Hay
Date
June 26, 2025, 11:12 a.m.
Failure - log-parser-boot/internal-error-oops-oops-smp
[  162.171779] Internal error: Oops: 0000000096000005 [#1]  SMP
[  162.177387] Modules linked in:
[  162.180433] CPU: 2 UID: 0 PID: 581 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[  162.190325] Tainted: [B]=BAD_PAGE, [N]=TEST
[  162.194484] Hardware name: WinLink E850-96 board (DT)
[  162.199522] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.206462] pc : kunit_test_null_dereference+0x70/0x170
[  162.211670] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.217487] sp : ffff80008a3b7d30
[  162.220786] x29: ffff80008a3b7d90 x28: 0000000000000000 x27: 0000000000000000
[  162.227902] x26: 1fffe00100db59c1 x25: 0000000000000000 x24: 0000000000000004
[  162.235020] x23: ffff000806dace0c x22: ffff800081201da0 x21: ffff000806861d88
[  162.242138] x20: 1ffff00011476fa6 x19: ffff800087bc7990 x18: ffff800087bc7b00
[  162.249256] x17: ffff8000812001d0 x16: ffff800081200050 x15: ffff8000811f4e60
[  162.256374] x14: ffff8000808d86a4 x13: 1fffe0010b5f19e0 x12: ffff60010093d3a4
[  162.263492] x11: 1fffe0010093d3a3 x10: ffff60010093d3a3 x9 : ffff8000811f9208
[  162.270610] x8 : ffff80008a3b7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  162.277728] x5 : ffff700011476fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  162.284846] x2 : dfff800000000000 x1 : ffff0008049e9440 x0 : ffff800087bc7990
[  162.291966] Call trace:
[  162.294399]  kunit_test_null_dereference+0x70/0x170 (P)
[  162.299606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.305071]  kthread+0x328/0x630
[  162.308283]  ret_from_fork+0x10/0x20
[  162.311858] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  162.317925] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[  229.298589] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  229.306829] SMP: stopping secondary CPUs
[  229.310752] Kernel Offset: disabled
[  229.314203] CPU features: 0x0400,00000000,01002650,0200721b
[  229.319758] Memory Limit: none
[  229.322829] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   99.513179] ==================================================================
[   99.513316] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   99.513316] 
[   99.513457] Use-after-free read at 0x(____ptrval____) (in kfence-#195):
[   99.513565]  test_krealloc+0x51c/0x830
[   99.516713]  kunit_try_run_case+0x170/0x3f0
[   99.520879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.526350]  kthread+0x328/0x630
[   99.529560]  ret_from_fork+0x10/0x20
[   99.533119] 
[   99.534598] kfence-#195: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   99.534598] 
[   99.544232] allocated by task 386 on cpu 1 at 99.513079s (0.031151s ago):
[   99.551017]  test_alloc+0x29c/0x628
[   99.554473]  test_krealloc+0xc0/0x830
[   99.558119]  kunit_try_run_case+0x170/0x3f0
[   99.562285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.567754]  kthread+0x328/0x630
[   99.570965]  ret_from_fork+0x10/0x20
[   99.574528] 
[   99.576003] freed by task 386 on cpu 1 at 99.513112s (0.062888s ago):
[   99.582436]  krealloc_noprof+0x148/0x360
[   99.586330]  test_krealloc+0x1dc/0x830
[   99.590062]  kunit_try_run_case+0x170/0x3f0
[   99.594229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.599698]  kthread+0x328/0x630
[   99.602909]  ret_from_fork+0x10/0x20
[   99.606470] 
[   99.607955] CPU: 1 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   99.617848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   99.622007] Hardware name: WinLink E850-96 board (DT)
[   99.627043] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   99.289972] ==================================================================
[   99.290121] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   99.290121] 
[   99.290280] Use-after-free read at 0x(____ptrval____) (in kfence-#193):
[   99.291173]  test_memcache_typesafe_by_rcu+0x280/0x560
[   99.296294]  kunit_try_run_case+0x170/0x3f0
[   99.300461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.305929]  kthread+0x328/0x630
[   99.309141]  ret_from_fork+0x10/0x20
[   99.312700] 
[   99.314179] kfence-#193: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   99.314179] 
[   99.323293] allocated by task 384 on cpu 3 at 99.242331s (0.080959s ago):
[   99.330077]  test_alloc+0x230/0x628
[   99.333534]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   99.338655]  kunit_try_run_case+0x170/0x3f0
[   99.342821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.348290]  kthread+0x328/0x630
[   99.351502]  ret_from_fork+0x10/0x20
[   99.355063] 
[   99.356538] freed by task 384 on cpu 3 at 99.242346s (0.114190s ago):
[   99.362970]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   99.368081]  kunit_try_run_case+0x170/0x3f0
[   99.372248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   99.377717]  kthread+0x328/0x630
[   99.380929]  ret_from_fork+0x10/0x20
[   99.384489] 
[   99.385973] CPU: 3 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   99.395870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   99.400026] Hardware name: WinLink E850-96 board (DT)
[   99.405064] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   76.168295] ==================================================================
[   76.168492] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   76.168492] 
[   76.168644] Invalid read at 0x(____ptrval____):
[   76.169825]  test_invalid_access+0xdc/0x1f0
[   76.173965]  kunit_try_run_case+0x170/0x3f0
[   76.178115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.183584]  kthread+0x328/0x630
[   76.186795]  ret_from_fork+0x10/0x20
[   76.190357] 
[   76.191813] CPU: 7 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   76.201736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.205899] Hardware name: WinLink E850-96 board (DT)
[   76.210930] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   75.821159] ==================================================================
[   75.821303] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.821303] 
[   75.821452] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#188):
[   75.825134]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.830342]  kunit_try_run_case+0x170/0x3f0
[   75.834509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.839978]  kthread+0x328/0x630
[   75.843189]  ret_from_fork+0x10/0x20
[   75.846748] 
[   75.848227] kfence-#188: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   75.848227] 
[   75.857861] allocated by task 374 on cpu 0 at 75.821090s (0.036769s ago):
[   75.864642]  test_alloc+0x29c/0x628
[   75.868102]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   75.873223]  kunit_try_run_case+0x170/0x3f0
[   75.877390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.882859]  kthread+0x328/0x630
[   75.886070]  ret_from_fork+0x10/0x20
[   75.889631] 
[   75.891107] freed by task 374 on cpu 0 at 75.821107s (0.069997s ago):
[   75.897539]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   75.902737]  kunit_try_run_case+0x170/0x3f0
[   75.906903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.912372]  kthread+0x328/0x630
[   75.915584]  ret_from_fork+0x10/0x20
[   75.919145] 
[   75.920629] CPU: 0 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   75.930530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.934682] Hardware name: WinLink E850-96 board (DT)
[   75.939719] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   75.609133] ==================================================================
[   75.609274] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   75.609274] 
[   75.609429] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#186):
[   75.611111]  test_kmalloc_aligned_oob_read+0x238/0x468
[   75.616232]  kunit_try_run_case+0x170/0x3f0
[   75.620398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.625867]  kthread+0x328/0x630
[   75.629079]  ret_from_fork+0x10/0x20
[   75.632638] 
[   75.634117] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   75.634117] 
[   75.643751] allocated by task 372 on cpu 5 at 75.609096s (0.034653s ago):
[   75.650535]  test_alloc+0x29c/0x628
[   75.653992]  test_kmalloc_aligned_oob_read+0x100/0x468
[   75.659113]  kunit_try_run_case+0x170/0x3f0
[   75.663280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.668748]  kthread+0x328/0x630
[   75.671960]  ret_from_fork+0x10/0x20
[   75.675521] 
[   75.677005] CPU: 5 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   75.686900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.691059] Hardware name: WinLink E850-96 board (DT)
[   75.696094] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   70.665139] ==================================================================
[   70.665269] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   70.665269] 
[   70.665396] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#139):
[   70.667800]  test_corruption+0x278/0x378
[   70.671706]  kunit_try_run_case+0x170/0x3f0
[   70.675872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.681341]  kthread+0x328/0x630
[   70.684553]  ret_from_fork+0x10/0x20
[   70.688112] 
[   70.689591] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.689591] 
[   70.699225] allocated by task 360 on cpu 7 at 70.665076s (0.034146s ago):
[   70.706005]  test_alloc+0x29c/0x628
[   70.709466]  test_corruption+0xdc/0x378
[   70.713285]  kunit_try_run_case+0x170/0x3f0
[   70.717452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.722921]  kthread+0x328/0x630
[   70.726132]  ret_from_fork+0x10/0x20
[   70.729694] 
[   70.731168] freed by task 360 on cpu 7 at 70.665093s (0.066073s ago):
[   70.737600]  test_corruption+0x278/0x378
[   70.741497]  kunit_try_run_case+0x170/0x3f0
[   70.745663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.751133]  kthread+0x328/0x630
[   70.754344]  ret_from_fork+0x10/0x20
[   70.757904] 
[   70.759388] CPU: 7 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   70.769284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.773442] Hardware name: WinLink E850-96 board (DT)
[   70.778478] ==================================================================
[   71.317142] ==================================================================
[   71.317286] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   71.317286] 
[   71.317414] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#145):
[   71.319816]  test_corruption+0x120/0x378
[   71.323722]  kunit_try_run_case+0x170/0x3f0
[   71.327888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.333357]  kthread+0x328/0x630
[   71.336569]  ret_from_fork+0x10/0x20
[   71.340128] 
[   71.341606] kfence-#145: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.341606] 
[   71.350720] allocated by task 362 on cpu 3 at 71.317076s (0.033641s ago):
[   71.357501]  test_alloc+0x230/0x628
[   71.360963]  test_corruption+0xdc/0x378
[   71.364781]  kunit_try_run_case+0x170/0x3f0
[   71.368947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.374416]  kthread+0x328/0x630
[   71.377627]  ret_from_fork+0x10/0x20
[   71.381189] 
[   71.382664] freed by task 362 on cpu 3 at 71.317091s (0.065571s ago):
[   71.389097]  test_corruption+0x120/0x378
[   71.392992]  kunit_try_run_case+0x170/0x3f0
[   71.397158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.402627]  kthread+0x328/0x630
[   71.405839]  ret_from_fork+0x10/0x20
[   71.409399] 
[   71.410884] CPU: 3 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   71.420781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.424937] Hardware name: WinLink E850-96 board (DT)
[   71.429974] ==================================================================
[   70.993158] ==================================================================
[   70.993289] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   70.993289] 
[   70.993417] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#142):
[   70.993581]  test_corruption+0x284/0x378
[   70.997123]  kunit_try_run_case+0x170/0x3f0
[   71.001289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.006758]  kthread+0x328/0x630
[   71.009969]  ret_from_fork+0x10/0x20
[   71.013529] 
[   71.015008] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   71.015008] 
[   71.024642] allocated by task 360 on cpu 7 at 70.993094s (0.031545s ago):
[   71.031423]  test_alloc+0x29c/0x628
[   71.034882]  test_corruption+0x198/0x378
[   71.038789]  kunit_try_run_case+0x170/0x3f0
[   71.042955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.048424]  kthread+0x328/0x630
[   71.051636]  ret_from_fork+0x10/0x20
[   71.055198] 
[   71.056673] freed by task 360 on cpu 7 at 70.993110s (0.063559s ago):
[   71.063104]  test_corruption+0x284/0x378
[   71.067000]  kunit_try_run_case+0x170/0x3f0
[   71.071167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.076635]  kthread+0x328/0x630
[   71.079847]  ret_from_fork+0x10/0x20
[   71.083407] 
[   71.084892] CPU: 7 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   71.094787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.098945] Hardware name: WinLink E850-96 board (DT)
[   71.103982] ==================================================================
[   71.541148] ==================================================================
[   71.541289] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   71.541289] 
[   71.541418] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#147):
[   71.541578]  test_corruption+0x1d8/0x378
[   71.545122]  kunit_try_run_case+0x170/0x3f0
[   71.549288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.554757]  kthread+0x328/0x630
[   71.557969]  ret_from_fork+0x10/0x20
[   71.561527] 
[   71.563007] kfence-#147: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   71.563007] 
[   71.572120] allocated by task 362 on cpu 3 at 71.541082s (0.031036s ago):
[   71.578901]  test_alloc+0x230/0x628
[   71.582361]  test_corruption+0x198/0x378
[   71.586267]  kunit_try_run_case+0x170/0x3f0
[   71.590433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.595902]  kthread+0x328/0x630
[   71.599114]  ret_from_fork+0x10/0x20
[   71.602676] 
[   71.604151] freed by task 362 on cpu 3 at 71.541097s (0.063052s ago):
[   71.610583]  test_corruption+0x1d8/0x378
[   71.614478]  kunit_try_run_case+0x170/0x3f0
[   71.618645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.624114]  kthread+0x328/0x630
[   71.627326]  ret_from_fork+0x10/0x20
[   71.630886] 
[   71.632370] CPU: 3 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   71.642264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.646424] Hardware name: WinLink E850-96 board (DT)
[   71.651460] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   70.249125] ==================================================================
[   70.249261] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   70.249261] 
[   70.249397] Invalid free of 0x(____ptrval____) (in kfence-#135):
[   70.249501]  test_invalid_addr_free+0x1ac/0x238
[   70.253006]  kunit_try_run_case+0x170/0x3f0
[   70.257173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.262641]  kthread+0x328/0x630
[   70.265853]  ret_from_fork+0x10/0x20
[   70.269412] 
[   70.270891] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   70.270891] 
[   70.280525] allocated by task 356 on cpu 0 at 70.249077s (0.031446s ago):
[   70.287306]  test_alloc+0x29c/0x628
[   70.290766]  test_invalid_addr_free+0xd4/0x238
[   70.295193]  kunit_try_run_case+0x170/0x3f0
[   70.299361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.304828]  kthread+0x328/0x630
[   70.308040]  ret_from_fork+0x10/0x20
[   70.311601] 
[   70.313085] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   70.322980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.327138] Hardware name: WinLink E850-96 board (DT)
[   70.332176] ==================================================================
[   70.457124] ==================================================================
[   70.457254] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   70.457254] 
[   70.457382] Invalid free of 0x(____ptrval____) (in kfence-#137):
[   70.457485]  test_invalid_addr_free+0xec/0x238
[   70.460826]  kunit_try_run_case+0x170/0x3f0
[   70.464992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.470461]  kthread+0x328/0x630
[   70.473673]  ret_from_fork+0x10/0x20
[   70.477232] 
[   70.478711] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.478711] 
[   70.487824] allocated by task 358 on cpu 7 at 70.457079s (0.030742s ago):
[   70.494606]  test_alloc+0x230/0x628
[   70.498065]  test_invalid_addr_free+0xd4/0x238
[   70.502492]  kunit_try_run_case+0x170/0x3f0
[   70.506659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.512127]  kthread+0x328/0x630
[   70.515339]  ret_from_fork+0x10/0x20
[   70.518900] 
[   70.520383] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   70.530279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.534437] Hardware name: WinLink E850-96 board (DT)
[   70.539474] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   70.029142] ==================================================================
[   70.029272] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   70.029272] 
[   70.029400] Invalid free of 0x(____ptrval____) (in kfence-#133):
[   70.029502]  test_double_free+0x100/0x238
[   70.031977]  kunit_try_run_case+0x170/0x3f0
[   70.036143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.041612]  kthread+0x328/0x630
[   70.044823]  ret_from_fork+0x10/0x20
[   70.048383] 
[   70.049862] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   70.049862] 
[   70.058975] allocated by task 354 on cpu 1 at 70.029074s (0.029899s ago):
[   70.065758]  test_alloc+0x230/0x628
[   70.069215]  test_double_free+0xd4/0x238
[   70.073122]  kunit_try_run_case+0x170/0x3f0
[   70.077288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.082757]  kthread+0x328/0x630
[   70.085970]  ret_from_fork+0x10/0x20
[   70.089531] 
[   70.091004] freed by task 354 on cpu 1 at 70.029088s (0.061914s ago):
[   70.097442]  test_double_free+0xf0/0x238
[   70.101333]  kunit_try_run_case+0x170/0x3f0
[   70.105500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.110969]  kthread+0x328/0x630
[   70.114180]  ret_from_fork+0x10/0x20
[   70.117741] 
[   70.119226] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   70.129121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.133278] Hardware name: WinLink E850-96 board (DT)
[   70.138315] ==================================================================
[   69.809158] ==================================================================
[   69.809288] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   69.809288] 
[   69.809415] Invalid free of 0x(____ptrval____) (in kfence-#131):
[   69.809515]  test_double_free+0x1bc/0x238
[   69.811993]  kunit_try_run_case+0x170/0x3f0
[   69.816159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.821628]  kthread+0x328/0x630
[   69.824840]  ret_from_fork+0x10/0x20
[   69.828399] 
[   69.829878] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.829878] 
[   69.839512] allocated by task 352 on cpu 0 at 69.809082s (0.030428s ago):
[   69.846293]  test_alloc+0x29c/0x628
[   69.849753]  test_double_free+0xd4/0x238
[   69.853659]  kunit_try_run_case+0x170/0x3f0
[   69.857825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.863294]  kthread+0x328/0x630
[   69.866506]  ret_from_fork+0x10/0x20
[   69.870068] 
[   69.871543] freed by task 352 on cpu 0 at 69.809098s (0.062443s ago):
[   69.877978]  test_double_free+0x1ac/0x238
[   69.881957]  kunit_try_run_case+0x170/0x3f0
[   69.886124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.891594]  kthread+0x328/0x630
[   69.894804]  ret_from_fork+0x10/0x20
[   69.898364] 
[   69.899850] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   69.909745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.913903] Hardware name: WinLink E850-96 board (DT)
[   69.918939] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   69.377127] ==================================================================
[   69.377246] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   69.377246] 
[   69.377395] Use-after-free read at 0x(____ptrval____) (in kfence-#127):
[   69.377869]  test_use_after_free_read+0x114/0x248
[   69.382557]  kunit_try_run_case+0x170/0x3f0
[   69.386724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.392192]  kthread+0x328/0x630
[   69.395404]  ret_from_fork+0x10/0x20
[   69.398963] 
[   69.400442] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.400442] 
[   69.409555] allocated by task 346 on cpu 7 at 69.377074s (0.032479s ago):
[   69.416341]  test_alloc+0x230/0x628
[   69.419796]  test_use_after_free_read+0xd0/0x248
[   69.424397]  kunit_try_run_case+0x170/0x3f0
[   69.428565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.434032]  kthread+0x328/0x630
[   69.437244]  ret_from_fork+0x10/0x20
[   69.440805] 
[   69.442283] freed by task 346 on cpu 7 at 69.377089s (0.065190s ago):
[   69.448716]  test_use_after_free_read+0xf0/0x248
[   69.453303]  kunit_try_run_case+0x170/0x3f0
[   69.457469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.462938]  kthread+0x328/0x630
[   69.466150]  ret_from_fork+0x10/0x20
[   69.469710] 
[   69.471194] CPU: 7 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   69.481089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.485248] Hardware name: WinLink E850-96 board (DT)
[   69.490285] ==================================================================
[   69.153133] ==================================================================
[   69.153268] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   69.153268] 
[   69.153426] Use-after-free read at 0x(____ptrval____) (in kfence-#125):
[   69.153890]  test_use_after_free_read+0x114/0x248
[   69.158577]  kunit_try_run_case+0x170/0x3f0
[   69.162744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.168212]  kthread+0x328/0x630
[   69.171424]  ret_from_fork+0x10/0x20
[   69.174983] 
[   69.176462] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   69.176462] 
[   69.186096] allocated by task 344 on cpu 0 at 69.153078s (0.033016s ago):
[   69.192882]  test_alloc+0x29c/0x628
[   69.196337]  test_use_after_free_read+0xd0/0x248
[   69.200937]  kunit_try_run_case+0x170/0x3f0
[   69.205104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.210573]  kthread+0x328/0x630
[   69.213786]  ret_from_fork+0x10/0x20
[   69.217347] 
[   69.218823] freed by task 344 on cpu 0 at 69.153094s (0.065725s ago):
[   69.225256]  test_use_after_free_read+0x1c0/0x248
[   69.229932]  kunit_try_run_case+0x170/0x3f0
[   69.234097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.239566]  kthread+0x328/0x630
[   69.242777]  ret_from_fork+0x10/0x20
[   69.246338] 
[   69.247823] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   69.257718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.261876] Hardware name: WinLink E850-96 board (DT)
[   69.266912] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   68.945099] ==================================================================
[   68.945235] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.945235] 
[   68.945392] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#123):
[   68.946549]  test_out_of_bounds_write+0x100/0x240
[   68.951236]  kunit_try_run_case+0x170/0x3f0
[   68.955403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.960871]  kthread+0x328/0x630
[   68.964083]  ret_from_fork+0x10/0x20
[   68.967643] 
[   68.969121] kfence-#123: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.969121] 
[   68.978235] allocated by task 342 on cpu 1 at 68.945066s (0.033166s ago):
[   68.985021]  test_alloc+0x230/0x628
[   68.988476]  test_out_of_bounds_write+0xc8/0x240
[   68.993076]  kunit_try_run_case+0x170/0x3f0
[   68.997243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.002712]  kthread+0x328/0x630
[   69.005923]  ret_from_fork+0x10/0x20
[   69.009484] 
[   69.010968] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   69.020863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.025021] Hardware name: WinLink E850-96 board (DT)
[   69.030058] ==================================================================
[   68.737102] ==================================================================
[   68.737231] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   68.737231] 
[   68.737386] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#121):
[   68.738547]  test_out_of_bounds_write+0x100/0x240
[   68.743235]  kunit_try_run_case+0x170/0x3f0
[   68.747401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.752870]  kthread+0x328/0x630
[   68.756082]  ret_from_fork+0x10/0x20
[   68.759641] 
[   68.761119] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.761119] 
[   68.770754] allocated by task 340 on cpu 7 at 68.737069s (0.033683s ago):
[   68.777538]  test_alloc+0x29c/0x628
[   68.780995]  test_out_of_bounds_write+0xc8/0x240
[   68.785595]  kunit_try_run_case+0x170/0x3f0
[   68.789762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.795230]  kthread+0x328/0x630
[   68.798442]  ret_from_fork+0x10/0x20
[   68.802003] 
[   68.803487] CPU: 7 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   68.813384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.817540] Hardware name: WinLink E850-96 board (DT)
[   68.822577] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   67.177121] ==================================================================
[   67.177246] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.177246] 
[   67.177395] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#106):
[   67.178304]  test_out_of_bounds_read+0x114/0x3e0
[   67.182904]  kunit_try_run_case+0x170/0x3f0
[   67.187070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.192539]  kthread+0x328/0x630
[   67.195750]  ret_from_fork+0x10/0x20
[   67.199309] 
[   67.200789] kfence-#106: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.200789] 
[   67.210423] allocated by task 336 on cpu 6 at 67.177087s (0.033334s ago):
[   67.217207]  test_alloc+0x29c/0x628
[   67.220664]  test_out_of_bounds_read+0xdc/0x3e0
[   67.225177]  kunit_try_run_case+0x170/0x3f0
[   67.229344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.234813]  kthread+0x328/0x630
[   67.238024]  ret_from_fork+0x10/0x20
[   67.241585] 
[   67.243069] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   67.252963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.257122] Hardware name: WinLink E850-96 board (DT)
[   67.262159] ==================================================================
[   67.593113] ==================================================================
[   67.593242] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   67.593242] 
[   67.593393] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#110):
[   67.594472]  test_out_of_bounds_read+0x1c8/0x3e0
[   67.599071]  kunit_try_run_case+0x170/0x3f0
[   67.603238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.608706]  kthread+0x328/0x630
[   67.611918]  ret_from_fork+0x10/0x20
[   67.615477] 
[   67.616956] kfence-#110: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.616956] 
[   67.626590] allocated by task 336 on cpu 6 at 67.593080s (0.033508s ago):
[   67.633375]  test_alloc+0x29c/0x628
[   67.636831]  test_out_of_bounds_read+0x198/0x3e0
[   67.641431]  kunit_try_run_case+0x170/0x3f0
[   67.645598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.651066]  kthread+0x328/0x630
[   67.654278]  ret_from_fork+0x10/0x20
[   67.657839] 
[   67.659323] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   67.669217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.673377] Hardware name: WinLink E850-96 board (DT)
[   67.678414] ==================================================================
[   68.529094] ==================================================================
[   68.529236] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   68.529236] 
[   68.529389] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#119):
[   68.530465]  test_out_of_bounds_read+0x1c8/0x3e0
[   68.535064]  kunit_try_run_case+0x170/0x3f0
[   68.539231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.544700]  kthread+0x328/0x630
[   68.547912]  ret_from_fork+0x10/0x20
[   68.551470] 
[   68.552949] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.552949] 
[   68.562063] allocated by task 338 on cpu 0 at 68.529059s (0.033001s ago):
[   68.568846]  test_alloc+0x230/0x628
[   68.572304]  test_out_of_bounds_read+0x198/0x3e0
[   68.576904]  kunit_try_run_case+0x170/0x3f0
[   68.581072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.586539]  kthread+0x328/0x630
[   68.589751]  ret_from_fork+0x10/0x20
[   68.593312] 
[   68.594797] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   68.604691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.608849] Hardware name: WinLink E850-96 board (DT)
[   68.613886] ==================================================================
[   67.905092] ==================================================================
[   67.905234] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   67.905234] 
[   67.905388] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#113):
[   67.906290]  test_out_of_bounds_read+0x114/0x3e0
[   67.910888]  kunit_try_run_case+0x170/0x3f0
[   67.915055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.920524]  kthread+0x328/0x630
[   67.923736]  ret_from_fork+0x10/0x20
[   67.927294] 
[   67.928772] kfence-#113: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.928772] 
[   67.937887] allocated by task 338 on cpu 0 at 67.905058s (0.032827s ago):
[   67.944672]  test_alloc+0x230/0x628
[   67.948128]  test_out_of_bounds_read+0xdc/0x3e0
[   67.952641]  kunit_try_run_case+0x170/0x3f0
[   67.956808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.962277]  kthread+0x328/0x630
[   67.965488]  ret_from_fork+0x10/0x20
[   67.969049] 
[   67.970534] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   67.980430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.984587] Hardware name: WinLink E850-96 board (DT)
[   67.989624] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   20.750038] ==================================================================
[   20.772760] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   20.772760] 
[   20.782305] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#39):
[   20.790292]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.795499]  kunit_try_run_case+0x170/0x3f0
[   20.799666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.805135]  kthread+0x328/0x630
[   20.808346]  ret_from_fork+0x10/0x20
[   20.811905] 
[   20.813384] kfence-#39: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   20.813384] 
[   20.823107] allocated by task 191 on cpu 7 at 20.749682s (0.073423s ago):
[   20.829890]  kmalloc_track_caller_oob_right+0x184/0x488
[   20.835082]  kunit_try_run_case+0x170/0x3f0
[   20.839249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.844719]  kthread+0x328/0x630
[   20.847929]  ret_from_fork+0x10/0x20
[   20.851490] 
[   20.852966] freed by task 191 on cpu 7 at 20.749999s (0.102962s ago):
[   20.859399]  kmalloc_track_caller_oob_right+0x224/0x488
[   20.864595]  kunit_try_run_case+0x170/0x3f0
[   20.868762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.874231]  kthread+0x328/0x630
[   20.877442]  ret_from_fork+0x10/0x20
[   20.881003] 
[   20.882487] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.892383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.896541] Hardware name: WinLink E850-96 board (DT)
[   20.901578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   66.766749] ==================================================================
[   66.773850] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   66.780793] Write of size 1 at addr ffff000800dad678 by task kunit_try_catch/334
[   66.788170] 
[   66.789655] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   66.789708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.789726] Hardware name: WinLink E850-96 board (DT)
[   66.789746] Call trace:
[   66.789762]  show_stack+0x20/0x38 (C)
[   66.789798]  dump_stack_lvl+0x8c/0xd0
[   66.789837]  print_report+0x118/0x608
[   66.789868]  kasan_report+0xdc/0x128
[   66.789900]  __asan_report_store1_noabort+0x20/0x30
[   66.789935]  strncpy_from_user+0x270/0x2a0
[   66.789966]  copy_user_test_oob+0x5c0/0xec8
[   66.789995]  kunit_try_run_case+0x170/0x3f0
[   66.790032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.790071]  kthread+0x328/0x630
[   66.790104]  ret_from_fork+0x10/0x20
[   66.790140] 
[   66.856658] Allocated by task 334:
[   66.860044]  kasan_save_stack+0x3c/0x68
[   66.863863]  kasan_save_track+0x20/0x40
[   66.867683]  kasan_save_alloc_info+0x40/0x58
[   66.871936]  __kasan_kmalloc+0xd4/0xd8
[   66.875669]  __kmalloc_noprof+0x198/0x4c8
[   66.879662]  kunit_kmalloc_array+0x34/0x88
[   66.883741]  copy_user_test_oob+0xac/0xec8
[   66.887821]  kunit_try_run_case+0x170/0x3f0
[   66.891988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.897457]  kthread+0x328/0x630
[   66.900668]  ret_from_fork+0x10/0x20
[   66.904227] 
[   66.905703] The buggy address belongs to the object at ffff000800dad600
[   66.905703]  which belongs to the cache kmalloc-128 of size 128
[   66.918203] The buggy address is located 0 bytes to the right of
[   66.918203]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   66.931137] 
[   66.932616] The buggy address belongs to the physical page:
[   66.938170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   66.946154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.953793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.960737] page_type: f5(slab)
[   66.963873] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.971594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.979321] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.987132] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.994945] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   67.002757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   67.010562] page dumped because: kasan: bad access detected
[   67.016118] 
[   67.017593] Memory state around the buggy address:
[   67.022373]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.029577]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.036781] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   67.043982]                                                                 ^
[   67.051104]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.058309]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.065510] ==================================================================
[   66.457892] ==================================================================
[   66.465000] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   66.471855] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   66.479407] 
[   66.480892] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   66.480942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.480958] Hardware name: WinLink E850-96 board (DT)
[   66.480977] Call trace:
[   66.480990]  show_stack+0x20/0x38 (C)
[   66.481026]  dump_stack_lvl+0x8c/0xd0
[   66.481061]  print_report+0x118/0x608
[   66.481093]  kasan_report+0xdc/0x128
[   66.481122]  kasan_check_range+0x100/0x1a8
[   66.481156]  __kasan_check_write+0x20/0x30
[   66.481192]  strncpy_from_user+0x3c/0x2a0
[   66.481223]  copy_user_test_oob+0x5c0/0xec8
[   66.481253]  kunit_try_run_case+0x170/0x3f0
[   66.481290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.481329]  kthread+0x328/0x630
[   66.481365]  ret_from_fork+0x10/0x20
[   66.481401] 
[   66.551110] Allocated by task 334:
[   66.554494]  kasan_save_stack+0x3c/0x68
[   66.558312]  kasan_save_track+0x20/0x40
[   66.562132]  kasan_save_alloc_info+0x40/0x58
[   66.566385]  __kasan_kmalloc+0xd4/0xd8
[   66.570118]  __kmalloc_noprof+0x198/0x4c8
[   66.574111]  kunit_kmalloc_array+0x34/0x88
[   66.578190]  copy_user_test_oob+0xac/0xec8
[   66.582270]  kunit_try_run_case+0x170/0x3f0
[   66.586437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.591906]  kthread+0x328/0x630
[   66.595117]  ret_from_fork+0x10/0x20
[   66.598676] 
[   66.600152] The buggy address belongs to the object at ffff000800dad600
[   66.600152]  which belongs to the cache kmalloc-128 of size 128
[   66.612652] The buggy address is located 0 bytes inside of
[   66.612652]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   66.625065] 
[   66.626544] The buggy address belongs to the physical page:
[   66.632099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   66.640082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.647721] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.654665] page_type: f5(slab)
[   66.657802] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.665522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.673249] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.681060] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.688873] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   66.696685] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.704491] page dumped because: kasan: bad access detected
[   66.710048] 
[   66.711523] Memory state around the buggy address:
[   66.716303]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.723505]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.730709] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.737910]                                                                 ^
[   66.745032]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.752237]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.759438] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   64.933426] ==================================================================
[   64.940371] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   64.947399] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   64.954864] 
[   64.956350] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   64.956407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.956425] Hardware name: WinLink E850-96 board (DT)
[   64.956447] Call trace:
[   64.956461]  show_stack+0x20/0x38 (C)
[   64.956497]  dump_stack_lvl+0x8c/0xd0
[   64.956538]  print_report+0x118/0x608
[   64.956573]  kasan_report+0xdc/0x128
[   64.956603]  kasan_check_range+0x100/0x1a8
[   64.956638]  __kasan_check_read+0x20/0x30
[   64.956673]  copy_user_test_oob+0x728/0xec8
[   64.956704]  kunit_try_run_case+0x170/0x3f0
[   64.956741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.956782]  kthread+0x328/0x630
[   64.956817]  ret_from_fork+0x10/0x20
[   64.956854] 
[   65.022485] Allocated by task 334:
[   65.025872]  kasan_save_stack+0x3c/0x68
[   65.029689]  kasan_save_track+0x20/0x40
[   65.033509]  kasan_save_alloc_info+0x40/0x58
[   65.037763]  __kasan_kmalloc+0xd4/0xd8
[   65.041495]  __kmalloc_noprof+0x198/0x4c8
[   65.045488]  kunit_kmalloc_array+0x34/0x88
[   65.049567]  copy_user_test_oob+0xac/0xec8
[   65.053649]  kunit_try_run_case+0x170/0x3f0
[   65.057814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.063283]  kthread+0x328/0x630
[   65.066494]  ret_from_fork+0x10/0x20
[   65.070053] 
[   65.071529] The buggy address belongs to the object at ffff000800dad600
[   65.071529]  which belongs to the cache kmalloc-128 of size 128
[   65.084032] The buggy address is located 0 bytes inside of
[   65.084032]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   65.096442] 
[   65.097922] The buggy address belongs to the physical page:
[   65.103477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   65.111462] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.119100] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.126045] page_type: f5(slab)
[   65.129178] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.136900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.144626] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.152437] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.160250] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   65.168062] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.175867] page dumped because: kasan: bad access detected
[   65.181423] 
[   65.182899] Memory state around the buggy address:
[   65.187681]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.194882]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.202087] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.209288]                                                                 ^
[   65.216409]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.223614]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.230815] ==================================================================
[   64.623030] ==================================================================
[   64.635341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   64.642369] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   64.649922] 
[   64.651409] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   64.651465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.651483] Hardware name: WinLink E850-96 board (DT)
[   64.651505] Call trace:
[   64.651519]  show_stack+0x20/0x38 (C)
[   64.651558]  dump_stack_lvl+0x8c/0xd0
[   64.651599]  print_report+0x118/0x608
[   64.651631]  kasan_report+0xdc/0x128
[   64.651665]  kasan_check_range+0x100/0x1a8
[   64.651699]  __kasan_check_write+0x20/0x30
[   64.651733]  copy_user_test_oob+0x234/0xec8
[   64.651766]  kunit_try_run_case+0x170/0x3f0
[   64.651805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.651844]  kthread+0x328/0x630
[   64.651884]  ret_from_fork+0x10/0x20
[   64.651920] 
[   64.717628] Allocated by task 334:
[   64.721018]  kasan_save_stack+0x3c/0x68
[   64.724833]  kasan_save_track+0x20/0x40
[   64.728652]  kasan_save_alloc_info+0x40/0x58
[   64.732906]  __kasan_kmalloc+0xd4/0xd8
[   64.736639]  __kmalloc_noprof+0x198/0x4c8
[   64.740632]  kunit_kmalloc_array+0x34/0x88
[   64.744711]  copy_user_test_oob+0xac/0xec8
[   64.748791]  kunit_try_run_case+0x170/0x3f0
[   64.752957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.758426]  kthread+0x328/0x630
[   64.761638]  ret_from_fork+0x10/0x20
[   64.765197] 
[   64.766674] The buggy address belongs to the object at ffff000800dad600
[   64.766674]  which belongs to the cache kmalloc-128 of size 128
[   64.779174] The buggy address is located 0 bytes inside of
[   64.779174]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   64.791585] 
[   64.793066] The buggy address belongs to the physical page:
[   64.798621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   64.806606] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.814244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.821187] page_type: f5(slab)
[   64.824327] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.832043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.839771] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.847581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.855394] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   64.863206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.871011] page dumped because: kasan: bad access detected
[   64.876568] 
[   64.878042] Memory state around the buggy address:
[   64.882823]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.890027]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.897232] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.904431]                                                                 ^
[   64.911553]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.918757]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.925960] ==================================================================
[   65.543170] ==================================================================
[   65.550259] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   65.557286] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   65.564751] 
[   65.566236] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   65.566290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.566307] Hardware name: WinLink E850-96 board (DT)
[   65.566329] Call trace:
[   65.566344]  show_stack+0x20/0x38 (C)
[   65.566379]  dump_stack_lvl+0x8c/0xd0
[   65.566415]  print_report+0x118/0x608
[   65.566449]  kasan_report+0xdc/0x128
[   65.566480]  kasan_check_range+0x100/0x1a8
[   65.566514]  __kasan_check_read+0x20/0x30
[   65.566550]  copy_user_test_oob+0x3c8/0xec8
[   65.566581]  kunit_try_run_case+0x170/0x3f0
[   65.566618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.566658]  kthread+0x328/0x630
[   65.566690]  ret_from_fork+0x10/0x20
[   65.566726] 
[   65.632372] Allocated by task 334:
[   65.635760]  kasan_save_stack+0x3c/0x68
[   65.639576]  kasan_save_track+0x20/0x40
[   65.643396]  kasan_save_alloc_info+0x40/0x58
[   65.647649]  __kasan_kmalloc+0xd4/0xd8
[   65.651383]  __kmalloc_noprof+0x198/0x4c8
[   65.655375]  kunit_kmalloc_array+0x34/0x88
[   65.659455]  copy_user_test_oob+0xac/0xec8
[   65.663534]  kunit_try_run_case+0x170/0x3f0
[   65.667701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.673170]  kthread+0x328/0x630
[   65.676381]  ret_from_fork+0x10/0x20
[   65.679940] 
[   65.681416] The buggy address belongs to the object at ffff000800dad600
[   65.681416]  which belongs to the cache kmalloc-128 of size 128
[   65.693919] The buggy address is located 0 bytes inside of
[   65.693919]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   65.706329] 
[   65.707807] The buggy address belongs to the physical page:
[   65.713366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   65.721347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.728986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.735932] page_type: f5(slab)
[   65.739065] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.746786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.754513] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.762324] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.770137] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   65.777949] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.785755] page dumped because: kasan: bad access detected
[   65.791310] 
[   65.792785] Memory state around the buggy address:
[   65.797565]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.804769]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.811973] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.819174]                                                                 ^
[   65.826296]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.833501]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.840703] ==================================================================
[   65.238365] ==================================================================
[   65.245231] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   65.252256] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   65.259808] 
[   65.261293] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   65.261350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.261368] Hardware name: WinLink E850-96 board (DT)
[   65.261389] Call trace:
[   65.261404]  show_stack+0x20/0x38 (C)
[   65.261443]  dump_stack_lvl+0x8c/0xd0
[   65.261481]  print_report+0x118/0x608
[   65.261513]  kasan_report+0xdc/0x128
[   65.261546]  kasan_check_range+0x100/0x1a8
[   65.261581]  __kasan_check_write+0x20/0x30
[   65.261614]  copy_user_test_oob+0x35c/0xec8
[   65.261644]  kunit_try_run_case+0x170/0x3f0
[   65.261682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.261723]  kthread+0x328/0x630
[   65.261756]  ret_from_fork+0x10/0x20
[   65.261792] 
[   65.327514] Allocated by task 334:
[   65.330904]  kasan_save_stack+0x3c/0x68
[   65.334720]  kasan_save_track+0x20/0x40
[   65.338539]  kasan_save_alloc_info+0x40/0x58
[   65.342792]  __kasan_kmalloc+0xd4/0xd8
[   65.346526]  __kmalloc_noprof+0x198/0x4c8
[   65.350518]  kunit_kmalloc_array+0x34/0x88
[   65.354598]  copy_user_test_oob+0xac/0xec8
[   65.358677]  kunit_try_run_case+0x170/0x3f0
[   65.362844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.368313]  kthread+0x328/0x630
[   65.371525]  ret_from_fork+0x10/0x20
[   65.375084] 
[   65.376559] The buggy address belongs to the object at ffff000800dad600
[   65.376559]  which belongs to the cache kmalloc-128 of size 128
[   65.389062] The buggy address is located 0 bytes inside of
[   65.389062]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   65.401472] 
[   65.402951] The buggy address belongs to the physical page:
[   65.408508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   65.416489] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.424131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.431074] page_type: f5(slab)
[   65.434211] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.441930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.449656] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.457467] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.465280] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   65.473092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.480898] page dumped because: kasan: bad access detected
[   65.486453] 
[   65.487929] Memory state around the buggy address:
[   65.492710]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.499912]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.507116] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.514318]                                                                 ^
[   65.521440]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.528644]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.535845] ==================================================================
[   66.153052] ==================================================================
[   66.160144] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   66.167172] Read of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   66.174638] 
[   66.176122] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   66.176177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.176197] Hardware name: WinLink E850-96 board (DT)
[   66.176219] Call trace:
[   66.176232]  show_stack+0x20/0x38 (C)
[   66.176267]  dump_stack_lvl+0x8c/0xd0
[   66.176305]  print_report+0x118/0x608
[   66.176336]  kasan_report+0xdc/0x128
[   66.176367]  kasan_check_range+0x100/0x1a8
[   66.176400]  __kasan_check_read+0x20/0x30
[   66.176433]  copy_user_test_oob+0x4a0/0xec8
[   66.176463]  kunit_try_run_case+0x170/0x3f0
[   66.176501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.176539]  kthread+0x328/0x630
[   66.176573]  ret_from_fork+0x10/0x20
[   66.176606] 
[   66.242258] Allocated by task 334:
[   66.245645]  kasan_save_stack+0x3c/0x68
[   66.249463]  kasan_save_track+0x20/0x40
[   66.253282]  kasan_save_alloc_info+0x40/0x58
[   66.257536]  __kasan_kmalloc+0xd4/0xd8
[   66.261268]  __kmalloc_noprof+0x198/0x4c8
[   66.265261]  kunit_kmalloc_array+0x34/0x88
[   66.269341]  copy_user_test_oob+0xac/0xec8
[   66.273420]  kunit_try_run_case+0x170/0x3f0
[   66.277587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.283056]  kthread+0x328/0x630
[   66.286267]  ret_from_fork+0x10/0x20
[   66.289827] 
[   66.291302] The buggy address belongs to the object at ffff000800dad600
[   66.291302]  which belongs to the cache kmalloc-128 of size 128
[   66.303803] The buggy address is located 0 bytes inside of
[   66.303803]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   66.316215] 
[   66.317693] The buggy address belongs to the physical page:
[   66.323249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   66.331233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.338873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.345817] page_type: f5(slab)
[   66.348949] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.356673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.364400] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.372210] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.380024] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   66.387835] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.395641] page dumped because: kasan: bad access detected
[   66.401196] 
[   66.402672] Memory state around the buggy address:
[   66.407452]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.414655]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.421860] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.429061]                                                                 ^
[   66.436182]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.443389]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.450589] ==================================================================
[   65.848118] ==================================================================
[   65.855114] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   65.862142] Write of size 121 at addr ffff000800dad600 by task kunit_try_catch/334
[   65.869694] 
[   65.871179] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   65.871235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.871254] Hardware name: WinLink E850-96 board (DT)
[   65.871276] Call trace:
[   65.871290]  show_stack+0x20/0x38 (C)
[   65.871327]  dump_stack_lvl+0x8c/0xd0
[   65.871366]  print_report+0x118/0x608
[   65.871399]  kasan_report+0xdc/0x128
[   65.871431]  kasan_check_range+0x100/0x1a8
[   65.871463]  __kasan_check_write+0x20/0x30
[   65.871497]  copy_user_test_oob+0x434/0xec8
[   65.871527]  kunit_try_run_case+0x170/0x3f0
[   65.871566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.871604]  kthread+0x328/0x630
[   65.871640]  ret_from_fork+0x10/0x20
[   65.871674] 
[   65.937401] Allocated by task 334:
[   65.940788]  kasan_save_stack+0x3c/0x68
[   65.944606]  kasan_save_track+0x20/0x40
[   65.948425]  kasan_save_alloc_info+0x40/0x58
[   65.952679]  __kasan_kmalloc+0xd4/0xd8
[   65.956413]  __kmalloc_noprof+0x198/0x4c8
[   65.960405]  kunit_kmalloc_array+0x34/0x88
[   65.964485]  copy_user_test_oob+0xac/0xec8
[   65.968564]  kunit_try_run_case+0x170/0x3f0
[   65.972731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.978199]  kthread+0x328/0x630
[   65.981411]  ret_from_fork+0x10/0x20
[   65.984970] 
[   65.986446] The buggy address belongs to the object at ffff000800dad600
[   65.986446]  which belongs to the cache kmalloc-128 of size 128
[   65.998948] The buggy address is located 0 bytes inside of
[   65.998948]  allocated 120-byte region [ffff000800dad600, ffff000800dad678)
[   66.011359] 
[   66.012836] The buggy address belongs to the physical page:
[   66.018395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   66.026379] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.034017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.040959] page_type: f5(slab)
[   66.044095] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.051816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.059543] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.067354] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.075167] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   66.082979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.090785] page dumped because: kasan: bad access detected
[   66.096340] 
[   66.097816] Memory state around the buggy address:
[   66.102597]  ffff000800dad500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.109799]  ffff000800dad580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.117003] >ffff000800dad600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.124204]                                                                 ^
[   66.131327]  ffff000800dad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.138531]  ffff000800dad700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.145732] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   64.309905] ==================================================================
[   64.316772] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   64.324058] Write of size 8 at addr ffff000801936378 by task kunit_try_catch/330
[   64.331436] 
[   64.332922] CPU: 2 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   64.332973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.332989] Hardware name: WinLink E850-96 board (DT)
[   64.333010] Call trace:
[   64.333025]  show_stack+0x20/0x38 (C)
[   64.333060]  dump_stack_lvl+0x8c/0xd0
[   64.333100]  print_report+0x118/0x608
[   64.333134]  kasan_report+0xdc/0x128
[   64.333166]  kasan_check_range+0x100/0x1a8
[   64.333202]  __kasan_check_write+0x20/0x30
[   64.333238]  copy_to_kernel_nofault+0x8c/0x250
[   64.333270]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   64.333308]  kunit_try_run_case+0x170/0x3f0
[   64.333345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.333387]  kthread+0x328/0x630
[   64.333422]  ret_from_fork+0x10/0x20
[   64.333458] 
[   64.404265] Allocated by task 330:
[   64.407653]  kasan_save_stack+0x3c/0x68
[   64.411469]  kasan_save_track+0x20/0x40
[   64.415289]  kasan_save_alloc_info+0x40/0x58
[   64.419542]  __kasan_kmalloc+0xd4/0xd8
[   64.423275]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.427789]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.432564]  kunit_try_run_case+0x170/0x3f0
[   64.436729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.442198]  kthread+0x328/0x630
[   64.445410]  ret_from_fork+0x10/0x20
[   64.448969] 
[   64.450444] The buggy address belongs to the object at ffff000801936300
[   64.450444]  which belongs to the cache kmalloc-128 of size 128
[   64.462946] The buggy address is located 0 bytes to the right of
[   64.462946]  allocated 120-byte region [ffff000801936300, ffff000801936378)
[   64.475878] 
[   64.477358] The buggy address belongs to the physical page:
[   64.482915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881936
[   64.490897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.498536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.505478] page_type: f5(slab)
[   64.508614] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.516336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.524062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.531874] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.539687] head: 0bfffe0000000001 fffffdffe0064d81 00000000ffffffff 00000000ffffffff
[   64.547499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.555304] page dumped because: kasan: bad access detected
[   64.560860] 
[   64.562337] Memory state around the buggy address:
[   64.567116]  ffff000801936200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.574318]  ffff000801936280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.581523] >ffff000801936300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.588724]                                                                 ^
[   64.595845]  ffff000801936380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.603052]  ffff000801936400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.610251] ==================================================================
[   63.998053] ==================================================================
[   64.012174] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   64.019550] Read of size 8 at addr ffff000801936378 by task kunit_try_catch/330
[   64.026840] 
[   64.028328] CPU: 2 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   64.028383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.028403] Hardware name: WinLink E850-96 board (DT)
[   64.028428] Call trace:
[   64.028443]  show_stack+0x20/0x38 (C)
[   64.028483]  dump_stack_lvl+0x8c/0xd0
[   64.028522]  print_report+0x118/0x608
[   64.028558]  kasan_report+0xdc/0x128
[   64.028590]  __asan_report_load8_noabort+0x20/0x30
[   64.028626]  copy_to_kernel_nofault+0x204/0x250
[   64.028658]  copy_to_kernel_nofault_oob+0x158/0x418
[   64.028702]  kunit_try_run_case+0x170/0x3f0
[   64.028741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.028781]  kthread+0x328/0x630
[   64.028818]  ret_from_fork+0x10/0x20
[   64.028854] 
[   64.096371] Allocated by task 330:
[   64.099760]  kasan_save_stack+0x3c/0x68
[   64.103576]  kasan_save_track+0x20/0x40
[   64.107396]  kasan_save_alloc_info+0x40/0x58
[   64.111648]  __kasan_kmalloc+0xd4/0xd8
[   64.115380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.119894]  copy_to_kernel_nofault_oob+0xc8/0x418
[   64.124670]  kunit_try_run_case+0x170/0x3f0
[   64.128835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.134304]  kthread+0x328/0x630
[   64.137515]  ret_from_fork+0x10/0x20
[   64.141074] 
[   64.142551] The buggy address belongs to the object at ffff000801936300
[   64.142551]  which belongs to the cache kmalloc-128 of size 128
[   64.155052] The buggy address is located 0 bytes to the right of
[   64.155052]  allocated 120-byte region [ffff000801936300, ffff000801936378)
[   64.167983] 
[   64.169464] The buggy address belongs to the physical page:
[   64.175021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881936
[   64.183003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.190641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.197585] page_type: f5(slab)
[   64.200723] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.208441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.216168] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.223979] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.231792] head: 0bfffe0000000001 fffffdffe0064d81 00000000ffffffff 00000000ffffffff
[   64.239604] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.247409] page dumped because: kasan: bad access detected
[   64.252965] 
[   64.254442] Memory state around the buggy address:
[   64.259221]  ffff000801936200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.266424]  ffff000801936280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.273630] >ffff000801936300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.280829]                                                                 ^
[   64.287951]  ffff000801936380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.295157]  ffff000801936400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.302358] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   63.558711] ==================================================================
[   63.573117] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.579800] Read of size 1 at addr ffff800087b3d7f3 by task kunit_try_catch/318
[   63.587091] 
[   63.588578] CPU: 2 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.588636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.588652] Hardware name: WinLink E850-96 board (DT)
[   63.588676] Call trace:
[   63.588690]  show_stack+0x20/0x38 (C)
[   63.588730]  dump_stack_lvl+0x8c/0xd0
[   63.588769]  print_report+0x310/0x608
[   63.588803]  kasan_report+0xdc/0x128
[   63.588835]  __asan_report_load1_noabort+0x20/0x30
[   63.588874]  vmalloc_oob+0x578/0x5d0
[   63.588908]  kunit_try_run_case+0x170/0x3f0
[   63.588945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.588986]  kthread+0x328/0x630
[   63.589023]  ret_from_fork+0x10/0x20
[   63.589060] 
[   63.650809] The buggy address belongs to the virtual mapping at
[   63.650809]  [ffff800087b3d000, ffff800087b3f000) created by:
[   63.650809]  vmalloc_oob+0x98/0x5d0
[   63.665908] 
[   63.667388] The buggy address belongs to the physical page:
[   63.672944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886532
[   63.680927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.687451] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.695168] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.702886] page dumped because: kasan: bad access detected
[   63.708445] 
[   63.709917] Memory state around the buggy address:
[   63.714699]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.721900]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.729106] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.736306]                                                              ^
[   63.743169]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.750372]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.757575] ==================================================================
[   63.764906] ==================================================================
[   63.771987] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.778667] Read of size 1 at addr ffff800087b3d7f8 by task kunit_try_catch/318
[   63.785958] 
[   63.787443] CPU: 2 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.787495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.787511] Hardware name: WinLink E850-96 board (DT)
[   63.787533] Call trace:
[   63.787546]  show_stack+0x20/0x38 (C)
[   63.787584]  dump_stack_lvl+0x8c/0xd0
[   63.787622]  print_report+0x310/0x608
[   63.787654]  kasan_report+0xdc/0x128
[   63.787686]  __asan_report_load1_noabort+0x20/0x30
[   63.787722]  vmalloc_oob+0x51c/0x5d0
[   63.787754]  kunit_try_run_case+0x170/0x3f0
[   63.787796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.787837]  kthread+0x328/0x630
[   63.787874]  ret_from_fork+0x10/0x20
[   63.787907] 
[   63.849676] The buggy address belongs to the virtual mapping at
[   63.849676]  [ffff800087b3d000, ffff800087b3f000) created by:
[   63.849676]  vmalloc_oob+0x98/0x5d0
[   63.864778] 
[   63.866257] The buggy address belongs to the physical page:
[   63.871812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886532
[   63.879796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.886318] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.894036] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.901755] page dumped because: kasan: bad access detected
[   63.907312] 
[   63.908786] Memory state around the buggy address:
[   63.913566]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.920769]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.927974] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.935175]                                                                 ^
[   63.942298]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.949503]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.956703] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   48.558908] ==================================================================
[   48.565965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.573253] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.580631] 
[   48.582114] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.582161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.582178] Hardware name: WinLink E850-96 board (DT)
[   48.582197] Call trace:
[   48.582211]  show_stack+0x20/0x38 (C)
[   48.582244]  dump_stack_lvl+0x8c/0xd0
[   48.582280]  print_report+0x118/0x608
[   48.582310]  kasan_report+0xdc/0x128
[   48.582340]  kasan_check_range+0x100/0x1a8
[   48.582375]  __kasan_check_write+0x20/0x30
[   48.582408]  kasan_atomics_helper+0x3ac/0x4858
[   48.582438]  kasan_atomics+0x198/0x2e0
[   48.582465]  kunit_try_run_case+0x170/0x3f0
[   48.582501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.582542]  kthread+0x328/0x630
[   48.582577]  ret_from_fork+0x10/0x20
[   48.582609] 
[   48.652331] Allocated by task 314:
[   48.655718]  kasan_save_stack+0x3c/0x68
[   48.659536]  kasan_save_track+0x20/0x40
[   48.663355]  kasan_save_alloc_info+0x40/0x58
[   48.667609]  __kasan_kmalloc+0xd4/0xd8
[   48.671341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.675855]  kasan_atomics+0xb8/0x2e0
[   48.679501]  kunit_try_run_case+0x170/0x3f0
[   48.683668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.689136]  kthread+0x328/0x630
[   48.692348]  ret_from_fork+0x10/0x20
[   48.695907] 
[   48.697382] The buggy address belongs to the object at ffff000800d61a00
[   48.697382]  which belongs to the cache kmalloc-64 of size 64
[   48.709710] The buggy address is located 0 bytes to the right of
[   48.709710]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.722556] 
[   48.724033] The buggy address belongs to the physical page:
[   48.729589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   48.737576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.744083] page_type: f5(slab)
[   48.747219] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.754941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.762659] page dumped because: kasan: bad access detected
[   48.768215] 
[   48.769690] Memory state around the buggy address:
[   48.774471]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.781673]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.788878] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.796079]                                      ^
[   48.800857]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.808062]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.815263] ==================================================================
[   50.141179] ==================================================================
[   50.148232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.155521] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.162899] 
[   50.164381] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.164430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.164447] Hardware name: WinLink E850-96 board (DT)
[   50.164468] Call trace:
[   50.164479]  show_stack+0x20/0x38 (C)
[   50.164513]  dump_stack_lvl+0x8c/0xd0
[   50.164550]  print_report+0x118/0x608
[   50.164581]  kasan_report+0xdc/0x128
[   50.164611]  kasan_check_range+0x100/0x1a8
[   50.164642]  __kasan_check_write+0x20/0x30
[   50.164675]  kasan_atomics_helper+0x61c/0x4858
[   50.164705]  kasan_atomics+0x198/0x2e0
[   50.164732]  kunit_try_run_case+0x170/0x3f0
[   50.164767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.164806]  kthread+0x328/0x630
[   50.164838]  ret_from_fork+0x10/0x20
[   50.164873] 
[   50.234599] Allocated by task 314:
[   50.237984]  kasan_save_stack+0x3c/0x68
[   50.241804]  kasan_save_track+0x20/0x40
[   50.245623]  kasan_save_alloc_info+0x40/0x58
[   50.249877]  __kasan_kmalloc+0xd4/0xd8
[   50.253609]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.258123]  kasan_atomics+0xb8/0x2e0
[   50.261769]  kunit_try_run_case+0x170/0x3f0
[   50.265936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.271404]  kthread+0x328/0x630
[   50.274616]  ret_from_fork+0x10/0x20
[   50.278175] 
[   50.279650] The buggy address belongs to the object at ffff000800d61a00
[   50.279650]  which belongs to the cache kmalloc-64 of size 64
[   50.291977] The buggy address is located 0 bytes to the right of
[   50.291977]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.304824] 
[   50.306301] The buggy address belongs to the physical page:
[   50.311855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.319841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.326351] page_type: f5(slab)
[   50.329487] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.337208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.344927] page dumped because: kasan: bad access detected
[   50.350483] 
[   50.351958] Memory state around the buggy address:
[   50.356737]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.363941]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.371146] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.378347]                                      ^
[   50.383125]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.390330]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.397531] ==================================================================
[   53.038704] ==================================================================
[   53.045758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.053047] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.060425] 
[   53.061906] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.061952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.061968] Hardware name: WinLink E850-96 board (DT)
[   53.061987] Call trace:
[   53.062002]  show_stack+0x20/0x38 (C)
[   53.062035]  dump_stack_lvl+0x8c/0xd0
[   53.062071]  print_report+0x118/0x608
[   53.062102]  kasan_report+0xdc/0x128
[   53.062132]  kasan_check_range+0x100/0x1a8
[   53.062164]  __kasan_check_write+0x20/0x30
[   53.062199]  kasan_atomics_helper+0xad4/0x4858
[   53.062229]  kasan_atomics+0x198/0x2e0
[   53.062258]  kunit_try_run_case+0x170/0x3f0
[   53.062295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.062333]  kthread+0x328/0x630
[   53.062367]  ret_from_fork+0x10/0x20
[   53.062401] 
[   53.132125] Allocated by task 314:
[   53.135512]  kasan_save_stack+0x3c/0x68
[   53.139330]  kasan_save_track+0x20/0x40
[   53.143149]  kasan_save_alloc_info+0x40/0x58
[   53.147403]  __kasan_kmalloc+0xd4/0xd8
[   53.151135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.155649]  kasan_atomics+0xb8/0x2e0
[   53.159295]  kunit_try_run_case+0x170/0x3f0
[   53.163461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.168930]  kthread+0x328/0x630
[   53.172142]  ret_from_fork+0x10/0x20
[   53.175701] 
[   53.177176] The buggy address belongs to the object at ffff000800d61a00
[   53.177176]  which belongs to the cache kmalloc-64 of size 64
[   53.189503] The buggy address is located 0 bytes to the right of
[   53.189503]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.202349] 
[   53.203826] The buggy address belongs to the physical page:
[   53.209382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   53.217367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.223877] page_type: f5(slab)
[   53.227013] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.234735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.242453] page dumped because: kasan: bad access detected
[   53.248009] 
[   53.249484] Memory state around the buggy address:
[   53.254264]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.261467]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.268672] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.275873]                                      ^
[   53.280651]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.287856]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.295057] ==================================================================
[   55.398906] ==================================================================
[   55.405965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.413341] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.420633] 
[   55.422117] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.422165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.422181] Hardware name: WinLink E850-96 board (DT)
[   55.422198] Call trace:
[   55.422211]  show_stack+0x20/0x38 (C)
[   55.422244]  dump_stack_lvl+0x8c/0xd0
[   55.422280]  print_report+0x118/0x608
[   55.422309]  kasan_report+0xdc/0x128
[   55.422340]  __asan_report_load4_noabort+0x20/0x30
[   55.422375]  kasan_atomics_helper+0x3e04/0x4858
[   55.422403]  kasan_atomics+0x198/0x2e0
[   55.422431]  kunit_try_run_case+0x170/0x3f0
[   55.422467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.422507]  kthread+0x328/0x630
[   55.422540]  ret_from_fork+0x10/0x20
[   55.422571] 
[   55.489034] Allocated by task 314:
[   55.492420]  kasan_save_stack+0x3c/0x68
[   55.496239]  kasan_save_track+0x20/0x40
[   55.500058]  kasan_save_alloc_info+0x40/0x58
[   55.504312]  __kasan_kmalloc+0xd4/0xd8
[   55.508044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.512558]  kasan_atomics+0xb8/0x2e0
[   55.516204]  kunit_try_run_case+0x170/0x3f0
[   55.520371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.525839]  kthread+0x328/0x630
[   55.529051]  ret_from_fork+0x10/0x20
[   55.532610] 
[   55.534086] The buggy address belongs to the object at ffff000800d61a00
[   55.534086]  which belongs to the cache kmalloc-64 of size 64
[   55.546412] The buggy address is located 0 bytes to the right of
[   55.546412]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.559259] 
[   55.560735] The buggy address belongs to the physical page:
[   55.566291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.574276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.580786] page_type: f5(slab)
[   55.583922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.591643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.599362] page dumped because: kasan: bad access detected
[   55.604918] 
[   55.606393] Memory state around the buggy address:
[   55.611172]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.618376]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.625581] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.632782]                                      ^
[   55.637560]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.644764]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.651966] ==================================================================
[   62.238031] ==================================================================
[   62.245099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.252475] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   62.259853] 
[   62.261336] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.261386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.261401] Hardware name: WinLink E850-96 board (DT)
[   62.261420] Call trace:
[   62.261432]  show_stack+0x20/0x38 (C)
[   62.261463]  dump_stack_lvl+0x8c/0xd0
[   62.261498]  print_report+0x118/0x608
[   62.261528]  kasan_report+0xdc/0x128
[   62.261557]  kasan_check_range+0x100/0x1a8
[   62.261589]  __kasan_check_write+0x20/0x30
[   62.261622]  kasan_atomics_helper+0x16d0/0x4858
[   62.261652]  kasan_atomics+0x198/0x2e0
[   62.261680]  kunit_try_run_case+0x170/0x3f0
[   62.261717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.261757]  kthread+0x328/0x630
[   62.261790]  ret_from_fork+0x10/0x20
[   62.261823] 
[   62.331639] Allocated by task 314:
[   62.335026]  kasan_save_stack+0x3c/0x68
[   62.338844]  kasan_save_track+0x20/0x40
[   62.342663]  kasan_save_alloc_info+0x40/0x58
[   62.346917]  __kasan_kmalloc+0xd4/0xd8
[   62.350650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.355163]  kasan_atomics+0xb8/0x2e0
[   62.358809]  kunit_try_run_case+0x170/0x3f0
[   62.362976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.368445]  kthread+0x328/0x630
[   62.371656]  ret_from_fork+0x10/0x20
[   62.375215] 
[   62.376691] The buggy address belongs to the object at ffff000800d61a00
[   62.376691]  which belongs to the cache kmalloc-64 of size 64
[   62.389018] The buggy address is located 0 bytes to the right of
[   62.389018]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.401864] 
[   62.403342] The buggy address belongs to the physical page:
[   62.408896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.416882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.423392] page_type: f5(slab)
[   62.426527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.434249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.441968] page dumped because: kasan: bad access detected
[   62.447523] 
[   62.448999] Memory state around the buggy address:
[   62.453777]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.460982]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.468187] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.475387]                                      ^
[   62.480166]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.487370]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.494571] ==================================================================
[   63.026239] ==================================================================
[   63.033282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.040657] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   63.047948] 
[   63.049432] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.049482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.049498] Hardware name: WinLink E850-96 board (DT)
[   63.049517] Call trace:
[   63.049530]  show_stack+0x20/0x38 (C)
[   63.049562]  dump_stack_lvl+0x8c/0xd0
[   63.049598]  print_report+0x118/0x608
[   63.049628]  kasan_report+0xdc/0x128
[   63.049657]  __asan_report_load8_noabort+0x20/0x30
[   63.049692]  kasan_atomics_helper+0x3e20/0x4858
[   63.049722]  kasan_atomics+0x198/0x2e0
[   63.049752]  kunit_try_run_case+0x170/0x3f0
[   63.049788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.049828]  kthread+0x328/0x630
[   63.049861]  ret_from_fork+0x10/0x20
[   63.049896] 
[   63.116350] Allocated by task 314:
[   63.119737]  kasan_save_stack+0x3c/0x68
[   63.123555]  kasan_save_track+0x20/0x40
[   63.127374]  kasan_save_alloc_info+0x40/0x58
[   63.131628]  __kasan_kmalloc+0xd4/0xd8
[   63.135360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.139874]  kasan_atomics+0xb8/0x2e0
[   63.143520]  kunit_try_run_case+0x170/0x3f0
[   63.147686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.153155]  kthread+0x328/0x630
[   63.156367]  ret_from_fork+0x10/0x20
[   63.159926] 
[   63.161401] The buggy address belongs to the object at ffff000800d61a00
[   63.161401]  which belongs to the cache kmalloc-64 of size 64
[   63.173729] The buggy address is located 0 bytes to the right of
[   63.173729]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   63.186575] 
[   63.188052] The buggy address belongs to the physical page:
[   63.193608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   63.201592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.208102] page_type: f5(slab)
[   63.211237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.218960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.226678] page dumped because: kasan: bad access detected
[   63.232234] 
[   63.233709] Memory state around the buggy address:
[   63.238489]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.245692]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.252897] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.260098]                                      ^
[   63.264876]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.272081]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.279282] ==================================================================
[   46.983525] ==================================================================
[   46.990471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   46.997756] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.005047] 
[   47.006533] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.006594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.006611] Hardware name: WinLink E850-96 board (DT)
[   47.006633] Call trace:
[   47.006649]  show_stack+0x20/0x38 (C)
[   47.006684]  dump_stack_lvl+0x8c/0xd0
[   47.006726]  print_report+0x118/0x608
[   47.006757]  kasan_report+0xdc/0x128
[   47.006788]  kasan_check_range+0x100/0x1a8
[   47.006824]  __kasan_check_read+0x20/0x30
[   47.006857]  kasan_atomics_helper+0x1ec/0x4858
[   47.006889]  kasan_atomics+0x198/0x2e0
[   47.006918]  kunit_try_run_case+0x170/0x3f0
[   47.006957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.006997]  kthread+0x328/0x630
[   47.007033]  ret_from_fork+0x10/0x20
[   47.007069] 
[   47.076661] Allocated by task 314:
[   47.080049]  kasan_save_stack+0x3c/0x68
[   47.083865]  kasan_save_track+0x20/0x40
[   47.087685]  kasan_save_alloc_info+0x40/0x58
[   47.091938]  __kasan_kmalloc+0xd4/0xd8
[   47.095671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.100184]  kasan_atomics+0xb8/0x2e0
[   47.103830]  kunit_try_run_case+0x170/0x3f0
[   47.107997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.113466]  kthread+0x328/0x630
[   47.116677]  ret_from_fork+0x10/0x20
[   47.120236] 
[   47.121712] The buggy address belongs to the object at ffff000800d61a00
[   47.121712]  which belongs to the cache kmalloc-64 of size 64
[   47.134042] The buggy address is located 0 bytes to the right of
[   47.134042]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.146885] 
[   47.148363] The buggy address belongs to the physical page:
[   47.153921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.161905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.168413] page_type: f5(slab)
[   47.171552] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.179270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.186989] page dumped because: kasan: bad access detected
[   47.192545] 
[   47.194020] Memory state around the buggy address:
[   47.198802]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.206003]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.213208] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.220408]                                      ^
[   47.225186]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.232391]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.239592] ==================================================================
[   47.510722] ==================================================================
[   47.517716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.525005] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.532297] 
[   47.533781] CPU: 6 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.533839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.533855] Hardware name: WinLink E850-96 board (DT)
[   47.533879] Call trace:
[   47.533893]  show_stack+0x20/0x38 (C)
[   47.533928]  dump_stack_lvl+0x8c/0xd0
[   47.533967]  print_report+0x118/0x608
[   47.533996]  kasan_report+0xdc/0x128
[   47.534028]  kasan_check_range+0x100/0x1a8
[   47.534064]  __kasan_check_read+0x20/0x30
[   47.534096]  kasan_atomics_helper+0x2b0/0x4858
[   47.534128]  kasan_atomics+0x198/0x2e0
[   47.534156]  kunit_try_run_case+0x170/0x3f0
[   47.534192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.534233]  kthread+0x328/0x630
[   47.534265]  ret_from_fork+0x10/0x20
[   47.534303] 
[   47.603910] Allocated by task 314:
[   47.607299]  kasan_save_stack+0x3c/0x68
[   47.611115]  kasan_save_track+0x20/0x40
[   47.614933]  kasan_save_alloc_info+0x40/0x58
[   47.619187]  __kasan_kmalloc+0xd4/0xd8
[   47.622920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.627433]  kasan_atomics+0xb8/0x2e0
[   47.631079]  kunit_try_run_case+0x170/0x3f0
[   47.635246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.640714]  kthread+0x328/0x630
[   47.643926]  ret_from_fork+0x10/0x20
[   47.647485] 
[   47.648962] The buggy address belongs to the object at ffff000800d61a00
[   47.648962]  which belongs to the cache kmalloc-64 of size 64
[   47.661289] The buggy address is located 0 bytes to the right of
[   47.661289]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.674134] 
[   47.675613] The buggy address belongs to the physical page:
[   47.681169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.689154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.695662] page_type: f5(slab)
[   47.698800] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.706519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.714238] page dumped because: kasan: bad access detected
[   47.719793] 
[   47.721268] Memory state around the buggy address:
[   47.726048]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.733252]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.740456] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.747657]                                      ^
[   47.752435]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.759640]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.766842] ==================================================================
[   53.562816] ==================================================================
[   53.569880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.577171] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.584549] 
[   53.586032] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.586081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.586096] Hardware name: WinLink E850-96 board (DT)
[   53.586116] Call trace:
[   53.586128]  show_stack+0x20/0x38 (C)
[   53.586159]  dump_stack_lvl+0x8c/0xd0
[   53.586197]  print_report+0x118/0x608
[   53.586227]  kasan_report+0xdc/0x128
[   53.586255]  kasan_check_range+0x100/0x1a8
[   53.586286]  __kasan_check_write+0x20/0x30
[   53.586319]  kasan_atomics_helper+0xb70/0x4858
[   53.586350]  kasan_atomics+0x198/0x2e0
[   53.586378]  kunit_try_run_case+0x170/0x3f0
[   53.586413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.586453]  kthread+0x328/0x630
[   53.586485]  ret_from_fork+0x10/0x20
[   53.586519] 
[   53.656249] Allocated by task 314:
[   53.659636]  kasan_save_stack+0x3c/0x68
[   53.663454]  kasan_save_track+0x20/0x40
[   53.667273]  kasan_save_alloc_info+0x40/0x58
[   53.671527]  __kasan_kmalloc+0xd4/0xd8
[   53.675259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.679773]  kasan_atomics+0xb8/0x2e0
[   53.683419]  kunit_try_run_case+0x170/0x3f0
[   53.687586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.693054]  kthread+0x328/0x630
[   53.696266]  ret_from_fork+0x10/0x20
[   53.699825] 
[   53.701301] The buggy address belongs to the object at ffff000800d61a00
[   53.701301]  which belongs to the cache kmalloc-64 of size 64
[   53.713627] The buggy address is located 0 bytes to the right of
[   53.713627]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.726473] 
[   53.727951] The buggy address belongs to the physical page:
[   53.733506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   53.741491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.748001] page_type: f5(slab)
[   53.751136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.758859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.766577] page dumped because: kasan: bad access detected
[   53.772133] 
[   53.773608] Memory state around the buggy address:
[   53.778388]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.785591]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.792796] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.799997]                                      ^
[   53.804775]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.811980]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.819181] ==================================================================
[   51.195986] ==================================================================
[   51.203076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.210366] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   51.217744] 
[   51.219227] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   51.219275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.219290] Hardware name: WinLink E850-96 board (DT)
[   51.219308] Call trace:
[   51.219320]  show_stack+0x20/0x38 (C)
[   51.219350]  dump_stack_lvl+0x8c/0xd0
[   51.219387]  print_report+0x118/0x608
[   51.219418]  kasan_report+0xdc/0x128
[   51.219448]  kasan_check_range+0x100/0x1a8
[   51.219479]  __kasan_check_write+0x20/0x30
[   51.219513]  kasan_atomics_helper+0x7cc/0x4858
[   51.219543]  kasan_atomics+0x198/0x2e0
[   51.219571]  kunit_try_run_case+0x170/0x3f0
[   51.219607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.219646]  kthread+0x328/0x630
[   51.219679]  ret_from_fork+0x10/0x20
[   51.219709] 
[   51.289444] Allocated by task 314:
[   51.292830]  kasan_save_stack+0x3c/0x68
[   51.296649]  kasan_save_track+0x20/0x40
[   51.300469]  kasan_save_alloc_info+0x40/0x58
[   51.304722]  __kasan_kmalloc+0xd4/0xd8
[   51.308454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.312968]  kasan_atomics+0xb8/0x2e0
[   51.316614]  kunit_try_run_case+0x170/0x3f0
[   51.320781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.326249]  kthread+0x328/0x630
[   51.329461]  ret_from_fork+0x10/0x20
[   51.333020] 
[   51.334496] The buggy address belongs to the object at ffff000800d61a00
[   51.334496]  which belongs to the cache kmalloc-64 of size 64
[   51.346822] The buggy address is located 0 bytes to the right of
[   51.346822]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.359669] 
[   51.361146] The buggy address belongs to the physical page:
[   51.366702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.374686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.381196] page_type: f5(slab)
[   51.384330] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.392054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.399773] page dumped because: kasan: bad access detected
[   51.405328] 
[   51.406804] Memory state around the buggy address:
[   51.411583]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.418787]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.425991] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.433192]                                      ^
[   51.437970]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.445175]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.452376] ==================================================================
[   55.135218] ==================================================================
[   55.142253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.149543] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.156921] 
[   55.158406] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.158455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.158469] Hardware name: WinLink E850-96 board (DT)
[   55.158486] Call trace:
[   55.158498]  show_stack+0x20/0x38 (C)
[   55.158530]  dump_stack_lvl+0x8c/0xd0
[   55.158565]  print_report+0x118/0x608
[   55.158597]  kasan_report+0xdc/0x128
[   55.158627]  kasan_check_range+0x100/0x1a8
[   55.158660]  __kasan_check_write+0x20/0x30
[   55.158693]  kasan_atomics_helper+0xd3c/0x4858
[   55.158725]  kasan_atomics+0x198/0x2e0
[   55.158755]  kunit_try_run_case+0x170/0x3f0
[   55.158789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.158828]  kthread+0x328/0x630
[   55.158858]  ret_from_fork+0x10/0x20
[   55.158891] 
[   55.228621] Allocated by task 314:
[   55.232008]  kasan_save_stack+0x3c/0x68
[   55.235826]  kasan_save_track+0x20/0x40
[   55.239646]  kasan_save_alloc_info+0x40/0x58
[   55.243899]  __kasan_kmalloc+0xd4/0xd8
[   55.247631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.252145]  kasan_atomics+0xb8/0x2e0
[   55.255791]  kunit_try_run_case+0x170/0x3f0
[   55.259958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.265426]  kthread+0x328/0x630
[   55.268638]  ret_from_fork+0x10/0x20
[   55.272197] 
[   55.273673] The buggy address belongs to the object at ffff000800d61a00
[   55.273673]  which belongs to the cache kmalloc-64 of size 64
[   55.285999] The buggy address is located 0 bytes to the right of
[   55.285999]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.298846] 
[   55.300322] The buggy address belongs to the physical page:
[   55.305878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.313863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.320373] page_type: f5(slab)
[   55.323507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.331231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.338950] page dumped because: kasan: bad access detected
[   55.344505] 
[   55.345981] Memory state around the buggy address:
[   55.350760]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.357964]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.365168] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.372369]                                      ^
[   55.377147]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.384352]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.391553] ==================================================================
[   59.081807] ==================================================================
[   59.088896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.096272] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.103650] 
[   59.105136] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.105184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.105202] Hardware name: WinLink E850-96 board (DT)
[   59.105221] Call trace:
[   59.105233]  show_stack+0x20/0x38 (C)
[   59.105264]  dump_stack_lvl+0x8c/0xd0
[   59.105297]  print_report+0x118/0x608
[   59.105329]  kasan_report+0xdc/0x128
[   59.105359]  kasan_check_range+0x100/0x1a8
[   59.105390]  __kasan_check_write+0x20/0x30
[   59.105423]  kasan_atomics_helper+0x126c/0x4858
[   59.105453]  kasan_atomics+0x198/0x2e0
[   59.105480]  kunit_try_run_case+0x170/0x3f0
[   59.105516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.105554]  kthread+0x328/0x630
[   59.105587]  ret_from_fork+0x10/0x20
[   59.105617] 
[   59.175437] Allocated by task 314:
[   59.178824]  kasan_save_stack+0x3c/0x68
[   59.182642]  kasan_save_track+0x20/0x40
[   59.186461]  kasan_save_alloc_info+0x40/0x58
[   59.190715]  __kasan_kmalloc+0xd4/0xd8
[   59.194447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.198961]  kasan_atomics+0xb8/0x2e0
[   59.202607]  kunit_try_run_case+0x170/0x3f0
[   59.206773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.212242]  kthread+0x328/0x630
[   59.215454]  ret_from_fork+0x10/0x20
[   59.219013] 
[   59.220489] The buggy address belongs to the object at ffff000800d61a00
[   59.220489]  which belongs to the cache kmalloc-64 of size 64
[   59.232815] The buggy address is located 0 bytes to the right of
[   59.232815]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   59.245662] 
[   59.247139] The buggy address belongs to the physical page:
[   59.252693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   59.260679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.267189] page_type: f5(slab)
[   59.270324] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.278047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.285765] page dumped because: kasan: bad access detected
[   59.291321] 
[   59.292796] Memory state around the buggy address:
[   59.297576]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.304779]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.311984] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.319185]                                      ^
[   59.323963]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.331168]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.338369] ==================================================================
[   49.350031] ==================================================================
[   49.357097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.364387] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.371765] 
[   49.373248] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.373297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.373315] Hardware name: WinLink E850-96 board (DT)
[   49.373331] Call trace:
[   49.373344]  show_stack+0x20/0x38 (C)
[   49.373374]  dump_stack_lvl+0x8c/0xd0
[   49.373412]  print_report+0x118/0x608
[   49.373442]  kasan_report+0xdc/0x128
[   49.373471]  kasan_check_range+0x100/0x1a8
[   49.373504]  __kasan_check_write+0x20/0x30
[   49.373537]  kasan_atomics_helper+0x4e4/0x4858
[   49.373568]  kasan_atomics+0x198/0x2e0
[   49.373596]  kunit_try_run_case+0x170/0x3f0
[   49.373632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.373672]  kthread+0x328/0x630
[   49.373706]  ret_from_fork+0x10/0x20
[   49.373739] 
[   49.443465] Allocated by task 314:
[   49.446851]  kasan_save_stack+0x3c/0x68
[   49.450670]  kasan_save_track+0x20/0x40
[   49.454489]  kasan_save_alloc_info+0x40/0x58
[   49.458743]  __kasan_kmalloc+0xd4/0xd8
[   49.462475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.466989]  kasan_atomics+0xb8/0x2e0
[   49.470635]  kunit_try_run_case+0x170/0x3f0
[   49.474801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.480270]  kthread+0x328/0x630
[   49.483482]  ret_from_fork+0x10/0x20
[   49.487041] 
[   49.488516] The buggy address belongs to the object at ffff000800d61a00
[   49.488516]  which belongs to the cache kmalloc-64 of size 64
[   49.500843] The buggy address is located 0 bytes to the right of
[   49.500843]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   49.513690] 
[   49.515167] The buggy address belongs to the physical page:
[   49.520723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.528707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.535217] page_type: f5(slab)
[   49.538353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.546075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.553794] page dumped because: kasan: bad access detected
[   49.559349] 
[   49.560824] Memory state around the buggy address:
[   49.565603]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.572807]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.580012] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.587213]                                      ^
[   49.591991]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.599196]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.606397] ==================================================================
[   58.554061] ==================================================================
[   58.561125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.568502] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.575880] 
[   58.577365] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.577415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.577431] Hardware name: WinLink E850-96 board (DT)
[   58.577454] Call trace:
[   58.577466]  show_stack+0x20/0x38 (C)
[   58.577498]  dump_stack_lvl+0x8c/0xd0
[   58.577534]  print_report+0x118/0x608
[   58.577566]  kasan_report+0xdc/0x128
[   58.577595]  kasan_check_range+0x100/0x1a8
[   58.577626]  __kasan_check_write+0x20/0x30
[   58.577660]  kasan_atomics_helper+0x1190/0x4858
[   58.577691]  kasan_atomics+0x198/0x2e0
[   58.577718]  kunit_try_run_case+0x170/0x3f0
[   58.577754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.577793]  kthread+0x328/0x630
[   58.577826]  ret_from_fork+0x10/0x20
[   58.577859] 
[   58.647667] Allocated by task 314:
[   58.651055]  kasan_save_stack+0x3c/0x68
[   58.654872]  kasan_save_track+0x20/0x40
[   58.658692]  kasan_save_alloc_info+0x40/0x58
[   58.662945]  __kasan_kmalloc+0xd4/0xd8
[   58.666677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.671191]  kasan_atomics+0xb8/0x2e0
[   58.674837]  kunit_try_run_case+0x170/0x3f0
[   58.679004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.684472]  kthread+0x328/0x630
[   58.687684]  ret_from_fork+0x10/0x20
[   58.691243] 
[   58.692719] The buggy address belongs to the object at ffff000800d61a00
[   58.692719]  which belongs to the cache kmalloc-64 of size 64
[   58.705045] The buggy address is located 0 bytes to the right of
[   58.705045]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.717892] 
[   58.719369] The buggy address belongs to the physical page:
[   58.724924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.732909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.739419] page_type: f5(slab)
[   58.742554] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.750277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.757995] page dumped because: kasan: bad access detected
[   58.763551] 
[   58.765026] Memory state around the buggy address:
[   58.769805]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.777010]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.784214] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.791415]                                      ^
[   58.796193]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.803398]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.810599] ==================================================================
[   52.511241] ==================================================================
[   52.518335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.525624] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.533002] 
[   52.534485] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.534531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.534547] Hardware name: WinLink E850-96 board (DT)
[   52.534565] Call trace:
[   52.534578]  show_stack+0x20/0x38 (C)
[   52.534609]  dump_stack_lvl+0x8c/0xd0
[   52.534644]  print_report+0x118/0x608
[   52.534673]  kasan_report+0xdc/0x128
[   52.534701]  kasan_check_range+0x100/0x1a8
[   52.534733]  __kasan_check_write+0x20/0x30
[   52.534765]  kasan_atomics_helper+0xa04/0x4858
[   52.534796]  kasan_atomics+0x198/0x2e0
[   52.534823]  kunit_try_run_case+0x170/0x3f0
[   52.534857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.534896]  kthread+0x328/0x630
[   52.534931]  ret_from_fork+0x10/0x20
[   52.534962] 
[   52.604702] Allocated by task 314:
[   52.608088]  kasan_save_stack+0x3c/0x68
[   52.611907]  kasan_save_track+0x20/0x40
[   52.615727]  kasan_save_alloc_info+0x40/0x58
[   52.619980]  __kasan_kmalloc+0xd4/0xd8
[   52.623713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.628226]  kasan_atomics+0xb8/0x2e0
[   52.631872]  kunit_try_run_case+0x170/0x3f0
[   52.636039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.641508]  kthread+0x328/0x630
[   52.644719]  ret_from_fork+0x10/0x20
[   52.648278] 
[   52.649754] The buggy address belongs to the object at ffff000800d61a00
[   52.649754]  which belongs to the cache kmalloc-64 of size 64
[   52.662080] The buggy address is located 0 bytes to the right of
[   52.662080]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.674927] 
[   52.676403] The buggy address belongs to the physical page:
[   52.681959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.689944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.696454] page_type: f5(slab)
[   52.699589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.707312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.715031] page dumped because: kasan: bad access detected
[   52.720586] 
[   52.722061] Memory state around the buggy address:
[   52.726841]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.734045]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.741249] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.748450]                                      ^
[   52.753228]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.760433]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.767634] ==================================================================
[   49.877481] ==================================================================
[   49.884520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.891810] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.899188] 
[   49.900670] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.900718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.900735] Hardware name: WinLink E850-96 board (DT)
[   49.900753] Call trace:
[   49.900767]  show_stack+0x20/0x38 (C)
[   49.900799]  dump_stack_lvl+0x8c/0xd0
[   49.900835]  print_report+0x118/0x608
[   49.900865]  kasan_report+0xdc/0x128
[   49.900896]  kasan_check_range+0x100/0x1a8
[   49.900927]  __kasan_check_write+0x20/0x30
[   49.900961]  kasan_atomics_helper+0x5b4/0x4858
[   49.900992]  kasan_atomics+0x198/0x2e0
[   49.901020]  kunit_try_run_case+0x170/0x3f0
[   49.901054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.901094]  kthread+0x328/0x630
[   49.901127]  ret_from_fork+0x10/0x20
[   49.901161] 
[   49.970888] Allocated by task 314:
[   49.974275]  kasan_save_stack+0x3c/0x68
[   49.978092]  kasan_save_track+0x20/0x40
[   49.981912]  kasan_save_alloc_info+0x40/0x58
[   49.986165]  __kasan_kmalloc+0xd4/0xd8
[   49.989898]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.994412]  kasan_atomics+0xb8/0x2e0
[   49.998058]  kunit_try_run_case+0x170/0x3f0
[   50.002224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.007693]  kthread+0x328/0x630
[   50.010905]  ret_from_fork+0x10/0x20
[   50.014463] 
[   50.015939] The buggy address belongs to the object at ffff000800d61a00
[   50.015939]  which belongs to the cache kmalloc-64 of size 64
[   50.028266] The buggy address is located 0 bytes to the right of
[   50.028266]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.041112] 
[   50.042590] The buggy address belongs to the physical page:
[   50.048144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.056130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.062640] page_type: f5(slab)
[   50.065775] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.073497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.081216] page dumped because: kasan: bad access detected
[   50.086771] 
[   50.088247] Memory state around the buggy address:
[   50.093027]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.100230]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.107435] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.114636]                                      ^
[   50.119414]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.126619]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.133819] ==================================================================
[   50.404900] ==================================================================
[   50.411941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.419232] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.426610] 
[   50.428096] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.428144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.428161] Hardware name: WinLink E850-96 board (DT)
[   50.428178] Call trace:
[   50.428191]  show_stack+0x20/0x38 (C)
[   50.428224]  dump_stack_lvl+0x8c/0xd0
[   50.428261]  print_report+0x118/0x608
[   50.428290]  kasan_report+0xdc/0x128
[   50.428319]  kasan_check_range+0x100/0x1a8
[   50.428350]  __kasan_check_write+0x20/0x30
[   50.428383]  kasan_atomics_helper+0x684/0x4858
[   50.428415]  kasan_atomics+0x198/0x2e0
[   50.428443]  kunit_try_run_case+0x170/0x3f0
[   50.428478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.428518]  kthread+0x328/0x630
[   50.428550]  ret_from_fork+0x10/0x20
[   50.428581] 
[   50.498310] Allocated by task 314:
[   50.501696]  kasan_save_stack+0x3c/0x68
[   50.505515]  kasan_save_track+0x20/0x40
[   50.509335]  kasan_save_alloc_info+0x40/0x58
[   50.513588]  __kasan_kmalloc+0xd4/0xd8
[   50.517320]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.521834]  kasan_atomics+0xb8/0x2e0
[   50.525480]  kunit_try_run_case+0x170/0x3f0
[   50.529647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.535115]  kthread+0x328/0x630
[   50.538327]  ret_from_fork+0x10/0x20
[   50.541886] 
[   50.543362] The buggy address belongs to the object at ffff000800d61a00
[   50.543362]  which belongs to the cache kmalloc-64 of size 64
[   50.555688] The buggy address is located 0 bytes to the right of
[   50.555688]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.568535] 
[   50.570012] The buggy address belongs to the physical page:
[   50.575568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.583552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.590063] page_type: f5(slab)
[   50.593199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.600920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.608639] page dumped because: kasan: bad access detected
[   50.614194] 
[   50.615670] Memory state around the buggy address:
[   50.620448]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.627653]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.634858] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.642058]                                      ^
[   50.646836]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.654041]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.661242] ==================================================================
[   54.350621] ==================================================================
[   54.357716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.365093] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.372384] 
[   54.373868] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.373914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.373932] Hardware name: WinLink E850-96 board (DT)
[   54.373950] Call trace:
[   54.373963]  show_stack+0x20/0x38 (C)
[   54.373992]  dump_stack_lvl+0x8c/0xd0
[   54.374027]  print_report+0x118/0x608
[   54.374055]  kasan_report+0xdc/0x128
[   54.374086]  __asan_report_load4_noabort+0x20/0x30
[   54.374121]  kasan_atomics_helper+0x3de4/0x4858
[   54.374150]  kasan_atomics+0x198/0x2e0
[   54.374178]  kunit_try_run_case+0x170/0x3f0
[   54.374212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.374251]  kthread+0x328/0x630
[   54.374286]  ret_from_fork+0x10/0x20
[   54.374317] 
[   54.440786] Allocated by task 314:
[   54.444173]  kasan_save_stack+0x3c/0x68
[   54.447990]  kasan_save_track+0x20/0x40
[   54.451810]  kasan_save_alloc_info+0x40/0x58
[   54.456064]  __kasan_kmalloc+0xd4/0xd8
[   54.459796]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.464310]  kasan_atomics+0xb8/0x2e0
[   54.467956]  kunit_try_run_case+0x170/0x3f0
[   54.472122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.477591]  kthread+0x328/0x630
[   54.480803]  ret_from_fork+0x10/0x20
[   54.484362] 
[   54.485837] The buggy address belongs to the object at ffff000800d61a00
[   54.485837]  which belongs to the cache kmalloc-64 of size 64
[   54.498164] The buggy address is located 0 bytes to the right of
[   54.498164]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   54.511010] 
[   54.512486] The buggy address belongs to the physical page:
[   54.518042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.526028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.532538] page_type: f5(slab)
[   54.535674] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.543396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.551114] page dumped because: kasan: bad access detected
[   54.556669] 
[   54.558145] Memory state around the buggy address:
[   54.562924]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.570128]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.577333] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.584534]                                      ^
[   54.589312]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.596517]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.603718] ==================================================================
[   56.183271] ==================================================================
[   56.190328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.197617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.204996] 
[   56.206478] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.206524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.206539] Hardware name: WinLink E850-96 board (DT)
[   56.206560] Call trace:
[   56.206573]  show_stack+0x20/0x38 (C)
[   56.206606]  dump_stack_lvl+0x8c/0xd0
[   56.206642]  print_report+0x118/0x608
[   56.206671]  kasan_report+0xdc/0x128
[   56.206701]  kasan_check_range+0x100/0x1a8
[   56.206733]  __kasan_check_write+0x20/0x30
[   56.206767]  kasan_atomics_helper+0xe44/0x4858
[   56.206797]  kasan_atomics+0x198/0x2e0
[   56.206825]  kunit_try_run_case+0x170/0x3f0
[   56.206861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.206902]  kthread+0x328/0x630
[   56.206936]  ret_from_fork+0x10/0x20
[   56.206968] 
[   56.276696] Allocated by task 314:
[   56.280081]  kasan_save_stack+0x3c/0x68
[   56.283900]  kasan_save_track+0x20/0x40
[   56.287720]  kasan_save_alloc_info+0x40/0x58
[   56.291973]  __kasan_kmalloc+0xd4/0xd8
[   56.295706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.300220]  kasan_atomics+0xb8/0x2e0
[   56.303866]  kunit_try_run_case+0x170/0x3f0
[   56.308032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.313501]  kthread+0x328/0x630
[   56.316713]  ret_from_fork+0x10/0x20
[   56.320272] 
[   56.321747] The buggy address belongs to the object at ffff000800d61a00
[   56.321747]  which belongs to the cache kmalloc-64 of size 64
[   56.334074] The buggy address is located 0 bytes to the right of
[   56.334074]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.346920] 
[   56.348396] The buggy address belongs to the physical page:
[   56.353954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.361938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.368448] page_type: f5(slab)
[   56.371581] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.379306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.387024] page dumped because: kasan: bad access detected
[   56.392580] 
[   56.394055] Memory state around the buggy address:
[   56.398835]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.406038]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.413243] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.420444]                                      ^
[   56.425222]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.432426]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.439628] ==================================================================
[   59.873515] ==================================================================
[   59.880551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   59.887927] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.895218] 
[   59.896700] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.896747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.896763] Hardware name: WinLink E850-96 board (DT)
[   59.896782] Call trace:
[   59.896794]  show_stack+0x20/0x38 (C)
[   59.896827]  dump_stack_lvl+0x8c/0xd0
[   59.896863]  print_report+0x118/0x608
[   59.896895]  kasan_report+0xdc/0x128
[   59.896924]  __asan_report_load8_noabort+0x20/0x30
[   59.896959]  kasan_atomics_helper+0x3f04/0x4858
[   59.896990]  kasan_atomics+0x198/0x2e0
[   59.897019]  kunit_try_run_case+0x170/0x3f0
[   59.897054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.897091]  kthread+0x328/0x630
[   59.897121]  ret_from_fork+0x10/0x20
[   59.897153] 
[   59.963620] Allocated by task 314:
[   59.967007]  kasan_save_stack+0x3c/0x68
[   59.970824]  kasan_save_track+0x20/0x40
[   59.974644]  kasan_save_alloc_info+0x40/0x58
[   59.978897]  __kasan_kmalloc+0xd4/0xd8
[   59.982630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.987144]  kasan_atomics+0xb8/0x2e0
[   59.990789]  kunit_try_run_case+0x170/0x3f0
[   59.994956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.000424]  kthread+0x328/0x630
[   60.003636]  ret_from_fork+0x10/0x20
[   60.007195] 
[   60.008671] The buggy address belongs to the object at ffff000800d61a00
[   60.008671]  which belongs to the cache kmalloc-64 of size 64
[   60.020998] The buggy address is located 0 bytes to the right of
[   60.020998]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.033844] 
[   60.035322] The buggy address belongs to the physical page:
[   60.040876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.048862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.055371] page_type: f5(slab)
[   60.058507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.066229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.073948] page dumped because: kasan: bad access detected
[   60.079503] 
[   60.080979] Memory state around the buggy address:
[   60.085759]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.092962]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.100167] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.107367]                                      ^
[   60.112146]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.119350]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.126551] ==================================================================
[   60.397753] ==================================================================
[   60.404848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.412224] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.419602] 
[   60.421086] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.421133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.421149] Hardware name: WinLink E850-96 board (DT)
[   60.421168] Call trace:
[   60.421181]  show_stack+0x20/0x38 (C)
[   60.421213]  dump_stack_lvl+0x8c/0xd0
[   60.421247]  print_report+0x118/0x608
[   60.421276]  kasan_report+0xdc/0x128
[   60.421307]  kasan_check_range+0x100/0x1a8
[   60.421339]  __kasan_check_write+0x20/0x30
[   60.421372]  kasan_atomics_helper+0x147c/0x4858
[   60.421403]  kasan_atomics+0x198/0x2e0
[   60.421431]  kunit_try_run_case+0x170/0x3f0
[   60.421465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.421504]  kthread+0x328/0x630
[   60.421537]  ret_from_fork+0x10/0x20
[   60.421572] 
[   60.491389] Allocated by task 314:
[   60.494775]  kasan_save_stack+0x3c/0x68
[   60.498594]  kasan_save_track+0x20/0x40
[   60.502414]  kasan_save_alloc_info+0x40/0x58
[   60.506667]  __kasan_kmalloc+0xd4/0xd8
[   60.510400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.514913]  kasan_atomics+0xb8/0x2e0
[   60.518559]  kunit_try_run_case+0x170/0x3f0
[   60.522726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.528194]  kthread+0x328/0x630
[   60.531406]  ret_from_fork+0x10/0x20
[   60.534965] 
[   60.536440] The buggy address belongs to the object at ffff000800d61a00
[   60.536440]  which belongs to the cache kmalloc-64 of size 64
[   60.548767] The buggy address is located 0 bytes to the right of
[   60.548767]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.561614] 
[   60.563091] The buggy address belongs to the physical page:
[   60.568646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.576631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.583142] page_type: f5(slab)
[   60.586277] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.593999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.601718] page dumped because: kasan: bad access detected
[   60.607273] 
[   60.608748] Memory state around the buggy address:
[   60.613527]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.620732]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.627937] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.635137]                                      ^
[   60.639915]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.647121]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.654321] ==================================================================
[   61.189469] ==================================================================
[   61.196503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.203879] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.211257] 
[   61.212740] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   61.212787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.212803] Hardware name: WinLink E850-96 board (DT)
[   61.212819] Call trace:
[   61.212832]  show_stack+0x20/0x38 (C)
[   61.212861]  dump_stack_lvl+0x8c/0xd0
[   61.212896]  print_report+0x118/0x608
[   61.212927]  kasan_report+0xdc/0x128
[   61.212959]  kasan_check_range+0x100/0x1a8
[   61.212992]  __kasan_check_write+0x20/0x30
[   61.213025]  kasan_atomics_helper+0x15b4/0x4858
[   61.213056]  kasan_atomics+0x198/0x2e0
[   61.213084]  kunit_try_run_case+0x170/0x3f0
[   61.213118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.213156]  kthread+0x328/0x630
[   61.213189]  ret_from_fork+0x10/0x20
[   61.213223] 
[   61.283044] Allocated by task 314:
[   61.286430]  kasan_save_stack+0x3c/0x68
[   61.290249]  kasan_save_track+0x20/0x40
[   61.294069]  kasan_save_alloc_info+0x40/0x58
[   61.298322]  __kasan_kmalloc+0xd4/0xd8
[   61.302054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.306568]  kasan_atomics+0xb8/0x2e0
[   61.310214]  kunit_try_run_case+0x170/0x3f0
[   61.314380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.319849]  kthread+0x328/0x630
[   61.323061]  ret_from_fork+0x10/0x20
[   61.326620] 
[   61.328096] The buggy address belongs to the object at ffff000800d61a00
[   61.328096]  which belongs to the cache kmalloc-64 of size 64
[   61.340422] The buggy address is located 0 bytes to the right of
[   61.340422]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.353269] 
[   61.354745] The buggy address belongs to the physical page:
[   61.360301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.368287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.374796] page_type: f5(slab)
[   61.377931] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.385654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.393373] page dumped because: kasan: bad access detected
[   61.398928] 
[   61.400403] Memory state around the buggy address:
[   61.405182]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.412387]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.419592] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.426792]                                      ^
[   61.431570]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.438775]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.445976] ==================================================================
[   60.661664] ==================================================================
[   60.668732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.676109] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.683487] 
[   60.684970] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.685018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.685036] Hardware name: WinLink E850-96 board (DT)
[   60.685054] Call trace:
[   60.685067]  show_stack+0x20/0x38 (C)
[   60.685098]  dump_stack_lvl+0x8c/0xd0
[   60.685136]  print_report+0x118/0x608
[   60.685168]  kasan_report+0xdc/0x128
[   60.685197]  kasan_check_range+0x100/0x1a8
[   60.685229]  __kasan_check_write+0x20/0x30
[   60.685262]  kasan_atomics_helper+0x14e4/0x4858
[   60.685293]  kasan_atomics+0x198/0x2e0
[   60.685323]  kunit_try_run_case+0x170/0x3f0
[   60.685356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.685394]  kthread+0x328/0x630
[   60.685428]  ret_from_fork+0x10/0x20
[   60.685461] 
[   60.755274] Allocated by task 314:
[   60.758661]  kasan_save_stack+0x3c/0x68
[   60.762479]  kasan_save_track+0x20/0x40
[   60.766298]  kasan_save_alloc_info+0x40/0x58
[   60.770552]  __kasan_kmalloc+0xd4/0xd8
[   60.774285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.778798]  kasan_atomics+0xb8/0x2e0
[   60.782444]  kunit_try_run_case+0x170/0x3f0
[   60.786611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.792080]  kthread+0x328/0x630
[   60.795291]  ret_from_fork+0x10/0x20
[   60.798850] 
[   60.800326] The buggy address belongs to the object at ffff000800d61a00
[   60.800326]  which belongs to the cache kmalloc-64 of size 64
[   60.812652] The buggy address is located 0 bytes to the right of
[   60.812652]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.825499] 
[   60.826976] The buggy address belongs to the physical page:
[   60.832531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.840516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.847027] page_type: f5(slab)
[   60.850161] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.857884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.865603] page dumped because: kasan: bad access detected
[   60.871158] 
[   60.872634] Memory state around the buggy address:
[   60.877412]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.884617]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.891822] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.899023]                                      ^
[   60.903800]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.911005]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.918206] ==================================================================
[   49.613718] ==================================================================
[   49.620808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.628098] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.635476] 
[   49.636959] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.637009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.637026] Hardware name: WinLink E850-96 board (DT)
[   49.637046] Call trace:
[   49.637058]  show_stack+0x20/0x38 (C)
[   49.637088]  dump_stack_lvl+0x8c/0xd0
[   49.637125]  print_report+0x118/0x608
[   49.637155]  kasan_report+0xdc/0x128
[   49.637184]  kasan_check_range+0x100/0x1a8
[   49.637215]  __kasan_check_write+0x20/0x30
[   49.637251]  kasan_atomics_helper+0x54c/0x4858
[   49.637283]  kasan_atomics+0x198/0x2e0
[   49.637310]  kunit_try_run_case+0x170/0x3f0
[   49.637344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.637383]  kthread+0x328/0x630
[   49.637416]  ret_from_fork+0x10/0x20
[   49.637450] 
[   49.707176] Allocated by task 314:
[   49.710562]  kasan_save_stack+0x3c/0x68
[   49.714381]  kasan_save_track+0x20/0x40
[   49.718201]  kasan_save_alloc_info+0x40/0x58
[   49.722454]  __kasan_kmalloc+0xd4/0xd8
[   49.726187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.730700]  kasan_atomics+0xb8/0x2e0
[   49.734346]  kunit_try_run_case+0x170/0x3f0
[   49.738513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.743982]  kthread+0x328/0x630
[   49.747193]  ret_from_fork+0x10/0x20
[   49.750752] 
[   49.752228] The buggy address belongs to the object at ffff000800d61a00
[   49.752228]  which belongs to the cache kmalloc-64 of size 64
[   49.764554] The buggy address is located 0 bytes to the right of
[   49.764554]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   49.777401] 
[   49.778878] The buggy address belongs to the physical page:
[   49.784433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.792418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.798928] page_type: f5(slab)
[   49.802063] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.809786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.817505] page dumped because: kasan: bad access detected
[   49.823060] 
[   49.824536] Memory state around the buggy address:
[   49.829314]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.836519]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.843724] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.850924]                                      ^
[   49.855702]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.862907]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.870108] ==================================================================
[   57.498666] ==================================================================
[   57.505759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.513049] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   57.520427] 
[   57.521909] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   57.521958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.521972] Hardware name: WinLink E850-96 board (DT)
[   57.521991] Call trace:
[   57.522002]  show_stack+0x20/0x38 (C)
[   57.522033]  dump_stack_lvl+0x8c/0xd0
[   57.522067]  print_report+0x118/0x608
[   57.522096]  kasan_report+0xdc/0x128
[   57.522126]  kasan_check_range+0x100/0x1a8
[   57.522157]  __kasan_check_write+0x20/0x30
[   57.522190]  kasan_atomics_helper+0xff0/0x4858
[   57.522222]  kasan_atomics+0x198/0x2e0
[   57.522250]  kunit_try_run_case+0x170/0x3f0
[   57.522284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.522324]  kthread+0x328/0x630
[   57.522356]  ret_from_fork+0x10/0x20
[   57.522389] 
[   57.592127] Allocated by task 314:
[   57.595513]  kasan_save_stack+0x3c/0x68
[   57.599332]  kasan_save_track+0x20/0x40
[   57.603152]  kasan_save_alloc_info+0x40/0x58
[   57.607405]  __kasan_kmalloc+0xd4/0xd8
[   57.611138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.615651]  kasan_atomics+0xb8/0x2e0
[   57.619297]  kunit_try_run_case+0x170/0x3f0
[   57.623464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.628933]  kthread+0x328/0x630
[   57.632144]  ret_from_fork+0x10/0x20
[   57.635703] 
[   57.637179] The buggy address belongs to the object at ffff000800d61a00
[   57.637179]  which belongs to the cache kmalloc-64 of size 64
[   57.649505] The buggy address is located 0 bytes to the right of
[   57.649505]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.662352] 
[   57.663828] The buggy address belongs to the physical page:
[   57.669384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.677369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.683880] page_type: f5(slab)
[   57.687014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.694737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.702456] page dumped because: kasan: bad access detected
[   57.708011] 
[   57.709487] Memory state around the buggy address:
[   57.714266]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.721470]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.728674] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.735875]                                      ^
[   57.740653]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.747858]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.755059] ==================================================================
[   50.932298] ==================================================================
[   50.939364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   50.946655] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.954033] 
[   50.955515] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.955561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.955579] Hardware name: WinLink E850-96 board (DT)
[   50.955597] Call trace:
[   50.955609]  show_stack+0x20/0x38 (C)
[   50.955642]  dump_stack_lvl+0x8c/0xd0
[   50.955676]  print_report+0x118/0x608
[   50.955708]  kasan_report+0xdc/0x128
[   50.955737]  kasan_check_range+0x100/0x1a8
[   50.955768]  __kasan_check_write+0x20/0x30
[   50.955800]  kasan_atomics_helper+0x760/0x4858
[   50.955831]  kasan_atomics+0x198/0x2e0
[   50.955860]  kunit_try_run_case+0x170/0x3f0
[   50.955894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.955934]  kthread+0x328/0x630
[   50.955967]  ret_from_fork+0x10/0x20
[   50.955997] 
[   51.025733] Allocated by task 314:
[   51.029120]  kasan_save_stack+0x3c/0x68
[   51.032938]  kasan_save_track+0x20/0x40
[   51.036757]  kasan_save_alloc_info+0x40/0x58
[   51.041010]  __kasan_kmalloc+0xd4/0xd8
[   51.044743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.049257]  kasan_atomics+0xb8/0x2e0
[   51.052903]  kunit_try_run_case+0x170/0x3f0
[   51.057069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.062538]  kthread+0x328/0x630
[   51.065750]  ret_from_fork+0x10/0x20
[   51.069309] 
[   51.070785] The buggy address belongs to the object at ffff000800d61a00
[   51.070785]  which belongs to the cache kmalloc-64 of size 64
[   51.083111] The buggy address is located 0 bytes to the right of
[   51.083111]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.095958] 
[   51.097435] The buggy address belongs to the physical page:
[   51.102991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.110977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.117485] page_type: f5(slab)
[   51.120620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.128342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.136061] page dumped because: kasan: bad access detected
[   51.141617] 
[   51.143092] Memory state around the buggy address:
[   51.147872]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.155076]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.162280] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.169481]                                      ^
[   51.174259]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.181464]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.188664] ==================================================================
[   57.762432] ==================================================================
[   57.769470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.776847] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   57.784225] 
[   57.785707] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   57.785756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.785772] Hardware name: WinLink E850-96 board (DT)
[   57.785790] Call trace:
[   57.785804]  show_stack+0x20/0x38 (C)
[   57.785836]  dump_stack_lvl+0x8c/0xd0
[   57.785873]  print_report+0x118/0x608
[   57.785903]  kasan_report+0xdc/0x128
[   57.785932]  kasan_check_range+0x100/0x1a8
[   57.785965]  __kasan_check_write+0x20/0x30
[   57.785998]  kasan_atomics_helper+0x1058/0x4858
[   57.786028]  kasan_atomics+0x198/0x2e0
[   57.786056]  kunit_try_run_case+0x170/0x3f0
[   57.786091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.786131]  kthread+0x328/0x630
[   57.786164]  ret_from_fork+0x10/0x20
[   57.786197] 
[   57.856012] Allocated by task 314:
[   57.859401]  kasan_save_stack+0x3c/0x68
[   57.863217]  kasan_save_track+0x20/0x40
[   57.867037]  kasan_save_alloc_info+0x40/0x58
[   57.871290]  __kasan_kmalloc+0xd4/0xd8
[   57.875023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.879537]  kasan_atomics+0xb8/0x2e0
[   57.883182]  kunit_try_run_case+0x170/0x3f0
[   57.887349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.892817]  kthread+0x328/0x630
[   57.896029]  ret_from_fork+0x10/0x20
[   57.899588] 
[   57.901063] The buggy address belongs to the object at ffff000800d61a00
[   57.901063]  which belongs to the cache kmalloc-64 of size 64
[   57.913392] The buggy address is located 0 bytes to the right of
[   57.913392]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.926237] 
[   57.927713] The buggy address belongs to the physical page:
[   57.933269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.941255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.947764] page_type: f5(slab)
[   57.950897] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.958622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.966341] page dumped because: kasan: bad access detected
[   57.971896] 
[   57.973372] Memory state around the buggy address:
[   57.978152]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.985355]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.992559] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.999760]                                      ^
[   58.004538]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.011743]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.018944] ==================================================================
[   56.707562] ==================================================================
[   56.714628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.721915] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.729293] 
[   56.730777] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.730823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.730839] Hardware name: WinLink E850-96 board (DT)
[   56.730856] Call trace:
[   56.730870]  show_stack+0x20/0x38 (C)
[   56.730902]  dump_stack_lvl+0x8c/0xd0
[   56.730936]  print_report+0x118/0x608
[   56.730967]  kasan_report+0xdc/0x128
[   56.730996]  kasan_check_range+0x100/0x1a8
[   56.731027]  __kasan_check_write+0x20/0x30
[   56.731059]  kasan_atomics_helper+0xeb8/0x4858
[   56.731087]  kasan_atomics+0x198/0x2e0
[   56.731118]  kunit_try_run_case+0x170/0x3f0
[   56.731151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.731190]  kthread+0x328/0x630
[   56.731222]  ret_from_fork+0x10/0x20
[   56.731256] 
[   56.800994] Allocated by task 314:
[   56.804379]  kasan_save_stack+0x3c/0x68
[   56.808198]  kasan_save_track+0x20/0x40
[   56.812018]  kasan_save_alloc_info+0x40/0x58
[   56.816271]  __kasan_kmalloc+0xd4/0xd8
[   56.820004]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.824517]  kasan_atomics+0xb8/0x2e0
[   56.828163]  kunit_try_run_case+0x170/0x3f0
[   56.832330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.837798]  kthread+0x328/0x630
[   56.841010]  ret_from_fork+0x10/0x20
[   56.844569] 
[   56.846045] The buggy address belongs to the object at ffff000800d61a00
[   56.846045]  which belongs to the cache kmalloc-64 of size 64
[   56.858371] The buggy address is located 0 bytes to the right of
[   56.858371]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.871218] 
[   56.872694] The buggy address belongs to the physical page:
[   56.878251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.886236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.892746] page_type: f5(slab)
[   56.895882] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.903603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.911322] page dumped because: kasan: bad access detected
[   56.916877] 
[   56.918353] Memory state around the buggy address:
[   56.923132]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.930336]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.937541] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.944741]                                      ^
[   56.949519]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.956724]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.963925] ==================================================================
[   59.345744] ==================================================================
[   59.352780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.360157] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.367535] 
[   59.369018] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.369067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.369083] Hardware name: WinLink E850-96 board (DT)
[   59.369100] Call trace:
[   59.369113]  show_stack+0x20/0x38 (C)
[   59.369144]  dump_stack_lvl+0x8c/0xd0
[   59.369182]  print_report+0x118/0x608
[   59.369211]  kasan_report+0xdc/0x128
[   59.369241]  kasan_check_range+0x100/0x1a8
[   59.369272]  __kasan_check_write+0x20/0x30
[   59.369304]  kasan_atomics_helper+0x12d8/0x4858
[   59.369334]  kasan_atomics+0x198/0x2e0
[   59.369361]  kunit_try_run_case+0x170/0x3f0
[   59.369395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.369435]  kthread+0x328/0x630
[   59.369470]  ret_from_fork+0x10/0x20
[   59.369501] 
[   59.439322] Allocated by task 314:
[   59.442708]  kasan_save_stack+0x3c/0x68
[   59.446527]  kasan_save_track+0x20/0x40
[   59.450346]  kasan_save_alloc_info+0x40/0x58
[   59.454599]  __kasan_kmalloc+0xd4/0xd8
[   59.458332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.462846]  kasan_atomics+0xb8/0x2e0
[   59.466492]  kunit_try_run_case+0x170/0x3f0
[   59.470658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.476127]  kthread+0x328/0x630
[   59.479339]  ret_from_fork+0x10/0x20
[   59.482898] 
[   59.484373] The buggy address belongs to the object at ffff000800d61a00
[   59.484373]  which belongs to the cache kmalloc-64 of size 64
[   59.496700] The buggy address is located 0 bytes to the right of
[   59.496700]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   59.509547] 
[   59.511024] The buggy address belongs to the physical page:
[   59.516578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   59.524564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.531074] page_type: f5(slab)
[   59.534209] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.541931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.549650] page dumped because: kasan: bad access detected
[   59.555205] 
[   59.556681] Memory state around the buggy address:
[   59.561461]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.568664]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.575869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.583070]                                      ^
[   59.587848]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.595053]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.602254] ==================================================================
[   63.286642] ==================================================================
[   63.293694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.301070] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   63.308448] 
[   63.309931] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.309978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.309993] Hardware name: WinLink E850-96 board (DT)
[   63.310013] Call trace:
[   63.310025]  show_stack+0x20/0x38 (C)
[   63.310057]  dump_stack_lvl+0x8c/0xd0
[   63.310092]  print_report+0x118/0x608
[   63.310123]  kasan_report+0xdc/0x128
[   63.310153]  kasan_check_range+0x100/0x1a8
[   63.310183]  __kasan_check_write+0x20/0x30
[   63.310217]  kasan_atomics_helper+0x17ec/0x4858
[   63.310248]  kasan_atomics+0x198/0x2e0
[   63.310275]  kunit_try_run_case+0x170/0x3f0
[   63.310311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.310349]  kthread+0x328/0x630
[   63.310383]  ret_from_fork+0x10/0x20
[   63.310416] 
[   63.380235] Allocated by task 314:
[   63.383621]  kasan_save_stack+0x3c/0x68
[   63.387440]  kasan_save_track+0x20/0x40
[   63.391259]  kasan_save_alloc_info+0x40/0x58
[   63.395512]  __kasan_kmalloc+0xd4/0xd8
[   63.399245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.403759]  kasan_atomics+0xb8/0x2e0
[   63.407405]  kunit_try_run_case+0x170/0x3f0
[   63.411571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.417040]  kthread+0x328/0x630
[   63.420252]  ret_from_fork+0x10/0x20
[   63.423811] 
[   63.425286] The buggy address belongs to the object at ffff000800d61a00
[   63.425286]  which belongs to the cache kmalloc-64 of size 64
[   63.437614] The buggy address is located 0 bytes to the right of
[   63.437614]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   63.450460] 
[   63.451937] The buggy address belongs to the physical page:
[   63.457493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   63.465477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.471987] page_type: f5(slab)
[   63.475121] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.482845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.490563] page dumped because: kasan: bad access detected
[   63.496119] 
[   63.497594] Memory state around the buggy address:
[   63.502374]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.509577]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.516782] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.523983]                                      ^
[   63.528761]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.535966]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.543167] ==================================================================
[   51.723445] ==================================================================
[   51.730501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.737875] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   51.745167] 
[   51.746650] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   51.746697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.746715] Hardware name: WinLink E850-96 board (DT)
[   51.746735] Call trace:
[   51.746747]  show_stack+0x20/0x38 (C)
[   51.746778]  dump_stack_lvl+0x8c/0xd0
[   51.746813]  print_report+0x118/0x608
[   51.746846]  kasan_report+0xdc/0x128
[   51.746876]  __asan_report_load4_noabort+0x20/0x30
[   51.746911]  kasan_atomics_helper+0x42d8/0x4858
[   51.746942]  kasan_atomics+0x198/0x2e0
[   51.746969]  kunit_try_run_case+0x170/0x3f0
[   51.747003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.747044]  kthread+0x328/0x630
[   51.747077]  ret_from_fork+0x10/0x20
[   51.747113] 
[   51.813568] Allocated by task 314:
[   51.816954]  kasan_save_stack+0x3c/0x68
[   51.820773]  kasan_save_track+0x20/0x40
[   51.824593]  kasan_save_alloc_info+0x40/0x58
[   51.828846]  __kasan_kmalloc+0xd4/0xd8
[   51.832578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.837092]  kasan_atomics+0xb8/0x2e0
[   51.840738]  kunit_try_run_case+0x170/0x3f0
[   51.844905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.850374]  kthread+0x328/0x630
[   51.853585]  ret_from_fork+0x10/0x20
[   51.857144] 
[   51.858620] The buggy address belongs to the object at ffff000800d61a00
[   51.858620]  which belongs to the cache kmalloc-64 of size 64
[   51.870947] The buggy address is located 0 bytes to the right of
[   51.870947]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.883793] 
[   51.885269] The buggy address belongs to the physical page:
[   51.890826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.898810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.905321] page_type: f5(slab)
[   51.908455] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.916178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.923896] page dumped because: kasan: bad access detected
[   51.929452] 
[   51.930928] Memory state around the buggy address:
[   51.935706]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.942911]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.950115] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.957316]                                      ^
[   51.962094]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.969299]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.976500] ==================================================================
[   47.247062] ==================================================================
[   47.254004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.261293] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.268672] 
[   47.270155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.270213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.270232] Hardware name: WinLink E850-96 board (DT)
[   47.270254] Call trace:
[   47.270268]  show_stack+0x20/0x38 (C)
[   47.270308]  dump_stack_lvl+0x8c/0xd0
[   47.270346]  print_report+0x118/0x608
[   47.270376]  kasan_report+0xdc/0x128
[   47.270406]  kasan_check_range+0x100/0x1a8
[   47.270440]  __kasan_check_write+0x20/0x30
[   47.270475]  kasan_atomics_helper+0x24c/0x4858
[   47.270506]  kasan_atomics+0x198/0x2e0
[   47.270535]  kunit_try_run_case+0x170/0x3f0
[   47.270576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.270614]  kthread+0x328/0x630
[   47.270648]  ret_from_fork+0x10/0x20
[   47.270684] 
[   47.340371] Allocated by task 314:
[   47.343759]  kasan_save_stack+0x3c/0x68
[   47.347577]  kasan_save_track+0x20/0x40
[   47.351396]  kasan_save_alloc_info+0x40/0x58
[   47.355649]  __kasan_kmalloc+0xd4/0xd8
[   47.359382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.363896]  kasan_atomics+0xb8/0x2e0
[   47.367541]  kunit_try_run_case+0x170/0x3f0
[   47.371708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.377177]  kthread+0x328/0x630
[   47.380388]  ret_from_fork+0x10/0x20
[   47.383947] 
[   47.385423] The buggy address belongs to the object at ffff000800d61a00
[   47.385423]  which belongs to the cache kmalloc-64 of size 64
[   47.397751] The buggy address is located 0 bytes to the right of
[   47.397751]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.410596] 
[   47.412074] The buggy address belongs to the physical page:
[   47.417631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.425616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.432124] page_type: f5(slab)
[   47.435261] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.442981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.450700] page dumped because: kasan: bad access detected
[   47.456257] 
[   47.457731] Memory state around the buggy address:
[   47.462513]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.469714]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.476918] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.484120]                                      ^
[   47.488898]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.496102]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.503303] ==================================================================
[   55.659284] ==================================================================
[   55.666377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.673667] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.680958] 
[   55.682441] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.682490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.682506] Hardware name: WinLink E850-96 board (DT)
[   55.682526] Call trace:
[   55.682540]  show_stack+0x20/0x38 (C)
[   55.682570]  dump_stack_lvl+0x8c/0xd0
[   55.682606]  print_report+0x118/0x608
[   55.682637]  kasan_report+0xdc/0x128
[   55.682667]  kasan_check_range+0x100/0x1a8
[   55.682700]  __kasan_check_read+0x20/0x30
[   55.682734]  kasan_atomics_helper+0xdd4/0x4858
[   55.682764]  kasan_atomics+0x198/0x2e0
[   55.682792]  kunit_try_run_case+0x170/0x3f0
[   55.682827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.682865]  kthread+0x328/0x630
[   55.682898]  ret_from_fork+0x10/0x20
[   55.682931] 
[   55.752572] Allocated by task 314:
[   55.755959]  kasan_save_stack+0x3c/0x68
[   55.759776]  kasan_save_track+0x20/0x40
[   55.763596]  kasan_save_alloc_info+0x40/0x58
[   55.767849]  __kasan_kmalloc+0xd4/0xd8
[   55.771582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.776096]  kasan_atomics+0xb8/0x2e0
[   55.779741]  kunit_try_run_case+0x170/0x3f0
[   55.783908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.789377]  kthread+0x328/0x630
[   55.792589]  ret_from_fork+0x10/0x20
[   55.796147] 
[   55.797623] The buggy address belongs to the object at ffff000800d61a00
[   55.797623]  which belongs to the cache kmalloc-64 of size 64
[   55.809951] The buggy address is located 0 bytes to the right of
[   55.809951]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.822796] 
[   55.824272] The buggy address belongs to the physical page:
[   55.829828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.837814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.844324] page_type: f5(slab)
[   55.847459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.855181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.862900] page dumped because: kasan: bad access detected
[   55.868455] 
[   55.869931] Memory state around the buggy address:
[   55.874710]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.881914]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.889119] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.896320]                                      ^
[   55.901098]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.908302]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.915503] ==================================================================
[   56.447004] ==================================================================
[   56.454040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.461416] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.468794] 
[   56.470277] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.470324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.470342] Hardware name: WinLink E850-96 board (DT)
[   56.470361] Call trace:
[   56.470374]  show_stack+0x20/0x38 (C)
[   56.470405]  dump_stack_lvl+0x8c/0xd0
[   56.470438]  print_report+0x118/0x608
[   56.470468]  kasan_report+0xdc/0x128
[   56.470497]  __asan_report_store8_noabort+0x20/0x30
[   56.470533]  kasan_atomics_helper+0x3e5c/0x4858
[   56.470565]  kasan_atomics+0x198/0x2e0
[   56.470592]  kunit_try_run_case+0x170/0x3f0
[   56.470627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.470666]  kthread+0x328/0x630
[   56.470699]  ret_from_fork+0x10/0x20
[   56.470732] 
[   56.537282] Allocated by task 314:
[   56.540669]  kasan_save_stack+0x3c/0x68
[   56.544487]  kasan_save_track+0x20/0x40
[   56.548306]  kasan_save_alloc_info+0x40/0x58
[   56.552560]  __kasan_kmalloc+0xd4/0xd8
[   56.556292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.560806]  kasan_atomics+0xb8/0x2e0
[   56.564452]  kunit_try_run_case+0x170/0x3f0
[   56.568619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.574087]  kthread+0x328/0x630
[   56.577299]  ret_from_fork+0x10/0x20
[   56.580858] 
[   56.582334] The buggy address belongs to the object at ffff000800d61a00
[   56.582334]  which belongs to the cache kmalloc-64 of size 64
[   56.594660] The buggy address is located 0 bytes to the right of
[   56.594660]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.607506] 
[   56.608983] The buggy address belongs to the physical page:
[   56.614540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.622524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.629034] page_type: f5(slab)
[   56.632171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.639892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.647611] page dumped because: kasan: bad access detected
[   56.653166] 
[   56.654641] Memory state around the buggy address:
[   56.659420]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.666625]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.673829] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.681030]                                      ^
[   56.685808]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.693013]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.700214] ==================================================================
[   58.290202] ==================================================================
[   58.297240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.304617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.311995] 
[   58.313480] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.313531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.313548] Hardware name: WinLink E850-96 board (DT)
[   58.313564] Call trace:
[   58.313580]  show_stack+0x20/0x38 (C)
[   58.313611]  dump_stack_lvl+0x8c/0xd0
[   58.313646]  print_report+0x118/0x608
[   58.313676]  kasan_report+0xdc/0x128
[   58.313705]  kasan_check_range+0x100/0x1a8
[   58.313736]  __kasan_check_write+0x20/0x30
[   58.313769]  kasan_atomics_helper+0x1128/0x4858
[   58.313801]  kasan_atomics+0x198/0x2e0
[   58.313829]  kunit_try_run_case+0x170/0x3f0
[   58.313864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.313901]  kthread+0x328/0x630
[   58.313933]  ret_from_fork+0x10/0x20
[   58.313963] 
[   58.383782] Allocated by task 314:
[   58.387170]  kasan_save_stack+0x3c/0x68
[   58.390987]  kasan_save_track+0x20/0x40
[   58.394806]  kasan_save_alloc_info+0x40/0x58
[   58.399060]  __kasan_kmalloc+0xd4/0xd8
[   58.402793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.407306]  kasan_atomics+0xb8/0x2e0
[   58.410952]  kunit_try_run_case+0x170/0x3f0
[   58.415119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.420587]  kthread+0x328/0x630
[   58.423799]  ret_from_fork+0x10/0x20
[   58.427358] 
[   58.428834] The buggy address belongs to the object at ffff000800d61a00
[   58.428834]  which belongs to the cache kmalloc-64 of size 64
[   58.441160] The buggy address is located 0 bytes to the right of
[   58.441160]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.454007] 
[   58.455484] The buggy address belongs to the physical page:
[   58.461039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.469024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.475534] page_type: f5(slab)
[   58.478669] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.486392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.494110] page dumped because: kasan: bad access detected
[   58.499666] 
[   58.501141] Memory state around the buggy address:
[   58.505920]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.513125]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.520329] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.527530]                                      ^
[   58.532308]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.539513]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.546714] ==================================================================
[   61.977594] ==================================================================
[   61.984685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   61.992063] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.999353] 
[   62.000835] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.000883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.000899] Hardware name: WinLink E850-96 board (DT)
[   62.000918] Call trace:
[   62.000932]  show_stack+0x20/0x38 (C)
[   62.000964]  dump_stack_lvl+0x8c/0xd0
[   62.000997]  print_report+0x118/0x608
[   62.001025]  kasan_report+0xdc/0x128
[   62.001056]  __asan_report_load8_noabort+0x20/0x30
[   62.001092]  kasan_atomics_helper+0x3df4/0x4858
[   62.001121]  kasan_atomics+0x198/0x2e0
[   62.001149]  kunit_try_run_case+0x170/0x3f0
[   62.001184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.001222]  kthread+0x328/0x630
[   62.001255]  ret_from_fork+0x10/0x20
[   62.001289] 
[   62.067754] Allocated by task 314:
[   62.071141]  kasan_save_stack+0x3c/0x68
[   62.074959]  kasan_save_track+0x20/0x40
[   62.078779]  kasan_save_alloc_info+0x40/0x58
[   62.083032]  __kasan_kmalloc+0xd4/0xd8
[   62.086765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.091279]  kasan_atomics+0xb8/0x2e0
[   62.094924]  kunit_try_run_case+0x170/0x3f0
[   62.099091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.104560]  kthread+0x328/0x630
[   62.107772]  ret_from_fork+0x10/0x20
[   62.111330] 
[   62.112806] The buggy address belongs to the object at ffff000800d61a00
[   62.112806]  which belongs to the cache kmalloc-64 of size 64
[   62.125133] The buggy address is located 0 bytes to the right of
[   62.125133]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.137979] 
[   62.139457] The buggy address belongs to the physical page:
[   62.145012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.152998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.159507] page_type: f5(slab)
[   62.162642] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.170364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.178083] page dumped because: kasan: bad access detected
[   62.183638] 
[   62.185114] Memory state around the buggy address:
[   62.189893]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.197097]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.204302] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.211503]                                      ^
[   62.216281]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.223485]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.230687] ==================================================================
[   53.826560] ==================================================================
[   53.833592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.840969] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.848260] 
[   53.849744] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.849793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.849810] Hardware name: WinLink E850-96 board (DT)
[   53.849829] Call trace:
[   53.849843]  show_stack+0x20/0x38 (C)
[   53.849874]  dump_stack_lvl+0x8c/0xd0
[   53.849910]  print_report+0x118/0x608
[   53.849940]  kasan_report+0xdc/0x128
[   53.849972]  __asan_report_load4_noabort+0x20/0x30
[   53.850006]  kasan_atomics_helper+0x3dbc/0x4858
[   53.850037]  kasan_atomics+0x198/0x2e0
[   53.850064]  kunit_try_run_case+0x170/0x3f0
[   53.850103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.850144]  kthread+0x328/0x630
[   53.850176]  ret_from_fork+0x10/0x20
[   53.850211] 
[   53.916662] Allocated by task 314:
[   53.920049]  kasan_save_stack+0x3c/0x68
[   53.923867]  kasan_save_track+0x20/0x40
[   53.927686]  kasan_save_alloc_info+0x40/0x58
[   53.931939]  __kasan_kmalloc+0xd4/0xd8
[   53.935672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.940186]  kasan_atomics+0xb8/0x2e0
[   53.943831]  kunit_try_run_case+0x170/0x3f0
[   53.947998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.953467]  kthread+0x328/0x630
[   53.956679]  ret_from_fork+0x10/0x20
[   53.960238] 
[   53.961713] The buggy address belongs to the object at ffff000800d61a00
[   53.961713]  which belongs to the cache kmalloc-64 of size 64
[   53.974040] The buggy address is located 0 bytes to the right of
[   53.974040]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.986886] 
[   53.988364] The buggy address belongs to the physical page:
[   53.993920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.001904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.008414] page_type: f5(slab)
[   54.011547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.019271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.026990] page dumped because: kasan: bad access detected
[   54.032545] 
[   54.034021] Memory state around the buggy address:
[   54.038799]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.046004]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.053209] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.060410]                                      ^
[   54.065188]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.072393]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.079594] ==================================================================
[   62.762334] ==================================================================
[   62.769395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.776773] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   62.784150] 
[   62.785634] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.785681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.785696] Hardware name: WinLink E850-96 board (DT)
[   62.785712] Call trace:
[   62.785725]  show_stack+0x20/0x38 (C)
[   62.785756]  dump_stack_lvl+0x8c/0xd0
[   62.785793]  print_report+0x118/0x608
[   62.785824]  kasan_report+0xdc/0x128
[   62.785853]  kasan_check_range+0x100/0x1a8
[   62.785884]  __kasan_check_write+0x20/0x30
[   62.785919]  kasan_atomics_helper+0x175c/0x4858
[   62.785949]  kasan_atomics+0x198/0x2e0
[   62.785976]  kunit_try_run_case+0x170/0x3f0
[   62.786013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.786052]  kthread+0x328/0x630
[   62.786085]  ret_from_fork+0x10/0x20
[   62.786118] 
[   62.855937] Allocated by task 314:
[   62.859323]  kasan_save_stack+0x3c/0x68
[   62.863142]  kasan_save_track+0x20/0x40
[   62.866962]  kasan_save_alloc_info+0x40/0x58
[   62.871215]  __kasan_kmalloc+0xd4/0xd8
[   62.874947]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.879461]  kasan_atomics+0xb8/0x2e0
[   62.883107]  kunit_try_run_case+0x170/0x3f0
[   62.887273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.892742]  kthread+0x328/0x630
[   62.895954]  ret_from_fork+0x10/0x20
[   62.899513] 
[   62.900988] The buggy address belongs to the object at ffff000800d61a00
[   62.900988]  which belongs to the cache kmalloc-64 of size 64
[   62.913315] The buggy address is located 0 bytes to the right of
[   62.913315]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.926162] 
[   62.927641] The buggy address belongs to the physical page:
[   62.933195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.941180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.947689] page_type: f5(slab)
[   62.950825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.958547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.966266] page dumped because: kasan: bad access detected
[   62.971821] 
[   62.973297] Memory state around the buggy address:
[   62.978075]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.985280]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.992484] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.999685]                                      ^
[   63.004464]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.011668]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.018869] ==================================================================
[   51.983854] ==================================================================
[   51.990912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   51.998201] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.005579] 
[   52.007063] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.007109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.007127] Hardware name: WinLink E850-96 board (DT)
[   52.007145] Call trace:
[   52.007158]  show_stack+0x20/0x38 (C)
[   52.007190]  dump_stack_lvl+0x8c/0xd0
[   52.007224]  print_report+0x118/0x608
[   52.007255]  kasan_report+0xdc/0x128
[   52.007286]  kasan_check_range+0x100/0x1a8
[   52.007317]  __kasan_check_write+0x20/0x30
[   52.007348]  kasan_atomics_helper+0x934/0x4858
[   52.007379]  kasan_atomics+0x198/0x2e0
[   52.007404]  kunit_try_run_case+0x170/0x3f0
[   52.007440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.007478]  kthread+0x328/0x630
[   52.007509]  ret_from_fork+0x10/0x20
[   52.007542] 
[   52.077280] Allocated by task 314:
[   52.080667]  kasan_save_stack+0x3c/0x68
[   52.084485]  kasan_save_track+0x20/0x40
[   52.088304]  kasan_save_alloc_info+0x40/0x58
[   52.092557]  __kasan_kmalloc+0xd4/0xd8
[   52.096290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.100804]  kasan_atomics+0xb8/0x2e0
[   52.104450]  kunit_try_run_case+0x170/0x3f0
[   52.108616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.114085]  kthread+0x328/0x630
[   52.117297]  ret_from_fork+0x10/0x20
[   52.120856] 
[   52.122331] The buggy address belongs to the object at ffff000800d61a00
[   52.122331]  which belongs to the cache kmalloc-64 of size 64
[   52.134658] The buggy address is located 0 bytes to the right of
[   52.134658]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.147504] 
[   52.148982] The buggy address belongs to the physical page:
[   52.154538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.162522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.169031] page_type: f5(slab)
[   52.172167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.179889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.187608] page dumped because: kasan: bad access detected
[   52.193163] 
[   52.194639] Memory state around the buggy address:
[   52.199417]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.206622]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.213827] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.221028]                                      ^
[   52.225806]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.233010]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.240211] ==================================================================
[   57.234982] ==================================================================
[   57.242047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.249338] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   57.256716] 
[   57.258199] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   57.258249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.258265] Hardware name: WinLink E850-96 board (DT)
[   57.258285] Call trace:
[   57.258297]  show_stack+0x20/0x38 (C)
[   57.258330]  dump_stack_lvl+0x8c/0xd0
[   57.258365]  print_report+0x118/0x608
[   57.258396]  kasan_report+0xdc/0x128
[   57.258425]  kasan_check_range+0x100/0x1a8
[   57.258457]  __kasan_check_write+0x20/0x30
[   57.258489]  kasan_atomics_helper+0xf88/0x4858
[   57.258519]  kasan_atomics+0x198/0x2e0
[   57.258547]  kunit_try_run_case+0x170/0x3f0
[   57.258581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.258621]  kthread+0x328/0x630
[   57.258652]  ret_from_fork+0x10/0x20
[   57.258684] 
[   57.328416] Allocated by task 314:
[   57.331802]  kasan_save_stack+0x3c/0x68
[   57.335621]  kasan_save_track+0x20/0x40
[   57.339441]  kasan_save_alloc_info+0x40/0x58
[   57.343694]  __kasan_kmalloc+0xd4/0xd8
[   57.347426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.351940]  kasan_atomics+0xb8/0x2e0
[   57.355586]  kunit_try_run_case+0x170/0x3f0
[   57.359753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.365221]  kthread+0x328/0x630
[   57.368433]  ret_from_fork+0x10/0x20
[   57.371992] 
[   57.373467] The buggy address belongs to the object at ffff000800d61a00
[   57.373467]  which belongs to the cache kmalloc-64 of size 64
[   57.385794] The buggy address is located 0 bytes to the right of
[   57.385794]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.398641] 
[   57.400117] The buggy address belongs to the physical page:
[   57.405673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.413659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.420168] page_type: f5(slab)
[   57.423303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.431026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.438744] page dumped because: kasan: bad access detected
[   57.444300] 
[   57.445775] Memory state around the buggy address:
[   57.450555]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.457759]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.464963] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.472164]                                      ^
[   57.476942]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.484147]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.491348] ==================================================================
[   58.026301] ==================================================================
[   58.033355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.040732] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.048110] 
[   58.049593] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.049643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.049660] Hardware name: WinLink E850-96 board (DT)
[   58.049680] Call trace:
[   58.049692]  show_stack+0x20/0x38 (C)
[   58.049724]  dump_stack_lvl+0x8c/0xd0
[   58.049760]  print_report+0x118/0x608
[   58.049789]  kasan_report+0xdc/0x128
[   58.049818]  kasan_check_range+0x100/0x1a8
[   58.049850]  __kasan_check_write+0x20/0x30
[   58.049882]  kasan_atomics_helper+0x10c0/0x4858
[   58.049914]  kasan_atomics+0x198/0x2e0
[   58.049942]  kunit_try_run_case+0x170/0x3f0
[   58.049976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.050015]  kthread+0x328/0x630
[   58.050045]  ret_from_fork+0x10/0x20
[   58.050078] 
[   58.119897] Allocated by task 314:
[   58.123284]  kasan_save_stack+0x3c/0x68
[   58.127102]  kasan_save_track+0x20/0x40
[   58.130921]  kasan_save_alloc_info+0x40/0x58
[   58.135175]  __kasan_kmalloc+0xd4/0xd8
[   58.138908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.143421]  kasan_atomics+0xb8/0x2e0
[   58.147067]  kunit_try_run_case+0x170/0x3f0
[   58.151234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.156702]  kthread+0x328/0x630
[   58.159914]  ret_from_fork+0x10/0x20
[   58.163473] 
[   58.164949] The buggy address belongs to the object at ffff000800d61a00
[   58.164949]  which belongs to the cache kmalloc-64 of size 64
[   58.177275] The buggy address is located 0 bytes to the right of
[   58.177275]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.190122] 
[   58.191600] The buggy address belongs to the physical page:
[   58.197155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.205139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.211649] page_type: f5(slab)
[   58.214786] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.222507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.230226] page dumped because: kasan: bad access detected
[   58.235781] 
[   58.237257] Memory state around the buggy address:
[   58.242036]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.249240]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.256444] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.263645]                                      ^
[   58.268423]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.275628]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.282829] ==================================================================
[   51.459752] ==================================================================
[   51.466788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.474077] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   51.481455] 
[   51.482939] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   51.482986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.483002] Hardware name: WinLink E850-96 board (DT)
[   51.483022] Call trace:
[   51.483036]  show_stack+0x20/0x38 (C)
[   51.483067]  dump_stack_lvl+0x8c/0xd0
[   51.483103]  print_report+0x118/0x608
[   51.483133]  kasan_report+0xdc/0x128
[   51.483162]  kasan_check_range+0x100/0x1a8
[   51.483194]  __kasan_check_write+0x20/0x30
[   51.483229]  kasan_atomics_helper+0x894/0x4858
[   51.483259]  kasan_atomics+0x198/0x2e0
[   51.483288]  kunit_try_run_case+0x170/0x3f0
[   51.483323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.483362]  kthread+0x328/0x630
[   51.483394]  ret_from_fork+0x10/0x20
[   51.483427] 
[   51.553155] Allocated by task 314:
[   51.556543]  kasan_save_stack+0x3c/0x68
[   51.560360]  kasan_save_track+0x20/0x40
[   51.564180]  kasan_save_alloc_info+0x40/0x58
[   51.568433]  __kasan_kmalloc+0xd4/0xd8
[   51.572166]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.576680]  kasan_atomics+0xb8/0x2e0
[   51.580325]  kunit_try_run_case+0x170/0x3f0
[   51.584492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.589961]  kthread+0x328/0x630
[   51.593172]  ret_from_fork+0x10/0x20
[   51.596732] 
[   51.598207] The buggy address belongs to the object at ffff000800d61a00
[   51.598207]  which belongs to the cache kmalloc-64 of size 64
[   51.610533] The buggy address is located 0 bytes to the right of
[   51.610533]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.623380] 
[   51.624856] The buggy address belongs to the physical page:
[   51.630414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.638398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.644908] page_type: f5(slab)
[   51.648044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.655765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.663484] page dumped because: kasan: bad access detected
[   51.669039] 
[   51.670515] Memory state around the buggy address:
[   51.675295]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.682498]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.689703] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.696904]                                      ^
[   51.701681]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.708887]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.716087] ==================================================================
[   55.922850] ==================================================================
[   55.929914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   55.937291] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.944583] 
[   55.946066] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.946115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.946131] Hardware name: WinLink E850-96 board (DT)
[   55.946151] Call trace:
[   55.946162]  show_stack+0x20/0x38 (C)
[   55.946193]  dump_stack_lvl+0x8c/0xd0
[   55.946227]  print_report+0x118/0x608
[   55.946259]  kasan_report+0xdc/0x128
[   55.946289]  __asan_report_load8_noabort+0x20/0x30
[   55.946326]  kasan_atomics_helper+0x3f58/0x4858
[   55.946356]  kasan_atomics+0x198/0x2e0
[   55.946384]  kunit_try_run_case+0x170/0x3f0
[   55.946418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.946457]  kthread+0x328/0x630
[   55.946491]  ret_from_fork+0x10/0x20
[   55.946524] 
[   56.012984] Allocated by task 314:
[   56.016371]  kasan_save_stack+0x3c/0x68
[   56.020189]  kasan_save_track+0x20/0x40
[   56.024009]  kasan_save_alloc_info+0x40/0x58
[   56.028262]  __kasan_kmalloc+0xd4/0xd8
[   56.031995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.036509]  kasan_atomics+0xb8/0x2e0
[   56.040154]  kunit_try_run_case+0x170/0x3f0
[   56.044321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.049790]  kthread+0x328/0x630
[   56.053001]  ret_from_fork+0x10/0x20
[   56.056560] 
[   56.058036] The buggy address belongs to the object at ffff000800d61a00
[   56.058036]  which belongs to the cache kmalloc-64 of size 64
[   56.070362] The buggy address is located 0 bytes to the right of
[   56.070362]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.083209] 
[   56.084685] The buggy address belongs to the physical page:
[   56.090243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.098226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.104737] page_type: f5(slab)
[   56.107871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.115594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.123313] page dumped because: kasan: bad access detected
[   56.128868] 
[   56.130344] Memory state around the buggy address:
[   56.135122]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.142327]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.149532] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.156732]                                      ^
[   56.161510]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.168715]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.175916] ==================================================================
[   62.501926] ==================================================================
[   62.508985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.516359] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   62.523651] 
[   62.525133] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.525181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.525199] Hardware name: WinLink E850-96 board (DT)
[   62.525216] Call trace:
[   62.525229]  show_stack+0x20/0x38 (C)
[   62.525260]  dump_stack_lvl+0x8c/0xd0
[   62.525294]  print_report+0x118/0x608
[   62.525325]  kasan_report+0xdc/0x128
[   62.525354]  __asan_report_load8_noabort+0x20/0x30
[   62.525390]  kasan_atomics_helper+0x3e10/0x4858
[   62.525422]  kasan_atomics+0x198/0x2e0
[   62.525448]  kunit_try_run_case+0x170/0x3f0
[   62.525485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.525524]  kthread+0x328/0x630
[   62.525556]  ret_from_fork+0x10/0x20
[   62.525588] 
[   62.592052] Allocated by task 314:
[   62.595438]  kasan_save_stack+0x3c/0x68
[   62.599257]  kasan_save_track+0x20/0x40
[   62.603077]  kasan_save_alloc_info+0x40/0x58
[   62.607330]  __kasan_kmalloc+0xd4/0xd8
[   62.611063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.615576]  kasan_atomics+0xb8/0x2e0
[   62.619222]  kunit_try_run_case+0x170/0x3f0
[   62.623389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.628858]  kthread+0x328/0x630
[   62.632069]  ret_from_fork+0x10/0x20
[   62.635628] 
[   62.637104] The buggy address belongs to the object at ffff000800d61a00
[   62.637104]  which belongs to the cache kmalloc-64 of size 64
[   62.649430] The buggy address is located 0 bytes to the right of
[   62.649430]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.662277] 
[   62.663754] The buggy address belongs to the physical page:
[   62.669310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.677295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.683804] page_type: f5(slab)
[   62.686939] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.694662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.702381] page dumped because: kasan: bad access detected
[   62.707936] 
[   62.709412] Memory state around the buggy address:
[   62.714190]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.721395]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.728599] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.735800]                                      ^
[   62.740578]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.747783]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.754984] ==================================================================
[   60.925555] ==================================================================
[   60.932617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   60.939994] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.947372] 
[   60.948855] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.948902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.948918] Hardware name: WinLink E850-96 board (DT)
[   60.948937] Call trace:
[   60.948949]  show_stack+0x20/0x38 (C)
[   60.948983]  dump_stack_lvl+0x8c/0xd0
[   60.949018]  print_report+0x118/0x608
[   60.949050]  kasan_report+0xdc/0x128
[   60.949079]  kasan_check_range+0x100/0x1a8
[   60.949111]  __kasan_check_write+0x20/0x30
[   60.949143]  kasan_atomics_helper+0x154c/0x4858
[   60.949174]  kasan_atomics+0x198/0x2e0
[   60.949202]  kunit_try_run_case+0x170/0x3f0
[   60.949237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.949275]  kthread+0x328/0x630
[   60.949310]  ret_from_fork+0x10/0x20
[   60.949344] 
[   61.019159] Allocated by task 314:
[   61.022545]  kasan_save_stack+0x3c/0x68
[   61.026364]  kasan_save_track+0x20/0x40
[   61.030183]  kasan_save_alloc_info+0x40/0x58
[   61.034437]  __kasan_kmalloc+0xd4/0xd8
[   61.038169]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.042683]  kasan_atomics+0xb8/0x2e0
[   61.046329]  kunit_try_run_case+0x170/0x3f0
[   61.050496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.055964]  kthread+0x328/0x630
[   61.059176]  ret_from_fork+0x10/0x20
[   61.062735] 
[   61.064211] The buggy address belongs to the object at ffff000800d61a00
[   61.064211]  which belongs to the cache kmalloc-64 of size 64
[   61.076537] The buggy address is located 0 bytes to the right of
[   61.076537]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.089384] 
[   61.090862] The buggy address belongs to the physical page:
[   61.096416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.104401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.110911] page_type: f5(slab)
[   61.114045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.121769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.129488] page dumped because: kasan: bad access detected
[   61.135043] 
[   61.136519] Memory state around the buggy address:
[   61.141297]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.148502]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.155706] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.162907]                                      ^
[   61.167685]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.174890]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.182091] ==================================================================
[   58.817946] ==================================================================
[   58.825010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.832387] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.839765] 
[   58.841247] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.841296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.841312] Hardware name: WinLink E850-96 board (DT)
[   58.841331] Call trace:
[   58.841344]  show_stack+0x20/0x38 (C)
[   58.841375]  dump_stack_lvl+0x8c/0xd0
[   58.841411]  print_report+0x118/0x608
[   58.841442]  kasan_report+0xdc/0x128
[   58.841471]  kasan_check_range+0x100/0x1a8
[   58.841502]  __kasan_check_write+0x20/0x30
[   58.841535]  kasan_atomics_helper+0x11f8/0x4858
[   58.841565]  kasan_atomics+0x198/0x2e0
[   58.841593]  kunit_try_run_case+0x170/0x3f0
[   58.841628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.841668]  kthread+0x328/0x630
[   58.841701]  ret_from_fork+0x10/0x20
[   58.841733] 
[   58.911552] Allocated by task 314:
[   58.914939]  kasan_save_stack+0x3c/0x68
[   58.918757]  kasan_save_track+0x20/0x40
[   58.922576]  kasan_save_alloc_info+0x40/0x58
[   58.926830]  __kasan_kmalloc+0xd4/0xd8
[   58.930563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.935076]  kasan_atomics+0xb8/0x2e0
[   58.938722]  kunit_try_run_case+0x170/0x3f0
[   58.942888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.948357]  kthread+0x328/0x630
[   58.951569]  ret_from_fork+0x10/0x20
[   58.955128] 
[   58.956603] The buggy address belongs to the object at ffff000800d61a00
[   58.956603]  which belongs to the cache kmalloc-64 of size 64
[   58.968930] The buggy address is located 0 bytes to the right of
[   58.968930]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.981777] 
[   58.983254] The buggy address belongs to the physical page:
[   58.988808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.996794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.003304] page_type: f5(slab)
[   59.006439] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.014162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.021881] page dumped because: kasan: bad access detected
[   59.027435] 
[   59.028911] Memory state around the buggy address:
[   59.033690]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.040895]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.048099] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.055300]                                      ^
[   59.060078]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.067283]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.074484] ==================================================================
[   46.722987] ==================================================================
[   46.729883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.737256] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   46.744634] 
[   46.746121] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   46.746179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.746198] Hardware name: WinLink E850-96 board (DT)
[   46.746219] Call trace:
[   46.746236]  show_stack+0x20/0x38 (C)
[   46.746271]  dump_stack_lvl+0x8c/0xd0
[   46.746309]  print_report+0x118/0x608
[   46.746343]  kasan_report+0xdc/0x128
[   46.746374]  __asan_report_store4_noabort+0x20/0x30
[   46.746415]  kasan_atomics_helper+0x3f7c/0x4858
[   46.746445]  kasan_atomics+0x198/0x2e0
[   46.746474]  kunit_try_run_case+0x170/0x3f0
[   46.746509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.746547]  kthread+0x328/0x630
[   46.746581]  ret_from_fork+0x10/0x20
[   46.746618] 
[   46.813122] Allocated by task 314:
[   46.816511]  kasan_save_stack+0x3c/0x68
[   46.820327]  kasan_save_track+0x20/0x40
[   46.824146]  kasan_save_alloc_info+0x40/0x58
[   46.828400]  __kasan_kmalloc+0xd4/0xd8
[   46.832133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.836647]  kasan_atomics+0xb8/0x2e0
[   46.840292]  kunit_try_run_case+0x170/0x3f0
[   46.844459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.849928]  kthread+0x328/0x630
[   46.853139]  ret_from_fork+0x10/0x20
[   46.856698] 
[   46.858175] The buggy address belongs to the object at ffff000800d61a00
[   46.858175]  which belongs to the cache kmalloc-64 of size 64
[   46.870502] The buggy address is located 0 bytes to the right of
[   46.870502]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   46.883347] 
[   46.884826] The buggy address belongs to the physical page:
[   46.890383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   46.898367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.904875] page_type: f5(slab)
[   46.908011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.915732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.923451] page dumped because: kasan: bad access detected
[   46.929008] 
[   46.930482] Memory state around the buggy address:
[   46.935263]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.942465]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.949670] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.956871]                                      ^
[   46.961648]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.968853]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.976054] ==================================================================
[   50.668589] ==================================================================
[   50.675653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.682943] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.690322] 
[   50.691804] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.691854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.691871] Hardware name: WinLink E850-96 board (DT)
[   50.691892] Call trace:
[   50.691904]  show_stack+0x20/0x38 (C)
[   50.691936]  dump_stack_lvl+0x8c/0xd0
[   50.691970]  print_report+0x118/0x608
[   50.692000]  kasan_report+0xdc/0x128
[   50.692030]  kasan_check_range+0x100/0x1a8
[   50.692063]  __kasan_check_write+0x20/0x30
[   50.692098]  kasan_atomics_helper+0x6ec/0x4858
[   50.692129]  kasan_atomics+0x198/0x2e0
[   50.692155]  kunit_try_run_case+0x170/0x3f0
[   50.692191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.692229]  kthread+0x328/0x630
[   50.692261]  ret_from_fork+0x10/0x20
[   50.692293] 
[   50.762021] Allocated by task 314:
[   50.765408]  kasan_save_stack+0x3c/0x68
[   50.769226]  kasan_save_track+0x20/0x40
[   50.773046]  kasan_save_alloc_info+0x40/0x58
[   50.777299]  __kasan_kmalloc+0xd4/0xd8
[   50.781032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.785546]  kasan_atomics+0xb8/0x2e0
[   50.789192]  kunit_try_run_case+0x170/0x3f0
[   50.793358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.798827]  kthread+0x328/0x630
[   50.802038]  ret_from_fork+0x10/0x20
[   50.805598] 
[   50.807073] The buggy address belongs to the object at ffff000800d61a00
[   50.807073]  which belongs to the cache kmalloc-64 of size 64
[   50.819400] The buggy address is located 0 bytes to the right of
[   50.819400]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.832246] 
[   50.833724] The buggy address belongs to the physical page:
[   50.839280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.847265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.853774] page_type: f5(slab)
[   50.856909] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.864631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.872350] page dumped because: kasan: bad access detected
[   50.877905] 
[   50.879381] Memory state around the buggy address:
[   50.884161]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.891364]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.898569] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.905770]                                      ^
[   50.910548]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.917752]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.924953] ==================================================================
[   46.455310] ==================================================================
[   46.469469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.476845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   46.484134] 
[   46.485623] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   46.485679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.485697] Hardware name: WinLink E850-96 board (DT)
[   46.485720] Call trace:
[   46.485734]  show_stack+0x20/0x38 (C)
[   46.485773]  dump_stack_lvl+0x8c/0xd0
[   46.485812]  print_report+0x118/0x608
[   46.485846]  kasan_report+0xdc/0x128
[   46.485877]  __asan_report_load4_noabort+0x20/0x30
[   46.485913]  kasan_atomics_helper+0x40a8/0x4858
[   46.485943]  kasan_atomics+0x198/0x2e0
[   46.485971]  kunit_try_run_case+0x170/0x3f0
[   46.486009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.486049]  kthread+0x328/0x630
[   46.486086]  ret_from_fork+0x10/0x20
[   46.486126] 
[   46.552537] Allocated by task 314:
[   46.555925]  kasan_save_stack+0x3c/0x68
[   46.559741]  kasan_save_track+0x20/0x40
[   46.563560]  kasan_save_alloc_info+0x40/0x58
[   46.567814]  __kasan_kmalloc+0xd4/0xd8
[   46.571546]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.576060]  kasan_atomics+0xb8/0x2e0
[   46.579706]  kunit_try_run_case+0x170/0x3f0
[   46.583873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.589341]  kthread+0x328/0x630
[   46.592553]  ret_from_fork+0x10/0x20
[   46.596112] 
[   46.597589] The buggy address belongs to the object at ffff000800d61a00
[   46.597589]  which belongs to the cache kmalloc-64 of size 64
[   46.609918] The buggy address is located 0 bytes to the right of
[   46.609918]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   46.622761] 
[   46.624240] The buggy address belongs to the physical page:
[   46.629798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   46.637780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.644290] page_type: f5(slab)
[   46.647429] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.655146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.662865] page dumped because: kasan: bad access detected
[   46.668420] 
[   46.669896] Memory state around the buggy address:
[   46.674675]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.681879]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.689084] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.696284]                                      ^
[   46.701063]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.708267]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.715469] ==================================================================
[   53.302428] ==================================================================
[   53.309468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.316845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.324136] 
[   53.325619] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.325667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.325684] Hardware name: WinLink E850-96 board (DT)
[   53.325704] Call trace:
[   53.325717]  show_stack+0x20/0x38 (C)
[   53.325749]  dump_stack_lvl+0x8c/0xd0
[   53.325784]  print_report+0x118/0x608
[   53.325812]  kasan_report+0xdc/0x128
[   53.325841]  __asan_report_load4_noabort+0x20/0x30
[   53.325876]  kasan_atomics_helper+0x3dcc/0x4858
[   53.325906]  kasan_atomics+0x198/0x2e0
[   53.325935]  kunit_try_run_case+0x170/0x3f0
[   53.325972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.326012]  kthread+0x328/0x630
[   53.326044]  ret_from_fork+0x10/0x20
[   53.326078] 
[   53.392538] Allocated by task 314:
[   53.395925]  kasan_save_stack+0x3c/0x68
[   53.399742]  kasan_save_track+0x20/0x40
[   53.403562]  kasan_save_alloc_info+0x40/0x58
[   53.407815]  __kasan_kmalloc+0xd4/0xd8
[   53.411548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.416062]  kasan_atomics+0xb8/0x2e0
[   53.419707]  kunit_try_run_case+0x170/0x3f0
[   53.423874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.429343]  kthread+0x328/0x630
[   53.432554]  ret_from_fork+0x10/0x20
[   53.436114] 
[   53.437589] The buggy address belongs to the object at ffff000800d61a00
[   53.437589]  which belongs to the cache kmalloc-64 of size 64
[   53.449916] The buggy address is located 0 bytes to the right of
[   53.449916]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.462763] 
[   53.464238] The buggy address belongs to the physical page:
[   53.469794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   53.477780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.484290] page_type: f5(slab)
[   53.487423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.495147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.502866] page dumped because: kasan: bad access detected
[   53.508422] 
[   53.509897] Memory state around the buggy address:
[   53.514677]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.521880]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.529085] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.536286]                                      ^
[   53.541064]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.548269]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.555470] ==================================================================
[   54.874779] ==================================================================
[   54.881840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   54.889217] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.896508] 
[   54.897992] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.898038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.898055] Hardware name: WinLink E850-96 board (DT)
[   54.898074] Call trace:
[   54.898089]  show_stack+0x20/0x38 (C)
[   54.898121]  dump_stack_lvl+0x8c/0xd0
[   54.898157]  print_report+0x118/0x608
[   54.898189]  kasan_report+0xdc/0x128
[   54.898217]  __asan_report_load4_noabort+0x20/0x30
[   54.898253]  kasan_atomics_helper+0x3dd8/0x4858
[   54.898284]  kasan_atomics+0x198/0x2e0
[   54.898311]  kunit_try_run_case+0x170/0x3f0
[   54.898347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.898387]  kthread+0x328/0x630
[   54.898421]  ret_from_fork+0x10/0x20
[   54.898457] 
[   54.964910] Allocated by task 314:
[   54.968296]  kasan_save_stack+0x3c/0x68
[   54.972114]  kasan_save_track+0x20/0x40
[   54.975934]  kasan_save_alloc_info+0x40/0x58
[   54.980188]  __kasan_kmalloc+0xd4/0xd8
[   54.983920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.988434]  kasan_atomics+0xb8/0x2e0
[   54.992080]  kunit_try_run_case+0x170/0x3f0
[   54.996246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.001715]  kthread+0x328/0x630
[   55.004927]  ret_from_fork+0x10/0x20
[   55.008486] 
[   55.009961] The buggy address belongs to the object at ffff000800d61a00
[   55.009961]  which belongs to the cache kmalloc-64 of size 64
[   55.022288] The buggy address is located 0 bytes to the right of
[   55.022288]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.035135] 
[   55.036612] The buggy address belongs to the physical page:
[   55.042167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.050152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.056662] page_type: f5(slab)
[   55.059797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.067520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.075238] page dumped because: kasan: bad access detected
[   55.080794] 
[   55.082269] Memory state around the buggy address:
[   55.087048]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.094252]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.101457] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.108658]                                      ^
[   55.113436]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.120640]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.127842] ==================================================================
[   56.971275] ==================================================================
[   56.978337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   56.985626] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.993005] 
[   56.994487] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.994537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.994553] Hardware name: WinLink E850-96 board (DT)
[   56.994573] Call trace:
[   56.994585]  show_stack+0x20/0x38 (C)
[   56.994618]  dump_stack_lvl+0x8c/0xd0
[   56.994652]  print_report+0x118/0x608
[   56.994682]  kasan_report+0xdc/0x128
[   56.994714]  kasan_check_range+0x100/0x1a8
[   56.994747]  __kasan_check_write+0x20/0x30
[   56.994780]  kasan_atomics_helper+0xf20/0x4858
[   56.994811]  kasan_atomics+0x198/0x2e0
[   56.994838]  kunit_try_run_case+0x170/0x3f0
[   56.994872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.994911]  kthread+0x328/0x630
[   56.994945]  ret_from_fork+0x10/0x20
[   56.994978] 
[   57.064705] Allocated by task 314:
[   57.068091]  kasan_save_stack+0x3c/0x68
[   57.071910]  kasan_save_track+0x20/0x40
[   57.075729]  kasan_save_alloc_info+0x40/0x58
[   57.079983]  __kasan_kmalloc+0xd4/0xd8
[   57.083715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.088229]  kasan_atomics+0xb8/0x2e0
[   57.091875]  kunit_try_run_case+0x170/0x3f0
[   57.096041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.101509]  kthread+0x328/0x630
[   57.104722]  ret_from_fork+0x10/0x20
[   57.108281] 
[   57.109756] The buggy address belongs to the object at ffff000800d61a00
[   57.109756]  which belongs to the cache kmalloc-64 of size 64
[   57.122083] The buggy address is located 0 bytes to the right of
[   57.122083]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.134930] 
[   57.136406] The buggy address belongs to the physical page:
[   57.141963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.149947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.156457] page_type: f5(slab)
[   57.159592] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.167314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.175033] page dumped because: kasan: bad access detected
[   57.180588] 
[   57.182064] Memory state around the buggy address:
[   57.186842]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.194047]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.201252] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.208453]                                      ^
[   57.213231]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.220436]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.227637] ==================================================================
[   52.247594] ==================================================================
[   52.254624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.261913] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.269291] 
[   52.270774] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.270823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.270840] Hardware name: WinLink E850-96 board (DT)
[   52.270861] Call trace:
[   52.270873]  show_stack+0x20/0x38 (C)
[   52.270904]  dump_stack_lvl+0x8c/0xd0
[   52.270941]  print_report+0x118/0x608
[   52.270972]  kasan_report+0xdc/0x128
[   52.271001]  kasan_check_range+0x100/0x1a8
[   52.271033]  __kasan_check_write+0x20/0x30
[   52.271065]  kasan_atomics_helper+0x99c/0x4858
[   52.271097]  kasan_atomics+0x198/0x2e0
[   52.271125]  kunit_try_run_case+0x170/0x3f0
[   52.271159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.271199]  kthread+0x328/0x630
[   52.271232]  ret_from_fork+0x10/0x20
[   52.271264] 
[   52.340991] Allocated by task 314:
[   52.344378]  kasan_save_stack+0x3c/0x68
[   52.348196]  kasan_save_track+0x20/0x40
[   52.352015]  kasan_save_alloc_info+0x40/0x58
[   52.356269]  __kasan_kmalloc+0xd4/0xd8
[   52.360001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.364515]  kasan_atomics+0xb8/0x2e0
[   52.368161]  kunit_try_run_case+0x170/0x3f0
[   52.372328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.377796]  kthread+0x328/0x630
[   52.381008]  ret_from_fork+0x10/0x20
[   52.384567] 
[   52.386042] The buggy address belongs to the object at ffff000800d61a00
[   52.386042]  which belongs to the cache kmalloc-64 of size 64
[   52.398369] The buggy address is located 0 bytes to the right of
[   52.398369]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.411216] 
[   52.412692] The buggy address belongs to the physical page:
[   52.418249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.426233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.432743] page_type: f5(slab)
[   52.435878] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.443600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.451319] page dumped because: kasan: bad access detected
[   52.456874] 
[   52.458350] Memory state around the buggy address:
[   52.463130]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.470334]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.477538] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.484739]                                      ^
[   52.489517]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.496722]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.503923] ==================================================================
[   61.713767] ==================================================================
[   61.720800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.728177] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.735555] 
[   61.737037] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   61.737083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.737101] Hardware name: WinLink E850-96 board (DT)
[   61.737118] Call trace:
[   61.737132]  show_stack+0x20/0x38 (C)
[   61.737163]  dump_stack_lvl+0x8c/0xd0
[   61.737198]  print_report+0x118/0x608
[   61.737228]  kasan_report+0xdc/0x128
[   61.737257]  kasan_check_range+0x100/0x1a8
[   61.737288]  __kasan_check_write+0x20/0x30
[   61.737319]  kasan_atomics_helper+0x1644/0x4858
[   61.737351]  kasan_atomics+0x198/0x2e0
[   61.737379]  kunit_try_run_case+0x170/0x3f0
[   61.737417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.737454]  kthread+0x328/0x630
[   61.737487]  ret_from_fork+0x10/0x20
[   61.737519] 
[   61.807342] Allocated by task 314:
[   61.810729]  kasan_save_stack+0x3c/0x68
[   61.814547]  kasan_save_track+0x20/0x40
[   61.818366]  kasan_save_alloc_info+0x40/0x58
[   61.822620]  __kasan_kmalloc+0xd4/0xd8
[   61.826352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.830866]  kasan_atomics+0xb8/0x2e0
[   61.834512]  kunit_try_run_case+0x170/0x3f0
[   61.838678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.844147]  kthread+0x328/0x630
[   61.847359]  ret_from_fork+0x10/0x20
[   61.850918] 
[   61.852394] The buggy address belongs to the object at ffff000800d61a00
[   61.852394]  which belongs to the cache kmalloc-64 of size 64
[   61.864721] The buggy address is located 0 bytes to the right of
[   61.864721]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.877567] 
[   61.879042] The buggy address belongs to the physical page:
[   61.884598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.892584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.899094] page_type: f5(slab)
[   61.902230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.909951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.917670] page dumped because: kasan: bad access detected
[   61.923225] 
[   61.924701] Memory state around the buggy address:
[   61.929481]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.936684]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.943889] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.951090]                                      ^
[   61.955868]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.963074]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.970274] ==================================================================
[   52.774976] ==================================================================
[   52.782045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.789335] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.796713] 
[   52.798198] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.798247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.798262] Hardware name: WinLink E850-96 board (DT)
[   52.798282] Call trace:
[   52.798294]  show_stack+0x20/0x38 (C)
[   52.798324]  dump_stack_lvl+0x8c/0xd0
[   52.798360]  print_report+0x118/0x608
[   52.798390]  kasan_report+0xdc/0x128
[   52.798420]  kasan_check_range+0x100/0x1a8
[   52.798452]  __kasan_check_write+0x20/0x30
[   52.798485]  kasan_atomics_helper+0xa6c/0x4858
[   52.798515]  kasan_atomics+0x198/0x2e0
[   52.798543]  kunit_try_run_case+0x170/0x3f0
[   52.798578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.798617]  kthread+0x328/0x630
[   52.798651]  ret_from_fork+0x10/0x20
[   52.798682] 
[   52.868414] Allocated by task 314:
[   52.871799]  kasan_save_stack+0x3c/0x68
[   52.875619]  kasan_save_track+0x20/0x40
[   52.879438]  kasan_save_alloc_info+0x40/0x58
[   52.883691]  __kasan_kmalloc+0xd4/0xd8
[   52.887424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.891937]  kasan_atomics+0xb8/0x2e0
[   52.895584]  kunit_try_run_case+0x170/0x3f0
[   52.899750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.905219]  kthread+0x328/0x630
[   52.908431]  ret_from_fork+0x10/0x20
[   52.911989] 
[   52.913465] The buggy address belongs to the object at ffff000800d61a00
[   52.913465]  which belongs to the cache kmalloc-64 of size 64
[   52.925793] The buggy address is located 0 bytes to the right of
[   52.925793]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.938638] 
[   52.940114] The buggy address belongs to the physical page:
[   52.945670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.953656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.960166] page_type: f5(slab)
[   52.963301] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.971023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.978742] page dumped because: kasan: bad access detected
[   52.984297] 
[   52.985773] Memory state around the buggy address:
[   52.990553]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.997756]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.004961] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.012162]                                      ^
[   53.016940]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.024144]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.031346] ==================================================================
[   61.453332] ==================================================================
[   61.460388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.467764] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.475055] 
[   61.476538] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   61.476585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.476600] Hardware name: WinLink E850-96 board (DT)
[   61.476619] Call trace:
[   61.476632]  show_stack+0x20/0x38 (C)
[   61.476663]  dump_stack_lvl+0x8c/0xd0
[   61.476699]  print_report+0x118/0x608
[   61.476730]  kasan_report+0xdc/0x128
[   61.476760]  __asan_report_load8_noabort+0x20/0x30
[   61.476793]  kasan_atomics_helper+0x3db0/0x4858
[   61.476824]  kasan_atomics+0x198/0x2e0
[   61.476851]  kunit_try_run_case+0x170/0x3f0
[   61.476887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.476924]  kthread+0x328/0x630
[   61.476957]  ret_from_fork+0x10/0x20
[   61.476990] 
[   61.543457] Allocated by task 314:
[   61.546842]  kasan_save_stack+0x3c/0x68
[   61.550662]  kasan_save_track+0x20/0x40
[   61.554481]  kasan_save_alloc_info+0x40/0x58
[   61.558735]  __kasan_kmalloc+0xd4/0xd8
[   61.562467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.566981]  kasan_atomics+0xb8/0x2e0
[   61.570627]  kunit_try_run_case+0x170/0x3f0
[   61.574793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.580262]  kthread+0x328/0x630
[   61.583474]  ret_from_fork+0x10/0x20
[   61.587033] 
[   61.588508] The buggy address belongs to the object at ffff000800d61a00
[   61.588508]  which belongs to the cache kmalloc-64 of size 64
[   61.600835] The buggy address is located 0 bytes to the right of
[   61.600835]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.613681] 
[   61.615158] The buggy address belongs to the physical page:
[   61.620714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.628700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.635209] page_type: f5(slab)
[   61.638344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.646067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.653786] page dumped because: kasan: bad access detected
[   61.659341] 
[   61.660816] Memory state around the buggy address:
[   61.665596]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.672799]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.680004] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.687205]                                      ^
[   61.691983]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.699187]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.706389] ==================================================================
[   48.822647] ==================================================================
[   48.829674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.836964] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.844342] 
[   48.845825] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.845876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.845893] Hardware name: WinLink E850-96 board (DT)
[   48.845912] Call trace:
[   48.845924]  show_stack+0x20/0x38 (C)
[   48.845953]  dump_stack_lvl+0x8c/0xd0
[   48.845988]  print_report+0x118/0x608
[   48.846017]  kasan_report+0xdc/0x128
[   48.846048]  kasan_check_range+0x100/0x1a8
[   48.846080]  __kasan_check_write+0x20/0x30
[   48.846112]  kasan_atomics_helper+0x414/0x4858
[   48.846141]  kasan_atomics+0x198/0x2e0
[   48.846170]  kunit_try_run_case+0x170/0x3f0
[   48.846205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.846245]  kthread+0x328/0x630
[   48.846278]  ret_from_fork+0x10/0x20
[   48.846310] 
[   48.916042] Allocated by task 314:
[   48.919428]  kasan_save_stack+0x3c/0x68
[   48.923247]  kasan_save_track+0x20/0x40
[   48.927067]  kasan_save_alloc_info+0x40/0x58
[   48.931320]  __kasan_kmalloc+0xd4/0xd8
[   48.935053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.939566]  kasan_atomics+0xb8/0x2e0
[   48.943212]  kunit_try_run_case+0x170/0x3f0
[   48.947379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.952847]  kthread+0x328/0x630
[   48.956059]  ret_from_fork+0x10/0x20
[   48.959618] 
[   48.961094] The buggy address belongs to the object at ffff000800d61a00
[   48.961094]  which belongs to the cache kmalloc-64 of size 64
[   48.973420] The buggy address is located 0 bytes to the right of
[   48.973420]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.986267] 
[   48.987745] The buggy address belongs to the physical page:
[   48.993301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.001284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.007794] page_type: f5(slab)
[   49.010929] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.018652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.026370] page dumped because: kasan: bad access detected
[   49.031926] 
[   49.033402] Memory state around the buggy address:
[   49.038182]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.045385]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.052590] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.059790]                                      ^
[   49.064568]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.071773]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.078974] ==================================================================
[   48.034698] ==================================================================
[   48.041667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.048955] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.056333] 
[   48.057818] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.057870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.057887] Hardware name: WinLink E850-96 board (DT)
[   48.057908] Call trace:
[   48.057924]  show_stack+0x20/0x38 (C)
[   48.057959]  dump_stack_lvl+0x8c/0xd0
[   48.057997]  print_report+0x118/0x608
[   48.058029]  kasan_report+0xdc/0x128
[   48.058058]  kasan_check_range+0x100/0x1a8
[   48.058093]  __kasan_check_write+0x20/0x30
[   48.058127]  kasan_atomics_helper+0x32c/0x4858
[   48.058156]  kasan_atomics+0x198/0x2e0
[   48.058185]  kunit_try_run_case+0x170/0x3f0
[   48.058223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.058261]  kthread+0x328/0x630
[   48.058296]  ret_from_fork+0x10/0x20
[   48.058330] 
[   48.128034] Allocated by task 314:
[   48.131421]  kasan_save_stack+0x3c/0x68
[   48.135238]  kasan_save_track+0x20/0x40
[   48.139058]  kasan_save_alloc_info+0x40/0x58
[   48.143311]  __kasan_kmalloc+0xd4/0xd8
[   48.147044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.151558]  kasan_atomics+0xb8/0x2e0
[   48.155203]  kunit_try_run_case+0x170/0x3f0
[   48.159370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.164839]  kthread+0x328/0x630
[   48.168050]  ret_from_fork+0x10/0x20
[   48.171609] 
[   48.173086] The buggy address belongs to the object at ffff000800d61a00
[   48.173086]  which belongs to the cache kmalloc-64 of size 64
[   48.185413] The buggy address is located 0 bytes to the right of
[   48.185413]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.198258] 
[   48.199734] The buggy address belongs to the physical page:
[   48.205294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   48.213278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.219786] page_type: f5(slab)
[   48.222922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.230643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.238361] page dumped because: kasan: bad access detected
[   48.243917] 
[   48.245393] Memory state around the buggy address:
[   48.250174]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.257376]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.264580] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.271781]                                      ^
[   48.276559]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.283764]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.290965] ==================================================================
[   48.298373] ==================================================================
[   48.305378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.312753] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.320131] 
[   48.321617] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.321667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.321684] Hardware name: WinLink E850-96 board (DT)
[   48.321704] Call trace:
[   48.321714]  show_stack+0x20/0x38 (C)
[   48.321749]  dump_stack_lvl+0x8c/0xd0
[   48.321787]  print_report+0x118/0x608
[   48.321819]  kasan_report+0xdc/0x128
[   48.321848]  __asan_report_store4_noabort+0x20/0x30
[   48.321884]  kasan_atomics_helper+0x3f94/0x4858
[   48.321915]  kasan_atomics+0x198/0x2e0
[   48.321943]  kunit_try_run_case+0x170/0x3f0
[   48.321981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.322021]  kthread+0x328/0x630
[   48.322055]  ret_from_fork+0x10/0x20
[   48.322088] 
[   48.388620] Allocated by task 314:
[   48.392008]  kasan_save_stack+0x3c/0x68
[   48.395825]  kasan_save_track+0x20/0x40
[   48.399644]  kasan_save_alloc_info+0x40/0x58
[   48.403897]  __kasan_kmalloc+0xd4/0xd8
[   48.407630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.412144]  kasan_atomics+0xb8/0x2e0
[   48.415789]  kunit_try_run_case+0x170/0x3f0
[   48.419956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.425425]  kthread+0x328/0x630
[   48.428637]  ret_from_fork+0x10/0x20
[   48.432196] 
[   48.433671] The buggy address belongs to the object at ffff000800d61a00
[   48.433671]  which belongs to the cache kmalloc-64 of size 64
[   48.445999] The buggy address is located 0 bytes to the right of
[   48.445999]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.458844] 
[   48.460322] The buggy address belongs to the physical page:
[   48.465878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   48.473865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.480372] page_type: f5(slab)
[   48.483508] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.491229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.498948] page dumped because: kasan: bad access detected
[   48.504503] 
[   48.505979] Memory state around the buggy address:
[   48.510759]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.517962]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.525166] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.532368]                                      ^
[   48.537146]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.544351]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.551551] ==================================================================
[   49.086332] ==================================================================
[   49.093385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.100676] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.108054] 
[   49.109539] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.109587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.109604] Hardware name: WinLink E850-96 board (DT)
[   49.109624] Call trace:
[   49.109637]  show_stack+0x20/0x38 (C)
[   49.109669]  dump_stack_lvl+0x8c/0xd0
[   49.109705]  print_report+0x118/0x608
[   49.109735]  kasan_report+0xdc/0x128
[   49.109765]  kasan_check_range+0x100/0x1a8
[   49.109798]  __kasan_check_write+0x20/0x30
[   49.109834]  kasan_atomics_helper+0x47c/0x4858
[   49.109865]  kasan_atomics+0x198/0x2e0
[   49.109893]  kunit_try_run_case+0x170/0x3f0
[   49.109927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.109966]  kthread+0x328/0x630
[   49.110000]  ret_from_fork+0x10/0x20
[   49.110032] 
[   49.179754] Allocated by task 314:
[   49.183140]  kasan_save_stack+0x3c/0x68
[   49.186958]  kasan_save_track+0x20/0x40
[   49.190778]  kasan_save_alloc_info+0x40/0x58
[   49.195031]  __kasan_kmalloc+0xd4/0xd8
[   49.198764]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.203278]  kasan_atomics+0xb8/0x2e0
[   49.206924]  kunit_try_run_case+0x170/0x3f0
[   49.211090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.216559]  kthread+0x328/0x630
[   49.219771]  ret_from_fork+0x10/0x20
[   49.223330] 
[   49.224805] The buggy address belongs to the object at ffff000800d61a00
[   49.224805]  which belongs to the cache kmalloc-64 of size 64
[   49.237132] The buggy address is located 0 bytes to the right of
[   49.237132]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   49.249978] 
[   49.251457] The buggy address belongs to the physical page:
[   49.257012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.264996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.271506] page_type: f5(slab)
[   49.274641] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.282364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.290082] page dumped because: kasan: bad access detected
[   49.295638] 
[   49.297113] Memory state around the buggy address:
[   49.301893]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.309096]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.316301] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.323502]                                      ^
[   49.328280]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.335484]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.342685] ==================================================================
[   54.086917] ==================================================================
[   54.094005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.101295] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.108673] 
[   54.110156] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.110206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.110223] Hardware name: WinLink E850-96 board (DT)
[   54.110241] Call trace:
[   54.110254]  show_stack+0x20/0x38 (C)
[   54.110286]  dump_stack_lvl+0x8c/0xd0
[   54.110320]  print_report+0x118/0x608
[   54.110351]  kasan_report+0xdc/0x128
[   54.110380]  kasan_check_range+0x100/0x1a8
[   54.110413]  __kasan_check_write+0x20/0x30
[   54.110447]  kasan_atomics_helper+0xc08/0x4858
[   54.110477]  kasan_atomics+0x198/0x2e0
[   54.110504]  kunit_try_run_case+0x170/0x3f0
[   54.110539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.110578]  kthread+0x328/0x630
[   54.110612]  ret_from_fork+0x10/0x20
[   54.110645] 
[   54.180373] Allocated by task 314:
[   54.183760]  kasan_save_stack+0x3c/0x68
[   54.187578]  kasan_save_track+0x20/0x40
[   54.191397]  kasan_save_alloc_info+0x40/0x58
[   54.195651]  __kasan_kmalloc+0xd4/0xd8
[   54.199383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.203897]  kasan_atomics+0xb8/0x2e0
[   54.207543]  kunit_try_run_case+0x170/0x3f0
[   54.211709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.217178]  kthread+0x328/0x630
[   54.220390]  ret_from_fork+0x10/0x20
[   54.223949] 
[   54.225425] The buggy address belongs to the object at ffff000800d61a00
[   54.225425]  which belongs to the cache kmalloc-64 of size 64
[   54.237751] The buggy address is located 0 bytes to the right of
[   54.237751]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   54.250598] 
[   54.252074] The buggy address belongs to the physical page:
[   54.257629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.265615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.272125] page_type: f5(slab)
[   54.275260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.282983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.290701] page dumped because: kasan: bad access detected
[   54.296257] 
[   54.297732] Memory state around the buggy address:
[   54.302510]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.309715]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.316920] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.324121]                                      ^
[   54.328899]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.336104]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.343305] ==================================================================
[   60.133902] ==================================================================
[   60.140962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.148339] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.155717] 
[   60.157200] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.157246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.157262] Hardware name: WinLink E850-96 board (DT)
[   60.157278] Call trace:
[   60.157292]  show_stack+0x20/0x38 (C)
[   60.157322]  dump_stack_lvl+0x8c/0xd0
[   60.157359]  print_report+0x118/0x608
[   60.157389]  kasan_report+0xdc/0x128
[   60.157417]  kasan_check_range+0x100/0x1a8
[   60.157448]  __kasan_check_write+0x20/0x30
[   60.157481]  kasan_atomics_helper+0x1414/0x4858
[   60.157512]  kasan_atomics+0x198/0x2e0
[   60.157540]  kunit_try_run_case+0x170/0x3f0
[   60.157575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.157614]  kthread+0x328/0x630
[   60.157646]  ret_from_fork+0x10/0x20
[   60.157679] 
[   60.227504] Allocated by task 314:
[   60.230892]  kasan_save_stack+0x3c/0x68
[   60.234709]  kasan_save_track+0x20/0x40
[   60.238529]  kasan_save_alloc_info+0x40/0x58
[   60.242782]  __kasan_kmalloc+0xd4/0xd8
[   60.246515]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.251029]  kasan_atomics+0xb8/0x2e0
[   60.254674]  kunit_try_run_case+0x170/0x3f0
[   60.258841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.264310]  kthread+0x328/0x630
[   60.267521]  ret_from_fork+0x10/0x20
[   60.271080] 
[   60.272556] The buggy address belongs to the object at ffff000800d61a00
[   60.272556]  which belongs to the cache kmalloc-64 of size 64
[   60.284883] The buggy address is located 0 bytes to the right of
[   60.284883]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.297729] 
[   60.299205] The buggy address belongs to the physical page:
[   60.304762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.312746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.319257] page_type: f5(slab)
[   60.322390] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.330114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.337833] page dumped because: kasan: bad access detected
[   60.343388] 
[   60.344864] Memory state around the buggy address:
[   60.349643]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.356847]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.364052] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.371253]                                      ^
[   60.376030]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.383235]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.390436] ==================================================================
[   54.611094] ==================================================================
[   54.618129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.625419] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.632797] 
[   54.634280] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.634330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.634347] Hardware name: WinLink E850-96 board (DT)
[   54.634365] Call trace:
[   54.634378]  show_stack+0x20/0x38 (C)
[   54.634408]  dump_stack_lvl+0x8c/0xd0
[   54.634443]  print_report+0x118/0x608
[   54.634475]  kasan_report+0xdc/0x128
[   54.634504]  kasan_check_range+0x100/0x1a8
[   54.634537]  __kasan_check_write+0x20/0x30
[   54.634570]  kasan_atomics_helper+0xca0/0x4858
[   54.634600]  kasan_atomics+0x198/0x2e0
[   54.634628]  kunit_try_run_case+0x170/0x3f0
[   54.634663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.634701]  kthread+0x328/0x630
[   54.634735]  ret_from_fork+0x10/0x20
[   54.634767] 
[   54.704497] Allocated by task 314:
[   54.707884]  kasan_save_stack+0x3c/0x68
[   54.711702]  kasan_save_track+0x20/0x40
[   54.715521]  kasan_save_alloc_info+0x40/0x58
[   54.719775]  __kasan_kmalloc+0xd4/0xd8
[   54.723507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.728021]  kasan_atomics+0xb8/0x2e0
[   54.731667]  kunit_try_run_case+0x170/0x3f0
[   54.735833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.741302]  kthread+0x328/0x630
[   54.744514]  ret_from_fork+0x10/0x20
[   54.748073] 
[   54.749549] The buggy address belongs to the object at ffff000800d61a00
[   54.749549]  which belongs to the cache kmalloc-64 of size 64
[   54.761875] The buggy address is located 0 bytes to the right of
[   54.761875]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   54.774722] 
[   54.776199] The buggy address belongs to the physical page:
[   54.781754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.789739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.796249] page_type: f5(slab)
[   54.799384] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.807107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.814826] page dumped because: kasan: bad access detected
[   54.820381] 
[   54.821856] Memory state around the buggy address:
[   54.826636]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.833840]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.841044] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.848245]                                      ^
[   54.853023]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.860228]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.867429] ==================================================================
[   47.774266] ==================================================================
[   47.781255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.788629] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.795921] 
[   47.797407] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.797461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.797479] Hardware name: WinLink E850-96 board (DT)
[   47.797500] Call trace:
[   47.797514]  show_stack+0x20/0x38 (C)
[   47.797550]  dump_stack_lvl+0x8c/0xd0
[   47.797587]  print_report+0x118/0x608
[   47.797619]  kasan_report+0xdc/0x128
[   47.797647]  __asan_report_load4_noabort+0x20/0x30
[   47.797686]  kasan_atomics_helper+0x40fc/0x4858
[   47.797715]  kasan_atomics+0x198/0x2e0
[   47.797743]  kunit_try_run_case+0x170/0x3f0
[   47.797782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.797822]  kthread+0x328/0x630
[   47.797857]  ret_from_fork+0x10/0x20
[   47.797891] 
[   47.864323] Allocated by task 314:
[   47.867709]  kasan_save_stack+0x3c/0x68
[   47.871527]  kasan_save_track+0x20/0x40
[   47.875347]  kasan_save_alloc_info+0x40/0x58
[   47.879600]  __kasan_kmalloc+0xd4/0xd8
[   47.883332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.887846]  kasan_atomics+0xb8/0x2e0
[   47.891492]  kunit_try_run_case+0x170/0x3f0
[   47.895658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.901127]  kthread+0x328/0x630
[   47.904339]  ret_from_fork+0x10/0x20
[   47.907898] 
[   47.909375] The buggy address belongs to the object at ffff000800d61a00
[   47.909375]  which belongs to the cache kmalloc-64 of size 64
[   47.921702] The buggy address is located 0 bytes to the right of
[   47.921702]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.934547] 
[   47.936025] The buggy address belongs to the physical page:
[   47.941579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.949566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.956075] page_type: f5(slab)
[   47.959212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.966931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.974651] page dumped because: kasan: bad access detected
[   47.980206] 
[   47.981681] Memory state around the buggy address:
[   47.986461]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.993665]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.000869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.008070]                                      ^
[   48.012848]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.020053]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.027254] ==================================================================
[   59.609607] ==================================================================
[   59.616664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.624042] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.631420] 
[   59.632904] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.632953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.632969] Hardware name: WinLink E850-96 board (DT)
[   59.632989] Call trace:
[   59.633001]  show_stack+0x20/0x38 (C)
[   59.633032]  dump_stack_lvl+0x8c/0xd0
[   59.633068]  print_report+0x118/0x608
[   59.633099]  kasan_report+0xdc/0x128
[   59.633130]  kasan_check_range+0x100/0x1a8
[   59.633161]  __kasan_check_write+0x20/0x30
[   59.633195]  kasan_atomics_helper+0x1384/0x4858
[   59.633225]  kasan_atomics+0x198/0x2e0
[   59.633252]  kunit_try_run_case+0x170/0x3f0
[   59.633289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.633331]  kthread+0x328/0x630
[   59.633363]  ret_from_fork+0x10/0x20
[   59.633398] 
[   59.703207] Allocated by task 314:
[   59.706594]  kasan_save_stack+0x3c/0x68
[   59.710411]  kasan_save_track+0x20/0x40
[   59.714231]  kasan_save_alloc_info+0x40/0x58
[   59.718485]  __kasan_kmalloc+0xd4/0xd8
[   59.722217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.726731]  kasan_atomics+0xb8/0x2e0
[   59.730377]  kunit_try_run_case+0x170/0x3f0
[   59.734543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.740012]  kthread+0x328/0x630
[   59.743224]  ret_from_fork+0x10/0x20
[   59.746783] 
[   59.748258] The buggy address belongs to the object at ffff000800d61a00
[   59.748258]  which belongs to the cache kmalloc-64 of size 64
[   59.760585] The buggy address is located 0 bytes to the right of
[   59.760585]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   59.773431] 
[   59.774909] The buggy address belongs to the physical page:
[   59.780465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   59.788449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.794959] page_type: f5(slab)
[   59.798095] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.805816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.813535] page dumped because: kasan: bad access detected
[   59.819090] 
[   59.820566] Memory state around the buggy address:
[   59.825346]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.832549]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.839754] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.846954]                                      ^
[   59.851733]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.858938]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.866139] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   44.312617] ==================================================================
[   44.319672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.328612] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.335903] 
[   44.337386] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.337434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.337451] Hardware name: WinLink E850-96 board (DT)
[   44.337470] Call trace:
[   44.337484]  show_stack+0x20/0x38 (C)
[   44.337515]  dump_stack_lvl+0x8c/0xd0
[   44.337550]  print_report+0x118/0x608
[   44.337579]  kasan_report+0xdc/0x128
[   44.337611]  __asan_report_load8_noabort+0x20/0x30
[   44.337645]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.337680]  kasan_bitops_generic+0x11c/0x1c8
[   44.337708]  kunit_try_run_case+0x170/0x3f0
[   44.337743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.337783]  kthread+0x328/0x630
[   44.337816]  ret_from_fork+0x10/0x20
[   44.337849] 
[   44.406474] Allocated by task 310:
[   44.409860]  kasan_save_stack+0x3c/0x68
[   44.413680]  kasan_save_track+0x20/0x40
[   44.417499]  kasan_save_alloc_info+0x40/0x58
[   44.421753]  __kasan_kmalloc+0xd4/0xd8
[   44.425485]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.429999]  kasan_bitops_generic+0xa0/0x1c8
[   44.434252]  kunit_try_run_case+0x170/0x3f0
[   44.438418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.443888]  kthread+0x328/0x630
[   44.447099]  ret_from_fork+0x10/0x20
[   44.450658] 
[   44.452133] The buggy address belongs to the object at ffff000802e0b440
[   44.452133]  which belongs to the cache kmalloc-16 of size 16
[   44.464462] The buggy address is located 8 bytes inside of
[   44.464462]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   44.476699] 
[   44.478175] The buggy address belongs to the physical page:
[   44.483734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   44.491719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.498227] page_type: f5(slab)
[   44.501360] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.509084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.516803] page dumped because: kasan: bad access detected
[   44.522358] 
[   44.523834] Memory state around the buggy address:
[   44.528613]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.535817]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.543022] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.550223]                                               ^
[   44.555782]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.562987]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.570188] ==================================================================
[   45.644207] ==================================================================
[   45.651249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.660189] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.667567] 
[   45.669050] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.669098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.669112] Hardware name: WinLink E850-96 board (DT)
[   45.669131] Call trace:
[   45.669144]  show_stack+0x20/0x38 (C)
[   45.669174]  dump_stack_lvl+0x8c/0xd0
[   45.669206]  print_report+0x118/0x608
[   45.669236]  kasan_report+0xdc/0x128
[   45.669266]  kasan_check_range+0x100/0x1a8
[   45.669300]  __kasan_check_write+0x20/0x30
[   45.669331]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.669367]  kasan_bitops_generic+0x11c/0x1c8
[   45.669396]  kunit_try_run_case+0x170/0x3f0
[   45.669430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.669470]  kthread+0x328/0x630
[   45.669505]  ret_from_fork+0x10/0x20
[   45.669539] 
[   45.741524] Allocated by task 310:
[   45.744910]  kasan_save_stack+0x3c/0x68
[   45.748729]  kasan_save_track+0x20/0x40
[   45.752548]  kasan_save_alloc_info+0x40/0x58
[   45.756802]  __kasan_kmalloc+0xd4/0xd8
[   45.760534]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.765048]  kasan_bitops_generic+0xa0/0x1c8
[   45.769302]  kunit_try_run_case+0x170/0x3f0
[   45.773468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.778937]  kthread+0x328/0x630
[   45.782149]  ret_from_fork+0x10/0x20
[   45.785708] 
[   45.787183] The buggy address belongs to the object at ffff000802e0b440
[   45.787183]  which belongs to the cache kmalloc-16 of size 16
[   45.799510] The buggy address is located 8 bytes inside of
[   45.799510]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.811749] 
[   45.813225] The buggy address belongs to the physical page:
[   45.818781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.826766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.833276] page_type: f5(slab)
[   45.836412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.844134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.851852] page dumped because: kasan: bad access detected
[   45.857408] 
[   45.858883] Memory state around the buggy address:
[   45.863662]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.870867]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.878071] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.885272]                                               ^
[   45.890832]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.898036]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.905237] ==================================================================
[   45.110861] ==================================================================
[   45.117924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.126864] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.134242] 
[   45.135725] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.135773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.135789] Hardware name: WinLink E850-96 board (DT)
[   45.135811] Call trace:
[   45.135823]  show_stack+0x20/0x38 (C)
[   45.135857]  dump_stack_lvl+0x8c/0xd0
[   45.135891]  print_report+0x118/0x608
[   45.135922]  kasan_report+0xdc/0x128
[   45.135952]  kasan_check_range+0x100/0x1a8
[   45.135985]  __kasan_check_write+0x20/0x30
[   45.136018]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.136055]  kasan_bitops_generic+0x11c/0x1c8
[   45.136084]  kunit_try_run_case+0x170/0x3f0
[   45.136119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.136158]  kthread+0x328/0x630
[   45.136190]  ret_from_fork+0x10/0x20
[   45.136223] 
[   45.208199] Allocated by task 310:
[   45.211584]  kasan_save_stack+0x3c/0x68
[   45.215403]  kasan_save_track+0x20/0x40
[   45.219223]  kasan_save_alloc_info+0x40/0x58
[   45.223476]  __kasan_kmalloc+0xd4/0xd8
[   45.227209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.231723]  kasan_bitops_generic+0xa0/0x1c8
[   45.235976]  kunit_try_run_case+0x170/0x3f0
[   45.240143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.245612]  kthread+0x328/0x630
[   45.248823]  ret_from_fork+0x10/0x20
[   45.252382] 
[   45.253858] The buggy address belongs to the object at ffff000802e0b440
[   45.253858]  which belongs to the cache kmalloc-16 of size 16
[   45.266184] The buggy address is located 8 bytes inside of
[   45.266184]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.278423] 
[   45.279900] The buggy address belongs to the physical page:
[   45.285456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.293441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.299951] page_type: f5(slab)
[   45.303086] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.310808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.318527] page dumped because: kasan: bad access detected
[   45.324082] 
[   45.325558] Memory state around the buggy address:
[   45.330337]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.337541]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.344746] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.351947]                                               ^
[   45.357506]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.364711]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.371912] ==================================================================
[   44.577562] ==================================================================
[   44.584600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.593538] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.600916] 
[   44.602399] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.602446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.602462] Hardware name: WinLink E850-96 board (DT)
[   44.602481] Call trace:
[   44.602496]  show_stack+0x20/0x38 (C)
[   44.602528]  dump_stack_lvl+0x8c/0xd0
[   44.602562]  print_report+0x118/0x608
[   44.602593]  kasan_report+0xdc/0x128
[   44.602623]  kasan_check_range+0x100/0x1a8
[   44.602656]  __kasan_check_write+0x20/0x30
[   44.602690]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.602725]  kasan_bitops_generic+0x11c/0x1c8
[   44.602753]  kunit_try_run_case+0x170/0x3f0
[   44.602787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.602825]  kthread+0x328/0x630
[   44.602857]  ret_from_fork+0x10/0x20
[   44.602890] 
[   44.674874] Allocated by task 310:
[   44.678259]  kasan_save_stack+0x3c/0x68
[   44.682078]  kasan_save_track+0x20/0x40
[   44.685898]  kasan_save_alloc_info+0x40/0x58
[   44.690151]  __kasan_kmalloc+0xd4/0xd8
[   44.693884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.698397]  kasan_bitops_generic+0xa0/0x1c8
[   44.702651]  kunit_try_run_case+0x170/0x3f0
[   44.706817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.712286]  kthread+0x328/0x630
[   44.715498]  ret_from_fork+0x10/0x20
[   44.719057] 
[   44.720532] The buggy address belongs to the object at ffff000802e0b440
[   44.720532]  which belongs to the cache kmalloc-16 of size 16
[   44.732859] The buggy address is located 8 bytes inside of
[   44.732859]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   44.745098] 
[   44.746574] The buggy address belongs to the physical page:
[   44.752133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   44.760116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.766626] page_type: f5(slab)
[   44.769761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.777483] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.785202] page dumped because: kasan: bad access detected
[   44.790757] 
[   44.792233] Memory state around the buggy address:
[   44.797013]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.804216]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.811420] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.818622]                                               ^
[   44.824181]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.831385]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.838586] ==================================================================
[   44.044439] ==================================================================
[   44.051450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.060300] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.067678] 
[   44.069161] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.069210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.069229] Hardware name: WinLink E850-96 board (DT)
[   44.069248] Call trace:
[   44.069262]  show_stack+0x20/0x38 (C)
[   44.069293]  dump_stack_lvl+0x8c/0xd0
[   44.069331]  print_report+0x118/0x608
[   44.069360]  kasan_report+0xdc/0x128
[   44.069392]  kasan_check_range+0x100/0x1a8
[   44.069429]  __kasan_check_write+0x20/0x30
[   44.069460]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.069495]  kasan_bitops_generic+0x11c/0x1c8
[   44.069524]  kunit_try_run_case+0x170/0x3f0
[   44.069558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.069598]  kthread+0x328/0x630
[   44.069633]  ret_from_fork+0x10/0x20
[   44.069668] 
[   44.141548] Allocated by task 310:
[   44.144934]  kasan_save_stack+0x3c/0x68
[   44.148753]  kasan_save_track+0x20/0x40
[   44.152572]  kasan_save_alloc_info+0x40/0x58
[   44.156826]  __kasan_kmalloc+0xd4/0xd8
[   44.160559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.165072]  kasan_bitops_generic+0xa0/0x1c8
[   44.169326]  kunit_try_run_case+0x170/0x3f0
[   44.173492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.178961]  kthread+0x328/0x630
[   44.182173]  ret_from_fork+0x10/0x20
[   44.185731] 
[   44.187207] The buggy address belongs to the object at ffff000802e0b440
[   44.187207]  which belongs to the cache kmalloc-16 of size 16
[   44.199534] The buggy address is located 8 bytes inside of
[   44.199534]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   44.211773] 
[   44.213249] The buggy address belongs to the physical page:
[   44.218807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   44.226792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.233301] page_type: f5(slab)
[   44.236435] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.244158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.251877] page dumped because: kasan: bad access detected
[   44.257432] 
[   44.258907] Memory state around the buggy address:
[   44.263686]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.270890]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.278095] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.285296]                                               ^
[   44.290855]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.298060]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.305261] ==================================================================
[   46.177543] ==================================================================
[   46.184575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.193514] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   46.200805] 
[   46.202287] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   46.202332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.202349] Hardware name: WinLink E850-96 board (DT)
[   46.202368] Call trace:
[   46.202382]  show_stack+0x20/0x38 (C)
[   46.202415]  dump_stack_lvl+0x8c/0xd0
[   46.202448]  print_report+0x118/0x608
[   46.202480]  kasan_report+0xdc/0x128
[   46.202509]  __asan_report_load8_noabort+0x20/0x30
[   46.202545]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.202580]  kasan_bitops_generic+0x11c/0x1c8
[   46.202609]  kunit_try_run_case+0x170/0x3f0
[   46.202643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.202686]  kthread+0x328/0x630
[   46.202717]  ret_from_fork+0x10/0x20
[   46.202749] 
[   46.271377] Allocated by task 310:
[   46.274764]  kasan_save_stack+0x3c/0x68
[   46.278582]  kasan_save_track+0x20/0x40
[   46.282401]  kasan_save_alloc_info+0x40/0x58
[   46.286655]  __kasan_kmalloc+0xd4/0xd8
[   46.290388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.294901]  kasan_bitops_generic+0xa0/0x1c8
[   46.299155]  kunit_try_run_case+0x170/0x3f0
[   46.303321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.308790]  kthread+0x328/0x630
[   46.312002]  ret_from_fork+0x10/0x20
[   46.315561] 
[   46.317036] The buggy address belongs to the object at ffff000802e0b440
[   46.317036]  which belongs to the cache kmalloc-16 of size 16
[   46.329364] The buggy address is located 8 bytes inside of
[   46.329364]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   46.341602] 
[   46.343078] The buggy address belongs to the physical page:
[   46.348635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   46.356620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.363129] page_type: f5(slab)
[   46.366264] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.373986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.381706] page dumped because: kasan: bad access detected
[   46.387261] 
[   46.388737] Memory state around the buggy address:
[   46.393515]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   46.400719]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   46.407924] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   46.415125]                                               ^
[   46.420684]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.427889]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.435090] ==================================================================
[   45.379264] ==================================================================
[   45.386323] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.395262] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.402554] 
[   45.404037] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.404082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.404096] Hardware name: WinLink E850-96 board (DT)
[   45.404113] Call trace:
[   45.404125]  show_stack+0x20/0x38 (C)
[   45.404155]  dump_stack_lvl+0x8c/0xd0
[   45.404190]  print_report+0x118/0x608
[   45.404219]  kasan_report+0xdc/0x128
[   45.404248]  __asan_report_load8_noabort+0x20/0x30
[   45.404281]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.404315]  kasan_bitops_generic+0x11c/0x1c8
[   45.404344]  kunit_try_run_case+0x170/0x3f0
[   45.404379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.404418]  kthread+0x328/0x630
[   45.404451]  ret_from_fork+0x10/0x20
[   45.404482] 
[   45.473126] Allocated by task 310:
[   45.476511]  kasan_save_stack+0x3c/0x68
[   45.480330]  kasan_save_track+0x20/0x40
[   45.484150]  kasan_save_alloc_info+0x40/0x58
[   45.488403]  __kasan_kmalloc+0xd4/0xd8
[   45.492136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.496650]  kasan_bitops_generic+0xa0/0x1c8
[   45.500903]  kunit_try_run_case+0x170/0x3f0
[   45.505069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.510538]  kthread+0x328/0x630
[   45.513750]  ret_from_fork+0x10/0x20
[   45.517309] 
[   45.518784] The buggy address belongs to the object at ffff000802e0b440
[   45.518784]  which belongs to the cache kmalloc-16 of size 16
[   45.531111] The buggy address is located 8 bytes inside of
[   45.531111]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.543350] 
[   45.544826] The buggy address belongs to the physical page:
[   45.550382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.558367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.564878] page_type: f5(slab)
[   45.568010] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.575735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.583454] page dumped because: kasan: bad access detected
[   45.589009] 
[   45.590485] Memory state around the buggy address:
[   45.595263]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.602468]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.609672] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.616873]                                               ^
[   45.622433]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.629637]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.636838] ==================================================================
[   44.845907] ==================================================================
[   44.852998] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.861937] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   44.869228] 
[   44.870712] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   44.870758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.870775] Hardware name: WinLink E850-96 board (DT)
[   44.870794] Call trace:
[   44.870808]  show_stack+0x20/0x38 (C)
[   44.870842]  dump_stack_lvl+0x8c/0xd0
[   44.870878]  print_report+0x118/0x608
[   44.870907]  kasan_report+0xdc/0x128
[   44.870937]  __asan_report_load8_noabort+0x20/0x30
[   44.870971]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.871006]  kasan_bitops_generic+0x11c/0x1c8
[   44.871035]  kunit_try_run_case+0x170/0x3f0
[   44.871071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.871111]  kthread+0x328/0x630
[   44.871144]  ret_from_fork+0x10/0x20
[   44.871174] 
[   44.939800] Allocated by task 310:
[   44.943185]  kasan_save_stack+0x3c/0x68
[   44.947005]  kasan_save_track+0x20/0x40
[   44.950824]  kasan_save_alloc_info+0x40/0x58
[   44.955078]  __kasan_kmalloc+0xd4/0xd8
[   44.958810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.963324]  kasan_bitops_generic+0xa0/0x1c8
[   44.967577]  kunit_try_run_case+0x170/0x3f0
[   44.971744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.977213]  kthread+0x328/0x630
[   44.980424]  ret_from_fork+0x10/0x20
[   44.983983] 
[   44.985459] The buggy address belongs to the object at ffff000802e0b440
[   44.985459]  which belongs to the cache kmalloc-16 of size 16
[   44.997785] The buggy address is located 8 bytes inside of
[   44.997785]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   45.010024] 
[   45.011501] The buggy address belongs to the physical page:
[   45.017057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   45.025043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.031552] page_type: f5(slab)
[   45.034685] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.042410] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.050128] page dumped because: kasan: bad access detected
[   45.055684] 
[   45.057159] Memory state around the buggy address:
[   45.061938]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   45.069142]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   45.076347] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   45.083548]                                               ^
[   45.089107]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.096312]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.103513] ==================================================================
[   45.912585] ==================================================================
[   45.919648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.928588] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   45.935879] 
[   45.937359] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   45.937404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.937421] Hardware name: WinLink E850-96 board (DT)
[   45.937441] Call trace:
[   45.937452]  show_stack+0x20/0x38 (C)
[   45.937484]  dump_stack_lvl+0x8c/0xd0
[   45.937516]  print_report+0x118/0x608
[   45.937547]  kasan_report+0xdc/0x128
[   45.937577]  __asan_report_load8_noabort+0x20/0x30
[   45.937610]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.937645]  kasan_bitops_generic+0x11c/0x1c8
[   45.937674]  kunit_try_run_case+0x170/0x3f0
[   45.937709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.937749]  kthread+0x328/0x630
[   45.937781]  ret_from_fork+0x10/0x20
[   45.937814] 
[   46.006451] Allocated by task 310:
[   46.009836]  kasan_save_stack+0x3c/0x68
[   46.013656]  kasan_save_track+0x20/0x40
[   46.017475]  kasan_save_alloc_info+0x40/0x58
[   46.021728]  __kasan_kmalloc+0xd4/0xd8
[   46.025461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.029975]  kasan_bitops_generic+0xa0/0x1c8
[   46.034228]  kunit_try_run_case+0x170/0x3f0
[   46.038395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.043864]  kthread+0x328/0x630
[   46.047075]  ret_from_fork+0x10/0x20
[   46.050634] 
[   46.052110] The buggy address belongs to the object at ffff000802e0b440
[   46.052110]  which belongs to the cache kmalloc-16 of size 16
[   46.064436] The buggy address is located 8 bytes inside of
[   46.064436]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   46.076675] 
[   46.078151] The buggy address belongs to the physical page:
[   46.083709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   46.091693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.098203] page_type: f5(slab)
[   46.101336] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.109060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.116779] page dumped because: kasan: bad access detected
[   46.122334] 
[   46.123810] Memory state around the buggy address:
[   46.128589]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   46.135793]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   46.142998] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   46.150199]                                               ^
[   46.155758]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.162963]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.170164] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   42.984018] ==================================================================
[   42.991048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   42.999205] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.006496] 
[   43.007980] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.008033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.008051] Hardware name: WinLink E850-96 board (DT)
[   43.008071] Call trace:
[   43.008084]  show_stack+0x20/0x38 (C)
[   43.008119]  dump_stack_lvl+0x8c/0xd0
[   43.008159]  print_report+0x118/0x608
[   43.008191]  kasan_report+0xdc/0x128
[   43.008219]  __asan_report_load8_noabort+0x20/0x30
[   43.008255]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.008289]  kasan_bitops_generic+0x110/0x1c8
[   43.008319]  kunit_try_run_case+0x170/0x3f0
[   43.008358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.008397]  kthread+0x328/0x630
[   43.008433]  ret_from_fork+0x10/0x20
[   43.008470] 
[   43.076286] Allocated by task 310:
[   43.079672]  kasan_save_stack+0x3c/0x68
[   43.083491]  kasan_save_track+0x20/0x40
[   43.087310]  kasan_save_alloc_info+0x40/0x58
[   43.091564]  __kasan_kmalloc+0xd4/0xd8
[   43.095296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.099810]  kasan_bitops_generic+0xa0/0x1c8
[   43.104063]  kunit_try_run_case+0x170/0x3f0
[   43.108230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.113699]  kthread+0x328/0x630
[   43.116911]  ret_from_fork+0x10/0x20
[   43.120470] 
[   43.121945] The buggy address belongs to the object at ffff000802e0b440
[   43.121945]  which belongs to the cache kmalloc-16 of size 16
[   43.134273] The buggy address is located 8 bytes inside of
[   43.134273]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.146511] 
[   43.147989] The buggy address belongs to the physical page:
[   43.153546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.161530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.168039] page_type: f5(slab)
[   43.171176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.178896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.186614] page dumped because: kasan: bad access detected
[   43.192170] 
[   43.193646] Memory state around the buggy address:
[   43.198426]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   43.205630]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   43.212834] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   43.220034]                                               ^
[   43.225595]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.232798]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.240000] ==================================================================
[   41.387629] ==================================================================
[   41.396976] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.405133] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   41.412509] 
[   41.413995] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.414056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.414074] Hardware name: WinLink E850-96 board (DT)
[   41.414098] Call trace:
[   41.414114]  show_stack+0x20/0x38 (C)
[   41.414154]  dump_stack_lvl+0x8c/0xd0
[   41.414195]  print_report+0x118/0x608
[   41.414230]  kasan_report+0xdc/0x128
[   41.414260]  kasan_check_range+0x100/0x1a8
[   41.414294]  __kasan_check_write+0x20/0x30
[   41.414328]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.414364]  kasan_bitops_generic+0x110/0x1c8
[   41.414398]  kunit_try_run_case+0x170/0x3f0
[   41.414439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.414478]  kthread+0x328/0x630
[   41.414516]  ret_from_fork+0x10/0x20
[   41.414556] 
[   41.485685] Allocated by task 310:
[   41.489075]  kasan_save_stack+0x3c/0x68
[   41.492890]  kasan_save_track+0x20/0x40
[   41.496709]  kasan_save_alloc_info+0x40/0x58
[   41.500963]  __kasan_kmalloc+0xd4/0xd8
[   41.504695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.509209]  kasan_bitops_generic+0xa0/0x1c8
[   41.513464]  kunit_try_run_case+0x170/0x3f0
[   41.517629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.523098]  kthread+0x328/0x630
[   41.526310]  ret_from_fork+0x10/0x20
[   41.529869] 
[   41.531347] The buggy address belongs to the object at ffff000802e0b440
[   41.531347]  which belongs to the cache kmalloc-16 of size 16
[   41.543673] The buggy address is located 8 bytes inside of
[   41.543673]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   41.555910] 
[   41.557390] The buggy address belongs to the physical page:
[   41.562946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   41.570929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.577439] page_type: f5(slab)
[   41.580578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.588295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.596013] page dumped because: kasan: bad access detected
[   41.601570] 
[   41.603046] Memory state around the buggy address:
[   41.607827]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   41.615028]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   41.622232] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   41.629433]                                               ^
[   41.634992]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.642197]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.649400] ==================================================================
[   41.920181] ==================================================================
[   41.927176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.935331] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   41.942710] 
[   41.944193] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.944247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.944264] Hardware name: WinLink E850-96 board (DT)
[   41.944286] Call trace:
[   41.944298]  show_stack+0x20/0x38 (C)
[   41.944330]  dump_stack_lvl+0x8c/0xd0
[   41.944368]  print_report+0x118/0x608
[   41.944399]  kasan_report+0xdc/0x128
[   41.944428]  kasan_check_range+0x100/0x1a8
[   41.944463]  __kasan_check_write+0x20/0x30
[   41.944496]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.944529]  kasan_bitops_generic+0x110/0x1c8
[   41.944558]  kunit_try_run_case+0x170/0x3f0
[   41.944598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.944640]  kthread+0x328/0x630
[   41.944675]  ret_from_fork+0x10/0x20
[   41.944708] 
[   42.015886] Allocated by task 310:
[   42.019274]  kasan_save_stack+0x3c/0x68
[   42.023090]  kasan_save_track+0x20/0x40
[   42.026910]  kasan_save_alloc_info+0x40/0x58
[   42.031163]  __kasan_kmalloc+0xd4/0xd8
[   42.034896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.039410]  kasan_bitops_generic+0xa0/0x1c8
[   42.043663]  kunit_try_run_case+0x170/0x3f0
[   42.047830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.053298]  kthread+0x328/0x630
[   42.056510]  ret_from_fork+0x10/0x20
[   42.060069] 
[   42.061544] The buggy address belongs to the object at ffff000802e0b440
[   42.061544]  which belongs to the cache kmalloc-16 of size 16
[   42.073871] The buggy address is located 8 bytes inside of
[   42.073871]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.086110] 
[   42.087588] The buggy address belongs to the physical page:
[   42.093145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.101129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.107638] page_type: f5(slab)
[   42.110776] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.118495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.126214] page dumped because: kasan: bad access detected
[   42.131769] 
[   42.133245] Memory state around the buggy address:
[   42.138025]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.145228]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.152433] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.159634]                                               ^
[   42.165193]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.172398]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.179599] ==================================================================
[   43.247315] ==================================================================
[   43.254412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.262569] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.269947] 
[   43.271430] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.271484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.271503] Hardware name: WinLink E850-96 board (DT)
[   43.271524] Call trace:
[   43.271536]  show_stack+0x20/0x38 (C)
[   43.271572]  dump_stack_lvl+0x8c/0xd0
[   43.271612]  print_report+0x118/0x608
[   43.271643]  kasan_report+0xdc/0x128
[   43.271672]  kasan_check_range+0x100/0x1a8
[   43.271706]  __kasan_check_write+0x20/0x30
[   43.271738]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.271772]  kasan_bitops_generic+0x110/0x1c8
[   43.271802]  kunit_try_run_case+0x170/0x3f0
[   43.271839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.271878]  kthread+0x328/0x630
[   43.271912]  ret_from_fork+0x10/0x20
[   43.271945] 
[   43.343122] Allocated by task 310:
[   43.346510]  kasan_save_stack+0x3c/0x68
[   43.350327]  kasan_save_track+0x20/0x40
[   43.354147]  kasan_save_alloc_info+0x40/0x58
[   43.358400]  __kasan_kmalloc+0xd4/0xd8
[   43.362133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.366647]  kasan_bitops_generic+0xa0/0x1c8
[   43.370900]  kunit_try_run_case+0x170/0x3f0
[   43.375066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.380535]  kthread+0x328/0x630
[   43.383747]  ret_from_fork+0x10/0x20
[   43.387306] 
[   43.388782] The buggy address belongs to the object at ffff000802e0b440
[   43.388782]  which belongs to the cache kmalloc-16 of size 16
[   43.401108] The buggy address is located 8 bytes inside of
[   43.401108]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.413347] 
[   43.414825] The buggy address belongs to the physical page:
[   43.420382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.428366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.434875] page_type: f5(slab)
[   43.438013] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.445732] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.453451] page dumped because: kasan: bad access detected
[   43.459006] 
[   43.460482] Memory state around the buggy address:
[   43.465264]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   43.472465]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   43.479671] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   43.486871]                                               ^
[   43.492431]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.499635]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.506836] ==================================================================
[   43.780993] ==================================================================
[   43.788084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.796241] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.803532] 
[   43.805015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.805066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.805081] Hardware name: WinLink E850-96 board (DT)
[   43.805101] Call trace:
[   43.805114]  show_stack+0x20/0x38 (C)
[   43.805146]  dump_stack_lvl+0x8c/0xd0
[   43.805186]  print_report+0x118/0x608
[   43.805215]  kasan_report+0xdc/0x128
[   43.805245]  __asan_report_load8_noabort+0x20/0x30
[   43.805282]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.805314]  kasan_bitops_generic+0x110/0x1c8
[   43.805345]  kunit_try_run_case+0x170/0x3f0
[   43.805382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.805421]  kthread+0x328/0x630
[   43.805455]  ret_from_fork+0x10/0x20
[   43.805491] 
[   43.873323] Allocated by task 310:
[   43.876709]  kasan_save_stack+0x3c/0x68
[   43.880528]  kasan_save_track+0x20/0x40
[   43.884347]  kasan_save_alloc_info+0x40/0x58
[   43.888600]  __kasan_kmalloc+0xd4/0xd8
[   43.892333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.896847]  kasan_bitops_generic+0xa0/0x1c8
[   43.901100]  kunit_try_run_case+0x170/0x3f0
[   43.905267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.910736]  kthread+0x328/0x630
[   43.913947]  ret_from_fork+0x10/0x20
[   43.917507] 
[   43.918981] The buggy address belongs to the object at ffff000802e0b440
[   43.918981]  which belongs to the cache kmalloc-16 of size 16
[   43.931308] The buggy address is located 8 bytes inside of
[   43.931308]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.943548] 
[   43.945024] The buggy address belongs to the physical page:
[   43.950582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.958567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.965075] page_type: f5(slab)
[   43.968210] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.975932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.983651] page dumped because: kasan: bad access detected
[   43.989206] 
[   43.990682] Memory state around the buggy address:
[   43.995463]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.002665]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.009870] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.017071]                                               ^
[   44.022630]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.029835]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.037036] ==================================================================
[   42.717119] ==================================================================
[   42.724212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.732368] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   42.739746] 
[   42.741229] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   42.741285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.741304] Hardware name: WinLink E850-96 board (DT)
[   42.741323] Call trace:
[   42.741336]  show_stack+0x20/0x38 (C)
[   42.741370]  dump_stack_lvl+0x8c/0xd0
[   42.741410]  print_report+0x118/0x608
[   42.741440]  kasan_report+0xdc/0x128
[   42.741471]  kasan_check_range+0x100/0x1a8
[   42.741504]  __kasan_check_write+0x20/0x30
[   42.741539]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.741573]  kasan_bitops_generic+0x110/0x1c8
[   42.741604]  kunit_try_run_case+0x170/0x3f0
[   42.741642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.741682]  kthread+0x328/0x630
[   42.741716]  ret_from_fork+0x10/0x20
[   42.741750] 
[   42.812921] Allocated by task 310:
[   42.816308]  kasan_save_stack+0x3c/0x68
[   42.820127]  kasan_save_track+0x20/0x40
[   42.823947]  kasan_save_alloc_info+0x40/0x58
[   42.828200]  __kasan_kmalloc+0xd4/0xd8
[   42.831933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.836446]  kasan_bitops_generic+0xa0/0x1c8
[   42.840700]  kunit_try_run_case+0x170/0x3f0
[   42.844866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.850334]  kthread+0x328/0x630
[   42.853546]  ret_from_fork+0x10/0x20
[   42.857106] 
[   42.858581] The buggy address belongs to the object at ffff000802e0b440
[   42.858581]  which belongs to the cache kmalloc-16 of size 16
[   42.870909] The buggy address is located 8 bytes inside of
[   42.870909]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.883147] 
[   42.884625] The buggy address belongs to the physical page:
[   42.890182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.898166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.904674] page_type: f5(slab)
[   42.907812] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.915532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.923251] page dumped because: kasan: bad access detected
[   42.928806] 
[   42.930281] Memory state around the buggy address:
[   42.935064]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.942267]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.949471] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.956670]                                               ^
[   42.962231]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.969435]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.976635] ==================================================================
[   42.450507] ==================================================================
[   42.457375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.465532] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   42.472910] 
[   42.474395] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   42.474449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.474467] Hardware name: WinLink E850-96 board (DT)
[   42.474489] Call trace:
[   42.474502]  show_stack+0x20/0x38 (C)
[   42.474536]  dump_stack_lvl+0x8c/0xd0
[   42.474575]  print_report+0x118/0x608
[   42.474608]  kasan_report+0xdc/0x128
[   42.474638]  kasan_check_range+0x100/0x1a8
[   42.474671]  __kasan_check_write+0x20/0x30
[   42.474707]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.474740]  kasan_bitops_generic+0x110/0x1c8
[   42.474771]  kunit_try_run_case+0x170/0x3f0
[   42.474808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.474849]  kthread+0x328/0x630
[   42.474886]  ret_from_fork+0x10/0x20
[   42.474918] 
[   42.546086] Allocated by task 310:
[   42.549472]  kasan_save_stack+0x3c/0x68
[   42.553291]  kasan_save_track+0x20/0x40
[   42.557110]  kasan_save_alloc_info+0x40/0x58
[   42.561364]  __kasan_kmalloc+0xd4/0xd8
[   42.565096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.569610]  kasan_bitops_generic+0xa0/0x1c8
[   42.573863]  kunit_try_run_case+0x170/0x3f0
[   42.578030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.583498]  kthread+0x328/0x630
[   42.586711]  ret_from_fork+0x10/0x20
[   42.590269] 
[   42.591745] The buggy address belongs to the object at ffff000802e0b440
[   42.591745]  which belongs to the cache kmalloc-16 of size 16
[   42.604073] The buggy address is located 8 bytes inside of
[   42.604073]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.616311] 
[   42.617789] The buggy address belongs to the physical page:
[   42.623346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.631330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.637838] page_type: f5(slab)
[   42.640975] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.648695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.656414] page dumped because: kasan: bad access detected
[   42.661969] 
[   42.663445] Memory state around the buggy address:
[   42.668228]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.675430]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.682635] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.689834]                                               ^
[   42.695393]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.702599]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.709799] ==================================================================
[   43.514165] ==================================================================
[   43.521248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.529405] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.536783] 
[   43.538267] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.538318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.538336] Hardware name: WinLink E850-96 board (DT)
[   43.538357] Call trace:
[   43.538371]  show_stack+0x20/0x38 (C)
[   43.538405]  dump_stack_lvl+0x8c/0xd0
[   43.538443]  print_report+0x118/0x608
[   43.538472]  kasan_report+0xdc/0x128
[   43.538502]  kasan_check_range+0x100/0x1a8
[   43.538535]  __kasan_check_write+0x20/0x30
[   43.538567]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.538600]  kasan_bitops_generic+0x110/0x1c8
[   43.538629]  kunit_try_run_case+0x170/0x3f0
[   43.538666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.538705]  kthread+0x328/0x630
[   43.538739]  ret_from_fork+0x10/0x20
[   43.538773] 
[   43.609959] Allocated by task 310:
[   43.613346]  kasan_save_stack+0x3c/0x68
[   43.617163]  kasan_save_track+0x20/0x40
[   43.620983]  kasan_save_alloc_info+0x40/0x58
[   43.625236]  __kasan_kmalloc+0xd4/0xd8
[   43.628969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.633483]  kasan_bitops_generic+0xa0/0x1c8
[   43.637736]  kunit_try_run_case+0x170/0x3f0
[   43.641903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.647371]  kthread+0x328/0x630
[   43.650583]  ret_from_fork+0x10/0x20
[   43.654143] 
[   43.655618] The buggy address belongs to the object at ffff000802e0b440
[   43.655618]  which belongs to the cache kmalloc-16 of size 16
[   43.667944] The buggy address is located 8 bytes inside of
[   43.667944]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.680184] 
[   43.681661] The buggy address belongs to the physical page:
[   43.687218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.695203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.701712] page_type: f5(slab)
[   43.704846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.712568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.720287] page dumped because: kasan: bad access detected
[   43.725842] 
[   43.727318] Memory state around the buggy address:
[   43.732098]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   43.739302]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   43.746507] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   43.753707]                                               ^
[   43.759267]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.766472]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.773672] ==================================================================
[   42.187051] ==================================================================
[   42.194012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.202168] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   42.209459] 
[   42.210944] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   42.211003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.211022] Hardware name: WinLink E850-96 board (DT)
[   42.211042] Call trace:
[   42.211056]  show_stack+0x20/0x38 (C)
[   42.211090]  dump_stack_lvl+0x8c/0xd0
[   42.211133]  print_report+0x118/0x608
[   42.211165]  kasan_report+0xdc/0x128
[   42.211197]  __asan_report_load8_noabort+0x20/0x30
[   42.211235]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.211268]  kasan_bitops_generic+0x110/0x1c8
[   42.211298]  kunit_try_run_case+0x170/0x3f0
[   42.211338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.211379]  kthread+0x328/0x630
[   42.211416]  ret_from_fork+0x10/0x20
[   42.211450] 
[   42.279251] Allocated by task 310:
[   42.282637]  kasan_save_stack+0x3c/0x68
[   42.286454]  kasan_save_track+0x20/0x40
[   42.290274]  kasan_save_alloc_info+0x40/0x58
[   42.294527]  __kasan_kmalloc+0xd4/0xd8
[   42.298260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.302774]  kasan_bitops_generic+0xa0/0x1c8
[   42.307027]  kunit_try_run_case+0x170/0x3f0
[   42.311194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.316662]  kthread+0x328/0x630
[   42.319875]  ret_from_fork+0x10/0x20
[   42.323434] 
[   42.324909] The buggy address belongs to the object at ffff000802e0b440
[   42.324909]  which belongs to the cache kmalloc-16 of size 16
[   42.337237] The buggy address is located 8 bytes inside of
[   42.337237]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.349474] 
[   42.350953] The buggy address belongs to the physical page:
[   42.356510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.364494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.371003] page_type: f5(slab)
[   42.374140] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.381859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.389578] page dumped because: kasan: bad access detected
[   42.395135] 
[   42.396609] Memory state around the buggy address:
[   42.401392]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.408592]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.415797] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.422997]                                               ^
[   42.428559]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.435763]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.442963] ==================================================================
[   41.656797] ==================================================================
[   41.663812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.671967] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   41.679260] 
[   41.680743] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.680800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.680815] Hardware name: WinLink E850-96 board (DT)
[   41.680838] Call trace:
[   41.680853]  show_stack+0x20/0x38 (C)
[   41.680887]  dump_stack_lvl+0x8c/0xd0
[   41.680927]  print_report+0x118/0x608
[   41.680955]  kasan_report+0xdc/0x128
[   41.680986]  __asan_report_load8_noabort+0x20/0x30
[   41.681024]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.681058]  kasan_bitops_generic+0x110/0x1c8
[   41.681091]  kunit_try_run_case+0x170/0x3f0
[   41.681130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.681169]  kthread+0x328/0x630
[   41.681205]  ret_from_fork+0x10/0x20
[   41.681240] 
[   41.749049] Allocated by task 310:
[   41.752436]  kasan_save_stack+0x3c/0x68
[   41.756254]  kasan_save_track+0x20/0x40
[   41.760074]  kasan_save_alloc_info+0x40/0x58
[   41.764327]  __kasan_kmalloc+0xd4/0xd8
[   41.768060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.772573]  kasan_bitops_generic+0xa0/0x1c8
[   41.776828]  kunit_try_run_case+0x170/0x3f0
[   41.780993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.786462]  kthread+0x328/0x630
[   41.789674]  ret_from_fork+0x10/0x20
[   41.793233] 
[   41.794710] The buggy address belongs to the object at ffff000802e0b440
[   41.794710]  which belongs to the cache kmalloc-16 of size 16
[   41.807035] The buggy address is located 8 bytes inside of
[   41.807035]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   41.819274] 
[   41.820753] The buggy address belongs to the physical page:
[   41.826308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   41.834293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.840801] page_type: f5(slab)
[   41.843939] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.851659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.859377] page dumped because: kasan: bad access detected
[   41.864932] 
[   41.866408] Memory state around the buggy address:
[   41.871190]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   41.878392]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   41.885596] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   41.892797]                                               ^
[   41.898357]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.905561]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.912762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   41.084854] ==================================================================
[   41.091947] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   41.097932] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308
[   41.105222] 
[   41.106708] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.106761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.106778] Hardware name: WinLink E850-96 board (DT)
[   41.106798] Call trace:
[   41.106814]  show_stack+0x20/0x38 (C)
[   41.106854]  dump_stack_lvl+0x8c/0xd0
[   41.106891]  print_report+0x118/0x608
[   41.106923]  kasan_report+0xdc/0x128
[   41.106953]  __asan_report_load1_noabort+0x20/0x30
[   41.106991]  strnlen+0x80/0x88
[   41.107019]  kasan_strings+0x478/0xb00
[   41.107053]  kunit_try_run_case+0x170/0x3f0
[   41.107093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.107132]  kthread+0x328/0x630
[   41.107167]  ret_from_fork+0x10/0x20
[   41.107201] 
[   41.172148] Allocated by task 308:
[   41.175534]  kasan_save_stack+0x3c/0x68
[   41.179353]  kasan_save_track+0x20/0x40
[   41.183172]  kasan_save_alloc_info+0x40/0x58
[   41.187426]  __kasan_kmalloc+0xd4/0xd8
[   41.191158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.195672]  kasan_strings+0xc8/0xb00
[   41.199318]  kunit_try_run_case+0x170/0x3f0
[   41.203485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.208953]  kthread+0x328/0x630
[   41.212165]  ret_from_fork+0x10/0x20
[   41.215724] 
[   41.217200] Freed by task 308:
[   41.220240]  kasan_save_stack+0x3c/0x68
[   41.224058]  kasan_save_track+0x20/0x40
[   41.227878]  kasan_save_free_info+0x4c/0x78
[   41.232043]  __kasan_slab_free+0x6c/0x98
[   41.235949]  kfree+0x214/0x3c8
[   41.238987]  kasan_strings+0x24c/0xb00
[   41.242720]  kunit_try_run_case+0x170/0x3f0
[   41.246887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.252355]  kthread+0x328/0x630
[   41.255567]  ret_from_fork+0x10/0x20
[   41.259126] 
[   41.260603] The buggy address belongs to the object at ffff0008066bd2c0
[   41.260603]  which belongs to the cache kmalloc-32 of size 32
[   41.272928] The buggy address is located 16 bytes inside of
[   41.272928]  freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0)
[   41.284994] 
[   41.286473] The buggy address belongs to the physical page:
[   41.292029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd
[   41.300013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.306522] page_type: f5(slab)
[   41.309658] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.317379] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.325099] page dumped because: kasan: bad access detected
[   41.330653] 
[   41.332128] Memory state around the buggy address:
[   41.336910]  ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.344112]  ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.351316] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.358517]                                                  ^
[   41.364337]  ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.371541]  ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   41.378744] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   40.783903] ==================================================================
[   40.790908] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.796807] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308
[   40.804099] 
[   40.805584] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   40.805635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.805654] Hardware name: WinLink E850-96 board (DT)
[   40.805676] Call trace:
[   40.805690]  show_stack+0x20/0x38 (C)
[   40.805728]  dump_stack_lvl+0x8c/0xd0
[   40.805764]  print_report+0x118/0x608
[   40.805797]  kasan_report+0xdc/0x128
[   40.805827]  __asan_report_load1_noabort+0x20/0x30
[   40.805864]  strlen+0xa8/0xb0
[   40.805893]  kasan_strings+0x418/0xb00
[   40.805928]  kunit_try_run_case+0x170/0x3f0
[   40.805966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.806004]  kthread+0x328/0x630
[   40.806037]  ret_from_fork+0x10/0x20
[   40.806074] 
[   40.870938] Allocated by task 308:
[   40.874325]  kasan_save_stack+0x3c/0x68
[   40.878142]  kasan_save_track+0x20/0x40
[   40.881962]  kasan_save_alloc_info+0x40/0x58
[   40.886215]  __kasan_kmalloc+0xd4/0xd8
[   40.889948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.894462]  kasan_strings+0xc8/0xb00
[   40.898107]  kunit_try_run_case+0x170/0x3f0
[   40.902274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.907743]  kthread+0x328/0x630
[   40.910956]  ret_from_fork+0x10/0x20
[   40.914515] 
[   40.915989] Freed by task 308:
[   40.919029]  kasan_save_stack+0x3c/0x68
[   40.922847]  kasan_save_track+0x20/0x40
[   40.926666]  kasan_save_free_info+0x4c/0x78
[   40.930832]  __kasan_slab_free+0x6c/0x98
[   40.934738]  kfree+0x214/0x3c8
[   40.937777]  kasan_strings+0x24c/0xb00
[   40.941509]  kunit_try_run_case+0x170/0x3f0
[   40.945676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.951145]  kthread+0x328/0x630
[   40.954357]  ret_from_fork+0x10/0x20
[   40.957916] 
[   40.959392] The buggy address belongs to the object at ffff0008066bd2c0
[   40.959392]  which belongs to the cache kmalloc-32 of size 32
[   40.971719] The buggy address is located 16 bytes inside of
[   40.971719]  freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0)
[   40.983783] 
[   40.985261] The buggy address belongs to the physical page:
[   40.990817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd
[   40.998803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.005310] page_type: f5(slab)
[   41.008449] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   41.016168] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.023887] page dumped because: kasan: bad access detected
[   41.029442] 
[   41.030917] Memory state around the buggy address:
[   41.035699]  ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.042901]  ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.050105] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.057306]                                                  ^
[   41.063126]  ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.070331]  ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   41.077532] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   40.484979] ==================================================================
[   40.492043] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   40.498721] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308
[   40.506012] 
[   40.507498] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   40.507556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.507575] Hardware name: WinLink E850-96 board (DT)
[   40.507596] Call trace:
[   40.507611]  show_stack+0x20/0x38 (C)
[   40.507649]  dump_stack_lvl+0x8c/0xd0
[   40.507690]  print_report+0x118/0x608
[   40.507725]  kasan_report+0xdc/0x128
[   40.507753]  __asan_report_load1_noabort+0x20/0x30
[   40.507791]  kasan_strings+0x95c/0xb00
[   40.507827]  kunit_try_run_case+0x170/0x3f0
[   40.507864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.507904]  kthread+0x328/0x630
[   40.507940]  ret_from_fork+0x10/0x20
[   40.507977] 
[   40.569900] Allocated by task 308:
[   40.573286]  kasan_save_stack+0x3c/0x68
[   40.577105]  kasan_save_track+0x20/0x40
[   40.580924]  kasan_save_alloc_info+0x40/0x58
[   40.585178]  __kasan_kmalloc+0xd4/0xd8
[   40.588910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.593424]  kasan_strings+0xc8/0xb00
[   40.597070]  kunit_try_run_case+0x170/0x3f0
[   40.601237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.606705]  kthread+0x328/0x630
[   40.609917]  ret_from_fork+0x10/0x20
[   40.613476] 
[   40.614952] Freed by task 308:
[   40.617992]  kasan_save_stack+0x3c/0x68
[   40.621809]  kasan_save_track+0x20/0x40
[   40.625629]  kasan_save_free_info+0x4c/0x78
[   40.629795]  __kasan_slab_free+0x6c/0x98
[   40.633702]  kfree+0x214/0x3c8
[   40.636740]  kasan_strings+0x24c/0xb00
[   40.640472]  kunit_try_run_case+0x170/0x3f0
[   40.644639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.650107]  kthread+0x328/0x630
[   40.653319]  ret_from_fork+0x10/0x20
[   40.656878] 
[   40.658355] The buggy address belongs to the object at ffff0008066bd2c0
[   40.658355]  which belongs to the cache kmalloc-32 of size 32
[   40.670680] The buggy address is located 16 bytes inside of
[   40.670680]  freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0)
[   40.682746] 
[   40.684223] The buggy address belongs to the physical page:
[   40.689780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd
[   40.697766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.704275] page_type: f5(slab)
[   40.707410] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.715131] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.722850] page dumped because: kasan: bad access detected
[   40.728405] 
[   40.729880] Memory state around the buggy address:
[   40.734662]  ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.741863]  ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.749068] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.756269]                                                  ^
[   40.762089]  ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.769294]  ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   40.776494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   40.167440] ==================================================================
[   40.191005] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.196903] Read of size 1 at addr ffff0008066bd2d0 by task kunit_try_catch/308
[   40.204196] 
[   40.205681] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   40.205741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.205761] Hardware name: WinLink E850-96 board (DT)
[   40.205784] Call trace:
[   40.205799]  show_stack+0x20/0x38 (C)
[   40.205836]  dump_stack_lvl+0x8c/0xd0
[   40.205876]  print_report+0x118/0x608
[   40.205912]  kasan_report+0xdc/0x128
[   40.205944]  __asan_report_load1_noabort+0x20/0x30
[   40.205982]  strcmp+0xc0/0xc8
[   40.206014]  kasan_strings+0x340/0xb00
[   40.206049]  kunit_try_run_case+0x170/0x3f0
[   40.206090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.206132]  kthread+0x328/0x630
[   40.206171]  ret_from_fork+0x10/0x20
[   40.206209] 
[   40.271033] Allocated by task 308:
[   40.274423]  kasan_save_stack+0x3c/0x68
[   40.278238]  kasan_save_track+0x20/0x40
[   40.282057]  kasan_save_alloc_info+0x40/0x58
[   40.286311]  __kasan_kmalloc+0xd4/0xd8
[   40.290045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.294557]  kasan_strings+0xc8/0xb00
[   40.298203]  kunit_try_run_case+0x170/0x3f0
[   40.302370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.307838]  kthread+0x328/0x630
[   40.311050]  ret_from_fork+0x10/0x20
[   40.314609] 
[   40.316084] Freed by task 308:
[   40.319125]  kasan_save_stack+0x3c/0x68
[   40.322942]  kasan_save_track+0x20/0x40
[   40.326763]  kasan_save_free_info+0x4c/0x78
[   40.330928]  __kasan_slab_free+0x6c/0x98
[   40.334835]  kfree+0x214/0x3c8
[   40.337873]  kasan_strings+0x24c/0xb00
[   40.341605]  kunit_try_run_case+0x170/0x3f0
[   40.345772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.351241]  kthread+0x328/0x630
[   40.354454]  ret_from_fork+0x10/0x20
[   40.358011] 
[   40.359488] The buggy address belongs to the object at ffff0008066bd2c0
[   40.359488]  which belongs to the cache kmalloc-32 of size 32
[   40.371816] The buggy address is located 16 bytes inside of
[   40.371816]  freed 32-byte region [ffff0008066bd2c0, ffff0008066bd2e0)
[   40.383879] 
[   40.385359] The buggy address belongs to the physical page:
[   40.390914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8866bd
[   40.398898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.405408] page_type: f5(slab)
[   40.408546] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.416264] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.423983] page dumped because: kasan: bad access detected
[   40.429539] 
[   40.431015] Memory state around the buggy address:
[   40.435795]  ffff0008066bd180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.442996]  ffff0008066bd200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.450203] >ffff0008066bd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.457402]                                                  ^
[   40.463222]  ffff0008066bd300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.470426]  ffff0008066bd380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   40.477629] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   39.868979] ==================================================================
[   39.879117] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.885105] Read of size 1 at addr ffff0008061c6618 by task kunit_try_catch/306
[   39.892393] 
[   39.893881] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   39.893938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.893957] Hardware name: WinLink E850-96 board (DT)
[   39.893983] Call trace:
[   39.893999]  show_stack+0x20/0x38 (C)
[   39.894040]  dump_stack_lvl+0x8c/0xd0
[   39.894078]  print_report+0x118/0x608
[   39.894114]  kasan_report+0xdc/0x128
[   39.894145]  __asan_report_load1_noabort+0x20/0x30
[   39.894183]  memcmp+0x198/0x1d8
[   39.894215]  kasan_memcmp+0x16c/0x300
[   39.894251]  kunit_try_run_case+0x170/0x3f0
[   39.894292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.894334]  kthread+0x328/0x630
[   39.894372]  ret_from_fork+0x10/0x20
[   39.894412] 
[   39.959320] Allocated by task 306:
[   39.962708]  kasan_save_stack+0x3c/0x68
[   39.966524]  kasan_save_track+0x20/0x40
[   39.970343]  kasan_save_alloc_info+0x40/0x58
[   39.974597]  __kasan_kmalloc+0xd4/0xd8
[   39.978329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.982843]  kasan_memcmp+0xbc/0x300
[   39.986402]  kunit_try_run_case+0x170/0x3f0
[   39.990568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.996039]  kthread+0x328/0x630
[   39.999249]  ret_from_fork+0x10/0x20
[   40.002808] 
[   40.004286] The buggy address belongs to the object at ffff0008061c6600
[   40.004286]  which belongs to the cache kmalloc-32 of size 32
[   40.016612] The buggy address is located 0 bytes to the right of
[   40.016612]  allocated 24-byte region [ffff0008061c6600, ffff0008061c6618)
[   40.029457] 
[   40.030937] The buggy address belongs to the physical page:
[   40.036493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8861c6
[   40.044477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.050986] page_type: f5(slab)
[   40.054125] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.061842] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.069560] page dumped because: kasan: bad access detected
[   40.075117] 
[   40.076592] Memory state around the buggy address:
[   40.081371]  ffff0008061c6500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.088575]  ffff0008061c6580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.095781] >ffff0008061c6600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.102980]                             ^
[   40.106977]  ffff0008061c6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.114182]  ffff0008061c6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.121383] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   39.636137] ==================================================================
[   39.645872] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   39.653423] Read of size 1 at addr ffff800089347b4a by task kunit_try_catch/302
[   39.660713] 
[   39.662198] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   39.662257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.662276] Hardware name: WinLink E850-96 board (DT)
[   39.662302] Call trace:
[   39.662317]  show_stack+0x20/0x38 (C)
[   39.662354]  dump_stack_lvl+0x8c/0xd0
[   39.662396]  print_report+0x310/0x608
[   39.662430]  kasan_report+0xdc/0x128
[   39.662460]  __asan_report_load1_noabort+0x20/0x30
[   39.662500]  kasan_alloca_oob_right+0x2dc/0x340
[   39.662537]  kunit_try_run_case+0x170/0x3f0
[   39.662578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.662619]  kthread+0x328/0x630
[   39.662659]  ret_from_fork+0x10/0x20
[   39.662701] 
[   39.725385] The buggy address belongs to stack of task kunit_try_catch/302
[   39.732263] 
[   39.733721] The buggy address belongs to the virtual mapping at
[   39.733721]  [ffff800089340000, ffff800089349000) created by:
[   39.733721]  kernel_clone+0x150/0x7a8
[   39.748993] 
[   39.750472] The buggy address belongs to the physical page:
[   39.756028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886824
[   39.764012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.770534] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.778252] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.785972] page dumped because: kasan: bad access detected
[   39.791528] 
[   39.793002] Memory state around the buggy address:
[   39.797783]  ffff800089347a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.804985]  ffff800089347a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.812191] >ffff800089347b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   39.819391]                                               ^
[   39.824950]  ffff800089347b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.832155]  ffff800089347c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.839356] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   39.424415] ==================================================================
[   39.433463] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.440925] Read of size 1 at addr ffff800089327b5f by task kunit_try_catch/300
[   39.448216] 
[   39.449703] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   39.449758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.449778] Hardware name: WinLink E850-96 board (DT)
[   39.449802] Call trace:
[   39.449816]  show_stack+0x20/0x38 (C)
[   39.449852]  dump_stack_lvl+0x8c/0xd0
[   39.449889]  print_report+0x310/0x608
[   39.449920]  kasan_report+0xdc/0x128
[   39.449950]  __asan_report_load1_noabort+0x20/0x30
[   39.449987]  kasan_alloca_oob_left+0x2b8/0x310
[   39.450023]  kunit_try_run_case+0x170/0x3f0
[   39.450061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.450102]  kthread+0x328/0x630
[   39.450141]  ret_from_fork+0x10/0x20
[   39.450177] 
[   39.512802] The buggy address belongs to stack of task kunit_try_catch/300
[   39.519678] 
[   39.521137] The buggy address belongs to the virtual mapping at
[   39.521137]  [ffff800089320000, ffff800089329000) created by:
[   39.521137]  kernel_clone+0x150/0x7a8
[   39.536409] 
[   39.537889] The buggy address belongs to the physical page:
[   39.543446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886810
[   39.551429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.557951] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.565668] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.573388] page dumped because: kasan: bad access detected
[   39.578944] 
[   39.580418] Memory state around the buggy address:
[   39.585202]  ffff800089327a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.592402]  ffff800089327a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.599608] >ffff800089327b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.606807]                                                     ^
[   39.612887]  ffff800089327b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.620094]  ffff800089327c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.627295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   39.182549] ==================================================================
[   39.196920] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   39.203776] Read of size 1 at addr ffff800089307c2a by task kunit_try_catch/298
[   39.211067] 
[   39.212554] CPU: 6 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   39.212615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.212634] Hardware name: WinLink E850-96 board (DT)
[   39.212658] Call trace:
[   39.212673]  show_stack+0x20/0x38 (C)
[   39.212712]  dump_stack_lvl+0x8c/0xd0
[   39.212753]  print_report+0x310/0x608
[   39.212789]  kasan_report+0xdc/0x128
[   39.212818]  __asan_report_load1_noabort+0x20/0x30
[   39.212859]  kasan_stack_oob+0x238/0x270
[   39.212895]  kunit_try_run_case+0x170/0x3f0
[   39.212932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.212973]  kthread+0x328/0x630
[   39.213009]  ret_from_fork+0x10/0x20
[   39.213045] 
[   39.275132] The buggy address belongs to stack of task kunit_try_catch/298
[   39.281988]  and is located at offset 138 in frame:
[   39.286847]  kasan_stack_oob+0x0/0x270
[   39.290584] 
[   39.292055] This frame has 4 objects:
[   39.295705]  [48, 49) '__assertion'
[   39.295728]  [64, 72) 'array'
[   39.299174]  [96, 112) '__assertion'
[   39.302127]  [128, 138) 'stack_array'
[   39.305683] 
[   39.310810] The buggy address belongs to the virtual mapping at
[   39.310810]  [ffff800089300000, ffff800089309000) created by:
[   39.310810]  kernel_clone+0x150/0x7a8
[   39.326082] 
[   39.327562] The buggy address belongs to the physical page:
[   39.333118] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867fc
[   39.341103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.347623] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.355342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.363061] page dumped because: kasan: bad access detected
[   39.368618] 
[   39.370092] Memory state around the buggy address:
[   39.374875]  ffff800089307b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.382075]  ffff800089307b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   39.389280] >ffff800089307c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   39.396481]                                   ^
[   39.400998]  ffff800089307c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   39.408203]  ffff800089307d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.415405] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   38.965224] ==================================================================
[   38.975743] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   38.983294] Read of size 1 at addr ffff800087a035ad by task kunit_try_catch/294
[   38.990584] 
[   38.992073] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   38.992130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.992149] Hardware name: WinLink E850-96 board (DT)
[   38.992174] Call trace:
[   38.992190]  show_stack+0x20/0x38 (C)
[   38.992226]  dump_stack_lvl+0x8c/0xd0
[   38.992265]  print_report+0x310/0x608
[   38.992297]  kasan_report+0xdc/0x128
[   38.992326]  __asan_report_load1_noabort+0x20/0x30
[   38.992365]  kasan_global_oob_right+0x230/0x270
[   38.992401]  kunit_try_run_case+0x170/0x3f0
[   38.992440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.992479]  kthread+0x328/0x630
[   38.992517]  ret_from_fork+0x10/0x20
[   38.992557] 
[   39.055253] The buggy address belongs to the variable:
[   39.060374]  global_array+0xd/0x40
[   39.063759] 
[   39.065243] The buggy address belongs to the virtual mapping at
[   39.065243]  [ffff800085c20000, ffff800087ac1000) created by:
[   39.065243]  paging_init+0x66c/0x7d0
[   39.080426] 
[   39.081908] The buggy address belongs to the physical page:
[   39.087463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87a03
[   39.095361] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.102662] raw: 03fffe0000002000 fffffdffc01e80c8 fffffdffc01e80c8 0000000000000000
[   39.110380] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.118101] page dumped because: kasan: bad access detected
[   39.123655] 
[   39.125132] Memory state around the buggy address:
[   39.129913]  ffff800087a03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.137113]  ffff800087a03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   39.144321] >ffff800087a03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   39.151519]                                   ^
[   39.156037]  ffff800087a03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   39.163242]  ffff800087a03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   39.170444] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   38.400235] ==================================================================
[   38.410561] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.418550] Free of addr ffff000802d03401 by task kunit_try_catch/290
[   38.424967] 
[   38.426456] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   38.426515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.426534] Hardware name: WinLink E850-96 board (DT)
[   38.426559] Call trace:
[   38.426571]  show_stack+0x20/0x38 (C)
[   38.426608]  dump_stack_lvl+0x8c/0xd0
[   38.426646]  print_report+0x118/0x608
[   38.426677]  kasan_report_invalid_free+0xc0/0xe8
[   38.426711]  check_slab_allocation+0xfc/0x108
[   38.426744]  __kasan_mempool_poison_object+0x78/0x150
[   38.426776]  mempool_free+0x28c/0x328
[   38.426815]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.426855]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.426890]  kunit_try_run_case+0x170/0x3f0
[   38.426929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.426971]  kthread+0x328/0x630
[   38.427008]  ret_from_fork+0x10/0x20
[   38.427044] 
[   38.505003] Allocated by task 290:
[   38.508391]  kasan_save_stack+0x3c/0x68
[   38.512205]  kasan_save_track+0x20/0x40
[   38.516026]  kasan_save_alloc_info+0x40/0x58
[   38.520279]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.525573]  remove_element+0x130/0x1f8
[   38.529392]  mempool_alloc_preallocated+0x58/0xc0
[   38.534080]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   38.539636]  mempool_kmalloc_invalid_free+0xc0/0x118
[   38.544584]  kunit_try_run_case+0x170/0x3f0
[   38.548750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.554218]  kthread+0x328/0x630
[   38.557430]  ret_from_fork+0x10/0x20
[   38.560989] 
[   38.562467] The buggy address belongs to the object at ffff000802d03400
[   38.562467]  which belongs to the cache kmalloc-128 of size 128
[   38.574967] The buggy address is located 1 bytes inside of
[   38.574967]  128-byte region [ffff000802d03400, ffff000802d03480)
[   38.586510] 
[   38.587990] The buggy address belongs to the physical page:
[   38.593547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   38.601530] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.609168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.616113] page_type: f5(slab)
[   38.619250] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.626967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.634694] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   38.642505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.650318] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   38.658131] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   38.665936] page dumped because: kasan: bad access detected
[   38.671491] 
[   38.672967] Memory state around the buggy address:
[   38.677749]  ffff000802d03300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.684951]  ffff000802d03380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.692156] >ffff000802d03400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.699355]                    ^
[   38.702571]  ffff000802d03480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.709776]  ffff000802d03500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.716978] ==================================================================
[   38.726091] ==================================================================
[   38.736164] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.744147] Free of addr ffff00080586c001 by task kunit_try_catch/292
[   38.750572] 
[   38.752059] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   38.752115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.752129] Hardware name: WinLink E850-96 board (DT)
[   38.752151] Call trace:
[   38.752167]  show_stack+0x20/0x38 (C)
[   38.752204]  dump_stack_lvl+0x8c/0xd0
[   38.752244]  print_report+0x118/0x608
[   38.752276]  kasan_report_invalid_free+0xc0/0xe8
[   38.752309]  __kasan_mempool_poison_object+0xfc/0x150
[   38.752342]  mempool_free+0x28c/0x328
[   38.752378]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   38.752420]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   38.752460]  kunit_try_run_case+0x170/0x3f0
[   38.752499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.752542]  kthread+0x328/0x630
[   38.752576]  ret_from_fork+0x10/0x20
[   38.752614] 
[   38.826787] The buggy address belongs to the physical page:
[   38.832345] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88586c
[   38.840328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.847967] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.854910] page_type: f8(unknown)
[   38.858307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.866026] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.873752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.881564] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.889378] head: 0bfffe0000000002 fffffdffe0161b01 00000000ffffffff 00000000ffffffff
[   38.897189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.904995] page dumped because: kasan: bad access detected
[   38.910550] 
[   38.912027] Memory state around the buggy address:
[   38.916809]  ffff00080586bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.924010]  ffff00080586bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.931215] >ffff00080586c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.938414]                    ^
[   38.941630]  ffff00080586c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.948834]  ffff00080586c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.956037] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   37.968259] ==================================================================
[   37.978364] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.985479] Free of addr ffff000803330000 by task kunit_try_catch/286
[   37.991902] 
[   37.993386] CPU: 7 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.993442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.993457] Hardware name: WinLink E850-96 board (DT)
[   37.993481] Call trace:
[   37.993497]  show_stack+0x20/0x38 (C)
[   37.993532]  dump_stack_lvl+0x8c/0xd0
[   37.993570]  print_report+0x118/0x608
[   37.993603]  kasan_report_invalid_free+0xc0/0xe8
[   37.993635]  __kasan_mempool_poison_object+0x14c/0x150
[   37.993666]  mempool_free+0x28c/0x328
[   37.993703]  mempool_double_free_helper+0x150/0x2e8
[   37.993740]  mempool_kmalloc_large_double_free+0xc0/0x118
[   37.993779]  kunit_try_run_case+0x170/0x3f0
[   37.993818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.993856]  kthread+0x328/0x630
[   37.993892]  ret_from_fork+0x10/0x20
[   37.993929] 
[   38.067337] The buggy address belongs to the physical page:
[   38.072894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   38.080878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.088518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.095460] page_type: f8(unknown)
[   38.098858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.106576] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.114302] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.122114] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.129927] head: 0bfffe0000000002 fffffdffe00ccc01 00000000ffffffff 00000000ffffffff
[   38.137740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.145544] page dumped because: kasan: bad access detected
[   38.151101] 
[   38.152577] Memory state around the buggy address:
[   38.157358]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.164561]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.171763] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.178964]                    ^
[   38.182180]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.189384]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.196587] ==================================================================
[   37.594678] ==================================================================
[   37.604324] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   37.611439] Free of addr ffff000800dad400 by task kunit_try_catch/284
[   37.617861] 
[   37.619350] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.619406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.619423] Hardware name: WinLink E850-96 board (DT)
[   37.619444] Call trace:
[   37.619460]  show_stack+0x20/0x38 (C)
[   37.619499]  dump_stack_lvl+0x8c/0xd0
[   37.619539]  print_report+0x118/0x608
[   37.619572]  kasan_report_invalid_free+0xc0/0xe8
[   37.619604]  check_slab_allocation+0xd4/0x108
[   37.619636]  __kasan_mempool_poison_object+0x78/0x150
[   37.619672]  mempool_free+0x28c/0x328
[   37.619708]  mempool_double_free_helper+0x150/0x2e8
[   37.619751]  mempool_kmalloc_double_free+0xc0/0x118
[   37.619787]  kunit_try_run_case+0x170/0x3f0
[   37.619823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.619863]  kthread+0x328/0x630
[   37.619901]  ret_from_fork+0x10/0x20
[   37.619937] 
[   37.697028] Allocated by task 284:
[   37.700417]  kasan_save_stack+0x3c/0x68
[   37.704231]  kasan_save_track+0x20/0x40
[   37.708051]  kasan_save_alloc_info+0x40/0x58
[   37.712305]  __kasan_mempool_unpoison_object+0x11c/0x180
[   37.717599]  remove_element+0x130/0x1f8
[   37.721419]  mempool_alloc_preallocated+0x58/0xc0
[   37.726106]  mempool_double_free_helper+0x94/0x2e8
[   37.730880]  mempool_kmalloc_double_free+0xc0/0x118
[   37.735743]  kunit_try_run_case+0x170/0x3f0
[   37.739908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.745377]  kthread+0x328/0x630
[   37.748588]  ret_from_fork+0x10/0x20
[   37.752147] 
[   37.753624] Freed by task 284:
[   37.756663]  kasan_save_stack+0x3c/0x68
[   37.760481]  kasan_save_track+0x20/0x40
[   37.764300]  kasan_save_free_info+0x4c/0x78
[   37.768467]  __kasan_mempool_poison_object+0xc0/0x150
[   37.773501]  mempool_free+0x28c/0x328
[   37.777147]  mempool_double_free_helper+0x100/0x2e8
[   37.782008]  mempool_kmalloc_double_free+0xc0/0x118
[   37.786869]  kunit_try_run_case+0x170/0x3f0
[   37.791036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.796505]  kthread+0x328/0x630
[   37.799716]  ret_from_fork+0x10/0x20
[   37.803275] 
[   37.804752] The buggy address belongs to the object at ffff000800dad400
[   37.804752]  which belongs to the cache kmalloc-128 of size 128
[   37.817254] The buggy address is located 0 bytes inside of
[   37.817254]  128-byte region [ffff000800dad400, ffff000800dad480)
[   37.828796] 
[   37.830276] The buggy address belongs to the physical page:
[   37.835832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   37.843815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.851455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   37.858397] page_type: f5(slab)
[   37.861536] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.869253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.876980] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   37.884791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.892604] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   37.900416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   37.908221] page dumped because: kasan: bad access detected
[   37.913778] 
[   37.915254] Memory state around the buggy address:
[   37.920036]  ffff000800dad300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.927240]  ffff000800dad380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.934442] >ffff000800dad400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.941641]                    ^
[   37.944857]  ffff000800dad480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.952062]  ffff000800dad500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.959264] ==================================================================
[   38.205655] ==================================================================
[   38.216208] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   38.223324] Free of addr ffff000803330000 by task kunit_try_catch/288
[   38.229746] 
[   38.231232] CPU: 7 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   38.231290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.231306] Hardware name: WinLink E850-96 board (DT)
[   38.231328] Call trace:
[   38.231342]  show_stack+0x20/0x38 (C)
[   38.231380]  dump_stack_lvl+0x8c/0xd0
[   38.231417]  print_report+0x118/0x608
[   38.231451]  kasan_report_invalid_free+0xc0/0xe8
[   38.231486]  __kasan_mempool_poison_pages+0xe0/0xe8
[   38.231519]  mempool_free+0x24c/0x328
[   38.231555]  mempool_double_free_helper+0x150/0x2e8
[   38.231592]  mempool_page_alloc_double_free+0xbc/0x118
[   38.231625]  kunit_try_run_case+0x170/0x3f0
[   38.231663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.231701]  kthread+0x328/0x630
[   38.231737]  ret_from_fork+0x10/0x20
[   38.231773] 
[   38.304659] The buggy address belongs to the physical page:
[   38.310217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   38.318200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.324723] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.332441] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.340159] page dumped because: kasan: bad access detected
[   38.345716] 
[   38.347192] Memory state around the buggy address:
[   38.351973]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.359175]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.366380] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.373579]                    ^
[   38.376795]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.383999]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.391202] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   37.415422] ==================================================================
[   37.416392] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   37.423075] Read of size 1 at addr ffff000803330000 by task kunit_try_catch/282
[   37.430364] 
[   37.431852] CPU: 7 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.431911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.431927] Hardware name: WinLink E850-96 board (DT)
[   37.431948] Call trace:
[   37.431961]  show_stack+0x20/0x38 (C)
[   37.432001]  dump_stack_lvl+0x8c/0xd0
[   37.432040]  print_report+0x118/0x608
[   37.432074]  kasan_report+0xdc/0x128
[   37.432105]  __asan_report_load1_noabort+0x20/0x30
[   37.432146]  mempool_uaf_helper+0x314/0x340
[   37.432181]  mempool_page_alloc_uaf+0xc0/0x118
[   37.432214]  kunit_try_run_case+0x170/0x3f0
[   37.432253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.432295]  kthread+0x328/0x630
[   37.432330]  ret_from_fork+0x10/0x20
[   37.432367] 
[   37.499115] The buggy address belongs to the physical page:
[   37.504673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   37.512658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.519178] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.526897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.534616] page dumped because: kasan: bad access detected
[   37.540173] 
[   37.541648] Memory state around the buggy address:
[   37.546428]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.553630]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.560836] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.568036]                    ^
[   37.571251]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.578456]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.585658] ==================================================================
[   36.853326] ==================================================================
[   36.862407] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   36.869091] Read of size 1 at addr ffff000803330000 by task kunit_try_catch/278
[   36.876379] 
[   36.877866] CPU: 7 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.877924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.877940] Hardware name: WinLink E850-96 board (DT)
[   36.877964] Call trace:
[   36.877978]  show_stack+0x20/0x38 (C)
[   36.878012]  dump_stack_lvl+0x8c/0xd0
[   36.878053]  print_report+0x118/0x608
[   36.878085]  kasan_report+0xdc/0x128
[   36.878114]  __asan_report_load1_noabort+0x20/0x30
[   36.878151]  mempool_uaf_helper+0x314/0x340
[   36.878184]  mempool_kmalloc_large_uaf+0xc4/0x120
[   36.878224]  kunit_try_run_case+0x170/0x3f0
[   36.878262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.878301]  kthread+0x328/0x630
[   36.878337]  ret_from_fork+0x10/0x20
[   36.878374] 
[   36.945393] The buggy address belongs to the physical page:
[   36.950949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883330
[   36.958934] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.966573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.973515] page_type: f8(unknown)
[   36.976914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.984630] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.992357] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   37.000169] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.007982] head: 0bfffe0000000002 fffffdffe00ccc01 00000000ffffffff 00000000ffffffff
[   37.015794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.023599] page dumped because: kasan: bad access detected
[   37.029156] 
[   37.030630] Memory state around the buggy address:
[   37.035411]  ffff00080332ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.042614]  ffff00080332ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.049819] >ffff000803330000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.057019]                    ^
[   37.060235]  ffff000803330080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.067439]  ffff000803330100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.074641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   37.084243] ==================================================================
[   37.093567] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.100683] Read of size 1 at addr ffff000806481240 by task kunit_try_catch/280
[   37.107973] 
[   37.109460] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.109516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.109532] Hardware name: WinLink E850-96 board (DT)
[   37.109555] Call trace:
[   37.109569]  show_stack+0x20/0x38 (C)
[   37.109605]  dump_stack_lvl+0x8c/0xd0
[   37.109644]  print_report+0x118/0x608
[   37.109676]  kasan_report+0xdc/0x128
[   37.109706]  __asan_report_load1_noabort+0x20/0x30
[   37.109741]  mempool_uaf_helper+0x314/0x340
[   37.109777]  mempool_slab_uaf+0xc0/0x118
[   37.109806]  kunit_try_run_case+0x170/0x3f0
[   37.109845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.109886]  kthread+0x328/0x630
[   37.109921]  ret_from_fork+0x10/0x20
[   37.109959] 
[   37.176202] Allocated by task 280:
[   37.179591]  kasan_save_stack+0x3c/0x68
[   37.183406]  kasan_save_track+0x20/0x40
[   37.187226]  kasan_save_alloc_info+0x40/0x58
[   37.191479]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.196687]  remove_element+0x16c/0x1f8
[   37.200506]  mempool_alloc_preallocated+0x58/0xc0
[   37.205195]  mempool_uaf_helper+0xa4/0x340
[   37.209273]  mempool_slab_uaf+0xc0/0x118
[   37.213180]  kunit_try_run_case+0x170/0x3f0
[   37.217347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.222815]  kthread+0x328/0x630
[   37.226027]  ret_from_fork+0x10/0x20
[   37.229586] 
[   37.231061] Freed by task 280:
[   37.234101]  kasan_save_stack+0x3c/0x68
[   37.237919]  kasan_save_track+0x20/0x40
[   37.241738]  kasan_save_free_info+0x4c/0x78
[   37.245905]  __kasan_mempool_poison_object+0xc0/0x150
[   37.250940]  mempool_free+0x28c/0x328
[   37.254585]  mempool_uaf_helper+0x104/0x340
[   37.258753]  mempool_slab_uaf+0xc0/0x118
[   37.262658]  kunit_try_run_case+0x170/0x3f0
[   37.266825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.272293]  kthread+0x328/0x630
[   37.275505]  ret_from_fork+0x10/0x20
[   37.279064] 
[   37.280541] The buggy address belongs to the object at ffff000806481240
[   37.280541]  which belongs to the cache test_cache of size 123
[   37.292955] The buggy address is located 0 bytes inside of
[   37.292955]  freed 123-byte region [ffff000806481240, ffff0008064812bb)
[   37.305019] 
[   37.306498] The buggy address belongs to the physical page:
[   37.312054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886481
[   37.320040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.326549] page_type: f5(slab)
[   37.329687] raw: 0bfffe0000000000 ffff00080177bcc0 dead000000000122 0000000000000000
[   37.337403] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.345122] page dumped because: kasan: bad access detected
[   37.350679] 
[   37.352155] Memory state around the buggy address:
[   37.356932]  ffff000806481100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.364137]  ffff000806481180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.371341] >ffff000806481200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.378542]                                            ^
[   37.383841]  ffff000806481280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.391046]  ffff000806481300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398248] ==================================================================
[   36.495655] ==================================================================
[   36.501129] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   36.508244] Read of size 1 at addr ffff000802d03000 by task kunit_try_catch/276
[   36.515534] 
[   36.517021] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.517071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.517088] Hardware name: WinLink E850-96 board (DT)
[   36.517114] Call trace:
[   36.517130]  show_stack+0x20/0x38 (C)
[   36.517166]  dump_stack_lvl+0x8c/0xd0
[   36.517204]  print_report+0x118/0x608
[   36.517238]  kasan_report+0xdc/0x128
[   36.517272]  __asan_report_load1_noabort+0x20/0x30
[   36.517311]  mempool_uaf_helper+0x314/0x340
[   36.517346]  mempool_kmalloc_uaf+0xc4/0x120
[   36.517380]  kunit_try_run_case+0x170/0x3f0
[   36.517417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.517457]  kthread+0x328/0x630
[   36.517497]  ret_from_fork+0x10/0x20
[   36.517535] 
[   36.584023] Allocated by task 276:
[   36.587411]  kasan_save_stack+0x3c/0x68
[   36.591227]  kasan_save_track+0x20/0x40
[   36.595047]  kasan_save_alloc_info+0x40/0x58
[   36.599300]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.604595]  remove_element+0x130/0x1f8
[   36.608415]  mempool_alloc_preallocated+0x58/0xc0
[   36.613102]  mempool_uaf_helper+0xa4/0x340
[   36.617182]  mempool_kmalloc_uaf+0xc4/0x120
[   36.621350]  kunit_try_run_case+0x170/0x3f0
[   36.625515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.630984]  kthread+0x328/0x630
[   36.634196]  ret_from_fork+0x10/0x20
[   36.637754] 
[   36.639232] Freed by task 276:
[   36.642270]  kasan_save_stack+0x3c/0x68
[   36.646087]  kasan_save_track+0x20/0x40
[   36.649907]  kasan_save_free_info+0x4c/0x78
[   36.654074]  __kasan_mempool_poison_object+0xc0/0x150
[   36.659108]  mempool_free+0x28c/0x328
[   36.662754]  mempool_uaf_helper+0x104/0x340
[   36.666921]  mempool_kmalloc_uaf+0xc4/0x120
[   36.671087]  kunit_try_run_case+0x170/0x3f0
[   36.675255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.680722]  kthread+0x328/0x630
[   36.683934]  ret_from_fork+0x10/0x20
[   36.687493] 
[   36.688970] The buggy address belongs to the object at ffff000802d03000
[   36.688970]  which belongs to the cache kmalloc-128 of size 128
[   36.701472] The buggy address is located 0 bytes inside of
[   36.701472]  freed 128-byte region [ffff000802d03000, ffff000802d03080)
[   36.713534] 
[   36.715014] The buggy address belongs to the physical page:
[   36.720571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   36.728555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.736194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.743136] page_type: f5(slab)
[   36.746274] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.753992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.761719] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.769530] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.777343] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   36.785155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.792960] page dumped because: kasan: bad access detected
[   36.798516] 
[   36.799991] Memory state around the buggy address:
[   36.804773]  ffff000802d02f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.811974]  ffff000802d02f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.819181] >ffff000802d03000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.826380]                    ^
[   36.829596]  ffff000802d03080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.836800]  ffff000802d03100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.844003] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   36.214244] ==================================================================
[   36.224136] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   36.231687] Read of size 1 at addr ffff00080659a2bb by task kunit_try_catch/274
[   36.238975] 
[   36.240464] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.240523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.240539] Hardware name: WinLink E850-96 board (DT)
[   36.240561] Call trace:
[   36.240577]  show_stack+0x20/0x38 (C)
[   36.240613]  dump_stack_lvl+0x8c/0xd0
[   36.240651]  print_report+0x118/0x608
[   36.240681]  kasan_report+0xdc/0x128
[   36.240712]  __asan_report_load1_noabort+0x20/0x30
[   36.240750]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.240786]  mempool_slab_oob_right+0xc0/0x118
[   36.240819]  kunit_try_run_case+0x170/0x3f0
[   36.240857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.240897]  kthread+0x328/0x630
[   36.240931]  ret_from_fork+0x10/0x20
[   36.240964] 
[   36.308247] Allocated by task 274:
[   36.311635]  kasan_save_stack+0x3c/0x68
[   36.315450]  kasan_save_track+0x20/0x40
[   36.319270]  kasan_save_alloc_info+0x40/0x58
[   36.323523]  __kasan_mempool_unpoison_object+0xbc/0x180
[   36.328733]  remove_element+0x16c/0x1f8
[   36.332550]  mempool_alloc_preallocated+0x58/0xc0
[   36.337238]  mempool_oob_right_helper+0x98/0x2f0
[   36.341839]  mempool_slab_oob_right+0xc0/0x118
[   36.346266]  kunit_try_run_case+0x170/0x3f0
[   36.350432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.355901]  kthread+0x328/0x630
[   36.359113]  ret_from_fork+0x10/0x20
[   36.362672] 
[   36.364149] The buggy address belongs to the object at ffff00080659a240
[   36.364149]  which belongs to the cache test_cache of size 123
[   36.376562] The buggy address is located 0 bytes to the right of
[   36.376562]  allocated 123-byte region [ffff00080659a240, ffff00080659a2bb)
[   36.389494] 
[   36.390974] The buggy address belongs to the physical page:
[   36.396530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88659a
[   36.404514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.411025] page_type: f5(slab)
[   36.414162] raw: 0bfffe0000000000 ffff000800dbe3c0 dead000000000122 0000000000000000
[   36.421879] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.429598] page dumped because: kasan: bad access detected
[   36.435155] 
[   36.436630] Memory state around the buggy address:
[   36.441411]  ffff00080659a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.448612]  ffff00080659a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.455817] >ffff00080659a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.463017]                                         ^
[   36.468056]  ffff00080659a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.475261]  ffff00080659a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.482463] ==================================================================
[   35.980585] ==================================================================
[   35.990549] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.998094] Read of size 1 at addr ffff00080315a001 by task kunit_try_catch/272
[   36.005385] 
[   36.006874] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.006933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.006953] Hardware name: WinLink E850-96 board (DT)
[   36.006975] Call trace:
[   36.006990]  show_stack+0x20/0x38 (C)
[   36.007024]  dump_stack_lvl+0x8c/0xd0
[   36.007067]  print_report+0x118/0x608
[   36.007099]  kasan_report+0xdc/0x128
[   36.007130]  __asan_report_load1_noabort+0x20/0x30
[   36.007168]  mempool_oob_right_helper+0x2ac/0x2f0
[   36.007205]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   36.007245]  kunit_try_run_case+0x170/0x3f0
[   36.007284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.007323]  kthread+0x328/0x630
[   36.007360]  ret_from_fork+0x10/0x20
[   36.007397] 
[   36.075439] The buggy address belongs to the physical page:
[   36.080997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883158
[   36.088980] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.096621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.103562] page_type: f8(unknown)
[   36.106962] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.114679] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.122405] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.130216] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.138030] head: 0bfffe0000000002 fffffdffe00c5601 00000000ffffffff 00000000ffffffff
[   36.145842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.153647] page dumped because: kasan: bad access detected
[   36.159204] 
[   36.160680] Memory state around the buggy address:
[   36.165460]  ffff000803159f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.172661]  ffff000803159f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.179869] >ffff00080315a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.187067]                    ^
[   36.190282]  ffff00080315a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.197487]  ffff00080315a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.204689] ==================================================================
[   35.679590] ==================================================================
[   35.679768] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   35.679902] Read of size 1 at addr ffff000801e72b73 by task kunit_try_catch/270
[   35.686293] 
[   35.687781] CPU: 5 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   35.687835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.687853] Hardware name: WinLink E850-96 board (DT)
[   35.687876] Call trace:
[   35.687889]  show_stack+0x20/0x38 (C)
[   35.687924]  dump_stack_lvl+0x8c/0xd0
[   35.687961]  print_report+0x118/0x608
[   35.687990]  kasan_report+0xdc/0x128
[   35.688021]  __asan_report_load1_noabort+0x20/0x30
[   35.688063]  mempool_oob_right_helper+0x2ac/0x2f0
[   35.688096]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.688132]  kunit_try_run_case+0x170/0x3f0
[   35.688172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.688211]  kthread+0x328/0x630
[   35.688249]  ret_from_fork+0x10/0x20
[   35.688285] 
[   35.755825] Allocated by task 270:
[   35.759212]  kasan_save_stack+0x3c/0x68
[   35.763030]  kasan_save_track+0x20/0x40
[   35.766849]  kasan_save_alloc_info+0x40/0x58
[   35.771101]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.776396]  remove_element+0x130/0x1f8
[   35.780215]  mempool_alloc_preallocated+0x58/0xc0
[   35.784903]  mempool_oob_right_helper+0x98/0x2f0
[   35.789503]  mempool_kmalloc_oob_right+0xc4/0x120
[   35.794191]  kunit_try_run_case+0x170/0x3f0
[   35.798357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.803827]  kthread+0x328/0x630
[   35.807038]  ret_from_fork+0x10/0x20
[   35.810597] 
[   35.812074] The buggy address belongs to the object at ffff000801e72b00
[   35.812074]  which belongs to the cache kmalloc-128 of size 128
[   35.824574] The buggy address is located 0 bytes to the right of
[   35.824574]  allocated 115-byte region [ffff000801e72b00, ffff000801e72b73)
[   35.837506] 
[   35.838986] The buggy address belongs to the physical page:
[   35.844542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e72
[   35.852526] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.860166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.867108] page_type: f5(slab)
[   35.870247] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.877964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.885690] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.893501] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.901315] head: 0bfffe0000000001 fffffdffe0079c81 00000000ffffffff 00000000ffffffff
[   35.909126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.916931] page dumped because: kasan: bad access detected
[   35.922489] 
[   35.923964] Memory state around the buggy address:
[   35.928743]  ffff000801e72a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.935946]  ffff000801e72a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.943152] >ffff000801e72b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.950352]                                                              ^
[   35.957213]  ffff000801e72b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.964419]  ffff000801e72c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.971620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   34.792035] ==================================================================
[   34.792222] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   34.792363] Read of size 1 at addr ffff000800dbe140 by task kunit_try_catch/264
[   34.795916] 
[   34.797405] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   34.797463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.797480] Hardware name: WinLink E850-96 board (DT)
[   34.797502] Call trace:
[   34.797518]  show_stack+0x20/0x38 (C)
[   34.797557]  dump_stack_lvl+0x8c/0xd0
[   34.797595]  print_report+0x118/0x608
[   34.797627]  kasan_report+0xdc/0x128
[   34.797658]  __kasan_check_byte+0x54/0x70
[   34.797689]  kmem_cache_destroy+0x34/0x218
[   34.797722]  kmem_cache_double_destroy+0x174/0x300
[   34.797757]  kunit_try_run_case+0x170/0x3f0
[   34.797794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.797834]  kthread+0x328/0x630
[   34.797871]  ret_from_fork+0x10/0x20
[   34.797908] 
[   34.864144] Allocated by task 264:
[   34.867533]  kasan_save_stack+0x3c/0x68
[   34.871349]  kasan_save_track+0x20/0x40
[   34.875168]  kasan_save_alloc_info+0x40/0x58
[   34.879421]  __kasan_slab_alloc+0xa8/0xb0
[   34.883415]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.888015]  __kmem_cache_create_args+0x178/0x280
[   34.892702]  kmem_cache_double_destroy+0xc0/0x300
[   34.897390]  kunit_try_run_case+0x170/0x3f0
[   34.901558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.907025]  kthread+0x328/0x630
[   34.910237]  ret_from_fork+0x10/0x20
[   34.913796] 
[   34.915273] Freed by task 264:
[   34.918311]  kasan_save_stack+0x3c/0x68
[   34.922129]  kasan_save_track+0x20/0x40
[   34.925948]  kasan_save_free_info+0x4c/0x78
[   34.930115]  __kasan_slab_free+0x6c/0x98
[   34.934023]  kmem_cache_free+0x260/0x468
[   34.937927]  slab_kmem_cache_release+0x38/0x50
[   34.942354]  kmem_cache_release+0x1c/0x30
[   34.946348]  kobject_put+0x17c/0x420
[   34.949906]  sysfs_slab_release+0x1c/0x30
[   34.953900]  kmem_cache_destroy+0x118/0x218
[   34.958066]  kmem_cache_double_destroy+0x128/0x300
[   34.962840]  kunit_try_run_case+0x170/0x3f0
[   34.967009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.972476]  kthread+0x328/0x630
[   34.975688]  ret_from_fork+0x10/0x20
[   34.979246] 
[   34.980723] The buggy address belongs to the object at ffff000800dbe140
[   34.980723]  which belongs to the cache kmem_cache of size 208
[   34.993137] The buggy address is located 0 bytes inside of
[   34.993137]  freed 208-byte region [ffff000800dbe140, ffff000800dbe210)
[   35.005200] 
[   35.006681] The buggy address belongs to the physical page:
[   35.012237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dbe
[   35.020220] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.027859] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.034802] page_type: f5(slab)
[   35.037941] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.045658] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.053385] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   35.061196] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.069009] head: 0bfffe0000000001 fffffdffe0036f81 00000000ffffffff 00000000ffffffff
[   35.076822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.084627] page dumped because: kasan: bad access detected
[   35.090183] 
[   35.091658] Memory state around the buggy address:
[   35.096438]  ffff000800dbe000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.103641]  ffff000800dbe080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   35.110847] >ffff000800dbe100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.118046]                                            ^
[   35.123345]  ffff000800dbe180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.130551]  ffff000800dbe200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.137751] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   34.385122] ==================================================================
[   34.385308] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   34.385443] Read of size 1 at addr ffff000802d0c000 by task kunit_try_catch/262
[   34.388824] 
[   34.390313] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   34.390370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.390386] Hardware name: WinLink E850-96 board (DT)
[   34.390410] Call trace:
[   34.390428]  show_stack+0x20/0x38 (C)
[   34.390464]  dump_stack_lvl+0x8c/0xd0
[   34.390504]  print_report+0x118/0x608
[   34.390538]  kasan_report+0xdc/0x128
[   34.390570]  __asan_report_load1_noabort+0x20/0x30
[   34.390608]  kmem_cache_rcu_uaf+0x388/0x468
[   34.390644]  kunit_try_run_case+0x170/0x3f0
[   34.390682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.390723]  kthread+0x328/0x630
[   34.390757]  ret_from_fork+0x10/0x20
[   34.390794] 
[   34.453148] Allocated by task 262:
[   34.456535]  kasan_save_stack+0x3c/0x68
[   34.460351]  kasan_save_track+0x20/0x40
[   34.464171]  kasan_save_alloc_info+0x40/0x58
[   34.468424]  __kasan_slab_alloc+0xa8/0xb0
[   34.472417]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.477018]  kmem_cache_rcu_uaf+0x12c/0x468
[   34.481184]  kunit_try_run_case+0x170/0x3f0
[   34.485351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.490821]  kthread+0x328/0x630
[   34.494031]  ret_from_fork+0x10/0x20
[   34.497590] 
[   34.499067] Freed by task 0:
[   34.501933]  kasan_save_stack+0x3c/0x68
[   34.505750]  kasan_save_track+0x20/0x40
[   34.509569]  kasan_save_free_info+0x4c/0x78
[   34.513736]  __kasan_slab_free+0x6c/0x98
[   34.517642]  slab_free_after_rcu_debug+0xd4/0x2f8
[   34.522329]  rcu_core+0x9f4/0x1e20
[   34.525715]  rcu_core_si+0x18/0x30
[   34.529100]  handle_softirqs+0x374/0xb28
[   34.533006]  __do_softirq+0x1c/0x28
[   34.536479] 
[   34.537954] Last potentially related work creation:
[   34.542817]  kasan_save_stack+0x3c/0x68
[   34.546634]  kasan_record_aux_stack+0xb4/0xc8
[   34.550976]  kmem_cache_free+0x120/0x468
[   34.554881]  kmem_cache_rcu_uaf+0x16c/0x468
[   34.559048]  kunit_try_run_case+0x170/0x3f0
[   34.563214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.568683]  kthread+0x328/0x630
[   34.571894]  ret_from_fork+0x10/0x20
[   34.575454] 
[   34.576928] The buggy address belongs to the object at ffff000802d0c000
[   34.576928]  which belongs to the cache test_cache of size 200
[   34.589345] The buggy address is located 0 bytes inside of
[   34.589345]  freed 200-byte region [ffff000802d0c000, ffff000802d0c0c8)
[   34.601408] 
[   34.602887] The buggy address belongs to the physical page:
[   34.608444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d0c
[   34.616428] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.624066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.631010] page_type: f5(slab)
[   34.634148] raw: 0bfffe0000000040 ffff00080177ba40 dead000000000122 0000000000000000
[   34.641866] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.649592] head: 0bfffe0000000040 ffff00080177ba40 dead000000000122 0000000000000000
[   34.657404] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.665217] head: 0bfffe0000000001 fffffdffe00b4301 00000000ffffffff 00000000ffffffff
[   34.673028] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.680834] page dumped because: kasan: bad access detected
[   34.686391] 
[   34.687865] Memory state around the buggy address:
[   34.692647]  ffff000802d0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.699848]  ffff000802d0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.707053] >ffff000802d0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.714254]                    ^
[   34.717469]  ffff000802d0c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.724674]  ffff000802d0c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.731876] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   34.004079] ==================================================================
[   34.007320] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   34.014263] Free of addr ffff000800dc0001 by task kunit_try_catch/260
[   34.020683] 
[   34.022171] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   34.022229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.022246] Hardware name: WinLink E850-96 board (DT)
[   34.022270] Call trace:
[   34.022283]  show_stack+0x20/0x38 (C)
[   34.022318]  dump_stack_lvl+0x8c/0xd0
[   34.022355]  print_report+0x118/0x608
[   34.022386]  kasan_report_invalid_free+0xc0/0xe8
[   34.022421]  check_slab_allocation+0xfc/0x108
[   34.022452]  __kasan_slab_pre_free+0x2c/0x48
[   34.022483]  kmem_cache_free+0xf0/0x468
[   34.022515]  kmem_cache_invalid_free+0x184/0x3c8
[   34.022552]  kunit_try_run_case+0x170/0x3f0
[   34.022592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.022633]  kthread+0x328/0x630
[   34.022670]  ret_from_fork+0x10/0x20
[   34.022707] 
[   34.094122] Allocated by task 260:
[   34.097509]  kasan_save_stack+0x3c/0x68
[   34.101324]  kasan_save_track+0x20/0x40
[   34.105144]  kasan_save_alloc_info+0x40/0x58
[   34.109397]  __kasan_slab_alloc+0xa8/0xb0
[   34.113390]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.117991]  kmem_cache_invalid_free+0x12c/0x3c8
[   34.122591]  kunit_try_run_case+0x170/0x3f0
[   34.126758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.132228]  kthread+0x328/0x630
[   34.135439]  ret_from_fork+0x10/0x20
[   34.138997] 
[   34.140475] The buggy address belongs to the object at ffff000800dc0000
[   34.140475]  which belongs to the cache test_cache of size 200
[   34.152888] The buggy address is located 1 bytes inside of
[   34.152888]  200-byte region [ffff000800dc0000, ffff000800dc00c8)
[   34.164431] 
[   34.165911] The buggy address belongs to the physical page:
[   34.171467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dc0
[   34.179452] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.187091] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.194033] page_type: f5(slab)
[   34.197172] raw: 0bfffe0000000040 ffff000800dbe000 dead000000000122 0000000000000000
[   34.204888] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.212615] head: 0bfffe0000000040 ffff000800dbe000 dead000000000122 0000000000000000
[   34.220427] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.228240] head: 0bfffe0000000001 fffffdffe0037001 00000000ffffffff 00000000ffffffff
[   34.236051] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.243857] page dumped because: kasan: bad access detected
[   34.249414] 
[   34.250888] Memory state around the buggy address:
[   34.255668]  ffff000800dbff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.262871]  ffff000800dbff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.270077] >ffff000800dc0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.277277]                    ^
[   34.280492]  ffff000800dc0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.287697]  ffff000800dc0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.294900] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.667853] ==================================================================
[   33.668032] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.668161] Free of addr ffff000802d0a000 by task kunit_try_catch/258
[   33.669560] 
[   33.671048] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   33.671102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.671119] Hardware name: WinLink E850-96 board (DT)
[   33.671143] Call trace:
[   33.671159]  show_stack+0x20/0x38 (C)
[   33.671194]  dump_stack_lvl+0x8c/0xd0
[   33.671232]  print_report+0x118/0x608
[   33.671266]  kasan_report_invalid_free+0xc0/0xe8
[   33.671299]  check_slab_allocation+0xd4/0x108
[   33.671332]  __kasan_slab_pre_free+0x2c/0x48
[   33.671363]  kmem_cache_free+0xf0/0x468
[   33.671396]  kmem_cache_double_free+0x190/0x3c8
[   33.671431]  kunit_try_run_case+0x170/0x3f0
[   33.671468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.671509]  kthread+0x328/0x630
[   33.671545]  ret_from_fork+0x10/0x20
[   33.671583] 
[   33.742911] Allocated by task 258:
[   33.746299]  kasan_save_stack+0x3c/0x68
[   33.750114]  kasan_save_track+0x20/0x40
[   33.753934]  kasan_save_alloc_info+0x40/0x58
[   33.758187]  __kasan_slab_alloc+0xa8/0xb0
[   33.762180]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.766781]  kmem_cache_double_free+0x12c/0x3c8
[   33.771295]  kunit_try_run_case+0x170/0x3f0
[   33.775461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.780929]  kthread+0x328/0x630
[   33.784142]  ret_from_fork+0x10/0x20
[   33.787700] 
[   33.789178] Freed by task 258:
[   33.792215]  kasan_save_stack+0x3c/0x68
[   33.796034]  kasan_save_track+0x20/0x40
[   33.799853]  kasan_save_free_info+0x4c/0x78
[   33.804020]  __kasan_slab_free+0x6c/0x98
[   33.807926]  kmem_cache_free+0x260/0x468
[   33.811832]  kmem_cache_double_free+0x140/0x3c8
[   33.816346]  kunit_try_run_case+0x170/0x3f0
[   33.820513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.825982]  kthread+0x328/0x630
[   33.829193]  ret_from_fork+0x10/0x20
[   33.832752] 
[   33.834229] The buggy address belongs to the object at ffff000802d0a000
[   33.834229]  which belongs to the cache test_cache of size 200
[   33.846644] The buggy address is located 0 bytes inside of
[   33.846644]  200-byte region [ffff000802d0a000, ffff000802d0a0c8)
[   33.858186] 
[   33.859665] The buggy address belongs to the physical page:
[   33.865222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d0a
[   33.873206] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.880846] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.887789] page_type: f5(slab)
[   33.890927] raw: 0bfffe0000000040 ffff00080177b900 dead000000000122 0000000000000000
[   33.898644] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.906370] head: 0bfffe0000000040 ffff00080177b900 dead000000000122 0000000000000000
[   33.914181] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.921995] head: 0bfffe0000000001 fffffdffe00b4281 00000000ffffffff 00000000ffffffff
[   33.929806] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.937612] page dumped because: kasan: bad access detected
[   33.943168] 
[   33.944643] Memory state around the buggy address:
[   33.949423]  ffff000802d09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956626]  ffff000802d09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.963832] >ffff000802d0a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.971031]                    ^
[   33.974247]  ffff000802d0a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.981452]  ffff000802d0a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.988654] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   33.333588] ==================================================================
[   33.343260] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.349941] Read of size 1 at addr ffff00080193c0c8 by task kunit_try_catch/256
[   33.357233] 
[   33.358720] CPU: 2 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   33.358775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.358791] Hardware name: WinLink E850-96 board (DT)
[   33.358814] Call trace:
[   33.358829]  show_stack+0x20/0x38 (C)
[   33.358867]  dump_stack_lvl+0x8c/0xd0
[   33.358905]  print_report+0x118/0x608
[   33.358939]  kasan_report+0xdc/0x128
[   33.358969]  __asan_report_load1_noabort+0x20/0x30
[   33.359005]  kmem_cache_oob+0x344/0x430
[   33.359038]  kunit_try_run_case+0x170/0x3f0
[   33.359079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.359119]  kthread+0x328/0x630
[   33.359154]  ret_from_fork+0x10/0x20
[   33.359193] 
[   33.421208] Allocated by task 256:
[   33.424595]  kasan_save_stack+0x3c/0x68
[   33.428411]  kasan_save_track+0x20/0x40
[   33.432231]  kasan_save_alloc_info+0x40/0x58
[   33.436484]  __kasan_slab_alloc+0xa8/0xb0
[   33.440477]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.445078]  kmem_cache_oob+0x12c/0x430
[   33.448897]  kunit_try_run_case+0x170/0x3f0
[   33.453064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.458532]  kthread+0x328/0x630
[   33.461744]  ret_from_fork+0x10/0x20
[   33.465303] 
[   33.466780] The buggy address belongs to the object at ffff00080193c000
[   33.466780]  which belongs to the cache test_cache of size 200
[   33.479194] The buggy address is located 0 bytes to the right of
[   33.479194]  allocated 200-byte region [ffff00080193c000, ffff00080193c0c8)
[   33.492126] 
[   33.493606] The buggy address belongs to the physical page:
[   33.499161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193c
[   33.507145] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.514784] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.521728] page_type: f5(slab)
[   33.524866] raw: 0bfffe0000000040 ffff00080193a000 dead000000000122 0000000000000000
[   33.532583] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.540310] head: 0bfffe0000000040 ffff00080193a000 dead000000000122 0000000000000000
[   33.548121] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.555934] head: 0bfffe0000000001 fffffdffe0064f01 00000000ffffffff 00000000ffffffff
[   33.563746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.571551] page dumped because: kasan: bad access detected
[   33.577108] 
[   33.578584] Memory state around the buggy address:
[   33.583364]  ffff00080193bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.590565]  ffff00080193c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.597770] >ffff00080193c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.604971]                                               ^
[   33.610531]  ffff00080193c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.617735]  ffff00080193c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.624935] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.987014] ==================================================================
[   32.994135] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   33.000814] Read of size 8 at addr ffff000800d63c40 by task kunit_try_catch/249
[   33.008105] 
[   33.009591] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   33.009648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.009666] Hardware name: WinLink E850-96 board (DT)
[   33.009689] Call trace:
[   33.009702]  show_stack+0x20/0x38 (C)
[   33.009736]  dump_stack_lvl+0x8c/0xd0
[   33.009776]  print_report+0x118/0x608
[   33.009807]  kasan_report+0xdc/0x128
[   33.009837]  __asan_report_load8_noabort+0x20/0x30
[   33.009873]  workqueue_uaf+0x480/0x4a8
[   33.009907]  kunit_try_run_case+0x170/0x3f0
[   33.009946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.009986]  kthread+0x328/0x630
[   33.010021]  ret_from_fork+0x10/0x20
[   33.010057] 
[   33.071995] Allocated by task 249:
[   33.075383]  kasan_save_stack+0x3c/0x68
[   33.079198]  kasan_save_track+0x20/0x40
[   33.083017]  kasan_save_alloc_info+0x40/0x58
[   33.087271]  __kasan_kmalloc+0xd4/0xd8
[   33.091003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.095517]  workqueue_uaf+0x13c/0x4a8
[   33.099250]  kunit_try_run_case+0x170/0x3f0
[   33.103416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.108886]  kthread+0x328/0x630
[   33.112097]  ret_from_fork+0x10/0x20
[   33.115656] 
[   33.117132] Freed by task 87:
[   33.120085]  kasan_save_stack+0x3c/0x68
[   33.123902]  kasan_save_track+0x20/0x40
[   33.127721]  kasan_save_free_info+0x4c/0x78
[   33.131888]  __kasan_slab_free+0x6c/0x98
[   33.135794]  kfree+0x214/0x3c8
[   33.138832]  workqueue_uaf_work+0x18/0x30
[   33.142825]  process_one_work+0x530/0xf98
[   33.146818]  worker_thread+0x618/0xf38
[   33.150551]  kthread+0x328/0x630
[   33.153763]  ret_from_fork+0x10/0x20
[   33.157322] 
[   33.158799] Last potentially related work creation:
[   33.163658]  kasan_save_stack+0x3c/0x68
[   33.167478]  kasan_record_aux_stack+0xb4/0xc8
[   33.171819]  __queue_work+0x65c/0x1008
[   33.175551]  queue_work_on+0xbc/0xf8
[   33.179109]  workqueue_uaf+0x210/0x4a8
[   33.182842]  kunit_try_run_case+0x170/0x3f0
[   33.187009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.192477]  kthread+0x328/0x630
[   33.195689]  ret_from_fork+0x10/0x20
[   33.199248] 
[   33.200725] The buggy address belongs to the object at ffff000800d63c40
[   33.200725]  which belongs to the cache kmalloc-32 of size 32
[   33.213053] The buggy address is located 0 bytes inside of
[   33.213053]  freed 32-byte region [ffff000800d63c40, ffff000800d63c60)
[   33.225029] 
[   33.226509] The buggy address belongs to the physical page:
[   33.232066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   33.240049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.246559] page_type: f5(slab)
[   33.249697] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   33.257414] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.265134] page dumped because: kasan: bad access detected
[   33.270689] 
[   33.272165] Memory state around the buggy address:
[   33.276945]  ffff000800d63b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.284146]  ffff000800d63b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.291351] >ffff000800d63c00: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   33.298552]                                            ^
[   33.303851]  ffff000800d63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311056]  ffff000800d63d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.318257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.620986] ==================================================================
[   32.621160] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.621286] Read of size 4 at addr ffff000800d63b80 by task swapper/7/0
[   32.622349] 
[   32.623833] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   32.623884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.623898] Hardware name: WinLink E850-96 board (DT)
[   32.623921] Call trace:
[   32.623935]  show_stack+0x20/0x38 (C)
[   32.623970]  dump_stack_lvl+0x8c/0xd0
[   32.624010]  print_report+0x118/0x608
[   32.624041]  kasan_report+0xdc/0x128
[   32.624071]  __asan_report_load4_noabort+0x20/0x30
[   32.624108]  rcu_uaf_reclaim+0x64/0x70
[   32.624139]  rcu_core+0x9f4/0x1e20
[   32.624172]  rcu_core_si+0x18/0x30
[   32.624200]  handle_softirqs+0x374/0xb28
[   32.624234]  __do_softirq+0x1c/0x28
[   32.624264]  ____do_softirq+0x18/0x30
[   32.624297]  call_on_irq_stack+0x24/0x30
[   32.624325]  do_softirq_own_stack+0x24/0x38
[   32.624355]  __irq_exit_rcu+0x1fc/0x318
[   32.624384]  irq_exit_rcu+0x1c/0x80
[   32.624414]  el1_interrupt+0x38/0x58
[   32.624442]  el1h_64_irq_handler+0x18/0x28
[   32.624475]  el1h_64_irq+0x6c/0x70
[   32.624503]  arch_local_irq_enable+0x4/0x8 (P)
[   32.624536]  do_idle+0x384/0x4e8
[   32.624567]  cpu_startup_entry+0x68/0x80
[   32.624595]  secondary_start_kernel+0x288/0x340
[   32.624633]  __secondary_switched+0xc0/0xc8
[   32.624670] 
[   32.733543] Allocated by task 247:
[   32.736930]  kasan_save_stack+0x3c/0x68
[   32.740748]  kasan_save_track+0x20/0x40
[   32.744569]  kasan_save_alloc_info+0x40/0x58
[   32.748821]  __kasan_kmalloc+0xd4/0xd8
[   32.752553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.757067]  rcu_uaf+0xb0/0x2d8
[   32.760192]  kunit_try_run_case+0x170/0x3f0
[   32.764359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.769827]  kthread+0x328/0x630
[   32.773039]  ret_from_fork+0x10/0x20
[   32.776598] 
[   32.778074] Freed by task 0:
[   32.780938]  kasan_save_stack+0x3c/0x68
[   32.784758]  kasan_save_track+0x20/0x40
[   32.788577]  kasan_save_free_info+0x4c/0x78
[   32.792744]  __kasan_slab_free+0x6c/0x98
[   32.796650]  kfree+0x214/0x3c8
[   32.799688]  rcu_uaf_reclaim+0x28/0x70
[   32.803422]  rcu_core+0x9f4/0x1e20
[   32.806806]  rcu_core_si+0x18/0x30
[   32.810192]  handle_softirqs+0x374/0xb28
[   32.814098]  __do_softirq+0x1c/0x28
[   32.817569] 
[   32.819048] Last potentially related work creation:
[   32.823908]  kasan_save_stack+0x3c/0x68
[   32.827726]  kasan_record_aux_stack+0xb4/0xc8
[   32.832066]  __call_rcu_common.constprop.0+0x70/0x8b0
[   32.837101]  call_rcu+0x18/0x30
[   32.840226]  rcu_uaf+0x14c/0x2d8
[   32.843437]  kunit_try_run_case+0x170/0x3f0
[   32.847604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.853073]  kthread+0x328/0x630
[   32.856285]  ret_from_fork+0x10/0x20
[   32.859844] 
[   32.861320] The buggy address belongs to the object at ffff000800d63b80
[   32.861320]  which belongs to the cache kmalloc-32 of size 32
[   32.873649] The buggy address is located 0 bytes inside of
[   32.873649]  freed 32-byte region [ffff000800d63b80, ffff000800d63ba0)
[   32.885624] 
[   32.887104] The buggy address belongs to the physical page:
[   32.892660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   32.900644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.907155] page_type: f5(slab)
[   32.910293] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   32.918009] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.925728] page dumped because: kasan: bad access detected
[   32.931285] 
[   32.932760] Memory state around the buggy address:
[   32.937543]  ffff000800d63a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.944742]  ffff000800d63b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.951947] >ffff000800d63b80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.959148]                    ^
[   32.962365]  ffff000800d63c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.969568]  ffff000800d63c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.976770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.242697] ==================================================================
[   32.249759] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.256092] Read of size 1 at addr ffff000802d02d78 by task kunit_try_catch/245
[   32.263383] 
[   32.264867] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   32.264919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.264934] Hardware name: WinLink E850-96 board (DT)
[   32.264952] Call trace:
[   32.264962]  show_stack+0x20/0x38 (C)
[   32.264995]  dump_stack_lvl+0x8c/0xd0
[   32.265031]  print_report+0x118/0x608
[   32.265063]  kasan_report+0xdc/0x128
[   32.265091]  __asan_report_load1_noabort+0x20/0x30
[   32.265126]  ksize_uaf+0x544/0x5f8
[   32.265160]  kunit_try_run_case+0x170/0x3f0
[   32.265195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.265232]  kthread+0x328/0x630
[   32.265264]  ret_from_fork+0x10/0x20
[   32.265297] 
[   32.326923] Allocated by task 245:
[   32.330311]  kasan_save_stack+0x3c/0x68
[   32.334128]  kasan_save_track+0x20/0x40
[   32.337948]  kasan_save_alloc_info+0x40/0x58
[   32.342201]  __kasan_kmalloc+0xd4/0xd8
[   32.345933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.350447]  ksize_uaf+0xb8/0x5f8
[   32.353747]  kunit_try_run_case+0x170/0x3f0
[   32.357913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.363381]  kthread+0x328/0x630
[   32.366593]  ret_from_fork+0x10/0x20
[   32.370152] 
[   32.371628] Freed by task 245:
[   32.374667]  kasan_save_stack+0x3c/0x68
[   32.378485]  kasan_save_track+0x20/0x40
[   32.382305]  kasan_save_free_info+0x4c/0x78
[   32.386471]  __kasan_slab_free+0x6c/0x98
[   32.390377]  kfree+0x214/0x3c8
[   32.393415]  ksize_uaf+0x11c/0x5f8
[   32.396801]  kunit_try_run_case+0x170/0x3f0
[   32.400967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.406438]  kthread+0x328/0x630
[   32.409648]  ret_from_fork+0x10/0x20
[   32.413207] 
[   32.414683] The buggy address belongs to the object at ffff000802d02d00
[   32.414683]  which belongs to the cache kmalloc-128 of size 128
[   32.427184] The buggy address is located 120 bytes inside of
[   32.427184]  freed 128-byte region [ffff000802d02d00, ffff000802d02d80)
[   32.439422] 
[   32.440901] The buggy address belongs to the physical page:
[   32.446459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   32.454441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.462079] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.469022] page_type: f5(slab)
[   32.472159] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.479879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.487606] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.495417] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.503230] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   32.511042] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.518848] page dumped because: kasan: bad access detected
[   32.524404] 
[   32.525879] Memory state around the buggy address:
[   32.530660]  ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.537862]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.545067] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.552267]                                                                 ^
[   32.559389]  ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.566594]  ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.573795] ==================================================================
[   31.908452] ==================================================================
[   31.915391] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.921723] Read of size 1 at addr ffff000802d02d00 by task kunit_try_catch/245
[   31.929013] 
[   31.930499] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   31.930551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.930566] Hardware name: WinLink E850-96 board (DT)
[   31.930588] Call trace:
[   31.930600]  show_stack+0x20/0x38 (C)
[   31.930637]  dump_stack_lvl+0x8c/0xd0
[   31.930674]  print_report+0x118/0x608
[   31.930709]  kasan_report+0xdc/0x128
[   31.930740]  __asan_report_load1_noabort+0x20/0x30
[   31.930774]  ksize_uaf+0x598/0x5f8
[   31.930808]  kunit_try_run_case+0x170/0x3f0
[   31.930844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.930881]  kthread+0x328/0x630
[   31.930915]  ret_from_fork+0x10/0x20
[   31.930953] 
[   31.992553] Allocated by task 245:
[   31.995942]  kasan_save_stack+0x3c/0x68
[   31.999758]  kasan_save_track+0x20/0x40
[   32.003578]  kasan_save_alloc_info+0x40/0x58
[   32.007831]  __kasan_kmalloc+0xd4/0xd8
[   32.011565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.016078]  ksize_uaf+0xb8/0x5f8
[   32.019377]  kunit_try_run_case+0x170/0x3f0
[   32.023543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.029011]  kthread+0x328/0x630
[   32.032223]  ret_from_fork+0x10/0x20
[   32.035782] 
[   32.037257] Freed by task 245:
[   32.040297]  kasan_save_stack+0x3c/0x68
[   32.044115]  kasan_save_track+0x20/0x40
[   32.047935]  kasan_save_free_info+0x4c/0x78
[   32.052101]  __kasan_slab_free+0x6c/0x98
[   32.056007]  kfree+0x214/0x3c8
[   32.059046]  ksize_uaf+0x11c/0x5f8
[   32.062431]  kunit_try_run_case+0x170/0x3f0
[   32.066598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.072068]  kthread+0x328/0x630
[   32.075278]  ret_from_fork+0x10/0x20
[   32.078837] 
[   32.080312] The buggy address belongs to the object at ffff000802d02d00
[   32.080312]  which belongs to the cache kmalloc-128 of size 128
[   32.092816] The buggy address is located 0 bytes inside of
[   32.092816]  freed 128-byte region [ffff000802d02d00, ffff000802d02d80)
[   32.104878] 
[   32.106357] The buggy address belongs to the physical page:
[   32.111913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   32.119897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.127536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.134478] page_type: f5(slab)
[   32.137615] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.145336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.153063] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.160873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.168687] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   32.176499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.184304] page dumped because: kasan: bad access detected
[   32.189861] 
[   32.191335] Memory state around the buggy address:
[   32.196115]  ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.203318]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.210523] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.217725]                    ^
[   32.220938]  ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228144]  ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235345] ==================================================================
[   31.569422] ==================================================================
[   31.578936] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.585271] Read of size 1 at addr ffff000802d02d00 by task kunit_try_catch/245
[   31.592561] 
[   31.594048] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   31.594101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.594118] Hardware name: WinLink E850-96 board (DT)
[   31.594140] Call trace:
[   31.594153]  show_stack+0x20/0x38 (C)
[   31.594192]  dump_stack_lvl+0x8c/0xd0
[   31.594228]  print_report+0x118/0x608
[   31.594256]  kasan_report+0xdc/0x128
[   31.594286]  __kasan_check_byte+0x54/0x70
[   31.594319]  ksize+0x30/0x88
[   31.594347]  ksize_uaf+0x168/0x5f8
[   31.594379]  kunit_try_run_case+0x170/0x3f0
[   31.594415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.594457]  kthread+0x328/0x630
[   31.594496]  ret_from_fork+0x10/0x20
[   31.594532] 
[   31.658185] Allocated by task 245:
[   31.661573]  kasan_save_stack+0x3c/0x68
[   31.665388]  kasan_save_track+0x20/0x40
[   31.669208]  kasan_save_alloc_info+0x40/0x58
[   31.673461]  __kasan_kmalloc+0xd4/0xd8
[   31.677194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.681707]  ksize_uaf+0xb8/0x5f8
[   31.685006]  kunit_try_run_case+0x170/0x3f0
[   31.689173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.694641]  kthread+0x328/0x630
[   31.697853]  ret_from_fork+0x10/0x20
[   31.701412] 
[   31.702887] Freed by task 245:
[   31.705927]  kasan_save_stack+0x3c/0x68
[   31.709745]  kasan_save_track+0x20/0x40
[   31.713564]  kasan_save_free_info+0x4c/0x78
[   31.717731]  __kasan_slab_free+0x6c/0x98
[   31.721637]  kfree+0x214/0x3c8
[   31.724675]  ksize_uaf+0x11c/0x5f8
[   31.728061]  kunit_try_run_case+0x170/0x3f0
[   31.732227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.737696]  kthread+0x328/0x630
[   31.740908]  ret_from_fork+0x10/0x20
[   31.744467] 
[   31.745944] The buggy address belongs to the object at ffff000802d02d00
[   31.745944]  which belongs to the cache kmalloc-128 of size 128
[   31.758446] The buggy address is located 0 bytes inside of
[   31.758446]  freed 128-byte region [ffff000802d02d00, ffff000802d02d80)
[   31.770508] 
[   31.771988] The buggy address belongs to the physical page:
[   31.777544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   31.785528] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.793166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.800111] page_type: f5(slab)
[   31.803249] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.810965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.818694] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.826505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.834318] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   31.842129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.849934] page dumped because: kasan: bad access detected
[   31.855491] 
[   31.856964] Memory state around the buggy address:
[   31.861747]  ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.868948]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.876153] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.883354]                    ^
[   31.886569]  ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.893775]  ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.900975] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.268112] ==================================================================
[   31.275207] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   31.282582] Read of size 1 at addr ffff000801ed677f by task kunit_try_catch/243
[   31.289873] 
[   31.291358] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   31.291406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.291422] Hardware name: WinLink E850-96 board (DT)
[   31.291443] Call trace:
[   31.291455]  show_stack+0x20/0x38 (C)
[   31.291488]  dump_stack_lvl+0x8c/0xd0
[   31.291526]  print_report+0x118/0x608
[   31.291554]  kasan_report+0xdc/0x128
[   31.291585]  __asan_report_load1_noabort+0x20/0x30
[   31.291624]  ksize_unpoisons_memory+0x690/0x740
[   31.291658]  kunit_try_run_case+0x170/0x3f0
[   31.291693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.291730]  kthread+0x328/0x630
[   31.291762]  ret_from_fork+0x10/0x20
[   31.291797] 
[   31.354542] Allocated by task 243:
[   31.357930]  kasan_save_stack+0x3c/0x68
[   31.361747]  kasan_save_track+0x20/0x40
[   31.365566]  kasan_save_alloc_info+0x40/0x58
[   31.369820]  __kasan_kmalloc+0xd4/0xd8
[   31.373553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.378066]  ksize_unpoisons_memory+0xc0/0x740
[   31.382493]  kunit_try_run_case+0x170/0x3f0
[   31.386660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.392128]  kthread+0x328/0x630
[   31.395340]  ret_from_fork+0x10/0x20
[   31.398899] 
[   31.400375] The buggy address belongs to the object at ffff000801ed6700
[   31.400375]  which belongs to the cache kmalloc-128 of size 128
[   31.412877] The buggy address is located 12 bytes to the right of
[   31.412877]  allocated 115-byte region [ffff000801ed6700, ffff000801ed6773)
[   31.425895] 
[   31.427372] The buggy address belongs to the physical page:
[   31.432928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   31.440914] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.448553] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.455497] page_type: f5(slab)
[   31.458632] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.466353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.474080] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.481891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.489704] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   31.497516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.505321] page dumped because: kasan: bad access detected
[   31.510876] 
[   31.512352] Memory state around the buggy address:
[   31.517133]  ffff000801ed6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.524335]  ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.531540] >ffff000801ed6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.538741]                                                                 ^
[   31.545863]  ffff000801ed6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.553069]  ffff000801ed6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.560268] ==================================================================
[   30.666919] ==================================================================
[   30.676692] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   30.684068] Read of size 1 at addr ffff000801ed6773 by task kunit_try_catch/243
[   30.691358] 
[   30.692845] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   30.692903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.692920] Hardware name: WinLink E850-96 board (DT)
[   30.692939] Call trace:
[   30.692954]  show_stack+0x20/0x38 (C)
[   30.692990]  dump_stack_lvl+0x8c/0xd0
[   30.693030]  print_report+0x118/0x608
[   30.693065]  kasan_report+0xdc/0x128
[   30.693096]  __asan_report_load1_noabort+0x20/0x30
[   30.693133]  ksize_unpoisons_memory+0x628/0x740
[   30.693170]  kunit_try_run_case+0x170/0x3f0
[   30.693207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.693246]  kthread+0x328/0x630
[   30.693279]  ret_from_fork+0x10/0x20
[   30.693317] 
[   30.756027] Allocated by task 243:
[   30.759416]  kasan_save_stack+0x3c/0x68
[   30.763232]  kasan_save_track+0x20/0x40
[   30.767051]  kasan_save_alloc_info+0x40/0x58
[   30.771304]  __kasan_kmalloc+0xd4/0xd8
[   30.775037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.779551]  ksize_unpoisons_memory+0xc0/0x740
[   30.783978]  kunit_try_run_case+0x170/0x3f0
[   30.788144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.793613]  kthread+0x328/0x630
[   30.796825]  ret_from_fork+0x10/0x20
[   30.800384] 
[   30.801861] The buggy address belongs to the object at ffff000801ed6700
[   30.801861]  which belongs to the cache kmalloc-128 of size 128
[   30.814362] The buggy address is located 0 bytes to the right of
[   30.814362]  allocated 115-byte region [ffff000801ed6700, ffff000801ed6773)
[   30.827293] 
[   30.828772] The buggy address belongs to the physical page:
[   30.834329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   30.842313] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.849951] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.856895] page_type: f5(slab)
[   30.860032] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.867751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.875478] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.883289] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.891102] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   30.898913] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.906719] page dumped because: kasan: bad access detected
[   30.912276] 
[   30.913752] Memory state around the buggy address:
[   30.918530]  ffff000801ed6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.925733]  ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.932939] >ffff000801ed6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.940139]                                                              ^
[   30.947000]  ffff000801ed6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.954206]  ffff000801ed6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.961407] ==================================================================
[   30.968872] ==================================================================
[   30.975819] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   30.983194] Read of size 1 at addr ffff000801ed6778 by task kunit_try_catch/243
[   30.990485] 
[   30.991970] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   30.992018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.992034] Hardware name: WinLink E850-96 board (DT)
[   30.992054] Call trace:
[   30.992066]  show_stack+0x20/0x38 (C)
[   30.992101]  dump_stack_lvl+0x8c/0xd0
[   30.992138]  print_report+0x118/0x608
[   30.992168]  kasan_report+0xdc/0x128
[   30.992200]  __asan_report_load1_noabort+0x20/0x30
[   30.992233]  ksize_unpoisons_memory+0x618/0x740
[   30.992268]  kunit_try_run_case+0x170/0x3f0
[   30.992303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.992341]  kthread+0x328/0x630
[   30.992373]  ret_from_fork+0x10/0x20
[   30.992407] 
[   31.055154] Allocated by task 243:
[   31.058543]  kasan_save_stack+0x3c/0x68
[   31.062359]  kasan_save_track+0x20/0x40
[   31.066178]  kasan_save_alloc_info+0x40/0x58
[   31.070432]  __kasan_kmalloc+0xd4/0xd8
[   31.074165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.078679]  ksize_unpoisons_memory+0xc0/0x740
[   31.083105]  kunit_try_run_case+0x170/0x3f0
[   31.087272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.092741]  kthread+0x328/0x630
[   31.095952]  ret_from_fork+0x10/0x20
[   31.099511] 
[   31.100987] The buggy address belongs to the object at ffff000801ed6700
[   31.100987]  which belongs to the cache kmalloc-128 of size 128
[   31.113489] The buggy address is located 5 bytes to the right of
[   31.113489]  allocated 115-byte region [ffff000801ed6700, ffff000801ed6773)
[   31.126421] 
[   31.127898] The buggy address belongs to the physical page:
[   31.133457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   31.141441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.149078] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.156022] page_type: f5(slab)
[   31.159157] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.166878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.174605] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.182416] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.190229] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   31.198041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.205847] page dumped because: kasan: bad access detected
[   31.211402] 
[   31.212879] Memory state around the buggy address:
[   31.217659]  ffff000801ed6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.224861]  ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.232065] >ffff000801ed6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.239266]                                                                 ^
[   31.246388]  ffff000801ed6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.253594]  ffff000801ed6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.260794] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   30.351916] ==================================================================
[   30.358988] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   30.364973] Free of addr ffff0008046792c0 by task kunit_try_catch/241
[   30.371397] 
[   30.372882] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   30.372936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.372952] Hardware name: WinLink E850-96 board (DT)
[   30.372970] Call trace:
[   30.372983]  show_stack+0x20/0x38 (C)
[   30.373015]  dump_stack_lvl+0x8c/0xd0
[   30.373052]  print_report+0x118/0x608
[   30.373083]  kasan_report_invalid_free+0xc0/0xe8
[   30.373116]  check_slab_allocation+0xd4/0x108
[   30.373149]  __kasan_slab_pre_free+0x2c/0x48
[   30.373180]  kfree+0xe8/0x3c8
[   30.373207]  kfree_sensitive+0x3c/0xb0
[   30.373237]  kmalloc_double_kzfree+0x168/0x308
[   30.373275]  kunit_try_run_case+0x170/0x3f0
[   30.373312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.373349]  kthread+0x328/0x630
[   30.373383]  ret_from_fork+0x10/0x20
[   30.373420] 
[   30.447526] Allocated by task 241:
[   30.450911]  kasan_save_stack+0x3c/0x68
[   30.454729]  kasan_save_track+0x20/0x40
[   30.458549]  kasan_save_alloc_info+0x40/0x58
[   30.462802]  __kasan_kmalloc+0xd4/0xd8
[   30.466535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.471049]  kmalloc_double_kzfree+0xb8/0x308
[   30.475389]  kunit_try_run_case+0x170/0x3f0
[   30.479555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.485025]  kthread+0x328/0x630
[   30.488236]  ret_from_fork+0x10/0x20
[   30.491795] 
[   30.493270] Freed by task 241:
[   30.496309]  kasan_save_stack+0x3c/0x68
[   30.500128]  kasan_save_track+0x20/0x40
[   30.503949]  kasan_save_free_info+0x4c/0x78
[   30.508114]  __kasan_slab_free+0x6c/0x98
[   30.512020]  kfree+0x214/0x3c8
[   30.515058]  kfree_sensitive+0x80/0xb0
[   30.518791]  kmalloc_double_kzfree+0x11c/0x308
[   30.523218]  kunit_try_run_case+0x170/0x3f0
[   30.527384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.532853]  kthread+0x328/0x630
[   30.536065]  ret_from_fork+0x10/0x20
[   30.539624] 
[   30.541101] The buggy address belongs to the object at ffff0008046792c0
[   30.541101]  which belongs to the cache kmalloc-16 of size 16
[   30.553427] The buggy address is located 0 bytes inside of
[   30.553427]  16-byte region [ffff0008046792c0, ffff0008046792d0)
[   30.564884] 
[   30.566363] The buggy address belongs to the physical page:
[   30.571917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884679
[   30.579902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.586412] page_type: f5(slab)
[   30.589549] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.597269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.604987] page dumped because: kasan: bad access detected
[   30.610543] 
[   30.612019] Memory state around the buggy address:
[   30.616800]  ffff000804679180: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   30.624001]  ffff000804679200: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   30.631208] >ffff000804679280: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.638407]                                            ^
[   30.643706]  ffff000804679300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.650911]  ffff000804679380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.658112] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.037451] ==================================================================
[   30.051267] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.058643] Read of size 1 at addr ffff0008046792c0 by task kunit_try_catch/241
[   30.065934] 
[   30.067423] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   30.067480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.067499] Hardware name: WinLink E850-96 board (DT)
[   30.067521] Call trace:
[   30.067535]  show_stack+0x20/0x38 (C)
[   30.067569]  dump_stack_lvl+0x8c/0xd0
[   30.067613]  print_report+0x118/0x608
[   30.067644]  kasan_report+0xdc/0x128
[   30.067673]  __kasan_check_byte+0x54/0x70
[   30.067703]  kfree_sensitive+0x30/0xb0
[   30.067736]  kmalloc_double_kzfree+0x168/0x308
[   30.067775]  kunit_try_run_case+0x170/0x3f0
[   30.067813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.067855]  kthread+0x328/0x630
[   30.067892]  ret_from_fork+0x10/0x20
[   30.067930] 
[   30.133469] Allocated by task 241:
[   30.136855]  kasan_save_stack+0x3c/0x68
[   30.140671]  kasan_save_track+0x20/0x40
[   30.144491]  kasan_save_alloc_info+0x40/0x58
[   30.148744]  __kasan_kmalloc+0xd4/0xd8
[   30.152477]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.156991]  kmalloc_double_kzfree+0xb8/0x308
[   30.161331]  kunit_try_run_case+0x170/0x3f0
[   30.165497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.170968]  kthread+0x328/0x630
[   30.174178]  ret_from_fork+0x10/0x20
[   30.177737] 
[   30.179213] Freed by task 241:
[   30.182250]  kasan_save_stack+0x3c/0x68
[   30.186070]  kasan_save_track+0x20/0x40
[   30.189891]  kasan_save_free_info+0x4c/0x78
[   30.194056]  __kasan_slab_free+0x6c/0x98
[   30.197962]  kfree+0x214/0x3c8
[   30.201000]  kfree_sensitive+0x80/0xb0
[   30.204733]  kmalloc_double_kzfree+0x11c/0x308
[   30.209160]  kunit_try_run_case+0x170/0x3f0
[   30.213327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.218795]  kthread+0x328/0x630
[   30.222007]  ret_from_fork+0x10/0x20
[   30.225566] 
[   30.227044] The buggy address belongs to the object at ffff0008046792c0
[   30.227044]  which belongs to the cache kmalloc-16 of size 16
[   30.239371] The buggy address is located 0 bytes inside of
[   30.239371]  freed 16-byte region [ffff0008046792c0, ffff0008046792d0)
[   30.251347] 
[   30.252827] The buggy address belongs to the physical page:
[   30.258382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884679
[   30.266367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.272877] page_type: f5(slab)
[   30.276015] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   30.283732] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.291452] page dumped because: kasan: bad access detected
[   30.297007] 
[   30.298483] Memory state around the buggy address:
[   30.303263]  ffff000804679180: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   30.310465]  ffff000804679200: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   30.317671] >ffff000804679280: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   30.324870]                                            ^
[   30.330169]  ffff000804679300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.337374]  ffff000804679380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.344575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   21.211214] ==================================================================
[   21.220757] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   21.228220] Write of size 1 at addr ffff00080332200a by task kunit_try_catch/195
[   21.235598] 
[   21.237083] CPU: 7 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.237139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.237155] Hardware name: WinLink E850-96 board (DT)
[   21.237178] Call trace:
[   21.237191]  show_stack+0x20/0x38 (C)
[   21.237229]  dump_stack_lvl+0x8c/0xd0
[   21.237267]  print_report+0x118/0x608
[   21.237298]  kasan_report+0xdc/0x128
[   21.237327]  __asan_report_store1_noabort+0x20/0x30
[   21.237363]  kmalloc_large_oob_right+0x278/0x2b8
[   21.237396]  kunit_try_run_case+0x170/0x3f0
[   21.237431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.237470]  kthread+0x328/0x630
[   21.237505]  ret_from_fork+0x10/0x20
[   21.237543] 
[   21.300443] The buggy address belongs to the physical page:
[   21.306000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883320
[   21.313983] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.321622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.328566] page_type: f8(unknown)
[   21.331964] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.339682] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.347408] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.355219] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.363033] head: 0bfffe0000000002 fffffdffe00cc801 00000000ffffffff 00000000ffffffff
[   21.370845] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.378650] page dumped because: kasan: bad access detected
[   21.384205] 
[   21.385683] Memory state around the buggy address:
[   21.390461]  ffff000803321f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.397664]  ffff000803321f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.404870] >ffff000803322000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.412070]                       ^
[   21.415546]  ffff000803322080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.422751]  ffff000803322100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.429952] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   29.734142] ==================================================================
[   29.743458] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   29.750054] Read of size 1 at addr ffff000802e1aba8 by task kunit_try_catch/237
[   29.757344] 
[   29.758833] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   29.758890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.758910] Hardware name: WinLink E850-96 board (DT)
[   29.758933] Call trace:
[   29.758951]  show_stack+0x20/0x38 (C)
[   29.758987]  dump_stack_lvl+0x8c/0xd0
[   29.759027]  print_report+0x118/0x608
[   29.759059]  kasan_report+0xdc/0x128
[   29.759088]  __asan_report_load1_noabort+0x20/0x30
[   29.759125]  kmalloc_uaf2+0x3f4/0x468
[   29.759160]  kunit_try_run_case+0x170/0x3f0
[   29.759199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.759237]  kthread+0x328/0x630
[   29.759271]  ret_from_fork+0x10/0x20
[   29.759308] 
[   29.821147] Allocated by task 237:
[   29.824534]  kasan_save_stack+0x3c/0x68
[   29.828350]  kasan_save_track+0x20/0x40
[   29.832169]  kasan_save_alloc_info+0x40/0x58
[   29.836423]  __kasan_kmalloc+0xd4/0xd8
[   29.840155]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.844669]  kmalloc_uaf2+0xc4/0x468
[   29.848228]  kunit_try_run_case+0x170/0x3f0
[   29.852395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.857863]  kthread+0x328/0x630
[   29.861075]  ret_from_fork+0x10/0x20
[   29.864634] 
[   29.866111] Freed by task 237:
[   29.869148]  kasan_save_stack+0x3c/0x68
[   29.872967]  kasan_save_track+0x20/0x40
[   29.876787]  kasan_save_free_info+0x4c/0x78
[   29.880953]  __kasan_slab_free+0x6c/0x98
[   29.884859]  kfree+0x214/0x3c8
[   29.887897]  kmalloc_uaf2+0x134/0x468
[   29.891543]  kunit_try_run_case+0x170/0x3f0
[   29.895710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.901179]  kthread+0x328/0x630
[   29.904391]  ret_from_fork+0x10/0x20
[   29.907950] 
[   29.909427] The buggy address belongs to the object at ffff000802e1ab80
[   29.909427]  which belongs to the cache kmalloc-64 of size 64
[   29.921755] The buggy address is located 40 bytes inside of
[   29.921755]  freed 64-byte region [ffff000802e1ab80, ffff000802e1abc0)
[   29.933817] 
[   29.935297] The buggy address belongs to the physical page:
[   29.940852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e1a
[   29.948837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.955347] page_type: f5(slab)
[   29.958485] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.966202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.973922] page dumped because: kasan: bad access detected
[   29.979476] 
[   29.980951] Memory state around the buggy address:
[   29.985734]  ffff000802e1aa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.992934]  ffff000802e1ab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.000141] >ffff000802e1ab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.007340]                                   ^
[   30.011859]  ffff000802e1ac00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.019063]  ffff000802e1ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.026265] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   29.430043] ==================================================================
[   29.438603] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   29.445719] Write of size 33 at addr ffff000800d61600 by task kunit_try_catch/235
[   29.453182] 
[   29.454670] CPU: 7 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   29.454725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.454745] Hardware name: WinLink E850-96 board (DT)
[   29.454768] Call trace:
[   29.454780]  show_stack+0x20/0x38 (C)
[   29.454819]  dump_stack_lvl+0x8c/0xd0
[   29.454857]  print_report+0x118/0x608
[   29.454888]  kasan_report+0xdc/0x128
[   29.454918]  kasan_check_range+0x100/0x1a8
[   29.454948]  __asan_memset+0x34/0x78
[   29.454980]  kmalloc_uaf_memset+0x170/0x310
[   29.455014]  kunit_try_run_case+0x170/0x3f0
[   29.455052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.455091]  kthread+0x328/0x630
[   29.455126]  ret_from_fork+0x10/0x20
[   29.455162] 
[   29.520370] Allocated by task 235:
[   29.523758]  kasan_save_stack+0x3c/0x68
[   29.527573]  kasan_save_track+0x20/0x40
[   29.531392]  kasan_save_alloc_info+0x40/0x58
[   29.535646]  __kasan_kmalloc+0xd4/0xd8
[   29.539380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.543892]  kmalloc_uaf_memset+0xb8/0x310
[   29.547972]  kunit_try_run_case+0x170/0x3f0
[   29.552139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.557607]  kthread+0x328/0x630
[   29.560819]  ret_from_fork+0x10/0x20
[   29.564378] 
[   29.565854] Freed by task 235:
[   29.568893]  kasan_save_stack+0x3c/0x68
[   29.572711]  kasan_save_track+0x20/0x40
[   29.576531]  kasan_save_free_info+0x4c/0x78
[   29.580697]  __kasan_slab_free+0x6c/0x98
[   29.584604]  kfree+0x214/0x3c8
[   29.587642]  kmalloc_uaf_memset+0x11c/0x310
[   29.591810]  kunit_try_run_case+0x170/0x3f0
[   29.595975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.601444]  kthread+0x328/0x630
[   29.604655]  ret_from_fork+0x10/0x20
[   29.608214] 
[   29.609690] The buggy address belongs to the object at ffff000800d61600
[   29.609690]  which belongs to the cache kmalloc-64 of size 64
[   29.622019] The buggy address is located 0 bytes inside of
[   29.622019]  freed 64-byte region [ffff000800d61600, ffff000800d61640)
[   29.633995] 
[   29.635475] The buggy address belongs to the physical page:
[   29.641032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   29.649015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.655525] page_type: f5(slab)
[   29.658662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.666380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.674100] page dumped because: kasan: bad access detected
[   29.679654] 
[   29.681131] Memory state around the buggy address:
[   29.685913]  ffff000800d61500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.693113]  ffff000800d61580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.700318] >ffff000800d61600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.707518]                    ^
[   29.710734]  ffff000800d61680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.717939]  ffff000800d61700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.725141] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   29.128310] ==================================================================
[   29.138522] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   29.145029] Read of size 1 at addr ffff000802e0b428 by task kunit_try_catch/233
[   29.152318] 
[   29.153807] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   29.153858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.153875] Hardware name: WinLink E850-96 board (DT)
[   29.153897] Call trace:
[   29.153910]  show_stack+0x20/0x38 (C)
[   29.153949]  dump_stack_lvl+0x8c/0xd0
[   29.153988]  print_report+0x118/0x608
[   29.154020]  kasan_report+0xdc/0x128
[   29.154051]  __asan_report_load1_noabort+0x20/0x30
[   29.154091]  kmalloc_uaf+0x300/0x338
[   29.154122]  kunit_try_run_case+0x170/0x3f0
[   29.154161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.154201]  kthread+0x328/0x630
[   29.154237]  ret_from_fork+0x10/0x20
[   29.154273] 
[   29.216035] Allocated by task 233:
[   29.219421]  kasan_save_stack+0x3c/0x68
[   29.223238]  kasan_save_track+0x20/0x40
[   29.227057]  kasan_save_alloc_info+0x40/0x58
[   29.231310]  __kasan_kmalloc+0xd4/0xd8
[   29.235043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.239557]  kmalloc_uaf+0xb8/0x338
[   29.243029]  kunit_try_run_case+0x170/0x3f0
[   29.247195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.252664]  kthread+0x328/0x630
[   29.255876]  ret_from_fork+0x10/0x20
[   29.259435] 
[   29.260910] Freed by task 233:
[   29.263949]  kasan_save_stack+0x3c/0x68
[   29.267768]  kasan_save_track+0x20/0x40
[   29.271589]  kasan_save_free_info+0x4c/0x78
[   29.275754]  __kasan_slab_free+0x6c/0x98
[   29.279660]  kfree+0x214/0x3c8
[   29.282699]  kmalloc_uaf+0x11c/0x338
[   29.286257]  kunit_try_run_case+0x170/0x3f0
[   29.290424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.295892]  kthread+0x328/0x630
[   29.299105]  ret_from_fork+0x10/0x20
[   29.302663] 
[   29.304140] The buggy address belongs to the object at ffff000802e0b420
[   29.304140]  which belongs to the cache kmalloc-16 of size 16
[   29.316469] The buggy address is located 8 bytes inside of
[   29.316469]  freed 16-byte region [ffff000802e0b420, ffff000802e0b430)
[   29.328444] 
[   29.329925] The buggy address belongs to the physical page:
[   29.335480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   29.343466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.349975] page_type: f5(slab)
[   29.353112] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   29.360829] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.368548] page dumped because: kasan: bad access detected
[   29.374104] 
[   29.375580] Memory state around the buggy address:
[   29.380360]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   29.387562]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   29.394766] >ffff000802e0b400: 00 05 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   29.401968]                                   ^
[   29.406485]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.413690]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.420891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   28.861701] ==================================================================
[   28.871684] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.879583] Read of size 64 at addr ffff000800d61584 by task kunit_try_catch/231
[   28.886960] 
[   28.888447] CPU: 7 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   28.888504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.888522] Hardware name: WinLink E850-96 board (DT)
[   28.888545] Call trace:
[   28.888559]  show_stack+0x20/0x38 (C)
[   28.888599]  dump_stack_lvl+0x8c/0xd0
[   28.888637]  print_report+0x118/0x608
[   28.888669]  kasan_report+0xdc/0x128
[   28.888698]  kasan_check_range+0x100/0x1a8
[   28.888732]  __asan_memmove+0x3c/0x98
[   28.888765]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.888802]  kunit_try_run_case+0x170/0x3f0
[   28.888840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.888880]  kthread+0x328/0x630
[   28.888916]  ret_from_fork+0x10/0x20
[   28.888949] 
[   28.955100] Allocated by task 231:
[   28.958489]  kasan_save_stack+0x3c/0x68
[   28.962304]  kasan_save_track+0x20/0x40
[   28.966123]  kasan_save_alloc_info+0x40/0x58
[   28.970377]  __kasan_kmalloc+0xd4/0xd8
[   28.974109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.978623]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   28.983571]  kunit_try_run_case+0x170/0x3f0
[   28.987737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.993206]  kthread+0x328/0x630
[   28.996418]  ret_from_fork+0x10/0x20
[   28.999977] 
[   29.001454] The buggy address belongs to the object at ffff000800d61580
[   29.001454]  which belongs to the cache kmalloc-64 of size 64
[   29.013782] The buggy address is located 4 bytes inside of
[   29.013782]  allocated 64-byte region [ffff000800d61580, ffff000800d615c0)
[   29.026105] 
[   29.027585] The buggy address belongs to the physical page:
[   29.033140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   29.041124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.047635] page_type: f5(slab)
[   29.050772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.058490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.066208] page dumped because: kasan: bad access detected
[   29.071765] 
[   29.073241] Memory state around the buggy address:
[   29.078020]  ffff000800d61480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.085223]  ffff000800d61500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.092428] >ffff000800d61580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.099628]                                            ^
[   29.104927]  ffff000800d61600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.112132]  ffff000800d61680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.119333] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   28.596762] ==================================================================
[   28.606324] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   28.613875] Read of size 18446744073709551614 at addr ffff000802e1ab04 by task kunit_try_catch/229
[   28.622812] 
[   28.624302] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   28.624354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.624372] Hardware name: WinLink E850-96 board (DT)
[   28.624394] Call trace:
[   28.624405]  show_stack+0x20/0x38 (C)
[   28.624441]  dump_stack_lvl+0x8c/0xd0
[   28.624479]  print_report+0x118/0x608
[   28.624511]  kasan_report+0xdc/0x128
[   28.624538]  kasan_check_range+0x100/0x1a8
[   28.624570]  __asan_memmove+0x3c/0x98
[   28.624602]  kmalloc_memmove_negative_size+0x154/0x2e0
[   28.624641]  kunit_try_run_case+0x170/0x3f0
[   28.624679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.624720]  kthread+0x328/0x630
[   28.624756]  ret_from_fork+0x10/0x20
[   28.624790] 
[   28.691040] Allocated by task 229:
[   28.694430]  kasan_save_stack+0x3c/0x68
[   28.698245]  kasan_save_track+0x20/0x40
[   28.702065]  kasan_save_alloc_info+0x40/0x58
[   28.706318]  __kasan_kmalloc+0xd4/0xd8
[   28.710051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.714565]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   28.719599]  kunit_try_run_case+0x170/0x3f0
[   28.723766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.729236]  kthread+0x328/0x630
[   28.732446]  ret_from_fork+0x10/0x20
[   28.736005] 
[   28.737482] The buggy address belongs to the object at ffff000802e1ab00
[   28.737482]  which belongs to the cache kmalloc-64 of size 64
[   28.749810] The buggy address is located 4 bytes inside of
[   28.749810]  64-byte region [ffff000802e1ab00, ffff000802e1ab40)
[   28.761265] 
[   28.762745] The buggy address belongs to the physical page:
[   28.768301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e1a
[   28.776285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.782796] page_type: f5(slab)
[   28.785933] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.793650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.801368] page dumped because: kasan: bad access detected
[   28.806925] 
[   28.808402] Memory state around the buggy address:
[   28.813181]  ffff000802e1aa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.820383]  ffff000802e1aa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.827589] >ffff000802e1ab00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.834788]                    ^
[   28.838004]  ffff000802e1ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.845210]  ffff000802e1ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.852410] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   28.290736] ==================================================================
[   28.300339] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   28.307627] Write of size 16 at addr ffff000801ed6669 by task kunit_try_catch/227
[   28.315091] 
[   28.316580] CPU: 7 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   28.316640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.316657] Hardware name: WinLink E850-96 board (DT)
[   28.316679] Call trace:
[   28.316693]  show_stack+0x20/0x38 (C)
[   28.316730]  dump_stack_lvl+0x8c/0xd0
[   28.316769]  print_report+0x118/0x608
[   28.316799]  kasan_report+0xdc/0x128
[   28.316828]  kasan_check_range+0x100/0x1a8
[   28.316859]  __asan_memset+0x34/0x78
[   28.316891]  kmalloc_oob_memset_16+0x150/0x2f8
[   28.316925]  kunit_try_run_case+0x170/0x3f0
[   28.316960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.316997]  kthread+0x328/0x630
[   28.317030]  ret_from_fork+0x10/0x20
[   28.317065] 
[   28.382539] Allocated by task 227:
[   28.385927]  kasan_save_stack+0x3c/0x68
[   28.389743]  kasan_save_track+0x20/0x40
[   28.393562]  kasan_save_alloc_info+0x40/0x58
[   28.397816]  __kasan_kmalloc+0xd4/0xd8
[   28.401548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.406062]  kmalloc_oob_memset_16+0xb0/0x2f8
[   28.410402]  kunit_try_run_case+0x170/0x3f0
[   28.414569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.420037]  kthread+0x328/0x630
[   28.423250]  ret_from_fork+0x10/0x20
[   28.426808] 
[   28.428287] The buggy address belongs to the object at ffff000801ed6600
[   28.428287]  which belongs to the cache kmalloc-128 of size 128
[   28.440787] The buggy address is located 105 bytes inside of
[   28.440787]  allocated 120-byte region [ffff000801ed6600, ffff000801ed6678)
[   28.453370] 
[   28.454849] The buggy address belongs to the physical page:
[   28.460407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   28.468390] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.476028] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.482972] page_type: f5(slab)
[   28.486110] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.493828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.501555] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.509366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.517179] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   28.524991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.532796] page dumped because: kasan: bad access detected
[   28.538353] 
[   28.539829] Memory state around the buggy address:
[   28.544607]  ffff000801ed6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.551810]  ffff000801ed6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.559016] >ffff000801ed6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.566216]                                                                 ^
[   28.573338]  ffff000801ed6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.580543]  ffff000801ed6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.587745] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   27.985309] ==================================================================
[   27.994788] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   28.001990] Write of size 8 at addr ffff000802d02c71 by task kunit_try_catch/225
[   28.009368] 
[   28.010855] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   28.010914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.010931] Hardware name: WinLink E850-96 board (DT)
[   28.010952] Call trace:
[   28.010964]  show_stack+0x20/0x38 (C)
[   28.011000]  dump_stack_lvl+0x8c/0xd0
[   28.011039]  print_report+0x118/0x608
[   28.011069]  kasan_report+0xdc/0x128
[   28.011098]  kasan_check_range+0x100/0x1a8
[   28.011129]  __asan_memset+0x34/0x78
[   28.011160]  kmalloc_oob_memset_8+0x150/0x2f8
[   28.011196]  kunit_try_run_case+0x170/0x3f0
[   28.011232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.011270]  kthread+0x328/0x630
[   28.011305]  ret_from_fork+0x10/0x20
[   28.011341] 
[   28.076729] Allocated by task 225:
[   28.080116]  kasan_save_stack+0x3c/0x68
[   28.083933]  kasan_save_track+0x20/0x40
[   28.087751]  kasan_save_alloc_info+0x40/0x58
[   28.092004]  __kasan_kmalloc+0xd4/0xd8
[   28.095737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.100251]  kmalloc_oob_memset_8+0xb0/0x2f8
[   28.104504]  kunit_try_run_case+0x170/0x3f0
[   28.108671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.114141]  kthread+0x328/0x630
[   28.117351]  ret_from_fork+0x10/0x20
[   28.120910] 
[   28.122389] The buggy address belongs to the object at ffff000802d02c00
[   28.122389]  which belongs to the cache kmalloc-128 of size 128
[   28.134888] The buggy address is located 113 bytes inside of
[   28.134888]  allocated 120-byte region [ffff000802d02c00, ffff000802d02c78)
[   28.147472] 
[   28.148950] The buggy address belongs to the physical page:
[   28.154508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   28.162493] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.170131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.177074] page_type: f5(slab)
[   28.180213] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.187930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.195657] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.203468] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.211281] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   28.219093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.226898] page dumped because: kasan: bad access detected
[   28.232455] 
[   28.233931] Memory state around the buggy address:
[   28.238713]  ffff000802d02b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.245912]  ffff000802d02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.253118] >ffff000802d02c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.260318]                                                                 ^
[   28.267440]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.274644]  ffff000802d02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.281847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   27.679827] ==================================================================
[   27.689237] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   27.696440] Write of size 4 at addr ffff000801ed6575 by task kunit_try_catch/223
[   27.703816] 
[   27.705306] CPU: 7 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   27.705362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.705378] Hardware name: WinLink E850-96 board (DT)
[   27.705398] Call trace:
[   27.705410]  show_stack+0x20/0x38 (C)
[   27.705447]  dump_stack_lvl+0x8c/0xd0
[   27.705487]  print_report+0x118/0x608
[   27.705517]  kasan_report+0xdc/0x128
[   27.705547]  kasan_check_range+0x100/0x1a8
[   27.705581]  __asan_memset+0x34/0x78
[   27.705611]  kmalloc_oob_memset_4+0x150/0x300
[   27.705643]  kunit_try_run_case+0x170/0x3f0
[   27.705683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.705722]  kthread+0x328/0x630
[   27.705757]  ret_from_fork+0x10/0x20
[   27.705794] 
[   27.771176] Allocated by task 223:
[   27.774565]  kasan_save_stack+0x3c/0x68
[   27.778380]  kasan_save_track+0x20/0x40
[   27.782200]  kasan_save_alloc_info+0x40/0x58
[   27.786453]  __kasan_kmalloc+0xd4/0xd8
[   27.790187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.794700]  kmalloc_oob_memset_4+0xb0/0x300
[   27.798953]  kunit_try_run_case+0x170/0x3f0
[   27.803121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.808588]  kthread+0x328/0x630
[   27.811800]  ret_from_fork+0x10/0x20
[   27.815359] 
[   27.816837] The buggy address belongs to the object at ffff000801ed6500
[   27.816837]  which belongs to the cache kmalloc-128 of size 128
[   27.829337] The buggy address is located 117 bytes inside of
[   27.829337]  allocated 120-byte region [ffff000801ed6500, ffff000801ed6578)
[   27.841921] 
[   27.843402] The buggy address belongs to the physical page:
[   27.848955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   27.856940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.864579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.871524] page_type: f5(slab)
[   27.874662] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.882379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.890107] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.897917] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.905729] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   27.913542] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.921347] page dumped because: kasan: bad access detected
[   27.926902] 
[   27.928378] Memory state around the buggy address:
[   27.933161]  ffff000801ed6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.940361]  ffff000801ed6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.947567] >ffff000801ed6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.954767]                                                                 ^
[   27.961889]  ffff000801ed6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.969094]  ffff000801ed6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.976296] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   27.374201] ==================================================================
[   27.383687] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   27.390888] Write of size 2 at addr ffff000802d02b77 by task kunit_try_catch/221
[   27.398266] 
[   27.399752] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   27.399806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.399824] Hardware name: WinLink E850-96 board (DT)
[   27.399846] Call trace:
[   27.399858]  show_stack+0x20/0x38 (C)
[   27.399896]  dump_stack_lvl+0x8c/0xd0
[   27.399935]  print_report+0x118/0x608
[   27.399965]  kasan_report+0xdc/0x128
[   27.399994]  kasan_check_range+0x100/0x1a8
[   27.400026]  __asan_memset+0x34/0x78
[   27.400057]  kmalloc_oob_memset_2+0x150/0x2f8
[   27.400091]  kunit_try_run_case+0x170/0x3f0
[   27.400128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.400169]  kthread+0x328/0x630
[   27.400205]  ret_from_fork+0x10/0x20
[   27.400241] 
[   27.465625] Allocated by task 221:
[   27.469013]  kasan_save_stack+0x3c/0x68
[   27.472830]  kasan_save_track+0x20/0x40
[   27.476649]  kasan_save_alloc_info+0x40/0x58
[   27.480902]  __kasan_kmalloc+0xd4/0xd8
[   27.484635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.489149]  kmalloc_oob_memset_2+0xb0/0x2f8
[   27.493402]  kunit_try_run_case+0x170/0x3f0
[   27.497569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.503039]  kthread+0x328/0x630
[   27.506249]  ret_from_fork+0x10/0x20
[   27.509808] 
[   27.511286] The buggy address belongs to the object at ffff000802d02b00
[   27.511286]  which belongs to the cache kmalloc-128 of size 128
[   27.523786] The buggy address is located 119 bytes inside of
[   27.523786]  allocated 120-byte region [ffff000802d02b00, ffff000802d02b78)
[   27.536371] 
[   27.537850] The buggy address belongs to the physical page:
[   27.543407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   27.551391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.559028] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.565972] page_type: f5(slab)
[   27.569112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.576828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.584556] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.592366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.600179] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   27.607991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.615796] page dumped because: kasan: bad access detected
[   27.621353] 
[   27.622829] Memory state around the buggy address:
[   27.627606]  ffff000802d02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.634810]  ffff000802d02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.642017] >ffff000802d02b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.649216]                                                                 ^
[   27.656338]  ffff000802d02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.663544]  ffff000802d02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.670743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   27.068756] ==================================================================
[   27.077790] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   27.085079] Write of size 128 at addr ffff000801ed6400 by task kunit_try_catch/219
[   27.092627] 
[   27.094116] CPU: 7 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   27.094171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.094186] Hardware name: WinLink E850-96 board (DT)
[   27.094210] Call trace:
[   27.094225]  show_stack+0x20/0x38 (C)
[   27.094259]  dump_stack_lvl+0x8c/0xd0
[   27.094298]  print_report+0x118/0x608
[   27.094329]  kasan_report+0xdc/0x128
[   27.094360]  kasan_check_range+0x100/0x1a8
[   27.094390]  __asan_memset+0x34/0x78
[   27.094422]  kmalloc_oob_in_memset+0x144/0x2d0
[   27.094456]  kunit_try_run_case+0x170/0x3f0
[   27.094493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.094532]  kthread+0x328/0x630
[   27.094568]  ret_from_fork+0x10/0x20
[   27.094604] 
[   27.160075] Allocated by task 219:
[   27.163463]  kasan_save_stack+0x3c/0x68
[   27.167278]  kasan_save_track+0x20/0x40
[   27.171098]  kasan_save_alloc_info+0x40/0x58
[   27.175351]  __kasan_kmalloc+0xd4/0xd8
[   27.179085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.183598]  kmalloc_oob_in_memset+0xb0/0x2d0
[   27.187938]  kunit_try_run_case+0x170/0x3f0
[   27.192105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.197573]  kthread+0x328/0x630
[   27.200785]  ret_from_fork+0x10/0x20
[   27.204344] 
[   27.205821] The buggy address belongs to the object at ffff000801ed6400
[   27.205821]  which belongs to the cache kmalloc-128 of size 128
[   27.218322] The buggy address is located 0 bytes inside of
[   27.218322]  allocated 120-byte region [ffff000801ed6400, ffff000801ed6478)
[   27.230733] 
[   27.232211] The buggy address belongs to the physical page:
[   27.237769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   27.245753] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.253390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   27.260336] page_type: f5(slab)
[   27.263474] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.271190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.278917] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   27.286728] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.294541] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   27.302353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.310158] page dumped because: kasan: bad access detected
[   27.315715] 
[   27.317191] Memory state around the buggy address:
[   27.321973]  ffff000801ed6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.329172]  ffff000801ed6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.336379] >ffff000801ed6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.343578]                                                                 ^
[   27.350702]  ffff000801ed6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.357904]  ffff000801ed6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.365107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   26.767527] ==================================================================
[   26.776405] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   26.783173] Read of size 16 at addr ffff0008046792a0 by task kunit_try_catch/217
[   26.790548] 
[   26.792036] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   26.792089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.792103] Hardware name: WinLink E850-96 board (DT)
[   26.792127] Call trace:
[   26.792140]  show_stack+0x20/0x38 (C)
[   26.792180]  dump_stack_lvl+0x8c/0xd0
[   26.792220]  print_report+0x118/0x608
[   26.792251]  kasan_report+0xdc/0x128
[   26.792280]  __asan_report_load16_noabort+0x20/0x30
[   26.792318]  kmalloc_uaf_16+0x3bc/0x438
[   26.792351]  kunit_try_run_case+0x170/0x3f0
[   26.792389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.792427]  kthread+0x328/0x630
[   26.792464]  ret_from_fork+0x10/0x20
[   26.792501] 
[   26.854611] Allocated by task 217:
[   26.857999]  kasan_save_stack+0x3c/0x68
[   26.861814]  kasan_save_track+0x20/0x40
[   26.865634]  kasan_save_alloc_info+0x40/0x58
[   26.869887]  __kasan_kmalloc+0xd4/0xd8
[   26.873620]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.878134]  kmalloc_uaf_16+0x140/0x438
[   26.881954]  kunit_try_run_case+0x170/0x3f0
[   26.886119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.891588]  kthread+0x328/0x630
[   26.894800]  ret_from_fork+0x10/0x20
[   26.898359] 
[   26.899834] Freed by task 217:
[   26.902874]  kasan_save_stack+0x3c/0x68
[   26.906694]  kasan_save_track+0x20/0x40
[   26.910512]  kasan_save_free_info+0x4c/0x78
[   26.914678]  __kasan_slab_free+0x6c/0x98
[   26.918585]  kfree+0x214/0x3c8
[   26.921622]  kmalloc_uaf_16+0x190/0x438
[   26.925442]  kunit_try_run_case+0x170/0x3f0
[   26.929609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.935078]  kthread+0x328/0x630
[   26.938289]  ret_from_fork+0x10/0x20
[   26.941848] 
[   26.943325] The buggy address belongs to the object at ffff0008046792a0
[   26.943325]  which belongs to the cache kmalloc-16 of size 16
[   26.955653] The buggy address is located 0 bytes inside of
[   26.955653]  freed 16-byte region [ffff0008046792a0, ffff0008046792b0)
[   26.967629] 
[   26.969109] The buggy address belongs to the physical page:
[   26.974664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884679
[   26.982649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.989158] page_type: f5(slab)
[   26.992297] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   27.000014] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.007732] page dumped because: kasan: bad access detected
[   27.013288] 
[   27.014763] Memory state around the buggy address:
[   27.019546]  ffff000804679180: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc
[   27.026747]  ffff000804679200: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   27.033953] >ffff000804679280: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   27.041152]                                ^
[   27.045409]  ffff000804679300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.052614]  ffff000804679380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.059815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   26.506773] ==================================================================
[   26.515817] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   26.522499] Write of size 16 at addr ffff000800d62060 by task kunit_try_catch/215
[   26.529962] 
[   26.531450] CPU: 7 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   26.531505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.531520] Hardware name: WinLink E850-96 board (DT)
[   26.531540] Call trace:
[   26.531551]  show_stack+0x20/0x38 (C)
[   26.531584]  dump_stack_lvl+0x8c/0xd0
[   26.531619]  print_report+0x118/0x608
[   26.531649]  kasan_report+0xdc/0x128
[   26.531679]  __asan_report_store16_noabort+0x20/0x30
[   26.531713]  kmalloc_oob_16+0x3a0/0x3f8
[   26.531743]  kunit_try_run_case+0x170/0x3f0
[   26.531780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.531818]  kthread+0x328/0x630
[   26.531855]  ret_from_fork+0x10/0x20
[   26.531892] 
[   26.594110] Allocated by task 215:
[   26.597498]  kasan_save_stack+0x3c/0x68
[   26.601315]  kasan_save_track+0x20/0x40
[   26.605134]  kasan_save_alloc_info+0x40/0x58
[   26.609388]  __kasan_kmalloc+0xd4/0xd8
[   26.613121]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.617634]  kmalloc_oob_16+0xb4/0x3f8
[   26.621367]  kunit_try_run_case+0x170/0x3f0
[   26.625534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.631002]  kthread+0x328/0x630
[   26.634214]  ret_from_fork+0x10/0x20
[   26.637773] 
[   26.639250] The buggy address belongs to the object at ffff000800d62060
[   26.639250]  which belongs to the cache kmalloc-16 of size 16
[   26.651577] The buggy address is located 0 bytes inside of
[   26.651577]  allocated 13-byte region [ffff000800d62060, ffff000800d6206d)
[   26.663901] 
[   26.665381] The buggy address belongs to the physical page:
[   26.670937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62
[   26.678922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.685429] page_type: f5(slab)
[   26.688567] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   26.696286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.704004] page dumped because: kasan: bad access detected
[   26.709560] 
[   26.711035] Memory state around the buggy address:
[   26.715817]  ffff000800d61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.723019]  ffff000800d61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.730225] >ffff000800d62000: 00 04 fc fc 00 05 fc fc fa fb fc fc 00 05 fc fc
[   26.737424]                                                           ^
[   26.744026]  ffff000800d62080: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.751230]  ffff000800d62100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.758431] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   26.170075] ==================================================================
[   26.177020] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.183613] Read of size 1 at addr ffff000802fae600 by task kunit_try_catch/213
[   26.190906] 
[   26.192390] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   26.192438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.192454] Hardware name: WinLink E850-96 board (DT)
[   26.192472] Call trace:
[   26.192484]  show_stack+0x20/0x38 (C)
[   26.192516]  dump_stack_lvl+0x8c/0xd0
[   26.192553]  print_report+0x118/0x608
[   26.192582]  kasan_report+0xdc/0x128
[   26.192610]  __asan_report_load1_noabort+0x20/0x30
[   26.192645]  krealloc_uaf+0x4c8/0x520
[   26.192671]  kunit_try_run_case+0x170/0x3f0
[   26.192708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.192747]  kthread+0x328/0x630
[   26.192779]  ret_from_fork+0x10/0x20
[   26.192812] 
[   26.254705] Allocated by task 213:
[   26.258093]  kasan_save_stack+0x3c/0x68
[   26.261910]  kasan_save_track+0x20/0x40
[   26.265730]  kasan_save_alloc_info+0x40/0x58
[   26.269983]  __kasan_kmalloc+0xd4/0xd8
[   26.273716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.278230]  krealloc_uaf+0xc8/0x520
[   26.281789]  kunit_try_run_case+0x170/0x3f0
[   26.285955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.291425]  kthread+0x328/0x630
[   26.294636]  ret_from_fork+0x10/0x20
[   26.298195] 
[   26.299670] Freed by task 213:
[   26.302708]  kasan_save_stack+0x3c/0x68
[   26.306528]  kasan_save_track+0x20/0x40
[   26.310348]  kasan_save_free_info+0x4c/0x78
[   26.314514]  __kasan_slab_free+0x6c/0x98
[   26.318420]  kfree+0x214/0x3c8
[   26.321458]  krealloc_uaf+0x12c/0x520
[   26.325104]  kunit_try_run_case+0x170/0x3f0
[   26.329270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.334739]  kthread+0x328/0x630
[   26.337951]  ret_from_fork+0x10/0x20
[   26.341510] 
[   26.342987] The buggy address belongs to the object at ffff000802fae600
[   26.342987]  which belongs to the cache kmalloc-256 of size 256
[   26.355487] The buggy address is located 0 bytes inside of
[   26.355487]  freed 256-byte region [ffff000802fae600, ffff000802fae700)
[   26.367551] 
[   26.369030] The buggy address belongs to the physical page:
[   26.374586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fac
[   26.382568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.390209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.397151] page_type: f5(slab)
[   26.400288] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.408009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.415737] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.423547] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.431359] head: 0bfffe0000000002 fffffdffe00beb01 00000000ffffffff 00000000ffffffff
[   26.439172] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.446977] page dumped because: kasan: bad access detected
[   26.452532] 
[   26.454008] Memory state around the buggy address:
[   26.458789]  ffff000802fae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465991]  ffff000802fae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.473196] >ffff000802fae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.480396]                    ^
[   26.483612]  ffff000802fae680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.490817]  ffff000802fae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.498018] ==================================================================
[   25.828773] ==================================================================
[   25.838571] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   25.845166] Read of size 1 at addr ffff000802fae600 by task kunit_try_catch/213
[   25.852455] 
[   25.853942] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   25.854000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.854016] Hardware name: WinLink E850-96 board (DT)
[   25.854038] Call trace:
[   25.854054]  show_stack+0x20/0x38 (C)
[   25.854089]  dump_stack_lvl+0x8c/0xd0
[   25.854126]  print_report+0x118/0x608
[   25.854159]  kasan_report+0xdc/0x128
[   25.854191]  __kasan_check_byte+0x54/0x70
[   25.854220]  krealloc_noprof+0x44/0x360
[   25.854252]  krealloc_uaf+0x180/0x520
[   25.854277]  kunit_try_run_case+0x170/0x3f0
[   25.854315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.854353]  kthread+0x328/0x630
[   25.854388]  ret_from_fork+0x10/0x20
[   25.854426] 
[   25.919296] Allocated by task 213:
[   25.922684]  kasan_save_stack+0x3c/0x68
[   25.926498]  kasan_save_track+0x20/0x40
[   25.930318]  kasan_save_alloc_info+0x40/0x58
[   25.934572]  __kasan_kmalloc+0xd4/0xd8
[   25.938304]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.942818]  krealloc_uaf+0xc8/0x520
[   25.946377]  kunit_try_run_case+0x170/0x3f0
[   25.950544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.956012]  kthread+0x328/0x630
[   25.959224]  ret_from_fork+0x10/0x20
[   25.962783] 
[   25.964260] Freed by task 213:
[   25.967296]  kasan_save_stack+0x3c/0x68
[   25.971116]  kasan_save_track+0x20/0x40
[   25.974937]  kasan_save_free_info+0x4c/0x78
[   25.979102]  __kasan_slab_free+0x6c/0x98
[   25.983008]  kfree+0x214/0x3c8
[   25.986046]  krealloc_uaf+0x12c/0x520
[   25.989692]  kunit_try_run_case+0x170/0x3f0
[   25.993859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.999327]  kthread+0x328/0x630
[   26.002539]  ret_from_fork+0x10/0x20
[   26.006098] 
[   26.007575] The buggy address belongs to the object at ffff000802fae600
[   26.007575]  which belongs to the cache kmalloc-256 of size 256
[   26.020077] The buggy address is located 0 bytes inside of
[   26.020077]  freed 256-byte region [ffff000802fae600, ffff000802fae700)
[   26.032139] 
[   26.033620] The buggy address belongs to the physical page:
[   26.039176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fac
[   26.047160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.054798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.061741] page_type: f5(slab)
[   26.064880] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.072597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.080323] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.088135] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.095948] head: 0bfffe0000000002 fffffdffe00beb01 00000000ffffffff 00000000ffffffff
[   26.103760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.111565] page dumped because: kasan: bad access detected
[   26.117122] 
[   26.118598] Memory state around the buggy address:
[   26.123377]  ffff000802fae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.130581]  ffff000802fae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.137786] >ffff000802fae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.144985]                    ^
[   26.148201]  ffff000802fae680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.155405]  ffff000802fae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.162606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   22.974400] ==================================================================
[   22.981410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.988956] Write of size 1 at addr ffff000803310ad0 by task kunit_try_catch/207
[   22.996334] 
[   22.997821] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.997877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.997892] Hardware name: WinLink E850-96 board (DT)
[   22.997912] Call trace:
[   22.997926]  show_stack+0x20/0x38 (C)
[   22.997958]  dump_stack_lvl+0x8c/0xd0
[   22.997997]  print_report+0x118/0x608
[   22.998028]  kasan_report+0xdc/0x128
[   22.998058]  __asan_report_store1_noabort+0x20/0x30
[   22.998094]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.998123]  krealloc_less_oob+0x20/0x38
[   22.998150]  kunit_try_run_case+0x170/0x3f0
[   22.998188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.998225]  kthread+0x328/0x630
[   22.998259]  ret_from_fork+0x10/0x20
[   22.998295] 
[   23.065170] Allocated by task 207:
[   23.068559]  kasan_save_stack+0x3c/0x68
[   23.072375]  kasan_save_track+0x20/0x40
[   23.076194]  kasan_save_alloc_info+0x40/0x58
[   23.080448]  __kasan_krealloc+0x118/0x178
[   23.084441]  krealloc_noprof+0x128/0x360
[   23.088347]  krealloc_less_oob_helper+0x168/0xc50
[   23.093034]  krealloc_less_oob+0x20/0x38
[   23.096940]  kunit_try_run_case+0x170/0x3f0
[   23.101108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.106576]  kthread+0x328/0x630
[   23.109788]  ret_from_fork+0x10/0x20
[   23.113346] 
[   23.114824] The buggy address belongs to the object at ffff000803310a00
[   23.114824]  which belongs to the cache kmalloc-256 of size 256
[   23.127324] The buggy address is located 7 bytes to the right of
[   23.127324]  allocated 201-byte region [ffff000803310a00, ffff000803310ac9)
[   23.140256] 
[   23.141733] The buggy address belongs to the physical page:
[   23.147292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   23.155274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.162912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.169856] page_type: f5(slab)
[   23.172995] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.180713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.188440] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.196251] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.204065] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   23.211876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.219682] page dumped because: kasan: bad access detected
[   23.225237] 
[   23.226712] Memory state around the buggy address:
[   23.231494]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.238696]  ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.245901] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.253103]                                                  ^
[   23.258921]  ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.266126]  ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.273327] ==================================================================
[   25.133653] ==================================================================
[   25.140749] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   25.148299] Write of size 1 at addr ffff0008033260da by task kunit_try_catch/211
[   25.155677] 
[   25.157161] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   25.157205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.157218] Hardware name: WinLink E850-96 board (DT)
[   25.157236] Call trace:
[   25.157249]  show_stack+0x20/0x38 (C)
[   25.157280]  dump_stack_lvl+0x8c/0xd0
[   25.157315]  print_report+0x118/0x608
[   25.157346]  kasan_report+0xdc/0x128
[   25.157373]  __asan_report_store1_noabort+0x20/0x30
[   25.157405]  krealloc_less_oob_helper+0xa80/0xc50
[   25.157433]  krealloc_large_less_oob+0x20/0x38
[   25.157461]  kunit_try_run_case+0x170/0x3f0
[   25.157497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.157535]  kthread+0x328/0x630
[   25.157569]  ret_from_fork+0x10/0x20
[   25.157603] 
[   25.225035] The buggy address belongs to the physical page:
[   25.230592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324
[   25.238575] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.246214] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.253158] page_type: f8(unknown)
[   25.256554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.264276] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.272002] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.279814] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.287627] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff
[   25.295438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.303244] page dumped because: kasan: bad access detected
[   25.308799] 
[   25.310275] Memory state around the buggy address:
[   25.315056]  ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.322258]  ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.329463] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.336664]                                                     ^
[   25.342744]  ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.349949]  ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.357150] ==================================================================
[   23.894760] ==================================================================
[   23.901620] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.909168] Write of size 1 at addr ffff000803310aeb by task kunit_try_catch/207
[   23.916546] 
[   23.918031] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.918080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.918097] Hardware name: WinLink E850-96 board (DT)
[   23.918115] Call trace:
[   23.918127]  show_stack+0x20/0x38 (C)
[   23.918160]  dump_stack_lvl+0x8c/0xd0
[   23.918197]  print_report+0x118/0x608
[   23.918226]  kasan_report+0xdc/0x128
[   23.918254]  __asan_report_store1_noabort+0x20/0x30
[   23.918287]  krealloc_less_oob_helper+0xa58/0xc50
[   23.918316]  krealloc_less_oob+0x20/0x38
[   23.918343]  kunit_try_run_case+0x170/0x3f0
[   23.918379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.918417]  kthread+0x328/0x630
[   23.918448]  ret_from_fork+0x10/0x20
[   23.918481] 
[   23.985382] Allocated by task 207:
[   23.988769]  kasan_save_stack+0x3c/0x68
[   23.992586]  kasan_save_track+0x20/0x40
[   23.996406]  kasan_save_alloc_info+0x40/0x58
[   24.000659]  __kasan_krealloc+0x118/0x178
[   24.004653]  krealloc_noprof+0x128/0x360
[   24.008559]  krealloc_less_oob_helper+0x168/0xc50
[   24.013246]  krealloc_less_oob+0x20/0x38
[   24.017153]  kunit_try_run_case+0x170/0x3f0
[   24.021321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.026788]  kthread+0x328/0x630
[   24.029999]  ret_from_fork+0x10/0x20
[   24.033558] 
[   24.035036] The buggy address belongs to the object at ffff000803310a00
[   24.035036]  which belongs to the cache kmalloc-256 of size 256
[   24.047537] The buggy address is located 34 bytes to the right of
[   24.047537]  allocated 201-byte region [ffff000803310a00, ffff000803310ac9)
[   24.060555] 
[   24.062033] The buggy address belongs to the physical page:
[   24.067590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   24.075573] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.083211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.090155] page_type: f5(slab)
[   24.093291] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.101012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.108739] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.116550] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.124363] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   24.132175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.139980] page dumped because: kasan: bad access detected
[   24.145535] 
[   24.147011] Memory state around the buggy address:
[   24.151793]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.158994]  ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.166199] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.173400]                                                           ^
[   24.180001]  ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.187206]  ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.194407] ==================================================================
[   25.364435] ==================================================================
[   25.371561] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   25.379111] Write of size 1 at addr ffff0008033260ea by task kunit_try_catch/211
[   25.386489] 
[   25.387974] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   25.388017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.388031] Hardware name: WinLink E850-96 board (DT)
[   25.388048] Call trace:
[   25.388057]  show_stack+0x20/0x38 (C)
[   25.388091]  dump_stack_lvl+0x8c/0xd0
[   25.388127]  print_report+0x118/0x608
[   25.388156]  kasan_report+0xdc/0x128
[   25.388186]  __asan_report_store1_noabort+0x20/0x30
[   25.388219]  krealloc_less_oob_helper+0xae4/0xc50
[   25.388248]  krealloc_large_less_oob+0x20/0x38
[   25.388278]  kunit_try_run_case+0x170/0x3f0
[   25.388312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.388350]  kthread+0x328/0x630
[   25.388383]  ret_from_fork+0x10/0x20
[   25.388415] 
[   25.455848] The buggy address belongs to the physical page:
[   25.461404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324
[   25.469388] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.477026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.483971] page_type: f8(unknown)
[   25.487367] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.495089] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.502814] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.510626] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.518441] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff
[   25.526251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.534057] page dumped because: kasan: bad access detected
[   25.539612] 
[   25.541088] Memory state around the buggy address:
[   25.545868]  ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.553071]  ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.560275] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.567476]                                                           ^
[   25.574077]  ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.581282]  ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.588483] ==================================================================
[   24.903303] ==================================================================
[   24.910200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   24.917747] Write of size 1 at addr ffff0008033260d0 by task kunit_try_catch/211
[   24.925125] 
[   24.926612] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   24.926663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.926679] Hardware name: WinLink E850-96 board (DT)
[   24.926697] Call trace:
[   24.926710]  show_stack+0x20/0x38 (C)
[   24.926743]  dump_stack_lvl+0x8c/0xd0
[   24.926782]  print_report+0x118/0x608
[   24.926812]  kasan_report+0xdc/0x128
[   24.926842]  __asan_report_store1_noabort+0x20/0x30
[   24.926877]  krealloc_less_oob_helper+0xb9c/0xc50
[   24.926906]  krealloc_large_less_oob+0x20/0x38
[   24.926934]  kunit_try_run_case+0x170/0x3f0
[   24.926972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.927010]  kthread+0x328/0x630
[   24.927044]  ret_from_fork+0x10/0x20
[   24.927079] 
[   24.994484] The buggy address belongs to the physical page:
[   25.000042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324
[   25.008023] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.015664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.022606] page_type: f8(unknown)
[   25.026003] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.033724] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.041450] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.049262] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.057075] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff
[   25.064886] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.072692] page dumped because: kasan: bad access detected
[   25.078247] 
[   25.079723] Memory state around the buggy address:
[   25.084503]  ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.091706]  ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.098911] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.106112]                                                  ^
[   25.111931]  ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.119136]  ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.126337] ==================================================================
[   23.587323] ==================================================================
[   23.594422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.601968] Write of size 1 at addr ffff000803310aea by task kunit_try_catch/207
[   23.609346] 
[   23.610831] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.610878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.610892] Hardware name: WinLink E850-96 board (DT)
[   23.610909] Call trace:
[   23.610920]  show_stack+0x20/0x38 (C)
[   23.610954]  dump_stack_lvl+0x8c/0xd0
[   23.610991]  print_report+0x118/0x608
[   23.611022]  kasan_report+0xdc/0x128
[   23.611050]  __asan_report_store1_noabort+0x20/0x30
[   23.611088]  krealloc_less_oob_helper+0xae4/0xc50
[   23.611116]  krealloc_less_oob+0x20/0x38
[   23.611144]  kunit_try_run_case+0x170/0x3f0
[   23.611182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.611219]  kthread+0x328/0x630
[   23.611254]  ret_from_fork+0x10/0x20
[   23.611289] 
[   23.678181] Allocated by task 207:
[   23.681569]  kasan_save_stack+0x3c/0x68
[   23.685386]  kasan_save_track+0x20/0x40
[   23.689206]  kasan_save_alloc_info+0x40/0x58
[   23.693459]  __kasan_krealloc+0x118/0x178
[   23.697452]  krealloc_noprof+0x128/0x360
[   23.701359]  krealloc_less_oob_helper+0x168/0xc50
[   23.706046]  krealloc_less_oob+0x20/0x38
[   23.709952]  kunit_try_run_case+0x170/0x3f0
[   23.714119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.719587]  kthread+0x328/0x630
[   23.722799]  ret_from_fork+0x10/0x20
[   23.726358] 
[   23.727835] The buggy address belongs to the object at ffff000803310a00
[   23.727835]  which belongs to the cache kmalloc-256 of size 256
[   23.740335] The buggy address is located 33 bytes to the right of
[   23.740335]  allocated 201-byte region [ffff000803310a00, ffff000803310ac9)
[   23.753354] 
[   23.754831] The buggy address belongs to the physical page:
[   23.760390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   23.768372] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.776010] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.782957] page_type: f5(slab)
[   23.786092] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.793812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.801543] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.809350] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.817163] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   23.824974] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.832780] page dumped because: kasan: bad access detected
[   23.838335] 
[   23.839811] Memory state around the buggy address:
[   23.844591]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.851794]  ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.858999] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.866200]                                                           ^
[   23.872801]  ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.880005]  ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.887206] ==================================================================
[   22.666013] ==================================================================
[   22.675336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.682887] Write of size 1 at addr ffff000803310ac9 by task kunit_try_catch/207
[   22.690262] 
[   22.691749] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.691802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.691819] Hardware name: WinLink E850-96 board (DT)
[   22.691840] Call trace:
[   22.691855]  show_stack+0x20/0x38 (C)
[   22.691889]  dump_stack_lvl+0x8c/0xd0
[   22.691927]  print_report+0x118/0x608
[   22.691961]  kasan_report+0xdc/0x128
[   22.691990]  __asan_report_store1_noabort+0x20/0x30
[   22.692028]  krealloc_less_oob_helper+0xa48/0xc50
[   22.692057]  krealloc_less_oob+0x20/0x38
[   22.692086]  kunit_try_run_case+0x170/0x3f0
[   22.692124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.692161]  kthread+0x328/0x630
[   22.692197]  ret_from_fork+0x10/0x20
[   22.692234] 
[   22.759098] Allocated by task 207:
[   22.762487]  kasan_save_stack+0x3c/0x68
[   22.766304]  kasan_save_track+0x20/0x40
[   22.770122]  kasan_save_alloc_info+0x40/0x58
[   22.774376]  __kasan_krealloc+0x118/0x178
[   22.778369]  krealloc_noprof+0x128/0x360
[   22.782275]  krealloc_less_oob_helper+0x168/0xc50
[   22.786963]  krealloc_less_oob+0x20/0x38
[   22.790869]  kunit_try_run_case+0x170/0x3f0
[   22.795037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.800504]  kthread+0x328/0x630
[   22.803716]  ret_from_fork+0x10/0x20
[   22.807275] 
[   22.808754] The buggy address belongs to the object at ffff000803310a00
[   22.808754]  which belongs to the cache kmalloc-256 of size 256
[   22.821253] The buggy address is located 0 bytes to the right of
[   22.821253]  allocated 201-byte region [ffff000803310a00, ffff000803310ac9)
[   22.834184] 
[   22.835664] The buggy address belongs to the physical page:
[   22.841220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   22.849205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.856842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.863786] page_type: f5(slab)
[   22.866925] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.874642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.882368] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.890180] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.897992] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   22.905804] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.913610] page dumped because: kasan: bad access detected
[   22.919167] 
[   22.920641] Memory state around the buggy address:
[   22.925420]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.932624]  ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.939829] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.947030]                                               ^
[   22.952589]  ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.959793]  ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.966996] ==================================================================
[   25.595796] ==================================================================
[   25.602895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   25.610445] Write of size 1 at addr ffff0008033260eb by task kunit_try_catch/211
[   25.617823] 
[   25.619308] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   25.619356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.619371] Hardware name: WinLink E850-96 board (DT)
[   25.619387] Call trace:
[   25.619400]  show_stack+0x20/0x38 (C)
[   25.619435]  dump_stack_lvl+0x8c/0xd0
[   25.619470]  print_report+0x118/0x608
[   25.619500]  kasan_report+0xdc/0x128
[   25.619530]  __asan_report_store1_noabort+0x20/0x30
[   25.619563]  krealloc_less_oob_helper+0xa58/0xc50
[   25.619593]  krealloc_large_less_oob+0x20/0x38
[   25.619622]  kunit_try_run_case+0x170/0x3f0
[   25.619660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.619698]  kthread+0x328/0x630
[   25.619730]  ret_from_fork+0x10/0x20
[   25.619762] 
[   25.687181] The buggy address belongs to the physical page:
[   25.692739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324
[   25.700721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.708360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.715305] page_type: f8(unknown)
[   25.718703] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.726423] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.734149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   25.741959] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.749773] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff
[   25.757584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.765390] page dumped because: kasan: bad access detected
[   25.770945] 
[   25.772421] Memory state around the buggy address:
[   25.777203]  ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.784404]  ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.791609] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.798810]                                                           ^
[   25.805411]  ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.812615]  ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.819816] ==================================================================
[   23.280653] ==================================================================
[   23.287740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.295288] Write of size 1 at addr ffff000803310ada by task kunit_try_catch/207
[   23.302667] 
[   23.304151] CPU: 7 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.304198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.304212] Hardware name: WinLink E850-96 board (DT)
[   23.304228] Call trace:
[   23.304242]  show_stack+0x20/0x38 (C)
[   23.304278]  dump_stack_lvl+0x8c/0xd0
[   23.304315]  print_report+0x118/0x608
[   23.304343]  kasan_report+0xdc/0x128
[   23.304371]  __asan_report_store1_noabort+0x20/0x30
[   23.304403]  krealloc_less_oob_helper+0xa80/0xc50
[   23.304432]  krealloc_less_oob+0x20/0x38
[   23.304459]  kunit_try_run_case+0x170/0x3f0
[   23.304495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.304535]  kthread+0x328/0x630
[   23.304569]  ret_from_fork+0x10/0x20
[   23.304600] 
[   23.371502] Allocated by task 207:
[   23.374890]  kasan_save_stack+0x3c/0x68
[   23.378707]  kasan_save_track+0x20/0x40
[   23.382526]  kasan_save_alloc_info+0x40/0x58
[   23.386780]  __kasan_krealloc+0x118/0x178
[   23.390773]  krealloc_noprof+0x128/0x360
[   23.394679]  krealloc_less_oob_helper+0x168/0xc50
[   23.399367]  krealloc_less_oob+0x20/0x38
[   23.403273]  kunit_try_run_case+0x170/0x3f0
[   23.407439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.412908]  kthread+0x328/0x630
[   23.416120]  ret_from_fork+0x10/0x20
[   23.419679] 
[   23.421156] The buggy address belongs to the object at ffff000803310a00
[   23.421156]  which belongs to the cache kmalloc-256 of size 256
[   23.433654] The buggy address is located 17 bytes to the right of
[   23.433654]  allocated 201-byte region [ffff000803310a00, ffff000803310ac9)
[   23.446675] 
[   23.448152] The buggy address belongs to the physical page:
[   23.453710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   23.461692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.469331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.476275] page_type: f5(slab)
[   23.479410] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.487132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.494859] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.502670] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.510484] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   23.518295] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.526101] page dumped because: kasan: bad access detected
[   23.531656] 
[   23.533132] Memory state around the buggy address:
[   23.537913]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.545115]  ffff000803310a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.552319] >ffff000803310a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.559520]                                                     ^
[   23.565600]  ffff000803310b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.572805]  ffff000803310b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.580006] ==================================================================
[   24.670060] ==================================================================
[   24.679908] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   24.687456] Write of size 1 at addr ffff0008033260c9 by task kunit_try_catch/211
[   24.694834] 
[   24.696319] CPU: 7 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   24.696376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.696392] Hardware name: WinLink E850-96 board (DT)
[   24.696412] Call trace:
[   24.696426]  show_stack+0x20/0x38 (C)
[   24.696459]  dump_stack_lvl+0x8c/0xd0
[   24.696501]  print_report+0x118/0x608
[   24.696535]  kasan_report+0xdc/0x128
[   24.696565]  __asan_report_store1_noabort+0x20/0x30
[   24.696603]  krealloc_less_oob_helper+0xa48/0xc50
[   24.696633]  krealloc_large_less_oob+0x20/0x38
[   24.696661]  kunit_try_run_case+0x170/0x3f0
[   24.696699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.696737]  kthread+0x328/0x630
[   24.696773]  ret_from_fork+0x10/0x20
[   24.696807] 
[   24.764194] The buggy address belongs to the physical page:
[   24.769752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883324
[   24.777734] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.785372] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.792316] page_type: f8(unknown)
[   24.795711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.803432] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.811159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.818970] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.826783] head: 0bfffe0000000002 fffffdffe00cc901 00000000ffffffff 00000000ffffffff
[   24.834595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.842400] page dumped because: kasan: bad access detected
[   24.847956] 
[   24.849434] Memory state around the buggy address:
[   24.854211]  ffff000803325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.861414]  ffff000803326000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.868620] >ffff000803326080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.875820]                                               ^
[   24.881379]  ffff000803326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.888584]  ffff000803326180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.895785] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   24.437044] ==================================================================
[   24.443972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   24.451523] Write of size 1 at addr ffff0008031520f0 by task kunit_try_catch/209
[   24.458899] 
[   24.460385] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   24.460438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.460453] Hardware name: WinLink E850-96 board (DT)
[   24.460476] Call trace:
[   24.460489]  show_stack+0x20/0x38 (C)
[   24.460525]  dump_stack_lvl+0x8c/0xd0
[   24.460562]  print_report+0x118/0x608
[   24.460596]  kasan_report+0xdc/0x128
[   24.460626]  __asan_report_store1_noabort+0x20/0x30
[   24.460661]  krealloc_more_oob_helper+0x5c0/0x678
[   24.460690]  krealloc_large_more_oob+0x20/0x38
[   24.460720]  kunit_try_run_case+0x170/0x3f0
[   24.460757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.460797]  kthread+0x328/0x630
[   24.460832]  ret_from_fork+0x10/0x20
[   24.460868] 
[   24.528258] The buggy address belongs to the physical page:
[   24.533816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150
[   24.541799] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.549438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.556381] page_type: f8(unknown)
[   24.559778] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.567498] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.575224] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.583036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.590849] head: 0bfffe0000000002 fffffdffe00c5401 00000000ffffffff 00000000ffffffff
[   24.598661] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.606466] page dumped because: kasan: bad access detected
[   24.612022] 
[   24.613497] Memory state around the buggy address:
[   24.618276]  ffff000803151f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.625480]  ffff000803152000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.632685] >ffff000803152080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.639886]                                                              ^
[   24.646747]  ffff000803152100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.653952]  ffff000803152180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.661153] ==================================================================
[   24.203342] ==================================================================
[   24.212639] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   24.220189] Write of size 1 at addr ffff0008031520eb by task kunit_try_catch/209
[   24.227567] 
[   24.229055] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   24.229109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.229126] Hardware name: WinLink E850-96 board (DT)
[   24.229147] Call trace:
[   24.229161]  show_stack+0x20/0x38 (C)
[   24.229197]  dump_stack_lvl+0x8c/0xd0
[   24.229233]  print_report+0x118/0x608
[   24.229265]  kasan_report+0xdc/0x128
[   24.229296]  __asan_report_store1_noabort+0x20/0x30
[   24.229334]  krealloc_more_oob_helper+0x60c/0x678
[   24.229362]  krealloc_large_more_oob+0x20/0x38
[   24.229389]  kunit_try_run_case+0x170/0x3f0
[   24.229429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.229467]  kthread+0x328/0x630
[   24.229503]  ret_from_fork+0x10/0x20
[   24.229539] 
[   24.296924] The buggy address belongs to the physical page:
[   24.302482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150
[   24.310466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.318105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.325049] page_type: f8(unknown)
[   24.328448] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.336165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.343891] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   24.351703] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   24.359515] head: 0bfffe0000000002 fffffdffe00c5401 00000000ffffffff 00000000ffffffff
[   24.367327] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.375133] page dumped because: kasan: bad access detected
[   24.380688] 
[   24.382165] Memory state around the buggy address:
[   24.386947]  ffff000803151f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.394149]  ffff000803152000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.401353] >ffff000803152080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.408552]                                                           ^
[   24.415154]  ffff000803152100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.422358]  ffff000803152180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.429559] ==================================================================
[   22.357271] ==================================================================
[   22.364143] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.371691] Write of size 1 at addr ffff0008033108f0 by task kunit_try_catch/205
[   22.379069] 
[   22.380555] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.380605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.380620] Hardware name: WinLink E850-96 board (DT)
[   22.380638] Call trace:
[   22.380650]  show_stack+0x20/0x38 (C)
[   22.380681]  dump_stack_lvl+0x8c/0xd0
[   22.380720]  print_report+0x118/0x608
[   22.380752]  kasan_report+0xdc/0x128
[   22.380781]  __asan_report_store1_noabort+0x20/0x30
[   22.380820]  krealloc_more_oob_helper+0x5c0/0x678
[   22.380849]  krealloc_more_oob+0x20/0x38
[   22.380875]  kunit_try_run_case+0x170/0x3f0
[   22.380911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.380947]  kthread+0x328/0x630
[   22.380980]  ret_from_fork+0x10/0x20
[   22.381015] 
[   22.447905] Allocated by task 205:
[   22.451293]  kasan_save_stack+0x3c/0x68
[   22.455110]  kasan_save_track+0x20/0x40
[   22.458929]  kasan_save_alloc_info+0x40/0x58
[   22.463183]  __kasan_krealloc+0x118/0x178
[   22.467176]  krealloc_noprof+0x128/0x360
[   22.471082]  krealloc_more_oob_helper+0x168/0x678
[   22.475769]  krealloc_more_oob+0x20/0x38
[   22.479675]  kunit_try_run_case+0x170/0x3f0
[   22.483842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.489311]  kthread+0x328/0x630
[   22.492523]  ret_from_fork+0x10/0x20
[   22.496082] 
[   22.497558] The buggy address belongs to the object at ffff000803310800
[   22.497558]  which belongs to the cache kmalloc-256 of size 256
[   22.510059] The buggy address is located 5 bytes to the right of
[   22.510059]  allocated 235-byte region [ffff000803310800, ffff0008033108eb)
[   22.522990] 
[   22.524468] The buggy address belongs to the physical page:
[   22.530027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   22.538008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.545648] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.552594] page_type: f5(slab)
[   22.555729] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.563448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.571175] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.578986] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.586799] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   22.594611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.602416] page dumped because: kasan: bad access detected
[   22.607972] 
[   22.609449] Memory state around the buggy address:
[   22.614229]  ffff000803310780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.621432]  ffff000803310800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.628635] >ffff000803310880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.635836]                                                              ^
[   22.642698]  ffff000803310900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.649902]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.657104] ==================================================================
[   22.048015] ==================================================================
[   22.057029] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.064580] Write of size 1 at addr ffff0008033108eb by task kunit_try_catch/205
[   22.071956] 
[   22.073442] CPU: 7 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.073497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.073515] Hardware name: WinLink E850-96 board (DT)
[   22.073536] Call trace:
[   22.073549]  show_stack+0x20/0x38 (C)
[   22.073585]  dump_stack_lvl+0x8c/0xd0
[   22.073623]  print_report+0x118/0x608
[   22.073658]  kasan_report+0xdc/0x128
[   22.073688]  __asan_report_store1_noabort+0x20/0x30
[   22.073725]  krealloc_more_oob_helper+0x60c/0x678
[   22.073756]  krealloc_more_oob+0x20/0x38
[   22.073782]  kunit_try_run_case+0x170/0x3f0
[   22.073818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.073859]  kthread+0x328/0x630
[   22.073893]  ret_from_fork+0x10/0x20
[   22.073928] 
[   22.140793] Allocated by task 205:
[   22.144180]  kasan_save_stack+0x3c/0x68
[   22.147996]  kasan_save_track+0x20/0x40
[   22.151816]  kasan_save_alloc_info+0x40/0x58
[   22.156069]  __kasan_krealloc+0x118/0x178
[   22.160062]  krealloc_noprof+0x128/0x360
[   22.163968]  krealloc_more_oob_helper+0x168/0x678
[   22.168656]  krealloc_more_oob+0x20/0x38
[   22.172562]  kunit_try_run_case+0x170/0x3f0
[   22.176729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.182197]  kthread+0x328/0x630
[   22.185409]  ret_from_fork+0x10/0x20
[   22.188968] 
[   22.190445] The buggy address belongs to the object at ffff000803310800
[   22.190445]  which belongs to the cache kmalloc-256 of size 256
[   22.202945] The buggy address is located 0 bytes to the right of
[   22.202945]  allocated 235-byte region [ffff000803310800, ffff0008033108eb)
[   22.215877] 
[   22.217357] The buggy address belongs to the physical page:
[   22.222913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883310
[   22.230896] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.238537] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.245479] page_type: f5(slab)
[   22.248618] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.256335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.264061] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.271873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.279686] head: 0bfffe0000000002 fffffdffe00cc401 00000000ffffffff 00000000ffffffff
[   22.287498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.295303] page dumped because: kasan: bad access detected
[   22.300860] 
[   22.302336] Memory state around the buggy address:
[   22.307115]  ffff000803310780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.314319]  ffff000803310800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.321523] >ffff000803310880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.328723]                                                           ^
[   22.335324]  ffff000803310900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.342529]  ffff000803310980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.349731] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   21.857317] ==================================================================
[   21.871702] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   21.878037] Read of size 1 at addr ffff000806430000 by task kunit_try_catch/203
[   21.885327] 
[   21.886815] CPU: 4 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.886869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.886887] Hardware name: WinLink E850-96 board (DT)
[   21.886907] Call trace:
[   21.886920]  show_stack+0x20/0x38 (C)
[   21.886955]  dump_stack_lvl+0x8c/0xd0
[   21.886993]  print_report+0x118/0x608
[   21.887026]  kasan_report+0xdc/0x128
[   21.887059]  __asan_report_load1_noabort+0x20/0x30
[   21.887098]  page_alloc_uaf+0x328/0x350
[   21.887126]  kunit_try_run_case+0x170/0x3f0
[   21.887166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.887204]  kthread+0x328/0x630
[   21.887240]  ret_from_fork+0x10/0x20
[   21.887277] 
[   21.949305] The buggy address belongs to the physical page:
[   21.954862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886430
[   21.962845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.969355] page_type: f0(buddy)
[   21.972581] raw: 0bfffe0000000000 ffff00087f61bbe0 ffff00087f61bbe0 0000000000000000
[   21.980297] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   21.988019] page dumped because: kasan: bad access detected
[   21.993571] 
[   21.995049] Memory state around the buggy address:
[   21.999830]  ffff00080642ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.007031]  ffff00080642ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.014236] >ffff000806430000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.021436]                    ^
[   22.024651]  ffff000806430080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.031856]  ffff000806430100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.039058] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   21.622309] ==================================================================
[   21.631432] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   21.636808] Free of addr ffff000803320001 by task kunit_try_catch/199
[   21.643230] 
[   21.644717] CPU: 7 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.644770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.644789] Hardware name: WinLink E850-96 board (DT)
[   21.644811] Call trace:
[   21.644825]  show_stack+0x20/0x38 (C)
[   21.644862]  dump_stack_lvl+0x8c/0xd0
[   21.644902]  print_report+0x118/0x608
[   21.644935]  kasan_report_invalid_free+0xc0/0xe8
[   21.644966]  __kasan_kfree_large+0x5c/0xa8
[   21.644998]  free_large_kmalloc+0x64/0x190
[   21.645038]  kfree+0x270/0x3c8
[   21.645062]  kmalloc_large_invalid_free+0x108/0x270
[   21.645100]  kunit_try_run_case+0x170/0x3f0
[   21.645137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.645173]  kthread+0x328/0x630
[   21.645208]  ret_from_fork+0x10/0x20
[   21.645242] 
[   21.715715] The buggy address belongs to the physical page:
[   21.721271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883320
[   21.729256] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.736893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.743837] page_type: f8(unknown)
[   21.747236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.754953] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.762683] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.770491] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.778304] head: 0bfffe0000000002 fffffdffe00cc801 00000000ffffffff 00000000ffffffff
[   21.786116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.793922] page dumped because: kasan: bad access detected
[   21.799479] 
[   21.800954] Memory state around the buggy address:
[   21.805733]  ffff00080331ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.812935]  ffff00080331ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.820142] >ffff000803320000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.827341]                    ^
[   21.830557]  ffff000803320080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.837762]  ffff000803320100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.844964] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   21.438786] ==================================================================
[   21.448619] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   21.455212] Read of size 1 at addr ffff000803150000 by task kunit_try_catch/197
[   21.462505] 
[   21.463991] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.464046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.464062] Hardware name: WinLink E850-96 board (DT)
[   21.464083] Call trace:
[   21.464097]  show_stack+0x20/0x38 (C)
[   21.464135]  dump_stack_lvl+0x8c/0xd0
[   21.464173]  print_report+0x118/0x608
[   21.464204]  kasan_report+0xdc/0x128
[   21.464232]  __asan_report_load1_noabort+0x20/0x30
[   21.464270]  kmalloc_large_uaf+0x2cc/0x2f8
[   21.464302]  kunit_try_run_case+0x170/0x3f0
[   21.464339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.464376]  kthread+0x328/0x630
[   21.464411]  ret_from_fork+0x10/0x20
[   21.464445] 
[   21.526741] The buggy address belongs to the physical page:
[   21.532299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883150
[   21.540282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.546806] raw: 0bfffe0000000000 fffffdffe00c5508 ffff00085af4d0c0 0000000000000000
[   21.554522] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.562241] page dumped because: kasan: bad access detected
[   21.567797] 
[   21.569274] Memory state around the buggy address:
[   21.574055]  ffff00080314ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.581255]  ffff00080314ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.588461] >ffff000803150000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.595661]                    ^
[   21.598877]  ffff000803150080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.606081]  ffff000803150100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.613282] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   20.910416] ==================================================================
[   20.921201] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   20.928484] Write of size 1 at addr ffff0008031d9f00 by task kunit_try_catch/193
[   20.935862] 
[   20.937350] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.937405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.937421] Hardware name: WinLink E850-96 board (DT)
[   20.937441] Call trace:
[   20.937454]  show_stack+0x20/0x38 (C)
[   20.937489]  dump_stack_lvl+0x8c/0xd0
[   20.937531]  print_report+0x118/0x608
[   20.937567]  kasan_report+0xdc/0x128
[   20.937596]  __asan_report_store1_noabort+0x20/0x30
[   20.937633]  kmalloc_big_oob_right+0x2a4/0x2f0
[   20.937670]  kunit_try_run_case+0x170/0x3f0
[   20.937709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.937747]  kthread+0x328/0x630
[   20.937783]  ret_from_fork+0x10/0x20
[   20.937819] 
[   21.000531] Allocated by task 193:
[   21.003920]  kasan_save_stack+0x3c/0x68
[   21.007736]  kasan_save_track+0x20/0x40
[   21.011555]  kasan_save_alloc_info+0x40/0x58
[   21.015809]  __kasan_kmalloc+0xd4/0xd8
[   21.019541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.024055]  kmalloc_big_oob_right+0xb8/0x2f0
[   21.028395]  kunit_try_run_case+0x170/0x3f0
[   21.032561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.038030]  kthread+0x328/0x630
[   21.041242]  ret_from_fork+0x10/0x20
[   21.044801] 
[   21.046280] The buggy address belongs to the object at ffff0008031d8000
[   21.046280]  which belongs to the cache kmalloc-8k of size 8192
[   21.058779] The buggy address is located 0 bytes to the right of
[   21.058779]  allocated 7936-byte region [ffff0008031d8000, ffff0008031d9f00)
[   21.071797] 
[   21.073278] The buggy address belongs to the physical page:
[   21.078833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831d8
[   21.086818] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.094455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.101399] page_type: f5(slab)
[   21.104538] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.112255] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.119983] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   21.127793] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.135605] head: 0bfffe0000000003 fffffdffe00c7601 00000000ffffffff 00000000ffffffff
[   21.143417] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   21.151223] page dumped because: kasan: bad access detected
[   21.156778] 
[   21.158254] Memory state around the buggy address:
[   21.163036]  ffff0008031d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.170238]  ffff0008031d9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.177443] >ffff0008031d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.184643]                    ^
[   21.187858]  ffff0008031d9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195063]  ffff0008031da000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.202264] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   20.444211] ==================================================================
[   20.453842] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.461911] Write of size 1 at addr ffff000801ed6278 by task kunit_try_catch/191
[   20.469289] 
[   20.470775] CPU: 7 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.470829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.470846] Hardware name: WinLink E850-96 board (DT)
[   20.470866] Call trace:
[   20.470879]  show_stack+0x20/0x38 (C)
[   20.470915]  dump_stack_lvl+0x8c/0xd0
[   20.470953]  print_report+0x118/0x608
[   20.470985]  kasan_report+0xdc/0x128
[   20.471016]  __asan_report_store1_noabort+0x20/0x30
[   20.471053]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.471085]  kunit_try_run_case+0x170/0x3f0
[   20.471123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.471160]  kthread+0x328/0x630
[   20.471196]  ret_from_fork+0x10/0x20
[   20.471231] 
[   20.534741] Allocated by task 191:
[   20.538127]  kasan_save_stack+0x3c/0x68
[   20.541944]  kasan_save_track+0x20/0x40
[   20.545764]  kasan_save_alloc_info+0x40/0x58
[   20.550017]  __kasan_kmalloc+0xd4/0xd8
[   20.553750]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   20.559305]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.564426]  kunit_try_run_case+0x170/0x3f0
[   20.568593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574062]  kthread+0x328/0x630
[   20.577273]  ret_from_fork+0x10/0x20
[   20.580833] 
[   20.582309] The buggy address belongs to the object at ffff000801ed6200
[   20.582309]  which belongs to the cache kmalloc-128 of size 128
[   20.594811] The buggy address is located 0 bytes to the right of
[   20.594811]  allocated 120-byte region [ffff000801ed6200, ffff000801ed6278)
[   20.607742] 
[   20.609222] The buggy address belongs to the physical page:
[   20.614777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ed6
[   20.622762] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.630400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.637343] page_type: f5(slab)
[   20.640482] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.648199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.655927] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.663737] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.671550] head: 0bfffe0000000001 fffffdffe007b581 00000000ffffffff 00000000ffffffff
[   20.679362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.687167] page dumped because: kasan: bad access detected
[   20.692723] 
[   20.694198] Memory state around the buggy address:
[   20.698979]  ffff000801ed6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.706182]  ffff000801ed6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.713387] >ffff000801ed6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.720587]                                                                 ^
[   20.727709]  ffff000801ed6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.734914]  ffff000801ed6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.742116] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   20.144490] ==================================================================
[   20.153679] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   20.161049] Read of size 1 at addr ffff0008031b3000 by task kunit_try_catch/189
[   20.168340] 
[   20.169826] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.169880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.169896] Hardware name: WinLink E850-96 board (DT)
[   20.169918] Call trace:
[   20.169932]  show_stack+0x20/0x38 (C)
[   20.169966]  dump_stack_lvl+0x8c/0xd0
[   20.170003]  print_report+0x118/0x608
[   20.170035]  kasan_report+0xdc/0x128
[   20.170065]  __asan_report_load1_noabort+0x20/0x30
[   20.170100]  kmalloc_node_oob_right+0x2f4/0x330
[   20.170131]  kunit_try_run_case+0x170/0x3f0
[   20.170169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.170207]  kthread+0x328/0x630
[   20.170240]  ret_from_fork+0x10/0x20
[   20.170276] 
[   20.233009] Allocated by task 189:
[   20.236397]  kasan_save_stack+0x3c/0x68
[   20.240212]  kasan_save_track+0x20/0x40
[   20.244032]  kasan_save_alloc_info+0x40/0x58
[   20.248285]  __kasan_kmalloc+0xd4/0xd8
[   20.252018]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   20.256965]  kmalloc_node_oob_right+0xbc/0x330
[   20.261393]  kunit_try_run_case+0x170/0x3f0
[   20.265559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.271028]  kthread+0x328/0x630
[   20.274239]  ret_from_fork+0x10/0x20
[   20.277799] 
[   20.279276] The buggy address belongs to the object at ffff0008031b2000
[   20.279276]  which belongs to the cache kmalloc-4k of size 4096
[   20.291776] The buggy address is located 0 bytes to the right of
[   20.291776]  allocated 4096-byte region [ffff0008031b2000, ffff0008031b3000)
[   20.304794] 
[   20.306275] The buggy address belongs to the physical page:
[   20.311831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8831b0
[   20.319816] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.327453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.334396] page_type: f5(slab)
[   20.337535] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.345252] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.352979] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   20.360790] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   20.368603] head: 0bfffe0000000003 fffffdffe00c6c01 00000000ffffffff 00000000ffffffff
[   20.376415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.384220] page dumped because: kasan: bad access detected
[   20.389777] 
[   20.391253] Memory state around the buggy address:
[   20.396031]  ffff0008031b2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.403235]  ffff0008031b2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.410441] >ffff0008031b3000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.417640]                    ^
[   20.420856]  ffff0008031b3080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.428061]  ffff0008031b3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.435263] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   19.877356] ==================================================================
[   19.886405] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   19.893257] Read of size 1 at addr ffff000800d6203f by task kunit_try_catch/187
[   19.900547] 
[   19.902038] CPU: 7 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.902096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.902112] Hardware name: WinLink E850-96 board (DT)
[   19.902134] Call trace:
[   19.902147]  show_stack+0x20/0x38 (C)
[   19.902183]  dump_stack_lvl+0x8c/0xd0
[   19.902221]  print_report+0x118/0x608
[   19.902251]  kasan_report+0xdc/0x128
[   19.902284]  __asan_report_load1_noabort+0x20/0x30
[   19.902322]  kmalloc_oob_left+0x2ec/0x320
[   19.902354]  kunit_try_run_case+0x170/0x3f0
[   19.902390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.902431]  kthread+0x328/0x630
[   19.902468]  ret_from_fork+0x10/0x20
[   19.902503] 
[   19.964696] Allocated by task 55:
[   19.967999]  kasan_save_stack+0x3c/0x68
[   19.971814]  kasan_save_track+0x20/0x40
[   19.975633]  kasan_save_alloc_info+0x40/0x58
[   19.979886]  __kasan_kmalloc+0xd4/0xd8
[   19.983619]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   19.989175]  kvasprintf+0xe0/0x180
[   19.992560]  __kthread_create_on_node+0x16c/0x350
[   19.997247]  kthread_create_on_node+0xe4/0x130
[   20.001676]  create_worker+0x380/0x6b8
[   20.005407]  worker_thread+0x808/0xf38
[   20.009140]  kthread+0x328/0x630
[   20.012351]  ret_from_fork+0x10/0x20
[   20.015910] 
[   20.017387] The buggy address belongs to the object at ffff000800d62020
[   20.017387]  which belongs to the cache kmalloc-16 of size 16
[   20.029714] The buggy address is located 18 bytes to the right of
[   20.029714]  allocated 13-byte region [ffff000800d62020, ffff000800d6202d)
[   20.042646] 
[   20.044126] The buggy address belongs to the physical page:
[   20.049681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62
[   20.057667] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.064175] page_type: f5(slab)
[   20.067314] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   20.075031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.082749] page dumped because: kasan: bad access detected
[   20.088306] 
[   20.089782] Memory state around the buggy address:
[   20.094563]  ffff000800d61f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.101763]  ffff000800d61f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.108969] >ffff000800d62000: 00 04 fc fc 00 05 fc fc 00 07 fc fc fc fc fc fc
[   20.116169]                                         ^
[   20.121209]  ffff000800d62080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.128412]  ffff000800d62100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.135615] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   19.283004] ==================================================================
[   19.290143] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   19.297085] Write of size 1 at addr ffff000801b46178 by task kunit_try_catch/185
[   19.304462] 
[   19.305947] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.305999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.306013] Hardware name: WinLink E850-96 board (DT)
[   19.306032] Call trace:
[   19.306042]  show_stack+0x20/0x38 (C)
[   19.306077]  dump_stack_lvl+0x8c/0xd0
[   19.306112]  print_report+0x118/0x608
[   19.306141]  kasan_report+0xdc/0x128
[   19.306168]  __asan_report_store1_noabort+0x20/0x30
[   19.306200]  kmalloc_oob_right+0x538/0x660
[   19.306232]  kunit_try_run_case+0x170/0x3f0
[   19.306268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.306305]  kthread+0x328/0x630
[   19.306339]  ret_from_fork+0x10/0x20
[   19.306374] 
[   19.368784] Allocated by task 185:
[   19.372171]  kasan_save_stack+0x3c/0x68
[   19.375989]  kasan_save_track+0x20/0x40
[   19.379809]  kasan_save_alloc_info+0x40/0x58
[   19.384062]  __kasan_kmalloc+0xd4/0xd8
[   19.387795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.392309]  kmalloc_oob_right+0xb0/0x660
[   19.396302]  kunit_try_run_case+0x170/0x3f0
[   19.400468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405937]  kthread+0x328/0x630
[   19.409149]  ret_from_fork+0x10/0x20
[   19.412708] 
[   19.414183] The buggy address belongs to the object at ffff000801b46100
[   19.414183]  which belongs to the cache kmalloc-128 of size 128
[   19.426685] The buggy address is located 5 bytes to the right of
[   19.426685]  allocated 115-byte region [ffff000801b46100, ffff000801b46173)
[   19.439617] 
[   19.441093] The buggy address belongs to the physical page:
[   19.446652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46
[   19.454636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.462273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.469219] page_type: f5(slab)
[   19.472352] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.480075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.487801] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.495613] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.503426] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff
[   19.511237] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.519043] page dumped because: kasan: bad access detected
[   19.524598] 
[   19.526074] Memory state around the buggy address:
[   19.530853]  ffff000801b46000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.538057]  ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.545261] >ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.552462]                                                                 ^
[   19.559584]  ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.566790]  ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.573990] ==================================================================
[   19.581362] ==================================================================
[   19.588402] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   19.595344] Read of size 1 at addr ffff000801b46180 by task kunit_try_catch/185
[   19.602636] 
[   19.604119] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.604164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.604178] Hardware name: WinLink E850-96 board (DT)
[   19.604196] Call trace:
[   19.604210]  show_stack+0x20/0x38 (C)
[   19.604245]  dump_stack_lvl+0x8c/0xd0
[   19.604280]  print_report+0x118/0x608
[   19.604308]  kasan_report+0xdc/0x128
[   19.604339]  __asan_report_load1_noabort+0x20/0x30
[   19.604373]  kmalloc_oob_right+0x5d0/0x660
[   19.604406]  kunit_try_run_case+0x170/0x3f0
[   19.604441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.604477]  kthread+0x328/0x630
[   19.604509]  ret_from_fork+0x10/0x20
[   19.604541] 
[   19.666870] Allocated by task 185:
[   19.670256]  kasan_save_stack+0x3c/0x68
[   19.674075]  kasan_save_track+0x20/0x40
[   19.677896]  kasan_save_alloc_info+0x40/0x58
[   19.682148]  __kasan_kmalloc+0xd4/0xd8
[   19.685880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.690395]  kmalloc_oob_right+0xb0/0x660
[   19.694387]  kunit_try_run_case+0x170/0x3f0
[   19.698554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.704023]  kthread+0x328/0x630
[   19.707234]  ret_from_fork+0x10/0x20
[   19.710794] 
[   19.712269] The buggy address belongs to the object at ffff000801b46100
[   19.712269]  which belongs to the cache kmalloc-128 of size 128
[   19.724769] The buggy address is located 13 bytes to the right of
[   19.724769]  allocated 115-byte region [ffff000801b46100, ffff000801b46173)
[   19.737789] 
[   19.739265] The buggy address belongs to the physical page:
[   19.744823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46
[   19.752807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.760446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.767390] page_type: f5(slab)
[   19.770525] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.778247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.785974] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.793785] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.801598] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff
[   19.809410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.817216] page dumped because: kasan: bad access detected
[   19.822771] 
[   19.824246] Memory state around the buggy address:
[   19.829025]  ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.836229]  ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.843434] >ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.850635]                    ^
[   19.853850]  ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861055]  ffff000801b46280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.868257] ==================================================================
[   18.981515] ==================================================================
[   18.988067] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   18.995010] Write of size 1 at addr ffff000801b46173 by task kunit_try_catch/185
[   19.002384] 
[   19.003871] CPU: 4 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc3 #1 PREEMPT 
[   19.003921] Tainted: [N]=TEST
[   19.003935] Hardware name: WinLink E850-96 board (DT)
[   19.003957] Call trace:
[   19.003970]  show_stack+0x20/0x38 (C)
[   19.004006]  dump_stack_lvl+0x8c/0xd0
[   19.004045]  print_report+0x118/0x608
[   19.004080]  kasan_report+0xdc/0x128
[   19.004110]  __asan_report_store1_noabort+0x20/0x30
[   19.004147]  kmalloc_oob_right+0x5a4/0x660
[   19.004179]  kunit_try_run_case+0x170/0x3f0
[   19.004216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.004255]  kthread+0x328/0x630
[   19.004289]  ret_from_fork+0x10/0x20
[   19.004325] 
[   19.065493] Allocated by task 185:
[   19.068880]  kasan_save_stack+0x3c/0x68
[   19.072695]  kasan_save_track+0x20/0x40
[   19.076515]  kasan_save_alloc_info+0x40/0x58
[   19.080768]  __kasan_kmalloc+0xd4/0xd8
[   19.084501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.089015]  kmalloc_oob_right+0xb0/0x660
[   19.093007]  kunit_try_run_case+0x170/0x3f0
[   19.097174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.102643]  kthread+0x328/0x630
[   19.105855]  ret_from_fork+0x10/0x20
[   19.109414] 
[   19.110891] The buggy address belongs to the object at ffff000801b46100
[   19.110891]  which belongs to the cache kmalloc-128 of size 128
[   19.123391] The buggy address is located 0 bytes to the right of
[   19.123391]  allocated 115-byte region [ffff000801b46100, ffff000801b46173)
[   19.136323] 
[   19.137802] The buggy address belongs to the physical page:
[   19.143359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b46
[   19.151343] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.158981] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.165925] page_type: f5(slab)
[   19.169062] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.176780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.184507] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   19.192318] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.200131] head: 0bfffe0000000001 fffffdffe006d181 00000000ffffffff 00000000ffffffff
[   19.207943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.215749] page dumped because: kasan: bad access detected
[   19.221306] 
[   19.222780] Memory state around the buggy address:
[   19.227562]  ffff000801b46000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.234763]  ffff000801b46080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.241969] >ffff000801b46100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.249168]                                                              ^
[   19.256030]  ffff000801b46180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.263236]  ffff000801b46200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.270435] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  163.488281] WARNING: CPU: 2 PID: 705 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  163.495744] Modules linked in:
[  163.498793] CPU: 2 UID: 0 PID: 705 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.4-rc3 #1 PREEMPT 
[  163.508693] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  163.514493] Hardware name: WinLink E850-96 board (DT)
[  163.519531] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  163.526471] pc : intlog10+0x38/0x48
[  163.529943] lr : intlog10_test+0xe4/0x200
[  163.533937] sp : ffff80008ab57c10
[  163.537236] x29: ffff80008ab57c90 x28: 0000000000000000 x27: 0000000000000000
[  163.544352] x26: 1fffe0010037d3a1 x25: 0000000000000000 x24: ffff80008ab57ce0
[  163.551472] x23: ffff80008ab57d00 x22: 0000000000000000 x21: 1ffff0001156af82
[  163.558588] x20: ffff800083c35180 x19: ffff800087bc7990 x18: 0000000021d23619
[  163.565706] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  163.572824] x14: 00000000f1f1f1f1 x13: 1fffe0010b5f19e0 x12: ffff700010f39b71
[  163.579942] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff8000812147c4
[  163.587060] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  163.594178] x5 : ffff70001156af82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a30
[  163.601296] x2 : 1ffff00010786a30 x1 : 0000000000000003 x0 : 0000000000000000
[  163.608416] Call trace:
[  163.610848]  intlog10+0x38/0x48 (P)
[  163.614320]  kunit_try_run_case+0x170/0x3f0
[  163.618483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  163.623952]  kthread+0x328/0x630
[  163.627165]  ret_from_fork+0x10/0x20
[  163.630727] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  163.285854] WARNING: CPU: 3 PID: 687 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  163.293142] Modules linked in:
[  163.296192] CPU: 3 UID: 0 PID: 687 Comm: kunit_try_catch Tainted: G    B D          N  6.15.4-rc3 #1 PREEMPT 
[  163.306087] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  163.311023] Hardware name: WinLink E850-96 board (DT)
[  163.316062] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  163.323003] pc : intlog2+0xd8/0xf8
[  163.326387] lr : intlog2_test+0xe4/0x200
[  163.330293] sp : ffff80008aa37c10
[  163.333593] x29: ffff80008aa37c90 x28: 0000000000000000 x27: 0000000000000000
[  163.340709] x26: 1fffe001002ed701 x25: 0000000000000000 x24: ffff80008aa37ce0
[  163.347829] x23: ffff80008aa37d00 x22: 0000000000000000 x21: 1ffff00011546f82
[  163.354946] x20: ffff800083c35080 x19: ffff800087bc7990 x18: ffff800087bc7b00
[  163.362063] x17: 0000000000000001 x16: ffff00085afaefe0 x15: 0000000000000000
[  163.369181] x14: 00000000f1f1f1f1 x13: 1fffe0010b5f5de0 x12: ffff700010f39b71
[  163.376299] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff8000812149c4
[  163.383417] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  163.390535] x5 : ffff700011546f82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a10
[  163.397653] x2 : 1ffff00010786a10 x1 : 0000000000000003 x0 : 0000000000000000
[  163.404774] Call trace:
[  163.407206]  intlog2+0xd8/0xf8 (P)
[  163.410590]  kunit_try_run_case+0x170/0x3f0
[  163.414755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  163.420222]  kthread+0x328/0x630
[  163.423435]  ret_from_fork+0x10/0x20
[  163.426997] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)