Hay
Date
June 2, 2025, 2:11 p.m.
Failure - log-parser-boot - internal-error-oops-oops-smp
[  159.824505] Internal error: Oops: 0000000096000005 [#1]  SMP
[  159.830116] Modules linked in:
[  159.833158] CPU: 4 UID: 0 PID: 579 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[  159.843054] Tainted: [B]=BAD_PAGE, [N]=TEST
[  159.847208] Hardware name: WinLink E850-96 board (DT)
[  159.852247] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  159.859187] pc : kunit_test_null_dereference+0x70/0x170
[  159.864394] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  159.870212] sp : ffff80008a437d30
[  159.873508] x29: ffff80008a437d90 x28: 0000000000000000 x27: 0000000000000000
[  159.880627] x26: 1fffe001003aab41 x25: 0000000000000000 x24: 0000000000000004
[  159.887745] x23: ffff000801d55a0c x22: ffff8000811fd6f8 x21: ffff000806bb7c08
[  159.894862] x20: 1ffff00011486fa6 x19: ffff800087ba7990 x18: ffff800087ba7b00
[  159.901980] x17: ffff800081d90744 x16: ffff800083904be4 x15: ffff8000811f04a0
[  159.909098] x14: ffff8000811fb5b8 x13: 1fffe0010b5fa9d0 x12: ffff60010097711c
[  159.916216] x11: 1fffe0010097711b x10: ffff60010097711b x9 : ffff8000811f4b60
[  159.923334] x8 : ffff80008a437c38 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  159.930452] x5 : ffff700011486fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  159.937570] x2 : dfff800000000000 x1 : ffff000804bb8000 x0 : ffff800087ba7990
[  159.944690] Call trace:
[  159.947123]  kunit_test_null_dereference+0x70/0x170 (P)
[  159.952330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  159.957796]  kthread+0x328/0x630
[  159.961008]  ret_from_fork+0x10/0x20
[  159.964579] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  159.970649] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[  226.228849] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  226.237086] SMP: stopping secondary CPUs
[  226.241009] Kernel Offset: disabled
[  226.244459] CPU features: 0x0400,00000000,01002650,0200721b
[  226.250015] Memory Limit: none
[  226.253088] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   97.526827] ==================================================================
[   97.526965] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   97.526965] 
[   97.527103] Use-after-free read at 0x(____ptrval____) (in kfence-#187):
[   97.527212]  test_krealloc+0x51c/0x830
[   97.530362]  kunit_try_run_case+0x170/0x3f0
[   97.534528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.539997]  kthread+0x328/0x630
[   97.543209]  ret_from_fork+0x10/0x20
[   97.546768] 
[   97.548248] kfence-#187: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   97.548248] 
[   97.557881] allocated by task 384 on cpu 5 at 97.526737s (0.031142s ago):
[   97.564664]  test_alloc+0x29c/0x628
[   97.568122]  test_krealloc+0xc0/0x830
[   97.571768]  kunit_try_run_case+0x170/0x3f0
[   97.575934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.581403]  kthread+0x328/0x630
[   97.584615]  ret_from_fork+0x10/0x20
[   97.588175] 
[   97.589653] freed by task 384 on cpu 5 at 97.526766s (0.062884s ago):
[   97.596087]  krealloc_noprof+0x148/0x360
[   97.599979]  test_krealloc+0x1dc/0x830
[   97.603712]  kunit_try_run_case+0x170/0x3f0
[   97.607878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.613347]  kthread+0x328/0x630
[   97.616559]  ret_from_fork+0x10/0x20
[   97.620119] 
[   97.621604] CPU: 5 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   97.631497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   97.635657] Hardware name: WinLink E850-96 board (DT)
[   97.640695] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   97.300235] ==================================================================
[   97.300379] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   97.300379] 
[   97.300541] Use-after-free read at 0x(____ptrval____) (in kfence-#185):
[   97.301436]  test_memcache_typesafe_by_rcu+0x280/0x560
[   97.306556]  kunit_try_run_case+0x170/0x3f0
[   97.310723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.316191]  kthread+0x328/0x630
[   97.319403]  ret_from_fork+0x10/0x20
[   97.322962] 
[   97.324441] kfence-#185: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   97.324441] 
[   97.333554] allocated by task 382 on cpu 4 at 97.250753s (0.082799s ago):
[   97.340337]  test_alloc+0x230/0x628
[   97.343795]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   97.348917]  kunit_try_run_case+0x170/0x3f0
[   97.353083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.358552]  kthread+0x328/0x630
[   97.361763]  ret_from_fork+0x10/0x20
[   97.365324] 
[   97.366800] freed by task 382 on cpu 4 at 97.250770s (0.116028s ago):
[   97.373232]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   97.378343]  kunit_try_run_case+0x170/0x3f0
[   97.382510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   97.387978]  kthread+0x328/0x630
[   97.391190]  ret_from_fork+0x10/0x20
[   97.394751] 
[   97.396237] CPU: 4 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   97.406129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   97.410288] Hardware name: WinLink E850-96 board (DT)
[   97.415326] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   73.768399] ==================================================================
[   73.768602] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   73.768602] 
[   73.768757] Invalid read at 0x(____ptrval____):
[   73.769864]  test_invalid_access+0xdc/0x1f0
[   73.774084]  kunit_try_run_case+0x170/0x3f0
[   73.778224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.783696]  kthread+0x328/0x630
[   73.786907]  ret_from_fork+0x10/0x20
[   73.790436] 
[   73.791947] CPU: 4 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   73.801847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.806032] Hardware name: WinLink E850-96 board (DT)
[   73.811113] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   73.414822] ==================================================================
[   73.414962] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   73.414962] 
[   73.415104] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#180):
[   73.418794]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   73.424001]  kunit_try_run_case+0x170/0x3f0
[   73.428168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.433636]  kthread+0x328/0x630
[   73.436848]  ret_from_fork+0x10/0x20
[   73.440407] 
[   73.441887] kfence-#180: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   73.441887] 
[   73.451520] allocated by task 372 on cpu 4 at 73.414753s (0.036764s ago):
[   73.458299]  test_alloc+0x29c/0x628
[   73.461761]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   73.466882]  kunit_try_run_case+0x170/0x3f0
[   73.471049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.476518]  kthread+0x328/0x630
[   73.479729]  ret_from_fork+0x10/0x20
[   73.483290] 
[   73.484767] freed by task 372 on cpu 4 at 73.414770s (0.069992s ago):
[   73.491204]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   73.496396]  kunit_try_run_case+0x170/0x3f0
[   73.500562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.506031]  kthread+0x328/0x630
[   73.509243]  ret_from_fork+0x10/0x20
[   73.512803] 
[   73.514289] CPU: 4 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   73.524181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.528341] Hardware name: WinLink E850-96 board (DT)
[   73.533378] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   72.995306] ==================================================================
[   72.995443] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   72.995443] 
[   72.995600] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#176):
[   72.997282]  test_kmalloc_aligned_oob_read+0x238/0x468
[   73.002402]  kunit_try_run_case+0x170/0x3f0
[   73.006568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.012037]  kthread+0x328/0x630
[   73.015249]  ret_from_fork+0x10/0x20
[   73.018808] 
[   73.020288] kfence-#176: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   73.020288] 
[   73.029921] allocated by task 370 on cpu 1 at 72.995269s (0.034650s ago):
[   73.036704]  test_alloc+0x29c/0x628
[   73.040162]  test_kmalloc_aligned_oob_read+0x100/0x468
[   73.045283]  kunit_try_run_case+0x170/0x3f0
[   73.049450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.054919]  kthread+0x328/0x630
[   73.058130]  ret_from_fork+0x10/0x20
[   73.061691] 
[   73.063178] CPU: 1 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   73.073069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.077229] Hardware name: WinLink E850-96 board (DT)
[   73.082266] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   68.478830] ==================================================================
[   68.478969] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   68.478969] 
[   68.479096] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#133):
[   68.479258]  test_corruption+0x284/0x378
[   68.482803]  kunit_try_run_case+0x170/0x3f0
[   68.486969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.492438]  kthread+0x328/0x630
[   68.495650]  ret_from_fork+0x10/0x20
[   68.499209] 
[   68.500688] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.500688] 
[   68.510322] allocated by task 358 on cpu 4 at 68.478761s (0.031559s ago):
[   68.517102]  test_alloc+0x29c/0x628
[   68.520563]  test_corruption+0x198/0x378
[   68.524469]  kunit_try_run_case+0x170/0x3f0
[   68.528636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.534104]  kthread+0x328/0x630
[   68.537316]  ret_from_fork+0x10/0x20
[   68.540876] 
[   68.542353] freed by task 358 on cpu 4 at 68.478776s (0.063574s ago):
[   68.548792]  test_corruption+0x284/0x378
[   68.552682]  kunit_try_run_case+0x170/0x3f0
[   68.556847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.562316]  kthread+0x328/0x630
[   68.565527]  ret_from_fork+0x10/0x20
[   68.569088] 
[   68.570573] CPU: 4 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   68.580468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.584626] Hardware name: WinLink E850-96 board (DT)
[   68.589663] ==================================================================
[   69.130847] ==================================================================
[   69.130977] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   69.130977] 
[   69.131104] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#139):
[   69.131262]  test_corruption+0x1d8/0x378
[   69.134810]  kunit_try_run_case+0x170/0x3f0
[   69.138977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.144446]  kthread+0x328/0x630
[   69.147657]  ret_from_fork+0x10/0x20
[   69.151216] 
[   69.152696] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.152696] 
[   69.161809] allocated by task 360 on cpu 5 at 69.130783s (0.031023s ago):
[   69.168589]  test_alloc+0x230/0x628
[   69.172050]  test_corruption+0x198/0x378
[   69.175955]  kunit_try_run_case+0x170/0x3f0
[   69.180122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.185591]  kthread+0x328/0x630
[   69.188802]  ret_from_fork+0x10/0x20
[   69.192363] 
[   69.193838] freed by task 360 on cpu 5 at 69.130800s (0.063036s ago):
[   69.200273]  test_corruption+0x1d8/0x378
[   69.204167]  kunit_try_run_case+0x170/0x3f0
[   69.208334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.213802]  kthread+0x328/0x630
[   69.217014]  ret_from_fork+0x10/0x20
[   69.220574] 
[   69.222061] CPU: 5 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   69.231954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.236112] Hardware name: WinLink E850-96 board (DT)
[   69.241150] ==================================================================
[   68.698799] ==================================================================
[   68.698924] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   68.698924] 
[   68.699052] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#135):
[   68.701459]  test_corruption+0x120/0x378
[   68.705363]  kunit_try_run_case+0x170/0x3f0
[   68.709530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.714999]  kthread+0x328/0x630
[   68.718210]  ret_from_fork+0x10/0x20
[   68.721769] 
[   68.723248] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.723248] 
[   68.732362] allocated by task 360 on cpu 5 at 68.698741s (0.033619s ago):
[   68.739141]  test_alloc+0x230/0x628
[   68.742602]  test_corruption+0xdc/0x378
[   68.746422]  kunit_try_run_case+0x170/0x3f0
[   68.750588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.756057]  kthread+0x328/0x630
[   68.759269]  ret_from_fork+0x10/0x20
[   68.762829] 
[   68.764304] freed by task 360 on cpu 5 at 68.698758s (0.065544s ago):
[   68.770737]  test_corruption+0x120/0x378
[   68.774633]  kunit_try_run_case+0x170/0x3f0
[   68.778799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.784268]  kthread+0x328/0x630
[   68.787480]  ret_from_fork+0x10/0x20
[   68.791040] 
[   68.792525] CPU: 5 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   68.802423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.806578] Hardware name: WinLink E850-96 board (DT)
[   68.811616] ==================================================================
[   68.150810] ==================================================================
[   68.150950] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   68.150950] 
[   68.151076] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#130):
[   68.153484]  test_corruption+0x278/0x378
[   68.157387]  kunit_try_run_case+0x170/0x3f0
[   68.161554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.167023]  kthread+0x328/0x630
[   68.170234]  ret_from_fork+0x10/0x20
[   68.173793] 
[   68.175273] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.175273] 
[   68.184907] allocated by task 358 on cpu 4 at 68.150744s (0.034161s ago):
[   68.191685]  test_alloc+0x29c/0x628
[   68.195147]  test_corruption+0xdc/0x378
[   68.198967]  kunit_try_run_case+0x170/0x3f0
[   68.203133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.208602]  kthread+0x328/0x630
[   68.211814]  ret_from_fork+0x10/0x20
[   68.215372] 
[   68.216852] freed by task 358 on cpu 4 at 68.150760s (0.066088s ago):
[   68.223287]  test_corruption+0x278/0x378
[   68.227178]  kunit_try_run_case+0x170/0x3f0
[   68.231345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.236813]  kthread+0x328/0x630
[   68.240027]  ret_from_fork+0x10/0x20
[   68.243586] 
[   68.245070] CPU: 4 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   68.254964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.259123] Hardware name: WinLink E850-96 board (DT)
[   68.264161] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   67.734800] ==================================================================
[   67.734940] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   67.734940] 
[   67.735068] Invalid free of 0x(____ptrval____) (in kfence-#126):
[   67.735172]  test_invalid_addr_free+0xec/0x238
[   67.738512]  kunit_try_run_case+0x170/0x3f0
[   67.742678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.748147]  kthread+0x328/0x630
[   67.751359]  ret_from_fork+0x10/0x20
[   67.754918] 
[   67.756398] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.756398] 
[   67.765510] allocated by task 356 on cpu 4 at 67.734750s (0.030758s ago):
[   67.772290]  test_alloc+0x230/0x628
[   67.775751]  test_invalid_addr_free+0xd4/0x238
[   67.780178]  kunit_try_run_case+0x170/0x3f0
[   67.784344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.789813]  kthread+0x328/0x630
[   67.793025]  ret_from_fork+0x10/0x20
[   67.796586] 
[   67.798069] CPU: 4 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   67.807965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.812123] Hardware name: WinLink E850-96 board (DT)
[   67.817161] ==================================================================
[   67.526804] ==================================================================
[   67.526930] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   67.526930] 
[   67.527066] Invalid free of 0x(____ptrval____) (in kfence-#124):
[   67.527172]  test_invalid_addr_free+0x1ac/0x238
[   67.530677]  kunit_try_run_case+0x170/0x3f0
[   67.534843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.540312]  kthread+0x328/0x630
[   67.543523]  ret_from_fork+0x10/0x20
[   67.547082] 
[   67.548562] kfence-#124: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.548562] 
[   67.558195] allocated by task 354 on cpu 2 at 67.526751s (0.031442s ago):
[   67.564977]  test_alloc+0x29c/0x628
[   67.568436]  test_invalid_addr_free+0xd4/0x238
[   67.572863]  kunit_try_run_case+0x170/0x3f0
[   67.577030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.582498]  kthread+0x328/0x630
[   67.585710]  ret_from_fork+0x10/0x20
[   67.589271] 
[   67.590757] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   67.600649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.604808] Hardware name: WinLink E850-96 board (DT)
[   67.609846] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   67.306794] ==================================================================
[   67.306921] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   67.306921] 
[   67.307045] Invalid free of 0x(____ptrval____) (in kfence-#122):
[   67.307148]  test_double_free+0x100/0x238
[   67.309625]  kunit_try_run_case+0x170/0x3f0
[   67.313792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.319260]  kthread+0x328/0x630
[   67.322472]  ret_from_fork+0x10/0x20
[   67.326031] 
[   67.327511] kfence-#122: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.327511] 
[   67.336624] allocated by task 352 on cpu 3 at 67.306730s (0.029892s ago):
[   67.343403]  test_alloc+0x230/0x628
[   67.346864]  test_double_free+0xd4/0x238
[   67.350770]  kunit_try_run_case+0x170/0x3f0
[   67.354937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.360406]  kthread+0x328/0x630
[   67.363617]  ret_from_fork+0x10/0x20
[   67.367178] 
[   67.368654] freed by task 352 on cpu 3 at 67.306745s (0.061905s ago):
[   67.375086]  test_double_free+0xf0/0x238
[   67.378982]  kunit_try_run_case+0x170/0x3f0
[   67.383148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.388617]  kthread+0x328/0x630
[   67.391829]  ret_from_fork+0x10/0x20
[   67.395389] 
[   67.396873] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   67.406767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.410927] Hardware name: WinLink E850-96 board (DT)
[   67.415964] ==================================================================
[   67.086825] ==================================================================
[   67.086964] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   67.086964] 
[   67.087087] Invalid free of 0x(____ptrval____) (in kfence-#120):
[   67.087193]  test_double_free+0x1bc/0x238
[   67.089669]  kunit_try_run_case+0x170/0x3f0
[   67.093835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.099304]  kthread+0x328/0x630
[   67.102516]  ret_from_fork+0x10/0x20
[   67.106075] 
[   67.107554] kfence-#120: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.107554] 
[   67.117188] allocated by task 350 on cpu 4 at 67.086748s (0.030437s ago):
[   67.123967]  test_alloc+0x29c/0x628
[   67.127429]  test_double_free+0xd4/0x238
[   67.131335]  kunit_try_run_case+0x170/0x3f0
[   67.135502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.140970]  kthread+0x328/0x630
[   67.144182]  ret_from_fork+0x10/0x20
[   67.147741] 
[   67.149221] freed by task 350 on cpu 4 at 67.086765s (0.062452s ago):
[   67.155654]  test_double_free+0x1ac/0x238
[   67.159633]  kunit_try_run_case+0x170/0x3f0
[   67.163800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.169268]  kthread+0x328/0x630
[   67.172480]  ret_from_fork+0x10/0x20
[   67.176041] 
[   67.177527] CPU: 4 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   67.187420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.191578] Hardware name: WinLink E850-96 board (DT)
[   67.196616] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   66.430800] ==================================================================
[   66.430934] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   66.430934] 
[   66.431083] Use-after-free read at 0x(____ptrval____) (in kfence-#114):
[   66.431557]  test_use_after_free_read+0x114/0x248
[   66.436243]  kunit_try_run_case+0x170/0x3f0
[   66.440410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.445878]  kthread+0x328/0x630
[   66.449090]  ret_from_fork+0x10/0x20
[   66.452649] 
[   66.454129] kfence-#114: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.454129] 
[   66.463763] allocated by task 342 on cpu 3 at 66.430744s (0.033017s ago):
[   66.470546]  test_alloc+0x29c/0x628
[   66.474003]  test_use_after_free_read+0xd0/0x248
[   66.478604]  kunit_try_run_case+0x170/0x3f0
[   66.482770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.488239]  kthread+0x328/0x630
[   66.491451]  ret_from_fork+0x10/0x20
[   66.495010] 
[   66.496490] freed by task 342 on cpu 3 at 66.430759s (0.065725s ago):
[   66.502925]  test_use_after_free_read+0x1c0/0x248
[   66.507597]  kunit_try_run_case+0x170/0x3f0
[   66.511763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.517232]  kthread+0x328/0x630
[   66.520443]  ret_from_fork+0x10/0x20
[   66.524004] 
[   66.525489] CPU: 3 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   66.535383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.539542] Hardware name: WinLink E850-96 board (DT)
[   66.544579] ==================================================================
[   66.654786] ==================================================================
[   66.654928] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   66.654928] 
[   66.655077] Use-after-free read at 0x(____ptrval____) (in kfence-#116):
[   66.655549]  test_use_after_free_read+0x114/0x248
[   66.660234]  kunit_try_run_case+0x170/0x3f0
[   66.664401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.669869]  kthread+0x328/0x630
[   66.673081]  ret_from_fork+0x10/0x20
[   66.676640] 
[   66.678120] kfence-#116: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.678120] 
[   66.687233] allocated by task 344 on cpu 4 at 66.654730s (0.032501s ago):
[   66.694016]  test_alloc+0x230/0x628
[   66.697474]  test_use_after_free_read+0xd0/0x248
[   66.702074]  kunit_try_run_case+0x170/0x3f0
[   66.706240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.711709]  kthread+0x328/0x630
[   66.714921]  ret_from_fork+0x10/0x20
[   66.718481] 
[   66.719957] freed by task 344 on cpu 4 at 66.654746s (0.065210s ago):
[   66.726390]  test_use_after_free_read+0xf0/0x248
[   66.730980]  kunit_try_run_case+0x170/0x3f0
[   66.735146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.740615]  kthread+0x328/0x630
[   66.743827]  ret_from_fork+0x10/0x20
[   66.747387] 
[   66.748873] CPU: 4 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   66.758765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.762925] Hardware name: WinLink E850-96 board (DT)
[   66.767963] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   66.222760] ==================================================================
[   66.222889] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   66.222889] 
[   66.223039] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#112):
[   66.224207]  test_out_of_bounds_write+0x100/0x240
[   66.228893]  kunit_try_run_case+0x170/0x3f0
[   66.233059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.238528]  kthread+0x328/0x630
[   66.241740]  ret_from_fork+0x10/0x20
[   66.245298] 
[   66.246777] kfence-#112: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.246777] 
[   66.255891] allocated by task 340 on cpu 6 at 66.222727s (0.033162s ago):
[   66.262674]  test_alloc+0x230/0x628
[   66.266132]  test_out_of_bounds_write+0xc8/0x240
[   66.270734]  kunit_try_run_case+0x170/0x3f0
[   66.274899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.280368]  kthread+0x328/0x630
[   66.283579]  ret_from_fork+0x10/0x20
[   66.287140] 
[   66.288623] CPU: 6 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   66.298521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.302677] Hardware name: WinLink E850-96 board (DT)
[   66.307715] ==================================================================
[   66.014780] ==================================================================
[   66.014916] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   66.014916] 
[   66.015068] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#110):
[   66.016234]  test_out_of_bounds_write+0x100/0x240
[   66.020920]  kunit_try_run_case+0x170/0x3f0
[   66.025086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.030555]  kthread+0x328/0x630
[   66.033767]  ret_from_fork+0x10/0x20
[   66.037326] 
[   66.038805] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.038805] 
[   66.048439] allocated by task 338 on cpu 3 at 66.014746s (0.033691s ago):
[   66.055222]  test_alloc+0x29c/0x628
[   66.058680]  test_out_of_bounds_write+0xc8/0x240
[   66.063281]  kunit_try_run_case+0x170/0x3f0
[   66.067447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.072916]  kthread+0x328/0x630
[   66.076127]  ret_from_fork+0x10/0x20
[   66.079689] 
[   66.081174] CPU: 3 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   66.091067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.095226] Hardware name: WinLink E850-96 board (DT)
[   66.100263] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   65.806810] ==================================================================
[   65.806958] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   65.806958] 
[   65.807105] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#108):
[   65.808184]  test_out_of_bounds_read+0x1c8/0x3e0
[   65.812783]  kunit_try_run_case+0x170/0x3f0
[   65.816949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.822418]  kthread+0x328/0x630
[   65.825630]  ret_from_fork+0x10/0x20
[   65.829189] 
[   65.830668] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.830668] 
[   65.839781] allocated by task 336 on cpu 4 at 65.806774s (0.033005s ago):
[   65.846565]  test_alloc+0x230/0x628
[   65.850022]  test_out_of_bounds_read+0x198/0x3e0
[   65.854623]  kunit_try_run_case+0x170/0x3f0
[   65.858789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.864258]  kthread+0x328/0x630
[   65.867469]  ret_from_fork+0x10/0x20
[   65.871030] 
[   65.872515] CPU: 4 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   65.882409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.886568] Hardware name: WinLink E850-96 board (DT)
[   65.891605] ==================================================================
[   65.178777] ==================================================================
[   65.178902] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   65.178902] 
[   65.179051] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#102):
[   65.179962]  test_out_of_bounds_read+0x114/0x3e0
[   65.184561]  kunit_try_run_case+0x170/0x3f0
[   65.188727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.194196]  kthread+0x328/0x630
[   65.197408]  ret_from_fork+0x10/0x20
[   65.200966] 
[   65.202446] kfence-#102: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.202446] 
[   65.212080] allocated by task 334 on cpu 3 at 65.178744s (0.033334s ago):
[   65.218863]  test_alloc+0x29c/0x628
[   65.222320]  test_out_of_bounds_read+0xdc/0x3e0
[   65.226835]  kunit_try_run_case+0x170/0x3f0
[   65.231001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.236470]  kthread+0x328/0x630
[   65.239681]  ret_from_fork+0x10/0x20
[   65.243242] 
[   65.244727] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   65.254621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.258780] Hardware name: WinLink E850-96 board (DT)
[   65.263817] ==================================================================
[   65.494765] ==================================================================
[   65.494907] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   65.494907] 
[   65.495056] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#105):
[   65.495964]  test_out_of_bounds_read+0x114/0x3e0
[   65.500563]  kunit_try_run_case+0x170/0x3f0
[   65.504729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.510198]  kthread+0x328/0x630
[   65.513409]  ret_from_fork+0x10/0x20
[   65.516969] 
[   65.518447] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.518447] 
[   65.527561] allocated by task 336 on cpu 4 at 65.494730s (0.032829s ago):
[   65.534344]  test_alloc+0x230/0x628
[   65.537801]  test_out_of_bounds_read+0xdc/0x3e0
[   65.542315]  kunit_try_run_case+0x170/0x3f0
[   65.546482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.551951]  kthread+0x328/0x630
[   65.555162]  ret_from_fork+0x10/0x20
[   65.558723] 
[   65.560207] CPU: 4 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   65.570102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.574261] Hardware name: WinLink E850-96 board (DT)
[   65.579297] ==================================================================
[   65.282751] ==================================================================
[   65.286819] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   65.286819] 
[   65.295846] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#103):
[   65.303224]  test_out_of_bounds_read+0x1c8/0x3e0
[   65.307823]  kunit_try_run_case+0x170/0x3f0
[   65.311990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.317458]  kthread+0x328/0x630
[   65.320670]  ret_from_fork+0x10/0x20
[   65.324229] 
[   65.325708] kfence-#103: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.325708] 
[   65.335342] allocated by task 334 on cpu 3 at 65.282725s (0.052615s ago):
[   65.342123]  test_alloc+0x29c/0x628
[   65.345583]  test_out_of_bounds_read+0x198/0x3e0
[   65.350183]  kunit_try_run_case+0x170/0x3f0
[   65.354350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.359819]  kthread+0x328/0x630
[   65.363031]  ret_from_fork+0x10/0x20
[   65.366589] 
[   65.368075] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   65.377968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.382129] Hardware name: WinLink E850-96 board (DT)
[   65.387163] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   18.628836] ==================================================================
[   18.651582] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   18.651582] 
[   18.661129] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#36):
[   18.669118]  kmalloc_track_caller_oob_right+0x224/0x488
[   18.674324]  kunit_try_run_case+0x170/0x3f0
[   18.678490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.683959]  kthread+0x328/0x630
[   18.687170]  ret_from_fork+0x10/0x20
[   18.690730] 
[   18.692209] kfence-#36: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   18.692209] 
[   18.701930] allocated by task 189 on cpu 5 at 18.628488s (0.073440s ago):
[   18.708714]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.713906]  kunit_try_run_case+0x170/0x3f0
[   18.718073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.723542]  kthread+0x328/0x630
[   18.726753]  ret_from_fork+0x10/0x20
[   18.730312] 
[   18.731792] freed by task 189 on cpu 5 at 18.628796s (0.102992s ago):
[   18.738227]  kmalloc_track_caller_oob_right+0x224/0x488
[   18.743420]  kunit_try_run_case+0x170/0x3f0
[   18.747588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.753055]  kthread+0x328/0x630
[   18.756266]  ret_from_fork+0x10/0x20
[   18.759827] 
[   18.761312] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.771211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.775365] Hardware name: WinLink E850-96 board (DT)
[   18.780403] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   64.664735] ==================================================================
[   64.671730] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   64.678670] Write of size 1 at addr ffff000801c16178 by task kunit_try_catch/332
[   64.686049] 
[   64.687533] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   64.687579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.687596] Hardware name: WinLink E850-96 board (DT)
[   64.687616] Call trace:
[   64.687631]  show_stack+0x20/0x38 (C)
[   64.687665]  dump_stack_lvl+0x8c/0xd0
[   64.687700]  print_report+0x118/0x608
[   64.687731]  kasan_report+0xdc/0x128
[   64.687758]  __asan_report_store1_noabort+0x20/0x30
[   64.687792]  strncpy_from_user+0x270/0x2a0
[   64.687821]  copy_user_test_oob+0x5c0/0xec8
[   64.687849]  kunit_try_run_case+0x170/0x3f0
[   64.687883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.687920]  kthread+0x328/0x630
[   64.687953]  ret_from_fork+0x10/0x20
[   64.687988] 
[   64.754538] Allocated by task 332:
[   64.757924]  kasan_save_stack+0x3c/0x68
[   64.761742]  kasan_save_track+0x20/0x40
[   64.765561]  kasan_save_alloc_info+0x40/0x58
[   64.769815]  __kasan_kmalloc+0xd4/0xd8
[   64.773547]  __kmalloc_noprof+0x198/0x4c8
[   64.777540]  kunit_kmalloc_array+0x34/0x88
[   64.781620]  copy_user_test_oob+0xac/0xec8
[   64.785700]  kunit_try_run_case+0x170/0x3f0
[   64.789866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.795335]  kthread+0x328/0x630
[   64.798547]  ret_from_fork+0x10/0x20
[   64.802106] 
[   64.803583] The buggy address belongs to the object at ffff000801c16100
[   64.803583]  which belongs to the cache kmalloc-128 of size 128
[   64.816083] The buggy address is located 0 bytes to the right of
[   64.816083]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   64.829015] 
[   64.830492] The buggy address belongs to the physical page:
[   64.836050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   64.844032] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.851671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.858617] page_type: f5(slab)
[   64.861748] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.869473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.877199] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.885010] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.892823] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   64.900635] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.908441] page dumped because: kasan: bad access detected
[   64.913996] 
[   64.915472] Memory state around the buggy address:
[   64.920250]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.927455]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.934660] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.941861]                                                                 ^
[   64.948982]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.956187]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.963388] ==================================================================
[   64.355858] ==================================================================
[   64.362881] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   64.369734] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   64.377286] 
[   64.378770] CPU: 6 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   64.378822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.378838] Hardware name: WinLink E850-96 board (DT)
[   64.378860] Call trace:
[   64.378874]  show_stack+0x20/0x38 (C)
[   64.378910]  dump_stack_lvl+0x8c/0xd0
[   64.378944]  print_report+0x118/0x608
[   64.378977]  kasan_report+0xdc/0x128
[   64.379005]  kasan_check_range+0x100/0x1a8
[   64.379037]  __kasan_check_write+0x20/0x30
[   64.379070]  strncpy_from_user+0x3c/0x2a0
[   64.379101]  copy_user_test_oob+0x5c0/0xec8
[   64.379133]  kunit_try_run_case+0x170/0x3f0
[   64.379168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.379207]  kthread+0x328/0x630
[   64.379240]  ret_from_fork+0x10/0x20
[   64.379276] 
[   64.448986] Allocated by task 332:
[   64.452373]  kasan_save_stack+0x3c/0x68
[   64.456191]  kasan_save_track+0x20/0x40
[   64.460010]  kasan_save_alloc_info+0x40/0x58
[   64.464264]  __kasan_kmalloc+0xd4/0xd8
[   64.467998]  __kmalloc_noprof+0x198/0x4c8
[   64.471989]  kunit_kmalloc_array+0x34/0x88
[   64.476069]  copy_user_test_oob+0xac/0xec8
[   64.480149]  kunit_try_run_case+0x170/0x3f0
[   64.484315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.489784]  kthread+0x328/0x630
[   64.492996]  ret_from_fork+0x10/0x20
[   64.496555] 
[   64.498033] The buggy address belongs to the object at ffff000801c16100
[   64.498033]  which belongs to the cache kmalloc-128 of size 128
[   64.510531] The buggy address is located 0 bytes inside of
[   64.510531]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   64.522943] 
[   64.524419] The buggy address belongs to the physical page:
[   64.529979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   64.537962] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.545600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.552545] page_type: f5(slab)
[   64.555676] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.563401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.571127] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.578938] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.586751] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   64.594563] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.602369] page dumped because: kasan: bad access detected
[   64.607925] 
[   64.609400] Memory state around the buggy address:
[   64.614181]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.621383]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.628588] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.635789]                                                                 ^
[   64.642910]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.650117]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.657316] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   62.520854] ==================================================================
[   62.533221] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   62.540251] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   62.547799] 
[   62.549285] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   62.549339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.549359] Hardware name: WinLink E850-96 board (DT)
[   62.549381] Call trace:
[   62.549397]  show_stack+0x20/0x38 (C)
[   62.549433]  dump_stack_lvl+0x8c/0xd0
[   62.549470]  print_report+0x118/0x608
[   62.549500]  kasan_report+0xdc/0x128
[   62.549529]  kasan_check_range+0x100/0x1a8
[   62.549565]  __kasan_check_write+0x20/0x30
[   62.549598]  copy_user_test_oob+0x234/0xec8
[   62.549626]  kunit_try_run_case+0x170/0x3f0
[   62.549662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.549702]  kthread+0x328/0x630
[   62.549735]  ret_from_fork+0x10/0x20
[   62.549770] 
[   62.615508] Allocated by task 332:
[   62.618896]  kasan_save_stack+0x3c/0x68
[   62.622712]  kasan_save_track+0x20/0x40
[   62.626531]  kasan_save_alloc_info+0x40/0x58
[   62.630784]  __kasan_kmalloc+0xd4/0xd8
[   62.634518]  __kmalloc_noprof+0x198/0x4c8
[   62.638511]  kunit_kmalloc_array+0x34/0x88
[   62.642589]  copy_user_test_oob+0xac/0xec8
[   62.646669]  kunit_try_run_case+0x170/0x3f0
[   62.650836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.656304]  kthread+0x328/0x630
[   62.659516]  ret_from_fork+0x10/0x20
[   62.663075] 
[   62.664553] The buggy address belongs to the object at ffff000801c16100
[   62.664553]  which belongs to the cache kmalloc-128 of size 128
[   62.677053] The buggy address is located 0 bytes inside of
[   62.677053]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   62.689464] 
[   62.690943] The buggy address belongs to the physical page:
[   62.696500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   62.704485] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.712121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.719066] page_type: f5(slab)
[   62.722203] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.729923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.737647] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.745459] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.753272] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   62.761084] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.768889] page dumped because: kasan: bad access detected
[   62.774446] 
[   62.775921] Memory state around the buggy address:
[   62.780702]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.787903]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.795109] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.802309]                                                                 ^
[   62.809431]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.816637]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.823838] ==================================================================
[   63.746113] ==================================================================
[   63.752993] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   63.760021] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   63.767573] 
[   63.769058] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   63.769109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.769128] Hardware name: WinLink E850-96 board (DT)
[   63.769149] Call trace:
[   63.769162]  show_stack+0x20/0x38 (C)
[   63.769195]  dump_stack_lvl+0x8c/0xd0
[   63.769229]  print_report+0x118/0x608
[   63.769259]  kasan_report+0xdc/0x128
[   63.769288]  kasan_check_range+0x100/0x1a8
[   63.769321]  __kasan_check_write+0x20/0x30
[   63.769355]  copy_user_test_oob+0x434/0xec8
[   63.769383]  kunit_try_run_case+0x170/0x3f0
[   63.769417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.769455]  kthread+0x328/0x630
[   63.769489]  ret_from_fork+0x10/0x20
[   63.769523] 
[   63.835281] Allocated by task 332:
[   63.838667]  kasan_save_stack+0x3c/0x68
[   63.842485]  kasan_save_track+0x20/0x40
[   63.846304]  kasan_save_alloc_info+0x40/0x58
[   63.850557]  __kasan_kmalloc+0xd4/0xd8
[   63.854290]  __kmalloc_noprof+0x198/0x4c8
[   63.858283]  kunit_kmalloc_array+0x34/0x88
[   63.862363]  copy_user_test_oob+0xac/0xec8
[   63.866443]  kunit_try_run_case+0x170/0x3f0
[   63.870609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.876078]  kthread+0x328/0x630
[   63.879290]  ret_from_fork+0x10/0x20
[   63.882849] 
[   63.884326] The buggy address belongs to the object at ffff000801c16100
[   63.884326]  which belongs to the cache kmalloc-128 of size 128
[   63.896826] The buggy address is located 0 bytes inside of
[   63.896826]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   63.909237] 
[   63.910714] The buggy address belongs to the physical page:
[   63.916272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   63.924257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.931895] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.938839] page_type: f5(slab)
[   63.941974] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.949695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.957421] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.965233] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.973045] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   63.980857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.988663] page dumped because: kasan: bad access detected
[   63.994218] 
[   63.995694] Memory state around the buggy address:
[   64.000473]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.007677]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.014881] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.022082]                                                                 ^
[   64.029204]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.036410]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.043610] ==================================================================
[   62.831312] ==================================================================
[   62.838254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   62.845278] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   62.852742] 
[   62.854229] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   62.854282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.854299] Hardware name: WinLink E850-96 board (DT)
[   62.854321] Call trace:
[   62.854334]  show_stack+0x20/0x38 (C)
[   62.854371]  dump_stack_lvl+0x8c/0xd0
[   62.854408]  print_report+0x118/0x608
[   62.854439]  kasan_report+0xdc/0x128
[   62.854467]  kasan_check_range+0x100/0x1a8
[   62.854500]  __kasan_check_read+0x20/0x30
[   62.854533]  copy_user_test_oob+0x728/0xec8
[   62.854562]  kunit_try_run_case+0x170/0x3f0
[   62.854599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.854639]  kthread+0x328/0x630
[   62.854674]  ret_from_fork+0x10/0x20
[   62.854708] 
[   62.920363] Allocated by task 332:
[   62.923751]  kasan_save_stack+0x3c/0x68
[   62.927568]  kasan_save_track+0x20/0x40
[   62.931387]  kasan_save_alloc_info+0x40/0x58
[   62.935641]  __kasan_kmalloc+0xd4/0xd8
[   62.939375]  __kmalloc_noprof+0x198/0x4c8
[   62.943366]  kunit_kmalloc_array+0x34/0x88
[   62.947446]  copy_user_test_oob+0xac/0xec8
[   62.951526]  kunit_try_run_case+0x170/0x3f0
[   62.955692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.961161]  kthread+0x328/0x630
[   62.964373]  ret_from_fork+0x10/0x20
[   62.967932] 
[   62.969409] The buggy address belongs to the object at ffff000801c16100
[   62.969409]  which belongs to the cache kmalloc-128 of size 128
[   62.981909] The buggy address is located 0 bytes inside of
[   62.981909]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   62.994320] 
[   62.995799] The buggy address belongs to the physical page:
[   63.001355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   63.009341] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.016979] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.023923] page_type: f5(slab)
[   63.027057] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.034777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.042504] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.050316] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.058128] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   63.065940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.073746] page dumped because: kasan: bad access detected
[   63.079301] 
[   63.080777] Memory state around the buggy address:
[   63.085558]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.092760]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.099965] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.107166]                                                                 ^
[   63.114287]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.121493]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.128693] ==================================================================
[   63.441045] ==================================================================
[   63.448140] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   63.455164] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   63.462629] 
[   63.464115] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   63.464172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.464189] Hardware name: WinLink E850-96 board (DT)
[   63.464211] Call trace:
[   63.464225]  show_stack+0x20/0x38 (C)
[   63.464259]  dump_stack_lvl+0x8c/0xd0
[   63.464297]  print_report+0x118/0x608
[   63.464328]  kasan_report+0xdc/0x128
[   63.464358]  kasan_check_range+0x100/0x1a8
[   63.464390]  __kasan_check_read+0x20/0x30
[   63.464422]  copy_user_test_oob+0x3c8/0xec8
[   63.464450]  kunit_try_run_case+0x170/0x3f0
[   63.464487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.464525]  kthread+0x328/0x630
[   63.464558]  ret_from_fork+0x10/0x20
[   63.464593] 
[   63.530250] Allocated by task 332:
[   63.533637]  kasan_save_stack+0x3c/0x68
[   63.537456]  kasan_save_track+0x20/0x40
[   63.541274]  kasan_save_alloc_info+0x40/0x58
[   63.545527]  __kasan_kmalloc+0xd4/0xd8
[   63.549260]  __kmalloc_noprof+0x198/0x4c8
[   63.553254]  kunit_kmalloc_array+0x34/0x88
[   63.557333]  copy_user_test_oob+0xac/0xec8
[   63.561413]  kunit_try_run_case+0x170/0x3f0
[   63.565579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.571048]  kthread+0x328/0x630
[   63.574260]  ret_from_fork+0x10/0x20
[   63.577819] 
[   63.579296] The buggy address belongs to the object at ffff000801c16100
[   63.579296]  which belongs to the cache kmalloc-128 of size 128
[   63.591796] The buggy address is located 0 bytes inside of
[   63.591796]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   63.604207] 
[   63.605684] The buggy address belongs to the physical page:
[   63.611241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   63.619227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.626866] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.633809] page_type: f5(slab)
[   63.636941] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.644664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.652391] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.660202] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.668015] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   63.675827] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.683633] page dumped because: kasan: bad access detected
[   63.689188] 
[   63.690664] Memory state around the buggy address:
[   63.695444]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.702647]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.709851] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.717052]                                                                 ^
[   63.724174]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.731380]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.738579] ==================================================================
[   64.051033] ==================================================================
[   64.058023] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   64.065051] Read of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   64.072516] 
[   64.073998] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   64.074048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.074065] Hardware name: WinLink E850-96 board (DT)
[   64.074085] Call trace:
[   64.074096]  show_stack+0x20/0x38 (C)
[   64.074126]  dump_stack_lvl+0x8c/0xd0
[   64.074158]  print_report+0x118/0x608
[   64.074189]  kasan_report+0xdc/0x128
[   64.074217]  kasan_check_range+0x100/0x1a8
[   64.074250]  __kasan_check_read+0x20/0x30
[   64.074284]  copy_user_test_oob+0x4a0/0xec8
[   64.074311]  kunit_try_run_case+0x170/0x3f0
[   64.074346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.074385]  kthread+0x328/0x630
[   64.074417]  ret_from_fork+0x10/0x20
[   64.074451] 
[   64.140136] Allocated by task 332:
[   64.143524]  kasan_save_stack+0x3c/0x68
[   64.147341]  kasan_save_track+0x20/0x40
[   64.151161]  kasan_save_alloc_info+0x40/0x58
[   64.155414]  __kasan_kmalloc+0xd4/0xd8
[   64.159146]  __kmalloc_noprof+0x198/0x4c8
[   64.163140]  kunit_kmalloc_array+0x34/0x88
[   64.167219]  copy_user_test_oob+0xac/0xec8
[   64.171299]  kunit_try_run_case+0x170/0x3f0
[   64.175465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.180934]  kthread+0x328/0x630
[   64.184146]  ret_from_fork+0x10/0x20
[   64.187705] 
[   64.189182] The buggy address belongs to the object at ffff000801c16100
[   64.189182]  which belongs to the cache kmalloc-128 of size 128
[   64.201683] The buggy address is located 0 bytes inside of
[   64.201683]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   64.214093] 
[   64.215571] The buggy address belongs to the physical page:
[   64.221129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   64.229113] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.236752] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.243696] page_type: f5(slab)
[   64.246830] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.254551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.262278] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.270089] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.277902] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   64.285714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.293519] page dumped because: kasan: bad access detected
[   64.299075] 
[   64.300551] Memory state around the buggy address:
[   64.305330]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.312533]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.319738] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.326939]                                                                 ^
[   64.334061]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.341267]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.348467] ==================================================================
[   63.136241] ==================================================================
[   63.143108] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   63.150134] Write of size 121 at addr ffff000801c16100 by task kunit_try_catch/332
[   63.157686] 
[   63.159171] CPU: 4 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   63.159226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.159243] Hardware name: WinLink E850-96 board (DT)
[   63.159265] Call trace:
[   63.159279]  show_stack+0x20/0x38 (C)
[   63.159314]  dump_stack_lvl+0x8c/0xd0
[   63.159350]  print_report+0x118/0x608
[   63.159380]  kasan_report+0xdc/0x128
[   63.159409]  kasan_check_range+0x100/0x1a8
[   63.159442]  __kasan_check_write+0x20/0x30
[   63.159475]  copy_user_test_oob+0x35c/0xec8
[   63.159504]  kunit_try_run_case+0x170/0x3f0
[   63.159540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.159577]  kthread+0x328/0x630
[   63.159609]  ret_from_fork+0x10/0x20
[   63.159645] 
[   63.225393] Allocated by task 332:
[   63.228780]  kasan_save_stack+0x3c/0x68
[   63.232598]  kasan_save_track+0x20/0x40
[   63.236417]  kasan_save_alloc_info+0x40/0x58
[   63.240671]  __kasan_kmalloc+0xd4/0xd8
[   63.244403]  __kmalloc_noprof+0x198/0x4c8
[   63.248396]  kunit_kmalloc_array+0x34/0x88
[   63.252477]  copy_user_test_oob+0xac/0xec8
[   63.256556]  kunit_try_run_case+0x170/0x3f0
[   63.260723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.266191]  kthread+0x328/0x630
[   63.269403]  ret_from_fork+0x10/0x20
[   63.272962] 
[   63.274439] The buggy address belongs to the object at ffff000801c16100
[   63.274439]  which belongs to the cache kmalloc-128 of size 128
[   63.286938] The buggy address is located 0 bytes inside of
[   63.286938]  allocated 120-byte region [ffff000801c16100, ffff000801c16178)
[   63.299350] 
[   63.300829] The buggy address belongs to the physical page:
[   63.306385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c16
[   63.314371] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.322008] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.328952] page_type: f5(slab)
[   63.332087] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.339808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.347534] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.355345] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.363158] head: 0bfffe0000000001 fffffdffe0070581 00000000ffffffff 00000000ffffffff
[   63.370970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.378776] page dumped because: kasan: bad access detected
[   63.384331] 
[   63.385807] Memory state around the buggy address:
[   63.390587]  ffff000801c16000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.397790]  ffff000801c16080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.404995] >ffff000801c16100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.412196]                                                                 ^
[   63.419317]  ffff000801c16180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.426523]  ffff000801c16200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.433724] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   61.895894] ==================================================================
[   61.910055] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   61.917429] Read of size 8 at addr ffff000802408b78 by task kunit_try_catch/328
[   61.924720] 
[   61.926205] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.926261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.926277] Hardware name: WinLink E850-96 board (DT)
[   61.926298] Call trace:
[   61.926315]  show_stack+0x20/0x38 (C)
[   61.926353]  dump_stack_lvl+0x8c/0xd0
[   61.926390]  print_report+0x118/0x608
[   61.926425]  kasan_report+0xdc/0x128
[   61.926454]  __asan_report_load8_noabort+0x20/0x30
[   61.926492]  copy_to_kernel_nofault+0x204/0x250
[   61.926524]  copy_to_kernel_nofault_oob+0x158/0x418
[   61.926563]  kunit_try_run_case+0x170/0x3f0
[   61.926601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.926639]  kthread+0x328/0x630
[   61.926675]  ret_from_fork+0x10/0x20
[   61.926708] 
[   61.994248] Allocated by task 328:
[   61.997638]  kasan_save_stack+0x3c/0x68
[   62.001453]  kasan_save_track+0x20/0x40
[   62.005273]  kasan_save_alloc_info+0x40/0x58
[   62.009526]  __kasan_kmalloc+0xd4/0xd8
[   62.013259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.017772]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.022548]  kunit_try_run_case+0x170/0x3f0
[   62.026713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.032182]  kthread+0x328/0x630
[   62.035394]  ret_from_fork+0x10/0x20
[   62.038953] 
[   62.040430] The buggy address belongs to the object at ffff000802408b00
[   62.040430]  which belongs to the cache kmalloc-128 of size 128
[   62.052930] The buggy address is located 0 bytes to the right of
[   62.052930]  allocated 120-byte region [ffff000802408b00, ffff000802408b78)
[   62.065862] 
[   62.067340] The buggy address belongs to the physical page:
[   62.072898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   62.080883] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.088522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.095464] page_type: f5(slab)
[   62.098601] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.106320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.114046] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.121857] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.129670] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   62.137482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.145288] page dumped because: kasan: bad access detected
[   62.150843] 
[   62.152319] Memory state around the buggy address:
[   62.157100]  ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.164302]  ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.171506] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.178707]                                                                 ^
[   62.185829]  ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.193035]  ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.200237] ==================================================================
[   62.207663] ==================================================================
[   62.214648] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   62.221936] Write of size 8 at addr ffff000802408b78 by task kunit_try_catch/328
[   62.229314] 
[   62.230799] CPU: 5 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   62.230855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.230873] Hardware name: WinLink E850-96 board (DT)
[   62.230894] Call trace:
[   62.230910]  show_stack+0x20/0x38 (C)
[   62.230942]  dump_stack_lvl+0x8c/0xd0
[   62.230978]  print_report+0x118/0x608
[   62.231011]  kasan_report+0xdc/0x128
[   62.231039]  kasan_check_range+0x100/0x1a8
[   62.231073]  __kasan_check_write+0x20/0x30
[   62.231105]  copy_to_kernel_nofault+0x8c/0x250
[   62.231137]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   62.231174]  kunit_try_run_case+0x170/0x3f0
[   62.231210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.231250]  kthread+0x328/0x630
[   62.231285]  ret_from_fork+0x10/0x20
[   62.231319] 
[   62.302143] Allocated by task 328:
[   62.305530]  kasan_save_stack+0x3c/0x68
[   62.309348]  kasan_save_track+0x20/0x40
[   62.313167]  kasan_save_alloc_info+0x40/0x58
[   62.317421]  __kasan_kmalloc+0xd4/0xd8
[   62.321153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.325667]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.330441]  kunit_try_run_case+0x170/0x3f0
[   62.334608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.340077]  kthread+0x328/0x630
[   62.343288]  ret_from_fork+0x10/0x20
[   62.346848] 
[   62.348324] The buggy address belongs to the object at ffff000802408b00
[   62.348324]  which belongs to the cache kmalloc-128 of size 128
[   62.360825] The buggy address is located 0 bytes to the right of
[   62.360825]  allocated 120-byte region [ffff000802408b00, ffff000802408b78)
[   62.373757] 
[   62.375236] The buggy address belongs to the physical page:
[   62.380793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   62.388776] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.396415] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.403358] page_type: f5(slab)
[   62.406494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.414214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.421941] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.429752] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.437565] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   62.445377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.453183] page dumped because: kasan: bad access detected
[   62.458738] 
[   62.460213] Memory state around the buggy address:
[   62.464995]  ffff000802408a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.472196]  ffff000802408a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.479401] >ffff000802408b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.486602]                                                                 ^
[   62.493724]  ffff000802408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.500930]  ffff000802408c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.508130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   61.456665] ==================================================================
[   61.470998] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   61.477679] Read of size 1 at addr ffff800087b1d7f3 by task kunit_try_catch/316
[   61.484968] 
[   61.486453] CPU: 4 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.486507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.486524] Hardware name: WinLink E850-96 board (DT)
[   61.486549] Call trace:
[   61.486563]  show_stack+0x20/0x38 (C)
[   61.486601]  dump_stack_lvl+0x8c/0xd0
[   61.486635]  print_report+0x310/0x608
[   61.486664]  kasan_report+0xdc/0x128
[   61.486692]  __asan_report_load1_noabort+0x20/0x30
[   61.486724]  vmalloc_oob+0x578/0x5d0
[   61.486753]  kunit_try_run_case+0x170/0x3f0
[   61.486793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.486833]  kthread+0x328/0x630
[   61.486869]  ret_from_fork+0x10/0x20
[   61.486904] 
[   61.548688] The buggy address belongs to the virtual mapping at
[   61.548688]  [ffff800087b1d000, ffff800087b1f000) created by:
[   61.548688]  vmalloc_oob+0x98/0x5d0
[   61.563786] 
[   61.565266] The buggy address belongs to the physical page:
[   61.570822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b19
[   61.578807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.585327] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.593046] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.600766] page dumped because: kasan: bad access detected
[   61.606322] 
[   61.607797] Memory state around the buggy address:
[   61.612578]  ffff800087b1d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.619778]  ffff800087b1d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.626983] >ffff800087b1d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.634185]                                                              ^
[   61.641047]  ffff800087b1d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.648250]  ffff800087b1d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.655453] ==================================================================
[   61.662792] ==================================================================
[   61.669867] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   61.676545] Read of size 1 at addr ffff800087b1d7f8 by task kunit_try_catch/316
[   61.683837] 
[   61.685321] CPU: 4 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.685375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.685391] Hardware name: WinLink E850-96 board (DT)
[   61.685414] Call trace:
[   61.685430]  show_stack+0x20/0x38 (C)
[   61.685463]  dump_stack_lvl+0x8c/0xd0
[   61.685496]  print_report+0x310/0x608
[   61.685530]  kasan_report+0xdc/0x128
[   61.685559]  __asan_report_load1_noabort+0x20/0x30
[   61.685595]  vmalloc_oob+0x51c/0x5d0
[   61.685626]  kunit_try_run_case+0x170/0x3f0
[   61.685664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.685705]  kthread+0x328/0x630
[   61.685740]  ret_from_fork+0x10/0x20
[   61.685776] 
[   61.747555] The buggy address belongs to the virtual mapping at
[   61.747555]  [ffff800087b1d000, ffff800087b1f000) created by:
[   61.747555]  vmalloc_oob+0x98/0x5d0
[   61.762655] 
[   61.764134] The buggy address belongs to the physical page:
[   61.769690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b19
[   61.777675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.784193] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.791914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.799633] page dumped because: kasan: bad access detected
[   61.805189] 
[   61.806664] Memory state around the buggy address:
[   61.811445]  ffff800087b1d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.818647]  ffff800087b1d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.825852] >ffff800087b1d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.833053]                                                                 ^
[   61.840176]  ffff800087b1d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.847379]  ffff800087b1d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.854580] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   60.660209] ==================================================================
[   60.667273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   60.674650] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.682029] 
[   60.683510] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.683558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.683574] Hardware name: WinLink E850-96 board (DT)
[   60.683593] Call trace:
[   60.683606]  show_stack+0x20/0x38 (C)
[   60.683638]  dump_stack_lvl+0x8c/0xd0
[   60.683668]  print_report+0x118/0x608
[   60.683697]  kasan_report+0xdc/0x128
[   60.683725]  kasan_check_range+0x100/0x1a8
[   60.683755]  __kasan_check_write+0x20/0x30
[   60.683785]  kasan_atomics_helper+0x175c/0x4858
[   60.683815]  kasan_atomics+0x198/0x2e0
[   60.683843]  kunit_try_run_case+0x170/0x3f0
[   60.683873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.683912]  kthread+0x328/0x630
[   60.683941]  ret_from_fork+0x10/0x20
[   60.683976] 
[   60.753815] Allocated by task 312:
[   60.757203]  kasan_save_stack+0x3c/0x68
[   60.761020]  kasan_save_track+0x20/0x40
[   60.764840]  kasan_save_alloc_info+0x40/0x58
[   60.769094]  __kasan_kmalloc+0xd4/0xd8
[   60.772826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.777339]  kasan_atomics+0xb8/0x2e0
[   60.780985]  kunit_try_run_case+0x170/0x3f0
[   60.785152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.790621]  kthread+0x328/0x630
[   60.793832]  ret_from_fork+0x10/0x20
[   60.797391] 
[   60.798869] The buggy address belongs to the object at ffff000800c2d400
[   60.798869]  which belongs to the cache kmalloc-64 of size 64
[   60.811194] The buggy address is located 0 bytes to the right of
[   60.811194]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.824040] 
[   60.825516] The buggy address belongs to the physical page:
[   60.831072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.839059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.845568] page_type: f5(slab)
[   60.848700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.856425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.864144] page dumped because: kasan: bad access detected
[   60.869699] 
[   60.871175] Memory state around the buggy address:
[   60.875955]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.883158]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.890363] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.897564]                                      ^
[   60.902341]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.909546]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.916747] ==================================================================
[   49.357630] ==================================================================
[   49.364667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   49.371956] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.379333] 
[   49.380816] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.380862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.380877] Hardware name: WinLink E850-96 board (DT)
[   49.380897] Call trace:
[   49.380908]  show_stack+0x20/0x38 (C)
[   49.380941]  dump_stack_lvl+0x8c/0xd0
[   49.380975]  print_report+0x118/0x608
[   49.381003]  kasan_report+0xdc/0x128
[   49.381031]  kasan_check_range+0x100/0x1a8
[   49.381061]  __kasan_check_write+0x20/0x30
[   49.381094]  kasan_atomics_helper+0x894/0x4858
[   49.381123]  kasan_atomics+0x198/0x2e0
[   49.381149]  kunit_try_run_case+0x170/0x3f0
[   49.381184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.381221]  kthread+0x328/0x630
[   49.381251]  ret_from_fork+0x10/0x20
[   49.381283] 
[   49.451034] Allocated by task 312:
[   49.454421]  kasan_save_stack+0x3c/0x68
[   49.458239]  kasan_save_track+0x20/0x40
[   49.462058]  kasan_save_alloc_info+0x40/0x58
[   49.466312]  __kasan_kmalloc+0xd4/0xd8
[   49.470044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.474558]  kasan_atomics+0xb8/0x2e0
[   49.478204]  kunit_try_run_case+0x170/0x3f0
[   49.482370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.487839]  kthread+0x328/0x630
[   49.491051]  ret_from_fork+0x10/0x20
[   49.494610] 
[   49.496085] The buggy address belongs to the object at ffff000800c2d400
[   49.496085]  which belongs to the cache kmalloc-64 of size 64
[   49.508412] The buggy address is located 0 bytes to the right of
[   49.508412]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   49.521259] 
[   49.522735] The buggy address belongs to the physical page:
[   49.528291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.536279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.542786] page_type: f5(slab)
[   49.545919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.553643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.561362] page dumped because: kasan: bad access detected
[   49.566917] 
[   49.568393] Memory state around the buggy address:
[   49.573173]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.580376]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.587581] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.594782]                                      ^
[   49.599560]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.606764]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.613966] ==================================================================
[   49.093862] ==================================================================
[   49.100956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   49.108245] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.115623] 
[   49.117105] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.117149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.117166] Hardware name: WinLink E850-96 board (DT)
[   49.117183] Call trace:
[   49.117196]  show_stack+0x20/0x38 (C)
[   49.117226]  dump_stack_lvl+0x8c/0xd0
[   49.117257]  print_report+0x118/0x608
[   49.117287]  kasan_report+0xdc/0x128
[   49.117314]  kasan_check_range+0x100/0x1a8
[   49.117347]  __kasan_check_write+0x20/0x30
[   49.117380]  kasan_atomics_helper+0x7cc/0x4858
[   49.117407]  kasan_atomics+0x198/0x2e0
[   49.117434]  kunit_try_run_case+0x170/0x3f0
[   49.117468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.117504]  kthread+0x328/0x630
[   49.117535]  ret_from_fork+0x10/0x20
[   49.117566] 
[   49.187322] Allocated by task 312:
[   49.190709]  kasan_save_stack+0x3c/0x68
[   49.194528]  kasan_save_track+0x20/0x40
[   49.198347]  kasan_save_alloc_info+0x40/0x58
[   49.202600]  __kasan_kmalloc+0xd4/0xd8
[   49.206333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.210847]  kasan_atomics+0xb8/0x2e0
[   49.214493]  kunit_try_run_case+0x170/0x3f0
[   49.218659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.224127]  kthread+0x328/0x630
[   49.227339]  ret_from_fork+0x10/0x20
[   49.230899] 
[   49.232374] The buggy address belongs to the object at ffff000800c2d400
[   49.232374]  which belongs to the cache kmalloc-64 of size 64
[   49.244701] The buggy address is located 0 bytes to the right of
[   49.244701]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   49.257547] 
[   49.259023] The buggy address belongs to the physical page:
[   49.264580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.272567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.279075] page_type: f5(slab)
[   49.282208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.289932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.297651] page dumped because: kasan: bad access detected
[   49.303206] 
[   49.304682] Memory state around the buggy address:
[   49.309461]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.316665]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.323869] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.331071]                                      ^
[   49.335849]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.343053]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.350255] ==================================================================
[   44.353258] ==================================================================
[   44.367351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   44.374722] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   44.382013] 
[   44.383500] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.383554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.383570] Hardware name: WinLink E850-96 board (DT)
[   44.383594] Call trace:
[   44.383607]  show_stack+0x20/0x38 (C)
[   44.383640]  dump_stack_lvl+0x8c/0xd0
[   44.383678]  print_report+0x118/0x608
[   44.383712]  kasan_report+0xdc/0x128
[   44.383742]  __asan_report_load4_noabort+0x20/0x30
[   44.383779]  kasan_atomics_helper+0x40a8/0x4858
[   44.383810]  kasan_atomics+0x198/0x2e0
[   44.383840]  kunit_try_run_case+0x170/0x3f0
[   44.383878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.383918]  kthread+0x328/0x630
[   44.383956]  ret_from_fork+0x10/0x20
[   44.383993] 
[   44.450416] Allocated by task 312:
[   44.453803]  kasan_save_stack+0x3c/0x68
[   44.457621]  kasan_save_track+0x20/0x40
[   44.461440]  kasan_save_alloc_info+0x40/0x58
[   44.465692]  __kasan_kmalloc+0xd4/0xd8
[   44.469425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.473938]  kasan_atomics+0xb8/0x2e0
[   44.477584]  kunit_try_run_case+0x170/0x3f0
[   44.481751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.487221]  kthread+0x328/0x630
[   44.490431]  ret_from_fork+0x10/0x20
[   44.493990] 
[   44.495469] The buggy address belongs to the object at ffff000800c2d400
[   44.495469]  which belongs to the cache kmalloc-64 of size 64
[   44.507795] The buggy address is located 0 bytes to the right of
[   44.507795]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   44.520639] 
[   44.522117] The buggy address belongs to the physical page:
[   44.527675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   44.535660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.542169] page_type: f5(slab)
[   44.545309] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.553024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.560745] page dumped because: kasan: bad access detected
[   44.566300] 
[   44.567774] Memory state around the buggy address:
[   44.572556]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.579757]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.586963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.594162]                                      ^
[   44.598941]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.606145]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.613348] ==================================================================
[   46.984209] ==================================================================
[   46.991263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   46.998554] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.005932] 
[   47.007415] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.007459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.007476] Hardware name: WinLink E850-96 board (DT)
[   47.007497] Call trace:
[   47.007511]  show_stack+0x20/0x38 (C)
[   47.007542]  dump_stack_lvl+0x8c/0xd0
[   47.007574]  print_report+0x118/0x608
[   47.007603]  kasan_report+0xdc/0x128
[   47.007631]  kasan_check_range+0x100/0x1a8
[   47.007664]  __kasan_check_write+0x20/0x30
[   47.007696]  kasan_atomics_helper+0x47c/0x4858
[   47.007724]  kasan_atomics+0x198/0x2e0
[   47.007752]  kunit_try_run_case+0x170/0x3f0
[   47.007784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.007822]  kthread+0x328/0x630
[   47.007855]  ret_from_fork+0x10/0x20
[   47.007889] 
[   47.077632] Allocated by task 312:
[   47.081020]  kasan_save_stack+0x3c/0x68
[   47.084837]  kasan_save_track+0x20/0x40
[   47.088656]  kasan_save_alloc_info+0x40/0x58
[   47.092910]  __kasan_kmalloc+0xd4/0xd8
[   47.096642]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.101156]  kasan_atomics+0xb8/0x2e0
[   47.104802]  kunit_try_run_case+0x170/0x3f0
[   47.108969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.114437]  kthread+0x328/0x630
[   47.117649]  ret_from_fork+0x10/0x20
[   47.121208] 
[   47.122686] The buggy address belongs to the object at ffff000800c2d400
[   47.122686]  which belongs to the cache kmalloc-64 of size 64
[   47.135010] The buggy address is located 0 bytes to the right of
[   47.135010]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.147857] 
[   47.149333] The buggy address belongs to the physical page:
[   47.154890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.162876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.169385] page_type: f5(slab)
[   47.172518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.180241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.187960] page dumped because: kasan: bad access detected
[   47.193516] 
[   47.194991] Memory state around the buggy address:
[   47.199771]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.206974]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.214179] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.221380]                                      ^
[   47.226158]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.233362]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.240564] ==================================================================
[   48.830174] ==================================================================
[   48.837243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   48.844533] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.851911] 
[   48.853393] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.853441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.853458] Hardware name: WinLink E850-96 board (DT)
[   48.853477] Call trace:
[   48.853488]  show_stack+0x20/0x38 (C)
[   48.853520]  dump_stack_lvl+0x8c/0xd0
[   48.853553]  print_report+0x118/0x608
[   48.853581]  kasan_report+0xdc/0x128
[   48.853609]  kasan_check_range+0x100/0x1a8
[   48.853639]  __kasan_check_write+0x20/0x30
[   48.853671]  kasan_atomics_helper+0x760/0x4858
[   48.853702]  kasan_atomics+0x198/0x2e0
[   48.853730]  kunit_try_run_case+0x170/0x3f0
[   48.853763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.853801]  kthread+0x328/0x630
[   48.853831]  ret_from_fork+0x10/0x20
[   48.853864] 
[   48.923612] Allocated by task 312:
[   48.926997]  kasan_save_stack+0x3c/0x68
[   48.930816]  kasan_save_track+0x20/0x40
[   48.934635]  kasan_save_alloc_info+0x40/0x58
[   48.938889]  __kasan_kmalloc+0xd4/0xd8
[   48.942622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.947135]  kasan_atomics+0xb8/0x2e0
[   48.950781]  kunit_try_run_case+0x170/0x3f0
[   48.954948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.960416]  kthread+0x328/0x630
[   48.963628]  ret_from_fork+0x10/0x20
[   48.967187] 
[   48.968663] The buggy address belongs to the object at ffff000800c2d400
[   48.968663]  which belongs to the cache kmalloc-64 of size 64
[   48.980989] The buggy address is located 0 bytes to the right of
[   48.980989]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.993836] 
[   48.995314] The buggy address belongs to the physical page:
[   49.000871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.008855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.015363] page_type: f5(slab)
[   49.018496] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.026221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.033940] page dumped because: kasan: bad access detected
[   49.039495] 
[   49.040971] Memory state around the buggy address:
[   49.045749]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.052954]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.060158] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.067359]                                      ^
[   49.072137]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.079342]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.086543] ==================================================================
[   55.396540] ==================================================================
[   55.403637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   55.410927] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.418306] 
[   55.419788] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.419835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.419854] Hardware name: WinLink E850-96 board (DT)
[   55.419873] Call trace:
[   55.419886]  show_stack+0x20/0x38 (C)
[   55.419916]  dump_stack_lvl+0x8c/0xd0
[   55.419948]  print_report+0x118/0x608
[   55.419976]  kasan_report+0xdc/0x128
[   55.420006]  kasan_check_range+0x100/0x1a8
[   55.420037]  __kasan_check_write+0x20/0x30
[   55.420072]  kasan_atomics_helper+0xff0/0x4858
[   55.420100]  kasan_atomics+0x198/0x2e0
[   55.420128]  kunit_try_run_case+0x170/0x3f0
[   55.420162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.420199]  kthread+0x328/0x630
[   55.420231]  ret_from_fork+0x10/0x20
[   55.420262] 
[   55.490006] Allocated by task 312:
[   55.493393]  kasan_save_stack+0x3c/0x68
[   55.497211]  kasan_save_track+0x20/0x40
[   55.501030]  kasan_save_alloc_info+0x40/0x58
[   55.505283]  __kasan_kmalloc+0xd4/0xd8
[   55.509016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.513530]  kasan_atomics+0xb8/0x2e0
[   55.517175]  kunit_try_run_case+0x170/0x3f0
[   55.521342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.526811]  kthread+0x328/0x630
[   55.530023]  ret_from_fork+0x10/0x20
[   55.533582] 
[   55.535057] The buggy address belongs to the object at ffff000800c2d400
[   55.535057]  which belongs to the cache kmalloc-64 of size 64
[   55.547384] The buggy address is located 0 bytes to the right of
[   55.547384]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.560230] 
[   55.561706] The buggy address belongs to the physical page:
[   55.567263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.575250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.581759] page_type: f5(slab)
[   55.584892] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.592615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.600334] page dumped because: kasan: bad access detected
[   55.605889] 
[   55.607365] Memory state around the buggy address:
[   55.612143]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.619348]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.626552] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.633754]                                      ^
[   55.638532]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.645736]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.652938] ==================================================================
[   45.672021] ==================================================================
[   45.679133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   45.686508] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.693799] 
[   45.695284] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.695332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.695348] Hardware name: WinLink E850-96 board (DT)
[   45.695371] Call trace:
[   45.695386]  show_stack+0x20/0x38 (C)
[   45.695418]  dump_stack_lvl+0x8c/0xd0
[   45.695453]  print_report+0x118/0x608
[   45.695484]  kasan_report+0xdc/0x128
[   45.695512]  __asan_report_load4_noabort+0x20/0x30
[   45.695547]  kasan_atomics_helper+0x40fc/0x4858
[   45.695576]  kasan_atomics+0x198/0x2e0
[   45.695606]  kunit_try_run_case+0x170/0x3f0
[   45.695641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.695677]  kthread+0x328/0x630
[   45.695708]  ret_from_fork+0x10/0x20
[   45.695741] 
[   45.762200] Allocated by task 312:
[   45.765586]  kasan_save_stack+0x3c/0x68
[   45.769406]  kasan_save_track+0x20/0x40
[   45.773225]  kasan_save_alloc_info+0x40/0x58
[   45.777478]  __kasan_kmalloc+0xd4/0xd8
[   45.781211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.785724]  kasan_atomics+0xb8/0x2e0
[   45.789370]  kunit_try_run_case+0x170/0x3f0
[   45.793537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.799006]  kthread+0x328/0x630
[   45.802217]  ret_from_fork+0x10/0x20
[   45.805776] 
[   45.807253] The buggy address belongs to the object at ffff000800c2d400
[   45.807253]  which belongs to the cache kmalloc-64 of size 64
[   45.819579] The buggy address is located 0 bytes to the right of
[   45.819579]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.832425] 
[   45.833902] The buggy address belongs to the physical page:
[   45.839460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.847445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.853952] page_type: f5(slab)
[   45.857088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.864810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.872528] page dumped because: kasan: bad access detected
[   45.878085] 
[   45.879560] Memory state around the buggy address:
[   45.884339]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.891542]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.898747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.905948]                                      ^
[   45.910726]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.917931]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.925132] ==================================================================
[   55.660301] ==================================================================
[   55.667349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   55.674726] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.682104] 
[   55.683585] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.683632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.683646] Hardware name: WinLink E850-96 board (DT)
[   55.683665] Call trace:
[   55.683677]  show_stack+0x20/0x38 (C)
[   55.683706]  dump_stack_lvl+0x8c/0xd0
[   55.683738]  print_report+0x118/0x608
[   55.683765]  kasan_report+0xdc/0x128
[   55.683793]  kasan_check_range+0x100/0x1a8
[   55.683823]  __kasan_check_write+0x20/0x30
[   55.683853]  kasan_atomics_helper+0x1058/0x4858
[   55.683882]  kasan_atomics+0x198/0x2e0
[   55.683909]  kunit_try_run_case+0x170/0x3f0
[   55.683943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.683981]  kthread+0x328/0x630
[   55.684013]  ret_from_fork+0x10/0x20
[   55.684045] 
[   55.753891] Allocated by task 312:
[   55.757278]  kasan_save_stack+0x3c/0x68
[   55.761096]  kasan_save_track+0x20/0x40
[   55.764915]  kasan_save_alloc_info+0x40/0x58
[   55.769169]  __kasan_kmalloc+0xd4/0xd8
[   55.772901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.777415]  kasan_atomics+0xb8/0x2e0
[   55.781061]  kunit_try_run_case+0x170/0x3f0
[   55.785227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.790696]  kthread+0x328/0x630
[   55.793908]  ret_from_fork+0x10/0x20
[   55.797466] 
[   55.798943] The buggy address belongs to the object at ffff000800c2d400
[   55.798943]  which belongs to the cache kmalloc-64 of size 64
[   55.811269] The buggy address is located 0 bytes to the right of
[   55.811269]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.824115] 
[   55.825591] The buggy address belongs to the physical page:
[   55.831149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.839136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.845643] page_type: f5(slab)
[   55.848776] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.856500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.864219] page dumped because: kasan: bad access detected
[   55.869774] 
[   55.871250] Memory state around the buggy address:
[   55.876030]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.883233]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.890437] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.897639]                                      ^
[   55.902417]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.909621]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.916822] ==================================================================
[   55.924168] ==================================================================
[   55.931234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   55.938611] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.945989] 
[   55.947472] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.947517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.947535] Hardware name: WinLink E850-96 board (DT)
[   55.947553] Call trace:
[   55.947565]  show_stack+0x20/0x38 (C)
[   55.947596]  dump_stack_lvl+0x8c/0xd0
[   55.947630]  print_report+0x118/0x608
[   55.947658]  kasan_report+0xdc/0x128
[   55.947686]  kasan_check_range+0x100/0x1a8
[   55.947718]  __kasan_check_write+0x20/0x30
[   55.947749]  kasan_atomics_helper+0x10c0/0x4858
[   55.947779]  kasan_atomics+0x198/0x2e0
[   55.947807]  kunit_try_run_case+0x170/0x3f0
[   55.947840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.947876]  kthread+0x328/0x630
[   55.947908]  ret_from_fork+0x10/0x20
[   55.947940] 
[   56.017776] Allocated by task 312:
[   56.021163]  kasan_save_stack+0x3c/0x68
[   56.024981]  kasan_save_track+0x20/0x40
[   56.028800]  kasan_save_alloc_info+0x40/0x58
[   56.033054]  __kasan_kmalloc+0xd4/0xd8
[   56.036786]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.041300]  kasan_atomics+0xb8/0x2e0
[   56.044945]  kunit_try_run_case+0x170/0x3f0
[   56.049112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.054581]  kthread+0x328/0x630
[   56.057793]  ret_from_fork+0x10/0x20
[   56.061351] 
[   56.062827] The buggy address belongs to the object at ffff000800c2d400
[   56.062827]  which belongs to the cache kmalloc-64 of size 64
[   56.075154] The buggy address is located 0 bytes to the right of
[   56.075154]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.088000] 
[   56.089476] The buggy address belongs to the physical page:
[   56.095032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.103021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.109529] page_type: f5(slab)
[   56.112662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.120385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.128104] page dumped because: kasan: bad access detected
[   56.133659] 
[   56.135135] Memory state around the buggy address:
[   56.139915]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.147118]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.154322] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.161524]                                      ^
[   56.166302]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.173506]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.180707] ==================================================================
[   46.196236] ==================================================================
[   46.203256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   46.210632] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   46.218010] 
[   46.219492] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   46.219541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.219559] Hardware name: WinLink E850-96 board (DT)
[   46.219579] Call trace:
[   46.219593]  show_stack+0x20/0x38 (C)
[   46.219629]  dump_stack_lvl+0x8c/0xd0
[   46.219661]  print_report+0x118/0x608
[   46.219694]  kasan_report+0xdc/0x128
[   46.219722]  __asan_report_store4_noabort+0x20/0x30
[   46.219754]  kasan_atomics_helper+0x3f94/0x4858
[   46.219785]  kasan_atomics+0x198/0x2e0
[   46.219813]  kunit_try_run_case+0x170/0x3f0
[   46.219846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.219883]  kthread+0x328/0x630
[   46.219913]  ret_from_fork+0x10/0x20
[   46.219945] 
[   46.286500] Allocated by task 312:
[   46.289884]  kasan_save_stack+0x3c/0x68
[   46.293703]  kasan_save_track+0x20/0x40
[   46.297523]  kasan_save_alloc_info+0x40/0x58
[   46.301776]  __kasan_kmalloc+0xd4/0xd8
[   46.305508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.310022]  kasan_atomics+0xb8/0x2e0
[   46.313668]  kunit_try_run_case+0x170/0x3f0
[   46.317835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.323303]  kthread+0x328/0x630
[   46.326515]  ret_from_fork+0x10/0x20
[   46.330074] 
[   46.331551] The buggy address belongs to the object at ffff000800c2d400
[   46.331551]  which belongs to the cache kmalloc-64 of size 64
[   46.343876] The buggy address is located 0 bytes to the right of
[   46.343876]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.356723] 
[   46.358200] The buggy address belongs to the physical page:
[   46.363758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.371742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.378250] page_type: f5(slab)
[   46.381383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.389107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.396826] page dumped because: kasan: bad access detected
[   46.402382] 
[   46.403857] Memory state around the buggy address:
[   46.408635]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.415840]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.423045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.430246]                                      ^
[   46.435024]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.442229]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.449430] ==================================================================
[   53.820699] ==================================================================
[   53.827794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   53.835170] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.842461] 
[   53.843943] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.843992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.844007] Hardware name: WinLink E850-96 board (DT)
[   53.844025] Call trace:
[   53.844037]  show_stack+0x20/0x38 (C)
[   53.844067]  dump_stack_lvl+0x8c/0xd0
[   53.844096]  print_report+0x118/0x608
[   53.844128]  kasan_report+0xdc/0x128
[   53.844158]  __asan_report_load8_noabort+0x20/0x30
[   53.844190]  kasan_atomics_helper+0x3f58/0x4858
[   53.844219]  kasan_atomics+0x198/0x2e0
[   53.844247]  kunit_try_run_case+0x170/0x3f0
[   53.844281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.844320]  kthread+0x328/0x630
[   53.844352]  ret_from_fork+0x10/0x20
[   53.844385] 
[   53.910863] Allocated by task 312:
[   53.914250]  kasan_save_stack+0x3c/0x68
[   53.918067]  kasan_save_track+0x20/0x40
[   53.921887]  kasan_save_alloc_info+0x40/0x58
[   53.926141]  __kasan_kmalloc+0xd4/0xd8
[   53.929873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.934387]  kasan_atomics+0xb8/0x2e0
[   53.938033]  kunit_try_run_case+0x170/0x3f0
[   53.942199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.947668]  kthread+0x328/0x630
[   53.950879]  ret_from_fork+0x10/0x20
[   53.954439] 
[   53.955914] The buggy address belongs to the object at ffff000800c2d400
[   53.955914]  which belongs to the cache kmalloc-64 of size 64
[   53.968241] The buggy address is located 0 bytes to the right of
[   53.968241]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.981087] 
[   53.982564] The buggy address belongs to the physical page:
[   53.988120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.996107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.002615] page_type: f5(slab)
[   54.005748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.013472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.021193] page dumped because: kasan: bad access detected
[   54.026746] 
[   54.028222] Memory state around the buggy address:
[   54.033000]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.040205]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.047410] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.054611]                                      ^
[   54.059388]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.066593]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.073794] ==================================================================
[   47.247916] ==================================================================
[   47.254976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   47.262265] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.269643] 
[   47.271126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.271173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.271192] Hardware name: WinLink E850-96 board (DT)
[   47.271212] Call trace:
[   47.271225]  show_stack+0x20/0x38 (C)
[   47.271257]  dump_stack_lvl+0x8c/0xd0
[   47.271290]  print_report+0x118/0x608
[   47.271319]  kasan_report+0xdc/0x128
[   47.271347]  kasan_check_range+0x100/0x1a8
[   47.271381]  __kasan_check_write+0x20/0x30
[   47.271414]  kasan_atomics_helper+0x4e4/0x4858
[   47.271443]  kasan_atomics+0x198/0x2e0
[   47.271471]  kunit_try_run_case+0x170/0x3f0
[   47.271505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.271541]  kthread+0x328/0x630
[   47.271573]  ret_from_fork+0x10/0x20
[   47.271605] 
[   47.341344] Allocated by task 312:
[   47.344731]  kasan_save_stack+0x3c/0x68
[   47.348548]  kasan_save_track+0x20/0x40
[   47.352368]  kasan_save_alloc_info+0x40/0x58
[   47.356621]  __kasan_kmalloc+0xd4/0xd8
[   47.360354]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.364868]  kasan_atomics+0xb8/0x2e0
[   47.368513]  kunit_try_run_case+0x170/0x3f0
[   47.372680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.378148]  kthread+0x328/0x630
[   47.381360]  ret_from_fork+0x10/0x20
[   47.384919] 
[   47.386395] The buggy address belongs to the object at ffff000800c2d400
[   47.386395]  which belongs to the cache kmalloc-64 of size 64
[   47.398722] The buggy address is located 0 bytes to the right of
[   47.398722]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.411568] 
[   47.413044] The buggy address belongs to the physical page:
[   47.418600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.426589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.433096] page_type: f5(slab)
[   47.436230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.443953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.451672] page dumped because: kasan: bad access detected
[   47.457227] 
[   47.458703] Memory state around the buggy address:
[   47.463481]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.470686]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.477890] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.485091]                                      ^
[   47.489869]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.497074]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.504275] ==================================================================
[   48.039046] ==================================================================
[   48.046110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   48.053399] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.060777] 
[   48.062258] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.062307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.062324] Hardware name: WinLink E850-96 board (DT)
[   48.062343] Call trace:
[   48.062358]  show_stack+0x20/0x38 (C)
[   48.062389]  dump_stack_lvl+0x8c/0xd0
[   48.062421]  print_report+0x118/0x608
[   48.062451]  kasan_report+0xdc/0x128
[   48.062479]  kasan_check_range+0x100/0x1a8
[   48.062510]  __kasan_check_write+0x20/0x30
[   48.062543]  kasan_atomics_helper+0x61c/0x4858
[   48.062571]  kasan_atomics+0x198/0x2e0
[   48.062598]  kunit_try_run_case+0x170/0x3f0
[   48.062632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.062670]  kthread+0x328/0x630
[   48.062702]  ret_from_fork+0x10/0x20
[   48.062733] 
[   48.132477] Allocated by task 312:
[   48.135864]  kasan_save_stack+0x3c/0x68
[   48.139682]  kasan_save_track+0x20/0x40
[   48.143502]  kasan_save_alloc_info+0x40/0x58
[   48.147755]  __kasan_kmalloc+0xd4/0xd8
[   48.151488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.156001]  kasan_atomics+0xb8/0x2e0
[   48.159647]  kunit_try_run_case+0x170/0x3f0
[   48.163814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.169282]  kthread+0x328/0x630
[   48.172494]  ret_from_fork+0x10/0x20
[   48.176053] 
[   48.177529] The buggy address belongs to the object at ffff000800c2d400
[   48.177529]  which belongs to the cache kmalloc-64 of size 64
[   48.189855] The buggy address is located 0 bytes to the right of
[   48.189855]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.202702] 
[   48.204178] The buggy address belongs to the physical page:
[   48.209734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   48.217721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.224229] page_type: f5(slab)
[   48.227362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.235087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.242806] page dumped because: kasan: bad access detected
[   48.248361] 
[   48.249837] Memory state around the buggy address:
[   48.254615]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.261820]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.269024] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.276225]                                      ^
[   48.281003]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.288208]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.295409] ==================================================================
[   56.979677] ==================================================================
[   56.986775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   56.994150] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.001528] 
[   57.003012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.003058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.003077] Hardware name: WinLink E850-96 board (DT)
[   57.003096] Call trace:
[   57.003109]  show_stack+0x20/0x38 (C)
[   57.003140]  dump_stack_lvl+0x8c/0xd0
[   57.003171]  print_report+0x118/0x608
[   57.003201]  kasan_report+0xdc/0x128
[   57.003228]  kasan_check_range+0x100/0x1a8
[   57.003259]  __kasan_check_write+0x20/0x30
[   57.003290]  kasan_atomics_helper+0x126c/0x4858
[   57.003318]  kasan_atomics+0x198/0x2e0
[   57.003345]  kunit_try_run_case+0x170/0x3f0
[   57.003378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.003416]  kthread+0x328/0x630
[   57.003448]  ret_from_fork+0x10/0x20
[   57.003482] 
[   57.073315] Allocated by task 312:
[   57.076702]  kasan_save_stack+0x3c/0x68
[   57.080520]  kasan_save_track+0x20/0x40
[   57.084340]  kasan_save_alloc_info+0x40/0x58
[   57.088593]  __kasan_kmalloc+0xd4/0xd8
[   57.092326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.096840]  kasan_atomics+0xb8/0x2e0
[   57.100485]  kunit_try_run_case+0x170/0x3f0
[   57.104652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.110120]  kthread+0x328/0x630
[   57.113332]  ret_from_fork+0x10/0x20
[   57.116891] 
[   57.118367] The buggy address belongs to the object at ffff000800c2d400
[   57.118367]  which belongs to the cache kmalloc-64 of size 64
[   57.130693] The buggy address is located 0 bytes to the right of
[   57.130693]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.143540] 
[   57.145016] The buggy address belongs to the physical page:
[   57.150575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.158559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.165069] page_type: f5(slab)
[   57.168200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.175924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.183644] page dumped because: kasan: bad access detected
[   57.189199] 
[   57.190674] Memory state around the buggy address:
[   57.195454]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.202657]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.209862] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.217063]                                      ^
[   57.221841]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.229046]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.236247] ==================================================================
[   57.771386] ==================================================================
[   57.778429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   57.785805] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.793096] 
[   57.794579] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.794627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.794642] Hardware name: WinLink E850-96 board (DT)
[   57.794664] Call trace:
[   57.794677]  show_stack+0x20/0x38 (C)
[   57.794707]  dump_stack_lvl+0x8c/0xd0
[   57.794739]  print_report+0x118/0x608
[   57.794766]  kasan_report+0xdc/0x128
[   57.794794]  __asan_report_load8_noabort+0x20/0x30
[   57.794829]  kasan_atomics_helper+0x3f04/0x4858
[   57.794858]  kasan_atomics+0x198/0x2e0
[   57.794885]  kunit_try_run_case+0x170/0x3f0
[   57.794917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.794956]  kthread+0x328/0x630
[   57.794992]  ret_from_fork+0x10/0x20
[   57.795024] 
[   57.861498] Allocated by task 312:
[   57.864885]  kasan_save_stack+0x3c/0x68
[   57.868703]  kasan_save_track+0x20/0x40
[   57.872522]  kasan_save_alloc_info+0x40/0x58
[   57.876776]  __kasan_kmalloc+0xd4/0xd8
[   57.880508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.885022]  kasan_atomics+0xb8/0x2e0
[   57.888667]  kunit_try_run_case+0x170/0x3f0
[   57.892834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.898303]  kthread+0x328/0x630
[   57.901515]  ret_from_fork+0x10/0x20
[   57.905074] 
[   57.906549] The buggy address belongs to the object at ffff000800c2d400
[   57.906549]  which belongs to the cache kmalloc-64 of size 64
[   57.918876] The buggy address is located 0 bytes to the right of
[   57.918876]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.931722] 
[   57.933200] The buggy address belongs to the physical page:
[   57.938754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.946742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.953250] page_type: f5(slab)
[   57.956383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.964107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.971826] page dumped because: kasan: bad access detected
[   57.977382] 
[   57.978857] Memory state around the buggy address:
[   57.983637]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.990840]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.998045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.005246]                                      ^
[   58.010024]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.017229]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.024430] ==================================================================
[   60.924118] ==================================================================
[   60.931158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   60.938535] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.945827] 
[   60.947309] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.947358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.947374] Hardware name: WinLink E850-96 board (DT)
[   60.947393] Call trace:
[   60.947406]  show_stack+0x20/0x38 (C)
[   60.947438]  dump_stack_lvl+0x8c/0xd0
[   60.947470]  print_report+0x118/0x608
[   60.947498]  kasan_report+0xdc/0x128
[   60.947526]  __asan_report_load8_noabort+0x20/0x30
[   60.947560]  kasan_atomics_helper+0x3e20/0x4858
[   60.947591]  kasan_atomics+0x198/0x2e0
[   60.947618]  kunit_try_run_case+0x170/0x3f0
[   60.947651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.947690]  kthread+0x328/0x630
[   60.947722]  ret_from_fork+0x10/0x20
[   60.947757] 
[   61.014229] Allocated by task 312:
[   61.017616]  kasan_save_stack+0x3c/0x68
[   61.021433]  kasan_save_track+0x20/0x40
[   61.025253]  kasan_save_alloc_info+0x40/0x58
[   61.029506]  __kasan_kmalloc+0xd4/0xd8
[   61.033239]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.037753]  kasan_atomics+0xb8/0x2e0
[   61.041398]  kunit_try_run_case+0x170/0x3f0
[   61.045565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.051033]  kthread+0x328/0x630
[   61.054245]  ret_from_fork+0x10/0x20
[   61.057805] 
[   61.059280] The buggy address belongs to the object at ffff000800c2d400
[   61.059280]  which belongs to the cache kmalloc-64 of size 64
[   61.071607] The buggy address is located 0 bytes to the right of
[   61.071607]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   61.084453] 
[   61.085929] The buggy address belongs to the physical page:
[   61.091485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   61.099472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.105980] page_type: f5(slab)
[   61.109115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.116838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.124557] page dumped because: kasan: bad access detected
[   61.130112] 
[   61.131588] Memory state around the buggy address:
[   61.136367]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.143571]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.150775] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.157976]                                      ^
[   61.162754]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.169959]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.177160] ==================================================================
[   52.248527] ==================================================================
[   52.255594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   52.262971] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.270262] 
[   52.271746] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.271793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.271810] Hardware name: WinLink E850-96 board (DT)
[   52.271829] Call trace:
[   52.271843]  show_stack+0x20/0x38 (C)
[   52.271873]  dump_stack_lvl+0x8c/0xd0
[   52.271904]  print_report+0x118/0x608
[   52.271935]  kasan_report+0xdc/0x128
[   52.271964]  __asan_report_load4_noabort+0x20/0x30
[   52.271998]  kasan_atomics_helper+0x3de4/0x4858
[   52.272028]  kasan_atomics+0x198/0x2e0
[   52.272058]  kunit_try_run_case+0x170/0x3f0
[   52.272092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.272131]  kthread+0x328/0x630
[   52.272161]  ret_from_fork+0x10/0x20
[   52.272191] 
[   52.338664] Allocated by task 312:
[   52.342051]  kasan_save_stack+0x3c/0x68
[   52.345869]  kasan_save_track+0x20/0x40
[   52.349689]  kasan_save_alloc_info+0x40/0x58
[   52.353942]  __kasan_kmalloc+0xd4/0xd8
[   52.357674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.362188]  kasan_atomics+0xb8/0x2e0
[   52.365834]  kunit_try_run_case+0x170/0x3f0
[   52.370001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.375469]  kthread+0x328/0x630
[   52.378681]  ret_from_fork+0x10/0x20
[   52.382240] 
[   52.383716] The buggy address belongs to the object at ffff000800c2d400
[   52.383716]  which belongs to the cache kmalloc-64 of size 64
[   52.396042] The buggy address is located 0 bytes to the right of
[   52.396042]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.408889] 
[   52.410365] The buggy address belongs to the physical page:
[   52.415921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.423908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.430416] page_type: f5(slab)
[   52.433549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.441274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.448993] page dumped because: kasan: bad access detected
[   52.454548] 
[   52.456023] Memory state around the buggy address:
[   52.460803]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.468006]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.475211] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.482412]                                      ^
[   52.487190]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.494395]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.501596] ==================================================================
[   51.984792] ==================================================================
[   51.991883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   51.999173] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.006551] 
[   52.008034] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.008084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.008099] Hardware name: WinLink E850-96 board (DT)
[   52.008117] Call trace:
[   52.008130]  show_stack+0x20/0x38 (C)
[   52.008161]  dump_stack_lvl+0x8c/0xd0
[   52.008193]  print_report+0x118/0x608
[   52.008222]  kasan_report+0xdc/0x128
[   52.008252]  kasan_check_range+0x100/0x1a8
[   52.008284]  __kasan_check_write+0x20/0x30
[   52.008314]  kasan_atomics_helper+0xc08/0x4858
[   52.008343]  kasan_atomics+0x198/0x2e0
[   52.008372]  kunit_try_run_case+0x170/0x3f0
[   52.008406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.008444]  kthread+0x328/0x630
[   52.008475]  ret_from_fork+0x10/0x20
[   52.008507] 
[   52.078251] Allocated by task 312:
[   52.081639]  kasan_save_stack+0x3c/0x68
[   52.085456]  kasan_save_track+0x20/0x40
[   52.089276]  kasan_save_alloc_info+0x40/0x58
[   52.093529]  __kasan_kmalloc+0xd4/0xd8
[   52.097262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.101776]  kasan_atomics+0xb8/0x2e0
[   52.105421]  kunit_try_run_case+0x170/0x3f0
[   52.109588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.115056]  kthread+0x328/0x630
[   52.118268]  ret_from_fork+0x10/0x20
[   52.121827] 
[   52.123303] The buggy address belongs to the object at ffff000800c2d400
[   52.123303]  which belongs to the cache kmalloc-64 of size 64
[   52.135629] The buggy address is located 0 bytes to the right of
[   52.135629]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.148476] 
[   52.149952] The buggy address belongs to the physical page:
[   52.155508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.163495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.170004] page_type: f5(slab)
[   52.173138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.180861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.188580] page dumped because: kasan: bad access detected
[   52.194135] 
[   52.195611] Memory state around the buggy address:
[   52.200390]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.207593]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.214798] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.221999]                                      ^
[   52.226777]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.233982]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.241183] ==================================================================
[   58.295653] ==================================================================
[   58.302726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   58.310103] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.317481] 
[   58.318964] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.319011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.319025] Hardware name: WinLink E850-96 board (DT)
[   58.319042] Call trace:
[   58.319056]  show_stack+0x20/0x38 (C)
[   58.319085]  dump_stack_lvl+0x8c/0xd0
[   58.319116]  print_report+0x118/0x608
[   58.319145]  kasan_report+0xdc/0x128
[   58.319172]  kasan_check_range+0x100/0x1a8
[   58.319203]  __kasan_check_write+0x20/0x30
[   58.319234]  kasan_atomics_helper+0x147c/0x4858
[   58.319264]  kasan_atomics+0x198/0x2e0
[   58.319290]  kunit_try_run_case+0x170/0x3f0
[   58.319323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.319361]  kthread+0x328/0x630
[   58.319392]  ret_from_fork+0x10/0x20
[   58.319427] 
[   58.389268] Allocated by task 312:
[   58.392655]  kasan_save_stack+0x3c/0x68
[   58.396473]  kasan_save_track+0x20/0x40
[   58.400292]  kasan_save_alloc_info+0x40/0x58
[   58.404545]  __kasan_kmalloc+0xd4/0xd8
[   58.408278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.412792]  kasan_atomics+0xb8/0x2e0
[   58.416437]  kunit_try_run_case+0x170/0x3f0
[   58.420604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.426073]  kthread+0x328/0x630
[   58.429285]  ret_from_fork+0x10/0x20
[   58.432844] 
[   58.434319] The buggy address belongs to the object at ffff000800c2d400
[   58.434319]  which belongs to the cache kmalloc-64 of size 64
[   58.446646] The buggy address is located 0 bytes to the right of
[   58.446646]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.459492] 
[   58.460969] The buggy address belongs to the physical page:
[   58.466525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   58.474511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.481020] page_type: f5(slab)
[   58.484154] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.491877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.499596] page dumped because: kasan: bad access detected
[   58.505151] 
[   58.506627] Memory state around the buggy address:
[   58.511406]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.518610]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.525815] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.533016]                                      ^
[   58.537794]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.544998]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.552200] ==================================================================
[   51.200308] ==================================================================
[   51.207346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   51.214723] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   51.222014] 
[   51.223497] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   51.223549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.223563] Hardware name: WinLink E850-96 board (DT)
[   51.223584] Call trace:
[   51.223597]  show_stack+0x20/0x38 (C)
[   51.223626]  dump_stack_lvl+0x8c/0xd0
[   51.223660]  print_report+0x118/0x608
[   51.223691]  kasan_report+0xdc/0x128
[   51.223720]  __asan_report_load4_noabort+0x20/0x30
[   51.223753]  kasan_atomics_helper+0x3dcc/0x4858
[   51.223785]  kasan_atomics+0x198/0x2e0
[   51.223811]  kunit_try_run_case+0x170/0x3f0
[   51.223844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.223883]  kthread+0x328/0x630
[   51.223916]  ret_from_fork+0x10/0x20
[   51.223948] 
[   51.290416] Allocated by task 312:
[   51.293803]  kasan_save_stack+0x3c/0x68
[   51.297621]  kasan_save_track+0x20/0x40
[   51.301440]  kasan_save_alloc_info+0x40/0x58
[   51.305694]  __kasan_kmalloc+0xd4/0xd8
[   51.309426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.313940]  kasan_atomics+0xb8/0x2e0
[   51.317586]  kunit_try_run_case+0x170/0x3f0
[   51.321752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.327221]  kthread+0x328/0x630
[   51.330433]  ret_from_fork+0x10/0x20
[   51.333992] 
[   51.335467] The buggy address belongs to the object at ffff000800c2d400
[   51.335467]  which belongs to the cache kmalloc-64 of size 64
[   51.347794] The buggy address is located 0 bytes to the right of
[   51.347794]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.360641] 
[   51.362117] The buggy address belongs to the physical page:
[   51.367672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.375660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.382168] page_type: f5(slab)
[   51.385304] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.393025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.400744] page dumped because: kasan: bad access detected
[   51.406300] 
[   51.407776] Memory state around the buggy address:
[   51.412555]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.419758]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.426963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.434164]                                      ^
[   51.438942]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.446147]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.453348] ==================================================================
[   51.460695] ==================================================================
[   51.467759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   51.475049] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   51.482427] 
[   51.483910] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   51.483961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.483977] Hardware name: WinLink E850-96 board (DT)
[   51.483996] Call trace:
[   51.484010]  show_stack+0x20/0x38 (C)
[   51.484042]  dump_stack_lvl+0x8c/0xd0
[   51.484071]  print_report+0x118/0x608
[   51.484100]  kasan_report+0xdc/0x128
[   51.484128]  kasan_check_range+0x100/0x1a8
[   51.484159]  __kasan_check_write+0x20/0x30
[   51.484191]  kasan_atomics_helper+0xb70/0x4858
[   51.484221]  kasan_atomics+0x198/0x2e0
[   51.484249]  kunit_try_run_case+0x170/0x3f0
[   51.484283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.484322]  kthread+0x328/0x630
[   51.484353]  ret_from_fork+0x10/0x20
[   51.484386] 
[   51.554127] Allocated by task 312:
[   51.557515]  kasan_save_stack+0x3c/0x68
[   51.561332]  kasan_save_track+0x20/0x40
[   51.565152]  kasan_save_alloc_info+0x40/0x58
[   51.569405]  __kasan_kmalloc+0xd4/0xd8
[   51.573138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.577651]  kasan_atomics+0xb8/0x2e0
[   51.581297]  kunit_try_run_case+0x170/0x3f0
[   51.585464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.590933]  kthread+0x328/0x630
[   51.594144]  ret_from_fork+0x10/0x20
[   51.597703] 
[   51.599180] The buggy address belongs to the object at ffff000800c2d400
[   51.599180]  which belongs to the cache kmalloc-64 of size 64
[   51.611506] The buggy address is located 0 bytes to the right of
[   51.611506]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.624352] 
[   51.625828] The buggy address belongs to the physical page:
[   51.631385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.639371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.645879] page_type: f5(slab)
[   51.649014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.656737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.664456] page dumped because: kasan: bad access detected
[   51.670011] 
[   51.671487] Memory state around the buggy address:
[   51.676266]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.683469]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.690674] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.697875]                                      ^
[   51.702653]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.709858]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.717059] ==================================================================
[   58.823436] ==================================================================
[   58.830495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   58.837873] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.845251] 
[   58.846734] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.846781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.846796] Hardware name: WinLink E850-96 board (DT)
[   58.846813] Call trace:
[   58.846826]  show_stack+0x20/0x38 (C)
[   58.846859]  dump_stack_lvl+0x8c/0xd0
[   58.846892]  print_report+0x118/0x608
[   58.846920]  kasan_report+0xdc/0x128
[   58.846948]  kasan_check_range+0x100/0x1a8
[   58.846978]  __kasan_check_write+0x20/0x30
[   58.847009]  kasan_atomics_helper+0x154c/0x4858
[   58.847040]  kasan_atomics+0x198/0x2e0
[   58.847064]  kunit_try_run_case+0x170/0x3f0
[   58.847095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.847130]  kthread+0x328/0x630
[   58.847163]  ret_from_fork+0x10/0x20
[   58.847194] 
[   58.917038] Allocated by task 312:
[   58.920425]  kasan_save_stack+0x3c/0x68
[   58.924243]  kasan_save_track+0x20/0x40
[   58.928062]  kasan_save_alloc_info+0x40/0x58
[   58.932315]  __kasan_kmalloc+0xd4/0xd8
[   58.936048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.940562]  kasan_atomics+0xb8/0x2e0
[   58.944208]  kunit_try_run_case+0x170/0x3f0
[   58.948374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.953842]  kthread+0x328/0x630
[   58.957055]  ret_from_fork+0x10/0x20
[   58.960614] 
[   58.962089] The buggy address belongs to the object at ffff000800c2d400
[   58.962089]  which belongs to the cache kmalloc-64 of size 64
[   58.974416] The buggy address is located 0 bytes to the right of
[   58.974416]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.987263] 
[   58.988738] The buggy address belongs to the physical page:
[   58.994294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.002282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.008790] page_type: f5(slab)
[   59.011922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.019647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.027366] page dumped because: kasan: bad access detected
[   59.032921] 
[   59.034397] Memory state around the buggy address:
[   59.039176]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.046380]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.053585] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.060786]                                      ^
[   59.065563]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.072768]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.079969] ==================================================================
[   53.296783] ==================================================================
[   53.303844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   53.311219] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.318511] 
[   53.319993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.320036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.320052] Hardware name: WinLink E850-96 board (DT)
[   53.320073] Call trace:
[   53.320085]  show_stack+0x20/0x38 (C)
[   53.320118]  dump_stack_lvl+0x8c/0xd0
[   53.320149]  print_report+0x118/0x608
[   53.320178]  kasan_report+0xdc/0x128
[   53.320206]  __asan_report_load4_noabort+0x20/0x30
[   53.320239]  kasan_atomics_helper+0x3e04/0x4858
[   53.320269]  kasan_atomics+0x198/0x2e0
[   53.320297]  kunit_try_run_case+0x170/0x3f0
[   53.320328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.320367]  kthread+0x328/0x630
[   53.320397]  ret_from_fork+0x10/0x20
[   53.320426] 
[   53.386912] Allocated by task 312:
[   53.390299]  kasan_save_stack+0x3c/0x68
[   53.394117]  kasan_save_track+0x20/0x40
[   53.397937]  kasan_save_alloc_info+0x40/0x58
[   53.402190]  __kasan_kmalloc+0xd4/0xd8
[   53.405923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.410436]  kasan_atomics+0xb8/0x2e0
[   53.414082]  kunit_try_run_case+0x170/0x3f0
[   53.418249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.423717]  kthread+0x328/0x630
[   53.426929]  ret_from_fork+0x10/0x20
[   53.430488] 
[   53.431964] The buggy address belongs to the object at ffff000800c2d400
[   53.431964]  which belongs to the cache kmalloc-64 of size 64
[   53.444290] The buggy address is located 0 bytes to the right of
[   53.444290]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.457137] 
[   53.458613] The buggy address belongs to the physical page:
[   53.464171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.472156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.478665] page_type: f5(slab)
[   53.481799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.489522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.497241] page dumped because: kasan: bad access detected
[   53.502796] 
[   53.504272] Memory state around the buggy address:
[   53.509050]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.516254]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.523459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.530660]                                      ^
[   53.535438]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.542643]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.549844] ==================================================================
[   45.144774] ==================================================================
[   45.151883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   45.159172] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.166550] 
[   45.168035] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.168089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.168108] Hardware name: WinLink E850-96 board (DT)
[   45.168129] Call trace:
[   45.168145]  show_stack+0x20/0x38 (C)
[   45.168176]  dump_stack_lvl+0x8c/0xd0
[   45.168214]  print_report+0x118/0x608
[   45.168246]  kasan_report+0xdc/0x128
[   45.168275]  kasan_check_range+0x100/0x1a8
[   45.168308]  __kasan_check_write+0x20/0x30
[   45.168341]  kasan_atomics_helper+0x24c/0x4858
[   45.168372]  kasan_atomics+0x198/0x2e0
[   45.168400]  kunit_try_run_case+0x170/0x3f0
[   45.168433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.168472]  kthread+0x328/0x630
[   45.168505]  ret_from_fork+0x10/0x20
[   45.168540] 
[   45.238250] Allocated by task 312:
[   45.241636]  kasan_save_stack+0x3c/0x68
[   45.245455]  kasan_save_track+0x20/0x40
[   45.249274]  kasan_save_alloc_info+0x40/0x58
[   45.253528]  __kasan_kmalloc+0xd4/0xd8
[   45.257260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.261774]  kasan_atomics+0xb8/0x2e0
[   45.265420]  kunit_try_run_case+0x170/0x3f0
[   45.269587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.275055]  kthread+0x328/0x630
[   45.278267]  ret_from_fork+0x10/0x20
[   45.281826] 
[   45.283303] The buggy address belongs to the object at ffff000800c2d400
[   45.283303]  which belongs to the cache kmalloc-64 of size 64
[   45.295630] The buggy address is located 0 bytes to the right of
[   45.295630]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.308475] 
[   45.309952] The buggy address belongs to the physical page:
[   45.315509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.323495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.330004] page_type: f5(slab)
[   45.333136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.340859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.348578] page dumped because: kasan: bad access detected
[   45.354133] 
[   45.355609] Memory state around the buggy address:
[   45.360389]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.367592]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.374797] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.381998]                                      ^
[   45.386776]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.393980]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.401182] ==================================================================
[   50.145438] ==================================================================
[   50.152502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   50.159791] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.167169] 
[   50.168652] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.168697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.168713] Hardware name: WinLink E850-96 board (DT)
[   50.168734] Call trace:
[   50.168747]  show_stack+0x20/0x38 (C)
[   50.168778]  dump_stack_lvl+0x8c/0xd0
[   50.168809]  print_report+0x118/0x608
[   50.168837]  kasan_report+0xdc/0x128
[   50.168867]  kasan_check_range+0x100/0x1a8
[   50.168897]  __kasan_check_write+0x20/0x30
[   50.168929]  kasan_atomics_helper+0x99c/0x4858
[   50.168959]  kasan_atomics+0x198/0x2e0
[   50.168986]  kunit_try_run_case+0x170/0x3f0
[   50.169021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.169060]  kthread+0x328/0x630
[   50.169090]  ret_from_fork+0x10/0x20
[   50.169122] 
[   50.238869] Allocated by task 312:
[   50.242256]  kasan_save_stack+0x3c/0x68
[   50.246074]  kasan_save_track+0x20/0x40
[   50.249894]  kasan_save_alloc_info+0x40/0x58
[   50.254147]  __kasan_kmalloc+0xd4/0xd8
[   50.257880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.262394]  kasan_atomics+0xb8/0x2e0
[   50.266039]  kunit_try_run_case+0x170/0x3f0
[   50.270206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.275675]  kthread+0x328/0x630
[   50.278886]  ret_from_fork+0x10/0x20
[   50.282445] 
[   50.283921] The buggy address belongs to the object at ffff000800c2d400
[   50.283921]  which belongs to the cache kmalloc-64 of size 64
[   50.296248] The buggy address is located 0 bytes to the right of
[   50.296248]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.309094] 
[   50.310570] The buggy address belongs to the physical page:
[   50.316126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.324113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.330622] page_type: f5(slab)
[   50.333756] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.341479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.349198] page dumped because: kasan: bad access detected
[   50.354753] 
[   50.356229] Memory state around the buggy address:
[   50.361008]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.368211]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.375416] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.382617]                                      ^
[   50.387395]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.394600]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.401802] ==================================================================
[   50.672852] ==================================================================
[   50.679923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   50.687214] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.694592] 
[   50.696074] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.696120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.696134] Hardware name: WinLink E850-96 board (DT)
[   50.696155] Call trace:
[   50.696165]  show_stack+0x20/0x38 (C)
[   50.696195]  dump_stack_lvl+0x8c/0xd0
[   50.696227]  print_report+0x118/0x608
[   50.696257]  kasan_report+0xdc/0x128
[   50.696286]  kasan_check_range+0x100/0x1a8
[   50.696318]  __kasan_check_write+0x20/0x30
[   50.696350]  kasan_atomics_helper+0xa6c/0x4858
[   50.696381]  kasan_atomics+0x198/0x2e0
[   50.696408]  kunit_try_run_case+0x170/0x3f0
[   50.696440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.696476]  kthread+0x328/0x630
[   50.696509]  ret_from_fork+0x10/0x20
[   50.696539] 
[   50.766292] Allocated by task 312:
[   50.769679]  kasan_save_stack+0x3c/0x68
[   50.773497]  kasan_save_track+0x20/0x40
[   50.777316]  kasan_save_alloc_info+0x40/0x58
[   50.781570]  __kasan_kmalloc+0xd4/0xd8
[   50.785302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.789816]  kasan_atomics+0xb8/0x2e0
[   50.793462]  kunit_try_run_case+0x170/0x3f0
[   50.797629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.803097]  kthread+0x328/0x630
[   50.806309]  ret_from_fork+0x10/0x20
[   50.809868] 
[   50.811344] The buggy address belongs to the object at ffff000800c2d400
[   50.811344]  which belongs to the cache kmalloc-64 of size 64
[   50.823670] The buggy address is located 0 bytes to the right of
[   50.823670]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.836517] 
[   50.837992] The buggy address belongs to the physical page:
[   50.843550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.851535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.858044] page_type: f5(slab)
[   50.861177] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.868901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.876621] page dumped because: kasan: bad access detected
[   50.882176] 
[   50.883651] Memory state around the buggy address:
[   50.888431]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.895634]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.902839] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.910040]                                      ^
[   50.914818]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.922022]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.929224] ==================================================================
[   59.351200] ==================================================================
[   59.358266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   59.365642] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.372934] 
[   59.374418] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.374467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.374483] Hardware name: WinLink E850-96 board (DT)
[   59.374503] Call trace:
[   59.374516]  show_stack+0x20/0x38 (C)
[   59.374545]  dump_stack_lvl+0x8c/0xd0
[   59.374579]  print_report+0x118/0x608
[   59.374609]  kasan_report+0xdc/0x128
[   59.374636]  __asan_report_load8_noabort+0x20/0x30
[   59.374670]  kasan_atomics_helper+0x3db0/0x4858
[   59.374699]  kasan_atomics+0x198/0x2e0
[   59.374727]  kunit_try_run_case+0x170/0x3f0
[   59.374760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.374795]  kthread+0x328/0x630
[   59.374825]  ret_from_fork+0x10/0x20
[   59.374861] 
[   59.441335] Allocated by task 312:
[   59.444722]  kasan_save_stack+0x3c/0x68
[   59.448541]  kasan_save_track+0x20/0x40
[   59.452360]  kasan_save_alloc_info+0x40/0x58
[   59.456613]  __kasan_kmalloc+0xd4/0xd8
[   59.460346]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.464860]  kasan_atomics+0xb8/0x2e0
[   59.468505]  kunit_try_run_case+0x170/0x3f0
[   59.472671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.478140]  kthread+0x328/0x630
[   59.481352]  ret_from_fork+0x10/0x20
[   59.484911] 
[   59.486387] The buggy address belongs to the object at ffff000800c2d400
[   59.486387]  which belongs to the cache kmalloc-64 of size 64
[   59.498713] The buggy address is located 0 bytes to the right of
[   59.498713]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   59.511560] 
[   59.513036] The buggy address belongs to the physical page:
[   59.518592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.526579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.533088] page_type: f5(slab)
[   59.536222] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.543945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.551664] page dumped because: kasan: bad access detected
[   59.557219] 
[   59.558695] Memory state around the buggy address:
[   59.563474]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.570677]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.577882] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.585083]                                      ^
[   59.589861]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.597066]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.604267] ==================================================================
[   50.409118] ==================================================================
[   50.416213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   50.423502] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.430880] 
[   50.432363] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.432412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.432426] Hardware name: WinLink E850-96 board (DT)
[   50.432444] Call trace:
[   50.432457]  show_stack+0x20/0x38 (C)
[   50.432486]  dump_stack_lvl+0x8c/0xd0
[   50.432520]  print_report+0x118/0x608
[   50.432550]  kasan_report+0xdc/0x128
[   50.432577]  kasan_check_range+0x100/0x1a8
[   50.432608]  __kasan_check_write+0x20/0x30
[   50.432639]  kasan_atomics_helper+0xa04/0x4858
[   50.432667]  kasan_atomics+0x198/0x2e0
[   50.432693]  kunit_try_run_case+0x170/0x3f0
[   50.432725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.432760]  kthread+0x328/0x630
[   50.432791]  ret_from_fork+0x10/0x20
[   50.432822] 
[   50.502581] Allocated by task 312:
[   50.505968]  kasan_save_stack+0x3c/0x68
[   50.509786]  kasan_save_track+0x20/0x40
[   50.513605]  kasan_save_alloc_info+0x40/0x58
[   50.517858]  __kasan_kmalloc+0xd4/0xd8
[   50.521591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.526105]  kasan_atomics+0xb8/0x2e0
[   50.529750]  kunit_try_run_case+0x170/0x3f0
[   50.533917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.539385]  kthread+0x328/0x630
[   50.542598]  ret_from_fork+0x10/0x20
[   50.546157] 
[   50.547632] The buggy address belongs to the object at ffff000800c2d400
[   50.547632]  which belongs to the cache kmalloc-64 of size 64
[   50.559959] The buggy address is located 0 bytes to the right of
[   50.559959]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.572805] 
[   50.574281] The buggy address belongs to the physical page:
[   50.579837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.587824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.594333] page_type: f5(slab)
[   50.597466] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.605190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.612909] page dumped because: kasan: bad access detected
[   50.618465] 
[   50.619940] Memory state around the buggy address:
[   50.624719]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.631923]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.639127] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.646328]                                      ^
[   50.651107]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.658311]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.665512] ==================================================================
[   53.557191] ==================================================================
[   53.564257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   53.571545] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.578837] 
[   53.580319] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.580367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.580382] Hardware name: WinLink E850-96 board (DT)
[   53.580402] Call trace:
[   53.580416]  show_stack+0x20/0x38 (C)
[   53.580446]  dump_stack_lvl+0x8c/0xd0
[   53.580480]  print_report+0x118/0x608
[   53.580509]  kasan_report+0xdc/0x128
[   53.580537]  kasan_check_range+0x100/0x1a8
[   53.580569]  __kasan_check_read+0x20/0x30
[   53.580602]  kasan_atomics_helper+0xdd4/0x4858
[   53.580631]  kasan_atomics+0x198/0x2e0
[   53.580661]  kunit_try_run_case+0x170/0x3f0
[   53.580693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.580731]  kthread+0x328/0x630
[   53.580763]  ret_from_fork+0x10/0x20
[   53.580794] 
[   53.650450] Allocated by task 312:
[   53.653838]  kasan_save_stack+0x3c/0x68
[   53.657655]  kasan_save_track+0x20/0x40
[   53.661475]  kasan_save_alloc_info+0x40/0x58
[   53.665728]  __kasan_kmalloc+0xd4/0xd8
[   53.669460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.673974]  kasan_atomics+0xb8/0x2e0
[   53.677620]  kunit_try_run_case+0x170/0x3f0
[   53.681786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.687255]  kthread+0x328/0x630
[   53.690467]  ret_from_fork+0x10/0x20
[   53.694026] 
[   53.695501] The buggy address belongs to the object at ffff000800c2d400
[   53.695501]  which belongs to the cache kmalloc-64 of size 64
[   53.707828] The buggy address is located 0 bytes to the right of
[   53.707828]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.720675] 
[   53.722151] The buggy address belongs to the physical page:
[   53.727708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.735694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.742204] page_type: f5(slab)
[   53.745335] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.753059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.760778] page dumped because: kasan: bad access detected
[   53.766334] 
[   53.767809] Memory state around the buggy address:
[   53.772589]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.779792]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.786997] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.794198]                                      ^
[   53.798976]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.806180]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.813382] ==================================================================
[   54.344849] ==================================================================
[   54.351918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   54.359294] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.366672] 
[   54.368154] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.368202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.368219] Hardware name: WinLink E850-96 board (DT)
[   54.368239] Call trace:
[   54.368252]  show_stack+0x20/0x38 (C)
[   54.368284]  dump_stack_lvl+0x8c/0xd0
[   54.368316]  print_report+0x118/0x608
[   54.368345]  kasan_report+0xdc/0x128
[   54.368374]  __asan_report_store8_noabort+0x20/0x30
[   54.368408]  kasan_atomics_helper+0x3e5c/0x4858
[   54.368437]  kasan_atomics+0x198/0x2e0
[   54.368465]  kunit_try_run_case+0x170/0x3f0
[   54.368498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.368534]  kthread+0x328/0x630
[   54.368565]  ret_from_fork+0x10/0x20
[   54.368598] 
[   54.435160] Allocated by task 312:
[   54.438548]  kasan_save_stack+0x3c/0x68
[   54.442366]  kasan_save_track+0x20/0x40
[   54.446185]  kasan_save_alloc_info+0x40/0x58
[   54.450438]  __kasan_kmalloc+0xd4/0xd8
[   54.454171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.458685]  kasan_atomics+0xb8/0x2e0
[   54.462330]  kunit_try_run_case+0x170/0x3f0
[   54.466497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.471966]  kthread+0x328/0x630
[   54.475177]  ret_from_fork+0x10/0x20
[   54.478737] 
[   54.480213] The buggy address belongs to the object at ffff000800c2d400
[   54.480213]  which belongs to the cache kmalloc-64 of size 64
[   54.492539] The buggy address is located 0 bytes to the right of
[   54.492539]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   54.505385] 
[   54.506861] The buggy address belongs to the physical page:
[   54.512418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   54.520405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.526913] page_type: f5(slab)
[   54.530047] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.537770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.545489] page dumped because: kasan: bad access detected
[   54.551044] 
[   54.552520] Memory state around the buggy address:
[   54.557299]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.564502]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.571707] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.578908]                                      ^
[   54.583686]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.590891]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.598092] ==================================================================
[   48.302784] ==================================================================
[   48.309820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   48.317110] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.324488] 
[   48.325971] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.326019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.326037] Hardware name: WinLink E850-96 board (DT)
[   48.326057] Call trace:
[   48.326070]  show_stack+0x20/0x38 (C)
[   48.326100]  dump_stack_lvl+0x8c/0xd0
[   48.326133]  print_report+0x118/0x608
[   48.326161]  kasan_report+0xdc/0x128
[   48.326187]  kasan_check_range+0x100/0x1a8
[   48.326219]  __kasan_check_write+0x20/0x30
[   48.326248]  kasan_atomics_helper+0x684/0x4858
[   48.326280]  kasan_atomics+0x198/0x2e0
[   48.326308]  kunit_try_run_case+0x170/0x3f0
[   48.326342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.326379]  kthread+0x328/0x630
[   48.326409]  ret_from_fork+0x10/0x20
[   48.326443] 
[   48.396189] Allocated by task 312:
[   48.399575]  kasan_save_stack+0x3c/0x68
[   48.403394]  kasan_save_track+0x20/0x40
[   48.407213]  kasan_save_alloc_info+0x40/0x58
[   48.411466]  __kasan_kmalloc+0xd4/0xd8
[   48.415199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.419713]  kasan_atomics+0xb8/0x2e0
[   48.423359]  kunit_try_run_case+0x170/0x3f0
[   48.427525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.432994]  kthread+0x328/0x630
[   48.436206]  ret_from_fork+0x10/0x20
[   48.439765] 
[   48.441240] The buggy address belongs to the object at ffff000800c2d400
[   48.441240]  which belongs to the cache kmalloc-64 of size 64
[   48.453567] The buggy address is located 0 bytes to the right of
[   48.453567]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.466413] 
[   48.467889] The buggy address belongs to the physical page:
[   48.473445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   48.481432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.487941] page_type: f5(slab)
[   48.491074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.498798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.506517] page dumped because: kasan: bad access detected
[   48.512072] 
[   48.513548] Memory state around the buggy address:
[   48.518327]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.525531]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.532736] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.539937]                                      ^
[   48.544714]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.551919]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.559120] ==================================================================
[   56.715816] ==================================================================
[   56.722889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   56.730265] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   56.737644] 
[   56.739126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   56.739173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.739188] Hardware name: WinLink E850-96 board (DT)
[   56.739209] Call trace:
[   56.739221]  show_stack+0x20/0x38 (C)
[   56.739252]  dump_stack_lvl+0x8c/0xd0
[   56.739285]  print_report+0x118/0x608
[   56.739316]  kasan_report+0xdc/0x128
[   56.739344]  kasan_check_range+0x100/0x1a8
[   56.739377]  __kasan_check_write+0x20/0x30
[   56.739407]  kasan_atomics_helper+0x11f8/0x4858
[   56.739438]  kasan_atomics+0x198/0x2e0
[   56.739464]  kunit_try_run_case+0x170/0x3f0
[   56.739497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.739535]  kthread+0x328/0x630
[   56.739564]  ret_from_fork+0x10/0x20
[   56.739597] 
[   56.809431] Allocated by task 312:
[   56.812818]  kasan_save_stack+0x3c/0x68
[   56.816636]  kasan_save_track+0x20/0x40
[   56.820455]  kasan_save_alloc_info+0x40/0x58
[   56.824708]  __kasan_kmalloc+0xd4/0xd8
[   56.828441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.832954]  kasan_atomics+0xb8/0x2e0
[   56.836600]  kunit_try_run_case+0x170/0x3f0
[   56.840767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.846236]  kthread+0x328/0x630
[   56.849447]  ret_from_fork+0x10/0x20
[   56.853006] 
[   56.854483] The buggy address belongs to the object at ffff000800c2d400
[   56.854483]  which belongs to the cache kmalloc-64 of size 64
[   56.866808] The buggy address is located 0 bytes to the right of
[   56.866808]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.879655] 
[   56.881131] The buggy address belongs to the physical page:
[   56.886687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.894674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.901183] page_type: f5(slab)
[   56.904315] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.912040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.919759] page dumped because: kasan: bad access detected
[   56.925315] 
[   56.926790] Memory state around the buggy address:
[   56.931569]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.938773]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.945977] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.953178]                                      ^
[   56.957956]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.965161]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.972362] ==================================================================
[   53.033089] ==================================================================
[   53.040131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   53.047421] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.054799] 
[   53.056283] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.056331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.056347] Hardware name: WinLink E850-96 board (DT)
[   53.056368] Call trace:
[   53.056379]  show_stack+0x20/0x38 (C)
[   53.056411]  dump_stack_lvl+0x8c/0xd0
[   53.056445]  print_report+0x118/0x608
[   53.056475]  kasan_report+0xdc/0x128
[   53.056504]  kasan_check_range+0x100/0x1a8
[   53.056534]  __kasan_check_write+0x20/0x30
[   53.056567]  kasan_atomics_helper+0xd3c/0x4858
[   53.056596]  kasan_atomics+0x198/0x2e0
[   53.056624]  kunit_try_run_case+0x170/0x3f0
[   53.056659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.056695]  kthread+0x328/0x630
[   53.056727]  ret_from_fork+0x10/0x20
[   53.056760] 
[   53.126500] Allocated by task 312:
[   53.129887]  kasan_save_stack+0x3c/0x68
[   53.133705]  kasan_save_track+0x20/0x40
[   53.137524]  kasan_save_alloc_info+0x40/0x58
[   53.141777]  __kasan_kmalloc+0xd4/0xd8
[   53.145510]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.150024]  kasan_atomics+0xb8/0x2e0
[   53.153670]  kunit_try_run_case+0x170/0x3f0
[   53.157836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.163305]  kthread+0x328/0x630
[   53.166516]  ret_from_fork+0x10/0x20
[   53.170076] 
[   53.171551] The buggy address belongs to the object at ffff000800c2d400
[   53.171551]  which belongs to the cache kmalloc-64 of size 64
[   53.183878] The buggy address is located 0 bytes to the right of
[   53.183878]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.196724] 
[   53.198201] The buggy address belongs to the physical page:
[   53.203758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.211743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.218252] page_type: f5(slab)
[   53.221386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.229109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.236828] page dumped because: kasan: bad access detected
[   53.242383] 
[   53.243859] Memory state around the buggy address:
[   53.248637]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.255842]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.263046] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.270247]                                      ^
[   53.275025]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.282230]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.289431] ==================================================================
[   49.881752] ==================================================================
[   49.888790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   49.896080] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.903458] 
[   49.904939] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.904986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.905003] Hardware name: WinLink E850-96 board (DT)
[   49.905023] Call trace:
[   49.905036]  show_stack+0x20/0x38 (C)
[   49.905067]  dump_stack_lvl+0x8c/0xd0
[   49.905097]  print_report+0x118/0x608
[   49.905126]  kasan_report+0xdc/0x128
[   49.905156]  kasan_check_range+0x100/0x1a8
[   49.905185]  __kasan_check_write+0x20/0x30
[   49.905217]  kasan_atomics_helper+0x934/0x4858
[   49.905245]  kasan_atomics+0x198/0x2e0
[   49.905275]  kunit_try_run_case+0x170/0x3f0
[   49.905305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.905341]  kthread+0x328/0x630
[   49.905371]  ret_from_fork+0x10/0x20
[   49.905403] 
[   49.975158] Allocated by task 312:
[   49.978545]  kasan_save_stack+0x3c/0x68
[   49.982363]  kasan_save_track+0x20/0x40
[   49.986183]  kasan_save_alloc_info+0x40/0x58
[   49.990436]  __kasan_kmalloc+0xd4/0xd8
[   49.994168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.998682]  kasan_atomics+0xb8/0x2e0
[   50.002328]  kunit_try_run_case+0x170/0x3f0
[   50.006495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.011963]  kthread+0x328/0x630
[   50.015175]  ret_from_fork+0x10/0x20
[   50.018734] 
[   50.020209] The buggy address belongs to the object at ffff000800c2d400
[   50.020209]  which belongs to the cache kmalloc-64 of size 64
[   50.032536] The buggy address is located 0 bytes to the right of
[   50.032536]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.045383] 
[   50.046859] The buggy address belongs to the physical page:
[   50.052416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.060403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.066911] page_type: f5(slab)
[   50.070044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.077767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.085486] page dumped because: kasan: bad access detected
[   50.091042] 
[   50.092518] Memory state around the buggy address:
[   50.097297]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.104500]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.111705] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.118906]                                      ^
[   50.123684]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.130888]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.138090] ==================================================================
[   45.408496] ==================================================================
[   45.415594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   45.422883] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.430174] 
[   45.431660] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.431710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.431727] Hardware name: WinLink E850-96 board (DT)
[   45.431748] Call trace:
[   45.431762]  show_stack+0x20/0x38 (C)
[   45.431795]  dump_stack_lvl+0x8c/0xd0
[   45.431829]  print_report+0x118/0x608
[   45.431859]  kasan_report+0xdc/0x128
[   45.431888]  kasan_check_range+0x100/0x1a8
[   45.431920]  __kasan_check_read+0x20/0x30
[   45.431952]  kasan_atomics_helper+0x2b0/0x4858
[   45.431981]  kasan_atomics+0x198/0x2e0
[   45.432007]  kunit_try_run_case+0x170/0x3f0
[   45.432044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.432080]  kthread+0x328/0x630
[   45.432110]  ret_from_fork+0x10/0x20
[   45.432147] 
[   45.501787] Allocated by task 312:
[   45.505175]  kasan_save_stack+0x3c/0x68
[   45.508993]  kasan_save_track+0x20/0x40
[   45.512812]  kasan_save_alloc_info+0x40/0x58
[   45.517065]  __kasan_kmalloc+0xd4/0xd8
[   45.520798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.525312]  kasan_atomics+0xb8/0x2e0
[   45.528958]  kunit_try_run_case+0x170/0x3f0
[   45.533124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.538592]  kthread+0x328/0x630
[   45.541804]  ret_from_fork+0x10/0x20
[   45.545364] 
[   45.546841] The buggy address belongs to the object at ffff000800c2d400
[   45.546841]  which belongs to the cache kmalloc-64 of size 64
[   45.559166] The buggy address is located 0 bytes to the right of
[   45.559166]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.572012] 
[   45.573489] The buggy address belongs to the physical page:
[   45.579047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.587034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.593541] page_type: f5(slab)
[   45.596675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.604397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.612116] page dumped because: kasan: bad access detected
[   45.617672] 
[   45.619147] Memory state around the buggy address:
[   45.623928]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.631130]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.638334] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.645536]                                      ^
[   45.650314]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.657518]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.664720] ==================================================================
[   54.081167] ==================================================================
[   54.088208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   54.095496] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.102874] 
[   54.104356] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.104402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.104420] Hardware name: WinLink E850-96 board (DT)
[   54.104441] Call trace:
[   54.104456]  show_stack+0x20/0x38 (C)
[   54.104487]  dump_stack_lvl+0x8c/0xd0
[   54.104518]  print_report+0x118/0x608
[   54.104549]  kasan_report+0xdc/0x128
[   54.104578]  kasan_check_range+0x100/0x1a8
[   54.104610]  __kasan_check_write+0x20/0x30
[   54.104642]  kasan_atomics_helper+0xe44/0x4858
[   54.104670]  kasan_atomics+0x198/0x2e0
[   54.104698]  kunit_try_run_case+0x170/0x3f0
[   54.104732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.104769]  kthread+0x328/0x630
[   54.104799]  ret_from_fork+0x10/0x20
[   54.104831] 
[   54.174574] Allocated by task 312:
[   54.177961]  kasan_save_stack+0x3c/0x68
[   54.181779]  kasan_save_track+0x20/0x40
[   54.185598]  kasan_save_alloc_info+0x40/0x58
[   54.189852]  __kasan_kmalloc+0xd4/0xd8
[   54.193585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.198098]  kasan_atomics+0xb8/0x2e0
[   54.201744]  kunit_try_run_case+0x170/0x3f0
[   54.205911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.211379]  kthread+0x328/0x630
[   54.214591]  ret_from_fork+0x10/0x20
[   54.218150] 
[   54.219626] The buggy address belongs to the object at ffff000800c2d400
[   54.219626]  which belongs to the cache kmalloc-64 of size 64
[   54.231952] The buggy address is located 0 bytes to the right of
[   54.231952]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   54.244799] 
[   54.246275] The buggy address belongs to the physical page:
[   54.251831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   54.259818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.266328] page_type: f5(slab)
[   54.269461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.277183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.284902] page dumped because: kasan: bad access detected
[   54.290458] 
[   54.291934] Memory state around the buggy address:
[   54.296713]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.303916]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.311120] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.318322]                                      ^
[   54.323100]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.330305]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.337506] ==================================================================
[   57.507479] ==================================================================
[   57.514545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   57.521920] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.529298] 
[   57.530782] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.530829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.530847] Hardware name: WinLink E850-96 board (DT)
[   57.530864] Call trace:
[   57.530874]  show_stack+0x20/0x38 (C)
[   57.530906]  dump_stack_lvl+0x8c/0xd0
[   57.530936]  print_report+0x118/0x608
[   57.530966]  kasan_report+0xdc/0x128
[   57.530994]  kasan_check_range+0x100/0x1a8
[   57.531024]  __kasan_check_write+0x20/0x30
[   57.531055]  kasan_atomics_helper+0x1384/0x4858
[   57.531086]  kasan_atomics+0x198/0x2e0
[   57.531114]  kunit_try_run_case+0x170/0x3f0
[   57.531147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.531187]  kthread+0x328/0x630
[   57.531220]  ret_from_fork+0x10/0x20
[   57.531250] 
[   57.601085] Allocated by task 312:
[   57.604472]  kasan_save_stack+0x3c/0x68
[   57.608290]  kasan_save_track+0x20/0x40
[   57.612110]  kasan_save_alloc_info+0x40/0x58
[   57.616363]  __kasan_kmalloc+0xd4/0xd8
[   57.620095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.624609]  kasan_atomics+0xb8/0x2e0
[   57.628255]  kunit_try_run_case+0x170/0x3f0
[   57.632422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.637890]  kthread+0x328/0x630
[   57.641102]  ret_from_fork+0x10/0x20
[   57.644661] 
[   57.646136] The buggy address belongs to the object at ffff000800c2d400
[   57.646136]  which belongs to the cache kmalloc-64 of size 64
[   57.658463] The buggy address is located 0 bytes to the right of
[   57.658463]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.671310] 
[   57.672786] The buggy address belongs to the physical page:
[   57.678342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.686330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.692837] page_type: f5(slab)
[   57.695970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.703695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.711413] page dumped because: kasan: bad access detected
[   57.716969] 
[   57.718445] Memory state around the buggy address:
[   57.723224]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.730427]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.737632] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.744833]                                      ^
[   57.749611]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.756816]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.764017] ==================================================================
[   58.031775] ==================================================================
[   58.038840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   58.046218] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.053596] 
[   58.055077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.055125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.055142] Hardware name: WinLink E850-96 board (DT)
[   58.055161] Call trace:
[   58.055174]  show_stack+0x20/0x38 (C)
[   58.055205]  dump_stack_lvl+0x8c/0xd0
[   58.055236]  print_report+0x118/0x608
[   58.055265]  kasan_report+0xdc/0x128
[   58.055294]  kasan_check_range+0x100/0x1a8
[   58.055325]  __kasan_check_write+0x20/0x30
[   58.055357]  kasan_atomics_helper+0x1414/0x4858
[   58.055385]  kasan_atomics+0x198/0x2e0
[   58.055413]  kunit_try_run_case+0x170/0x3f0
[   58.055444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.055480]  kthread+0x328/0x630
[   58.055510]  ret_from_fork+0x10/0x20
[   58.055545] 
[   58.125383] Allocated by task 312:
[   58.128770]  kasan_save_stack+0x3c/0x68
[   58.132588]  kasan_save_track+0x20/0x40
[   58.136407]  kasan_save_alloc_info+0x40/0x58
[   58.140660]  __kasan_kmalloc+0xd4/0xd8
[   58.144393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.148907]  kasan_atomics+0xb8/0x2e0
[   58.152553]  kunit_try_run_case+0x170/0x3f0
[   58.156719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.162188]  kthread+0x328/0x630
[   58.165400]  ret_from_fork+0x10/0x20
[   58.168959] 
[   58.170434] The buggy address belongs to the object at ffff000800c2d400
[   58.170434]  which belongs to the cache kmalloc-64 of size 64
[   58.182761] The buggy address is located 0 bytes to the right of
[   58.182761]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.195607] 
[   58.197084] The buggy address belongs to the physical page:
[   58.202639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   58.210625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.217135] page_type: f5(slab)
[   58.220268] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.227992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.235711] page dumped because: kasan: bad access detected
[   58.241267] 
[   58.242742] Memory state around the buggy address:
[   58.247520]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.254725]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.261930] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.269131]                                      ^
[   58.273909]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.281113]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.288315] ==================================================================
[   56.188078] ==================================================================
[   56.195119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   56.202495] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   56.209874] 
[   56.211355] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   56.211403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.211417] Hardware name: WinLink E850-96 board (DT)
[   56.211438] Call trace:
[   56.211448]  show_stack+0x20/0x38 (C)
[   56.211478]  dump_stack_lvl+0x8c/0xd0
[   56.211511]  print_report+0x118/0x608
[   56.211541]  kasan_report+0xdc/0x128
[   56.211567]  kasan_check_range+0x100/0x1a8
[   56.211599]  __kasan_check_write+0x20/0x30
[   56.211630]  kasan_atomics_helper+0x1128/0x4858
[   56.211660]  kasan_atomics+0x198/0x2e0
[   56.211687]  kunit_try_run_case+0x170/0x3f0
[   56.211720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.211759]  kthread+0x328/0x630
[   56.211790]  ret_from_fork+0x10/0x20
[   56.211824] 
[   56.281661] Allocated by task 312:
[   56.285048]  kasan_save_stack+0x3c/0x68
[   56.288865]  kasan_save_track+0x20/0x40
[   56.292685]  kasan_save_alloc_info+0x40/0x58
[   56.296938]  __kasan_kmalloc+0xd4/0xd8
[   56.300671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.305184]  kasan_atomics+0xb8/0x2e0
[   56.308830]  kunit_try_run_case+0x170/0x3f0
[   56.312997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.318466]  kthread+0x328/0x630
[   56.321677]  ret_from_fork+0x10/0x20
[   56.325237] 
[   56.326712] The buggy address belongs to the object at ffff000800c2d400
[   56.326712]  which belongs to the cache kmalloc-64 of size 64
[   56.339039] The buggy address is located 0 bytes to the right of
[   56.339039]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.351885] 
[   56.353361] The buggy address belongs to the physical page:
[   56.358917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.366906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.373413] page_type: f5(slab)
[   56.376546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.384270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.391989] page dumped because: kasan: bad access detected
[   56.397544] 
[   56.399020] Memory state around the buggy address:
[   56.403800]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.411002]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.418207] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.425409]                                      ^
[   56.430186]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.437391]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.444592] ==================================================================
[   52.772654] ==================================================================
[   52.779718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   52.787095] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.794387] 
[   52.795871] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.795920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.795936] Hardware name: WinLink E850-96 board (DT)
[   52.795955] Call trace:
[   52.795967]  show_stack+0x20/0x38 (C)
[   52.795999]  dump_stack_lvl+0x8c/0xd0
[   52.796031]  print_report+0x118/0x608
[   52.796060]  kasan_report+0xdc/0x128
[   52.796090]  __asan_report_load4_noabort+0x20/0x30
[   52.796124]  kasan_atomics_helper+0x3dd8/0x4858
[   52.796153]  kasan_atomics+0x198/0x2e0
[   52.796182]  kunit_try_run_case+0x170/0x3f0
[   52.796215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.796253]  kthread+0x328/0x630
[   52.796283]  ret_from_fork+0x10/0x20
[   52.796315] 
[   52.862788] Allocated by task 312:
[   52.866176]  kasan_save_stack+0x3c/0x68
[   52.869993]  kasan_save_track+0x20/0x40
[   52.873812]  kasan_save_alloc_info+0x40/0x58
[   52.878066]  __kasan_kmalloc+0xd4/0xd8
[   52.881799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.886312]  kasan_atomics+0xb8/0x2e0
[   52.889958]  kunit_try_run_case+0x170/0x3f0
[   52.894125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.899593]  kthread+0x328/0x630
[   52.902805]  ret_from_fork+0x10/0x20
[   52.906364] 
[   52.907840] The buggy address belongs to the object at ffff000800c2d400
[   52.907840]  which belongs to the cache kmalloc-64 of size 64
[   52.920166] The buggy address is located 0 bytes to the right of
[   52.920166]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.933013] 
[   52.934489] The buggy address belongs to the physical page:
[   52.940046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.948032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.954541] page_type: f5(slab)
[   52.957675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.965398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.973117] page dumped because: kasan: bad access detected
[   52.978672] 
[   52.980147] Memory state around the buggy address:
[   52.984927]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.992130]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.999335] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.006536]                                      ^
[   53.011314]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.018519]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.025720] ==================================================================
[   60.135885] ==================================================================
[   60.142976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   60.150353] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.157731] 
[   60.159213] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.159258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.159273] Hardware name: WinLink E850-96 board (DT)
[   60.159294] Call trace:
[   60.159307]  show_stack+0x20/0x38 (C)
[   60.159340]  dump_stack_lvl+0x8c/0xd0
[   60.159370]  print_report+0x118/0x608
[   60.159398]  kasan_report+0xdc/0x128
[   60.159425]  kasan_check_range+0x100/0x1a8
[   60.159455]  __kasan_check_write+0x20/0x30
[   60.159486]  kasan_atomics_helper+0x16d0/0x4858
[   60.159516]  kasan_atomics+0x198/0x2e0
[   60.159542]  kunit_try_run_case+0x170/0x3f0
[   60.159574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.159609]  kthread+0x328/0x630
[   60.159643]  ret_from_fork+0x10/0x20
[   60.159674] 
[   60.229518] Allocated by task 312:
[   60.232905]  kasan_save_stack+0x3c/0x68
[   60.236723]  kasan_save_track+0x20/0x40
[   60.240542]  kasan_save_alloc_info+0x40/0x58
[   60.244796]  __kasan_kmalloc+0xd4/0xd8
[   60.248528]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.253042]  kasan_atomics+0xb8/0x2e0
[   60.256688]  kunit_try_run_case+0x170/0x3f0
[   60.260854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.266323]  kthread+0x328/0x630
[   60.269535]  ret_from_fork+0x10/0x20
[   60.273094] 
[   60.274569] The buggy address belongs to the object at ffff000800c2d400
[   60.274569]  which belongs to the cache kmalloc-64 of size 64
[   60.286896] The buggy address is located 0 bytes to the right of
[   60.286896]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.299743] 
[   60.301218] The buggy address belongs to the physical page:
[   60.306774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.314762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.321272] page_type: f5(slab)
[   60.324405] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.332127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.339848] page dumped because: kasan: bad access detected
[   60.345401] 
[   60.346877] Memory state around the buggy address:
[   60.351657]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.358860]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.366065] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.373266]                                      ^
[   60.378044]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.385248]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.392450] ==================================================================
[   56.451938] ==================================================================
[   56.459003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   56.466381] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   56.473759] 
[   56.475241] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   56.475288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.475303] Hardware name: WinLink E850-96 board (DT)
[   56.475321] Call trace:
[   56.475331]  show_stack+0x20/0x38 (C)
[   56.475362]  dump_stack_lvl+0x8c/0xd0
[   56.475393]  print_report+0x118/0x608
[   56.475424]  kasan_report+0xdc/0x128
[   56.475453]  kasan_check_range+0x100/0x1a8
[   56.475484]  __kasan_check_write+0x20/0x30
[   56.475516]  kasan_atomics_helper+0x1190/0x4858
[   56.475544]  kasan_atomics+0x198/0x2e0
[   56.475572]  kunit_try_run_case+0x170/0x3f0
[   56.475603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.475639]  kthread+0x328/0x630
[   56.475671]  ret_from_fork+0x10/0x20
[   56.475701] 
[   56.545546] Allocated by task 312:
[   56.548933]  kasan_save_stack+0x3c/0x68
[   56.552751]  kasan_save_track+0x20/0x40
[   56.556570]  kasan_save_alloc_info+0x40/0x58
[   56.560823]  __kasan_kmalloc+0xd4/0xd8
[   56.564556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.569069]  kasan_atomics+0xb8/0x2e0
[   56.572715]  kunit_try_run_case+0x170/0x3f0
[   56.576882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.582351]  kthread+0x328/0x630
[   56.585562]  ret_from_fork+0x10/0x20
[   56.589121] 
[   56.590597] The buggy address belongs to the object at ffff000800c2d400
[   56.590597]  which belongs to the cache kmalloc-64 of size 64
[   56.602924] The buggy address is located 0 bytes to the right of
[   56.602924]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.615770] 
[   56.617246] The buggy address belongs to the physical page:
[   56.622802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.630789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.637298] page_type: f5(slab)
[   56.640430] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.648155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.655874] page dumped because: kasan: bad access detected
[   56.661429] 
[   56.662905] Memory state around the buggy address:
[   56.667684]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.674888]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.682092] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.689294]                                      ^
[   56.694071]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.701276]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.708477] ==================================================================
[   44.620742] ==================================================================
[   44.627761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   44.635135] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   44.642513] 
[   44.643998] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.644053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.644069] Hardware name: WinLink E850-96 board (DT)
[   44.644089] Call trace:
[   44.644101]  show_stack+0x20/0x38 (C)
[   44.644134]  dump_stack_lvl+0x8c/0xd0
[   44.644169]  print_report+0x118/0x608
[   44.644202]  kasan_report+0xdc/0x128
[   44.644233]  __asan_report_store4_noabort+0x20/0x30
[   44.644266]  kasan_atomics_helper+0x3f7c/0x4858
[   44.644296]  kasan_atomics+0x198/0x2e0
[   44.644325]  kunit_try_run_case+0x170/0x3f0
[   44.644360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.644397]  kthread+0x328/0x630
[   44.644433]  ret_from_fork+0x10/0x20
[   44.644467] 
[   44.711001] Allocated by task 312:
[   44.714388]  kasan_save_stack+0x3c/0x68
[   44.718206]  kasan_save_track+0x20/0x40
[   44.722025]  kasan_save_alloc_info+0x40/0x58
[   44.726279]  __kasan_kmalloc+0xd4/0xd8
[   44.730011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.734525]  kasan_atomics+0xb8/0x2e0
[   44.738171]  kunit_try_run_case+0x170/0x3f0
[   44.742337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.747807]  kthread+0x328/0x630
[   44.751018]  ret_from_fork+0x10/0x20
[   44.754577] 
[   44.756054] The buggy address belongs to the object at ffff000800c2d400
[   44.756054]  which belongs to the cache kmalloc-64 of size 64
[   44.768380] The buggy address is located 0 bytes to the right of
[   44.768380]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   44.781226] 
[   44.782705] The buggy address belongs to the physical page:
[   44.788261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   44.796246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.802755] page_type: f5(slab)
[   44.805889] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.813610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.821329] page dumped because: kasan: bad access detected
[   44.826884] 
[   44.828360] Memory state around the buggy address:
[   44.833140]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.840343]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.847548] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.854749]                                      ^
[   44.859527]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.866732]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.873933] ==================================================================
[   58.559517] ==================================================================
[   58.566610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   58.573988] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.581366] 
[   58.582849] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.582895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.582911] Hardware name: WinLink E850-96 board (DT)
[   58.582932] Call trace:
[   58.582945]  show_stack+0x20/0x38 (C)
[   58.582976]  dump_stack_lvl+0x8c/0xd0
[   58.583007]  print_report+0x118/0x608
[   58.583035]  kasan_report+0xdc/0x128
[   58.583065]  kasan_check_range+0x100/0x1a8
[   58.583095]  __kasan_check_write+0x20/0x30
[   58.583128]  kasan_atomics_helper+0x14e4/0x4858
[   58.583157]  kasan_atomics+0x198/0x2e0
[   58.583183]  kunit_try_run_case+0x170/0x3f0
[   58.583215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.583251]  kthread+0x328/0x630
[   58.583284]  ret_from_fork+0x10/0x20
[   58.583316] 
[   58.653153] Allocated by task 312:
[   58.656540]  kasan_save_stack+0x3c/0x68
[   58.660358]  kasan_save_track+0x20/0x40
[   58.664177]  kasan_save_alloc_info+0x40/0x58
[   58.668431]  __kasan_kmalloc+0xd4/0xd8
[   58.672163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.676677]  kasan_atomics+0xb8/0x2e0
[   58.680323]  kunit_try_run_case+0x170/0x3f0
[   58.684489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.689958]  kthread+0x328/0x630
[   58.693169]  ret_from_fork+0x10/0x20
[   58.696728] 
[   58.698204] The buggy address belongs to the object at ffff000800c2d400
[   58.698204]  which belongs to the cache kmalloc-64 of size 64
[   58.710531] The buggy address is located 0 bytes to the right of
[   58.710531]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.723377] 
[   58.724853] The buggy address belongs to the physical page:
[   58.730410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   58.738396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.744905] page_type: f5(slab)
[   58.748038] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.755762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.763481] page dumped because: kasan: bad access detected
[   58.769037] 
[   58.770512] Memory state around the buggy address:
[   58.775290]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.782495]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.789700] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.796901]                                      ^
[   58.801678]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.808883]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.816085] ==================================================================
[   59.611637] ==================================================================
[   59.618678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   59.626055] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.633433] 
[   59.634915] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.634961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.634976] Hardware name: WinLink E850-96 board (DT)
[   59.634993] Call trace:
[   59.635006]  show_stack+0x20/0x38 (C)
[   59.635036]  dump_stack_lvl+0x8c/0xd0
[   59.635066]  print_report+0x118/0x608
[   59.635097]  kasan_report+0xdc/0x128
[   59.635124]  kasan_check_range+0x100/0x1a8
[   59.635156]  __kasan_check_write+0x20/0x30
[   59.635187]  kasan_atomics_helper+0x1644/0x4858
[   59.635217]  kasan_atomics+0x198/0x2e0
[   59.635246]  kunit_try_run_case+0x170/0x3f0
[   59.635280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.635318]  kthread+0x328/0x630
[   59.635349]  ret_from_fork+0x10/0x20
[   59.635381] 
[   59.705220] Allocated by task 312:
[   59.708607]  kasan_save_stack+0x3c/0x68
[   59.712425]  kasan_save_track+0x20/0x40
[   59.716245]  kasan_save_alloc_info+0x40/0x58
[   59.720498]  __kasan_kmalloc+0xd4/0xd8
[   59.724231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.728745]  kasan_atomics+0xb8/0x2e0
[   59.732390]  kunit_try_run_case+0x170/0x3f0
[   59.736557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.742025]  kthread+0x328/0x630
[   59.745237]  ret_from_fork+0x10/0x20
[   59.748796] 
[   59.750272] The buggy address belongs to the object at ffff000800c2d400
[   59.750272]  which belongs to the cache kmalloc-64 of size 64
[   59.762598] The buggy address is located 0 bytes to the right of
[   59.762598]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   59.775445] 
[   59.776921] The buggy address belongs to the physical page:
[   59.782477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.790464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.796972] page_type: f5(slab)
[   59.800105] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.807830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.815549] page dumped because: kasan: bad access detected
[   59.821104] 
[   59.822580] Memory state around the buggy address:
[   59.827359]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.834562]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.841767] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.848968]                                      ^
[   59.853746]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.860951]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.868152] ==================================================================
[   54.869155] ==================================================================
[   54.876216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   54.883505] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.890883] 
[   54.892366] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.892411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.892426] Hardware name: WinLink E850-96 board (DT)
[   54.892444] Call trace:
[   54.892459]  show_stack+0x20/0x38 (C)
[   54.892490]  dump_stack_lvl+0x8c/0xd0
[   54.892522]  print_report+0x118/0x608
[   54.892552]  kasan_report+0xdc/0x128
[   54.892582]  kasan_check_range+0x100/0x1a8
[   54.892613]  __kasan_check_write+0x20/0x30
[   54.892645]  kasan_atomics_helper+0xf20/0x4858
[   54.892673]  kasan_atomics+0x198/0x2e0
[   54.892702]  kunit_try_run_case+0x170/0x3f0
[   54.892735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.892772]  kthread+0x328/0x630
[   54.892803]  ret_from_fork+0x10/0x20
[   54.892834] 
[   54.962583] Allocated by task 312:
[   54.965971]  kasan_save_stack+0x3c/0x68
[   54.969788]  kasan_save_track+0x20/0x40
[   54.973608]  kasan_save_alloc_info+0x40/0x58
[   54.977861]  __kasan_kmalloc+0xd4/0xd8
[   54.981594]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.986107]  kasan_atomics+0xb8/0x2e0
[   54.989753]  kunit_try_run_case+0x170/0x3f0
[   54.993920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.999388]  kthread+0x328/0x630
[   55.002600]  ret_from_fork+0x10/0x20
[   55.006159] 
[   55.007636] The buggy address belongs to the object at ffff000800c2d400
[   55.007636]  which belongs to the cache kmalloc-64 of size 64
[   55.019961] The buggy address is located 0 bytes to the right of
[   55.019961]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.032808] 
[   55.034284] The buggy address belongs to the physical page:
[   55.039839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.047827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.054336] page_type: f5(slab)
[   55.057468] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.065192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.072911] page dumped because: kasan: bad access detected
[   55.078467] 
[   55.079942] Memory state around the buggy address:
[   55.084722]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.091925]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.099130] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.106331]                                      ^
[   55.111109]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.118314]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.125515] ==================================================================
[   46.456790] ==================================================================
[   46.463841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   46.471131] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   46.478509] 
[   46.479993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   46.480046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.480064] Hardware name: WinLink E850-96 board (DT)
[   46.480082] Call trace:
[   46.480093]  show_stack+0x20/0x38 (C)
[   46.480124]  dump_stack_lvl+0x8c/0xd0
[   46.480156]  print_report+0x118/0x608
[   46.480186]  kasan_report+0xdc/0x128
[   46.480215]  kasan_check_range+0x100/0x1a8
[   46.480246]  __kasan_check_write+0x20/0x30
[   46.480277]  kasan_atomics_helper+0x3ac/0x4858
[   46.480305]  kasan_atomics+0x198/0x2e0
[   46.480333]  kunit_try_run_case+0x170/0x3f0
[   46.480365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.480402]  kthread+0x328/0x630
[   46.480434]  ret_from_fork+0x10/0x20
[   46.480468] 
[   46.550210] Allocated by task 312:
[   46.553595]  kasan_save_stack+0x3c/0x68
[   46.557414]  kasan_save_track+0x20/0x40
[   46.561234]  kasan_save_alloc_info+0x40/0x58
[   46.565487]  __kasan_kmalloc+0xd4/0xd8
[   46.569220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.573733]  kasan_atomics+0xb8/0x2e0
[   46.577379]  kunit_try_run_case+0x170/0x3f0
[   46.581546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.587015]  kthread+0x328/0x630
[   46.590226]  ret_from_fork+0x10/0x20
[   46.593785] 
[   46.595260] The buggy address belongs to the object at ffff000800c2d400
[   46.595260]  which belongs to the cache kmalloc-64 of size 64
[   46.607587] The buggy address is located 0 bytes to the right of
[   46.607587]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.620434] 
[   46.621910] The buggy address belongs to the physical page:
[   46.627469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.635453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.641962] page_type: f5(slab)
[   46.645094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.652819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.660538] page dumped because: kasan: bad access detected
[   46.666093] 
[   46.667568] Memory state around the buggy address:
[   46.672348]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.679552]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.686756] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.693958]                                      ^
[   46.698735]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.705940]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.713141] ==================================================================
[   54.605459] ==================================================================
[   54.612503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   54.619794] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.627172] 
[   54.628653] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.628699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.628716] Hardware name: WinLink E850-96 board (DT)
[   54.628737] Call trace:
[   54.628748]  show_stack+0x20/0x38 (C)
[   54.628779]  dump_stack_lvl+0x8c/0xd0
[   54.628811]  print_report+0x118/0x608
[   54.628841]  kasan_report+0xdc/0x128
[   54.628868]  kasan_check_range+0x100/0x1a8
[   54.628898]  __kasan_check_write+0x20/0x30
[   54.628930]  kasan_atomics_helper+0xeb8/0x4858
[   54.628958]  kasan_atomics+0x198/0x2e0
[   54.628985]  kunit_try_run_case+0x170/0x3f0
[   54.629017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.629054]  kthread+0x328/0x630
[   54.629086]  ret_from_fork+0x10/0x20
[   54.629119] 
[   54.698872] Allocated by task 312:
[   54.702257]  kasan_save_stack+0x3c/0x68
[   54.706076]  kasan_save_track+0x20/0x40
[   54.709896]  kasan_save_alloc_info+0x40/0x58
[   54.714150]  __kasan_kmalloc+0xd4/0xd8
[   54.717882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.722396]  kasan_atomics+0xb8/0x2e0
[   54.726042]  kunit_try_run_case+0x170/0x3f0
[   54.730208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.735677]  kthread+0x328/0x630
[   54.738889]  ret_from_fork+0x10/0x20
[   54.742447] 
[   54.743923] The buggy address belongs to the object at ffff000800c2d400
[   54.743923]  which belongs to the cache kmalloc-64 of size 64
[   54.756250] The buggy address is located 0 bytes to the right of
[   54.756250]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   54.769096] 
[   54.770572] The buggy address belongs to the physical page:
[   54.776128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   54.784116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.790624] page_type: f5(slab)
[   54.793758] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.801481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.809200] page dumped because: kasan: bad access detected
[   54.814755] 
[   54.816231] Memory state around the buggy address:
[   54.821011]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.828214]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.835419] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.842620]                                      ^
[   54.847398]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.854602]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.861803] ==================================================================
[   45.932518] ==================================================================
[   45.939545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   45.946833] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.954212] 
[   45.955696] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.955750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.955766] Hardware name: WinLink E850-96 board (DT)
[   45.955786] Call trace:
[   45.955798]  show_stack+0x20/0x38 (C)
[   45.955828]  dump_stack_lvl+0x8c/0xd0
[   45.955863]  print_report+0x118/0x608
[   45.955893]  kasan_report+0xdc/0x128
[   45.955922]  kasan_check_range+0x100/0x1a8
[   45.955954]  __kasan_check_write+0x20/0x30
[   45.955986]  kasan_atomics_helper+0x32c/0x4858
[   45.956015]  kasan_atomics+0x198/0x2e0
[   45.956042]  kunit_try_run_case+0x170/0x3f0
[   45.956076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.956114]  kthread+0x328/0x630
[   45.956147]  ret_from_fork+0x10/0x20
[   45.956181] 
[   46.025912] Allocated by task 312:
[   46.029299]  kasan_save_stack+0x3c/0x68
[   46.033117]  kasan_save_track+0x20/0x40
[   46.036936]  kasan_save_alloc_info+0x40/0x58
[   46.041190]  __kasan_kmalloc+0xd4/0xd8
[   46.044922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.049436]  kasan_atomics+0xb8/0x2e0
[   46.053082]  kunit_try_run_case+0x170/0x3f0
[   46.057248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.062717]  kthread+0x328/0x630
[   46.065928]  ret_from_fork+0x10/0x20
[   46.069488] 
[   46.070965] The buggy address belongs to the object at ffff000800c2d400
[   46.070965]  which belongs to the cache kmalloc-64 of size 64
[   46.083290] The buggy address is located 0 bytes to the right of
[   46.083290]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.096137] 
[   46.097612] The buggy address belongs to the physical page:
[   46.103171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.111156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.117664] page_type: f5(slab)
[   46.120797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.128521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.136240] page dumped because: kasan: bad access detected
[   46.141795] 
[   46.143271] Memory state around the buggy address:
[   46.148050]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.155254]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.162459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.169660]                                      ^
[   46.174437]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.181642]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.188843] ==================================================================
[   59.875469] ==================================================================
[   59.882564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   59.889940] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.897231] 
[   59.898714] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.898760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.898776] Hardware name: WinLink E850-96 board (DT)
[   59.898795] Call trace:
[   59.898806]  show_stack+0x20/0x38 (C)
[   59.898839]  dump_stack_lvl+0x8c/0xd0
[   59.898868]  print_report+0x118/0x608
[   59.898897]  kasan_report+0xdc/0x128
[   59.898925]  __asan_report_load8_noabort+0x20/0x30
[   59.898957]  kasan_atomics_helper+0x3df4/0x4858
[   59.898986]  kasan_atomics+0x198/0x2e0
[   59.899015]  kunit_try_run_case+0x170/0x3f0
[   59.899047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.899085]  kthread+0x328/0x630
[   59.899115]  ret_from_fork+0x10/0x20
[   59.899147] 
[   59.965633] Allocated by task 312:
[   59.969020]  kasan_save_stack+0x3c/0x68
[   59.972838]  kasan_save_track+0x20/0x40
[   59.976657]  kasan_save_alloc_info+0x40/0x58
[   59.980911]  __kasan_kmalloc+0xd4/0xd8
[   59.984643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.989157]  kasan_atomics+0xb8/0x2e0
[   59.992803]  kunit_try_run_case+0x170/0x3f0
[   59.996970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.002438]  kthread+0x328/0x630
[   60.005650]  ret_from_fork+0x10/0x20
[   60.009209] 
[   60.010685] The buggy address belongs to the object at ffff000800c2d400
[   60.010685]  which belongs to the cache kmalloc-64 of size 64
[   60.023011] The buggy address is located 0 bytes to the right of
[   60.023011]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.035858] 
[   60.037334] The buggy address belongs to the physical page:
[   60.042890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.050877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.057385] page_type: f5(slab)
[   60.060518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.068243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.075961] page dumped because: kasan: bad access detected
[   60.081517] 
[   60.082992] Memory state around the buggy address:
[   60.087772]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.094975]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.102180] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.109381]                                      ^
[   60.114159]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.121363]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.128565] ==================================================================
[   61.184513] ==================================================================
[   61.191573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   61.198948] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   61.206326] 
[   61.207808] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.207857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.207873] Hardware name: WinLink E850-96 board (DT)
[   61.207891] Call trace:
[   61.207906]  show_stack+0x20/0x38 (C)
[   61.207938]  dump_stack_lvl+0x8c/0xd0
[   61.207970]  print_report+0x118/0x608
[   61.208000]  kasan_report+0xdc/0x128
[   61.208028]  kasan_check_range+0x100/0x1a8
[   61.208058]  __kasan_check_write+0x20/0x30
[   61.208089]  kasan_atomics_helper+0x17ec/0x4858
[   61.208120]  kasan_atomics+0x198/0x2e0
[   61.208148]  kunit_try_run_case+0x170/0x3f0
[   61.208180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.208215]  kthread+0x328/0x630
[   61.208247]  ret_from_fork+0x10/0x20
[   61.208278] 
[   61.278113] Allocated by task 312:
[   61.281500]  kasan_save_stack+0x3c/0x68
[   61.285318]  kasan_save_track+0x20/0x40
[   61.289138]  kasan_save_alloc_info+0x40/0x58
[   61.293391]  __kasan_kmalloc+0xd4/0xd8
[   61.297124]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.301637]  kasan_atomics+0xb8/0x2e0
[   61.305283]  kunit_try_run_case+0x170/0x3f0
[   61.309450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.314918]  kthread+0x328/0x630
[   61.318130]  ret_from_fork+0x10/0x20
[   61.321689] 
[   61.323165] The buggy address belongs to the object at ffff000800c2d400
[   61.323165]  which belongs to the cache kmalloc-64 of size 64
[   61.335492] The buggy address is located 0 bytes to the right of
[   61.335492]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   61.348338] 
[   61.349814] The buggy address belongs to the physical page:
[   61.355371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   61.363357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.369866] page_type: f5(slab)
[   61.373000] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.380723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.388442] page dumped because: kasan: bad access detected
[   61.393997] 
[   61.395473] Memory state around the buggy address:
[   61.400252]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.407455]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.414660] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.421861]                                      ^
[   61.426639]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.433843]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.441045] ==================================================================
[   44.881315] ==================================================================
[   44.888348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   44.895634] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   44.902925] 
[   44.904412] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.904465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.904482] Hardware name: WinLink E850-96 board (DT)
[   44.904504] Call trace:
[   44.904517]  show_stack+0x20/0x38 (C)
[   44.904552]  dump_stack_lvl+0x8c/0xd0
[   44.904585]  print_report+0x118/0x608
[   44.904616]  kasan_report+0xdc/0x128
[   44.904644]  kasan_check_range+0x100/0x1a8
[   44.904675]  __kasan_check_read+0x20/0x30
[   44.904708]  kasan_atomics_helper+0x1ec/0x4858
[   44.904737]  kasan_atomics+0x198/0x2e0
[   44.904763]  kunit_try_run_case+0x170/0x3f0
[   44.904799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.904838]  kthread+0x328/0x630
[   44.904872]  ret_from_fork+0x10/0x20
[   44.904908] 
[   44.974538] Allocated by task 312:
[   44.977926]  kasan_save_stack+0x3c/0x68
[   44.981744]  kasan_save_track+0x20/0x40
[   44.985563]  kasan_save_alloc_info+0x40/0x58
[   44.989816]  __kasan_kmalloc+0xd4/0xd8
[   44.993549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.998063]  kasan_atomics+0xb8/0x2e0
[   45.001709]  kunit_try_run_case+0x170/0x3f0
[   45.005875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.011345]  kthread+0x328/0x630
[   45.014555]  ret_from_fork+0x10/0x20
[   45.018114] 
[   45.019591] The buggy address belongs to the object at ffff000800c2d400
[   45.019591]  which belongs to the cache kmalloc-64 of size 64
[   45.031918] The buggy address is located 0 bytes to the right of
[   45.031918]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.044763] 
[   45.046240] The buggy address belongs to the physical page:
[   45.051799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.059783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.066292] page_type: f5(slab)
[   45.069428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.077148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.084867] page dumped because: kasan: bad access detected
[   45.090422] 
[   45.091898] Memory state around the buggy address:
[   45.096679]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.103881]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.111085] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.118287]                                      ^
[   45.123064]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.130269]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.137472] ==================================================================
[   47.511594] ==================================================================
[   47.518686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   47.525976] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.533355] 
[   47.534837] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.534884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.534902] Hardware name: WinLink E850-96 board (DT)
[   47.534920] Call trace:
[   47.534933]  show_stack+0x20/0x38 (C)
[   47.534965]  dump_stack_lvl+0x8c/0xd0
[   47.534998]  print_report+0x118/0x608
[   47.535028]  kasan_report+0xdc/0x128
[   47.535057]  kasan_check_range+0x100/0x1a8
[   47.535088]  __kasan_check_write+0x20/0x30
[   47.535121]  kasan_atomics_helper+0x54c/0x4858
[   47.535150]  kasan_atomics+0x198/0x2e0
[   47.535178]  kunit_try_run_case+0x170/0x3f0
[   47.535212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.535246]  kthread+0x328/0x630
[   47.535279]  ret_from_fork+0x10/0x20
[   47.535310] 
[   47.605055] Allocated by task 312:
[   47.608440]  kasan_save_stack+0x3c/0x68
[   47.612260]  kasan_save_track+0x20/0x40
[   47.616079]  kasan_save_alloc_info+0x40/0x58
[   47.620333]  __kasan_kmalloc+0xd4/0xd8
[   47.624065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.628579]  kasan_atomics+0xb8/0x2e0
[   47.632225]  kunit_try_run_case+0x170/0x3f0
[   47.636391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.641860]  kthread+0x328/0x630
[   47.645072]  ret_from_fork+0x10/0x20
[   47.648631] 
[   47.650106] The buggy address belongs to the object at ffff000800c2d400
[   47.650106]  which belongs to the cache kmalloc-64 of size 64
[   47.662433] The buggy address is located 0 bytes to the right of
[   47.662433]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.675279] 
[   47.676755] The buggy address belongs to the physical page:
[   47.682311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.690300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.696807] page_type: f5(slab)
[   47.699940] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.707664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.715383] page dumped because: kasan: bad access detected
[   47.720938] 
[   47.722414] Memory state around the buggy address:
[   47.727194]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.734397]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.741602] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.748803]                                      ^
[   47.753580]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.760785]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.767986] ==================================================================
[   52.508944] ==================================================================
[   52.516007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   52.523297] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.530675] 
[   52.532158] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.532204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.532221] Hardware name: WinLink E850-96 board (DT)
[   52.532241] Call trace:
[   52.532255]  show_stack+0x20/0x38 (C)
[   52.532287]  dump_stack_lvl+0x8c/0xd0
[   52.532317]  print_report+0x118/0x608
[   52.532347]  kasan_report+0xdc/0x128
[   52.532373]  kasan_check_range+0x100/0x1a8
[   52.532404]  __kasan_check_write+0x20/0x30
[   52.532435]  kasan_atomics_helper+0xca0/0x4858
[   52.532463]  kasan_atomics+0x198/0x2e0
[   52.532492]  kunit_try_run_case+0x170/0x3f0
[   52.532527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.532565]  kthread+0x328/0x630
[   52.532597]  ret_from_fork+0x10/0x20
[   52.532629] 
[   52.602375] Allocated by task 312:
[   52.605763]  kasan_save_stack+0x3c/0x68
[   52.609580]  kasan_save_track+0x20/0x40
[   52.613400]  kasan_save_alloc_info+0x40/0x58
[   52.617653]  __kasan_kmalloc+0xd4/0xd8
[   52.621386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.625900]  kasan_atomics+0xb8/0x2e0
[   52.629546]  kunit_try_run_case+0x170/0x3f0
[   52.633712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.639181]  kthread+0x328/0x630
[   52.642393]  ret_from_fork+0x10/0x20
[   52.645951] 
[   52.647427] The buggy address belongs to the object at ffff000800c2d400
[   52.647427]  which belongs to the cache kmalloc-64 of size 64
[   52.659754] The buggy address is located 0 bytes to the right of
[   52.659754]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.672600] 
[   52.674076] The buggy address belongs to the physical page:
[   52.679632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.687619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.694128] page_type: f5(slab)
[   52.697262] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.704985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.712704] page dumped because: kasan: bad access detected
[   52.718259] 
[   52.719735] Memory state around the buggy address:
[   52.724514]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.731718]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.738922] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.746123]                                      ^
[   52.750901]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.758106]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.765307] ==================================================================
[   46.720522] ==================================================================
[   46.727552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   46.734843] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   46.742221] 
[   46.743703] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   46.743754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.743773] Hardware name: WinLink E850-96 board (DT)
[   46.743795] Call trace:
[   46.743809]  show_stack+0x20/0x38 (C)
[   46.743840]  dump_stack_lvl+0x8c/0xd0
[   46.743871]  print_report+0x118/0x608
[   46.743900]  kasan_report+0xdc/0x128
[   46.743928]  kasan_check_range+0x100/0x1a8
[   46.743959]  __kasan_check_write+0x20/0x30
[   46.743988]  kasan_atomics_helper+0x414/0x4858
[   46.744019]  kasan_atomics+0x198/0x2e0
[   46.744045]  kunit_try_run_case+0x170/0x3f0
[   46.744078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.744117]  kthread+0x328/0x630
[   46.744148]  ret_from_fork+0x10/0x20
[   46.744182] 
[   46.813921] Allocated by task 312:
[   46.817307]  kasan_save_stack+0x3c/0x68
[   46.821126]  kasan_save_track+0x20/0x40
[   46.824945]  kasan_save_alloc_info+0x40/0x58
[   46.829199]  __kasan_kmalloc+0xd4/0xd8
[   46.832931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.837445]  kasan_atomics+0xb8/0x2e0
[   46.841091]  kunit_try_run_case+0x170/0x3f0
[   46.845257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.850726]  kthread+0x328/0x630
[   46.853938]  ret_from_fork+0x10/0x20
[   46.857497] 
[   46.858975] The buggy address belongs to the object at ffff000800c2d400
[   46.858975]  which belongs to the cache kmalloc-64 of size 64
[   46.871299] The buggy address is located 0 bytes to the right of
[   46.871299]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.884145] 
[   46.885621] The buggy address belongs to the physical page:
[   46.891177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.899166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.905673] page_type: f5(slab)
[   46.908806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.916530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.924249] page dumped because: kasan: bad access detected
[   46.929805] 
[   46.931280] Memory state around the buggy address:
[   46.936058]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.943263]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.950468] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.957669]                                      ^
[   46.962446]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.969651]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.976852] ==================================================================
[   55.132857] ==================================================================
[   55.139927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   55.147216] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.154594] 
[   55.156077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.156127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.156140] Hardware name: WinLink E850-96 board (DT)
[   55.156159] Call trace:
[   55.156171]  show_stack+0x20/0x38 (C)
[   55.156203]  dump_stack_lvl+0x8c/0xd0
[   55.156234]  print_report+0x118/0x608
[   55.156262]  kasan_report+0xdc/0x128
[   55.156291]  kasan_check_range+0x100/0x1a8
[   55.156323]  __kasan_check_write+0x20/0x30
[   55.156354]  kasan_atomics_helper+0xf88/0x4858
[   55.156385]  kasan_atomics+0x198/0x2e0
[   55.156413]  kunit_try_run_case+0x170/0x3f0
[   55.156446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.156484]  kthread+0x328/0x630
[   55.156514]  ret_from_fork+0x10/0x20
[   55.156546] 
[   55.226294] Allocated by task 312:
[   55.229682]  kasan_save_stack+0x3c/0x68
[   55.233499]  kasan_save_track+0x20/0x40
[   55.237319]  kasan_save_alloc_info+0x40/0x58
[   55.241572]  __kasan_kmalloc+0xd4/0xd8
[   55.245305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.249818]  kasan_atomics+0xb8/0x2e0
[   55.253464]  kunit_try_run_case+0x170/0x3f0
[   55.257631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.263100]  kthread+0x328/0x630
[   55.266311]  ret_from_fork+0x10/0x20
[   55.269870] 
[   55.271346] The buggy address belongs to the object at ffff000800c2d400
[   55.271346]  which belongs to the cache kmalloc-64 of size 64
[   55.283672] The buggy address is located 0 bytes to the right of
[   55.283672]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.296519] 
[   55.297995] The buggy address belongs to the physical page:
[   55.303551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.311538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.318047] page_type: f5(slab)
[   55.321179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.328904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.336623] page dumped because: kasan: bad access detected
[   55.342178] 
[   55.343654] Memory state around the buggy address:
[   55.348433]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.355636]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.362841] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.370043]                                      ^
[   55.374820]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.382025]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.389226] ==================================================================
[   50.936574] ==================================================================
[   50.943635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   50.950925] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.958303] 
[   50.959786] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.959833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.959848] Hardware name: WinLink E850-96 board (DT)
[   50.959868] Call trace:
[   50.959882]  show_stack+0x20/0x38 (C)
[   50.959914]  dump_stack_lvl+0x8c/0xd0
[   50.959947]  print_report+0x118/0x608
[   50.959977]  kasan_report+0xdc/0x128
[   50.960006]  kasan_check_range+0x100/0x1a8
[   50.960037]  __kasan_check_write+0x20/0x30
[   50.960068]  kasan_atomics_helper+0xad4/0x4858
[   50.960096]  kasan_atomics+0x198/0x2e0
[   50.960124]  kunit_try_run_case+0x170/0x3f0
[   50.960158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.960198]  kthread+0x328/0x630
[   50.960230]  ret_from_fork+0x10/0x20
[   50.960261] 
[   51.030003] Allocated by task 312:
[   51.033390]  kasan_save_stack+0x3c/0x68
[   51.037209]  kasan_save_track+0x20/0x40
[   51.041027]  kasan_save_alloc_info+0x40/0x58
[   51.045281]  __kasan_kmalloc+0xd4/0xd8
[   51.049014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.053527]  kasan_atomics+0xb8/0x2e0
[   51.057173]  kunit_try_run_case+0x170/0x3f0
[   51.061340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.066808]  kthread+0x328/0x630
[   51.070020]  ret_from_fork+0x10/0x20
[   51.073579] 
[   51.075056] The buggy address belongs to the object at ffff000800c2d400
[   51.075056]  which belongs to the cache kmalloc-64 of size 64
[   51.087381] The buggy address is located 0 bytes to the right of
[   51.087381]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.100228] 
[   51.101704] The buggy address belongs to the physical page:
[   51.107260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.115247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.121756] page_type: f5(slab)
[   51.124890] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.132613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.140332] page dumped because: kasan: bad access detected
[   51.145887] 
[   51.147363] Memory state around the buggy address:
[   51.152142]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.159345]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.166550] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.173751]                                      ^
[   51.178529]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.185734]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.192935] ==================================================================
[   59.087341] ==================================================================
[   59.094380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   59.101758] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.109135] 
[   59.110617] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.110668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.110684] Hardware name: WinLink E850-96 board (DT)
[   59.110705] Call trace:
[   59.110718]  show_stack+0x20/0x38 (C)
[   59.110750]  dump_stack_lvl+0x8c/0xd0
[   59.110782]  print_report+0x118/0x608
[   59.110810]  kasan_report+0xdc/0x128
[   59.110839]  kasan_check_range+0x100/0x1a8
[   59.110869]  __kasan_check_write+0x20/0x30
[   59.110901]  kasan_atomics_helper+0x15b4/0x4858
[   59.110931]  kasan_atomics+0x198/0x2e0
[   59.110957]  kunit_try_run_case+0x170/0x3f0
[   59.110990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.111027]  kthread+0x328/0x630
[   59.111058]  ret_from_fork+0x10/0x20
[   59.111088] 
[   59.180923] Allocated by task 312:
[   59.184310]  kasan_save_stack+0x3c/0x68
[   59.188127]  kasan_save_track+0x20/0x40
[   59.191947]  kasan_save_alloc_info+0x40/0x58
[   59.196200]  __kasan_kmalloc+0xd4/0xd8
[   59.199933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.204446]  kasan_atomics+0xb8/0x2e0
[   59.208092]  kunit_try_run_case+0x170/0x3f0
[   59.212259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.217728]  kthread+0x328/0x630
[   59.220939]  ret_from_fork+0x10/0x20
[   59.224499] 
[   59.225974] The buggy address belongs to the object at ffff000800c2d400
[   59.225974]  which belongs to the cache kmalloc-64 of size 64
[   59.238301] The buggy address is located 0 bytes to the right of
[   59.238301]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   59.251147] 
[   59.252623] The buggy address belongs to the physical page:
[   59.258181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.266166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.272676] page_type: f5(slab)
[   59.275810] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.283532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.291251] page dumped because: kasan: bad access detected
[   59.296806] 
[   59.298282] Memory state around the buggy address:
[   59.303062]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.310265]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.317469] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.324671]                                      ^
[   59.329449]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.336653]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.343854] ==================================================================
[   57.243617] ==================================================================
[   57.250660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   57.258035] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.265413] 
[   57.266896] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.266945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.266962] Hardware name: WinLink E850-96 board (DT)
[   57.266981] Call trace:
[   57.266993]  show_stack+0x20/0x38 (C)
[   57.267025]  dump_stack_lvl+0x8c/0xd0
[   57.267056]  print_report+0x118/0x608
[   57.267085]  kasan_report+0xdc/0x128
[   57.267113]  kasan_check_range+0x100/0x1a8
[   57.267144]  __kasan_check_write+0x20/0x30
[   57.267175]  kasan_atomics_helper+0x12d8/0x4858
[   57.267204]  kasan_atomics+0x198/0x2e0
[   57.267233]  kunit_try_run_case+0x170/0x3f0
[   57.267264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.267302]  kthread+0x328/0x630
[   57.267333]  ret_from_fork+0x10/0x20
[   57.267366] 
[   57.337201] Allocated by task 312:
[   57.340587]  kasan_save_stack+0x3c/0x68
[   57.344405]  kasan_save_track+0x20/0x40
[   57.348225]  kasan_save_alloc_info+0x40/0x58
[   57.352478]  __kasan_kmalloc+0xd4/0xd8
[   57.356210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.360724]  kasan_atomics+0xb8/0x2e0
[   57.364370]  kunit_try_run_case+0x170/0x3f0
[   57.368537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.374005]  kthread+0x328/0x630
[   57.377217]  ret_from_fork+0x10/0x20
[   57.380776] 
[   57.382252] The buggy address belongs to the object at ffff000800c2d400
[   57.382252]  which belongs to the cache kmalloc-64 of size 64
[   57.394578] The buggy address is located 0 bytes to the right of
[   57.394578]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.407425] 
[   57.408901] The buggy address belongs to the physical page:
[   57.414456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.422444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.428954] page_type: f5(slab)
[   57.432088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.439810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.447530] page dumped because: kasan: bad access detected
[   57.453084] 
[   57.454560] Memory state around the buggy address:
[   57.459338]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.466542]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.473747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.480948]                                      ^
[   57.485726]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.492931]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.500132] ==================================================================
[   60.399820] ==================================================================
[   60.406862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   60.414238] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.421529] 
[   60.423012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.423063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.423077] Hardware name: WinLink E850-96 board (DT)
[   60.423098] Call trace:
[   60.423111]  show_stack+0x20/0x38 (C)
[   60.423145]  dump_stack_lvl+0x8c/0xd0
[   60.423174]  print_report+0x118/0x608
[   60.423203]  kasan_report+0xdc/0x128
[   60.423232]  __asan_report_load8_noabort+0x20/0x30
[   60.423267]  kasan_atomics_helper+0x3e10/0x4858
[   60.423296]  kasan_atomics+0x198/0x2e0
[   60.423324]  kunit_try_run_case+0x170/0x3f0
[   60.423355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.423393]  kthread+0x328/0x630
[   60.423423]  ret_from_fork+0x10/0x20
[   60.423457] 
[   60.489930] Allocated by task 312:
[   60.493318]  kasan_save_stack+0x3c/0x68
[   60.497136]  kasan_save_track+0x20/0x40
[   60.500955]  kasan_save_alloc_info+0x40/0x58
[   60.505208]  __kasan_kmalloc+0xd4/0xd8
[   60.508941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.513455]  kasan_atomics+0xb8/0x2e0
[   60.517101]  kunit_try_run_case+0x170/0x3f0
[   60.521267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.526736]  kthread+0x328/0x630
[   60.529948]  ret_from_fork+0x10/0x20
[   60.533507] 
[   60.534982] The buggy address belongs to the object at ffff000800c2d400
[   60.534982]  which belongs to the cache kmalloc-64 of size 64
[   60.547309] The buggy address is located 0 bytes to the right of
[   60.547309]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.560155] 
[   60.561631] The buggy address belongs to the physical page:
[   60.567187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.575175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.581683] page_type: f5(slab)
[   60.584816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.592540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.600259] page dumped because: kasan: bad access detected
[   60.605814] 
[   60.607290] Memory state around the buggy address:
[   60.612070]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.619273]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.626477] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.633679]                                      ^
[   60.638456]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.645661]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.652863] ==================================================================
[   51.724437] ==================================================================
[   51.731471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   51.738847] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   51.746138] 
[   51.747622] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   51.747671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.747686] Hardware name: WinLink E850-96 board (DT)
[   51.747706] Call trace:
[   51.747721]  show_stack+0x20/0x38 (C)
[   51.747753]  dump_stack_lvl+0x8c/0xd0
[   51.747786]  print_report+0x118/0x608
[   51.747817]  kasan_report+0xdc/0x128
[   51.747845]  __asan_report_load4_noabort+0x20/0x30
[   51.747879]  kasan_atomics_helper+0x3dbc/0x4858
[   51.747908]  kasan_atomics+0x198/0x2e0
[   51.747937]  kunit_try_run_case+0x170/0x3f0
[   51.747970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.748007]  kthread+0x328/0x630
[   51.748038]  ret_from_fork+0x10/0x20
[   51.748067] 
[   51.814540] Allocated by task 312:
[   51.817927]  kasan_save_stack+0x3c/0x68
[   51.821745]  kasan_save_track+0x20/0x40
[   51.825564]  kasan_save_alloc_info+0x40/0x58
[   51.829818]  __kasan_kmalloc+0xd4/0xd8
[   51.833551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.838064]  kasan_atomics+0xb8/0x2e0
[   51.841710]  kunit_try_run_case+0x170/0x3f0
[   51.845877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.851345]  kthread+0x328/0x630
[   51.854557]  ret_from_fork+0x10/0x20
[   51.858116] 
[   51.859591] The buggy address belongs to the object at ffff000800c2d400
[   51.859591]  which belongs to the cache kmalloc-64 of size 64
[   51.871918] The buggy address is located 0 bytes to the right of
[   51.871918]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.884765] 
[   51.886241] The buggy address belongs to the physical page:
[   51.891796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.899784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.906292] page_type: f5(slab)
[   51.909428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.917149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.924868] page dumped because: kasan: bad access detected
[   51.930424] 
[   51.931899] Memory state around the buggy address:
[   51.936678]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.943882]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.951087] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.958288]                                      ^
[   51.963066]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.970271]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.977472] ==================================================================
[   48.566473] ==================================================================
[   48.573531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   48.580822] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.588200] 
[   48.589681] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.589728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.589748] Hardware name: WinLink E850-96 board (DT)
[   48.589766] Call trace:
[   48.589779]  show_stack+0x20/0x38 (C)
[   48.589810]  dump_stack_lvl+0x8c/0xd0
[   48.589842]  print_report+0x118/0x608
[   48.589871]  kasan_report+0xdc/0x128
[   48.589899]  kasan_check_range+0x100/0x1a8
[   48.589930]  __kasan_check_write+0x20/0x30
[   48.589962]  kasan_atomics_helper+0x6ec/0x4858
[   48.589991]  kasan_atomics+0x198/0x2e0
[   48.590019]  kunit_try_run_case+0x170/0x3f0
[   48.590054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.590093]  kthread+0x328/0x630
[   48.590124]  ret_from_fork+0x10/0x20
[   48.590156] 
[   48.659900] Allocated by task 312:
[   48.663287]  kasan_save_stack+0x3c/0x68
[   48.667105]  kasan_save_track+0x20/0x40
[   48.670924]  kasan_save_alloc_info+0x40/0x58
[   48.675178]  __kasan_kmalloc+0xd4/0xd8
[   48.678910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.683424]  kasan_atomics+0xb8/0x2e0
[   48.687070]  kunit_try_run_case+0x170/0x3f0
[   48.691236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.696705]  kthread+0x328/0x630
[   48.699917]  ret_from_fork+0x10/0x20
[   48.703476] 
[   48.704951] The buggy address belongs to the object at ffff000800c2d400
[   48.704951]  which belongs to the cache kmalloc-64 of size 64
[   48.717278] The buggy address is located 0 bytes to the right of
[   48.717278]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.730125] 
[   48.731601] The buggy address belongs to the physical page:
[   48.737158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   48.745144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.751652] page_type: f5(slab)
[   48.754785] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.762510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.770228] page dumped because: kasan: bad access detected
[   48.775783] 
[   48.777259] Memory state around the buggy address:
[   48.782039]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.789242]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.796447] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.803648]                                      ^
[   48.808426]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.815630]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.822832] ==================================================================
[   49.621312] ==================================================================
[   49.628377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   49.635754] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.643045] 
[   49.644528] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.644576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.644591] Hardware name: WinLink E850-96 board (DT)
[   49.644610] Call trace:
[   49.644623]  show_stack+0x20/0x38 (C)
[   49.644655]  dump_stack_lvl+0x8c/0xd0
[   49.644687]  print_report+0x118/0x608
[   49.644717]  kasan_report+0xdc/0x128
[   49.644745]  __asan_report_load4_noabort+0x20/0x30
[   49.644780]  kasan_atomics_helper+0x42d8/0x4858
[   49.644808]  kasan_atomics+0x198/0x2e0
[   49.644834]  kunit_try_run_case+0x170/0x3f0
[   49.644867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.644904]  kthread+0x328/0x630
[   49.644937]  ret_from_fork+0x10/0x20
[   49.644972] 
[   49.711448] Allocated by task 312:
[   49.714834]  kasan_save_stack+0x3c/0x68
[   49.718652]  kasan_save_track+0x20/0x40
[   49.722471]  kasan_save_alloc_info+0x40/0x58
[   49.726725]  __kasan_kmalloc+0xd4/0xd8
[   49.730457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.734971]  kasan_atomics+0xb8/0x2e0
[   49.738616]  kunit_try_run_case+0x170/0x3f0
[   49.742783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.748252]  kthread+0x328/0x630
[   49.751464]  ret_from_fork+0x10/0x20
[   49.755023] 
[   49.756500] The buggy address belongs to the object at ffff000800c2d400
[   49.756500]  which belongs to the cache kmalloc-64 of size 64
[   49.768825] The buggy address is located 0 bytes to the right of
[   49.768825]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   49.781671] 
[   49.783147] The buggy address belongs to the physical page:
[   49.788703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.796691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.803199] page_type: f5(slab)
[   49.806333] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.814056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.821775] page dumped because: kasan: bad access detected
[   49.827330] 
[   49.828806] Memory state around the buggy address:
[   49.833586]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.840789]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.847993] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.855195]                                      ^
[   49.859973]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.867177]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.874378] ==================================================================
[   47.775357] ==================================================================
[   47.782399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   47.789688] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.797066] 
[   47.798548] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.798597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.798616] Hardware name: WinLink E850-96 board (DT)
[   47.798635] Call trace:
[   47.798648]  show_stack+0x20/0x38 (C)
[   47.798680]  dump_stack_lvl+0x8c/0xd0
[   47.798712]  print_report+0x118/0x608
[   47.798740]  kasan_report+0xdc/0x128
[   47.798767]  kasan_check_range+0x100/0x1a8
[   47.798799]  __kasan_check_write+0x20/0x30
[   47.798831]  kasan_atomics_helper+0x5b4/0x4858
[   47.798860]  kasan_atomics+0x198/0x2e0
[   47.798887]  kunit_try_run_case+0x170/0x3f0
[   47.798919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.798957]  kthread+0x328/0x630
[   47.798989]  ret_from_fork+0x10/0x20
[   47.799021] 
[   47.868766] Allocated by task 312:
[   47.872153]  kasan_save_stack+0x3c/0x68
[   47.875971]  kasan_save_track+0x20/0x40
[   47.879790]  kasan_save_alloc_info+0x40/0x58
[   47.884044]  __kasan_kmalloc+0xd4/0xd8
[   47.887776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.892290]  kasan_atomics+0xb8/0x2e0
[   47.895936]  kunit_try_run_case+0x170/0x3f0
[   47.900103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.905571]  kthread+0x328/0x630
[   47.908783]  ret_from_fork+0x10/0x20
[   47.912342] 
[   47.913817] The buggy address belongs to the object at ffff000800c2d400
[   47.913817]  which belongs to the cache kmalloc-64 of size 64
[   47.926144] The buggy address is located 0 bytes to the right of
[   47.926144]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.938991] 
[   47.940467] The buggy address belongs to the physical page:
[   47.946022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.954009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.960518] page_type: f5(slab)
[   47.963653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.971375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.979094] page dumped because: kasan: bad access detected
[   47.984650] 
[   47.986126] Memory state around the buggy address:
[   47.990905]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.998108]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.005313] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.012514]                                      ^
[   48.017292]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.024497]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.031697] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   42.737527] ==================================================================
[   42.744626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.753565] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   42.760857] 
[   42.762336] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   42.762382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.762398] Hardware name: WinLink E850-96 board (DT)
[   42.762416] Call trace:
[   42.762430]  show_stack+0x20/0x38 (C)
[   42.762461]  dump_stack_lvl+0x8c/0xd0
[   42.762492]  print_report+0x118/0x608
[   42.762521]  kasan_report+0xdc/0x128
[   42.762551]  __asan_report_load8_noabort+0x20/0x30
[   42.762585]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.762619]  kasan_bitops_generic+0x11c/0x1c8
[   42.762648]  kunit_try_run_case+0x170/0x3f0
[   42.762678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.762718]  kthread+0x328/0x630
[   42.762747]  ret_from_fork+0x10/0x20
[   42.762778] 
[   42.831429] Allocated by task 308:
[   42.834815]  kasan_save_stack+0x3c/0x68
[   42.838633]  kasan_save_track+0x20/0x40
[   42.842453]  kasan_save_alloc_info+0x40/0x58
[   42.846706]  __kasan_kmalloc+0xd4/0xd8
[   42.850439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.854953]  kasan_bitops_generic+0xa0/0x1c8
[   42.859206]  kunit_try_run_case+0x170/0x3f0
[   42.863373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.868841]  kthread+0x328/0x630
[   42.872053]  ret_from_fork+0x10/0x20
[   42.875612] 
[   42.877087] The buggy address belongs to the object at ffff0008037171e0
[   42.877087]  which belongs to the cache kmalloc-16 of size 16
[   42.889414] The buggy address is located 8 bytes inside of
[   42.889414]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.901653] 
[   42.903129] The buggy address belongs to the physical page:
[   42.908685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.916671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.923182] page_type: f5(slab)
[   42.926315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.934038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.941757] page dumped because: kasan: bad access detected
[   42.947312] 
[   42.948788] Memory state around the buggy address:
[   42.953566]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.960771]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.967975] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.975177]                                                           ^
[   42.981777]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.988982]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.996183] ==================================================================
[   43.538960] ==================================================================
[   43.546003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.554942] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.562320] 
[   43.563801] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.563848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.563864] Hardware name: WinLink E850-96 board (DT)
[   43.563883] Call trace:
[   43.563895]  show_stack+0x20/0x38 (C)
[   43.563926]  dump_stack_lvl+0x8c/0xd0
[   43.563957]  print_report+0x118/0x608
[   43.563986]  kasan_report+0xdc/0x128
[   43.564014]  kasan_check_range+0x100/0x1a8
[   43.564044]  __kasan_check_write+0x20/0x30
[   43.564076]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.564109]  kasan_bitops_generic+0x11c/0x1c8
[   43.564137]  kunit_try_run_case+0x170/0x3f0
[   43.564169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.564207]  kthread+0x328/0x630
[   43.564238]  ret_from_fork+0x10/0x20
[   43.564269] 
[   43.636277] Allocated by task 308:
[   43.639665]  kasan_save_stack+0x3c/0x68
[   43.643482]  kasan_save_track+0x20/0x40
[   43.647302]  kasan_save_alloc_info+0x40/0x58
[   43.651555]  __kasan_kmalloc+0xd4/0xd8
[   43.655288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.659802]  kasan_bitops_generic+0xa0/0x1c8
[   43.664055]  kunit_try_run_case+0x170/0x3f0
[   43.668222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.673690]  kthread+0x328/0x630
[   43.676902]  ret_from_fork+0x10/0x20
[   43.680461] 
[   43.681937] The buggy address belongs to the object at ffff0008037171e0
[   43.681937]  which belongs to the cache kmalloc-16 of size 16
[   43.694263] The buggy address is located 8 bytes inside of
[   43.694263]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.706502] 
[   43.707978] The buggy address belongs to the physical page:
[   43.713535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.721521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.728030] page_type: f5(slab)
[   43.731162] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.738887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.746606] page dumped because: kasan: bad access detected
[   43.752161] 
[   43.753637] Memory state around the buggy address:
[   43.758415]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   43.765620]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   43.772824] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   43.780025]                                                           ^
[   43.786626]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.793831]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.801032] ==================================================================
[   44.074342] ==================================================================
[   44.081411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.090351] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   44.097642] 
[   44.099123] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.099169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.099185] Hardware name: WinLink E850-96 board (DT)
[   44.099206] Call trace:
[   44.099218]  show_stack+0x20/0x38 (C)
[   44.099249]  dump_stack_lvl+0x8c/0xd0
[   44.099279]  print_report+0x118/0x608
[   44.099308]  kasan_report+0xdc/0x128
[   44.099336]  __asan_report_load8_noabort+0x20/0x30
[   44.099371]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.099404]  kasan_bitops_generic+0x11c/0x1c8
[   44.099433]  kunit_try_run_case+0x170/0x3f0
[   44.099467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.099504]  kthread+0x328/0x630
[   44.099536]  ret_from_fork+0x10/0x20
[   44.099567] 
[   44.168214] Allocated by task 308:
[   44.171600]  kasan_save_stack+0x3c/0x68
[   44.175419]  kasan_save_track+0x20/0x40
[   44.179238]  kasan_save_alloc_info+0x40/0x58
[   44.183492]  __kasan_kmalloc+0xd4/0xd8
[   44.187224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.191738]  kasan_bitops_generic+0xa0/0x1c8
[   44.195992]  kunit_try_run_case+0x170/0x3f0
[   44.200158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.205627]  kthread+0x328/0x630
[   44.208839]  ret_from_fork+0x10/0x20
[   44.212398] 
[   44.213873] The buggy address belongs to the object at ffff0008037171e0
[   44.213873]  which belongs to the cache kmalloc-16 of size 16
[   44.226200] The buggy address is located 8 bytes inside of
[   44.226200]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   44.238439] 
[   44.239915] The buggy address belongs to the physical page:
[   44.245471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   44.253458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.259966] page_type: f5(slab)
[   44.263100] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.270823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.278542] page dumped because: kasan: bad access detected
[   44.284098] 
[   44.285573] Memory state around the buggy address:
[   44.290351]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   44.297556]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   44.304761] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   44.311962]                                                           ^
[   44.318562]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.325768]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.332968] ==================================================================
[   43.808380] ==================================================================
[   43.815443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.824383] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.831674] 
[   43.833154] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.833200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.833216] Hardware name: WinLink E850-96 board (DT)
[   43.833235] Call trace:
[   43.833247]  show_stack+0x20/0x38 (C)
[   43.833277]  dump_stack_lvl+0x8c/0xd0
[   43.833310]  print_report+0x118/0x608
[   43.833339]  kasan_report+0xdc/0x128
[   43.833366]  __asan_report_load8_noabort+0x20/0x30
[   43.833400]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.833435]  kasan_bitops_generic+0x11c/0x1c8
[   43.833462]  kunit_try_run_case+0x170/0x3f0
[   43.833494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.833532]  kthread+0x328/0x630
[   43.833564]  ret_from_fork+0x10/0x20
[   43.833597] 
[   43.902246] Allocated by task 308:
[   43.905633]  kasan_save_stack+0x3c/0x68
[   43.909451]  kasan_save_track+0x20/0x40
[   43.913270]  kasan_save_alloc_info+0x40/0x58
[   43.917523]  __kasan_kmalloc+0xd4/0xd8
[   43.921256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.925770]  kasan_bitops_generic+0xa0/0x1c8
[   43.930023]  kunit_try_run_case+0x170/0x3f0
[   43.934190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.939659]  kthread+0x328/0x630
[   43.942870]  ret_from_fork+0x10/0x20
[   43.946429] 
[   43.947905] The buggy address belongs to the object at ffff0008037171e0
[   43.947905]  which belongs to the cache kmalloc-16 of size 16
[   43.960231] The buggy address is located 8 bytes inside of
[   43.960231]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.972470] 
[   43.973946] The buggy address belongs to the physical page:
[   43.979502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.987489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.993998] page_type: f5(slab)
[   43.997131] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.004855] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.012574] page dumped because: kasan: bad access detected
[   44.018129] 
[   44.019605] Memory state around the buggy address:
[   44.024384]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   44.031588]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   44.038792] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   44.045994]                                                           ^
[   44.052594]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.059799]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.067000] ==================================================================
[   42.468115] ==================================================================
[   42.475185] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.484125] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   42.491503] 
[   42.492983] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   42.493029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.493044] Hardware name: WinLink E850-96 board (DT)
[   42.493063] Call trace:
[   42.493075]  show_stack+0x20/0x38 (C)
[   42.493107]  dump_stack_lvl+0x8c/0xd0
[   42.493138]  print_report+0x118/0x608
[   42.493166]  kasan_report+0xdc/0x128
[   42.493195]  kasan_check_range+0x100/0x1a8
[   42.493227]  __kasan_check_write+0x20/0x30
[   42.493258]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.493290]  kasan_bitops_generic+0x11c/0x1c8
[   42.493319]  kunit_try_run_case+0x170/0x3f0
[   42.493349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.493386]  kthread+0x328/0x630
[   42.493417]  ret_from_fork+0x10/0x20
[   42.493448] 
[   42.565460] Allocated by task 308:
[   42.568846]  kasan_save_stack+0x3c/0x68
[   42.572665]  kasan_save_track+0x20/0x40
[   42.576485]  kasan_save_alloc_info+0x40/0x58
[   42.580738]  __kasan_kmalloc+0xd4/0xd8
[   42.584470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.588984]  kasan_bitops_generic+0xa0/0x1c8
[   42.593238]  kunit_try_run_case+0x170/0x3f0
[   42.597404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.602873]  kthread+0x328/0x630
[   42.606085]  ret_from_fork+0x10/0x20
[   42.609644] 
[   42.611119] The buggy address belongs to the object at ffff0008037171e0
[   42.611119]  which belongs to the cache kmalloc-16 of size 16
[   42.623446] The buggy address is located 8 bytes inside of
[   42.623446]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.635685] 
[   42.637161] The buggy address belongs to the physical page:
[   42.642717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.650704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.657214] page_type: f5(slab)
[   42.660347] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.668070] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.675789] page dumped because: kasan: bad access detected
[   42.681344] 
[   42.682820] Memory state around the buggy address:
[   42.687598]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.694802]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.702007] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.709208]                                                           ^
[   42.715809]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.723014]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.730215] ==================================================================
[   42.202156] ==================================================================
[   42.209217] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.218157] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   42.225448] 
[   42.226930] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   42.226978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.226997] Hardware name: WinLink E850-96 board (DT)
[   42.227012] Call trace:
[   42.227022]  show_stack+0x20/0x38 (C)
[   42.227050]  dump_stack_lvl+0x8c/0xd0
[   42.227083]  print_report+0x118/0x608
[   42.227110]  kasan_report+0xdc/0x128
[   42.227140]  __asan_report_load8_noabort+0x20/0x30
[   42.227172]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.227205]  kasan_bitops_generic+0x11c/0x1c8
[   42.227232]  kunit_try_run_case+0x170/0x3f0
[   42.227263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.227300]  kthread+0x328/0x630
[   42.227330]  ret_from_fork+0x10/0x20
[   42.227359] 
[   42.296020] Allocated by task 308:
[   42.299407]  kasan_save_stack+0x3c/0x68
[   42.303225]  kasan_save_track+0x20/0x40
[   42.307044]  kasan_save_alloc_info+0x40/0x58
[   42.311298]  __kasan_kmalloc+0xd4/0xd8
[   42.315030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.319544]  kasan_bitops_generic+0xa0/0x1c8
[   42.323797]  kunit_try_run_case+0x170/0x3f0
[   42.327964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.333433]  kthread+0x328/0x630
[   42.336644]  ret_from_fork+0x10/0x20
[   42.340203] 
[   42.341679] The buggy address belongs to the object at ffff0008037171e0
[   42.341679]  which belongs to the cache kmalloc-16 of size 16
[   42.354006] The buggy address is located 8 bytes inside of
[   42.354006]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.366245] 
[   42.367720] The buggy address belongs to the physical page:
[   42.373279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.381263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.387773] page_type: f5(slab)
[   42.390907] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.398629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.406348] page dumped because: kasan: bad access detected
[   42.411904] 
[   42.413379] Memory state around the buggy address:
[   42.418157]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.425362]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.432567] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.439768]                                                           ^
[   42.446368]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.453573]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.460775] ==================================================================
[   43.003551] ==================================================================
[   43.010594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.019534] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.026912] 
[   43.028393] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.028439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.028457] Hardware name: WinLink E850-96 board (DT)
[   43.028476] Call trace:
[   43.028486]  show_stack+0x20/0x38 (C)
[   43.028519]  dump_stack_lvl+0x8c/0xd0
[   43.028549]  print_report+0x118/0x608
[   43.028579]  kasan_report+0xdc/0x128
[   43.028608]  kasan_check_range+0x100/0x1a8
[   43.028639]  __kasan_check_write+0x20/0x30
[   43.028671]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.028705]  kasan_bitops_generic+0x11c/0x1c8
[   43.028733]  kunit_try_run_case+0x170/0x3f0
[   43.028767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.028804]  kthread+0x328/0x630
[   43.028836]  ret_from_fork+0x10/0x20
[   43.028866] 
[   43.100869] Allocated by task 308:
[   43.104256]  kasan_save_stack+0x3c/0x68
[   43.108074]  kasan_save_track+0x20/0x40
[   43.111893]  kasan_save_alloc_info+0x40/0x58
[   43.116147]  __kasan_kmalloc+0xd4/0xd8
[   43.119879]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.124393]  kasan_bitops_generic+0xa0/0x1c8
[   43.128646]  kunit_try_run_case+0x170/0x3f0
[   43.132813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.138282]  kthread+0x328/0x630
[   43.141493]  ret_from_fork+0x10/0x20
[   43.145053] 
[   43.146528] The buggy address belongs to the object at ffff0008037171e0
[   43.146528]  which belongs to the cache kmalloc-16 of size 16
[   43.158854] The buggy address is located 8 bytes inside of
[   43.158854]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.171094] 
[   43.172570] The buggy address belongs to the physical page:
[   43.178127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.186113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.192622] page_type: f5(slab)
[   43.195756] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.203478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.211197] page dumped because: kasan: bad access detected
[   43.216753] 
[   43.218228] Memory state around the buggy address:
[   43.223006]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   43.230211]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   43.237415] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   43.244617]                                                           ^
[   43.251217]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.258422]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.265623] ==================================================================
[   41.932920] ==================================================================
[   41.939950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.948803] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.956181] 
[   41.957662] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.957709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.957726] Hardware name: WinLink E850-96 board (DT)
[   41.957747] Call trace:
[   41.957759]  show_stack+0x20/0x38 (C)
[   41.957792]  dump_stack_lvl+0x8c/0xd0
[   41.957823]  print_report+0x118/0x608
[   41.957852]  kasan_report+0xdc/0x128
[   41.957882]  kasan_check_range+0x100/0x1a8
[   41.957912]  __kasan_check_write+0x20/0x30
[   41.957943]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.957977]  kasan_bitops_generic+0x11c/0x1c8
[   41.958005]  kunit_try_run_case+0x170/0x3f0
[   41.958037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.958074]  kthread+0x328/0x630
[   41.958107]  ret_from_fork+0x10/0x20
[   41.958139] 
[   42.030052] Allocated by task 308:
[   42.033439]  kasan_save_stack+0x3c/0x68
[   42.037257]  kasan_save_track+0x20/0x40
[   42.041076]  kasan_save_alloc_info+0x40/0x58
[   42.045329]  __kasan_kmalloc+0xd4/0xd8
[   42.049062]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.053575]  kasan_bitops_generic+0xa0/0x1c8
[   42.057829]  kunit_try_run_case+0x170/0x3f0
[   42.061995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.067464]  kthread+0x328/0x630
[   42.070676]  ret_from_fork+0x10/0x20
[   42.074235] 
[   42.075711] The buggy address belongs to the object at ffff0008037171e0
[   42.075711]  which belongs to the cache kmalloc-16 of size 16
[   42.088037] The buggy address is located 8 bytes inside of
[   42.088037]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   42.100276] 
[   42.101752] The buggy address belongs to the physical page:
[   42.107310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   42.115295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.121805] page_type: f5(slab)
[   42.124938] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.132661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.140380] page dumped because: kasan: bad access detected
[   42.145935] 
[   42.147411] Memory state around the buggy address:
[   42.152190]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   42.159394]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   42.166598] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   42.173800]                                                           ^
[   42.180400]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.187605]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.194806] ==================================================================
[   43.272967] ==================================================================
[   43.280034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.288974] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   43.296266] 
[   43.297745] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   43.297790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.297804] Hardware name: WinLink E850-96 board (DT)
[   43.297823] Call trace:
[   43.297834]  show_stack+0x20/0x38 (C)
[   43.297863]  dump_stack_lvl+0x8c/0xd0
[   43.297895]  print_report+0x118/0x608
[   43.297921]  kasan_report+0xdc/0x128
[   43.297949]  __asan_report_load8_noabort+0x20/0x30
[   43.297982]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.298016]  kasan_bitops_generic+0x11c/0x1c8
[   43.298046]  kunit_try_run_case+0x170/0x3f0
[   43.298080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.298117]  kthread+0x328/0x630
[   43.298148]  ret_from_fork+0x10/0x20
[   43.298178] 
[   43.366837] Allocated by task 308:
[   43.370223]  kasan_save_stack+0x3c/0x68
[   43.374042]  kasan_save_track+0x20/0x40
[   43.377861]  kasan_save_alloc_info+0x40/0x58
[   43.382115]  __kasan_kmalloc+0xd4/0xd8
[   43.385847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.390361]  kasan_bitops_generic+0xa0/0x1c8
[   43.394614]  kunit_try_run_case+0x170/0x3f0
[   43.398781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.404250]  kthread+0x328/0x630
[   43.407461]  ret_from_fork+0x10/0x20
[   43.411021] 
[   43.412496] The buggy address belongs to the object at ffff0008037171e0
[   43.412496]  which belongs to the cache kmalloc-16 of size 16
[   43.424823] The buggy address is located 8 bytes inside of
[   43.424823]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   43.437062] 
[   43.438538] The buggy address belongs to the physical page:
[   43.444094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   43.452080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.458591] page_type: f5(slab)
[   43.461724] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.469446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.477165] page dumped because: kasan: bad access detected
[   43.482721] 
[   43.484196] Memory state around the buggy address:
[   43.488974]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   43.496179]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   43.503384] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   43.510585]                                                           ^
[   43.517185]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.524390]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.531592] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   39.800392] ==================================================================
[   39.807345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.815502] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   39.822880] 
[   39.824363] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   39.824410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.824425] Hardware name: WinLink E850-96 board (DT)
[   39.824443] Call trace:
[   39.824455]  show_stack+0x20/0x38 (C)
[   39.824491]  dump_stack_lvl+0x8c/0xd0
[   39.824524]  print_report+0x118/0x608
[   39.824552]  kasan_report+0xdc/0x128
[   39.824581]  kasan_check_range+0x100/0x1a8
[   39.824610]  __kasan_check_write+0x20/0x30
[   39.824645]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.824675]  kasan_bitops_generic+0x110/0x1c8
[   39.824701]  kunit_try_run_case+0x170/0x3f0
[   39.824736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.824773]  kthread+0x328/0x630
[   39.824803]  ret_from_fork+0x10/0x20
[   39.824839] 
[   39.896056] Allocated by task 308:
[   39.899442]  kasan_save_stack+0x3c/0x68
[   39.903261]  kasan_save_track+0x20/0x40
[   39.907080]  kasan_save_alloc_info+0x40/0x58
[   39.911333]  __kasan_kmalloc+0xd4/0xd8
[   39.915066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.919580]  kasan_bitops_generic+0xa0/0x1c8
[   39.923834]  kunit_try_run_case+0x170/0x3f0
[   39.928000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.933469]  kthread+0x328/0x630
[   39.936680]  ret_from_fork+0x10/0x20
[   39.940240] 
[   39.941715] The buggy address belongs to the object at ffff0008037171e0
[   39.941715]  which belongs to the cache kmalloc-16 of size 16
[   39.954042] The buggy address is located 8 bytes inside of
[   39.954042]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   39.966281] 
[   39.967756] The buggy address belongs to the physical page:
[   39.973314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   39.981299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.987808] page_type: f5(slab)
[   39.990941] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.998665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.006384] page dumped because: kasan: bad access detected
[   40.011939] 
[   40.013415] Memory state around the buggy address:
[   40.018195]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.025398]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.032602] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.039804]                                                           ^
[   40.046404]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.053609]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.060811] ==================================================================
[   40.068194] ==================================================================
[   40.075224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.083381] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.090671] 
[   40.092156] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.092208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.092224] Hardware name: WinLink E850-96 board (DT)
[   40.092244] Call trace:
[   40.092259]  show_stack+0x20/0x38 (C)
[   40.092289]  dump_stack_lvl+0x8c/0xd0
[   40.092322]  print_report+0x118/0x608
[   40.092351]  kasan_report+0xdc/0x128
[   40.092381]  __asan_report_load8_noabort+0x20/0x30
[   40.092415]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.092447]  kasan_bitops_generic+0x110/0x1c8
[   40.092475]  kunit_try_run_case+0x170/0x3f0
[   40.092511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.092548]  kthread+0x328/0x630
[   40.092582]  ret_from_fork+0x10/0x20
[   40.092614] 
[   40.160462] Allocated by task 308:
[   40.163849]  kasan_save_stack+0x3c/0x68
[   40.167667]  kasan_save_track+0x20/0x40
[   40.171486]  kasan_save_alloc_info+0x40/0x58
[   40.175739]  __kasan_kmalloc+0xd4/0xd8
[   40.179472]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.183986]  kasan_bitops_generic+0xa0/0x1c8
[   40.188239]  kunit_try_run_case+0x170/0x3f0
[   40.192406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.197874]  kthread+0x328/0x630
[   40.201086]  ret_from_fork+0x10/0x20
[   40.204645] 
[   40.206120] The buggy address belongs to the object at ffff0008037171e0
[   40.206120]  which belongs to the cache kmalloc-16 of size 16
[   40.218448] The buggy address is located 8 bytes inside of
[   40.218448]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   40.230686] 
[   40.232162] The buggy address belongs to the physical page:
[   40.237721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   40.245705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.252215] page_type: f5(slab)
[   40.255349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.263071] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.270790] page dumped because: kasan: bad access detected
[   40.276345] 
[   40.277821] Memory state around the buggy address:
[   40.282599]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.289804]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.297008] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.304210]                                                           ^
[   40.310810]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.318015]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.325216] ==================================================================
[   41.668529] ==================================================================
[   41.675545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.683703] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.690994] 
[   41.692476] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.692521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.692540] Hardware name: WinLink E850-96 board (DT)
[   41.692558] Call trace:
[   41.692568]  show_stack+0x20/0x38 (C)
[   41.692598]  dump_stack_lvl+0x8c/0xd0
[   41.692630]  print_report+0x118/0x608
[   41.692659]  kasan_report+0xdc/0x128
[   41.692689]  __asan_report_load8_noabort+0x20/0x30
[   41.692722]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.692754]  kasan_bitops_generic+0x110/0x1c8
[   41.692785]  kunit_try_run_case+0x170/0x3f0
[   41.692818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.692855]  kthread+0x328/0x630
[   41.692890]  ret_from_fork+0x10/0x20
[   41.692924] 
[   41.760785] Allocated by task 308:
[   41.764170]  kasan_save_stack+0x3c/0x68
[   41.767990]  kasan_save_track+0x20/0x40
[   41.771809]  kasan_save_alloc_info+0x40/0x58
[   41.776062]  __kasan_kmalloc+0xd4/0xd8
[   41.779795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.784309]  kasan_bitops_generic+0xa0/0x1c8
[   41.788562]  kunit_try_run_case+0x170/0x3f0
[   41.792729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.798198]  kthread+0x328/0x630
[   41.801409]  ret_from_fork+0x10/0x20
[   41.804968] 
[   41.806444] The buggy address belongs to the object at ffff0008037171e0
[   41.806444]  which belongs to the cache kmalloc-16 of size 16
[   41.818771] The buggy address is located 8 bytes inside of
[   41.818771]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.831010] 
[   41.832487] The buggy address belongs to the physical page:
[   41.838043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.846028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.852539] page_type: f5(slab)
[   41.855671] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.863394] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.871113] page dumped because: kasan: bad access detected
[   41.876668] 
[   41.878144] Memory state around the buggy address:
[   41.882923]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.890127]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.897332] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.904533]                                                           ^
[   41.911133]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.918338]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.925540] ==================================================================
[   40.868353] ==================================================================
[   40.875383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.883541] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.890833] 
[   40.892315] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.892359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.892375] Hardware name: WinLink E850-96 board (DT)
[   40.892396] Call trace:
[   40.892409]  show_stack+0x20/0x38 (C)
[   40.892440]  dump_stack_lvl+0x8c/0xd0
[   40.892471]  print_report+0x118/0x608
[   40.892499]  kasan_report+0xdc/0x128
[   40.892527]  __asan_report_load8_noabort+0x20/0x30
[   40.892562]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.892595]  kasan_bitops_generic+0x110/0x1c8
[   40.892623]  kunit_try_run_case+0x170/0x3f0
[   40.892657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.892696]  kthread+0x328/0x630
[   40.892729]  ret_from_fork+0x10/0x20
[   40.892761] 
[   40.960623] Allocated by task 308:
[   40.964010]  kasan_save_stack+0x3c/0x68
[   40.967828]  kasan_save_track+0x20/0x40
[   40.971648]  kasan_save_alloc_info+0x40/0x58
[   40.975901]  __kasan_kmalloc+0xd4/0xd8
[   40.979634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.984147]  kasan_bitops_generic+0xa0/0x1c8
[   40.988401]  kunit_try_run_case+0x170/0x3f0
[   40.992567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.998036]  kthread+0x328/0x630
[   41.001248]  ret_from_fork+0x10/0x20
[   41.004807] 
[   41.006282] The buggy address belongs to the object at ffff0008037171e0
[   41.006282]  which belongs to the cache kmalloc-16 of size 16
[   41.018609] The buggy address is located 8 bytes inside of
[   41.018609]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.030848] 
[   41.032324] The buggy address belongs to the physical page:
[   41.037879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.045867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.052377] page_type: f5(slab)
[   41.055510] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.063232] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.070952] page dumped because: kasan: bad access detected
[   41.076507] 
[   41.077982] Memory state around the buggy address:
[   41.082760]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.089966]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.097170] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.104371]                                                           ^
[   41.110972]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.118177]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.125378] ==================================================================
[   39.535879] ==================================================================
[   39.542940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.551096] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   39.558387] 
[   39.559870] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   39.559918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.559934] Hardware name: WinLink E850-96 board (DT)
[   39.559952] Call trace:
[   39.559965]  show_stack+0x20/0x38 (C)
[   39.559996]  dump_stack_lvl+0x8c/0xd0
[   39.560034]  print_report+0x118/0x608
[   39.560066]  kasan_report+0xdc/0x128
[   39.560096]  __asan_report_load8_noabort+0x20/0x30
[   39.560130]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.560160]  kasan_bitops_generic+0x110/0x1c8
[   39.560189]  kunit_try_run_case+0x170/0x3f0
[   39.560223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.560261]  kthread+0x328/0x630
[   39.560293]  ret_from_fork+0x10/0x20
[   39.560327] 
[   39.628178] Allocated by task 308:
[   39.631563]  kasan_save_stack+0x3c/0x68
[   39.635383]  kasan_save_track+0x20/0x40
[   39.639202]  kasan_save_alloc_info+0x40/0x58
[   39.643456]  __kasan_kmalloc+0xd4/0xd8
[   39.647188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.651702]  kasan_bitops_generic+0xa0/0x1c8
[   39.655956]  kunit_try_run_case+0x170/0x3f0
[   39.660122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.665591]  kthread+0x328/0x630
[   39.668803]  ret_from_fork+0x10/0x20
[   39.672362] 
[   39.673837] The buggy address belongs to the object at ffff0008037171e0
[   39.673837]  which belongs to the cache kmalloc-16 of size 16
[   39.686165] The buggy address is located 8 bytes inside of
[   39.686165]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   39.698403] 
[   39.699878] The buggy address belongs to the physical page:
[   39.705437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   39.713422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.719930] page_type: f5(slab)
[   39.723066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.730787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.738506] page dumped because: kasan: bad access detected
[   39.744062] 
[   39.745537] Memory state around the buggy address:
[   39.750317]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   39.757520]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   39.764725] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   39.771926]                                                           ^
[   39.778527]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.785731]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.792933] ==================================================================
[   39.265705] ==================================================================
[   39.275063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.283220] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   39.290597] 
[   39.292079] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   39.292137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.292155] Hardware name: WinLink E850-96 board (DT)
[   39.292177] Call trace:
[   39.292189]  show_stack+0x20/0x38 (C)
[   39.292222]  dump_stack_lvl+0x8c/0xd0
[   39.292259]  print_report+0x118/0x608
[   39.292290]  kasan_report+0xdc/0x128
[   39.292318]  kasan_check_range+0x100/0x1a8
[   39.292351]  __kasan_check_write+0x20/0x30
[   39.292384]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.292415]  kasan_bitops_generic+0x110/0x1c8
[   39.292444]  kunit_try_run_case+0x170/0x3f0
[   39.292480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.292517]  kthread+0x328/0x630
[   39.292552]  ret_from_fork+0x10/0x20
[   39.292589] 
[   39.363772] Allocated by task 308:
[   39.367159]  kasan_save_stack+0x3c/0x68
[   39.370977]  kasan_save_track+0x20/0x40
[   39.374796]  kasan_save_alloc_info+0x40/0x58
[   39.379050]  __kasan_kmalloc+0xd4/0xd8
[   39.382783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.387298]  kasan_bitops_generic+0xa0/0x1c8
[   39.391550]  kunit_try_run_case+0x170/0x3f0
[   39.395716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.401185]  kthread+0x328/0x630
[   39.404397]  ret_from_fork+0x10/0x20
[   39.407955] 
[   39.409434] The buggy address belongs to the object at ffff0008037171e0
[   39.409434]  which belongs to the cache kmalloc-16 of size 16
[   39.421761] The buggy address is located 8 bytes inside of
[   39.421761]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   39.433997] 
[   39.435476] The buggy address belongs to the physical page:
[   39.441032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   39.449016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.455524] page_type: f5(slab)
[   39.458661] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.466382] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.474100] page dumped because: kasan: bad access detected
[   39.479656] 
[   39.481132] Memory state around the buggy address:
[   39.485914]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   39.493114]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   39.500319] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   39.507520]                                                           ^
[   39.514122]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.521326]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.528527] ==================================================================
[   40.332606] ==================================================================
[   40.339630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.347786] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.355164] 
[   40.356646] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.356690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.356706] Hardware name: WinLink E850-96 board (DT)
[   40.356726] Call trace:
[   40.356739]  show_stack+0x20/0x38 (C)
[   40.356769]  dump_stack_lvl+0x8c/0xd0
[   40.356803]  print_report+0x118/0x608
[   40.356829]  kasan_report+0xdc/0x128
[   40.356856]  kasan_check_range+0x100/0x1a8
[   40.356888]  __kasan_check_write+0x20/0x30
[   40.356918]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.356950]  kasan_bitops_generic+0x110/0x1c8
[   40.356978]  kunit_try_run_case+0x170/0x3f0
[   40.357012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.357050]  kthread+0x328/0x630
[   40.357083]  ret_from_fork+0x10/0x20
[   40.357116] 
[   40.428339] Allocated by task 308:
[   40.431725]  kasan_save_stack+0x3c/0x68
[   40.435545]  kasan_save_track+0x20/0x40
[   40.439364]  kasan_save_alloc_info+0x40/0x58
[   40.443617]  __kasan_kmalloc+0xd4/0xd8
[   40.447350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.451863]  kasan_bitops_generic+0xa0/0x1c8
[   40.456117]  kunit_try_run_case+0x170/0x3f0
[   40.460284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.465752]  kthread+0x328/0x630
[   40.468964]  ret_from_fork+0x10/0x20
[   40.472523] 
[   40.473998] The buggy address belongs to the object at ffff0008037171e0
[   40.473998]  which belongs to the cache kmalloc-16 of size 16
[   40.486325] The buggy address is located 8 bytes inside of
[   40.486325]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   40.498564] 
[   40.500041] The buggy address belongs to the physical page:
[   40.505596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   40.513583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.520093] page_type: f5(slab)
[   40.523226] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.530949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.538668] page dumped because: kasan: bad access detected
[   40.544223] 
[   40.545699] Memory state around the buggy address:
[   40.550477]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.557682]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.564886] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.572087]                                                           ^
[   40.578688]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.585893]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.593094] ==================================================================
[   40.600482] ==================================================================
[   40.607505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.615664] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.623042] 
[   40.624522] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.624568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.624584] Hardware name: WinLink E850-96 board (DT)
[   40.624602] Call trace:
[   40.624614]  show_stack+0x20/0x38 (C)
[   40.624645]  dump_stack_lvl+0x8c/0xd0
[   40.624677]  print_report+0x118/0x608
[   40.624707]  kasan_report+0xdc/0x128
[   40.624737]  kasan_check_range+0x100/0x1a8
[   40.624769]  __kasan_check_write+0x20/0x30
[   40.624801]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.624831]  kasan_bitops_generic+0x110/0x1c8
[   40.624858]  kunit_try_run_case+0x170/0x3f0
[   40.624893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.624930]  kthread+0x328/0x630
[   40.624963]  ret_from_fork+0x10/0x20
[   40.624996] 
[   40.696217] Allocated by task 308:
[   40.699605]  kasan_save_stack+0x3c/0x68
[   40.703422]  kasan_save_track+0x20/0x40
[   40.707242]  kasan_save_alloc_info+0x40/0x58
[   40.711495]  __kasan_kmalloc+0xd4/0xd8
[   40.715228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.719741]  kasan_bitops_generic+0xa0/0x1c8
[   40.723995]  kunit_try_run_case+0x170/0x3f0
[   40.728161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.733630]  kthread+0x328/0x630
[   40.736842]  ret_from_fork+0x10/0x20
[   40.740401] 
[   40.741877] The buggy address belongs to the object at ffff0008037171e0
[   40.741877]  which belongs to the cache kmalloc-16 of size 16
[   40.754203] The buggy address is located 8 bytes inside of
[   40.754203]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   40.766442] 
[   40.767918] The buggy address belongs to the physical page:
[   40.773474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   40.781461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.787971] page_type: f5(slab)
[   40.791105] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.798827] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.806546] page dumped because: kasan: bad access detected
[   40.812101] 
[   40.813577] Memory state around the buggy address:
[   40.818356]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.825559]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.832764] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.839966]                                                           ^
[   40.846566]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.853771]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.860972] ==================================================================
[   41.400660] ==================================================================
[   41.407667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.415825] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.423203] 
[   41.424686] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.424732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.424751] Hardware name: WinLink E850-96 board (DT)
[   41.424767] Call trace:
[   41.424779]  show_stack+0x20/0x38 (C)
[   41.424810]  dump_stack_lvl+0x8c/0xd0
[   41.424842]  print_report+0x118/0x608
[   41.424872]  kasan_report+0xdc/0x128
[   41.424901]  kasan_check_range+0x100/0x1a8
[   41.424931]  __kasan_check_write+0x20/0x30
[   41.424964]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.424995]  kasan_bitops_generic+0x110/0x1c8
[   41.425024]  kunit_try_run_case+0x170/0x3f0
[   41.425056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.425093]  kthread+0x328/0x630
[   41.425125]  ret_from_fork+0x10/0x20
[   41.425156] 
[   41.496379] Allocated by task 308:
[   41.499765]  kasan_save_stack+0x3c/0x68
[   41.503584]  kasan_save_track+0x20/0x40
[   41.507404]  kasan_save_alloc_info+0x40/0x58
[   41.511657]  __kasan_kmalloc+0xd4/0xd8
[   41.515389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.519903]  kasan_bitops_generic+0xa0/0x1c8
[   41.524156]  kunit_try_run_case+0x170/0x3f0
[   41.528323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.533792]  kthread+0x328/0x630
[   41.537004]  ret_from_fork+0x10/0x20
[   41.540562] 
[   41.542038] The buggy address belongs to the object at ffff0008037171e0
[   41.542038]  which belongs to the cache kmalloc-16 of size 16
[   41.554365] The buggy address is located 8 bytes inside of
[   41.554365]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.566604] 
[   41.568080] The buggy address belongs to the physical page:
[   41.573636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.581623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.588133] page_type: f5(slab)
[   41.591266] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.598989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.606708] page dumped because: kasan: bad access detected
[   41.612263] 
[   41.613738] Memory state around the buggy address:
[   41.618517]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.625721]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.632926] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.640127]                                                           ^
[   41.646728]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.653932]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.661134] ==================================================================
[   41.132712] ==================================================================
[   41.139789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.147947] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.155325] 
[   41.156806] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.156849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.156867] Hardware name: WinLink E850-96 board (DT)
[   41.156887] Call trace:
[   41.156898]  show_stack+0x20/0x38 (C)
[   41.156930]  dump_stack_lvl+0x8c/0xd0
[   41.156964]  print_report+0x118/0x608
[   41.156993]  kasan_report+0xdc/0x128
[   41.157021]  kasan_check_range+0x100/0x1a8
[   41.157053]  __kasan_check_write+0x20/0x30
[   41.157084]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.157117]  kasan_bitops_generic+0x110/0x1c8
[   41.157145]  kunit_try_run_case+0x170/0x3f0
[   41.157178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.157216]  kthread+0x328/0x630
[   41.157247]  ret_from_fork+0x10/0x20
[   41.157277] 
[   41.228501] Allocated by task 308:
[   41.231887]  kasan_save_stack+0x3c/0x68
[   41.235706]  kasan_save_track+0x20/0x40
[   41.239526]  kasan_save_alloc_info+0x40/0x58
[   41.243779]  __kasan_kmalloc+0xd4/0xd8
[   41.247511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.252025]  kasan_bitops_generic+0xa0/0x1c8
[   41.256279]  kunit_try_run_case+0x170/0x3f0
[   41.260445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.265914]  kthread+0x328/0x630
[   41.269126]  ret_from_fork+0x10/0x20
[   41.272685] 
[   41.274160] The buggy address belongs to the object at ffff0008037171e0
[   41.274160]  which belongs to the cache kmalloc-16 of size 16
[   41.286487] The buggy address is located 8 bytes inside of
[   41.286487]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.298726] 
[   41.300202] The buggy address belongs to the physical page:
[   41.305758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.313745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.320253] page_type: f5(slab)
[   41.323388] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.331111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.338829] page dumped because: kasan: bad access detected
[   41.344385] 
[   41.345860] Memory state around the buggy address:
[   41.350640]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.357843]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.365048] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.372249]                                                           ^
[   41.378850]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.386055]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.393256] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   38.965084] ==================================================================
[   38.972116] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   38.978101] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306
[   38.985393] 
[   38.986876] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   38.986931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.986948] Hardware name: WinLink E850-96 board (DT)
[   38.986970] Call trace:
[   38.986982]  show_stack+0x20/0x38 (C)
[   38.987014]  dump_stack_lvl+0x8c/0xd0
[   38.987045]  print_report+0x118/0x608
[   38.987077]  kasan_report+0xdc/0x128
[   38.987104]  __asan_report_load1_noabort+0x20/0x30
[   38.987138]  strnlen+0x80/0x88
[   38.987163]  kasan_strings+0x478/0xb00
[   38.987198]  kunit_try_run_case+0x170/0x3f0
[   38.987230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.987269]  kthread+0x328/0x630
[   38.987299]  ret_from_fork+0x10/0x20
[   38.987334] 
[   39.052319] Allocated by task 306:
[   39.055704]  kasan_save_stack+0x3c/0x68
[   39.059524]  kasan_save_track+0x20/0x40
[   39.063343]  kasan_save_alloc_info+0x40/0x58
[   39.067596]  __kasan_kmalloc+0xd4/0xd8
[   39.071329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.075843]  kasan_strings+0xc8/0xb00
[   39.079489]  kunit_try_run_case+0x170/0x3f0
[   39.083655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.089124]  kthread+0x328/0x630
[   39.092335]  ret_from_fork+0x10/0x20
[   39.095895] 
[   39.097370] Freed by task 306:
[   39.100410]  kasan_save_stack+0x3c/0x68
[   39.104228]  kasan_save_track+0x20/0x40
[   39.108047]  kasan_save_free_info+0x4c/0x78
[   39.112214]  __kasan_slab_free+0x6c/0x98
[   39.116120]  kfree+0x214/0x3c8
[   39.119158]  kasan_strings+0x24c/0xb00
[   39.122891]  kunit_try_run_case+0x170/0x3f0
[   39.127057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.132526]  kthread+0x328/0x630
[   39.135738]  ret_from_fork+0x10/0x20
[   39.139296] 
[   39.140772] The buggy address belongs to the object at ffff00080394fc00
[   39.140772]  which belongs to the cache kmalloc-32 of size 32
[   39.153099] The buggy address is located 16 bytes inside of
[   39.153099]  freed 32-byte region [ffff00080394fc00, ffff00080394fc20)
[   39.165164] 
[   39.166643] The buggy address belongs to the physical page:
[   39.172196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f
[   39.180182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.186691] page_type: f5(slab)
[   39.189826] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.197549] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   39.205268] page dumped because: kasan: bad access detected
[   39.210823] 
[   39.212299] Memory state around the buggy address:
[   39.217080]  ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.224282]  ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.231486] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.238688]                          ^
[   39.242423]  ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.249628]  ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.256830] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   37.522626] ==================================================================
[   37.532293] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   37.539845] Read of size 1 at addr ffff800089377b4a by task kunit_try_catch/300
[   37.547133] 
[   37.548619] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   37.548676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.548695] Hardware name: WinLink E850-96 board (DT)
[   37.548722] Call trace:
[   37.548738]  show_stack+0x20/0x38 (C)
[   37.548774]  dump_stack_lvl+0x8c/0xd0
[   37.548810]  print_report+0x310/0x608
[   37.548842]  kasan_report+0xdc/0x128
[   37.548873]  __asan_report_load1_noabort+0x20/0x30
[   37.548907]  kasan_alloca_oob_right+0x2dc/0x340
[   37.548944]  kunit_try_run_case+0x170/0x3f0
[   37.548985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.549026]  kthread+0x328/0x630
[   37.549065]  ret_from_fork+0x10/0x20
[   37.549100] 
[   37.611805] The buggy address belongs to stack of task kunit_try_catch/300
[   37.618682] 
[   37.620139] The buggy address belongs to the virtual mapping at
[   37.620139]  [ffff800089370000, ffff800089379000) created by:
[   37.620139]  kernel_clone+0x150/0x7a8
[   37.635413] 
[   37.636894] The buggy address belongs to the physical page:
[   37.642449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867ee
[   37.650434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.656954] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.664672] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.672391] page dumped because: kasan: bad access detected
[   37.677947] 
[   37.679423] Memory state around the buggy address:
[   37.684202]  ffff800089377a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.691405]  ffff800089377a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.698610] >ffff800089377b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   37.705811]                                               ^
[   37.711370]  ffff800089377b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   37.718576]  ffff800089377c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.725776] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   38.666061] ==================================================================
[   38.673159] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   38.679060] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306
[   38.686352] 
[   38.687835] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   38.687887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.687906] Hardware name: WinLink E850-96 board (DT)
[   38.687928] Call trace:
[   38.687941]  show_stack+0x20/0x38 (C)
[   38.687974]  dump_stack_lvl+0x8c/0xd0
[   38.688009]  print_report+0x118/0x608
[   38.688038]  kasan_report+0xdc/0x128
[   38.688068]  __asan_report_load1_noabort+0x20/0x30
[   38.688102]  strlen+0xa8/0xb0
[   38.688128]  kasan_strings+0x418/0xb00
[   38.688161]  kunit_try_run_case+0x170/0x3f0
[   38.688193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.688231]  kthread+0x328/0x630
[   38.688262]  ret_from_fork+0x10/0x20
[   38.688295] 
[   38.753191] Allocated by task 306:
[   38.756577]  kasan_save_stack+0x3c/0x68
[   38.760396]  kasan_save_track+0x20/0x40
[   38.764215]  kasan_save_alloc_info+0x40/0x58
[   38.768469]  __kasan_kmalloc+0xd4/0xd8
[   38.772203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.776715]  kasan_strings+0xc8/0xb00
[   38.780361]  kunit_try_run_case+0x170/0x3f0
[   38.784527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.789996]  kthread+0x328/0x630
[   38.793208]  ret_from_fork+0x10/0x20
[   38.796767] 
[   38.798242] Freed by task 306:
[   38.801281]  kasan_save_stack+0x3c/0x68
[   38.805100]  kasan_save_track+0x20/0x40
[   38.808919]  kasan_save_free_info+0x4c/0x78
[   38.813086]  __kasan_slab_free+0x6c/0x98
[   38.816992]  kfree+0x214/0x3c8
[   38.820031]  kasan_strings+0x24c/0xb00
[   38.823763]  kunit_try_run_case+0x170/0x3f0
[   38.827929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.833398]  kthread+0x328/0x630
[   38.836610]  ret_from_fork+0x10/0x20
[   38.840169] 
[   38.841645] The buggy address belongs to the object at ffff00080394fc00
[   38.841645]  which belongs to the cache kmalloc-32 of size 32
[   38.853971] The buggy address is located 16 bytes inside of
[   38.853971]  freed 32-byte region [ffff00080394fc00, ffff00080394fc20)
[   38.866037] 
[   38.867515] The buggy address belongs to the physical page:
[   38.873070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f
[   38.881056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.887564] page_type: f5(slab)
[   38.890698] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   38.898421] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.906140] page dumped because: kasan: bad access detected
[   38.911695] 
[   38.913171] Memory state around the buggy address:
[   38.917950]  ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.925154]  ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.932359] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.939560]                          ^
[   38.943296]  ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.950501]  ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.957702] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   38.369280] ==================================================================
[   38.376376] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   38.383059] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306
[   38.390349] 
[   38.391834] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   38.391886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.391903] Hardware name: WinLink E850-96 board (DT)
[   38.391924] Call trace:
[   38.391936]  show_stack+0x20/0x38 (C)
[   38.391969]  dump_stack_lvl+0x8c/0xd0
[   38.392006]  print_report+0x118/0x608
[   38.392039]  kasan_report+0xdc/0x128
[   38.392067]  __asan_report_load1_noabort+0x20/0x30
[   38.392101]  kasan_strings+0x95c/0xb00
[   38.392136]  kunit_try_run_case+0x170/0x3f0
[   38.392171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.392210]  kthread+0x328/0x630
[   38.392243]  ret_from_fork+0x10/0x20
[   38.392277] 
[   38.454237] Allocated by task 306:
[   38.457623]  kasan_save_stack+0x3c/0x68
[   38.461442]  kasan_save_track+0x20/0x40
[   38.465262]  kasan_save_alloc_info+0x40/0x58
[   38.469515]  __kasan_kmalloc+0xd4/0xd8
[   38.473249]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.477763]  kasan_strings+0xc8/0xb00
[   38.481407]  kunit_try_run_case+0x170/0x3f0
[   38.485574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.491042]  kthread+0x328/0x630
[   38.494254]  ret_from_fork+0x10/0x20
[   38.497813] 
[   38.499289] Freed by task 306:
[   38.502328]  kasan_save_stack+0x3c/0x68
[   38.506146]  kasan_save_track+0x20/0x40
[   38.509966]  kasan_save_free_info+0x4c/0x78
[   38.514132]  __kasan_slab_free+0x6c/0x98
[   38.518038]  kfree+0x214/0x3c8
[   38.521077]  kasan_strings+0x24c/0xb00
[   38.524809]  kunit_try_run_case+0x170/0x3f0
[   38.528976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.534444]  kthread+0x328/0x630
[   38.537656]  ret_from_fork+0x10/0x20
[   38.541215] 
[   38.542690] The buggy address belongs to the object at ffff00080394fc00
[   38.542690]  which belongs to the cache kmalloc-32 of size 32
[   38.555018] The buggy address is located 16 bytes inside of
[   38.555018]  freed 32-byte region [ffff00080394fc00, ffff00080394fc20)
[   38.567083] 
[   38.568562] The buggy address belongs to the physical page:
[   38.574116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f
[   38.582102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.588612] page_type: f5(slab)
[   38.591745] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   38.599467] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.607186] page dumped because: kasan: bad access detected
[   38.612742] 
[   38.614217] Memory state around the buggy address:
[   38.618998]  ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.626200]  ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.633405] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.640606]                          ^
[   38.644342]  ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.651547]  ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.658748] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   38.053860] ==================================================================
[   38.077426] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   38.083323] Read of size 1 at addr ffff00080394fc10 by task kunit_try_catch/306
[   38.090614] 
[   38.092101] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   38.092156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.092175] Hardware name: WinLink E850-96 board (DT)
[   38.092198] Call trace:
[   38.092213]  show_stack+0x20/0x38 (C)
[   38.092250]  dump_stack_lvl+0x8c/0xd0
[   38.092284]  print_report+0x118/0x608
[   38.092318]  kasan_report+0xdc/0x128
[   38.092348]  __asan_report_load1_noabort+0x20/0x30
[   38.092383]  strcmp+0xc0/0xc8
[   38.092408]  kasan_strings+0x340/0xb00
[   38.092442]  kunit_try_run_case+0x170/0x3f0
[   38.092480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.092521]  kthread+0x328/0x630
[   38.092554]  ret_from_fork+0x10/0x20
[   38.092592] 
[   38.157454] Allocated by task 306:
[   38.160841]  kasan_save_stack+0x3c/0x68
[   38.164659]  kasan_save_track+0x20/0x40
[   38.168478]  kasan_save_alloc_info+0x40/0x58
[   38.172731]  __kasan_kmalloc+0xd4/0xd8
[   38.176465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.180977]  kasan_strings+0xc8/0xb00
[   38.184623]  kunit_try_run_case+0x170/0x3f0
[   38.188790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.194259]  kthread+0x328/0x630
[   38.197470]  ret_from_fork+0x10/0x20
[   38.201029] 
[   38.202506] Freed by task 306:
[   38.205545]  kasan_save_stack+0x3c/0x68
[   38.209363]  kasan_save_track+0x20/0x40
[   38.213183]  kasan_save_free_info+0x4c/0x78
[   38.217349]  __kasan_slab_free+0x6c/0x98
[   38.221255]  kfree+0x214/0x3c8
[   38.224293]  kasan_strings+0x24c/0xb00
[   38.228025]  kunit_try_run_case+0x170/0x3f0
[   38.232192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.237661]  kthread+0x328/0x630
[   38.240872]  ret_from_fork+0x10/0x20
[   38.244431] 
[   38.245909] The buggy address belongs to the object at ffff00080394fc00
[   38.245909]  which belongs to the cache kmalloc-32 of size 32
[   38.258235] The buggy address is located 16 bytes inside of
[   38.258235]  freed 32-byte region [ffff00080394fc00, ffff00080394fc20)
[   38.270299] 
[   38.271778] The buggy address belongs to the physical page:
[   38.277335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88394f
[   38.285320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.291828] page_type: f5(slab)
[   38.294966] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   38.302684] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.310403] page dumped because: kasan: bad access detected
[   38.315958] 
[   38.317433] Memory state around the buggy address:
[   38.322215]  ffff00080394fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.329417]  ffff00080394fb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.336622] >ffff00080394fc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.343823]                          ^
[   38.347558]  ffff00080394fc80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.354763]  ffff00080394fd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.361965] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   37.755338] ==================================================================
[   37.765537] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   37.771522] Read of size 1 at addr ffff0008064dea98 by task kunit_try_catch/304
[   37.778813] 
[   37.780301] CPU: 4 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   37.780357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.780376] Hardware name: WinLink E850-96 board (DT)
[   37.780399] Call trace:
[   37.780414]  show_stack+0x20/0x38 (C)
[   37.780450]  dump_stack_lvl+0x8c/0xd0
[   37.780488]  print_report+0x118/0x608
[   37.780524]  kasan_report+0xdc/0x128
[   37.780553]  __asan_report_load1_noabort+0x20/0x30
[   37.780591]  memcmp+0x198/0x1d8
[   37.780618]  kasan_memcmp+0x16c/0x300
[   37.780651]  kunit_try_run_case+0x170/0x3f0
[   37.780690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.780731]  kthread+0x328/0x630
[   37.780764]  ret_from_fork+0x10/0x20
[   37.780802] 
[   37.845741] Allocated by task 304:
[   37.849129]  kasan_save_stack+0x3c/0x68
[   37.852944]  kasan_save_track+0x20/0x40
[   37.856764]  kasan_save_alloc_info+0x40/0x58
[   37.861017]  __kasan_kmalloc+0xd4/0xd8
[   37.864750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.869263]  kasan_memcmp+0xbc/0x300
[   37.872823]  kunit_try_run_case+0x170/0x3f0
[   37.876989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.882459]  kthread+0x328/0x630
[   37.885670]  ret_from_fork+0x10/0x20
[   37.889228] 
[   37.890706] The buggy address belongs to the object at ffff0008064dea80
[   37.890706]  which belongs to the cache kmalloc-32 of size 32
[   37.903033] The buggy address is located 0 bytes to the right of
[   37.903033]  allocated 24-byte region [ffff0008064dea80, ffff0008064dea98)
[   37.915877] 
[   37.917357] The buggy address belongs to the physical page:
[   37.922913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8864de
[   37.930898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.937407] page_type: f5(slab)
[   37.940545] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   37.948262] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   37.955981] page dumped because: kasan: bad access detected
[   37.961536] 
[   37.963013] Memory state around the buggy address:
[   37.967795]  ffff0008064de980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   37.974996]  ffff0008064dea00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   37.982199] >ffff0008064dea80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.989401]                             ^
[   37.993397]  ffff0008064deb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.000602]  ffff0008064deb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.007804] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   37.310503] ==================================================================
[   37.319886] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   37.327345] Read of size 1 at addr ffff800089357b5f by task kunit_try_catch/298
[   37.334636] 
[   37.336122] CPU: 4 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   37.336181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.336198] Hardware name: WinLink E850-96 board (DT)
[   37.336226] Call trace:
[   37.336241]  show_stack+0x20/0x38 (C)
[   37.336274]  dump_stack_lvl+0x8c/0xd0
[   37.336311]  print_report+0x310/0x608
[   37.336344]  kasan_report+0xdc/0x128
[   37.336372]  __asan_report_load1_noabort+0x20/0x30
[   37.336406]  kasan_alloca_oob_left+0x2b8/0x310
[   37.336440]  kunit_try_run_case+0x170/0x3f0
[   37.336475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.336516]  kthread+0x328/0x630
[   37.336552]  ret_from_fork+0x10/0x20
[   37.336586] 
[   37.399223] The buggy address belongs to stack of task kunit_try_catch/298
[   37.406098] 
[   37.407558] The buggy address belongs to the virtual mapping at
[   37.407558]  [ffff800089350000, ffff800089359000) created by:
[   37.407558]  kernel_clone+0x150/0x7a8
[   37.422829] 
[   37.424309] The buggy address belongs to the physical page:
[   37.429865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8868fb
[   37.437849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.444372] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.452089] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.459808] page dumped because: kasan: bad access detected
[   37.465364] 
[   37.466839] Memory state around the buggy address:
[   37.471618]  ffff800089357a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.478822]  ffff800089357a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.486026] >ffff800089357b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   37.493227]                                                     ^
[   37.499307]  ffff800089357b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   37.506514]  ffff800089357c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.513713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   37.069001] ==================================================================
[   37.083341] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   37.090198] Read of size 1 at addr ffff800088a57c2a by task kunit_try_catch/296
[   37.097487] 
[   37.098974] CPU: 6 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   37.099030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.099048] Hardware name: WinLink E850-96 board (DT)
[   37.099071] Call trace:
[   37.099086]  show_stack+0x20/0x38 (C)
[   37.099123]  dump_stack_lvl+0x8c/0xd0
[   37.099162]  print_report+0x310/0x608
[   37.099195]  kasan_report+0xdc/0x128
[   37.099225]  __asan_report_load1_noabort+0x20/0x30
[   37.099260]  kasan_stack_oob+0x238/0x270
[   37.099293]  kunit_try_run_case+0x170/0x3f0
[   37.099330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.099373]  kthread+0x328/0x630
[   37.099407]  ret_from_fork+0x10/0x20
[   37.099442] 
[   37.161553] The buggy address belongs to stack of task kunit_try_catch/296
[   37.168407]  and is located at offset 138 in frame:
[   37.173266]  kasan_stack_oob+0x0/0x270
[   37.177006] 
[   37.178475] This frame has 4 objects:
[   37.182125]  [48, 49) '__assertion'
[   37.182151]  [64, 72) 'array'
[   37.185594]  [96, 112) '__assertion'
[   37.188548]  [128, 138) 'stack_array'
[   37.192104] 
[   37.197229] The buggy address belongs to the virtual mapping at
[   37.197229]  [ffff800088a50000, ffff800088a59000) created by:
[   37.197229]  kernel_clone+0x150/0x7a8
[   37.212503] 
[   37.213983] The buggy address belongs to the physical page:
[   37.219539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862e7
[   37.227523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.234043] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.241762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.249481] page dumped because: kasan: bad access detected
[   37.255036] 
[   37.256512] Memory state around the buggy address:
[   37.261293]  ffff800088a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.268495]  ffff800088a57b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   37.275701] >ffff800088a57c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   37.282900]                                   ^
[   37.287418]  ffff800088a57c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   37.294623]  ffff800088a57d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.301824] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   36.849423] ==================================================================
[   36.860083] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   36.867632] Read of size 1 at addr ffff8000879f14ed by task kunit_try_catch/292
[   36.874921] 
[   36.876407] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   36.876458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.876477] Hardware name: WinLink E850-96 board (DT)
[   36.876500] Call trace:
[   36.876515]  show_stack+0x20/0x38 (C)
[   36.876551]  dump_stack_lvl+0x8c/0xd0
[   36.876589]  print_report+0x310/0x608
[   36.876620]  kasan_report+0xdc/0x128
[   36.876649]  __asan_report_load1_noabort+0x20/0x30
[   36.876686]  kasan_global_oob_right+0x230/0x270
[   36.876721]  kunit_try_run_case+0x170/0x3f0
[   36.876759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.876802]  kthread+0x328/0x630
[   36.876836]  ret_from_fork+0x10/0x20
[   36.876874] 
[   36.939589] The buggy address belongs to the variable:
[   36.944711]  global_array+0xd/0x40
[   36.948097] 
[   36.949580] The buggy address belongs to the virtual mapping at
[   36.949580]  [ffff800085c10000, ffff800087aa1000) created by:
[   36.949580]  paging_init+0x66c/0x7d0
[   36.964763] 
[   36.966243] The buggy address belongs to the physical page:
[   36.971800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x879f1
[   36.979698] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   36.986999] raw: 03fffe0000002000 fffffdffc01e7c48 fffffdffc01e7c48 0000000000000000
[   36.994717] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.002436] page dumped because: kasan: bad access detected
[   37.007991] 
[   37.009467] Memory state around the buggy address:
[   37.014247]  ffff8000879f1380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.021450]  ffff8000879f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.028655] >ffff8000879f1480: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   37.035856]                                                           ^
[   37.042457]  ffff8000879f1500: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   37.049661]  ffff8000879f1580: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   37.056864] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   36.610391] ==================================================================
[   36.620503] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.628485] Free of addr ffff000803208001 by task kunit_try_catch/290
[   36.634907] 
[   36.636393] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   36.636449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.636464] Hardware name: WinLink E850-96 board (DT)
[   36.636485] Call trace:
[   36.636500]  show_stack+0x20/0x38 (C)
[   36.636539]  dump_stack_lvl+0x8c/0xd0
[   36.636575]  print_report+0x118/0x608
[   36.636607]  kasan_report_invalid_free+0xc0/0xe8
[   36.636638]  __kasan_mempool_poison_object+0xfc/0x150
[   36.636671]  mempool_free+0x28c/0x328
[   36.636709]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.636745]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   36.636784]  kunit_try_run_case+0x170/0x3f0
[   36.636822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.636863]  kthread+0x328/0x630
[   36.636896]  ret_from_fork+0x10/0x20
[   36.636935] 
[   36.711125] The buggy address belongs to the physical page:
[   36.716682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208
[   36.724666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.732304] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.739246] page_type: f8(unknown)
[   36.742645] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.750363] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.758090] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.765901] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.773714] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff
[   36.781526] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.789331] page dumped because: kasan: bad access detected
[   36.794887] 
[   36.796362] Memory state around the buggy address:
[   36.801144]  ffff000803207f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.808345]  ffff000803207f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.815553] >ffff000803208000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.822752]                    ^
[   36.825968]  ffff000803208080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.833171]  ffff000803208100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.840375] ==================================================================
[   36.284328] ==================================================================
[   36.294899] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.302882] Free of addr ffff000801dd0801 by task kunit_try_catch/288
[   36.309304] 
[   36.310790] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   36.310844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.310860] Hardware name: WinLink E850-96 board (DT)
[   36.310883] Call trace:
[   36.310898]  show_stack+0x20/0x38 (C)
[   36.310933]  dump_stack_lvl+0x8c/0xd0
[   36.310968]  print_report+0x118/0x608
[   36.311000]  kasan_report_invalid_free+0xc0/0xe8
[   36.311031]  check_slab_allocation+0xfc/0x108
[   36.311064]  __kasan_mempool_poison_object+0x78/0x150
[   36.311099]  mempool_free+0x28c/0x328
[   36.311136]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.311171]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.311210]  kunit_try_run_case+0x170/0x3f0
[   36.311247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.311288]  kthread+0x328/0x630
[   36.311322]  ret_from_fork+0x10/0x20
[   36.311358] 
[   36.389339] Allocated by task 288:
[   36.392726]  kasan_save_stack+0x3c/0x68
[   36.396543]  kasan_save_track+0x20/0x40
[   36.400362]  kasan_save_alloc_info+0x40/0x58
[   36.404615]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.409910]  remove_element+0x130/0x1f8
[   36.413730]  mempool_alloc_preallocated+0x58/0xc0
[   36.418417]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   36.423972]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.428921]  kunit_try_run_case+0x170/0x3f0
[   36.433087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.438557]  kthread+0x328/0x630
[   36.441768]  ret_from_fork+0x10/0x20
[   36.445326] 
[   36.446804] The buggy address belongs to the object at ffff000801dd0800
[   36.446804]  which belongs to the cache kmalloc-128 of size 128
[   36.459305] The buggy address is located 1 bytes inside of
[   36.459305]  128-byte region [ffff000801dd0800, ffff000801dd0880)
[   36.470847] 
[   36.472325] The buggy address belongs to the physical page:
[   36.477883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0
[   36.485868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.493506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.500449] page_type: f5(slab)
[   36.503586] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.511304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.519030] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.526842] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.534655] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff
[   36.542467] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.550273] page dumped because: kasan: bad access detected
[   36.555830] 
[   36.557304] Memory state around the buggy address:
[   36.562084]  ffff000801dd0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.569287]  ffff000801dd0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.576491] >ffff000801dd0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.583692]                    ^
[   36.586908]  ffff000801dd0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.594112]  ffff000801dd0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.601316] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   35.852760] ==================================================================
[   35.862699] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.869817] Free of addr ffff000803244000 by task kunit_try_catch/284
[   35.876238] 
[   35.877725] CPU: 6 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   35.877777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.877793] Hardware name: WinLink E850-96 board (DT)
[   35.877817] Call trace:
[   35.877831]  show_stack+0x20/0x38 (C)
[   35.877868]  dump_stack_lvl+0x8c/0xd0
[   35.877903]  print_report+0x118/0x608
[   35.877935]  kasan_report_invalid_free+0xc0/0xe8
[   35.877967]  __kasan_mempool_poison_object+0x14c/0x150
[   35.878000]  mempool_free+0x28c/0x328
[   35.878039]  mempool_double_free_helper+0x150/0x2e8
[   35.878074]  mempool_kmalloc_large_double_free+0xc0/0x118
[   35.878112]  kunit_try_run_case+0x170/0x3f0
[   35.878151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.878190]  kthread+0x328/0x630
[   35.878225]  ret_from_fork+0x10/0x20
[   35.878260] 
[   35.951675] The buggy address belongs to the physical page:
[   35.957231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883244
[   35.965215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.972853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.979796] page_type: f8(unknown)
[   35.983192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.990914] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   35.998638] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.006452] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.014263] head: 0bfffe0000000002 fffffdffe00c9101 00000000ffffffff 00000000ffffffff
[   36.022075] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.029881] page dumped because: kasan: bad access detected
[   36.035436] 
[   36.036913] Memory state around the buggy address:
[   36.041693]  ffff000803243f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.048895]  ffff000803243f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.056101] >ffff000803244000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.063301]                    ^
[   36.066516]  ffff000803244080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.073721]  ffff000803244100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.080923] ==================================================================
[   35.478975] ==================================================================
[   35.488661] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.495777] Free of addr ffff000801bfff00 by task kunit_try_catch/282
[   35.502198] 
[   35.503685] CPU: 4 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   35.503741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.503756] Hardware name: WinLink E850-96 board (DT)
[   35.503778] Call trace:
[   35.503793]  show_stack+0x20/0x38 (C)
[   35.503828]  dump_stack_lvl+0x8c/0xd0
[   35.503862]  print_report+0x118/0x608
[   35.503893]  kasan_report_invalid_free+0xc0/0xe8
[   35.503923]  check_slab_allocation+0xd4/0x108
[   35.503956]  __kasan_mempool_poison_object+0x78/0x150
[   35.503989]  mempool_free+0x28c/0x328
[   35.504028]  mempool_double_free_helper+0x150/0x2e8
[   35.504063]  mempool_kmalloc_double_free+0xc0/0x118
[   35.504099]  kunit_try_run_case+0x170/0x3f0
[   35.504135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.504175]  kthread+0x328/0x630
[   35.504208]  ret_from_fork+0x10/0x20
[   35.504245] 
[   35.581365] Allocated by task 282:
[   35.584753]  kasan_save_stack+0x3c/0x68
[   35.588569]  kasan_save_track+0x20/0x40
[   35.592388]  kasan_save_alloc_info+0x40/0x58
[   35.596641]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.601936]  remove_element+0x130/0x1f8
[   35.605755]  mempool_alloc_preallocated+0x58/0xc0
[   35.610443]  mempool_double_free_helper+0x94/0x2e8
[   35.615217]  mempool_kmalloc_double_free+0xc0/0x118
[   35.620078]  kunit_try_run_case+0x170/0x3f0
[   35.624245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.629715]  kthread+0x328/0x630
[   35.632925]  ret_from_fork+0x10/0x20
[   35.636484] 
[   35.637961] Freed by task 282:
[   35.640998]  kasan_save_stack+0x3c/0x68
[   35.644818]  kasan_save_track+0x20/0x40
[   35.648637]  kasan_save_free_info+0x4c/0x78
[   35.652804]  __kasan_mempool_poison_object+0xc0/0x150
[   35.657838]  mempool_free+0x28c/0x328
[   35.661484]  mempool_double_free_helper+0x100/0x2e8
[   35.666345]  mempool_kmalloc_double_free+0xc0/0x118
[   35.671206]  kunit_try_run_case+0x170/0x3f0
[   35.675373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.680841]  kthread+0x328/0x630
[   35.684053]  ret_from_fork+0x10/0x20
[   35.687612] 
[   35.689089] The buggy address belongs to the object at ffff000801bfff00
[   35.689089]  which belongs to the cache kmalloc-128 of size 128
[   35.701589] The buggy address is located 0 bytes inside of
[   35.701589]  128-byte region [ffff000801bfff00, ffff000801bfff80)
[   35.713132] 
[   35.714611] The buggy address belongs to the physical page:
[   35.720169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bfe
[   35.728154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.735792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.742735] page_type: f5(slab)
[   35.745872] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.753590] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   35.761317] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.769128] head: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   35.776941] head: 0bfffe0000000001 fffffdffe006ff81 00000000ffffffff 00000000ffffffff
[   35.784753] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.792558] page dumped because: kasan: bad access detected
[   35.798114] 
[   35.799589] Memory state around the buggy address:
[   35.804370]  ffff000801bffe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.811572]  ffff000801bffe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.818778] >ffff000801bfff00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.825978]                    ^
[   35.829193]  ffff000801bfff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.836400]  ffff000801c00000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.843602] ==================================================================
[   36.089945] ==================================================================
[   36.100546] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   36.107660] Free of addr ffff000803208000 by task kunit_try_catch/286
[   36.114083] 
[   36.115567] CPU: 5 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   36.115618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.115635] Hardware name: WinLink E850-96 board (DT)
[   36.115660] Call trace:
[   36.115676]  show_stack+0x20/0x38 (C)
[   36.115712]  dump_stack_lvl+0x8c/0xd0
[   36.115747]  print_report+0x118/0x608
[   36.115779]  kasan_report_invalid_free+0xc0/0xe8
[   36.115810]  __kasan_mempool_poison_pages+0xe0/0xe8
[   36.115842]  mempool_free+0x24c/0x328
[   36.115874]  mempool_double_free_helper+0x150/0x2e8
[   36.115909]  mempool_page_alloc_double_free+0xbc/0x118
[   36.115941]  kunit_try_run_case+0x170/0x3f0
[   36.115977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.116016]  kthread+0x328/0x630
[   36.116052]  ret_from_fork+0x10/0x20
[   36.116089] 
[   36.188995] The buggy address belongs to the physical page:
[   36.194554] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208
[   36.202538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.209059] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.216777] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.224496] page dumped because: kasan: bad access detected
[   36.230051] 
[   36.231527] Memory state around the buggy address:
[   36.236307]  ffff000803207f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.243510]  ffff000803207f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.250716] >ffff000803208000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.257916]                    ^
[   36.261131]  ffff000803208080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.268336]  ffff000803208100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.275539] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   34.737221] ==================================================================
[   34.746745] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.753425] Read of size 1 at addr ffff000803244000 by task kunit_try_catch/276
[   34.760716] 
[   34.762203] CPU: 6 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   34.762252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.762269] Hardware name: WinLink E850-96 board (DT)
[   34.762291] Call trace:
[   34.762306]  show_stack+0x20/0x38 (C)
[   34.762340]  dump_stack_lvl+0x8c/0xd0
[   34.762375]  print_report+0x118/0x608
[   34.762404]  kasan_report+0xdc/0x128
[   34.762432]  __asan_report_load1_noabort+0x20/0x30
[   34.762466]  mempool_uaf_helper+0x314/0x340
[   34.762500]  mempool_kmalloc_large_uaf+0xc4/0x120
[   34.762537]  kunit_try_run_case+0x170/0x3f0
[   34.762574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.762613]  kthread+0x328/0x630
[   34.762647]  ret_from_fork+0x10/0x20
[   34.762682] 
[   34.829730] The buggy address belongs to the physical page:
[   34.835286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883244
[   34.843271] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.850910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.857850] page_type: f8(unknown)
[   34.861248] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.868968] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.876694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.884505] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.892318] head: 0bfffe0000000002 fffffdffe00c9101 00000000ffffffff 00000000ffffffff
[   34.900130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.907936] page dumped because: kasan: bad access detected
[   34.913492] 
[   34.914967] Memory state around the buggy address:
[   34.919748]  ffff000803243f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.926950]  ffff000803243f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.934156] >ffff000803244000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.941356]                    ^
[   34.944571]  ffff000803244080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.951775]  ffff000803244100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.958979] ==================================================================
[   35.297251] ==================================================================
[   35.300729] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   35.307412] Read of size 1 at addr ffff000803270000 by task kunit_try_catch/280
[   35.314702] 
[   35.316188] CPU: 7 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   35.316243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.316256] Hardware name: WinLink E850-96 board (DT)
[   35.316277] Call trace:
[   35.316293]  show_stack+0x20/0x38 (C)
[   35.316331]  dump_stack_lvl+0x8c/0xd0
[   35.316362]  print_report+0x118/0x608
[   35.316394]  kasan_report+0xdc/0x128
[   35.316426]  __asan_report_load1_noabort+0x20/0x30
[   35.316460]  mempool_uaf_helper+0x314/0x340
[   35.316491]  mempool_page_alloc_uaf+0xc0/0x118
[   35.316523]  kunit_try_run_case+0x170/0x3f0
[   35.316560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.316599]  kthread+0x328/0x630
[   35.316634]  ret_from_fork+0x10/0x20
[   35.316670] 
[   35.383455] The buggy address belongs to the physical page:
[   35.389011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883270
[   35.396995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.403518] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.411234] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.418954] page dumped because: kasan: bad access detected
[   35.424508] 
[   35.425984] Memory state around the buggy address:
[   35.430766]  ffff00080326ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.437967]  ffff00080326ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.445171] >ffff000803270000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.452373]                    ^
[   35.455588]  ffff000803270080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.462793]  ffff000803270100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.469996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   34.381155] ==================================================================
[   34.385467] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.392581] Read of size 1 at addr ffff000802408800 by task kunit_try_catch/274
[   34.399871] 
[   34.401360] CPU: 5 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   34.401412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.401431] Hardware name: WinLink E850-96 board (DT)
[   34.401454] Call trace:
[   34.401471]  show_stack+0x20/0x38 (C)
[   34.401510]  dump_stack_lvl+0x8c/0xd0
[   34.401548]  print_report+0x118/0x608
[   34.401579]  kasan_report+0xdc/0x128
[   34.401609]  __asan_report_load1_noabort+0x20/0x30
[   34.401642]  mempool_uaf_helper+0x314/0x340
[   34.401678]  mempool_kmalloc_uaf+0xc4/0x120
[   34.401710]  kunit_try_run_case+0x170/0x3f0
[   34.401749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.401790]  kthread+0x328/0x630
[   34.401827]  ret_from_fork+0x10/0x20
[   34.401863] 
[   34.468361] Allocated by task 274:
[   34.471748]  kasan_save_stack+0x3c/0x68
[   34.475564]  kasan_save_track+0x20/0x40
[   34.479385]  kasan_save_alloc_info+0x40/0x58
[   34.483637]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.488932]  remove_element+0x130/0x1f8
[   34.492751]  mempool_alloc_preallocated+0x58/0xc0
[   34.497439]  mempool_uaf_helper+0xa4/0x340
[   34.501519]  mempool_kmalloc_uaf+0xc4/0x120
[   34.505687]  kunit_try_run_case+0x170/0x3f0
[   34.509852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.515321]  kthread+0x328/0x630
[   34.518532]  ret_from_fork+0x10/0x20
[   34.522091] 
[   34.523568] Freed by task 274:
[   34.526607]  kasan_save_stack+0x3c/0x68
[   34.530425]  kasan_save_track+0x20/0x40
[   34.534244]  kasan_save_free_info+0x4c/0x78
[   34.538410]  __kasan_mempool_poison_object+0xc0/0x150
[   34.543445]  mempool_free+0x28c/0x328
[   34.547091]  mempool_uaf_helper+0x104/0x340
[   34.551258]  mempool_kmalloc_uaf+0xc4/0x120
[   34.555424]  kunit_try_run_case+0x170/0x3f0
[   34.559592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.565059]  kthread+0x328/0x630
[   34.568271]  ret_from_fork+0x10/0x20
[   34.571830] 
[   34.573308] The buggy address belongs to the object at ffff000802408800
[   34.573308]  which belongs to the cache kmalloc-128 of size 128
[   34.585807] The buggy address is located 0 bytes inside of
[   34.585807]  freed 128-byte region [ffff000802408800, ffff000802408880)
[   34.597871] 
[   34.599351] The buggy address belongs to the physical page:
[   34.604908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   34.612892] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.620531] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.627474] page_type: f5(slab)
[   34.630611] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.638329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.646055] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.653866] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.661680] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   34.669491] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.677298] page dumped because: kasan: bad access detected
[   34.682854] 
[   34.684328] Memory state around the buggy address:
[   34.689110]  ffff000802408700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.696311]  ffff000802408780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.703517] >ffff000802408800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.710717]                    ^
[   34.713932]  ffff000802408880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.721137]  ffff000802408900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.728340] ==================================================================
[   34.968570] ==================================================================
[   34.977908] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.985022] Read of size 1 at addr ffff000806953240 by task kunit_try_catch/278
[   34.992311] 
[   34.993798] CPU: 5 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   34.993855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.993871] Hardware name: WinLink E850-96 board (DT)
[   34.993894] Call trace:
[   34.993908]  show_stack+0x20/0x38 (C)
[   34.993942]  dump_stack_lvl+0x8c/0xd0
[   34.993977]  print_report+0x118/0x608
[   34.994006]  kasan_report+0xdc/0x128
[   34.994034]  __asan_report_load1_noabort+0x20/0x30
[   34.994068]  mempool_uaf_helper+0x314/0x340
[   34.994102]  mempool_slab_uaf+0xc0/0x118
[   34.994133]  kunit_try_run_case+0x170/0x3f0
[   34.994169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.994207]  kthread+0x328/0x630
[   34.994243]  ret_from_fork+0x10/0x20
[   34.994277] 
[   35.060540] Allocated by task 278:
[   35.063926]  kasan_save_stack+0x3c/0x68
[   35.067743]  kasan_save_track+0x20/0x40
[   35.071562]  kasan_save_alloc_info+0x40/0x58
[   35.075816]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.081024]  remove_element+0x16c/0x1f8
[   35.084843]  mempool_alloc_preallocated+0x58/0xc0
[   35.089532]  mempool_uaf_helper+0xa4/0x340
[   35.093611]  mempool_slab_uaf+0xc0/0x118
[   35.097517]  kunit_try_run_case+0x170/0x3f0
[   35.101683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.107152]  kthread+0x328/0x630
[   35.110364]  ret_from_fork+0x10/0x20
[   35.113923] 
[   35.115400] Freed by task 278:
[   35.118439]  kasan_save_stack+0x3c/0x68
[   35.122256]  kasan_save_track+0x20/0x40
[   35.126075]  kasan_save_free_info+0x4c/0x78
[   35.130242]  __kasan_mempool_poison_object+0xc0/0x150
[   35.135277]  mempool_free+0x28c/0x328
[   35.138922]  mempool_uaf_helper+0x104/0x340
[   35.143089]  mempool_slab_uaf+0xc0/0x118
[   35.146995]  kunit_try_run_case+0x170/0x3f0
[   35.151162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.156631]  kthread+0x328/0x630
[   35.159842]  ret_from_fork+0x10/0x20
[   35.163402] 
[   35.164878] The buggy address belongs to the object at ffff000806953240
[   35.164878]  which belongs to the cache test_cache of size 123
[   35.177292] The buggy address is located 0 bytes inside of
[   35.177292]  freed 123-byte region [ffff000806953240, ffff0008069532bb)
[   35.189356] 
[   35.190835] The buggy address belongs to the physical page:
[   35.196392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886953
[   35.204375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.210885] page_type: f5(slab)
[   35.214022] raw: 0bfffe0000000000 ffff00080240a000 dead000000000122 0000000000000000
[   35.221740] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   35.229461] page dumped because: kasan: bad access detected
[   35.235014] 
[   35.236490] Memory state around the buggy address:
[   35.241273]  ffff000806953100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.248473]  ffff000806953180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.255678] >ffff000806953200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.262879]                                            ^
[   35.268177]  ffff000806953280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.275382]  ffff000806953300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.282585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   33.864859] ==================================================================
[   33.874886] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.882431] Read of size 1 at addr ffff00080320a001 by task kunit_try_catch/270
[   33.889722] 
[   33.891209] CPU: 5 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   33.891260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.891276] Hardware name: WinLink E850-96 board (DT)
[   33.891296] Call trace:
[   33.891309]  show_stack+0x20/0x38 (C)
[   33.891342]  dump_stack_lvl+0x8c/0xd0
[   33.891376]  print_report+0x118/0x608
[   33.891406]  kasan_report+0xdc/0x128
[   33.891435]  __asan_report_load1_noabort+0x20/0x30
[   33.891467]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.891504]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   33.891542]  kunit_try_run_case+0x170/0x3f0
[   33.891577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.891617]  kthread+0x328/0x630
[   33.891651]  ret_from_fork+0x10/0x20
[   33.891685] 
[   33.959778] The buggy address belongs to the physical page:
[   33.965334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883208
[   33.973319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.980958] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.987898] page_type: f8(unknown)
[   33.991296] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.999015] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.006742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.014553] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.022366] head: 0bfffe0000000002 fffffdffe00c8201 00000000ffffffff 00000000ffffffff
[   34.030178] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.037984] page dumped because: kasan: bad access detected
[   34.043539] 
[   34.045015] Memory state around the buggy address:
[   34.049796]  ffff000803209f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.056998]  ffff000803209f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.064202] >ffff00080320a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.071404]                    ^
[   34.074619]  ffff00080320a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.081824]  ffff00080320a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.089025] ==================================================================
[   33.563921] ==================================================================
[   33.564101] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.564242] Read of size 1 at addr ffff000801dd0473 by task kunit_try_catch/268
[   33.570630] 
[   33.572118] CPU: 6 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   33.572173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.572188] Hardware name: WinLink E850-96 board (DT)
[   33.572211] Call trace:
[   33.572226]  show_stack+0x20/0x38 (C)
[   33.572266]  dump_stack_lvl+0x8c/0xd0
[   33.572301]  print_report+0x118/0x608
[   33.572333]  kasan_report+0xdc/0x128
[   33.572364]  __asan_report_load1_noabort+0x20/0x30
[   33.572399]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.572434]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.572468]  kunit_try_run_case+0x170/0x3f0
[   33.572505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.572544]  kthread+0x328/0x630
[   33.572579]  ret_from_fork+0x10/0x20
[   33.572617] 
[   33.640162] Allocated by task 268:
[   33.643548]  kasan_save_stack+0x3c/0x68
[   33.647365]  kasan_save_track+0x20/0x40
[   33.651184]  kasan_save_alloc_info+0x40/0x58
[   33.655438]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.660733]  remove_element+0x130/0x1f8
[   33.664552]  mempool_alloc_preallocated+0x58/0xc0
[   33.669240]  mempool_oob_right_helper+0x98/0x2f0
[   33.673840]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.678528]  kunit_try_run_case+0x170/0x3f0
[   33.682693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.688165]  kthread+0x328/0x630
[   33.691375]  ret_from_fork+0x10/0x20
[   33.694934] 
[   33.696411] The buggy address belongs to the object at ffff000801dd0400
[   33.696411]  which belongs to the cache kmalloc-128 of size 128
[   33.708911] The buggy address is located 0 bytes to the right of
[   33.708911]  allocated 115-byte region [ffff000801dd0400, ffff000801dd0473)
[   33.721843] 
[   33.723323] The buggy address belongs to the physical page:
[   33.728880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0
[   33.736864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.744504] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.751445] page_type: f5(slab)
[   33.754581] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   33.762301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.770027] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   33.777838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.785651] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff
[   33.793463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.801269] page dumped because: kasan: bad access detected
[   33.806824] 
[   33.808300] Memory state around the buggy address:
[   33.813080]  ffff000801dd0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.820282]  ffff000801dd0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.827488] >ffff000801dd0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.834688]                                                              ^
[   33.841549]  ffff000801dd0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.848754]  ffff000801dd0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.855957] ==================================================================
[   34.098396] ==================================================================
[   34.108476] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.116022] Read of size 1 at addr ffff00080682f2bb by task kunit_try_catch/272
[   34.123312] 
[   34.124800] CPU: 6 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   34.124848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.124864] Hardware name: WinLink E850-96 board (DT)
[   34.124885] Call trace:
[   34.124900]  show_stack+0x20/0x38 (C)
[   34.124934]  dump_stack_lvl+0x8c/0xd0
[   34.124968]  print_report+0x118/0x608
[   34.124999]  kasan_report+0xdc/0x128
[   34.125030]  __asan_report_load1_noabort+0x20/0x30
[   34.125065]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.125101]  mempool_slab_oob_right+0xc0/0x118
[   34.125133]  kunit_try_run_case+0x170/0x3f0
[   34.125169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.125207]  kthread+0x328/0x630
[   34.125240]  ret_from_fork+0x10/0x20
[   34.125277] 
[   34.192584] Allocated by task 272:
[   34.195970]  kasan_save_stack+0x3c/0x68
[   34.199787]  kasan_save_track+0x20/0x40
[   34.203607]  kasan_save_alloc_info+0x40/0x58
[   34.207860]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.213070]  remove_element+0x16c/0x1f8
[   34.216888]  mempool_alloc_preallocated+0x58/0xc0
[   34.221575]  mempool_oob_right_helper+0x98/0x2f0
[   34.226176]  mempool_slab_oob_right+0xc0/0x118
[   34.230602]  kunit_try_run_case+0x170/0x3f0
[   34.234769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.240238]  kthread+0x328/0x630
[   34.243450]  ret_from_fork+0x10/0x20
[   34.247008] 
[   34.248487] The buggy address belongs to the object at ffff00080682f240
[   34.248487]  which belongs to the cache test_cache of size 123
[   34.260900] The buggy address is located 0 bytes to the right of
[   34.260900]  allocated 123-byte region [ffff00080682f240, ffff00080682f2bb)
[   34.273831] 
[   34.275310] The buggy address belongs to the physical page:
[   34.280867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88682f
[   34.288852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.295360] page_type: f5(slab)
[   34.298496] raw: 0bfffe0000000000 ffff000801dd23c0 dead000000000122 0000000000000000
[   34.306216] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.313935] page dumped because: kasan: bad access detected
[   34.319490] 
[   34.320966] Memory state around the buggy address:
[   34.325746]  ffff00080682f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.332950]  ffff00080682f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.340155] >ffff00080682f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.347354]                                         ^
[   34.352392]  ffff00080682f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.359597]  ffff00080682f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.366799] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.677716] ==================================================================
[   32.677908] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   32.678049] Read of size 1 at addr ffff000802440280 by task kunit_try_catch/262
[   32.681603] 
[   32.683090] CPU: 7 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   32.683147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.683164] Hardware name: WinLink E850-96 board (DT)
[   32.683187] Call trace:
[   32.683205]  show_stack+0x20/0x38 (C)
[   32.683238]  dump_stack_lvl+0x8c/0xd0
[   32.683275]  print_report+0x118/0x608
[   32.683303]  kasan_report+0xdc/0x128
[   32.683332]  __kasan_check_byte+0x54/0x70
[   32.683360]  kmem_cache_destroy+0x34/0x218
[   32.683393]  kmem_cache_double_destroy+0x174/0x300
[   32.683426]  kunit_try_run_case+0x170/0x3f0
[   32.683463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.683505]  kthread+0x328/0x630
[   32.683539]  ret_from_fork+0x10/0x20
[   32.683573] 
[   32.749833] Allocated by task 262:
[   32.753221]  kasan_save_stack+0x3c/0x68
[   32.757036]  kasan_save_track+0x20/0x40
[   32.760855]  kasan_save_alloc_info+0x40/0x58
[   32.765109]  __kasan_slab_alloc+0xa8/0xb0
[   32.769101]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.773702]  __kmem_cache_create_args+0x178/0x280
[   32.778389]  kmem_cache_double_destroy+0xc0/0x300
[   32.783077]  kunit_try_run_case+0x170/0x3f0
[   32.787245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.792713]  kthread+0x328/0x630
[   32.795924]  ret_from_fork+0x10/0x20
[   32.799483] 
[   32.800960] Freed by task 262:
[   32.803998]  kasan_save_stack+0x3c/0x68
[   32.807816]  kasan_save_track+0x20/0x40
[   32.811636]  kasan_save_free_info+0x4c/0x78
[   32.815802]  __kasan_slab_free+0x6c/0x98
[   32.819710]  kmem_cache_free+0x260/0x468
[   32.823615]  slab_kmem_cache_release+0x38/0x50
[   32.828042]  kmem_cache_release+0x1c/0x30
[   32.832035]  kobject_put+0x17c/0x420
[   32.835593]  sysfs_slab_release+0x1c/0x30
[   32.839587]  kmem_cache_destroy+0x118/0x218
[   32.843753]  kmem_cache_double_destroy+0x128/0x300
[   32.848528]  kunit_try_run_case+0x170/0x3f0
[   32.852694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.858163]  kthread+0x328/0x630
[   32.861375]  ret_from_fork+0x10/0x20
[   32.864933] 
[   32.866411] The buggy address belongs to the object at ffff000802440280
[   32.866411]  which belongs to the cache kmem_cache of size 208
[   32.878824] The buggy address is located 0 bytes inside of
[   32.878824]  freed 208-byte region [ffff000802440280, ffff000802440350)
[   32.890888] 
[   32.892368] The buggy address belongs to the physical page:
[   32.897924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882440
[   32.905909] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.913548] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.920492] page_type: f5(slab)
[   32.923627] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   32.931345] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   32.939072] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   32.946883] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   32.954696] head: 0bfffe0000000001 fffffdffe0091001 00000000ffffffff 00000000ffffffff
[   32.962508] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.970314] page dumped because: kasan: bad access detected
[   32.975869] 
[   32.977345] Memory state around the buggy address:
[   32.982125]  ffff000802440180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.989328]  ffff000802440200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.996532] >ffff000802440280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.003734]                    ^
[   33.006949]  ffff000802440300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   33.014153]  ffff000802440380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.021356] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   32.282681] ==================================================================
[   32.282876] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   32.283009] Read of size 1 at addr ffff000801dd6000 by task kunit_try_catch/260
[   32.286394] 
[   32.287880] CPU: 6 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   32.287933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.287952] Hardware name: WinLink E850-96 board (DT)
[   32.287976] Call trace:
[   32.287991]  show_stack+0x20/0x38 (C)
[   32.288024]  dump_stack_lvl+0x8c/0xd0
[   32.288061]  print_report+0x118/0x608
[   32.288093]  kasan_report+0xdc/0x128
[   32.288121]  __asan_report_load1_noabort+0x20/0x30
[   32.288154]  kmem_cache_rcu_uaf+0x388/0x468
[   32.288189]  kunit_try_run_case+0x170/0x3f0
[   32.288228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.288265]  kthread+0x328/0x630
[   32.288299]  ret_from_fork+0x10/0x20
[   32.288339] 
[   32.350716] Allocated by task 260:
[   32.354103]  kasan_save_stack+0x3c/0x68
[   32.357920]  kasan_save_track+0x20/0x40
[   32.361739]  kasan_save_alloc_info+0x40/0x58
[   32.365992]  __kasan_slab_alloc+0xa8/0xb0
[   32.369985]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.374586]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.378753]  kunit_try_run_case+0x170/0x3f0
[   32.382919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.388389]  kthread+0x328/0x630
[   32.391601]  ret_from_fork+0x10/0x20
[   32.395158] 
[   32.396636] Freed by task 0:
[   32.399502]  kasan_save_stack+0x3c/0x68
[   32.403318]  kasan_save_track+0x20/0x40
[   32.407139]  kasan_save_free_info+0x4c/0x78
[   32.411304]  __kasan_slab_free+0x6c/0x98
[   32.415211]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.419898]  rcu_core+0x9f4/0x1e20
[   32.423283]  rcu_core_si+0x18/0x30
[   32.426668]  handle_softirqs+0x374/0xb28
[   32.430575]  __do_softirq+0x1c/0x28
[   32.434047] 
[   32.435522] Last potentially related work creation:
[   32.440385]  kasan_save_stack+0x3c/0x68
[   32.444203]  kasan_record_aux_stack+0xb4/0xc8
[   32.448545]  kmem_cache_free+0x120/0x468
[   32.452450]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.456616]  kunit_try_run_case+0x170/0x3f0
[   32.460783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.466251]  kthread+0x328/0x630
[   32.469463]  ret_from_fork+0x10/0x20
[   32.473022] 
[   32.474498] The buggy address belongs to the object at ffff000801dd6000
[   32.474498]  which belongs to the cache test_cache of size 200
[   32.486913] The buggy address is located 0 bytes inside of
[   32.486913]  freed 200-byte region [ffff000801dd6000, ffff000801dd60c8)
[   32.498978] 
[   32.500456] The buggy address belongs to the physical page:
[   32.506012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd6
[   32.513997] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.521636] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.528579] page_type: f5(slab)
[   32.531716] raw: 0bfffe0000000040 ffff000801dd2140 dead000000000122 0000000000000000
[   32.539434] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.547161] head: 0bfffe0000000040 ffff000801dd2140 dead000000000122 0000000000000000
[   32.554972] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.562785] head: 0bfffe0000000001 fffffdffe0077581 00000000ffffffff 00000000ffffffff
[   32.570596] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.578402] page dumped because: kasan: bad access detected
[   32.583958] 
[   32.585433] Memory state around the buggy address:
[   32.590213]  ffff000801dd5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.597416]  ffff000801dd5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.604622] >ffff000801dd6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.611822]                    ^
[   32.615038]  ffff000801dd6080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.622242]  ffff000801dd6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.629445] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.885707] ==================================================================
[   31.889174] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.896116] Free of addr ffff000802444001 by task kunit_try_catch/258
[   31.902538] 
[   31.904026] CPU: 7 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   31.904080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.904101] Hardware name: WinLink E850-96 board (DT)
[   31.904124] Call trace:
[   31.904138]  show_stack+0x20/0x38 (C)
[   31.904178]  dump_stack_lvl+0x8c/0xd0
[   31.904214]  print_report+0x118/0x608
[   31.904246]  kasan_report_invalid_free+0xc0/0xe8
[   31.904280]  check_slab_allocation+0xfc/0x108
[   31.904312]  __kasan_slab_pre_free+0x2c/0x48
[   31.904340]  kmem_cache_free+0xf0/0x468
[   31.904371]  kmem_cache_invalid_free+0x184/0x3c8
[   31.904406]  kunit_try_run_case+0x170/0x3f0
[   31.904441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.904482]  kthread+0x328/0x630
[   31.904517]  ret_from_fork+0x10/0x20
[   31.904552] 
[   31.975975] Allocated by task 258:
[   31.979363]  kasan_save_stack+0x3c/0x68
[   31.983179]  kasan_save_track+0x20/0x40
[   31.986999]  kasan_save_alloc_info+0x40/0x58
[   31.991251]  __kasan_slab_alloc+0xa8/0xb0
[   31.995244]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.999845]  kmem_cache_invalid_free+0x12c/0x3c8
[   32.004446]  kunit_try_run_case+0x170/0x3f0
[   32.008612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.014081]  kthread+0x328/0x630
[   32.017293]  ret_from_fork+0x10/0x20
[   32.020852] 
[   32.022329] The buggy address belongs to the object at ffff000802444000
[   32.022329]  which belongs to the cache test_cache of size 200
[   32.034744] The buggy address is located 1 bytes inside of
[   32.034744]  200-byte region [ffff000802444000, ffff0008024440c8)
[   32.046285] 
[   32.047764] The buggy address belongs to the physical page:
[   32.053322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882444
[   32.061306] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.068945] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.075888] page_type: f5(slab)
[   32.079027] raw: 0bfffe0000000040 ffff000802440140 dead000000000122 0000000000000000
[   32.086743] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.094469] head: 0bfffe0000000040 ffff000802440140 dead000000000122 0000000000000000
[   32.102280] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.110093] head: 0bfffe0000000001 fffffdffe0091101 00000000ffffffff 00000000ffffffff
[   32.117905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.125711] page dumped because: kasan: bad access detected
[   32.131266] 
[   32.132742] Memory state around the buggy address:
[   32.137525]  ffff000802443f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.144726]  ffff000802443f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.151931] >ffff000802444000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.159131]                    ^
[   32.162346]  ffff000802444080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.169551]  ffff000802444100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176754] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.549704] ==================================================================
[   31.549887] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.550017] Free of addr ffff000801dd4000 by task kunit_try_catch/256
[   31.551416] 
[   31.552904] CPU: 6 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   31.552958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.552977] Hardware name: WinLink E850-96 board (DT)
[   31.552999] Call trace:
[   31.553013]  show_stack+0x20/0x38 (C)
[   31.553049]  dump_stack_lvl+0x8c/0xd0
[   31.553081]  print_report+0x118/0x608
[   31.553113]  kasan_report_invalid_free+0xc0/0xe8
[   31.553147]  check_slab_allocation+0xd4/0x108
[   31.553177]  __kasan_slab_pre_free+0x2c/0x48
[   31.553208]  kmem_cache_free+0xf0/0x468
[   31.553239]  kmem_cache_double_free+0x190/0x3c8
[   31.553273]  kunit_try_run_case+0x170/0x3f0
[   31.553309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.553350]  kthread+0x328/0x630
[   31.553387]  ret_from_fork+0x10/0x20
[   31.553425] 
[   31.624765] Allocated by task 256:
[   31.628151]  kasan_save_stack+0x3c/0x68
[   31.631969]  kasan_save_track+0x20/0x40
[   31.635790]  kasan_save_alloc_info+0x40/0x58
[   31.640042]  __kasan_slab_alloc+0xa8/0xb0
[   31.644035]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.648635]  kmem_cache_double_free+0x12c/0x3c8
[   31.653149]  kunit_try_run_case+0x170/0x3f0
[   31.657315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.662784]  kthread+0x328/0x630
[   31.665997]  ret_from_fork+0x10/0x20
[   31.669555] 
[   31.671032] Freed by task 256:
[   31.674071]  kasan_save_stack+0x3c/0x68
[   31.677888]  kasan_save_track+0x20/0x40
[   31.681708]  kasan_save_free_info+0x4c/0x78
[   31.685874]  __kasan_slab_free+0x6c/0x98
[   31.689782]  kmem_cache_free+0x260/0x468
[   31.693687]  kmem_cache_double_free+0x140/0x3c8
[   31.698200]  kunit_try_run_case+0x170/0x3f0
[   31.702367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.707836]  kthread+0x328/0x630
[   31.711047]  ret_from_fork+0x10/0x20
[   31.714606] 
[   31.716084] The buggy address belongs to the object at ffff000801dd4000
[   31.716084]  which belongs to the cache test_cache of size 200
[   31.728498] The buggy address is located 0 bytes inside of
[   31.728498]  200-byte region [ffff000801dd4000, ffff000801dd40c8)
[   31.740040] 
[   31.741520] The buggy address belongs to the physical page:
[   31.747076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd4
[   31.755061] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.762700] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.769642] page_type: f5(slab)
[   31.772780] raw: 0bfffe0000000040 ffff000801dd2000 dead000000000122 0000000000000000
[   31.780498] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.788224] head: 0bfffe0000000040 ffff000801dd2000 dead000000000122 0000000000000000
[   31.796035] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.803848] head: 0bfffe0000000001 fffffdffe0077501 00000000ffffffff 00000000ffffffff
[   31.811661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.819466] page dumped because: kasan: bad access detected
[   31.825021] 
[   31.826497] Memory state around the buggy address:
[   31.831279]  ffff000801dd3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.838480]  ffff000801dd3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.845686] >ffff000801dd4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.852887]                    ^
[   31.856101]  ffff000801dd4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.863306]  ffff000801dd4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.870508] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.223337] ==================================================================
[   31.232914] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.239592] Read of size 1 at addr ffff0008024420c8 by task kunit_try_catch/254
[   31.246882] 
[   31.248368] CPU: 7 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   31.248425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.248442] Hardware name: WinLink E850-96 board (DT)
[   31.248462] Call trace:
[   31.248476]  show_stack+0x20/0x38 (C)
[   31.248510]  dump_stack_lvl+0x8c/0xd0
[   31.248547]  print_report+0x118/0x608
[   31.248579]  kasan_report+0xdc/0x128
[   31.248608]  __asan_report_load1_noabort+0x20/0x30
[   31.248645]  kmem_cache_oob+0x344/0x430
[   31.248679]  kunit_try_run_case+0x170/0x3f0
[   31.248714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.248754]  kthread+0x328/0x630
[   31.248787]  ret_from_fork+0x10/0x20
[   31.248823] 
[   31.310858] Allocated by task 254:
[   31.314244]  kasan_save_stack+0x3c/0x68
[   31.318061]  kasan_save_track+0x20/0x40
[   31.321881]  kasan_save_alloc_info+0x40/0x58
[   31.326134]  __kasan_slab_alloc+0xa8/0xb0
[   31.330129]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.334729]  kmem_cache_oob+0x12c/0x430
[   31.338548]  kunit_try_run_case+0x170/0x3f0
[   31.342714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.348182]  kthread+0x328/0x630
[   31.351394]  ret_from_fork+0x10/0x20
[   31.354953] 
[   31.356431] The buggy address belongs to the object at ffff000802442000
[   31.356431]  which belongs to the cache test_cache of size 200
[   31.368844] The buggy address is located 0 bytes to the right of
[   31.368844]  allocated 200-byte region [ffff000802442000, ffff0008024420c8)
[   31.381775] 
[   31.383255] The buggy address belongs to the physical page:
[   31.388812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882442
[   31.396797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.404435] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.411378] page_type: f5(slab)
[   31.414517] raw: 0bfffe0000000040 ffff000802440000 dead000000000122 0000000000000000
[   31.422233] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.429959] head: 0bfffe0000000040 ffff000802440000 dead000000000122 0000000000000000
[   31.437771] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.445584] head: 0bfffe0000000001 fffffdffe0091081 00000000ffffffff 00000000ffffffff
[   31.453395] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.461203] page dumped because: kasan: bad access detected
[   31.466756] 
[   31.468234] Memory state around the buggy address:
[   31.473012]  ffff000802441f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.480216]  ffff000802442000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.487421] >ffff000802442080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.494621]                                               ^
[   31.500180]  ffff000802442100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.507385]  ffff000802442180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.514586] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   30.876564] ==================================================================
[   30.883787] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   30.890464] Read of size 8 at addr ffff0008064fc3c0 by task kunit_try_catch/247
[   30.897755] 
[   30.899242] CPU: 5 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   30.899297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.899312] Hardware name: WinLink E850-96 board (DT)
[   30.899334] Call trace:
[   30.899348]  show_stack+0x20/0x38 (C)
[   30.899383]  dump_stack_lvl+0x8c/0xd0
[   30.899421]  print_report+0x118/0x608
[   30.899455]  kasan_report+0xdc/0x128
[   30.899483]  __asan_report_load8_noabort+0x20/0x30
[   30.899517]  workqueue_uaf+0x480/0x4a8
[   30.899549]  kunit_try_run_case+0x170/0x3f0
[   30.899588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.899627]  kthread+0x328/0x630
[   30.899662]  ret_from_fork+0x10/0x20
[   30.899699] 
[   30.961643] Allocated by task 247:
[   30.965032]  kasan_save_stack+0x3c/0x68
[   30.968848]  kasan_save_track+0x20/0x40
[   30.972667]  kasan_save_alloc_info+0x40/0x58
[   30.976920]  __kasan_kmalloc+0xd4/0xd8
[   30.980655]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.985167]  workqueue_uaf+0x13c/0x4a8
[   30.988899]  kunit_try_run_case+0x170/0x3f0
[   30.993066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.998535]  kthread+0x328/0x630
[   31.001746]  ret_from_fork+0x10/0x20
[   31.005305] 
[   31.006782] Freed by task 91:
[   31.009734]  kasan_save_stack+0x3c/0x68
[   31.013552]  kasan_save_track+0x20/0x40
[   31.017372]  kasan_save_free_info+0x4c/0x78
[   31.021538]  __kasan_slab_free+0x6c/0x98
[   31.025444]  kfree+0x214/0x3c8
[   31.028482]  workqueue_uaf_work+0x18/0x30
[   31.032476]  process_one_work+0x530/0xf98
[   31.036468]  worker_thread+0x618/0xf38
[   31.040202]  kthread+0x328/0x630
[   31.043413]  ret_from_fork+0x10/0x20
[   31.046971] 
[   31.048448] Last potentially related work creation:
[   31.053310]  kasan_save_stack+0x3c/0x68
[   31.057128]  kasan_record_aux_stack+0xb4/0xc8
[   31.061468]  __queue_work+0x65c/0x1008
[   31.065201]  queue_work_on+0xbc/0xf8
[   31.068759]  workqueue_uaf+0x210/0x4a8
[   31.072492]  kunit_try_run_case+0x170/0x3f0
[   31.076659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.082127]  kthread+0x328/0x630
[   31.085339]  ret_from_fork+0x10/0x20
[   31.088898] 
[   31.090375] The buggy address belongs to the object at ffff0008064fc3c0
[   31.090375]  which belongs to the cache kmalloc-32 of size 32
[   31.102702] The buggy address is located 0 bytes inside of
[   31.102702]  freed 32-byte region [ffff0008064fc3c0, ffff0008064fc3e0)
[   31.114679] 
[   31.116157] The buggy address belongs to the physical page:
[   31.121715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8864fc
[   31.129700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.136208] page_type: f5(slab)
[   31.139347] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   31.147063] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.154784] page dumped because: kasan: bad access detected
[   31.160339] 
[   31.161814] Memory state around the buggy address:
[   31.166594]  ffff0008064fc280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.173796]  ffff0008064fc300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.181001] >ffff0008064fc380: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   31.188202]                                            ^
[   31.193502]  ffff0008064fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.200706]  ffff0008064fc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.207908] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   30.510633] ==================================================================
[   30.510812] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   30.510940] Read of size 4 at addr ffff000806717080 by task swapper/6/0
[   30.511997] 
[   30.513484] CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   30.513535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.513551] Hardware name: WinLink E850-96 board (DT)
[   30.513573] Call trace:
[   30.513586]  show_stack+0x20/0x38 (C)
[   30.513627]  dump_stack_lvl+0x8c/0xd0
[   30.513662]  print_report+0x118/0x608
[   30.513692]  kasan_report+0xdc/0x128
[   30.513720]  __asan_report_load4_noabort+0x20/0x30
[   30.513755]  rcu_uaf_reclaim+0x64/0x70
[   30.513786]  rcu_core+0x9f4/0x1e20
[   30.513819]  rcu_core_si+0x18/0x30
[   30.513846]  handle_softirqs+0x374/0xb28
[   30.513881]  __do_softirq+0x1c/0x28
[   30.513908]  ____do_softirq+0x18/0x30
[   30.513938]  call_on_irq_stack+0x24/0x58
[   30.513969]  do_softirq_own_stack+0x24/0x38
[   30.514001]  __irq_exit_rcu+0x1fc/0x318
[   30.514031]  irq_exit_rcu+0x1c/0x80
[   30.514057]  el1_interrupt+0x38/0x58
[   30.514091]  el1h_64_irq_handler+0x18/0x28
[   30.514124]  el1h_64_irq+0x6c/0x70
[   30.514152]  arch_local_irq_enable+0x4/0x8 (P)
[   30.514184]  do_idle+0x384/0x4e8
[   30.514214]  cpu_startup_entry+0x68/0x80
[   30.514245]  secondary_start_kernel+0x288/0x340
[   30.514285]  __secondary_switched+0xc0/0xc8
[   30.514323] 
[   30.623196] Allocated by task 245:
[   30.626579]  kasan_save_stack+0x3c/0x68
[   30.630398]  kasan_save_track+0x20/0x40
[   30.634217]  kasan_save_alloc_info+0x40/0x58
[   30.638471]  __kasan_kmalloc+0xd4/0xd8
[   30.642203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.646717]  rcu_uaf+0xb0/0x2d8
[   30.649842]  kunit_try_run_case+0x170/0x3f0
[   30.654008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.659479]  kthread+0x328/0x630
[   30.662689]  ret_from_fork+0x10/0x20
[   30.666248] 
[   30.667725] Freed by task 0:
[   30.670589]  kasan_save_stack+0x3c/0x68
[   30.674408]  kasan_save_track+0x20/0x40
[   30.678227]  kasan_save_free_info+0x4c/0x78
[   30.682394]  __kasan_slab_free+0x6c/0x98
[   30.686301]  kfree+0x214/0x3c8
[   30.689338]  rcu_uaf_reclaim+0x28/0x70
[   30.693071]  rcu_core+0x9f4/0x1e20
[   30.696456]  rcu_core_si+0x18/0x30
[   30.699841]  handle_softirqs+0x374/0xb28
[   30.703748]  __do_softirq+0x1c/0x28
[   30.707220] 
[   30.708697] Last potentially related work creation:
[   30.713556]  kasan_save_stack+0x3c/0x68
[   30.717376]  kasan_record_aux_stack+0xb4/0xc8
[   30.721717]  __call_rcu_common.constprop.0+0x70/0x8b0
[   30.726751]  call_rcu+0x18/0x30
[   30.729876]  rcu_uaf+0x14c/0x2d8
[   30.733087]  kunit_try_run_case+0x170/0x3f0
[   30.737254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.742723]  kthread+0x328/0x630
[   30.745934]  ret_from_fork+0x10/0x20
[   30.749493] 
[   30.750972] The buggy address belongs to the object at ffff000806717080
[   30.750972]  which belongs to the cache kmalloc-32 of size 32
[   30.763298] The buggy address is located 0 bytes inside of
[   30.763298]  freed 32-byte region [ffff000806717080, ffff0008067170a0)
[   30.775274] 
[   30.776752] The buggy address belongs to the physical page:
[   30.782310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886717
[   30.790295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.796804] page_type: f5(slab)
[   30.799941] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   30.807659] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.815379] page dumped because: kasan: bad access detected
[   30.820933] 
[   30.822409] Memory state around the buggy address:
[   30.827189]  ffff000806716f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.834393]  ffff000806717000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.841598] >ffff000806717080: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   30.848798]                    ^
[   30.852013]  ffff000806717100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.859218]  ffff000806717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.866420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   29.788242] ==================================================================
[   29.795255] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.801587] Read of size 1 at addr ffff000800dac200 by task kunit_try_catch/243
[   29.808879] 
[   29.810365] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   29.810418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.810434] Hardware name: WinLink E850-96 board (DT)
[   29.810454] Call trace:
[   29.810465]  show_stack+0x20/0x38 (C)
[   29.810495]  dump_stack_lvl+0x8c/0xd0
[   29.810529]  print_report+0x118/0x608
[   29.810557]  kasan_report+0xdc/0x128
[   29.810585]  __asan_report_load1_noabort+0x20/0x30
[   29.810616]  ksize_uaf+0x598/0x5f8
[   29.810646]  kunit_try_run_case+0x170/0x3f0
[   29.810679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.810717]  kthread+0x328/0x630
[   29.810754]  ret_from_fork+0x10/0x20
[   29.810788] 
[   29.872421] Allocated by task 243:
[   29.875808]  kasan_save_stack+0x3c/0x68
[   29.879624]  kasan_save_track+0x20/0x40
[   29.883444]  kasan_save_alloc_info+0x40/0x58
[   29.887697]  __kasan_kmalloc+0xd4/0xd8
[   29.891430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.895943]  ksize_uaf+0xb8/0x5f8
[   29.899242]  kunit_try_run_case+0x170/0x3f0
[   29.903409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.908877]  kthread+0x328/0x630
[   29.912089]  ret_from_fork+0x10/0x20
[   29.915648] 
[   29.917124] Freed by task 243:
[   29.920163]  kasan_save_stack+0x3c/0x68
[   29.923981]  kasan_save_track+0x20/0x40
[   29.927800]  kasan_save_free_info+0x4c/0x78
[   29.931967]  __kasan_slab_free+0x6c/0x98
[   29.935873]  kfree+0x214/0x3c8
[   29.938911]  ksize_uaf+0x11c/0x5f8
[   29.942298]  kunit_try_run_case+0x170/0x3f0
[   29.946463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.951932]  kthread+0x328/0x630
[   29.955144]  ret_from_fork+0x10/0x20
[   29.958703] 
[   29.960180] The buggy address belongs to the object at ffff000800dac200
[   29.960180]  which belongs to the cache kmalloc-128 of size 128
[   29.972679] The buggy address is located 0 bytes inside of
[   29.972679]  freed 128-byte region [ffff000800dac200, ffff000800dac280)
[   29.984744] 
[   29.986224] The buggy address belongs to the physical page:
[   29.991780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.999761] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.007403] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.014346] page_type: f5(slab)
[   30.017478] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.025201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.032928] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.040739] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.048552] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   30.056364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.064170] page dumped because: kasan: bad access detected
[   30.069725] 
[   30.071201] Memory state around the buggy address:
[   30.075981]  ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.083184]  ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.090389] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.097590]                    ^
[   30.100805]  ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.108009]  ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.115211] ==================================================================
[   29.448975] ==================================================================
[   29.458801] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.465135] Read of size 1 at addr ffff000800dac200 by task kunit_try_catch/243
[   29.472425] 
[   29.473911] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   29.473968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.473983] Hardware name: WinLink E850-96 board (DT)
[   29.474007] Call trace:
[   29.474020]  show_stack+0x20/0x38 (C)
[   29.474061]  dump_stack_lvl+0x8c/0xd0
[   29.474095]  print_report+0x118/0x608
[   29.474130]  kasan_report+0xdc/0x128
[   29.474159]  __kasan_check_byte+0x54/0x70
[   29.474188]  ksize+0x30/0x88
[   29.474216]  ksize_uaf+0x168/0x5f8
[   29.474250]  kunit_try_run_case+0x170/0x3f0
[   29.474288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474330]  kthread+0x328/0x630
[   29.474364]  ret_from_fork+0x10/0x20
[   29.474399] 
[   29.538050] Allocated by task 243:
[   29.541439]  kasan_save_stack+0x3c/0x68
[   29.545254]  kasan_save_track+0x20/0x40
[   29.549074]  kasan_save_alloc_info+0x40/0x58
[   29.553327]  __kasan_kmalloc+0xd4/0xd8
[   29.557060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.561573]  ksize_uaf+0xb8/0x5f8
[   29.564872]  kunit_try_run_case+0x170/0x3f0
[   29.569039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.574507]  kthread+0x328/0x630
[   29.577719]  ret_from_fork+0x10/0x20
[   29.581278] 
[   29.582754] Freed by task 243:
[   29.585792]  kasan_save_stack+0x3c/0x68
[   29.589611]  kasan_save_track+0x20/0x40
[   29.593431]  kasan_save_free_info+0x4c/0x78
[   29.597597]  __kasan_slab_free+0x6c/0x98
[   29.601503]  kfree+0x214/0x3c8
[   29.604541]  ksize_uaf+0x11c/0x5f8
[   29.607928]  kunit_try_run_case+0x170/0x3f0
[   29.612094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.617562]  kthread+0x328/0x630
[   29.620774]  ret_from_fork+0x10/0x20
[   29.624333] 
[   29.625811] The buggy address belongs to the object at ffff000800dac200
[   29.625811]  which belongs to the cache kmalloc-128 of size 128
[   29.638311] The buggy address is located 0 bytes inside of
[   29.638311]  freed 128-byte region [ffff000800dac200, ffff000800dac280)
[   29.650374] 
[   29.651854] The buggy address belongs to the physical page:
[   29.657409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.665395] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.673034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.679976] page_type: f5(slab)
[   29.683112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.690832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.698558] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.706370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.714182] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   29.721994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.729800] page dumped because: kasan: bad access detected
[   29.735355] 
[   29.736831] Memory state around the buggy address:
[   29.741612]  ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.748814]  ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.756020] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.763220]                    ^
[   29.766435]  ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773640]  ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780842] ==================================================================
[   30.122630] ==================================================================
[   30.129625] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.135957] Read of size 1 at addr ffff000800dac278 by task kunit_try_catch/243
[   30.143249] 
[   30.144733] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   30.144787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.144802] Hardware name: WinLink E850-96 board (DT)
[   30.144820] Call trace:
[   30.144832]  show_stack+0x20/0x38 (C)
[   30.144862]  dump_stack_lvl+0x8c/0xd0
[   30.144896]  print_report+0x118/0x608
[   30.144924]  kasan_report+0xdc/0x128
[   30.144951]  __asan_report_load1_noabort+0x20/0x30
[   30.144983]  ksize_uaf+0x544/0x5f8
[   30.145016]  kunit_try_run_case+0x170/0x3f0
[   30.145049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.145087]  kthread+0x328/0x630
[   30.145120]  ret_from_fork+0x10/0x20
[   30.145152] 
[   30.206789] Allocated by task 243:
[   30.210177]  kasan_save_stack+0x3c/0x68
[   30.213994]  kasan_save_track+0x20/0x40
[   30.217814]  kasan_save_alloc_info+0x40/0x58
[   30.222067]  __kasan_kmalloc+0xd4/0xd8
[   30.225800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.230313]  ksize_uaf+0xb8/0x5f8
[   30.233612]  kunit_try_run_case+0x170/0x3f0
[   30.237779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.243247]  kthread+0x328/0x630
[   30.246459]  ret_from_fork+0x10/0x20
[   30.250018] 
[   30.251494] Freed by task 243:
[   30.254533]  kasan_save_stack+0x3c/0x68
[   30.258351]  kasan_save_track+0x20/0x40
[   30.262170]  kasan_save_free_info+0x4c/0x78
[   30.266337]  __kasan_slab_free+0x6c/0x98
[   30.270243]  kfree+0x214/0x3c8
[   30.273281]  ksize_uaf+0x11c/0x5f8
[   30.276667]  kunit_try_run_case+0x170/0x3f0
[   30.280833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.286302]  kthread+0x328/0x630
[   30.289514]  ret_from_fork+0x10/0x20
[   30.293073] 
[   30.294550] The buggy address belongs to the object at ffff000800dac200
[   30.294550]  which belongs to the cache kmalloc-128 of size 128
[   30.307049] The buggy address is located 120 bytes inside of
[   30.307049]  freed 128-byte region [ffff000800dac200, ffff000800dac280)
[   30.319288] 
[   30.320763] The buggy address belongs to the physical page:
[   30.326324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   30.334307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.341945] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.348889] page_type: f5(slab)
[   30.352023] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.359745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.367471] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.375282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.383096] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   30.390908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.398713] page dumped because: kasan: bad access detected
[   30.404268] 
[   30.405745] Memory state around the buggy address:
[   30.410525]  ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.417727]  ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.424932] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.432133]                                                                 ^
[   30.439255]  ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.446459]  ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.453661] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   28.546978] ==================================================================
[   28.556558] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   28.563938] Read of size 1 at addr ffff000802408573 by task kunit_try_catch/241
[   28.571224] 
[   28.572710] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   28.572763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.572779] Hardware name: WinLink E850-96 board (DT)
[   28.572803] Call trace:
[   28.572816]  show_stack+0x20/0x38 (C)
[   28.572854]  dump_stack_lvl+0x8c/0xd0
[   28.572892]  print_report+0x118/0x608
[   28.572920]  kasan_report+0xdc/0x128
[   28.572951]  __asan_report_load1_noabort+0x20/0x30
[   28.572986]  ksize_unpoisons_memory+0x628/0x740
[   28.573020]  kunit_try_run_case+0x170/0x3f0
[   28.573057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.573096]  kthread+0x328/0x630
[   28.573133]  ret_from_fork+0x10/0x20
[   28.573168] 
[   28.635895] Allocated by task 241:
[   28.639280]  kasan_save_stack+0x3c/0x68
[   28.643097]  kasan_save_track+0x20/0x40
[   28.646917]  kasan_save_alloc_info+0x40/0x58
[   28.651170]  __kasan_kmalloc+0xd4/0xd8
[   28.654903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.659417]  ksize_unpoisons_memory+0xc0/0x740
[   28.663844]  kunit_try_run_case+0x170/0x3f0
[   28.668010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.673480]  kthread+0x328/0x630
[   28.676691]  ret_from_fork+0x10/0x20
[   28.680250] 
[   28.681727] The buggy address belongs to the object at ffff000802408500
[   28.681727]  which belongs to the cache kmalloc-128 of size 128
[   28.694227] The buggy address is located 0 bytes to the right of
[   28.694227]  allocated 115-byte region [ffff000802408500, ffff000802408573)
[   28.707159] 
[   28.708638] The buggy address belongs to the physical page:
[   28.714195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   28.722180] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.729817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.736762] page_type: f5(slab)
[   28.739899] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.747617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.755343] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.763154] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.770967] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   28.778779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.786585] page dumped because: kasan: bad access detected
[   28.792140] 
[   28.793616] Memory state around the buggy address:
[   28.798396]  ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.805601]  ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.812803] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.820005]                                                              ^
[   28.826865]  ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.834072]  ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.841274] ==================================================================
[   29.148098] ==================================================================
[   29.155073] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.162448] Read of size 1 at addr ffff00080240857f by task kunit_try_catch/241
[   29.169739] 
[   29.171226] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   29.171276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.171291] Hardware name: WinLink E850-96 board (DT)
[   29.171312] Call trace:
[   29.171323]  show_stack+0x20/0x38 (C)
[   29.171356]  dump_stack_lvl+0x8c/0xd0
[   29.171389]  print_report+0x118/0x608
[   29.171419]  kasan_report+0xdc/0x128
[   29.171447]  __asan_report_load1_noabort+0x20/0x30
[   29.171481]  ksize_unpoisons_memory+0x690/0x740
[   29.171514]  kunit_try_run_case+0x170/0x3f0
[   29.171549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.171586]  kthread+0x328/0x630
[   29.171620]  ret_from_fork+0x10/0x20
[   29.171652] 
[   29.234408] Allocated by task 241:
[   29.237796]  kasan_save_stack+0x3c/0x68
[   29.241614]  kasan_save_track+0x20/0x40
[   29.245433]  kasan_save_alloc_info+0x40/0x58
[   29.249686]  __kasan_kmalloc+0xd4/0xd8
[   29.253418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.257932]  ksize_unpoisons_memory+0xc0/0x740
[   29.262359]  kunit_try_run_case+0x170/0x3f0
[   29.266526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.271994]  kthread+0x328/0x630
[   29.275206]  ret_from_fork+0x10/0x20
[   29.278765] 
[   29.280242] The buggy address belongs to the object at ffff000802408500
[   29.280242]  which belongs to the cache kmalloc-128 of size 128
[   29.292742] The buggy address is located 12 bytes to the right of
[   29.292742]  allocated 115-byte region [ffff000802408500, ffff000802408573)
[   29.305761] 
[   29.307239] The buggy address belongs to the physical page:
[   29.312795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   29.320779] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.328419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.335363] page_type: f5(slab)
[   29.338495] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.346219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.353945] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.361756] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.369569] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   29.377381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.385187] page dumped because: kasan: bad access detected
[   29.390743] 
[   29.392218] Memory state around the buggy address:
[   29.396999]  ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.404201]  ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.411406] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.418607]                                                                 ^
[   29.425728]  ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.432934]  ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.440135] ==================================================================
[   28.848597] ==================================================================
[   28.855688] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   28.863061] Read of size 1 at addr ffff000802408578 by task kunit_try_catch/241
[   28.870352] 
[   28.871838] CPU: 5 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   28.871889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.871905] Hardware name: WinLink E850-96 board (DT)
[   28.871924] Call trace:
[   28.871935]  show_stack+0x20/0x38 (C)
[   28.871971]  dump_stack_lvl+0x8c/0xd0
[   28.872005]  print_report+0x118/0x608
[   28.872036]  kasan_report+0xdc/0x128
[   28.872063]  __asan_report_load1_noabort+0x20/0x30
[   28.872098]  ksize_unpoisons_memory+0x618/0x740
[   28.872134]  kunit_try_run_case+0x170/0x3f0
[   28.872168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.872203]  kthread+0x328/0x630
[   28.872239]  ret_from_fork+0x10/0x20
[   28.872272] 
[   28.935020] Allocated by task 241:
[   28.938408]  kasan_save_stack+0x3c/0x68
[   28.942225]  kasan_save_track+0x20/0x40
[   28.946045]  kasan_save_alloc_info+0x40/0x58
[   28.950298]  __kasan_kmalloc+0xd4/0xd8
[   28.954030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.958544]  ksize_unpoisons_memory+0xc0/0x740
[   28.962971]  kunit_try_run_case+0x170/0x3f0
[   28.967138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.972607]  kthread+0x328/0x630
[   28.975818]  ret_from_fork+0x10/0x20
[   28.979377] 
[   28.980854] The buggy address belongs to the object at ffff000802408500
[   28.980854]  which belongs to the cache kmalloc-128 of size 128
[   28.993354] The buggy address is located 5 bytes to the right of
[   28.993354]  allocated 115-byte region [ffff000802408500, ffff000802408573)
[   29.006287] 
[   29.007766] The buggy address belongs to the physical page:
[   29.013322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   29.021307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.028944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.035888] page_type: f5(slab)
[   29.039022] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.046744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.054470] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.062282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.070095] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   29.077907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.085712] page dumped because: kasan: bad access detected
[   29.091268] 
[   29.092743] Memory state around the buggy address:
[   29.097525]  ffff000802408400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.104726]  ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.111931] >ffff000802408500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.119132]                                                                 ^
[   29.126254]  ffff000802408580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.133460]  ffff000802408600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.140660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   28.231850] ==================================================================
[   28.238854] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   28.244840] Free of addr ffff000800a7c640 by task kunit_try_catch/239
[   28.251263] 
[   28.252749] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   28.252806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.252824] Hardware name: WinLink E850-96 board (DT)
[   28.252843] Call trace:
[   28.252856]  show_stack+0x20/0x38 (C)
[   28.252886]  dump_stack_lvl+0x8c/0xd0
[   28.252920]  print_report+0x118/0x608
[   28.252949]  kasan_report_invalid_free+0xc0/0xe8
[   28.252979]  check_slab_allocation+0xd4/0x108
[   28.253011]  __kasan_slab_pre_free+0x2c/0x48
[   28.253041]  kfree+0xe8/0x3c8
[   28.253074]  kfree_sensitive+0x3c/0xb0
[   28.253102]  kmalloc_double_kzfree+0x168/0x308
[   28.253137]  kunit_try_run_case+0x170/0x3f0
[   28.253171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.253207]  kthread+0x328/0x630
[   28.253239]  ret_from_fork+0x10/0x20
[   28.253276] 
[   28.327390] Allocated by task 239:
[   28.330778]  kasan_save_stack+0x3c/0x68
[   28.334595]  kasan_save_track+0x20/0x40
[   28.338415]  kasan_save_alloc_info+0x40/0x58
[   28.342668]  __kasan_kmalloc+0xd4/0xd8
[   28.346401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.350914]  kmalloc_double_kzfree+0xb8/0x308
[   28.355255]  kunit_try_run_case+0x170/0x3f0
[   28.359421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.364890]  kthread+0x328/0x630
[   28.368102]  ret_from_fork+0x10/0x20
[   28.371661] 
[   28.373136] Freed by task 239:
[   28.376176]  kasan_save_stack+0x3c/0x68
[   28.379994]  kasan_save_track+0x20/0x40
[   28.383813]  kasan_save_free_info+0x4c/0x78
[   28.387980]  __kasan_slab_free+0x6c/0x98
[   28.391886]  kfree+0x214/0x3c8
[   28.394924]  kfree_sensitive+0x80/0xb0
[   28.398657]  kmalloc_double_kzfree+0x11c/0x308
[   28.403084]  kunit_try_run_case+0x170/0x3f0
[   28.407252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.412719]  kthread+0x328/0x630
[   28.415931]  ret_from_fork+0x10/0x20
[   28.419490] 
[   28.420965] The buggy address belongs to the object at ffff000800a7c640
[   28.420965]  which belongs to the cache kmalloc-16 of size 16
[   28.433293] The buggy address is located 0 bytes inside of
[   28.433293]  16-byte region [ffff000800a7c640, ffff000800a7c650)
[   28.444750] 
[   28.446229] The buggy address belongs to the physical page:
[   28.451784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880a7c
[   28.459770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.466279] page_type: f5(slab)
[   28.469411] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   28.477135] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.484853] page dumped because: kasan: bad access detected
[   28.490409] 
[   28.491884] Memory state around the buggy address:
[   28.496664]  ffff000800a7c500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.503867]  ffff000800a7c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.511072] >ffff000800a7c600: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   28.518273]                                            ^
[   28.523571]  ffff000800a7c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.530776]  ffff000800a7c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.537978] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   27.917363] ==================================================================
[   27.931136] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   27.938508] Read of size 1 at addr ffff000800a7c640 by task kunit_try_catch/239
[   27.945799] 
[   27.947286] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   27.947342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.947358] Hardware name: WinLink E850-96 board (DT)
[   27.947380] Call trace:
[   27.947395]  show_stack+0x20/0x38 (C)
[   27.947426]  dump_stack_lvl+0x8c/0xd0
[   27.947463]  print_report+0x118/0x608
[   27.947493]  kasan_report+0xdc/0x128
[   27.947523]  __kasan_check_byte+0x54/0x70
[   27.947553]  kfree_sensitive+0x30/0xb0
[   27.947585]  kmalloc_double_kzfree+0x168/0x308
[   27.947619]  kunit_try_run_case+0x170/0x3f0
[   27.947655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.947692]  kthread+0x328/0x630
[   27.947728]  ret_from_fork+0x10/0x20
[   27.947763] 
[   28.013333] Allocated by task 239:
[   28.016720]  kasan_save_stack+0x3c/0x68
[   28.020538]  kasan_save_track+0x20/0x40
[   28.024357]  kasan_save_alloc_info+0x40/0x58
[   28.028610]  __kasan_kmalloc+0xd4/0xd8
[   28.032343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.036857]  kmalloc_double_kzfree+0xb8/0x308
[   28.041197]  kunit_try_run_case+0x170/0x3f0
[   28.045364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.050832]  kthread+0x328/0x630
[   28.054044]  ret_from_fork+0x10/0x20
[   28.057603] 
[   28.059080] Freed by task 239:
[   28.062118]  kasan_save_stack+0x3c/0x68
[   28.065936]  kasan_save_track+0x20/0x40
[   28.069755]  kasan_save_free_info+0x4c/0x78
[   28.073922]  __kasan_slab_free+0x6c/0x98
[   28.077828]  kfree+0x214/0x3c8
[   28.080866]  kfree_sensitive+0x80/0xb0
[   28.084599]  kmalloc_double_kzfree+0x11c/0x308
[   28.089026]  kunit_try_run_case+0x170/0x3f0
[   28.093194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.098661]  kthread+0x328/0x630
[   28.101873]  ret_from_fork+0x10/0x20
[   28.105432] 
[   28.106909] The buggy address belongs to the object at ffff000800a7c640
[   28.106909]  which belongs to the cache kmalloc-16 of size 16
[   28.119236] The buggy address is located 0 bytes inside of
[   28.119236]  freed 16-byte region [ffff000800a7c640, ffff000800a7c650)
[   28.131213] 
[   28.132693] The buggy address belongs to the physical page:
[   28.138249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880a7c
[   28.146234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.152742] page_type: f5(slab)
[   28.155881] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   28.163597] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.171316] page dumped because: kasan: bad access detected
[   28.176872] 
[   28.178348] Memory state around the buggy address:
[   28.183127]  ffff000800a7c500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.190330]  ffff000800a7c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.197536] >ffff000800a7c600: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   28.204736]                                            ^
[   28.210035]  ffff000800a7c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.217239]  ffff000800a7c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.224442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   19.736288] ==================================================================
[   19.750528] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   19.756861] Read of size 1 at addr ffff0008065f0000 by task kunit_try_catch/201
[   19.764151] 
[   19.765636] CPU: 5 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   19.765689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.765706] Hardware name: WinLink E850-96 board (DT)
[   19.765728] Call trace:
[   19.765742]  show_stack+0x20/0x38 (C)
[   19.765779]  dump_stack_lvl+0x8c/0xd0
[   19.765813]  print_report+0x118/0x608
[   19.765843]  kasan_report+0xdc/0x128
[   19.765875]  __asan_report_load1_noabort+0x20/0x30
[   19.765908]  page_alloc_uaf+0x328/0x350
[   19.765944]  kunit_try_run_case+0x170/0x3f0
[   19.765980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.766021]  kthread+0x328/0x630
[   19.766057]  ret_from_fork+0x10/0x20
[   19.766090] 
[   19.828128] The buggy address belongs to the physical page:
[   19.833686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8865f0
[   19.841671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.848178] page_type: f0(buddy)
[   19.851403] raw: 0bfffe0000000000 ffff00087f61bbe0 ffff00087f61bbe0 0000000000000000
[   19.859123] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   19.866841] page dumped because: kasan: bad access detected
[   19.872396] 
[   19.873871] Memory state around the buggy address:
[   19.878652]  ffff0008065eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.885854]  ffff0008065eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.893059] >ffff0008065f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.900260]                    ^
[   19.903475]  ffff0008065f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.910680]  ffff0008065f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.917883] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   27.613942] ==================================================================
[   27.623330] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   27.629921] Read of size 1 at addr ffff000800d61628 by task kunit_try_catch/235
[   27.637210] 
[   27.638698] CPU: 7 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   27.638753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.638770] Hardware name: WinLink E850-96 board (DT)
[   27.638792] Call trace:
[   27.638806]  show_stack+0x20/0x38 (C)
[   27.638841]  dump_stack_lvl+0x8c/0xd0
[   27.638876]  print_report+0x118/0x608
[   27.638908]  kasan_report+0xdc/0x128
[   27.638935]  __asan_report_load1_noabort+0x20/0x30
[   27.638971]  kmalloc_uaf2+0x3f4/0x468
[   27.639002]  kunit_try_run_case+0x170/0x3f0
[   27.639039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.639080]  kthread+0x328/0x630
[   27.639115]  ret_from_fork+0x10/0x20
[   27.639151] 
[   27.701013] Allocated by task 235:
[   27.704398]  kasan_save_stack+0x3c/0x68
[   27.708216]  kasan_save_track+0x20/0x40
[   27.712035]  kasan_save_alloc_info+0x40/0x58
[   27.716289]  __kasan_kmalloc+0xd4/0xd8
[   27.720023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.724535]  kmalloc_uaf2+0xc4/0x468
[   27.728096]  kunit_try_run_case+0x170/0x3f0
[   27.732260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.737729]  kthread+0x328/0x630
[   27.740941]  ret_from_fork+0x10/0x20
[   27.744500] 
[   27.745977] Freed by task 235:
[   27.749015]  kasan_save_stack+0x3c/0x68
[   27.752833]  kasan_save_track+0x20/0x40
[   27.756653]  kasan_save_free_info+0x4c/0x78
[   27.760819]  __kasan_slab_free+0x6c/0x98
[   27.764726]  kfree+0x214/0x3c8
[   27.767764]  kmalloc_uaf2+0x134/0x468
[   27.771409]  kunit_try_run_case+0x170/0x3f0
[   27.775576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.781045]  kthread+0x328/0x630
[   27.784256]  ret_from_fork+0x10/0x20
[   27.787815] 
[   27.789293] The buggy address belongs to the object at ffff000800d61600
[   27.789293]  which belongs to the cache kmalloc-64 of size 64
[   27.801619] The buggy address is located 40 bytes inside of
[   27.801619]  freed 64-byte region [ffff000800d61600, ffff000800d61640)
[   27.813683] 
[   27.815162] The buggy address belongs to the physical page:
[   27.820719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   27.828704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.835212] page_type: f5(slab)
[   27.838350] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   27.846068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.853788] page dumped because: kasan: bad access detected
[   27.859342] 
[   27.860818] Memory state around the buggy address:
[   27.865598]  ffff000800d61500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.872801]  ffff000800d61580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.880006] >ffff000800d61600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.887207]                                   ^
[   27.891723]  ffff000800d61680: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   27.898928]  ffff000800d61700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.906131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   27.309667] ==================================================================
[   27.318471] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   27.325584] Write of size 33 at addr ffff000800c2d200 by task kunit_try_catch/233
[   27.333048] 
[   27.334534] CPU: 5 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   27.334589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.334605] Hardware name: WinLink E850-96 board (DT)
[   27.334626] Call trace:
[   27.334639]  show_stack+0x20/0x38 (C)
[   27.334672]  dump_stack_lvl+0x8c/0xd0
[   27.334706]  print_report+0x118/0x608
[   27.334737]  kasan_report+0xdc/0x128
[   27.334764]  kasan_check_range+0x100/0x1a8
[   27.334797]  __asan_memset+0x34/0x78
[   27.334827]  kmalloc_uaf_memset+0x170/0x310
[   27.334859]  kunit_try_run_case+0x170/0x3f0
[   27.334895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.334935]  kthread+0x328/0x630
[   27.334969]  ret_from_fork+0x10/0x20
[   27.335005] 
[   27.400236] Allocated by task 233:
[   27.403622]  kasan_save_stack+0x3c/0x68
[   27.407439]  kasan_save_track+0x20/0x40
[   27.411260]  kasan_save_alloc_info+0x40/0x58
[   27.415512]  __kasan_kmalloc+0xd4/0xd8
[   27.419245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.423758]  kmalloc_uaf_memset+0xb8/0x310
[   27.427838]  kunit_try_run_case+0x170/0x3f0
[   27.432005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.437473]  kthread+0x328/0x630
[   27.440685]  ret_from_fork+0x10/0x20
[   27.444244] 
[   27.445721] Freed by task 233:
[   27.448761]  kasan_save_stack+0x3c/0x68
[   27.452577]  kasan_save_track+0x20/0x40
[   27.456397]  kasan_save_free_info+0x4c/0x78
[   27.460563]  __kasan_slab_free+0x6c/0x98
[   27.464471]  kfree+0x214/0x3c8
[   27.467508]  kmalloc_uaf_memset+0x11c/0x310
[   27.471674]  kunit_try_run_case+0x170/0x3f0
[   27.475841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.481310]  kthread+0x328/0x630
[   27.484521]  ret_from_fork+0x10/0x20
[   27.488080] 
[   27.489559] The buggy address belongs to the object at ffff000800c2d200
[   27.489559]  which belongs to the cache kmalloc-64 of size 64
[   27.501885] The buggy address is located 0 bytes inside of
[   27.501885]  freed 64-byte region [ffff000800c2d200, ffff000800c2d240)
[   27.513861] 
[   27.515341] The buggy address belongs to the physical page:
[   27.520896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   27.528882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.535390] page_type: f5(slab)
[   27.538529] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   27.546246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.553965] page dumped because: kasan: bad access detected
[   27.559520] 
[   27.560997] Memory state around the buggy address:
[   27.565776]  ffff000800c2d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.572978]  ffff000800c2d180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.580184] >ffff000800c2d200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.587384]                    ^
[   27.590600]  ffff000800c2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597804]  ffff000800c2d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.605007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   27.007228] ==================================================================
[   27.017346] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   27.023851] Read of size 1 at addr ffff0008037171c8 by task kunit_try_catch/231
[   27.031143] 
[   27.032630] CPU: 4 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   27.032684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.032699] Hardware name: WinLink E850-96 board (DT)
[   27.032726] Call trace:
[   27.032737]  show_stack+0x20/0x38 (C)
[   27.032771]  dump_stack_lvl+0x8c/0xd0
[   27.032803]  print_report+0x118/0x608
[   27.032833]  kasan_report+0xdc/0x128
[   27.032862]  __asan_report_load1_noabort+0x20/0x30
[   27.032896]  kmalloc_uaf+0x300/0x338
[   27.032927]  kunit_try_run_case+0x170/0x3f0
[   27.032965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.033006]  kthread+0x328/0x630
[   27.033038]  ret_from_fork+0x10/0x20
[   27.033072] 
[   27.094858] Allocated by task 231:
[   27.098245]  kasan_save_stack+0x3c/0x68
[   27.102062]  kasan_save_track+0x20/0x40
[   27.105881]  kasan_save_alloc_info+0x40/0x58
[   27.110135]  __kasan_kmalloc+0xd4/0xd8
[   27.113867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.118381]  kmalloc_uaf+0xb8/0x338
[   27.121854]  kunit_try_run_case+0x170/0x3f0
[   27.126020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.131488]  kthread+0x328/0x630
[   27.134699]  ret_from_fork+0x10/0x20
[   27.138259] 
[   27.139736] Freed by task 231:
[   27.142774]  kasan_save_stack+0x3c/0x68
[   27.146591]  kasan_save_track+0x20/0x40
[   27.150412]  kasan_save_free_info+0x4c/0x78
[   27.154578]  __kasan_slab_free+0x6c/0x98
[   27.158484]  kfree+0x214/0x3c8
[   27.161523]  kmalloc_uaf+0x11c/0x338
[   27.165081]  kunit_try_run_case+0x170/0x3f0
[   27.169248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.174717]  kthread+0x328/0x630
[   27.177929]  ret_from_fork+0x10/0x20
[   27.181488] 
[   27.182965] The buggy address belongs to the object at ffff0008037171c0
[   27.182965]  which belongs to the cache kmalloc-16 of size 16
[   27.195291] The buggy address is located 8 bytes inside of
[   27.195291]  freed 16-byte region [ffff0008037171c0, ffff0008037171d0)
[   27.207268] 
[   27.208748] The buggy address belongs to the physical page:
[   27.214304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   27.222289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.228798] page_type: f5(slab)
[   27.231936] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   27.239653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.247372] page dumped because: kasan: bad access detected
[   27.252927] 
[   27.254403] Memory state around the buggy address:
[   27.259182]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   27.266386]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   27.273590] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc fc fc fc fc
[   27.280792]                                               ^
[   27.286352]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.293555]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.300758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   26.740219] ==================================================================
[   26.750510] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.758404] Read of size 64 at addr ffff000800c2d184 by task kunit_try_catch/229
[   26.765784] 
[   26.767270] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   26.767329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.767344] Hardware name: WinLink E850-96 board (DT)
[   26.767365] Call trace:
[   26.767378]  show_stack+0x20/0x38 (C)
[   26.767411]  dump_stack_lvl+0x8c/0xd0
[   26.767444]  print_report+0x118/0x608
[   26.767475]  kasan_report+0xdc/0x128
[   26.767502]  kasan_check_range+0x100/0x1a8
[   26.767536]  __asan_memmove+0x3c/0x98
[   26.767566]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.767603]  kunit_try_run_case+0x170/0x3f0
[   26.767639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.767678]  kthread+0x328/0x630
[   26.767710]  ret_from_fork+0x10/0x20
[   26.767745] 
[   26.833925] Allocated by task 229:
[   26.837311]  kasan_save_stack+0x3c/0x68
[   26.841128]  kasan_save_track+0x20/0x40
[   26.844949]  kasan_save_alloc_info+0x40/0x58
[   26.849201]  __kasan_kmalloc+0xd4/0xd8
[   26.852934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.857448]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   26.862395]  kunit_try_run_case+0x170/0x3f0
[   26.866562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.872030]  kthread+0x328/0x630
[   26.875242]  ret_from_fork+0x10/0x20
[   26.878801] 
[   26.880280] The buggy address belongs to the object at ffff000800c2d180
[   26.880280]  which belongs to the cache kmalloc-64 of size 64
[   26.892606] The buggy address is located 4 bytes inside of
[   26.892606]  allocated 64-byte region [ffff000800c2d180, ffff000800c2d1c0)
[   26.904929] 
[   26.906407] The buggy address belongs to the physical page:
[   26.911965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   26.919950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.926459] page_type: f5(slab)
[   26.929596] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   26.937314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.945034] page dumped because: kasan: bad access detected
[   26.950587] 
[   26.952064] Memory state around the buggy address:
[   26.956846]  ffff000800c2d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.964046]  ffff000800c2d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.971253] >ffff000800c2d180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.978452]                                            ^
[   26.983753]  ffff000800c2d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.990956]  ffff000800c2d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.998158] ==================================================================
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   26.475302] ==================================================================
[   26.485148] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   26.492698] Read of size 18446744073709551614 at addr ffff000800cab184 by task kunit_try_catch/227
[   26.501637] 
[   26.503124] CPU: 6 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   26.503175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.503189] Hardware name: WinLink E850-96 board (DT)
[   26.503212] Call trace:
[   26.503230]  show_stack+0x20/0x38 (C)
[   26.503265]  dump_stack_lvl+0x8c/0xd0
[   26.503300]  print_report+0x118/0x608
[   26.503333]  kasan_report+0xdc/0x128
[   26.503364]  kasan_check_range+0x100/0x1a8
[   26.503398]  __asan_memmove+0x3c/0x98
[   26.503430]  kmalloc_memmove_negative_size+0x154/0x2e0
[   26.503471]  kunit_try_run_case+0x170/0x3f0
[   26.503509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.503547]  kthread+0x328/0x630
[   26.503583]  ret_from_fork+0x10/0x20
[   26.503621] 
[   26.569866] Allocated by task 227:
[   26.573252]  kasan_save_stack+0x3c/0x68
[   26.577070]  kasan_save_track+0x20/0x40
[   26.580889]  kasan_save_alloc_info+0x40/0x58
[   26.585143]  __kasan_kmalloc+0xd4/0xd8
[   26.588875]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.593389]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   26.598425]  kunit_try_run_case+0x170/0x3f0
[   26.602589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.608059]  kthread+0x328/0x630
[   26.611271]  ret_from_fork+0x10/0x20
[   26.614829] 
[   26.616308] The buggy address belongs to the object at ffff000800cab180
[   26.616308]  which belongs to the cache kmalloc-64 of size 64
[   26.628635] The buggy address is located 4 bytes inside of
[   26.628635]  64-byte region [ffff000800cab180, ffff000800cab1c0)
[   26.640089] 
[   26.641569] The buggy address belongs to the physical page:
[   26.647125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab
[   26.655110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.661618] page_type: f5(slab)
[   26.664755] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   26.672474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.680193] page dumped because: kasan: bad access detected
[   26.685748] 
[   26.687224] Memory state around the buggy address:
[   26.692006]  ffff000800cab080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.699207]  ffff000800cab100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.706412] >ffff000800cab180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.713613]                    ^
[   26.716829]  ffff000800cab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.724032]  ffff000800cab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731234] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   26.169575] ==================================================================
[   26.179164] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   26.186451] Write of size 16 at addr ffff000802408469 by task kunit_try_catch/225
[   26.193916] 
[   26.195402] CPU: 5 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   26.195456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.195471] Hardware name: WinLink E850-96 board (DT)
[   26.195491] Call trace:
[   26.195506]  show_stack+0x20/0x38 (C)
[   26.195543]  dump_stack_lvl+0x8c/0xd0
[   26.195579]  print_report+0x118/0x608
[   26.195607]  kasan_report+0xdc/0x128
[   26.195634]  kasan_check_range+0x100/0x1a8
[   26.195669]  __asan_memset+0x34/0x78
[   26.195698]  kmalloc_oob_memset_16+0x150/0x2f8
[   26.195730]  kunit_try_run_case+0x170/0x3f0
[   26.195764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.195801]  kthread+0x328/0x630
[   26.195834]  ret_from_fork+0x10/0x20
[   26.195869] 
[   26.261364] Allocated by task 225:
[   26.264750]  kasan_save_stack+0x3c/0x68
[   26.268567]  kasan_save_track+0x20/0x40
[   26.272388]  kasan_save_alloc_info+0x40/0x58
[   26.276640]  __kasan_kmalloc+0xd4/0xd8
[   26.280373]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.284887]  kmalloc_oob_memset_16+0xb0/0x2f8
[   26.289227]  kunit_try_run_case+0x170/0x3f0
[   26.293394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.298862]  kthread+0x328/0x630
[   26.302074]  ret_from_fork+0x10/0x20
[   26.305633] 
[   26.307110] The buggy address belongs to the object at ffff000802408400
[   26.307110]  which belongs to the cache kmalloc-128 of size 128
[   26.319610] The buggy address is located 105 bytes inside of
[   26.319610]  allocated 120-byte region [ffff000802408400, ffff000802408478)
[   26.332195] 
[   26.333674] The buggy address belongs to the physical page:
[   26.339231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   26.347215] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.354854] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.361796] page_type: f5(slab)
[   26.364934] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.372652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.380378] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.388190] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.396003] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   26.403815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.411620] page dumped because: kasan: bad access detected
[   26.417176] 
[   26.418652] Memory state around the buggy address:
[   26.423433]  ffff000802408300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.430634]  ffff000802408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.437840] >ffff000802408400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.445041]                                                                 ^
[   26.452162]  ffff000802408480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.459366]  ffff000802408500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.466569] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   25.864148] ==================================================================
[   25.873613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   25.880815] Write of size 8 at addr ffff000801dd0171 by task kunit_try_catch/223
[   25.888191] 
[   25.889679] CPU: 6 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   25.889734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.889747] Hardware name: WinLink E850-96 board (DT)
[   25.889767] Call trace:
[   25.889780]  show_stack+0x20/0x38 (C)
[   25.889816]  dump_stack_lvl+0x8c/0xd0
[   25.889853]  print_report+0x118/0x608
[   25.889886]  kasan_report+0xdc/0x128
[   25.889914]  kasan_check_range+0x100/0x1a8
[   25.889946]  __asan_memset+0x34/0x78
[   25.889976]  kmalloc_oob_memset_8+0x150/0x2f8
[   25.890008]  kunit_try_run_case+0x170/0x3f0
[   25.890045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.890084]  kthread+0x328/0x630
[   25.890116]  ret_from_fork+0x10/0x20
[   25.890152] 
[   25.955553] Allocated by task 223:
[   25.958938]  kasan_save_stack+0x3c/0x68
[   25.962756]  kasan_save_track+0x20/0x40
[   25.966575]  kasan_save_alloc_info+0x40/0x58
[   25.970829]  __kasan_kmalloc+0xd4/0xd8
[   25.974561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.979075]  kmalloc_oob_memset_8+0xb0/0x2f8
[   25.983330]  kunit_try_run_case+0x170/0x3f0
[   25.987495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.992964]  kthread+0x328/0x630
[   25.996176]  ret_from_fork+0x10/0x20
[   25.999734] 
[   26.001213] The buggy address belongs to the object at ffff000801dd0100
[   26.001213]  which belongs to the cache kmalloc-128 of size 128
[   26.013712] The buggy address is located 113 bytes inside of
[   26.013712]  allocated 120-byte region [ffff000801dd0100, ffff000801dd0178)
[   26.026296] 
[   26.027775] The buggy address belongs to the physical page:
[   26.033333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0
[   26.041318] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.048955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.055899] page_type: f5(slab)
[   26.059036] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.066754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.074480] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.082292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.090105] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff
[   26.097917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.105722] page dumped because: kasan: bad access detected
[   26.111278] 
[   26.112755] Memory state around the buggy address:
[   26.117533]  ffff000801dd0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.124736]  ffff000801dd0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.131942] >ffff000801dd0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.139142]                                                                 ^
[   26.146263]  ffff000801dd0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.153470]  ffff000801dd0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.160671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   25.558510] ==================================================================
[   25.568065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.575266] Write of size 4 at addr ffff000802408375 by task kunit_try_catch/221
[   25.582639] 
[   25.584127] CPU: 5 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   25.584183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.584199] Hardware name: WinLink E850-96 board (DT)
[   25.584221] Call trace:
[   25.584234]  show_stack+0x20/0x38 (C)
[   25.584268]  dump_stack_lvl+0x8c/0xd0
[   25.584302]  print_report+0x118/0x608
[   25.584331]  kasan_report+0xdc/0x128
[   25.584356]  kasan_check_range+0x100/0x1a8
[   25.584386]  __asan_memset+0x34/0x78
[   25.584415]  kmalloc_oob_memset_4+0x150/0x300
[   25.584451]  kunit_try_run_case+0x170/0x3f0
[   25.584486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.584523]  kthread+0x328/0x630
[   25.584556]  ret_from_fork+0x10/0x20
[   25.584590] 
[   25.650001] Allocated by task 221:
[   25.653388]  kasan_save_stack+0x3c/0x68
[   25.657205]  kasan_save_track+0x20/0x40
[   25.661026]  kasan_save_alloc_info+0x40/0x58
[   25.665278]  __kasan_kmalloc+0xd4/0xd8
[   25.669010]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.673524]  kmalloc_oob_memset_4+0xb0/0x300
[   25.677778]  kunit_try_run_case+0x170/0x3f0
[   25.681944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.687413]  kthread+0x328/0x630
[   25.690625]  ret_from_fork+0x10/0x20
[   25.694183] 
[   25.695661] The buggy address belongs to the object at ffff000802408300
[   25.695661]  which belongs to the cache kmalloc-128 of size 128
[   25.708161] The buggy address is located 117 bytes inside of
[   25.708161]  allocated 120-byte region [ffff000802408300, ffff000802408378)
[   25.720745] 
[   25.722224] The buggy address belongs to the physical page:
[   25.727782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   25.735766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.743405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.750348] page_type: f5(slab)
[   25.753483] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.761203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.768929] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.776741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.784555] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   25.792366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.800171] page dumped because: kasan: bad access detected
[   25.805728] 
[   25.807202] Memory state around the buggy address:
[   25.811984]  ffff000802408200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.819185]  ffff000802408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.826390] >ffff000802408300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.833591]                                                                 ^
[   25.840713]  ffff000802408380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.847919]  ffff000802408400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855120] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   25.252973] ==================================================================
[   25.262512] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   25.269713] Write of size 2 at addr ffff000801dd0077 by task kunit_try_catch/219
[   25.277089] 
[   25.278576] CPU: 6 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   25.278621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.278635] Hardware name: WinLink E850-96 board (DT)
[   25.278652] Call trace:
[   25.278666]  show_stack+0x20/0x38 (C)
[   25.278698]  dump_stack_lvl+0x8c/0xd0
[   25.278731]  print_report+0x118/0x608
[   25.278761]  kasan_report+0xdc/0x128
[   25.278786]  kasan_check_range+0x100/0x1a8
[   25.278815]  __asan_memset+0x34/0x78
[   25.278843]  kmalloc_oob_memset_2+0x150/0x2f8
[   25.278877]  kunit_try_run_case+0x170/0x3f0
[   25.278914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.278952]  kthread+0x328/0x630
[   25.278988]  ret_from_fork+0x10/0x20
[   25.279023] 
[   25.344451] Allocated by task 219:
[   25.347837]  kasan_save_stack+0x3c/0x68
[   25.351654]  kasan_save_track+0x20/0x40
[   25.355474]  kasan_save_alloc_info+0x40/0x58
[   25.359727]  __kasan_kmalloc+0xd4/0xd8
[   25.363459]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.367974]  kmalloc_oob_memset_2+0xb0/0x2f8
[   25.372228]  kunit_try_run_case+0x170/0x3f0
[   25.376395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.381862]  kthread+0x328/0x630
[   25.385074]  ret_from_fork+0x10/0x20
[   25.388632] 
[   25.390110] The buggy address belongs to the object at ffff000801dd0000
[   25.390110]  which belongs to the cache kmalloc-128 of size 128
[   25.402610] The buggy address is located 119 bytes inside of
[   25.402610]  allocated 120-byte region [ffff000801dd0000, ffff000801dd0078)
[   25.415195] 
[   25.416673] The buggy address belongs to the physical page:
[   25.422231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881dd0
[   25.430215] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.437854] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.444797] page_type: f5(slab)
[   25.447933] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.455652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.463378] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.471190] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.479003] head: 0bfffe0000000001 fffffdffe0077401 00000000ffffffff 00000000ffffffff
[   25.486815] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.494620] page dumped because: kasan: bad access detected
[   25.500176] 
[   25.501652] Memory state around the buggy address:
[   25.506433]  ffff000801dcff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.513634]  ffff000801dcff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.520841] >ffff000801dd0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.528040]                                                                 ^
[   25.535162]  ffff000801dd0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.542366]  ffff000801dd0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.549569] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   24.947449] ==================================================================
[   24.956613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   24.963903] Write of size 128 at addr ffff000802408200 by task kunit_try_catch/217
[   24.971451] 
[   24.972938] CPU: 5 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   24.972992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.973007] Hardware name: WinLink E850-96 board (DT)
[   24.973029] Call trace:
[   24.973041]  show_stack+0x20/0x38 (C)
[   24.973072]  dump_stack_lvl+0x8c/0xd0
[   24.973106]  print_report+0x118/0x608
[   24.973135]  kasan_report+0xdc/0x128
[   24.973164]  kasan_check_range+0x100/0x1a8
[   24.973196]  __asan_memset+0x34/0x78
[   24.973227]  kmalloc_oob_in_memset+0x144/0x2d0
[   24.973259]  kunit_try_run_case+0x170/0x3f0
[   24.973294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.973334]  kthread+0x328/0x630
[   24.973368]  ret_from_fork+0x10/0x20
[   24.973402] 
[   25.038899] Allocated by task 217:
[   25.042287]  kasan_save_stack+0x3c/0x68
[   25.046103]  kasan_save_track+0x20/0x40
[   25.049924]  kasan_save_alloc_info+0x40/0x58
[   25.054176]  __kasan_kmalloc+0xd4/0xd8
[   25.057908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.062422]  kmalloc_oob_in_memset+0xb0/0x2d0
[   25.066762]  kunit_try_run_case+0x170/0x3f0
[   25.070929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.076397]  kthread+0x328/0x630
[   25.079609]  ret_from_fork+0x10/0x20
[   25.083168] 
[   25.084646] The buggy address belongs to the object at ffff000802408200
[   25.084646]  which belongs to the cache kmalloc-128 of size 128
[   25.097146] The buggy address is located 0 bytes inside of
[   25.097146]  allocated 120-byte region [ffff000802408200, ffff000802408278)
[   25.109557] 
[   25.111035] The buggy address belongs to the physical page:
[   25.116594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   25.124578] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.132216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.139158] page_type: f5(slab)
[   25.142296] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.150014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.157741] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.165552] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.173365] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   25.181177] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.188983] page dumped because: kasan: bad access detected
[   25.194538] 
[   25.196014] Memory state around the buggy address:
[   25.200793]  ffff000802408100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.207997]  ffff000802408180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.215203] >ffff000802408200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.222402]                                                                 ^
[   25.229524]  ffff000802408280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.236728]  ffff000802408300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.243931] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   24.644129] ==================================================================
[   24.653145] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   24.659912] Read of size 16 at addr ffff000800cac060 by task kunit_try_catch/215
[   24.667290] 
[   24.668779] CPU: 6 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   24.668831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.668847] Hardware name: WinLink E850-96 board (DT)
[   24.668866] Call trace:
[   24.668879]  show_stack+0x20/0x38 (C)
[   24.668911]  dump_stack_lvl+0x8c/0xd0
[   24.668945]  print_report+0x118/0x608
[   24.668976]  kasan_report+0xdc/0x128
[   24.669001]  __asan_report_load16_noabort+0x20/0x30
[   24.669035]  kmalloc_uaf_16+0x3bc/0x438
[   24.669066]  kunit_try_run_case+0x170/0x3f0
[   24.669102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.669144]  kthread+0x328/0x630
[   24.669179]  ret_from_fork+0x10/0x20
[   24.669214] 
[   24.731352] Allocated by task 215:
[   24.734737]  kasan_save_stack+0x3c/0x68
[   24.738555]  kasan_save_track+0x20/0x40
[   24.742375]  kasan_save_alloc_info+0x40/0x58
[   24.746628]  __kasan_kmalloc+0xd4/0xd8
[   24.750361]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.754875]  kmalloc_uaf_16+0x140/0x438
[   24.758694]  kunit_try_run_case+0x170/0x3f0
[   24.762861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.768329]  kthread+0x328/0x630
[   24.771541]  ret_from_fork+0x10/0x20
[   24.775100] 
[   24.776577] Freed by task 215:
[   24.779614]  kasan_save_stack+0x3c/0x68
[   24.783433]  kasan_save_track+0x20/0x40
[   24.787253]  kasan_save_free_info+0x4c/0x78
[   24.791419]  __kasan_slab_free+0x6c/0x98
[   24.795325]  kfree+0x214/0x3c8
[   24.798363]  kmalloc_uaf_16+0x190/0x438
[   24.802184]  kunit_try_run_case+0x170/0x3f0
[   24.806349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.811818]  kthread+0x328/0x630
[   24.815030]  ret_from_fork+0x10/0x20
[   24.818588] 
[   24.820067] The buggy address belongs to the object at ffff000800cac060
[   24.820067]  which belongs to the cache kmalloc-16 of size 16
[   24.832393] The buggy address is located 0 bytes inside of
[   24.832393]  freed 16-byte region [ffff000800cac060, ffff000800cac070)
[   24.844370] 
[   24.845850] The buggy address belongs to the physical page:
[   24.851406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cac
[   24.859391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.865899] page_type: f5(slab)
[   24.869035] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   24.876754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.884473] page dumped because: kasan: bad access detected
[   24.890029] 
[   24.891504] Memory state around the buggy address:
[   24.896287]  ffff000800cabf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.903487]  ffff000800cabf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.910694] >ffff000800cac000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fa fb fc fc
[   24.917893]                                                        ^
[   24.924234]  ffff000800cac080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.931438]  ffff000800cac100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.938641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   24.385729] ==================================================================
[   24.394641] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   24.401321] Write of size 16 at addr ffff000800c2e0a0 by task kunit_try_catch/213
[   24.408786] 
[   24.410272] CPU: 5 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   24.410329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.410345] Hardware name: WinLink E850-96 board (DT)
[   24.410366] Call trace:
[   24.410380]  show_stack+0x20/0x38 (C)
[   24.410415]  dump_stack_lvl+0x8c/0xd0
[   24.410448]  print_report+0x118/0x608
[   24.410480]  kasan_report+0xdc/0x128
[   24.410507]  __asan_report_store16_noabort+0x20/0x30
[   24.410541]  kmalloc_oob_16+0x3a0/0x3f8
[   24.410572]  kunit_try_run_case+0x170/0x3f0
[   24.410607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.410646]  kthread+0x328/0x630
[   24.410677]  ret_from_fork+0x10/0x20
[   24.410711] 
[   24.472935] Allocated by task 213:
[   24.476322]  kasan_save_stack+0x3c/0x68
[   24.480139]  kasan_save_track+0x20/0x40
[   24.483960]  kasan_save_alloc_info+0x40/0x58
[   24.488212]  __kasan_kmalloc+0xd4/0xd8
[   24.491945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.496459]  kmalloc_oob_16+0xb4/0x3f8
[   24.500191]  kunit_try_run_case+0x170/0x3f0
[   24.504358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.509827]  kthread+0x328/0x630
[   24.513038]  ret_from_fork+0x10/0x20
[   24.516597] 
[   24.518076] The buggy address belongs to the object at ffff000800c2e0a0
[   24.518076]  which belongs to the cache kmalloc-16 of size 16
[   24.530401] The buggy address is located 0 bytes inside of
[   24.530401]  allocated 13-byte region [ffff000800c2e0a0, ffff000800c2e0ad)
[   24.542725] 
[   24.544204] The buggy address belongs to the physical page:
[   24.549760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   24.557745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.564255] page_type: f5(slab)
[   24.567393] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   24.575110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.582830] page dumped because: kasan: bad access detected
[   24.588384] 
[   24.589859] Memory state around the buggy address:
[   24.594640]  ffff000800c2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.601843]  ffff000800c2e000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.609047] >ffff000800c2e080: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   24.616248]                                   ^
[   24.620766]  ffff000800c2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.627971]  ffff000800c2e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.635173] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   23.707591] ==================================================================
[   23.717393] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   23.723988] Read of size 1 at addr ffff000801c37c00 by task kunit_try_catch/211
[   23.731279] 
[   23.732765] CPU: 4 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   23.732815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.732828] Hardware name: WinLink E850-96 board (DT)
[   23.732849] Call trace:
[   23.732862]  show_stack+0x20/0x38 (C)
[   23.732893]  dump_stack_lvl+0x8c/0xd0
[   23.732926]  print_report+0x118/0x608
[   23.732956]  kasan_report+0xdc/0x128
[   23.732984]  __kasan_check_byte+0x54/0x70
[   23.733013]  krealloc_noprof+0x44/0x360
[   23.733040]  krealloc_uaf+0x180/0x520
[   23.733070]  kunit_try_run_case+0x170/0x3f0
[   23.733103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.733141]  kthread+0x328/0x630
[   23.733174]  ret_from_fork+0x10/0x20
[   23.733208] 
[   23.798120] Allocated by task 211:
[   23.801508]  kasan_save_stack+0x3c/0x68
[   23.805323]  kasan_save_track+0x20/0x40
[   23.809143]  kasan_save_alloc_info+0x40/0x58
[   23.813396]  __kasan_kmalloc+0xd4/0xd8
[   23.817128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.821642]  krealloc_uaf+0xc8/0x520
[   23.825201]  kunit_try_run_case+0x170/0x3f0
[   23.829368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.834836]  kthread+0x328/0x630
[   23.838048]  ret_from_fork+0x10/0x20
[   23.841607] 
[   23.843084] Freed by task 211:
[   23.846121]  kasan_save_stack+0x3c/0x68
[   23.849940]  kasan_save_track+0x20/0x40
[   23.853760]  kasan_save_free_info+0x4c/0x78
[   23.857927]  __kasan_slab_free+0x6c/0x98
[   23.861833]  kfree+0x214/0x3c8
[   23.864871]  krealloc_uaf+0x12c/0x520
[   23.868516]  kunit_try_run_case+0x170/0x3f0
[   23.872683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.878152]  kthread+0x328/0x630
[   23.881364]  ret_from_fork+0x10/0x20
[   23.884923] 
[   23.886401] The buggy address belongs to the object at ffff000801c37c00
[   23.886401]  which belongs to the cache kmalloc-256 of size 256
[   23.898900] The buggy address is located 0 bytes inside of
[   23.898900]  freed 256-byte region [ffff000801c37c00, ffff000801c37d00)
[   23.910964] 
[   23.912443] The buggy address belongs to the physical page:
[   23.917999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c34
[   23.925985] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.933623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.940566] page_type: f5(slab)
[   23.943702] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.951421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.959148] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.966959] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.974772] head: 0bfffe0000000002 fffffdffe0070d01 00000000ffffffff 00000000ffffffff
[   23.982584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.990390] page dumped because: kasan: bad access detected
[   23.995945] 
[   23.997421] Memory state around the buggy address:
[   24.002202]  ffff000801c37b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.009403]  ffff000801c37b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.016608] >ffff000801c37c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.023809]                    ^
[   24.027024]  ffff000801c37c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.034229]  ffff000801c37d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.041432] ==================================================================
[   24.048984] ==================================================================
[   24.055848] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   24.062438] Read of size 1 at addr ffff000801c37c00 by task kunit_try_catch/211
[   24.069729] 
[   24.071215] CPU: 2 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   24.071267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.071283] Hardware name: WinLink E850-96 board (DT)
[   24.071307] Call trace:
[   24.071318]  show_stack+0x20/0x38 (C)
[   24.071352]  dump_stack_lvl+0x8c/0xd0
[   24.071383]  print_report+0x118/0x608
[   24.071410]  kasan_report+0xdc/0x128
[   24.071436]  __asan_report_load1_noabort+0x20/0x30
[   24.071467]  krealloc_uaf+0x4c8/0x520
[   24.071497]  kunit_try_run_case+0x170/0x3f0
[   24.071535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.071574]  kthread+0x328/0x630
[   24.071609]  ret_from_fork+0x10/0x20
[   24.071643] 
[   24.133530] Allocated by task 211:
[   24.136916]  kasan_save_stack+0x3c/0x68
[   24.140735]  kasan_save_track+0x20/0x40
[   24.144554]  kasan_save_alloc_info+0x40/0x58
[   24.148808]  __kasan_kmalloc+0xd4/0xd8
[   24.152540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.157054]  krealloc_uaf+0xc8/0x520
[   24.160613]  kunit_try_run_case+0x170/0x3f0
[   24.164779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.170248]  kthread+0x328/0x630
[   24.173460]  ret_from_fork+0x10/0x20
[   24.177019] 
[   24.178494] Freed by task 211:
[   24.181533]  kasan_save_stack+0x3c/0x68
[   24.185352]  kasan_save_track+0x20/0x40
[   24.189171]  kasan_save_free_info+0x4c/0x78
[   24.193338]  __kasan_slab_free+0x6c/0x98
[   24.197244]  kfree+0x214/0x3c8
[   24.200282]  krealloc_uaf+0x12c/0x520
[   24.203928]  kunit_try_run_case+0x170/0x3f0
[   24.208095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.213564]  kthread+0x328/0x630
[   24.216775]  ret_from_fork+0x10/0x20
[   24.220334] 
[   24.221812] The buggy address belongs to the object at ffff000801c37c00
[   24.221812]  which belongs to the cache kmalloc-256 of size 256
[   24.234310] The buggy address is located 0 bytes inside of
[   24.234310]  freed 256-byte region [ffff000801c37c00, ffff000801c37d00)
[   24.246375] 
[   24.247853] The buggy address belongs to the physical page:
[   24.253411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881c34
[   24.261394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.269035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.275978] page_type: f5(slab)
[   24.279111] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.286833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.294559] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.302370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.310184] head: 0bfffe0000000002 fffffdffe0070d01 00000000ffffffff 00000000ffffffff
[   24.317996] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.325801] page dumped because: kasan: bad access detected
[   24.331357] 
[   24.332832] Memory state around the buggy address:
[   24.337613]  ffff000801c37b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.344815]  ffff000801c37b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.352020] >ffff000801c37c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.359221]                    ^
[   24.362436]  ffff000801c37c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.369641]  ffff000801c37d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.376842] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   22.781909] ==================================================================
[   22.789020] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.796571] Write of size 1 at addr ffff0008032360d0 by task kunit_try_catch/209
[   22.803949] 
[   22.805432] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   22.805479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.805496] Hardware name: WinLink E850-96 board (DT)
[   22.805517] Call trace:
[   22.805528]  show_stack+0x20/0x38 (C)
[   22.805559]  dump_stack_lvl+0x8c/0xd0
[   22.805592]  print_report+0x118/0x608
[   22.805620]  kasan_report+0xdc/0x128
[   22.805645]  __asan_report_store1_noabort+0x20/0x30
[   22.805678]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.805712]  krealloc_large_less_oob+0x20/0x38
[   22.805748]  kunit_try_run_case+0x170/0x3f0
[   22.805784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.805821]  kthread+0x328/0x630
[   22.805855]  ret_from_fork+0x10/0x20
[   22.805890] 
[   22.873306] The buggy address belongs to the physical page:
[   22.878865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234
[   22.886850] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.894489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.901430] page_type: f8(unknown)
[   22.904825] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.912548] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.920274] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.928085] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.935899] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff
[   22.943711] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.951516] page dumped because: kasan: bad access detected
[   22.957072] 
[   22.958547] Memory state around the buggy address:
[   22.963327]  ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.970530]  ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.977735] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.984936]                                                  ^
[   22.990755]  ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.997960]  ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.005162] ==================================================================
[   21.466255] ==================================================================
[   21.473245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   21.480792] Write of size 1 at addr ffff0008030fcaea by task kunit_try_catch/205
[   21.488170] 
[   21.489655] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   21.489706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.489722] Hardware name: WinLink E850-96 board (DT)
[   21.489742] Call trace:
[   21.489754]  show_stack+0x20/0x38 (C)
[   21.489787]  dump_stack_lvl+0x8c/0xd0
[   21.489821]  print_report+0x118/0x608
[   21.489848]  kasan_report+0xdc/0x128
[   21.489875]  __asan_report_store1_noabort+0x20/0x30
[   21.489907]  krealloc_less_oob_helper+0xae4/0xc50
[   21.489941]  krealloc_less_oob+0x20/0x38
[   21.489973]  kunit_try_run_case+0x170/0x3f0
[   21.490009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.490044]  kthread+0x328/0x630
[   21.490078]  ret_from_fork+0x10/0x20
[   21.490111] 
[   21.557006] Allocated by task 205:
[   21.560394]  kasan_save_stack+0x3c/0x68
[   21.564211]  kasan_save_track+0x20/0x40
[   21.568030]  kasan_save_alloc_info+0x40/0x58
[   21.572284]  __kasan_krealloc+0x118/0x178
[   21.576276]  krealloc_noprof+0x128/0x360
[   21.580183]  krealloc_less_oob_helper+0x168/0xc50
[   21.584872]  krealloc_less_oob+0x20/0x38
[   21.588777]  kunit_try_run_case+0x170/0x3f0
[   21.592943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.598412]  kthread+0x328/0x630
[   21.601624]  ret_from_fork+0x10/0x20
[   21.605183] 
[   21.606658] The buggy address belongs to the object at ffff0008030fca00
[   21.606658]  which belongs to the cache kmalloc-256 of size 256
[   21.619160] The buggy address is located 33 bytes to the right of
[   21.619160]  allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9)
[   21.632179] 
[   21.633656] The buggy address belongs to the physical page:
[   21.639214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   21.647198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.654835] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.661779] page_type: f5(slab)
[   21.664913] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.672636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.680362] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.688174] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.695987] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   21.703799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.711604] page dumped because: kasan: bad access detected
[   21.717160] 
[   21.718634] Memory state around the buggy address:
[   21.723414]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.730618]  ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.737823] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.745024]                                                           ^
[   21.751625]  ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.758829]  ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.766031] ==================================================================
[   21.159529] ==================================================================
[   21.166567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   21.174115] Write of size 1 at addr ffff0008030fcada by task kunit_try_catch/205
[   21.181491] 
[   21.182977] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   21.183032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.183047] Hardware name: WinLink E850-96 board (DT)
[   21.183069] Call trace:
[   21.183081]  show_stack+0x20/0x38 (C)
[   21.183115]  dump_stack_lvl+0x8c/0xd0
[   21.183147]  print_report+0x118/0x608
[   21.183175]  kasan_report+0xdc/0x128
[   21.183201]  __asan_report_store1_noabort+0x20/0x30
[   21.183231]  krealloc_less_oob_helper+0xa80/0xc50
[   21.183264]  krealloc_less_oob+0x20/0x38
[   21.183297]  kunit_try_run_case+0x170/0x3f0
[   21.183334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.183372]  kthread+0x328/0x630
[   21.183405]  ret_from_fork+0x10/0x20
[   21.183440] 
[   21.250326] Allocated by task 205:
[   21.253715]  kasan_save_stack+0x3c/0x68
[   21.257531]  kasan_save_track+0x20/0x40
[   21.261351]  kasan_save_alloc_info+0x40/0x58
[   21.265604]  __kasan_krealloc+0x118/0x178
[   21.269597]  krealloc_noprof+0x128/0x360
[   21.273503]  krealloc_less_oob_helper+0x168/0xc50
[   21.278192]  krealloc_less_oob+0x20/0x38
[   21.282097]  kunit_try_run_case+0x170/0x3f0
[   21.286264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.291732]  kthread+0x328/0x630
[   21.294944]  ret_from_fork+0x10/0x20
[   21.298503] 
[   21.299981] The buggy address belongs to the object at ffff0008030fca00
[   21.299981]  which belongs to the cache kmalloc-256 of size 256
[   21.312480] The buggy address is located 17 bytes to the right of
[   21.312480]  allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9)
[   21.325499] 
[   21.326977] The buggy address belongs to the physical page:
[   21.332535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   21.340519] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.348157] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.355101] page_type: f5(slab)
[   21.358235] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.365956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.373683] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.381494] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.389307] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   21.397119] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.404925] page dumped because: kasan: bad access detected
[   21.410480] 
[   21.411956] Memory state around the buggy address:
[   21.416736]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.423939]  ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.431143] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.438345]                                                     ^
[   21.444424]  ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.451629]  ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.458831] ==================================================================
[   20.544885] ==================================================================
[   20.554163] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   20.561709] Write of size 1 at addr ffff0008030fcac9 by task kunit_try_catch/205
[   20.569087] 
[   20.570572] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   20.570621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.570637] Hardware name: WinLink E850-96 board (DT)
[   20.570659] Call trace:
[   20.570670]  show_stack+0x20/0x38 (C)
[   20.570706]  dump_stack_lvl+0x8c/0xd0
[   20.570742]  print_report+0x118/0x608
[   20.570772]  kasan_report+0xdc/0x128
[   20.570801]  __asan_report_store1_noabort+0x20/0x30
[   20.570836]  krealloc_less_oob_helper+0xa48/0xc50
[   20.570870]  krealloc_less_oob+0x20/0x38
[   20.570900]  kunit_try_run_case+0x170/0x3f0
[   20.570935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.570971]  kthread+0x328/0x630
[   20.571006]  ret_from_fork+0x10/0x20
[   20.571041] 
[   20.637924] Allocated by task 205:
[   20.641311]  kasan_save_stack+0x3c/0x68
[   20.645128]  kasan_save_track+0x20/0x40
[   20.648947]  kasan_save_alloc_info+0x40/0x58
[   20.653201]  __kasan_krealloc+0x118/0x178
[   20.657193]  krealloc_noprof+0x128/0x360
[   20.661099]  krealloc_less_oob_helper+0x168/0xc50
[   20.665786]  krealloc_less_oob+0x20/0x38
[   20.669693]  kunit_try_run_case+0x170/0x3f0
[   20.673860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.679328]  kthread+0x328/0x630
[   20.682540]  ret_from_fork+0x10/0x20
[   20.686099] 
[   20.687577] The buggy address belongs to the object at ffff0008030fca00
[   20.687577]  which belongs to the cache kmalloc-256 of size 256
[   20.700076] The buggy address is located 0 bytes to the right of
[   20.700076]  allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9)
[   20.713008] 
[   20.714487] The buggy address belongs to the physical page:
[   20.720044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   20.728029] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.735668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.742610] page_type: f5(slab)
[   20.745748] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.753466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.761192] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.769003] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.776817] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   20.784628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.792434] page dumped because: kasan: bad access detected
[   20.797989] 
[   20.799465] Memory state around the buggy address:
[   20.804247]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.811448]  ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.818654] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.825853]                                               ^
[   20.831413]  ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.838618]  ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.845820] ==================================================================
[   22.548747] ==================================================================
[   22.558729] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.566281] Write of size 1 at addr ffff0008032360c9 by task kunit_try_catch/209
[   22.573657] 
[   22.575142] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   22.575195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.575211] Hardware name: WinLink E850-96 board (DT)
[   22.575234] Call trace:
[   22.575250]  show_stack+0x20/0x38 (C)
[   22.575282]  dump_stack_lvl+0x8c/0xd0
[   22.575314]  print_report+0x118/0x608
[   22.575343]  kasan_report+0xdc/0x128
[   22.575370]  __asan_report_store1_noabort+0x20/0x30
[   22.575403]  krealloc_less_oob_helper+0xa48/0xc50
[   22.575442]  krealloc_large_less_oob+0x20/0x38
[   22.575475]  kunit_try_run_case+0x170/0x3f0
[   22.575514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.575553]  kthread+0x328/0x630
[   22.575589]  ret_from_fork+0x10/0x20
[   22.575623] 
[   22.643017] The buggy address belongs to the physical page:
[   22.648573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234
[   22.656559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.664198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.671139] page_type: f8(unknown)
[   22.674536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.682256] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.689982] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.697794] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.705607] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff
[   22.713419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.721224] page dumped because: kasan: bad access detected
[   22.726780] 
[   22.728255] Memory state around the buggy address:
[   22.733035]  ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.740238]  ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.747443] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.754644]                                               ^
[   22.760203]  ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.767408]  ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.774611] ==================================================================
[   23.474648] ==================================================================
[   23.481720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.489272] Write of size 1 at addr ffff0008032360eb by task kunit_try_catch/209
[   23.496648] 
[   23.498131] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   23.498181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.498196] Hardware name: WinLink E850-96 board (DT)
[   23.498215] Call trace:
[   23.498229]  show_stack+0x20/0x38 (C)
[   23.498262]  dump_stack_lvl+0x8c/0xd0
[   23.498295]  print_report+0x118/0x608
[   23.498325]  kasan_report+0xdc/0x128
[   23.498351]  __asan_report_store1_noabort+0x20/0x30
[   23.498385]  krealloc_less_oob_helper+0xa58/0xc50
[   23.498423]  krealloc_large_less_oob+0x20/0x38
[   23.498459]  kunit_try_run_case+0x170/0x3f0
[   23.498494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.498534]  kthread+0x328/0x630
[   23.498567]  ret_from_fork+0x10/0x20
[   23.498600] 
[   23.566007] The buggy address belongs to the physical page:
[   23.571563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234
[   23.579545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.587186] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.594128] page_type: f8(unknown)
[   23.597524] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.605246] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.612971] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.620783] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.628597] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff
[   23.636409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.644214] page dumped because: kasan: bad access detected
[   23.649771] 
[   23.651245] Memory state around the buggy address:
[   23.656025]  ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.663228]  ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.670432] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.677634]                                                           ^
[   23.684235]  ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.691440]  ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.698642] ==================================================================
[   23.012480] ==================================================================
[   23.019575] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.027125] Write of size 1 at addr ffff0008032360da by task kunit_try_catch/209
[   23.034501] 
[   23.035985] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   23.036031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.036046] Hardware name: WinLink E850-96 board (DT)
[   23.036066] Call trace:
[   23.036077]  show_stack+0x20/0x38 (C)
[   23.036109]  dump_stack_lvl+0x8c/0xd0
[   23.036140]  print_report+0x118/0x608
[   23.036167]  kasan_report+0xdc/0x128
[   23.036195]  __asan_report_store1_noabort+0x20/0x30
[   23.036231]  krealloc_less_oob_helper+0xa80/0xc50
[   23.036266]  krealloc_large_less_oob+0x20/0x38
[   23.036303]  kunit_try_run_case+0x170/0x3f0
[   23.036338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.036376]  kthread+0x328/0x630
[   23.036410]  ret_from_fork+0x10/0x20
[   23.036444] 
[   23.103859] The buggy address belongs to the physical page:
[   23.109416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234
[   23.117401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.125038] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.131983] page_type: f8(unknown)
[   23.135378] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.143100] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.150826] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.158637] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.166451] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff
[   23.174263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.182068] page dumped because: kasan: bad access detected
[   23.187624] 
[   23.189100] Memory state around the buggy address:
[   23.193879]  ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.201083]  ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.208287] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.215488]                                                     ^
[   23.221568]  ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.228773]  ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.235974] ==================================================================
[   21.773353] ==================================================================
[   21.780443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   21.787992] Write of size 1 at addr ffff0008030fcaeb by task kunit_try_catch/205
[   21.795371] 
[   21.796856] CPU: 2 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   21.796902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.796917] Hardware name: WinLink E850-96 board (DT)
[   21.796935] Call trace:
[   21.796946]  show_stack+0x20/0x38 (C)
[   21.796978]  dump_stack_lvl+0x8c/0xd0
[   21.797011]  print_report+0x118/0x608
[   21.797042]  kasan_report+0xdc/0x128
[   21.797068]  __asan_report_store1_noabort+0x20/0x30
[   21.797100]  krealloc_less_oob_helper+0xa58/0xc50
[   21.797136]  krealloc_less_oob+0x20/0x38
[   21.797167]  kunit_try_run_case+0x170/0x3f0
[   21.797202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.797241]  kthread+0x328/0x630
[   21.797272]  ret_from_fork+0x10/0x20
[   21.797305] 
[   21.864206] Allocated by task 205:
[   21.867593]  kasan_save_stack+0x3c/0x68
[   21.871411]  kasan_save_track+0x20/0x40
[   21.875231]  kasan_save_alloc_info+0x40/0x58
[   21.879484]  __kasan_krealloc+0x118/0x178
[   21.883477]  krealloc_noprof+0x128/0x360
[   21.887383]  krealloc_less_oob_helper+0x168/0xc50
[   21.892072]  krealloc_less_oob+0x20/0x38
[   21.895977]  kunit_try_run_case+0x170/0x3f0
[   21.900143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.905612]  kthread+0x328/0x630
[   21.908824]  ret_from_fork+0x10/0x20
[   21.912382] 
[   21.913859] The buggy address belongs to the object at ffff0008030fca00
[   21.913859]  which belongs to the cache kmalloc-256 of size 256
[   21.926360] The buggy address is located 34 bytes to the right of
[   21.926360]  allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9)
[   21.939379] 
[   21.940855] The buggy address belongs to the physical page:
[   21.946413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   21.954397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.962035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.968979] page_type: f5(slab)
[   21.972114] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.979836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.987563] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.995374] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.003187] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   22.010999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.018805] page dumped because: kasan: bad access detected
[   22.024360] 
[   22.025836] Memory state around the buggy address:
[   22.030616]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.037818]  ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.045023] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.052224]                                                           ^
[   22.058825]  ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.066030]  ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.073232] ==================================================================
[   23.243259] ==================================================================
[   23.250386] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.257936] Write of size 1 at addr ffff0008032360ea by task kunit_try_catch/209
[   23.265314] 
[   23.266796] CPU: 6 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   23.266841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.266857] Hardware name: WinLink E850-96 board (DT)
[   23.266873] Call trace:
[   23.266882]  show_stack+0x20/0x38 (C)
[   23.266914]  dump_stack_lvl+0x8c/0xd0
[   23.266944]  print_report+0x118/0x608
[   23.266972]  kasan_report+0xdc/0x128
[   23.267000]  __asan_report_store1_noabort+0x20/0x30
[   23.267033]  krealloc_less_oob_helper+0xae4/0xc50
[   23.267068]  krealloc_large_less_oob+0x20/0x38
[   23.267101]  kunit_try_run_case+0x170/0x3f0
[   23.267134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.267173]  kthread+0x328/0x630
[   23.267205]  ret_from_fork+0x10/0x20
[   23.267237] 
[   23.334671] The buggy address belongs to the physical page:
[   23.340228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883234
[   23.348212] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.355850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.362795] page_type: f8(unknown)
[   23.366189] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.373912] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.381638] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.389450] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.397263] head: 0bfffe0000000002 fffffdffe00c8d01 00000000ffffffff 00000000ffffffff
[   23.405075] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.412881] page dumped because: kasan: bad access detected
[   23.418437] 
[   23.419912] Memory state around the buggy address:
[   23.424690]  ffff000803235f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.431895]  ffff000803236000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.439100] >ffff000803236080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.446301]                                                           ^
[   23.452901]  ffff000803236100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.460106]  ffff000803236180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.467307] ==================================================================
[   20.853212] ==================================================================
[   20.860234] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.867780] Write of size 1 at addr ffff0008030fcad0 by task kunit_try_catch/205
[   20.875159] 
[   20.876644] CPU: 5 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   20.876690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.876705] Hardware name: WinLink E850-96 board (DT)
[   20.876724] Call trace:
[   20.876738]  show_stack+0x20/0x38 (C)
[   20.876772]  dump_stack_lvl+0x8c/0xd0
[   20.876804]  print_report+0x118/0x608
[   20.876830]  kasan_report+0xdc/0x128
[   20.876857]  __asan_report_store1_noabort+0x20/0x30
[   20.876888]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.876922]  krealloc_less_oob+0x20/0x38
[   20.876953]  kunit_try_run_case+0x170/0x3f0
[   20.876989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.877025]  kthread+0x328/0x630
[   20.877059]  ret_from_fork+0x10/0x20
[   20.877091] 
[   20.943994] Allocated by task 205:
[   20.947381]  kasan_save_stack+0x3c/0x68
[   20.951199]  kasan_save_track+0x20/0x40
[   20.955018]  kasan_save_alloc_info+0x40/0x58
[   20.959272]  __kasan_krealloc+0x118/0x178
[   20.963265]  krealloc_noprof+0x128/0x360
[   20.967171]  krealloc_less_oob_helper+0x168/0xc50
[   20.971860]  krealloc_less_oob+0x20/0x38
[   20.975765]  kunit_try_run_case+0x170/0x3f0
[   20.979932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.985400]  kthread+0x328/0x630
[   20.988612]  ret_from_fork+0x10/0x20
[   20.992171] 
[   20.993648] The buggy address belongs to the object at ffff0008030fca00
[   20.993648]  which belongs to the cache kmalloc-256 of size 256
[   21.006148] The buggy address is located 7 bytes to the right of
[   21.006148]  allocated 201-byte region [ffff0008030fca00, ffff0008030fcac9)
[   21.019080] 
[   21.020559] The buggy address belongs to the physical page:
[   21.026115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   21.034100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.041739] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.048682] page_type: f5(slab)
[   21.051816] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.059537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.067264] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.075075] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.082888] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   21.090700] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.098506] page dumped because: kasan: bad access detected
[   21.104061] 
[   21.105537] Memory state around the buggy address:
[   21.110319]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.117520]  ffff0008030fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.124725] >ffff0008030fca80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.131926]                                                  ^
[   21.137745]  ffff0008030fcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.144950]  ffff0008030fcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.152151] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   22.315679] ==================================================================
[   22.322798] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.330346] Write of size 1 at addr ffff0008031fe0f0 by task kunit_try_catch/207
[   22.337724] 
[   22.339206] CPU: 5 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   22.339256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.339272] Hardware name: WinLink E850-96 board (DT)
[   22.339287] Call trace:
[   22.339300]  show_stack+0x20/0x38 (C)
[   22.339329]  dump_stack_lvl+0x8c/0xd0
[   22.339361]  print_report+0x118/0x608
[   22.339393]  kasan_report+0xdc/0x128
[   22.339419]  __asan_report_store1_noabort+0x20/0x30
[   22.339451]  krealloc_more_oob_helper+0x5c0/0x678
[   22.339486]  krealloc_large_more_oob+0x20/0x38
[   22.339518]  kunit_try_run_case+0x170/0x3f0
[   22.339553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.339591]  kthread+0x328/0x630
[   22.339622]  ret_from_fork+0x10/0x20
[   22.339653] 
[   22.407080] The buggy address belongs to the physical page:
[   22.412638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831fc
[   22.420623] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.428262] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.435205] page_type: f8(unknown)
[   22.438598] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.446322] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.454048] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.461860] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.469673] head: 0bfffe0000000002 fffffdffe00c7f01 00000000ffffffff 00000000ffffffff
[   22.477485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.485291] page dumped because: kasan: bad access detected
[   22.490846] 
[   22.492322] Memory state around the buggy address:
[   22.497101]  ffff0008031fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.504305]  ffff0008031fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.511509] >ffff0008031fe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.518710]                                                              ^
[   22.525571]  ffff0008031fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.532776]  ffff0008031fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.539977] ==================================================================
[   19.926730] ==================================================================
[   19.935854] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.943403] Write of size 1 at addr ffff0008030fc8eb by task kunit_try_catch/203
[   19.950780] 
[   19.952266] CPU: 5 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   19.952319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.952333] Hardware name: WinLink E850-96 board (DT)
[   19.952352] Call trace:
[   19.952364]  show_stack+0x20/0x38 (C)
[   19.952400]  dump_stack_lvl+0x8c/0xd0
[   19.952440]  print_report+0x118/0x608
[   19.952471]  kasan_report+0xdc/0x128
[   19.952497]  __asan_report_store1_noabort+0x20/0x30
[   19.952531]  krealloc_more_oob_helper+0x60c/0x678
[   19.952565]  krealloc_more_oob+0x20/0x38
[   19.952596]  kunit_try_run_case+0x170/0x3f0
[   19.952631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.952668]  kthread+0x328/0x630
[   19.952701]  ret_from_fork+0x10/0x20
[   19.952736] 
[   20.019617] Allocated by task 203:
[   20.023005]  kasan_save_stack+0x3c/0x68
[   20.026821]  kasan_save_track+0x20/0x40
[   20.030640]  kasan_save_alloc_info+0x40/0x58
[   20.034894]  __kasan_krealloc+0x118/0x178
[   20.038887]  krealloc_noprof+0x128/0x360
[   20.042793]  krealloc_more_oob_helper+0x168/0x678
[   20.047482]  krealloc_more_oob+0x20/0x38
[   20.051386]  kunit_try_run_case+0x170/0x3f0
[   20.055553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.061021]  kthread+0x328/0x630
[   20.064233]  ret_from_fork+0x10/0x20
[   20.067792] 
[   20.069271] The buggy address belongs to the object at ffff0008030fc800
[   20.069271]  which belongs to the cache kmalloc-256 of size 256
[   20.081770] The buggy address is located 0 bytes to the right of
[   20.081770]  allocated 235-byte region [ffff0008030fc800, ffff0008030fc8eb)
[   20.094701] 
[   20.096181] The buggy address belongs to the physical page:
[   20.101738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   20.109722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.117360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.124304] page_type: f5(slab)
[   20.127440] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.135159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.142886] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.150697] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.158510] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   20.166322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.174127] page dumped because: kasan: bad access detected
[   20.179684] 
[   20.181160] Memory state around the buggy address:
[   20.185940]  ffff0008030fc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.193141]  ffff0008030fc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.200347] >ffff0008030fc880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.207547]                                                           ^
[   20.214148]  ffff0008030fc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221353]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.228555] ==================================================================
[   22.082075] ==================================================================
[   22.091464] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.099014] Write of size 1 at addr ffff0008031fe0eb by task kunit_try_catch/207
[   22.106391] 
[   22.107876] CPU: 5 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   22.107926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.107941] Hardware name: WinLink E850-96 board (DT)
[   22.107961] Call trace:
[   22.107976]  show_stack+0x20/0x38 (C)
[   22.108012]  dump_stack_lvl+0x8c/0xd0
[   22.108045]  print_report+0x118/0x608
[   22.108076]  kasan_report+0xdc/0x128
[   22.108104]  __asan_report_store1_noabort+0x20/0x30
[   22.108139]  krealloc_more_oob_helper+0x60c/0x678
[   22.108175]  krealloc_large_more_oob+0x20/0x38
[   22.108207]  kunit_try_run_case+0x170/0x3f0
[   22.108244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.108284]  kthread+0x328/0x630
[   22.108322]  ret_from_fork+0x10/0x20
[   22.108356] 
[   22.175750] The buggy address belongs to the physical page:
[   22.181306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831fc
[   22.189292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.196931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.203873] page_type: f8(unknown)
[   22.207267] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.214989] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.222715] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.230527] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.238339] head: 0bfffe0000000002 fffffdffe00c7f01 00000000ffffffff 00000000ffffffff
[   22.246151] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.253957] page dumped because: kasan: bad access detected
[   22.259514] 
[   22.260990] Memory state around the buggy address:
[   22.265768]  ffff0008031fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.272972]  ffff0008031fe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.280176] >ffff0008031fe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.287377]                                                           ^
[   22.293978]  ffff0008031fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.301183]  ffff0008031fe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.308385] ==================================================================
[   20.236014] ==================================================================
[   20.242969] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   20.250515] Write of size 1 at addr ffff0008030fc8f0 by task kunit_try_catch/203
[   20.257894] 
[   20.259378] CPU: 5 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   20.259432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.259447] Hardware name: WinLink E850-96 board (DT)
[   20.259467] Call trace:
[   20.259479]  show_stack+0x20/0x38 (C)
[   20.259512]  dump_stack_lvl+0x8c/0xd0
[   20.259543]  print_report+0x118/0x608
[   20.259570]  kasan_report+0xdc/0x128
[   20.259599]  __asan_report_store1_noabort+0x20/0x30
[   20.259633]  krealloc_more_oob_helper+0x5c0/0x678
[   20.259666]  krealloc_more_oob+0x20/0x38
[   20.259698]  kunit_try_run_case+0x170/0x3f0
[   20.259732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.259768]  kthread+0x328/0x630
[   20.259800]  ret_from_fork+0x10/0x20
[   20.259830] 
[   20.326731] Allocated by task 203:
[   20.330115]  kasan_save_stack+0x3c/0x68
[   20.333934]  kasan_save_track+0x20/0x40
[   20.337754]  kasan_save_alloc_info+0x40/0x58
[   20.342007]  __kasan_krealloc+0x118/0x178
[   20.346000]  krealloc_noprof+0x128/0x360
[   20.349906]  krealloc_more_oob_helper+0x168/0x678
[   20.354595]  krealloc_more_oob+0x20/0x38
[   20.358500]  kunit_try_run_case+0x170/0x3f0
[   20.362667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.368135]  kthread+0x328/0x630
[   20.371347]  ret_from_fork+0x10/0x20
[   20.374906] 
[   20.376383] The buggy address belongs to the object at ffff0008030fc800
[   20.376383]  which belongs to the cache kmalloc-256 of size 256
[   20.388883] The buggy address is located 5 bytes to the right of
[   20.388883]  allocated 235-byte region [ffff0008030fc800, ffff0008030fc8eb)
[   20.401815] 
[   20.403292] The buggy address belongs to the physical page:
[   20.408848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   20.416834] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.424473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.431417] page_type: f5(slab)
[   20.434549] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.442272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.449999] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.457810] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.465623] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   20.473435] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.481241] page dumped because: kasan: bad access detected
[   20.486798] 
[   20.488272] Memory state around the buggy address:
[   20.493052]  ffff0008030fc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.500255]  ffff0008030fc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.507460] >ffff0008030fc880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.514661]                                                              ^
[   20.521521]  ffff0008030fc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.528726]  ffff0008030fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.535928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   19.500953] ==================================================================
[   19.510253] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   19.515633] Free of addr ffff0008031f8001 by task kunit_try_catch/197
[   19.522054] 
[   19.523540] CPU: 5 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   19.523596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.523612] Hardware name: WinLink E850-96 board (DT)
[   19.523633] Call trace:
[   19.523648]  show_stack+0x20/0x38 (C)
[   19.523681]  dump_stack_lvl+0x8c/0xd0
[   19.523714]  print_report+0x118/0x608
[   19.523745]  kasan_report_invalid_free+0xc0/0xe8
[   19.523776]  __kasan_kfree_large+0x5c/0xa8
[   19.523807]  free_large_kmalloc+0x64/0x190
[   19.523840]  kfree+0x270/0x3c8
[   19.523870]  kmalloc_large_invalid_free+0x108/0x270
[   19.523906]  kunit_try_run_case+0x170/0x3f0
[   19.523940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.523980]  kthread+0x328/0x630
[   19.524015]  ret_from_fork+0x10/0x20
[   19.524052] 
[   19.594539] The buggy address belongs to the physical page:
[   19.600097] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831f8
[   19.608081] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.615718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.622660] page_type: f8(unknown)
[   19.626060] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.633777] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.641504] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.649315] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.657128] head: 0bfffe0000000002 fffffdffe00c7e01 00000000ffffffff 00000000ffffffff
[   19.664941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.672746] page dumped because: kasan: bad access detected
[   19.678301] 
[   19.679778] Memory state around the buggy address:
[   19.684559]  ffff0008031f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.691760]  ffff0008031f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.698966] >ffff0008031f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.706166]                    ^
[   19.709381]  ffff0008031f8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.716586]  ffff0008031f8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.723790] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   19.317473] ==================================================================
[   19.327446] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   19.334039] Read of size 1 at addr ffff000803264000 by task kunit_try_catch/195
[   19.341328] 
[   19.342816] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   19.342870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.342885] Hardware name: WinLink E850-96 board (DT)
[   19.342906] Call trace:
[   19.342922]  show_stack+0x20/0x38 (C)
[   19.342959]  dump_stack_lvl+0x8c/0xd0
[   19.342994]  print_report+0x118/0x608
[   19.343024]  kasan_report+0xdc/0x128
[   19.343051]  __asan_report_load1_noabort+0x20/0x30
[   19.343085]  kmalloc_large_uaf+0x2cc/0x2f8
[   19.343115]  kunit_try_run_case+0x170/0x3f0
[   19.343154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.343193]  kthread+0x328/0x630
[   19.343226]  ret_from_fork+0x10/0x20
[   19.343260] 
[   19.405567] The buggy address belongs to the physical page:
[   19.411122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883264
[   19.419107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.425629] raw: 0bfffe0000000000 fffffdffe00c9a08 ffff00085b03f040 0000000000000000
[   19.433346] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.441065] page dumped because: kasan: bad access detected
[   19.446622] 
[   19.448098] Memory state around the buggy address:
[   19.452877]  ffff000803263f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.460079]  ffff000803263f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.467284] >ffff000803264000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.474485]                    ^
[   19.477701]  ffff000803264080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.484905]  ffff000803264100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.492108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   19.090022] ==================================================================
[   19.099585] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   19.107048] Write of size 1 at addr ffff0008031fa00a by task kunit_try_catch/193
[   19.114421] 
[   19.115907] CPU: 5 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   19.115958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.115974] Hardware name: WinLink E850-96 board (DT)
[   19.115995] Call trace:
[   19.116007]  show_stack+0x20/0x38 (C)
[   19.116040]  dump_stack_lvl+0x8c/0xd0
[   19.116076]  print_report+0x118/0x608
[   19.116107]  kasan_report+0xdc/0x128
[   19.116135]  __asan_report_store1_noabort+0x20/0x30
[   19.116169]  kmalloc_large_oob_right+0x278/0x2b8
[   19.116203]  kunit_try_run_case+0x170/0x3f0
[   19.116238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.116276]  kthread+0x328/0x630
[   19.116312]  ret_from_fork+0x10/0x20
[   19.116346] 
[   19.179267] The buggy address belongs to the physical page:
[   19.184824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831f8
[   19.192809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.200448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.207390] page_type: f8(unknown)
[   19.210785] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.218506] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.226232] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.234043] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.241857] head: 0bfffe0000000002 fffffdffe00c7e01 00000000ffffffff 00000000ffffffff
[   19.249669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.257475] page dumped because: kasan: bad access detected
[   19.263031] 
[   19.264507] Memory state around the buggy address:
[   19.269286]  ffff0008031f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.276488]  ffff0008031f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.283693] >ffff0008031fa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.290894]                       ^
[   19.294370]  ffff0008031fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.301575]  ffff0008031fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.308777] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   18.789078] ==================================================================
[   18.800028] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   18.807310] Write of size 1 at addr ffff00080270df00 by task kunit_try_catch/191
[   18.814686] 
[   18.816172] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.816225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.816240] Hardware name: WinLink E850-96 board (DT)
[   18.816261] Call trace:
[   18.816274]  show_stack+0x20/0x38 (C)
[   18.816309]  dump_stack_lvl+0x8c/0xd0
[   18.816344]  print_report+0x118/0x608
[   18.816374]  kasan_report+0xdc/0x128
[   18.816401]  __asan_report_store1_noabort+0x20/0x30
[   18.816438]  kmalloc_big_oob_right+0x2a4/0x2f0
[   18.816470]  kunit_try_run_case+0x170/0x3f0
[   18.816505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.816542]  kthread+0x328/0x630
[   18.816578]  ret_from_fork+0x10/0x20
[   18.816614] 
[   18.879357] Allocated by task 191:
[   18.882743]  kasan_save_stack+0x3c/0x68
[   18.886560]  kasan_save_track+0x20/0x40
[   18.890380]  kasan_save_alloc_info+0x40/0x58
[   18.894633]  __kasan_kmalloc+0xd4/0xd8
[   18.898366]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.902879]  kmalloc_big_oob_right+0xb8/0x2f0
[   18.907220]  kunit_try_run_case+0x170/0x3f0
[   18.911386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.916855]  kthread+0x328/0x630
[   18.920066]  ret_from_fork+0x10/0x20
[   18.923625] 
[   18.925103] The buggy address belongs to the object at ffff00080270c000
[   18.925103]  which belongs to the cache kmalloc-8k of size 8192
[   18.937603] The buggy address is located 0 bytes to the right of
[   18.937603]  allocated 7936-byte region [ffff00080270c000, ffff00080270df00)
[   18.950622] 
[   18.952101] The buggy address belongs to the physical page:
[   18.957657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882708
[   18.965642] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.973281] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.980224] page_type: f5(slab)
[   18.983362] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   18.991079] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   18.998805] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   19.006616] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.014430] head: 0bfffe0000000003 fffffdffe009c201 00000000ffffffff 00000000ffffffff
[   19.022242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.030047] page dumped because: kasan: bad access detected
[   19.035604] 
[   19.037080] Memory state around the buggy address:
[   19.041859]  ffff00080270de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.049061]  ffff00080270de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.056267] >ffff00080270df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.063467]                    ^
[   19.066682]  ffff00080270df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.073888]  ffff00080270e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.081090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   18.322780] ==================================================================
[   18.332667] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.340736] Write of size 1 at addr ffff000802408078 by task kunit_try_catch/189
[   18.348113] 
[   18.349599] CPU: 5 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.349657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.349670] Hardware name: WinLink E850-96 board (DT)
[   18.349690] Call trace:
[   18.349700]  show_stack+0x20/0x38 (C)
[   18.349734]  dump_stack_lvl+0x8c/0xd0
[   18.349766]  print_report+0x118/0x608
[   18.349795]  kasan_report+0xdc/0x128
[   18.349824]  __asan_report_store1_noabort+0x20/0x30
[   18.349858]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.349895]  kunit_try_run_case+0x170/0x3f0
[   18.349930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.349967]  kthread+0x328/0x630
[   18.350000]  ret_from_fork+0x10/0x20
[   18.350033] 
[   18.413565] Allocated by task 189:
[   18.416952]  kasan_save_stack+0x3c/0x68
[   18.420769]  kasan_save_track+0x20/0x40
[   18.424588]  kasan_save_alloc_info+0x40/0x58
[   18.428841]  __kasan_kmalloc+0xd4/0xd8
[   18.432574]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.438130]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.443251]  kunit_try_run_case+0x170/0x3f0
[   18.447417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452886]  kthread+0x328/0x630
[   18.456098]  ret_from_fork+0x10/0x20
[   18.459657] 
[   18.461135] The buggy address belongs to the object at ffff000802408000
[   18.461135]  which belongs to the cache kmalloc-128 of size 128
[   18.473634] The buggy address is located 0 bytes to the right of
[   18.473634]  allocated 120-byte region [ffff000802408000, ffff000802408078)
[   18.486566] 
[   18.488045] The buggy address belongs to the physical page:
[   18.493602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882408
[   18.501587] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.509226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.516168] page_type: f5(slab)
[   18.519306] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.527023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.534749] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.542563] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.550374] head: 0bfffe0000000001 fffffdffe0090201 00000000ffffffff 00000000ffffffff
[   18.558186] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.565992] page dumped because: kasan: bad access detected
[   18.571547] 
[   18.573023] Memory state around the buggy address:
[   18.577803]  ffff000802407f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.585006]  ffff000802407f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.592212] >ffff000802408000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.599412]                                                                 ^
[   18.606533]  ffff000802408080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.613738]  ffff000802408100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.620940] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   18.023287] ==================================================================
[   18.032504] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   18.039872] Read of size 1 at addr ffff000806541000 by task kunit_try_catch/187
[   18.047164] 
[   18.048650] CPU: 7 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.048703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.048717] Hardware name: WinLink E850-96 board (DT)
[   18.048738] Call trace:
[   18.048752]  show_stack+0x20/0x38 (C)
[   18.048788]  dump_stack_lvl+0x8c/0xd0
[   18.048823]  print_report+0x118/0x608
[   18.048854]  kasan_report+0xdc/0x128
[   18.048883]  __asan_report_load1_noabort+0x20/0x30
[   18.048917]  kmalloc_node_oob_right+0x2f4/0x330
[   18.048955]  kunit_try_run_case+0x170/0x3f0
[   18.048991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.049029]  kthread+0x328/0x630
[   18.049065]  ret_from_fork+0x10/0x20
[   18.049099] 
[   18.111832] Allocated by task 187:
[   18.115220]  kasan_save_stack+0x3c/0x68
[   18.119038]  kasan_save_track+0x20/0x40
[   18.122856]  kasan_save_alloc_info+0x40/0x58
[   18.127109]  __kasan_kmalloc+0xd4/0xd8
[   18.130842]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   18.135790]  kmalloc_node_oob_right+0xbc/0x330
[   18.140217]  kunit_try_run_case+0x170/0x3f0
[   18.144384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.149854]  kthread+0x328/0x630
[   18.153064]  ret_from_fork+0x10/0x20
[   18.156623] 
[   18.158102] The buggy address belongs to the object at ffff000806540000
[   18.158102]  which belongs to the cache kmalloc-4k of size 4096
[   18.170601] The buggy address is located 0 bytes to the right of
[   18.170601]  allocated 4096-byte region [ffff000806540000, ffff000806541000)
[   18.183619] 
[   18.185097] The buggy address belongs to the physical page:
[   18.190655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886540
[   18.198640] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.206279] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.213221] page_type: f5(slab)
[   18.216358] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   18.224077] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.231803] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   18.239614] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.247427] head: 0bfffe0000000003 fffffdffe0195001 00000000ffffffff 00000000ffffffff
[   18.255239] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.263045] page dumped because: kasan: bad access detected
[   18.268600] 
[   18.270078] Memory state around the buggy address:
[   18.274856]  ffff000806540f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.282058]  ffff000806540f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.289264] >ffff000806541000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.296465]                    ^
[   18.299680]  ffff000806541080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.306885]  ffff000806541100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.314088] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.726033] ==================================================================
[   17.735368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.742221] Read of size 1 at addr ffff000800c2e07f by task kunit_try_catch/185
[   17.749511] 
[   17.750997] CPU: 5 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.751049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.751064] Hardware name: WinLink E850-96 board (DT)
[   17.751089] Call trace:
[   17.751106]  show_stack+0x20/0x38 (C)
[   17.751139]  dump_stack_lvl+0x8c/0xd0
[   17.751174]  print_report+0x118/0x608
[   17.751205]  kasan_report+0xdc/0x128
[   17.751234]  __asan_report_load1_noabort+0x20/0x30
[   17.751270]  kmalloc_oob_left+0x2ec/0x320
[   17.751301]  kunit_try_run_case+0x170/0x3f0
[   17.751338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.751376]  kthread+0x328/0x630
[   17.751411]  ret_from_fork+0x10/0x20
[   17.751448] 
[   17.813661] Allocated by task 56:
[   17.816961]  kasan_save_stack+0x3c/0x68
[   17.820779]  kasan_save_track+0x20/0x40
[   17.824598]  kasan_save_alloc_info+0x40/0x58
[   17.828850]  __kasan_kmalloc+0xd4/0xd8
[   17.832583]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.838138]  kstrdup+0x54/0xc8
[   17.841177]  devtmpfs_work_loop+0x6f8/0xa58
[   17.845343]  devtmpfsd+0x50/0x58
[   17.848555]  kthread+0x328/0x630
[   17.851766]  ret_from_fork+0x10/0x20
[   17.855325] 
[   17.856803] Freed by task 56:
[   17.859756]  kasan_save_stack+0x3c/0x68
[   17.863572]  kasan_save_track+0x20/0x40
[   17.867391]  kasan_save_free_info+0x4c/0x78
[   17.871558]  __kasan_slab_free+0x6c/0x98
[   17.875466]  kfree+0x214/0x3c8
[   17.878502]  devtmpfs_work_loop+0x804/0xa58
[   17.882668]  devtmpfsd+0x50/0x58
[   17.885881]  kthread+0x328/0x630
[   17.889092]  ret_from_fork+0x10/0x20
[   17.892651] 
[   17.894129] The buggy address belongs to the object at ffff000800c2e060
[   17.894129]  which belongs to the cache kmalloc-16 of size 16
[   17.906455] The buggy address is located 15 bytes to the right of
[   17.906455]  allocated 16-byte region [ffff000800c2e060, ffff000800c2e070)
[   17.919387] 
[   17.920865] The buggy address belongs to the physical page:
[   17.926425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   17.934408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.940917] page_type: f5(slab)
[   17.944054] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   17.951771] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.959490] page dumped because: kasan: bad access detected
[   17.965046] 
[   17.966522] Memory state around the buggy address:
[   17.971303]  ffff000800c2df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.978504]  ffff000800c2df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.985712] >ffff000800c2e000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.992912]                                                                 ^
[   18.000032]  ffff000800c2e080: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.007237]  ffff000800c2e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.014439] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   17.132065] ==================================================================
[   17.139112] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.146048] Write of size 1 at addr ffff00080243e178 by task kunit_try_catch/183
[   17.153426] 
[   17.154911] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.154970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.154984] Hardware name: WinLink E850-96 board (DT)
[   17.155004] Call trace:
[   17.155017]  show_stack+0x20/0x38 (C)
[   17.155050]  dump_stack_lvl+0x8c/0xd0
[   17.155084]  print_report+0x118/0x608
[   17.155115]  kasan_report+0xdc/0x128
[   17.155142]  __asan_report_store1_noabort+0x20/0x30
[   17.155176]  kmalloc_oob_right+0x538/0x660
[   17.155208]  kunit_try_run_case+0x170/0x3f0
[   17.155241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.155283]  kthread+0x328/0x630
[   17.155315]  ret_from_fork+0x10/0x20
[   17.155350] 
[   17.217748] Allocated by task 183:
[   17.221137]  kasan_save_stack+0x3c/0x68
[   17.224953]  kasan_save_track+0x20/0x40
[   17.228772]  kasan_save_alloc_info+0x40/0x58
[   17.233026]  __kasan_kmalloc+0xd4/0xd8
[   17.236758]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.241272]  kmalloc_oob_right+0xb0/0x660
[   17.245265]  kunit_try_run_case+0x170/0x3f0
[   17.249432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.254902]  kthread+0x328/0x630
[   17.258112]  ret_from_fork+0x10/0x20
[   17.261671] 
[   17.263150] The buggy address belongs to the object at ffff00080243e100
[   17.263150]  which belongs to the cache kmalloc-128 of size 128
[   17.275647] The buggy address is located 5 bytes to the right of
[   17.275647]  allocated 115-byte region [ffff00080243e100, ffff00080243e173)
[   17.288580] 
[   17.290060] The buggy address belongs to the physical page:
[   17.295616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   17.303601] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.311240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.318182] page_type: f5(slab)
[   17.321316] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.329038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.336764] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.344576] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.352390] head: 0bfffe0000000001 fffffdffe0090f81 00000000ffffffff 00000000ffffffff
[   17.360201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.368006] page dumped because: kasan: bad access detected
[   17.373562] 
[   17.375038] Memory state around the buggy address:
[   17.379817]  ffff00080243e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.387021]  ffff00080243e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.394225] >ffff00080243e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.401426]                                                                 ^
[   17.408547]  ffff00080243e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.415752]  ffff00080243e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.422954] ==================================================================
[   16.830434] ==================================================================
[   16.837031] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.843972] Write of size 1 at addr ffff00080243e173 by task kunit_try_catch/183
[   16.851349] 
[   16.852836] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G                 N  6.15.1-rc1 #1 PREEMPT 
[   16.852884] Tainted: [N]=TEST
[   16.852898] Hardware name: WinLink E850-96 board (DT)
[   16.852922] Call trace:
[   16.852936]  show_stack+0x20/0x38 (C)
[   16.852973]  dump_stack_lvl+0x8c/0xd0
[   16.853010]  print_report+0x118/0x608
[   16.853046]  kasan_report+0xdc/0x128
[   16.853078]  __asan_report_store1_noabort+0x20/0x30
[   16.853112]  kmalloc_oob_right+0x5a4/0x660
[   16.853144]  kunit_try_run_case+0x170/0x3f0
[   16.853179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.853221]  kthread+0x328/0x630
[   16.853256]  ret_from_fork+0x10/0x20
[   16.853291] 
[   16.914455] Allocated by task 183:
[   16.917843]  kasan_save_stack+0x3c/0x68
[   16.921659]  kasan_save_track+0x20/0x40
[   16.925478]  kasan_save_alloc_info+0x40/0x58
[   16.929732]  __kasan_kmalloc+0xd4/0xd8
[   16.933464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.937978]  kmalloc_oob_right+0xb0/0x660
[   16.941971]  kunit_try_run_case+0x170/0x3f0
[   16.946138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.951608]  kthread+0x328/0x630
[   16.954818]  ret_from_fork+0x10/0x20
[   16.958377] 
[   16.959856] The buggy address belongs to the object at ffff00080243e100
[   16.959856]  which belongs to the cache kmalloc-128 of size 128
[   16.972355] The buggy address is located 0 bytes to the right of
[   16.972355]  allocated 115-byte region [ffff00080243e100, ffff00080243e173)
[   16.985286] 
[   16.986765] The buggy address belongs to the physical page:
[   16.992323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   17.000307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.007946] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.014889] page_type: f5(slab)
[   17.018027] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.025744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.033470] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.041282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.049095] head: 0bfffe0000000001 fffffdffe0090f81 00000000ffffffff 00000000ffffffff
[   17.056907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.064712] page dumped because: kasan: bad access detected
[   17.070268] 
[   17.071743] Memory state around the buggy address:
[   17.076527]  ffff00080243e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.083727]  ffff00080243e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.090932] >ffff00080243e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.098132]                                                              ^
[   17.104993]  ffff00080243e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.112199]  ffff00080243e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.119401] ==================================================================
[   17.430257] ==================================================================
[   17.437365] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.444308] Read of size 1 at addr ffff00080243e180 by task kunit_try_catch/183
[   17.451599] 
[   17.453082] CPU: 7 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.453130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.453145] Hardware name: WinLink E850-96 board (DT)
[   17.453166] Call trace:
[   17.453177]  show_stack+0x20/0x38 (C)
[   17.453208]  dump_stack_lvl+0x8c/0xd0
[   17.453241]  print_report+0x118/0x608
[   17.453272]  kasan_report+0xdc/0x128
[   17.453300]  __asan_report_load1_noabort+0x20/0x30
[   17.453332]  kmalloc_oob_right+0x5d0/0x660
[   17.453364]  kunit_try_run_case+0x170/0x3f0
[   17.453400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.453437]  kthread+0x328/0x630
[   17.453472]  ret_from_fork+0x10/0x20
[   17.453505] 
[   17.515834] Allocated by task 183:
[   17.519222]  kasan_save_stack+0x3c/0x68
[   17.523039]  kasan_save_track+0x20/0x40
[   17.526858]  kasan_save_alloc_info+0x40/0x58
[   17.531112]  __kasan_kmalloc+0xd4/0xd8
[   17.534844]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.539358]  kmalloc_oob_right+0xb0/0x660
[   17.543351]  kunit_try_run_case+0x170/0x3f0
[   17.547517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.552986]  kthread+0x328/0x630
[   17.556198]  ret_from_fork+0x10/0x20
[   17.559757] 
[   17.561234] The buggy address belongs to the object at ffff00080243e100
[   17.561234]  which belongs to the cache kmalloc-128 of size 128
[   17.573733] The buggy address is located 13 bytes to the right of
[   17.573733]  allocated 115-byte region [ffff00080243e100, ffff00080243e173)
[   17.586753] 
[   17.588229] The buggy address belongs to the physical page:
[   17.593788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   17.601774] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.609411] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.616353] page_type: f5(slab)
[   17.619489] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.627211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.634937] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.642748] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.650561] head: 0bfffe0000000001 fffffdffe0090f81 00000000ffffffff 00000000ffffffff
[   17.658374] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.666179] page dumped because: kasan: bad access detected
[   17.671734] 
[   17.673210] Memory state around the buggy address:
[   17.677988]  ffff00080243e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.685193]  ffff00080243e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.692398] >ffff00080243e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.699599]                    ^
[   17.702814]  ffff00080243e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.710019]  ffff00080243e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.717220] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  161.135845] WARNING: CPU: 7 PID: 703 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  161.143307] Modules linked in:
[  161.146354] CPU: 7 UID: 0 PID: 703 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.1-rc1 #1 PREEMPT 
[  161.156250] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  161.162057] Hardware name: WinLink E850-96 board (DT)
[  161.167096] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  161.174035] pc : intlog10+0x38/0x48
[  161.177505] lr : intlog10_test+0xe4/0x200
[  161.181498] sp : ffff80008abc7c10
[  161.184798] x29: ffff80008abc7c90 x28: 0000000000000000 x27: 0000000000000000
[  161.191915] x26: 1fffe00100466841 x25: 0000000000000000 x24: ffff80008abc7ce0
[  161.199036] x23: ffff80008abc7d00 x22: 0000000000000000 x21: 1ffff00011578f82
[  161.206151] x20: ffff800083c24e80 x19: ffff800087ba7990 x18: ffff800087ba7b00
[  161.213269] x17: 0000000000000001 x16: ffff00085b03af60 x15: ffff8000811f07b8
[  161.220387] x14: ffff8000808d50ac x13: 1fffe0010b6075d0 x12: ffff700010f37769
[  161.227505] x11: 1ffff00010f37768 x10: ffff700010f37768 x9 : ffff80008121011c
[  161.234622] x8 : ffff8000879bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  161.241740] x5 : ffff700011578f82 x4 : 1ffff00010f74f3a x3 : 1ffff000107849d0
[  161.248859] x2 : 1ffff000107849d0 x1 : 0000000000000003 x0 : 0000000000000000
[  161.255979] Call trace:
[  161.258411]  intlog10+0x38/0x48 (P)
[  161.261882]  kunit_try_run_case+0x170/0x3f0
[  161.266046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  161.271515]  kthread+0x328/0x630
[  161.274728]  ret_from_fork+0x10/0x20
[  161.278289] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  160.933417] WARNING: CPU: 1 PID: 685 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  160.940706] Modules linked in:
[  160.943752] CPU: 1 UID: 0 PID: 685 Comm: kunit_try_catch Tainted: G    B D          N  6.15.1-rc1 #1 PREEMPT 
[  160.953648] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  160.958585] Hardware name: WinLink E850-96 board (DT)
[  160.963625] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  160.970564] pc : intlog2+0xd8/0xf8
[  160.973950] lr : intlog2_test+0xe4/0x200
[  160.977856] sp : ffff80008aaa7c10
[  160.981155] x29: ffff80008aaa7c90 x28: 0000000000000000 x27: 0000000000000000
[  160.988272] x26: 1fffe00100380be1 x25: 0000000000000000 x24: ffff80008aaa7ce0
[  160.995390] x23: ffff80008aaa7d00 x22: 0000000000000000 x21: 1ffff00011554f82
[  161.002508] x20: ffff800083c24d80 x19: ffff800087ba7990 x18: 000000004d8b5b7f
[  161.009626] x17: 0000000000000001 x16: ffff00085af6ef60 x15: 0000000000000000
[  161.016744] x14: 00000000f1f1f1f1 x13: 1fffe0010b5eddd0 x12: ffff700010f37769
[  161.023862] x11: 1ffff00010f37768 x10: ffff700010f37768 x9 : ffff80008121031c
[  161.030980] x8 : ffff8000879bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  161.038098] x5 : ffff700011554f82 x4 : 1ffff00010f74f3a x3 : 1ffff000107849b0
[  161.045216] x2 : 1ffff000107849b0 x1 : 0000000000000003 x0 : 0000000000000000
[  161.052337] Call trace:
[  161.054769]  intlog2+0xd8/0xf8 (P)
[  161.058153]  kunit_try_run_case+0x170/0x3f0
[  161.062317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  161.067787]  kthread+0x328/0x630
[  161.070998]  ret_from_fork+0x10/0x20
[  161.074559] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)