Hay
Date
June 8, 2025, 11:09 p.m.
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   38.175154] ==================================================================
[   38.185784] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.192900] Free of addr ffff000800e14000 by task kunit_try_catch/286
[   38.199322] 
[   38.200809] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   38.200867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.200883] Hardware name: WinLink E850-96 board (DT)
[   38.200904] Call trace:
[   38.200919]  show_stack+0x20/0x38 (C)
[   38.200956]  dump_stack_lvl+0x8c/0xd0
[   38.200993]  print_report+0x118/0x608
[   38.201030]  kasan_report_invalid_free+0xc0/0xe8
[   38.201068]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.201107]  mempool_free+0x24c/0x328
[   38.201139]  mempool_double_free_helper+0x150/0x2e8
[   38.201172]  mempool_page_alloc_double_free+0xbc/0x118
[   38.201209]  kunit_try_run_case+0x170/0x3f0
[   38.201250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.201287]  kthread+0x328/0x630
[   38.201316]  ret_from_fork+0x10/0x20
[   38.201353] 
[   38.274235] The buggy address belongs to the physical page:
[   38.279794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14
[   38.287777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.294298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.302017] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.309739] page dumped because: kasan: bad access detected
[   38.315291] 
[   38.316767] Memory state around the buggy address:
[   38.321549]  ffff000800e13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.328750]  ffff000800e13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.335956] >ffff000800e14000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.343156]                    ^
[   38.346371]  ffff000800e14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.353576]  ffff000800e14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.360778] ==================================================================
[   37.937870] ==================================================================
[   37.947941] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.955057] Free of addr ffff000806390000 by task kunit_try_catch/284
[   37.961479] 
[   37.962965] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   37.963021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.963038] Hardware name: WinLink E850-96 board (DT)
[   37.963062] Call trace:
[   37.963075]  show_stack+0x20/0x38 (C)
[   37.963111]  dump_stack_lvl+0x8c/0xd0
[   37.963146]  print_report+0x118/0x608
[   37.963185]  kasan_report_invalid_free+0xc0/0xe8
[   37.963222]  __kasan_mempool_poison_object+0x14c/0x150
[   37.963259]  mempool_free+0x28c/0x328
[   37.963291]  mempool_double_free_helper+0x150/0x2e8
[   37.963324]  mempool_kmalloc_large_double_free+0xc0/0x118
[   37.963359]  kunit_try_run_case+0x170/0x3f0
[   37.963394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.963432]  kthread+0x328/0x630
[   37.963460]  ret_from_fork+0x10/0x20
[   37.963492] 
[   38.036913] The buggy address belongs to the physical page:
[   38.042470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886390
[   38.050455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.058093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.065035] page_type: f8(unknown)
[   38.068434] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.076153] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.083880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.091690] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.099504] head: 0bfffe0000000002 fffffdffe018e401 00000000ffffffff 00000000ffffffff
[   38.107315] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.115121] page dumped because: kasan: bad access detected
[   38.120676] 
[   38.122152] Memory state around the buggy address:
[   38.126937]  ffff00080638ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.134135]  ffff00080638ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.141341] >ffff000806390000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.148540]                    ^
[   38.151756]  ffff000806390080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.158961]  ffff000806390100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.166163] ==================================================================
[   37.564296] ==================================================================
[   37.573900] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.581016] Free of addr ffff000802ca6800 by task kunit_try_catch/282
[   37.587439] 
[   37.588925] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   37.588983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.589002] Hardware name: WinLink E850-96 board (DT)
[   37.589023] Call trace:
[   37.589039]  show_stack+0x20/0x38 (C)
[   37.589079]  dump_stack_lvl+0x8c/0xd0
[   37.589116]  print_report+0x118/0x608
[   37.589154]  kasan_report_invalid_free+0xc0/0xe8
[   37.589193]  check_slab_allocation+0xd4/0x108
[   37.589229]  __kasan_mempool_poison_object+0x78/0x150
[   37.589266]  mempool_free+0x28c/0x328
[   37.589297]  mempool_double_free_helper+0x150/0x2e8
[   37.589333]  mempool_kmalloc_double_free+0xc0/0x118
[   37.589367]  kunit_try_run_case+0x170/0x3f0
[   37.589406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.589444]  kthread+0x328/0x630
[   37.589473]  ret_from_fork+0x10/0x20
[   37.589506] 
[   37.666605] Allocated by task 282:
[   37.669992]  kasan_save_stack+0x3c/0x68
[   37.673808]  kasan_save_track+0x20/0x40
[   37.677628]  kasan_save_alloc_info+0x40/0x58
[   37.681881]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.687177]  remove_element+0x130/0x1f8
[   37.690995]  mempool_alloc_preallocated+0x58/0xc0
[   37.695682]  mempool_double_free_helper+0x94/0x2e8
[   37.700457]  mempool_kmalloc_double_free+0xc0/0x118
[   37.705318]  kunit_try_run_case+0x170/0x3f0
[   37.709485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.714953]  kthread+0x328/0x630
[   37.718165]  ret_from_fork+0x10/0x20
[   37.721724] 
[   37.723201] Freed by task 282:
[   37.726237]  kasan_save_stack+0x3c/0x68
[   37.730057]  kasan_save_track+0x20/0x40
[   37.733876]  kasan_save_free_info+0x4c/0x78
[   37.738043]  __kasan_mempool_poison_object+0xc0/0x150
[   37.743079]  mempool_free+0x28c/0x328
[   37.746724]  mempool_double_free_helper+0x100/0x2e8
[   37.751585]  mempool_kmalloc_double_free+0xc0/0x118
[   37.756445]  kunit_try_run_case+0x170/0x3f0
[   37.760612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.766081]  kthread+0x328/0x630
[   37.769293]  ret_from_fork+0x10/0x20
[   37.772852] 
[   37.774329] The buggy address belongs to the object at ffff000802ca6800
[   37.774329]  which belongs to the cache kmalloc-128 of size 128
[   37.786830] The buggy address is located 0 bytes inside of
[   37.786830]  128-byte region [ffff000802ca6800, ffff000802ca6880)
[   37.798372] 
[   37.799852] The buggy address belongs to the physical page:
[   37.805408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882ca6
[   37.813392] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.821031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.827974] page_type: f5(slab)
[   37.831112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.838830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.846558] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.854367] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.862181] head: 0bfffe0000000001 fffffdffe00b2981 00000000ffffffff 00000000ffffffff
[   37.869992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.877798] page dumped because: kasan: bad access detected
[   37.883353] 
[   37.884829] Memory state around the buggy address:
[   37.889611]  ffff000802ca6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.896813]  ffff000802ca6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.904018] >ffff000802ca6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.911218]                    ^
[   37.914433]  ffff000802ca6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.921638]  ffff000802ca6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.928840] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
[  163.861987] Internal error: Oops: 0000000096000005 [#1]  SMP
[  163.867593] Modules linked in:
[  163.870638] CPU: 4 UID: 0 PID: 627 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[  163.880529] Tainted: [B]=BAD_PAGE, [N]=TEST
[  163.884690] Hardware name: WinLink E850-96 board (DT)
[  163.889726] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  163.896667] pc : kunit_test_null_dereference+0x70/0x170
[  163.901874] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  163.907690] sp : ffff80008a8d7d30
[  163.910988] x29: ffff80008a8d7d90 x28: 0000000000000000 x27: 0000000000000000
[  163.918106] x26: 1fffe001002ee8a1 x25: 0000000000000000 x24: 0000000000000004
[  163.925224] x23: ffff00080177450c x22: ffff8000812578b8 x21: ffff000808427588
[  163.932342] x20: 1ffff0001151afa6 x19: ffff800087d67990 x18: ffff800087d67b00
[  163.939459] x17: 0000000000000001 x16: ffff00085af9cd28 x15: ffff80008124b61c
[  163.946578] x14: ffff8000808ed1d4 x13: 1fffe0010b5f3989 x12: ffff6001002c7b3c
[  163.953696] x11: 1fffe001002c7b3b x10: ffff6001002c7b3b x9 : ffff80008124ed20
[  163.960814] x8 : ffff80008a8d7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  163.967932] x5 : ffff70001151afa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  163.975050] x2 : dfff800000000000 x1 : ffff00080163d100 x0 : ffff800087d67990
[  163.982171] Call trace:
[  163.984602]  kunit_test_null_dereference+0x70/0x170 (P)
[  163.989808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  163.995275]  kthread+0x328/0x630
[  163.998487]  ret_from_fork+0x10/0x20
[  164.002061] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  164.008127] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  101.043712] ==================================================================
[  101.043851] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[  101.043851] 
[  101.043993] Use-after-free read at 0x(____ptrval____) (in kfence-#203):
[  101.044104]  test_krealloc+0x51c/0x830
[  101.047250]  kunit_try_run_case+0x170/0x3f0
[  101.051417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.056885]  kthread+0x328/0x630
[  101.060097]  ret_from_fork+0x10/0x20
[  101.063656] 
[  101.065134] kfence-#203: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[  101.065134] 
[  101.074773] allocated by task 384 on cpu 0 at 101.043620s (0.031149s ago):
[  101.081644]  test_alloc+0x29c/0x628
[  101.085098]  test_krealloc+0xc0/0x830
[  101.088743]  kunit_try_run_case+0x170/0x3f0
[  101.092909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.098378]  kthread+0x328/0x630
[  101.101590]  ret_from_fork+0x10/0x20
[  101.105150] 
[  101.106626] freed by task 384 on cpu 0 at 101.043649s (0.062975s ago):
[  101.113150]  krealloc_noprof+0x148/0x360
[  101.117041]  test_krealloc+0x1dc/0x830
[  101.120773]  kunit_try_run_case+0x170/0x3f0
[  101.124940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.130409]  kthread+0x328/0x630
[  101.133620]  ret_from_fork+0x10/0x20
[  101.137181] 
[  101.138666] CPU: 0 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[  101.148565] Tainted: [B]=BAD_PAGE, [N]=TEST
[  101.152720] Hardware name: WinLink E850-96 board (DT)
[  101.157755] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  100.819506] ==================================================================
[  100.819654] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[  100.819654] 
[  100.819821] Use-after-free read at 0x(____ptrval____) (in kfence-#201):
[  100.820707]  test_memcache_typesafe_by_rcu+0x280/0x560
[  100.825829]  kunit_try_run_case+0x170/0x3f0
[  100.829995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  100.835464]  kthread+0x328/0x630
[  100.838676]  ret_from_fork+0x10/0x20
[  100.842235] 
[  100.843714] kfence-#201: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[  100.843714] 
[  100.852831] allocated by task 382 on cpu 1 at 100.783688s (0.069139s ago):
[  100.859702]  test_alloc+0x230/0x628
[  100.863156]  test_memcache_typesafe_by_rcu+0x15c/0x560
[  100.868276]  kunit_try_run_case+0x170/0x3f0
[  100.872443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  100.877911]  kthread+0x328/0x630
[  100.881123]  ret_from_fork+0x10/0x20
[  100.884684] 
[  100.886162] freed by task 382 on cpu 1 at 100.783702s (0.102455s ago):
[  100.892681]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[  100.897789]  kunit_try_run_case+0x170/0x3f0
[  100.901956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  100.907425]  kthread+0x328/0x630
[  100.910637]  ret_from_fork+0x10/0x20
[  100.914197] 
[  100.915683] CPU: 1 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[  100.925580] Tainted: [B]=BAD_PAGE, [N]=TEST
[  100.929735] Hardware name: WinLink E850-96 board (DT)
[  100.934773] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   77.291050] ==================================================================
[   77.291245] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   77.291245] 
[   77.291405] Invalid read at 0x(____ptrval____):
[   77.292563]  test_invalid_access+0xdc/0x1f0
[   77.296704]  kunit_try_run_case+0x170/0x3f0
[   77.300885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.306338]  kthread+0x328/0x630
[   77.309551]  ret_from_fork+0x10/0x20
[   77.313107] 
[   77.314568] CPU: 7 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   77.324495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.328649] Hardware name: WinLink E850-96 board (DT)
[   77.333690] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   76.943680] ==================================================================
[   76.943822] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   76.943822] 
[   76.943969] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#196):
[   76.947655]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   76.952862]  kunit_try_run_case+0x170/0x3f0
[   76.957028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.962497]  kthread+0x328/0x630
[   76.965709]  ret_from_fork+0x10/0x20
[   76.969267] 
[   76.970746] kfence-#196: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   76.970746] 
[   76.980382] allocated by task 372 on cpu 0 at 76.943604s (0.036776s ago):
[   76.987166]  test_alloc+0x29c/0x628
[   76.990621]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   76.995743]  kunit_try_run_case+0x170/0x3f0
[   76.999909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.005378]  kthread+0x328/0x630
[   77.008590]  ret_from_fork+0x10/0x20
[   77.012149] 
[   77.013627] freed by task 372 on cpu 0 at 76.943621s (0.070002s ago):
[   77.020065]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   77.025256]  kunit_try_run_case+0x170/0x3f0
[   77.029423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   77.034891]  kthread+0x328/0x630
[   77.038103]  ret_from_fork+0x10/0x20
[   77.041664] 
[   77.043149] CPU: 0 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   77.053046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.057203] Hardware name: WinLink E850-96 board (DT)
[   77.062238] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   76.319666] ==================================================================
[   76.319806] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   76.319806] 
[   76.319970] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#190):
[   76.321642]  test_kmalloc_aligned_oob_read+0x238/0x468
[   76.326762]  kunit_try_run_case+0x170/0x3f0
[   76.330929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.336397]  kthread+0x328/0x630
[   76.339609]  ret_from_fork+0x10/0x20
[   76.343168] 
[   76.344646] kfence-#190: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   76.344646] 
[   76.354282] allocated by task 370 on cpu 4 at 76.319628s (0.034652s ago):
[   76.361068]  test_alloc+0x29c/0x628
[   76.364522]  test_kmalloc_aligned_oob_read+0x100/0x468
[   76.369644]  kunit_try_run_case+0x170/0x3f0
[   76.373810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.379279]  kthread+0x328/0x630
[   76.382490]  ret_from_fork+0x10/0x20
[   76.386051] 
[   76.387536] CPU: 4 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   76.397429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.401590] Hardware name: WinLink E850-96 board (DT)
[   76.406626] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   71.091675] ==================================================================
[   71.091817] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   71.091817] 
[   71.091950] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#140):
[   71.094347]  test_corruption+0x120/0x378
[   71.098253]  kunit_try_run_case+0x170/0x3f0
[   71.102419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.107888]  kthread+0x328/0x630
[   71.111100]  ret_from_fork+0x10/0x20
[   71.114659] 
[   71.116138] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.116138] 
[   71.125252] allocated by task 360 on cpu 0 at 71.091600s (0.033650s ago):
[   71.132034]  test_alloc+0x230/0x628
[   71.135492]  test_corruption+0xdc/0x378
[   71.139311]  kunit_try_run_case+0x170/0x3f0
[   71.143478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.148947]  kthread+0x328/0x630
[   71.152158]  ret_from_fork+0x10/0x20
[   71.155718] 
[   71.157194] freed by task 360 on cpu 0 at 71.091616s (0.065575s ago):
[   71.163632]  test_corruption+0x120/0x378
[   71.167522]  kunit_try_run_case+0x170/0x3f0
[   71.171689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.177158]  kthread+0x328/0x630
[   71.180369]  ret_from_fork+0x10/0x20
[   71.183930] 
[   71.185416] CPU: 0 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   71.195312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.199468] Hardware name: WinLink E850-96 board (DT)
[   71.204504] ==================================================================
[   70.543666] ==================================================================
[   70.543800] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   70.543800] 
[   70.543935] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#135):
[   70.546331]  test_corruption+0x278/0x378
[   70.550236]  kunit_try_run_case+0x170/0x3f0
[   70.554403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.559872]  kthread+0x328/0x630
[   70.563083]  ret_from_fork+0x10/0x20
[   70.566642] 
[   70.568121] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.568121] 
[   70.577755] allocated by task 358 on cpu 7 at 70.543596s (0.034157s ago):
[   70.584538]  test_alloc+0x29c/0x628
[   70.587996]  test_corruption+0xdc/0x378
[   70.591816]  kunit_try_run_case+0x170/0x3f0
[   70.595983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.601451]  kthread+0x328/0x630
[   70.604662]  ret_from_fork+0x10/0x20
[   70.608223] 
[   70.609699] freed by task 358 on cpu 7 at 70.543611s (0.066087s ago):
[   70.616138]  test_corruption+0x278/0x378
[   70.620027]  kunit_try_run_case+0x170/0x3f0
[   70.624193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.629662]  kthread+0x328/0x630
[   70.632874]  ret_from_fork+0x10/0x20
[   70.636434] 
[   70.637921] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   70.647816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.651974] Hardware name: WinLink E850-96 board (DT)
[   70.657009] ==================================================================
[   71.315705] ==================================================================
[   71.315842] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   71.315842] 
[   71.315974] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#142):
[   71.316133]  test_corruption+0x1d8/0x378
[   71.319674]  kunit_try_run_case+0x170/0x3f0
[   71.323840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.329309]  kthread+0x328/0x630
[   71.332521]  ret_from_fork+0x10/0x20
[   71.336080] 
[   71.337558] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.337558] 
[   71.346674] allocated by task 360 on cpu 0 at 71.315631s (0.031040s ago):
[   71.353454]  test_alloc+0x230/0x628
[   71.356913]  test_corruption+0x198/0x378
[   71.360819]  kunit_try_run_case+0x170/0x3f0
[   71.364986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.370455]  kthread+0x328/0x630
[   71.373667]  ret_from_fork+0x10/0x20
[   71.377227] 
[   71.378703] freed by task 360 on cpu 0 at 71.315646s (0.063054s ago):
[   71.385140]  test_corruption+0x1d8/0x378
[   71.389031]  kunit_try_run_case+0x170/0x3f0
[   71.393197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.398666]  kthread+0x328/0x630
[   71.401878]  ret_from_fork+0x10/0x20
[   71.405438] 
[   71.406924] CPU: 0 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   71.416818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.420976] Hardware name: WinLink E850-96 board (DT)
[   71.426013] ==================================================================
[   70.767665] ==================================================================
[   70.767787] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   70.767787] 
[   70.767917] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#137):
[   70.768073]  test_corruption+0x284/0x378
[   70.771620]  kunit_try_run_case+0x170/0x3f0
[   70.775787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.781256]  kthread+0x328/0x630
[   70.784467]  ret_from_fork+0x10/0x20
[   70.788026] 
[   70.789505] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.789505] 
[   70.799139] allocated by task 358 on cpu 7 at 70.767603s (0.031534s ago):
[   70.805923]  test_alloc+0x29c/0x628
[   70.809382]  test_corruption+0x198/0x378
[   70.813286]  kunit_try_run_case+0x170/0x3f0
[   70.817453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.822922]  kthread+0x328/0x630
[   70.826133]  ret_from_fork+0x10/0x20
[   70.829694] 
[   70.831172] freed by task 358 on cpu 7 at 70.767619s (0.063549s ago):
[   70.837605]  test_corruption+0x284/0x378
[   70.841498]  kunit_try_run_case+0x170/0x3f0
[   70.845664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.851133]  kthread+0x328/0x630
[   70.854345]  ret_from_fork+0x10/0x20
[   70.857904] 
[   70.859390] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   70.869283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.873443] Hardware name: WinLink E850-96 board (DT)
[   70.878479] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   69.919687] ==================================================================
[   69.919830] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   69.919830] 
[   69.919962] Invalid free of 0x(____ptrval____) (in kfence-#129):
[   69.920066]  test_invalid_addr_free+0x1ac/0x238
[   69.923573]  kunit_try_run_case+0x170/0x3f0
[   69.927740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.933208]  kthread+0x328/0x630
[   69.936420]  ret_from_fork+0x10/0x20
[   69.939979] 
[   69.941458] kfence-#129: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.941458] 
[   69.951096] allocated by task 354 on cpu 0 at 69.919631s (0.031460s ago):
[   69.957876]  test_alloc+0x29c/0x628
[   69.961333]  test_invalid_addr_free+0xd4/0x238
[   69.965760]  kunit_try_run_case+0x170/0x3f0
[   69.969926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.975395]  kthread+0x328/0x630
[   69.978607]  ret_from_fork+0x10/0x20
[   69.982168] 
[   69.983652] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   69.993550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.997705] Hardware name: WinLink E850-96 board (DT)
[   70.002742] ==================================================================
[   70.127662] ==================================================================
[   70.127796] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   70.127796] 
[   70.127936] Invalid free of 0x(____ptrval____) (in kfence-#131):
[   70.128036]  test_invalid_addr_free+0xec/0x238
[   70.131367]  kunit_try_run_case+0x170/0x3f0
[   70.135534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.141002]  kthread+0x328/0x630
[   70.144214]  ret_from_fork+0x10/0x20
[   70.147774] 
[   70.149252] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.149252] 
[   70.158365] allocated by task 356 on cpu 1 at 70.127606s (0.030757s ago):
[   70.165150]  test_alloc+0x230/0x628
[   70.168606]  test_invalid_addr_free+0xd4/0x238
[   70.173033]  kunit_try_run_case+0x170/0x3f0
[   70.177200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.182668]  kthread+0x328/0x630
[   70.185880]  ret_from_fork+0x10/0x20
[   70.189441] 
[   70.190926] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   70.200824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.204978] Hardware name: WinLink E850-96 board (DT)
[   70.210016] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   69.479698] ==================================================================
[   69.479827] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   69.479827] 
[   69.479957] Invalid free of 0x(____ptrval____) (in kfence-#125):
[   69.480057]  test_double_free+0x1bc/0x238
[   69.482531]  kunit_try_run_case+0x170/0x3f0
[   69.486697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.492166]  kthread+0x328/0x630
[   69.495378]  ret_from_fork+0x10/0x20
[   69.498937] 
[   69.500417] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.500417] 
[   69.510051] allocated by task 350 on cpu 7 at 69.479620s (0.030429s ago):
[   69.516837]  test_alloc+0x29c/0x628
[   69.520290]  test_double_free+0xd4/0x238
[   69.524197]  kunit_try_run_case+0x170/0x3f0
[   69.528364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.533832]  kthread+0x328/0x630
[   69.537046]  ret_from_fork+0x10/0x20
[   69.540605] 
[   69.542081] freed by task 350 on cpu 7 at 69.479637s (0.062442s ago):
[   69.548519]  test_double_free+0x1ac/0x238
[   69.552496]  kunit_try_run_case+0x170/0x3f0
[   69.556662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.562131]  kthread+0x328/0x630
[   69.565342]  ret_from_fork+0x10/0x20
[   69.568903] 
[   69.570388] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   69.580285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.584442] Hardware name: WinLink E850-96 board (DT)
[   69.589478] ==================================================================
[   69.699697] ==================================================================
[   69.699835] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   69.699835] 
[   69.699962] Invalid free of 0x(____ptrval____) (in kfence-#127):
[   69.700065]  test_double_free+0x100/0x238
[   69.702538]  kunit_try_run_case+0x170/0x3f0
[   69.706705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.712174]  kthread+0x328/0x630
[   69.715386]  ret_from_fork+0x10/0x20
[   69.718944] 
[   69.720424] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.720424] 
[   69.729538] allocated by task 352 on cpu 0 at 69.699616s (0.029920s ago):
[   69.736319]  test_alloc+0x230/0x628
[   69.739777]  test_double_free+0xd4/0x238
[   69.743684]  kunit_try_run_case+0x170/0x3f0
[   69.747852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.753319]  kthread+0x328/0x630
[   69.756531]  ret_from_fork+0x10/0x20
[   69.760091] 
[   69.761568] freed by task 352 on cpu 0 at 69.699632s (0.061931s ago):
[   69.768006]  test_double_free+0xf0/0x238
[   69.771895]  kunit_try_run_case+0x170/0x3f0
[   69.776062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.781530]  kthread+0x328/0x630
[   69.784742]  ret_from_fork+0x10/0x20
[   69.788303] 
[   69.789788] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   69.799685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.803840] Hardware name: WinLink E850-96 board (DT)
[   69.808878] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   68.823656] ==================================================================
[   68.823793] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   68.823793] 
[   68.823953] Use-after-free read at 0x(____ptrval____) (in kfence-#119):
[   68.824415]  test_use_after_free_read+0x114/0x248
[   68.829103]  kunit_try_run_case+0x170/0x3f0
[   68.833269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.838738]  kthread+0x328/0x630
[   68.841950]  ret_from_fork+0x10/0x20
[   68.845509] 
[   68.846986] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.846986] 
[   68.856626] allocated by task 342 on cpu 1 at 68.823603s (0.033018s ago):
[   68.863408]  test_alloc+0x29c/0x628
[   68.866863]  test_use_after_free_read+0xd0/0x248
[   68.871463]  kunit_try_run_case+0x170/0x3f0
[   68.875631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.881098]  kthread+0x328/0x630
[   68.884310]  ret_from_fork+0x10/0x20
[   68.887871] 
[   68.889351] freed by task 342 on cpu 1 at 68.823618s (0.065728s ago):
[   68.895788]  test_use_after_free_read+0x1c0/0x248
[   68.900456]  kunit_try_run_case+0x170/0x3f0
[   68.904623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.910091]  kthread+0x328/0x630
[   68.913303]  ret_from_fork+0x10/0x20
[   68.916863] 
[   68.918348] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   68.928247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.932401] Hardware name: WinLink E850-96 board (DT)
[   68.937438] ==================================================================
[   69.047663] ==================================================================
[   69.047785] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   69.047785] 
[   69.047942] Use-after-free read at 0x(____ptrval____) (in kfence-#121):
[   69.048409]  test_use_after_free_read+0x114/0x248
[   69.053097]  kunit_try_run_case+0x170/0x3f0
[   69.057263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.062732]  kthread+0x328/0x630
[   69.065944]  ret_from_fork+0x10/0x20
[   69.069503] 
[   69.070982] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.070982] 
[   69.080095] allocated by task 344 on cpu 7 at 69.047609s (0.032484s ago):
[   69.086882]  test_alloc+0x230/0x628
[   69.090337]  test_use_after_free_read+0xd0/0x248
[   69.094936]  kunit_try_run_case+0x170/0x3f0
[   69.099103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.104572]  kthread+0x328/0x630
[   69.107784]  ret_from_fork+0x10/0x20
[   69.111344] 
[   69.112822] freed by task 344 on cpu 7 at 69.047624s (0.065194s ago):
[   69.119262]  test_use_after_free_read+0xf0/0x248
[   69.123842]  kunit_try_run_case+0x170/0x3f0
[   69.128009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.133477]  kthread+0x328/0x630
[   69.136689]  ret_from_fork+0x10/0x20
[   69.140250] 
[   69.141734] CPU: 7 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   69.151633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.155787] Hardware name: WinLink E850-96 board (DT)
[   69.160824] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   68.407632] ==================================================================
[   68.407764] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.407764] 
[   68.407920] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#115):
[   68.409081]  test_out_of_bounds_write+0x100/0x240
[   68.413768]  kunit_try_run_case+0x170/0x3f0
[   68.417934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.423403]  kthread+0x328/0x630
[   68.426615]  ret_from_fork+0x10/0x20
[   68.430173] 
[   68.431653] kfence-#115: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.431653] 
[   68.441288] allocated by task 338 on cpu 7 at 68.407597s (0.033689s ago):
[   68.448074]  test_alloc+0x29c/0x628
[   68.451527]  test_out_of_bounds_write+0xc8/0x240
[   68.456128]  kunit_try_run_case+0x170/0x3f0
[   68.460295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.465764]  kthread+0x328/0x630
[   68.468975]  ret_from_fork+0x10/0x20
[   68.472536] 
[   68.474021] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   68.483919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.488074] Hardware name: WinLink E850-96 board (DT)
[   68.493111] ==================================================================
[   68.615629] ==================================================================
[   68.615762] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.615762] 
[   68.615916] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#117):
[   68.617078]  test_out_of_bounds_write+0x100/0x240
[   68.621764]  kunit_try_run_case+0x170/0x3f0
[   68.625931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.631399]  kthread+0x328/0x630
[   68.634611]  ret_from_fork+0x10/0x20
[   68.638170] 
[   68.639649] kfence-#117: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.639649] 
[   68.648763] allocated by task 340 on cpu 1 at 68.615595s (0.033166s ago):
[   68.655549]  test_alloc+0x230/0x628
[   68.659003]  test_out_of_bounds_write+0xc8/0x240
[   68.663603]  kunit_try_run_case+0x170/0x3f0
[   68.667770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.673239]  kthread+0x328/0x630
[   68.676452]  ret_from_fork+0x10/0x20
[   68.680011] 
[   68.681495] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   68.691392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.695549] Hardware name: WinLink E850-96 board (DT)
[   68.700586] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   67.887650] ==================================================================
[   67.887794] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.887794] 
[   67.887953] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#110):
[   67.888851]  test_out_of_bounds_read+0x114/0x3e0
[   67.893450]  kunit_try_run_case+0x170/0x3f0
[   67.897617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.903085]  kthread+0x328/0x630
[   67.906297]  ret_from_fork+0x10/0x20
[   67.909856] 
[   67.911335] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.911335] 
[   67.920450] allocated by task 336 on cpu 0 at 67.887614s (0.032833s ago):
[   67.927237]  test_alloc+0x230/0x628
[   67.930689]  test_out_of_bounds_read+0xdc/0x3e0
[   67.935203]  kunit_try_run_case+0x170/0x3f0
[   67.939370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.944838]  kthread+0x328/0x630
[   67.948050]  ret_from_fork+0x10/0x20
[   67.951610] 
[   67.953096] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   67.962993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.967148] Hardware name: WinLink E850-96 board (DT)
[   67.972185] ==================================================================
[   67.575681] ==================================================================
[   67.575804] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   67.575804] 
[   67.575962] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#107):
[   67.577036]  test_out_of_bounds_read+0x1c8/0x3e0
[   67.581634]  kunit_try_run_case+0x170/0x3f0
[   67.585801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.591269]  kthread+0x328/0x630
[   67.594482]  ret_from_fork+0x10/0x20
[   67.598041] 
[   67.599520] kfence-#107: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.599520] 
[   67.609155] allocated by task 334 on cpu 7 at 67.575648s (0.033505s ago):
[   67.615940]  test_alloc+0x29c/0x628
[   67.619394]  test_out_of_bounds_read+0x198/0x3e0
[   67.623995]  kunit_try_run_case+0x170/0x3f0
[   67.628162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.633630]  kthread+0x328/0x630
[   67.636842]  ret_from_fork+0x10/0x20
[   67.640401] 
[   67.641888] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   67.651786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.655940] Hardware name: WinLink E850-96 board (DT)
[   67.660978] ==================================================================
[   67.263642] ==================================================================
[   67.263768] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.263768] 
[   67.263922] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#104):
[   67.264827]  test_out_of_bounds_read+0x114/0x3e0
[   67.269426]  kunit_try_run_case+0x170/0x3f0
[   67.273593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.279061]  kthread+0x328/0x630
[   67.282273]  ret_from_fork+0x10/0x20
[   67.285832] 
[   67.287311] kfence-#104: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.287311] 
[   67.296949] allocated by task 334 on cpu 7 at 67.263604s (0.033340s ago):
[   67.303733]  test_alloc+0x29c/0x628
[   67.307186]  test_out_of_bounds_read+0xdc/0x3e0
[   67.311700]  kunit_try_run_case+0x170/0x3f0
[   67.315866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.321335]  kthread+0x328/0x630
[   67.324547]  ret_from_fork+0x10/0x20
[   67.328107] 
[   67.329592] CPU: 7 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   67.339490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.343646] Hardware name: WinLink E850-96 board (DT)
[   67.348682] ==================================================================
[   68.095636] ==================================================================
[   68.095758] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   68.095758] 
[   68.095909] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#112):
[   68.096990]  test_out_of_bounds_read+0x1c8/0x3e0
[   68.101589]  kunit_try_run_case+0x170/0x3f0
[   68.105756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.111225]  kthread+0x328/0x630
[   68.114436]  ret_from_fork+0x10/0x20
[   68.117995] 
[   68.119474] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.119474] 
[   68.128591] allocated by task 336 on cpu 0 at 68.095604s (0.032983s ago):
[   68.135374]  test_alloc+0x230/0x628
[   68.138828]  test_out_of_bounds_read+0x198/0x3e0
[   68.143431]  kunit_try_run_case+0x170/0x3f0
[   68.147596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.153064]  kthread+0x328/0x630
[   68.156276]  ret_from_fork+0x10/0x20
[   68.159835] 
[   68.161321] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   68.171214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.175374] Hardware name: WinLink E850-96 board (DT)
[   68.180411] ==================================================================
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   20.700290] ==================================================================
[   20.723231] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   20.723231] 
[   20.732777] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#38):
[   20.742153]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.747360]  kunit_try_run_case+0x170/0x3f0
[   20.751527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.756996]  kthread+0x328/0x630
[   20.760207]  ret_from_fork+0x10/0x20
[   20.763766] 
[   20.765245] kfence-#38: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   20.765245] 
[   20.774970] allocated by task 189 on cpu 5 at 20.699953s (0.075012s ago):
[   20.781752]  kmalloc_track_caller_oob_right+0x184/0x488
[   20.786943]  kunit_try_run_case+0x170/0x3f0
[   20.791109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.796578]  kthread+0x328/0x630
[   20.799792]  ret_from_fork+0x10/0x20
[   20.803351] 
[   20.804827] freed by task 189 on cpu 5 at 20.700253s (0.104571s ago):
[   20.811267]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.816457]  kunit_try_run_case+0x170/0x3f0
[   20.820623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826092]  kthread+0x328/0x630
[   20.829303]  ret_from_fork+0x10/0x20
[   20.832864] 
[   20.834347] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.844243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.848402] Hardware name: WinLink E850-96 board (DT)
[   20.853438] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   66.442063] ==================================================================
[   66.449163] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   66.456015] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   66.463567] 
[   66.465051] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   66.465107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.465123] Hardware name: WinLink E850-96 board (DT)
[   66.465145] Call trace:
[   66.465159]  show_stack+0x20/0x38 (C)
[   66.465195]  dump_stack_lvl+0x8c/0xd0
[   66.465230]  print_report+0x118/0x608
[   66.465267]  kasan_report+0xdc/0x128
[   66.465299]  kasan_check_range+0x100/0x1a8
[   66.465337]  __kasan_check_write+0x20/0x30
[   66.465368]  strncpy_from_user+0x3c/0x2a0
[   66.465405]  copy_user_test_oob+0x5c0/0xec8
[   66.465438]  kunit_try_run_case+0x170/0x3f0
[   66.465473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.465511]  kthread+0x328/0x630
[   66.465539]  ret_from_fork+0x10/0x20
[   66.465575] 
[   66.535267] Allocated by task 332:
[   66.538653]  kasan_save_stack+0x3c/0x68
[   66.542472]  kasan_save_track+0x20/0x40
[   66.546291]  kasan_save_alloc_info+0x40/0x58
[   66.550545]  __kasan_kmalloc+0xd4/0xd8
[   66.554277]  __kmalloc_noprof+0x198/0x4c8
[   66.558270]  kunit_kmalloc_array+0x34/0x88
[   66.562350]  copy_user_test_oob+0xac/0xec8
[   66.566430]  kunit_try_run_case+0x170/0x3f0
[   66.570596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.576065]  kthread+0x328/0x630
[   66.579277]  ret_from_fork+0x10/0x20
[   66.582836] 
[   66.584312] The buggy address belongs to the object at ffff000800db1a00
[   66.584312]  which belongs to the cache kmalloc-128 of size 128
[   66.596812] The buggy address is located 0 bytes inside of
[   66.596812]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   66.609224] 
[   66.610700] The buggy address belongs to the physical page:
[   66.616257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   66.624243] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.631882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.638825] page_type: f5(slab)
[   66.641961] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.649682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.657408] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.665220] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.673033] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   66.680845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.688650] page dumped because: kasan: bad access detected
[   66.694206] 
[   66.695681] Memory state around the buggy address:
[   66.700461]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.707665]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.714869] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.722070]                                                                 ^
[   66.729192]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.736396]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.743598] ==================================================================
[   66.750997] ==================================================================
[   66.758013] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   66.764952] Write of size 1 at addr ffff000800db1a78 by task kunit_try_catch/332
[   66.772330] 
[   66.773812] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   66.773865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.773883] Hardware name: WinLink E850-96 board (DT)
[   66.773906] Call trace:
[   66.773923]  show_stack+0x20/0x38 (C)
[   66.773962]  dump_stack_lvl+0x8c/0xd0
[   66.774000]  print_report+0x118/0x608
[   66.774035]  kasan_report+0xdc/0x128
[   66.774069]  __asan_report_store1_noabort+0x20/0x30
[   66.774102]  strncpy_from_user+0x270/0x2a0
[   66.774139]  copy_user_test_oob+0x5c0/0xec8
[   66.774174]  kunit_try_run_case+0x170/0x3f0
[   66.774211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.774250]  kthread+0x328/0x630
[   66.774276]  ret_from_fork+0x10/0x20
[   66.774313] 
[   66.840818] Allocated by task 332:
[   66.844204]  kasan_save_stack+0x3c/0x68
[   66.848023]  kasan_save_track+0x20/0x40
[   66.851842]  kasan_save_alloc_info+0x40/0x58
[   66.856096]  __kasan_kmalloc+0xd4/0xd8
[   66.859828]  __kmalloc_noprof+0x198/0x4c8
[   66.863821]  kunit_kmalloc_array+0x34/0x88
[   66.867901]  copy_user_test_oob+0xac/0xec8
[   66.871981]  kunit_try_run_case+0x170/0x3f0
[   66.876147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.881616]  kthread+0x328/0x630
[   66.884828]  ret_from_fork+0x10/0x20
[   66.888387] 
[   66.889862] The buggy address belongs to the object at ffff000800db1a00
[   66.889862]  which belongs to the cache kmalloc-128 of size 128
[   66.902363] The buggy address is located 0 bytes to the right of
[   66.902363]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   66.915296] 
[   66.916774] The buggy address belongs to the physical page:
[   66.922328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   66.930313] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.937954] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.944898] page_type: f5(slab)
[   66.948030] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.955754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.963480] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.971291] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.979105] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   66.986917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.994722] page dumped because: kasan: bad access detected
[   67.000277] 
[   67.001753] Memory state around the buggy address:
[   67.006533]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.013736]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.020941] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   67.028142]                                                                 ^
[   67.035263]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.042468]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.049669] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   64.917628] ==================================================================
[   64.924535] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   64.931559] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   64.939024] 
[   64.940510] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   64.940571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.940590] Hardware name: WinLink E850-96 board (DT)
[   64.940612] Call trace:
[   64.940626]  show_stack+0x20/0x38 (C)
[   64.940665]  dump_stack_lvl+0x8c/0xd0
[   64.940703]  print_report+0x118/0x608
[   64.940739]  kasan_report+0xdc/0x128
[   64.940775]  kasan_check_range+0x100/0x1a8
[   64.940813]  __kasan_check_read+0x20/0x30
[   64.940843]  copy_user_test_oob+0x728/0xec8
[   64.940877]  kunit_try_run_case+0x170/0x3f0
[   64.940913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.940954]  kthread+0x328/0x630
[   64.940986]  ret_from_fork+0x10/0x20
[   64.941024] 
[   65.006646] Allocated by task 332:
[   65.010031]  kasan_save_stack+0x3c/0x68
[   65.013849]  kasan_save_track+0x20/0x40
[   65.017668]  kasan_save_alloc_info+0x40/0x58
[   65.021922]  __kasan_kmalloc+0xd4/0xd8
[   65.025656]  __kmalloc_noprof+0x198/0x4c8
[   65.029648]  kunit_kmalloc_array+0x34/0x88
[   65.033727]  copy_user_test_oob+0xac/0xec8
[   65.037807]  kunit_try_run_case+0x170/0x3f0
[   65.041974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.047442]  kthread+0x328/0x630
[   65.050654]  ret_from_fork+0x10/0x20
[   65.054213] 
[   65.055690] The buggy address belongs to the object at ffff000800db1a00
[   65.055690]  which belongs to the cache kmalloc-128 of size 128
[   65.068190] The buggy address is located 0 bytes inside of
[   65.068190]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.080602] 
[   65.082080] The buggy address belongs to the physical page:
[   65.087638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   65.095622] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.103260] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.110202] page_type: f5(slab)
[   65.113338] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.121061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.128786] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.136597] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.144410] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   65.152222] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.160027] page dumped because: kasan: bad access detected
[   65.165583] 
[   65.167058] Memory state around the buggy address:
[   65.171839]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.179042]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.186247] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.193447]                                                                 ^
[   65.200569]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.207774]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.214974] ==================================================================
[   65.527348] ==================================================================
[   65.534418] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   65.541445] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   65.548911] 
[   65.550396] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   65.550452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.550472] Hardware name: WinLink E850-96 board (DT)
[   65.550493] Call trace:
[   65.550508]  show_stack+0x20/0x38 (C)
[   65.550542]  dump_stack_lvl+0x8c/0xd0
[   65.550581]  print_report+0x118/0x608
[   65.550616]  kasan_report+0xdc/0x128
[   65.550652]  kasan_check_range+0x100/0x1a8
[   65.550688]  __kasan_check_read+0x20/0x30
[   65.550717]  copy_user_test_oob+0x3c8/0xec8
[   65.550750]  kunit_try_run_case+0x170/0x3f0
[   65.550785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.550824]  kthread+0x328/0x630
[   65.550854]  ret_from_fork+0x10/0x20
[   65.550890] 
[   65.616531] Allocated by task 332:
[   65.619916]  kasan_save_stack+0x3c/0x68
[   65.623736]  kasan_save_track+0x20/0x40
[   65.627555]  kasan_save_alloc_info+0x40/0x58
[   65.631809]  __kasan_kmalloc+0xd4/0xd8
[   65.635542]  __kmalloc_noprof+0x198/0x4c8
[   65.639536]  kunit_kmalloc_array+0x34/0x88
[   65.643614]  copy_user_test_oob+0xac/0xec8
[   65.647694]  kunit_try_run_case+0x170/0x3f0
[   65.651860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.657329]  kthread+0x328/0x630
[   65.660541]  ret_from_fork+0x10/0x20
[   65.664100] 
[   65.665577] The buggy address belongs to the object at ffff000800db1a00
[   65.665577]  which belongs to the cache kmalloc-128 of size 128
[   65.678077] The buggy address is located 0 bytes inside of
[   65.678077]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.690488] 
[   65.691965] The buggy address belongs to the physical page:
[   65.697523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   65.705507] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.713145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.720090] page_type: f5(slab)
[   65.723226] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.730946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.738673] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.746484] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.754297] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   65.762109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.769914] page dumped because: kasan: bad access detected
[   65.775469] 
[   65.776946] Memory state around the buggy address:
[   65.781727]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.788928]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.796135] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.803334]                                                                 ^
[   65.810456]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.817660]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.824861] ==================================================================
[   65.832180] ==================================================================
[   65.839274] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   65.846302] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   65.853854] 
[   65.855339] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   65.855391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.855407] Hardware name: WinLink E850-96 board (DT)
[   65.855431] Call trace:
[   65.855447]  show_stack+0x20/0x38 (C)
[   65.855483]  dump_stack_lvl+0x8c/0xd0
[   65.855517]  print_report+0x118/0x608
[   65.855554]  kasan_report+0xdc/0x128
[   65.855588]  kasan_check_range+0x100/0x1a8
[   65.855625]  __kasan_check_write+0x20/0x30
[   65.855654]  copy_user_test_oob+0x434/0xec8
[   65.855689]  kunit_try_run_case+0x170/0x3f0
[   65.855727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.855764]  kthread+0x328/0x630
[   65.855791]  ret_from_fork+0x10/0x20
[   65.855828] 
[   65.921561] Allocated by task 332:
[   65.924946]  kasan_save_stack+0x3c/0x68
[   65.928766]  kasan_save_track+0x20/0x40
[   65.932585]  kasan_save_alloc_info+0x40/0x58
[   65.936840]  __kasan_kmalloc+0xd4/0xd8
[   65.940573]  __kmalloc_noprof+0x198/0x4c8
[   65.944564]  kunit_kmalloc_array+0x34/0x88
[   65.948644]  copy_user_test_oob+0xac/0xec8
[   65.952724]  kunit_try_run_case+0x170/0x3f0
[   65.956891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.962359]  kthread+0x328/0x630
[   65.965571]  ret_from_fork+0x10/0x20
[   65.969130] 
[   65.970605] The buggy address belongs to the object at ffff000800db1a00
[   65.970605]  which belongs to the cache kmalloc-128 of size 128
[   65.983107] The buggy address is located 0 bytes inside of
[   65.983107]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.995518] 
[   65.996996] The buggy address belongs to the physical page:
[   66.002553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   66.010536] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.018175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.025119] page_type: f5(slab)
[   66.028256] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.035976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.043702] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.051514] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.059327] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   66.067139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.074944] page dumped because: kasan: bad access detected
[   66.080499] 
[   66.081977] Memory state around the buggy address:
[   66.086758]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.093958]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.101164] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.108364]                                                                 ^
[   66.115486]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.122691]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.129891] ==================================================================
[   66.137286] ==================================================================
[   66.144306] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   66.151333] Read of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   66.158797] 
[   66.160279] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   66.160333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.160353] Hardware name: WinLink E850-96 board (DT)
[   66.160374] Call trace:
[   66.160390]  show_stack+0x20/0x38 (C)
[   66.160426]  dump_stack_lvl+0x8c/0xd0
[   66.160463]  print_report+0x118/0x608
[   66.160497]  kasan_report+0xdc/0x128
[   66.160532]  kasan_check_range+0x100/0x1a8
[   66.160567]  __kasan_check_read+0x20/0x30
[   66.160597]  copy_user_test_oob+0x4a0/0xec8
[   66.160632]  kunit_try_run_case+0x170/0x3f0
[   66.160666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.160703]  kthread+0x328/0x630
[   66.160732]  ret_from_fork+0x10/0x20
[   66.160767] 
[   66.226418] Allocated by task 332:
[   66.229804]  kasan_save_stack+0x3c/0x68
[   66.233622]  kasan_save_track+0x20/0x40
[   66.237442]  kasan_save_alloc_info+0x40/0x58
[   66.241695]  __kasan_kmalloc+0xd4/0xd8
[   66.245428]  __kmalloc_noprof+0x198/0x4c8
[   66.249421]  kunit_kmalloc_array+0x34/0x88
[   66.253501]  copy_user_test_oob+0xac/0xec8
[   66.257581]  kunit_try_run_case+0x170/0x3f0
[   66.261747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.267216]  kthread+0x328/0x630
[   66.270428]  ret_from_fork+0x10/0x20
[   66.273987] 
[   66.275461] The buggy address belongs to the object at ffff000800db1a00
[   66.275461]  which belongs to the cache kmalloc-128 of size 128
[   66.287962] The buggy address is located 0 bytes inside of
[   66.287962]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   66.300375] 
[   66.301852] The buggy address belongs to the physical page:
[   66.307409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   66.315392] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.323033] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.329975] page_type: f5(slab)
[   66.333112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.340833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.348559] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.356370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.364183] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   66.371995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.379801] page dumped because: kasan: bad access detected
[   66.385356] 
[   66.386832] Memory state around the buggy address:
[   66.391612]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.398815]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.406020] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.413220]                                                                 ^
[   66.420342]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.427547]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.434748] ==================================================================
[   64.607043] ==================================================================
[   64.619503] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   64.626531] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   64.634080] 
[   64.635568] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   64.635622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.635641] Hardware name: WinLink E850-96 board (DT)
[   64.635662] Call trace:
[   64.635679]  show_stack+0x20/0x38 (C)
[   64.635721]  dump_stack_lvl+0x8c/0xd0
[   64.635761]  print_report+0x118/0x608
[   64.635800]  kasan_report+0xdc/0x128
[   64.635836]  kasan_check_range+0x100/0x1a8
[   64.635874]  __kasan_check_write+0x20/0x30
[   64.635904]  copy_user_test_oob+0x234/0xec8
[   64.635939]  kunit_try_run_case+0x170/0x3f0
[   64.635979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.636017]  kthread+0x328/0x630
[   64.636047]  ret_from_fork+0x10/0x20
[   64.636083] 
[   64.701790] Allocated by task 332:
[   64.705176]  kasan_save_stack+0x3c/0x68
[   64.708992]  kasan_save_track+0x20/0x40
[   64.712812]  kasan_save_alloc_info+0x40/0x58
[   64.717065]  __kasan_kmalloc+0xd4/0xd8
[   64.720799]  __kmalloc_noprof+0x198/0x4c8
[   64.724791]  kunit_kmalloc_array+0x34/0x88
[   64.728871]  copy_user_test_oob+0xac/0xec8
[   64.732952]  kunit_try_run_case+0x170/0x3f0
[   64.737117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.742586]  kthread+0x328/0x630
[   64.745798]  ret_from_fork+0x10/0x20
[   64.749356] 
[   64.750833] The buggy address belongs to the object at ffff000800db1a00
[   64.750833]  which belongs to the cache kmalloc-128 of size 128
[   64.763334] The buggy address is located 0 bytes inside of
[   64.763334]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   64.775745] 
[   64.777225] The buggy address belongs to the physical page:
[   64.782781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   64.790764] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.798403] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.805348] page_type: f5(slab)
[   64.808484] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.816203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.823931] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.831741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.839554] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   64.847365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.855171] page dumped because: kasan: bad access detected
[   64.860726] 
[   64.862202] Memory state around the buggy address:
[   64.866983]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.874185]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.881391] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.888590]                                                                 ^
[   64.895712]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.902917]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.910121] ==================================================================
[   65.222469] ==================================================================
[   65.229394] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   65.236416] Write of size 121 at addr ffff000800db1a00 by task kunit_try_catch/332
[   65.243967] 
[   65.245454] CPU: 1 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   65.245518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.245538] Hardware name: WinLink E850-96 board (DT)
[   65.245562] Call trace:
[   65.245577]  show_stack+0x20/0x38 (C)
[   65.245613]  dump_stack_lvl+0x8c/0xd0
[   65.245650]  print_report+0x118/0x608
[   65.245687]  kasan_report+0xdc/0x128
[   65.245725]  kasan_check_range+0x100/0x1a8
[   65.245764]  __kasan_check_write+0x20/0x30
[   65.245797]  copy_user_test_oob+0x35c/0xec8
[   65.245831]  kunit_try_run_case+0x170/0x3f0
[   65.245867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.245908]  kthread+0x328/0x630
[   65.245937]  ret_from_fork+0x10/0x20
[   65.245974] 
[   65.311676] Allocated by task 332:
[   65.315061]  kasan_save_stack+0x3c/0x68
[   65.318879]  kasan_save_track+0x20/0x40
[   65.322698]  kasan_save_alloc_info+0x40/0x58
[   65.326952]  __kasan_kmalloc+0xd4/0xd8
[   65.330686]  __kmalloc_noprof+0x198/0x4c8
[   65.334678]  kunit_kmalloc_array+0x34/0x88
[   65.338757]  copy_user_test_oob+0xac/0xec8
[   65.342837]  kunit_try_run_case+0x170/0x3f0
[   65.347004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.352472]  kthread+0x328/0x630
[   65.355684]  ret_from_fork+0x10/0x20
[   65.359243] 
[   65.360720] The buggy address belongs to the object at ffff000800db1a00
[   65.360720]  which belongs to the cache kmalloc-128 of size 128
[   65.373221] The buggy address is located 0 bytes inside of
[   65.373221]  allocated 120-byte region [ffff000800db1a00, ffff000800db1a78)
[   65.385632] 
[   65.387110] The buggy address belongs to the physical page:
[   65.392668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880db0
[   65.400651] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.408288] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.415232] page_type: f5(slab)
[   65.418369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.426090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.433817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.441627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.449440] head: 0bfffe0000000001 fffffdffe0036c01 00000000ffffffff 00000000ffffffff
[   65.457252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.465057] page dumped because: kasan: bad access detected
[   65.470613] 
[   65.472088] Memory state around the buggy address:
[   65.476870]  ffff000800db1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.484072]  ffff000800db1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.491277] >ffff000800db1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.498477]                                                                 ^
[   65.505599]  ffff000800db1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.512804]  ffff000800db1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.520007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   63.982111] ==================================================================
[   63.996336] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   64.003709] Read of size 8 at addr ffff000801ad8e78 by task kunit_try_catch/328
[   64.011000] 
[   64.012488] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   64.012548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.012567] Hardware name: WinLink E850-96 board (DT)
[   64.012588] Call trace:
[   64.012606]  show_stack+0x20/0x38 (C)
[   64.012644]  dump_stack_lvl+0x8c/0xd0
[   64.012683]  print_report+0x118/0x608
[   64.012724]  kasan_report+0xdc/0x128
[   64.012757]  __asan_report_load8_noabort+0x20/0x30
[   64.012796]  copy_to_kernel_nofault+0x204/0x250
[   64.012836]  copy_to_kernel_nofault_oob+0x158/0x418
[   64.012873]  kunit_try_run_case+0x170/0x3f0
[   64.012911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.012951]  kthread+0x328/0x630
[   64.012981]  ret_from_fork+0x10/0x20
[   64.013022] 
[   64.080531] Allocated by task 328:
[   64.083918]  kasan_save_stack+0x3c/0x68
[   64.087736]  kasan_save_track+0x20/0x40
[   64.091554]  kasan_save_alloc_info+0x40/0x58
[   64.095807]  __kasan_kmalloc+0xd4/0xd8
[   64.099540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.104054]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.108829]  kunit_try_run_case+0x170/0x3f0
[   64.112995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.118463]  kthread+0x328/0x630
[   64.121675]  ret_from_fork+0x10/0x20
[   64.125234] 
[   64.126712] The buggy address belongs to the object at ffff000801ad8e00
[   64.126712]  which belongs to the cache kmalloc-128 of size 128
[   64.139212] The buggy address is located 0 bytes to the right of
[   64.139212]  allocated 120-byte region [ffff000801ad8e00, ffff000801ad8e78)
[   64.152143] 
[   64.153623] The buggy address belongs to the physical page:
[   64.159179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   64.167162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.174800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.181746] page_type: f5(slab)
[   64.184883] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.192601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.200331] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.208139] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.215952] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   64.223764] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.231571] page dumped because: kasan: bad access detected
[   64.237124] 
[   64.238600] Memory state around the buggy address:
[   64.243380]  ffff000801ad8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.250583]  ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.257788] >ffff000801ad8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.264989]                                                                 ^
[   64.272112]  ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.279315]  ffff000801ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.286518] ==================================================================
[   64.293956] ==================================================================
[   64.300931] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   64.308218] Write of size 8 at addr ffff000801ad8e78 by task kunit_try_catch/328
[   64.315596] 
[   64.317081] CPU: 4 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   64.317134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.317150] Hardware name: WinLink E850-96 board (DT)
[   64.317173] Call trace:
[   64.317190]  show_stack+0x20/0x38 (C)
[   64.317226]  dump_stack_lvl+0x8c/0xd0
[   64.317266]  print_report+0x118/0x608
[   64.317305]  kasan_report+0xdc/0x128
[   64.317340]  kasan_check_range+0x100/0x1a8
[   64.317377]  __kasan_check_write+0x20/0x30
[   64.317409]  copy_to_kernel_nofault+0x8c/0x250
[   64.317445]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   64.317479]  kunit_try_run_case+0x170/0x3f0
[   64.317516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.317555]  kthread+0x328/0x630
[   64.317583]  ret_from_fork+0x10/0x20
[   64.317620] 
[   64.388426] Allocated by task 328:
[   64.391810]  kasan_save_stack+0x3c/0x68
[   64.395629]  kasan_save_track+0x20/0x40
[   64.399449]  kasan_save_alloc_info+0x40/0x58
[   64.403702]  __kasan_kmalloc+0xd4/0xd8
[   64.407435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.411948]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.416723]  kunit_try_run_case+0x170/0x3f0
[   64.420889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.426358]  kthread+0x328/0x630
[   64.429570]  ret_from_fork+0x10/0x20
[   64.433128] 
[   64.434606] The buggy address belongs to the object at ffff000801ad8e00
[   64.434606]  which belongs to the cache kmalloc-128 of size 128
[   64.447106] The buggy address is located 0 bytes to the right of
[   64.447106]  allocated 120-byte region [ffff000801ad8e00, ffff000801ad8e78)
[   64.460038] 
[   64.461515] The buggy address belongs to the physical page:
[   64.467073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   64.475058] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.482696] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.489638] page_type: f5(slab)
[   64.492778] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.500496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.508222] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.516033] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.523847] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   64.531658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.539463] page dumped because: kasan: bad access detected
[   64.545019] 
[   64.546495] Memory state around the buggy address:
[   64.551274]  ffff000801ad8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.558478]  ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.565684] >ffff000801ad8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.572883]                                                                 ^
[   64.580005]  ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.587210]  ffff000801ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.594411] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   63.542893] ==================================================================
[   63.557278] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.563959] Read of size 1 at addr ffff800087cdd7f3 by task kunit_try_catch/316
[   63.571249] 
[   63.572736] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.572794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.572811] Hardware name: WinLink E850-96 board (DT)
[   63.572835] Call trace:
[   63.572853]  show_stack+0x20/0x38 (C)
[   63.572893]  dump_stack_lvl+0x8c/0xd0
[   63.572930]  print_report+0x310/0x608
[   63.572967]  kasan_report+0xdc/0x128
[   63.573005]  __asan_report_load1_noabort+0x20/0x30
[   63.573051]  vmalloc_oob+0x578/0x5d0
[   63.573083]  kunit_try_run_case+0x170/0x3f0
[   63.573122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.573162]  kthread+0x328/0x630
[   63.573192]  ret_from_fork+0x10/0x20
[   63.573229] 
[   63.634970] The buggy address belongs to the virtual mapping at
[   63.634970]  [ffff800087cdd000, ffff800087cdf000) created by:
[   63.634970]  vmalloc_oob+0x98/0x5d0
[   63.650069] 
[   63.651547] The buggy address belongs to the physical page:
[   63.657103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d
[   63.665088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.671610] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.679327] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.687049] page dumped because: kasan: bad access detected
[   63.692602] 
[   63.694077] Memory state around the buggy address:
[   63.698859]  ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.706060]  ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.713266] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.720465]                                                              ^
[   63.727329]  ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.734532]  ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.741736] ==================================================================
[   63.749077] ==================================================================
[   63.756147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.762827] Read of size 1 at addr ffff800087cdd7f8 by task kunit_try_catch/316
[   63.770118] 
[   63.771601] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.771656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.771673] Hardware name: WinLink E850-96 board (DT)
[   63.771695] Call trace:
[   63.771711]  show_stack+0x20/0x38 (C)
[   63.771748]  dump_stack_lvl+0x8c/0xd0
[   63.771786]  print_report+0x310/0x608
[   63.771821]  kasan_report+0xdc/0x128
[   63.771860]  __asan_report_load1_noabort+0x20/0x30
[   63.771900]  vmalloc_oob+0x51c/0x5d0
[   63.771930]  kunit_try_run_case+0x170/0x3f0
[   63.771968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.772007]  kthread+0x328/0x630
[   63.772037]  ret_from_fork+0x10/0x20
[   63.772071] 
[   63.833836] The buggy address belongs to the virtual mapping at
[   63.833836]  [ffff800087cdd000, ffff800087cdf000) created by:
[   63.833836]  vmalloc_oob+0x98/0x5d0
[   63.848936] 
[   63.850414] The buggy address belongs to the physical page:
[   63.855972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d
[   63.863955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.870478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.878196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.885917] page dumped because: kasan: bad access detected
[   63.891470] 
[   63.892946] Memory state around the buggy address:
[   63.897724]  ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.904928]  ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.912135] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.919334]                                                                 ^
[   63.926458]  ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.933661]  ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.940861] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   56.955544] ==================================================================
[   56.962501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   56.969786] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.977164] 
[   56.978648] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.978696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.978713] Hardware name: WinLink E850-96 board (DT)
[   56.978733] Call trace:
[   56.978747]  show_stack+0x20/0x38 (C)
[   56.978780]  dump_stack_lvl+0x8c/0xd0
[   56.978816]  print_report+0x118/0x608
[   56.978851]  kasan_report+0xdc/0x128
[   56.978885]  kasan_check_range+0x100/0x1a8
[   56.978923]  __kasan_check_write+0x20/0x30
[   56.978954]  kasan_atomics_helper+0xf20/0x4858
[   56.978989]  kasan_atomics+0x198/0x2e0
[   56.979019]  kunit_try_run_case+0x170/0x3f0
[   56.979055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.979095]  kthread+0x328/0x630
[   56.979123]  ret_from_fork+0x10/0x20
[   56.979158] 
[   57.048864] Allocated by task 312:
[   57.052250]  kasan_save_stack+0x3c/0x68
[   57.056069]  kasan_save_track+0x20/0x40
[   57.059889]  kasan_save_alloc_info+0x40/0x58
[   57.064142]  __kasan_kmalloc+0xd4/0xd8
[   57.067876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.072388]  kasan_atomics+0xb8/0x2e0
[   57.076034]  kunit_try_run_case+0x170/0x3f0
[   57.080201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.085669]  kthread+0x328/0x630
[   57.088881]  ret_from_fork+0x10/0x20
[   57.092440] 
[   57.093916] The buggy address belongs to the object at ffff000805f49a00
[   57.093916]  which belongs to the cache kmalloc-64 of size 64
[   57.106242] The buggy address is located 0 bytes to the right of
[   57.106242]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.119089] 
[   57.120565] The buggy address belongs to the physical page:
[   57.126122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.134110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.140616] page_type: f5(slab)
[   57.143753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.151475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.159193] page dumped because: kasan: bad access detected
[   57.164748] 
[   57.166224] Memory state around the buggy address:
[   57.171002]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.178207]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.185411] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.192612]                                      ^
[   57.197390]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.204595]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.211796] ==================================================================
[   54.595236] ==================================================================
[   54.602288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.609578] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.616957] 
[   54.618438] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.618483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.618498] Hardware name: WinLink E850-96 board (DT)
[   54.618516] Call trace:
[   54.618527]  show_stack+0x20/0x38 (C)
[   54.618561]  dump_stack_lvl+0x8c/0xd0
[   54.618596]  print_report+0x118/0x608
[   54.618629]  kasan_report+0xdc/0x128
[   54.618663]  kasan_check_range+0x100/0x1a8
[   54.618699]  __kasan_check_write+0x20/0x30
[   54.618731]  kasan_atomics_helper+0xca0/0x4858
[   54.618767]  kasan_atomics+0x198/0x2e0
[   54.618797]  kunit_try_run_case+0x170/0x3f0
[   54.618832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.618870]  kthread+0x328/0x630
[   54.618897]  ret_from_fork+0x10/0x20
[   54.618929] 
[   54.688657] Allocated by task 312:
[   54.692042]  kasan_save_stack+0x3c/0x68
[   54.695862]  kasan_save_track+0x20/0x40
[   54.699681]  kasan_save_alloc_info+0x40/0x58
[   54.703934]  __kasan_kmalloc+0xd4/0xd8
[   54.707667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.712181]  kasan_atomics+0xb8/0x2e0
[   54.715827]  kunit_try_run_case+0x170/0x3f0
[   54.719993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.725462]  kthread+0x328/0x630
[   54.728674]  ret_from_fork+0x10/0x20
[   54.732233] 
[   54.733708] The buggy address belongs to the object at ffff000805f49a00
[   54.733708]  which belongs to the cache kmalloc-64 of size 64
[   54.746035] The buggy address is located 0 bytes to the right of
[   54.746035]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   54.758881] 
[   54.760357] The buggy address belongs to the physical page:
[   54.765913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   54.773899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.780409] page_type: f5(slab)
[   54.783542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.791266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.798985] page dumped because: kasan: bad access detected
[   54.804540] 
[   54.806016] Memory state around the buggy address:
[   54.810795]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.817999]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.825204] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.832405]                                      ^
[   54.837183]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.844388]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.851589] ==================================================================
[   56.691730] ==================================================================
[   56.698785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.706075] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.713453] 
[   56.714933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.714980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.714995] Hardware name: WinLink E850-96 board (DT)
[   56.715012] Call trace:
[   56.715025]  show_stack+0x20/0x38 (C)
[   56.715056]  dump_stack_lvl+0x8c/0xd0
[   56.715093]  print_report+0x118/0x608
[   56.715127]  kasan_report+0xdc/0x128
[   56.715161]  kasan_check_range+0x100/0x1a8
[   56.715195]  __kasan_check_write+0x20/0x30
[   56.715224]  kasan_atomics_helper+0xeb8/0x4858
[   56.715259]  kasan_atomics+0x198/0x2e0
[   56.715290]  kunit_try_run_case+0x170/0x3f0
[   56.715323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.715361]  kthread+0x328/0x630
[   56.715391]  ret_from_fork+0x10/0x20
[   56.715422] 
[   56.785153] Allocated by task 312:
[   56.788539]  kasan_save_stack+0x3c/0x68
[   56.792358]  kasan_save_track+0x20/0x40
[   56.796177]  kasan_save_alloc_info+0x40/0x58
[   56.800430]  __kasan_kmalloc+0xd4/0xd8
[   56.804163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.808677]  kasan_atomics+0xb8/0x2e0
[   56.812323]  kunit_try_run_case+0x170/0x3f0
[   56.816490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.821958]  kthread+0x328/0x630
[   56.825170]  ret_from_fork+0x10/0x20
[   56.828729] 
[   56.830205] The buggy address belongs to the object at ffff000805f49a00
[   56.830205]  which belongs to the cache kmalloc-64 of size 64
[   56.842531] The buggy address is located 0 bytes to the right of
[   56.842531]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.855378] 
[   56.856854] The buggy address belongs to the physical page:
[   56.862410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.870395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.876905] page_type: f5(slab)
[   56.880039] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.887763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.895482] page dumped because: kasan: bad access detected
[   56.901037] 
[   56.902512] Memory state around the buggy address:
[   56.907291]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.914496]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.921700] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.928901]                                      ^
[   56.933679]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.940884]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.948085] ==================================================================
[   52.759152] ==================================================================
[   52.766205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.773495] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   52.780873] 
[   52.782354] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   52.782401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.782417] Hardware name: WinLink E850-96 board (DT)
[   52.782435] Call trace:
[   52.782448]  show_stack+0x20/0x38 (C)
[   52.782480]  dump_stack_lvl+0x8c/0xd0
[   52.782515]  print_report+0x118/0x608
[   52.782549]  kasan_report+0xdc/0x128
[   52.782582]  kasan_check_range+0x100/0x1a8
[   52.782616]  __kasan_check_write+0x20/0x30
[   52.782647]  kasan_atomics_helper+0xa6c/0x4858
[   52.782682]  kasan_atomics+0x198/0x2e0
[   52.782712]  kunit_try_run_case+0x170/0x3f0
[   52.782746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.782782]  kthread+0x328/0x630
[   52.782810]  ret_from_fork+0x10/0x20
[   52.782840] 
[   52.852573] Allocated by task 312:
[   52.855959]  kasan_save_stack+0x3c/0x68
[   52.859778]  kasan_save_track+0x20/0x40
[   52.863597]  kasan_save_alloc_info+0x40/0x58
[   52.867851]  __kasan_kmalloc+0xd4/0xd8
[   52.871583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.876097]  kasan_atomics+0xb8/0x2e0
[   52.879743]  kunit_try_run_case+0x170/0x3f0
[   52.883910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.889378]  kthread+0x328/0x630
[   52.892590]  ret_from_fork+0x10/0x20
[   52.896149] 
[   52.897624] The buggy address belongs to the object at ffff000805f49a00
[   52.897624]  which belongs to the cache kmalloc-64 of size 64
[   52.909951] The buggy address is located 0 bytes to the right of
[   52.909951]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.922798] 
[   52.924274] The buggy address belongs to the physical page:
[   52.929830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.937815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.944325] page_type: f5(slab)
[   52.947459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.955183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.962902] page dumped because: kasan: bad access detected
[   52.968457] 
[   52.969933] Memory state around the buggy address:
[   52.974711]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.981916]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.989120] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.996321]                                      ^
[   53.001099]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.008304]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.015505] ==================================================================
[   47.231269] ==================================================================
[   47.238165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.245453] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   47.252831] 
[   47.254315] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   47.254363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.254379] Hardware name: WinLink E850-96 board (DT)
[   47.254399] Call trace:
[   47.254415]  show_stack+0x20/0x38 (C)
[   47.254452]  dump_stack_lvl+0x8c/0xd0
[   47.254489]  print_report+0x118/0x608
[   47.254525]  kasan_report+0xdc/0x128
[   47.254559]  kasan_check_range+0x100/0x1a8
[   47.254598]  __kasan_check_write+0x20/0x30
[   47.254629]  kasan_atomics_helper+0x24c/0x4858
[   47.254663]  kasan_atomics+0x198/0x2e0
[   47.254694]  kunit_try_run_case+0x170/0x3f0
[   47.254730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.254768]  kthread+0x328/0x630
[   47.254793]  ret_from_fork+0x10/0x20
[   47.254827] 
[   47.324531] Allocated by task 312:
[   47.327918]  kasan_save_stack+0x3c/0x68
[   47.331736]  kasan_save_track+0x20/0x40
[   47.335555]  kasan_save_alloc_info+0x40/0x58
[   47.339809]  __kasan_kmalloc+0xd4/0xd8
[   47.343541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.348055]  kasan_atomics+0xb8/0x2e0
[   47.351701]  kunit_try_run_case+0x170/0x3f0
[   47.355868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.361336]  kthread+0x328/0x630
[   47.364548]  ret_from_fork+0x10/0x20
[   47.368107] 
[   47.369583] The buggy address belongs to the object at ffff000805f49a00
[   47.369583]  which belongs to the cache kmalloc-64 of size 64
[   47.381909] The buggy address is located 0 bytes to the right of
[   47.381909]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.394756] 
[   47.396233] The buggy address belongs to the physical page:
[   47.401789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.409776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.416284] page_type: f5(slab)
[   47.419418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.427141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.434860] page dumped because: kasan: bad access detected
[   47.440415] 
[   47.441890] Memory state around the buggy address:
[   47.446670]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.453874]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.461078] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.468279]                                      ^
[   47.473057]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.480262]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.487462] ==================================================================
[   48.806785] ==================================================================
[   48.813836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.821124] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.828502] 
[   48.829985] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.830037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.830054] Hardware name: WinLink E850-96 board (DT)
[   48.830073] Call trace:
[   48.830087]  show_stack+0x20/0x38 (C)
[   48.830120]  dump_stack_lvl+0x8c/0xd0
[   48.830156]  print_report+0x118/0x608
[   48.830189]  kasan_report+0xdc/0x128
[   48.830222]  kasan_check_range+0x100/0x1a8
[   48.830256]  __kasan_check_write+0x20/0x30
[   48.830286]  kasan_atomics_helper+0x414/0x4858
[   48.830320]  kasan_atomics+0x198/0x2e0
[   48.830351]  kunit_try_run_case+0x170/0x3f0
[   48.830385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.830423]  kthread+0x328/0x630
[   48.830451]  ret_from_fork+0x10/0x20
[   48.830482] 
[   48.900202] Allocated by task 312:
[   48.903587]  kasan_save_stack+0x3c/0x68
[   48.907407]  kasan_save_track+0x20/0x40
[   48.911226]  kasan_save_alloc_info+0x40/0x58
[   48.915480]  __kasan_kmalloc+0xd4/0xd8
[   48.919212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.923726]  kasan_atomics+0xb8/0x2e0
[   48.927372]  kunit_try_run_case+0x170/0x3f0
[   48.931538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.937007]  kthread+0x328/0x630
[   48.940219]  ret_from_fork+0x10/0x20
[   48.943778] 
[   48.945255] The buggy address belongs to the object at ffff000805f49a00
[   48.945255]  which belongs to the cache kmalloc-64 of size 64
[   48.957580] The buggy address is located 0 bytes to the right of
[   48.957580]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.970427] 
[   48.971904] The buggy address belongs to the physical page:
[   48.977460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.985447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.991955] page_type: f5(slab)
[   48.995091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.002812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.010530] page dumped because: kasan: bad access detected
[   49.016086] 
[   49.017561] Memory state around the buggy address:
[   49.022340]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.029544]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.036749] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.043950]                                      ^
[   49.048728]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.055933]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.063134] ==================================================================
[   50.389071] ==================================================================
[   50.396105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.403392] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.410770] 
[   50.412254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.412306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.412322] Hardware name: WinLink E850-96 board (DT)
[   50.412343] Call trace:
[   50.412361]  show_stack+0x20/0x38 (C)
[   50.412394]  dump_stack_lvl+0x8c/0xd0
[   50.412432]  print_report+0x118/0x608
[   50.412467]  kasan_report+0xdc/0x128
[   50.412498]  kasan_check_range+0x100/0x1a8
[   50.412535]  __kasan_check_write+0x20/0x30
[   50.412565]  kasan_atomics_helper+0x684/0x4858
[   50.412598]  kasan_atomics+0x198/0x2e0
[   50.412631]  kunit_try_run_case+0x170/0x3f0
[   50.412667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.412704]  kthread+0x328/0x630
[   50.412733]  ret_from_fork+0x10/0x20
[   50.412764] 
[   50.482470] Allocated by task 312:
[   50.485856]  kasan_save_stack+0x3c/0x68
[   50.489675]  kasan_save_track+0x20/0x40
[   50.493494]  kasan_save_alloc_info+0x40/0x58
[   50.497748]  __kasan_kmalloc+0xd4/0xd8
[   50.501480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.505994]  kasan_atomics+0xb8/0x2e0
[   50.509640]  kunit_try_run_case+0x170/0x3f0
[   50.513806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.519275]  kthread+0x328/0x630
[   50.522487]  ret_from_fork+0x10/0x20
[   50.526046] 
[   50.527521] The buggy address belongs to the object at ffff000805f49a00
[   50.527521]  which belongs to the cache kmalloc-64 of size 64
[   50.539848] The buggy address is located 0 bytes to the right of
[   50.539848]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.552695] 
[   50.554171] The buggy address belongs to the physical page:
[   50.559727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.567714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.574222] page_type: f5(slab)
[   50.577356] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.585079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.592798] page dumped because: kasan: bad access detected
[   50.598354] 
[   50.599829] Memory state around the buggy address:
[   50.604607]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.611812]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.619017] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.626218]                                      ^
[   50.630996]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.638201]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.645402] ==================================================================
[   51.968124] ==================================================================
[   51.975072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   51.982361] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.989739] 
[   51.991223] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.991270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.991285] Hardware name: WinLink E850-96 board (DT)
[   51.991306] Call trace:
[   51.991323]  show_stack+0x20/0x38 (C)
[   51.991356]  dump_stack_lvl+0x8c/0xd0
[   51.991392]  print_report+0x118/0x608
[   51.991426]  kasan_report+0xdc/0x128
[   51.991462]  kasan_check_range+0x100/0x1a8
[   51.991498]  __kasan_check_write+0x20/0x30
[   51.991529]  kasan_atomics_helper+0x934/0x4858
[   51.991563]  kasan_atomics+0x198/0x2e0
[   51.991594]  kunit_try_run_case+0x170/0x3f0
[   51.991628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.991666]  kthread+0x328/0x630
[   51.991693]  ret_from_fork+0x10/0x20
[   51.991730] 
[   52.061439] Allocated by task 312:
[   52.064825]  kasan_save_stack+0x3c/0x68
[   52.068644]  kasan_save_track+0x20/0x40
[   52.072463]  kasan_save_alloc_info+0x40/0x58
[   52.076717]  __kasan_kmalloc+0xd4/0xd8
[   52.080449]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.084963]  kasan_atomics+0xb8/0x2e0
[   52.088609]  kunit_try_run_case+0x170/0x3f0
[   52.092776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.098244]  kthread+0x328/0x630
[   52.101456]  ret_from_fork+0x10/0x20
[   52.105015] 
[   52.106490] The buggy address belongs to the object at ffff000805f49a00
[   52.106490]  which belongs to the cache kmalloc-64 of size 64
[   52.118817] The buggy address is located 0 bytes to the right of
[   52.118817]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.131664] 
[   52.133142] The buggy address belongs to the physical page:
[   52.138698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.146683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.153191] page_type: f5(slab)
[   52.156326] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.164049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.171768] page dumped because: kasan: bad access detected
[   52.177323] 
[   52.178798] Memory state around the buggy address:
[   52.183577]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.190782]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.197986] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.205187]                                      ^
[   52.209965]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.217170]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.224371] ==================================================================
[   58.538208] ==================================================================
[   58.545286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.552662] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.560040] 
[   58.561523] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.561569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.561586] Hardware name: WinLink E850-96 board (DT)
[   58.561606] Call trace:
[   58.561620]  show_stack+0x20/0x38 (C)
[   58.561655]  dump_stack_lvl+0x8c/0xd0
[   58.561689]  print_report+0x118/0x608
[   58.561722]  kasan_report+0xdc/0x128
[   58.561757]  kasan_check_range+0x100/0x1a8
[   58.561793]  __kasan_check_write+0x20/0x30
[   58.561824]  kasan_atomics_helper+0x1190/0x4858
[   58.561857]  kasan_atomics+0x198/0x2e0
[   58.561887]  kunit_try_run_case+0x170/0x3f0
[   58.561918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.561956]  kthread+0x328/0x630
[   58.561984]  ret_from_fork+0x10/0x20
[   58.562017] 
[   58.631827] Allocated by task 312:
[   58.635213]  kasan_save_stack+0x3c/0x68
[   58.639032]  kasan_save_track+0x20/0x40
[   58.642851]  kasan_save_alloc_info+0x40/0x58
[   58.647104]  __kasan_kmalloc+0xd4/0xd8
[   58.650837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.655351]  kasan_atomics+0xb8/0x2e0
[   58.658997]  kunit_try_run_case+0x170/0x3f0
[   58.663163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.668632]  kthread+0x328/0x630
[   58.671844]  ret_from_fork+0x10/0x20
[   58.675402] 
[   58.676878] The buggy address belongs to the object at ffff000805f49a00
[   58.676878]  which belongs to the cache kmalloc-64 of size 64
[   58.689205] The buggy address is located 0 bytes to the right of
[   58.689205]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.702052] 
[   58.703527] The buggy address belongs to the physical page:
[   58.709085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.717072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.723579] page_type: f5(slab)
[   58.726712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.734436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.742155] page dumped because: kasan: bad access detected
[   58.747711] 
[   58.749186] Memory state around the buggy address:
[   58.753964]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.761169]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.768374] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.775575]                                      ^
[   58.780353]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.787558]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.794759] ==================================================================
[   55.119488] ==================================================================
[   55.126413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.133703] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.141080] 
[   55.142564] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.142614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.142629] Hardware name: WinLink E850-96 board (DT)
[   55.142649] Call trace:
[   55.142666]  show_stack+0x20/0x38 (C)
[   55.142698]  dump_stack_lvl+0x8c/0xd0
[   55.142734]  print_report+0x118/0x608
[   55.142767]  kasan_report+0xdc/0x128
[   55.142801]  kasan_check_range+0x100/0x1a8
[   55.142838]  __kasan_check_write+0x20/0x30
[   55.142869]  kasan_atomics_helper+0xd3c/0x4858
[   55.142904]  kasan_atomics+0x198/0x2e0
[   55.142935]  kunit_try_run_case+0x170/0x3f0
[   55.142971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.143009]  kthread+0x328/0x630
[   55.143037]  ret_from_fork+0x10/0x20
[   55.143072] 
[   55.212781] Allocated by task 312:
[   55.216166]  kasan_save_stack+0x3c/0x68
[   55.219986]  kasan_save_track+0x20/0x40
[   55.223805]  kasan_save_alloc_info+0x40/0x58
[   55.228059]  __kasan_kmalloc+0xd4/0xd8
[   55.231791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.236305]  kasan_atomics+0xb8/0x2e0
[   55.239950]  kunit_try_run_case+0x170/0x3f0
[   55.244117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.249586]  kthread+0x328/0x630
[   55.252798]  ret_from_fork+0x10/0x20
[   55.256357] 
[   55.257832] The buggy address belongs to the object at ffff000805f49a00
[   55.257832]  which belongs to the cache kmalloc-64 of size 64
[   55.270159] The buggy address is located 0 bytes to the right of
[   55.270159]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.283006] 
[   55.284481] The buggy address belongs to the physical page:
[   55.290039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.298026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.304533] page_type: f5(slab)
[   55.307668] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.315391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.323109] page dumped because: kasan: bad access detected
[   55.328664] 
[   55.330140] Memory state around the buggy address:
[   55.334919]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.342123]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.349328] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.356529]                                      ^
[   55.361307]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.368511]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.375713] ==================================================================
[   60.645842] ==================================================================
[   60.652892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.660269] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.667647] 
[   60.669129] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.669176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.669192] Hardware name: WinLink E850-96 board (DT)
[   60.669211] Call trace:
[   60.669227]  show_stack+0x20/0x38 (C)
[   60.669260]  dump_stack_lvl+0x8c/0xd0
[   60.669295]  print_report+0x118/0x608
[   60.669328]  kasan_report+0xdc/0x128
[   60.669361]  kasan_check_range+0x100/0x1a8
[   60.669395]  __kasan_check_write+0x20/0x30
[   60.669427]  kasan_atomics_helper+0x14e4/0x4858
[   60.669461]  kasan_atomics+0x198/0x2e0
[   60.669491]  kunit_try_run_case+0x170/0x3f0
[   60.669524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.669562]  kthread+0x328/0x630
[   60.669590]  ret_from_fork+0x10/0x20
[   60.669623] 
[   60.739434] Allocated by task 312:
[   60.742819]  kasan_save_stack+0x3c/0x68
[   60.746639]  kasan_save_track+0x20/0x40
[   60.750458]  kasan_save_alloc_info+0x40/0x58
[   60.754712]  __kasan_kmalloc+0xd4/0xd8
[   60.758444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.762958]  kasan_atomics+0xb8/0x2e0
[   60.766604]  kunit_try_run_case+0x170/0x3f0
[   60.770771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.776239]  kthread+0x328/0x630
[   60.779450]  ret_from_fork+0x10/0x20
[   60.783010] 
[   60.784485] The buggy address belongs to the object at ffff000805f49a00
[   60.784485]  which belongs to the cache kmalloc-64 of size 64
[   60.796812] The buggy address is located 0 bytes to the right of
[   60.796812]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.809659] 
[   60.811135] The buggy address belongs to the physical page:
[   60.816690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.824678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.831186] page_type: f5(slab)
[   60.834321] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.842044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.849762] page dumped because: kasan: bad access detected
[   60.855318] 
[   60.856793] Memory state around the buggy address:
[   60.861572]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.868776]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.875981] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.883182]                                      ^
[   60.887960]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.895165]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.902366] ==================================================================
[   47.494868] ==================================================================
[   47.501879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.509164] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   47.516456] 
[   47.517941] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   47.517993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.518009] Hardware name: WinLink E850-96 board (DT)
[   47.518030] Call trace:
[   47.518046]  show_stack+0x20/0x38 (C)
[   47.518082]  dump_stack_lvl+0x8c/0xd0
[   47.518123]  print_report+0x118/0x608
[   47.518158]  kasan_report+0xdc/0x128
[   47.518192]  kasan_check_range+0x100/0x1a8
[   47.518231]  __kasan_check_read+0x20/0x30
[   47.518260]  kasan_atomics_helper+0x2b0/0x4858
[   47.518295]  kasan_atomics+0x198/0x2e0
[   47.518328]  kunit_try_run_case+0x170/0x3f0
[   47.518367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.518407]  kthread+0x328/0x630
[   47.518435]  ret_from_fork+0x10/0x20
[   47.518470] 
[   47.588069] Allocated by task 312:
[   47.591456]  kasan_save_stack+0x3c/0x68
[   47.595274]  kasan_save_track+0x20/0x40
[   47.599093]  kasan_save_alloc_info+0x40/0x58
[   47.603346]  __kasan_kmalloc+0xd4/0xd8
[   47.607079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.611593]  kasan_atomics+0xb8/0x2e0
[   47.615239]  kunit_try_run_case+0x170/0x3f0
[   47.619405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.624874]  kthread+0x328/0x630
[   47.628086]  ret_from_fork+0x10/0x20
[   47.631645] 
[   47.633121] The buggy address belongs to the object at ffff000805f49a00
[   47.633121]  which belongs to the cache kmalloc-64 of size 64
[   47.645447] The buggy address is located 0 bytes to the right of
[   47.645447]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.658294] 
[   47.659771] The buggy address belongs to the physical page:
[   47.665330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.673311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.679821] page_type: f5(slab)
[   47.682957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.690680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.698397] page dumped because: kasan: bad access detected
[   47.703953] 
[   47.705428] Memory state around the buggy address:
[   47.710208]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.717411]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.724616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.731817]                                      ^
[   47.736595]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.743800]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.751002] ==================================================================
[   51.180189] ==================================================================
[   51.187237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.194526] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.201904] 
[   51.203386] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.203435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.203452] Hardware name: WinLink E850-96 board (DT)
[   51.203473] Call trace:
[   51.203488]  show_stack+0x20/0x38 (C)
[   51.203521]  dump_stack_lvl+0x8c/0xd0
[   51.203557]  print_report+0x118/0x608
[   51.203590]  kasan_report+0xdc/0x128
[   51.203625]  kasan_check_range+0x100/0x1a8
[   51.203662]  __kasan_check_write+0x20/0x30
[   51.203692]  kasan_atomics_helper+0x7cc/0x4858
[   51.203726]  kasan_atomics+0x198/0x2e0
[   51.203756]  kunit_try_run_case+0x170/0x3f0
[   51.203790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.203828]  kthread+0x328/0x630
[   51.203856]  ret_from_fork+0x10/0x20
[   51.203887] 
[   51.273604] Allocated by task 312:
[   51.276989]  kasan_save_stack+0x3c/0x68
[   51.280809]  kasan_save_track+0x20/0x40
[   51.284628]  kasan_save_alloc_info+0x40/0x58
[   51.288881]  __kasan_kmalloc+0xd4/0xd8
[   51.292614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.297128]  kasan_atomics+0xb8/0x2e0
[   51.300774]  kunit_try_run_case+0x170/0x3f0
[   51.304940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.310409]  kthread+0x328/0x630
[   51.313621]  ret_from_fork+0x10/0x20
[   51.317180] 
[   51.318655] The buggy address belongs to the object at ffff000805f49a00
[   51.318655]  which belongs to the cache kmalloc-64 of size 64
[   51.330982] The buggy address is located 0 bytes to the right of
[   51.330982]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.343829] 
[   51.345304] The buggy address belongs to the physical page:
[   51.350860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.358848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.365356] page_type: f5(slab)
[   51.368489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.376213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.383932] page dumped because: kasan: bad access detected
[   51.389488] 
[   51.390963] Memory state around the buggy address:
[   51.395741]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.402946]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.410151] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.417351]                                      ^
[   51.422130]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.429335]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.436536] ==================================================================
[   47.758436] ==================================================================
[   47.765413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.772789] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   47.780080] 
[   47.781565] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   47.781618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.781636] Hardware name: WinLink E850-96 board (DT)
[   47.781656] Call trace:
[   47.781670]  show_stack+0x20/0x38 (C)
[   47.781706]  dump_stack_lvl+0x8c/0xd0
[   47.781741]  print_report+0x118/0x608
[   47.781776]  kasan_report+0xdc/0x128
[   47.781812]  __asan_report_load4_noabort+0x20/0x30
[   47.781852]  kasan_atomics_helper+0x40fc/0x4858
[   47.781886]  kasan_atomics+0x198/0x2e0
[   47.781917]  kunit_try_run_case+0x170/0x3f0
[   47.781954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.781993]  kthread+0x328/0x630
[   47.782019]  ret_from_fork+0x10/0x20
[   47.782053] 
[   47.848482] Allocated by task 312:
[   47.851868]  kasan_save_stack+0x3c/0x68
[   47.855686]  kasan_save_track+0x20/0x40
[   47.859506]  kasan_save_alloc_info+0x40/0x58
[   47.863760]  __kasan_kmalloc+0xd4/0xd8
[   47.867491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.872006]  kasan_atomics+0xb8/0x2e0
[   47.875651]  kunit_try_run_case+0x170/0x3f0
[   47.879818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.885287]  kthread+0x328/0x630
[   47.888499]  ret_from_fork+0x10/0x20
[   47.892058] 
[   47.893534] The buggy address belongs to the object at ffff000805f49a00
[   47.893534]  which belongs to the cache kmalloc-64 of size 64
[   47.905862] The buggy address is located 0 bytes to the right of
[   47.905862]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.918707] 
[   47.920184] The buggy address belongs to the physical page:
[   47.925741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.933726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.940234] page_type: f5(slab)
[   47.943369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.951091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.958810] page dumped because: kasan: bad access detected
[   47.964365] 
[   47.965841] Memory state around the buggy address:
[   47.970621]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.977824]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.985029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.992230]                                      ^
[   47.997008]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.004212]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.011413] ==================================================================
[   51.707616] ==================================================================
[   51.714659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.722035] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.729327] 
[   51.730809] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.730854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.730872] Hardware name: WinLink E850-96 board (DT)
[   51.730893] Call trace:
[   51.730907]  show_stack+0x20/0x38 (C)
[   51.730940]  dump_stack_lvl+0x8c/0xd0
[   51.730976]  print_report+0x118/0x608
[   51.731010]  kasan_report+0xdc/0x128
[   51.731044]  __asan_report_load4_noabort+0x20/0x30
[   51.731083]  kasan_atomics_helper+0x42d8/0x4858
[   51.731117]  kasan_atomics+0x198/0x2e0
[   51.731149]  kunit_try_run_case+0x170/0x3f0
[   51.731182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.731221]  kthread+0x328/0x630
[   51.731250]  ret_from_fork+0x10/0x20
[   51.731284] 
[   51.797728] Allocated by task 312:
[   51.801114]  kasan_save_stack+0x3c/0x68
[   51.804932]  kasan_save_track+0x20/0x40
[   51.808752]  kasan_save_alloc_info+0x40/0x58
[   51.813006]  __kasan_kmalloc+0xd4/0xd8
[   51.816738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.821252]  kasan_atomics+0xb8/0x2e0
[   51.824898]  kunit_try_run_case+0x170/0x3f0
[   51.829064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.834533]  kthread+0x328/0x630
[   51.837745]  ret_from_fork+0x10/0x20
[   51.841304] 
[   51.842779] The buggy address belongs to the object at ffff000805f49a00
[   51.842779]  which belongs to the cache kmalloc-64 of size 64
[   51.855106] The buggy address is located 0 bytes to the right of
[   51.855106]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.867953] 
[   51.869429] The buggy address belongs to the physical page:
[   51.874984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.882972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.889480] page_type: f5(slab)
[   51.892614] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.900338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.908056] page dumped because: kasan: bad access detected
[   51.913612] 
[   51.915087] Memory state around the buggy address:
[   51.919866]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.927070]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.934275] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.941476]                                      ^
[   51.946254]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.953459]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.960660] ==================================================================
[   51.443918] ==================================================================
[   51.450948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.458237] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   51.465615] 
[   51.467098] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   51.467147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.467165] Hardware name: WinLink E850-96 board (DT)
[   51.467185] Call trace:
[   51.467202]  show_stack+0x20/0x38 (C)
[   51.467234]  dump_stack_lvl+0x8c/0xd0
[   51.467272]  print_report+0x118/0x608
[   51.467305]  kasan_report+0xdc/0x128
[   51.467338]  kasan_check_range+0x100/0x1a8
[   51.467374]  __kasan_check_write+0x20/0x30
[   51.467405]  kasan_atomics_helper+0x894/0x4858
[   51.467437]  kasan_atomics+0x198/0x2e0
[   51.467469]  kunit_try_run_case+0x170/0x3f0
[   51.467504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.467544]  kthread+0x328/0x630
[   51.467571]  ret_from_fork+0x10/0x20
[   51.467604] 
[   51.537315] Allocated by task 312:
[   51.540701]  kasan_save_stack+0x3c/0x68
[   51.544520]  kasan_save_track+0x20/0x40
[   51.548339]  kasan_save_alloc_info+0x40/0x58
[   51.552593]  __kasan_kmalloc+0xd4/0xd8
[   51.556325]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.560839]  kasan_atomics+0xb8/0x2e0
[   51.564485]  kunit_try_run_case+0x170/0x3f0
[   51.568652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.574120]  kthread+0x328/0x630
[   51.577332]  ret_from_fork+0x10/0x20
[   51.580891] 
[   51.582367] The buggy address belongs to the object at ffff000805f49a00
[   51.582367]  which belongs to the cache kmalloc-64 of size 64
[   51.594693] The buggy address is located 0 bytes to the right of
[   51.594693]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.607540] 
[   51.609016] The buggy address belongs to the physical page:
[   51.614572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.622558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.629068] page_type: f5(slab)
[   51.632200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.639925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.647644] page dumped because: kasan: bad access detected
[   51.653199] 
[   51.654674] Memory state around the buggy address:
[   51.659453]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.666658]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.673862] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.681063]                                      ^
[   51.685841]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.693046]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.700247] ==================================================================
[   49.334217] ==================================================================
[   49.341258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.348546] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.355924] 
[   49.357408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.357457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.357475] Hardware name: WinLink E850-96 board (DT)
[   49.357497] Call trace:
[   49.357512]  show_stack+0x20/0x38 (C)
[   49.357545]  dump_stack_lvl+0x8c/0xd0
[   49.357583]  print_report+0x118/0x608
[   49.357619]  kasan_report+0xdc/0x128
[   49.357652]  kasan_check_range+0x100/0x1a8
[   49.357686]  __kasan_check_write+0x20/0x30
[   49.357717]  kasan_atomics_helper+0x4e4/0x4858
[   49.357749]  kasan_atomics+0x198/0x2e0
[   49.357781]  kunit_try_run_case+0x170/0x3f0
[   49.357816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.357854]  kthread+0x328/0x630
[   49.357883]  ret_from_fork+0x10/0x20
[   49.357915] 
[   49.427625] Allocated by task 312:
[   49.431010]  kasan_save_stack+0x3c/0x68
[   49.434829]  kasan_save_track+0x20/0x40
[   49.438649]  kasan_save_alloc_info+0x40/0x58
[   49.442903]  __kasan_kmalloc+0xd4/0xd8
[   49.446635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.451149]  kasan_atomics+0xb8/0x2e0
[   49.454794]  kunit_try_run_case+0x170/0x3f0
[   49.458961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.464430]  kthread+0x328/0x630
[   49.467642]  ret_from_fork+0x10/0x20
[   49.471201] 
[   49.472676] The buggy address belongs to the object at ffff000805f49a00
[   49.472676]  which belongs to the cache kmalloc-64 of size 64
[   49.485003] The buggy address is located 0 bytes to the right of
[   49.485003]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   49.497850] 
[   49.499326] The buggy address belongs to the physical page:
[   49.504881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   49.512869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.519377] page_type: f5(slab)
[   49.522510] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.530235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.537953] page dumped because: kasan: bad access detected
[   49.543508] 
[   49.544984] Memory state around the buggy address:
[   49.549762]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.556967]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.564172] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.571373]                                      ^
[   49.576151]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.583356]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.590556] ==================================================================
[   56.431167] ==================================================================
[   56.438200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.445575] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.452953] 
[   56.454437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.454484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.454501] Hardware name: WinLink E850-96 board (DT)
[   56.454521] Call trace:
[   56.454534]  show_stack+0x20/0x38 (C)
[   56.454567]  dump_stack_lvl+0x8c/0xd0
[   56.454604]  print_report+0x118/0x608
[   56.454637]  kasan_report+0xdc/0x128
[   56.454671]  __asan_report_store8_noabort+0x20/0x30
[   56.454703]  kasan_atomics_helper+0x3e5c/0x4858
[   56.454736]  kasan_atomics+0x198/0x2e0
[   56.454768]  kunit_try_run_case+0x170/0x3f0
[   56.454804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.454842]  kthread+0x328/0x630
[   56.454868]  ret_from_fork+0x10/0x20
[   56.454900] 
[   56.521442] Allocated by task 312:
[   56.524827]  kasan_save_stack+0x3c/0x68
[   56.528647]  kasan_save_track+0x20/0x40
[   56.532466]  kasan_save_alloc_info+0x40/0x58
[   56.536719]  __kasan_kmalloc+0xd4/0xd8
[   56.540452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.544966]  kasan_atomics+0xb8/0x2e0
[   56.548612]  kunit_try_run_case+0x170/0x3f0
[   56.552778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.558247]  kthread+0x328/0x630
[   56.561459]  ret_from_fork+0x10/0x20
[   56.565018] 
[   56.566493] The buggy address belongs to the object at ffff000805f49a00
[   56.566493]  which belongs to the cache kmalloc-64 of size 64
[   56.578820] The buggy address is located 0 bytes to the right of
[   56.578820]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.591667] 
[   56.593142] The buggy address belongs to the physical page:
[   56.598698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.606683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.613194] page_type: f5(slab)
[   56.616327] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.624051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.631770] page dumped because: kasan: bad access detected
[   56.637326] 
[   56.638801] Memory state around the buggy address:
[   56.643579]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.650784]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.657989] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.665190]                                      ^
[   56.669968]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.677172]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.684374] ==================================================================
[   54.071162] ==================================================================
[   54.078166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.085455] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.092833] 
[   54.094315] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.094361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.094378] Hardware name: WinLink E850-96 board (DT)
[   54.094397] Call trace:
[   54.094411]  show_stack+0x20/0x38 (C)
[   54.094443]  dump_stack_lvl+0x8c/0xd0
[   54.094480]  print_report+0x118/0x608
[   54.094513]  kasan_report+0xdc/0x128
[   54.094546]  kasan_check_range+0x100/0x1a8
[   54.094584]  __kasan_check_write+0x20/0x30
[   54.094615]  kasan_atomics_helper+0xc08/0x4858
[   54.094649]  kasan_atomics+0x198/0x2e0
[   54.094679]  kunit_try_run_case+0x170/0x3f0
[   54.094713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.094751]  kthread+0x328/0x630
[   54.094780]  ret_from_fork+0x10/0x20
[   54.094813] 
[   54.164533] Allocated by task 312:
[   54.167918]  kasan_save_stack+0x3c/0x68
[   54.171737]  kasan_save_track+0x20/0x40
[   54.175557]  kasan_save_alloc_info+0x40/0x58
[   54.179810]  __kasan_kmalloc+0xd4/0xd8
[   54.183543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.188057]  kasan_atomics+0xb8/0x2e0
[   54.191702]  kunit_try_run_case+0x170/0x3f0
[   54.195869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.201338]  kthread+0x328/0x630
[   54.204550]  ret_from_fork+0x10/0x20
[   54.208108] 
[   54.209584] The buggy address belongs to the object at ffff000805f49a00
[   54.209584]  which belongs to the cache kmalloc-64 of size 64
[   54.221911] The buggy address is located 0 bytes to the right of
[   54.221911]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   54.234758] 
[   54.236233] The buggy address belongs to the physical page:
[   54.241789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   54.249778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.256285] page_type: f5(slab)
[   54.259418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.267143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.274861] page dumped because: kasan: bad access detected
[   54.280416] 
[   54.281892] Memory state around the buggy address:
[   54.286671]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.293875]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.301080] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.308281]                                      ^
[   54.313059]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.320264]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.327464] ==================================================================
[   56.167435] ==================================================================
[   56.174487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.181777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   56.189155] 
[   56.190636] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   56.190683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.190699] Hardware name: WinLink E850-96 board (DT)
[   56.190717] Call trace:
[   56.190733]  show_stack+0x20/0x38 (C)
[   56.190766]  dump_stack_lvl+0x8c/0xd0
[   56.190801]  print_report+0x118/0x608
[   56.190832]  kasan_report+0xdc/0x128
[   56.190865]  kasan_check_range+0x100/0x1a8
[   56.190901]  __kasan_check_write+0x20/0x30
[   56.190932]  kasan_atomics_helper+0xe44/0x4858
[   56.190966]  kasan_atomics+0x198/0x2e0
[   56.190997]  kunit_try_run_case+0x170/0x3f0
[   56.191032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.191070]  kthread+0x328/0x630
[   56.191098]  ret_from_fork+0x10/0x20
[   56.191128] 
[   56.260855] Allocated by task 312:
[   56.264241]  kasan_save_stack+0x3c/0x68
[   56.268060]  kasan_save_track+0x20/0x40
[   56.271879]  kasan_save_alloc_info+0x40/0x58
[   56.276133]  __kasan_kmalloc+0xd4/0xd8
[   56.279866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.284380]  kasan_atomics+0xb8/0x2e0
[   56.288025]  kunit_try_run_case+0x170/0x3f0
[   56.292192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.297661]  kthread+0x328/0x630
[   56.300872]  ret_from_fork+0x10/0x20
[   56.304431] 
[   56.305907] The buggy address belongs to the object at ffff000805f49a00
[   56.305907]  which belongs to the cache kmalloc-64 of size 64
[   56.318234] The buggy address is located 0 bytes to the right of
[   56.318234]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.331080] 
[   56.332556] The buggy address belongs to the physical page:
[   56.338112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.346098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.352608] page_type: f5(slab)
[   56.355741] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.363465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.371184] page dumped because: kasan: bad access detected
[   56.376739] 
[   56.378214] Memory state around the buggy address:
[   56.382993]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.390198]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.397402] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.404603]                                      ^
[   56.409381]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.416586]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.423787] ==================================================================
[   49.861724] ==================================================================
[   49.868679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.875969] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.883347] 
[   49.884831] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.884883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.884899] Hardware name: WinLink E850-96 board (DT)
[   49.884920] Call trace:
[   49.884934]  show_stack+0x20/0x38 (C)
[   49.884967]  dump_stack_lvl+0x8c/0xd0
[   49.885005]  print_report+0x118/0x608
[   49.885038]  kasan_report+0xdc/0x128
[   49.885071]  kasan_check_range+0x100/0x1a8
[   49.885107]  __kasan_check_write+0x20/0x30
[   49.885137]  kasan_atomics_helper+0x5b4/0x4858
[   49.885170]  kasan_atomics+0x198/0x2e0
[   49.885201]  kunit_try_run_case+0x170/0x3f0
[   49.885235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.885274]  kthread+0x328/0x630
[   49.885302]  ret_from_fork+0x10/0x20
[   49.885331] 
[   49.955047] Allocated by task 312:
[   49.958433]  kasan_save_stack+0x3c/0x68
[   49.962252]  kasan_save_track+0x20/0x40
[   49.966072]  kasan_save_alloc_info+0x40/0x58
[   49.970325]  __kasan_kmalloc+0xd4/0xd8
[   49.974058]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.978571]  kasan_atomics+0xb8/0x2e0
[   49.982217]  kunit_try_run_case+0x170/0x3f0
[   49.986384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.991853]  kthread+0x328/0x630
[   49.995064]  ret_from_fork+0x10/0x20
[   49.998623] 
[   50.000099] The buggy address belongs to the object at ffff000805f49a00
[   50.000099]  which belongs to the cache kmalloc-64 of size 64
[   50.012425] The buggy address is located 0 bytes to the right of
[   50.012425]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.025272] 
[   50.026749] The buggy address belongs to the physical page:
[   50.032304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.040290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.046799] page_type: f5(slab)
[   50.049935] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.057657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.065376] page dumped because: kasan: bad access detected
[   50.070931] 
[   50.072406] Memory state around the buggy address:
[   50.077185]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.084390]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.091594] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.098795]                                      ^
[   50.103574]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.110778]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.117979] ==================================================================
[   46.707046] ==================================================================
[   46.714042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.721415] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   46.728795] 
[   46.730282] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.730339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.730357] Hardware name: WinLink E850-96 board (DT)
[   46.730378] Call trace:
[   46.730393]  show_stack+0x20/0x38 (C)
[   46.730430]  dump_stack_lvl+0x8c/0xd0
[   46.730468]  print_report+0x118/0x608
[   46.730503]  kasan_report+0xdc/0x128
[   46.730539]  __asan_report_store4_noabort+0x20/0x30
[   46.730575]  kasan_atomics_helper+0x3f7c/0x4858
[   46.730610]  kasan_atomics+0x198/0x2e0
[   46.730645]  kunit_try_run_case+0x170/0x3f0
[   46.730681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.730721]  kthread+0x328/0x630
[   46.730753]  ret_from_fork+0x10/0x20
[   46.730790] 
[   46.797283] Allocated by task 312:
[   46.800670]  kasan_save_stack+0x3c/0x68
[   46.804487]  kasan_save_track+0x20/0x40
[   46.808306]  kasan_save_alloc_info+0x40/0x58
[   46.812560]  __kasan_kmalloc+0xd4/0xd8
[   46.816293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.820807]  kasan_atomics+0xb8/0x2e0
[   46.824452]  kunit_try_run_case+0x170/0x3f0
[   46.828619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.834087]  kthread+0x328/0x630
[   46.837299]  ret_from_fork+0x10/0x20
[   46.840860] 
[   46.842336] The buggy address belongs to the object at ffff000805f49a00
[   46.842336]  which belongs to the cache kmalloc-64 of size 64
[   46.854662] The buggy address is located 0 bytes to the right of
[   46.854662]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   46.867507] 
[   46.868985] The buggy address belongs to the physical page:
[   46.874542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   46.882527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.889035] page_type: f5(slab)
[   46.892170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.899892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.907611] page dumped because: kasan: bad access detected
[   46.913166] 
[   46.914641] Memory state around the buggy address:
[   46.919421]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.926624]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.933831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.941030]                                      ^
[   46.945808]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.953013]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.960214] ==================================================================
[   52.231709] ==================================================================
[   52.238783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.246072] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   52.253451] 
[   52.254933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   52.254984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.254998] Hardware name: WinLink E850-96 board (DT)
[   52.255018] Call trace:
[   52.255031]  show_stack+0x20/0x38 (C)
[   52.255065]  dump_stack_lvl+0x8c/0xd0
[   52.255100]  print_report+0x118/0x608
[   52.255133]  kasan_report+0xdc/0x128
[   52.255166]  kasan_check_range+0x100/0x1a8
[   52.255201]  __kasan_check_write+0x20/0x30
[   52.255230]  kasan_atomics_helper+0x99c/0x4858
[   52.255265]  kasan_atomics+0x198/0x2e0
[   52.255296]  kunit_try_run_case+0x170/0x3f0
[   52.255329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.255367]  kthread+0x328/0x630
[   52.255396]  ret_from_fork+0x10/0x20
[   52.255428] 
[   52.325151] Allocated by task 312:
[   52.328536]  kasan_save_stack+0x3c/0x68
[   52.332355]  kasan_save_track+0x20/0x40
[   52.336175]  kasan_save_alloc_info+0x40/0x58
[   52.340428]  __kasan_kmalloc+0xd4/0xd8
[   52.344161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.348675]  kasan_atomics+0xb8/0x2e0
[   52.352321]  kunit_try_run_case+0x170/0x3f0
[   52.356487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.361956]  kthread+0x328/0x630
[   52.365168]  ret_from_fork+0x10/0x20
[   52.368727] 
[   52.370202] The buggy address belongs to the object at ffff000805f49a00
[   52.370202]  which belongs to the cache kmalloc-64 of size 64
[   52.382529] The buggy address is located 0 bytes to the right of
[   52.382529]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.395375] 
[   52.396851] The buggy address belongs to the physical page:
[   52.402407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.410393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.416903] page_type: f5(slab)
[   52.420036] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.427760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.435479] page dumped because: kasan: bad access detected
[   52.441034] 
[   52.442510] Memory state around the buggy address:
[   52.447288]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.454493]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.461698] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.468898]                                      ^
[   52.473677]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.480881]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.488082] ==================================================================
[   48.543148] ==================================================================
[   48.550124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.557413] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.564791] 
[   48.566276] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.566329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.566347] Hardware name: WinLink E850-96 board (DT)
[   48.566371] Call trace:
[   48.566387]  show_stack+0x20/0x38 (C)
[   48.566426]  dump_stack_lvl+0x8c/0xd0
[   48.566464]  print_report+0x118/0x608
[   48.566502]  kasan_report+0xdc/0x128
[   48.566535]  kasan_check_range+0x100/0x1a8
[   48.566574]  __kasan_check_write+0x20/0x30
[   48.566605]  kasan_atomics_helper+0x3ac/0x4858
[   48.566639]  kasan_atomics+0x198/0x2e0
[   48.566669]  kunit_try_run_case+0x170/0x3f0
[   48.566705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.566743]  kthread+0x328/0x630
[   48.566771]  ret_from_fork+0x10/0x20
[   48.566805] 
[   48.636491] Allocated by task 312:
[   48.639878]  kasan_save_stack+0x3c/0x68
[   48.643695]  kasan_save_track+0x20/0x40
[   48.647515]  kasan_save_alloc_info+0x40/0x58
[   48.651768]  __kasan_kmalloc+0xd4/0xd8
[   48.655501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.660015]  kasan_atomics+0xb8/0x2e0
[   48.663661]  kunit_try_run_case+0x170/0x3f0
[   48.667827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.673296]  kthread+0x328/0x630
[   48.676508]  ret_from_fork+0x10/0x20
[   48.680067] 
[   48.681544] The buggy address belongs to the object at ffff000805f49a00
[   48.681544]  which belongs to the cache kmalloc-64 of size 64
[   48.693869] The buggy address is located 0 bytes to the right of
[   48.693869]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.706716] 
[   48.708193] The buggy address belongs to the physical page:
[   48.713752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.721735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.728243] page_type: f5(slab)
[   48.731378] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.739100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.746819] page dumped because: kasan: bad access detected
[   48.752374] 
[   48.753850] Memory state around the buggy address:
[   48.758630]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.765833]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.773038] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.780239]                                      ^
[   48.785017]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.792222]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.799422] ==================================================================
[   55.643509] ==================================================================
[   55.650537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.657827] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.665118] 
[   55.666600] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.666652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.666669] Hardware name: WinLink E850-96 board (DT)
[   55.666689] Call trace:
[   55.666705]  show_stack+0x20/0x38 (C)
[   55.666737]  dump_stack_lvl+0x8c/0xd0
[   55.666772]  print_report+0x118/0x608
[   55.666805]  kasan_report+0xdc/0x128
[   55.666840]  kasan_check_range+0x100/0x1a8
[   55.666878]  __kasan_check_read+0x20/0x30
[   55.666909]  kasan_atomics_helper+0xdd4/0x4858
[   55.666943]  kasan_atomics+0x198/0x2e0
[   55.666977]  kunit_try_run_case+0x170/0x3f0
[   55.667010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.667047]  kthread+0x328/0x630
[   55.667074]  ret_from_fork+0x10/0x20
[   55.667107] 
[   55.736731] Allocated by task 312:
[   55.740117]  kasan_save_stack+0x3c/0x68
[   55.743936]  kasan_save_track+0x20/0x40
[   55.747756]  kasan_save_alloc_info+0x40/0x58
[   55.752009]  __kasan_kmalloc+0xd4/0xd8
[   55.755742]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.760255]  kasan_atomics+0xb8/0x2e0
[   55.763901]  kunit_try_run_case+0x170/0x3f0
[   55.768068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.773536]  kthread+0x328/0x630
[   55.776748]  ret_from_fork+0x10/0x20
[   55.780307] 
[   55.781782] The buggy address belongs to the object at ffff000805f49a00
[   55.781782]  which belongs to the cache kmalloc-64 of size 64
[   55.794109] The buggy address is located 0 bytes to the right of
[   55.794109]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.806956] 
[   55.808432] The buggy address belongs to the physical page:
[   55.813988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.821975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.828484] page_type: f5(slab)
[   55.831619] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.839341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.847060] page dumped because: kasan: bad access detected
[   55.852615] 
[   55.854091] Memory state around the buggy address:
[   55.858869]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.866074]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.873278] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.880479]                                      ^
[   55.885257]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.892462]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.899663] ==================================================================
[   57.482875] ==================================================================
[   57.489921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.497209] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   57.504587] 
[   57.506068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   57.506117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.506134] Hardware name: WinLink E850-96 board (DT)
[   57.506152] Call trace:
[   57.506166]  show_stack+0x20/0x38 (C)
[   57.506199]  dump_stack_lvl+0x8c/0xd0
[   57.506234]  print_report+0x118/0x608
[   57.506268]  kasan_report+0xdc/0x128
[   57.506300]  kasan_check_range+0x100/0x1a8
[   57.506335]  __kasan_check_write+0x20/0x30
[   57.506365]  kasan_atomics_helper+0xff0/0x4858
[   57.506399]  kasan_atomics+0x198/0x2e0
[   57.506429]  kunit_try_run_case+0x170/0x3f0
[   57.506463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.506502]  kthread+0x328/0x630
[   57.506529]  ret_from_fork+0x10/0x20
[   57.506561] 
[   57.576287] Allocated by task 312:
[   57.579673]  kasan_save_stack+0x3c/0x68
[   57.583492]  kasan_save_track+0x20/0x40
[   57.587311]  kasan_save_alloc_info+0x40/0x58
[   57.591565]  __kasan_kmalloc+0xd4/0xd8
[   57.595297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.599811]  kasan_atomics+0xb8/0x2e0
[   57.603457]  kunit_try_run_case+0x170/0x3f0
[   57.607624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.613092]  kthread+0x328/0x630
[   57.616304]  ret_from_fork+0x10/0x20
[   57.619863] 
[   57.621338] The buggy address belongs to the object at ffff000805f49a00
[   57.621338]  which belongs to the cache kmalloc-64 of size 64
[   57.633665] The buggy address is located 0 bytes to the right of
[   57.633665]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.646512] 
[   57.647988] The buggy address belongs to the physical page:
[   57.653544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.661530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.668039] page_type: f5(slab)
[   57.671172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.678897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.686615] page dumped because: kasan: bad access detected
[   57.692171] 
[   57.693646] Memory state around the buggy address:
[   57.698425]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.705629]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.712834] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.720035]                                      ^
[   57.724813]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.732018]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.739219] ==================================================================
[   59.857748] ==================================================================
[   59.864713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   59.872087] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.879378] 
[   59.880861] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.880910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.880928] Hardware name: WinLink E850-96 board (DT)
[   59.880948] Call trace:
[   59.880963]  show_stack+0x20/0x38 (C)
[   59.880999]  dump_stack_lvl+0x8c/0xd0
[   59.881035]  print_report+0x118/0x608
[   59.881071]  kasan_report+0xdc/0x128
[   59.881102]  __asan_report_load8_noabort+0x20/0x30
[   59.881142]  kasan_atomics_helper+0x3f04/0x4858
[   59.881176]  kasan_atomics+0x198/0x2e0
[   59.881207]  kunit_try_run_case+0x170/0x3f0
[   59.881243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.881282]  kthread+0x328/0x630
[   59.881309]  ret_from_fork+0x10/0x20
[   59.881343] 
[   59.947779] Allocated by task 312:
[   59.951165]  kasan_save_stack+0x3c/0x68
[   59.954984]  kasan_save_track+0x20/0x40
[   59.958804]  kasan_save_alloc_info+0x40/0x58
[   59.963057]  __kasan_kmalloc+0xd4/0xd8
[   59.966789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.971303]  kasan_atomics+0xb8/0x2e0
[   59.974949]  kunit_try_run_case+0x170/0x3f0
[   59.979116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.984584]  kthread+0x328/0x630
[   59.987796]  ret_from_fork+0x10/0x20
[   59.991355] 
[   59.992831] The buggy address belongs to the object at ffff000805f49a00
[   59.992831]  which belongs to the cache kmalloc-64 of size 64
[   60.005158] The buggy address is located 0 bytes to the right of
[   60.005158]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.018004] 
[   60.019481] The buggy address belongs to the physical page:
[   60.025037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.033025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.039531] page_type: f5(slab)
[   60.042665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.050389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.058108] page dumped because: kasan: bad access detected
[   60.063663] 
[   60.065138] Memory state around the buggy address:
[   60.069918]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.077122]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.084326] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.091527]                                      ^
[   60.096305]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.103510]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.110711] ==================================================================
[   55.907054] ==================================================================
[   55.914075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   55.921451] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.928743] 
[   55.930224] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.930269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.930284] Hardware name: WinLink E850-96 board (DT)
[   55.930303] Call trace:
[   55.930317]  show_stack+0x20/0x38 (C)
[   55.930349]  dump_stack_lvl+0x8c/0xd0
[   55.930385]  print_report+0x118/0x608
[   55.930417]  kasan_report+0xdc/0x128
[   55.930451]  __asan_report_load8_noabort+0x20/0x30
[   55.930490]  kasan_atomics_helper+0x3f58/0x4858
[   55.930525]  kasan_atomics+0x198/0x2e0
[   55.930556]  kunit_try_run_case+0x170/0x3f0
[   55.930591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.930628]  kthread+0x328/0x630
[   55.930657]  ret_from_fork+0x10/0x20
[   55.930688] 
[   55.997144] Allocated by task 312:
[   56.000530]  kasan_save_stack+0x3c/0x68
[   56.004349]  kasan_save_track+0x20/0x40
[   56.008168]  kasan_save_alloc_info+0x40/0x58
[   56.012422]  __kasan_kmalloc+0xd4/0xd8
[   56.016154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.020668]  kasan_atomics+0xb8/0x2e0
[   56.024314]  kunit_try_run_case+0x170/0x3f0
[   56.028481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.033949]  kthread+0x328/0x630
[   56.037161]  ret_from_fork+0x10/0x20
[   56.040720] 
[   56.042195] The buggy address belongs to the object at ffff000805f49a00
[   56.042195]  which belongs to the cache kmalloc-64 of size 64
[   56.054522] The buggy address is located 0 bytes to the right of
[   56.054522]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   56.067369] 
[   56.068845] The buggy address belongs to the physical page:
[   56.074401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   56.082388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.088896] page_type: f5(slab)
[   56.092029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.099754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.107472] page dumped because: kasan: bad access detected
[   56.113028] 
[   56.114504] Memory state around the buggy address:
[   56.119282]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.126486]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.133691] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.140892]                                      ^
[   56.145670]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.152875]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.160075] ==================================================================
[   57.746600] ==================================================================
[   57.753632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.761007] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   57.768385] 
[   57.769867] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   57.769915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.769933] Hardware name: WinLink E850-96 board (DT)
[   57.769950] Call trace:
[   57.769967]  show_stack+0x20/0x38 (C)
[   57.769998]  dump_stack_lvl+0x8c/0xd0
[   57.770031]  print_report+0x118/0x608
[   57.770064]  kasan_report+0xdc/0x128
[   57.770100]  kasan_check_range+0x100/0x1a8
[   57.770134]  __kasan_check_write+0x20/0x30
[   57.770165]  kasan_atomics_helper+0x1058/0x4858
[   57.770198]  kasan_atomics+0x198/0x2e0
[   57.770229]  kunit_try_run_case+0x170/0x3f0
[   57.770265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.770303]  kthread+0x328/0x630
[   57.770332]  ret_from_fork+0x10/0x20
[   57.770363] 
[   57.840172] Allocated by task 312:
[   57.843558]  kasan_save_stack+0x3c/0x68
[   57.847377]  kasan_save_track+0x20/0x40
[   57.851196]  kasan_save_alloc_info+0x40/0x58
[   57.855450]  __kasan_kmalloc+0xd4/0xd8
[   57.859182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.863696]  kasan_atomics+0xb8/0x2e0
[   57.867342]  kunit_try_run_case+0x170/0x3f0
[   57.871508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.876977]  kthread+0x328/0x630
[   57.880189]  ret_from_fork+0x10/0x20
[   57.883747] 
[   57.885223] The buggy address belongs to the object at ffff000805f49a00
[   57.885223]  which belongs to the cache kmalloc-64 of size 64
[   57.897550] The buggy address is located 0 bytes to the right of
[   57.897550]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.910396] 
[   57.911873] The buggy address belongs to the physical page:
[   57.917429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.925415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.931924] page_type: f5(slab)
[   57.935057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.942782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.950500] page dumped because: kasan: bad access detected
[   57.956055] 
[   57.957531] Memory state around the buggy address:
[   57.962310]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.969515]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.976719] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.983920]                                      ^
[   57.988698]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.995903]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.003104] ==================================================================
[   50.125343] ==================================================================
[   50.132392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.139681] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.147058] 
[   50.148542] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.148591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.148607] Hardware name: WinLink E850-96 board (DT)
[   50.148628] Call trace:
[   50.148641]  show_stack+0x20/0x38 (C)
[   50.148676]  dump_stack_lvl+0x8c/0xd0
[   50.148714]  print_report+0x118/0x608
[   50.148748]  kasan_report+0xdc/0x128
[   50.148782]  kasan_check_range+0x100/0x1a8
[   50.148817]  __kasan_check_write+0x20/0x30
[   50.148846]  kasan_atomics_helper+0x61c/0x4858
[   50.148880]  kasan_atomics+0x198/0x2e0
[   50.148910]  kunit_try_run_case+0x170/0x3f0
[   50.148945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.148983]  kthread+0x328/0x630
[   50.149010]  ret_from_fork+0x10/0x20
[   50.149043] 
[   50.218758] Allocated by task 312:
[   50.222144]  kasan_save_stack+0x3c/0x68
[   50.225963]  kasan_save_track+0x20/0x40
[   50.229783]  kasan_save_alloc_info+0x40/0x58
[   50.234036]  __kasan_kmalloc+0xd4/0xd8
[   50.237769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.242283]  kasan_atomics+0xb8/0x2e0
[   50.245929]  kunit_try_run_case+0x170/0x3f0
[   50.250095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.255564]  kthread+0x328/0x630
[   50.258775]  ret_from_fork+0x10/0x20
[   50.262334] 
[   50.263810] The buggy address belongs to the object at ffff000805f49a00
[   50.263810]  which belongs to the cache kmalloc-64 of size 64
[   50.276137] The buggy address is located 0 bytes to the right of
[   50.276137]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.288983] 
[   50.290459] The buggy address belongs to the physical page:
[   50.296015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.304001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.310511] page_type: f5(slab)
[   50.313644] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.321368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.329087] page dumped because: kasan: bad access detected
[   50.334642] 
[   50.336118] Memory state around the buggy address:
[   50.340896]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.348101]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.355306] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.362506]                                      ^
[   50.367285]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.374489]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.381690] ==================================================================
[   54.334849] ==================================================================
[   54.341876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.349253] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.356544] 
[   54.358026] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.358076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.358092] Hardware name: WinLink E850-96 board (DT)
[   54.358113] Call trace:
[   54.358130]  show_stack+0x20/0x38 (C)
[   54.358164]  dump_stack_lvl+0x8c/0xd0
[   54.358200]  print_report+0x118/0x608
[   54.358233]  kasan_report+0xdc/0x128
[   54.358267]  __asan_report_load4_noabort+0x20/0x30
[   54.358307]  kasan_atomics_helper+0x3de4/0x4858
[   54.358340]  kasan_atomics+0x198/0x2e0
[   54.358370]  kunit_try_run_case+0x170/0x3f0
[   54.358407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.358447]  kthread+0x328/0x630
[   54.358475]  ret_from_fork+0x10/0x20
[   54.358507] 
[   54.424945] Allocated by task 312:
[   54.428331]  kasan_save_stack+0x3c/0x68
[   54.432151]  kasan_save_track+0x20/0x40
[   54.435970]  kasan_save_alloc_info+0x40/0x58
[   54.440223]  __kasan_kmalloc+0xd4/0xd8
[   54.443956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.448469]  kasan_atomics+0xb8/0x2e0
[   54.452115]  kunit_try_run_case+0x170/0x3f0
[   54.456282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.461750]  kthread+0x328/0x630
[   54.464962]  ret_from_fork+0x10/0x20
[   54.468521] 
[   54.469997] The buggy address belongs to the object at ffff000805f49a00
[   54.469997]  which belongs to the cache kmalloc-64 of size 64
[   54.482324] The buggy address is located 0 bytes to the right of
[   54.482324]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   54.495170] 
[   54.496647] The buggy address belongs to the physical page:
[   54.502203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   54.510189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.516697] page_type: f5(slab)
[   54.519831] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.527555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.535274] page dumped because: kasan: bad access detected
[   54.540829] 
[   54.542305] Memory state around the buggy address:
[   54.547083]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.554288]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.561492] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.568693]                                      ^
[   54.573471]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.580676]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.587877] ==================================================================
[   62.486093] ==================================================================
[   62.493144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.500519] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   62.507810] 
[   62.509294] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   62.509341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.509358] Hardware name: WinLink E850-96 board (DT)
[   62.509376] Call trace:
[   62.509390]  show_stack+0x20/0x38 (C)
[   62.509425]  dump_stack_lvl+0x8c/0xd0
[   62.509460]  print_report+0x118/0x608
[   62.509494]  kasan_report+0xdc/0x128
[   62.509528]  __asan_report_load8_noabort+0x20/0x30
[   62.509566]  kasan_atomics_helper+0x3e10/0x4858
[   62.509602]  kasan_atomics+0x198/0x2e0
[   62.509631]  kunit_try_run_case+0x170/0x3f0
[   62.509665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.509703]  kthread+0x328/0x630
[   62.509728]  ret_from_fork+0x10/0x20
[   62.509760] 
[   62.576212] Allocated by task 312:
[   62.579597]  kasan_save_stack+0x3c/0x68
[   62.583417]  kasan_save_track+0x20/0x40
[   62.587236]  kasan_save_alloc_info+0x40/0x58
[   62.591490]  __kasan_kmalloc+0xd4/0xd8
[   62.595222]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.599736]  kasan_atomics+0xb8/0x2e0
[   62.603382]  kunit_try_run_case+0x170/0x3f0
[   62.607548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.613017]  kthread+0x328/0x630
[   62.616229]  ret_from_fork+0x10/0x20
[   62.619788] 
[   62.621263] The buggy address belongs to the object at ffff000805f49a00
[   62.621263]  which belongs to the cache kmalloc-64 of size 64
[   62.633590] The buggy address is located 0 bytes to the right of
[   62.633590]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.646437] 
[   62.647913] The buggy address belongs to the physical page:
[   62.653469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.661457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.667964] page_type: f5(slab)
[   62.671097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.678822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.686540] page dumped because: kasan: bad access detected
[   62.692095] 
[   62.693571] Memory state around the buggy address:
[   62.698351]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.705554]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.712759] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.719960]                                      ^
[   62.724738]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.731943]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.739144] ==================================================================
[   53.546987] ==================================================================
[   53.554042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.561330] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.568708] 
[   53.570190] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.570236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.570252] Hardware name: WinLink E850-96 board (DT)
[   53.570271] Call trace:
[   53.570283]  show_stack+0x20/0x38 (C)
[   53.570316]  dump_stack_lvl+0x8c/0xd0
[   53.570351]  print_report+0x118/0x608
[   53.570383]  kasan_report+0xdc/0x128
[   53.570419]  kasan_check_range+0x100/0x1a8
[   53.570456]  __kasan_check_write+0x20/0x30
[   53.570484]  kasan_atomics_helper+0xb70/0x4858
[   53.570518]  kasan_atomics+0x198/0x2e0
[   53.570549]  kunit_try_run_case+0x170/0x3f0
[   53.570583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.570622]  kthread+0x328/0x630
[   53.570648]  ret_from_fork+0x10/0x20
[   53.570680] 
[   53.640409] Allocated by task 312:
[   53.643794]  kasan_save_stack+0x3c/0x68
[   53.647613]  kasan_save_track+0x20/0x40
[   53.651433]  kasan_save_alloc_info+0x40/0x58
[   53.655686]  __kasan_kmalloc+0xd4/0xd8
[   53.659419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.663933]  kasan_atomics+0xb8/0x2e0
[   53.667579]  kunit_try_run_case+0x170/0x3f0
[   53.671745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.677214]  kthread+0x328/0x630
[   53.680425]  ret_from_fork+0x10/0x20
[   53.683985] 
[   53.685460] The buggy address belongs to the object at ffff000805f49a00
[   53.685460]  which belongs to the cache kmalloc-64 of size 64
[   53.697787] The buggy address is located 0 bytes to the right of
[   53.697787]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.710634] 
[   53.712109] The buggy address belongs to the physical page:
[   53.717665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.725650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.732161] page_type: f5(slab)
[   53.735294] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.743018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.750737] page dumped because: kasan: bad access detected
[   53.756292] 
[   53.757768] Memory state around the buggy address:
[   53.762546]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.769751]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.776956] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.784157]                                      ^
[   53.788935]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.796139]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.803340] ==================================================================
[   49.070528] ==================================================================
[   49.077546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.084835] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.092213] 
[   49.093697] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.093747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.093765] Hardware name: WinLink E850-96 board (DT)
[   49.093787] Call trace:
[   49.093803]  show_stack+0x20/0x38 (C)
[   49.093836]  dump_stack_lvl+0x8c/0xd0
[   49.093875]  print_report+0x118/0x608
[   49.093908]  kasan_report+0xdc/0x128
[   49.093944]  kasan_check_range+0x100/0x1a8
[   49.093980]  __kasan_check_write+0x20/0x30
[   49.094011]  kasan_atomics_helper+0x47c/0x4858
[   49.094043]  kasan_atomics+0x198/0x2e0
[   49.094073]  kunit_try_run_case+0x170/0x3f0
[   49.094108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.094147]  kthread+0x328/0x630
[   49.094173]  ret_from_fork+0x10/0x20
[   49.094206] 
[   49.163914] Allocated by task 312:
[   49.167299]  kasan_save_stack+0x3c/0x68
[   49.171118]  kasan_save_track+0x20/0x40
[   49.174938]  kasan_save_alloc_info+0x40/0x58
[   49.179191]  __kasan_kmalloc+0xd4/0xd8
[   49.182924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.187437]  kasan_atomics+0xb8/0x2e0
[   49.191083]  kunit_try_run_case+0x170/0x3f0
[   49.195250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.200718]  kthread+0x328/0x630
[   49.203930]  ret_from_fork+0x10/0x20
[   49.207489] 
[   49.208965] The buggy address belongs to the object at ffff000805f49a00
[   49.208965]  which belongs to the cache kmalloc-64 of size 64
[   49.221292] The buggy address is located 0 bytes to the right of
[   49.221292]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   49.234138] 
[   49.235615] The buggy address belongs to the physical page:
[   49.241170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   49.249156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.255665] page_type: f5(slab)
[   49.258799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.266523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.274242] page dumped because: kasan: bad access detected
[   49.279797] 
[   49.281273] Memory state around the buggy address:
[   49.286053]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.293256]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.300461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.307661]                                      ^
[   49.312439]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.319644]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.326845] ==================================================================
[   63.270803] ==================================================================
[   63.277855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.285229] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   63.292607] 
[   63.294091] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.294140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.294156] Hardware name: WinLink E850-96 board (DT)
[   63.294174] Call trace:
[   63.294189]  show_stack+0x20/0x38 (C)
[   63.294222]  dump_stack_lvl+0x8c/0xd0
[   63.294255]  print_report+0x118/0x608
[   63.294290]  kasan_report+0xdc/0x128
[   63.294324]  kasan_check_range+0x100/0x1a8
[   63.294360]  __kasan_check_write+0x20/0x30
[   63.294391]  kasan_atomics_helper+0x17ec/0x4858
[   63.294424]  kasan_atomics+0x198/0x2e0
[   63.294454]  kunit_try_run_case+0x170/0x3f0
[   63.294489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.294526]  kthread+0x328/0x630
[   63.294555]  ret_from_fork+0x10/0x20
[   63.294589] 
[   63.364394] Allocated by task 312:
[   63.367780]  kasan_save_stack+0x3c/0x68
[   63.371600]  kasan_save_track+0x20/0x40
[   63.375419]  kasan_save_alloc_info+0x40/0x58
[   63.379672]  __kasan_kmalloc+0xd4/0xd8
[   63.383405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.387919]  kasan_atomics+0xb8/0x2e0
[   63.391564]  kunit_try_run_case+0x170/0x3f0
[   63.395731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.401200]  kthread+0x328/0x630
[   63.404411]  ret_from_fork+0x10/0x20
[   63.407970] 
[   63.409446] The buggy address belongs to the object at ffff000805f49a00
[   63.409446]  which belongs to the cache kmalloc-64 of size 64
[   63.421773] The buggy address is located 0 bytes to the right of
[   63.421773]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   63.434619] 
[   63.436096] The buggy address belongs to the physical page:
[   63.441651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   63.449640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.456147] page_type: f5(slab)
[   63.459280] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.467004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.474723] page dumped because: kasan: bad access detected
[   63.480278] 
[   63.481754] Memory state around the buggy address:
[   63.486536]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.493737]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.500942] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.508142]                                      ^
[   63.512920]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.520126]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.527326] ==================================================================
[   60.381951] ==================================================================
[   60.389009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.396384] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.403762] 
[   60.405245] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.405294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.405309] Hardware name: WinLink E850-96 board (DT)
[   60.405330] Call trace:
[   60.405345]  show_stack+0x20/0x38 (C)
[   60.405379]  dump_stack_lvl+0x8c/0xd0
[   60.405414]  print_report+0x118/0x608
[   60.405448]  kasan_report+0xdc/0x128
[   60.405482]  kasan_check_range+0x100/0x1a8
[   60.405518]  __kasan_check_write+0x20/0x30
[   60.405548]  kasan_atomics_helper+0x147c/0x4858
[   60.405581]  kasan_atomics+0x198/0x2e0
[   60.405611]  kunit_try_run_case+0x170/0x3f0
[   60.405647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.405686]  kthread+0x328/0x630
[   60.405713]  ret_from_fork+0x10/0x20
[   60.405744] 
[   60.475549] Allocated by task 312:
[   60.478935]  kasan_save_stack+0x3c/0x68
[   60.482754]  kasan_save_track+0x20/0x40
[   60.486573]  kasan_save_alloc_info+0x40/0x58
[   60.490827]  __kasan_kmalloc+0xd4/0xd8
[   60.494559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.499073]  kasan_atomics+0xb8/0x2e0
[   60.502719]  kunit_try_run_case+0x170/0x3f0
[   60.506886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.512354]  kthread+0x328/0x630
[   60.515566]  ret_from_fork+0x10/0x20
[   60.519125] 
[   60.520600] The buggy address belongs to the object at ffff000805f49a00
[   60.520600]  which belongs to the cache kmalloc-64 of size 64
[   60.532927] The buggy address is located 0 bytes to the right of
[   60.532927]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.545774] 
[   60.547250] The buggy address belongs to the physical page:
[   60.552806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.560793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.567301] page_type: f5(slab)
[   60.570435] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.578159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.585877] page dumped because: kasan: bad access detected
[   60.591433] 
[   60.592908] Memory state around the buggy address:
[   60.597687]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.604891]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.612096] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.619297]                                      ^
[   60.624075]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.631280]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.638481] ==================================================================
[   48.282630] ==================================================================
[   48.289537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.296913] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.304291] 
[   48.305776] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.305828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.305848] Hardware name: WinLink E850-96 board (DT)
[   48.305872] Call trace:
[   48.305886]  show_stack+0x20/0x38 (C)
[   48.305925]  dump_stack_lvl+0x8c/0xd0
[   48.305963]  print_report+0x118/0x608
[   48.305997]  kasan_report+0xdc/0x128
[   48.306029]  __asan_report_store4_noabort+0x20/0x30
[   48.306065]  kasan_atomics_helper+0x3f94/0x4858
[   48.306098]  kasan_atomics+0x198/0x2e0
[   48.306129]  kunit_try_run_case+0x170/0x3f0
[   48.306164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.306202]  kthread+0x328/0x630
[   48.306232]  ret_from_fork+0x10/0x20
[   48.306266] 
[   48.372779] Allocated by task 312:
[   48.376165]  kasan_save_stack+0x3c/0x68
[   48.379984]  kasan_save_track+0x20/0x40
[   48.383804]  kasan_save_alloc_info+0x40/0x58
[   48.388057]  __kasan_kmalloc+0xd4/0xd8
[   48.391789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.396304]  kasan_atomics+0xb8/0x2e0
[   48.399949]  kunit_try_run_case+0x170/0x3f0
[   48.404116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.409585]  kthread+0x328/0x630
[   48.412796]  ret_from_fork+0x10/0x20
[   48.416355] 
[   48.417832] The buggy address belongs to the object at ffff000805f49a00
[   48.417832]  which belongs to the cache kmalloc-64 of size 64
[   48.430157] The buggy address is located 0 bytes to the right of
[   48.430157]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.443004] 
[   48.444480] The buggy address belongs to the physical page:
[   48.450037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.458023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.464532] page_type: f5(slab)
[   48.467665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.475389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.483108] page dumped because: kasan: bad access detected
[   48.488663] 
[   48.490139] Memory state around the buggy address:
[   48.494918]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.502122]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.509327] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.516528]                                      ^
[   48.521305]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.528510]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.535711] ==================================================================
[   61.437516] ==================================================================
[   61.444549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.451924] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.459215] 
[   61.460698] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.460744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.460760] Hardware name: WinLink E850-96 board (DT)
[   61.460780] Call trace:
[   61.460794]  show_stack+0x20/0x38 (C)
[   61.460828]  dump_stack_lvl+0x8c/0xd0
[   61.460864]  print_report+0x118/0x608
[   61.460898]  kasan_report+0xdc/0x128
[   61.460933]  __asan_report_load8_noabort+0x20/0x30
[   61.460970]  kasan_atomics_helper+0x3db0/0x4858
[   61.461003]  kasan_atomics+0x198/0x2e0
[   61.461033]  kunit_try_run_case+0x170/0x3f0
[   61.461070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.461109]  kthread+0x328/0x630
[   61.461137]  ret_from_fork+0x10/0x20
[   61.461169] 
[   61.527617] Allocated by task 312:
[   61.531002]  kasan_save_stack+0x3c/0x68
[   61.534821]  kasan_save_track+0x20/0x40
[   61.538641]  kasan_save_alloc_info+0x40/0x58
[   61.542894]  __kasan_kmalloc+0xd4/0xd8
[   61.546628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.551141]  kasan_atomics+0xb8/0x2e0
[   61.554786]  kunit_try_run_case+0x170/0x3f0
[   61.558953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.564422]  kthread+0x328/0x630
[   61.567634]  ret_from_fork+0x10/0x20
[   61.571193] 
[   61.572668] The buggy address belongs to the object at ffff000805f49a00
[   61.572668]  which belongs to the cache kmalloc-64 of size 64
[   61.584995] The buggy address is located 0 bytes to the right of
[   61.584995]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.597841] 
[   61.599317] The buggy address belongs to the physical page:
[   61.604873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.612860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.619369] page_type: f5(slab)
[   61.622502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.630226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.637945] page dumped because: kasan: bad access detected
[   61.643500] 
[   61.644976] Memory state around the buggy address:
[   61.649756]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.656959]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.664164] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.671365]                                      ^
[   61.676143]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.683347]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.690548] ==================================================================
[   55.383044] ==================================================================
[   55.390125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.397500] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   55.404792] 
[   55.406275] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   55.406319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.406335] Hardware name: WinLink E850-96 board (DT)
[   55.406354] Call trace:
[   55.406366]  show_stack+0x20/0x38 (C)
[   55.406399]  dump_stack_lvl+0x8c/0xd0
[   55.406436]  print_report+0x118/0x608
[   55.406468]  kasan_report+0xdc/0x128
[   55.406504]  __asan_report_load4_noabort+0x20/0x30
[   55.406540]  kasan_atomics_helper+0x3e04/0x4858
[   55.406573]  kasan_atomics+0x198/0x2e0
[   55.406604]  kunit_try_run_case+0x170/0x3f0
[   55.406637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.406676]  kthread+0x328/0x630
[   55.406704]  ret_from_fork+0x10/0x20
[   55.406737] 
[   55.473194] Allocated by task 312:
[   55.476579]  kasan_save_stack+0x3c/0x68
[   55.480398]  kasan_save_track+0x20/0x40
[   55.484218]  kasan_save_alloc_info+0x40/0x58
[   55.488471]  __kasan_kmalloc+0xd4/0xd8
[   55.492204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.496718]  kasan_atomics+0xb8/0x2e0
[   55.500364]  kunit_try_run_case+0x170/0x3f0
[   55.504530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.509999]  kthread+0x328/0x630
[   55.513210]  ret_from_fork+0x10/0x20
[   55.516770] 
[   55.518245] The buggy address belongs to the object at ffff000805f49a00
[   55.518245]  which belongs to the cache kmalloc-64 of size 64
[   55.530572] The buggy address is located 0 bytes to the right of
[   55.530572]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.543418] 
[   55.544894] The buggy address belongs to the physical page:
[   55.550450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.558438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.564946] page_type: f5(slab)
[   55.568079] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.575803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.583522] page dumped because: kasan: bad access detected
[   55.589078] 
[   55.590553] Memory state around the buggy address:
[   55.595331]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.602536]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.609741] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.616941]                                      ^
[   55.621720]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.628924]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.636125] ==================================================================
[   61.697886] ==================================================================
[   61.704960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.712336] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.719715] 
[   61.721196] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.721244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.721262] Hardware name: WinLink E850-96 board (DT)
[   61.721282] Call trace:
[   61.721296]  show_stack+0x20/0x38 (C)
[   61.721330]  dump_stack_lvl+0x8c/0xd0
[   61.721363]  print_report+0x118/0x608
[   61.721394]  kasan_report+0xdc/0x128
[   61.721432]  kasan_check_range+0x100/0x1a8
[   61.721466]  __kasan_check_write+0x20/0x30
[   61.721495]  kasan_atomics_helper+0x1644/0x4858
[   61.721529]  kasan_atomics+0x198/0x2e0
[   61.721561]  kunit_try_run_case+0x170/0x3f0
[   61.721595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.721633]  kthread+0x328/0x630
[   61.721662]  ret_from_fork+0x10/0x20
[   61.721692] 
[   61.791501] Allocated by task 312:
[   61.794887]  kasan_save_stack+0x3c/0x68
[   61.798706]  kasan_save_track+0x20/0x40
[   61.802526]  kasan_save_alloc_info+0x40/0x58
[   61.806779]  __kasan_kmalloc+0xd4/0xd8
[   61.810512]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.815026]  kasan_atomics+0xb8/0x2e0
[   61.818671]  kunit_try_run_case+0x170/0x3f0
[   61.822838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.828307]  kthread+0x328/0x630
[   61.831518]  ret_from_fork+0x10/0x20
[   61.835077] 
[   61.836553] The buggy address belongs to the object at ffff000805f49a00
[   61.836553]  which belongs to the cache kmalloc-64 of size 64
[   61.848879] The buggy address is located 0 bytes to the right of
[   61.848879]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.861726] 
[   61.863202] The buggy address belongs to the physical page:
[   61.868759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.876744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.883254] page_type: f5(slab)
[   61.886387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.894111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.901830] page dumped because: kasan: bad access detected
[   61.907385] 
[   61.908861] Memory state around the buggy address:
[   61.913641]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.920844]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.928049] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.935249]                                      ^
[   61.940027]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.947232]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.954433] ==================================================================
[   54.858940] ==================================================================
[   54.866000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   54.873377] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   54.880668] 
[   54.882149] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   54.882196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.882212] Hardware name: WinLink E850-96 board (DT)
[   54.882231] Call trace:
[   54.882246]  show_stack+0x20/0x38 (C)
[   54.882279]  dump_stack_lvl+0x8c/0xd0
[   54.882316]  print_report+0x118/0x608
[   54.882350]  kasan_report+0xdc/0x128
[   54.882382]  __asan_report_load4_noabort+0x20/0x30
[   54.882420]  kasan_atomics_helper+0x3dd8/0x4858
[   54.882453]  kasan_atomics+0x198/0x2e0
[   54.882483]  kunit_try_run_case+0x170/0x3f0
[   54.882519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.882557]  kthread+0x328/0x630
[   54.882585]  ret_from_fork+0x10/0x20
[   54.882617] 
[   54.949070] Allocated by task 312:
[   54.952455]  kasan_save_stack+0x3c/0x68
[   54.956274]  kasan_save_track+0x20/0x40
[   54.960094]  kasan_save_alloc_info+0x40/0x58
[   54.964347]  __kasan_kmalloc+0xd4/0xd8
[   54.968080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.972593]  kasan_atomics+0xb8/0x2e0
[   54.976240]  kunit_try_run_case+0x170/0x3f0
[   54.980406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.985875]  kthread+0x328/0x630
[   54.989087]  ret_from_fork+0x10/0x20
[   54.992646] 
[   54.994121] The buggy address belongs to the object at ffff000805f49a00
[   54.994121]  which belongs to the cache kmalloc-64 of size 64
[   55.006448] The buggy address is located 0 bytes to the right of
[   55.006448]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   55.019294] 
[   55.020770] The buggy address belongs to the physical page:
[   55.026326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   55.034312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.040822] page_type: f5(slab)
[   55.043955] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.051679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.059398] page dumped because: kasan: bad access detected
[   55.064953] 
[   55.066429] Memory state around the buggy address:
[   55.071207]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.078412]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.085616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.092817]                                      ^
[   55.097595]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.104800]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.112001] ==================================================================
[   62.222225] ==================================================================
[   62.229259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.236634] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   62.244012] 
[   62.245495] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   62.245543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.245559] Hardware name: WinLink E850-96 board (DT)
[   62.245579] Call trace:
[   62.245595]  show_stack+0x20/0x38 (C)
[   62.245626]  dump_stack_lvl+0x8c/0xd0
[   62.245663]  print_report+0x118/0x608
[   62.245695]  kasan_report+0xdc/0x128
[   62.245727]  kasan_check_range+0x100/0x1a8
[   62.245763]  __kasan_check_write+0x20/0x30
[   62.245792]  kasan_atomics_helper+0x16d0/0x4858
[   62.245826]  kasan_atomics+0x198/0x2e0
[   62.245858]  kunit_try_run_case+0x170/0x3f0
[   62.245893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.245931]  kthread+0x328/0x630
[   62.245958]  ret_from_fork+0x10/0x20
[   62.245989] 
[   62.315799] Allocated by task 312:
[   62.319185]  kasan_save_stack+0x3c/0x68
[   62.323004]  kasan_save_track+0x20/0x40
[   62.326823]  kasan_save_alloc_info+0x40/0x58
[   62.331077]  __kasan_kmalloc+0xd4/0xd8
[   62.334810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.339323]  kasan_atomics+0xb8/0x2e0
[   62.342969]  kunit_try_run_case+0x170/0x3f0
[   62.347136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.352604]  kthread+0x328/0x630
[   62.355816]  ret_from_fork+0x10/0x20
[   62.359375] 
[   62.360851] The buggy address belongs to the object at ffff000805f49a00
[   62.360851]  which belongs to the cache kmalloc-64 of size 64
[   62.373177] The buggy address is located 0 bytes to the right of
[   62.373177]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.386024] 
[   62.387500] The buggy address belongs to the physical page:
[   62.393056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.401044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.407551] page_type: f5(slab)
[   62.410685] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.418409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.426128] page dumped because: kasan: bad access detected
[   62.431683] 
[   62.433159] Memory state around the buggy address:
[   62.437938]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.445142]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.452346] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.459547]                                      ^
[   62.464325]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.471530]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.478731] ==================================================================
[   48.018806] ==================================================================
[   48.025827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.033116] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   48.040493] 
[   48.041978] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   48.042033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.042052] Hardware name: WinLink E850-96 board (DT)
[   48.042074] Call trace:
[   48.042088]  show_stack+0x20/0x38 (C)
[   48.042128]  dump_stack_lvl+0x8c/0xd0
[   48.042165]  print_report+0x118/0x608
[   48.042205]  kasan_report+0xdc/0x128
[   48.042237]  kasan_check_range+0x100/0x1a8
[   48.042278]  __kasan_check_write+0x20/0x30
[   48.042310]  kasan_atomics_helper+0x32c/0x4858
[   48.042342]  kasan_atomics+0x198/0x2e0
[   48.042374]  kunit_try_run_case+0x170/0x3f0
[   48.042411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.042448]  kthread+0x328/0x630
[   48.042479]  ret_from_fork+0x10/0x20
[   48.042514] 
[   48.112193] Allocated by task 312:
[   48.115579]  kasan_save_stack+0x3c/0x68
[   48.119398]  kasan_save_track+0x20/0x40
[   48.123218]  kasan_save_alloc_info+0x40/0x58
[   48.127471]  __kasan_kmalloc+0xd4/0xd8
[   48.131204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.135717]  kasan_atomics+0xb8/0x2e0
[   48.139363]  kunit_try_run_case+0x170/0x3f0
[   48.143530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.148998]  kthread+0x328/0x630
[   48.152210]  ret_from_fork+0x10/0x20
[   48.155769] 
[   48.157246] The buggy address belongs to the object at ffff000805f49a00
[   48.157246]  which belongs to the cache kmalloc-64 of size 64
[   48.169573] The buggy address is located 0 bytes to the right of
[   48.169573]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   48.182417] 
[   48.183894] The buggy address belongs to the physical page:
[   48.189450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   48.197437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.203945] page_type: f5(slab)
[   48.207081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.214803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.222521] page dumped because: kasan: bad access detected
[   48.228077] 
[   48.229552] Memory state around the buggy address:
[   48.234332]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.241535]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.248740] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.255941]                                      ^
[   48.260719]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.267924]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.275125] ==================================================================
[   62.746523] ==================================================================
[   62.753558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.760932] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   62.768310] 
[   62.769793] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   62.769842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.769858] Hardware name: WinLink E850-96 board (DT)
[   62.769878] Call trace:
[   62.769894]  show_stack+0x20/0x38 (C)
[   62.769925]  dump_stack_lvl+0x8c/0xd0
[   62.769963]  print_report+0x118/0x608
[   62.769998]  kasan_report+0xdc/0x128
[   62.770032]  kasan_check_range+0x100/0x1a8
[   62.770068]  __kasan_check_write+0x20/0x30
[   62.770099]  kasan_atomics_helper+0x175c/0x4858
[   62.770132]  kasan_atomics+0x198/0x2e0
[   62.770164]  kunit_try_run_case+0x170/0x3f0
[   62.770201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.770242]  kthread+0x328/0x630
[   62.770269]  ret_from_fork+0x10/0x20
[   62.770301] 
[   62.840097] Allocated by task 312:
[   62.843483]  kasan_save_stack+0x3c/0x68
[   62.847302]  kasan_save_track+0x20/0x40
[   62.851121]  kasan_save_alloc_info+0x40/0x58
[   62.855374]  __kasan_kmalloc+0xd4/0xd8
[   62.859107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.863621]  kasan_atomics+0xb8/0x2e0
[   62.867267]  kunit_try_run_case+0x170/0x3f0
[   62.871433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.876902]  kthread+0x328/0x630
[   62.880114]  ret_from_fork+0x10/0x20
[   62.883673] 
[   62.885148] The buggy address belongs to the object at ffff000805f49a00
[   62.885148]  which belongs to the cache kmalloc-64 of size 64
[   62.897475] The buggy address is located 0 bytes to the right of
[   62.897475]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.910322] 
[   62.911798] The buggy address belongs to the physical page:
[   62.917354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.925342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.931849] page_type: f5(slab)
[   62.934982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.942707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.950425] page dumped because: kasan: bad access detected
[   62.955981] 
[   62.957456] Memory state around the buggy address:
[   62.962235]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.969439]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.976644] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.983845]                                      ^
[   62.988623]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.995828]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.003029] ==================================================================
[   58.010554] ==================================================================
[   58.017516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.024892] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.032270] 
[   58.033752] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.033803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.033820] Hardware name: WinLink E850-96 board (DT)
[   58.033841] Call trace:
[   58.033856]  show_stack+0x20/0x38 (C)
[   58.033890]  dump_stack_lvl+0x8c/0xd0
[   58.033926]  print_report+0x118/0x608
[   58.033959]  kasan_report+0xdc/0x128
[   58.033994]  kasan_check_range+0x100/0x1a8
[   58.034029]  __kasan_check_write+0x20/0x30
[   58.034059]  kasan_atomics_helper+0x10c0/0x4858
[   58.034094]  kasan_atomics+0x198/0x2e0
[   58.034125]  kunit_try_run_case+0x170/0x3f0
[   58.034160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.034199]  kthread+0x328/0x630
[   58.034226]  ret_from_fork+0x10/0x20
[   58.034258] 
[   58.104057] Allocated by task 312:
[   58.107443]  kasan_save_stack+0x3c/0x68
[   58.111262]  kasan_save_track+0x20/0x40
[   58.115081]  kasan_save_alloc_info+0x40/0x58
[   58.119335]  __kasan_kmalloc+0xd4/0xd8
[   58.123067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.127581]  kasan_atomics+0xb8/0x2e0
[   58.131227]  kunit_try_run_case+0x170/0x3f0
[   58.135393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.140862]  kthread+0x328/0x630
[   58.144074]  ret_from_fork+0x10/0x20
[   58.147633] 
[   58.149108] The buggy address belongs to the object at ffff000805f49a00
[   58.149108]  which belongs to the cache kmalloc-64 of size 64
[   58.161435] The buggy address is located 0 bytes to the right of
[   58.161435]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.174282] 
[   58.175759] The buggy address belongs to the physical page:
[   58.181314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.189302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.195809] page_type: f5(slab)
[   58.198944] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.206667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.214385] page dumped because: kasan: bad access detected
[   58.219940] 
[   58.221416] Memory state around the buggy address:
[   58.226195]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.233399]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.240604] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.247804]                                      ^
[   58.252583]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.259788]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.266989] ==================================================================
[   59.329915] ==================================================================
[   59.336940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.344317] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.351695] 
[   59.353177] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.353227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.353244] Hardware name: WinLink E850-96 board (DT)
[   59.353263] Call trace:
[   59.353281]  show_stack+0x20/0x38 (C)
[   59.353313]  dump_stack_lvl+0x8c/0xd0
[   59.353350]  print_report+0x118/0x608
[   59.353384]  kasan_report+0xdc/0x128
[   59.353419]  kasan_check_range+0x100/0x1a8
[   59.353453]  __kasan_check_write+0x20/0x30
[   59.353484]  kasan_atomics_helper+0x12d8/0x4858
[   59.353518]  kasan_atomics+0x198/0x2e0
[   59.353549]  kunit_try_run_case+0x170/0x3f0
[   59.353582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.353621]  kthread+0x328/0x630
[   59.353649]  ret_from_fork+0x10/0x20
[   59.353683] 
[   59.423481] Allocated by task 312:
[   59.426867]  kasan_save_stack+0x3c/0x68
[   59.430686]  kasan_save_track+0x20/0x40
[   59.434506]  kasan_save_alloc_info+0x40/0x58
[   59.438759]  __kasan_kmalloc+0xd4/0xd8
[   59.442492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.447006]  kasan_atomics+0xb8/0x2e0
[   59.450652]  kunit_try_run_case+0x170/0x3f0
[   59.454818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.460286]  kthread+0x328/0x630
[   59.463499]  ret_from_fork+0x10/0x20
[   59.467057] 
[   59.468533] The buggy address belongs to the object at ffff000805f49a00
[   59.468533]  which belongs to the cache kmalloc-64 of size 64
[   59.480859] The buggy address is located 0 bytes to the right of
[   59.480859]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   59.493706] 
[   59.495182] The buggy address belongs to the physical page:
[   59.500738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   59.508727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.515233] page_type: f5(slab)
[   59.518369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.526091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.533810] page dumped because: kasan: bad access detected
[   59.539365] 
[   59.540841] Memory state around the buggy address:
[   59.545619]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.552824]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.560029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.567229]                                      ^
[   59.572008]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.579212]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.586413] ==================================================================
[   53.810687] ==================================================================
[   53.817752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.825128] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.832420] 
[   53.833903] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.833949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.833970] Hardware name: WinLink E850-96 board (DT)
[   53.833987] Call trace:
[   53.833999]  show_stack+0x20/0x38 (C)
[   53.834034]  dump_stack_lvl+0x8c/0xd0
[   53.834069]  print_report+0x118/0x608
[   53.834102]  kasan_report+0xdc/0x128
[   53.834137]  __asan_report_load4_noabort+0x20/0x30
[   53.834176]  kasan_atomics_helper+0x3dbc/0x4858
[   53.834210]  kasan_atomics+0x198/0x2e0
[   53.834241]  kunit_try_run_case+0x170/0x3f0
[   53.834277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.834314]  kthread+0x328/0x630
[   53.834343]  ret_from_fork+0x10/0x20
[   53.834375] 
[   53.900821] Allocated by task 312:
[   53.904207]  kasan_save_stack+0x3c/0x68
[   53.908026]  kasan_save_track+0x20/0x40
[   53.911846]  kasan_save_alloc_info+0x40/0x58
[   53.916099]  __kasan_kmalloc+0xd4/0xd8
[   53.919832]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.924346]  kasan_atomics+0xb8/0x2e0
[   53.927991]  kunit_try_run_case+0x170/0x3f0
[   53.932158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.937626]  kthread+0x328/0x630
[   53.940838]  ret_from_fork+0x10/0x20
[   53.944397] 
[   53.945873] The buggy address belongs to the object at ffff000805f49a00
[   53.945873]  which belongs to the cache kmalloc-64 of size 64
[   53.958200] The buggy address is located 0 bytes to the right of
[   53.958200]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.971046] 
[   53.972522] The buggy address belongs to the physical page:
[   53.978078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.986065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.992573] page_type: f5(slab)
[   53.995707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.003431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.011150] page dumped because: kasan: bad access detected
[   54.016705] 
[   54.018181] Memory state around the buggy address:
[   54.022959]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.030164]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.037368] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.044569]                                      ^
[   54.049348]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.056552]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.063753] ==================================================================
[   60.909817] ==================================================================
[   60.916779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   60.924154] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.931532] 
[   60.933015] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.933064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.933082] Hardware name: WinLink E850-96 board (DT)
[   60.933103] Call trace:
[   60.933118]  show_stack+0x20/0x38 (C)
[   60.933151]  dump_stack_lvl+0x8c/0xd0
[   60.933190]  print_report+0x118/0x608
[   60.933225]  kasan_report+0xdc/0x128
[   60.933258]  kasan_check_range+0x100/0x1a8
[   60.933296]  __kasan_check_write+0x20/0x30
[   60.933325]  kasan_atomics_helper+0x154c/0x4858
[   60.933356]  kasan_atomics+0x198/0x2e0
[   60.933386]  kunit_try_run_case+0x170/0x3f0
[   60.933421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.933461]  kthread+0x328/0x630
[   60.933489]  ret_from_fork+0x10/0x20
[   60.933526] 
[   61.003319] Allocated by task 312:
[   61.006704]  kasan_save_stack+0x3c/0x68
[   61.010524]  kasan_save_track+0x20/0x40
[   61.014343]  kasan_save_alloc_info+0x40/0x58
[   61.018596]  __kasan_kmalloc+0xd4/0xd8
[   61.022329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.026843]  kasan_atomics+0xb8/0x2e0
[   61.030489]  kunit_try_run_case+0x170/0x3f0
[   61.034655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.040124]  kthread+0x328/0x630
[   61.043336]  ret_from_fork+0x10/0x20
[   61.046895] 
[   61.048371] The buggy address belongs to the object at ffff000805f49a00
[   61.048371]  which belongs to the cache kmalloc-64 of size 64
[   61.060697] The buggy address is located 0 bytes to the right of
[   61.060697]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.073544] 
[   61.075021] The buggy address belongs to the physical page:
[   61.080577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.088563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.095071] page_type: f5(slab)
[   61.098206] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.105929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.113647] page dumped because: kasan: bad access detected
[   61.119203] 
[   61.120678] Memory state around the buggy address:
[   61.125458]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.132661]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.139866] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.147067]                                      ^
[   61.151845]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.159049]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.166251] ==================================================================
[   53.022955] ==================================================================
[   53.029919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.037207] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.044584] 
[   53.046068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.046114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.046129] Hardware name: WinLink E850-96 board (DT)
[   53.046151] Call trace:
[   53.046166]  show_stack+0x20/0x38 (C)
[   53.046199]  dump_stack_lvl+0x8c/0xd0
[   53.046236]  print_report+0x118/0x608
[   53.046272]  kasan_report+0xdc/0x128
[   53.046306]  kasan_check_range+0x100/0x1a8
[   53.046340]  __kasan_check_write+0x20/0x30
[   53.046371]  kasan_atomics_helper+0xad4/0x4858
[   53.046405]  kasan_atomics+0x198/0x2e0
[   53.046437]  kunit_try_run_case+0x170/0x3f0
[   53.046473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.046511]  kthread+0x328/0x630
[   53.046540]  ret_from_fork+0x10/0x20
[   53.046572] 
[   53.116285] Allocated by task 312:
[   53.119670]  kasan_save_stack+0x3c/0x68
[   53.123490]  kasan_save_track+0x20/0x40
[   53.127309]  kasan_save_alloc_info+0x40/0x58
[   53.131562]  __kasan_kmalloc+0xd4/0xd8
[   53.135295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.139809]  kasan_atomics+0xb8/0x2e0
[   53.143455]  kunit_try_run_case+0x170/0x3f0
[   53.147621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.153090]  kthread+0x328/0x630
[   53.156301]  ret_from_fork+0x10/0x20
[   53.159860] 
[   53.161336] The buggy address belongs to the object at ffff000805f49a00
[   53.161336]  which belongs to the cache kmalloc-64 of size 64
[   53.173664] The buggy address is located 0 bytes to the right of
[   53.173664]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.186510] 
[   53.187985] The buggy address belongs to the physical page:
[   53.193541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.201530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.208037] page_type: f5(slab)
[   53.211170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.218894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.226613] page dumped because: kasan: bad access detected
[   53.232168] 
[   53.233644] Memory state around the buggy address:
[   53.238422]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.245627]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.252831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.260032]                                      ^
[   53.264811]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.272015]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.279216] ==================================================================
[   46.439520] ==================================================================
[   46.453630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.461004] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   46.468294] 
[   46.469781] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.469841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.469860] Hardware name: WinLink E850-96 board (DT)
[   46.469883] Call trace:
[   46.469901]  show_stack+0x20/0x38 (C)
[   46.469943]  dump_stack_lvl+0x8c/0xd0
[   46.469981]  print_report+0x118/0x608
[   46.470019]  kasan_report+0xdc/0x128
[   46.470052]  __asan_report_load4_noabort+0x20/0x30
[   46.470093]  kasan_atomics_helper+0x40a8/0x4858
[   46.470130]  kasan_atomics+0x198/0x2e0
[   46.470162]  kunit_try_run_case+0x170/0x3f0
[   46.470201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.470240]  kthread+0x328/0x630
[   46.470272]  ret_from_fork+0x10/0x20
[   46.470311] 
[   46.536698] Allocated by task 312:
[   46.540085]  kasan_save_stack+0x3c/0x68
[   46.543901]  kasan_save_track+0x20/0x40
[   46.547720]  kasan_save_alloc_info+0x40/0x58
[   46.551973]  __kasan_kmalloc+0xd4/0xd8
[   46.555707]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.560220]  kasan_atomics+0xb8/0x2e0
[   46.563866]  kunit_try_run_case+0x170/0x3f0
[   46.568032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.573501]  kthread+0x328/0x630
[   46.576712]  ret_from_fork+0x10/0x20
[   46.580272] 
[   46.581749] The buggy address belongs to the object at ffff000805f49a00
[   46.581749]  which belongs to the cache kmalloc-64 of size 64
[   46.594076] The buggy address is located 0 bytes to the right of
[   46.594076]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   46.606921] 
[   46.608400] The buggy address belongs to the physical page:
[   46.613956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   46.621940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.628451] page_type: f5(slab)
[   46.631584] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.639306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.647025] page dumped because: kasan: bad access detected
[   46.652580] 
[   46.654057] Memory state around the buggy address:
[   46.658834]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.666038]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.673244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.680444]                                      ^
[   46.685221]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.692426]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.699630] ==================================================================
[   59.066091] ==================================================================
[   59.073057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.080432] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.087810] 
[   59.089293] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.089343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.089359] Hardware name: WinLink E850-96 board (DT)
[   59.089379] Call trace:
[   59.089396]  show_stack+0x20/0x38 (C)
[   59.089430]  dump_stack_lvl+0x8c/0xd0
[   59.089467]  print_report+0x118/0x608
[   59.089500]  kasan_report+0xdc/0x128
[   59.089535]  kasan_check_range+0x100/0x1a8
[   59.089569]  __kasan_check_write+0x20/0x30
[   59.089600]  kasan_atomics_helper+0x126c/0x4858
[   59.089634]  kasan_atomics+0x198/0x2e0
[   59.089663]  kunit_try_run_case+0x170/0x3f0
[   59.089700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.089739]  kthread+0x328/0x630
[   59.089767]  ret_from_fork+0x10/0x20
[   59.089802] 
[   59.159596] Allocated by task 312:
[   59.162982]  kasan_save_stack+0x3c/0x68
[   59.166802]  kasan_save_track+0x20/0x40
[   59.170621]  kasan_save_alloc_info+0x40/0x58
[   59.174874]  __kasan_kmalloc+0xd4/0xd8
[   59.178607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.183121]  kasan_atomics+0xb8/0x2e0
[   59.186766]  kunit_try_run_case+0x170/0x3f0
[   59.190933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.196402]  kthread+0x328/0x630
[   59.199614]  ret_from_fork+0x10/0x20
[   59.203173] 
[   59.204648] The buggy address belongs to the object at ffff000805f49a00
[   59.204648]  which belongs to the cache kmalloc-64 of size 64
[   59.216976] The buggy address is located 0 bytes to the right of
[   59.216976]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   59.229821] 
[   59.231297] The buggy address belongs to the physical page:
[   59.236853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   59.244842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.251349] page_type: f5(slab)
[   59.254484] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.262206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.269925] page dumped because: kasan: bad access detected
[   59.275480] 
[   59.276956] Memory state around the buggy address:
[   59.281734]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.288939]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.296144] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.303344]                                      ^
[   59.308123]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.315328]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.322528] ==================================================================
[   53.286580] ==================================================================
[   53.293628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.301005] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   53.308296] 
[   53.309777] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   53.309826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.309841] Hardware name: WinLink E850-96 board (DT)
[   53.309860] Call trace:
[   53.309874]  show_stack+0x20/0x38 (C)
[   53.309906]  dump_stack_lvl+0x8c/0xd0
[   53.309941]  print_report+0x118/0x608
[   53.309976]  kasan_report+0xdc/0x128
[   53.310011]  __asan_report_load4_noabort+0x20/0x30
[   53.310049]  kasan_atomics_helper+0x3dcc/0x4858
[   53.310082]  kasan_atomics+0x198/0x2e0
[   53.310114]  kunit_try_run_case+0x170/0x3f0
[   53.310148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.310184]  kthread+0x328/0x630
[   53.310212]  ret_from_fork+0x10/0x20
[   53.310245] 
[   53.376697] Allocated by task 312:
[   53.380083]  kasan_save_stack+0x3c/0x68
[   53.383902]  kasan_save_track+0x20/0x40
[   53.387722]  kasan_save_alloc_info+0x40/0x58
[   53.391975]  __kasan_kmalloc+0xd4/0xd8
[   53.395708]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.400221]  kasan_atomics+0xb8/0x2e0
[   53.403867]  kunit_try_run_case+0x170/0x3f0
[   53.408034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.413502]  kthread+0x328/0x630
[   53.416714]  ret_from_fork+0x10/0x20
[   53.420273] 
[   53.421748] The buggy address belongs to the object at ffff000805f49a00
[   53.421748]  which belongs to the cache kmalloc-64 of size 64
[   53.434076] The buggy address is located 0 bytes to the right of
[   53.434076]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   53.446922] 
[   53.448398] The buggy address belongs to the physical page:
[   53.453954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   53.461940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.468450] page_type: f5(slab)
[   53.471583] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.479307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.487026] page dumped because: kasan: bad access detected
[   53.492581] 
[   53.494057] Memory state around the buggy address:
[   53.498835]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.506040]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.513244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.520445]                                      ^
[   53.525223]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.532428]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.539629] ==================================================================
[   57.219129] ==================================================================
[   57.226209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.233497] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   57.240875] 
[   57.242358] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   57.242410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.242427] Hardware name: WinLink E850-96 board (DT)
[   57.242450] Call trace:
[   57.242466]  show_stack+0x20/0x38 (C)
[   57.242495]  dump_stack_lvl+0x8c/0xd0
[   57.242531]  print_report+0x118/0x608
[   57.242566]  kasan_report+0xdc/0x128
[   57.242600]  kasan_check_range+0x100/0x1a8
[   57.242634]  __kasan_check_write+0x20/0x30
[   57.242664]  kasan_atomics_helper+0xf88/0x4858
[   57.242698]  kasan_atomics+0x198/0x2e0
[   57.242730]  kunit_try_run_case+0x170/0x3f0
[   57.242763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.242803]  kthread+0x328/0x630
[   57.242831]  ret_from_fork+0x10/0x20
[   57.242863] 
[   57.312576] Allocated by task 312:
[   57.315962]  kasan_save_stack+0x3c/0x68
[   57.319781]  kasan_save_track+0x20/0x40
[   57.323600]  kasan_save_alloc_info+0x40/0x58
[   57.327854]  __kasan_kmalloc+0xd4/0xd8
[   57.331586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.336100]  kasan_atomics+0xb8/0x2e0
[   57.339746]  kunit_try_run_case+0x170/0x3f0
[   57.343912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.349381]  kthread+0x328/0x630
[   57.352593]  ret_from_fork+0x10/0x20
[   57.356152] 
[   57.357627] The buggy address belongs to the object at ffff000805f49a00
[   57.357627]  which belongs to the cache kmalloc-64 of size 64
[   57.369954] The buggy address is located 0 bytes to the right of
[   57.369954]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   57.382800] 
[   57.384276] The buggy address belongs to the physical page:
[   57.389832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   57.397821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.404328] page_type: f5(slab)
[   57.407461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.415185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.422904] page dumped because: kasan: bad access detected
[   57.428460] 
[   57.429935] Memory state around the buggy address:
[   57.434713]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.441918]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.449123] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.456324]                                      ^
[   57.461101]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.468307]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.475508] ==================================================================
[   60.118048] ==================================================================
[   60.125123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.132499] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   60.139877] 
[   60.141360] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   60.141409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.141424] Hardware name: WinLink E850-96 board (DT)
[   60.141440] Call trace:
[   60.141453]  show_stack+0x20/0x38 (C)
[   60.141487]  dump_stack_lvl+0x8c/0xd0
[   60.141524]  print_report+0x118/0x608
[   60.141557]  kasan_report+0xdc/0x128
[   60.141589]  kasan_check_range+0x100/0x1a8
[   60.141625]  __kasan_check_write+0x20/0x30
[   60.141655]  kasan_atomics_helper+0x1414/0x4858
[   60.141689]  kasan_atomics+0x198/0x2e0
[   60.141719]  kunit_try_run_case+0x170/0x3f0
[   60.141753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.141793]  kthread+0x328/0x630
[   60.141821]  ret_from_fork+0x10/0x20
[   60.141854] 
[   60.211664] Allocated by task 312:
[   60.215049]  kasan_save_stack+0x3c/0x68
[   60.218869]  kasan_save_track+0x20/0x40
[   60.222688]  kasan_save_alloc_info+0x40/0x58
[   60.226942]  __kasan_kmalloc+0xd4/0xd8
[   60.230674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.235188]  kasan_atomics+0xb8/0x2e0
[   60.238834]  kunit_try_run_case+0x170/0x3f0
[   60.243001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.248469]  kthread+0x328/0x630
[   60.251681]  ret_from_fork+0x10/0x20
[   60.255240] 
[   60.256716] The buggy address belongs to the object at ffff000805f49a00
[   60.256716]  which belongs to the cache kmalloc-64 of size 64
[   60.269042] The buggy address is located 0 bytes to the right of
[   60.269042]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   60.281889] 
[   60.283365] The buggy address belongs to the physical page:
[   60.288921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   60.296909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.303416] page_type: f5(slab)
[   60.306550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.314274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.321992] page dumped because: kasan: bad access detected
[   60.327548] 
[   60.329023] Memory state around the buggy address:
[   60.333802]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.341006]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.348211] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.355412]                                      ^
[   60.360190]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.367395]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.374596] ==================================================================
[   50.652736] ==================================================================
[   50.659814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.667103] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.674481] 
[   50.675964] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.676013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.676029] Hardware name: WinLink E850-96 board (DT)
[   50.676049] Call trace:
[   50.676065]  show_stack+0x20/0x38 (C)
[   50.676098]  dump_stack_lvl+0x8c/0xd0
[   50.676135]  print_report+0x118/0x608
[   50.676170]  kasan_report+0xdc/0x128
[   50.676203]  kasan_check_range+0x100/0x1a8
[   50.676238]  __kasan_check_write+0x20/0x30
[   50.676269]  kasan_atomics_helper+0x6ec/0x4858
[   50.676304]  kasan_atomics+0x198/0x2e0
[   50.676334]  kunit_try_run_case+0x170/0x3f0
[   50.676368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.676408]  kthread+0x328/0x630
[   50.676435]  ret_from_fork+0x10/0x20
[   50.676468] 
[   50.746181] Allocated by task 312:
[   50.749567]  kasan_save_stack+0x3c/0x68
[   50.753386]  kasan_save_track+0x20/0x40
[   50.757205]  kasan_save_alloc_info+0x40/0x58
[   50.761459]  __kasan_kmalloc+0xd4/0xd8
[   50.765192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.769705]  kasan_atomics+0xb8/0x2e0
[   50.773351]  kunit_try_run_case+0x170/0x3f0
[   50.777518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.782986]  kthread+0x328/0x630
[   50.786198]  ret_from_fork+0x10/0x20
[   50.789757] 
[   50.791233] The buggy address belongs to the object at ffff000805f49a00
[   50.791233]  which belongs to the cache kmalloc-64 of size 64
[   50.803559] The buggy address is located 0 bytes to the right of
[   50.803559]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   50.816406] 
[   50.817882] The buggy address belongs to the physical page:
[   50.823438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   50.831425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.837933] page_type: f5(slab)
[   50.841067] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.848791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.856509] page dumped because: kasan: bad access detected
[   50.862065] 
[   50.863540] Memory state around the buggy address:
[   50.868319]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.875524]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.882728] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.889929]                                      ^
[   50.894707]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.901912]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.909113] ==================================================================
[   58.274367] ==================================================================
[   58.281400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.288777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.296155] 
[   58.297639] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.297690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.297706] Hardware name: WinLink E850-96 board (DT)
[   58.297725] Call trace:
[   58.297742]  show_stack+0x20/0x38 (C)
[   58.297777]  dump_stack_lvl+0x8c/0xd0
[   58.297815]  print_report+0x118/0x608
[   58.297846]  kasan_report+0xdc/0x128
[   58.297880]  kasan_check_range+0x100/0x1a8
[   58.297916]  __kasan_check_write+0x20/0x30
[   58.297946]  kasan_atomics_helper+0x1128/0x4858
[   58.297979]  kasan_atomics+0x198/0x2e0
[   58.298009]  kunit_try_run_case+0x170/0x3f0
[   58.298045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.298083]  kthread+0x328/0x630
[   58.298109]  ret_from_fork+0x10/0x20
[   58.298141] 
[   58.367942] Allocated by task 312:
[   58.371327]  kasan_save_stack+0x3c/0x68
[   58.375147]  kasan_save_track+0x20/0x40
[   58.378966]  kasan_save_alloc_info+0x40/0x58
[   58.383220]  __kasan_kmalloc+0xd4/0xd8
[   58.386952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.391466]  kasan_atomics+0xb8/0x2e0
[   58.395112]  kunit_try_run_case+0x170/0x3f0
[   58.399278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.404747]  kthread+0x328/0x630
[   58.407959]  ret_from_fork+0x10/0x20
[   58.411518] 
[   58.412993] The buggy address belongs to the object at ffff000805f49a00
[   58.412993]  which belongs to the cache kmalloc-64 of size 64
[   58.425320] The buggy address is located 0 bytes to the right of
[   58.425320]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.438166] 
[   58.439642] The buggy address belongs to the physical page:
[   58.445200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.453187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.459694] page_type: f5(slab)
[   58.462829] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.470551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.478270] page dumped because: kasan: bad access detected
[   58.483825] 
[   58.485301] Memory state around the buggy address:
[   58.490080]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.497284]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.504489] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.511690]                                      ^
[   58.516468]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.523673]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.530874] ==================================================================
[   61.173623] ==================================================================
[   61.180665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.188039] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.195417] 
[   61.196900] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.196951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.196968] Hardware name: WinLink E850-96 board (DT)
[   61.196989] Call trace:
[   61.197005]  show_stack+0x20/0x38 (C)
[   61.197036]  dump_stack_lvl+0x8c/0xd0
[   61.197070]  print_report+0x118/0x608
[   61.197106]  kasan_report+0xdc/0x128
[   61.197138]  kasan_check_range+0x100/0x1a8
[   61.197174]  __kasan_check_write+0x20/0x30
[   61.197205]  kasan_atomics_helper+0x15b4/0x4858
[   61.197239]  kasan_atomics+0x198/0x2e0
[   61.197272]  kunit_try_run_case+0x170/0x3f0
[   61.197305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.197345]  kthread+0x328/0x630
[   61.197371]  ret_from_fork+0x10/0x20
[   61.197406] 
[   61.267204] Allocated by task 312:
[   61.270590]  kasan_save_stack+0x3c/0x68
[   61.274408]  kasan_save_track+0x20/0x40
[   61.278228]  kasan_save_alloc_info+0x40/0x58
[   61.282481]  __kasan_kmalloc+0xd4/0xd8
[   61.286214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.290728]  kasan_atomics+0xb8/0x2e0
[   61.294374]  kunit_try_run_case+0x170/0x3f0
[   61.298540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.304009]  kthread+0x328/0x630
[   61.307221]  ret_from_fork+0x10/0x20
[   61.310780] 
[   61.312255] The buggy address belongs to the object at ffff000805f49a00
[   61.312255]  which belongs to the cache kmalloc-64 of size 64
[   61.324582] The buggy address is located 0 bytes to the right of
[   61.324582]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   61.337429] 
[   61.338904] The buggy address belongs to the physical page:
[   61.344461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   61.352448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.358956] page_type: f5(slab)
[   61.362089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.369813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.377532] page dumped because: kasan: bad access detected
[   61.383088] 
[   61.384563] Memory state around the buggy address:
[   61.389341]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.396546]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.403751] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.410952]                                      ^
[   61.415730]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.422935]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.430136] ==================================================================
[   63.010485] ==================================================================
[   63.017442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.024817] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   63.032108] 
[   63.033591] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.033640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.033660] Hardware name: WinLink E850-96 board (DT)
[   63.033680] Call trace:
[   63.033694]  show_stack+0x20/0x38 (C)
[   63.033726]  dump_stack_lvl+0x8c/0xd0
[   63.033763]  print_report+0x118/0x608
[   63.033797]  kasan_report+0xdc/0x128
[   63.033833]  __asan_report_load8_noabort+0x20/0x30
[   63.033870]  kasan_atomics_helper+0x3e20/0x4858
[   63.033903]  kasan_atomics+0x198/0x2e0
[   63.033936]  kunit_try_run_case+0x170/0x3f0
[   63.033970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.034007]  kthread+0x328/0x630
[   63.034033]  ret_from_fork+0x10/0x20
[   63.034066] 
[   63.100509] Allocated by task 312:
[   63.103895]  kasan_save_stack+0x3c/0x68
[   63.107715]  kasan_save_track+0x20/0x40
[   63.111534]  kasan_save_alloc_info+0x40/0x58
[   63.115788]  __kasan_kmalloc+0xd4/0xd8
[   63.119520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.124034]  kasan_atomics+0xb8/0x2e0
[   63.127679]  kunit_try_run_case+0x170/0x3f0
[   63.131846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.137315]  kthread+0x328/0x630
[   63.140527]  ret_from_fork+0x10/0x20
[   63.144086] 
[   63.145561] The buggy address belongs to the object at ffff000805f49a00
[   63.145561]  which belongs to the cache kmalloc-64 of size 64
[   63.157888] The buggy address is located 0 bytes to the right of
[   63.157888]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   63.170734] 
[   63.172210] The buggy address belongs to the physical page:
[   63.177768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   63.185755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.192262] page_type: f5(slab)
[   63.195396] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.203119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.210838] page dumped because: kasan: bad access detected
[   63.216393] 
[   63.217869] Memory state around the buggy address:
[   63.222649]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.229852]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.237057] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.244258]                                      ^
[   63.249036]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.256240]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.263441] ==================================================================
[   52.495405] ==================================================================
[   52.502493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.509783] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   52.517162] 
[   52.518644] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   52.518691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.518705] Hardware name: WinLink E850-96 board (DT)
[   52.518724] Call trace:
[   52.518738]  show_stack+0x20/0x38 (C)
[   52.518772]  dump_stack_lvl+0x8c/0xd0
[   52.518807]  print_report+0x118/0x608
[   52.518841]  kasan_report+0xdc/0x128
[   52.518876]  kasan_check_range+0x100/0x1a8
[   52.518910]  __kasan_check_write+0x20/0x30
[   52.518938]  kasan_atomics_helper+0xa04/0x4858
[   52.518972]  kasan_atomics+0x198/0x2e0
[   52.519002]  kunit_try_run_case+0x170/0x3f0
[   52.519038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.519075]  kthread+0x328/0x630
[   52.519103]  ret_from_fork+0x10/0x20
[   52.519134] 
[   52.588862] Allocated by task 312:
[   52.592247]  kasan_save_stack+0x3c/0x68
[   52.596067]  kasan_save_track+0x20/0x40
[   52.599886]  kasan_save_alloc_info+0x40/0x58
[   52.604139]  __kasan_kmalloc+0xd4/0xd8
[   52.607872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.612386]  kasan_atomics+0xb8/0x2e0
[   52.616032]  kunit_try_run_case+0x170/0x3f0
[   52.620198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.625667]  kthread+0x328/0x630
[   52.628879]  ret_from_fork+0x10/0x20
[   52.632438] 
[   52.633913] The buggy address belongs to the object at ffff000805f49a00
[   52.633913]  which belongs to the cache kmalloc-64 of size 64
[   52.646240] The buggy address is located 0 bytes to the right of
[   52.646240]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   52.659087] 
[   52.660562] The buggy address belongs to the physical page:
[   52.666118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   52.674104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.680614] page_type: f5(slab)
[   52.683747] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.691471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.699190] page dumped because: kasan: bad access detected
[   52.704746] 
[   52.706221] Memory state around the buggy address:
[   52.711000]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.718204]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.725409] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.732610]                                      ^
[   52.737388]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.744593]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.751794] ==================================================================
[   61.961852] ==================================================================
[   61.968845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   61.976221] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   61.983513] 
[   61.984996] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   61.985048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.985063] Hardware name: WinLink E850-96 board (DT)
[   61.985081] Call trace:
[   61.985097]  show_stack+0x20/0x38 (C)
[   61.985129]  dump_stack_lvl+0x8c/0xd0
[   61.985166]  print_report+0x118/0x608
[   61.985199]  kasan_report+0xdc/0x128
[   61.985234]  __asan_report_load8_noabort+0x20/0x30
[   61.985274]  kasan_atomics_helper+0x3df4/0x4858
[   61.985307]  kasan_atomics+0x198/0x2e0
[   61.985338]  kunit_try_run_case+0x170/0x3f0
[   61.985373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.985410]  kthread+0x328/0x630
[   61.985438]  ret_from_fork+0x10/0x20
[   61.985469] 
[   62.051914] Allocated by task 312:
[   62.055300]  kasan_save_stack+0x3c/0x68
[   62.059119]  kasan_save_track+0x20/0x40
[   62.062939]  kasan_save_alloc_info+0x40/0x58
[   62.067192]  __kasan_kmalloc+0xd4/0xd8
[   62.070924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.075438]  kasan_atomics+0xb8/0x2e0
[   62.079084]  kunit_try_run_case+0x170/0x3f0
[   62.083251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.088719]  kthread+0x328/0x630
[   62.091931]  ret_from_fork+0x10/0x20
[   62.095490] 
[   62.096967] The buggy address belongs to the object at ffff000805f49a00
[   62.096967]  which belongs to the cache kmalloc-64 of size 64
[   62.109292] The buggy address is located 0 bytes to the right of
[   62.109292]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   62.122139] 
[   62.123615] The buggy address belongs to the physical page:
[   62.129170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   62.137158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.143666] page_type: f5(slab)
[   62.146799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.154524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.162242] page dumped because: kasan: bad access detected
[   62.167798] 
[   62.169273] Memory state around the buggy address:
[   62.174054]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.181257]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.188461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.195662]                                      ^
[   62.200440]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.207645]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.214846] ==================================================================
[   46.967607] ==================================================================
[   46.974627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   46.981915] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   46.989207] 
[   46.990691] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.990741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.990759] Hardware name: WinLink E850-96 board (DT)
[   46.990779] Call trace:
[   46.990791]  show_stack+0x20/0x38 (C)
[   46.990826]  dump_stack_lvl+0x8c/0xd0
[   46.990866]  print_report+0x118/0x608
[   46.990903]  kasan_report+0xdc/0x128
[   46.990938]  kasan_check_range+0x100/0x1a8
[   46.990978]  __kasan_check_read+0x20/0x30
[   46.991007]  kasan_atomics_helper+0x1ec/0x4858
[   46.991039]  kasan_atomics+0x198/0x2e0
[   46.991072]  kunit_try_run_case+0x170/0x3f0
[   46.991107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.991146]  kthread+0x328/0x630
[   46.991175]  ret_from_fork+0x10/0x20
[   46.991212] 
[   47.060820] Allocated by task 312:
[   47.064207]  kasan_save_stack+0x3c/0x68
[   47.068025]  kasan_save_track+0x20/0x40
[   47.071844]  kasan_save_alloc_info+0x40/0x58
[   47.076098]  __kasan_kmalloc+0xd4/0xd8
[   47.079830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.084344]  kasan_atomics+0xb8/0x2e0
[   47.087990]  kunit_try_run_case+0x170/0x3f0
[   47.092156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.097625]  kthread+0x328/0x630
[   47.100837]  ret_from_fork+0x10/0x20
[   47.104396] 
[   47.105873] The buggy address belongs to the object at ffff000805f49a00
[   47.105873]  which belongs to the cache kmalloc-64 of size 64
[   47.118198] The buggy address is located 0 bytes to the right of
[   47.118198]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   47.131045] 
[   47.132522] The buggy address belongs to the physical page:
[   47.138078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   47.146064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.152573] page_type: f5(slab)
[   47.155707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.163429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.171148] page dumped because: kasan: bad access detected
[   47.176703] 
[   47.178179] Memory state around the buggy address:
[   47.182959]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.190162]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.197367] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.204568]                                      ^
[   47.209346]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.216550]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.223751] ==================================================================
[   49.597924] ==================================================================
[   49.604968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.612258] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   49.619636] 
[   49.621119] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   49.621167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.621185] Hardware name: WinLink E850-96 board (DT)
[   49.621208] Call trace:
[   49.621222]  show_stack+0x20/0x38 (C)
[   49.621255]  dump_stack_lvl+0x8c/0xd0
[   49.621292]  print_report+0x118/0x608
[   49.621325]  kasan_report+0xdc/0x128
[   49.621359]  kasan_check_range+0x100/0x1a8
[   49.621394]  __kasan_check_write+0x20/0x30
[   49.621425]  kasan_atomics_helper+0x54c/0x4858
[   49.621460]  kasan_atomics+0x198/0x2e0
[   49.621491]  kunit_try_run_case+0x170/0x3f0
[   49.621525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.621562]  kthread+0x328/0x630
[   49.621590]  ret_from_fork+0x10/0x20
[   49.621621] 
[   49.691336] Allocated by task 312:
[   49.694722]  kasan_save_stack+0x3c/0x68
[   49.698541]  kasan_save_track+0x20/0x40
[   49.702360]  kasan_save_alloc_info+0x40/0x58
[   49.706614]  __kasan_kmalloc+0xd4/0xd8
[   49.710346]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.714860]  kasan_atomics+0xb8/0x2e0
[   49.718505]  kunit_try_run_case+0x170/0x3f0
[   49.722673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.728141]  kthread+0x328/0x630
[   49.731353]  ret_from_fork+0x10/0x20
[   49.734912] 
[   49.736387] The buggy address belongs to the object at ffff000805f49a00
[   49.736387]  which belongs to the cache kmalloc-64 of size 64
[   49.748714] The buggy address is located 0 bytes to the right of
[   49.748714]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   49.761561] 
[   49.763037] The buggy address belongs to the physical page:
[   49.768593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   49.776579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.783088] page_type: f5(slab)
[   49.786221] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.793945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.801664] page dumped because: kasan: bad access detected
[   49.807220] 
[   49.808695] Memory state around the buggy address:
[   49.813474]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.820678]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.827883] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.835084]                                      ^
[   49.839862]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.847067]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.854268] ==================================================================
[   58.802111] ==================================================================
[   58.809171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.816547] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   58.823925] 
[   58.825408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   58.825457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.825473] Hardware name: WinLink E850-96 board (DT)
[   58.825490] Call trace:
[   58.825507]  show_stack+0x20/0x38 (C)
[   58.825537]  dump_stack_lvl+0x8c/0xd0
[   58.825573]  print_report+0x118/0x608
[   58.825609]  kasan_report+0xdc/0x128
[   58.825641]  kasan_check_range+0x100/0x1a8
[   58.825676]  __kasan_check_write+0x20/0x30
[   58.825705]  kasan_atomics_helper+0x11f8/0x4858
[   58.825740]  kasan_atomics+0x198/0x2e0
[   58.825773]  kunit_try_run_case+0x170/0x3f0
[   58.825807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.825846]  kthread+0x328/0x630
[   58.825874]  ret_from_fork+0x10/0x20
[   58.825905] 
[   58.895711] Allocated by task 312:
[   58.899097]  kasan_save_stack+0x3c/0x68
[   58.902916]  kasan_save_track+0x20/0x40
[   58.906736]  kasan_save_alloc_info+0x40/0x58
[   58.910989]  __kasan_kmalloc+0xd4/0xd8
[   58.914722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.919236]  kasan_atomics+0xb8/0x2e0
[   58.922882]  kunit_try_run_case+0x170/0x3f0
[   58.927048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.932517]  kthread+0x328/0x630
[   58.935729]  ret_from_fork+0x10/0x20
[   58.939288] 
[   58.940763] The buggy address belongs to the object at ffff000805f49a00
[   58.940763]  which belongs to the cache kmalloc-64 of size 64
[   58.953090] The buggy address is located 0 bytes to the right of
[   58.953090]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   58.965937] 
[   58.967412] The buggy address belongs to the physical page:
[   58.972968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   58.980955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.987464] page_type: f5(slab)
[   58.990597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.998321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.006040] page dumped because: kasan: bad access detected
[   59.011595] 
[   59.013071] Memory state around the buggy address:
[   59.017850]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.025054]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.032258] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.039460]                                      ^
[   59.044238]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.051443]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.058643] ==================================================================
[   50.916548] ==================================================================
[   50.923526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   50.930814] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312
[   50.938193] 
[   50.939676] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   50.939724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.939741] Hardware name: WinLink E850-96 board (DT)
[   50.939762] Call trace:
[   50.939777]  show_stack+0x20/0x38 (C)
[   50.939810]  dump_stack_lvl+0x8c/0xd0
[   50.939845]  print_report+0x118/0x608
[   50.939880]  kasan_report+0xdc/0x128
[   50.939915]  kasan_check_range+0x100/0x1a8
[   50.939950]  __kasan_check_write+0x20/0x30
[   50.939980]  kasan_atomics_helper+0x760/0x4858
[   50.940013]  kasan_atomics+0x198/0x2e0
[   50.940044]  kunit_try_run_case+0x170/0x3f0
[   50.940079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.940117]  kthread+0x328/0x630
[   50.940144]  ret_from_fork+0x10/0x20
[   50.940176] 
[   51.009892] Allocated by task 312:
[   51.013278]  kasan_save_stack+0x3c/0x68
[   51.017097]  kasan_save_track+0x20/0x40
[   51.020917]  kasan_save_alloc_info+0x40/0x58
[   51.025170]  __kasan_kmalloc+0xd4/0xd8
[   51.028903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.033416]  kasan_atomics+0xb8/0x2e0
[   51.037063]  kunit_try_run_case+0x170/0x3f0
[   51.041229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.046698]  kthread+0x328/0x630
[   51.049909]  ret_from_fork+0x10/0x20
[   51.053468] 
[   51.054944] The buggy address belongs to the object at ffff000805f49a00
[   51.054944]  which belongs to the cache kmalloc-64 of size 64
[   51.067271] The buggy address is located 0 bytes to the right of
[   51.067271]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   51.080117] 
[   51.081593] The buggy address belongs to the physical page:
[   51.087149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   51.095135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.101645] page_type: f5(slab)
[   51.104779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.112502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.120221] page dumped because: kasan: bad access detected
[   51.125776] 
[   51.127252] Memory state around the buggy address:
[   51.132030]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.139235]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.146440] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.153641]                                      ^
[   51.158418]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.165623]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.172824] ==================================================================
[   59.593777] ==================================================================
[   59.600825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.608201] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312
[   59.615580] 
[   59.617063] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   59.617110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.617125] Hardware name: WinLink E850-96 board (DT)
[   59.617145] Call trace:
[   59.617161]  show_stack+0x20/0x38 (C)
[   59.617192]  dump_stack_lvl+0x8c/0xd0
[   59.617229]  print_report+0x118/0x608
[   59.617261]  kasan_report+0xdc/0x128
[   59.617296]  kasan_check_range+0x100/0x1a8
[   59.617329]  __kasan_check_write+0x20/0x30
[   59.617359]  kasan_atomics_helper+0x1384/0x4858
[   59.617392]  kasan_atomics+0x198/0x2e0
[   59.617422]  kunit_try_run_case+0x170/0x3f0
[   59.617455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.617493]  kthread+0x328/0x630
[   59.617520]  ret_from_fork+0x10/0x20
[   59.617553] 
[   59.687367] Allocated by task 312:
[   59.690752]  kasan_save_stack+0x3c/0x68
[   59.694571]  kasan_save_track+0x20/0x40
[   59.698391]  kasan_save_alloc_info+0x40/0x58
[   59.702644]  __kasan_kmalloc+0xd4/0xd8
[   59.706377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.710891]  kasan_atomics+0xb8/0x2e0
[   59.714536]  kunit_try_run_case+0x170/0x3f0
[   59.718703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.724172]  kthread+0x328/0x630
[   59.727383]  ret_from_fork+0x10/0x20
[   59.730942] 
[   59.732418] The buggy address belongs to the object at ffff000805f49a00
[   59.732418]  which belongs to the cache kmalloc-64 of size 64
[   59.744745] The buggy address is located 0 bytes to the right of
[   59.744745]  allocated 48-byte region [ffff000805f49a00, ffff000805f49a30)
[   59.757591] 
[   59.759067] The buggy address belongs to the physical page:
[   59.764623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49
[   59.772612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.779119] page_type: f5(slab)
[   59.782252] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.789976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.797695] page dumped because: kasan: bad access detected
[   59.803250] 
[   59.804726] Memory state around the buggy address:
[   59.809504]  ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.816709]  ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.823914] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.831114]                                      ^
[   59.835892]  ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.843097]  ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.850298] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   44.554430] ==================================================================
[   44.561467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.570406] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.577785] 
[   44.579265] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.579312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.579328] Hardware name: WinLink E850-96 board (DT)
[   44.579344] Call trace:
[   44.579358]  show_stack+0x20/0x38 (C)
[   44.579393]  dump_stack_lvl+0x8c/0xd0
[   44.579427]  print_report+0x118/0x608
[   44.579461]  kasan_report+0xdc/0x128
[   44.579494]  kasan_check_range+0x100/0x1a8
[   44.579529]  __kasan_check_write+0x20/0x30
[   44.579558]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.579594]  kasan_bitops_generic+0x11c/0x1c8
[   44.579628]  kunit_try_run_case+0x170/0x3f0
[   44.579661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.579698]  kthread+0x328/0x630
[   44.579725]  ret_from_fork+0x10/0x20
[   44.579758] 
[   44.651741] Allocated by task 308:
[   44.655127]  kasan_save_stack+0x3c/0x68
[   44.658946]  kasan_save_track+0x20/0x40
[   44.662766]  kasan_save_alloc_info+0x40/0x58
[   44.667019]  __kasan_kmalloc+0xd4/0xd8
[   44.670752]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.675265]  kasan_bitops_generic+0xa0/0x1c8
[   44.679519]  kunit_try_run_case+0x170/0x3f0
[   44.683686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.689154]  kthread+0x328/0x630
[   44.692366]  ret_from_fork+0x10/0x20
[   44.695925] 
[   44.697400] The buggy address belongs to the object at ffff000800d63060
[   44.697400]  which belongs to the cache kmalloc-16 of size 16
[   44.709727] The buggy address is located 8 bytes inside of
[   44.709727]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.721966] 
[   44.723442] The buggy address belongs to the physical page:
[   44.728998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.736983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.743494] page_type: f5(slab)
[   44.746627] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.754351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.762070] page dumped because: kasan: bad access detected
[   44.767625] 
[   44.769101] Memory state around the buggy address:
[   44.773879]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.781084]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.788289] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.795489]                                                           ^
[   44.802090]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.809296]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.816496] ==================================================================
[   45.625215] ==================================================================
[   45.632284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.641224] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.648602] 
[   45.650082] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.650127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.650143] Hardware name: WinLink E850-96 board (DT)
[   45.650160] Call trace:
[   45.650176]  show_stack+0x20/0x38 (C)
[   45.650206]  dump_stack_lvl+0x8c/0xd0
[   45.650239]  print_report+0x118/0x608
[   45.650273]  kasan_report+0xdc/0x128
[   45.650303]  kasan_check_range+0x100/0x1a8
[   45.650339]  __kasan_check_write+0x20/0x30
[   45.650369]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.650407]  kasan_bitops_generic+0x11c/0x1c8
[   45.650440]  kunit_try_run_case+0x170/0x3f0
[   45.650472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.650509]  kthread+0x328/0x630
[   45.650537]  ret_from_fork+0x10/0x20
[   45.650566] 
[   45.722559] Allocated by task 308:
[   45.725944]  kasan_save_stack+0x3c/0x68
[   45.729764]  kasan_save_track+0x20/0x40
[   45.733583]  kasan_save_alloc_info+0x40/0x58
[   45.737836]  __kasan_kmalloc+0xd4/0xd8
[   45.741569]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.746083]  kasan_bitops_generic+0xa0/0x1c8
[   45.750336]  kunit_try_run_case+0x170/0x3f0
[   45.754503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.759971]  kthread+0x328/0x630
[   45.763183]  ret_from_fork+0x10/0x20
[   45.766742] 
[   45.768218] The buggy address belongs to the object at ffff000800d63060
[   45.768218]  which belongs to the cache kmalloc-16 of size 16
[   45.780545] The buggy address is located 8 bytes inside of
[   45.780545]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   45.792784] 
[   45.794260] The buggy address belongs to the physical page:
[   45.799815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.807802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.814311] page_type: f5(slab)
[   45.817444] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.825169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.832887] page dumped because: kasan: bad access detected
[   45.838442] 
[   45.839918] Memory state around the buggy address:
[   45.844697]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.851901]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.859106] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.866307]                                                           ^
[   45.872908]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.880112]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.887313] ==================================================================
[   46.160653] ==================================================================
[   46.167694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.176632] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   46.183924] 
[   46.185405] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.185450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.185466] Hardware name: WinLink E850-96 board (DT)
[   46.185485] Call trace:
[   46.185498]  show_stack+0x20/0x38 (C)
[   46.185533]  dump_stack_lvl+0x8c/0xd0
[   46.185565]  print_report+0x118/0x608
[   46.185599]  kasan_report+0xdc/0x128
[   46.185631]  __asan_report_load8_noabort+0x20/0x30
[   46.185669]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.185707]  kasan_bitops_generic+0x11c/0x1c8
[   46.185741]  kunit_try_run_case+0x170/0x3f0
[   46.185777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.185816]  kthread+0x328/0x630
[   46.185841]  ret_from_fork+0x10/0x20
[   46.185872] 
[   46.254495] Allocated by task 308:
[   46.257881]  kasan_save_stack+0x3c/0x68
[   46.261700]  kasan_save_track+0x20/0x40
[   46.265519]  kasan_save_alloc_info+0x40/0x58
[   46.269773]  __kasan_kmalloc+0xd4/0xd8
[   46.273505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.278019]  kasan_bitops_generic+0xa0/0x1c8
[   46.282273]  kunit_try_run_case+0x170/0x3f0
[   46.286439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.291908]  kthread+0x328/0x630
[   46.295120]  ret_from_fork+0x10/0x20
[   46.298678] 
[   46.300154] The buggy address belongs to the object at ffff000800d63060
[   46.300154]  which belongs to the cache kmalloc-16 of size 16
[   46.312481] The buggy address is located 8 bytes inside of
[   46.312481]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   46.324720] 
[   46.326196] The buggy address belongs to the physical page:
[   46.331752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   46.339739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.346247] page_type: f5(slab)
[   46.349381] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.357105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.364823] page dumped because: kasan: bad access detected
[   46.370379] 
[   46.371854] Memory state around the buggy address:
[   46.376633]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.383838]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.391042] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.398243]                                                           ^
[   46.404844]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.412049]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.419250] ==================================================================
[   45.089838] ==================================================================
[   45.096875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.105815] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.113193] 
[   45.114674] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.114720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.114738] Hardware name: WinLink E850-96 board (DT)
[   45.114756] Call trace:
[   45.114769]  show_stack+0x20/0x38 (C)
[   45.114803]  dump_stack_lvl+0x8c/0xd0
[   45.114839]  print_report+0x118/0x608
[   45.114873]  kasan_report+0xdc/0x128
[   45.114906]  kasan_check_range+0x100/0x1a8
[   45.114941]  __kasan_check_write+0x20/0x30
[   45.114971]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.115009]  kasan_bitops_generic+0x11c/0x1c8
[   45.115041]  kunit_try_run_case+0x170/0x3f0
[   45.115076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.115114]  kthread+0x328/0x630
[   45.115141]  ret_from_fork+0x10/0x20
[   45.115171] 
[   45.187150] Allocated by task 308:
[   45.190536]  kasan_save_stack+0x3c/0x68
[   45.194355]  kasan_save_track+0x20/0x40
[   45.198174]  kasan_save_alloc_info+0x40/0x58
[   45.202428]  __kasan_kmalloc+0xd4/0xd8
[   45.206160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.210674]  kasan_bitops_generic+0xa0/0x1c8
[   45.214928]  kunit_try_run_case+0x170/0x3f0
[   45.219094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.224563]  kthread+0x328/0x630
[   45.227774]  ret_from_fork+0x10/0x20
[   45.231334] 
[   45.232809] The buggy address belongs to the object at ffff000800d63060
[   45.232809]  which belongs to the cache kmalloc-16 of size 16
[   45.245137] The buggy address is located 8 bytes inside of
[   45.245137]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   45.257375] 
[   45.258851] The buggy address belongs to the physical page:
[   45.264407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.272392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.278902] page_type: f5(slab)
[   45.282036] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.289760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.297478] page dumped because: kasan: bad access detected
[   45.303034] 
[   45.304509] Memory state around the buggy address:
[   45.309288]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.316492]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.323697] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.330898]                                                           ^
[   45.337499]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.344704]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.351905] ==================================================================
[   45.359255] ==================================================================
[   45.366315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.375255] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.382547] 
[   45.384028] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.384074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.384092] Hardware name: WinLink E850-96 board (DT)
[   45.384109] Call trace:
[   45.384123]  show_stack+0x20/0x38 (C)
[   45.384155]  dump_stack_lvl+0x8c/0xd0
[   45.384190]  print_report+0x118/0x608
[   45.384223]  kasan_report+0xdc/0x128
[   45.384255]  __asan_report_load8_noabort+0x20/0x30
[   45.384293]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.384331]  kasan_bitops_generic+0x11c/0x1c8
[   45.384364]  kunit_try_run_case+0x170/0x3f0
[   45.384398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.384436]  kthread+0x328/0x630
[   45.384464]  ret_from_fork+0x10/0x20
[   45.384494] 
[   45.453118] Allocated by task 308:
[   45.456504]  kasan_save_stack+0x3c/0x68
[   45.460323]  kasan_save_track+0x20/0x40
[   45.464143]  kasan_save_alloc_info+0x40/0x58
[   45.468396]  __kasan_kmalloc+0xd4/0xd8
[   45.472128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.476642]  kasan_bitops_generic+0xa0/0x1c8
[   45.480896]  kunit_try_run_case+0x170/0x3f0
[   45.485063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.490531]  kthread+0x328/0x630
[   45.493743]  ret_from_fork+0x10/0x20
[   45.497302] 
[   45.498777] The buggy address belongs to the object at ffff000800d63060
[   45.498777]  which belongs to the cache kmalloc-16 of size 16
[   45.511104] The buggy address is located 8 bytes inside of
[   45.511104]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   45.523343] 
[   45.524819] The buggy address belongs to the physical page:
[   45.530375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.538360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.544870] page_type: f5(slab)
[   45.548004] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.555728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.563446] page dumped because: kasan: bad access detected
[   45.569002] 
[   45.570477] Memory state around the buggy address:
[   45.575256]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.582461]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.589665] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.596866]                                                           ^
[   45.603467]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.610672]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.617873] ==================================================================
[   45.894629] ==================================================================
[   45.901724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.910664] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.917955] 
[   45.919435] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.919483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.919501] Hardware name: WinLink E850-96 board (DT)
[   45.919520] Call trace:
[   45.919532]  show_stack+0x20/0x38 (C)
[   45.919567]  dump_stack_lvl+0x8c/0xd0
[   45.919599]  print_report+0x118/0x608
[   45.919631]  kasan_report+0xdc/0x128
[   45.919664]  __asan_report_load8_noabort+0x20/0x30
[   45.919700]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.919738]  kasan_bitops_generic+0x11c/0x1c8
[   45.919771]  kunit_try_run_case+0x170/0x3f0
[   45.919804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.919842]  kthread+0x328/0x630
[   45.919867]  ret_from_fork+0x10/0x20
[   45.919899] 
[   45.988527] Allocated by task 308:
[   45.991912]  kasan_save_stack+0x3c/0x68
[   45.995732]  kasan_save_track+0x20/0x40
[   45.999551]  kasan_save_alloc_info+0x40/0x58
[   46.003804]  __kasan_kmalloc+0xd4/0xd8
[   46.007537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.012051]  kasan_bitops_generic+0xa0/0x1c8
[   46.016305]  kunit_try_run_case+0x170/0x3f0
[   46.020471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.025940]  kthread+0x328/0x630
[   46.029151]  ret_from_fork+0x10/0x20
[   46.032710] 
[   46.034186] The buggy address belongs to the object at ffff000800d63060
[   46.034186]  which belongs to the cache kmalloc-16 of size 16
[   46.046513] The buggy address is located 8 bytes inside of
[   46.046513]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   46.058752] 
[   46.060228] The buggy address belongs to the physical page:
[   46.065784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   46.073769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.080279] page_type: f5(slab)
[   46.083412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.091137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.098855] page dumped because: kasan: bad access detected
[   46.104411] 
[   46.105886] Memory state around the buggy address:
[   46.110665]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.117870]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.125074] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.132275]                                                           ^
[   46.138876]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.146081]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.153282] ==================================================================
[   44.823844] ==================================================================
[   44.830909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.839847] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.847138] 
[   44.848619] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.848664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.848680] Hardware name: WinLink E850-96 board (DT)
[   44.848699] Call trace:
[   44.848711]  show_stack+0x20/0x38 (C)
[   44.848746]  dump_stack_lvl+0x8c/0xd0
[   44.848781]  print_report+0x118/0x608
[   44.848813]  kasan_report+0xdc/0x128
[   44.848847]  __asan_report_load8_noabort+0x20/0x30
[   44.848885]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.848923]  kasan_bitops_generic+0x11c/0x1c8
[   44.848955]  kunit_try_run_case+0x170/0x3f0
[   44.848991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.849029]  kthread+0x328/0x630
[   44.849056]  ret_from_fork+0x10/0x20
[   44.849087] 
[   44.917710] Allocated by task 308:
[   44.921095]  kasan_save_stack+0x3c/0x68
[   44.924915]  kasan_save_track+0x20/0x40
[   44.928734]  kasan_save_alloc_info+0x40/0x58
[   44.932987]  __kasan_kmalloc+0xd4/0xd8
[   44.936720]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.941234]  kasan_bitops_generic+0xa0/0x1c8
[   44.945487]  kunit_try_run_case+0x170/0x3f0
[   44.949654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.955122]  kthread+0x328/0x630
[   44.958334]  ret_from_fork+0x10/0x20
[   44.961893] 
[   44.963369] The buggy address belongs to the object at ffff000800d63060
[   44.963369]  which belongs to the cache kmalloc-16 of size 16
[   44.975696] The buggy address is located 8 bytes inside of
[   44.975696]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.987935] 
[   44.989410] The buggy address belongs to the physical page:
[   44.994966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.002952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.009462] page_type: f5(slab)
[   45.012595] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.020320] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.028038] page dumped because: kasan: bad access detected
[   45.033593] 
[   45.035069] Memory state around the buggy address:
[   45.039847]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.047052]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.054257] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.061457]                                                           ^
[   45.068058]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.075263]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.082465] ==================================================================
[   44.288411] ==================================================================
[   44.295498] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.304438] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.311730] 
[   44.313210] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.313255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.313276] Hardware name: WinLink E850-96 board (DT)
[   44.313293] Call trace:
[   44.313307]  show_stack+0x20/0x38 (C)
[   44.313342]  dump_stack_lvl+0x8c/0xd0
[   44.313378]  print_report+0x118/0x608
[   44.313410]  kasan_report+0xdc/0x128
[   44.313443]  __asan_report_load8_noabort+0x20/0x30
[   44.313480]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.313518]  kasan_bitops_generic+0x11c/0x1c8
[   44.313549]  kunit_try_run_case+0x170/0x3f0
[   44.313584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.313623]  kthread+0x328/0x630
[   44.313649]  ret_from_fork+0x10/0x20
[   44.313681] 
[   44.382301] Allocated by task 308:
[   44.385687]  kasan_save_stack+0x3c/0x68
[   44.389506]  kasan_save_track+0x20/0x40
[   44.393325]  kasan_save_alloc_info+0x40/0x58
[   44.397579]  __kasan_kmalloc+0xd4/0xd8
[   44.401311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.405825]  kasan_bitops_generic+0xa0/0x1c8
[   44.410078]  kunit_try_run_case+0x170/0x3f0
[   44.414245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.419714]  kthread+0x328/0x630
[   44.422926]  ret_from_fork+0x10/0x20
[   44.426485] 
[   44.427960] The buggy address belongs to the object at ffff000800d63060
[   44.427960]  which belongs to the cache kmalloc-16 of size 16
[   44.440287] The buggy address is located 8 bytes inside of
[   44.440287]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.452526] 
[   44.454002] The buggy address belongs to the physical page:
[   44.459559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.467543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.474054] page_type: f5(slab)
[   44.477187] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.484911] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.492630] page dumped because: kasan: bad access detected
[   44.498185] 
[   44.499660] Memory state around the buggy address:
[   44.504438]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.511644]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.518848] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.526049]                                                           ^
[   44.532650]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.539855]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.547056] ==================================================================
[   44.019166] ==================================================================
[   44.026233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.035084] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.042463] 
[   44.043942] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.043991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.044006] Hardware name: WinLink E850-96 board (DT)
[   44.044026] Call trace:
[   44.044040]  show_stack+0x20/0x38 (C)
[   44.044075]  dump_stack_lvl+0x8c/0xd0
[   44.044112]  print_report+0x118/0x608
[   44.044144]  kasan_report+0xdc/0x128
[   44.044178]  kasan_check_range+0x100/0x1a8
[   44.044212]  __kasan_check_write+0x20/0x30
[   44.044241]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.044280]  kasan_bitops_generic+0x11c/0x1c8
[   44.044312]  kunit_try_run_case+0x170/0x3f0
[   44.044346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.044385]  kthread+0x328/0x630
[   44.044411]  ret_from_fork+0x10/0x20
[   44.044444] 
[   44.116333] Allocated by task 308:
[   44.119718]  kasan_save_stack+0x3c/0x68
[   44.123538]  kasan_save_track+0x20/0x40
[   44.127357]  kasan_save_alloc_info+0x40/0x58
[   44.131611]  __kasan_kmalloc+0xd4/0xd8
[   44.135343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.139857]  kasan_bitops_generic+0xa0/0x1c8
[   44.144110]  kunit_try_run_case+0x170/0x3f0
[   44.148277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.153746]  kthread+0x328/0x630
[   44.156957]  ret_from_fork+0x10/0x20
[   44.160516] 
[   44.161992] The buggy address belongs to the object at ffff000800d63060
[   44.161992]  which belongs to the cache kmalloc-16 of size 16
[   44.174319] The buggy address is located 8 bytes inside of
[   44.174319]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.186558] 
[   44.188034] The buggy address belongs to the physical page:
[   44.193590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.201575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.208085] page_type: f5(slab)
[   44.211218] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.218943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.226661] page dumped because: kasan: bad access detected
[   44.232217] 
[   44.233692] Memory state around the buggy address:
[   44.238471]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.245675]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.252880] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.260081]                                                           ^
[   44.266682]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.273887]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.281087] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   43.754770] ==================================================================
[   43.761826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.769984] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   43.777276] 
[   43.778756] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   43.778806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.778822] Hardware name: WinLink E850-96 board (DT)
[   43.778843] Call trace:
[   43.778856]  show_stack+0x20/0x38 (C)
[   43.778889]  dump_stack_lvl+0x8c/0xd0
[   43.778924]  print_report+0x118/0x608
[   43.778959]  kasan_report+0xdc/0x128
[   43.778993]  __asan_report_load8_noabort+0x20/0x30
[   43.779033]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.779069]  kasan_bitops_generic+0x110/0x1c8
[   43.779102]  kunit_try_run_case+0x170/0x3f0
[   43.779137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.779174]  kthread+0x328/0x630
[   43.779201]  ret_from_fork+0x10/0x20
[   43.779234] 
[   43.847066] Allocated by task 308:
[   43.850452]  kasan_save_stack+0x3c/0x68
[   43.854271]  kasan_save_track+0x20/0x40
[   43.858090]  kasan_save_alloc_info+0x40/0x58
[   43.862344]  __kasan_kmalloc+0xd4/0xd8
[   43.866076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.870590]  kasan_bitops_generic+0xa0/0x1c8
[   43.874843]  kunit_try_run_case+0x170/0x3f0
[   43.879010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.884479]  kthread+0x328/0x630
[   43.887690]  ret_from_fork+0x10/0x20
[   43.891249] 
[   43.892725] The buggy address belongs to the object at ffff000800d63060
[   43.892725]  which belongs to the cache kmalloc-16 of size 16
[   43.905052] The buggy address is located 8 bytes inside of
[   43.905052]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.917291] 
[   43.918767] The buggy address belongs to the physical page:
[   43.924326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.932309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.938818] page_type: f5(slab)
[   43.941952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.949676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.957394] page dumped because: kasan: bad access detected
[   43.962950] 
[   43.964425] Memory state around the buggy address:
[   43.969204]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.976408]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.983613] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.990814]                                                           ^
[   43.997415]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.004620]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.011821] ==================================================================
[   41.622131] ==================================================================
[   41.629221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.637377] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   41.644669] 
[   41.646153] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.646206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.646225] Hardware name: WinLink E850-96 board (DT)
[   41.646247] Call trace:
[   41.646264]  show_stack+0x20/0x38 (C)
[   41.646298]  dump_stack_lvl+0x8c/0xd0
[   41.646335]  print_report+0x118/0x608
[   41.646370]  kasan_report+0xdc/0x128
[   41.646405]  __asan_report_load8_noabort+0x20/0x30
[   41.646444]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.646478]  kasan_bitops_generic+0x110/0x1c8
[   41.646510]  kunit_try_run_case+0x170/0x3f0
[   41.646546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.646586]  kthread+0x328/0x630
[   41.646615]  ret_from_fork+0x10/0x20
[   41.646649] 
[   41.714459] Allocated by task 308:
[   41.717848]  kasan_save_stack+0x3c/0x68
[   41.721664]  kasan_save_track+0x20/0x40
[   41.725483]  kasan_save_alloc_info+0x40/0x58
[   41.729737]  __kasan_kmalloc+0xd4/0xd8
[   41.733470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.737983]  kasan_bitops_generic+0xa0/0x1c8
[   41.742237]  kunit_try_run_case+0x170/0x3f0
[   41.746403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.751872]  kthread+0x328/0x630
[   41.755084]  ret_from_fork+0x10/0x20
[   41.758642] 
[   41.760120] The buggy address belongs to the object at ffff000800d63060
[   41.760120]  which belongs to the cache kmalloc-16 of size 16
[   41.772445] The buggy address is located 8 bytes inside of
[   41.772445]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   41.784684] 
[   41.786161] The buggy address belongs to the physical page:
[   41.791719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.799703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.806213] page_type: f5(slab)
[   41.809348] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.817069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.824788] page dumped because: kasan: bad access detected
[   41.830343] 
[   41.831819] Memory state around the buggy address:
[   41.836600]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.843802]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.851006] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   41.858207]                                                           ^
[   41.864808]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.872013]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.879214] ==================================================================
[   42.954736] ==================================================================
[   42.961666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   42.969823] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.977114] 
[   42.978597] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.978650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.978668] Hardware name: WinLink E850-96 board (DT)
[   42.978690] Call trace:
[   42.978706]  show_stack+0x20/0x38 (C)
[   42.978740]  dump_stack_lvl+0x8c/0xd0
[   42.978778]  print_report+0x118/0x608
[   42.978812]  kasan_report+0xdc/0x128
[   42.978844]  __asan_report_load8_noabort+0x20/0x30
[   42.978883]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   42.978920]  kasan_bitops_generic+0x110/0x1c8
[   42.978952]  kunit_try_run_case+0x170/0x3f0
[   42.978990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.979030]  kthread+0x328/0x630
[   42.979057]  ret_from_fork+0x10/0x20
[   42.979090] 
[   43.046904] Allocated by task 308:
[   43.050291]  kasan_save_stack+0x3c/0x68
[   43.054109]  kasan_save_track+0x20/0x40
[   43.057929]  kasan_save_alloc_info+0x40/0x58
[   43.062182]  __kasan_kmalloc+0xd4/0xd8
[   43.065915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.070428]  kasan_bitops_generic+0xa0/0x1c8
[   43.074682]  kunit_try_run_case+0x170/0x3f0
[   43.078848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.084317]  kthread+0x328/0x630
[   43.087529]  ret_from_fork+0x10/0x20
[   43.091088] 
[   43.092563] The buggy address belongs to the object at ffff000800d63060
[   43.092563]  which belongs to the cache kmalloc-16 of size 16
[   43.104890] The buggy address is located 8 bytes inside of
[   43.104890]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.117129] 
[   43.118605] The buggy address belongs to the physical page:
[   43.124162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.132149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.138658] page_type: f5(slab)
[   43.141791] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.149514] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.157233] page dumped because: kasan: bad access detected
[   43.162788] 
[   43.164264] Memory state around the buggy address:
[   43.169043]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.176247]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.183451] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.190652]                                                           ^
[   43.197253]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.204458]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.211659] ==================================================================
[   42.419014] ==================================================================
[   42.425910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.434067] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.441445] 
[   42.442929] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.442980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.442998] Hardware name: WinLink E850-96 board (DT)
[   42.443018] Call trace:
[   42.443033]  show_stack+0x20/0x38 (C)
[   42.443068]  dump_stack_lvl+0x8c/0xd0
[   42.443109]  print_report+0x118/0x608
[   42.443142]  kasan_report+0xdc/0x128
[   42.443174]  kasan_check_range+0x100/0x1a8
[   42.443211]  __kasan_check_write+0x20/0x30
[   42.443242]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.443276]  kasan_bitops_generic+0x110/0x1c8
[   42.443310]  kunit_try_run_case+0x170/0x3f0
[   42.443344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.443382]  kthread+0x328/0x630
[   42.443410]  ret_from_fork+0x10/0x20
[   42.443443] 
[   42.514622] Allocated by task 308:
[   42.518006]  kasan_save_stack+0x3c/0x68
[   42.521825]  kasan_save_track+0x20/0x40
[   42.525645]  kasan_save_alloc_info+0x40/0x58
[   42.529898]  __kasan_kmalloc+0xd4/0xd8
[   42.533631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.538145]  kasan_bitops_generic+0xa0/0x1c8
[   42.542398]  kunit_try_run_case+0x170/0x3f0
[   42.546565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.552033]  kthread+0x328/0x630
[   42.555245]  ret_from_fork+0x10/0x20
[   42.558804] 
[   42.560280] The buggy address belongs to the object at ffff000800d63060
[   42.560280]  which belongs to the cache kmalloc-16 of size 16
[   42.572607] The buggy address is located 8 bytes inside of
[   42.572607]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.584845] 
[   42.586322] The buggy address belongs to the physical page:
[   42.591881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.599863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.606375] page_type: f5(slab)
[   42.609508] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.617231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.624949] page dumped because: kasan: bad access detected
[   42.630505] 
[   42.631980] Memory state around the buggy address:
[   42.636761]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.643963]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.651168] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.658369]                                                           ^
[   42.664970]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.672175]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.679376] ==================================================================
[   42.686685] ==================================================================
[   42.693788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.701945] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.709323] 
[   42.710805] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.710853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.710871] Hardware name: WinLink E850-96 board (DT)
[   42.710892] Call trace:
[   42.710906]  show_stack+0x20/0x38 (C)
[   42.710942]  dump_stack_lvl+0x8c/0xd0
[   42.710977]  print_report+0x118/0x608
[   42.711012]  kasan_report+0xdc/0x128
[   42.711046]  kasan_check_range+0x100/0x1a8
[   42.711080]  __kasan_check_write+0x20/0x30
[   42.711110]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.711146]  kasan_bitops_generic+0x110/0x1c8
[   42.711178]  kunit_try_run_case+0x170/0x3f0
[   42.711210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.711248]  kthread+0x328/0x630
[   42.711274]  ret_from_fork+0x10/0x20
[   42.711306] 
[   42.782499] Allocated by task 308:
[   42.785886]  kasan_save_stack+0x3c/0x68
[   42.789704]  kasan_save_track+0x20/0x40
[   42.793523]  kasan_save_alloc_info+0x40/0x58
[   42.797776]  __kasan_kmalloc+0xd4/0xd8
[   42.801509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.806023]  kasan_bitops_generic+0xa0/0x1c8
[   42.810276]  kunit_try_run_case+0x170/0x3f0
[   42.814443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.819912]  kthread+0x328/0x630
[   42.823123]  ret_from_fork+0x10/0x20
[   42.826682] 
[   42.828158] The buggy address belongs to the object at ffff000800d63060
[   42.828158]  which belongs to the cache kmalloc-16 of size 16
[   42.840485] The buggy address is located 8 bytes inside of
[   42.840485]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.852723] 
[   42.854199] The buggy address belongs to the physical page:
[   42.859757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.867743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.874252] page_type: f5(slab)
[   42.877384] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.885109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.892827] page dumped because: kasan: bad access detected
[   42.898382] 
[   42.899858] Memory state around the buggy address:
[   42.904639]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.911841]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.919046] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.926247]                                                           ^
[   42.932848]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.940053]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.947253] ==================================================================
[   42.154405] ==================================================================
[   42.161503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.169661] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.176952] 
[   42.178436] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.178487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.178504] Hardware name: WinLink E850-96 board (DT)
[   42.178525] Call trace:
[   42.178541]  show_stack+0x20/0x38 (C)
[   42.178576]  dump_stack_lvl+0x8c/0xd0
[   42.178611]  print_report+0x118/0x608
[   42.178644]  kasan_report+0xdc/0x128
[   42.178678]  __asan_report_load8_noabort+0x20/0x30
[   42.178717]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.178755]  kasan_bitops_generic+0x110/0x1c8
[   42.178786]  kunit_try_run_case+0x170/0x3f0
[   42.178822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.178861]  kthread+0x328/0x630
[   42.178888]  ret_from_fork+0x10/0x20
[   42.178922] 
[   42.246743] Allocated by task 308:
[   42.250128]  kasan_save_stack+0x3c/0x68
[   42.253948]  kasan_save_track+0x20/0x40
[   42.257767]  kasan_save_alloc_info+0x40/0x58
[   42.262020]  __kasan_kmalloc+0xd4/0xd8
[   42.265753]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.270267]  kasan_bitops_generic+0xa0/0x1c8
[   42.274520]  kunit_try_run_case+0x170/0x3f0
[   42.278687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.284155]  kthread+0x328/0x630
[   42.287367]  ret_from_fork+0x10/0x20
[   42.290926] 
[   42.292402] The buggy address belongs to the object at ffff000800d63060
[   42.292402]  which belongs to the cache kmalloc-16 of size 16
[   42.304729] The buggy address is located 8 bytes inside of
[   42.304729]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.316968] 
[   42.318445] The buggy address belongs to the physical page:
[   42.323999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.331985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.338496] page_type: f5(slab)
[   42.341628] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.349353] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.357071] page dumped because: kasan: bad access detected
[   42.362626] 
[   42.364102] Memory state around the buggy address:
[   42.368882]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.376085]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.383292] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.390491]                                                           ^
[   42.397092]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.404297]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.411497] ==================================================================
[   43.219061] ==================================================================
[   43.226070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.234228] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   43.241607] 
[   43.243090] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   43.243140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.243159] Hardware name: WinLink E850-96 board (DT)
[   43.243180] Call trace:
[   43.243194]  show_stack+0x20/0x38 (C)
[   43.243228]  dump_stack_lvl+0x8c/0xd0
[   43.243263]  print_report+0x118/0x608
[   43.243297]  kasan_report+0xdc/0x128
[   43.243330]  kasan_check_range+0x100/0x1a8
[   43.243365]  __kasan_check_write+0x20/0x30
[   43.243394]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.243429]  kasan_bitops_generic+0x110/0x1c8
[   43.243462]  kunit_try_run_case+0x170/0x3f0
[   43.243497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.243535]  kthread+0x328/0x630
[   43.243563]  ret_from_fork+0x10/0x20
[   43.243596] 
[   43.314782] Allocated by task 308:
[   43.318168]  kasan_save_stack+0x3c/0x68
[   43.321987]  kasan_save_track+0x20/0x40
[   43.325807]  kasan_save_alloc_info+0x40/0x58
[   43.330060]  __kasan_kmalloc+0xd4/0xd8
[   43.333793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.338307]  kasan_bitops_generic+0xa0/0x1c8
[   43.342560]  kunit_try_run_case+0x170/0x3f0
[   43.346727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.352195]  kthread+0x328/0x630
[   43.355407]  ret_from_fork+0x10/0x20
[   43.358966] 
[   43.360442] The buggy address belongs to the object at ffff000800d63060
[   43.360442]  which belongs to the cache kmalloc-16 of size 16
[   43.372768] The buggy address is located 8 bytes inside of
[   43.372768]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.385007] 
[   43.386483] The buggy address belongs to the physical page:
[   43.392039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.400028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.406536] page_type: f5(slab)
[   43.409668] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.417392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.425111] page dumped because: kasan: bad access detected
[   43.430666] 
[   43.432142] Memory state around the buggy address:
[   43.436921]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.444125]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.451330] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.458531]                                                           ^
[   43.465131]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.472336]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.479537] ==================================================================
[   43.486941] ==================================================================
[   43.493948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.502106] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   43.509484] 
[   43.510967] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   43.511017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.511035] Hardware name: WinLink E850-96 board (DT)
[   43.511057] Call trace:
[   43.511068]  show_stack+0x20/0x38 (C)
[   43.511105]  dump_stack_lvl+0x8c/0xd0
[   43.511140]  print_report+0x118/0x608
[   43.511175]  kasan_report+0xdc/0x128
[   43.511209]  kasan_check_range+0x100/0x1a8
[   43.511244]  __kasan_check_write+0x20/0x30
[   43.511273]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.511309]  kasan_bitops_generic+0x110/0x1c8
[   43.511341]  kunit_try_run_case+0x170/0x3f0
[   43.511377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.511416]  kthread+0x328/0x630
[   43.511443]  ret_from_fork+0x10/0x20
[   43.511476] 
[   43.582660] Allocated by task 308:
[   43.586047]  kasan_save_stack+0x3c/0x68
[   43.589865]  kasan_save_track+0x20/0x40
[   43.593685]  kasan_save_alloc_info+0x40/0x58
[   43.597938]  __kasan_kmalloc+0xd4/0xd8
[   43.601670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.606184]  kasan_bitops_generic+0xa0/0x1c8
[   43.610438]  kunit_try_run_case+0x170/0x3f0
[   43.614604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.620073]  kthread+0x328/0x630
[   43.623285]  ret_from_fork+0x10/0x20
[   43.626844] 
[   43.628319] The buggy address belongs to the object at ffff000800d63060
[   43.628319]  which belongs to the cache kmalloc-16 of size 16
[   43.640646] The buggy address is located 8 bytes inside of
[   43.640646]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.652885] 
[   43.654362] The buggy address belongs to the physical page:
[   43.659917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.667904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.674412] page_type: f5(slab)
[   43.677546] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.685270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.692989] page dumped because: kasan: bad access detected
[   43.698544] 
[   43.700019] Memory state around the buggy address:
[   43.704799]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.712003]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.719207] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.726408]                                                           ^
[   43.733009]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.740214]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.747415] ==================================================================
[   41.352004] ==================================================================
[   41.361343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.369500] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   41.376878] 
[   41.378364] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.378423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.378442] Hardware name: WinLink E850-96 board (DT)
[   41.378465] Call trace:
[   41.378480]  show_stack+0x20/0x38 (C)
[   41.378518]  dump_stack_lvl+0x8c/0xd0
[   41.378557]  print_report+0x118/0x608
[   41.378596]  kasan_report+0xdc/0x128
[   41.378633]  kasan_check_range+0x100/0x1a8
[   41.378670]  __kasan_check_write+0x20/0x30
[   41.378703]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.378738]  kasan_bitops_generic+0x110/0x1c8
[   41.378774]  kunit_try_run_case+0x170/0x3f0
[   41.378812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.378850]  kthread+0x328/0x630
[   41.378881]  ret_from_fork+0x10/0x20
[   41.378918] 
[   41.450054] Allocated by task 308:
[   41.453442]  kasan_save_stack+0x3c/0x68
[   41.457258]  kasan_save_track+0x20/0x40
[   41.461079]  kasan_save_alloc_info+0x40/0x58
[   41.465331]  __kasan_kmalloc+0xd4/0xd8
[   41.469065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.473577]  kasan_bitops_generic+0xa0/0x1c8
[   41.477831]  kunit_try_run_case+0x170/0x3f0
[   41.481997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.487467]  kthread+0x328/0x630
[   41.490678]  ret_from_fork+0x10/0x20
[   41.494237] 
[   41.495714] The buggy address belongs to the object at ffff000800d63060
[   41.495714]  which belongs to the cache kmalloc-16 of size 16
[   41.508041] The buggy address is located 8 bytes inside of
[   41.508041]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   41.520278] 
[   41.521757] The buggy address belongs to the physical page:
[   41.527313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.535298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.541807] page_type: f5(slab)
[   41.544944] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.552663] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.560382] page dumped because: kasan: bad access detected
[   41.565937] 
[   41.567413] Memory state around the buggy address:
[   41.572194]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.579396]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.586602] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   41.593801]                                                           ^
[   41.600402]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.607607]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.614810] ==================================================================
[   41.886599] ==================================================================
[   41.893625] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.901783] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   41.909162] 
[   41.910648] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.910701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.910718] Hardware name: WinLink E850-96 board (DT)
[   41.910739] Call trace:
[   41.910756]  show_stack+0x20/0x38 (C)
[   41.910793]  dump_stack_lvl+0x8c/0xd0
[   41.910829]  print_report+0x118/0x608
[   41.910862]  kasan_report+0xdc/0x128
[   41.910897]  kasan_check_range+0x100/0x1a8
[   41.910932]  __kasan_check_write+0x20/0x30
[   41.910962]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.910999]  kasan_bitops_generic+0x110/0x1c8
[   41.911031]  kunit_try_run_case+0x170/0x3f0
[   41.911065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.911102]  kthread+0x328/0x630
[   41.911130]  ret_from_fork+0x10/0x20
[   41.911165] 
[   41.982337] Allocated by task 308:
[   41.985724]  kasan_save_stack+0x3c/0x68
[   41.989544]  kasan_save_track+0x20/0x40
[   41.993363]  kasan_save_alloc_info+0x40/0x58
[   41.997615]  __kasan_kmalloc+0xd4/0xd8
[   42.001347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.005861]  kasan_bitops_generic+0xa0/0x1c8
[   42.010115]  kunit_try_run_case+0x170/0x3f0
[   42.014281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.019750]  kthread+0x328/0x630
[   42.022962]  ret_from_fork+0x10/0x20
[   42.026521] 
[   42.027998] The buggy address belongs to the object at ffff000800d63060
[   42.027998]  which belongs to the cache kmalloc-16 of size 16
[   42.040323] The buggy address is located 8 bytes inside of
[   42.040323]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.052562] 
[   42.054039] The buggy address belongs to the physical page:
[   42.059593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.067581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.074091] page_type: f5(slab)
[   42.077223] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.084947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.092665] page dumped because: kasan: bad access detected
[   42.098221] 
[   42.099696] Memory state around the buggy address:
[   42.104476]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.111680]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.118886] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.126085]                                                           ^
[   42.132686]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.139891]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.147092] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   41.051386] ==================================================================
[   41.058396] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   41.064382] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306
[   41.071674] 
[   41.073158] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.073211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.073231] Hardware name: WinLink E850-96 board (DT)
[   41.073252] Call trace:
[   41.073269]  show_stack+0x20/0x38 (C)
[   41.073307]  dump_stack_lvl+0x8c/0xd0
[   41.073342]  print_report+0x118/0x608
[   41.073376]  kasan_report+0xdc/0x128
[   41.073411]  __asan_report_load1_noabort+0x20/0x30
[   41.073449]  strnlen+0x80/0x88
[   41.073477]  kasan_strings+0x478/0xb00
[   41.073509]  kunit_try_run_case+0x170/0x3f0
[   41.073545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.073583]  kthread+0x328/0x630
[   41.073610]  ret_from_fork+0x10/0x20
[   41.073644] 
[   41.138600] Allocated by task 306:
[   41.141987]  kasan_save_stack+0x3c/0x68
[   41.145804]  kasan_save_track+0x20/0x40
[   41.149624]  kasan_save_alloc_info+0x40/0x58
[   41.153878]  __kasan_kmalloc+0xd4/0xd8
[   41.157610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.162124]  kasan_strings+0xc8/0xb00
[   41.165769]  kunit_try_run_case+0x170/0x3f0
[   41.169936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.175406]  kthread+0x328/0x630
[   41.178617]  ret_from_fork+0x10/0x20
[   41.182176] 
[   41.183651] Freed by task 306:
[   41.186689]  kasan_save_stack+0x3c/0x68
[   41.190509]  kasan_save_track+0x20/0x40
[   41.194328]  kasan_save_free_info+0x4c/0x78
[   41.198495]  __kasan_slab_free+0x6c/0x98
[   41.202401]  kfree+0x214/0x3c8
[   41.205439]  kasan_strings+0x24c/0xb00
[   41.209172]  kunit_try_run_case+0x170/0x3f0
[   41.213338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.218807]  kthread+0x328/0x630
[   41.222019]  ret_from_fork+0x10/0x20
[   41.225578] 
[   41.227054] The buggy address belongs to the object at ffff00080499db00
[   41.227054]  which belongs to the cache kmalloc-32 of size 32
[   41.239382] The buggy address is located 16 bytes inside of
[   41.239382]  freed 32-byte region [ffff00080499db00, ffff00080499db20)
[   41.251446] 
[   41.252923] The buggy address belongs to the physical page:
[   41.258479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d
[   41.266463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.272974] page_type: f5(slab)
[   41.276109] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.283831] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.291549] page dumped because: kasan: bad access detected
[   41.297104] 
[   41.298580] Memory state around the buggy address:
[   41.303360]  ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.310563]  ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.317768] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.324969]                          ^
[   41.328705]  ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.335910]  ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.343111] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   40.752346] ==================================================================
[   40.759443] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.765342] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306
[   40.772633] 
[   40.774118] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   40.774171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.774188] Hardware name: WinLink E850-96 board (DT)
[   40.774210] Call trace:
[   40.774225]  show_stack+0x20/0x38 (C)
[   40.774260]  dump_stack_lvl+0x8c/0xd0
[   40.774296]  print_report+0x118/0x608
[   40.774332]  kasan_report+0xdc/0x128
[   40.774365]  __asan_report_load1_noabort+0x20/0x30
[   40.774402]  strlen+0xa8/0xb0
[   40.774429]  kasan_strings+0x418/0xb00
[   40.774461]  kunit_try_run_case+0x170/0x3f0
[   40.774497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.774535]  kthread+0x328/0x630
[   40.774564]  ret_from_fork+0x10/0x20
[   40.774603] 
[   40.839472] Allocated by task 306:
[   40.842859]  kasan_save_stack+0x3c/0x68
[   40.846677]  kasan_save_track+0x20/0x40
[   40.850496]  kasan_save_alloc_info+0x40/0x58
[   40.854750]  __kasan_kmalloc+0xd4/0xd8
[   40.858482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.862996]  kasan_strings+0xc8/0xb00
[   40.866642]  kunit_try_run_case+0x170/0x3f0
[   40.870809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.876279]  kthread+0x328/0x630
[   40.879489]  ret_from_fork+0x10/0x20
[   40.883048] 
[   40.884524] Freed by task 306:
[   40.887562]  kasan_save_stack+0x3c/0x68
[   40.891381]  kasan_save_track+0x20/0x40
[   40.895201]  kasan_save_free_info+0x4c/0x78
[   40.899367]  __kasan_slab_free+0x6c/0x98
[   40.903273]  kfree+0x214/0x3c8
[   40.906312]  kasan_strings+0x24c/0xb00
[   40.910044]  kunit_try_run_case+0x170/0x3f0
[   40.914211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.919679]  kthread+0x328/0x630
[   40.922891]  ret_from_fork+0x10/0x20
[   40.926451] 
[   40.927926] The buggy address belongs to the object at ffff00080499db00
[   40.927926]  which belongs to the cache kmalloc-32 of size 32
[   40.940254] The buggy address is located 16 bytes inside of
[   40.940254]  freed 32-byte region [ffff00080499db00, ffff00080499db20)
[   40.952318] 
[   40.953796] The buggy address belongs to the physical page:
[   40.959353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d
[   40.967337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.973847] page_type: f5(slab)
[   40.976983] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.984703] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.992422] page dumped because: kasan: bad access detected
[   40.997977] 
[   40.999451] Memory state around the buggy address:
[   41.004233]  ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.011436]  ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.018640] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.025841]                          ^
[   41.029577]  ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.036782]  ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.043985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   40.455571] ==================================================================
[   40.462660] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   40.469339] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306
[   40.476630] 
[   40.478116] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   40.478167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.478186] Hardware name: WinLink E850-96 board (DT)
[   40.478207] Call trace:
[   40.478223]  show_stack+0x20/0x38 (C)
[   40.478256]  dump_stack_lvl+0x8c/0xd0
[   40.478294]  print_report+0x118/0x608
[   40.478331]  kasan_report+0xdc/0x128
[   40.478364]  __asan_report_load1_noabort+0x20/0x30
[   40.478403]  kasan_strings+0x95c/0xb00
[   40.478432]  kunit_try_run_case+0x170/0x3f0
[   40.478468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.478509]  kthread+0x328/0x630
[   40.478540]  ret_from_fork+0x10/0x20
[   40.478576] 
[   40.540520] Allocated by task 306:
[   40.543907]  kasan_save_stack+0x3c/0x68
[   40.547723]  kasan_save_track+0x20/0x40
[   40.551543]  kasan_save_alloc_info+0x40/0x58
[   40.555796]  __kasan_kmalloc+0xd4/0xd8
[   40.559529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.564042]  kasan_strings+0xc8/0xb00
[   40.567688]  kunit_try_run_case+0x170/0x3f0
[   40.571855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.577325]  kthread+0x328/0x630
[   40.580535]  ret_from_fork+0x10/0x20
[   40.584094] 
[   40.585570] Freed by task 306:
[   40.588608]  kasan_save_stack+0x3c/0x68
[   40.592428]  kasan_save_track+0x20/0x40
[   40.596247]  kasan_save_free_info+0x4c/0x78
[   40.600414]  __kasan_slab_free+0x6c/0x98
[   40.604320]  kfree+0x214/0x3c8
[   40.607358]  kasan_strings+0x24c/0xb00
[   40.611091]  kunit_try_run_case+0x170/0x3f0
[   40.615257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.620726]  kthread+0x328/0x630
[   40.623937]  ret_from_fork+0x10/0x20
[   40.627497] 
[   40.628972] The buggy address belongs to the object at ffff00080499db00
[   40.628972]  which belongs to the cache kmalloc-32 of size 32
[   40.641300] The buggy address is located 16 bytes inside of
[   40.641300]  freed 32-byte region [ffff00080499db00, ffff00080499db20)
[   40.653364] 
[   40.654842] The buggy address belongs to the physical page:
[   40.660397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d
[   40.668382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.674893] page_type: f5(slab)
[   40.678029] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.685749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.693467] page dumped because: kasan: bad access detected
[   40.699023] 
[   40.700499] Memory state around the buggy address:
[   40.705278]  ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.712482]  ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.719686] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.726887]                          ^
[   40.730624]  ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.737828]  ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.745031] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   40.139983] ==================================================================
[   40.163706] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.169606] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306
[   40.176896] 
[   40.178384] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   40.178440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.178459] Hardware name: WinLink E850-96 board (DT)
[   40.178480] Call trace:
[   40.178496]  show_stack+0x20/0x38 (C)
[   40.178532]  dump_stack_lvl+0x8c/0xd0
[   40.178568]  print_report+0x118/0x608
[   40.178607]  kasan_report+0xdc/0x128
[   40.178641]  __asan_report_load1_noabort+0x20/0x30
[   40.178683]  strcmp+0xc0/0xc8
[   40.178715]  kasan_strings+0x340/0xb00
[   40.178748]  kunit_try_run_case+0x170/0x3f0
[   40.178786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.178826]  kthread+0x328/0x630
[   40.178857]  ret_from_fork+0x10/0x20
[   40.178894] 
[   40.243735] Allocated by task 306:
[   40.247124]  kasan_save_stack+0x3c/0x68
[   40.250940]  kasan_save_track+0x20/0x40
[   40.254759]  kasan_save_alloc_info+0x40/0x58
[   40.259012]  __kasan_kmalloc+0xd4/0xd8
[   40.262745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.267259]  kasan_strings+0xc8/0xb00
[   40.270905]  kunit_try_run_case+0x170/0x3f0
[   40.275071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.280541]  kthread+0x328/0x630
[   40.283751]  ret_from_fork+0x10/0x20
[   40.287310] 
[   40.288787] Freed by task 306:
[   40.291827]  kasan_save_stack+0x3c/0x68
[   40.295644]  kasan_save_track+0x20/0x40
[   40.299462]  kasan_save_free_info+0x4c/0x78
[   40.303630]  __kasan_slab_free+0x6c/0x98
[   40.307536]  kfree+0x214/0x3c8
[   40.310574]  kasan_strings+0x24c/0xb00
[   40.314306]  kunit_try_run_case+0x170/0x3f0
[   40.318473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.323942]  kthread+0x328/0x630
[   40.327154]  ret_from_fork+0x10/0x20
[   40.330712] 
[   40.332190] The buggy address belongs to the object at ffff00080499db00
[   40.332190]  which belongs to the cache kmalloc-32 of size 32
[   40.344517] The buggy address is located 16 bytes inside of
[   40.344517]  freed 32-byte region [ffff00080499db00, ffff00080499db20)
[   40.356580] 
[   40.358058] The buggy address belongs to the physical page:
[   40.363617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d
[   40.371600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.378111] page_type: f5(slab)
[   40.381247] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.388965] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.396686] page dumped because: kasan: bad access detected
[   40.402239] 
[   40.403715] Memory state around the buggy address:
[   40.408498]  ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.415698]  ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.422902] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.430103]                          ^
[   40.433840]  ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.441045]  ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.448247] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   39.839509] ==================================================================
[   39.849735] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.855721] Read of size 1 at addr ffff000800d64fd8 by task kunit_try_catch/304
[   39.863011] 
[   39.864500] CPU: 7 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   39.864558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.864579] Hardware name: WinLink E850-96 board (DT)
[   39.864606] Call trace:
[   39.864624]  show_stack+0x20/0x38 (C)
[   39.864664]  dump_stack_lvl+0x8c/0xd0
[   39.864703]  print_report+0x118/0x608
[   39.864744]  kasan_report+0xdc/0x128
[   39.864781]  __asan_report_load1_noabort+0x20/0x30
[   39.864824]  memcmp+0x198/0x1d8
[   39.864855]  kasan_memcmp+0x16c/0x300
[   39.864887]  kunit_try_run_case+0x170/0x3f0
[   39.864926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.864970]  kthread+0x328/0x630
[   39.865001]  ret_from_fork+0x10/0x20
[   39.865039] 
[   39.929939] Allocated by task 304:
[   39.933326]  kasan_save_stack+0x3c/0x68
[   39.937142]  kasan_save_track+0x20/0x40
[   39.940961]  kasan_save_alloc_info+0x40/0x58
[   39.945215]  __kasan_kmalloc+0xd4/0xd8
[   39.948949]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.953461]  kasan_memcmp+0xbc/0x300
[   39.957020]  kunit_try_run_case+0x170/0x3f0
[   39.961187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.966656]  kthread+0x328/0x630
[   39.969867]  ret_from_fork+0x10/0x20
[   39.973426] 
[   39.974905] The buggy address belongs to the object at ffff000800d64fc0
[   39.974905]  which belongs to the cache kmalloc-32 of size 32
[   39.987231] The buggy address is located 0 bytes to the right of
[   39.987231]  allocated 24-byte region [ffff000800d64fc0, ffff000800d64fd8)
[   40.000075] 
[   40.001555] The buggy address belongs to the physical page:
[   40.007112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d64
[   40.015095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.021606] page_type: f5(slab)
[   40.024743] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.032460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.040181] page dumped because: kasan: bad access detected
[   40.045734] 
[   40.047210] Memory state around the buggy address:
[   40.051993]  ffff000800d64e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.059193]  ffff000800d64f00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.066398] >ffff000800d64f80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.073598]                                                     ^
[   40.079680]  ffff000800d65000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   40.086883]  ffff000800d65080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   40.094087] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   39.606911] ==================================================================
[   39.616490] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   39.624040] Read of size 1 at addr ffff800089547b4a by task kunit_try_catch/300
[   39.631331] 
[   39.632817] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   39.632884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.632900] Hardware name: WinLink E850-96 board (DT)
[   39.632923] Call trace:
[   39.632939]  show_stack+0x20/0x38 (C)
[   39.632978]  dump_stack_lvl+0x8c/0xd0
[   39.633016]  print_report+0x310/0x608
[   39.633052]  kasan_report+0xdc/0x128
[   39.633089]  __asan_report_load1_noabort+0x20/0x30
[   39.633130]  kasan_alloca_oob_right+0x2dc/0x340
[   39.633163]  kunit_try_run_case+0x170/0x3f0
[   39.633204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.633245]  kthread+0x328/0x630
[   39.633275]  ret_from_fork+0x10/0x20
[   39.633312] 
[   39.696003] The buggy address belongs to stack of task kunit_try_catch/300
[   39.702878] 
[   39.704338] The buggy address belongs to the virtual mapping at
[   39.704338]  [ffff800089540000, ffff800089549000) created by:
[   39.704338]  kernel_clone+0x150/0x7a8
[   39.719611] 
[   39.721089] The buggy address belongs to the physical page:
[   39.726647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886496
[   39.734630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.741151] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.748872] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.756591] page dumped because: kasan: bad access detected
[   39.762145] 
[   39.763620] Memory state around the buggy address:
[   39.768404]  ffff800089547a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.775604]  ffff800089547a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.782808] >ffff800089547b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   39.790009]                                               ^
[   39.795569]  ffff800089547b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.802773]  ffff800089547c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.809977] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   39.394852] ==================================================================
[   39.404080] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.411544] Read of size 1 at addr ffff800089527b5f by task kunit_try_catch/298
[   39.418836] 
[   39.420321] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   39.420378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.420397] Hardware name: WinLink E850-96 board (DT)
[   39.420421] Call trace:
[   39.420438]  show_stack+0x20/0x38 (C)
[   39.420477]  dump_stack_lvl+0x8c/0xd0
[   39.420514]  print_report+0x310/0x608
[   39.420551]  kasan_report+0xdc/0x128
[   39.420587]  __asan_report_load1_noabort+0x20/0x30
[   39.420628]  kasan_alloca_oob_left+0x2b8/0x310
[   39.420659]  kunit_try_run_case+0x170/0x3f0
[   39.420697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.420733]  kthread+0x328/0x630
[   39.420764]  ret_from_fork+0x10/0x20
[   39.420798] 
[   39.483420] The buggy address belongs to stack of task kunit_try_catch/298
[   39.490296] 
[   39.491757] The buggy address belongs to the virtual mapping at
[   39.491757]  [ffff800089520000, ffff800089529000) created by:
[   39.491757]  kernel_clone+0x150/0x7a8
[   39.507027] 
[   39.508507] The buggy address belongs to the physical page:
[   39.514063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886482
[   39.522046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.528567] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.536287] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.544007] page dumped because: kasan: bad access detected
[   39.549561] 
[   39.551037] Memory state around the buggy address:
[   39.555817]  ffff800089527a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.563020]  ffff800089527a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.570226] >ffff800089527b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.577425]                                                     ^
[   39.583505]  ffff800089527b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.590710]  ffff800089527c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.597913] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   39.153172] ==================================================================
[   39.167539] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   39.174395] Read of size 1 at addr ffff800089507c2a by task kunit_try_catch/296
[   39.181685] 
[   39.183173] CPU: 2 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   39.183229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.183248] Hardware name: WinLink E850-96 board (DT)
[   39.183272] Call trace:
[   39.183288]  show_stack+0x20/0x38 (C)
[   39.183325]  dump_stack_lvl+0x8c/0xd0
[   39.183363]  print_report+0x310/0x608
[   39.183400]  kasan_report+0xdc/0x128
[   39.183436]  __asan_report_load1_noabort+0x20/0x30
[   39.183476]  kasan_stack_oob+0x238/0x270
[   39.183506]  kunit_try_run_case+0x170/0x3f0
[   39.183545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.183583]  kthread+0x328/0x630
[   39.183610]  ret_from_fork+0x10/0x20
[   39.183645] 
[   39.245751] The buggy address belongs to stack of task kunit_try_catch/296
[   39.252606]  and is located at offset 138 in frame:
[   39.257465]  kasan_stack_oob+0x0/0x270
[   39.261204] 
[   39.262673] This frame has 4 objects:
[   39.266323]  [48, 49) '__assertion'
[   39.266348]  [64, 72) 'array'
[   39.269794]  [96, 112) '__assertion'
[   39.272744]  [128, 138) 'stack_array'
[   39.276301] 
[   39.281428] The buggy address belongs to the virtual mapping at
[   39.281428]  [ffff800089500000, ffff800089509000) created by:
[   39.281428]  kernel_clone+0x150/0x7a8
[   39.296701] 
[   39.298181] The buggy address belongs to the physical page:
[   39.303736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646e
[   39.311721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.318243] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.325960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.333680] page dumped because: kasan: bad access detected
[   39.339235] 
[   39.340710] Memory state around the buggy address:
[   39.345492]  ffff800089507b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.352694]  ffff800089507b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   39.359899] >ffff800089507c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   39.367099]                                   ^
[   39.371616]  ffff800089507c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   39.378821]  ffff800089507d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.386023] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   38.934662] ==================================================================
[   38.945321] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   38.952870] Read of size 1 at addr ffff800087baf5cd by task kunit_try_catch/292
[   38.960161] 
[   38.961647] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   38.961702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.961721] Hardware name: WinLink E850-96 board (DT)
[   38.961745] Call trace:
[   38.961764]  show_stack+0x20/0x38 (C)
[   38.961802]  dump_stack_lvl+0x8c/0xd0
[   38.961841]  print_report+0x310/0x608
[   38.961880]  kasan_report+0xdc/0x128
[   38.961914]  __asan_report_load1_noabort+0x20/0x30
[   38.961954]  kasan_global_oob_right+0x230/0x270
[   38.961984]  kunit_try_run_case+0x170/0x3f0
[   38.962022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.962062]  kthread+0x328/0x630
[   38.962091]  ret_from_fork+0x10/0x20
[   38.962129] 
[   39.024831] The buggy address belongs to the variable:
[   39.029951]  global_array+0xd/0x40
[   39.033336] 
[   39.034826] The buggy address belongs to the virtual mapping at
[   39.034826]  [ffff800085d50000, ffff800087c61000) created by:
[   39.034826]  paging_init+0x66c/0x7d0
[   39.050003] 
[   39.051483] The buggy address belongs to the physical page:
[   39.057039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87baf
[   39.064936] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.072237] raw: 03fffe0000002000 fffffdffc01eebc8 fffffdffc01eebc8 0000000000000000
[   39.079957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.087677] page dumped because: kasan: bad access detected
[   39.093231] 
[   39.094707] Memory state around the buggy address:
[   39.099488]  ffff800087baf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.106690]  ffff800087baf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.113896] >ffff800087baf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   39.121096]                                               ^
[   39.126655]  ffff800087baf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   39.133859]  ffff800087baf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   39.141063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   38.369742] ==================================================================
[   38.380138] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.388122] Free of addr ffff000802ca6c01 by task kunit_try_catch/288
[   38.394544] 
[   38.396030] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   38.396086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.396103] Hardware name: WinLink E850-96 board (DT)
[   38.396126] Call trace:
[   38.396140]  show_stack+0x20/0x38 (C)
[   38.396176]  dump_stack_lvl+0x8c/0xd0
[   38.396215]  print_report+0x118/0x608
[   38.396250]  kasan_report_invalid_free+0xc0/0xe8
[   38.396286]  check_slab_allocation+0xfc/0x108
[   38.396322]  __kasan_mempool_poison_object+0x78/0x150
[   38.396359]  mempool_free+0x28c/0x328
[   38.396393]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.396428]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.396459]  kunit_try_run_case+0x170/0x3f0
[   38.396496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.396536]  kthread+0x328/0x630
[   38.396565]  ret_from_fork+0x10/0x20
[   38.396603] 
[   38.474579] Allocated by task 288:
[   38.477964]  kasan_save_stack+0x3c/0x68
[   38.481782]  kasan_save_track+0x20/0x40
[   38.485601]  kasan_save_alloc_info+0x40/0x58
[   38.489855]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.495150]  remove_element+0x130/0x1f8
[   38.498969]  mempool_alloc_preallocated+0x58/0xc0
[   38.503658]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   38.509212]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.514160]  kunit_try_run_case+0x170/0x3f0
[   38.518327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.523795]  kthread+0x328/0x630
[   38.527007]  ret_from_fork+0x10/0x20
[   38.530567] 
[   38.532043] The buggy address belongs to the object at ffff000802ca6c00
[   38.532043]  which belongs to the cache kmalloc-128 of size 128
[   38.544545] The buggy address is located 1 bytes inside of
[   38.544545]  128-byte region [ffff000802ca6c00, ffff000802ca6c80)
[   38.556086] 
[   38.557566] The buggy address belongs to the physical page:
[   38.563123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882ca6
[   38.571107] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.578744] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.585688] page_type: f5(slab)
[   38.588823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.596544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.604272] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.612082] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.619895] head: 0bfffe0000000001 fffffdffe00b2981 00000000ffffffff 00000000ffffffff
[   38.627707] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.635512] page dumped because: kasan: bad access detected
[   38.641068] 
[   38.642544] Memory state around the buggy address:
[   38.647325]  ffff000802ca6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.654526]  ffff000802ca6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.661731] >ffff000802ca6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.668932]                    ^
[   38.672148]  ffff000802ca6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.679352]  ffff000802ca6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.686555] ==================================================================
[   38.695692] ==================================================================
[   38.705740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.713723] Free of addr ffff000800e14001 by task kunit_try_catch/290
[   38.720146] 
[   38.721634] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   38.721691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.721707] Hardware name: WinLink E850-96 board (DT)
[   38.721730] Call trace:
[   38.721745]  show_stack+0x20/0x38 (C)
[   38.721782]  dump_stack_lvl+0x8c/0xd0
[   38.721821]  print_report+0x118/0x608
[   38.721860]  kasan_report_invalid_free+0xc0/0xe8
[   38.721897]  __kasan_mempool_poison_object+0xfc/0x150
[   38.721936]  mempool_free+0x28c/0x328
[   38.721967]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.722005]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   38.722042]  kunit_try_run_case+0x170/0x3f0
[   38.722080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.722120]  kthread+0x328/0x630
[   38.722147]  ret_from_fork+0x10/0x20
[   38.722185] 
[   38.796364] The buggy address belongs to the physical page:
[   38.801920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14
[   38.809905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.817543] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.824486] page_type: f8(unknown)
[   38.827884] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.835603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.843331] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.851140] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.858954] head: 0bfffe0000000002 fffffdffe0038501 00000000ffffffff 00000000ffffffff
[   38.866766] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.874571] page dumped because: kasan: bad access detected
[   38.880126] 
[   38.881602] Memory state around the buggy address:
[   38.886383]  ffff000800e13f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.893585]  ffff000800e13f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.900791] >ffff000800e14000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.907991]                    ^
[   38.911207]  ffff000800e14080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.918411]  ffff000800e14100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.925613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   36.822667] ==================================================================
[   36.831986] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   36.838666] Read of size 1 at addr ffff000806390000 by task kunit_try_catch/276
[   36.845956] 
[   36.847443] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   36.847495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.847513] Hardware name: WinLink E850-96 board (DT)
[   36.847538] Call trace:
[   36.847554]  show_stack+0x20/0x38 (C)
[   36.847589]  dump_stack_lvl+0x8c/0xd0
[   36.847627]  print_report+0x118/0x608
[   36.847663]  kasan_report+0xdc/0x128
[   36.847698]  __asan_report_load1_noabort+0x20/0x30
[   36.847737]  mempool_uaf_helper+0x314/0x340
[   36.847771]  mempool_kmalloc_large_uaf+0xc4/0x120
[   36.847806]  kunit_try_run_case+0x170/0x3f0
[   36.847843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.847882]  kthread+0x328/0x630
[   36.847911]  ret_from_fork+0x10/0x20
[   36.847945] 
[   36.914967] The buggy address belongs to the physical page:
[   36.920526] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886390
[   36.928510] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.936147] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.943090] page_type: f8(unknown)
[   36.946489] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.954208] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.961937] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.969745] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.977559] head: 0bfffe0000000002 fffffdffe018e401 00000000ffffffff 00000000ffffffff
[   36.985371] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.993175] page dumped because: kasan: bad access detected
[   36.998731] 
[   37.000207] Memory state around the buggy address:
[   37.004986]  ffff00080638ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.012190]  ffff00080638ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.019396] >ffff000806390000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.026595]                    ^
[   37.029810]  ffff000806390080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.037016]  ffff000806390100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.044216] ==================================================================
[   37.382222] ==================================================================
[   37.385970] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.392651] Read of size 1 at addr ffff0008051c0000 by task kunit_try_catch/280
[   37.399941] 
[   37.401429] CPU: 4 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   37.401483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.401502] Hardware name: WinLink E850-96 board (DT)
[   37.401527] Call trace:
[   37.401543]  show_stack+0x20/0x38 (C)
[   37.401579]  dump_stack_lvl+0x8c/0xd0
[   37.401618]  print_report+0x118/0x608
[   37.401656]  kasan_report+0xdc/0x128
[   37.401692]  __asan_report_load1_noabort+0x20/0x30
[   37.401735]  mempool_uaf_helper+0x314/0x340
[   37.401767]  mempool_page_alloc_uaf+0xc0/0x118
[   37.401801]  kunit_try_run_case+0x170/0x3f0
[   37.401841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.401879]  kthread+0x328/0x630
[   37.401911]  ret_from_fork+0x10/0x20
[   37.401949] 
[   37.468693] The buggy address belongs to the physical page:
[   37.474248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8851c0
[   37.482234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.488757] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.496474] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.504195] page dumped because: kasan: bad access detected
[   37.509748] 
[   37.511223] Memory state around the buggy address:
[   37.516008]  ffff0008051bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.523206]  ffff0008051bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.530413] >ffff0008051c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.537612]                    ^
[   37.540828]  ffff0008051c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.548033]  ffff0008051c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.555235] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   37.053742] ==================================================================
[   37.063145] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.070261] Read of size 1 at addr ffff000806060240 by task kunit_try_catch/278
[   37.077550] 
[   37.079037] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   37.079094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.079111] Hardware name: WinLink E850-96 board (DT)
[   37.079132] Call trace:
[   37.079149]  show_stack+0x20/0x38 (C)
[   37.079185]  dump_stack_lvl+0x8c/0xd0
[   37.079224]  print_report+0x118/0x608
[   37.079259]  kasan_report+0xdc/0x128
[   37.079294]  __asan_report_load1_noabort+0x20/0x30
[   37.079335]  mempool_uaf_helper+0x314/0x340
[   37.079366]  mempool_slab_uaf+0xc0/0x118
[   37.079399]  kunit_try_run_case+0x170/0x3f0
[   37.079436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.079472]  kthread+0x328/0x630
[   37.079500]  ret_from_fork+0x10/0x20
[   37.079536] 
[   37.145779] Allocated by task 278:
[   37.149165]  kasan_save_stack+0x3c/0x68
[   37.152983]  kasan_save_track+0x20/0x40
[   37.156803]  kasan_save_alloc_info+0x40/0x58
[   37.161055]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.166263]  remove_element+0x16c/0x1f8
[   37.170083]  mempool_alloc_preallocated+0x58/0xc0
[   37.174771]  mempool_uaf_helper+0xa4/0x340
[   37.178850]  mempool_slab_uaf+0xc0/0x118
[   37.182756]  kunit_try_run_case+0x170/0x3f0
[   37.186923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.192393]  kthread+0x328/0x630
[   37.195604]  ret_from_fork+0x10/0x20
[   37.199164] 
[   37.200639] Freed by task 278:
[   37.203676]  kasan_save_stack+0x3c/0x68
[   37.207495]  kasan_save_track+0x20/0x40
[   37.211316]  kasan_save_free_info+0x4c/0x78
[   37.215481]  __kasan_mempool_poison_object+0xc0/0x150
[   37.220516]  mempool_free+0x28c/0x328
[   37.224162]  mempool_uaf_helper+0x104/0x340
[   37.228328]  mempool_slab_uaf+0xc0/0x118
[   37.232235]  kunit_try_run_case+0x170/0x3f0
[   37.236401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.241870]  kthread+0x328/0x630
[   37.245083]  ret_from_fork+0x10/0x20
[   37.248641] 
[   37.250118] The buggy address belongs to the object at ffff000806060240
[   37.250118]  which belongs to the cache test_cache of size 123
[   37.262531] The buggy address is located 0 bytes inside of
[   37.262531]  freed 123-byte region [ffff000806060240, ffff0008060602bb)
[   37.274595] 
[   37.276075] The buggy address belongs to the physical page:
[   37.281630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886060
[   37.289615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.296124] page_type: f5(slab)
[   37.299262] raw: 0bfffe0000000000 ffff000800dba280 dead000000000122 0000000000000000
[   37.306980] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.314700] page dumped because: kasan: bad access detected
[   37.320254] 
[   37.321730] Memory state around the buggy address:
[   37.326513]  ffff000806060100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.333713]  ffff000806060180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.340917] >ffff000806060200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.348118]                                            ^
[   37.353417]  ffff000806060280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.360622]  ffff000806060300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.367824] ==================================================================
[   36.466273] ==================================================================
[   36.470704] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   36.477821] Read of size 1 at addr ffff000801da3800 by task kunit_try_catch/274
[   36.485112] 
[   36.486599] CPU: 2 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   36.486657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.486672] Hardware name: WinLink E850-96 board (DT)
[   36.486700] Call trace:
[   36.486716]  show_stack+0x20/0x38 (C)
[   36.486757]  dump_stack_lvl+0x8c/0xd0
[   36.486794]  print_report+0x118/0x608
[   36.486829]  kasan_report+0xdc/0x128
[   36.486864]  __asan_report_load1_noabort+0x20/0x30
[   36.486906]  mempool_uaf_helper+0x314/0x340
[   36.486940]  mempool_kmalloc_uaf+0xc4/0x120
[   36.486972]  kunit_try_run_case+0x170/0x3f0
[   36.487010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.487049]  kthread+0x328/0x630
[   36.487078]  ret_from_fork+0x10/0x20
[   36.487116] 
[   36.553601] Allocated by task 274:
[   36.556988]  kasan_save_stack+0x3c/0x68
[   36.560804]  kasan_save_track+0x20/0x40
[   36.564623]  kasan_save_alloc_info+0x40/0x58
[   36.568876]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.574171]  remove_element+0x130/0x1f8
[   36.577991]  mempool_alloc_preallocated+0x58/0xc0
[   36.582679]  mempool_uaf_helper+0xa4/0x340
[   36.586758]  mempool_kmalloc_uaf+0xc4/0x120
[   36.590926]  kunit_try_run_case+0x170/0x3f0
[   36.595092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.600560]  kthread+0x328/0x630
[   36.603772]  ret_from_fork+0x10/0x20
[   36.607331] 
[   36.608808] Freed by task 274:
[   36.611846]  kasan_save_stack+0x3c/0x68
[   36.615666]  kasan_save_track+0x20/0x40
[   36.619484]  kasan_save_free_info+0x4c/0x78
[   36.623650]  __kasan_mempool_poison_object+0xc0/0x150
[   36.628685]  mempool_free+0x28c/0x328
[   36.632330]  mempool_uaf_helper+0x104/0x340
[   36.636497]  mempool_kmalloc_uaf+0xc4/0x120
[   36.640664]  kunit_try_run_case+0x170/0x3f0
[   36.644832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.650299]  kthread+0x328/0x630
[   36.653511]  ret_from_fork+0x10/0x20
[   36.657070] 
[   36.658547] The buggy address belongs to the object at ffff000801da3800
[   36.658547]  which belongs to the cache kmalloc-128 of size 128
[   36.671048] The buggy address is located 0 bytes inside of
[   36.671048]  freed 128-byte region [ffff000801da3800, ffff000801da3880)
[   36.683111] 
[   36.684591] The buggy address belongs to the physical page:
[   36.690147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881da2
[   36.698130] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.705770] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.712713] page_type: f5(slab)
[   36.715851] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.723569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.731297] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.739107] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.746919] head: 0bfffe0000000001 fffffdffe0076881 00000000ffffffff 00000000ffffffff
[   36.754732] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.762537] page dumped because: kasan: bad access detected
[   36.768092] 
[   36.769568] Memory state around the buggy address:
[   36.774349]  ffff000801da3700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.781551]  ffff000801da3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.788757] >ffff000801da3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.795956]                    ^
[   36.799172]  ffff000801da3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.806377]  ffff000801da3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.813579] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   35.950272] ==================================================================
[   35.960126] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.967670] Read of size 1 at addr ffff000800e16001 by task kunit_try_catch/270
[   35.974962] 
[   35.976450] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   35.976503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.976519] Hardware name: WinLink E850-96 board (DT)
[   35.976540] Call trace:
[   35.976556]  show_stack+0x20/0x38 (C)
[   35.976594]  dump_stack_lvl+0x8c/0xd0
[   35.976635]  print_report+0x118/0x608
[   35.976672]  kasan_report+0xdc/0x128
[   35.976706]  __asan_report_load1_noabort+0x20/0x30
[   35.976747]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.976780]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   35.976814]  kunit_try_run_case+0x170/0x3f0
[   35.976853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.976892]  kthread+0x328/0x630
[   35.976923]  ret_from_fork+0x10/0x20
[   35.976961] 
[   36.045015] The buggy address belongs to the physical page:
[   36.050573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880e14
[   36.058558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.066196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.073139] page_type: f8(unknown)
[   36.076538] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.084256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.091983] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.099793] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.107607] head: 0bfffe0000000002 fffffdffe0038501 00000000ffffffff 00000000ffffffff
[   36.115418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.123223] page dumped because: kasan: bad access detected
[   36.128779] 
[   36.130255] Memory state around the buggy address:
[   36.135036]  ffff000800e15f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.142237]  ffff000800e15f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.149442] >ffff000800e16000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.156644]                    ^
[   36.159859]  ffff000800e16080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.167063]  ffff000800e16100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.174266] ==================================================================
[   35.649105] ==================================================================
[   35.649284] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.649421] Read of size 1 at addr ffff000801e28873 by task kunit_try_catch/268
[   35.655870] 
[   35.657357] CPU: 7 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   35.657421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.657437] Hardware name: WinLink E850-96 board (DT)
[   35.657458] Call trace:
[   35.657471]  show_stack+0x20/0x38 (C)
[   35.657508]  dump_stack_lvl+0x8c/0xd0
[   35.657547]  print_report+0x118/0x608
[   35.657581]  kasan_report+0xdc/0x128
[   35.657617]  __asan_report_load1_noabort+0x20/0x30
[   35.657659]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.657693]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.657724]  kunit_try_run_case+0x170/0x3f0
[   35.657764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.657800]  kthread+0x328/0x630
[   35.657831]  ret_from_fork+0x10/0x20
[   35.657867] 
[   35.725402] Allocated by task 268:
[   35.728788]  kasan_save_stack+0x3c/0x68
[   35.732605]  kasan_save_track+0x20/0x40
[   35.736424]  kasan_save_alloc_info+0x40/0x58
[   35.740677]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.745974]  remove_element+0x130/0x1f8
[   35.749792]  mempool_alloc_preallocated+0x58/0xc0
[   35.754479]  mempool_oob_right_helper+0x98/0x2f0
[   35.759080]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.763767]  kunit_try_run_case+0x170/0x3f0
[   35.767934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.773403]  kthread+0x328/0x630
[   35.776614]  ret_from_fork+0x10/0x20
[   35.780174] 
[   35.781650] The buggy address belongs to the object at ffff000801e28800
[   35.781650]  which belongs to the cache kmalloc-128 of size 128
[   35.794151] The buggy address is located 0 bytes to the right of
[   35.794151]  allocated 115-byte region [ffff000801e28800, ffff000801e28873)
[   35.807082] 
[   35.808562] The buggy address belongs to the physical page:
[   35.814119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   35.822102] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.829742] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.836684] page_type: f5(slab)
[   35.839822] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.847541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.855268] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.863079] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.870892] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   35.878703] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.886510] page dumped because: kasan: bad access detected
[   35.892064] 
[   35.893539] Memory state around the buggy address:
[   35.898322]  ffff000801e28700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.905522]  ffff000801e28780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.912729] >ffff000801e28800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.919928]                                                              ^
[   35.926789]  ffff000801e28880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.933994]  ffff000801e28900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.941197] ==================================================================
[   36.183778] ==================================================================
[   36.193713] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.201263] Read of size 1 at addr ffff00080631c2bb by task kunit_try_catch/272
[   36.208554] 
[   36.210040] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   36.210100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.210116] Hardware name: WinLink E850-96 board (DT)
[   36.210140] Call trace:
[   36.210157]  show_stack+0x20/0x38 (C)
[   36.210197]  dump_stack_lvl+0x8c/0xd0
[   36.210234]  print_report+0x118/0x608
[   36.210270]  kasan_report+0xdc/0x128
[   36.210303]  __asan_report_load1_noabort+0x20/0x30
[   36.210343]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.210377]  mempool_slab_oob_right+0xc0/0x118
[   36.210413]  kunit_try_run_case+0x170/0x3f0
[   36.210450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.210488]  kthread+0x328/0x630
[   36.210517]  ret_from_fork+0x10/0x20
[   36.210553] 
[   36.277824] Allocated by task 272:
[   36.281211]  kasan_save_stack+0x3c/0x68
[   36.285027]  kasan_save_track+0x20/0x40
[   36.288847]  kasan_save_alloc_info+0x40/0x58
[   36.293099]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.298308]  remove_element+0x16c/0x1f8
[   36.302127]  mempool_alloc_preallocated+0x58/0xc0
[   36.306815]  mempool_oob_right_helper+0x98/0x2f0
[   36.311415]  mempool_slab_oob_right+0xc0/0x118
[   36.315842]  kunit_try_run_case+0x170/0x3f0
[   36.320009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.325479]  kthread+0x328/0x630
[   36.328689]  ret_from_fork+0x10/0x20
[   36.332248] 
[   36.333725] The buggy address belongs to the object at ffff00080631c240
[   36.333725]  which belongs to the cache test_cache of size 123
[   36.346139] The buggy address is located 0 bytes to the right of
[   36.346139]  allocated 123-byte region [ffff00080631c240, ffff00080631c2bb)
[   36.359071] 
[   36.360550] The buggy address belongs to the physical page:
[   36.366107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88631c
[   36.374091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.380600] page_type: f5(slab)
[   36.383736] raw: 0bfffe0000000000 ffff00080179fcc0 dead000000000122 0000000000000000
[   36.391456] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.399176] page dumped because: kasan: bad access detected
[   36.404729] 
[   36.406205] Memory state around the buggy address:
[   36.410986]  ffff00080631c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.418190]  ffff00080631c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.425394] >ffff00080631c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.432594]                                         ^
[   36.437633]  ffff00080631c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.444837]  ffff00080631c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.452040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   34.762685] ==================================================================
[   34.762871] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   34.763007] Read of size 1 at addr ffff000800dba140 by task kunit_try_catch/262
[   34.766568] 
[   34.768054] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   34.768116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.768133] Hardware name: WinLink E850-96 board (DT)
[   34.768153] Call trace:
[   34.768167]  show_stack+0x20/0x38 (C)
[   34.768204]  dump_stack_lvl+0x8c/0xd0
[   34.768240]  print_report+0x118/0x608
[   34.768276]  kasan_report+0xdc/0x128
[   34.768311]  __kasan_check_byte+0x54/0x70
[   34.768344]  kmem_cache_destroy+0x34/0x218
[   34.768377]  kmem_cache_double_destroy+0x174/0x300
[   34.768412]  kunit_try_run_case+0x170/0x3f0
[   34.768451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.768488]  kthread+0x328/0x630
[   34.768521]  ret_from_fork+0x10/0x20
[   34.768559] 
[   34.834794] Allocated by task 262:
[   34.838183]  kasan_save_stack+0x3c/0x68
[   34.841999]  kasan_save_track+0x20/0x40
[   34.845818]  kasan_save_alloc_info+0x40/0x58
[   34.850072]  __kasan_slab_alloc+0xa8/0xb0
[   34.854065]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.858666]  __kmem_cache_create_args+0x178/0x280
[   34.863352]  kmem_cache_double_destroy+0xc0/0x300
[   34.868040]  kunit_try_run_case+0x170/0x3f0
[   34.872208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.877675]  kthread+0x328/0x630
[   34.880887]  ret_from_fork+0x10/0x20
[   34.884446] 
[   34.885923] Freed by task 262:
[   34.888963]  kasan_save_stack+0x3c/0x68
[   34.892779]  kasan_save_track+0x20/0x40
[   34.896599]  kasan_save_free_info+0x4c/0x78
[   34.900765]  __kasan_slab_free+0x6c/0x98
[   34.904671]  kmem_cache_free+0x260/0x468
[   34.908577]  slab_kmem_cache_release+0x38/0x50
[   34.913006]  kmem_cache_release+0x1c/0x30
[   34.916998]  kobject_put+0x17c/0x420
[   34.920558]  sysfs_slab_release+0x1c/0x30
[   34.924549]  kmem_cache_destroy+0x118/0x218
[   34.928716]  kmem_cache_double_destroy+0x128/0x300
[   34.933490]  kunit_try_run_case+0x170/0x3f0
[   34.937657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.943127]  kthread+0x328/0x630
[   34.946339]  ret_from_fork+0x10/0x20
[   34.949896] 
[   34.951374] The buggy address belongs to the object at ffff000800dba140
[   34.951374]  which belongs to the cache kmem_cache of size 208
[   34.963787] The buggy address is located 0 bytes inside of
[   34.963787]  freed 208-byte region [ffff000800dba140, ffff000800dba210)
[   34.975851] 
[   34.977331] The buggy address belongs to the physical page:
[   34.982887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dba
[   34.990870] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.998510] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.005453] page_type: f5(slab)
[   35.008591] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.016309] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.024037] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.031847] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.039660] head: 0bfffe0000000001 fffffdffe0036e81 00000000ffffffff 00000000ffffffff
[   35.047472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.055277] page dumped because: kasan: bad access detected
[   35.060832] 
[   35.062308] Memory state around the buggy address:
[   35.067088]  ffff000800dba000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.074291]  ffff000800dba080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   35.081496] >ffff000800dba100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.088696]                                            ^
[   35.093995]  ffff000800dba180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.101201]  ffff000800dba200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.108404] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   34.351644] ==================================================================
[   34.351833] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   34.351966] Read of size 1 at addr ffff000802cca000 by task kunit_try_catch/260
[   34.355351] 
[   34.356838] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   34.356896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.356913] Hardware name: WinLink E850-96 board (DT)
[   34.356936] Call trace:
[   34.356951]  show_stack+0x20/0x38 (C)
[   34.356989]  dump_stack_lvl+0x8c/0xd0
[   34.357026]  print_report+0x118/0x608
[   34.357061]  kasan_report+0xdc/0x128
[   34.357096]  __asan_report_load1_noabort+0x20/0x30
[   34.357135]  kmem_cache_rcu_uaf+0x388/0x468
[   34.357169]  kunit_try_run_case+0x170/0x3f0
[   34.357209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.357249]  kthread+0x328/0x630
[   34.357278]  ret_from_fork+0x10/0x20
[   34.357315] 
[   34.419675] Allocated by task 260:
[   34.423062]  kasan_save_stack+0x3c/0x68
[   34.426878]  kasan_save_track+0x20/0x40
[   34.430697]  kasan_save_alloc_info+0x40/0x58
[   34.434950]  __kasan_slab_alloc+0xa8/0xb0
[   34.438943]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.443544]  kmem_cache_rcu_uaf+0x12c/0x468
[   34.447710]  kunit_try_run_case+0x170/0x3f0
[   34.451877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457346]  kthread+0x328/0x630
[   34.460558]  ret_from_fork+0x10/0x20
[   34.464118] 
[   34.465594] Freed by task 0:
[   34.468460]  kasan_save_stack+0x3c/0x68
[   34.472276]  kasan_save_track+0x20/0x40
[   34.476096]  kasan_save_free_info+0x4c/0x78
[   34.480262]  __kasan_slab_free+0x6c/0x98
[   34.484170]  slab_free_after_rcu_debug+0xd4/0x2f8
[   34.488856]  rcu_core+0x9f4/0x1e20
[   34.492241]  rcu_core_si+0x18/0x30
[   34.495627]  handle_softirqs+0x374/0xb28
[   34.499533]  __do_softirq+0x1c/0x28
[   34.503005] 
[   34.504482] Last potentially related work creation:
[   34.509343]  kasan_save_stack+0x3c/0x68
[   34.513161]  kasan_record_aux_stack+0xb4/0xc8
[   34.517501]  kmem_cache_free+0x120/0x468
[   34.521407]  kmem_cache_rcu_uaf+0x16c/0x468
[   34.525574]  kunit_try_run_case+0x170/0x3f0
[   34.529740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.535209]  kthread+0x328/0x630
[   34.538421]  ret_from_fork+0x10/0x20
[   34.541980] 
[   34.543455] The buggy address belongs to the object at ffff000802cca000
[   34.543455]  which belongs to the cache test_cache of size 200
[   34.555872] The buggy address is located 0 bytes inside of
[   34.555872]  freed 200-byte region [ffff000802cca000, ffff000802cca0c8)
[   34.567934] 
[   34.569414] The buggy address belongs to the physical page:
[   34.574970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882cca
[   34.582954] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.590593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.597538] page_type: f5(slab)
[   34.600675] raw: 0bfffe0000000040 ffff00080179fa40 dead000000000122 0000000000000000
[   34.608392] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.616120] head: 0bfffe0000000040 ffff00080179fa40 dead000000000122 0000000000000000
[   34.623930] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.631743] head: 0bfffe0000000001 fffffdffe00b3281 00000000ffffffff 00000000ffffffff
[   34.639555] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.647360] page dumped because: kasan: bad access detected
[   34.652915] 
[   34.654391] Memory state around the buggy address:
[   34.659173]  ffff000802cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.666374]  ffff000802cc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673580] >ffff000802cca000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.680780]                    ^
[   34.683995]  ffff000802cca080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.691200]  ffff000802cca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.698402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.954495] ==================================================================
[   33.958010] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   33.964949] Free of addr ffff0008048e0001 by task kunit_try_catch/258
[   33.971374] 
[   33.972860] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   33.972921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.972938] Hardware name: WinLink E850-96 board (DT)
[   33.972962] Call trace:
[   33.972977]  show_stack+0x20/0x38 (C)
[   33.973014]  dump_stack_lvl+0x8c/0xd0
[   33.973052]  print_report+0x118/0x608
[   33.973087]  kasan_report_invalid_free+0xc0/0xe8
[   33.973125]  check_slab_allocation+0xfc/0x108
[   33.973161]  __kasan_slab_pre_free+0x2c/0x48
[   33.973194]  kmem_cache_free+0xf0/0x468
[   33.973228]  kmem_cache_invalid_free+0x184/0x3c8
[   33.973260]  kunit_try_run_case+0x170/0x3f0
[   33.973298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.973336]  kthread+0x328/0x630
[   33.973364]  ret_from_fork+0x10/0x20
[   33.973404] 
[   34.044808] Allocated by task 258:
[   34.048195]  kasan_save_stack+0x3c/0x68
[   34.052012]  kasan_save_track+0x20/0x40
[   34.055833]  kasan_save_alloc_info+0x40/0x58
[   34.060084]  __kasan_slab_alloc+0xa8/0xb0
[   34.064077]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.068678]  kmem_cache_invalid_free+0x12c/0x3c8
[   34.073279]  kunit_try_run_case+0x170/0x3f0
[   34.077445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.082914]  kthread+0x328/0x630
[   34.086126]  ret_from_fork+0x10/0x20
[   34.089685] 
[   34.091163] The buggy address belongs to the object at ffff0008048e0000
[   34.091163]  which belongs to the cache test_cache of size 200
[   34.103577] The buggy address is located 1 bytes inside of
[   34.103577]  200-byte region [ffff0008048e0000, ffff0008048e00c8)
[   34.115118] 
[   34.116598] The buggy address belongs to the physical page:
[   34.122154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848e0
[   34.130137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.137777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.144721] page_type: f5(slab)
[   34.147859] raw: 0bfffe0000000040 ffff000801d92a00 dead000000000122 0000000000000000
[   34.155576] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.163304] head: 0bfffe0000000040 ffff000801d92a00 dead000000000122 0000000000000000
[   34.171114] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.178927] head: 0bfffe0000000001 fffffdffe0123801 00000000ffffffff 00000000ffffffff
[   34.186739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.194544] page dumped because: kasan: bad access detected
[   34.200100] 
[   34.201575] Memory state around the buggy address:
[   34.206358]  ffff0008048dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.213558]  ffff0008048dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.220763] >ffff0008048e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.227964]                    ^
[   34.231180]  ffff0008048e0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.238384]  ffff0008048e0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.245587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.618540] ==================================================================
[   33.618722] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.618848] Free of addr ffff000800dbc000 by task kunit_try_catch/256
[   33.620249] 
[   33.621736] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   33.621791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.621808] Hardware name: WinLink E850-96 board (DT)
[   33.621832] Call trace:
[   33.621846]  show_stack+0x20/0x38 (C)
[   33.621885]  dump_stack_lvl+0x8c/0xd0
[   33.621922]  print_report+0x118/0x608
[   33.621957]  kasan_report_invalid_free+0xc0/0xe8
[   33.621994]  check_slab_allocation+0xd4/0x108
[   33.622027]  __kasan_slab_pre_free+0x2c/0x48
[   33.622061]  kmem_cache_free+0xf0/0x468
[   33.622094]  kmem_cache_double_free+0x190/0x3c8
[   33.622128]  kunit_try_run_case+0x170/0x3f0
[   33.622167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.622203]  kthread+0x328/0x630
[   33.622232]  ret_from_fork+0x10/0x20
[   33.622271] 
[   33.693600] Allocated by task 256:
[   33.696986]  kasan_save_stack+0x3c/0x68
[   33.700802]  kasan_save_track+0x20/0x40
[   33.704621]  kasan_save_alloc_info+0x40/0x58
[   33.708875]  __kasan_slab_alloc+0xa8/0xb0
[   33.712869]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.717468]  kmem_cache_double_free+0x12c/0x3c8
[   33.721982]  kunit_try_run_case+0x170/0x3f0
[   33.726149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.731617]  kthread+0x328/0x630
[   33.734829]  ret_from_fork+0x10/0x20
[   33.738388] 
[   33.739865] Freed by task 256:
[   33.742903]  kasan_save_stack+0x3c/0x68
[   33.746721]  kasan_save_track+0x20/0x40
[   33.750540]  kasan_save_free_info+0x4c/0x78
[   33.754707]  __kasan_slab_free+0x6c/0x98
[   33.758614]  kmem_cache_free+0x260/0x468
[   33.762520]  kmem_cache_double_free+0x140/0x3c8
[   33.767035]  kunit_try_run_case+0x170/0x3f0
[   33.771200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.776669]  kthread+0x328/0x630
[   33.779880]  ret_from_fork+0x10/0x20
[   33.783439] 
[   33.784916] The buggy address belongs to the object at ffff000800dbc000
[   33.784916]  which belongs to the cache test_cache of size 200
[   33.797331] The buggy address is located 0 bytes inside of
[   33.797331]  200-byte region [ffff000800dbc000, ffff000800dbc0c8)
[   33.808873] 
[   33.810353] The buggy address belongs to the physical page:
[   33.815909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dbc
[   33.823892] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.831533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.838475] page_type: f5(slab)
[   33.841613] raw: 0bfffe0000000040 ffff000800dba000 dead000000000122 0000000000000000
[   33.849331] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.857060] head: 0bfffe0000000040 ffff000800dba000 dead000000000122 0000000000000000
[   33.864868] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.872682] head: 0bfffe0000000001 fffffdffe0036f01 00000000ffffffff 00000000ffffffff
[   33.880494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.888301] page dumped because: kasan: bad access detected
[   33.893854] 
[   33.895329] Memory state around the buggy address:
[   33.900109]  ffff000800dbbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.907313]  ffff000800dbbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.914517] >ffff000800dbc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.921719]                    ^
[   33.924934]  ffff000800dbc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.932139]  ffff000800dbc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.939341] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   33.282229] ==================================================================
[   33.291710] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.298389] Read of size 1 at addr ffff000802cca0c8 by task kunit_try_catch/254
[   33.305681] 
[   33.307167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   33.307223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.307241] Hardware name: WinLink E850-96 board (DT)
[   33.307265] Call trace:
[   33.307280]  show_stack+0x20/0x38 (C)
[   33.307316]  dump_stack_lvl+0x8c/0xd0
[   33.307355]  print_report+0x118/0x608
[   33.307390]  kasan_report+0xdc/0x128
[   33.307426]  __asan_report_load1_noabort+0x20/0x30
[   33.307462]  kmem_cache_oob+0x344/0x430
[   33.307495]  kunit_try_run_case+0x170/0x3f0
[   33.307534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.307573]  kthread+0x328/0x630
[   33.307602]  ret_from_fork+0x10/0x20
[   33.307638] 
[   33.369657] Allocated by task 254:
[   33.373044]  kasan_save_stack+0x3c/0x68
[   33.376859]  kasan_save_track+0x20/0x40
[   33.380680]  kasan_save_alloc_info+0x40/0x58
[   33.384932]  __kasan_slab_alloc+0xa8/0xb0
[   33.388926]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.393526]  kmem_cache_oob+0x12c/0x430
[   33.397345]  kunit_try_run_case+0x170/0x3f0
[   33.401512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.406981]  kthread+0x328/0x630
[   33.410193]  ret_from_fork+0x10/0x20
[   33.413753] 
[   33.415229] The buggy address belongs to the object at ffff000802cca000
[   33.415229]  which belongs to the cache test_cache of size 200
[   33.427642] The buggy address is located 0 bytes to the right of
[   33.427642]  allocated 200-byte region [ffff000802cca000, ffff000802cca0c8)
[   33.440574] 
[   33.442054] The buggy address belongs to the physical page:
[   33.447609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882cca
[   33.455594] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.463233] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.470176] page_type: f5(slab)
[   33.473314] raw: 0bfffe0000000040 ffff00080179f900 dead000000000122 0000000000000000
[   33.481032] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.488761] head: 0bfffe0000000040 ffff00080179f900 dead000000000122 0000000000000000
[   33.496569] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.504383] head: 0bfffe0000000001 fffffdffe00b3281 00000000ffffffff 00000000ffffffff
[   33.512195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.520001] page dumped because: kasan: bad access detected
[   33.525555] 
[   33.527031] Memory state around the buggy address:
[   33.531813]  ffff000802cc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.539014]  ffff000802cca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.546218] >ffff000802cca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.553420]                                               ^
[   33.558979]  ffff000802cca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.566184]  ffff000802cca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.573386] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.937319] ==================================================================
[   32.944668] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   32.951351] Read of size 8 at addr ffff000800d64980 by task kunit_try_catch/247
[   32.958637] 
[   32.960125] CPU: 7 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   32.960187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.960204] Hardware name: WinLink E850-96 board (DT)
[   32.960226] Call trace:
[   32.960240]  show_stack+0x20/0x38 (C)
[   32.960276]  dump_stack_lvl+0x8c/0xd0
[   32.960314]  print_report+0x118/0x608
[   32.960351]  kasan_report+0xdc/0x128
[   32.960388]  __asan_report_load8_noabort+0x20/0x30
[   32.960429]  workqueue_uaf+0x480/0x4a8
[   32.960461]  kunit_try_run_case+0x170/0x3f0
[   32.960496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.960535]  kthread+0x328/0x630
[   32.960564]  ret_from_fork+0x10/0x20
[   32.960602] 
[   33.022528] Allocated by task 247:
[   33.025914]  kasan_save_stack+0x3c/0x68
[   33.029730]  kasan_save_track+0x20/0x40
[   33.033550]  kasan_save_alloc_info+0x40/0x58
[   33.037802]  __kasan_kmalloc+0xd4/0xd8
[   33.041535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.046049]  workqueue_uaf+0x13c/0x4a8
[   33.049781]  kunit_try_run_case+0x170/0x3f0
[   33.053948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.059418]  kthread+0x328/0x630
[   33.062628]  ret_from_fork+0x10/0x20
[   33.066187] 
[   33.067664] Freed by task 83:
[   33.070617]  kasan_save_stack+0x3c/0x68
[   33.074434]  kasan_save_track+0x20/0x40
[   33.078253]  kasan_save_free_info+0x4c/0x78
[   33.082419]  __kasan_slab_free+0x6c/0x98
[   33.086327]  kfree+0x214/0x3c8
[   33.089365]  workqueue_uaf_work+0x18/0x30
[   33.093357]  process_one_work+0x530/0xf98
[   33.097350]  worker_thread+0x618/0xf38
[   33.101082]  kthread+0x328/0x630
[   33.104296]  ret_from_fork+0x10/0x20
[   33.107853] 
[   33.109330] Last potentially related work creation:
[   33.114190]  kasan_save_stack+0x3c/0x68
[   33.118011]  kasan_record_aux_stack+0xb4/0xc8
[   33.122351]  __queue_work+0x65c/0x1008
[   33.126082]  queue_work_on+0xbc/0xf8
[   33.129641]  workqueue_uaf+0x210/0x4a8
[   33.133374]  kunit_try_run_case+0x170/0x3f0
[   33.137540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.143009]  kthread+0x328/0x630
[   33.146222]  ret_from_fork+0x10/0x20
[   33.149780] 
[   33.151257] The buggy address belongs to the object at ffff000800d64980
[   33.151257]  which belongs to the cache kmalloc-32 of size 32
[   33.163585] The buggy address is located 0 bytes inside of
[   33.163585]  freed 32-byte region [ffff000800d64980, ffff000800d649a0)
[   33.175560] 
[   33.177040] The buggy address belongs to the physical page:
[   33.182596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d64
[   33.190581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.197090] page_type: f5(slab)
[   33.200230] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   33.207947] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.215666] page dumped because: kasan: bad access detected
[   33.221220] 
[   33.222696] Memory state around the buggy address:
[   33.227475]  ffff000800d64880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.234680]  ffff000800d64900: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   33.241883] >ffff000800d64980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.249084]                    ^
[   33.252299]  ffff000800d64a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.259504]  ffff000800d64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.266708] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.571518] ==================================================================
[   32.571693] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.571818] Read of size 4 at addr ffff000800c30c00 by task swapper/5/0
[   32.572879] 
[   32.574369] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   32.574425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.574441] Hardware name: WinLink E850-96 board (DT)
[   32.574464] Call trace:
[   32.574479]  show_stack+0x20/0x38 (C)
[   32.574515]  dump_stack_lvl+0x8c/0xd0
[   32.574553]  print_report+0x118/0x608
[   32.574589]  kasan_report+0xdc/0x128
[   32.574625]  __asan_report_load4_noabort+0x20/0x30
[   32.574662]  rcu_uaf_reclaim+0x64/0x70
[   32.574691]  rcu_core+0x9f4/0x1e20
[   32.574724]  rcu_core_si+0x18/0x30
[   32.574754]  handle_softirqs+0x374/0xb28
[   32.574789]  __do_softirq+0x1c/0x28
[   32.574821]  ____do_softirq+0x18/0x30
[   32.574857]  call_on_irq_stack+0x24/0x30
[   32.574886]  do_softirq_own_stack+0x24/0x38
[   32.574916]  __irq_exit_rcu+0x1fc/0x318
[   32.574946]  irq_exit_rcu+0x1c/0x80
[   32.574975]  el1_interrupt+0x38/0x58
[   32.575013]  el1h_64_irq_handler+0x18/0x28
[   32.575041]  el1h_64_irq+0x6c/0x70
[   32.575068]  arch_local_irq_enable+0x4/0x8 (P)
[   32.575103]  do_idle+0x384/0x4e8
[   32.575134]  cpu_startup_entry+0x64/0x80
[   32.575167]  secondary_start_kernel+0x288/0x340
[   32.575200]  __secondary_switched+0xc0/0xc8
[   32.575243] 
[   32.684076] Allocated by task 245:
[   32.687463]  kasan_save_stack+0x3c/0x68
[   32.691281]  kasan_save_track+0x20/0x40
[   32.695100]  kasan_save_alloc_info+0x40/0x58
[   32.699352]  __kasan_kmalloc+0xd4/0xd8
[   32.703085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.707599]  rcu_uaf+0xb0/0x2d8
[   32.710724]  kunit_try_run_case+0x170/0x3f0
[   32.714890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.720359]  kthread+0x328/0x630
[   32.723571]  ret_from_fork+0x10/0x20
[   32.727130] 
[   32.728605] Freed by task 0:
[   32.731472]  kasan_save_stack+0x3c/0x68
[   32.735289]  kasan_save_track+0x20/0x40
[   32.739109]  kasan_save_free_info+0x4c/0x78
[   32.743275]  __kasan_slab_free+0x6c/0x98
[   32.747181]  kfree+0x214/0x3c8
[   32.750220]  rcu_uaf_reclaim+0x28/0x70
[   32.753954]  rcu_core+0x9f4/0x1e20
[   32.757338]  rcu_core_si+0x18/0x30
[   32.760725]  handle_softirqs+0x374/0xb28
[   32.764630]  __do_softirq+0x1c/0x28
[   32.768102] 
[   32.769579] Last potentially related work creation:
[   32.774440]  kasan_save_stack+0x3c/0x68
[   32.778257]  kasan_record_aux_stack+0xb4/0xc8
[   32.782598]  __call_rcu_common.constprop.0+0x70/0x8b0
[   32.787632]  call_rcu+0x18/0x30
[   32.790759]  rcu_uaf+0x14c/0x2d8
[   32.793969]  kunit_try_run_case+0x170/0x3f0
[   32.798136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.803604]  kthread+0x328/0x630
[   32.806816]  ret_from_fork+0x10/0x20
[   32.810375] 
[   32.811852] The buggy address belongs to the object at ffff000800c30c00
[   32.811852]  which belongs to the cache kmalloc-32 of size 32
[   32.824180] The buggy address is located 0 bytes inside of
[   32.824180]  freed 32-byte region [ffff000800c30c00, ffff000800c30c20)
[   32.836156] 
[   32.837635] The buggy address belongs to the physical page:
[   32.843191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c30
[   32.851177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.857685] page_type: f5(slab)
[   32.860823] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   32.868541] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.876261] page dumped because: kasan: bad access detected
[   32.881815] 
[   32.883290] Memory state around the buggy address:
[   32.888071]  ffff000800c30b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.895274]  ffff000800c30b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.902480] >ffff000800c30c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.909679]                    ^
[   32.912895]  ffff000800c30c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.920100]  ffff000800c30d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.927302] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   31.517821] ==================================================================
[   31.527671] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.534007] Read of size 1 at addr ffff000801e28500 by task kunit_try_catch/243
[   31.541295] 
[   31.542782] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   31.542840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.542857] Hardware name: WinLink E850-96 board (DT)
[   31.542877] Call trace:
[   31.542894]  show_stack+0x20/0x38 (C)
[   31.542930]  dump_stack_lvl+0x8c/0xd0
[   31.542965]  print_report+0x118/0x608
[   31.543003]  kasan_report+0xdc/0x128
[   31.543035]  __kasan_check_byte+0x54/0x70
[   31.543069]  ksize+0x30/0x88
[   31.543101]  ksize_uaf+0x168/0x5f8
[   31.543132]  kunit_try_run_case+0x170/0x3f0
[   31.543169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.543208]  kthread+0x328/0x630
[   31.543236]  ret_from_fork+0x10/0x20
[   31.543273] 
[   31.606919] Allocated by task 243:
[   31.610308]  kasan_save_stack+0x3c/0x68
[   31.614125]  kasan_save_track+0x20/0x40
[   31.617945]  kasan_save_alloc_info+0x40/0x58
[   31.622197]  __kasan_kmalloc+0xd4/0xd8
[   31.625929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.630443]  ksize_uaf+0xb8/0x5f8
[   31.633743]  kunit_try_run_case+0x170/0x3f0
[   31.637910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.643377]  kthread+0x328/0x630
[   31.646589]  ret_from_fork+0x10/0x20
[   31.650149] 
[   31.651623] Freed by task 243:
[   31.654663]  kasan_save_stack+0x3c/0x68
[   31.658481]  kasan_save_track+0x20/0x40
[   31.662300]  kasan_save_free_info+0x4c/0x78
[   31.666467]  __kasan_slab_free+0x6c/0x98
[   31.670373]  kfree+0x214/0x3c8
[   31.673411]  ksize_uaf+0x11c/0x5f8
[   31.676797]  kunit_try_run_case+0x170/0x3f0
[   31.680963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686435]  kthread+0x328/0x630
[   31.689644]  ret_from_fork+0x10/0x20
[   31.693203] 
[   31.694682] The buggy address belongs to the object at ffff000801e28500
[   31.694682]  which belongs to the cache kmalloc-128 of size 128
[   31.707181] The buggy address is located 0 bytes inside of
[   31.707181]  freed 128-byte region [ffff000801e28500, ffff000801e28580)
[   31.719245] 
[   31.720722] The buggy address belongs to the physical page:
[   31.726279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   31.734263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.741904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.748847] page_type: f5(slab)
[   31.751984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.759702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.767430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.775239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.783053] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   31.790864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.798671] page dumped because: kasan: bad access detected
[   31.804225] 
[   31.805700] Memory state around the buggy address:
[   31.810483]  ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.817686]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.824889] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.832090]                    ^
[   31.835305]  ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.842511]  ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.849714] ==================================================================
[   31.857047] ==================================================================
[   31.864128] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.870457] Read of size 1 at addr ffff000801e28500 by task kunit_try_catch/243
[   31.877749] 
[   31.879235] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   31.879286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.879303] Hardware name: WinLink E850-96 board (DT)
[   31.879323] Call trace:
[   31.879338]  show_stack+0x20/0x38 (C)
[   31.879373]  dump_stack_lvl+0x8c/0xd0
[   31.879411]  print_report+0x118/0x608
[   31.879444]  kasan_report+0xdc/0x128
[   31.879478]  __asan_report_load1_noabort+0x20/0x30
[   31.879515]  ksize_uaf+0x598/0x5f8
[   31.879543]  kunit_try_run_case+0x170/0x3f0
[   31.879578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.879615]  kthread+0x328/0x630
[   31.879645]  ret_from_fork+0x10/0x20
[   31.879682] 
[   31.941289] Allocated by task 243:
[   31.944675]  kasan_save_stack+0x3c/0x68
[   31.948494]  kasan_save_track+0x20/0x40
[   31.952313]  kasan_save_alloc_info+0x40/0x58
[   31.956567]  __kasan_kmalloc+0xd4/0xd8
[   31.960300]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.964813]  ksize_uaf+0xb8/0x5f8
[   31.968112]  kunit_try_run_case+0x170/0x3f0
[   31.972279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.977747]  kthread+0x328/0x630
[   31.980960]  ret_from_fork+0x10/0x20
[   31.984518] 
[   31.985994] Freed by task 243:
[   31.989033]  kasan_save_stack+0x3c/0x68
[   31.992851]  kasan_save_track+0x20/0x40
[   31.996670]  kasan_save_free_info+0x4c/0x78
[   32.000837]  __kasan_slab_free+0x6c/0x98
[   32.004743]  kfree+0x214/0x3c8
[   32.007781]  ksize_uaf+0x11c/0x5f8
[   32.011167]  kunit_try_run_case+0x170/0x3f0
[   32.015333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.020803]  kthread+0x328/0x630
[   32.024014]  ret_from_fork+0x10/0x20
[   32.027574] 
[   32.029050] The buggy address belongs to the object at ffff000801e28500
[   32.029050]  which belongs to the cache kmalloc-128 of size 128
[   32.041550] The buggy address is located 0 bytes inside of
[   32.041550]  freed 128-byte region [ffff000801e28500, ffff000801e28580)
[   32.053615] 
[   32.055092] The buggy address belongs to the physical page:
[   32.060650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   32.068634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.076273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.083216] page_type: f5(slab)
[   32.086351] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.094071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.101798] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.109610] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.117423] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   32.125235] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.133040] page dumped because: kasan: bad access detected
[   32.138595] 
[   32.140071] Memory state around the buggy address:
[   32.144849]  ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.152054]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.159259] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.166459]                    ^
[   32.169675]  ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176881]  ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.184081] ==================================================================
[   32.191400] ==================================================================
[   32.198497] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.204827] Read of size 1 at addr ffff000801e28578 by task kunit_try_catch/243
[   32.212119] 
[   32.213604] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   32.213656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.213674] Hardware name: WinLink E850-96 board (DT)
[   32.213693] Call trace:
[   32.213706]  show_stack+0x20/0x38 (C)
[   32.213741]  dump_stack_lvl+0x8c/0xd0
[   32.213779]  print_report+0x118/0x608
[   32.213813]  kasan_report+0xdc/0x128
[   32.213845]  __asan_report_load1_noabort+0x20/0x30
[   32.213881]  ksize_uaf+0x544/0x5f8
[   32.213911]  kunit_try_run_case+0x170/0x3f0
[   32.213947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.213985]  kthread+0x328/0x630
[   32.214011]  ret_from_fork+0x10/0x20
[   32.214044] 
[   32.275659] Allocated by task 243:
[   32.279046]  kasan_save_stack+0x3c/0x68
[   32.282867]  kasan_save_track+0x20/0x40
[   32.286684]  kasan_save_alloc_info+0x40/0x58
[   32.290937]  __kasan_kmalloc+0xd4/0xd8
[   32.294669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.299183]  ksize_uaf+0xb8/0x5f8
[   32.302483]  kunit_try_run_case+0x170/0x3f0
[   32.306650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.312117]  kthread+0x328/0x630
[   32.315329]  ret_from_fork+0x10/0x20
[   32.318888] 
[   32.320364] Freed by task 243:
[   32.323403]  kasan_save_stack+0x3c/0x68
[   32.327221]  kasan_save_track+0x20/0x40
[   32.331040]  kasan_save_free_info+0x4c/0x78
[   32.335207]  __kasan_slab_free+0x6c/0x98
[   32.339114]  kfree+0x214/0x3c8
[   32.342151]  ksize_uaf+0x11c/0x5f8
[   32.345536]  kunit_try_run_case+0x170/0x3f0
[   32.349703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.355174]  kthread+0x328/0x630
[   32.358384]  ret_from_fork+0x10/0x20
[   32.361943] 
[   32.363419] The buggy address belongs to the object at ffff000801e28500
[   32.363419]  which belongs to the cache kmalloc-128 of size 128
[   32.375920] The buggy address is located 120 bytes inside of
[   32.375920]  freed 128-byte region [ffff000801e28500, ffff000801e28580)
[   32.388158] 
[   32.389637] The buggy address belongs to the physical page:
[   32.395193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   32.403178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.410817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.417759] page_type: f5(slab)
[   32.420895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.428615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.436342] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.444153] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.451966] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   32.459778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.467584] page dumped because: kasan: bad access detected
[   32.473139] 
[   32.474614] Memory state around the buggy address:
[   32.479393]  ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.486598]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.493802] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.501003]                                                                 ^
[   32.508125]  ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.515331]  ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.522532] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   30.615747] ==================================================================
[   30.625431] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.632804] Read of size 1 at addr ffff000801e28473 by task kunit_try_catch/241
[   30.640094] 
[   30.641582] CPU: 7 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.641636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.641654] Hardware name: WinLink E850-96 board (DT)
[   30.641677] Call trace:
[   30.641694]  show_stack+0x20/0x38 (C)
[   30.641731]  dump_stack_lvl+0x8c/0xd0
[   30.641772]  print_report+0x118/0x608
[   30.641808]  kasan_report+0xdc/0x128
[   30.641845]  __asan_report_load1_noabort+0x20/0x30
[   30.641883]  ksize_unpoisons_memory+0x628/0x740
[   30.641916]  kunit_try_run_case+0x170/0x3f0
[   30.641953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641993]  kthread+0x328/0x630
[   30.642023]  ret_from_fork+0x10/0x20
[   30.642057] 
[   30.704764] Allocated by task 241:
[   30.708151]  kasan_save_stack+0x3c/0x68
[   30.711969]  kasan_save_track+0x20/0x40
[   30.715788]  kasan_save_alloc_info+0x40/0x58
[   30.720040]  __kasan_kmalloc+0xd4/0xd8
[   30.723773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.728286]  ksize_unpoisons_memory+0xc0/0x740
[   30.732714]  kunit_try_run_case+0x170/0x3f0
[   30.736880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.742349]  kthread+0x328/0x630
[   30.745561]  ret_from_fork+0x10/0x20
[   30.749120] 
[   30.750598] The buggy address belongs to the object at ffff000801e28400
[   30.750598]  which belongs to the cache kmalloc-128 of size 128
[   30.763098] The buggy address is located 0 bytes to the right of
[   30.763098]  allocated 115-byte region [ffff000801e28400, ffff000801e28473)
[   30.776029] 
[   30.777508] The buggy address belongs to the physical page:
[   30.783064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   30.791049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.798687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.805632] page_type: f5(slab)
[   30.808769] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.816489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.824216] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.832025] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.839837] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   30.847650] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.855455] page dumped because: kasan: bad access detected
[   30.861010] 
[   30.862486] Memory state around the buggy address:
[   30.867268]  ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.874469]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.881675] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.888875]                                                              ^
[   30.895736]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.902941]  ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.910144] ==================================================================
[   30.917551] ==================================================================
[   30.924562] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.931930] Read of size 1 at addr ffff000801e28478 by task kunit_try_catch/241
[   30.939221] 
[   30.940709] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.940767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.940785] Hardware name: WinLink E850-96 board (DT)
[   30.940806] Call trace:
[   30.940820]  show_stack+0x20/0x38 (C)
[   30.940859]  dump_stack_lvl+0x8c/0xd0
[   30.940897]  print_report+0x118/0x608
[   30.940933]  kasan_report+0xdc/0x128
[   30.940970]  __asan_report_load1_noabort+0x20/0x30
[   30.941009]  ksize_unpoisons_memory+0x618/0x740
[   30.941041]  kunit_try_run_case+0x170/0x3f0
[   30.941080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.941120]  kthread+0x328/0x630
[   30.941150]  ret_from_fork+0x10/0x20
[   30.941185] 
[   31.003890] Allocated by task 241:
[   31.007278]  kasan_save_stack+0x3c/0x68
[   31.011095]  kasan_save_track+0x20/0x40
[   31.014916]  kasan_save_alloc_info+0x40/0x58
[   31.019168]  __kasan_kmalloc+0xd4/0xd8
[   31.022901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.027414]  ksize_unpoisons_memory+0xc0/0x740
[   31.031841]  kunit_try_run_case+0x170/0x3f0
[   31.036007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.041476]  kthread+0x328/0x630
[   31.044688]  ret_from_fork+0x10/0x20
[   31.048247] 
[   31.049724] The buggy address belongs to the object at ffff000801e28400
[   31.049724]  which belongs to the cache kmalloc-128 of size 128
[   31.062225] The buggy address is located 5 bytes to the right of
[   31.062225]  allocated 115-byte region [ffff000801e28400, ffff000801e28473)
[   31.075157] 
[   31.076636] The buggy address belongs to the physical page:
[   31.082192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   31.090176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.097816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.104758] page_type: f5(slab)
[   31.107895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.115614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.123341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.131152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.138965] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   31.146777] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.154582] page dumped because: kasan: bad access detected
[   31.160138] 
[   31.161613] Memory state around the buggy address:
[   31.166395]  ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.173596]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.180803] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.188002]                                                                 ^
[   31.195124]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.202329]  ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.209531] ==================================================================
[   31.216864] ==================================================================
[   31.223942] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.231318] Read of size 1 at addr ffff000801e2847f by task kunit_try_catch/241
[   31.238609] 
[   31.240094] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   31.240149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.240166] Hardware name: WinLink E850-96 board (DT)
[   31.240186] Call trace:
[   31.240200]  show_stack+0x20/0x38 (C)
[   31.240232]  dump_stack_lvl+0x8c/0xd0
[   31.240271]  print_report+0x118/0x608
[   31.240303]  kasan_report+0xdc/0x128
[   31.240336]  __asan_report_load1_noabort+0x20/0x30
[   31.240374]  ksize_unpoisons_memory+0x690/0x740
[   31.240405]  kunit_try_run_case+0x170/0x3f0
[   31.240440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.240478]  kthread+0x328/0x630
[   31.240505]  ret_from_fork+0x10/0x20
[   31.240540] 
[   31.303278] Allocated by task 241:
[   31.306666]  kasan_save_stack+0x3c/0x68
[   31.310484]  kasan_save_track+0x20/0x40
[   31.314302]  kasan_save_alloc_info+0x40/0x58
[   31.318556]  __kasan_kmalloc+0xd4/0xd8
[   31.322288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.326802]  ksize_unpoisons_memory+0xc0/0x740
[   31.331230]  kunit_try_run_case+0x170/0x3f0
[   31.335396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.340864]  kthread+0x328/0x630
[   31.344076]  ret_from_fork+0x10/0x20
[   31.347635] 
[   31.349113] The buggy address belongs to the object at ffff000801e28400
[   31.349113]  which belongs to the cache kmalloc-128 of size 128
[   31.361612] The buggy address is located 12 bytes to the right of
[   31.361612]  allocated 115-byte region [ffff000801e28400, ffff000801e28473)
[   31.374631] 
[   31.376108] The buggy address belongs to the physical page:
[   31.381667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   31.389650] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.397289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.404231] page_type: f5(slab)
[   31.407369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.415089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.422815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.430627] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.438440] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   31.446252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.454057] page dumped because: kasan: bad access detected
[   31.459613] 
[   31.461088] Memory state around the buggy address:
[   31.465868]  ffff000801e28300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.473071]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.480277] >ffff000801e28400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.487477]                                                                 ^
[   31.494598]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.501803]  ffff000801e28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.509004] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.301843] ==================================================================
[   30.308767] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.314751] Free of addr ffff000800c2f0a0 by task kunit_try_catch/239
[   30.321175] 
[   30.322660] CPU: 5 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.322717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.322737] Hardware name: WinLink E850-96 board (DT)
[   30.322758] Call trace:
[   30.322772]  show_stack+0x20/0x38 (C)
[   30.322806]  dump_stack_lvl+0x8c/0xd0
[   30.322841]  print_report+0x118/0x608
[   30.322875]  kasan_report_invalid_free+0xc0/0xe8
[   30.322911]  check_slab_allocation+0xd4/0x108
[   30.322948]  __kasan_slab_pre_free+0x2c/0x48
[   30.322983]  kfree+0xe8/0x3c8
[   30.323013]  kfree_sensitive+0x3c/0xb0
[   30.323044]  kmalloc_double_kzfree+0x168/0x308
[   30.323079]  kunit_try_run_case+0x170/0x3f0
[   30.323116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.323152]  kthread+0x328/0x630
[   30.323180]  ret_from_fork+0x10/0x20
[   30.323214] 
[   30.397302] Allocated by task 239:
[   30.400689]  kasan_save_stack+0x3c/0x68
[   30.404509]  kasan_save_track+0x20/0x40
[   30.408326]  kasan_save_alloc_info+0x40/0x58
[   30.412580]  __kasan_kmalloc+0xd4/0xd8
[   30.416312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.420826]  kmalloc_double_kzfree+0xb8/0x308
[   30.425166]  kunit_try_run_case+0x170/0x3f0
[   30.429333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.434803]  kthread+0x328/0x630
[   30.438013]  ret_from_fork+0x10/0x20
[   30.441572] 
[   30.443048] Freed by task 239:
[   30.446086]  kasan_save_stack+0x3c/0x68
[   30.449905]  kasan_save_track+0x20/0x40
[   30.453725]  kasan_save_free_info+0x4c/0x78
[   30.457891]  __kasan_slab_free+0x6c/0x98
[   30.461798]  kfree+0x214/0x3c8
[   30.464836]  kfree_sensitive+0x80/0xb0
[   30.468568]  kmalloc_double_kzfree+0x11c/0x308
[   30.472996]  kunit_try_run_case+0x170/0x3f0
[   30.477162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.482631]  kthread+0x328/0x630
[   30.485844]  ret_from_fork+0x10/0x20
[   30.489401] 
[   30.490878] The buggy address belongs to the object at ffff000800c2f0a0
[   30.490878]  which belongs to the cache kmalloc-16 of size 16
[   30.503206] The buggy address is located 0 bytes inside of
[   30.503206]  16-byte region [ffff000800c2f0a0, ffff000800c2f0b0)
[   30.514661] 
[   30.516139] The buggy address belongs to the physical page:
[   30.521696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f
[   30.529680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.536191] page_type: f5(slab)
[   30.539325] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.547046] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.554765] page dumped because: kasan: bad access detected
[   30.560320] 
[   30.561796] Memory state around the buggy address:
[   30.566577]  ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.573779]  ffff000800c2f000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.580984] >ffff000800c2f080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.588184]                                ^
[   30.592442]  ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.599647]  ffff000800c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.606848] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   29.988428] ==================================================================
[   30.002087] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.009462] Read of size 1 at addr ffff000800c2f0a0 by task kunit_try_catch/239
[   30.016752] 
[   30.018238] CPU: 5 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.018300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.018319] Hardware name: WinLink E850-96 board (DT)
[   30.018341] Call trace:
[   30.018357]  show_stack+0x20/0x38 (C)
[   30.018393]  dump_stack_lvl+0x8c/0xd0
[   30.018433]  print_report+0x118/0x608
[   30.018468]  kasan_report+0xdc/0x128
[   30.018505]  __kasan_check_byte+0x54/0x70
[   30.018537]  kfree_sensitive+0x30/0xb0
[   30.018573]  kmalloc_double_kzfree+0x168/0x308
[   30.018605]  kunit_try_run_case+0x170/0x3f0
[   30.018642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.018681]  kthread+0x328/0x630
[   30.018709]  ret_from_fork+0x10/0x20
[   30.018743] 
[   30.084287] Allocated by task 239:
[   30.087675]  kasan_save_stack+0x3c/0x68
[   30.091492]  kasan_save_track+0x20/0x40
[   30.095310]  kasan_save_alloc_info+0x40/0x58
[   30.099564]  __kasan_kmalloc+0xd4/0xd8
[   30.103296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.107810]  kmalloc_double_kzfree+0xb8/0x308
[   30.112150]  kunit_try_run_case+0x170/0x3f0
[   30.116317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.121787]  kthread+0x328/0x630
[   30.124997]  ret_from_fork+0x10/0x20
[   30.128556] 
[   30.130032] Freed by task 239:
[   30.133070]  kasan_save_stack+0x3c/0x68
[   30.136889]  kasan_save_track+0x20/0x40
[   30.140710]  kasan_save_free_info+0x4c/0x78
[   30.144875]  __kasan_slab_free+0x6c/0x98
[   30.148781]  kfree+0x214/0x3c8
[   30.151820]  kfree_sensitive+0x80/0xb0
[   30.155552]  kmalloc_double_kzfree+0x11c/0x308
[   30.159979]  kunit_try_run_case+0x170/0x3f0
[   30.164146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.169614]  kthread+0x328/0x630
[   30.172828]  ret_from_fork+0x10/0x20
[   30.176385] 
[   30.177863] The buggy address belongs to the object at ffff000800c2f0a0
[   30.177863]  which belongs to the cache kmalloc-16 of size 16
[   30.190190] The buggy address is located 0 bytes inside of
[   30.190190]  freed 16-byte region [ffff000800c2f0a0, ffff000800c2f0b0)
[   30.202166] 
[   30.203644] The buggy address belongs to the physical page:
[   30.209201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f
[   30.217185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.223696] page_type: f5(slab)
[   30.226833] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.234551] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.242269] page dumped because: kasan: bad access detected
[   30.247825] 
[   30.249300] Memory state around the buggy address:
[   30.254082]  ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.261285]  ffff000800c2f000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.268488] >ffff000800c2f080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   30.275689]                                ^
[   30.279947]  ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.287151]  ffff000800c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.294355] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   29.684963] ==================================================================
[   29.694280] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.700874] Read of size 1 at addr ffff000800c2e9a8 by task kunit_try_catch/235
[   29.708163] 
[   29.709649] CPU: 5 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.709706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.709724] Hardware name: WinLink E850-96 board (DT)
[   29.709747] Call trace:
[   29.709760]  show_stack+0x20/0x38 (C)
[   29.709797]  dump_stack_lvl+0x8c/0xd0
[   29.709835]  print_report+0x118/0x608
[   29.709870]  kasan_report+0xdc/0x128
[   29.709906]  __asan_report_load1_noabort+0x20/0x30
[   29.709946]  kmalloc_uaf2+0x3f4/0x468
[   29.709976]  kunit_try_run_case+0x170/0x3f0
[   29.710014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.710052]  kthread+0x328/0x630
[   29.710085]  ret_from_fork+0x10/0x20
[   29.710122] 
[   29.771966] Allocated by task 235:
[   29.775354]  kasan_save_stack+0x3c/0x68
[   29.779169]  kasan_save_track+0x20/0x40
[   29.782989]  kasan_save_alloc_info+0x40/0x58
[   29.787242]  __kasan_kmalloc+0xd4/0xd8
[   29.790974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.795488]  kmalloc_uaf2+0xc4/0x468
[   29.799047]  kunit_try_run_case+0x170/0x3f0
[   29.803214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.808684]  kthread+0x328/0x630
[   29.811894]  ret_from_fork+0x10/0x20
[   29.815452] 
[   29.816928] Freed by task 235:
[   29.819967]  kasan_save_stack+0x3c/0x68
[   29.823786]  kasan_save_track+0x20/0x40
[   29.827607]  kasan_save_free_info+0x4c/0x78
[   29.831773]  __kasan_slab_free+0x6c/0x98
[   29.835679]  kfree+0x214/0x3c8
[   29.838717]  kmalloc_uaf2+0x134/0x468
[   29.842363]  kunit_try_run_case+0x170/0x3f0
[   29.846529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.851998]  kthread+0x328/0x630
[   29.855210]  ret_from_fork+0x10/0x20
[   29.858769] 
[   29.860247] The buggy address belongs to the object at ffff000800c2e980
[   29.860247]  which belongs to the cache kmalloc-64 of size 64
[   29.872574] The buggy address is located 40 bytes inside of
[   29.872574]  freed 64-byte region [ffff000800c2e980, ffff000800c2e9c0)
[   29.884636] 
[   29.886114] The buggy address belongs to the physical page:
[   29.891674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   29.899655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.906166] page_type: f5(slab)
[   29.909301] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.917021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.924741] page dumped because: kasan: bad access detected
[   29.930295] 
[   29.931770] Memory state around the buggy address:
[   29.936552]  ffff000800c2e880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.943754]  ffff000800c2e900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.950958] >ffff000800c2e980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.958159]                                   ^
[   29.962678]  ffff000800c2ea00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   29.969882]  ffff000800c2ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977086] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   29.380671] ==================================================================
[   29.389426] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.396538] Write of size 33 at addr ffff000800d62280 by task kunit_try_catch/233
[   29.404001] 
[   29.405489] CPU: 7 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.405548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.405567] Hardware name: WinLink E850-96 board (DT)
[   29.405588] Call trace:
[   29.405602]  show_stack+0x20/0x38 (C)
[   29.405639]  dump_stack_lvl+0x8c/0xd0
[   29.405677]  print_report+0x118/0x608
[   29.405715]  kasan_report+0xdc/0x128
[   29.405751]  kasan_check_range+0x100/0x1a8
[   29.405791]  __asan_memset+0x34/0x78
[   29.405820]  kmalloc_uaf_memset+0x170/0x310
[   29.405853]  kunit_try_run_case+0x170/0x3f0
[   29.405890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.405929]  kthread+0x328/0x630
[   29.405958]  ret_from_fork+0x10/0x20
[   29.405994] 
[   29.471189] Allocated by task 233:
[   29.474576]  kasan_save_stack+0x3c/0x68
[   29.478392]  kasan_save_track+0x20/0x40
[   29.482212]  kasan_save_alloc_info+0x40/0x58
[   29.486465]  __kasan_kmalloc+0xd4/0xd8
[   29.490199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.494712]  kmalloc_uaf_memset+0xb8/0x310
[   29.498791]  kunit_try_run_case+0x170/0x3f0
[   29.502959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.508426]  kthread+0x328/0x630
[   29.511638]  ret_from_fork+0x10/0x20
[   29.515197] 
[   29.516673] Freed by task 233:
[   29.519714]  kasan_save_stack+0x3c/0x68
[   29.523530]  kasan_save_track+0x20/0x40
[   29.527350]  kasan_save_free_info+0x4c/0x78
[   29.531516]  __kasan_slab_free+0x6c/0x98
[   29.535423]  kfree+0x214/0x3c8
[   29.538461]  kmalloc_uaf_memset+0x11c/0x310
[   29.542629]  kunit_try_run_case+0x170/0x3f0
[   29.546794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.552263]  kthread+0x328/0x630
[   29.555474]  ret_from_fork+0x10/0x20
[   29.559033] 
[   29.560509] The buggy address belongs to the object at ffff000800d62280
[   29.560509]  which belongs to the cache kmalloc-64 of size 64
[   29.572839] The buggy address is located 0 bytes inside of
[   29.572839]  freed 64-byte region [ffff000800d62280, ffff000800d622c0)
[   29.584815] 
[   29.586294] The buggy address belongs to the physical page:
[   29.591849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62
[   29.599835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.606343] page_type: f5(slab)
[   29.609480] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.617200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.624919] page dumped because: kasan: bad access detected
[   29.630473] 
[   29.631949] Memory state around the buggy address:
[   29.636730]  ffff000800d62180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.643932]  ffff000800d62200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.651136] >ffff000800d62280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.658337]                    ^
[   29.661553]  ffff000800d62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.668758]  ffff000800d62380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.675960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   29.080260] ==================================================================
[   29.090381] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.096889] Read of size 1 at addr ffff000800c2f088 by task kunit_try_catch/231
[   29.104179] 
[   29.105666] CPU: 5 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.105728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.105746] Hardware name: WinLink E850-96 board (DT)
[   29.105769] Call trace:
[   29.105782]  show_stack+0x20/0x38 (C)
[   29.105817]  dump_stack_lvl+0x8c/0xd0
[   29.105854]  print_report+0x118/0x608
[   29.105892]  kasan_report+0xdc/0x128
[   29.105924]  __asan_report_load1_noabort+0x20/0x30
[   29.105966]  kmalloc_uaf+0x300/0x338
[   29.105992]  kunit_try_run_case+0x170/0x3f0
[   29.106028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.106067]  kthread+0x328/0x630
[   29.106098]  ret_from_fork+0x10/0x20
[   29.106135] 
[   29.167895] Allocated by task 231:
[   29.171282]  kasan_save_stack+0x3c/0x68
[   29.175099]  kasan_save_track+0x20/0x40
[   29.178918]  kasan_save_alloc_info+0x40/0x58
[   29.183171]  __kasan_kmalloc+0xd4/0xd8
[   29.186904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.191417]  kmalloc_uaf+0xb8/0x338
[   29.194890]  kunit_try_run_case+0x170/0x3f0
[   29.199056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.204525]  kthread+0x328/0x630
[   29.207737]  ret_from_fork+0x10/0x20
[   29.211296] 
[   29.212771] Freed by task 231:
[   29.215809]  kasan_save_stack+0x3c/0x68
[   29.219629]  kasan_save_track+0x20/0x40
[   29.223450]  kasan_save_free_info+0x4c/0x78
[   29.227615]  __kasan_slab_free+0x6c/0x98
[   29.231521]  kfree+0x214/0x3c8
[   29.234559]  kmalloc_uaf+0x11c/0x338
[   29.238118]  kunit_try_run_case+0x170/0x3f0
[   29.242286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.247753]  kthread+0x328/0x630
[   29.250965]  ret_from_fork+0x10/0x20
[   29.254524] 
[   29.256001] The buggy address belongs to the object at ffff000800c2f080
[   29.256001]  which belongs to the cache kmalloc-16 of size 16
[   29.268328] The buggy address is located 8 bytes inside of
[   29.268328]  freed 16-byte region [ffff000800c2f080, ffff000800c2f090)
[   29.280305] 
[   29.281783] The buggy address belongs to the physical page:
[   29.287340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f
[   29.295325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.301835] page_type: f5(slab)
[   29.304971] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.312690] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.320410] page dumped because: kasan: bad access detected
[   29.325964] 
[   29.327440] Memory state around the buggy address:
[   29.332222]  ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.339424]  ffff000800c2f000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.346627] >ffff000800c2f080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.353828]                       ^
[   29.357305]  ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.364509]  ffff000800c2f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.371713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   28.813228] ==================================================================
[   28.823545] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.831442] Read of size 64 at addr ffff000800d62204 by task kunit_try_catch/229
[   28.838819] 
[   28.840306] CPU: 7 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.840368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.840386] Hardware name: WinLink E850-96 board (DT)
[   28.840406] Call trace:
[   28.840422]  show_stack+0x20/0x38 (C)
[   28.840459]  dump_stack_lvl+0x8c/0xd0
[   28.840497]  print_report+0x118/0x608
[   28.840533]  kasan_report+0xdc/0x128
[   28.840566]  kasan_check_range+0x100/0x1a8
[   28.840603]  __asan_memmove+0x3c/0x98
[   28.840632]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.840668]  kunit_try_run_case+0x170/0x3f0
[   28.840706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.840746]  kthread+0x328/0x630
[   28.840775]  ret_from_fork+0x10/0x20
[   28.840810] 
[   28.906961] Allocated by task 229:
[   28.910348]  kasan_save_stack+0x3c/0x68
[   28.914164]  kasan_save_track+0x20/0x40
[   28.917984]  kasan_save_alloc_info+0x40/0x58
[   28.922237]  __kasan_kmalloc+0xd4/0xd8
[   28.925971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.930484]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   28.935432]  kunit_try_run_case+0x170/0x3f0
[   28.939598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.945067]  kthread+0x328/0x630
[   28.948279]  ret_from_fork+0x10/0x20
[   28.951838] 
[   28.953316] The buggy address belongs to the object at ffff000800d62200
[   28.953316]  which belongs to the cache kmalloc-64 of size 64
[   28.965642] The buggy address is located 4 bytes inside of
[   28.965642]  allocated 64-byte region [ffff000800d62200, ffff000800d62240)
[   28.977966] 
[   28.979445] The buggy address belongs to the physical page:
[   28.985002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62
[   28.992985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.999495] page_type: f5(slab)
[   29.002631] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.010351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.018071] page dumped because: kasan: bad access detected
[   29.023625] 
[   29.025100] Memory state around the buggy address:
[   29.029881]  ffff000800d62100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.037083]  ffff000800d62180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.044289] >ffff000800d62200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.051488]                                            ^
[   29.056788]  ffff000800d62280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.063993]  ffff000800d62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.071195] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   28.548604] ==================================================================
[   28.558185] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   28.565734] Read of size 18446744073709551614 at addr ffff000800c2e904 by task kunit_try_catch/227
[   28.574674] 
[   28.576161] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.576214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.576229] Hardware name: WinLink E850-96 board (DT)
[   28.576249] Call trace:
[   28.576264]  show_stack+0x20/0x38 (C)
[   28.576301]  dump_stack_lvl+0x8c/0xd0
[   28.576339]  print_report+0x118/0x608
[   28.576372]  kasan_report+0xdc/0x128
[   28.576403]  kasan_check_range+0x100/0x1a8
[   28.576439]  __asan_memmove+0x3c/0x98
[   28.576465]  kmalloc_memmove_negative_size+0x154/0x2e0
[   28.576499]  kunit_try_run_case+0x170/0x3f0
[   28.576535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.576571]  kthread+0x328/0x630
[   28.576601]  ret_from_fork+0x10/0x20
[   28.576636] 
[   28.642901] Allocated by task 227:
[   28.646290]  kasan_save_stack+0x3c/0x68
[   28.650109]  kasan_save_track+0x20/0x40
[   28.653927]  kasan_save_alloc_info+0x40/0x58
[   28.658179]  __kasan_kmalloc+0xd4/0xd8
[   28.661913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.666426]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   28.671459]  kunit_try_run_case+0x170/0x3f0
[   28.675627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.681097]  kthread+0x328/0x630
[   28.684307]  ret_from_fork+0x10/0x20
[   28.687866] 
[   28.689344] The buggy address belongs to the object at ffff000800c2e900
[   28.689344]  which belongs to the cache kmalloc-64 of size 64
[   28.701671] The buggy address is located 4 bytes inside of
[   28.701671]  64-byte region [ffff000800c2e900, ffff000800c2e940)
[   28.713126] 
[   28.714606] The buggy address belongs to the physical page:
[   28.720162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   28.728145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.734656] page_type: f5(slab)
[   28.737793] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.745511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.753231] page dumped because: kasan: bad access detected
[   28.758785] 
[   28.760260] Memory state around the buggy address:
[   28.765042]  ffff000800c2e800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.772244]  ffff000800c2e880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.779448] >ffff000800c2e900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.786649]                    ^
[   28.789865]  ffff000800c2e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.797071]  ffff000800c2ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.804273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   28.242649] ==================================================================
[   28.252201] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   28.259489] Write of size 16 at addr ffff000801e28369 by task kunit_try_catch/225
[   28.266954] 
[   28.268440] CPU: 7 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.268498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.268515] Hardware name: WinLink E850-96 board (DT)
[   28.268535] Call trace:
[   28.268550]  show_stack+0x20/0x38 (C)
[   28.268584]  dump_stack_lvl+0x8c/0xd0
[   28.268623]  print_report+0x118/0x608
[   28.268658]  kasan_report+0xdc/0x128
[   28.268690]  kasan_check_range+0x100/0x1a8
[   28.268729]  __asan_memset+0x34/0x78
[   28.268759]  kmalloc_oob_memset_16+0x150/0x2f8
[   28.268792]  kunit_try_run_case+0x170/0x3f0
[   28.268827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.268864]  kthread+0x328/0x630
[   28.268892]  ret_from_fork+0x10/0x20
[   28.268927] 
[   28.334399] Allocated by task 225:
[   28.337788]  kasan_save_stack+0x3c/0x68
[   28.341605]  kasan_save_track+0x20/0x40
[   28.345423]  kasan_save_alloc_info+0x40/0x58
[   28.349678]  __kasan_kmalloc+0xd4/0xd8
[   28.353410]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.357923]  kmalloc_oob_memset_16+0xb0/0x2f8
[   28.362263]  kunit_try_run_case+0x170/0x3f0
[   28.366430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.371900]  kthread+0x328/0x630
[   28.375112]  ret_from_fork+0x10/0x20
[   28.378669] 
[   28.380146] The buggy address belongs to the object at ffff000801e28300
[   28.380146]  which belongs to the cache kmalloc-128 of size 128
[   28.392647] The buggy address is located 105 bytes inside of
[   28.392647]  allocated 120-byte region [ffff000801e28300, ffff000801e28378)
[   28.405231] 
[   28.406711] The buggy address belongs to the physical page:
[   28.412266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   28.420250] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.427889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.434836] page_type: f5(slab)
[   28.437970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.445689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.453417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.461227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.469040] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   28.476852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.484657] page dumped because: kasan: bad access detected
[   28.490213] 
[   28.491688] Memory state around the buggy address:
[   28.496470]  ffff000801e28200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.503671]  ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.510876] >ffff000801e28300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.518077]                                                                 ^
[   28.525199]  ffff000801e28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.532405]  ffff000801e28400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.539607] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   27.937127] ==================================================================
[   27.946649] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   27.953855] Write of size 8 at addr ffff000801dea571 by task kunit_try_catch/223
[   27.961228] 
[   27.962714] CPU: 5 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.962769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.962787] Hardware name: WinLink E850-96 board (DT)
[   27.962808] Call trace:
[   27.962822]  show_stack+0x20/0x38 (C)
[   27.962860]  dump_stack_lvl+0x8c/0xd0
[   27.962896]  print_report+0x118/0x608
[   27.962929]  kasan_report+0xdc/0x128
[   27.962963]  kasan_check_range+0x100/0x1a8
[   27.962999]  __asan_memset+0x34/0x78
[   27.963026]  kmalloc_oob_memset_8+0x150/0x2f8
[   27.963061]  kunit_try_run_case+0x170/0x3f0
[   27.963095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.963130]  kthread+0x328/0x630
[   27.963159]  ret_from_fork+0x10/0x20
[   27.963194] 
[   28.028587] Allocated by task 223:
[   28.031978]  kasan_save_stack+0x3c/0x68
[   28.035794]  kasan_save_track+0x20/0x40
[   28.039612]  kasan_save_alloc_info+0x40/0x58
[   28.043865]  __kasan_kmalloc+0xd4/0xd8
[   28.047598]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.052112]  kmalloc_oob_memset_8+0xb0/0x2f8
[   28.056365]  kunit_try_run_case+0x170/0x3f0
[   28.060533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.066000]  kthread+0x328/0x630
[   28.069212]  ret_from_fork+0x10/0x20
[   28.072771] 
[   28.074248] The buggy address belongs to the object at ffff000801dea500
[   28.074248]  which belongs to the cache kmalloc-128 of size 128
[   28.086748] The buggy address is located 113 bytes inside of
[   28.086748]  allocated 120-byte region [ffff000801dea500, ffff000801dea578)
[   28.099333] 
[   28.100813] The buggy address belongs to the physical page:
[   28.106369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea
[   28.114352] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.121991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.128935] page_type: f5(slab)
[   28.132072] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.139791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.147519] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.155329] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.163142] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff
[   28.170954] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.178759] page dumped because: kasan: bad access detected
[   28.184314] 
[   28.185790] Memory state around the buggy address:
[   28.190570]  ffff000801dea400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.197773]  ffff000801dea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.204978] >ffff000801dea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.212179]                                                                 ^
[   28.219300]  ffff000801dea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.226506]  ffff000801dea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.233707] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   27.631526] ==================================================================
[   27.641098] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   27.648299] Write of size 4 at addr ffff000801e28275 by task kunit_try_catch/221
[   27.655677] 
[   27.657164] CPU: 7 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.657222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.657238] Hardware name: WinLink E850-96 board (DT)
[   27.657261] Call trace:
[   27.657276]  show_stack+0x20/0x38 (C)
[   27.657313]  dump_stack_lvl+0x8c/0xd0
[   27.657352]  print_report+0x118/0x608
[   27.657387]  kasan_report+0xdc/0x128
[   27.657421]  kasan_check_range+0x100/0x1a8
[   27.657457]  __asan_memset+0x34/0x78
[   27.657483]  kmalloc_oob_memset_4+0x150/0x300
[   27.657515]  kunit_try_run_case+0x170/0x3f0
[   27.657552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.657588]  kthread+0x328/0x630
[   27.657620]  ret_from_fork+0x10/0x20
[   27.657655] 
[   27.723037] Allocated by task 221:
[   27.726427]  kasan_save_stack+0x3c/0x68
[   27.730243]  kasan_save_track+0x20/0x40
[   27.734063]  kasan_save_alloc_info+0x40/0x58
[   27.738316]  __kasan_kmalloc+0xd4/0xd8
[   27.742047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.746560]  kmalloc_oob_memset_4+0xb0/0x300
[   27.750814]  kunit_try_run_case+0x170/0x3f0
[   27.754981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.760450]  kthread+0x328/0x630
[   27.763661]  ret_from_fork+0x10/0x20
[   27.767220] 
[   27.768697] The buggy address belongs to the object at ffff000801e28200
[   27.768697]  which belongs to the cache kmalloc-128 of size 128
[   27.781197] The buggy address is located 117 bytes inside of
[   27.781197]  allocated 120-byte region [ffff000801e28200, ffff000801e28278)
[   27.793782] 
[   27.795261] The buggy address belongs to the physical page:
[   27.800817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   27.808801] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.816440] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.823384] page_type: f5(slab)
[   27.826522] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.834240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.841966] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.849778] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.857591] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   27.865403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.873208] page dumped because: kasan: bad access detected
[   27.878763] 
[   27.880239] Memory state around the buggy address:
[   27.885018]  ffff000801e28100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.892222]  ffff000801e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.899428] >ffff000801e28200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.906628]                                                                 ^
[   27.913749]  ffff000801e28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.920954]  ffff000801e28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.928158] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   27.325930] ==================================================================
[   27.335548] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   27.342749] Write of size 2 at addr ffff000801dea477 by task kunit_try_catch/219
[   27.350126] 
[   27.351611] CPU: 5 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.351668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.351684] Hardware name: WinLink E850-96 board (DT)
[   27.351704] Call trace:
[   27.351719]  show_stack+0x20/0x38 (C)
[   27.351755]  dump_stack_lvl+0x8c/0xd0
[   27.351793]  print_report+0x118/0x608
[   27.351829]  kasan_report+0xdc/0x128
[   27.351863]  kasan_check_range+0x100/0x1a8
[   27.351899]  __asan_memset+0x34/0x78
[   27.351928]  kmalloc_oob_memset_2+0x150/0x2f8
[   27.351958]  kunit_try_run_case+0x170/0x3f0
[   27.351994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.352035]  kthread+0x328/0x630
[   27.352063]  ret_from_fork+0x10/0x20
[   27.352097] 
[   27.417485] Allocated by task 219:
[   27.420875]  kasan_save_stack+0x3c/0x68
[   27.424690]  kasan_save_track+0x20/0x40
[   27.428510]  kasan_save_alloc_info+0x40/0x58
[   27.432763]  __kasan_kmalloc+0xd4/0xd8
[   27.436496]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.441010]  kmalloc_oob_memset_2+0xb0/0x2f8
[   27.445263]  kunit_try_run_case+0x170/0x3f0
[   27.449430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.454900]  kthread+0x328/0x630
[   27.458110]  ret_from_fork+0x10/0x20
[   27.461669] 
[   27.463146] The buggy address belongs to the object at ffff000801dea400
[   27.463146]  which belongs to the cache kmalloc-128 of size 128
[   27.475647] The buggy address is located 119 bytes inside of
[   27.475647]  allocated 120-byte region [ffff000801dea400, ffff000801dea478)
[   27.488231] 
[   27.489709] The buggy address belongs to the physical page:
[   27.495267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea
[   27.503252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.510890] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.517833] page_type: f5(slab)
[   27.520970] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.528689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.536417] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.544227] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.552040] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff
[   27.559852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.567657] page dumped because: kasan: bad access detected
[   27.573212] 
[   27.574688] Memory state around the buggy address:
[   27.579470]  ffff000801dea300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.586671]  ffff000801dea380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.593876] >ffff000801dea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.601077]                                                                 ^
[   27.608198]  ffff000801dea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.615403]  ffff000801dea500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.622607] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   27.020407] ==================================================================
[   27.029650] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   27.036937] Write of size 128 at addr ffff000801e28100 by task kunit_try_catch/217
[   27.044488] 
[   27.045973] CPU: 7 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.046025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.046041] Hardware name: WinLink E850-96 board (DT)
[   27.046062] Call trace:
[   27.046077]  show_stack+0x20/0x38 (C)
[   27.046118]  dump_stack_lvl+0x8c/0xd0
[   27.046156]  print_report+0x118/0x608
[   27.046192]  kasan_report+0xdc/0x128
[   27.046226]  kasan_check_range+0x100/0x1a8
[   27.046264]  __asan_memset+0x34/0x78
[   27.046291]  kmalloc_oob_in_memset+0x144/0x2d0
[   27.046322]  kunit_try_run_case+0x170/0x3f0
[   27.046359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.046395]  kthread+0x328/0x630
[   27.046426]  ret_from_fork+0x10/0x20
[   27.046462] 
[   27.111935] Allocated by task 217:
[   27.115323]  kasan_save_stack+0x3c/0x68
[   27.119139]  kasan_save_track+0x20/0x40
[   27.122959]  kasan_save_alloc_info+0x40/0x58
[   27.127212]  __kasan_kmalloc+0xd4/0xd8
[   27.130946]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.135458]  kmalloc_oob_in_memset+0xb0/0x2d0
[   27.139799]  kunit_try_run_case+0x170/0x3f0
[   27.143965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.149434]  kthread+0x328/0x630
[   27.152646]  ret_from_fork+0x10/0x20
[   27.156207] 
[   27.157682] The buggy address belongs to the object at ffff000801e28100
[   27.157682]  which belongs to the cache kmalloc-128 of size 128
[   27.170182] The buggy address is located 0 bytes inside of
[   27.170182]  allocated 120-byte region [ffff000801e28100, ffff000801e28178)
[   27.182593] 
[   27.184072] The buggy address belongs to the physical page:
[   27.189628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   27.197613] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.205251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.212196] page_type: f5(slab)
[   27.215333] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.223051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.230781] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.238589] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.246402] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   27.254214] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.262020] page dumped because: kasan: bad access detected
[   27.267575] 
[   27.269050] Memory state around the buggy address:
[   27.273832]  ffff000801e28000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.281033]  ffff000801e28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.288238] >ffff000801e28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.295439]                                                                 ^
[   27.302561]  ffff000801e28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.309767]  ffff000801e28200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.316968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   26.716993] ==================================================================
[   26.726179] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   26.732953] Read of size 16 at addr ffff000800c2f060 by task kunit_try_catch/215
[   26.740326] 
[   26.741813] CPU: 5 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.741873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.741891] Hardware name: WinLink E850-96 board (DT)
[   26.741911] Call trace:
[   26.741925]  show_stack+0x20/0x38 (C)
[   26.741959]  dump_stack_lvl+0x8c/0xd0
[   26.741996]  print_report+0x118/0x608
[   26.742031]  kasan_report+0xdc/0x128
[   26.742064]  __asan_report_load16_noabort+0x20/0x30
[   26.742104]  kmalloc_uaf_16+0x3bc/0x438
[   26.742134]  kunit_try_run_case+0x170/0x3f0
[   26.742169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.742206]  kthread+0x328/0x630
[   26.742236]  ret_from_fork+0x10/0x20
[   26.742270] 
[   26.804389] Allocated by task 215:
[   26.807776]  kasan_save_stack+0x3c/0x68
[   26.811595]  kasan_save_track+0x20/0x40
[   26.815411]  kasan_save_alloc_info+0x40/0x58
[   26.819665]  __kasan_kmalloc+0xd4/0xd8
[   26.823397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.827911]  kmalloc_uaf_16+0x140/0x438
[   26.831731]  kunit_try_run_case+0x170/0x3f0
[   26.835897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.841366]  kthread+0x328/0x630
[   26.844578]  ret_from_fork+0x10/0x20
[   26.848137] 
[   26.849614] Freed by task 215:
[   26.852652]  kasan_save_stack+0x3c/0x68
[   26.856470]  kasan_save_track+0x20/0x40
[   26.860289]  kasan_save_free_info+0x4c/0x78
[   26.864456]  __kasan_slab_free+0x6c/0x98
[   26.868362]  kfree+0x214/0x3c8
[   26.871400]  kmalloc_uaf_16+0x190/0x438
[   26.875220]  kunit_try_run_case+0x170/0x3f0
[   26.879386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.884855]  kthread+0x328/0x630
[   26.888067]  ret_from_fork+0x10/0x20
[   26.891626] 
[   26.893103] The buggy address belongs to the object at ffff000800c2f060
[   26.893103]  which belongs to the cache kmalloc-16 of size 16
[   26.905429] The buggy address is located 0 bytes inside of
[   26.905429]  freed 16-byte region [ffff000800c2f060, ffff000800c2f070)
[   26.917406] 
[   26.918886] The buggy address belongs to the physical page:
[   26.924441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f
[   26.932426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.938935] page_type: f5(slab)
[   26.942071] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   26.949792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.957512] page dumped because: kasan: bad access detected
[   26.963065] 
[   26.964541] Memory state around the buggy address:
[   26.969322]  ffff000800c2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.976524]  ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.983729] >ffff000800c2f000: 00 04 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   26.990930]                                                        ^
[   26.997270]  ffff000800c2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.004475]  ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.011679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   26.458632] ==================================================================
[   26.467680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   26.474358] Write of size 16 at addr ffff000800d63020 by task kunit_try_catch/213
[   26.481823] 
[   26.483310] CPU: 7 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.483364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.483380] Hardware name: WinLink E850-96 board (DT)
[   26.483401] Call trace:
[   26.483416]  show_stack+0x20/0x38 (C)
[   26.483455]  dump_stack_lvl+0x8c/0xd0
[   26.483491]  print_report+0x118/0x608
[   26.483527]  kasan_report+0xdc/0x128
[   26.483564]  __asan_report_store16_noabort+0x20/0x30
[   26.483598]  kmalloc_oob_16+0x3a0/0x3f8
[   26.483627]  kunit_try_run_case+0x170/0x3f0
[   26.483664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.483702]  kthread+0x328/0x630
[   26.483732]  ret_from_fork+0x10/0x20
[   26.483766] 
[   26.545971] Allocated by task 213:
[   26.549358]  kasan_save_stack+0x3c/0x68
[   26.553177]  kasan_save_track+0x20/0x40
[   26.556995]  kasan_save_alloc_info+0x40/0x58
[   26.561250]  __kasan_kmalloc+0xd4/0xd8
[   26.564982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.569495]  kmalloc_oob_16+0xb4/0x3f8
[   26.573227]  kunit_try_run_case+0x170/0x3f0
[   26.577394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.582863]  kthread+0x328/0x630
[   26.586075]  ret_from_fork+0x10/0x20
[   26.589633] 
[   26.591111] The buggy address belongs to the object at ffff000800d63020
[   26.591111]  which belongs to the cache kmalloc-16 of size 16
[   26.603438] The buggy address is located 0 bytes inside of
[   26.603438]  allocated 13-byte region [ffff000800d63020, ffff000800d6302d)
[   26.615762] 
[   26.617240] The buggy address belongs to the physical page:
[   26.622797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   26.630781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.637291] page_type: f5(slab)
[   26.640427] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   26.648147] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.655867] page dumped because: kasan: bad access detected
[   26.661421] 
[   26.662896] Memory state around the buggy address:
[   26.667675]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.674879]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.682086] >ffff000800d63000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   26.689285]                                   ^
[   26.693803]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.701007]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.708211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   25.780418] ==================================================================
[   25.790430] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   25.797025] Read of size 1 at addr ffff0008032a0a00 by task kunit_try_catch/211
[   25.804316] 
[   25.805802] CPU: 5 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.805856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.805870] Hardware name: WinLink E850-96 board (DT)
[   25.805891] Call trace:
[   25.805905]  show_stack+0x20/0x38 (C)
[   25.805940]  dump_stack_lvl+0x8c/0xd0
[   25.805979]  print_report+0x118/0x608
[   25.806013]  kasan_report+0xdc/0x128
[   25.806046]  __kasan_check_byte+0x54/0x70
[   25.806076]  krealloc_noprof+0x44/0x360
[   25.806110]  krealloc_uaf+0x180/0x520
[   25.806138]  kunit_try_run_case+0x170/0x3f0
[   25.806175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.806213]  kthread+0x328/0x630
[   25.806241]  ret_from_fork+0x10/0x20
[   25.806274] 
[   25.871155] Allocated by task 211:
[   25.874544]  kasan_save_stack+0x3c/0x68
[   25.878361]  kasan_save_track+0x20/0x40
[   25.882179]  kasan_save_alloc_info+0x40/0x58
[   25.886433]  __kasan_kmalloc+0xd4/0xd8
[   25.890165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.894679]  krealloc_uaf+0xc8/0x520
[   25.898238]  kunit_try_run_case+0x170/0x3f0
[   25.902404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.907874]  kthread+0x328/0x630
[   25.911085]  ret_from_fork+0x10/0x20
[   25.914644] 
[   25.916121] Freed by task 211:
[   25.919158]  kasan_save_stack+0x3c/0x68
[   25.922977]  kasan_save_track+0x20/0x40
[   25.926798]  kasan_save_free_info+0x4c/0x78
[   25.930963]  __kasan_slab_free+0x6c/0x98
[   25.934869]  kfree+0x214/0x3c8
[   25.937907]  krealloc_uaf+0x12c/0x520
[   25.941553]  kunit_try_run_case+0x170/0x3f0
[   25.945719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.951188]  kthread+0x328/0x630
[   25.954400]  ret_from_fork+0x10/0x20
[   25.957959] 
[   25.959436] The buggy address belongs to the object at ffff0008032a0a00
[   25.959436]  which belongs to the cache kmalloc-256 of size 256
[   25.971938] The buggy address is located 0 bytes inside of
[   25.971938]  freed 256-byte region [ffff0008032a0a00, ffff0008032a0b00)
[   25.984000] 
[   25.985478] The buggy address belongs to the physical page:
[   25.991035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   25.999021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.006658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.013602] page_type: f5(slab)
[   26.016738] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.024458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.032186] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.039996] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.047809] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   26.055621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.063426] page dumped because: kasan: bad access detected
[   26.068982] 
[   26.070457] Memory state around the buggy address:
[   26.075240]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.082440]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.089645] >ffff0008032a0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.096846]                    ^
[   26.100061]  ffff0008032a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.107266]  ffff0008032a0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.114470] ==================================================================
[   26.121781] ==================================================================
[   26.128884] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.135476] Read of size 1 at addr ffff0008032a0a00 by task kunit_try_catch/211
[   26.142765] 
[   26.144250] CPU: 5 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.144300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.144315] Hardware name: WinLink E850-96 board (DT)
[   26.144336] Call trace:
[   26.144351]  show_stack+0x20/0x38 (C)
[   26.144381]  dump_stack_lvl+0x8c/0xd0
[   26.144417]  print_report+0x118/0x608
[   26.144449]  kasan_report+0xdc/0x128
[   26.144482]  __asan_report_load1_noabort+0x20/0x30
[   26.144518]  krealloc_uaf+0x4c8/0x520
[   26.144546]  kunit_try_run_case+0x170/0x3f0
[   26.144581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.144618]  kthread+0x328/0x630
[   26.144646]  ret_from_fork+0x10/0x20
[   26.144679] 
[   26.206568] Allocated by task 211:
[   26.209952]  kasan_save_stack+0x3c/0x68
[   26.213773]  kasan_save_track+0x20/0x40
[   26.217591]  kasan_save_alloc_info+0x40/0x58
[   26.221844]  __kasan_kmalloc+0xd4/0xd8
[   26.225577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.230090]  krealloc_uaf+0xc8/0x520
[   26.233649]  kunit_try_run_case+0x170/0x3f0
[   26.237816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.243285]  kthread+0x328/0x630
[   26.246496]  ret_from_fork+0x10/0x20
[   26.250055] 
[   26.251531] Freed by task 211:
[   26.254569]  kasan_save_stack+0x3c/0x68
[   26.258389]  kasan_save_track+0x20/0x40
[   26.262208]  kasan_save_free_info+0x4c/0x78
[   26.266374]  __kasan_slab_free+0x6c/0x98
[   26.270281]  kfree+0x214/0x3c8
[   26.273319]  krealloc_uaf+0x12c/0x520
[   26.276965]  kunit_try_run_case+0x170/0x3f0
[   26.281131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.286600]  kthread+0x328/0x630
[   26.289812]  ret_from_fork+0x10/0x20
[   26.293371] 
[   26.294848] The buggy address belongs to the object at ffff0008032a0a00
[   26.294848]  which belongs to the cache kmalloc-256 of size 256
[   26.307346] The buggy address is located 0 bytes inside of
[   26.307346]  freed 256-byte region [ffff0008032a0a00, ffff0008032a0b00)
[   26.319412] 
[   26.320891] The buggy address belongs to the physical page:
[   26.326446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   26.334431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.342068] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.349012] page_type: f5(slab)
[   26.352147] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.359870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.367596] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.375408] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.383221] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   26.391032] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.398838] page dumped because: kasan: bad access detected
[   26.404393] 
[   26.405869] Memory state around the buggy address:
[   26.410650]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.417851]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.425056] >ffff0008032a0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.432258]                    ^
[   26.435473]  ffff0008032a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.442678]  ffff0008032a0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.449879] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   22.926445] ==================================================================
[   22.933271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.940817] Write of size 1 at addr ffff0008032a08d0 by task kunit_try_catch/205
[   22.948195] 
[   22.949681] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.949733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.949750] Hardware name: WinLink E850-96 board (DT)
[   22.949770] Call trace:
[   22.949786]  show_stack+0x20/0x38 (C)
[   22.949820]  dump_stack_lvl+0x8c/0xd0
[   22.949858]  print_report+0x118/0x608
[   22.949892]  kasan_report+0xdc/0x128
[   22.949928]  __asan_report_store1_noabort+0x20/0x30
[   22.949960]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.949991]  krealloc_less_oob+0x20/0x38
[   22.950020]  kunit_try_run_case+0x170/0x3f0
[   22.950055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.950092]  kthread+0x328/0x630
[   22.950121]  ret_from_fork+0x10/0x20
[   22.950156] 
[   23.017033] Allocated by task 205:
[   23.020418]  kasan_save_stack+0x3c/0x68
[   23.024235]  kasan_save_track+0x20/0x40
[   23.028055]  kasan_save_alloc_info+0x40/0x58
[   23.032309]  __kasan_krealloc+0x118/0x178
[   23.036302]  krealloc_noprof+0x128/0x360
[   23.040207]  krealloc_less_oob_helper+0x168/0xc50
[   23.044895]  krealloc_less_oob+0x20/0x38
[   23.048801]  kunit_try_run_case+0x170/0x3f0
[   23.052969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.058438]  kthread+0x328/0x630
[   23.061649]  ret_from_fork+0x10/0x20
[   23.065207] 
[   23.066684] The buggy address belongs to the object at ffff0008032a0800
[   23.066684]  which belongs to the cache kmalloc-256 of size 256
[   23.079185] The buggy address is located 7 bytes to the right of
[   23.079185]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   23.092117] 
[   23.093596] The buggy address belongs to the physical page:
[   23.099152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   23.107137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.114774] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.121720] page_type: f5(slab)
[   23.124854] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.132574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.140301] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.148112] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.155925] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   23.163737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.171543] page dumped because: kasan: bad access detected
[   23.177098] 
[   23.178573] Memory state around the buggy address:
[   23.183353]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.190556]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.197761] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.204962]                                                  ^
[   23.210782]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.217987]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.225187] ==================================================================
[   25.085531] ==================================================================
[   25.092612] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.100161] Write of size 1 at addr ffff0008032a60da by task kunit_try_catch/209
[   25.107537] 
[   25.109021] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.109074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.109089] Hardware name: WinLink E850-96 board (DT)
[   25.109109] Call trace:
[   25.109123]  show_stack+0x20/0x38 (C)
[   25.109157]  dump_stack_lvl+0x8c/0xd0
[   25.109194]  print_report+0x118/0x608
[   25.109228]  kasan_report+0xdc/0x128
[   25.109261]  __asan_report_store1_noabort+0x20/0x30
[   25.109295]  krealloc_less_oob_helper+0xa80/0xc50
[   25.109327]  krealloc_large_less_oob+0x20/0x38
[   25.109359]  kunit_try_run_case+0x170/0x3f0
[   25.109396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.109433]  kthread+0x328/0x630
[   25.109463]  ret_from_fork+0x10/0x20
[   25.109497] 
[   25.176896] The buggy address belongs to the physical page:
[   25.182454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   25.190439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.198077] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.205019] page_type: f8(unknown)
[   25.208418] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.216137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.223864] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.231674] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.239488] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.247300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.255105] page dumped because: kasan: bad access detected
[   25.260661] 
[   25.262136] Memory state around the buggy address:
[   25.266917]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.274119]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.281324] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.288525]                                                     ^
[   25.294606]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.301810]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.309010] ==================================================================
[   23.846457] ==================================================================
[   23.853485] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.861029] Write of size 1 at addr ffff0008032a08eb by task kunit_try_catch/205
[   23.868408] 
[   23.869892] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.869945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.869961] Hardware name: WinLink E850-96 board (DT)
[   23.869983] Call trace:
[   23.869996]  show_stack+0x20/0x38 (C)
[   23.870028]  dump_stack_lvl+0x8c/0xd0
[   23.870063]  print_report+0x118/0x608
[   23.870097]  kasan_report+0xdc/0x128
[   23.870129]  __asan_report_store1_noabort+0x20/0x30
[   23.870161]  krealloc_less_oob_helper+0xa58/0xc50
[   23.870194]  krealloc_less_oob+0x20/0x38
[   23.870224]  kunit_try_run_case+0x170/0x3f0
[   23.870259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.870295]  kthread+0x328/0x630
[   23.870324]  ret_from_fork+0x10/0x20
[   23.870359] 
[   23.937243] Allocated by task 205:
[   23.940631]  kasan_save_stack+0x3c/0x68
[   23.944448]  kasan_save_track+0x20/0x40
[   23.948268]  kasan_save_alloc_info+0x40/0x58
[   23.952522]  __kasan_krealloc+0x118/0x178
[   23.956514]  krealloc_noprof+0x128/0x360
[   23.960419]  krealloc_less_oob_helper+0x168/0xc50
[   23.965107]  krealloc_less_oob+0x20/0x38
[   23.969013]  kunit_try_run_case+0x170/0x3f0
[   23.973181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.978649]  kthread+0x328/0x630
[   23.981860]  ret_from_fork+0x10/0x20
[   23.985419] 
[   23.986896] The buggy address belongs to the object at ffff0008032a0800
[   23.986896]  which belongs to the cache kmalloc-256 of size 256
[   23.999396] The buggy address is located 34 bytes to the right of
[   23.999396]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   24.012415] 
[   24.013893] The buggy address belongs to the physical page:
[   24.019451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   24.027434] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.035074] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.042017] page_type: f5(slab)
[   24.045154] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.052874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.060599] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.068411] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.076224] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   24.084036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.091841] page dumped because: kasan: bad access detected
[   24.097397] 
[   24.098872] Memory state around the buggy address:
[   24.103654]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.110855]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.118060] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.125261]                                                           ^
[   24.131862]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.139066]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146269] ==================================================================
[   25.316294] ==================================================================
[   25.323425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.330972] Write of size 1 at addr ffff0008032a60ea by task kunit_try_catch/209
[   25.338350] 
[   25.339834] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.339882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.339895] Hardware name: WinLink E850-96 board (DT)
[   25.339915] Call trace:
[   25.339926]  show_stack+0x20/0x38 (C)
[   25.339958]  dump_stack_lvl+0x8c/0xd0
[   25.339992]  print_report+0x118/0x608
[   25.340024]  kasan_report+0xdc/0x128
[   25.340059]  __asan_report_store1_noabort+0x20/0x30
[   25.340089]  krealloc_less_oob_helper+0xae4/0xc50
[   25.340122]  krealloc_large_less_oob+0x20/0x38
[   25.340155]  kunit_try_run_case+0x170/0x3f0
[   25.340191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.340229]  kthread+0x328/0x630
[   25.340258]  ret_from_fork+0x10/0x20
[   25.340292] 
[   25.407707] The buggy address belongs to the physical page:
[   25.413264] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   25.421250] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.428889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.435832] page_type: f8(unknown)
[   25.439226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.446949] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.454675] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.462487] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.470300] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.478112] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.485917] page dumped because: kasan: bad access detected
[   25.491473] 
[   25.492949] Memory state around the buggy address:
[   25.497729]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.504931]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.512136] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.519337]                                                           ^
[   25.525938]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.533143]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.540344] ==================================================================
[   25.547658] ==================================================================
[   25.554759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.562307] Write of size 1 at addr ffff0008032a60eb by task kunit_try_catch/209
[   25.569684] 
[   25.571169] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.571219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.571235] Hardware name: WinLink E850-96 board (DT)
[   25.571255] Call trace:
[   25.571268]  show_stack+0x20/0x38 (C)
[   25.571301]  dump_stack_lvl+0x8c/0xd0
[   25.571335]  print_report+0x118/0x608
[   25.571371]  kasan_report+0xdc/0x128
[   25.571404]  __asan_report_store1_noabort+0x20/0x30
[   25.571435]  krealloc_less_oob_helper+0xa58/0xc50
[   25.571464]  krealloc_large_less_oob+0x20/0x38
[   25.571493]  kunit_try_run_case+0x170/0x3f0
[   25.571525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.571559]  kthread+0x328/0x630
[   25.571587]  ret_from_fork+0x10/0x20
[   25.571620] 
[   25.639042] The buggy address belongs to the physical page:
[   25.644598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   25.652584] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.660221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.667165] page_type: f8(unknown)
[   25.670562] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.678283] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.686009] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.693820] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.701634] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.709445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.717251] page dumped because: kasan: bad access detected
[   25.722807] 
[   25.724282] Memory state around the buggy address:
[   25.729061]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.736265]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.743470] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.750670]                                                           ^
[   25.757271]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.764476]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.771677] ==================================================================
[   22.617770] ==================================================================
[   22.627200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.634748] Write of size 1 at addr ffff0008032a08c9 by task kunit_try_catch/205
[   22.642125] 
[   22.643611] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.643662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.643678] Hardware name: WinLink E850-96 board (DT)
[   22.643699] Call trace:
[   22.643713]  show_stack+0x20/0x38 (C)
[   22.643750]  dump_stack_lvl+0x8c/0xd0
[   22.643786]  print_report+0x118/0x608
[   22.643824]  kasan_report+0xdc/0x128
[   22.643857]  __asan_report_store1_noabort+0x20/0x30
[   22.643889]  krealloc_less_oob_helper+0xa48/0xc50
[   22.643922]  krealloc_less_oob+0x20/0x38
[   22.643950]  kunit_try_run_case+0x170/0x3f0
[   22.643988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.644026]  kthread+0x328/0x630
[   22.644058]  ret_from_fork+0x10/0x20
[   22.644096] 
[   22.710960] Allocated by task 205:
[   22.714347]  kasan_save_stack+0x3c/0x68
[   22.718164]  kasan_save_track+0x20/0x40
[   22.721985]  kasan_save_alloc_info+0x40/0x58
[   22.726237]  __kasan_krealloc+0x118/0x178
[   22.730230]  krealloc_noprof+0x128/0x360
[   22.734136]  krealloc_less_oob_helper+0x168/0xc50
[   22.738824]  krealloc_less_oob+0x20/0x38
[   22.742730]  kunit_try_run_case+0x170/0x3f0
[   22.746896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.752365]  kthread+0x328/0x630
[   22.755578]  ret_from_fork+0x10/0x20
[   22.759135] 
[   22.760614] The buggy address belongs to the object at ffff0008032a0800
[   22.760614]  which belongs to the cache kmalloc-256 of size 256
[   22.773113] The buggy address is located 0 bytes to the right of
[   22.773113]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   22.786046] 
[   22.787523] The buggy address belongs to the physical page:
[   22.793081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   22.801065] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.808702] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.815648] page_type: f5(slab)
[   22.818784] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.826503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.834232] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.842042] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.849853] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   22.857665] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.865471] page dumped because: kasan: bad access detected
[   22.871026] 
[   22.872502] Memory state around the buggy address:
[   22.877285]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.884485]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.891689] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.898890]                                               ^
[   22.904449]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.911654]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.918858] ==================================================================
[   24.855166] ==================================================================
[   24.862060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.869608] Write of size 1 at addr ffff0008032a60d0 by task kunit_try_catch/209
[   24.876986] 
[   24.878470] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.878526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.878543] Hardware name: WinLink E850-96 board (DT)
[   24.878565] Call trace:
[   24.878578]  show_stack+0x20/0x38 (C)
[   24.878612]  dump_stack_lvl+0x8c/0xd0
[   24.878649]  print_report+0x118/0x608
[   24.878682]  kasan_report+0xdc/0x128
[   24.878715]  __asan_report_store1_noabort+0x20/0x30
[   24.878750]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.878783]  krealloc_large_less_oob+0x20/0x38
[   24.878813]  kunit_try_run_case+0x170/0x3f0
[   24.878848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.878888]  kthread+0x328/0x630
[   24.878918]  ret_from_fork+0x10/0x20
[   24.878952] 
[   24.946344] The buggy address belongs to the physical page:
[   24.951900] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   24.959887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.967524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.974467] page_type: f8(unknown)
[   24.977865] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.985585] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.993311] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.001122] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.008936] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   25.016747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.024553] page dumped because: kasan: bad access detected
[   25.030108] 
[   25.031584] Memory state around the buggy address:
[   25.036365]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.043567]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.050772] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.057972]                                                  ^
[   25.063792]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.070997]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.078198] ==================================================================
[   23.232510] ==================================================================
[   23.239599] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.247149] Write of size 1 at addr ffff0008032a08da by task kunit_try_catch/205
[   23.254529] 
[   23.256013] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.256067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.256083] Hardware name: WinLink E850-96 board (DT)
[   23.256102] Call trace:
[   23.256115]  show_stack+0x20/0x38 (C)
[   23.256150]  dump_stack_lvl+0x8c/0xd0
[   23.256185]  print_report+0x118/0x608
[   23.256219]  kasan_report+0xdc/0x128
[   23.256251]  __asan_report_store1_noabort+0x20/0x30
[   23.256283]  krealloc_less_oob_helper+0xa80/0xc50
[   23.256315]  krealloc_less_oob+0x20/0x38
[   23.256344]  kunit_try_run_case+0x170/0x3f0
[   23.256380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.256419]  kthread+0x328/0x630
[   23.256448]  ret_from_fork+0x10/0x20
[   23.256480] 
[   23.323363] Allocated by task 205:
[   23.326750]  kasan_save_stack+0x3c/0x68
[   23.330569]  kasan_save_track+0x20/0x40
[   23.334387]  kasan_save_alloc_info+0x40/0x58
[   23.338641]  __kasan_krealloc+0x118/0x178
[   23.342634]  krealloc_noprof+0x128/0x360
[   23.346540]  krealloc_less_oob_helper+0x168/0xc50
[   23.351227]  krealloc_less_oob+0x20/0x38
[   23.355133]  kunit_try_run_case+0x170/0x3f0
[   23.359302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.364769]  kthread+0x328/0x630
[   23.367981]  ret_from_fork+0x10/0x20
[   23.371539] 
[   23.373017] The buggy address belongs to the object at ffff0008032a0800
[   23.373017]  which belongs to the cache kmalloc-256 of size 256
[   23.385517] The buggy address is located 17 bytes to the right of
[   23.385517]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   23.398535] 
[   23.400013] The buggy address belongs to the physical page:
[   23.405573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   23.413556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.421193] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.428137] page_type: f5(slab)
[   23.431272] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.438995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.446720] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.454531] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.462344] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   23.470156] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.477962] page dumped because: kasan: bad access detected
[   23.483517] 
[   23.484992] Memory state around the buggy address:
[   23.489772]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.496976]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.504180] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.511381]                                                     ^
[   23.517461]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.524666]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.531867] ==================================================================
[   23.539190] ==================================================================
[   23.546280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.553829] Write of size 1 at addr ffff0008032a08ea by task kunit_try_catch/205
[   23.561207] 
[   23.562691] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.562742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.562756] Hardware name: WinLink E850-96 board (DT)
[   23.562774] Call trace:
[   23.562787]  show_stack+0x20/0x38 (C)
[   23.562821]  dump_stack_lvl+0x8c/0xd0
[   23.562856]  print_report+0x118/0x608
[   23.562891]  kasan_report+0xdc/0x128
[   23.562923]  __asan_report_store1_noabort+0x20/0x30
[   23.562952]  krealloc_less_oob_helper+0xae4/0xc50
[   23.562984]  krealloc_less_oob+0x20/0x38
[   23.563013]  kunit_try_run_case+0x170/0x3f0
[   23.563046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.563081]  kthread+0x328/0x630
[   23.563109]  ret_from_fork+0x10/0x20
[   23.563142] 
[   23.630043] Allocated by task 205:
[   23.633428]  kasan_save_stack+0x3c/0x68
[   23.637249]  kasan_save_track+0x20/0x40
[   23.641068]  kasan_save_alloc_info+0x40/0x58
[   23.645320]  __kasan_krealloc+0x118/0x178
[   23.649313]  krealloc_noprof+0x128/0x360
[   23.653219]  krealloc_less_oob_helper+0x168/0xc50
[   23.657907]  krealloc_less_oob+0x20/0x38
[   23.661815]  kunit_try_run_case+0x170/0x3f0
[   23.665981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.671448]  kthread+0x328/0x630
[   23.674660]  ret_from_fork+0x10/0x20
[   23.678219] 
[   23.679696] The buggy address belongs to the object at ffff0008032a0800
[   23.679696]  which belongs to the cache kmalloc-256 of size 256
[   23.692195] The buggy address is located 33 bytes to the right of
[   23.692195]  allocated 201-byte region [ffff0008032a0800, ffff0008032a08c9)
[   23.705215] 
[   23.706693] The buggy address belongs to the physical page:
[   23.712248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0
[   23.720234] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.727874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.734817] page_type: f5(slab)
[   23.737951] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.745673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.753399] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.761211] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.769024] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff
[   23.776835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.784641] page dumped because: kasan: bad access detected
[   23.790196] 
[   23.791672] Memory state around the buggy address:
[   23.796451]  ffff0008032a0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.803655]  ffff0008032a0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.810860] >ffff0008032a0880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.818061]                                                           ^
[   23.824661]  ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.831866]  ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.839067] ==================================================================
[   24.621849] ==================================================================
[   24.631768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.639317] Write of size 1 at addr ffff0008032a60c9 by task kunit_try_catch/209
[   24.646696] 
[   24.648179] CPU: 5 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.648234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.648250] Hardware name: WinLink E850-96 board (DT)
[   24.648269] Call trace:
[   24.648283]  show_stack+0x20/0x38 (C)
[   24.648320]  dump_stack_lvl+0x8c/0xd0
[   24.648356]  print_report+0x118/0x608
[   24.648393]  kasan_report+0xdc/0x128
[   24.648428]  __asan_report_store1_noabort+0x20/0x30
[   24.648459]  krealloc_less_oob_helper+0xa48/0xc50
[   24.648495]  krealloc_large_less_oob+0x20/0x38
[   24.648527]  kunit_try_run_case+0x170/0x3f0
[   24.648563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.648600]  kthread+0x328/0x630
[   24.648631]  ret_from_fork+0x10/0x20
[   24.648665] 
[   24.716054] The buggy address belongs to the physical page:
[   24.721609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   24.729595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.737234] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.744176] page_type: f8(unknown)
[   24.747572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.755294] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.763019] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.770831] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.778644] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   24.786456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.794261] page dumped because: kasan: bad access detected
[   24.799817] 
[   24.801292] Memory state around the buggy address:
[   24.806077]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.813275]  ffff0008032a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.820480] >ffff0008032a6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.827680]                                               ^
[   24.833240]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.840445]  ffff0008032a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.847647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   24.388718] ==================================================================
[   24.395834] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.403382] Write of size 1 at addr ffff0008033820f0 by task kunit_try_catch/207
[   24.410760] 
[   24.412245] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.412301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.412316] Hardware name: WinLink E850-96 board (DT)
[   24.412337] Call trace:
[   24.412352]  show_stack+0x20/0x38 (C)
[   24.412389]  dump_stack_lvl+0x8c/0xd0
[   24.412423]  print_report+0x118/0x608
[   24.412457]  kasan_report+0xdc/0x128
[   24.412492]  __asan_report_store1_noabort+0x20/0x30
[   24.412524]  krealloc_more_oob_helper+0x5c0/0x678
[   24.412556]  krealloc_large_more_oob+0x20/0x38
[   24.412588]  kunit_try_run_case+0x170/0x3f0
[   24.412624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.412658]  kthread+0x328/0x630
[   24.412686]  ret_from_fork+0x10/0x20
[   24.412720] 
[   24.480118] The buggy address belongs to the physical page:
[   24.485676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883380
[   24.493658] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.501299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.508242] page_type: f8(unknown)
[   24.511636] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.519359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.527085] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.534897] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.542710] head: 0bfffe0000000002 fffffdffe00ce001 00000000ffffffff 00000000ffffffff
[   24.550522] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.558327] page dumped because: kasan: bad access detected
[   24.563883] 
[   24.565358] Memory state around the buggy address:
[   24.570139]  ffff000803381f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.577341]  ffff000803382000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.584546] >ffff000803382080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.591747]                                                              ^
[   24.598608]  ffff000803382100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.605813]  ffff000803382180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.613014] ==================================================================
[   21.999689] ==================================================================
[   22.008891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.016440] Write of size 1 at addr ffff0008033508eb by task kunit_try_catch/203
[   22.023818] 
[   22.025304] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.025362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.025381] Hardware name: WinLink E850-96 board (DT)
[   22.025400] Call trace:
[   22.025415]  show_stack+0x20/0x38 (C)
[   22.025452]  dump_stack_lvl+0x8c/0xd0
[   22.025487]  print_report+0x118/0x608
[   22.025525]  kasan_report+0xdc/0x128
[   22.025560]  __asan_report_store1_noabort+0x20/0x30
[   22.025594]  krealloc_more_oob_helper+0x60c/0x678
[   22.025628]  krealloc_more_oob+0x20/0x38
[   22.025657]  kunit_try_run_case+0x170/0x3f0
[   22.025695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.025733]  kthread+0x328/0x630
[   22.025761]  ret_from_fork+0x10/0x20
[   22.025798] 
[   22.092654] Allocated by task 203:
[   22.096041]  kasan_save_stack+0x3c/0x68
[   22.099857]  kasan_save_track+0x20/0x40
[   22.103677]  kasan_save_alloc_info+0x40/0x58
[   22.107930]  __kasan_krealloc+0x118/0x178
[   22.111923]  krealloc_noprof+0x128/0x360
[   22.115829]  krealloc_more_oob_helper+0x168/0x678
[   22.120517]  krealloc_more_oob+0x20/0x38
[   22.124423]  kunit_try_run_case+0x170/0x3f0
[   22.128591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.134058]  kthread+0x328/0x630
[   22.137270]  ret_from_fork+0x10/0x20
[   22.140829] 
[   22.142306] The buggy address belongs to the object at ffff000803350800
[   22.142306]  which belongs to the cache kmalloc-256 of size 256
[   22.154807] The buggy address is located 0 bytes to the right of
[   22.154807]  allocated 235-byte region [ffff000803350800, ffff0008033508eb)
[   22.167738] 
[   22.169218] The buggy address belongs to the physical page:
[   22.174774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883350
[   22.182757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.190396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.197341] page_type: f5(slab)
[   22.200477] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.208196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.215924] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.223734] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.231546] head: 0bfffe0000000002 fffffdffe00cd401 00000000ffffffff 00000000ffffffff
[   22.239359] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.247165] page dumped because: kasan: bad access detected
[   22.252721] 
[   22.254195] Memory state around the buggy address:
[   22.258976]  ffff000803350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.266180]  ffff000803350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.273382] >ffff000803350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.280584]                                                           ^
[   22.287184]  ffff000803350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.294389]  ffff000803350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.301593] ==================================================================
[   24.155102] ==================================================================
[   24.164500] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.172050] Write of size 1 at addr ffff0008033820eb by task kunit_try_catch/207
[   24.179427] 
[   24.180911] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   24.180972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.180989] Hardware name: WinLink E850-96 board (DT)
[   24.181007] Call trace:
[   24.181021]  show_stack+0x20/0x38 (C)
[   24.181055]  dump_stack_lvl+0x8c/0xd0
[   24.181091]  print_report+0x118/0x608
[   24.181128]  kasan_report+0xdc/0x128
[   24.181160]  __asan_report_store1_noabort+0x20/0x30
[   24.181194]  krealloc_more_oob_helper+0x60c/0x678
[   24.181232]  krealloc_large_more_oob+0x20/0x38
[   24.181264]  kunit_try_run_case+0x170/0x3f0
[   24.181299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.181336]  kthread+0x328/0x630
[   24.181366]  ret_from_fork+0x10/0x20
[   24.181401] 
[   24.248787] The buggy address belongs to the physical page:
[   24.254342] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883380
[   24.262328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.269965] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.276909] page_type: f8(unknown)
[   24.280304] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.288026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.295753] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.303564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.311377] head: 0bfffe0000000002 fffffdffe00ce001 00000000ffffffff 00000000ffffffff
[   24.319189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.326994] page dumped because: kasan: bad access detected
[   24.332549] 
[   24.334025] Memory state around the buggy address:
[   24.338809]  ffff000803381f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.346008]  ffff000803382000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.353213] >ffff000803382080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.360414]                                                           ^
[   24.367014]  ffff000803382100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.374219]  ffff000803382180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.381422] ==================================================================
[   22.308913] ==================================================================
[   22.316004] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.323552] Write of size 1 at addr ffff0008033508f0 by task kunit_try_catch/203
[   22.330930] 
[   22.332415] CPU: 7 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.332470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.332484] Hardware name: WinLink E850-96 board (DT)
[   22.332504] Call trace:
[   22.332518]  show_stack+0x20/0x38 (C)
[   22.332552]  dump_stack_lvl+0x8c/0xd0
[   22.332587]  print_report+0x118/0x608
[   22.332623]  kasan_report+0xdc/0x128
[   22.332655]  __asan_report_store1_noabort+0x20/0x30
[   22.332689]  krealloc_more_oob_helper+0x5c0/0x678
[   22.332720]  krealloc_more_oob+0x20/0x38
[   22.332752]  kunit_try_run_case+0x170/0x3f0
[   22.332786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.332822]  kthread+0x328/0x630
[   22.332850]  ret_from_fork+0x10/0x20
[   22.332884] 
[   22.399766] Allocated by task 203:
[   22.403153]  kasan_save_stack+0x3c/0x68
[   22.406971]  kasan_save_track+0x20/0x40
[   22.410790]  kasan_save_alloc_info+0x40/0x58
[   22.415043]  __kasan_krealloc+0x118/0x178
[   22.419036]  krealloc_noprof+0x128/0x360
[   22.422943]  krealloc_more_oob_helper+0x168/0x678
[   22.427630]  krealloc_more_oob+0x20/0x38
[   22.431536]  kunit_try_run_case+0x170/0x3f0
[   22.435704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.441172]  kthread+0x328/0x630
[   22.444383]  ret_from_fork+0x10/0x20
[   22.447942] 
[   22.449419] The buggy address belongs to the object at ffff000803350800
[   22.449419]  which belongs to the cache kmalloc-256 of size 256
[   22.461918] The buggy address is located 5 bytes to the right of
[   22.461918]  allocated 235-byte region [ffff000803350800, ffff0008033508eb)
[   22.474852] 
[   22.476329] The buggy address belongs to the physical page:
[   22.481888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883350
[   22.489870] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.497509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.504452] page_type: f5(slab)
[   22.507588] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.515309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.523036] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.530847] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.538660] head: 0bfffe0000000002 fffffdffe00cd401 00000000ffffffff 00000000ffffffff
[   22.546472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.554278] page dumped because: kasan: bad access detected
[   22.559833] 
[   22.561308] Memory state around the buggy address:
[   22.566087]  ffff000803350780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.573294]  ffff000803350800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.580496] >ffff000803350880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.587697]                                                              ^
[   22.594558]  ffff000803350900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601763]  ffff000803350980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.608965] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   21.809320] ==================================================================
[   21.823564] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   21.829897] Read of size 1 at addr ffff000806080000 by task kunit_try_catch/201
[   21.837188] 
[   21.838674] CPU: 5 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.838731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.838748] Hardware name: WinLink E850-96 board (DT)
[   21.838769] Call trace:
[   21.838783]  show_stack+0x20/0x38 (C)
[   21.838820]  dump_stack_lvl+0x8c/0xd0
[   21.838857]  print_report+0x118/0x608
[   21.838894]  kasan_report+0xdc/0x128
[   21.838927]  __asan_report_load1_noabort+0x20/0x30
[   21.838969]  page_alloc_uaf+0x328/0x350
[   21.838999]  kunit_try_run_case+0x170/0x3f0
[   21.839035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.839072]  kthread+0x328/0x630
[   21.839104]  ret_from_fork+0x10/0x20
[   21.839141] 
[   21.901165] The buggy address belongs to the physical page:
[   21.906723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886080
[   21.914706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.921216] page_type: f0(buddy)
[   21.924439] raw: 0bfffe0000000000 ffff00087f61bd98 ffff00087f61bd98 0000000000000000
[   21.932158] raw: 0000000000000000 0000000000000007 00000000f0000000 0000000000000000
[   21.939879] page dumped because: kasan: bad access detected
[   21.945432] 
[   21.946908] Memory state around the buggy address:
[   21.951689]  ffff00080607ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.958891]  ffff00080607ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.966096] >ffff000806080000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.973297]                    ^
[   21.976512]  ffff000806080080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.983717]  ffff000806080100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.990921] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   21.574028] ==================================================================
[   21.583291] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   21.588669] Free of addr ffff0008032a4001 by task kunit_try_catch/197
[   21.595091] 
[   21.596578] CPU: 5 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.596638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.596656] Hardware name: WinLink E850-96 board (DT)
[   21.596675] Call trace:
[   21.596688]  show_stack+0x20/0x38 (C)
[   21.596724]  dump_stack_lvl+0x8c/0xd0
[   21.596760]  print_report+0x118/0x608
[   21.596795]  kasan_report_invalid_free+0xc0/0xe8
[   21.596831]  __kasan_kfree_large+0x5c/0xa8
[   21.596866]  free_large_kmalloc+0x64/0x190
[   21.596899]  kfree+0x270/0x3c8
[   21.596927]  kmalloc_large_invalid_free+0x108/0x270
[   21.596959]  kunit_try_run_case+0x170/0x3f0
[   21.596995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.597033]  kthread+0x328/0x630
[   21.597062]  ret_from_fork+0x10/0x20
[   21.597095] 
[   21.667575] The buggy address belongs to the physical page:
[   21.673132] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   21.681116] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.688755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.695696] page_type: f8(unknown)
[   21.699097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.706814] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.714543] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.722352] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.730165] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   21.737977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.745783] page dumped because: kasan: bad access detected
[   21.751338] 
[   21.752813] Memory state around the buggy address:
[   21.757597]  ffff0008032a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.764797]  ffff0008032a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.772003] >ffff0008032a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.779202]                    ^
[   21.782418]  ffff0008032a4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.789623]  ffff0008032a4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.796825] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   21.390510] ==================================================================
[   21.400478] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   21.407074] Read of size 1 at addr ffff00080337c000 by task kunit_try_catch/195
[   21.414364] 
[   21.415852] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.415907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.415928] Hardware name: WinLink E850-96 board (DT)
[   21.415947] Call trace:
[   21.415962]  show_stack+0x20/0x38 (C)
[   21.415998]  dump_stack_lvl+0x8c/0xd0
[   21.416035]  print_report+0x118/0x608
[   21.416074]  kasan_report+0xdc/0x128
[   21.416108]  __asan_report_load1_noabort+0x20/0x30
[   21.416146]  kmalloc_large_uaf+0x2cc/0x2f8
[   21.416179]  kunit_try_run_case+0x170/0x3f0
[   21.416216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.416255]  kthread+0x328/0x630
[   21.416286]  ret_from_fork+0x10/0x20
[   21.416321] 
[   21.478601] The buggy address belongs to the physical page:
[   21.484158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88337c
[   21.492142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.498666] raw: 0bfffe0000000000 fffffdffe00ce008 ffff00085b006f40 0000000000000000
[   21.506383] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.514105] page dumped because: kasan: bad access detected
[   21.519658] 
[   21.521133] Memory state around the buggy address:
[   21.525914]  ffff00080337bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.533118]  ffff00080337bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540321] >ffff00080337c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.547522]                    ^
[   21.550738]  ffff00080337c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.557942]  ffff00080337c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.565145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   21.163014] ==================================================================
[   21.172618] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   21.180080] Write of size 1 at addr ffff0008032a600a by task kunit_try_catch/193
[   21.187458] 
[   21.188945] CPU: 5 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.189005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.189022] Hardware name: WinLink E850-96 board (DT)
[   21.189044] Call trace:
[   21.189060]  show_stack+0x20/0x38 (C)
[   21.189096]  dump_stack_lvl+0x8c/0xd0
[   21.189134]  print_report+0x118/0x608
[   21.189170]  kasan_report+0xdc/0x128
[   21.189206]  __asan_report_store1_noabort+0x20/0x30
[   21.189237]  kmalloc_large_oob_right+0x278/0x2b8
[   21.189270]  kunit_try_run_case+0x170/0x3f0
[   21.189307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.189345]  kthread+0x328/0x630
[   21.189375]  ret_from_fork+0x10/0x20
[   21.189413] 
[   21.252304] The buggy address belongs to the physical page:
[   21.257861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a4
[   21.265844] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.273484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.280425] page_type: f8(unknown)
[   21.283823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.291543] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.299272] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.307080] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.314894] head: 0bfffe0000000002 fffffdffe00ca901 00000000ffffffff 00000000ffffffff
[   21.322705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.330511] page dumped because: kasan: bad access detected
[   21.336067] 
[   21.337542] Memory state around the buggy address:
[   21.342324]  ffff0008032a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.349526]  ffff0008032a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.356730] >ffff0008032a6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.363931]                       ^
[   21.367407]  ffff0008032a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.374612]  ffff0008032a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.381815] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   20.862235] ==================================================================
[   20.873065] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   20.880348] Write of size 1 at addr ffff000805d69f00 by task kunit_try_catch/191
[   20.887723] 
[   20.889211] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.889268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.889285] Hardware name: WinLink E850-96 board (DT)
[   20.889306] Call trace:
[   20.889321]  show_stack+0x20/0x38 (C)
[   20.889360]  dump_stack_lvl+0x8c/0xd0
[   20.889398]  print_report+0x118/0x608
[   20.889433]  kasan_report+0xdc/0x128
[   20.889466]  __asan_report_store1_noabort+0x20/0x30
[   20.889497]  kmalloc_big_oob_right+0x2a4/0x2f0
[   20.889528]  kunit_try_run_case+0x170/0x3f0
[   20.889564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.889601]  kthread+0x328/0x630
[   20.889632]  ret_from_fork+0x10/0x20
[   20.889667] 
[   20.952393] Allocated by task 191:
[   20.955781]  kasan_save_stack+0x3c/0x68
[   20.959598]  kasan_save_track+0x20/0x40
[   20.963416]  kasan_save_alloc_info+0x40/0x58
[   20.967669]  __kasan_kmalloc+0xd4/0xd8
[   20.971403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.975916]  kmalloc_big_oob_right+0xb8/0x2f0
[   20.980257]  kunit_try_run_case+0x170/0x3f0
[   20.984423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.989891]  kthread+0x328/0x630
[   20.993103]  ret_from_fork+0x10/0x20
[   20.996662] 
[   20.998139] The buggy address belongs to the object at ffff000805d68000
[   20.998139]  which belongs to the cache kmalloc-8k of size 8192
[   21.010640] The buggy address is located 0 bytes to the right of
[   21.010640]  allocated 7936-byte region [ffff000805d68000, ffff000805d69f00)
[   21.023658] 
[   21.025138] The buggy address belongs to the physical page:
[   21.030693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d68
[   21.038677] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.046317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.053261] page_type: f5(slab)
[   21.056397] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.064116] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.071845] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.079653] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.087466] head: 0bfffe0000000003 fffffdffe0175a01 00000000ffffffff 00000000ffffffff
[   21.095278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   21.103084] page dumped because: kasan: bad access detected
[   21.108641] 
[   21.110115] Memory state around the buggy address:
[   21.114896]  ffff000805d69e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.122098]  ffff000805d69e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.129302] >ffff000805d69f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.136504]                    ^
[   21.139720]  ffff000805d69f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.146925]  ffff000805d6a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.154128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   20.394489] ==================================================================
[   20.404316] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.412385] Write of size 1 at addr ffff000801dea278 by task kunit_try_catch/189
[   20.419761] 
[   20.421247] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.421306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.421324] Hardware name: WinLink E850-96 board (DT)
[   20.421346] Call trace:
[   20.421360]  show_stack+0x20/0x38 (C)
[   20.421398]  dump_stack_lvl+0x8c/0xd0
[   20.421436]  print_report+0x118/0x608
[   20.421473]  kasan_report+0xdc/0x128
[   20.421507]  __asan_report_store1_noabort+0x20/0x30
[   20.421540]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.421576]  kunit_try_run_case+0x170/0x3f0
[   20.421616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.421653]  kthread+0x328/0x630
[   20.421681]  ret_from_fork+0x10/0x20
[   20.421715] 
[   20.485213] Allocated by task 189:
[   20.488600]  kasan_save_stack+0x3c/0x68
[   20.492417]  kasan_save_track+0x20/0x40
[   20.496238]  kasan_save_alloc_info+0x40/0x58
[   20.500489]  __kasan_kmalloc+0xd4/0xd8
[   20.504221]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   20.509777]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.514899]  kunit_try_run_case+0x170/0x3f0
[   20.519066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.524534]  kthread+0x328/0x630
[   20.527745]  ret_from_fork+0x10/0x20
[   20.531304] 
[   20.532781] The buggy address belongs to the object at ffff000801dea200
[   20.532781]  which belongs to the cache kmalloc-128 of size 128
[   20.545282] The buggy address is located 0 bytes to the right of
[   20.545282]  allocated 120-byte region [ffff000801dea200, ffff000801dea278)
[   20.558213] 
[   20.559692] The buggy address belongs to the physical page:
[   20.565249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dea
[   20.573233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.580871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.587814] page_type: f5(slab)
[   20.590952] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.598672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.606398] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.614209] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.622022] head: 0bfffe0000000001 fffffdffe0077a81 00000000ffffffff 00000000ffffffff
[   20.629834] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.637640] page dumped because: kasan: bad access detected
[   20.643195] 
[   20.644670] Memory state around the buggy address:
[   20.649452]  ffff000801dea100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.656654]  ffff000801dea180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.663860] >ffff000801dea200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.671059]                                                                 ^
[   20.678181]  ffff000801dea280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685386]  ffff000801dea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.692590] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   20.094886] ==================================================================
[   20.104145] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   20.111521] Read of size 1 at addr ffff000805d61000 by task kunit_try_catch/187
[   20.118811] 
[   20.120297] CPU: 7 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.120353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.120370] Hardware name: WinLink E850-96 board (DT)
[   20.120392] Call trace:
[   20.120408]  show_stack+0x20/0x38 (C)
[   20.120442]  dump_stack_lvl+0x8c/0xd0
[   20.120481]  print_report+0x118/0x608
[   20.120514]  kasan_report+0xdc/0x128
[   20.120546]  __asan_report_load1_noabort+0x20/0x30
[   20.120584]  kmalloc_node_oob_right+0x2f4/0x330
[   20.120619]  kunit_try_run_case+0x170/0x3f0
[   20.120654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.120691]  kthread+0x328/0x630
[   20.120721]  ret_from_fork+0x10/0x20
[   20.120756] 
[   20.183480] Allocated by task 187:
[   20.186867]  kasan_save_stack+0x3c/0x68
[   20.190686]  kasan_save_track+0x20/0x40
[   20.194504]  kasan_save_alloc_info+0x40/0x58
[   20.198757]  __kasan_kmalloc+0xd4/0xd8
[   20.202490]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   20.207438]  kmalloc_node_oob_right+0xbc/0x330
[   20.211866]  kunit_try_run_case+0x170/0x3f0
[   20.216031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.221500]  kthread+0x328/0x630
[   20.224712]  ret_from_fork+0x10/0x20
[   20.228272] 
[   20.229748] The buggy address belongs to the object at ffff000805d60000
[   20.229748]  which belongs to the cache kmalloc-4k of size 4096
[   20.242248] The buggy address is located 0 bytes to the right of
[   20.242248]  allocated 4096-byte region [ffff000805d60000, ffff000805d61000)
[   20.255267] 
[   20.256745] The buggy address belongs to the physical page:
[   20.262303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d60
[   20.270287] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.277923] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.284867] page_type: f5(slab)
[   20.288008] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.295725] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.303452] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.311264] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.319075] head: 0bfffe0000000003 fffffdffe0175801 00000000ffffffff 00000000ffffffff
[   20.326887] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.334693] page dumped because: kasan: bad access detected
[   20.340248] 
[   20.341723] Memory state around the buggy address:
[   20.346504]  ffff000805d60f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.353707]  ffff000805d60f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.360911] >ffff000805d61000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.368112]                    ^
[   20.371328]  ffff000805d61080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.378533]  ffff000805d61100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.385735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   19.828841] ==================================================================
[   19.837914] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   19.844771] Read of size 1 at addr ffff000800c2f01f by task kunit_try_catch/185
[   19.852062] 
[   19.853549] CPU: 5 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.853605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.853622] Hardware name: WinLink E850-96 board (DT)
[   19.853645] Call trace:
[   19.853659]  show_stack+0x20/0x38 (C)
[   19.853700]  dump_stack_lvl+0x8c/0xd0
[   19.853737]  print_report+0x118/0x608
[   19.853776]  kasan_report+0xdc/0x128
[   19.853812]  __asan_report_load1_noabort+0x20/0x30
[   19.853851]  kmalloc_oob_left+0x2ec/0x320
[   19.853881]  kunit_try_run_case+0x170/0x3f0
[   19.853917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.853955]  kthread+0x328/0x630
[   19.853984]  ret_from_fork+0x10/0x20
[   19.854021] 
[   19.916209] Allocated by task 44:
[   19.919512]  kasan_save_stack+0x3c/0x68
[   19.923327]  kasan_save_track+0x20/0x40
[   19.927148]  kasan_save_alloc_info+0x40/0x58
[   19.931400]  __kasan_kmalloc+0xd4/0xd8
[   19.935133]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.940688]  kvasprintf+0xe0/0x180
[   19.944075]  __kthread_create_on_node+0x16c/0x350
[   19.948761]  kthread_create_on_node+0xe4/0x130
[   19.953188]  create_worker+0x380/0x6b8
[   19.956921]  worker_thread+0x808/0xf38
[   19.960653]  kthread+0x328/0x630
[   19.963865]  ret_from_fork+0x10/0x20
[   19.967424] 
[   19.968901] The buggy address belongs to the object at ffff000800c2f000
[   19.968901]  which belongs to the cache kmalloc-16 of size 16
[   19.981228] The buggy address is located 19 bytes to the right of
[   19.981228]  allocated 12-byte region [ffff000800c2f000, ffff000800c2f00c)
[   19.994160] 
[   19.995638] The buggy address belongs to the physical page:
[   20.001195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2f
[   20.009179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.015689] page_type: f5(slab)
[   20.018826] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   20.026545] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.034265] page dumped because: kasan: bad access detected
[   20.039818] 
[   20.041294] Memory state around the buggy address:
[   20.046076]  ffff000800c2ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.053277]  ffff000800c2ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.060483] >ffff000800c2f000: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   20.067683]                             ^
[   20.071680]  ffff000800c2f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.078885]  ffff000800c2f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.086087] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   18.933077] ==================================================================
[   18.939578] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.946521] Write of size 1 at addr ffff000801ad8d73 by task kunit_try_catch/183
[   18.953898] 
[   18.955385] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc1 #1 PREEMPT 
[   18.955443] Tainted: [N]=TEST
[   18.955455] Hardware name: WinLink E850-96 board (DT)
[   18.955475] Call trace:
[   18.955486]  show_stack+0x20/0x38 (C)
[   18.955526]  dump_stack_lvl+0x8c/0xd0
[   18.955562]  print_report+0x118/0x608
[   18.955598]  kasan_report+0xdc/0x128
[   18.955633]  __asan_report_store1_noabort+0x20/0x30
[   18.955666]  kmalloc_oob_right+0x5a4/0x660
[   18.955695]  kunit_try_run_case+0x170/0x3f0
[   18.955732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.955774]  kthread+0x328/0x630
[   18.955802]  ret_from_fork+0x10/0x20
[   18.955838] 
[   19.017006] Allocated by task 183:
[   19.020393]  kasan_save_stack+0x3c/0x68
[   19.024209]  kasan_save_track+0x20/0x40
[   19.028028]  kasan_save_alloc_info+0x40/0x58
[   19.032281]  __kasan_kmalloc+0xd4/0xd8
[   19.036014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.040529]  kmalloc_oob_right+0xb0/0x660
[   19.044523]  kunit_try_run_case+0x170/0x3f0
[   19.048688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.054156]  kthread+0x328/0x630
[   19.057368]  ret_from_fork+0x10/0x20
[   19.060927] 
[   19.062404] The buggy address belongs to the object at ffff000801ad8d00
[   19.062404]  which belongs to the cache kmalloc-128 of size 128
[   19.074905] The buggy address is located 0 bytes to the right of
[   19.074905]  allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73)
[   19.087836] 
[   19.089316] The buggy address belongs to the physical page:
[   19.094872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   19.102856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.110494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.117438] page_type: f5(slab)
[   19.120575] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.128294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.136022] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.143832] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.151645] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   19.159456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.167262] page dumped because: kasan: bad access detected
[   19.172818] 
[   19.174293] Memory state around the buggy address:
[   19.179074]  ffff000801ad8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.186277]  ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.193481] >ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.200682]                                                              ^
[   19.207543]  ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.214750]  ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.221951] ==================================================================
[   19.234510] ==================================================================
[   19.241659] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.248598] Write of size 1 at addr ffff000801ad8d78 by task kunit_try_catch/183
[   19.255977] 
[   19.257461] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.257514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.257528] Hardware name: WinLink E850-96 board (DT)
[   19.257549] Call trace:
[   19.257561]  show_stack+0x20/0x38 (C)
[   19.257593]  dump_stack_lvl+0x8c/0xd0
[   19.257628]  print_report+0x118/0x608
[   19.257663]  kasan_report+0xdc/0x128
[   19.257695]  __asan_report_store1_noabort+0x20/0x30
[   19.257726]  kmalloc_oob_right+0x538/0x660
[   19.257756]  kunit_try_run_case+0x170/0x3f0
[   19.257791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.257829]  kthread+0x328/0x630
[   19.257856]  ret_from_fork+0x10/0x20
[   19.257891] 
[   19.320300] Allocated by task 183:
[   19.323685]  kasan_save_stack+0x3c/0x68
[   19.327503]  kasan_save_track+0x20/0x40
[   19.331322]  kasan_save_alloc_info+0x40/0x58
[   19.335576]  __kasan_kmalloc+0xd4/0xd8
[   19.339309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.343822]  kmalloc_oob_right+0xb0/0x660
[   19.347817]  kunit_try_run_case+0x170/0x3f0
[   19.351982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.357451]  kthread+0x328/0x630
[   19.360662]  ret_from_fork+0x10/0x20
[   19.364221] 
[   19.365698] The buggy address belongs to the object at ffff000801ad8d00
[   19.365698]  which belongs to the cache kmalloc-128 of size 128
[   19.378199] The buggy address is located 5 bytes to the right of
[   19.378199]  allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73)
[   19.391130] 
[   19.392606] The buggy address belongs to the physical page:
[   19.398166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   19.406149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.413788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.420732] page_type: f5(slab)
[   19.423869] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.431588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.439315] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.447126] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.454939] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   19.462751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.470557] page dumped because: kasan: bad access detected
[   19.476112] 
[   19.477588] Memory state around the buggy address:
[   19.482367]  ffff000801ad8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.489571]  ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.496776] >ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.503976]                                                                 ^
[   19.511098]  ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518302]  ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.525504] ==================================================================
[   19.532936] ==================================================================
[   19.539916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.546858] Read of size 1 at addr ffff000801ad8d80 by task kunit_try_catch/183
[   19.554149] 
[   19.555633] CPU: 4 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   19.555687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.555702] Hardware name: WinLink E850-96 board (DT)
[   19.555721] Call trace:
[   19.555732]  show_stack+0x20/0x38 (C)
[   19.555764]  dump_stack_lvl+0x8c/0xd0
[   19.555799]  print_report+0x118/0x608
[   19.555831]  kasan_report+0xdc/0x128
[   19.555865]  __asan_report_load1_noabort+0x20/0x30
[   19.555900]  kmalloc_oob_right+0x5d0/0x660
[   19.555929]  kunit_try_run_case+0x170/0x3f0
[   19.555961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555998]  kthread+0x328/0x630
[   19.556025]  ret_from_fork+0x10/0x20
[   19.556055] 
[   19.618384] Allocated by task 183:
[   19.621770]  kasan_save_stack+0x3c/0x68
[   19.625589]  kasan_save_track+0x20/0x40
[   19.629408]  kasan_save_alloc_info+0x40/0x58
[   19.633662]  __kasan_kmalloc+0xd4/0xd8
[   19.637394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.641908]  kmalloc_oob_right+0xb0/0x660
[   19.645902]  kunit_try_run_case+0x170/0x3f0
[   19.650068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655536]  kthread+0x328/0x630
[   19.658748]  ret_from_fork+0x10/0x20
[   19.662307] 
[   19.663784] The buggy address belongs to the object at ffff000801ad8d00
[   19.663784]  which belongs to the cache kmalloc-128 of size 128
[   19.676283] The buggy address is located 13 bytes to the right of
[   19.676283]  allocated 115-byte region [ffff000801ad8d00, ffff000801ad8d73)
[   19.689303] 
[   19.690781] The buggy address belongs to the physical page:
[   19.696337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ad8
[   19.704322] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.711959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.718903] page_type: f5(slab)
[   19.722038] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.729761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.737487] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.745299] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.753112] head: 0bfffe0000000001 fffffdffe006b601 00000000ffffffff 00000000ffffffff
[   19.760924] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.768729] page dumped because: kasan: bad access detected
[   19.774284] 
[   19.775760] Memory state around the buggy address:
[   19.780538]  ffff000801ad8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.787743]  ffff000801ad8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.794947] >ffff000801ad8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.802149]                    ^
[   19.805364]  ffff000801ad8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.812569]  ffff000801ad8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819770] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  165.175785] WARNING: CPU: 2 PID: 751 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  165.183248] Modules linked in:
[  165.186297] CPU: 2 UID: 0 PID: 751 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc1 #1 PREEMPT 
[  165.196196] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  165.201997] Hardware name: WinLink E850-96 board (DT)
[  165.207035] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  165.213976] pc : intlog10+0x38/0x48
[  165.217447] lr : intlog10_test+0xe4/0x200
[  165.221439] sp : ffff80008b097c10
[  165.224738] x29: ffff80008b097c90 x28: 0000000000000000 x27: 0000000000000000
[  165.231856] x26: 1fffe001003bca01 x25: 0000000000000000 x24: ffff80008b097ce0
[  165.238976] x23: ffff80008b097d00 x22: 0000000000000000 x21: 1ffff00011612f82
[  165.246092] x20: ffff800083cd2fc0 x19: ffff800087d67990 x18: 000000001f59ab94
[  165.253211] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  165.260328] x14: 0000000000000000 x13: 1fffe0010b5eb189 x12: ffff700010f6f381
[  165.267446] x11: 1ffff00010f6f380 x10: ffff700010f6f380 x9 : ffff80008126a2dc
[  165.274564] x8 : ffff800087b79c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  165.281682] x5 : ffff700011612f82 x4 : 1ffff00010facf3a x3 : 1ffff0001079a5f8
[  165.288800] x2 : 1ffff0001079a5f8 x1 : 0000000000000003 x0 : 0000000000000000
[  165.295921] Call trace:
[  165.298353]  intlog10+0x38/0x48 (P)
[  165.301824]  kunit_try_run_case+0x170/0x3f0
[  165.305987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  165.311455]  kthread+0x328/0x630
[  165.314669]  ret_from_fork+0x10/0x20
[  165.318229] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  164.973359] WARNING: CPU: 7 PID: 733 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  164.980649] Modules linked in:
[  164.983695] CPU: 7 UID: 0 PID: 733 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc1 #1 PREEMPT 
[  164.993591] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  164.998528] Hardware name: WinLink E850-96 board (DT)
[  165.003564] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  165.010507] pc : intlog2+0xd8/0xf8
[  165.013891] lr : intlog2_test+0xe4/0x200
[  165.017796] sp : ffff80008af77c10
[  165.021097] x29: ffff80008af77c90 x28: 0000000000000000 x27: 0000000000000000
[  165.028213] x26: 1fffe001003bca61 x25: 0000000000000000 x24: ffff80008af77ce0
[  165.035331] x23: ffff80008af77d00 x22: 0000000000000000 x21: 1ffff000115eef82
[  165.042451] x20: ffff800083cd2ec0 x19: ffff800087d67990 x18: 000000007c333b66
[  165.049567] x17: 0000000000000000 x16: ffff00085b002d28 x15: 0000000000000000
[  165.056685] x14: 00000000f1f1f1f1 x13: 1fffe0010b600589 x12: ffff700010f6f381
[  165.063803] x11: 1ffff00010f6f380 x10: ffff700010f6f380 x9 : ffff80008126a4dc
[  165.070921] x8 : ffff800087b79c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  165.078039] x5 : ffff7000115eef82 x4 : 1ffff00010facf3a x3 : 1ffff0001079a5d8
[  165.085157] x2 : 1ffff0001079a5d8 x1 : 0000000000000003 x0 : 0000000000000000
[  165.092278] Call trace:
[  165.094710]  intlog2+0xd8/0xf8 (P)
[  165.098092]  kunit_try_run_case+0x170/0x3f0
[  165.102259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  165.107726]  kthread+0x328/0x630
[  165.110940]  ret_from_fork+0x10/0x20
[  165.114500] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block KNOWN ISSUE - e850-96: board rootfs mount failed intermittently - /dev/root: Can't open blockdev
[  232.437665] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  232.445906] SMP: stopping secondary CPUs
[  232.449830] Kernel Offset: disabled
[  232.453279] CPU features: 0x1000,00000000,02004ca0,0400721b
[  232.458834] Memory Limit: none
[  232.461905] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---