   19.664897] Allocated by task 222:
[   19.665241]  kasan_save_stack+0x3c/0x68
[   19.665639]  kasan_save_track+0x20/0x40
[   19.666036]  kasan_save_alloc_info+0x40/0x58
[   19.666477]  __kasan_kmalloc+0xd4/0xd8
[   19.666867]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.667338]  krealloc_uaf+0xc8/0x520
[   19.667722]  kunit_try_run_case+0x170/0x3f0
[   19.668157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.668714]  kthread+0x328/0x630
[   19.669066]  ret_from_fork+0x10/0x20
[   19.669442] 
[   19.669610] Freed by task 222:
[   19.669925]  kasan_save_stack+0x3c/0x68
[   19.670324]  kasan_save_track+0x20/0x40
[   19.670721]  kasan_save_free_info+0x4c/0x78
[   19.671154]  __kasan_slab_free+0x6c/0x98
[   19.671558]  kfree+0x214/0x3c8
[   19.671892]  krealloc_uaf+0x12c/0x520
[   19.672283]  kunit_try_run_case+0x170/0x3f0
[   19.672719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.673275]  kthread+0x328/0x630
[   19.673626]  ret_from_fork+0x10/0x20
[   19.674003] 
[   19.674172] The buggy address belongs to the object at ffff00000219ce00
[   19.674172]  which belongs to the cache kmalloc-256 of size 256
[   19.675337] The buggy address is located 0 bytes inside of
[   19.675337]  freed 256-byte region [ffff00000219ce00, ffff00000219cf00)
[   19.676467] 
[   19.676637] The buggy address belongs to the physical page:
[   19.677172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x219c
[   19.677925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.678657] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.679339] page_type: f5(slab)
[   19.679675] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.680421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.681168] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.681922] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.682677] head: 03fffe0000000001 fffffdffc0086701 00000000ffffffff 00000000ffffffff
[   19.683430] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.684168] page dumped because: kasan: bad access detected
[   19.684704] 
[   19.684871] Memory state around the buggy address:
[   19.685340]  ffff00000219cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686034]  ffff00000219cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686726] >ffff00000219ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.687411]                    ^
[   19.687742]  ffff00000219ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.688435]  ffff00000219cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.689120] ==================================================================
[   19.621634] ==================================================================
[   19.622774] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   19.623446] Read of size 1 at addr ffff00000219ce00 by task kunit_try_catch/222
[   19.624152] 
[   19.624336] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.624415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.624438] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.624465] Call trace:
[   19.624483]  show_stack+0x20/0x38 (C)
[   19.624535]  dump_stack_lvl+0x8c/0xd0
[   19.624585]  print_report+0x118/0x608
[   19.624633]  kasan_report+0xdc/0x128
[   19.624680]  __kasan_check_byte+0x54/0x70
[   19.624728]  krealloc_noprof+0x44/0x360
[   19.624776]  krealloc_uaf+0x180/0x520
[   19.624831]  kunit_try_run_case+0x170/0x3f0
[   19.624888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.624952]  kthread+0x328/0x630
[   19.625007]  ret_from_fork+0x10/0x20
[   19.625060] 
[   19.630985] Allocated by task 222:
[   19.631332]  kasan_save_stack+0x3c/0x68
[   19.631733]  kasan_save_track+0x20/0x40
[   19.632130]  kasan_save_alloc_info+0x40/0x58
[   19.632571]  __kasan_kmalloc+0xd4/0xd8
[   19.632960]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.633432]  krealloc_uaf+0xc8/0x520
[   19.633816]  kunit_try_run_case+0x170/0x3f0
[   19.634254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.634811]  kthread+0x328/0x630
[   19.635162]  ret_from_fork+0x10/0x20
[   19.635540] 
[   19.635708] Freed by task 222:
[   19.636021]  kasan_save_stack+0x3c/0x68
[   19.636418]  kasan_save_track+0x20/0x40
[   19.636813]  kasan_save_free_info+0x4c/0x78
[   19.637247]  __kasan_slab_free+0x6c/0x98
[   19.637652]  kfree+0x214/0x3c8
[   19.637989]  krealloc_uaf+0x12c/0x520
[   19.638379]  kunit_try_run_case+0x170/0x3f0
[   19.638815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.639372]  kthread+0x328/0x630
[   19.639723]  ret_from_fork+0x10/0x20
[   19.640100] 
[   19.640268] The buggy address belongs to the object at ffff00000219ce00
[   19.640268]  which belongs to the cache kmalloc-256 of size 256
[   19.641433] The buggy address is located 0 bytes inside of
[   19.641433]  freed 256-byte region [ffff00000219ce00, ffff00000219cf00)
[   19.642564] 
[   19.642734] The buggy address belongs to the physical page:
[   19.643271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x219c
[   19.644025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.644758] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.645441] page_type: f5(slab)
[   19.645781] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.646527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.647275] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.648028] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.648783] head: 03fffe0000000001 fffffdffc0086701 00000000ffffffff 00000000ffffffff
[   19.649536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.650276] page dumped because: kasan: bad access detected
[   19.650811] 
[   19.650979] Memory state around the buggy address:
[   19.651449]  ffff00000219cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652142]  ffff00000219cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652835] >ffff00000219ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.653520]                    ^
[   19.653852]  ffff00000219ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.654545]  ffff00000219cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.655231] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   19.575343] ==================================================================
[   19.576018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.576723] Write of size 1 at addr ffff00001039a0ea by task kunit_try_catch/220
[   19.577395] 
[   19.577551] CPU: 4 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.577587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.577596] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.577608] Call trace:
[   19.577616]  show_stack+0x20/0x38 (C)
[   19.577639]  dump_stack_lvl+0x8c/0xd0
[   19.577660]  print_report+0x118/0x608
[   19.577678]  kasan_report+0xdc/0x128
[   19.577697]  __asan_report_store1_noabort+0x20/0x30
[   19.577719]  krealloc_less_oob_helper+0xae4/0xc50
[   19.577743]  krealloc_large_less_oob+0x20/0x38
[   19.577766]  kunit_try_run_case+0x170/0x3f0
[   19.577790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577815]  kthread+0x328/0x630
[   19.577838]  ret_from_fork+0x10/0x20
[   19.577859] 
[   19.583835] The buggy address belongs to the physical page:
[   19.584341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.585058] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.585751] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.586387] page_type: f8(unknown)
[   19.586709] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.587408] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.588109] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.588814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.589520] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.590225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.590926] page dumped because: kasan: bad access detected
[   19.591429] 
[   19.591574] Memory state around the buggy address:
[   19.592010]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.592662]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.593313] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.593961]                                                           ^
[   19.594559]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.595212]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.595861] ==================================================================
[   19.508879] ==================================================================
[   19.509969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.510699] Write of size 1 at addr ffff00001039a0c9 by task kunit_try_catch/220
[   19.511384] 
[   19.511550] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.511599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.511613] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.511630] Call trace:
[   19.511641]  show_stack+0x20/0x38 (C)
[   19.511673]  dump_stack_lvl+0x8c/0xd0
[   19.511704]  print_report+0x118/0x608
[   19.511733]  kasan_report+0xdc/0x128
[   19.511761]  __asan_report_store1_noabort+0x20/0x30
[   19.511795]  krealloc_less_oob_helper+0xa48/0xc50
[   19.511831]  krealloc_large_less_oob+0x20/0x38
[   19.511865]  kunit_try_run_case+0x170/0x3f0
[   19.511901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.511940]  kthread+0x328/0x630
[   19.511974]  ret_from_fork+0x10/0x20
[   19.512006] 
[   19.518036] The buggy address belongs to the physical page:
[   19.518553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.519283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.519988] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.520640] page_type: f8(unknown)
[   19.520976] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.521690] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.522405] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.523127] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.523850] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.524572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.525287] page dumped because: kasan: bad access detected
[   19.525801] 
[   19.525953] Memory state around the buggy address:
[   19.526401]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.527067]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.527732] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.528393]                                               ^
[   19.528910]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.529576]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.530237] ==================================================================
[   19.553119] ==================================================================
[   19.553790] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.554507] Write of size 1 at addr ffff00001039a0da by task kunit_try_catch/220
[   19.555192] 
[   19.555356] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.555405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555419] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.555436] Call trace:
[   19.555447]  show_stack+0x20/0x38 (C)
[   19.555479]  dump_stack_lvl+0x8c/0xd0
[   19.555509]  print_report+0x118/0x608
[   19.555538]  kasan_report+0xdc/0x128
[   19.555566]  __asan_report_store1_noabort+0x20/0x30
[   19.555601]  krealloc_less_oob_helper+0xa80/0xc50
[   19.555636]  krealloc_large_less_oob+0x20/0x38
[   19.555671]  kunit_try_run_case+0x170/0x3f0
[   19.555706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555744]  kthread+0x328/0x630
[   19.555778]  ret_from_fork+0x10/0x20
[   19.555810] 
[   19.561839] The buggy address belongs to the physical page:
[   19.562354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.563085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.563788] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.564439] page_type: f8(unknown)
[   19.564773] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.565487] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.566201] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.566921] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.567644] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.568366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.569081] page dumped because: kasan: bad access detected
[   19.569595] 
[   19.569747] Memory state around the buggy address:
[   19.570194]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.570860]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.571525] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.572186]                                                     ^
[   19.572749]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.573414]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.574075] ==================================================================
[   19.375361] ==================================================================
[   19.376015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   19.376704] Write of size 1 at addr ffff00000d6fccda by task kunit_try_catch/216
[   19.377373] 
[   19.377522] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.377554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377563] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.377573] Call trace:
[   19.377580]  show_stack+0x20/0x38 (C)
[   19.377600]  dump_stack_lvl+0x8c/0xd0
[   19.377619]  print_report+0x118/0x608
[   19.377638]  kasan_report+0xdc/0x128
[   19.377656]  __asan_report_store1_noabort+0x20/0x30
[   19.377678]  krealloc_less_oob_helper+0xa80/0xc50
[   19.377702]  krealloc_less_oob+0x20/0x38
[   19.377725]  kunit_try_run_case+0x170/0x3f0
[   19.377747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.377772]  kthread+0x328/0x630
[   19.377793]  ret_from_fork+0x10/0x20
[   19.377812] 
[   19.383740] Allocated by task 216:
[   19.384055]  kasan_save_stack+0x3c/0x68
[   19.384415]  kasan_save_track+0x20/0x40
[   19.384773]  kasan_save_alloc_info+0x40/0x58
[   19.385172]  __kasan_krealloc+0x118/0x178
[   19.385546]  krealloc_noprof+0x128/0x360
[   19.385912]  krealloc_less_oob_helper+0x168/0xc50
[   19.386352]  krealloc_less_oob+0x20/0x38
[   19.386724]  kunit_try_run_case+0x170/0x3f0
[   19.387115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.387624]  kthread+0x328/0x630
[   19.387932]  ret_from_fork+0x10/0x20
[   19.388269] 
[   19.388413] The buggy address belongs to the object at ffff00000d6fcc00
[   19.388413]  which belongs to the cache kmalloc-256 of size 256
[   19.389528] The buggy address is located 17 bytes to the right of
[   19.389528]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.390693] 
[   19.390838] The buggy address belongs to the physical page:
[   19.391341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.392049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.392737] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.393370] page_type: f5(slab)
[   19.393667] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.394365] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.395065] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.395770] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.396476] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.397182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.397883] page dumped because: kasan: bad access detected
[   19.398387] 
[   19.398533] Memory state around the buggy address:
[   19.398969]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.399621]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.400273] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.400921]                                                     ^
[   19.401473]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402125]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402774] ==================================================================
[   19.596686] ==================================================================
[   19.597340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.598029] Write of size 1 at addr ffff00001039a0eb by task kunit_try_catch/220
[   19.598699] 
[   19.598848] CPU: 4 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.598880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.598889] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.598899] Call trace:
[   19.598905]  show_stack+0x20/0x38 (C)
[   19.598925]  dump_stack_lvl+0x8c/0xd0
[   19.598943]  print_report+0x118/0x608
[   19.598961]  kasan_report+0xdc/0x128
[   19.598979]  __asan_report_store1_noabort+0x20/0x30
[   19.599000]  krealloc_less_oob_helper+0xa58/0xc50
[   19.599024]  krealloc_large_less_oob+0x20/0x38
[   19.599047]  kunit_try_run_case+0x170/0x3f0
[   19.599069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.599094]  kthread+0x328/0x630
[   19.599116]  ret_from_fork+0x10/0x20
[   19.599136] 
[   19.605108] The buggy address belongs to the physical page:
[   19.605610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.606325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.607014] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.607646] page_type: f8(unknown)
[   19.607966] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.608664] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.609363] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.610068] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.610774] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.611480] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.612181] page dumped because: kasan: bad access detected
[   19.612683] 
[   19.612828] Memory state around the buggy address:
[   19.613263]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.613916]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.614566] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.615214]                                                           ^
[   19.615810]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.616461]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.617109] ==================================================================
[   19.403560] ==================================================================
[   19.404214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   19.404903] Write of size 1 at addr ffff00000d6fccea by task kunit_try_catch/216
[   19.405572] 
[   19.405722] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.405754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.405763] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.405773] Call trace:
[   19.405780]  show_stack+0x20/0x38 (C)
[   19.405800]  dump_stack_lvl+0x8c/0xd0
[   19.405820]  print_report+0x118/0x608
[   19.405838]  kasan_report+0xdc/0x128
[   19.405856]  __asan_report_store1_noabort+0x20/0x30
[   19.405879]  krealloc_less_oob_helper+0xae4/0xc50
[   19.405903]  krealloc_less_oob+0x20/0x38
[   19.405926]  kunit_try_run_case+0x170/0x3f0
[   19.405947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405972]  kthread+0x328/0x630
[   19.405993]  ret_from_fork+0x10/0x20
[   19.406013] 
[   19.411939] Allocated by task 216:
[   19.412255]  kasan_save_stack+0x3c/0x68
[   19.412614]  kasan_save_track+0x20/0x40
[   19.412972]  kasan_save_alloc_info+0x40/0x58
[   19.413372]  __kasan_krealloc+0x118/0x178
[   19.413745]  krealloc_noprof+0x128/0x360
[   19.414111]  krealloc_less_oob_helper+0x168/0xc50
[   19.414552]  krealloc_less_oob+0x20/0x38
[   19.414923]  kunit_try_run_case+0x170/0x3f0
[   19.415315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.415823]  kthread+0x328/0x630
[   19.416131]  ret_from_fork+0x10/0x20
[   19.416468] 
[   19.416614] The buggy address belongs to the object at ffff00000d6fcc00
[   19.416614]  which belongs to the cache kmalloc-256 of size 256
[   19.417728] The buggy address is located 33 bytes to the right of
[   19.417728]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.418892] 
[   19.419037] The buggy address belongs to the physical page:
[   19.419541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.420247] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.420936] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.421567] page_type: f5(slab)
[   19.421864] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.422563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.423261] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.423967] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.424674] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.425378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.426079] page dumped because: kasan: bad access detected
[   19.426581] 
[   19.426726] Memory state around the buggy address:
[   19.427162]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427813]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.428463] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.429112]                                                           ^
[   19.429708]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.430359]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431008] ==================================================================
[   19.347103] ==================================================================
[   19.347777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.348480] Write of size 1 at addr ffff00000d6fccd0 by task kunit_try_catch/216
[   19.349151] 
[   19.349306] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.349342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.349351] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.349363] Call trace:
[   19.349371]  show_stack+0x20/0x38 (C)
[   19.349394]  dump_stack_lvl+0x8c/0xd0
[   19.349415]  print_report+0x118/0x608
[   19.349434]  kasan_report+0xdc/0x128
[   19.349452]  __asan_report_store1_noabort+0x20/0x30
[   19.349475]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.349499]  krealloc_less_oob+0x20/0x38
[   19.349523]  kunit_try_run_case+0x170/0x3f0
[   19.349546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.349571]  kthread+0x328/0x630
[   19.349593]  ret_from_fork+0x10/0x20
[   19.349614] 
[   19.355545] Allocated by task 216:
[   19.355862]  kasan_save_stack+0x3c/0x68
[   19.356223]  kasan_save_track+0x20/0x40
[   19.356582]  kasan_save_alloc_info+0x40/0x58
[   19.356981]  __kasan_krealloc+0x118/0x178
[   19.357355]  krealloc_noprof+0x128/0x360
[   19.357722]  krealloc_less_oob_helper+0x168/0xc50
[   19.358162]  krealloc_less_oob+0x20/0x38
[   19.358532]  kunit_try_run_case+0x170/0x3f0
[   19.358925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.359433]  kthread+0x328/0x630
[   19.359743]  ret_from_fork+0x10/0x20
[   19.360079] 
[   19.360226] The buggy address belongs to the object at ffff00000d6fcc00
[   19.360226]  which belongs to the cache kmalloc-256 of size 256
[   19.361342] The buggy address is located 7 bytes to the right of
[   19.361342]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.362499] 
[   19.362645] The buggy address belongs to the physical page:
[   19.363149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.363858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.364550] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.365185] page_type: f5(slab)
[   19.365485] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.366185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.366884] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.367590] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.368297] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.369003] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.369704] page dumped because: kasan: bad access detected
[   19.370208] 
[   19.370353] Memory state around the buggy address:
[   19.370790]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.371442]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.372093] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.372741]                                                  ^
[   19.373269]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.373921]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.374568] ==================================================================
[   19.531305] ==================================================================
[   19.531989] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   19.532704] Write of size 1 at addr ffff00001039a0d0 by task kunit_try_catch/220
[   19.533388] 
[   19.533552] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.533601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.533615] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.533632] Call trace:
[   19.533643]  show_stack+0x20/0x38 (C)
[   19.533674]  dump_stack_lvl+0x8c/0xd0
[   19.533705]  print_report+0x118/0x608
[   19.533734]  kasan_report+0xdc/0x128
[   19.533761]  __asan_report_store1_noabort+0x20/0x30
[   19.533795]  krealloc_less_oob_helper+0xb9c/0xc50
[   19.533831]  krealloc_large_less_oob+0x20/0x38
[   19.533866]  kunit_try_run_case+0x170/0x3f0
[   19.533901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533939]  kthread+0x328/0x630
[   19.533973]  ret_from_fork+0x10/0x20
[   19.534005] 
[   19.540033] The buggy address belongs to the physical page:
[   19.540549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10398
[   19.541280] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.541984] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.542634] page_type: f8(unknown)
[   19.542969] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.543684] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.544398] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.545120] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.545843] head: 03fffe0000000002 fffffdffc040e601 00000000ffffffff 00000000ffffffff
[   19.546566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.547280] page dumped because: kasan: bad access detected
[   19.547794] 
[   19.547946] Memory state around the buggy address:
[   19.548393]  ffff000010399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.549059]  ffff00001039a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.549724] >ffff00001039a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.550385]                                                  ^
[   19.550927]  ffff00001039a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.551591]  ffff00001039a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.552252] ==================================================================
[   19.317399] ==================================================================
[   19.318458] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   19.319185] Write of size 1 at addr ffff00000d6fccc9 by task kunit_try_catch/216
[   19.319869] 
[   19.320034] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.320083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.320097] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.320113] Call trace:
[   19.320125]  show_stack+0x20/0x38 (C)
[   19.320157]  dump_stack_lvl+0x8c/0xd0
[   19.320188]  print_report+0x118/0x608
[   19.320217]  kasan_report+0xdc/0x128
[   19.320244]  __asan_report_store1_noabort+0x20/0x30
[   19.320278]  krealloc_less_oob_helper+0xa48/0xc50
[   19.320314]  krealloc_less_oob+0x20/0x38
[   19.320348]  kunit_try_run_case+0x170/0x3f0
[   19.320382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.320421]  kthread+0x328/0x630
[   19.320454]  ret_from_fork+0x10/0x20
[   19.320487] 
[   19.326473] Allocated by task 216:
[   19.326801]  kasan_save_stack+0x3c/0x68
[   19.327176]  kasan_save_track+0x20/0x40
[   19.327547]  kasan_save_alloc_info+0x40/0x58
[   19.327961]  __kasan_krealloc+0x118/0x178
[   19.328348]  krealloc_noprof+0x128/0x360
[   19.328728]  krealloc_less_oob_helper+0x168/0xc50
[   19.329183]  krealloc_less_oob+0x20/0x38
[   19.329567]  kunit_try_run_case+0x170/0x3f0
[   19.329974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.330499]  kthread+0x328/0x630
[   19.330821]  ret_from_fork+0x10/0x20
[   19.331171] 
[   19.331324] The buggy address belongs to the object at ffff00000d6fcc00
[   19.331324]  which belongs to the cache kmalloc-256 of size 256
[   19.332455] The buggy address is located 0 bytes to the right of
[   19.332455]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.333627] 
[   19.333781] The buggy address belongs to the physical page:
[   19.334298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.335021] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.335727] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.336378] page_type: f5(slab)
[   19.336692] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.337408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.338123] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.338846] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.339569] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.340292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.341006] page dumped because: kasan: bad access detected
[   19.341519] 
[   19.341671] Memory state around the buggy address:
[   19.342119]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342785]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.343450] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.344112]                                               ^
[   19.344629]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345294]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345955] ==================================================================
[   19.431786] ==================================================================
[   19.432440] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   19.433131] Write of size 1 at addr ffff00000d6fcceb by task kunit_try_catch/216
[   19.433800] 
[   19.433949] CPU: 4 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.433980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.433989] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.433999] Call trace:
[   19.434006]  show_stack+0x20/0x38 (C)
[   19.434025]  dump_stack_lvl+0x8c/0xd0
[   19.434043]  print_report+0x118/0x608
[   19.434062]  kasan_report+0xdc/0x128
[   19.434080]  __asan_report_store1_noabort+0x20/0x30
[   19.434101]  krealloc_less_oob_helper+0xa58/0xc50
[   19.434126]  krealloc_less_oob+0x20/0x38
[   19.434149]  kunit_try_run_case+0x170/0x3f0
[   19.434170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.434195]  kthread+0x328/0x630
[   19.434216]  ret_from_fork+0x10/0x20
[   19.434236] 
[   19.440161] Allocated by task 216:
[   19.440476]  kasan_save_stack+0x3c/0x68
[   19.440834]  kasan_save_track+0x20/0x40
[   19.441192]  kasan_save_alloc_info+0x40/0x58
[   19.441591]  __kasan_krealloc+0x118/0x178
[   19.441964]  krealloc_noprof+0x128/0x360
[   19.442329]  krealloc_less_oob_helper+0x168/0xc50
[   19.442768]  krealloc_less_oob+0x20/0x38
[   19.443138]  kunit_try_run_case+0x170/0x3f0
[   19.443530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444036]  kthread+0x328/0x630
[   19.444345]  ret_from_fork+0x10/0x20
[   19.444681] 
[   19.444827] The buggy address belongs to the object at ffff00000d6fcc00
[   19.444827]  which belongs to the cache kmalloc-256 of size 256
[   19.445941] The buggy address is located 34 bytes to the right of
[   19.445941]  allocated 201-byte region [ffff00000d6fcc00, ffff00000d6fccc9)
[   19.447104] 
[   19.447250] The buggy address belongs to the physical page:
[   19.447752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd6fc
[   19.448459] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.449148] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.449779] page_type: f5(slab)
[   19.450075] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.450774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.451473] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.452179] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.452885] head: 03fffe0000000001 fffffdffc035bf01 00000000ffffffff 00000000ffffffff
[   19.453591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.454292] page dumped because: kasan: bad access detected
[   19.454795] 
[   19.454940] Memory state around the buggy address:
[   19.455376]  ffff00000d6fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.456027]  ffff00000d6fcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.456677] >ffff00000d6fcc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.457326]                                                           ^
[   19.457923]  ffff00000d6fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.458574]  ffff00000d6fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.459223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   19.485032] ==================================================================
[   19.485706] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.486433] Write of size 1 at addr ffff000001a960f0 by task kunit_try_catch/218
[   19.487105] 
[   19.487261] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.487297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.487307] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.487319] Call trace:
[   19.487328]  show_stack+0x20/0x38 (C)
[   19.487351]  dump_stack_lvl+0x8c/0xd0
[   19.487373]  print_report+0x118/0x608
[   19.487394]  kasan_report+0xdc/0x128
[   19.487413]  __asan_report_store1_noabort+0x20/0x30
[   19.487438]  krealloc_more_oob_helper+0x5c0/0x678
[   19.487463]  krealloc_large_more_oob+0x20/0x38
[   19.487488]  kunit_try_run_case+0x170/0x3f0
[   19.487514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487541]  kthread+0x328/0x630
[   19.487566]  ret_from_fork+0x10/0x20
[   19.487590] 
[   19.493575] The buggy address belongs to the physical page:
[   19.494082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94
[   19.494794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.495487] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.496124] page_type: f8(unknown)
[   19.496448] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.497150] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.497851] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.498560] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.499270] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff
[   19.499979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.500683] page dumped because: kasan: bad access detected
[   19.501189] 
[   19.501334] Memory state around the buggy address:
[   19.501773]  ffff000001a95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.502426]  ffff000001a96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.503080] >ffff000001a96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.503730]                                                              ^
[   19.504351]  ffff000001a96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.505005]  ffff000001a96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.505656] ==================================================================
[   19.462778] ==================================================================
[   19.463867] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.464591] Write of size 1 at addr ffff000001a960eb by task kunit_try_catch/218
[   19.465275] 
[   19.465441] CPU: 3 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.465489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.465503] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.465521] Call trace:
[   19.465533]  show_stack+0x20/0x38 (C)
[   19.465568]  dump_stack_lvl+0x8c/0xd0
[   19.465600]  print_report+0x118/0x608
[   19.465630]  kasan_report+0xdc/0x128
[   19.465658]  __asan_report_store1_noabort+0x20/0x30
[   19.465692]  krealloc_more_oob_helper+0x60c/0x678
[   19.465729]  krealloc_large_more_oob+0x20/0x38
[   19.465764]  kunit_try_run_case+0x170/0x3f0
[   19.465799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.465838]  kthread+0x328/0x630
[   19.465873]  ret_from_fork+0x10/0x20
[   19.465906] 
[   19.471939] The buggy address belongs to the physical page:
[   19.472458] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94
[   19.473181] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.473887] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.474538] page_type: f8(unknown)
[   19.474874] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.475590] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.476304] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.477026] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.477749] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff
[   19.478471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.479186] page dumped because: kasan: bad access detected
[   19.479701] 
[   19.479852] Memory state around the buggy address:
[   19.480299]  ffff000001a95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.480964]  ffff000001a96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.481629] >ffff000001a96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.482290]                                                           ^
[   19.482899]  ffff000001a96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.483565]  ffff000001a96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.484226] ==================================================================
[   19.258095] ==================================================================
[   19.259091] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.259797] Write of size 1 at addr ffff00000a9e8aeb by task kunit_try_catch/214
[   19.260467] 
[   19.260614] CPU: 5 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.260639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.260645] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.260653] Call trace:
[   19.260659]  show_stack+0x20/0x38 (C)
[   19.260676]  dump_stack_lvl+0x8c/0xd0
[   19.260691]  print_report+0x118/0x608
[   19.260704]  kasan_report+0xdc/0x128
[   19.260717]  __asan_report_store1_noabort+0x20/0x30
[   19.260732]  krealloc_more_oob_helper+0x60c/0x678
[   19.260749]  krealloc_more_oob+0x20/0x38
[   19.260765]  kunit_try_run_case+0x170/0x3f0
[   19.260781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.260798]  kthread+0x328/0x630
[   19.260814]  ret_from_fork+0x10/0x20
[   19.260828] 
[   19.266719] Allocated by task 214:
[   19.267028]  kasan_save_stack+0x3c/0x68
[   19.267381]  kasan_save_track+0x20/0x40
[   19.267731]  kasan_save_alloc_info+0x40/0x58
[   19.268121]  __kasan_krealloc+0x118/0x178
[   19.268486]  krealloc_noprof+0x128/0x360
[   19.268844]  krealloc_more_oob_helper+0x168/0x678
[   19.269273]  krealloc_more_oob+0x20/0x38
[   19.269635]  kunit_try_run_case+0x170/0x3f0
[   19.270017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.270514]  kthread+0x328/0x630
[   19.270813]  ret_from_fork+0x10/0x20
[   19.271140] 
[   19.271281] The buggy address belongs to the object at ffff00000a9e8a00
[   19.271281]  which belongs to the cache kmalloc-256 of size 256
[   19.272385] The buggy address is located 0 bytes to the right of
[   19.272385]  allocated 235-byte region [ffff00000a9e8a00, ffff00000a9e8aeb)
[   19.273531] 
[   19.273671] The buggy address belongs to the physical page:
[   19.274170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa9e8
[   19.274869] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.275551] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.276176] page_type: f5(slab)
[   19.276467] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.277158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.277847] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.278545] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.279242] head: 03fffe0000000001 fffffdffc02a7a01 00000000ffffffff 00000000ffffffff
[   19.279938] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.280632] page dumped because: kasan: bad access detected
[   19.281129] 
[   19.281269] Memory state around the buggy address:
[   19.281699]  ffff00000a9e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.282342]  ffff00000a9e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.282985] >ffff00000a9e8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.283626]                                                           ^
[   19.284214]  ffff00000a9e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.284857]  ffff00000a9e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.285498] ==================================================================
[   19.286224] ==================================================================
[   19.286869] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   19.287549] Write of size 1 at addr ffff00000a9e8af0 by task kunit_try_catch/214
[   19.288208] 
[   19.288350] CPU: 5 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.288367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.288371] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.288377] Call trace:
[   19.288380]  show_stack+0x20/0x38 (C)
[   19.288392]  dump_stack_lvl+0x8c/0xd0
[   19.288401]  print_report+0x118/0x608
[   19.288411]  kasan_report+0xdc/0x128
[   19.288420]  __asan_report_store1_noabort+0x20/0x30
[   19.288431]  krealloc_more_oob_helper+0x5c0/0x678
[   19.288444]  krealloc_more_oob+0x20/0x38
[   19.288455]  kunit_try_run_case+0x170/0x3f0
[   19.288467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.288480]  kthread+0x328/0x630
[   19.288491]  ret_from_fork+0x10/0x20
[   19.288501] 
[   19.294374] Allocated by task 214:
[   19.294679]  kasan_save_stack+0x3c/0x68
[   19.295024]  kasan_save_track+0x20/0x40
[   19.295370]  kasan_save_alloc_info+0x40/0x58
[   19.295755]  __kasan_krealloc+0x118/0x178
[   19.296116]  krealloc_noprof+0x128/0x360
[   19.296469]  krealloc_more_oob_helper+0x168/0x678
[   19.296893]  krealloc_more_oob+0x20/0x38
[   19.297249]  kunit_try_run_case+0x170/0x3f0
[   19.297625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.298117]  kthread+0x328/0x630
[   19.298411]  ret_from_fork+0x10/0x20
[   19.298734] 
[   19.298872] The buggy address belongs to the object at ffff00000a9e8a00
[   19.298872]  which belongs to the cache kmalloc-256 of size 256
[   19.299971] The buggy address is located 5 bytes to the right of
[   19.299971]  allocated 235-byte region [ffff00000a9e8a00, ffff00000a9e8aeb)
[   19.301109] 
[   19.301246] The buggy address belongs to the physical page:
[   19.301739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa9e8
[   19.302433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.303109] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.303726] page_type: f5(slab)
[   19.304011] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.304696] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.305379] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000
[   19.306070] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.306763] head: 03fffe0000000001 fffffdffc02a7a01 00000000ffffffff 00000000ffffffff
[   19.307455] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.308146] page dumped because: kasan: bad access detected
[   19.308638] 
[   19.308775] Memory state around the buggy address:
[   19.309201]  ffff00000a9e8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.309841]  ffff00000a9e8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.310480] >ffff00000a9e8a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.311116]                                                              ^
[   19.311723]  ffff00000a9e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.312361]  ffff00000a9e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.312997] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   19.237279] ==================================================================
[   19.238660] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   19.239290] Read of size 1 at addr ffff000010940000 by task kunit_try_catch/212
[   19.239976] 
[   19.240149] CPU: 3 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.240209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.240226] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.240247] Call trace:
[   19.240261]  show_stack+0x20/0x38 (C)
[   19.240300]  dump_stack_lvl+0x8c/0xd0
[   19.240337]  print_report+0x118/0x608
[   19.240372]  kasan_report+0xdc/0x128
[   19.240406]  __asan_report_load1_noabort+0x20/0x30
[   19.240448]  page_alloc_uaf+0x328/0x350
[   19.240489]  kunit_try_run_case+0x170/0x3f0
[   19.240532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.240580]  kthread+0x328/0x630
[   19.240621]  ret_from_fork+0x10/0x20
[   19.240661] 
[   19.246259] The buggy address belongs to the physical page:
[   19.246783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10940
[   19.247527] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.248149] page_type: f0(buddy)
[   19.248479] raw: 03fffe0000000000 ffff0000f75f26f0 ffff0000f75f26f0 0000000000000000
[   19.249205] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   19.249921] page dumped because: kasan: bad access detected
[   19.250443] 
[   19.250601] Memory state around the buggy address:
[   19.251056]  ffff00001093ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.251731]  ffff00001093ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.252406] >ffff000010940000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.253076]                    ^
[   19.253394]  ffff000010940080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.254068]  ffff000010940100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.254738] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   19.209947] ==================================================================
[   19.210983] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   19.211511] Free of addr ffff000001a94001 by task kunit_try_catch/208
[   19.212107] 
[   19.212269] CPU: 3 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.212317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.212331] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.212347] Call trace:
[   19.212359]  show_stack+0x20/0x38 (C)
[   19.212390]  dump_stack_lvl+0x8c/0xd0
[   19.212421]  print_report+0x118/0x608
[   19.212451]  kasan_report_invalid_free+0xc0/0xe8
[   19.212482]  __kasan_kfree_large+0x5c/0xa8
[   19.212511]  free_large_kmalloc+0x64/0x190
[   19.212546]  kfree+0x270/0x3c8
[   19.212576]  kmalloc_large_invalid_free+0x108/0x270
[   19.212613]  kunit_try_run_case+0x170/0x3f0
[   19.212647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.212686]  kthread+0x328/0x630
[   19.212719]  ret_from_fork+0x10/0x20
[   19.212751] 
[   19.219068] The buggy address belongs to the physical page:
[   19.219588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a94
[   19.220312] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.221016] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.221666] page_type: f8(unknown)
[   19.222001] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.222716] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.223431] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.224153] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.224875] head: 03fffe0000000002 fffffdffc006a501 00000000ffffffff 00000000ffffffff
[   19.225598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.226314] page dumped because: kasan: bad access detected
[   19.226828] 
[   19.226980] Memory state around the buggy address:
[   19.227429]  ffff000001a93f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.228095]  ffff000001a93f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.228760] >ffff000001a94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.229421]                    ^
[   19.229733]  ffff000001a94080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.230398]  ffff000001a94100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.231060] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   19.190147] ==================================================================
[   19.191202] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   19.191823] Read of size 1 at addr ffff0000108c4000 by task kunit_try_catch/206
[   19.192487] 
[   19.192634] CPU: 5 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.192659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.192666] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.192674] Call trace:
[   19.192680]  show_stack+0x20/0x38 (C)
[   19.192697]  dump_stack_lvl+0x8c/0xd0
[   19.192712]  print_report+0x118/0x608
[   19.192725]  kasan_report+0xdc/0x128
[   19.192737]  __asan_report_load1_noabort+0x20/0x30
[   19.192752]  kmalloc_large_uaf+0x2cc/0x2f8
[   19.192767]  kunit_try_run_case+0x170/0x3f0
[   19.192783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.192800]  kthread+0x328/0x630
[   19.192816]  ret_from_fork+0x10/0x20
[   19.192830] 
[   19.198320] The buggy address belongs to the physical page:
[   19.198818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108c4
[   19.199525] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.200118] raw: 03fffe0000000000 fffffdffc0423208 ffff0000d1782740 0000000000000000
[   19.200809] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.201495] page dumped because: kasan: bad access detected
[   19.201993] 
[   19.202132] Memory state around the buggy address:
[   19.202563]  ffff0000108c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.203206]  ffff0000108c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.203849] >ffff0000108c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.204490]                    ^
[   19.204784]  ffff0000108c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.205427]  ffff0000108c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.206068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   19.133811] ==================================================================
[   19.134994] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   19.135692] Write of size 1 at addr ffff00000eb85f00 by task kunit_try_catch/202
[   19.136376] 
[   19.136542] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.136591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.136604] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.136621] Call trace:
[   19.136633]  show_stack+0x20/0x38 (C)
[   19.136666]  dump_stack_lvl+0x8c/0xd0
[   19.136697]  print_report+0x118/0x608
[   19.136726]  kasan_report+0xdc/0x128
[   19.136754]  __asan_report_store1_noabort+0x20/0x30
[   19.136788]  kmalloc_big_oob_right+0x2a4/0x2f0
[   19.136822]  kunit_try_run_case+0x170/0x3f0
[   19.136857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.136897]  kthread+0x328/0x630
[   19.136931]  ret_from_fork+0x10/0x20
[   19.136963] 
[   19.142599] Allocated by task 202:
[   19.142950]  kasan_save_stack+0x3c/0x68
[   19.143354]  kasan_save_track+0x20/0x40
[   19.143751]  kasan_save_alloc_info+0x40/0x58
[   19.144191]  __kasan_kmalloc+0xd4/0xd8
[   19.144580]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.145054]  kmalloc_big_oob_right+0xb8/0x2f0
[   19.145507]  kunit_try_run_case+0x170/0x3f0
[   19.145948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.146505]  kthread+0x328/0x630
[   19.146858]  ret_from_fork+0x10/0x20
[   19.147235] 
[   19.147404] The buggy address belongs to the object at ffff00000eb84000
[   19.147404]  which belongs to the cache kmalloc-8k of size 8192
[   19.148569] The buggy address is located 0 bytes to the right of
[   19.148569]  allocated 7936-byte region [ffff00000eb84000, ffff00000eb85f00)
[   19.149786] 
[   19.149956] The buggy address belongs to the physical page:
[   19.150493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xeb80
[   19.151245] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.151978] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.152661] page_type: f5(slab)
[   19.153000] raw: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000
[   19.153747] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.154494] head: 03fffe0000000040 ffff000000403180 dead000000000122 0000000000000000
[   19.155247] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.156002] head: 03fffe0000000003 fffffdffc03ae001 00000000ffffffff 00000000ffffffff
[   19.156756] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.157494] page dumped because: kasan: bad access detected
[   19.158029] 
[   19.158196] Memory state around the buggy address:
[   19.158665]  ffff00000eb85e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.159358]  ffff00000eb85e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.160051] >ffff00000eb85f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.160736]                    ^
[   19.161067]  ffff00000eb85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.161760]  ffff00000eb86000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.162445] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   19.088529] ==================================================================
[   19.089613] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   19.090387] Write of size 1 at addr ffff00000e73a078 by task kunit_try_catch/200
[   19.091073] 
[   19.091238] CPU: 2 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.091287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.091301] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.091318] Call trace:
[   19.091329]  show_stack+0x20/0x38 (C)
[   19.091362]  dump_stack_lvl+0x8c/0xd0
[   19.091393]  print_report+0x118/0x608
[   19.091422]  kasan_report+0xdc/0x128
[   19.091450]  __asan_report_store1_noabort+0x20/0x30
[   19.091484]  kmalloc_track_caller_oob_right+0x40c/0x488
[   19.091523]  kunit_try_run_case+0x170/0x3f0
[   19.091558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.091597]  kthread+0x328/0x630
[   19.091631]  ret_from_fork+0x10/0x20
[   19.091664] 
[   19.097345] Allocated by task 200:
[   19.097671]  kasan_save_stack+0x3c/0x68
[   19.098045]  kasan_save_track+0x20/0x40
[   19.098416]  kasan_save_alloc_info+0x40/0x58
[   19.098830]  __kasan_kmalloc+0xd4/0xd8
[   19.099192]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   19.099720]  kmalloc_track_caller_oob_right+0xa8/0x488
[   19.100214]  kunit_try_run_case+0x170/0x3f0
[   19.100621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.101145]  kthread+0x328/0x630
[   19.101467]  ret_from_fork+0x10/0x20
[   19.101817] 
[   19.101971] The buggy address belongs to the object at ffff00000e73a000
[   19.101971]  which belongs to the cache kmalloc-128 of size 128
[   19.103103] The buggy address is located 0 bytes to the right of
[   19.103103]  allocated 120-byte region [ffff00000e73a000, ffff00000e73a078)
[   19.104276] 
[   19.104430] The buggy address belongs to the physical page:
[   19.104946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe73a
[   19.105670] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.106281] page_type: f5(slab)
[   19.106595] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.107310] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.108016] page dumped because: kasan: bad access detected
[   19.108530] 
[   19.108682] Memory state around the buggy address:
[   19.109131]  ffff00000e739f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.109796]  ffff00000e739f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.110462] >ffff00000e73a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.111121]                                                                 ^
[   19.111776]  ffff00000e73a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.112440]  ffff00000e73a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.113102] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   19.056743] ==================================================================
[   19.057776] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   19.058478] Read of size 1 at addr ffff00000d213000 by task kunit_try_catch/198
[   19.059148] 
[   19.059309] CPU: 2 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.059349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.059361] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.059376] Call trace:
[   19.059386]  show_stack+0x20/0x38 (C)
[   19.059414]  dump_stack_lvl+0x8c/0xd0
[   19.059441]  print_report+0x118/0x608
[   19.059465]  kasan_report+0xdc/0x128
[   19.059489]  __asan_report_load1_noabort+0x20/0x30
[   19.059517]  kmalloc_node_oob_right+0x2f4/0x330
[   19.059547]  kunit_try_run_case+0x170/0x3f0
[   19.059577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.059610]  kthread+0x328/0x630
[   19.059639]  ret_from_fork+0x10/0x20
[   19.059666] 
[   19.065254] Allocated by task 198:
[   19.065575]  kasan_save_stack+0x3c/0x68
[   19.065942]  kasan_save_track+0x20/0x40
[   19.066306]  kasan_save_alloc_info+0x40/0x58
[   19.066713]  __kasan_kmalloc+0xd4/0xd8
[   19.067069]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   19.067535]  kmalloc_node_oob_right+0xbc/0x330
[   19.067960]  kunit_try_run_case+0x170/0x3f0
[   19.068360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.068875]  kthread+0x328/0x630
[   19.069191]  ret_from_fork+0x10/0x20
[   19.069534] 
[   19.069684] The buggy address belongs to the object at ffff00000d212000
[   19.069684]  which belongs to the cache kmalloc-4k of size 4096
[   19.070810] The buggy address is located 0 bytes to the right of
[   19.070810]  allocated 4096-byte region [ffff00000d212000, ffff00000d213000)
[   19.071982] 
[   19.072133] The buggy address belongs to the physical page:
[   19.072645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd210
[   19.073362] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.074060] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   19.074705] page_type: f5(slab)
[   19.075012] raw: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000
[   19.075720] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   19.076428] head: 03fffe0000000040 ffff000000403040 dead000000000122 0000000000000000
[   19.077143] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   19.077859] head: 03fffe0000000003 fffffdffc0348401 00000000ffffffff 00000000ffffffff
[   19.078575] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.079283] page dumped because: kasan: bad access detected
[   19.079793] 
[   19.079941] Memory state around the buggy address:
[   19.080384]  ffff00000d212f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.081044]  ffff00000d212f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.081703] >ffff00000d213000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.082357]                    ^
[   19.082662]  ffff00000d213080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.083321]  ffff00000d213100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.083976] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   19.010665] ==================================================================
[   19.011707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   19.012366] Read of size 1 at addr ffff000002427adf by task kunit_try_catch/196
[   19.013041] 
[   19.013205] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.013253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.013267] Hardware name: Radxa ROCK Pi 4B (DT)
[   19.013284] Call trace:
[   19.013295]  show_stack+0x20/0x38 (C)
[   19.013327]  dump_stack_lvl+0x8c/0xd0
[   19.013358]  print_report+0x118/0x608
[   19.013387]  kasan_report+0xdc/0x128
[   19.013415]  __asan_report_load1_noabort+0x20/0x30
[   19.013448]  kmalloc_oob_left+0x2ec/0x320
[   19.013482]  kunit_try_run_case+0x170/0x3f0
[   19.013519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.013557]  kthread+0x328/0x630
[   19.013592]  ret_from_fork+0x10/0x20
[   19.013626] 
[   19.019294] Allocated by task 11:
[   19.019635]  kasan_save_stack+0x3c/0x68
[   19.020035]  kasan_save_track+0x20/0x40
[   19.020432]  kasan_save_alloc_info+0x40/0x58
[   19.020873]  __kasan_kmalloc+0xd4/0xd8
[   19.021262]  __kmalloc_noprof+0x190/0x4d0
[   19.021676]  usb_hcd_submit_urb+0x444/0x1a58
[   19.022121]  usb_submit_urb+0x564/0x1198
[   19.022531]  usb_start_wait_urb+0x120/0x3e8
[   19.022965]  usb_control_msg+0x2b4/0x3e0
[   19.023375]  hub_ext_port_status+0x114/0x580
[   19.023823]  hub_activate+0x2a4/0x1340
[   19.024211]  hub_resume+0xa8/0x380
[   19.024566]  usb_resume_interface.isra.0+0x1f8/0x348
[   19.025076]  usb_suspend_both+0x250/0x6f0
[   19.025496]  usb_runtime_suspend+0x3c/0xf8
[   19.025926]  __rpm_callback+0xa0/0x470
[   19.026321]  rpm_callback+0x168/0x1b0
[   19.026705]  rpm_suspend+0x1bc/0xcd8
[   19.027080]  __pm_runtime_suspend+0x5c/0x1e8
[   19.027519]  usb_runtime_idle+0x48/0x68
[   19.027926]  rpm_idle+0x13c/0x708
[   19.028277]  pm_runtime_work+0x110/0x170
[   19.028684]  process_one_work+0x530/0xf98
[   19.029099]  worker_thread+0x8ac/0xf28
[   19.029489]  kthread+0x328/0x630
[   19.029843]  ret_from_fork+0x10/0x20
[   19.030220] 
[   19.030388] Freed by task 11:
[   19.030694]  kasan_save_stack+0x3c/0x68
[   19.031094]  kasan_save_track+0x20/0x40
[   19.031490]  kasan_save_free_info+0x4c/0x78
[   19.031923]  __kasan_slab_free+0x6c/0x98
[   19.032328]  kfree+0x214/0x3c8
[   19.032664]  usb_hcd_submit_urb+0x518/0x1a58
[   19.033104]  usb_submit_urb+0x564/0x1198
[   19.033513]  usb_start_wait_urb+0x120/0x3e8
[   19.033948]  usb_control_msg+0x2b4/0x3e0
[   19.034356]  hub_ext_port_status+0x114/0x580
[   19.034802]  hub_activate+0x2a4/0x1340
[   19.035190]  hub_resume+0xa8/0x380
[   19.035547]  usb_resume_interface.isra.0+0x1f8/0x348
[   19.036054]  usb_suspend_both+0x250/0x6f0
[   19.036474]  usb_runtime_suspend+0x3c/0xf8
[   19.036903]  __rpm_callback+0xa0/0x470
[   19.037294]  rpm_callback+0x168/0x1b0
[   19.037677]  rpm_suspend+0x1bc/0xcd8
[   19.038053]  __pm_runtime_suspend+0x5c/0x1e8
[   19.038491]  usb_runtime_idle+0x48/0x68
[   19.038896]  rpm_idle+0x13c/0x708
[   19.039247]  pm_runtime_work+0x110/0x170
[   19.039653]  process_one_work+0x530/0xf98
[   19.040065]  worker_thread+0x8ac/0xf28
[   19.040453]  kthread+0x328/0x630
[   19.040804]  ret_from_fork+0x10/0x20
[   19.041180] 
[   19.041348] The buggy address belongs to the object at ffff000002427ac0
[   19.041348]  which belongs to the cache kmalloc-16 of size 16
[   19.042498] The buggy address is located 15 bytes to the right of
[   19.042498]  allocated 16-byte region [ffff000002427ac0, ffff000002427ad0)
[   19.043707] 
[   19.043876] The buggy address belongs to the physical page:
[   19.044412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2427
[   19.045166] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.045806] page_type: f5(slab)
[   19.046144] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   19.046890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.047623] page dumped because: kasan: bad access detected
[   19.048158] 
[   19.048326] Memory state around the buggy address:
[   19.048796]  ffff000002427980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.049488]  ffff000002427a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.050181] >ffff000002427a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   19.050866]                                                     ^
[   19.051454]  ffff000002427b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.052146]  ffff000002427b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.052832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   18.933917] ==================================================================
[   18.934632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.935300] Write of size 1 at addr ffff00000d788473 by task kunit_try_catch/194
[   18.935985] 
[   18.936151] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT 
[   18.936196] Tainted: [N]=TEST
[   18.936208] Hardware name: Radxa ROCK Pi 4B (DT)
[   18.936225] Call trace:
[   18.936236]  show_stack+0x20/0x38 (C)
[   18.936269]  dump_stack_lvl+0x8c/0xd0
[   18.936300]  print_report+0x118/0x608
[   18.936329]  kasan_report+0xdc/0x128
[   18.936357]  __asan_report_store1_noabort+0x20/0x30
[   18.936391]  kmalloc_oob_right+0x5a4/0x660
[   18.936424]  kunit_try_run_case+0x170/0x3f0
[   18.936459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.936498]  kthread+0x328/0x630
[   18.936531]  ret_from_fork+0x10/0x20
[   18.936564] 
[   18.942047] Allocated by task 194:
[   18.942378]  kasan_save_stack+0x3c/0x68
[   18.942755]  kasan_save_track+0x20/0x40
[   18.943127]  kasan_save_alloc_info+0x40/0x58
[   18.943539]  __kasan_kmalloc+0xd4/0xd8
[   18.943903]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.944344]  kmalloc_oob_right+0xb0/0x660
[   18.944735]  kunit_try_run_case+0x170/0x3f0
[   18.945143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.945667]  kthread+0x328/0x630
[   18.945991]  ret_from_fork+0x10/0x20
[   18.946341] 
[   18.946494] The buggy address belongs to the object at ffff00000d788400
[   18.946494]  which belongs to the cache kmalloc-128 of size 128
[   18.947627] The buggy address is located 0 bytes to the right of
[   18.947627]  allocated 115-byte region [ffff00000d788400, ffff00000d788473)
[   18.948800] 
[   18.948954] The buggy address belongs to the physical page:
[   18.949469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788
[   18.950193] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   18.950804] page_type: f5(slab)
[   18.951118] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   18.951834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.952540] page dumped because: kasan: bad access detected
[   18.953054] 
[   18.953206] Memory state around the buggy address:
[   18.953655]  ffff00000d788300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.954320]  ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.954985] >ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.955646]                                                              ^
[   18.956278]  ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.956943]  ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.957604] ==================================================================
[   18.959082] ==================================================================
[   18.959740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   18.960393] Write of size 1 at addr ffff00000d788478 by task kunit_try_catch/194
[   18.961070] 
[   18.961230] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.961271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.961282] Hardware name: Radxa ROCK Pi 4B (DT)
[   18.961297] Call trace:
[   18.961307]  show_stack+0x20/0x38 (C)
[   18.961333]  dump_stack_lvl+0x8c/0xd0
[   18.961359]  print_report+0x118/0x608
[   18.961383]  kasan_report+0xdc/0x128
[   18.961407]  __asan_report_store1_noabort+0x20/0x30
[   18.961435]  kmalloc_oob_right+0x538/0x660
[   18.961463]  kunit_try_run_case+0x170/0x3f0
[   18.961493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.961526]  kthread+0x328/0x630
[   18.961554]  ret_from_fork+0x10/0x20
[   18.961582] 
[   18.967140] Allocated by task 194:
[   18.967460]  kasan_save_stack+0x3c/0x68
[   18.967826]  kasan_save_track+0x20/0x40
[   18.968191]  kasan_save_alloc_info+0x40/0x58
[   18.968596]  __kasan_kmalloc+0xd4/0xd8
[   18.968951]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.969384]  kmalloc_oob_right+0xb0/0x660
[   18.969768]  kunit_try_run_case+0x170/0x3f0
[   18.970168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.970684]  kthread+0x328/0x630
[   18.970999]  ret_from_fork+0x10/0x20
[   18.971342] 
[   18.971491] The buggy address belongs to the object at ffff00000d788400
[   18.971491]  which belongs to the cache kmalloc-128 of size 128
[   18.972615] The buggy address is located 5 bytes to the right of
[   18.972615]  allocated 115-byte region [ffff00000d788400, ffff00000d788473)
[   18.973780] 
[   18.973930] The buggy address belongs to the physical page:
[   18.974440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788
[   18.975156] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   18.975759] page_type: f5(slab)
[   18.976063] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   18.976771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.977471] page dumped because: kasan: bad access detected
[   18.977980] 
[   18.978129] Memory state around the buggy address:
[   18.978572]  ffff00000d788300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.979230]  ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.979889] >ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.980544]                                                                 ^
[   18.981192]  ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.981851]  ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.982506] ==================================================================
[   18.983417] ==================================================================
[   18.984085] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   18.984733] Read of size 1 at addr ffff00000d788480 by task kunit_try_catch/194
[   18.985401] 
[   18.985560] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.985600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.985612] Hardware name: Radxa ROCK Pi 4B (DT)
[   18.985626] Call trace:
[   18.985636]  show_stack+0x20/0x38 (C)
[   18.985662]  dump_stack_lvl+0x8c/0xd0
[   18.985688]  print_report+0x118/0x608
[   18.985713]  kasan_report+0xdc/0x128
[   18.985736]  __asan_report_load1_noabort+0x20/0x30
[   18.985764]  kmalloc_oob_right+0x5d0/0x660
[   18.985792]  kunit_try_run_case+0x170/0x3f0
[   18.985821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.985853]  kthread+0x328/0x630
[   18.985880]  ret_from_fork+0x10/0x20
[   18.985907] 
[   18.991455] Allocated by task 194:
[   18.991776]  kasan_save_stack+0x3c/0x68
[   18.992141]  kasan_save_track+0x20/0x40
[   18.992506]  kasan_save_alloc_info+0x40/0x58
[   18.992912]  __kasan_kmalloc+0xd4/0xd8
[   18.993270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.993703]  kmalloc_oob_right+0xb0/0x660
[   18.994087]  kunit_try_run_case+0x170/0x3f0
[   18.994486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.995001]  kthread+0x328/0x630
[   18.995316]  ret_from_fork+0x10/0x20
[   18.995659] 
[   18.995808] The buggy address belongs to the object at ffff00000d788400
[   18.995808]  which belongs to the cache kmalloc-128 of size 128
[   18.996931] The buggy address is located 13 bytes to the right of
[   18.996931]  allocated 115-byte region [ffff00000d788400, ffff00000d788473)
[   18.998103] 
[   18.998252] The buggy address belongs to the physical page:
[   18.998763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xd788
[   18.999478] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   19.000081] page_type: f5(slab)
[   19.000387] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   19.001093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.001794] page dumped because: kasan: bad access detected
[   19.002303] 
[   19.002451] Memory state around the buggy address:
[   19.002894]  ffff00000d788380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.003552]  ffff00000d788400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.004211] >ffff00000d788480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.004866]                    ^
[   19.005171]  ffff00000d788500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.005829]  ffff00000d788580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.006484] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   65.886531] WARNING: CPU: 3 PID: 714 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   65.887232] Modules linked in:
[   65.887536] CPU: 3 UID: 0 PID: 714 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT 
[   65.888436] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   65.888962] Hardware name: Radxa ROCK Pi 4B (DT)
[   65.889384] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   65.890016] pc : intlog10+0x38/0x48
[   65.890348] lr : intlog10_test+0xe4/0x200
[   65.890725] sp : ffff80008a1c7c10
[   65.891031] x29: ffff80008a1c7c90 x28: 0000000000000000 x27: 0000000000000000
[   65.891700] x26: 1fffe00001d30ee1 x25: 0000000000000000 x24: ffff80008a1c7ce0
[   65.892368] x23: ffff80008a1c7d00 x22: 0000000000000000 x21: 1ffff00011438f82
[   65.893035] x20: ffff800083cc3840 x19: ffff800087cd7990 x18: 00000000ff39b097
[   65.893701] x17: 0000000000000001 x16: ffff0000d1738f60 x15: 000000000acdfed5
[   65.894369] x14: 0000000089535c53 x13: ffff00000bed0008 x12: ffff700010f61161
[   65.895037] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d60c
[   65.895704] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   65.896372] x5 : ffff700011438f82 x4 : 1ffff00010f9af3a x3 : 1ffff00010798708
[   65.897039] x2 : 1ffff00010798708 x1 : 0000000000000003 x0 : 0000000000000000
[   65.897705] Call trace:
[   65.897938]  intlog10+0x38/0x48 (P)
[   65.898272]  kunit_try_run_case+0x170/0x3f0
[   65.898671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.899183]  kthread+0x328/0x630
[   65.899499]  ret_from_fork+0x10/0x20
[   65.899844] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   65.847863] WARNING: CPU: 0 PID: 696 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   65.848562] Modules linked in:
[   65.848879] CPU: 0 UID: 0 PID: 696 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc3 #1 PREEMPT 
[   65.849793] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   65.850252] Hardware name: Radxa ROCK Pi 4B (DT)
[   65.850683] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   65.851328] pc : intlog2+0xd8/0xf8
[   65.851665] lr : intlog2_test+0xe4/0x200
[   65.852047] sp : ffff80008a1c7c10
[   65.852362] x29: ffff80008a1c7c90 x28: 0000000000000000 x27: 0000000000000000
[   65.853051] x26: 1fffe00001932141 x25: 0000000000000000 x24: ffff80008a1c7ce0
[   65.853736] x23: ffff80008a1c7d00 x22: 0000000000000000 x21: 1ffff00011438f82
[   65.854423] x20: ffff800083cc3740 x19: ffff800087cd7990 x18: 0000000031be129e
[   65.855113] x17: 0000000000000001 x16: ffff0000d16d2f60 x15: ffff000000d98420
[   65.855800] x14: 00000000000c8000 x13: ffff800085ba7700 x12: ffff700010f61161
[   65.856488] x11: 1ffff00010f61160 x10: ffff700010f61160 x9 : ffff80008120d80c
[   65.857175] x8 : ffff800087b08b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   65.857862] x5 : ffff700011438f82 x4 : 1ffff00010f9af3a x3 : 1ffff000107986e8
[   65.858549] x2 : 1ffff000107986e8 x1 : 0000000000000003 x0 : 0000000000000000
[   65.859235] Call trace:
[   65.859475]  intlog2+0xd8/0xf8 (P)
[   65.859817]  kunit_try_run_case+0x170/0x3f0
[   65.860229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.860756]  kthread+0x328/0x630
[   65.861087]  ret_from_fork+0x10/0x20
[   65.861445] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/uboot-action
(no logs available)
Failure - lava/uboot-commands
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
[   65.390735] Internal error: Oops: 0000000096000005 [#1]  SMP
[   65.391250] Modules linked in:
[   65.391551] CPU: 4 UID: 0 PID: 590 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   65.392450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.392833] Hardware name: Radxa ROCK Pi 4B (DT)
[   65.393253] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   65.393884] pc : kunit_test_null_dereference+0x70/0x170
[   65.394373] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.394913] sp : ffff80008a287d30
[   65.395219] x29: ffff80008a287d90 x28: 0000000000000000 x27: 0000000000000000
[   65.395886] x26: 1fffe000003645c1 x25: 0000000000000000 x24: 0000000000000004
[   65.396550] x23: ffff000001b22e0c x22: ffff8000811fabe8 x21: ffff0000022e2588
[   65.397215] x20: 1ffff00011450fa6 x19: ffff800087cd7990 x18: 0000000014195029
[   65.397878] x17: 000000040044ffff x16: 00500074b5503510 x15: 0000000000000000
[   65.398541] x14: ffff000000f0d100 x13: ffff80004bbb1000 x12: ffff60000175c8b4
[   65.399204] x11: 1fffe0000175c8b3 x10: ffff60000175c8b3 x9 : ffff8000811f2050
[   65.399865] x8 : ffff80008a287c38 x7 : 0000000000000000 x6 : 0000000041b58ab3
[   65.400528] x5 : ffff700011450fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   65.401190] x2 : dfff800000000000 x1 : ffff00000bae3cc0 x0 : ffff800087cd7990
[   65.401853] Call trace:
[   65.402085]  kunit_test_null_dereference+0x70/0x170 (P)
[   65.402571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.403081]  kthread+0x328/0x630
[   65.403396]  ret_from_fork+0x10/0x20
[   65.403745] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   65.404293] ---[ end trace 0000000000000000 ]---