Hay
Date
July 4, 2025, 3:11 p.m.
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   66.376846] ==================================================================
[   66.376979] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   66.376979] 
[   66.377136] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#115):
[   66.378295]  test_out_of_bounds_write+0x100/0x240
[   66.382982]  kunit_try_run_case+0x170/0x3f0
[   66.387148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.392617]  kthread+0x328/0x630
[   66.395829]  ret_from_fork+0x10/0x20
[   66.399387] 
[   66.400867] kfence-#115: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.400867] 
[   66.410501] allocated by task 340 on cpu 5 at 66.376812s (0.033687s ago):
[   66.417287]  test_alloc+0x29c/0x628
[   66.420742]  test_out_of_bounds_write+0xc8/0x240
[   66.425342]  kunit_try_run_case+0x170/0x3f0
[   66.429509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.434977]  kthread+0x328/0x630
[   66.438189]  ret_from_fork+0x10/0x20
[   66.441750] 
[   66.443236] CPU: 5 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   66.453131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.457289] Hardware name: WinLink E850-96 board (DT)
[   66.462324] ==================================================================
[   66.584835] ==================================================================
[   66.584974] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   66.584974] 
[   66.585130] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#117):
[   66.586290]  test_out_of_bounds_write+0x100/0x240
[   66.590977]  kunit_try_run_case+0x170/0x3f0
[   66.595144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.600612]  kthread+0x328/0x630
[   66.603824]  ret_from_fork+0x10/0x20
[   66.607383] 
[   66.608862] kfence-#117: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.608862] 
[   66.617976] allocated by task 342 on cpu 4 at 66.584798s (0.033176s ago):
[   66.624761]  test_alloc+0x230/0x628
[   66.628216]  test_out_of_bounds_write+0xc8/0x240
[   66.632817]  kunit_try_run_case+0x170/0x3f0
[   66.636983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.642452]  kthread+0x328/0x630
[   66.645664]  ret_from_fork+0x10/0x20
[   66.649226] 
[   66.650710] CPU: 4 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   66.660603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.664762] Hardware name: WinLink E850-96 board (DT)
[   66.669799] ==================================================================
Failure - log-parser-boot/internal-error-oops-oops-smp
[  161.451985] Internal error: Oops: 0000000096000005 [#1]  SMP
[  161.457586] Modules linked in:
[  161.460631] CPU: 7 UID: 0 PID: 581 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[  161.470525] Tainted: [B]=BAD_PAGE, [N]=TEST
[  161.474682] Hardware name: WinLink E850-96 board (DT)
[  161.479720] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  161.486659] pc : kunit_test_null_dereference+0x70/0x170
[  161.491868] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  161.497684] sp : ffff80008a447d30
[  161.500982] x29: ffff80008a447d90 x28: 0000000000000000 x27: 0000000000000000
[  161.508100] x26: 1fffe0010007e641 x25: 0000000000000000 x24: 0000000000000004
[  161.515218] x23: ffff0008003f320c x22: ffff8000812024e0 x21: ffff000801370f88
[  161.522336] x20: 1ffff00011488fa6 x19: ffff800087bc7990 x18: ffff800087bc7b00
[  161.529454] x17: 0000000000000000 x16: ffff00085b036fe0 x15: ffff8000811f2d10
[  161.536572] x14: ffff8000808d8bbc x13: 1fffe0010b606de0 x12: ffff6001012888b4
[  161.543690] x11: 1fffe001012888b3 x10: ffff6001012888b3 x9 : ffff8000811f9948
[  161.550808] x8 : ffff80008a447c18 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  161.557926] x5 : ffff700011488fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  161.565044] x2 : dfff800000000000 x1 : ffff000809443cc0 x0 : ffff800087bc7990
[  161.572165] Call trace:
[  161.574595]  kunit_test_null_dereference+0x70/0x170 (P)
[  161.579804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  161.585270]  kthread+0x328/0x630
[  161.588481]  ret_from_fork+0x10/0x20
[  161.592053] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  161.598123] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[  228.626713] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0)
[  228.634952] SMP: stopping secondary CPUs
[  228.638876] Kernel Offset: disabled
[  228.642326] CPU features: 0x0400,00000000,01002650,0200721b
[  228.647882] Memory Limit: none
[  228.650952] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   98.524895] ==================================================================
[   98.525019] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   98.525019] 
[   98.525165] Use-after-free read at 0x(____ptrval____) (in kfence-#198):
[   98.525272]  test_krealloc+0x51c/0x830
[   98.528415]  kunit_try_run_case+0x170/0x3f0
[   98.532582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.538050]  kthread+0x328/0x630
[   98.541263]  ret_from_fork+0x10/0x20
[   98.544821] 
[   98.546301] kfence-#198: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   98.546301] 
[   98.555935] allocated by task 386 on cpu 6 at 98.524798s (0.031135s ago):
[   98.562721]  test_alloc+0x29c/0x628
[   98.566175]  test_krealloc+0xc0/0x830
[   98.569821]  kunit_try_run_case+0x170/0x3f0
[   98.573988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.579458]  kthread+0x328/0x630
[   98.582668]  ret_from_fork+0x10/0x20
[   98.586227] 
[   98.587705] freed by task 386 on cpu 6 at 98.524826s (0.062875s ago):
[   98.594145]  krealloc_noprof+0x148/0x360
[   98.598032]  test_krealloc+0x1dc/0x830
[   98.601765]  kunit_try_run_case+0x170/0x3f0
[   98.605931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.611400]  kthread+0x328/0x630
[   98.614612]  ret_from_fork+0x10/0x20
[   98.618173] 
[   98.619658] CPU: 6 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   98.629555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   98.633710] Hardware name: WinLink E850-96 board (DT)
[   98.638747] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   98.300540] ==================================================================
[   98.300688] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   98.300688] 
[   98.300846] Use-after-free read at 0x(____ptrval____) (in kfence-#196):
[   98.301740]  test_memcache_typesafe_by_rcu+0x280/0x560
[   98.306862]  kunit_try_run_case+0x170/0x3f0
[   98.311028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.316497]  kthread+0x328/0x630
[   98.319709]  ret_from_fork+0x10/0x20
[   98.323267] 
[   98.324747] kfence-#196: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   98.324747] 
[   98.333862] allocated by task 384 on cpu 1 at 98.248811s (0.085047s ago):
[   98.340646]  test_alloc+0x230/0x628
[   98.344102]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   98.349222]  kunit_try_run_case+0x170/0x3f0
[   98.353388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.358857]  kthread+0x328/0x630
[   98.362069]  ret_from_fork+0x10/0x20
[   98.365628] 
[   98.367107] freed by task 384 on cpu 1 at 98.248827s (0.118278s ago):
[   98.373535]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   98.378649]  kunit_try_run_case+0x170/0x3f0
[   98.382816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   98.388286]  kthread+0x328/0x630
[   98.391496]  ret_from_fork+0x10/0x20
[   98.395056] 
[   98.396543] CPU: 1 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   98.406437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   98.410594] Hardware name: WinLink E850-96 board (DT)
[   98.415632] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   74.750637] ==================================================================
[   74.750829] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   74.750829] 
[   74.750980] Invalid read at 0x(____ptrval____):
[   74.752094]  test_invalid_access+0xdc/0x1f0
[   74.756327]  kunit_try_run_case+0x170/0x3f0
[   74.760470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.765925]  kthread+0x328/0x630
[   74.769133]  ret_from_fork+0x10/0x20
[   74.772694] 
[   74.774154] CPU: 6 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   74.784078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.788238] Hardware name: WinLink E850-96 board (DT)
[   74.793272] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   74.404895] ==================================================================
[   74.405036] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.405036] 
[   74.405179] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#191):
[   74.408870]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.414076]  kunit_try_run_case+0x170/0x3f0
[   74.418243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.423712]  kthread+0x328/0x630
[   74.426923]  ret_from_fork+0x10/0x20
[   74.430482] 
[   74.431962] kfence-#191: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   74.431962] 
[   74.441596] allocated by task 374 on cpu 6 at 74.404827s (0.036767s ago):
[   74.448377]  test_alloc+0x29c/0x628
[   74.451836]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   74.456958]  kunit_try_run_case+0x170/0x3f0
[   74.461124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.466593]  kthread+0x328/0x630
[   74.469805]  ret_from_fork+0x10/0x20
[   74.473364] 
[   74.474842] freed by task 374 on cpu 6 at 74.404843s (0.069997s ago):
[   74.481276]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   74.486471]  kunit_try_run_case+0x170/0x3f0
[   74.490638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.496106]  kthread+0x328/0x630
[   74.499318]  ret_from_fork+0x10/0x20
[   74.502878] 
[   74.504364] CPU: 6 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   74.514260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.518417] Hardware name: WinLink E850-96 board (DT)
[   74.523452] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   74.192861] ==================================================================
[   74.193009] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   74.193009] 
[   74.193171] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#189):
[   74.194843]  test_kmalloc_aligned_oob_read+0x238/0x468
[   74.199965]  kunit_try_run_case+0x170/0x3f0
[   74.204131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.209600]  kthread+0x328/0x630
[   74.212811]  ret_from_fork+0x10/0x20
[   74.216370] 
[   74.217850] kfence-#189: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96
[   74.217850] 
[   74.227484] allocated by task 372 on cpu 4 at 74.192820s (0.034661s ago):
[   74.234269]  test_alloc+0x29c/0x628
[   74.237725]  test_kmalloc_aligned_oob_read+0x100/0x468
[   74.242846]  kunit_try_run_case+0x170/0x3f0
[   74.247012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.252481]  kthread+0x328/0x630
[   74.255693]  ret_from_fork+0x10/0x20
[   74.259255] 
[   74.260739] CPU: 4 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   74.270634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.274792] Hardware name: WinLink E850-96 board (DT)
[   74.279828] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   69.496877] ==================================================================
[   69.496998] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   69.496998] 
[   69.497125] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#144):
[   69.497285]  test_corruption+0x1d8/0x378
[   69.500832]  kunit_try_run_case+0x170/0x3f0
[   69.504999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.510468]  kthread+0x328/0x630
[   69.513679]  ret_from_fork+0x10/0x20
[   69.517239] 
[   69.518717] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.518717] 
[   69.527831] allocated by task 362 on cpu 0 at 69.496819s (0.031010s ago):
[   69.534611]  test_alloc+0x230/0x628
[   69.538071]  test_corruption+0x198/0x378
[   69.541979]  kunit_try_run_case+0x170/0x3f0
[   69.546144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.551613]  kthread+0x328/0x630
[   69.554825]  ret_from_fork+0x10/0x20
[   69.558383] 
[   69.559863] freed by task 362 on cpu 0 at 69.496833s (0.063026s ago):
[   69.566295]  test_corruption+0x1d8/0x378
[   69.570189]  kunit_try_run_case+0x170/0x3f0
[   69.574356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.579824]  kthread+0x328/0x630
[   69.583036]  ret_from_fork+0x10/0x20
[   69.586595] 
[   69.588080] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   69.597976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.602135] Hardware name: WinLink E850-96 board (DT)
[   69.607171] ==================================================================
[   68.412864] ==================================================================
[   68.412992] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   68.412992] 
[   68.413122] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#134):
[   68.415525]  test_corruption+0x278/0x378
[   68.419429]  kunit_try_run_case+0x170/0x3f0
[   68.423596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.429065]  kthread+0x328/0x630
[   68.432277]  ret_from_fork+0x10/0x20
[   68.435835] 
[   68.437314] kfence-#134: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.437314] 
[   68.446949] allocated by task 360 on cpu 6 at 68.412807s (0.034140s ago):
[   68.453730]  test_alloc+0x29c/0x628
[   68.457189]  test_corruption+0xdc/0x378
[   68.461009]  kunit_try_run_case+0x170/0x3f0
[   68.465176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.470646]  kthread+0x328/0x630
[   68.473855]  ret_from_fork+0x10/0x20
[   68.477416] 
[   68.478893] freed by task 360 on cpu 6 at 68.412821s (0.066069s ago):
[   68.485328]  test_corruption+0x278/0x378
[   68.489220]  kunit_try_run_case+0x170/0x3f0
[   68.493387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.498855]  kthread+0x328/0x630
[   68.502067]  ret_from_fork+0x10/0x20
[   68.505628] 
[   68.507114] CPU: 6 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   68.517007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.521166] Hardware name: WinLink E850-96 board (DT)
[   68.526202] ==================================================================
[   69.272860] ==================================================================
[   69.272995] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   69.272995] 
[   69.273126] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#142):
[   69.275527]  test_corruption+0x120/0x378
[   69.279432]  kunit_try_run_case+0x170/0x3f0
[   69.283598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.289067]  kthread+0x328/0x630
[   69.292279]  ret_from_fork+0x10/0x20
[   69.295838] 
[   69.297317] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   69.297317] 
[   69.306431] allocated by task 362 on cpu 0 at 69.272800s (0.033628s ago):
[   69.313214]  test_alloc+0x230/0x628
[   69.316671]  test_corruption+0xdc/0x378
[   69.320490]  kunit_try_run_case+0x170/0x3f0
[   69.324657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.330127]  kthread+0x328/0x630
[   69.333337]  ret_from_fork+0x10/0x20
[   69.336896] 
[   69.338376] freed by task 362 on cpu 0 at 69.272814s (0.065558s ago):
[   69.344810]  test_corruption+0x120/0x378
[   69.348701]  kunit_try_run_case+0x170/0x3f0
[   69.352868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.358337]  kthread+0x328/0x630
[   69.361549]  ret_from_fork+0x10/0x20
[   69.365109] 
[   69.366594] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   69.376491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.380648] Hardware name: WinLink E850-96 board (DT)
[   69.385684] ==================================================================
[   68.948869] ==================================================================
[   68.949001] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   68.949001] 
[   68.949132] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#139):
[   68.949293]  test_corruption+0x284/0x378
[   68.952834]  kunit_try_run_case+0x170/0x3f0
[   68.957001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.962469]  kthread+0x328/0x630
[   68.965681]  ret_from_fork+0x10/0x20
[   68.969240] 
[   68.970719] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   68.970719] 
[   68.980354] allocated by task 360 on cpu 6 at 68.948806s (0.031545s ago):
[   68.987135]  test_alloc+0x29c/0x628
[   68.990594]  test_corruption+0x198/0x378
[   68.994500]  kunit_try_run_case+0x170/0x3f0
[   68.998667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.004135]  kthread+0x328/0x630
[   69.007347]  ret_from_fork+0x10/0x20
[   69.010906] 
[   69.012384] freed by task 360 on cpu 6 at 68.948821s (0.063561s ago):
[   69.018819]  test_corruption+0x284/0x378
[   69.022711]  kunit_try_run_case+0x170/0x3f0
[   69.026878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.032348]  kthread+0x328/0x630
[   69.035559]  ret_from_fork+0x10/0x20
[   69.039119] 
[   69.040604] CPU: 6 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   69.050501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.054658] Hardware name: WinLink E850-96 board (DT)
[   69.059692] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   67.888864] ==================================================================
[   67.888993] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   67.888993] 
[   67.889131] Invalid free of 0x(____ptrval____) (in kfence-#129):
[   67.889231]  test_invalid_addr_free+0x1ac/0x238
[   67.892739]  kunit_try_run_case+0x170/0x3f0
[   67.896906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.902375]  kthread+0x328/0x630
[   67.905587]  ret_from_fork+0x10/0x20
[   67.909145] 
[   67.910624] kfence-#129: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.910624] 
[   67.920261] allocated by task 356 on cpu 6 at 67.888815s (0.031441s ago):
[   67.927041]  test_alloc+0x29c/0x628
[   67.930501]  test_invalid_addr_free+0xd4/0x238
[   67.934926]  kunit_try_run_case+0x170/0x3f0
[   67.939093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.944561]  kthread+0x328/0x630
[   67.947773]  ret_from_fork+0x10/0x20
[   67.951335] 
[   67.952820] CPU: 6 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   67.962716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.966872] Hardware name: WinLink E850-96 board (DT)
[   67.971909] ==================================================================
[   68.100875] ==================================================================
[   68.101004] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   68.101004] 
[   68.101135] Invalid free of 0x(____ptrval____) (in kfence-#131):
[   68.101239]  test_invalid_addr_free+0xec/0x238
[   68.104576]  kunit_try_run_case+0x170/0x3f0
[   68.108743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.114212]  kthread+0x328/0x630
[   68.117424]  ret_from_fork+0x10/0x20
[   68.120983] 
[   68.122462] kfence-#131: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   68.122462] 
[   68.131575] allocated by task 358 on cpu 7 at 68.100825s (0.030747s ago):
[   68.138354]  test_alloc+0x230/0x628
[   68.141815]  test_invalid_addr_free+0xd4/0x238
[   68.146243]  kunit_try_run_case+0x170/0x3f0
[   68.150409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.155877]  kthread+0x328/0x630
[   68.159089]  ret_from_fork+0x10/0x20
[   68.162651] 
[   68.164136] CPU: 7 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   68.174030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.178189] Hardware name: WinLink E850-96 board (DT)
[   68.183225] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   67.668877] ==================================================================
[   67.669006] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   67.669006] 
[   67.669130] Invalid free of 0x(____ptrval____) (in kfence-#127):
[   67.669233]  test_double_free+0x100/0x238
[   67.671711]  kunit_try_run_case+0x170/0x3f0
[   67.675878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.681347]  kthread+0x328/0x630
[   67.684558]  ret_from_fork+0x10/0x20
[   67.688117] 
[   67.689597] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.689597] 
[   67.698710] allocated by task 354 on cpu 7 at 67.668808s (0.029900s ago):
[   67.705491]  test_alloc+0x230/0x628
[   67.708951]  test_double_free+0xd4/0x238
[   67.712856]  kunit_try_run_case+0x170/0x3f0
[   67.717023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.722492]  kthread+0x328/0x630
[   67.725703]  ret_from_fork+0x10/0x20
[   67.729264] 
[   67.730740] freed by task 354 on cpu 7 at 67.668822s (0.061916s ago):
[   67.737173]  test_double_free+0xf0/0x238
[   67.741068]  kunit_try_run_case+0x170/0x3f0
[   67.745234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.750703]  kthread+0x328/0x630
[   67.753915]  ret_from_fork+0x10/0x20
[   67.757475] 
[   67.758960] CPU: 7 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   67.768857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.773013] Hardware name: WinLink E850-96 board (DT)
[   67.778050] ==================================================================
[   67.448891] ==================================================================
[   67.449019] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   67.449019] 
[   67.449147] Invalid free of 0x(____ptrval____) (in kfence-#125):
[   67.449247]  test_double_free+0x1bc/0x238
[   67.451724]  kunit_try_run_case+0x170/0x3f0
[   67.455891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.461360]  kthread+0x328/0x630
[   67.464571]  ret_from_fork+0x10/0x20
[   67.468130] 
[   67.469610] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   67.469610] 
[   67.479244] allocated by task 352 on cpu 6 at 67.448821s (0.030421s ago):
[   67.486024]  test_alloc+0x29c/0x628
[   67.489484]  test_double_free+0xd4/0x238
[   67.493390]  kunit_try_run_case+0x170/0x3f0
[   67.497557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.503025]  kthread+0x328/0x630
[   67.506239]  ret_from_fork+0x10/0x20
[   67.509796] 
[   67.511275] freed by task 352 on cpu 6 at 67.448836s (0.062436s ago):
[   67.517709]  test_double_free+0x1ac/0x238
[   67.521689]  kunit_try_run_case+0x170/0x3f0
[   67.525855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.531324]  kthread+0x328/0x630
[   67.534535]  ret_from_fork+0x10/0x20
[   67.538096] 
[   67.539581] CPU: 6 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   67.549475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.553634] Hardware name: WinLink E850-96 board (DT)
[   67.558671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   67.016865] ==================================================================
[   67.016994] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   67.016994] 
[   67.017144] Use-after-free read at 0x(____ptrval____) (in kfence-#121):
[   67.017616]  test_use_after_free_read+0x114/0x248
[   67.022304]  kunit_try_run_case+0x170/0x3f0
[   67.026470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.031939]  kthread+0x328/0x630
[   67.035151]  ret_from_fork+0x10/0x20
[   67.038709] 
[   67.040189] kfence-#121: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   67.040189] 
[   67.049302] allocated by task 346 on cpu 7 at 67.016811s (0.032489s ago):
[   67.056089]  test_alloc+0x230/0x628
[   67.059543]  test_use_after_free_read+0xd0/0x248
[   67.064144]  kunit_try_run_case+0x170/0x3f0
[   67.068310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.073779]  kthread+0x328/0x630
[   67.076990]  ret_from_fork+0x10/0x20
[   67.080551] 
[   67.082026] freed by task 346 on cpu 7 at 67.016826s (0.065198s ago):
[   67.088459]  test_use_after_free_read+0xf0/0x248
[   67.093049]  kunit_try_run_case+0x170/0x3f0
[   67.097216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.102684]  kthread+0x328/0x630
[   67.105896]  ret_from_fork+0x10/0x20
[   67.109457] 
[   67.110942] CPU: 7 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   67.120838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.124995] Hardware name: WinLink E850-96 board (DT)
[   67.130031] ==================================================================
[   66.792863] ==================================================================
[   66.792999] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   66.792999] 
[   66.793152] Use-after-free read at 0x(____ptrval____) (in kfence-#119):
[   66.793620]  test_use_after_free_read+0x114/0x248
[   66.798307]  kunit_try_run_case+0x170/0x3f0
[   66.802474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.807943]  kthread+0x328/0x630
[   66.811155]  ret_from_fork+0x10/0x20
[   66.814713] 
[   66.816193] kfence-#119: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   66.816193] 
[   66.825827] allocated by task 344 on cpu 5 at 66.792809s (0.033016s ago):
[   66.832611]  test_alloc+0x29c/0x628
[   66.836067]  test_use_after_free_read+0xd0/0x248
[   66.840668]  kunit_try_run_case+0x170/0x3f0
[   66.844836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.850303]  kthread+0x328/0x630
[   66.853515]  ret_from_fork+0x10/0x20
[   66.857075] 
[   66.858552] freed by task 344 on cpu 5 at 66.792824s (0.065725s ago):
[   66.864985]  test_use_after_free_read+0x1c0/0x248
[   66.869661]  kunit_try_run_case+0x170/0x3f0
[   66.873827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.879296]  kthread+0x328/0x630
[   66.882508]  ret_from_fork+0x10/0x20
[   66.886068] 
[   66.887554] CPU: 5 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   66.897448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.901606] Hardware name: WinLink E850-96 board (DT)
[   66.906643] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   65.644839] ==================================================================
[   65.644968] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   65.644968] 
[   65.645120] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#108):
[   65.646199]  test_out_of_bounds_read+0x1c8/0x3e0
[   65.650800]  kunit_try_run_case+0x170/0x3f0
[   65.654966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.660435]  kthread+0x328/0x630
[   65.663647]  ret_from_fork+0x10/0x20
[   65.667206] 
[   65.668685] kfence-#108: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.668685] 
[   65.678319] allocated by task 336 on cpu 6 at 65.644806s (0.033511s ago):
[   65.685103]  test_alloc+0x29c/0x628
[   65.688560]  test_out_of_bounds_read+0x198/0x3e0
[   65.693160]  kunit_try_run_case+0x170/0x3f0
[   65.697327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.702795]  kthread+0x328/0x630
[   65.706007]  ret_from_fork+0x10/0x20
[   65.709569] 
[   65.711054] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   65.720948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.725106] Hardware name: WinLink E850-96 board (DT)
[   65.730143] ==================================================================
[   65.332853] ==================================================================
[   65.332983] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   65.332983] 
[   65.333132] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#105):
[   65.334042]  test_out_of_bounds_read+0x114/0x3e0
[   65.338641]  kunit_try_run_case+0x170/0x3f0
[   65.342807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.348276]  kthread+0x328/0x630
[   65.351488]  ret_from_fork+0x10/0x20
[   65.355047] 
[   65.356526] kfence-#105: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32
[   65.356526] 
[   65.366161] allocated by task 336 on cpu 6 at 65.332818s (0.033340s ago):
[   65.372944]  test_alloc+0x29c/0x628
[   65.376401]  test_out_of_bounds_read+0xdc/0x3e0
[   65.380915]  kunit_try_run_case+0x170/0x3f0
[   65.385081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.390549]  kthread+0x328/0x630
[   65.393761]  ret_from_fork+0x10/0x20
[   65.397324] 
[   65.398807] CPU: 6 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   65.408702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.412860] Hardware name: WinLink E850-96 board (DT)
[   65.417896] ==================================================================
[   65.960857] ==================================================================
[   65.960983] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   65.960983] 
[   65.961130] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#111):
[   65.962040]  test_out_of_bounds_read+0x114/0x3e0
[   65.966640]  kunit_try_run_case+0x170/0x3f0
[   65.970807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.976275]  kthread+0x328/0x630
[   65.979487]  ret_from_fork+0x10/0x20
[   65.983046] 
[   65.984525] kfence-#111: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   65.984525] 
[   65.993639] allocated by task 338 on cpu 7 at 65.960824s (0.032812s ago):
[   66.000424]  test_alloc+0x230/0x628
[   66.003879]  test_out_of_bounds_read+0xdc/0x3e0
[   66.008393]  kunit_try_run_case+0x170/0x3f0
[   66.012560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.018029]  kthread+0x328/0x630
[   66.021240]  ret_from_fork+0x10/0x20
[   66.024801] 
[   66.026286] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   66.036180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.040340] Hardware name: WinLink E850-96 board (DT)
[   66.045375] ==================================================================
[   66.168865] ==================================================================
[   66.168992] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   66.168992] 
[   66.169141] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#113):
[   66.170224]  test_out_of_bounds_read+0x1c8/0x3e0
[   66.174822]  kunit_try_run_case+0x170/0x3f0
[   66.178989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.184458]  kthread+0x328/0x630
[   66.187669]  ret_from_fork+0x10/0x20
[   66.191228] 
[   66.192708] kfence-#113: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test
[   66.192708] 
[   66.201821] allocated by task 338 on cpu 7 at 66.168831s (0.032988s ago):
[   66.208605]  test_alloc+0x230/0x628
[   66.212061]  test_out_of_bounds_read+0x198/0x3e0
[   66.216662]  kunit_try_run_case+0x170/0x3f0
[   66.220829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.226297]  kthread+0x328/0x630
[   66.229509]  ret_from_fork+0x10/0x20
[   66.233069] 
[   66.234555] CPU: 7 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   66.244449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.248607] Hardware name: WinLink E850-96 board (DT)
[   66.253643] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   18.670968] ==================================================================
[   18.693704] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   18.693704] 
[   18.703250] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#37):
[   18.712627]  kmalloc_track_caller_oob_right+0x224/0x488
[   18.717833]  kunit_try_run_case+0x170/0x3f0
[   18.722000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.727469]  kthread+0x328/0x630
[   18.730681]  ret_from_fork+0x10/0x20
[   18.734239] 
[   18.735719] kfence-#37: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128
[   18.735719] 
[   18.745440] allocated by task 191 on cpu 2 at 18.670620s (0.074817s ago):
[   18.752225]  kmalloc_track_caller_oob_right+0x184/0x488
[   18.757416]  kunit_try_run_case+0x170/0x3f0
[   18.761583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.767052]  kthread+0x328/0x630
[   18.770263]  ret_from_fork+0x10/0x20
[   18.773822] 
[   18.775301] freed by task 191 on cpu 2 at 18.670936s (0.104361s ago):
[   18.781733]  kmalloc_track_caller_oob_right+0x224/0x488
[   18.786929]  kunit_try_run_case+0x170/0x3f0
[   18.791096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.796565]  kthread+0x328/0x630
[   18.799777]  ret_from_fork+0x10/0x20
[   18.803337] 
[   18.804821] CPU: 2 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.814717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.818875] Hardware name: WinLink E850-96 board (DT)
[   18.823911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   64.686326] ==================================================================
[   64.693434] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   64.700376] Write of size 1 at addr ffff0008018e7578 by task kunit_try_catch/334
[   64.707754] 
[   64.709238] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   64.709287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.709306] Hardware name: WinLink E850-96 board (DT)
[   64.709328] Call trace:
[   64.709340]  show_stack+0x20/0x38 (C)
[   64.709376]  dump_stack_lvl+0x8c/0xd0
[   64.709412]  print_report+0x118/0x608
[   64.709444]  kasan_report+0xdc/0x128
[   64.709472]  __asan_report_store1_noabort+0x20/0x30
[   64.709507]  strncpy_from_user+0x270/0x2a0
[   64.709536]  copy_user_test_oob+0x5c0/0xec8
[   64.709566]  kunit_try_run_case+0x170/0x3f0
[   64.709599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.709638]  kthread+0x328/0x630
[   64.709671]  ret_from_fork+0x10/0x20
[   64.709707] 
[   64.776242] Allocated by task 334:
[   64.779629]  kasan_save_stack+0x3c/0x68
[   64.783447]  kasan_save_track+0x20/0x40
[   64.787267]  kasan_save_alloc_info+0x40/0x58
[   64.791520]  __kasan_kmalloc+0xd4/0xd8
[   64.795253]  __kmalloc_noprof+0x198/0x4c8
[   64.799246]  kunit_kmalloc_array+0x34/0x88
[   64.803326]  copy_user_test_oob+0xac/0xec8
[   64.807405]  kunit_try_run_case+0x170/0x3f0
[   64.811572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.817040]  kthread+0x328/0x630
[   64.820252]  ret_from_fork+0x10/0x20
[   64.823811] 
[   64.825287] The buggy address belongs to the object at ffff0008018e7500
[   64.825287]  which belongs to the cache kmalloc-128 of size 128
[   64.837787] The buggy address is located 0 bytes to the right of
[   64.837787]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   64.850721] 
[   64.852197] The buggy address belongs to the physical page:
[   64.857753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   64.865738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.873376] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.880321] page_type: f5(slab)
[   64.883454] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.891178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.898905] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.906716] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.914529] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   64.922342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.930147] page dumped because: kasan: bad access detected
[   64.935702] 
[   64.937177] Memory state around the buggy address:
[   64.941956]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.949162]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.956365] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.963566]                                                                 ^
[   64.970688]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.977893]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.985094] ==================================================================
[   64.377489] ==================================================================
[   64.384586] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   64.391440] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   64.398991] 
[   64.400475] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   64.400525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.400543] Hardware name: WinLink E850-96 board (DT)
[   64.400562] Call trace:
[   64.400573]  show_stack+0x20/0x38 (C)
[   64.400606]  dump_stack_lvl+0x8c/0xd0
[   64.400640]  print_report+0x118/0x608
[   64.400672]  kasan_report+0xdc/0x128
[   64.400698]  kasan_check_range+0x100/0x1a8
[   64.400730]  __kasan_check_write+0x20/0x30
[   64.400760]  strncpy_from_user+0x3c/0x2a0
[   64.400790]  copy_user_test_oob+0x5c0/0xec8
[   64.400818]  kunit_try_run_case+0x170/0x3f0
[   64.400855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.400891]  kthread+0x328/0x630
[   64.400924]  ret_from_fork+0x10/0x20
[   64.400957] 
[   64.470691] Allocated by task 334:
[   64.474079]  kasan_save_stack+0x3c/0x68
[   64.477896]  kasan_save_track+0x20/0x40
[   64.481716]  kasan_save_alloc_info+0x40/0x58
[   64.485969]  __kasan_kmalloc+0xd4/0xd8
[   64.489702]  __kmalloc_noprof+0x198/0x4c8
[   64.493695]  kunit_kmalloc_array+0x34/0x88
[   64.497775]  copy_user_test_oob+0xac/0xec8
[   64.501854]  kunit_try_run_case+0x170/0x3f0
[   64.506021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.511490]  kthread+0x328/0x630
[   64.514701]  ret_from_fork+0x10/0x20
[   64.518260] 
[   64.519736] The buggy address belongs to the object at ffff0008018e7500
[   64.519736]  which belongs to the cache kmalloc-128 of size 128
[   64.532236] The buggy address is located 0 bytes inside of
[   64.532236]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   64.544649] 
[   64.546125] The buggy address belongs to the physical page:
[   64.551683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   64.559668] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.567306] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.574250] page_type: f5(slab)
[   64.577384] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.585106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.592833] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.600644] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.608457] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   64.616271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.624075] page dumped because: kasan: bad access detected
[   64.629630] 
[   64.631106] Memory state around the buggy address:
[   64.635887]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.643088]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.650294] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.657494]                                                                 ^
[   64.664616]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.671821]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.679022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   62.852955] ==================================================================
[   62.859959] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   62.866986] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   62.874448] 
[   62.875935] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   62.875989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.876007] Hardware name: WinLink E850-96 board (DT)
[   62.876030] Call trace:
[   62.876043]  show_stack+0x20/0x38 (C)
[   62.876076]  dump_stack_lvl+0x8c/0xd0
[   62.876114]  print_report+0x118/0x608
[   62.876146]  kasan_report+0xdc/0x128
[   62.876178]  kasan_check_range+0x100/0x1a8
[   62.876213]  __kasan_check_read+0x20/0x30
[   62.876248]  copy_user_test_oob+0x728/0xec8
[   62.876277]  kunit_try_run_case+0x170/0x3f0
[   62.876312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.876350]  kthread+0x328/0x630
[   62.876384]  ret_from_fork+0x10/0x20
[   62.876421] 
[   62.942069] Allocated by task 334:
[   62.945458]  kasan_save_stack+0x3c/0x68
[   62.949273]  kasan_save_track+0x20/0x40
[   62.953093]  kasan_save_alloc_info+0x40/0x58
[   62.957346]  __kasan_kmalloc+0xd4/0xd8
[   62.961079]  __kmalloc_noprof+0x198/0x4c8
[   62.965072]  kunit_kmalloc_array+0x34/0x88
[   62.969151]  copy_user_test_oob+0xac/0xec8
[   62.973231]  kunit_try_run_case+0x170/0x3f0
[   62.977398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.982867]  kthread+0x328/0x630
[   62.986080]  ret_from_fork+0x10/0x20
[   62.989637] 
[   62.991115] The buggy address belongs to the object at ffff0008018e7500
[   62.991115]  which belongs to the cache kmalloc-128 of size 128
[   63.003614] The buggy address is located 0 bytes inside of
[   63.003614]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.016026] 
[   63.017505] The buggy address belongs to the physical page:
[   63.023060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.031045] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.038684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.045626] page_type: f5(slab)
[   63.048762] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.056485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.064210] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.072021] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.079834] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   63.087646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.095453] page dumped because: kasan: bad access detected
[   63.101007] 
[   63.102482] Memory state around the buggy address:
[   63.107263]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.114466]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.121674] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.128871]                                                                 ^
[   63.135993]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.143198]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.150400] ==================================================================
[   62.542566] ==================================================================
[   62.554927] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   62.561955] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   62.569505] 
[   62.570992] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   62.571046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.571063] Hardware name: WinLink E850-96 board (DT)
[   62.571087] Call trace:
[   62.571102]  show_stack+0x20/0x38 (C)
[   62.571138]  dump_stack_lvl+0x8c/0xd0
[   62.571176]  print_report+0x118/0x608
[   62.571207]  kasan_report+0xdc/0x128
[   62.571237]  kasan_check_range+0x100/0x1a8
[   62.571273]  __kasan_check_write+0x20/0x30
[   62.571307]  copy_user_test_oob+0x234/0xec8
[   62.571341]  kunit_try_run_case+0x170/0x3f0
[   62.571378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.571417]  kthread+0x328/0x630
[   62.571453]  ret_from_fork+0x10/0x20
[   62.571491] 
[   62.637212] Allocated by task 334:
[   62.640601]  kasan_save_stack+0x3c/0x68
[   62.644417]  kasan_save_track+0x20/0x40
[   62.648238]  kasan_save_alloc_info+0x40/0x58
[   62.652490]  __kasan_kmalloc+0xd4/0xd8
[   62.656222]  __kmalloc_noprof+0x198/0x4c8
[   62.660215]  kunit_kmalloc_array+0x34/0x88
[   62.664295]  copy_user_test_oob+0xac/0xec8
[   62.668375]  kunit_try_run_case+0x170/0x3f0
[   62.672541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.678010]  kthread+0x328/0x630
[   62.681223]  ret_from_fork+0x10/0x20
[   62.684781] 
[   62.686258] The buggy address belongs to the object at ffff0008018e7500
[   62.686258]  which belongs to the cache kmalloc-128 of size 128
[   62.698760] The buggy address is located 0 bytes inside of
[   62.698760]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   62.711169] 
[   62.712649] The buggy address belongs to the physical page:
[   62.718206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   62.726188] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.733828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.740770] page_type: f5(slab)
[   62.743910] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.751627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.759354] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.767166] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.774978] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   62.782789] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.790595] page dumped because: kasan: bad access detected
[   62.796151] 
[   62.797626] Memory state around the buggy address:
[   62.802407]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.809609]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.816817] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.824015]                                                                 ^
[   62.831138]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.838343]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.845543] ==================================================================
[   64.072900] ==================================================================
[   64.079732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   64.086757] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   64.094222] 
[   64.095706] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   64.095759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.095778] Hardware name: WinLink E850-96 board (DT)
[   64.095798] Call trace:
[   64.095812]  show_stack+0x20/0x38 (C)
[   64.095845]  dump_stack_lvl+0x8c/0xd0
[   64.095882]  print_report+0x118/0x608
[   64.095912]  kasan_report+0xdc/0x128
[   64.095943]  kasan_check_range+0x100/0x1a8
[   64.095974]  __kasan_check_read+0x20/0x30
[   64.096008]  copy_user_test_oob+0x4a0/0xec8
[   64.096037]  kunit_try_run_case+0x170/0x3f0
[   64.096071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.096109]  kthread+0x328/0x630
[   64.096142]  ret_from_fork+0x10/0x20
[   64.096176] 
[   64.161842] Allocated by task 334:
[   64.165231]  kasan_save_stack+0x3c/0x68
[   64.169046]  kasan_save_track+0x20/0x40
[   64.172866]  kasan_save_alloc_info+0x40/0x58
[   64.177120]  __kasan_kmalloc+0xd4/0xd8
[   64.180852]  __kmalloc_noprof+0x198/0x4c8
[   64.184845]  kunit_kmalloc_array+0x34/0x88
[   64.188925]  copy_user_test_oob+0xac/0xec8
[   64.193005]  kunit_try_run_case+0x170/0x3f0
[   64.197171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.202640]  kthread+0x328/0x630
[   64.205851]  ret_from_fork+0x10/0x20
[   64.209411] 
[   64.210886] The buggy address belongs to the object at ffff0008018e7500
[   64.210886]  which belongs to the cache kmalloc-128 of size 128
[   64.223387] The buggy address is located 0 bytes inside of
[   64.223387]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   64.235799] 
[   64.237277] The buggy address belongs to the physical page:
[   64.242835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   64.250818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.258457] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.265400] page_type: f5(slab)
[   64.268536] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.276257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.283983] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.291795] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.299608] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   64.307420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.315225] page dumped because: kasan: bad access detected
[   64.320781] 
[   64.322256] Memory state around the buggy address:
[   64.327036]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.334239]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.341444] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.348645]                                                                 ^
[   64.355767]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.362972]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.370174] ==================================================================
[   63.158048] ==================================================================
[   63.164816] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   63.171841] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   63.179391] 
[   63.180878] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   63.180931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.180948] Hardware name: WinLink E850-96 board (DT)
[   63.180970] Call trace:
[   63.180985]  show_stack+0x20/0x38 (C)
[   63.181019]  dump_stack_lvl+0x8c/0xd0
[   63.181056]  print_report+0x118/0x608
[   63.181088]  kasan_report+0xdc/0x128
[   63.181121]  kasan_check_range+0x100/0x1a8
[   63.181155]  __kasan_check_write+0x20/0x30
[   63.181187]  copy_user_test_oob+0x35c/0xec8
[   63.181215]  kunit_try_run_case+0x170/0x3f0
[   63.181252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.181292]  kthread+0x328/0x630
[   63.181325]  ret_from_fork+0x10/0x20
[   63.181360] 
[   63.247099] Allocated by task 334:
[   63.250486]  kasan_save_stack+0x3c/0x68
[   63.254304]  kasan_save_track+0x20/0x40
[   63.258123]  kasan_save_alloc_info+0x40/0x58
[   63.262377]  __kasan_kmalloc+0xd4/0xd8
[   63.266109]  __kmalloc_noprof+0x198/0x4c8
[   63.270102]  kunit_kmalloc_array+0x34/0x88
[   63.274182]  copy_user_test_oob+0xac/0xec8
[   63.278263]  kunit_try_run_case+0x170/0x3f0
[   63.282428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.287897]  kthread+0x328/0x630
[   63.291109]  ret_from_fork+0x10/0x20
[   63.294668] 
[   63.296143] The buggy address belongs to the object at ffff0008018e7500
[   63.296143]  which belongs to the cache kmalloc-128 of size 128
[   63.308644] The buggy address is located 0 bytes inside of
[   63.308644]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.321056] 
[   63.322535] The buggy address belongs to the physical page:
[   63.328092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.336075] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.343716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.350658] page_type: f5(slab)
[   63.353792] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.361513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.369240] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.377051] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.384864] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   63.392676] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.400482] page dumped because: kasan: bad access detected
[   63.406037] 
[   63.407513] Memory state around the buggy address:
[   63.412295]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.419496]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.426702] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.433902]                                                                 ^
[   63.441023]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.448228]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.455431] ==================================================================
[   63.462784] ==================================================================
[   63.469841] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   63.476870] Read of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   63.484335] 
[   63.485820] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   63.485870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.485887] Hardware name: WinLink E850-96 board (DT)
[   63.485907] Call trace:
[   63.485921]  show_stack+0x20/0x38 (C)
[   63.485954]  dump_stack_lvl+0x8c/0xd0
[   63.485991]  print_report+0x118/0x608
[   63.486021]  kasan_report+0xdc/0x128
[   63.486049]  kasan_check_range+0x100/0x1a8
[   63.486079]  __kasan_check_read+0x20/0x30
[   63.486111]  copy_user_test_oob+0x3c8/0xec8
[   63.486140]  kunit_try_run_case+0x170/0x3f0
[   63.486174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.486213]  kthread+0x328/0x630
[   63.486245]  ret_from_fork+0x10/0x20
[   63.486276] 
[   63.551955] Allocated by task 334:
[   63.555343]  kasan_save_stack+0x3c/0x68
[   63.559160]  kasan_save_track+0x20/0x40
[   63.562979]  kasan_save_alloc_info+0x40/0x58
[   63.567233]  __kasan_kmalloc+0xd4/0xd8
[   63.570966]  __kmalloc_noprof+0x198/0x4c8
[   63.574958]  kunit_kmalloc_array+0x34/0x88
[   63.579038]  copy_user_test_oob+0xac/0xec8
[   63.583118]  kunit_try_run_case+0x170/0x3f0
[   63.587285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.592753]  kthread+0x328/0x630
[   63.595965]  ret_from_fork+0x10/0x20
[   63.599524] 
[   63.601000] The buggy address belongs to the object at ffff0008018e7500
[   63.601000]  which belongs to the cache kmalloc-128 of size 128
[   63.613500] The buggy address is located 0 bytes inside of
[   63.613500]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.625913] 
[   63.627388] The buggy address belongs to the physical page:
[   63.632947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.640932] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.648570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.655514] page_type: f5(slab)
[   63.658647] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.666370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.674096] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.681908] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.689723] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   63.697533] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   63.705338] page dumped because: kasan: bad access detected
[   63.710894] 
[   63.712369] Memory state around the buggy address:
[   63.717149]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.724353]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.731557] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   63.738758]                                                                 ^
[   63.745880]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.753085]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.760286] ==================================================================
[   63.767599] ==================================================================
[   63.774700] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   63.781728] Write of size 121 at addr ffff0008018e7500 by task kunit_try_catch/334
[   63.789278] 
[   63.790762] CPU: 6 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   63.790816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.790833] Hardware name: WinLink E850-96 board (DT)
[   63.790854] Call trace:
[   63.790868]  show_stack+0x20/0x38 (C)
[   63.790903]  dump_stack_lvl+0x8c/0xd0
[   63.790939]  print_report+0x118/0x608
[   63.790970]  kasan_report+0xdc/0x128
[   63.791000]  kasan_check_range+0x100/0x1a8
[   63.791032]  __kasan_check_write+0x20/0x30
[   63.791065]  copy_user_test_oob+0x434/0xec8
[   63.791094]  kunit_try_run_case+0x170/0x3f0
[   63.791129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.791167]  kthread+0x328/0x630
[   63.791199]  ret_from_fork+0x10/0x20
[   63.791233] 
[   63.856985] Allocated by task 334:
[   63.860373]  kasan_save_stack+0x3c/0x68
[   63.864190]  kasan_save_track+0x20/0x40
[   63.868010]  kasan_save_alloc_info+0x40/0x58
[   63.872263]  __kasan_kmalloc+0xd4/0xd8
[   63.875996]  __kmalloc_noprof+0x198/0x4c8
[   63.879988]  kunit_kmalloc_array+0x34/0x88
[   63.884068]  copy_user_test_oob+0xac/0xec8
[   63.888148]  kunit_try_run_case+0x170/0x3f0
[   63.892315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.897783]  kthread+0x328/0x630
[   63.900995]  ret_from_fork+0x10/0x20
[   63.904555] 
[   63.906030] The buggy address belongs to the object at ffff0008018e7500
[   63.906030]  which belongs to the cache kmalloc-128 of size 128
[   63.918530] The buggy address is located 0 bytes inside of
[   63.918530]  allocated 120-byte region [ffff0008018e7500, ffff0008018e7578)
[   63.930943] 
[   63.932420] The buggy address belongs to the physical page:
[   63.937979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   63.945962] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.953600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   63.960544] page_type: f5(slab)
[   63.963679] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.971400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.979126] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   63.986938] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.994752] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   64.002565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   64.010370] page dumped because: kasan: bad access detected
[   64.015924] 
[   64.017399] Memory state around the buggy address:
[   64.022179]  ffff0008018e7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.029383]  ffff0008018e7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.036587] >ffff0008018e7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.043788]                                                                 ^
[   64.050910]  ffff0008018e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.058116]  ffff0008018e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.065317] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   61.917552] ==================================================================
[   61.931759] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   61.939136] Read of size 8 at addr ffff000802678c78 by task kunit_try_catch/330
[   61.946427] 
[   61.947912] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.947969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.947987] Hardware name: WinLink E850-96 board (DT)
[   61.948010] Call trace:
[   61.948026]  show_stack+0x20/0x38 (C)
[   61.948062]  dump_stack_lvl+0x8c/0xd0
[   61.948103]  print_report+0x118/0x608
[   61.948136]  kasan_report+0xdc/0x128
[   61.948167]  __asan_report_load8_noabort+0x20/0x30
[   61.948202]  copy_to_kernel_nofault+0x204/0x250
[   61.948232]  copy_to_kernel_nofault_oob+0x158/0x418
[   61.948271]  kunit_try_run_case+0x170/0x3f0
[   61.948307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.948346]  kthread+0x328/0x630
[   61.948380]  ret_from_fork+0x10/0x20
[   61.948416] 
[   62.015956] Allocated by task 330:
[   62.019342]  kasan_save_stack+0x3c/0x68
[   62.023159]  kasan_save_track+0x20/0x40
[   62.026978]  kasan_save_alloc_info+0x40/0x58
[   62.031232]  __kasan_kmalloc+0xd4/0xd8
[   62.034964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.039478]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.044252]  kunit_try_run_case+0x170/0x3f0
[   62.048419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.053888]  kthread+0x328/0x630
[   62.057099]  ret_from_fork+0x10/0x20
[   62.060658] 
[   62.062136] The buggy address belongs to the object at ffff000802678c00
[   62.062136]  which belongs to the cache kmalloc-128 of size 128
[   62.074638] The buggy address is located 0 bytes to the right of
[   62.074638]  allocated 120-byte region [ffff000802678c00, ffff000802678c78)
[   62.087568] 
[   62.089047] The buggy address belongs to the physical page:
[   62.094605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   62.102587] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.110225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.117168] page_type: f5(slab)
[   62.120308] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.128025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.135753] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.143563] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.151376] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   62.159188] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.166993] page dumped because: kasan: bad access detected
[   62.172549] 
[   62.174024] Memory state around the buggy address:
[   62.178807]  ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.186008]  ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.193215] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.200413]                                                                 ^
[   62.207535]  ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.214740]  ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.221942] ==================================================================
[   62.229672] ==================================================================
[   62.236357] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   62.243643] Write of size 8 at addr ffff000802678c78 by task kunit_try_catch/330
[   62.251020] 
[   62.252507] CPU: 7 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   62.252560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.252579] Hardware name: WinLink E850-96 board (DT)
[   62.252601] Call trace:
[   62.252615]  show_stack+0x20/0x38 (C)
[   62.252651]  dump_stack_lvl+0x8c/0xd0
[   62.252690]  print_report+0x118/0x608
[   62.252719]  kasan_report+0xdc/0x128
[   62.252748]  kasan_check_range+0x100/0x1a8
[   62.252784]  __kasan_check_write+0x20/0x30
[   62.252817]  copy_to_kernel_nofault+0x8c/0x250
[   62.252847]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   62.252885]  kunit_try_run_case+0x170/0x3f0
[   62.252923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.252962]  kthread+0x328/0x630
[   62.252995]  ret_from_fork+0x10/0x20
[   62.253030] 
[   62.323849] Allocated by task 330:
[   62.327238]  kasan_save_stack+0x3c/0x68
[   62.331054]  kasan_save_track+0x20/0x40
[   62.334873]  kasan_save_alloc_info+0x40/0x58
[   62.339126]  __kasan_kmalloc+0xd4/0xd8
[   62.342859]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.347373]  copy_to_kernel_nofault_oob+0xc8/0x418
[   62.352148]  kunit_try_run_case+0x170/0x3f0
[   62.356314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.361782]  kthread+0x328/0x630
[   62.364994]  ret_from_fork+0x10/0x20
[   62.368553] 
[   62.370028] The buggy address belongs to the object at ffff000802678c00
[   62.370028]  which belongs to the cache kmalloc-128 of size 128
[   62.382530] The buggy address is located 0 bytes to the right of
[   62.382530]  allocated 120-byte region [ffff000802678c00, ffff000802678c78)
[   62.395462] 
[   62.396940] The buggy address belongs to the physical page:
[   62.402498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   62.410481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.418120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   62.425064] page_type: f5(slab)
[   62.428201] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.435920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.443648] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   62.451458] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.459271] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   62.467083] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   62.474888] page dumped because: kasan: bad access detected
[   62.480444] 
[   62.481919] Memory state around the buggy address:
[   62.486701]  ffff000802678b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.493902]  ffff000802678b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.501109] >ffff000802678c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   62.508308]                                                                 ^
[   62.515430]  ffff000802678c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.522636]  ffff000802678d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.529837] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   61.684553] ==================================================================
[   61.691570] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   61.698251] Read of size 1 at addr ffff800087b3d7f8 by task kunit_try_catch/318
[   61.705542] 
[   61.707028] CPU: 5 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.707083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.707102] Hardware name: WinLink E850-96 board (DT)
[   61.707122] Call trace:
[   61.707135]  show_stack+0x20/0x38 (C)
[   61.707175]  dump_stack_lvl+0x8c/0xd0
[   61.707211]  print_report+0x310/0x608
[   61.707244]  kasan_report+0xdc/0x128
[   61.707272]  __asan_report_load1_noabort+0x20/0x30
[   61.707307]  vmalloc_oob+0x51c/0x5d0
[   61.707340]  kunit_try_run_case+0x170/0x3f0
[   61.707379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.707419]  kthread+0x328/0x630
[   61.707454]  ret_from_fork+0x10/0x20
[   61.707491] 
[   61.769260] The buggy address belongs to the virtual mapping at
[   61.769260]  [ffff800087b3d000, ffff800087b3f000) created by:
[   61.769260]  vmalloc_oob+0x98/0x5d0
[   61.784360] 
[   61.785840] The buggy address belongs to the physical page:
[   61.791396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862
[   61.799379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.805900] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.813620] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.821339] page dumped because: kasan: bad access detected
[   61.826894] 
[   61.828369] Memory state around the buggy address:
[   61.833150]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.840353]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.847560] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.854759]                                                                 ^
[   61.861882]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.869085]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.876286] ==================================================================
[   61.478327] ==================================================================
[   61.492701] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   61.499384] Read of size 1 at addr ffff800087b3d7f3 by task kunit_try_catch/318
[   61.506675] 
[   61.508162] CPU: 5 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.508221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.508241] Hardware name: WinLink E850-96 board (DT)
[   61.508266] Call trace:
[   61.508281]  show_stack+0x20/0x38 (C)
[   61.508316]  dump_stack_lvl+0x8c/0xd0
[   61.508355]  print_report+0x310/0x608
[   61.508386]  kasan_report+0xdc/0x128
[   61.508417]  __asan_report_load1_noabort+0x20/0x30
[   61.508455]  vmalloc_oob+0x578/0x5d0
[   61.508487]  kunit_try_run_case+0x170/0x3f0
[   61.508525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.508566]  kthread+0x328/0x630
[   61.508601]  ret_from_fork+0x10/0x20
[   61.508642] 
[   61.570393] The buggy address belongs to the virtual mapping at
[   61.570393]  [ffff800087b3d000, ffff800087b3f000) created by:
[   61.570393]  vmalloc_oob+0x98/0x5d0
[   61.585492] 
[   61.586972] The buggy address belongs to the physical page:
[   61.592528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862
[   61.600511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.607034] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.614751] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.622472] page dumped because: kasan: bad access detected
[   61.628026] 
[   61.629501] Memory state around the buggy address:
[   61.634282]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.641484]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.648688] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.655890]                                                              ^
[   61.662753]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.669956]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.677159] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   49.379314] ==================================================================
[   49.386371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   49.393661] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.401040] 
[   49.402520] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.402566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.402583] Hardware name: WinLink E850-96 board (DT)
[   49.402602] Call trace:
[   49.402615]  show_stack+0x20/0x38 (C)
[   49.402645]  dump_stack_lvl+0x8c/0xd0
[   49.402677]  print_report+0x118/0x608
[   49.402706]  kasan_report+0xdc/0x128
[   49.402735]  kasan_check_range+0x100/0x1a8
[   49.402767]  __kasan_check_write+0x20/0x30
[   49.402800]  kasan_atomics_helper+0x894/0x4858
[   49.402827]  kasan_atomics+0x198/0x2e0
[   49.402854]  kunit_try_run_case+0x170/0x3f0
[   49.402885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.402924]  kthread+0x328/0x630
[   49.402957]  ret_from_fork+0x10/0x20
[   49.402986] 
[   49.472740] Allocated by task 314:
[   49.476127]  kasan_save_stack+0x3c/0x68
[   49.479944]  kasan_save_track+0x20/0x40
[   49.483764]  kasan_save_alloc_info+0x40/0x58
[   49.488018]  __kasan_kmalloc+0xd4/0xd8
[   49.491750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.496264]  kasan_atomics+0xb8/0x2e0
[   49.499909]  kunit_try_run_case+0x170/0x3f0
[   49.504076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.509545]  kthread+0x328/0x630
[   49.512757]  ret_from_fork+0x10/0x20
[   49.516315] 
[   49.517791] The buggy address belongs to the object at ffff000803afab80
[   49.517791]  which belongs to the cache kmalloc-64 of size 64
[   49.530118] The buggy address is located 0 bytes to the right of
[   49.530118]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.542964] 
[   49.544440] The buggy address belongs to the physical page:
[   49.549996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.557982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.564492] page_type: f5(slab)
[   49.567624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.575349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.583068] page dumped because: kasan: bad access detected
[   49.588623] 
[   49.590099] Memory state around the buggy address:
[   49.594878]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.602082]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.609287] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.616488]                                      ^
[   49.621266]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.628470]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.635671] ==================================================================
[   47.269626] ==================================================================
[   47.276680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   47.283971] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.291349] 
[   47.292831] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.292878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.292894] Hardware name: WinLink E850-96 board (DT)
[   47.292913] Call trace:
[   47.292925]  show_stack+0x20/0x38 (C)
[   47.292956]  dump_stack_lvl+0x8c/0xd0
[   47.292990]  print_report+0x118/0x608
[   47.293019]  kasan_report+0xdc/0x128
[   47.293049]  kasan_check_range+0x100/0x1a8
[   47.293079]  __kasan_check_write+0x20/0x30
[   47.293111]  kasan_atomics_helper+0x4e4/0x4858
[   47.293138]  kasan_atomics+0x198/0x2e0
[   47.293167]  kunit_try_run_case+0x170/0x3f0
[   47.293200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.293237]  kthread+0x328/0x630
[   47.293268]  ret_from_fork+0x10/0x20
[   47.293296] 
[   47.363049] Allocated by task 314:
[   47.366435]  kasan_save_stack+0x3c/0x68
[   47.370254]  kasan_save_track+0x20/0x40
[   47.374073]  kasan_save_alloc_info+0x40/0x58
[   47.378327]  __kasan_kmalloc+0xd4/0xd8
[   47.382059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.386573]  kasan_atomics+0xb8/0x2e0
[   47.390219]  kunit_try_run_case+0x170/0x3f0
[   47.394386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.399854]  kthread+0x328/0x630
[   47.403066]  ret_from_fork+0x10/0x20
[   47.406625] 
[   47.408100] The buggy address belongs to the object at ffff000803afab80
[   47.408100]  which belongs to the cache kmalloc-64 of size 64
[   47.420427] The buggy address is located 0 bytes to the right of
[   47.420427]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.433274] 
[   47.434750] The buggy address belongs to the physical page:
[   47.440306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.448291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.454801] page_type: f5(slab)
[   47.457934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.465659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.473377] page dumped because: kasan: bad access detected
[   47.478933] 
[   47.480408] Memory state around the buggy address:
[   47.485188]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.492392]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.499596] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.506797]                                      ^
[   47.511575]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.518780]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.525982] ==================================================================
[   44.374859] ==================================================================
[   44.389056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   44.396429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   44.403719] 
[   44.405207] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.405265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.405284] Hardware name: WinLink E850-96 board (DT)
[   44.405306] Call trace:
[   44.405323]  show_stack+0x20/0x38 (C)
[   44.405357]  dump_stack_lvl+0x8c/0xd0
[   44.405395]  print_report+0x118/0x608
[   44.405430]  kasan_report+0xdc/0x128
[   44.405460]  __asan_report_load4_noabort+0x20/0x30
[   44.405496]  kasan_atomics_helper+0x40a8/0x4858
[   44.405529]  kasan_atomics+0x198/0x2e0
[   44.405556]  kunit_try_run_case+0x170/0x3f0
[   44.405594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.405634]  kthread+0x328/0x630
[   44.405669]  ret_from_fork+0x10/0x20
[   44.405706] 
[   44.472122] Allocated by task 314:
[   44.475510]  kasan_save_stack+0x3c/0x68
[   44.479325]  kasan_save_track+0x20/0x40
[   44.483145]  kasan_save_alloc_info+0x40/0x58
[   44.487398]  __kasan_kmalloc+0xd4/0xd8
[   44.491130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.495644]  kasan_atomics+0xb8/0x2e0
[   44.499291]  kunit_try_run_case+0x170/0x3f0
[   44.503456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.508925]  kthread+0x328/0x630
[   44.512137]  ret_from_fork+0x10/0x20
[   44.515696] 
[   44.517175] The buggy address belongs to the object at ffff000803afab80
[   44.517175]  which belongs to the cache kmalloc-64 of size 64
[   44.529502] The buggy address is located 0 bytes to the right of
[   44.529502]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   44.542345] 
[   44.543824] The buggy address belongs to the physical page:
[   44.549380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   44.557364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.563874] page_type: f5(slab)
[   44.567011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.574730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.582451] page dumped because: kasan: bad access detected
[   44.588004] 
[   44.589479] Memory state around the buggy address:
[   44.594260]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.601464]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.608669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.615868]                                      ^
[   44.620648]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.627851]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.635054] ==================================================================
[   53.054767] ==================================================================
[   53.061836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   53.069127] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.076505] 
[   53.077985] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.078030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.078046] Hardware name: WinLink E850-96 board (DT)
[   53.078064] Call trace:
[   53.078076]  show_stack+0x20/0x38 (C)
[   53.078105]  dump_stack_lvl+0x8c/0xd0
[   53.078140]  print_report+0x118/0x608
[   53.078170]  kasan_report+0xdc/0x128
[   53.078198]  kasan_check_range+0x100/0x1a8
[   53.078231]  __kasan_check_write+0x20/0x30
[   53.078262]  kasan_atomics_helper+0xd3c/0x4858
[   53.078291]  kasan_atomics+0x198/0x2e0
[   53.078317]  kunit_try_run_case+0x170/0x3f0
[   53.078352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.078390]  kthread+0x328/0x630
[   53.078425]  ret_from_fork+0x10/0x20
[   53.078453] 
[   53.148205] Allocated by task 314:
[   53.151591]  kasan_save_stack+0x3c/0x68
[   53.155410]  kasan_save_track+0x20/0x40
[   53.159229]  kasan_save_alloc_info+0x40/0x58
[   53.163483]  __kasan_kmalloc+0xd4/0xd8
[   53.167215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.171729]  kasan_atomics+0xb8/0x2e0
[   53.175375]  kunit_try_run_case+0x170/0x3f0
[   53.179542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.185010]  kthread+0x328/0x630
[   53.188222]  ret_from_fork+0x10/0x20
[   53.191781] 
[   53.193257] The buggy address belongs to the object at ffff000803afab80
[   53.193257]  which belongs to the cache kmalloc-64 of size 64
[   53.205583] The buggy address is located 0 bytes to the right of
[   53.205583]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   53.218430] 
[   53.219906] The buggy address belongs to the physical page:
[   53.225462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   53.233447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.239958] page_type: f5(slab)
[   53.243090] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.250815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.258534] page dumped because: kasan: bad access detected
[   53.264089] 
[   53.265565] Memory state around the buggy address:
[   53.270346]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.277548]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.284753] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.291953]                                      ^
[   53.296731]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.303936]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.311139] ==================================================================
[   49.643032] ==================================================================
[   49.650086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   49.657460] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.664751] 
[   49.666233] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.666281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.666295] Hardware name: WinLink E850-96 board (DT)
[   49.666316] Call trace:
[   49.666328]  show_stack+0x20/0x38 (C)
[   49.666360]  dump_stack_lvl+0x8c/0xd0
[   49.666395]  print_report+0x118/0x608
[   49.666424]  kasan_report+0xdc/0x128
[   49.666451]  __asan_report_load4_noabort+0x20/0x30
[   49.666488]  kasan_atomics_helper+0x42d8/0x4858
[   49.666519]  kasan_atomics+0x198/0x2e0
[   49.666548]  kunit_try_run_case+0x170/0x3f0
[   49.666581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.666619]  kthread+0x328/0x630
[   49.666653]  ret_from_fork+0x10/0x20
[   49.666686] 
[   49.733153] Allocated by task 314:
[   49.736538]  kasan_save_stack+0x3c/0x68
[   49.740357]  kasan_save_track+0x20/0x40
[   49.744176]  kasan_save_alloc_info+0x40/0x58
[   49.748430]  __kasan_kmalloc+0xd4/0xd8
[   49.752163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.756676]  kasan_atomics+0xb8/0x2e0
[   49.760324]  kunit_try_run_case+0x170/0x3f0
[   49.764489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.769958]  kthread+0x328/0x630
[   49.773169]  ret_from_fork+0x10/0x20
[   49.776728] 
[   49.778205] The buggy address belongs to the object at ffff000803afab80
[   49.778205]  which belongs to the cache kmalloc-64 of size 64
[   49.790531] The buggy address is located 0 bytes to the right of
[   49.790531]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.803377] 
[   49.804853] The buggy address belongs to the physical page:
[   49.810410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.818394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.824905] page_type: f5(slab)
[   49.828040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.835762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.843482] page dumped because: kasan: bad access detected
[   49.849036] 
[   49.850512] Memory state around the buggy address:
[   49.855292]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.862495]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.869699] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.876900]                                      ^
[   49.881678]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.888883]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.896085] ==================================================================
[   51.222013] ==================================================================
[   51.229052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   51.236429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   51.243720] 
[   51.245200] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   51.245244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.245261] Hardware name: WinLink E850-96 board (DT)
[   51.245278] Call trace:
[   51.245292]  show_stack+0x20/0x38 (C)
[   51.245322]  dump_stack_lvl+0x8c/0xd0
[   51.245354]  print_report+0x118/0x608
[   51.245383]  kasan_report+0xdc/0x128
[   51.245411]  __asan_report_load4_noabort+0x20/0x30
[   51.245444]  kasan_atomics_helper+0x3dcc/0x4858
[   51.245474]  kasan_atomics+0x198/0x2e0
[   51.245502]  kunit_try_run_case+0x170/0x3f0
[   51.245537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.245574]  kthread+0x328/0x630
[   51.245606]  ret_from_fork+0x10/0x20
[   51.245635] 
[   51.312122] Allocated by task 314:
[   51.315507]  kasan_save_stack+0x3c/0x68
[   51.319326]  kasan_save_track+0x20/0x40
[   51.323146]  kasan_save_alloc_info+0x40/0x58
[   51.327399]  __kasan_kmalloc+0xd4/0xd8
[   51.331132]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.335646]  kasan_atomics+0xb8/0x2e0
[   51.339292]  kunit_try_run_case+0x170/0x3f0
[   51.343458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.348927]  kthread+0x328/0x630
[   51.352139]  ret_from_fork+0x10/0x20
[   51.355697] 
[   51.357173] The buggy address belongs to the object at ffff000803afab80
[   51.357173]  which belongs to the cache kmalloc-64 of size 64
[   51.369500] The buggy address is located 0 bytes to the right of
[   51.369500]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.382347] 
[   51.383822] The buggy address belongs to the physical page:
[   51.389378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.397364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.403874] page_type: f5(slab)
[   51.407007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.414731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.422450] page dumped because: kasan: bad access detected
[   51.428005] 
[   51.429481] Memory state around the buggy address:
[   51.434259]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.441464]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.448669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.455870]                                      ^
[   51.460647]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.467853]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.475055] ==================================================================
[   54.102879] ==================================================================
[   54.109913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   54.117202] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.124580] 
[   54.126059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.126107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.126122] Hardware name: WinLink E850-96 board (DT)
[   54.126141] Call trace:
[   54.126153]  show_stack+0x20/0x38 (C)
[   54.126184]  dump_stack_lvl+0x8c/0xd0
[   54.126219]  print_report+0x118/0x608
[   54.126247]  kasan_report+0xdc/0x128
[   54.126277]  kasan_check_range+0x100/0x1a8
[   54.126308]  __kasan_check_write+0x20/0x30
[   54.126338]  kasan_atomics_helper+0xe44/0x4858
[   54.126367]  kasan_atomics+0x198/0x2e0
[   54.126394]  kunit_try_run_case+0x170/0x3f0
[   54.126427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.126465]  kthread+0x328/0x630
[   54.126497]  ret_from_fork+0x10/0x20
[   54.126528] 
[   54.196280] Allocated by task 314:
[   54.199665]  kasan_save_stack+0x3c/0x68
[   54.203485]  kasan_save_track+0x20/0x40
[   54.207304]  kasan_save_alloc_info+0x40/0x58
[   54.211557]  __kasan_kmalloc+0xd4/0xd8
[   54.215290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.219804]  kasan_atomics+0xb8/0x2e0
[   54.223450]  kunit_try_run_case+0x170/0x3f0
[   54.227616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.233085]  kthread+0x328/0x630
[   54.236297]  ret_from_fork+0x10/0x20
[   54.239856] 
[   54.241331] The buggy address belongs to the object at ffff000803afab80
[   54.241331]  which belongs to the cache kmalloc-64 of size 64
[   54.253658] The buggy address is located 0 bytes to the right of
[   54.253658]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.266504] 
[   54.267981] The buggy address belongs to the physical page:
[   54.273536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.281522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.288032] page_type: f5(slab)
[   54.291165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.298889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.306608] page dumped because: kasan: bad access detected
[   54.312163] 
[   54.313639] Memory state around the buggy address:
[   54.318419]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.325622]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.332827] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.340028]                                      ^
[   54.344806]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.352011]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.359212] ==================================================================
[   57.001433] ==================================================================
[   57.008479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   57.015856] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.023234] 
[   57.024714] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.024759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.024773] Hardware name: WinLink E850-96 board (DT)
[   57.024791] Call trace:
[   57.024804]  show_stack+0x20/0x38 (C)
[   57.024834]  dump_stack_lvl+0x8c/0xd0
[   57.024867]  print_report+0x118/0x608
[   57.024895]  kasan_report+0xdc/0x128
[   57.024924]  kasan_check_range+0x100/0x1a8
[   57.024955]  __kasan_check_write+0x20/0x30
[   57.024987]  kasan_atomics_helper+0x126c/0x4858
[   57.025018]  kasan_atomics+0x198/0x2e0
[   57.025046]  kunit_try_run_case+0x170/0x3f0
[   57.025080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.025118]  kthread+0x328/0x630
[   57.025150]  ret_from_fork+0x10/0x20
[   57.025181] 
[   57.095021] Allocated by task 314:
[   57.098406]  kasan_save_stack+0x3c/0x68
[   57.102226]  kasan_save_track+0x20/0x40
[   57.106045]  kasan_save_alloc_info+0x40/0x58
[   57.110299]  __kasan_kmalloc+0xd4/0xd8
[   57.114031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.118545]  kasan_atomics+0xb8/0x2e0
[   57.122191]  kunit_try_run_case+0x170/0x3f0
[   57.126357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.131826]  kthread+0x328/0x630
[   57.135038]  ret_from_fork+0x10/0x20
[   57.138597] 
[   57.140072] The buggy address belongs to the object at ffff000803afab80
[   57.140072]  which belongs to the cache kmalloc-64 of size 64
[   57.152399] The buggy address is located 0 bytes to the right of
[   57.152399]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.165246] 
[   57.166722] The buggy address belongs to the physical page:
[   57.172278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.180263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.186773] page_type: f5(slab)
[   57.189906] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.197631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.205349] page dumped because: kasan: bad access detected
[   57.210905] 
[   57.212380] Memory state around the buggy address:
[   57.217160]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.224363]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.231568] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.238769]                                      ^
[   57.243547]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.250752]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.257953] ==================================================================
[   44.642448] ==================================================================
[   44.649468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   44.656840] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   44.664218] 
[   44.665704] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.665760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.665778] Hardware name: WinLink E850-96 board (DT)
[   44.665797] Call trace:
[   44.665811]  show_stack+0x20/0x38 (C)
[   44.665843]  dump_stack_lvl+0x8c/0xd0
[   44.665882]  print_report+0x118/0x608
[   44.665913]  kasan_report+0xdc/0x128
[   44.665940]  __asan_report_store4_noabort+0x20/0x30
[   44.665977]  kasan_atomics_helper+0x3f7c/0x4858
[   44.666007]  kasan_atomics+0x198/0x2e0
[   44.666033]  kunit_try_run_case+0x170/0x3f0
[   44.666070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.666108]  kthread+0x328/0x630
[   44.666140]  ret_from_fork+0x10/0x20
[   44.666175] 
[   44.732707] Allocated by task 314:
[   44.736095]  kasan_save_stack+0x3c/0x68
[   44.739912]  kasan_save_track+0x20/0x40
[   44.743731]  kasan_save_alloc_info+0x40/0x58
[   44.747984]  __kasan_kmalloc+0xd4/0xd8
[   44.751717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.756231]  kasan_atomics+0xb8/0x2e0
[   44.759877]  kunit_try_run_case+0x170/0x3f0
[   44.764043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.769512]  kthread+0x328/0x630
[   44.772723]  ret_from_fork+0x10/0x20
[   44.776282] 
[   44.777761] The buggy address belongs to the object at ffff000803afab80
[   44.777761]  which belongs to the cache kmalloc-64 of size 64
[   44.790085] The buggy address is located 0 bytes to the right of
[   44.790085]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   44.802931] 
[   44.804411] The buggy address belongs to the physical page:
[   44.809967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   44.817951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.824460] page_type: f5(slab)
[   44.827595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.835316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.843035] page dumped because: kasan: bad access detected
[   44.848590] 
[   44.850066] Memory state around the buggy address:
[   44.854846]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.862049]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.869255] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.876455]                                      ^
[   44.881234]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.888439]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.895640] ==================================================================
[   46.742171] ==================================================================
[   46.749258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   46.756548] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   46.763926] 
[   46.765409] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   46.765456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.765471] Hardware name: WinLink E850-96 board (DT)
[   46.765489] Call trace:
[   46.765502]  show_stack+0x20/0x38 (C)
[   46.765536]  dump_stack_lvl+0x8c/0xd0
[   46.765570]  print_report+0x118/0x608
[   46.765600]  kasan_report+0xdc/0x128
[   46.765628]  kasan_check_range+0x100/0x1a8
[   46.765659]  __kasan_check_write+0x20/0x30
[   46.765692]  kasan_atomics_helper+0x414/0x4858
[   46.765720]  kasan_atomics+0x198/0x2e0
[   46.765747]  kunit_try_run_case+0x170/0x3f0
[   46.765783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.765820]  kthread+0x328/0x630
[   46.765853]  ret_from_fork+0x10/0x20
[   46.765887] 
[   46.835626] Allocated by task 314:
[   46.839012]  kasan_save_stack+0x3c/0x68
[   46.842832]  kasan_save_track+0x20/0x40
[   46.846651]  kasan_save_alloc_info+0x40/0x58
[   46.850904]  __kasan_kmalloc+0xd4/0xd8
[   46.854637]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.859151]  kasan_atomics+0xb8/0x2e0
[   46.862796]  kunit_try_run_case+0x170/0x3f0
[   46.866963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.872432]  kthread+0x328/0x630
[   46.875643]  ret_from_fork+0x10/0x20
[   46.879202] 
[   46.880678] The buggy address belongs to the object at ffff000803afab80
[   46.880678]  which belongs to the cache kmalloc-64 of size 64
[   46.893005] The buggy address is located 0 bytes to the right of
[   46.893005]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.905851] 
[   46.907327] The buggy address belongs to the physical page:
[   46.912883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.920869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.927379] page_type: f5(slab)
[   46.930513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.938236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.945955] page dumped because: kasan: bad access detected
[   46.951510] 
[   46.952986] Memory state around the buggy address:
[   46.957764]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.964969]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.972174] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.979374]                                      ^
[   46.984152]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.991357]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.998560] ==================================================================
[   48.588171] ==================================================================
[   48.595237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   48.602527] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.609906] 
[   48.611387] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.611435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.611453] Hardware name: WinLink E850-96 board (DT)
[   48.611471] Call trace:
[   48.611482]  show_stack+0x20/0x38 (C)
[   48.611512]  dump_stack_lvl+0x8c/0xd0
[   48.611545]  print_report+0x118/0x608
[   48.611573]  kasan_report+0xdc/0x128
[   48.611603]  kasan_check_range+0x100/0x1a8
[   48.611635]  __kasan_check_write+0x20/0x30
[   48.611667]  kasan_atomics_helper+0x6ec/0x4858
[   48.611698]  kasan_atomics+0x198/0x2e0
[   48.611724]  kunit_try_run_case+0x170/0x3f0
[   48.611758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.611797]  kthread+0x328/0x630
[   48.611827]  ret_from_fork+0x10/0x20
[   48.611858] 
[   48.681606] Allocated by task 314:
[   48.684991]  kasan_save_stack+0x3c/0x68
[   48.688810]  kasan_save_track+0x20/0x40
[   48.692630]  kasan_save_alloc_info+0x40/0x58
[   48.696883]  __kasan_kmalloc+0xd4/0xd8
[   48.700616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.705130]  kasan_atomics+0xb8/0x2e0
[   48.708775]  kunit_try_run_case+0x170/0x3f0
[   48.712942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.718411]  kthread+0x328/0x630
[   48.721623]  ret_from_fork+0x10/0x20
[   48.725182] 
[   48.726657] The buggy address belongs to the object at ffff000803afab80
[   48.726657]  which belongs to the cache kmalloc-64 of size 64
[   48.738984] The buggy address is located 0 bytes to the right of
[   48.738984]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   48.751830] 
[   48.753307] The buggy address belongs to the physical page:
[   48.758862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   48.766848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.773358] page_type: f5(slab)
[   48.776492] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.784215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.791934] page dumped because: kasan: bad access detected
[   48.797489] 
[   48.798965] Memory state around the buggy address:
[   48.803743]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.810948]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.818153] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.825354]                                      ^
[   48.830131]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.837336]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.844537] ==================================================================
[   48.851889] ==================================================================
[   48.858949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   48.866239] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.873617] 
[   48.875099] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.875148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.875166] Hardware name: WinLink E850-96 board (DT)
[   48.875186] Call trace:
[   48.875201]  show_stack+0x20/0x38 (C)
[   48.875231]  dump_stack_lvl+0x8c/0xd0
[   48.875265]  print_report+0x118/0x608
[   48.875293]  kasan_report+0xdc/0x128
[   48.875322]  kasan_check_range+0x100/0x1a8
[   48.875353]  __kasan_check_write+0x20/0x30
[   48.875385]  kasan_atomics_helper+0x760/0x4858
[   48.875413]  kasan_atomics+0x198/0x2e0
[   48.875439]  kunit_try_run_case+0x170/0x3f0
[   48.875473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.875512]  kthread+0x328/0x630
[   48.875543]  ret_from_fork+0x10/0x20
[   48.875572] 
[   48.945318] Allocated by task 314:
[   48.948704]  kasan_save_stack+0x3c/0x68
[   48.952522]  kasan_save_track+0x20/0x40
[   48.956341]  kasan_save_alloc_info+0x40/0x58
[   48.960595]  __kasan_kmalloc+0xd4/0xd8
[   48.964327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.968841]  kasan_atomics+0xb8/0x2e0
[   48.972487]  kunit_try_run_case+0x170/0x3f0
[   48.976653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.982122]  kthread+0x328/0x630
[   48.985334]  ret_from_fork+0x10/0x20
[   48.988893] 
[   48.990368] The buggy address belongs to the object at ffff000803afab80
[   48.990368]  which belongs to the cache kmalloc-64 of size 64
[   49.002695] The buggy address is located 0 bytes to the right of
[   49.002695]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.015542] 
[   49.017018] The buggy address belongs to the physical page:
[   49.022573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.030559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.037069] page_type: f5(slab)
[   49.040202] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.047927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.055645] page dumped because: kasan: bad access detected
[   49.061200] 
[   49.062676] Memory state around the buggy address:
[   49.067457]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.074659]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.081864] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.089065]                                      ^
[   49.093843]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.101048]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.108250] ==================================================================
[   55.681994] ==================================================================
[   55.689054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   55.696431] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.703809] 
[   55.705289] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.705335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.705353] Hardware name: WinLink E850-96 board (DT)
[   55.705371] Call trace:
[   55.705383]  show_stack+0x20/0x38 (C)
[   55.705414]  dump_stack_lvl+0x8c/0xd0
[   55.705449]  print_report+0x118/0x608
[   55.705478]  kasan_report+0xdc/0x128
[   55.705506]  kasan_check_range+0x100/0x1a8
[   55.705535]  __kasan_check_write+0x20/0x30
[   55.705567]  kasan_atomics_helper+0x1058/0x4858
[   55.705596]  kasan_atomics+0x198/0x2e0
[   55.705624]  kunit_try_run_case+0x170/0x3f0
[   55.705657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.705694]  kthread+0x328/0x630
[   55.705727]  ret_from_fork+0x10/0x20
[   55.705758] 
[   55.775597] Allocated by task 314:
[   55.778982]  kasan_save_stack+0x3c/0x68
[   55.782801]  kasan_save_track+0x20/0x40
[   55.786621]  kasan_save_alloc_info+0x40/0x58
[   55.790874]  __kasan_kmalloc+0xd4/0xd8
[   55.794607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.799120]  kasan_atomics+0xb8/0x2e0
[   55.802766]  kunit_try_run_case+0x170/0x3f0
[   55.806933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.812401]  kthread+0x328/0x630
[   55.815613]  ret_from_fork+0x10/0x20
[   55.819172] 
[   55.820647] The buggy address belongs to the object at ffff000803afab80
[   55.820647]  which belongs to the cache kmalloc-64 of size 64
[   55.832975] The buggy address is located 0 bytes to the right of
[   55.832975]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.845821] 
[   55.847297] The buggy address belongs to the physical page:
[   55.852853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.860838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.867349] page_type: f5(slab)
[   55.870482] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.878206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.885925] page dumped because: kasan: bad access detected
[   55.891480] 
[   55.892955] Memory state around the buggy address:
[   55.897734]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.904939]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.912143] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.919344]                                      ^
[   55.924122]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.931327]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.938528] ==================================================================
[   58.845138] ==================================================================
[   58.852201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   58.859578] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.866956] 
[   58.868436] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.868482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.868499] Hardware name: WinLink E850-96 board (DT)
[   58.868519] Call trace:
[   58.868530]  show_stack+0x20/0x38 (C)
[   58.868560]  dump_stack_lvl+0x8c/0xd0
[   58.868593]  print_report+0x118/0x608
[   58.868622]  kasan_report+0xdc/0x128
[   58.868652]  kasan_check_range+0x100/0x1a8
[   58.868682]  __kasan_check_write+0x20/0x30
[   58.868714]  kasan_atomics_helper+0x154c/0x4858
[   58.868746]  kasan_atomics+0x198/0x2e0
[   58.868773]  kunit_try_run_case+0x170/0x3f0
[   58.868809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.868847]  kthread+0x328/0x630
[   58.868878]  ret_from_fork+0x10/0x20
[   58.868908] 
[   58.938743] Allocated by task 314:
[   58.942129]  kasan_save_stack+0x3c/0x68
[   58.945948]  kasan_save_track+0x20/0x40
[   58.949767]  kasan_save_alloc_info+0x40/0x58
[   58.954021]  __kasan_kmalloc+0xd4/0xd8
[   58.957754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.962267]  kasan_atomics+0xb8/0x2e0
[   58.965913]  kunit_try_run_case+0x170/0x3f0
[   58.970080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.975549]  kthread+0x328/0x630
[   58.978760]  ret_from_fork+0x10/0x20
[   58.982319] 
[   58.983795] The buggy address belongs to the object at ffff000803afab80
[   58.983795]  which belongs to the cache kmalloc-64 of size 64
[   58.996122] The buggy address is located 0 bytes to the right of
[   58.996122]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.008968] 
[   59.010444] The buggy address belongs to the physical page:
[   59.016001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.023985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.030496] page_type: f5(slab)
[   59.033629] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.041353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.049072] page dumped because: kasan: bad access detected
[   59.054627] 
[   59.056103] Memory state around the buggy address:
[   59.060882]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.068086]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.075291] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.082491]                                      ^
[   59.087269]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.094474]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.101676] ==================================================================
[   58.317374] ==================================================================
[   58.324431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   58.331809] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.339187] 
[   58.340666] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.340712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.340728] Hardware name: WinLink E850-96 board (DT)
[   58.340746] Call trace:
[   58.340759]  show_stack+0x20/0x38 (C)
[   58.340788]  dump_stack_lvl+0x8c/0xd0
[   58.340821]  print_report+0x118/0x608
[   58.340851]  kasan_report+0xdc/0x128
[   58.340880]  kasan_check_range+0x100/0x1a8
[   58.340911]  __kasan_check_write+0x20/0x30
[   58.340942]  kasan_atomics_helper+0x147c/0x4858
[   58.340971]  kasan_atomics+0x198/0x2e0
[   58.340997]  kunit_try_run_case+0x170/0x3f0
[   58.341033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.341070]  kthread+0x328/0x630
[   58.341102]  ret_from_fork+0x10/0x20
[   58.341134] 
[   58.410974] Allocated by task 314:
[   58.414359]  kasan_save_stack+0x3c/0x68
[   58.418179]  kasan_save_track+0x20/0x40
[   58.421998]  kasan_save_alloc_info+0x40/0x58
[   58.426251]  __kasan_kmalloc+0xd4/0xd8
[   58.429984]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.434497]  kasan_atomics+0xb8/0x2e0
[   58.438143]  kunit_try_run_case+0x170/0x3f0
[   58.442310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.447779]  kthread+0x328/0x630
[   58.450990]  ret_from_fork+0x10/0x20
[   58.454550] 
[   58.456025] The buggy address belongs to the object at ffff000803afab80
[   58.456025]  which belongs to the cache kmalloc-64 of size 64
[   58.468352] The buggy address is located 0 bytes to the right of
[   58.468352]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   58.481198] 
[   58.482674] The buggy address belongs to the physical page:
[   58.488230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   58.496216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.502725] page_type: f5(slab)
[   58.505860] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.513583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.521302] page dumped because: kasan: bad access detected
[   58.526857] 
[   58.528333] Memory state around the buggy address:
[   58.533112]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.540316]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.547521] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.554721]                                      ^
[   58.559499]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.566704]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.573905] ==================================================================
[   45.166488] ==================================================================
[   45.173591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   45.180877] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.188255] 
[   45.189742] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.189794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.189808] Hardware name: WinLink E850-96 board (DT)
[   45.189828] Call trace:
[   45.189839]  show_stack+0x20/0x38 (C)
[   45.189872]  dump_stack_lvl+0x8c/0xd0
[   45.189908]  print_report+0x118/0x608
[   45.189938]  kasan_report+0xdc/0x128
[   45.189968]  kasan_check_range+0x100/0x1a8
[   45.190000]  __kasan_check_write+0x20/0x30
[   45.190033]  kasan_atomics_helper+0x24c/0x4858
[   45.190061]  kasan_atomics+0x198/0x2e0
[   45.190090]  kunit_try_run_case+0x170/0x3f0
[   45.190124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.190163]  kthread+0x328/0x630
[   45.190197]  ret_from_fork+0x10/0x20
[   45.190231] 
[   45.259955] Allocated by task 314:
[   45.263341]  kasan_save_stack+0x3c/0x68
[   45.267161]  kasan_save_track+0x20/0x40
[   45.270980]  kasan_save_alloc_info+0x40/0x58
[   45.275233]  __kasan_kmalloc+0xd4/0xd8
[   45.278966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.283480]  kasan_atomics+0xb8/0x2e0
[   45.287125]  kunit_try_run_case+0x170/0x3f0
[   45.291292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.296761]  kthread+0x328/0x630
[   45.299972]  ret_from_fork+0x10/0x20
[   45.303532] 
[   45.305007] The buggy address belongs to the object at ffff000803afab80
[   45.305007]  which belongs to the cache kmalloc-64 of size 64
[   45.317333] The buggy address is located 0 bytes to the right of
[   45.317333]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.330181] 
[   45.331656] The buggy address belongs to the physical page:
[   45.337215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.345198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.351708] page_type: f5(slab)
[   45.354842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.362565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.370284] page dumped because: kasan: bad access detected
[   45.375839] 
[   45.377315] Memory state around the buggy address:
[   45.382096]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.389298]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.396504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.403704]                                      ^
[   45.408482]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.415687]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.422889] ==================================================================
[   51.482375] ==================================================================
[   51.489466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   51.496755] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   51.504133] 
[   51.505613] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   51.505659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.505674] Hardware name: WinLink E850-96 board (DT)
[   51.505695] Call trace:
[   51.505706]  show_stack+0x20/0x38 (C)
[   51.505736]  dump_stack_lvl+0x8c/0xd0
[   51.505769]  print_report+0x118/0x608
[   51.505799]  kasan_report+0xdc/0x128
[   51.505828]  kasan_check_range+0x100/0x1a8
[   51.505860]  __kasan_check_write+0x20/0x30
[   51.505891]  kasan_atomics_helper+0xb70/0x4858
[   51.505922]  kasan_atomics+0x198/0x2e0
[   51.505948]  kunit_try_run_case+0x170/0x3f0
[   51.505981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.506020]  kthread+0x328/0x630
[   51.506053]  ret_from_fork+0x10/0x20
[   51.506082] 
[   51.575833] Allocated by task 314:
[   51.579219]  kasan_save_stack+0x3c/0x68
[   51.583038]  kasan_save_track+0x20/0x40
[   51.586857]  kasan_save_alloc_info+0x40/0x58
[   51.591111]  __kasan_kmalloc+0xd4/0xd8
[   51.594843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.599357]  kasan_atomics+0xb8/0x2e0
[   51.603003]  kunit_try_run_case+0x170/0x3f0
[   51.607170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.612638]  kthread+0x328/0x630
[   51.615850]  ret_from_fork+0x10/0x20
[   51.619409] 
[   51.620884] The buggy address belongs to the object at ffff000803afab80
[   51.620884]  which belongs to the cache kmalloc-64 of size 64
[   51.633211] The buggy address is located 0 bytes to the right of
[   51.633211]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.646058] 
[   51.647534] The buggy address belongs to the physical page:
[   51.653089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.661075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.667585] page_type: f5(slab)
[   51.670718] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.678442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.686161] page dumped because: kasan: bad access detected
[   51.691717] 
[   51.693192] Memory state around the buggy address:
[   51.697971]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.705175]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.712380] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.719581]                                      ^
[   51.724359]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.731564]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.738765] ==================================================================
[   52.006545] ==================================================================
[   52.013590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   52.020879] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.028257] 
[   52.029739] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.029785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.029802] Hardware name: WinLink E850-96 board (DT)
[   52.029818] Call trace:
[   52.029830]  show_stack+0x20/0x38 (C)
[   52.029860]  dump_stack_lvl+0x8c/0xd0
[   52.029893]  print_report+0x118/0x608
[   52.029923]  kasan_report+0xdc/0x128
[   52.029952]  kasan_check_range+0x100/0x1a8
[   52.029982]  __kasan_check_write+0x20/0x30
[   52.030016]  kasan_atomics_helper+0xc08/0x4858
[   52.030046]  kasan_atomics+0x198/0x2e0
[   52.030074]  kunit_try_run_case+0x170/0x3f0
[   52.030108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.030146]  kthread+0x328/0x630
[   52.030180]  ret_from_fork+0x10/0x20
[   52.030211] 
[   52.099957] Allocated by task 314:
[   52.103343]  kasan_save_stack+0x3c/0x68
[   52.107162]  kasan_save_track+0x20/0x40
[   52.110981]  kasan_save_alloc_info+0x40/0x58
[   52.115235]  __kasan_kmalloc+0xd4/0xd8
[   52.118967]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.123481]  kasan_atomics+0xb8/0x2e0
[   52.127127]  kunit_try_run_case+0x170/0x3f0
[   52.131294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.136762]  kthread+0x328/0x630
[   52.139974]  ret_from_fork+0x10/0x20
[   52.143533] 
[   52.145010] The buggy address belongs to the object at ffff000803afab80
[   52.145010]  which belongs to the cache kmalloc-64 of size 64
[   52.157335] The buggy address is located 0 bytes to the right of
[   52.157335]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.170182] 
[   52.171658] The buggy address belongs to the physical page:
[   52.177213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.185199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.191710] page_type: f5(slab)
[   52.194842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.202567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.210285] page dumped because: kasan: bad access detected
[   52.215841] 
[   52.217316] Memory state around the buggy address:
[   52.222097]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.229300]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.236504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.243705]                                      ^
[   52.248483]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.255688]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.262889] ==================================================================
[   53.318454] ==================================================================
[   53.325548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   53.332925] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.340216] 
[   53.341697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.341743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.341761] Hardware name: WinLink E850-96 board (DT)
[   53.341779] Call trace:
[   53.341793]  show_stack+0x20/0x38 (C)
[   53.341825]  dump_stack_lvl+0x8c/0xd0
[   53.341858]  print_report+0x118/0x608
[   53.341886]  kasan_report+0xdc/0x128
[   53.341915]  __asan_report_load4_noabort+0x20/0x30
[   53.341949]  kasan_atomics_helper+0x3e04/0x4858
[   53.341980]  kasan_atomics+0x198/0x2e0
[   53.342007]  kunit_try_run_case+0x170/0x3f0
[   53.342041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.342079]  kthread+0x328/0x630
[   53.342110]  ret_from_fork+0x10/0x20
[   53.342140] 
[   53.408618] Allocated by task 314:
[   53.412004]  kasan_save_stack+0x3c/0x68
[   53.415823]  kasan_save_track+0x20/0x40
[   53.419642]  kasan_save_alloc_info+0x40/0x58
[   53.423896]  __kasan_kmalloc+0xd4/0xd8
[   53.427628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.432142]  kasan_atomics+0xb8/0x2e0
[   53.435788]  kunit_try_run_case+0x170/0x3f0
[   53.439955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.445423]  kthread+0x328/0x630
[   53.448635]  ret_from_fork+0x10/0x20
[   53.452194] 
[   53.453669] The buggy address belongs to the object at ffff000803afab80
[   53.453669]  which belongs to the cache kmalloc-64 of size 64
[   53.465996] The buggy address is located 0 bytes to the right of
[   53.465996]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   53.478843] 
[   53.480319] The buggy address belongs to the physical page:
[   53.485875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   53.493860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.500370] page_type: f5(slab)
[   53.503503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.511227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.518946] page dumped because: kasan: bad access detected
[   53.524502] 
[   53.525977] Memory state around the buggy address:
[   53.530755]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.537960]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.545165] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.552366]                                      ^
[   53.557144]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.564349]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.571550] ==================================================================
[   54.890853] ==================================================================
[   54.897922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   54.905210] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.912589] 
[   54.914069] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.914116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.914132] Hardware name: WinLink E850-96 board (DT)
[   54.914150] Call trace:
[   54.914160]  show_stack+0x20/0x38 (C)
[   54.914189]  dump_stack_lvl+0x8c/0xd0
[   54.914222]  print_report+0x118/0x608
[   54.914251]  kasan_report+0xdc/0x128
[   54.914280]  kasan_check_range+0x100/0x1a8
[   54.914311]  __kasan_check_write+0x20/0x30
[   54.914343]  kasan_atomics_helper+0xf20/0x4858
[   54.914371]  kasan_atomics+0x198/0x2e0
[   54.914399]  kunit_try_run_case+0x170/0x3f0
[   54.914434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.914473]  kthread+0x328/0x630
[   54.914506]  ret_from_fork+0x10/0x20
[   54.914537] 
[   54.984290] Allocated by task 314:
[   54.987674]  kasan_save_stack+0x3c/0x68
[   54.991494]  kasan_save_track+0x20/0x40
[   54.995313]  kasan_save_alloc_info+0x40/0x58
[   54.999567]  __kasan_kmalloc+0xd4/0xd8
[   55.003299]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.007813]  kasan_atomics+0xb8/0x2e0
[   55.011458]  kunit_try_run_case+0x170/0x3f0
[   55.015625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.021094]  kthread+0x328/0x630
[   55.024306]  ret_from_fork+0x10/0x20
[   55.027865] 
[   55.029340] The buggy address belongs to the object at ffff000803afab80
[   55.029340]  which belongs to the cache kmalloc-64 of size 64
[   55.041667] The buggy address is located 0 bytes to the right of
[   55.041667]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.054514] 
[   55.055990] The buggy address belongs to the physical page:
[   55.061545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.069531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.076041] page_type: f5(slab)
[   55.079174] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.086898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.094617] page dumped because: kasan: bad access detected
[   55.100172] 
[   55.101648] Memory state around the buggy address:
[   55.106427]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.113631]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.120836] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.128036]                                      ^
[   55.132814]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.140020]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.147221] ==================================================================
[   60.421504] ==================================================================
[   60.428566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   60.435943] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.443235] 
[   60.444716] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.444764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.444780] Hardware name: WinLink E850-96 board (DT)
[   60.444798] Call trace:
[   60.444811]  show_stack+0x20/0x38 (C)
[   60.444842]  dump_stack_lvl+0x8c/0xd0
[   60.444877]  print_report+0x118/0x608
[   60.444905]  kasan_report+0xdc/0x128
[   60.444935]  __asan_report_load8_noabort+0x20/0x30
[   60.444968]  kasan_atomics_helper+0x3e10/0x4858
[   60.444997]  kasan_atomics+0x198/0x2e0
[   60.445024]  kunit_try_run_case+0x170/0x3f0
[   60.445059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.445100]  kthread+0x328/0x630
[   60.445132]  ret_from_fork+0x10/0x20
[   60.445161] 
[   60.511636] Allocated by task 314:
[   60.515022]  kasan_save_stack+0x3c/0x68
[   60.518841]  kasan_save_track+0x20/0x40
[   60.522661]  kasan_save_alloc_info+0x40/0x58
[   60.526914]  __kasan_kmalloc+0xd4/0xd8
[   60.530647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.535160]  kasan_atomics+0xb8/0x2e0
[   60.538806]  kunit_try_run_case+0x170/0x3f0
[   60.542973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.548442]  kthread+0x328/0x630
[   60.551653]  ret_from_fork+0x10/0x20
[   60.555212] 
[   60.556688] The buggy address belongs to the object at ffff000803afab80
[   60.556688]  which belongs to the cache kmalloc-64 of size 64
[   60.569015] The buggy address is located 0 bytes to the right of
[   60.569015]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.581861] 
[   60.583337] The buggy address belongs to the physical page:
[   60.588893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.596878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.603389] page_type: f5(slab)
[   60.606523] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.614246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.621965] page dumped because: kasan: bad access detected
[   60.627520] 
[   60.628996] Memory state around the buggy address:
[   60.633775]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.640978]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.648183] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.655384]                                      ^
[   60.660162]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.667367]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.674568] ==================================================================
[   60.945771] ==================================================================
[   60.952866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   60.960241] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.967533] 
[   60.969014] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.969062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.969077] Hardware name: WinLink E850-96 board (DT)
[   60.969095] Call trace:
[   60.969106]  show_stack+0x20/0x38 (C)
[   60.969138]  dump_stack_lvl+0x8c/0xd0
[   60.969170]  print_report+0x118/0x608
[   60.969200]  kasan_report+0xdc/0x128
[   60.969229]  __asan_report_load8_noabort+0x20/0x30
[   60.969263]  kasan_atomics_helper+0x3e20/0x4858
[   60.969292]  kasan_atomics+0x198/0x2e0
[   60.969319]  kunit_try_run_case+0x170/0x3f0
[   60.969352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.969390]  kthread+0x328/0x630
[   60.969421]  ret_from_fork+0x10/0x20
[   60.969450] 
[   61.035934] Allocated by task 314:
[   61.039320]  kasan_save_stack+0x3c/0x68
[   61.043139]  kasan_save_track+0x20/0x40
[   61.046958]  kasan_save_alloc_info+0x40/0x58
[   61.051212]  __kasan_kmalloc+0xd4/0xd8
[   61.054944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.059458]  kasan_atomics+0xb8/0x2e0
[   61.063104]  kunit_try_run_case+0x170/0x3f0
[   61.067270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.072739]  kthread+0x328/0x630
[   61.075951]  ret_from_fork+0x10/0x20
[   61.079510] 
[   61.080986] The buggy address belongs to the object at ffff000803afab80
[   61.080986]  which belongs to the cache kmalloc-64 of size 64
[   61.093312] The buggy address is located 0 bytes to the right of
[   61.093312]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   61.106159] 
[   61.107634] The buggy address belongs to the physical page:
[   61.113191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   61.121176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.127686] page_type: f5(slab)
[   61.130819] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.138544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.146262] page dumped because: kasan: bad access detected
[   61.151818] 
[   61.153293] Memory state around the buggy address:
[   61.158072]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.165276]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.172481] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.179682]                                      ^
[   61.184460]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.191665]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.198866] ==================================================================
[   57.793044] ==================================================================
[   57.800134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   57.807511] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.814802] 
[   57.816281] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.816327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.816343] Hardware name: WinLink E850-96 board (DT)
[   57.816360] Call trace:
[   57.816370]  show_stack+0x20/0x38 (C)
[   57.816401]  dump_stack_lvl+0x8c/0xd0
[   57.816433]  print_report+0x118/0x608
[   57.816464]  kasan_report+0xdc/0x128
[   57.816494]  __asan_report_load8_noabort+0x20/0x30
[   57.816527]  kasan_atomics_helper+0x3f04/0x4858
[   57.816555]  kasan_atomics+0x198/0x2e0
[   57.816583]  kunit_try_run_case+0x170/0x3f0
[   57.816615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.816653]  kthread+0x328/0x630
[   57.816686]  ret_from_fork+0x10/0x20
[   57.816717] 
[   57.883203] Allocated by task 314:
[   57.886589]  kasan_save_stack+0x3c/0x68
[   57.890408]  kasan_save_track+0x20/0x40
[   57.894228]  kasan_save_alloc_info+0x40/0x58
[   57.898481]  __kasan_kmalloc+0xd4/0xd8
[   57.902214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.906728]  kasan_atomics+0xb8/0x2e0
[   57.910374]  kunit_try_run_case+0x170/0x3f0
[   57.914540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.920009]  kthread+0x328/0x630
[   57.923220]  ret_from_fork+0x10/0x20
[   57.926779] 
[   57.928255] The buggy address belongs to the object at ffff000803afab80
[   57.928255]  which belongs to the cache kmalloc-64 of size 64
[   57.940582] The buggy address is located 0 bytes to the right of
[   57.940582]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.953429] 
[   57.954904] The buggy address belongs to the physical page:
[   57.960460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.968446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.974956] page_type: f5(slab)
[   57.978089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.985813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.993532] page dumped because: kasan: bad access detected
[   57.999087] 
[   58.000563] Memory state around the buggy address:
[   58.005341]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.012546]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.019752] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.026952]                                      ^
[   58.031730]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.038934]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.046136] ==================================================================
[   44.903038] ==================================================================
[   44.910055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   44.917342] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   44.924632] 
[   44.926116] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.926172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.926188] Hardware name: WinLink E850-96 board (DT)
[   44.926210] Call trace:
[   44.926224]  show_stack+0x20/0x38 (C)
[   44.926259]  dump_stack_lvl+0x8c/0xd0
[   44.926298]  print_report+0x118/0x608
[   44.926329]  kasan_report+0xdc/0x128
[   44.926358]  kasan_check_range+0x100/0x1a8
[   44.926390]  __kasan_check_read+0x20/0x30
[   44.926421]  kasan_atomics_helper+0x1ec/0x4858
[   44.926451]  kasan_atomics+0x198/0x2e0
[   44.926480]  kunit_try_run_case+0x170/0x3f0
[   44.926518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.926558]  kthread+0x328/0x630
[   44.926592]  ret_from_fork+0x10/0x20
[   44.926626] 
[   44.996244] Allocated by task 314:
[   44.999634]  kasan_save_stack+0x3c/0x68
[   45.003449]  kasan_save_track+0x20/0x40
[   45.007269]  kasan_save_alloc_info+0x40/0x58
[   45.011522]  __kasan_kmalloc+0xd4/0xd8
[   45.015255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.019768]  kasan_atomics+0xb8/0x2e0
[   45.023416]  kunit_try_run_case+0x170/0x3f0
[   45.027581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.033049]  kthread+0x328/0x630
[   45.036261]  ret_from_fork+0x10/0x20
[   45.039820] 
[   45.041296] The buggy address belongs to the object at ffff000803afab80
[   45.041296]  which belongs to the cache kmalloc-64 of size 64
[   45.053623] The buggy address is located 0 bytes to the right of
[   45.053623]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.066469] 
[   45.067948] The buggy address belongs to the physical page:
[   45.073505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.081488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.087997] page_type: f5(slab)
[   45.091133] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.098854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.106573] page dumped because: kasan: bad access detected
[   45.112128] 
[   45.113603] Memory state around the buggy address:
[   45.118385]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.125588]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.132792] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.139992]                                      ^
[   45.144771]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.151975]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.159178] ==================================================================
[   45.954234] ==================================================================
[   45.961252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   45.968539] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.975917] 
[   45.977400] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.977450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.977465] Hardware name: WinLink E850-96 board (DT)
[   45.977486] Call trace:
[   45.977499]  show_stack+0x20/0x38 (C)
[   45.977533]  dump_stack_lvl+0x8c/0xd0
[   45.977566]  print_report+0x118/0x608
[   45.977598]  kasan_report+0xdc/0x128
[   45.977627]  kasan_check_range+0x100/0x1a8
[   45.977659]  __kasan_check_write+0x20/0x30
[   45.977691]  kasan_atomics_helper+0x32c/0x4858
[   45.977721]  kasan_atomics+0x198/0x2e0
[   45.977748]  kunit_try_run_case+0x170/0x3f0
[   45.977784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.977821]  kthread+0x328/0x630
[   45.977854]  ret_from_fork+0x10/0x20
[   45.977886] 
[   46.047617] Allocated by task 314:
[   46.051005]  kasan_save_stack+0x3c/0x68
[   46.054822]  kasan_save_track+0x20/0x40
[   46.058642]  kasan_save_alloc_info+0x40/0x58
[   46.062895]  __kasan_kmalloc+0xd4/0xd8
[   46.066628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.071141]  kasan_atomics+0xb8/0x2e0
[   46.074787]  kunit_try_run_case+0x170/0x3f0
[   46.078954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.084422]  kthread+0x328/0x630
[   46.087634]  ret_from_fork+0x10/0x20
[   46.091193] 
[   46.092669] The buggy address belongs to the object at ffff000803afab80
[   46.092669]  which belongs to the cache kmalloc-64 of size 64
[   46.104996] The buggy address is located 0 bytes to the right of
[   46.104996]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.117842] 
[   46.119319] The buggy address belongs to the physical page:
[   46.124875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.132859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.139370] page_type: f5(slab)
[   46.142506] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.150227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.157946] page dumped because: kasan: bad access detected
[   46.163501] 
[   46.164976] Memory state around the buggy address:
[   46.169757]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.176960]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.184166] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.191365]                                      ^
[   46.196143]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.203348]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.210549] ==================================================================
[   58.053455] ==================================================================
[   58.060548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   58.067923] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.075302] 
[   58.076781] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.076829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.076844] Hardware name: WinLink E850-96 board (DT)
[   58.076861] Call trace:
[   58.076873]  show_stack+0x20/0x38 (C)
[   58.076903]  dump_stack_lvl+0x8c/0xd0
[   58.076936]  print_report+0x118/0x608
[   58.076966]  kasan_report+0xdc/0x128
[   58.076994]  kasan_check_range+0x100/0x1a8
[   58.077024]  __kasan_check_write+0x20/0x30
[   58.077056]  kasan_atomics_helper+0x1414/0x4858
[   58.077084]  kasan_atomics+0x198/0x2e0
[   58.077111]  kunit_try_run_case+0x170/0x3f0
[   58.077143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.077181]  kthread+0x328/0x630
[   58.077214]  ret_from_fork+0x10/0x20
[   58.077244] 
[   58.147089] Allocated by task 314:
[   58.150474]  kasan_save_stack+0x3c/0x68
[   58.154293]  kasan_save_track+0x20/0x40
[   58.158113]  kasan_save_alloc_info+0x40/0x58
[   58.162366]  __kasan_kmalloc+0xd4/0xd8
[   58.166099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.170613]  kasan_atomics+0xb8/0x2e0
[   58.174258]  kunit_try_run_case+0x170/0x3f0
[   58.178425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.183894]  kthread+0x328/0x630
[   58.187105]  ret_from_fork+0x10/0x20
[   58.190664] 
[   58.192140] The buggy address belongs to the object at ffff000803afab80
[   58.192140]  which belongs to the cache kmalloc-64 of size 64
[   58.204467] The buggy address is located 0 bytes to the right of
[   58.204467]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   58.217313] 
[   58.218789] The buggy address belongs to the physical page:
[   58.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   58.232331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.238841] page_type: f5(slab)
[   58.241973] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.249698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.257417] page dumped because: kasan: bad access detected
[   58.262972] 
[   58.264448] Memory state around the buggy address:
[   58.269227]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.276431]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.283636] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.290837]                                      ^
[   58.295615]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.302820]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.310020] ==================================================================
[   59.633321] ==================================================================
[   59.640385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   59.647761] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.655139] 
[   59.656619] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.656664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.656679] Hardware name: WinLink E850-96 board (DT)
[   59.656697] Call trace:
[   59.656711]  show_stack+0x20/0x38 (C)
[   59.656743]  dump_stack_lvl+0x8c/0xd0
[   59.656774]  print_report+0x118/0x608
[   59.656801]  kasan_report+0xdc/0x128
[   59.656829]  kasan_check_range+0x100/0x1a8
[   59.656858]  __kasan_check_write+0x20/0x30
[   59.656890]  kasan_atomics_helper+0x1644/0x4858
[   59.656919]  kasan_atomics+0x198/0x2e0
[   59.656946]  kunit_try_run_case+0x170/0x3f0
[   59.656981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.657019]  kthread+0x328/0x630
[   59.657052]  ret_from_fork+0x10/0x20
[   59.657084] 
[   59.726926] Allocated by task 314:
[   59.730312]  kasan_save_stack+0x3c/0x68
[   59.734131]  kasan_save_track+0x20/0x40
[   59.737950]  kasan_save_alloc_info+0x40/0x58
[   59.742204]  __kasan_kmalloc+0xd4/0xd8
[   59.745936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.750450]  kasan_atomics+0xb8/0x2e0
[   59.754096]  kunit_try_run_case+0x170/0x3f0
[   59.758262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.763731]  kthread+0x328/0x630
[   59.766943]  ret_from_fork+0x10/0x20
[   59.770502] 
[   59.771977] The buggy address belongs to the object at ffff000803afab80
[   59.771977]  which belongs to the cache kmalloc-64 of size 64
[   59.784304] The buggy address is located 0 bytes to the right of
[   59.784304]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.797151] 
[   59.798627] The buggy address belongs to the physical page:
[   59.804182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.812168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.818678] page_type: f5(slab)
[   59.821811] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.829535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.837254] page dumped because: kasan: bad access detected
[   59.842809] 
[   59.844285] Memory state around the buggy address:
[   59.849065]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.856268]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.863473] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.870674]                                      ^
[   59.875452]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.882657]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.889858] ==================================================================
[   49.903416] ==================================================================
[   49.910495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   49.917785] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.925164] 
[   49.926646] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.926691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.926707] Hardware name: WinLink E850-96 board (DT)
[   49.926728] Call trace:
[   49.926740]  show_stack+0x20/0x38 (C)
[   49.926771]  dump_stack_lvl+0x8c/0xd0
[   49.926805]  print_report+0x118/0x608
[   49.926833]  kasan_report+0xdc/0x128
[   49.926862]  kasan_check_range+0x100/0x1a8
[   49.926894]  __kasan_check_write+0x20/0x30
[   49.926925]  kasan_atomics_helper+0x934/0x4858
[   49.926956]  kasan_atomics+0x198/0x2e0
[   49.926981]  kunit_try_run_case+0x170/0x3f0
[   49.927014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.927052]  kthread+0x328/0x630
[   49.927083]  ret_from_fork+0x10/0x20
[   49.927115] 
[   49.996864] Allocated by task 314:
[   50.000249]  kasan_save_stack+0x3c/0x68
[   50.004069]  kasan_save_track+0x20/0x40
[   50.007888]  kasan_save_alloc_info+0x40/0x58
[   50.012141]  __kasan_kmalloc+0xd4/0xd8
[   50.015874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.020388]  kasan_atomics+0xb8/0x2e0
[   50.024034]  kunit_try_run_case+0x170/0x3f0
[   50.028200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.033669]  kthread+0x328/0x630
[   50.036881]  ret_from_fork+0x10/0x20
[   50.040440] 
[   50.041915] The buggy address belongs to the object at ffff000803afab80
[   50.041915]  which belongs to the cache kmalloc-64 of size 64
[   50.054242] The buggy address is located 0 bytes to the right of
[   50.054242]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.067088] 
[   50.068566] The buggy address belongs to the physical page:
[   50.074120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.082106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.088616] page_type: f5(slab)
[   50.091749] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.099473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.107192] page dumped because: kasan: bad access detected
[   50.112747] 
[   50.114223] Memory state around the buggy address:
[   50.119003]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.126206]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.133411] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.140612]                                      ^
[   50.145390]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.152595]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.159797] ==================================================================
[   51.746082] ==================================================================
[   51.753176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   51.760553] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   51.767844] 
[   51.769323] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   51.769367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.769382] Hardware name: WinLink E850-96 board (DT)
[   51.769403] Call trace:
[   51.769415]  show_stack+0x20/0x38 (C)
[   51.769446]  dump_stack_lvl+0x8c/0xd0
[   51.769478]  print_report+0x118/0x608
[   51.769508]  kasan_report+0xdc/0x128
[   51.769539]  __asan_report_load4_noabort+0x20/0x30
[   51.769571]  kasan_atomics_helper+0x3dbc/0x4858
[   51.769600]  kasan_atomics+0x198/0x2e0
[   51.769627]  kunit_try_run_case+0x170/0x3f0
[   51.769662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.769700]  kthread+0x328/0x630
[   51.769733]  ret_from_fork+0x10/0x20
[   51.769762] 
[   51.836246] Allocated by task 314:
[   51.839631]  kasan_save_stack+0x3c/0x68
[   51.843451]  kasan_save_track+0x20/0x40
[   51.847270]  kasan_save_alloc_info+0x40/0x58
[   51.851524]  __kasan_kmalloc+0xd4/0xd8
[   51.855256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.859770]  kasan_atomics+0xb8/0x2e0
[   51.863416]  kunit_try_run_case+0x170/0x3f0
[   51.867582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.873051]  kthread+0x328/0x630
[   51.876263]  ret_from_fork+0x10/0x20
[   51.879821] 
[   51.881297] The buggy address belongs to the object at ffff000803afab80
[   51.881297]  which belongs to the cache kmalloc-64 of size 64
[   51.893624] The buggy address is located 0 bytes to the right of
[   51.893624]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.906471] 
[   51.907946] The buggy address belongs to the physical page:
[   51.913504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.921488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.927998] page_type: f5(slab)
[   51.931131] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.938855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.946574] page dumped because: kasan: bad access detected
[   51.952129] 
[   51.953605] Memory state around the buggy address:
[   51.958383]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.965588]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.972793] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.979994]                                      ^
[   51.984772]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.991977]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.999178] ==================================================================
[   52.270236] ==================================================================
[   52.277301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   52.284677] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.291968] 
[   52.293449] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.293493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.293507] Hardware name: WinLink E850-96 board (DT)
[   52.293523] Call trace:
[   52.293536]  show_stack+0x20/0x38 (C)
[   52.293566]  dump_stack_lvl+0x8c/0xd0
[   52.293598]  print_report+0x118/0x608
[   52.293628]  kasan_report+0xdc/0x128
[   52.293657]  __asan_report_load4_noabort+0x20/0x30
[   52.293692]  kasan_atomics_helper+0x3de4/0x4858
[   52.293721]  kasan_atomics+0x198/0x2e0
[   52.293748]  kunit_try_run_case+0x170/0x3f0
[   52.293782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.293820]  kthread+0x328/0x630
[   52.293852]  ret_from_fork+0x10/0x20
[   52.293884] 
[   52.360370] Allocated by task 314:
[   52.363755]  kasan_save_stack+0x3c/0x68
[   52.367575]  kasan_save_track+0x20/0x40
[   52.371394]  kasan_save_alloc_info+0x40/0x58
[   52.375648]  __kasan_kmalloc+0xd4/0xd8
[   52.379380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.383894]  kasan_atomics+0xb8/0x2e0
[   52.387540]  kunit_try_run_case+0x170/0x3f0
[   52.391707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.397175]  kthread+0x328/0x630
[   52.400387]  ret_from_fork+0x10/0x20
[   52.403946] 
[   52.405421] The buggy address belongs to the object at ffff000803afab80
[   52.405421]  which belongs to the cache kmalloc-64 of size 64
[   52.417748] The buggy address is located 0 bytes to the right of
[   52.417748]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.430595] 
[   52.432071] The buggy address belongs to the physical page:
[   52.437626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.445612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.452122] page_type: f5(slab)
[   52.455255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.462979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.470698] page dumped because: kasan: bad access detected
[   52.476253] 
[   52.477729] Memory state around the buggy address:
[   52.482510]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.489712]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.496917] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.504118]                                      ^
[   52.508896]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.516100]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.523302] ==================================================================
[   59.109019] ==================================================================
[   59.116086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   59.123463] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.130841] 
[   59.132321] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.132366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.132384] Hardware name: WinLink E850-96 board (DT)
[   59.132402] Call trace:
[   59.132414]  show_stack+0x20/0x38 (C)
[   59.132443]  dump_stack_lvl+0x8c/0xd0
[   59.132477]  print_report+0x118/0x608
[   59.132507]  kasan_report+0xdc/0x128
[   59.132536]  kasan_check_range+0x100/0x1a8
[   59.132568]  __kasan_check_write+0x20/0x30
[   59.132600]  kasan_atomics_helper+0x15b4/0x4858
[   59.132629]  kasan_atomics+0x198/0x2e0
[   59.132655]  kunit_try_run_case+0x170/0x3f0
[   59.132690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.132729]  kthread+0x328/0x630
[   59.132762]  ret_from_fork+0x10/0x20
[   59.132792] 
[   59.202629] Allocated by task 314:
[   59.206014]  kasan_save_stack+0x3c/0x68
[   59.209833]  kasan_save_track+0x20/0x40
[   59.213653]  kasan_save_alloc_info+0x40/0x58
[   59.217906]  __kasan_kmalloc+0xd4/0xd8
[   59.221639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.226152]  kasan_atomics+0xb8/0x2e0
[   59.229798]  kunit_try_run_case+0x170/0x3f0
[   59.233965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.239433]  kthread+0x328/0x630
[   59.242645]  ret_from_fork+0x10/0x20
[   59.246204] 
[   59.247680] The buggy address belongs to the object at ffff000803afab80
[   59.247680]  which belongs to the cache kmalloc-64 of size 64
[   59.260007] The buggy address is located 0 bytes to the right of
[   59.260007]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.272853] 
[   59.274329] The buggy address belongs to the physical page:
[   59.279885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.287871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.294381] page_type: f5(slab)
[   59.297513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.305238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.312956] page dumped because: kasan: bad access detected
[   59.318512] 
[   59.319988] Memory state around the buggy address:
[   59.324767]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.331970]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.339176] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.346376]                                      ^
[   59.351154]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.358359]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.365560] ==================================================================
[   50.430857] ==================================================================
[   50.437917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   50.445208] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.452586] 
[   50.454067] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.454115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.454129] Hardware name: WinLink E850-96 board (DT)
[   50.454148] Call trace:
[   50.454159]  show_stack+0x20/0x38 (C)
[   50.454189]  dump_stack_lvl+0x8c/0xd0
[   50.454220]  print_report+0x118/0x608
[   50.454251]  kasan_report+0xdc/0x128
[   50.454279]  kasan_check_range+0x100/0x1a8
[   50.454310]  __kasan_check_write+0x20/0x30
[   50.454342]  kasan_atomics_helper+0xa04/0x4858
[   50.454372]  kasan_atomics+0x198/0x2e0
[   50.454399]  kunit_try_run_case+0x170/0x3f0
[   50.454434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.454470]  kthread+0x328/0x630
[   50.454502]  ret_from_fork+0x10/0x20
[   50.454532] 
[   50.524286] Allocated by task 314:
[   50.527673]  kasan_save_stack+0x3c/0x68
[   50.531491]  kasan_save_track+0x20/0x40
[   50.535311]  kasan_save_alloc_info+0x40/0x58
[   50.539564]  __kasan_kmalloc+0xd4/0xd8
[   50.543296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.547810]  kasan_atomics+0xb8/0x2e0
[   50.551456]  kunit_try_run_case+0x170/0x3f0
[   50.555623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.561092]  kthread+0x328/0x630
[   50.564303]  ret_from_fork+0x10/0x20
[   50.567862] 
[   50.569338] The buggy address belongs to the object at ffff000803afab80
[   50.569338]  which belongs to the cache kmalloc-64 of size 64
[   50.581664] The buggy address is located 0 bytes to the right of
[   50.581664]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.594511] 
[   50.595987] The buggy address belongs to the physical page:
[   50.601543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.609528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.616039] page_type: f5(slab)
[   50.619171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.626896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.634615] page dumped because: kasan: bad access detected
[   50.640170] 
[   50.641646] Memory state around the buggy address:
[   50.646427]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.653629]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.660834] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.668035]                                      ^
[   50.672812]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.680017]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.687219] ==================================================================
[   55.945899] ==================================================================
[   55.952940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   55.960316] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.967694] 
[   55.969175] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.969219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.969233] Hardware name: WinLink E850-96 board (DT)
[   55.969252] Call trace:
[   55.969265]  show_stack+0x20/0x38 (C)
[   55.969297]  dump_stack_lvl+0x8c/0xd0
[   55.969330]  print_report+0x118/0x608
[   55.969358]  kasan_report+0xdc/0x128
[   55.969387]  kasan_check_range+0x100/0x1a8
[   55.969419]  __kasan_check_write+0x20/0x30
[   55.969449]  kasan_atomics_helper+0x10c0/0x4858
[   55.969479]  kasan_atomics+0x198/0x2e0
[   55.969504]  kunit_try_run_case+0x170/0x3f0
[   55.969539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.969577]  kthread+0x328/0x630
[   55.969607]  ret_from_fork+0x10/0x20
[   55.969637] 
[   56.039481] Allocated by task 314:
[   56.042867]  kasan_save_stack+0x3c/0x68
[   56.046686]  kasan_save_track+0x20/0x40
[   56.050506]  kasan_save_alloc_info+0x40/0x58
[   56.054759]  __kasan_kmalloc+0xd4/0xd8
[   56.058491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.063005]  kasan_atomics+0xb8/0x2e0
[   56.066651]  kunit_try_run_case+0x170/0x3f0
[   56.070818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.076286]  kthread+0x328/0x630
[   56.079498]  ret_from_fork+0x10/0x20
[   56.083057] 
[   56.084532] The buggy address belongs to the object at ffff000803afab80
[   56.084532]  which belongs to the cache kmalloc-64 of size 64
[   56.096860] The buggy address is located 0 bytes to the right of
[   56.096860]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.109706] 
[   56.111182] The buggy address belongs to the physical page:
[   56.116738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.124723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.131234] page_type: f5(slab)
[   56.134366] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.142091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.149810] page dumped because: kasan: bad access detected
[   56.155365] 
[   56.156841] Memory state around the buggy address:
[   56.161620]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.168824]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.176028] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.183229]                                      ^
[   56.188007]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.195212]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.202413] ==================================================================
[   56.473640] ==================================================================
[   56.480709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   56.488086] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   56.495464] 
[   56.496944] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   56.496991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.497007] Hardware name: WinLink E850-96 board (DT)
[   56.497027] Call trace:
[   56.497038]  show_stack+0x20/0x38 (C)
[   56.497069]  dump_stack_lvl+0x8c/0xd0
[   56.497102]  print_report+0x118/0x608
[   56.497130]  kasan_report+0xdc/0x128
[   56.497159]  kasan_check_range+0x100/0x1a8
[   56.497190]  __kasan_check_write+0x20/0x30
[   56.497221]  kasan_atomics_helper+0x1190/0x4858
[   56.497250]  kasan_atomics+0x198/0x2e0
[   56.497277]  kunit_try_run_case+0x170/0x3f0
[   56.497312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.497349]  kthread+0x328/0x630
[   56.497379]  ret_from_fork+0x10/0x20
[   56.497412] 
[   56.567251] Allocated by task 314:
[   56.570637]  kasan_save_stack+0x3c/0x68
[   56.574456]  kasan_save_track+0x20/0x40
[   56.578275]  kasan_save_alloc_info+0x40/0x58
[   56.582529]  __kasan_kmalloc+0xd4/0xd8
[   56.586261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.590775]  kasan_atomics+0xb8/0x2e0
[   56.594421]  kunit_try_run_case+0x170/0x3f0
[   56.598587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.604056]  kthread+0x328/0x630
[   56.607268]  ret_from_fork+0x10/0x20
[   56.610827] 
[   56.612303] The buggy address belongs to the object at ffff000803afab80
[   56.612303]  which belongs to the cache kmalloc-64 of size 64
[   56.624629] The buggy address is located 0 bytes to the right of
[   56.624629]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.637476] 
[   56.638952] The buggy address belongs to the physical page:
[   56.644508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.652493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.659004] page_type: f5(slab)
[   56.662138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.669861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.677580] page dumped because: kasan: bad access detected
[   56.683135] 
[   56.684610] Memory state around the buggy address:
[   56.689390]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.696594]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.703798] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.710999]                                      ^
[   56.715777]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.722982]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.730183] ==================================================================
[   47.797043] ==================================================================
[   47.804103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   47.811393] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.818772] 
[   47.820253] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.820301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.820318] Hardware name: WinLink E850-96 board (DT)
[   47.820335] Call trace:
[   47.820347]  show_stack+0x20/0x38 (C)
[   47.820377]  dump_stack_lvl+0x8c/0xd0
[   47.820412]  print_report+0x118/0x608
[   47.820443]  kasan_report+0xdc/0x128
[   47.820473]  kasan_check_range+0x100/0x1a8
[   47.820504]  __kasan_check_write+0x20/0x30
[   47.820536]  kasan_atomics_helper+0x5b4/0x4858
[   47.820566]  kasan_atomics+0x198/0x2e0
[   47.820593]  kunit_try_run_case+0x170/0x3f0
[   47.820628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.820665]  kthread+0x328/0x630
[   47.820699]  ret_from_fork+0x10/0x20
[   47.820731] 
[   47.890472] Allocated by task 314:
[   47.893857]  kasan_save_stack+0x3c/0x68
[   47.897677]  kasan_save_track+0x20/0x40
[   47.901496]  kasan_save_alloc_info+0x40/0x58
[   47.905749]  __kasan_kmalloc+0xd4/0xd8
[   47.909482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.913996]  kasan_atomics+0xb8/0x2e0
[   47.917642]  kunit_try_run_case+0x170/0x3f0
[   47.921808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.927277]  kthread+0x328/0x630
[   47.930489]  ret_from_fork+0x10/0x20
[   47.934047] 
[   47.935523] The buggy address belongs to the object at ffff000803afab80
[   47.935523]  which belongs to the cache kmalloc-64 of size 64
[   47.947850] The buggy address is located 0 bytes to the right of
[   47.947850]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.960697] 
[   47.962174] The buggy address belongs to the physical page:
[   47.967728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.975714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.982224] page_type: f5(slab)
[   47.985357] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.993081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.000800] page dumped because: kasan: bad access detected
[   48.006355] 
[   48.007831] Memory state around the buggy address:
[   48.012609]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.019814]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.027019] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.034220]                                      ^
[   48.038998]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.046202]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.053403] ==================================================================
[   45.693725] ==================================================================
[   45.700837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   45.708213] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.715505] 
[   45.716988] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.717035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.717052] Hardware name: WinLink E850-96 board (DT)
[   45.717071] Call trace:
[   45.717085]  show_stack+0x20/0x38 (C)
[   45.717119]  dump_stack_lvl+0x8c/0xd0
[   45.717151]  print_report+0x118/0x608
[   45.717179]  kasan_report+0xdc/0x128
[   45.717209]  __asan_report_load4_noabort+0x20/0x30
[   45.717244]  kasan_atomics_helper+0x40fc/0x4858
[   45.717274]  kasan_atomics+0x198/0x2e0
[   45.717301]  kunit_try_run_case+0x170/0x3f0
[   45.717334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.717373]  kthread+0x328/0x630
[   45.717403]  ret_from_fork+0x10/0x20
[   45.717437] 
[   45.783906] Allocated by task 314:
[   45.787292]  kasan_save_stack+0x3c/0x68
[   45.791111]  kasan_save_track+0x20/0x40
[   45.794931]  kasan_save_alloc_info+0x40/0x58
[   45.799184]  __kasan_kmalloc+0xd4/0xd8
[   45.802917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.807430]  kasan_atomics+0xb8/0x2e0
[   45.811076]  kunit_try_run_case+0x170/0x3f0
[   45.815243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.820711]  kthread+0x328/0x630
[   45.823923]  ret_from_fork+0x10/0x20
[   45.827482] 
[   45.828958] The buggy address belongs to the object at ffff000803afab80
[   45.828958]  which belongs to the cache kmalloc-64 of size 64
[   45.841285] The buggy address is located 0 bytes to the right of
[   45.841285]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.854131] 
[   45.855607] The buggy address belongs to the physical page:
[   45.861164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.869148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.875658] page_type: f5(slab)
[   45.878791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.886516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.894235] page dumped because: kasan: bad access detected
[   45.899790] 
[   45.901265] Memory state around the buggy address:
[   45.906046]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.913248]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.920455] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.927654]                                      ^
[   45.932432]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.939637]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.946840] ==================================================================
[   49.115617] ==================================================================
[   49.122660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   49.129950] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.137328] 
[   49.138811] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.138857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.138872] Hardware name: WinLink E850-96 board (DT)
[   49.138890] Call trace:
[   49.138901]  show_stack+0x20/0x38 (C)
[   49.138931]  dump_stack_lvl+0x8c/0xd0
[   49.138964]  print_report+0x118/0x608
[   49.138994]  kasan_report+0xdc/0x128
[   49.139022]  kasan_check_range+0x100/0x1a8
[   49.139052]  __kasan_check_write+0x20/0x30
[   49.139084]  kasan_atomics_helper+0x7cc/0x4858
[   49.139113]  kasan_atomics+0x198/0x2e0
[   49.139139]  kunit_try_run_case+0x170/0x3f0
[   49.139173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.139212]  kthread+0x328/0x630
[   49.139245]  ret_from_fork+0x10/0x20
[   49.139275] 
[   49.209029] Allocated by task 314:
[   49.212414]  kasan_save_stack+0x3c/0x68
[   49.216233]  kasan_save_track+0x20/0x40
[   49.220053]  kasan_save_alloc_info+0x40/0x58
[   49.224306]  __kasan_kmalloc+0xd4/0xd8
[   49.228039]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.232552]  kasan_atomics+0xb8/0x2e0
[   49.236198]  kunit_try_run_case+0x170/0x3f0
[   49.240364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.245833]  kthread+0x328/0x630
[   49.249045]  ret_from_fork+0x10/0x20
[   49.252604] 
[   49.254079] The buggy address belongs to the object at ffff000803afab80
[   49.254079]  which belongs to the cache kmalloc-64 of size 64
[   49.266406] The buggy address is located 0 bytes to the right of
[   49.266406]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.279253] 
[   49.280729] The buggy address belongs to the physical page:
[   49.286285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.294270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.300781] page_type: f5(slab)
[   49.303913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.311638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.319357] page dumped because: kasan: bad access detected
[   49.324912] 
[   49.326387] Memory state around the buggy address:
[   49.331166]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.338371]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.345575] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.352776]                                      ^
[   49.357554]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.364759]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.371962] ==================================================================
[   60.157639] ==================================================================
[   60.164682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   60.172059] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.179437] 
[   60.180918] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.180964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.180981] Hardware name: WinLink E850-96 board (DT)
[   60.180998] Call trace:
[   60.181010]  show_stack+0x20/0x38 (C)
[   60.181039]  dump_stack_lvl+0x8c/0xd0
[   60.181073]  print_report+0x118/0x608
[   60.181100]  kasan_report+0xdc/0x128
[   60.181130]  kasan_check_range+0x100/0x1a8
[   60.181162]  __kasan_check_write+0x20/0x30
[   60.181194]  kasan_atomics_helper+0x16d0/0x4858
[   60.181223]  kasan_atomics+0x198/0x2e0
[   60.181251]  kunit_try_run_case+0x170/0x3f0
[   60.181285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.181323]  kthread+0x328/0x630
[   60.181354]  ret_from_fork+0x10/0x20
[   60.181387] 
[   60.251224] Allocated by task 314:
[   60.254611]  kasan_save_stack+0x3c/0x68
[   60.258428]  kasan_save_track+0x20/0x40
[   60.262248]  kasan_save_alloc_info+0x40/0x58
[   60.266501]  __kasan_kmalloc+0xd4/0xd8
[   60.270234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.274748]  kasan_atomics+0xb8/0x2e0
[   60.278393]  kunit_try_run_case+0x170/0x3f0
[   60.282560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.288029]  kthread+0x328/0x630
[   60.291240]  ret_from_fork+0x10/0x20
[   60.294800] 
[   60.296275] The buggy address belongs to the object at ffff000803afab80
[   60.296275]  which belongs to the cache kmalloc-64 of size 64
[   60.308602] The buggy address is located 0 bytes to the right of
[   60.308602]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.321448] 
[   60.322925] The buggy address belongs to the physical page:
[   60.328480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.336466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.342976] page_type: f5(slab)
[   60.346108] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.353833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.361552] page dumped because: kasan: bad access detected
[   60.367107] 
[   60.368583] Memory state around the buggy address:
[   60.373361]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.380566]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.387771] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.394972]                                      ^
[   60.399750]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.406954]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.414155] ==================================================================
[   45.430204] ==================================================================
[   45.437301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   45.444589] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.451880] 
[   45.453365] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.453413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.453430] Hardware name: WinLink E850-96 board (DT)
[   45.453448] Call trace:
[   45.453463]  show_stack+0x20/0x38 (C)
[   45.453496]  dump_stack_lvl+0x8c/0xd0
[   45.453529]  print_report+0x118/0x608
[   45.453563]  kasan_report+0xdc/0x128
[   45.453589]  kasan_check_range+0x100/0x1a8
[   45.453621]  __kasan_check_read+0x20/0x30
[   45.453652]  kasan_atomics_helper+0x2b0/0x4858
[   45.453681]  kasan_atomics+0x198/0x2e0
[   45.453708]  kunit_try_run_case+0x170/0x3f0
[   45.453743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.453782]  kthread+0x328/0x630
[   45.453815]  ret_from_fork+0x10/0x20
[   45.453848] 
[   45.523493] Allocated by task 314:
[   45.526881]  kasan_save_stack+0x3c/0x68
[   45.530698]  kasan_save_track+0x20/0x40
[   45.534518]  kasan_save_alloc_info+0x40/0x58
[   45.538771]  __kasan_kmalloc+0xd4/0xd8
[   45.542504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.547017]  kasan_atomics+0xb8/0x2e0
[   45.550663]  kunit_try_run_case+0x170/0x3f0
[   45.554830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.560298]  kthread+0x328/0x630
[   45.563510]  ret_from_fork+0x10/0x20
[   45.567069] 
[   45.568545] The buggy address belongs to the object at ffff000803afab80
[   45.568545]  which belongs to the cache kmalloc-64 of size 64
[   45.580872] The buggy address is located 0 bytes to the right of
[   45.580872]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.593718] 
[   45.595194] The buggy address belongs to the physical page:
[   45.600752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.608735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.615246] page_type: f5(slab)
[   45.618381] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.626103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.633822] page dumped because: kasan: bad access detected
[   45.639377] 
[   45.640853] Memory state around the buggy address:
[   45.645632]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.652836]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.660042] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.667241]                                      ^
[   45.672019]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.679224]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.686425] ==================================================================
[   61.206209] ==================================================================
[   61.213277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   61.220654] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   61.228032] 
[   61.229513] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.229559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.229574] Hardware name: WinLink E850-96 board (DT)
[   61.229596] Call trace:
[   61.229609]  show_stack+0x20/0x38 (C)
[   61.229639]  dump_stack_lvl+0x8c/0xd0
[   61.229671]  print_report+0x118/0x608
[   61.229700]  kasan_report+0xdc/0x128
[   61.229728]  kasan_check_range+0x100/0x1a8
[   61.229759]  __kasan_check_write+0x20/0x30
[   61.229791]  kasan_atomics_helper+0x17ec/0x4858
[   61.229821]  kasan_atomics+0x198/0x2e0
[   61.229847]  kunit_try_run_case+0x170/0x3f0
[   61.229881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.229920]  kthread+0x328/0x630
[   61.229953]  ret_from_fork+0x10/0x20
[   61.229986] 
[   61.299819] Allocated by task 314:
[   61.303205]  kasan_save_stack+0x3c/0x68
[   61.307024]  kasan_save_track+0x20/0x40
[   61.310843]  kasan_save_alloc_info+0x40/0x58
[   61.315097]  __kasan_kmalloc+0xd4/0xd8
[   61.318829]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.323343]  kasan_atomics+0xb8/0x2e0
[   61.326989]  kunit_try_run_case+0x170/0x3f0
[   61.331155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.336624]  kthread+0x328/0x630
[   61.339836]  ret_from_fork+0x10/0x20
[   61.343395] 
[   61.344871] The buggy address belongs to the object at ffff000803afab80
[   61.344871]  which belongs to the cache kmalloc-64 of size 64
[   61.357197] The buggy address is located 0 bytes to the right of
[   61.357197]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   61.370044] 
[   61.371522] The buggy address belongs to the physical page:
[   61.377076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   61.385061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.391571] page_type: f5(slab)
[   61.394704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.402428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.410147] page dumped because: kasan: bad access detected
[   61.415703] 
[   61.417178] Memory state around the buggy address:
[   61.421957]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.429161]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.436366] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.443567]                                      ^
[   61.448345]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.455550]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.462751] ==================================================================
[   47.005903] ==================================================================
[   47.012969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   47.020260] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.027638] 
[   47.029120] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.029167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.029181] Hardware name: WinLink E850-96 board (DT)
[   47.029202] Call trace:
[   47.029214]  show_stack+0x20/0x38 (C)
[   47.029244]  dump_stack_lvl+0x8c/0xd0
[   47.029281]  print_report+0x118/0x608
[   47.029309]  kasan_report+0xdc/0x128
[   47.029337]  kasan_check_range+0x100/0x1a8
[   47.029368]  __kasan_check_write+0x20/0x30
[   47.029399]  kasan_atomics_helper+0x47c/0x4858
[   47.029429]  kasan_atomics+0x198/0x2e0
[   47.029454]  kunit_try_run_case+0x170/0x3f0
[   47.029489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.029527]  kthread+0x328/0x630
[   47.029557]  ret_from_fork+0x10/0x20
[   47.029590] 
[   47.099338] Allocated by task 314:
[   47.102724]  kasan_save_stack+0x3c/0x68
[   47.106542]  kasan_save_track+0x20/0x40
[   47.110362]  kasan_save_alloc_info+0x40/0x58
[   47.114615]  __kasan_kmalloc+0xd4/0xd8
[   47.118348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.122862]  kasan_atomics+0xb8/0x2e0
[   47.126507]  kunit_try_run_case+0x170/0x3f0
[   47.130674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.136143]  kthread+0x328/0x630
[   47.139355]  ret_from_fork+0x10/0x20
[   47.142914] 
[   47.144389] The buggy address belongs to the object at ffff000803afab80
[   47.144389]  which belongs to the cache kmalloc-64 of size 64
[   47.156716] The buggy address is located 0 bytes to the right of
[   47.156716]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.169562] 
[   47.171038] The buggy address belongs to the physical page:
[   47.176594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.184580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.191090] page_type: f5(slab)
[   47.194223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.201947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.209666] page dumped because: kasan: bad access detected
[   47.215221] 
[   47.216697] Memory state around the buggy address:
[   47.221477]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.228680]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.235885] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.243086]                                      ^
[   47.247864]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.255068]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.262271] ==================================================================
[   54.366560] ==================================================================
[   54.373624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   54.381000] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.388378] 
[   54.389859] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.389903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.389920] Hardware name: WinLink E850-96 board (DT)
[   54.389940] Call trace:
[   54.389955]  show_stack+0x20/0x38 (C)
[   54.389987]  dump_stack_lvl+0x8c/0xd0
[   54.390019]  print_report+0x118/0x608
[   54.390047]  kasan_report+0xdc/0x128
[   54.390077]  __asan_report_store8_noabort+0x20/0x30
[   54.390109]  kasan_atomics_helper+0x3e5c/0x4858
[   54.390137]  kasan_atomics+0x198/0x2e0
[   54.390164]  kunit_try_run_case+0x170/0x3f0
[   54.390198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.390236]  kthread+0x328/0x630
[   54.390268]  ret_from_fork+0x10/0x20
[   54.390299] 
[   54.456866] Allocated by task 314:
[   54.460252]  kasan_save_stack+0x3c/0x68
[   54.464071]  kasan_save_track+0x20/0x40
[   54.467891]  kasan_save_alloc_info+0x40/0x58
[   54.472144]  __kasan_kmalloc+0xd4/0xd8
[   54.475876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.480390]  kasan_atomics+0xb8/0x2e0
[   54.484036]  kunit_try_run_case+0x170/0x3f0
[   54.488203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.493671]  kthread+0x328/0x630
[   54.496883]  ret_from_fork+0x10/0x20
[   54.500442] 
[   54.501917] The buggy address belongs to the object at ffff000803afab80
[   54.501917]  which belongs to the cache kmalloc-64 of size 64
[   54.514244] The buggy address is located 0 bytes to the right of
[   54.514244]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.527091] 
[   54.528567] The buggy address belongs to the physical page:
[   54.534122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.542108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.548619] page_type: f5(slab)
[   54.551751] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.559476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.567194] page dumped because: kasan: bad access detected
[   54.572750] 
[   54.574225] Memory state around the buggy address:
[   54.579003]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.586208]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.593413] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.600614]                                      ^
[   54.605392]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.612597]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.619798] ==================================================================
[   50.167140] ==================================================================
[   50.174206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   50.181496] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.188875] 
[   50.190356] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.190402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.190418] Hardware name: WinLink E850-96 board (DT)
[   50.190435] Call trace:
[   50.190448]  show_stack+0x20/0x38 (C)
[   50.190479]  dump_stack_lvl+0x8c/0xd0
[   50.190512]  print_report+0x118/0x608
[   50.190543]  kasan_report+0xdc/0x128
[   50.190571]  kasan_check_range+0x100/0x1a8
[   50.190601]  __kasan_check_write+0x20/0x30
[   50.190632]  kasan_atomics_helper+0x99c/0x4858
[   50.190661]  kasan_atomics+0x198/0x2e0
[   50.190687]  kunit_try_run_case+0x170/0x3f0
[   50.190724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.190759]  kthread+0x328/0x630
[   50.190791]  ret_from_fork+0x10/0x20
[   50.190819] 
[   50.260575] Allocated by task 314:
[   50.263961]  kasan_save_stack+0x3c/0x68
[   50.267780]  kasan_save_track+0x20/0x40
[   50.271599]  kasan_save_alloc_info+0x40/0x58
[   50.275853]  __kasan_kmalloc+0xd4/0xd8
[   50.279585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.284099]  kasan_atomics+0xb8/0x2e0
[   50.287745]  kunit_try_run_case+0x170/0x3f0
[   50.291911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.297380]  kthread+0x328/0x630
[   50.300592]  ret_from_fork+0x10/0x20
[   50.304151] 
[   50.305626] The buggy address belongs to the object at ffff000803afab80
[   50.305626]  which belongs to the cache kmalloc-64 of size 64
[   50.317953] The buggy address is located 0 bytes to the right of
[   50.317953]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.330800] 
[   50.332275] The buggy address belongs to the physical page:
[   50.337831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.345817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.352327] page_type: f5(slab)
[   50.355460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.363184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.370904] page dumped because: kasan: bad access detected
[   50.376459] 
[   50.377934] Memory state around the buggy address:
[   50.382714]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.389918]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.397122] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.404323]                                      ^
[   50.409101]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.416306]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.423506] ==================================================================
[   54.627114] ==================================================================
[   54.634209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   54.641499] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.648877] 
[   54.650357] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.650405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.650421] Hardware name: WinLink E850-96 board (DT)
[   54.650440] Call trace:
[   54.650450]  show_stack+0x20/0x38 (C)
[   54.650479]  dump_stack_lvl+0x8c/0xd0
[   54.650511]  print_report+0x118/0x608
[   54.650541]  kasan_report+0xdc/0x128
[   54.650571]  kasan_check_range+0x100/0x1a8
[   54.650601]  __kasan_check_write+0x20/0x30
[   54.650634]  kasan_atomics_helper+0xeb8/0x4858
[   54.650661]  kasan_atomics+0x198/0x2e0
[   54.650689]  kunit_try_run_case+0x170/0x3f0
[   54.650724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.650761]  kthread+0x328/0x630
[   54.650793]  ret_from_fork+0x10/0x20
[   54.650827] 
[   54.720578] Allocated by task 314:
[   54.723963]  kasan_save_stack+0x3c/0x68
[   54.727782]  kasan_save_track+0x20/0x40
[   54.731602]  kasan_save_alloc_info+0x40/0x58
[   54.735855]  __kasan_kmalloc+0xd4/0xd8
[   54.739588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.744101]  kasan_atomics+0xb8/0x2e0
[   54.747747]  kunit_try_run_case+0x170/0x3f0
[   54.751914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.757383]  kthread+0x328/0x630
[   54.760594]  ret_from_fork+0x10/0x20
[   54.764153] 
[   54.765629] The buggy address belongs to the object at ffff000803afab80
[   54.765629]  which belongs to the cache kmalloc-64 of size 64
[   54.777956] The buggy address is located 0 bytes to the right of
[   54.777956]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.790802] 
[   54.792278] The buggy address belongs to the physical page:
[   54.797835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.805819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.812330] page_type: f5(slab)
[   54.815464] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.823187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.830906] page dumped because: kasan: bad access detected
[   54.836461] 
[   54.837937] Memory state around the buggy address:
[   54.842716]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.849920]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.857125] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.864326]                                      ^
[   54.869104]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.876308]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.883509] ==================================================================
[   52.530671] ==================================================================
[   52.537713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   52.545003] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.552381] 
[   52.553862] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.553910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.553924] Hardware name: WinLink E850-96 board (DT)
[   52.553943] Call trace:
[   52.553954]  show_stack+0x20/0x38 (C)
[   52.553983]  dump_stack_lvl+0x8c/0xd0
[   52.554018]  print_report+0x118/0x608
[   52.554047]  kasan_report+0xdc/0x128
[   52.554076]  kasan_check_range+0x100/0x1a8
[   52.554108]  __kasan_check_write+0x20/0x30
[   52.554137]  kasan_atomics_helper+0xca0/0x4858
[   52.554168]  kasan_atomics+0x198/0x2e0
[   52.554196]  kunit_try_run_case+0x170/0x3f0
[   52.554231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.554268]  kthread+0x328/0x630
[   52.554301]  ret_from_fork+0x10/0x20
[   52.554333] 
[   52.624081] Allocated by task 314:
[   52.627467]  kasan_save_stack+0x3c/0x68
[   52.631286]  kasan_save_track+0x20/0x40
[   52.635106]  kasan_save_alloc_info+0x40/0x58
[   52.639359]  __kasan_kmalloc+0xd4/0xd8
[   52.643091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.647605]  kasan_atomics+0xb8/0x2e0
[   52.651251]  kunit_try_run_case+0x170/0x3f0
[   52.655418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.660886]  kthread+0x328/0x630
[   52.664098]  ret_from_fork+0x10/0x20
[   52.667657] 
[   52.669132] The buggy address belongs to the object at ffff000803afab80
[   52.669132]  which belongs to the cache kmalloc-64 of size 64
[   52.681459] The buggy address is located 0 bytes to the right of
[   52.681459]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.694306] 
[   52.695782] The buggy address belongs to the physical page:
[   52.701338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.709323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.715833] page_type: f5(slab)
[   52.718968] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.726691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.734410] page dumped because: kasan: bad access detected
[   52.739965] 
[   52.741440] Memory state around the buggy address:
[   52.746221]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.753423]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.760628] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.767829]                                      ^
[   52.772607]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.779812]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.787015] ==================================================================
[   46.478502] ==================================================================
[   46.485548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   46.492837] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   46.500215] 
[   46.501697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   46.501750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.501765] Hardware name: WinLink E850-96 board (DT)
[   46.501784] Call trace:
[   46.501795]  show_stack+0x20/0x38 (C)
[   46.501827]  dump_stack_lvl+0x8c/0xd0
[   46.501862]  print_report+0x118/0x608
[   46.501890]  kasan_report+0xdc/0x128
[   46.501917]  kasan_check_range+0x100/0x1a8
[   46.501948]  __kasan_check_write+0x20/0x30
[   46.501978]  kasan_atomics_helper+0x3ac/0x4858
[   46.502007]  kasan_atomics+0x198/0x2e0
[   46.502034]  kunit_try_run_case+0x170/0x3f0
[   46.502070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.502109]  kthread+0x328/0x630
[   46.502142]  ret_from_fork+0x10/0x20
[   46.502174] 
[   46.571915] Allocated by task 314:
[   46.575302]  kasan_save_stack+0x3c/0x68
[   46.579120]  kasan_save_track+0x20/0x40
[   46.582939]  kasan_save_alloc_info+0x40/0x58
[   46.587193]  __kasan_kmalloc+0xd4/0xd8
[   46.590925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.595439]  kasan_atomics+0xb8/0x2e0
[   46.599085]  kunit_try_run_case+0x170/0x3f0
[   46.603251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.608720]  kthread+0x328/0x630
[   46.611932]  ret_from_fork+0x10/0x20
[   46.615491] 
[   46.616966] The buggy address belongs to the object at ffff000803afab80
[   46.616966]  which belongs to the cache kmalloc-64 of size 64
[   46.629294] The buggy address is located 0 bytes to the right of
[   46.629294]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.642140] 
[   46.643616] The buggy address belongs to the physical page:
[   46.649174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.657157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.663667] page_type: f5(slab)
[   46.666802] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.674525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.682244] page dumped because: kasan: bad access detected
[   46.687799] 
[   46.689274] Memory state around the buggy address:
[   46.694055]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.701257]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.708462] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.715663]                                      ^
[   46.720441]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.727646]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.734847] ==================================================================
[   53.578920] ==================================================================
[   53.585962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   53.593251] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.600542] 
[   53.602023] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.602070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.602084] Hardware name: WinLink E850-96 board (DT)
[   53.602103] Call trace:
[   53.602115]  show_stack+0x20/0x38 (C)
[   53.602144]  dump_stack_lvl+0x8c/0xd0
[   53.602179]  print_report+0x118/0x608
[   53.602210]  kasan_report+0xdc/0x128
[   53.602239]  kasan_check_range+0x100/0x1a8
[   53.602270]  __kasan_check_read+0x20/0x30
[   53.602301]  kasan_atomics_helper+0xdd4/0x4858
[   53.602330]  kasan_atomics+0x198/0x2e0
[   53.602358]  kunit_try_run_case+0x170/0x3f0
[   53.602392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.602431]  kthread+0x328/0x630
[   53.602464]  ret_from_fork+0x10/0x20
[   53.602495] 
[   53.672155] Allocated by task 314:
[   53.675542]  kasan_save_stack+0x3c/0x68
[   53.679361]  kasan_save_track+0x20/0x40
[   53.683180]  kasan_save_alloc_info+0x40/0x58
[   53.687433]  __kasan_kmalloc+0xd4/0xd8
[   53.691166]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.695680]  kasan_atomics+0xb8/0x2e0
[   53.699326]  kunit_try_run_case+0x170/0x3f0
[   53.703492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.708961]  kthread+0x328/0x630
[   53.712173]  ret_from_fork+0x10/0x20
[   53.715731] 
[   53.717207] The buggy address belongs to the object at ffff000803afab80
[   53.717207]  which belongs to the cache kmalloc-64 of size 64
[   53.729534] The buggy address is located 0 bytes to the right of
[   53.729534]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   53.742380] 
[   53.743857] The buggy address belongs to the physical page:
[   53.749412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   53.757398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.763908] page_type: f5(slab)
[   53.767041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.774765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.782484] page dumped because: kasan: bad access detected
[   53.788040] 
[   53.789515] Memory state around the buggy address:
[   53.794295]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.801498]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.808703] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.815904]                                      ^
[   53.820682]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.827887]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.835088] ==================================================================
[   59.372882] ==================================================================
[   59.379971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   59.387348] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.394640] 
[   59.396119] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.396163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.396179] Hardware name: WinLink E850-96 board (DT)
[   59.396197] Call trace:
[   59.396208]  show_stack+0x20/0x38 (C)
[   59.396238]  dump_stack_lvl+0x8c/0xd0
[   59.396270]  print_report+0x118/0x608
[   59.396299]  kasan_report+0xdc/0x128
[   59.396328]  __asan_report_load8_noabort+0x20/0x30
[   59.396362]  kasan_atomics_helper+0x3db0/0x4858
[   59.396391]  kasan_atomics+0x198/0x2e0
[   59.396418]  kunit_try_run_case+0x170/0x3f0
[   59.396451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.396488]  kthread+0x328/0x630
[   59.396522]  ret_from_fork+0x10/0x20
[   59.396552] 
[   59.463041] Allocated by task 314:
[   59.466426]  kasan_save_stack+0x3c/0x68
[   59.470246]  kasan_save_track+0x20/0x40
[   59.474065]  kasan_save_alloc_info+0x40/0x58
[   59.478319]  __kasan_kmalloc+0xd4/0xd8
[   59.482051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.486565]  kasan_atomics+0xb8/0x2e0
[   59.490211]  kunit_try_run_case+0x170/0x3f0
[   59.494378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.499846]  kthread+0x328/0x630
[   59.503058]  ret_from_fork+0x10/0x20
[   59.506617] 
[   59.508092] The buggy address belongs to the object at ffff000803afab80
[   59.508092]  which belongs to the cache kmalloc-64 of size 64
[   59.520419] The buggy address is located 0 bytes to the right of
[   59.520419]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.533266] 
[   59.534742] The buggy address belongs to the physical page:
[   59.540297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.548283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.554794] page_type: f5(slab)
[   59.557926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.565650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.573369] page dumped because: kasan: bad access detected
[   59.578925] 
[   59.580400] Memory state around the buggy address:
[   59.585181]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.592383]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.599588] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.606789]                                      ^
[   59.611567]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.618772]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.625973] ==================================================================
[   55.154573] ==================================================================
[   55.161631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   55.168922] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.176300] 
[   55.177780] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.177825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.177840] Hardware name: WinLink E850-96 board (DT)
[   55.177858] Call trace:
[   55.177870]  show_stack+0x20/0x38 (C)
[   55.177901]  dump_stack_lvl+0x8c/0xd0
[   55.177934]  print_report+0x118/0x608
[   55.177966]  kasan_report+0xdc/0x128
[   55.177992]  kasan_check_range+0x100/0x1a8
[   55.178024]  __kasan_check_write+0x20/0x30
[   55.178055]  kasan_atomics_helper+0xf88/0x4858
[   55.178084]  kasan_atomics+0x198/0x2e0
[   55.178109]  kunit_try_run_case+0x170/0x3f0
[   55.178144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.178183]  kthread+0x328/0x630
[   55.178215]  ret_from_fork+0x10/0x20
[   55.178248] 
[   55.248000] Allocated by task 314:
[   55.251386]  kasan_save_stack+0x3c/0x68
[   55.255205]  kasan_save_track+0x20/0x40
[   55.259024]  kasan_save_alloc_info+0x40/0x58
[   55.263278]  __kasan_kmalloc+0xd4/0xd8
[   55.267011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.271524]  kasan_atomics+0xb8/0x2e0
[   55.275170]  kunit_try_run_case+0x170/0x3f0
[   55.279337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.284805]  kthread+0x328/0x630
[   55.288017]  ret_from_fork+0x10/0x20
[   55.291576] 
[   55.293052] The buggy address belongs to the object at ffff000803afab80
[   55.293052]  which belongs to the cache kmalloc-64 of size 64
[   55.305378] The buggy address is located 0 bytes to the right of
[   55.305378]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.318225] 
[   55.319701] The buggy address belongs to the physical page:
[   55.325257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.333242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.339752] page_type: f5(slab)
[   55.342885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.350610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.358329] page dumped because: kasan: bad access detected
[   55.363884] 
[   55.365359] Memory state around the buggy address:
[   55.370139]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.377342]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.384547] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.391748]                                      ^
[   55.396526]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.403731]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.410932] ==================================================================
[   55.418297] ==================================================================
[   55.425344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   55.432633] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.440011] 
[   55.441491] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.441537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.441552] Hardware name: WinLink E850-96 board (DT)
[   55.441570] Call trace:
[   55.441580]  show_stack+0x20/0x38 (C)
[   55.441612]  dump_stack_lvl+0x8c/0xd0
[   55.441643]  print_report+0x118/0x608
[   55.441671]  kasan_report+0xdc/0x128
[   55.441699]  kasan_check_range+0x100/0x1a8
[   55.441729]  __kasan_check_write+0x20/0x30
[   55.441760]  kasan_atomics_helper+0xff0/0x4858
[   55.441791]  kasan_atomics+0x198/0x2e0
[   55.441818]  kunit_try_run_case+0x170/0x3f0
[   55.441851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.441889]  kthread+0x328/0x630
[   55.441920]  ret_from_fork+0x10/0x20
[   55.441950] 
[   55.511712] Allocated by task 314:
[   55.515097]  kasan_save_stack+0x3c/0x68
[   55.518916]  kasan_save_track+0x20/0x40
[   55.522736]  kasan_save_alloc_info+0x40/0x58
[   55.526989]  __kasan_kmalloc+0xd4/0xd8
[   55.530722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.535236]  kasan_atomics+0xb8/0x2e0
[   55.538881]  kunit_try_run_case+0x170/0x3f0
[   55.543048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.548517]  kthread+0x328/0x630
[   55.551728]  ret_from_fork+0x10/0x20
[   55.555287] 
[   55.556763] The buggy address belongs to the object at ffff000803afab80
[   55.556763]  which belongs to the cache kmalloc-64 of size 64
[   55.569089] The buggy address is located 0 bytes to the right of
[   55.569089]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.581936] 
[   55.583412] The buggy address belongs to the physical page:
[   55.588968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.596953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.603464] page_type: f5(slab)
[   55.606596] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.614321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.622040] page dumped because: kasan: bad access detected
[   55.627595] 
[   55.629071] Memory state around the buggy address:
[   55.633852]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.641054]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.648258] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.655459]                                      ^
[   55.660237]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.667442]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.674643] ==================================================================
[   50.694568] ==================================================================
[   50.701629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   50.708919] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.716297] 
[   50.717779] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.717824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.717840] Hardware name: WinLink E850-96 board (DT)
[   50.717858] Call trace:
[   50.717873]  show_stack+0x20/0x38 (C)
[   50.717902]  dump_stack_lvl+0x8c/0xd0
[   50.717936]  print_report+0x118/0x608
[   50.717966]  kasan_report+0xdc/0x128
[   50.717994]  kasan_check_range+0x100/0x1a8
[   50.718025]  __kasan_check_write+0x20/0x30
[   50.718056]  kasan_atomics_helper+0xa6c/0x4858
[   50.718085]  kasan_atomics+0x198/0x2e0
[   50.718113]  kunit_try_run_case+0x170/0x3f0
[   50.718146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.718184]  kthread+0x328/0x630
[   50.718217]  ret_from_fork+0x10/0x20
[   50.718247] 
[   50.787998] Allocated by task 314:
[   50.791383]  kasan_save_stack+0x3c/0x68
[   50.795203]  kasan_save_track+0x20/0x40
[   50.799022]  kasan_save_alloc_info+0x40/0x58
[   50.803275]  __kasan_kmalloc+0xd4/0xd8
[   50.807008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.811522]  kasan_atomics+0xb8/0x2e0
[   50.815168]  kunit_try_run_case+0x170/0x3f0
[   50.819334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.824803]  kthread+0x328/0x630
[   50.828015]  ret_from_fork+0x10/0x20
[   50.831574] 
[   50.833049] The buggy address belongs to the object at ffff000803afab80
[   50.833049]  which belongs to the cache kmalloc-64 of size 64
[   50.845376] The buggy address is located 0 bytes to the right of
[   50.845376]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.858222] 
[   50.859698] The buggy address belongs to the physical page:
[   50.865254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.873240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.879750] page_type: f5(slab)
[   50.882883] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.890607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.898326] page dumped because: kasan: bad access detected
[   50.903881] 
[   50.905357] Memory state around the buggy address:
[   50.910135]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.917340]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.924545] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.931745]                                      ^
[   50.936524]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.943729]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.950930] ==================================================================
[   46.217947] ==================================================================
[   46.224960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   46.232337] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   46.239715] 
[   46.241198] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   46.241247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.241262] Hardware name: WinLink E850-96 board (DT)
[   46.241282] Call trace:
[   46.241296]  show_stack+0x20/0x38 (C)
[   46.241329]  dump_stack_lvl+0x8c/0xd0
[   46.241362]  print_report+0x118/0x608
[   46.241391]  kasan_report+0xdc/0x128
[   46.241421]  __asan_report_store4_noabort+0x20/0x30
[   46.241454]  kasan_atomics_helper+0x3f94/0x4858
[   46.241481]  kasan_atomics+0x198/0x2e0
[   46.241508]  kunit_try_run_case+0x170/0x3f0
[   46.241542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.241579]  kthread+0x328/0x630
[   46.241610]  ret_from_fork+0x10/0x20
[   46.241644] 
[   46.308204] Allocated by task 314:
[   46.311591]  kasan_save_stack+0x3c/0x68
[   46.315409]  kasan_save_track+0x20/0x40
[   46.319228]  kasan_save_alloc_info+0x40/0x58
[   46.323482]  __kasan_kmalloc+0xd4/0xd8
[   46.327214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.331728]  kasan_atomics+0xb8/0x2e0
[   46.335374]  kunit_try_run_case+0x170/0x3f0
[   46.339540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.345009]  kthread+0x328/0x630
[   46.348221]  ret_from_fork+0x10/0x20
[   46.351780] 
[   46.353255] The buggy address belongs to the object at ffff000803afab80
[   46.353255]  which belongs to the cache kmalloc-64 of size 64
[   46.365582] The buggy address is located 0 bytes to the right of
[   46.365582]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.378428] 
[   46.379905] The buggy address belongs to the physical page:
[   46.385462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.393445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.399956] page_type: f5(slab)
[   46.403089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.410813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.418532] page dumped because: kasan: bad access detected
[   46.424087] 
[   46.425563] Memory state around the buggy address:
[   46.430341]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.437546]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.444751] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.451952]                                      ^
[   46.456730]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.463935]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.471136] ==================================================================
[   56.209731] ==================================================================
[   56.216824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   56.224201] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   56.231579] 
[   56.233059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   56.233106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.233122] Hardware name: WinLink E850-96 board (DT)
[   56.233143] Call trace:
[   56.233155]  show_stack+0x20/0x38 (C)
[   56.233187]  dump_stack_lvl+0x8c/0xd0
[   56.233219]  print_report+0x118/0x608
[   56.233250]  kasan_report+0xdc/0x128
[   56.233279]  kasan_check_range+0x100/0x1a8
[   56.233312]  __kasan_check_write+0x20/0x30
[   56.233345]  kasan_atomics_helper+0x1128/0x4858
[   56.233373]  kasan_atomics+0x198/0x2e0
[   56.233399]  kunit_try_run_case+0x170/0x3f0
[   56.233431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.233469]  kthread+0x328/0x630
[   56.233502]  ret_from_fork+0x10/0x20
[   56.233529] 
[   56.303366] Allocated by task 314:
[   56.306752]  kasan_save_stack+0x3c/0x68
[   56.310571]  kasan_save_track+0x20/0x40
[   56.314391]  kasan_save_alloc_info+0x40/0x58
[   56.318644]  __kasan_kmalloc+0xd4/0xd8
[   56.322376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.326890]  kasan_atomics+0xb8/0x2e0
[   56.330536]  kunit_try_run_case+0x170/0x3f0
[   56.334703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.340171]  kthread+0x328/0x630
[   56.343383]  ret_from_fork+0x10/0x20
[   56.346942] 
[   56.348418] The buggy address belongs to the object at ffff000803afab80
[   56.348418]  which belongs to the cache kmalloc-64 of size 64
[   56.360744] The buggy address is located 0 bytes to the right of
[   56.360744]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.373591] 
[   56.375067] The buggy address belongs to the physical page:
[   56.380623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.388608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.395119] page_type: f5(slab)
[   56.398251] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.405976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.413695] page dumped because: kasan: bad access detected
[   56.419250] 
[   56.420725] Memory state around the buggy address:
[   56.425505]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.432709]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.439913] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.447114]                                      ^
[   56.451892]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.459097]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.466298] ==================================================================
[   59.897211] ==================================================================
[   59.904270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   59.911646] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.918937] 
[   59.920419] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.920466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.920481] Hardware name: WinLink E850-96 board (DT)
[   59.920499] Call trace:
[   59.920511]  show_stack+0x20/0x38 (C)
[   59.920543]  dump_stack_lvl+0x8c/0xd0
[   59.920575]  print_report+0x118/0x608
[   59.920604]  kasan_report+0xdc/0x128
[   59.920632]  __asan_report_load8_noabort+0x20/0x30
[   59.920666]  kasan_atomics_helper+0x3df4/0x4858
[   59.920697]  kasan_atomics+0x198/0x2e0
[   59.920724]  kunit_try_run_case+0x170/0x3f0
[   59.920760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.920797]  kthread+0x328/0x630
[   59.920829]  ret_from_fork+0x10/0x20
[   59.920861] 
[   59.987340] Allocated by task 314:
[   59.990725]  kasan_save_stack+0x3c/0x68
[   59.994544]  kasan_save_track+0x20/0x40
[   59.998363]  kasan_save_alloc_info+0x40/0x58
[   60.002617]  __kasan_kmalloc+0xd4/0xd8
[   60.006349]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.010863]  kasan_atomics+0xb8/0x2e0
[   60.014509]  kunit_try_run_case+0x170/0x3f0
[   60.018675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.024144]  kthread+0x328/0x630
[   60.027356]  ret_from_fork+0x10/0x20
[   60.030915] 
[   60.032390] The buggy address belongs to the object at ffff000803afab80
[   60.032390]  which belongs to the cache kmalloc-64 of size 64
[   60.044717] The buggy address is located 0 bytes to the right of
[   60.044717]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.057563] 
[   60.059039] The buggy address belongs to the physical page:
[   60.064595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.072581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.079091] page_type: f5(slab)
[   60.082224] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.089948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.097667] page dumped because: kasan: bad access detected
[   60.103222] 
[   60.104698] Memory state around the buggy address:
[   60.109476]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.116681]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.123886] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.131087]                                      ^
[   60.135865]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.143069]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.150272] ==================================================================
[   57.529209] ==================================================================
[   57.536249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   57.543626] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.551004] 
[   57.552484] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.552532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.552547] Hardware name: WinLink E850-96 board (DT)
[   57.552566] Call trace:
[   57.552578]  show_stack+0x20/0x38 (C)
[   57.552612]  dump_stack_lvl+0x8c/0xd0
[   57.552645]  print_report+0x118/0x608
[   57.552672]  kasan_report+0xdc/0x128
[   57.552700]  kasan_check_range+0x100/0x1a8
[   57.552731]  __kasan_check_write+0x20/0x30
[   57.552762]  kasan_atomics_helper+0x1384/0x4858
[   57.552792]  kasan_atomics+0x198/0x2e0
[   57.552819]  kunit_try_run_case+0x170/0x3f0
[   57.552852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.552889]  kthread+0x328/0x630
[   57.552922]  ret_from_fork+0x10/0x20
[   57.552956] 
[   57.622791] Allocated by task 314:
[   57.626177]  kasan_save_stack+0x3c/0x68
[   57.629996]  kasan_save_track+0x20/0x40
[   57.633815]  kasan_save_alloc_info+0x40/0x58
[   57.638069]  __kasan_kmalloc+0xd4/0xd8
[   57.641801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.646315]  kasan_atomics+0xb8/0x2e0
[   57.649961]  kunit_try_run_case+0x170/0x3f0
[   57.654127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.659596]  kthread+0x328/0x630
[   57.662808]  ret_from_fork+0x10/0x20
[   57.666367] 
[   57.667842] The buggy address belongs to the object at ffff000803afab80
[   57.667842]  which belongs to the cache kmalloc-64 of size 64
[   57.680169] The buggy address is located 0 bytes to the right of
[   57.680169]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.693016] 
[   57.694491] The buggy address belongs to the physical page:
[   57.700047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.708033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.714543] page_type: f5(slab)
[   57.717676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.725400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.733119] page dumped because: kasan: bad access detected
[   57.738674] 
[   57.740150] Memory state around the buggy address:
[   57.744928]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.752133]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.759338] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.766539]                                      ^
[   57.771317]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.778522]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.785722] ==================================================================
[   60.681930] ==================================================================
[   60.688979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   60.696356] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.703734] 
[   60.705216] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.705263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.705279] Hardware name: WinLink E850-96 board (DT)
[   60.705296] Call trace:
[   60.705307]  show_stack+0x20/0x38 (C)
[   60.705339]  dump_stack_lvl+0x8c/0xd0
[   60.705370]  print_report+0x118/0x608
[   60.705401]  kasan_report+0xdc/0x128
[   60.705429]  kasan_check_range+0x100/0x1a8
[   60.705461]  __kasan_check_write+0x20/0x30
[   60.705493]  kasan_atomics_helper+0x175c/0x4858
[   60.705521]  kasan_atomics+0x198/0x2e0
[   60.705548]  kunit_try_run_case+0x170/0x3f0
[   60.705583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.705620]  kthread+0x328/0x630
[   60.705651]  ret_from_fork+0x10/0x20
[   60.705679] 
[   60.775521] Allocated by task 314:
[   60.778907]  kasan_save_stack+0x3c/0x68
[   60.782726]  kasan_save_track+0x20/0x40
[   60.786545]  kasan_save_alloc_info+0x40/0x58
[   60.790799]  __kasan_kmalloc+0xd4/0xd8
[   60.794531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.799045]  kasan_atomics+0xb8/0x2e0
[   60.802691]  kunit_try_run_case+0x170/0x3f0
[   60.806857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.812326]  kthread+0x328/0x630
[   60.815538]  ret_from_fork+0x10/0x20
[   60.819097] 
[   60.820573] The buggy address belongs to the object at ffff000803afab80
[   60.820573]  which belongs to the cache kmalloc-64 of size 64
[   60.832899] The buggy address is located 0 bytes to the right of
[   60.832899]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.845746] 
[   60.847222] The buggy address belongs to the physical page:
[   60.852778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.860763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.867274] page_type: f5(slab)
[   60.870408] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.878131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.885850] page dumped because: kasan: bad access detected
[   60.891405] 
[   60.892880] Memory state around the buggy address:
[   60.897659]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.904864]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.912068] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.919269]                                      ^
[   60.924047]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.931252]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.938453] ==================================================================
[   47.533354] ==================================================================
[   47.540393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   47.547682] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.555060] 
[   47.556542] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.556587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.556602] Hardware name: WinLink E850-96 board (DT)
[   47.556622] Call trace:
[   47.556636]  show_stack+0x20/0x38 (C)
[   47.556666]  dump_stack_lvl+0x8c/0xd0
[   47.556702]  print_report+0x118/0x608
[   47.556731]  kasan_report+0xdc/0x128
[   47.556759]  kasan_check_range+0x100/0x1a8
[   47.556789]  __kasan_check_write+0x20/0x30
[   47.556822]  kasan_atomics_helper+0x54c/0x4858
[   47.556851]  kasan_atomics+0x198/0x2e0
[   47.556879]  kunit_try_run_case+0x170/0x3f0
[   47.556914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.556951]  kthread+0x328/0x630
[   47.556982]  ret_from_fork+0x10/0x20
[   47.557014] 
[   47.626761] Allocated by task 314:
[   47.630146]  kasan_save_stack+0x3c/0x68
[   47.633965]  kasan_save_track+0x20/0x40
[   47.637785]  kasan_save_alloc_info+0x40/0x58
[   47.642038]  __kasan_kmalloc+0xd4/0xd8
[   47.645771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.650284]  kasan_atomics+0xb8/0x2e0
[   47.653930]  kunit_try_run_case+0x170/0x3f0
[   47.658097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.663565]  kthread+0x328/0x630
[   47.666777]  ret_from_fork+0x10/0x20
[   47.670336] 
[   47.671812] The buggy address belongs to the object at ffff000803afab80
[   47.671812]  which belongs to the cache kmalloc-64 of size 64
[   47.684139] The buggy address is located 0 bytes to the right of
[   47.684139]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.696985] 
[   47.698461] The buggy address belongs to the physical page:
[   47.704017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.712003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.718513] page_type: f5(slab)
[   47.721645] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.729370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.737089] page dumped because: kasan: bad access detected
[   47.742644] 
[   47.744120] Memory state around the buggy address:
[   47.748898]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.756103]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.763307] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.770508]                                      ^
[   47.775286]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.782491]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.789692] ==================================================================
[   50.958276] ==================================================================
[   50.965340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   50.972631] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.980009] 
[   50.981490] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.981537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.981551] Hardware name: WinLink E850-96 board (DT)
[   50.981569] Call trace:
[   50.981580]  show_stack+0x20/0x38 (C)
[   50.981610]  dump_stack_lvl+0x8c/0xd0
[   50.981645]  print_report+0x118/0x608
[   50.981675]  kasan_report+0xdc/0x128
[   50.981703]  kasan_check_range+0x100/0x1a8
[   50.981735]  __kasan_check_write+0x20/0x30
[   50.981767]  kasan_atomics_helper+0xad4/0x4858
[   50.981798]  kasan_atomics+0x198/0x2e0
[   50.981825]  kunit_try_run_case+0x170/0x3f0
[   50.981862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.981901]  kthread+0x328/0x630
[   50.981933]  ret_from_fork+0x10/0x20
[   50.981963] 
[   51.051709] Allocated by task 314:
[   51.055095]  kasan_save_stack+0x3c/0x68
[   51.058914]  kasan_save_track+0x20/0x40
[   51.062733]  kasan_save_alloc_info+0x40/0x58
[   51.066987]  __kasan_kmalloc+0xd4/0xd8
[   51.070719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.075233]  kasan_atomics+0xb8/0x2e0
[   51.078879]  kunit_try_run_case+0x170/0x3f0
[   51.083045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.088514]  kthread+0x328/0x630
[   51.091726]  ret_from_fork+0x10/0x20
[   51.095285] 
[   51.096760] The buggy address belongs to the object at ffff000803afab80
[   51.096760]  which belongs to the cache kmalloc-64 of size 64
[   51.109087] The buggy address is located 0 bytes to the right of
[   51.109087]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.121934] 
[   51.123410] The buggy address belongs to the physical page:
[   51.128965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.136951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.143461] page_type: f5(slab)
[   51.146595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.154318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.162037] page dumped because: kasan: bad access detected
[   51.167593] 
[   51.169068] Memory state around the buggy address:
[   51.173848]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.181051]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.188256] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.195457]                                      ^
[   51.200235]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.207440]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.214641] ==================================================================
[   48.060792] ==================================================================
[   48.067814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   48.075105] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.082483] 
[   48.083964] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.084010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.084024] Hardware name: WinLink E850-96 board (DT)
[   48.084044] Call trace:
[   48.084057]  show_stack+0x20/0x38 (C)
[   48.084089]  dump_stack_lvl+0x8c/0xd0
[   48.084123]  print_report+0x118/0x608
[   48.084154]  kasan_report+0xdc/0x128
[   48.084182]  kasan_check_range+0x100/0x1a8
[   48.084212]  __kasan_check_write+0x20/0x30
[   48.084245]  kasan_atomics_helper+0x61c/0x4858
[   48.084274]  kasan_atomics+0x198/0x2e0
[   48.084301]  kunit_try_run_case+0x170/0x3f0
[   48.084338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.084375]  kthread+0x328/0x630
[   48.084406]  ret_from_fork+0x10/0x20
[   48.084437] 
[   48.154183] Allocated by task 314:
[   48.157569]  kasan_save_stack+0x3c/0x68
[   48.161388]  kasan_save_track+0x20/0x40
[   48.165207]  kasan_save_alloc_info+0x40/0x58
[   48.169461]  __kasan_kmalloc+0xd4/0xd8
[   48.173193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.177707]  kasan_atomics+0xb8/0x2e0
[   48.181353]  kunit_try_run_case+0x170/0x3f0
[   48.185520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.190988]  kthread+0x328/0x630
[   48.194200]  ret_from_fork+0x10/0x20
[   48.197759] 
[   48.199234] The buggy address belongs to the object at ffff000803afab80
[   48.199234]  which belongs to the cache kmalloc-64 of size 64
[   48.211561] The buggy address is located 0 bytes to the right of
[   48.211561]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   48.224408] 
[   48.225884] The buggy address belongs to the physical page:
[   48.231440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   48.239425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.245935] page_type: f5(slab)
[   48.249068] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.256792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.264511] page dumped because: kasan: bad access detected
[   48.270067] 
[   48.271542] Memory state around the buggy address:
[   48.276324]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.283526]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.290730] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.297931]                                      ^
[   48.302709]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.309914]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.317115] ==================================================================
[   52.794357] ==================================================================
[   52.801425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   52.808801] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.816092] 
[   52.817573] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.817620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.817636] Hardware name: WinLink E850-96 board (DT)
[   52.817655] Call trace:
[   52.817665]  show_stack+0x20/0x38 (C)
[   52.817695]  dump_stack_lvl+0x8c/0xd0
[   52.817728]  print_report+0x118/0x608
[   52.817757]  kasan_report+0xdc/0x128
[   52.817787]  __asan_report_load4_noabort+0x20/0x30
[   52.817820]  kasan_atomics_helper+0x3dd8/0x4858
[   52.817851]  kasan_atomics+0x198/0x2e0
[   52.817877]  kunit_try_run_case+0x170/0x3f0
[   52.817911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.817949]  kthread+0x328/0x630
[   52.817981]  ret_from_fork+0x10/0x20
[   52.818014] 
[   52.884494] Allocated by task 314:
[   52.887879]  kasan_save_stack+0x3c/0x68
[   52.891699]  kasan_save_track+0x20/0x40
[   52.895518]  kasan_save_alloc_info+0x40/0x58
[   52.899772]  __kasan_kmalloc+0xd4/0xd8
[   52.903504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.908018]  kasan_atomics+0xb8/0x2e0
[   52.911664]  kunit_try_run_case+0x170/0x3f0
[   52.915830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.921299]  kthread+0x328/0x630
[   52.924511]  ret_from_fork+0x10/0x20
[   52.928070] 
[   52.929545] The buggy address belongs to the object at ffff000803afab80
[   52.929545]  which belongs to the cache kmalloc-64 of size 64
[   52.941872] The buggy address is located 0 bytes to the right of
[   52.941872]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.954719] 
[   52.956195] The buggy address belongs to the physical page:
[   52.961751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.969736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.976246] page_type: f5(slab)
[   52.979379] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.987103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.994822] page dumped because: kasan: bad access detected
[   53.000378] 
[   53.001853] Memory state around the buggy address:
[   53.006633]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.013836]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.021041] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.028242]                                      ^
[   53.033020]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.040225]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.047427] ==================================================================
[   58.581273] ==================================================================
[   58.588316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   58.595693] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.603072] 
[   58.604552] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.604597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.604613] Hardware name: WinLink E850-96 board (DT)
[   58.604631] Call trace:
[   58.604643]  show_stack+0x20/0x38 (C)
[   58.604672]  dump_stack_lvl+0x8c/0xd0
[   58.604705]  print_report+0x118/0x608
[   58.604735]  kasan_report+0xdc/0x128
[   58.604762]  kasan_check_range+0x100/0x1a8
[   58.604794]  __kasan_check_write+0x20/0x30
[   58.604826]  kasan_atomics_helper+0x14e4/0x4858
[   58.604855]  kasan_atomics+0x198/0x2e0
[   58.604881]  kunit_try_run_case+0x170/0x3f0
[   58.604914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.604951]  kthread+0x328/0x630
[   58.604983]  ret_from_fork+0x10/0x20
[   58.605011] 
[   58.674858] Allocated by task 314:
[   58.678244]  kasan_save_stack+0x3c/0x68
[   58.682063]  kasan_save_track+0x20/0x40
[   58.685883]  kasan_save_alloc_info+0x40/0x58
[   58.690136]  __kasan_kmalloc+0xd4/0xd8
[   58.693869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.698383]  kasan_atomics+0xb8/0x2e0
[   58.702028]  kunit_try_run_case+0x170/0x3f0
[   58.706195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.711664]  kthread+0x328/0x630
[   58.714875]  ret_from_fork+0x10/0x20
[   58.718434] 
[   58.719910] The buggy address belongs to the object at ffff000803afab80
[   58.719910]  which belongs to the cache kmalloc-64 of size 64
[   58.732237] The buggy address is located 0 bytes to the right of
[   58.732237]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   58.745083] 
[   58.746559] The buggy address belongs to the physical page:
[   58.752115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   58.760101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.766611] page_type: f5(slab)
[   58.769743] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.777468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.785187] page dumped because: kasan: bad access detected
[   58.790742] 
[   58.792218] Memory state around the buggy address:
[   58.796997]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.804201]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.811406] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.818606]                                      ^
[   58.823385]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.830589]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.837790] ==================================================================
[   53.842441] ==================================================================
[   53.849498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   53.856876] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.864167] 
[   53.865648] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.865694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.865709] Hardware name: WinLink E850-96 board (DT)
[   53.865727] Call trace:
[   53.865739]  show_stack+0x20/0x38 (C)
[   53.865771]  dump_stack_lvl+0x8c/0xd0
[   53.865805]  print_report+0x118/0x608
[   53.865835]  kasan_report+0xdc/0x128
[   53.865863]  __asan_report_load8_noabort+0x20/0x30
[   53.865897]  kasan_atomics_helper+0x3f58/0x4858
[   53.865928]  kasan_atomics+0x198/0x2e0
[   53.865955]  kunit_try_run_case+0x170/0x3f0
[   53.865990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.866026]  kthread+0x328/0x630
[   53.866058]  ret_from_fork+0x10/0x20
[   53.866089] 
[   53.932569] Allocated by task 314:
[   53.935954]  kasan_save_stack+0x3c/0x68
[   53.939774]  kasan_save_track+0x20/0x40
[   53.943593]  kasan_save_alloc_info+0x40/0x58
[   53.947846]  __kasan_kmalloc+0xd4/0xd8
[   53.951579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.956093]  kasan_atomics+0xb8/0x2e0
[   53.959738]  kunit_try_run_case+0x170/0x3f0
[   53.963905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.969374]  kthread+0x328/0x630
[   53.972585]  ret_from_fork+0x10/0x20
[   53.976144] 
[   53.977620] The buggy address belongs to the object at ffff000803afab80
[   53.977620]  which belongs to the cache kmalloc-64 of size 64
[   53.989947] The buggy address is located 0 bytes to the right of
[   53.989947]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.002793] 
[   54.004270] The buggy address belongs to the physical page:
[   54.009825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.017811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.024321] page_type: f5(slab)
[   54.027453] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.035178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.042897] page dumped because: kasan: bad access detected
[   54.048452] 
[   54.049928] Memory state around the buggy address:
[   54.054707]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.061911]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.069116] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.076317]                                      ^
[   54.081094]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.088299]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.095500] ==================================================================
[   56.737533] ==================================================================
[   56.744594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   56.751971] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   56.759349] 
[   56.760829] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   56.760876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.760891] Hardware name: WinLink E850-96 board (DT)
[   56.760908] Call trace:
[   56.760920]  show_stack+0x20/0x38 (C)
[   56.760950]  dump_stack_lvl+0x8c/0xd0
[   56.760980]  print_report+0x118/0x608
[   56.761012]  kasan_report+0xdc/0x128
[   56.761038]  kasan_check_range+0x100/0x1a8
[   56.761069]  __kasan_check_write+0x20/0x30
[   56.761102]  kasan_atomics_helper+0x11f8/0x4858
[   56.761130]  kasan_atomics+0x198/0x2e0
[   56.761157]  kunit_try_run_case+0x170/0x3f0
[   56.761189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.761227]  kthread+0x328/0x630
[   56.761258]  ret_from_fork+0x10/0x20
[   56.761289] 
[   56.831136] Allocated by task 314:
[   56.834522]  kasan_save_stack+0x3c/0x68
[   56.838341]  kasan_save_track+0x20/0x40
[   56.842160]  kasan_save_alloc_info+0x40/0x58
[   56.846414]  __kasan_kmalloc+0xd4/0xd8
[   56.850146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.854660]  kasan_atomics+0xb8/0x2e0
[   56.858306]  kunit_try_run_case+0x170/0x3f0
[   56.862472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.867941]  kthread+0x328/0x630
[   56.871153]  ret_from_fork+0x10/0x20
[   56.874712] 
[   56.876188] The buggy address belongs to the object at ffff000803afab80
[   56.876188]  which belongs to the cache kmalloc-64 of size 64
[   56.888514] The buggy address is located 0 bytes to the right of
[   56.888514]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.901361] 
[   56.902837] The buggy address belongs to the physical page:
[   56.908393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.916378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.922888] page_type: f5(slab)
[   56.926021] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.933745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.941465] page dumped because: kasan: bad access detected
[   56.947020] 
[   56.948495] Memory state around the buggy address:
[   56.953274]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.960479]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.967683] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.974884]                                      ^
[   56.979662]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.986867]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.994068] ==================================================================
[   57.265299] ==================================================================
[   57.272365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   57.279741] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.287119] 
[   57.288599] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.288645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.288662] Hardware name: WinLink E850-96 board (DT)
[   57.288678] Call trace:
[   57.288692]  show_stack+0x20/0x38 (C)
[   57.288725]  dump_stack_lvl+0x8c/0xd0
[   57.288757]  print_report+0x118/0x608
[   57.288787]  kasan_report+0xdc/0x128
[   57.288815]  kasan_check_range+0x100/0x1a8
[   57.288845]  __kasan_check_write+0x20/0x30
[   57.288879]  kasan_atomics_helper+0x12d8/0x4858
[   57.288907]  kasan_atomics+0x198/0x2e0
[   57.288935]  kunit_try_run_case+0x170/0x3f0
[   57.288967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.289004]  kthread+0x328/0x630
[   57.289037]  ret_from_fork+0x10/0x20
[   57.289069] 
[   57.358906] Allocated by task 314:
[   57.362292]  kasan_save_stack+0x3c/0x68
[   57.366111]  kasan_save_track+0x20/0x40
[   57.369930]  kasan_save_alloc_info+0x40/0x58
[   57.374184]  __kasan_kmalloc+0xd4/0xd8
[   57.377916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.382430]  kasan_atomics+0xb8/0x2e0
[   57.386076]  kunit_try_run_case+0x170/0x3f0
[   57.390242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.395711]  kthread+0x328/0x630
[   57.398923]  ret_from_fork+0x10/0x20
[   57.402482] 
[   57.403957] The buggy address belongs to the object at ffff000803afab80
[   57.403957]  which belongs to the cache kmalloc-64 of size 64
[   57.416284] The buggy address is located 0 bytes to the right of
[   57.416284]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.429131] 
[   57.430606] The buggy address belongs to the physical page:
[   57.436163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.444148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.450658] page_type: f5(slab)
[   57.453791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.461516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.469234] page dumped because: kasan: bad access detected
[   57.474790] 
[   57.476265] Memory state around the buggy address:
[   57.481044]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.488248]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.495453] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.502654]                                      ^
[   57.507432]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.514637]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.521838] ==================================================================
[   48.324435] ==================================================================
[   48.331526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   48.338816] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.346194] 
[   48.347675] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.347720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.347736] Hardware name: WinLink E850-96 board (DT)
[   48.347755] Call trace:
[   48.347765]  show_stack+0x20/0x38 (C)
[   48.347796]  dump_stack_lvl+0x8c/0xd0
[   48.347830]  print_report+0x118/0x608
[   48.347862]  kasan_report+0xdc/0x128
[   48.347889]  kasan_check_range+0x100/0x1a8
[   48.347922]  __kasan_check_write+0x20/0x30
[   48.347955]  kasan_atomics_helper+0x684/0x4858
[   48.347983]  kasan_atomics+0x198/0x2e0
[   48.348009]  kunit_try_run_case+0x170/0x3f0
[   48.348044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.348081]  kthread+0x328/0x630
[   48.348113]  ret_from_fork+0x10/0x20
[   48.348145] 
[   48.417894] Allocated by task 314:
[   48.421280]  kasan_save_stack+0x3c/0x68
[   48.425100]  kasan_save_track+0x20/0x40
[   48.428919]  kasan_save_alloc_info+0x40/0x58
[   48.433172]  __kasan_kmalloc+0xd4/0xd8
[   48.436904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.441418]  kasan_atomics+0xb8/0x2e0
[   48.445064]  kunit_try_run_case+0x170/0x3f0
[   48.449231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.454699]  kthread+0x328/0x630
[   48.457911]  ret_from_fork+0x10/0x20
[   48.461470] 
[   48.462945] The buggy address belongs to the object at ffff000803afab80
[   48.462945]  which belongs to the cache kmalloc-64 of size 64
[   48.475272] The buggy address is located 0 bytes to the right of
[   48.475272]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   48.488119] 
[   48.489595] The buggy address belongs to the physical page:
[   48.495151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   48.503137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.509647] page_type: f5(slab)
[   48.512779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.520504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.528223] page dumped because: kasan: bad access detected
[   48.533778] 
[   48.535254] Memory state around the buggy address:
[   48.540033]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.547237]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.554441] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.561642]                                      ^
[   48.566420]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.573625]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.580826] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   42.771790] ==================================================================
[   42.778833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.787771] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   42.795062] 
[   42.796543] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   42.796590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.796606] Hardware name: WinLink E850-96 board (DT)
[   42.796624] Call trace:
[   42.796636]  show_stack+0x20/0x38 (C)
[   42.796665]  dump_stack_lvl+0x8c/0xd0
[   42.796697]  print_report+0x118/0x608
[   42.796724]  kasan_report+0xdc/0x128
[   42.796752]  __asan_report_load8_noabort+0x20/0x30
[   42.796790]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   42.796823]  kasan_bitops_generic+0x11c/0x1c8
[   42.796851]  kunit_try_run_case+0x170/0x3f0
[   42.796886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.796924]  kthread+0x328/0x630
[   42.796957]  ret_from_fork+0x10/0x20
[   42.796986] 
[   42.865634] Allocated by task 310:
[   42.869020]  kasan_save_stack+0x3c/0x68
[   42.872839]  kasan_save_track+0x20/0x40
[   42.876658]  kasan_save_alloc_info+0x40/0x58
[   42.880912]  __kasan_kmalloc+0xd4/0xd8
[   42.884644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.889158]  kasan_bitops_generic+0xa0/0x1c8
[   42.893411]  kunit_try_run_case+0x170/0x3f0
[   42.897578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.903047]  kthread+0x328/0x630
[   42.906258]  ret_from_fork+0x10/0x20
[   42.909817] 
[   42.911293] The buggy address belongs to the object at ffff000800d63020
[   42.911293]  which belongs to the cache kmalloc-16 of size 16
[   42.923620] The buggy address is located 8 bytes inside of
[   42.923620]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.935859] 
[   42.937335] The buggy address belongs to the physical page:
[   42.942891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.950876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.957386] page_type: f5(slab)
[   42.960519] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.968244] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.975963] page dumped because: kasan: bad access detected
[   42.981518] 
[   42.982993] Memory state around the buggy address:
[   42.987773]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.994976]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.002181] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.009382]                                   ^
[   43.013900]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.021104]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.028307] ==================================================================
[   44.098140] ==================================================================
[   44.105201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.114140] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   44.121431] 
[   44.122912] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.122958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.122974] Hardware name: WinLink E850-96 board (DT)
[   44.122993] Call trace:
[   44.123005]  show_stack+0x20/0x38 (C)
[   44.123037]  dump_stack_lvl+0x8c/0xd0
[   44.123069]  print_report+0x118/0x608
[   44.123099]  kasan_report+0xdc/0x128
[   44.123128]  __asan_report_load8_noabort+0x20/0x30
[   44.123160]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   44.123193]  kasan_bitops_generic+0x11c/0x1c8
[   44.123223]  kunit_try_run_case+0x170/0x3f0
[   44.123257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.123297]  kthread+0x328/0x630
[   44.123326]  ret_from_fork+0x10/0x20
[   44.123357] 
[   44.192003] Allocated by task 310:
[   44.195389]  kasan_save_stack+0x3c/0x68
[   44.199208]  kasan_save_track+0x20/0x40
[   44.203027]  kasan_save_alloc_info+0x40/0x58
[   44.207281]  __kasan_kmalloc+0xd4/0xd8
[   44.211013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.215527]  kasan_bitops_generic+0xa0/0x1c8
[   44.219780]  kunit_try_run_case+0x170/0x3f0
[   44.223947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.229416]  kthread+0x328/0x630
[   44.232628]  ret_from_fork+0x10/0x20
[   44.236186] 
[   44.237664] The buggy address belongs to the object at ffff000800d63020
[   44.237664]  which belongs to the cache kmalloc-16 of size 16
[   44.249989] The buggy address is located 8 bytes inside of
[   44.249989]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   44.262228] 
[   44.263703] The buggy address belongs to the physical page:
[   44.269260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.277245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.283755] page_type: f5(slab)
[   44.286888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.294612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.302331] page dumped because: kasan: bad access detected
[   44.307887] 
[   44.309362] Memory state around the buggy address:
[   44.314141]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.321345]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.328550] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.335751]                                   ^
[   44.340268]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.347474]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.354674] ==================================================================
[   42.504414] ==================================================================
[   42.511476] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.520414] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   42.527792] 
[   42.529273] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   42.529319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.529335] Hardware name: WinLink E850-96 board (DT)
[   42.529352] Call trace:
[   42.529365]  show_stack+0x20/0x38 (C)
[   42.529399]  dump_stack_lvl+0x8c/0xd0
[   42.529433]  print_report+0x118/0x608
[   42.529463]  kasan_report+0xdc/0x128
[   42.529493]  kasan_check_range+0x100/0x1a8
[   42.529525]  __kasan_check_write+0x20/0x30
[   42.529556]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   42.529589]  kasan_bitops_generic+0x11c/0x1c8
[   42.529618]  kunit_try_run_case+0x170/0x3f0
[   42.529655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.529691]  kthread+0x328/0x630
[   42.529723]  ret_from_fork+0x10/0x20
[   42.529753] 
[   42.601749] Allocated by task 310:
[   42.605134]  kasan_save_stack+0x3c/0x68
[   42.608954]  kasan_save_track+0x20/0x40
[   42.612773]  kasan_save_alloc_info+0x40/0x58
[   42.617027]  __kasan_kmalloc+0xd4/0xd8
[   42.620759]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.625273]  kasan_bitops_generic+0xa0/0x1c8
[   42.629526]  kunit_try_run_case+0x170/0x3f0
[   42.633693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.639162]  kthread+0x328/0x630
[   42.642373]  ret_from_fork+0x10/0x20
[   42.645932] 
[   42.647408] The buggy address belongs to the object at ffff000800d63020
[   42.647408]  which belongs to the cache kmalloc-16 of size 16
[   42.659735] The buggy address is located 8 bytes inside of
[   42.659735]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.671974] 
[   42.673450] The buggy address belongs to the physical page:
[   42.679006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.686991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.693501] page_type: f5(slab)
[   42.696634] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.704358] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.712077] page dumped because: kasan: bad access detected
[   42.717632] 
[   42.719108] Memory state around the buggy address:
[   42.723888]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.731091]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.738296] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.745497]                                   ^
[   42.750015]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.757219]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.764420] ==================================================================
[   43.566899] ==================================================================
[   43.573961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.582898] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.590276] 
[   43.591757] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.591804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.591820] Hardware name: WinLink E850-96 board (DT)
[   43.591838] Call trace:
[   43.591851]  show_stack+0x20/0x38 (C)
[   43.591880]  dump_stack_lvl+0x8c/0xd0
[   43.591913]  print_report+0x118/0x608
[   43.591942]  kasan_report+0xdc/0x128
[   43.591970]  kasan_check_range+0x100/0x1a8
[   43.592002]  __kasan_check_write+0x20/0x30
[   43.592034]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   43.592068]  kasan_bitops_generic+0x11c/0x1c8
[   43.592096]  kunit_try_run_case+0x170/0x3f0
[   43.592129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.592166]  kthread+0x328/0x630
[   43.592201]  ret_from_fork+0x10/0x20
[   43.592230] 
[   43.664233] Allocated by task 310:
[   43.667619]  kasan_save_stack+0x3c/0x68
[   43.671438]  kasan_save_track+0x20/0x40
[   43.675257]  kasan_save_alloc_info+0x40/0x58
[   43.679511]  __kasan_kmalloc+0xd4/0xd8
[   43.683243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.687757]  kasan_bitops_generic+0xa0/0x1c8
[   43.692011]  kunit_try_run_case+0x170/0x3f0
[   43.696177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.701646]  kthread+0x328/0x630
[   43.704858]  ret_from_fork+0x10/0x20
[   43.708416] 
[   43.709894] The buggy address belongs to the object at ffff000800d63020
[   43.709894]  which belongs to the cache kmalloc-16 of size 16
[   43.722219] The buggy address is located 8 bytes inside of
[   43.722219]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.734458] 
[   43.735934] The buggy address belongs to the physical page:
[   43.741489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.749475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.755986] page_type: f5(slab)
[   43.759118] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.766843] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.774561] page dumped because: kasan: bad access detected
[   43.780117] 
[   43.781592] Memory state around the buggy address:
[   43.786373]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.793575]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.800780] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.807981]                                   ^
[   43.812499]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.819704]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.826904] ==================================================================
[   43.834280] ==================================================================
[   43.841316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.850255] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.857546] 
[   43.859027] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.859074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.859089] Hardware name: WinLink E850-96 board (DT)
[   43.859106] Call trace:
[   43.859120]  show_stack+0x20/0x38 (C)
[   43.859148]  dump_stack_lvl+0x8c/0xd0
[   43.859182]  print_report+0x118/0x608
[   43.859211]  kasan_report+0xdc/0x128
[   43.859241]  __asan_report_load8_noabort+0x20/0x30
[   43.859276]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   43.859310]  kasan_bitops_generic+0x11c/0x1c8
[   43.859338]  kunit_try_run_case+0x170/0x3f0
[   43.859369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.859407]  kthread+0x328/0x630
[   43.859438]  ret_from_fork+0x10/0x20
[   43.859469] 
[   43.928118] Allocated by task 310:
[   43.931504]  kasan_save_stack+0x3c/0x68
[   43.935323]  kasan_save_track+0x20/0x40
[   43.939142]  kasan_save_alloc_info+0x40/0x58
[   43.943396]  __kasan_kmalloc+0xd4/0xd8
[   43.947128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.951642]  kasan_bitops_generic+0xa0/0x1c8
[   43.955895]  kunit_try_run_case+0x170/0x3f0
[   43.960062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.965531]  kthread+0x328/0x630
[   43.968742]  ret_from_fork+0x10/0x20
[   43.972302] 
[   43.973778] The buggy address belongs to the object at ffff000800d63020
[   43.973778]  which belongs to the cache kmalloc-16 of size 16
[   43.986104] The buggy address is located 8 bytes inside of
[   43.986104]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.998343] 
[   43.999819] The buggy address belongs to the physical page:
[   44.005375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.013360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.019870] page_type: f5(slab)
[   44.023003] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.030727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.038446] page dumped because: kasan: bad access detected
[   44.044002] 
[   44.045477] Memory state around the buggy address:
[   44.050255]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.057460]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.064665] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.071866]                                   ^
[   44.076384]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.083588]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.090790] ==================================================================
[   41.973352] ==================================================================
[   41.980406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.989259] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.996637] 
[   41.998118] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.998164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.998181] Hardware name: WinLink E850-96 board (DT)
[   41.998200] Call trace:
[   41.998213]  show_stack+0x20/0x38 (C)
[   41.998243]  dump_stack_lvl+0x8c/0xd0
[   41.998278]  print_report+0x118/0x608
[   41.998307]  kasan_report+0xdc/0x128
[   41.998335]  kasan_check_range+0x100/0x1a8
[   41.998367]  __kasan_check_write+0x20/0x30
[   41.998397]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   41.998432]  kasan_bitops_generic+0x11c/0x1c8
[   41.998461]  kunit_try_run_case+0x170/0x3f0
[   41.998495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.998532]  kthread+0x328/0x630
[   41.998563]  ret_from_fork+0x10/0x20
[   41.998594] 
[   42.070507] Allocated by task 310:
[   42.073893]  kasan_save_stack+0x3c/0x68
[   42.077712]  kasan_save_track+0x20/0x40
[   42.081531]  kasan_save_alloc_info+0x40/0x58
[   42.085785]  __kasan_kmalloc+0xd4/0xd8
[   42.089517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.094031]  kasan_bitops_generic+0xa0/0x1c8
[   42.098284]  kunit_try_run_case+0x170/0x3f0
[   42.102451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.107919]  kthread+0x328/0x630
[   42.111132]  ret_from_fork+0x10/0x20
[   42.114690] 
[   42.116166] The buggy address belongs to the object at ffff000800d63020
[   42.116166]  which belongs to the cache kmalloc-16 of size 16
[   42.128493] The buggy address is located 8 bytes inside of
[   42.128493]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.140732] 
[   42.142209] The buggy address belongs to the physical page:
[   42.147764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.155749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.162259] page_type: f5(slab)
[   42.165392] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.173117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.180835] page dumped because: kasan: bad access detected
[   42.186391] 
[   42.187866] Memory state around the buggy address:
[   42.192646]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.199849]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.207054] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.214255]                                   ^
[   42.218773]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.225977]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.233178] ==================================================================
[   43.303010] ==================================================================
[   43.310073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.319013] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.326304] 
[   43.327784] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.327832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.327849] Hardware name: WinLink E850-96 board (DT)
[   43.327869] Call trace:
[   43.327880]  show_stack+0x20/0x38 (C)
[   43.327909]  dump_stack_lvl+0x8c/0xd0
[   43.327941]  print_report+0x118/0x608
[   43.327970]  kasan_report+0xdc/0x128
[   43.328000]  __asan_report_load8_noabort+0x20/0x30
[   43.328033]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   43.328068]  kasan_bitops_generic+0x11c/0x1c8
[   43.328096]  kunit_try_run_case+0x170/0x3f0
[   43.328131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.328169]  kthread+0x328/0x630
[   43.328202]  ret_from_fork+0x10/0x20
[   43.328231] 
[   43.396876] Allocated by task 310:
[   43.400262]  kasan_save_stack+0x3c/0x68
[   43.404081]  kasan_save_track+0x20/0x40
[   43.407900]  kasan_save_alloc_info+0x40/0x58
[   43.412154]  __kasan_kmalloc+0xd4/0xd8
[   43.415886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.420400]  kasan_bitops_generic+0xa0/0x1c8
[   43.424653]  kunit_try_run_case+0x170/0x3f0
[   43.428820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.434289]  kthread+0x328/0x630
[   43.437501]  ret_from_fork+0x10/0x20
[   43.441059] 
[   43.442537] The buggy address belongs to the object at ffff000800d63020
[   43.442537]  which belongs to the cache kmalloc-16 of size 16
[   43.454862] The buggy address is located 8 bytes inside of
[   43.454862]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.467101] 
[   43.468576] The buggy address belongs to the physical page:
[   43.474132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.482118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.488628] page_type: f5(slab)
[   43.491761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.499485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.507205] page dumped because: kasan: bad access detected
[   43.512760] 
[   43.514235] Memory state around the buggy address:
[   43.519014]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.526218]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.533423] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.540624]                                   ^
[   43.545142]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.552346]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.559547] ==================================================================
[   42.240553] ==================================================================
[   42.247590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.256530] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   42.263820] 
[   42.265300] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   42.265345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.265360] Hardware name: WinLink E850-96 board (DT)
[   42.265378] Call trace:
[   42.265390]  show_stack+0x20/0x38 (C)
[   42.265424]  dump_stack_lvl+0x8c/0xd0
[   42.265456]  print_report+0x118/0x608
[   42.265486]  kasan_report+0xdc/0x128
[   42.265515]  __asan_report_load8_noabort+0x20/0x30
[   42.265548]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   42.265583]  kasan_bitops_generic+0x11c/0x1c8
[   42.265610]  kunit_try_run_case+0x170/0x3f0
[   42.265645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.265685]  kthread+0x328/0x630
[   42.265715]  ret_from_fork+0x10/0x20
[   42.265747] 
[   42.334392] Allocated by task 310:
[   42.337778]  kasan_save_stack+0x3c/0x68
[   42.341597]  kasan_save_track+0x20/0x40
[   42.345416]  kasan_save_alloc_info+0x40/0x58
[   42.349670]  __kasan_kmalloc+0xd4/0xd8
[   42.353402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.357916]  kasan_bitops_generic+0xa0/0x1c8
[   42.362170]  kunit_try_run_case+0x170/0x3f0
[   42.366336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.371805]  kthread+0x328/0x630
[   42.375016]  ret_from_fork+0x10/0x20
[   42.378575] 
[   42.380052] The buggy address belongs to the object at ffff000800d63020
[   42.380052]  which belongs to the cache kmalloc-16 of size 16
[   42.392378] The buggy address is located 8 bytes inside of
[   42.392378]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   42.404617] 
[   42.406094] The buggy address belongs to the physical page:
[   42.411648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.419634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.426144] page_type: f5(slab)
[   42.429277] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.437001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.444720] page dumped because: kasan: bad access detected
[   42.450276] 
[   42.451751] Memory state around the buggy address:
[   42.456530]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.463734]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.470939] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   42.478140]                                   ^
[   42.482658]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.489862]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.497064] ==================================================================
[   43.035627] ==================================================================
[   43.042716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.051656] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   43.059034] 
[   43.060514] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   43.060562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.060577] Hardware name: WinLink E850-96 board (DT)
[   43.060596] Call trace:
[   43.060606]  show_stack+0x20/0x38 (C)
[   43.060636]  dump_stack_lvl+0x8c/0xd0
[   43.060669]  print_report+0x118/0x608
[   43.060698]  kasan_report+0xdc/0x128
[   43.060726]  kasan_check_range+0x100/0x1a8
[   43.060757]  __kasan_check_write+0x20/0x30
[   43.060788]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   43.060822]  kasan_bitops_generic+0x11c/0x1c8
[   43.060853]  kunit_try_run_case+0x170/0x3f0
[   43.060888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.060927]  kthread+0x328/0x630
[   43.060959]  ret_from_fork+0x10/0x20
[   43.060989] 
[   43.132992] Allocated by task 310:
[   43.136376]  kasan_save_stack+0x3c/0x68
[   43.140196]  kasan_save_track+0x20/0x40
[   43.144015]  kasan_save_alloc_info+0x40/0x58
[   43.148268]  __kasan_kmalloc+0xd4/0xd8
[   43.152001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.156515]  kasan_bitops_generic+0xa0/0x1c8
[   43.160768]  kunit_try_run_case+0x170/0x3f0
[   43.164935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.170404]  kthread+0x328/0x630
[   43.173615]  ret_from_fork+0x10/0x20
[   43.177175] 
[   43.178652] The buggy address belongs to the object at ffff000800d63020
[   43.178652]  which belongs to the cache kmalloc-16 of size 16
[   43.190977] The buggy address is located 8 bytes inside of
[   43.190977]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   43.203216] 
[   43.204692] The buggy address belongs to the physical page:
[   43.210249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.218233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.224743] page_type: f5(slab)
[   43.227876] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.235600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.243320] page dumped because: kasan: bad access detected
[   43.248875] 
[   43.250350] Memory state around the buggy address:
[   43.255129]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.262334]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.269538] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   43.276739]                                   ^
[   43.281257]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.288461]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.295664] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   39.327019] ==================================================================
[   39.336351] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.344507] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   39.351886] 
[   39.353372] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.353430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.353448] Hardware name: WinLink E850-96 board (DT)
[   39.353471] Call trace:
[   39.353485]  show_stack+0x20/0x38 (C)
[   39.353519]  dump_stack_lvl+0x8c/0xd0
[   39.353556]  print_report+0x118/0x608
[   39.353587]  kasan_report+0xdc/0x128
[   39.353619]  kasan_check_range+0x100/0x1a8
[   39.353651]  __kasan_check_write+0x20/0x30
[   39.353687]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.353719]  kasan_bitops_generic+0x110/0x1c8
[   39.353750]  kunit_try_run_case+0x170/0x3f0
[   39.353787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.353826]  kthread+0x328/0x630
[   39.353862]  ret_from_fork+0x10/0x20
[   39.353898] 
[   39.425063] Allocated by task 310:
[   39.428448]  kasan_save_stack+0x3c/0x68
[   39.432265]  kasan_save_track+0x20/0x40
[   39.436085]  kasan_save_alloc_info+0x40/0x58
[   39.440338]  __kasan_kmalloc+0xd4/0xd8
[   39.444071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.448585]  kasan_bitops_generic+0xa0/0x1c8
[   39.452838]  kunit_try_run_case+0x170/0x3f0
[   39.457004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.462473]  kthread+0x328/0x630
[   39.465685]  ret_from_fork+0x10/0x20
[   39.469244] 
[   39.470722] The buggy address belongs to the object at ffff000800d63020
[   39.470722]  which belongs to the cache kmalloc-16 of size 16
[   39.483050] The buggy address is located 8 bytes inside of
[   39.483050]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   39.495285] 
[   39.496765] The buggy address belongs to the physical page:
[   39.502320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   39.510305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.516814] page_type: f5(slab)
[   39.519952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.527670] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.535392] page dumped because: kasan: bad access detected
[   39.540944] 
[   39.542419] Memory state around the buggy address:
[   39.547199]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.554403]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.561610] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   39.568809]                                   ^
[   39.573326]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.580531]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.587733] ==================================================================
[   39.857451] ==================================================================
[   39.864471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.872625] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   39.880002] 
[   39.881487] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.881537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.881552] Hardware name: WinLink E850-96 board (DT)
[   39.881573] Call trace:
[   39.881586]  show_stack+0x20/0x38 (C)
[   39.881620]  dump_stack_lvl+0x8c/0xd0
[   39.881659]  print_report+0x118/0x608
[   39.881688]  kasan_report+0xdc/0x128
[   39.881717]  kasan_check_range+0x100/0x1a8
[   39.881750]  __kasan_check_write+0x20/0x30
[   39.881781]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.881813]  kasan_bitops_generic+0x110/0x1c8
[   39.881844]  kunit_try_run_case+0x170/0x3f0
[   39.881879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.881915]  kthread+0x328/0x630
[   39.881950]  ret_from_fork+0x10/0x20
[   39.881987] 
[   39.953178] Allocated by task 310:
[   39.956566]  kasan_save_stack+0x3c/0x68
[   39.960382]  kasan_save_track+0x20/0x40
[   39.964203]  kasan_save_alloc_info+0x40/0x58
[   39.968455]  __kasan_kmalloc+0xd4/0xd8
[   39.972188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.976702]  kasan_bitops_generic+0xa0/0x1c8
[   39.980955]  kunit_try_run_case+0x170/0x3f0
[   39.985122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.990590]  kthread+0x328/0x630
[   39.993802]  ret_from_fork+0x10/0x20
[   39.997361] 
[   39.998839] The buggy address belongs to the object at ffff000800d63020
[   39.998839]  which belongs to the cache kmalloc-16 of size 16
[   40.011164] The buggy address is located 8 bytes inside of
[   40.011164]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.023402] 
[   40.024880] The buggy address belongs to the physical page:
[   40.030438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.038420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.044930] page_type: f5(slab)
[   40.048067] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.055787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.063506] page dumped because: kasan: bad access detected
[   40.069061] 
[   40.070537] Memory state around the buggy address:
[   40.075318]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.082522]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.089726] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.096926]                                   ^
[   40.101445]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.108648]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.115849] ==================================================================
[   41.711041] ==================================================================
[   41.718085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.726242] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.733533] 
[   41.735015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.735059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.735076] Hardware name: WinLink E850-96 board (DT)
[   41.735096] Call trace:
[   41.735110]  show_stack+0x20/0x38 (C)
[   41.735140]  dump_stack_lvl+0x8c/0xd0
[   41.735175]  print_report+0x118/0x608
[   41.735208]  kasan_report+0xdc/0x128
[   41.735236]  __asan_report_load8_noabort+0x20/0x30
[   41.735274]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.735305]  kasan_bitops_generic+0x110/0x1c8
[   41.735335]  kunit_try_run_case+0x170/0x3f0
[   41.735370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.735408]  kthread+0x328/0x630
[   41.735440]  ret_from_fork+0x10/0x20
[   41.735473] 
[   41.803324] Allocated by task 310:
[   41.806709]  kasan_save_stack+0x3c/0x68
[   41.810529]  kasan_save_track+0x20/0x40
[   41.814348]  kasan_save_alloc_info+0x40/0x58
[   41.818601]  __kasan_kmalloc+0xd4/0xd8
[   41.822334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.826847]  kasan_bitops_generic+0xa0/0x1c8
[   41.831101]  kunit_try_run_case+0x170/0x3f0
[   41.835267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.840736]  kthread+0x328/0x630
[   41.843948]  ret_from_fork+0x10/0x20
[   41.847507] 
[   41.848984] The buggy address belongs to the object at ffff000800d63020
[   41.848984]  which belongs to the cache kmalloc-16 of size 16
[   41.861309] The buggy address is located 8 bytes inside of
[   41.861309]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.873548] 
[   41.875024] The buggy address belongs to the physical page:
[   41.880580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.888566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.895076] page_type: f5(slab)
[   41.898209] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.905933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.913652] page dumped because: kasan: bad access detected
[   41.919207] 
[   41.920683] Memory state around the buggy address:
[   41.925461]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.932666]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.939871] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.947072]                                   ^
[   41.951589]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.958794]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.965995] ==================================================================
[   40.123151] ==================================================================
[   40.130263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.138418] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.145710] 
[   40.147194] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.147245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.147261] Hardware name: WinLink E850-96 board (DT)
[   40.147280] Call trace:
[   40.147294]  show_stack+0x20/0x38 (C)
[   40.147329]  dump_stack_lvl+0x8c/0xd0
[   40.147364]  print_report+0x118/0x608
[   40.147393]  kasan_report+0xdc/0x128
[   40.147420]  __asan_report_load8_noabort+0x20/0x30
[   40.147456]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.147487]  kasan_bitops_generic+0x110/0x1c8
[   40.147517]  kunit_try_run_case+0x170/0x3f0
[   40.147551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.147588]  kthread+0x328/0x630
[   40.147620]  ret_from_fork+0x10/0x20
[   40.147653] 
[   40.215500] Allocated by task 310:
[   40.218886]  kasan_save_stack+0x3c/0x68
[   40.222705]  kasan_save_track+0x20/0x40
[   40.226524]  kasan_save_alloc_info+0x40/0x58
[   40.230778]  __kasan_kmalloc+0xd4/0xd8
[   40.234510]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.239024]  kasan_bitops_generic+0xa0/0x1c8
[   40.243278]  kunit_try_run_case+0x170/0x3f0
[   40.247444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.252913]  kthread+0x328/0x630
[   40.256125]  ret_from_fork+0x10/0x20
[   40.259684] 
[   40.261161] The buggy address belongs to the object at ffff000800d63020
[   40.261161]  which belongs to the cache kmalloc-16 of size 16
[   40.273486] The buggy address is located 8 bytes inside of
[   40.273486]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.285725] 
[   40.287202] The buggy address belongs to the physical page:
[   40.292758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.300742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.307252] page_type: f5(slab)
[   40.310387] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.318110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.325829] page dumped because: kasan: bad access detected
[   40.331384] 
[   40.332859] Memory state around the buggy address:
[   40.337640]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.344843]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.352047] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.359248]                                   ^
[   40.363766]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.370971]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.378171] ==================================================================
[   40.917079] ==================================================================
[   40.924174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.932330] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.939621] 
[   40.941106] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.941156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.941173] Hardware name: WinLink E850-96 board (DT)
[   40.941192] Call trace:
[   40.941204]  show_stack+0x20/0x38 (C)
[   40.941238]  dump_stack_lvl+0x8c/0xd0
[   40.941272]  print_report+0x118/0x608
[   40.941303]  kasan_report+0xdc/0x128
[   40.941331]  __asan_report_load8_noabort+0x20/0x30
[   40.941370]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.941402]  kasan_bitops_generic+0x110/0x1c8
[   40.941432]  kunit_try_run_case+0x170/0x3f0
[   40.941467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.941504]  kthread+0x328/0x630
[   40.941538]  ret_from_fork+0x10/0x20
[   40.941570] 
[   41.009412] Allocated by task 310:
[   41.012798]  kasan_save_stack+0x3c/0x68
[   41.016617]  kasan_save_track+0x20/0x40
[   41.020436]  kasan_save_alloc_info+0x40/0x58
[   41.024690]  __kasan_kmalloc+0xd4/0xd8
[   41.028422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.032936]  kasan_bitops_generic+0xa0/0x1c8
[   41.037189]  kunit_try_run_case+0x170/0x3f0
[   41.041356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.046824]  kthread+0x328/0x630
[   41.050036]  ret_from_fork+0x10/0x20
[   41.053595] 
[   41.055072] The buggy address belongs to the object at ffff000800d63020
[   41.055072]  which belongs to the cache kmalloc-16 of size 16
[   41.067398] The buggy address is located 8 bytes inside of
[   41.067398]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.079637] 
[   41.081113] The buggy address belongs to the physical page:
[   41.086670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.094654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.101164] page_type: f5(slab)
[   41.104298] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.112022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.119740] page dumped because: kasan: bad access detected
[   41.125296] 
[   41.126771] Memory state around the buggy address:
[   41.131551]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.138754]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.145959] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.153160]                                   ^
[   41.157677]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.164882]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.172083] ==================================================================
[   41.445191] ==================================================================
[   41.452292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.460447] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.467825] 
[   41.469306] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.469356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.469372] Hardware name: WinLink E850-96 board (DT)
[   41.469391] Call trace:
[   41.469403]  show_stack+0x20/0x38 (C)
[   41.469435]  dump_stack_lvl+0x8c/0xd0
[   41.469472]  print_report+0x118/0x608
[   41.469502]  kasan_report+0xdc/0x128
[   41.469531]  kasan_check_range+0x100/0x1a8
[   41.469559]  __kasan_check_write+0x20/0x30
[   41.469593]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.469625]  kasan_bitops_generic+0x110/0x1c8
[   41.469653]  kunit_try_run_case+0x170/0x3f0
[   41.469685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.469725]  kthread+0x328/0x630
[   41.469757]  ret_from_fork+0x10/0x20
[   41.469791] 
[   41.541001] Allocated by task 310:
[   41.544387]  kasan_save_stack+0x3c/0x68
[   41.548206]  kasan_save_track+0x20/0x40
[   41.552025]  kasan_save_alloc_info+0x40/0x58
[   41.556279]  __kasan_kmalloc+0xd4/0xd8
[   41.560011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.564525]  kasan_bitops_generic+0xa0/0x1c8
[   41.568779]  kunit_try_run_case+0x170/0x3f0
[   41.572945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.578414]  kthread+0x328/0x630
[   41.581626]  ret_from_fork+0x10/0x20
[   41.585184] 
[   41.586660] The buggy address belongs to the object at ffff000800d63020
[   41.586660]  which belongs to the cache kmalloc-16 of size 16
[   41.598987] The buggy address is located 8 bytes inside of
[   41.598987]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.611227] 
[   41.612702] The buggy address belongs to the physical page:
[   41.618257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.626243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.632755] page_type: f5(slab)
[   41.635888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.643611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.651329] page dumped because: kasan: bad access detected
[   41.656885] 
[   41.658360] Memory state around the buggy address:
[   41.663140]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.670343]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.677548] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.684749]                                   ^
[   41.689267]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.696472]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.703672] ==================================================================
[   39.595066] ==================================================================
[   39.602145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.610301] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   39.617593] 
[   39.619077] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.619125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.619143] Hardware name: WinLink E850-96 board (DT)
[   39.619165] Call trace:
[   39.619181]  show_stack+0x20/0x38 (C)
[   39.619214]  dump_stack_lvl+0x8c/0xd0
[   39.619250]  print_report+0x118/0x608
[   39.619280]  kasan_report+0xdc/0x128
[   39.619309]  __asan_report_load8_noabort+0x20/0x30
[   39.619346]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.619377]  kasan_bitops_generic+0x110/0x1c8
[   39.619405]  kunit_try_run_case+0x170/0x3f0
[   39.619441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.619478]  kthread+0x328/0x630
[   39.619513]  ret_from_fork+0x10/0x20
[   39.619547] 
[   39.687383] Allocated by task 310:
[   39.690770]  kasan_save_stack+0x3c/0x68
[   39.694588]  kasan_save_track+0x20/0x40
[   39.698407]  kasan_save_alloc_info+0x40/0x58
[   39.702661]  __kasan_kmalloc+0xd4/0xd8
[   39.706393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.710907]  kasan_bitops_generic+0xa0/0x1c8
[   39.715160]  kunit_try_run_case+0x170/0x3f0
[   39.719327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.724796]  kthread+0x328/0x630
[   39.728008]  ret_from_fork+0x10/0x20
[   39.731566] 
[   39.733044] The buggy address belongs to the object at ffff000800d63020
[   39.733044]  which belongs to the cache kmalloc-16 of size 16
[   39.745369] The buggy address is located 8 bytes inside of
[   39.745369]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   39.757608] 
[   39.759087] The buggy address belongs to the physical page:
[   39.764641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   39.772625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.779135] page_type: f5(slab)
[   39.782272] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.789992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.797711] page dumped because: kasan: bad access detected
[   39.803267] 
[   39.804742] Memory state around the buggy address:
[   39.809523]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.816726]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.823932] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   39.831131]                                   ^
[   39.835649]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.842854]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.850055] ==================================================================
[   40.385489] ==================================================================
[   40.392586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.400741] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.408119] 
[   40.409601] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.409654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.409670] Hardware name: WinLink E850-96 board (DT)
[   40.409689] Call trace:
[   40.409702]  show_stack+0x20/0x38 (C)
[   40.409733]  dump_stack_lvl+0x8c/0xd0
[   40.409767]  print_report+0x118/0x608
[   40.409798]  kasan_report+0xdc/0x128
[   40.409826]  kasan_check_range+0x100/0x1a8
[   40.409859]  __kasan_check_write+0x20/0x30
[   40.409891]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.409921]  kasan_bitops_generic+0x110/0x1c8
[   40.409950]  kunit_try_run_case+0x170/0x3f0
[   40.409986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.410023]  kthread+0x328/0x630
[   40.410058]  ret_from_fork+0x10/0x20
[   40.410095] 
[   40.481295] Allocated by task 310:
[   40.484680]  kasan_save_stack+0x3c/0x68
[   40.488499]  kasan_save_track+0x20/0x40
[   40.492319]  kasan_save_alloc_info+0x40/0x58
[   40.496573]  __kasan_kmalloc+0xd4/0xd8
[   40.500305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.504819]  kasan_bitops_generic+0xa0/0x1c8
[   40.509072]  kunit_try_run_case+0x170/0x3f0
[   40.513238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.518708]  kthread+0x328/0x630
[   40.521919]  ret_from_fork+0x10/0x20
[   40.525478] 
[   40.526954] The buggy address belongs to the object at ffff000800d63020
[   40.526954]  which belongs to the cache kmalloc-16 of size 16
[   40.539282] The buggy address is located 8 bytes inside of
[   40.539282]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.551519] 
[   40.552997] The buggy address belongs to the physical page:
[   40.558554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.566537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.573047] page_type: f5(slab)
[   40.576183] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.583904] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.591623] page dumped because: kasan: bad access detected
[   40.597178] 
[   40.598654] Memory state around the buggy address:
[   40.603435]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.610639]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.617844] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.625043]                                   ^
[   40.629560]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.636765]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.643968] ==================================================================
[   41.179386] ==================================================================
[   41.186497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.194652] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.202031] 
[   41.203515] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.203562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.203579] Hardware name: WinLink E850-96 board (DT)
[   41.203596] Call trace:
[   41.203608]  show_stack+0x20/0x38 (C)
[   41.203639]  dump_stack_lvl+0x8c/0xd0
[   41.203673]  print_report+0x118/0x608
[   41.203703]  kasan_report+0xdc/0x128
[   41.203733]  kasan_check_range+0x100/0x1a8
[   41.203765]  __kasan_check_write+0x20/0x30
[   41.203800]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.203832]  kasan_bitops_generic+0x110/0x1c8
[   41.203862]  kunit_try_run_case+0x170/0x3f0
[   41.203896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.203935]  kthread+0x328/0x630
[   41.203967]  ret_from_fork+0x10/0x20
[   41.203998] 
[   41.275206] Allocated by task 310:
[   41.278592]  kasan_save_stack+0x3c/0x68
[   41.282411]  kasan_save_track+0x20/0x40
[   41.286231]  kasan_save_alloc_info+0x40/0x58
[   41.290484]  __kasan_kmalloc+0xd4/0xd8
[   41.294217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.298730]  kasan_bitops_generic+0xa0/0x1c8
[   41.302984]  kunit_try_run_case+0x170/0x3f0
[   41.307150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.312619]  kthread+0x328/0x630
[   41.315831]  ret_from_fork+0x10/0x20
[   41.319390] 
[   41.320866] The buggy address belongs to the object at ffff000800d63020
[   41.320866]  which belongs to the cache kmalloc-16 of size 16
[   41.333192] The buggy address is located 8 bytes inside of
[   41.333192]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.345431] 
[   41.346907] The buggy address belongs to the physical page:
[   41.352464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.360450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.366960] page_type: f5(slab)
[   41.370093] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.377816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.385535] page dumped because: kasan: bad access detected
[   41.391090] 
[   41.392566] Memory state around the buggy address:
[   41.397347]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.404549]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.411753] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.418954]                                   ^
[   41.423472]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.430677]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.437878] ==================================================================
[   40.651273] ==================================================================
[   40.658380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.666535] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.673914] 
[   40.675400] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.675448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.675465] Hardware name: WinLink E850-96 board (DT)
[   40.675485] Call trace:
[   40.675497]  show_stack+0x20/0x38 (C)
[   40.675531]  dump_stack_lvl+0x8c/0xd0
[   40.675566]  print_report+0x118/0x608
[   40.675593]  kasan_report+0xdc/0x128
[   40.675619]  kasan_check_range+0x100/0x1a8
[   40.675650]  __kasan_check_write+0x20/0x30
[   40.675682]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.675715]  kasan_bitops_generic+0x110/0x1c8
[   40.675745]  kunit_try_run_case+0x170/0x3f0
[   40.675779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.675817]  kthread+0x328/0x630
[   40.675849]  ret_from_fork+0x10/0x20
[   40.675884] 
[   40.747089] Allocated by task 310:
[   40.750477]  kasan_save_stack+0x3c/0x68
[   40.754294]  kasan_save_track+0x20/0x40
[   40.758114]  kasan_save_alloc_info+0x40/0x58
[   40.762367]  __kasan_kmalloc+0xd4/0xd8
[   40.766100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.770614]  kasan_bitops_generic+0xa0/0x1c8
[   40.774867]  kunit_try_run_case+0x170/0x3f0
[   40.779033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.784502]  kthread+0x328/0x630
[   40.787714]  ret_from_fork+0x10/0x20
[   40.791273] 
[   40.792749] The buggy address belongs to the object at ffff000800d63020
[   40.792749]  which belongs to the cache kmalloc-16 of size 16
[   40.805076] The buggy address is located 8 bytes inside of
[   40.805076]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.817314] 
[   40.818790] The buggy address belongs to the physical page:
[   40.824347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.832331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.838842] page_type: f5(slab)
[   40.841976] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.849700] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.857418] page dumped because: kasan: bad access detected
[   40.862973] 
[   40.864449] Memory state around the buggy address:
[   40.869230]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.876432]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.883636] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.890837]                                   ^
[   40.895355]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.902560]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.909761] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   39.024310] ==================================================================
[   39.031321] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   39.037307] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308
[   39.044598] 
[   39.046082] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.046134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.046152] Hardware name: WinLink E850-96 board (DT)
[   39.046172] Call trace:
[   39.046184]  show_stack+0x20/0x38 (C)
[   39.046221]  dump_stack_lvl+0x8c/0xd0
[   39.046254]  print_report+0x118/0x608
[   39.046287]  kasan_report+0xdc/0x128
[   39.046316]  __asan_report_load1_noabort+0x20/0x30
[   39.046350]  strnlen+0x80/0x88
[   39.046376]  kasan_strings+0x478/0xb00
[   39.046408]  kunit_try_run_case+0x170/0x3f0
[   39.046445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.046483]  kthread+0x328/0x630
[   39.046515]  ret_from_fork+0x10/0x20
[   39.046551] 
[   39.111524] Allocated by task 308:
[   39.114911]  kasan_save_stack+0x3c/0x68
[   39.118728]  kasan_save_track+0x20/0x40
[   39.122548]  kasan_save_alloc_info+0x40/0x58
[   39.126801]  __kasan_kmalloc+0xd4/0xd8
[   39.130534]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.135048]  kasan_strings+0xc8/0xb00
[   39.138693]  kunit_try_run_case+0x170/0x3f0
[   39.142860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.148329]  kthread+0x328/0x630
[   39.151540]  ret_from_fork+0x10/0x20
[   39.155100] 
[   39.156575] Freed by task 308:
[   39.159614]  kasan_save_stack+0x3c/0x68
[   39.163433]  kasan_save_track+0x20/0x40
[   39.167252]  kasan_save_free_info+0x4c/0x78
[   39.171419]  __kasan_slab_free+0x6c/0x98
[   39.175325]  kfree+0x214/0x3c8
[   39.178363]  kasan_strings+0x24c/0xb00
[   39.182095]  kunit_try_run_case+0x170/0x3f0
[   39.186262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.191731]  kthread+0x328/0x630
[   39.194943]  ret_from_fork+0x10/0x20
[   39.198502] 
[   39.199977] The buggy address belongs to the object at ffff000800cab9c0
[   39.199977]  which belongs to the cache kmalloc-32 of size 32
[   39.212307] The buggy address is located 16 bytes inside of
[   39.212307]  freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0)
[   39.224369] 
[   39.225847] The buggy address belongs to the physical page:
[   39.231403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab
[   39.239386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.245897] page_type: f5(slab)
[   39.249033] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   39.256755] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   39.264474] page dumped because: kasan: bad access detected
[   39.270028] 
[   39.271504] Memory state around the buggy address:
[   39.276287]  ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.283487]  ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.290693] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.297893]                                                  ^
[   39.303712]  ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.310917]  ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   39.318119] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   38.723198] ==================================================================
[   38.730282] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   38.736183] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308
[   38.743474] 
[   38.744958] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   38.745010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.745026] Hardware name: WinLink E850-96 board (DT)
[   38.745047] Call trace:
[   38.745061]  show_stack+0x20/0x38 (C)
[   38.745096]  dump_stack_lvl+0x8c/0xd0
[   38.745130]  print_report+0x118/0x608
[   38.745162]  kasan_report+0xdc/0x128
[   38.745191]  __asan_report_load1_noabort+0x20/0x30
[   38.745227]  strlen+0xa8/0xb0
[   38.745254]  kasan_strings+0x418/0xb00
[   38.745285]  kunit_try_run_case+0x170/0x3f0
[   38.745321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.745360]  kthread+0x328/0x630
[   38.745393]  ret_from_fork+0x10/0x20
[   38.745428] 
[   38.810313] Allocated by task 308:
[   38.813702]  kasan_save_stack+0x3c/0x68
[   38.817518]  kasan_save_track+0x20/0x40
[   38.821337]  kasan_save_alloc_info+0x40/0x58
[   38.825590]  __kasan_kmalloc+0xd4/0xd8
[   38.829323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.833837]  kasan_strings+0xc8/0xb00
[   38.837483]  kunit_try_run_case+0x170/0x3f0
[   38.841649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.847118]  kthread+0x328/0x630
[   38.850330]  ret_from_fork+0x10/0x20
[   38.853889] 
[   38.855364] Freed by task 308:
[   38.858403]  kasan_save_stack+0x3c/0x68
[   38.862222]  kasan_save_track+0x20/0x40
[   38.866041]  kasan_save_free_info+0x4c/0x78
[   38.870208]  __kasan_slab_free+0x6c/0x98
[   38.874114]  kfree+0x214/0x3c8
[   38.877152]  kasan_strings+0x24c/0xb00
[   38.880885]  kunit_try_run_case+0x170/0x3f0
[   38.885051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.890520]  kthread+0x328/0x630
[   38.893732]  ret_from_fork+0x10/0x20
[   38.897291] 
[   38.898767] The buggy address belongs to the object at ffff000800cab9c0
[   38.898767]  which belongs to the cache kmalloc-32 of size 32
[   38.911093] The buggy address is located 16 bytes inside of
[   38.911093]  freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0)
[   38.923159] 
[   38.924636] The buggy address belongs to the physical page:
[   38.930193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab
[   38.938176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.944686] page_type: f5(slab)
[   38.947820] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   38.955543] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.963262] page dumped because: kasan: bad access detected
[   38.968817] 
[   38.970293] Memory state around the buggy address:
[   38.975075]  ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.982276]  ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.989483] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.996681]                                                  ^
[   39.002501]  ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.009706]  ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   39.016907] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   38.424342] ==================================================================
[   38.431420] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   38.438098] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308
[   38.445388] 
[   38.446874] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   38.446928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.446945] Hardware name: WinLink E850-96 board (DT)
[   38.446963] Call trace:
[   38.446978]  show_stack+0x20/0x38 (C)
[   38.447010]  dump_stack_lvl+0x8c/0xd0
[   38.447049]  print_report+0x118/0x608
[   38.447078]  kasan_report+0xdc/0x128
[   38.447106]  __asan_report_load1_noabort+0x20/0x30
[   38.447141]  kasan_strings+0x95c/0xb00
[   38.447174]  kunit_try_run_case+0x170/0x3f0
[   38.447211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.447249]  kthread+0x328/0x630
[   38.447284]  ret_from_fork+0x10/0x20
[   38.447318] 
[   38.509275] Allocated by task 308:
[   38.512660]  kasan_save_stack+0x3c/0x68
[   38.516480]  kasan_save_track+0x20/0x40
[   38.520300]  kasan_save_alloc_info+0x40/0x58
[   38.524554]  __kasan_kmalloc+0xd4/0xd8
[   38.528286]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.532800]  kasan_strings+0xc8/0xb00
[   38.536446]  kunit_try_run_case+0x170/0x3f0
[   38.540612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.546082]  kthread+0x328/0x630
[   38.549293]  ret_from_fork+0x10/0x20
[   38.552852] 
[   38.554327] Freed by task 308:
[   38.557366]  kasan_save_stack+0x3c/0x68
[   38.561185]  kasan_save_track+0x20/0x40
[   38.565004]  kasan_save_free_info+0x4c/0x78
[   38.569171]  __kasan_slab_free+0x6c/0x98
[   38.573077]  kfree+0x214/0x3c8
[   38.576115]  kasan_strings+0x24c/0xb00
[   38.579848]  kunit_try_run_case+0x170/0x3f0
[   38.584014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.589483]  kthread+0x328/0x630
[   38.592695]  ret_from_fork+0x10/0x20
[   38.596254] 
[   38.597730] The buggy address belongs to the object at ffff000800cab9c0
[   38.597730]  which belongs to the cache kmalloc-32 of size 32
[   38.610056] The buggy address is located 16 bytes inside of
[   38.610056]  freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0)
[   38.622121] 
[   38.623599] The buggy address belongs to the physical page:
[   38.629156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab
[   38.637141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.643650] page_type: f5(slab)
[   38.646785] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   38.654506] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.662225] page dumped because: kasan: bad access detected
[   38.667780] 
[   38.669256] Memory state around the buggy address:
[   38.674036]  ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.681239]  ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.688445] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.695645]                                                  ^
[   38.701464]  ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.708668]  ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   38.715870] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   38.106807] ==================================================================
[   38.130379] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   38.136279] Read of size 1 at addr ffff000800cab9d0 by task kunit_try_catch/308
[   38.143571] 
[   38.145058] CPU: 6 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   38.145115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.145133] Hardware name: WinLink E850-96 board (DT)
[   38.145155] Call trace:
[   38.145170]  show_stack+0x20/0x38 (C)
[   38.145205]  dump_stack_lvl+0x8c/0xd0
[   38.145241]  print_report+0x118/0x608
[   38.145275]  kasan_report+0xdc/0x128
[   38.145307]  __asan_report_load1_noabort+0x20/0x30
[   38.145344]  strcmp+0xc0/0xc8
[   38.145372]  kasan_strings+0x340/0xb00
[   38.145406]  kunit_try_run_case+0x170/0x3f0
[   38.145444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.145485]  kthread+0x328/0x630
[   38.145519]  ret_from_fork+0x10/0x20
[   38.145557] 
[   38.210409] Allocated by task 308:
[   38.213798]  kasan_save_stack+0x3c/0x68
[   38.217613]  kasan_save_track+0x20/0x40
[   38.221433]  kasan_save_alloc_info+0x40/0x58
[   38.225686]  __kasan_kmalloc+0xd4/0xd8
[   38.229419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   38.233933]  kasan_strings+0xc8/0xb00
[   38.237578]  kunit_try_run_case+0x170/0x3f0
[   38.241745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.247215]  kthread+0x328/0x630
[   38.250426]  ret_from_fork+0x10/0x20
[   38.253985] 
[   38.255461] Freed by task 308:
[   38.258500]  kasan_save_stack+0x3c/0x68
[   38.262317]  kasan_save_track+0x20/0x40
[   38.266137]  kasan_save_free_info+0x4c/0x78
[   38.270304]  __kasan_slab_free+0x6c/0x98
[   38.274210]  kfree+0x214/0x3c8
[   38.277248]  kasan_strings+0x24c/0xb00
[   38.280981]  kunit_try_run_case+0x170/0x3f0
[   38.285147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.290616]  kthread+0x328/0x630
[   38.293828]  ret_from_fork+0x10/0x20
[   38.297387] 
[   38.298864] The buggy address belongs to the object at ffff000800cab9c0
[   38.298864]  which belongs to the cache kmalloc-32 of size 32
[   38.311192] The buggy address is located 16 bytes inside of
[   38.311192]  freed 32-byte region [ffff000800cab9c0, ffff000800cab9e0)
[   38.323254] 
[   38.324732] The buggy address belongs to the physical page:
[   38.330290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab
[   38.338273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.344783] page_type: f5(slab)
[   38.347922] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   38.355639] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.363359] page dumped because: kasan: bad access detected
[   38.368913] 
[   38.370389] Memory state around the buggy address:
[   38.375172]  ffff000800cab880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.382372]  ffff000800cab900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.389578] >ffff000800cab980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.396777]                                                  ^
[   38.402597]  ffff000800caba00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.409802]  ffff000800caba80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   38.417005] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   37.806179] ==================================================================
[   37.816409] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   37.822394] Read of size 1 at addr ffff000800d61358 by task kunit_try_catch/306
[   37.829687] 
[   37.831174] CPU: 7 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   37.831230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.831247] Hardware name: WinLink E850-96 board (DT)
[   37.831271] Call trace:
[   37.831285]  show_stack+0x20/0x38 (C)
[   37.831322]  dump_stack_lvl+0x8c/0xd0
[   37.831360]  print_report+0x118/0x608
[   37.831395]  kasan_report+0xdc/0x128
[   37.831427]  __asan_report_load1_noabort+0x20/0x30
[   37.831465]  memcmp+0x198/0x1d8
[   37.831493]  kasan_memcmp+0x16c/0x300
[   37.831528]  kunit_try_run_case+0x170/0x3f0
[   37.831566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.831607]  kthread+0x328/0x630
[   37.831643]  ret_from_fork+0x10/0x20
[   37.831680] 
[   37.896612] Allocated by task 306:
[   37.900001]  kasan_save_stack+0x3c/0x68
[   37.903816]  kasan_save_track+0x20/0x40
[   37.907636]  kasan_save_alloc_info+0x40/0x58
[   37.911889]  __kasan_kmalloc+0xd4/0xd8
[   37.915621]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.920135]  kasan_memcmp+0xbc/0x300
[   37.923694]  kunit_try_run_case+0x170/0x3f0
[   37.927861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.933329]  kthread+0x328/0x630
[   37.936541]  ret_from_fork+0x10/0x20
[   37.940100] 
[   37.941577] The buggy address belongs to the object at ffff000800d61340
[   37.941577]  which belongs to the cache kmalloc-32 of size 32
[   37.953906] The buggy address is located 0 bytes to the right of
[   37.953906]  allocated 24-byte region [ffff000800d61340, ffff000800d61358)
[   37.966749] 
[   37.968228] The buggy address belongs to the physical page:
[   37.973785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   37.981768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.988278] page_type: f5(slab)
[   37.991414] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   37.999135] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.006854] page dumped because: kasan: bad access detected
[   38.012408] 
[   38.013884] Memory state around the buggy address:
[   38.018667]  ffff000800d61200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.025867]  ffff000800d61280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.033074] >ffff000800d61300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.040272]                                                     ^
[   38.046353]  ffff000800d61380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.053559]  ffff000800d61400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.060760] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   37.573491] ==================================================================
[   37.583167] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   37.590717] Read of size 1 at addr ffff800089397b4a by task kunit_try_catch/302
[   37.598005] 
[   37.599491] CPU: 6 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   37.599547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.599568] Hardware name: WinLink E850-96 board (DT)
[   37.599591] Call trace:
[   37.599607]  show_stack+0x20/0x38 (C)
[   37.599642]  dump_stack_lvl+0x8c/0xd0
[   37.599682]  print_report+0x310/0x608
[   37.599716]  kasan_report+0xdc/0x128
[   37.599744]  __asan_report_load1_noabort+0x20/0x30
[   37.599781]  kasan_alloca_oob_right+0x2dc/0x340
[   37.599816]  kunit_try_run_case+0x170/0x3f0
[   37.599854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.599896]  kthread+0x328/0x630
[   37.599932]  ret_from_fork+0x10/0x20
[   37.599970] 
[   37.662676] The buggy address belongs to stack of task kunit_try_catch/302
[   37.669554] 
[   37.671013] The buggy address belongs to the virtual mapping at
[   37.671013]  [ffff800089390000, ffff800089399000) created by:
[   37.671013]  kernel_clone+0x150/0x7a8
[   37.686285] 
[   37.687764] The buggy address belongs to the physical page:
[   37.693320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884967
[   37.701304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.707827] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.715544] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.723266] page dumped because: kasan: bad access detected
[   37.728819] 
[   37.730294] Memory state around the buggy address:
[   37.735077]  ffff800089397a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.742277]  ffff800089397a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.749484] >ffff800089397b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   37.756683]                                               ^
[   37.762242]  ffff800089397b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   37.769450]  ffff800089397c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.776650] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   37.360442] ==================================================================
[   37.369452] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   37.376917] Read of size 1 at addr ffff800089377b5f by task kunit_try_catch/300
[   37.384207] 
[   37.385692] CPU: 7 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   37.385752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.385770] Hardware name: WinLink E850-96 board (DT)
[   37.385792] Call trace:
[   37.385806]  show_stack+0x20/0x38 (C)
[   37.385843]  dump_stack_lvl+0x8c/0xd0
[   37.385880]  print_report+0x310/0x608
[   37.385913]  kasan_report+0xdc/0x128
[   37.385941]  __asan_report_load1_noabort+0x20/0x30
[   37.385981]  kasan_alloca_oob_left+0x2b8/0x310
[   37.386017]  kunit_try_run_case+0x170/0x3f0
[   37.386054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.386093]  kthread+0x328/0x630
[   37.386131]  ret_from_fork+0x10/0x20
[   37.386168] 
[   37.448792] The buggy address belongs to stack of task kunit_try_catch/300
[   37.455669] 
[   37.457126] The buggy address belongs to the virtual mapping at
[   37.457126]  [ffff800089370000, ffff800089379000) created by:
[   37.457126]  kernel_clone+0x150/0x7a8
[   37.472399] 
[   37.473879] The buggy address belongs to the physical page:
[   37.479435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffffffffffffff pfn:0x882607
[   37.488720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.495246] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.502961] raw: ffffffffffffffff 0000000000000000 00000001ffffffff 0000000000000000
[   37.510681] page dumped because: kasan: bad access detected
[   37.516235] 
[   37.517711] Memory state around the buggy address:
[   37.522493]  ffff800089377a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.529694]  ffff800089377a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.536901] >ffff800089377b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   37.544099]                                                     ^
[   37.550179]  ffff800089377b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   37.557384]  ffff800089377c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.564587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   37.118572] ==================================================================
[   37.132915] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   37.139767] Read of size 1 at addr ffff800089357c2a by task kunit_try_catch/298
[   37.147058] 
[   37.148544] CPU: 6 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   37.148600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.148620] Hardware name: WinLink E850-96 board (DT)
[   37.148644] Call trace:
[   37.148658]  show_stack+0x20/0x38 (C)
[   37.148692]  dump_stack_lvl+0x8c/0xd0
[   37.148728]  print_report+0x310/0x608
[   37.148759]  kasan_report+0xdc/0x128
[   37.148790]  __asan_report_load1_noabort+0x20/0x30
[   37.148828]  kasan_stack_oob+0x238/0x270
[   37.148861]  kunit_try_run_case+0x170/0x3f0
[   37.148897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.148939]  kthread+0x328/0x630
[   37.148973]  ret_from_fork+0x10/0x20
[   37.149009] 
[   37.211123] The buggy address belongs to stack of task kunit_try_catch/298
[   37.217977]  and is located at offset 138 in frame:
[   37.222837]  kasan_stack_oob+0x0/0x270
[   37.226574] 
[   37.228045] This frame has 4 objects:
[   37.231697]  [48, 49) '__assertion'
[   37.231719]  [64, 72) 'array'
[   37.235166]  [96, 112) '__assertion'
[   37.238116]  [128, 138) 'stack_array'
[   37.241673] 
[   37.246800] The buggy address belongs to the virtual mapping at
[   37.246800]  [ffff800089350000, ffff800089359000) created by:
[   37.246800]  kernel_clone+0x150/0x7a8
[   37.262072] 
[   37.263552] The buggy address belongs to the physical page:
[   37.269109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88624a
[   37.277092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.283616] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.291332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.299052] page dumped because: kasan: bad access detected
[   37.304606] 
[   37.306082] Memory state around the buggy address:
[   37.310863]  ffff800089357b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.318066]  ffff800089357b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   37.325271] >ffff800089357c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   37.332471]                                   ^
[   37.336988]  ffff800089357c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   37.344193]  ffff800089357d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   37.351396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   36.901156] ==================================================================
[   36.911733] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   36.919286] Read of size 1 at addr ffff800087a035ad by task kunit_try_catch/294
[   36.926576] 
[   36.928061] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.928118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.928136] Hardware name: WinLink E850-96 board (DT)
[   36.928159] Call trace:
[   36.928172]  show_stack+0x20/0x38 (C)
[   36.928210]  dump_stack_lvl+0x8c/0xd0
[   36.928247]  print_report+0x310/0x608
[   36.928278]  kasan_report+0xdc/0x128
[   36.928308]  __asan_report_load1_noabort+0x20/0x30
[   36.928348]  kasan_global_oob_right+0x230/0x270
[   36.928382]  kunit_try_run_case+0x170/0x3f0
[   36.928419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.928459]  kthread+0x328/0x630
[   36.928493]  ret_from_fork+0x10/0x20
[   36.928532] 
[   36.991244] The buggy address belongs to the variable:
[   36.996364]  global_array+0xd/0x40
[   36.999751] 
[   37.001235] The buggy address belongs to the virtual mapping at
[   37.001235]  [ffff800085c20000, ffff800087ac1000) created by:
[   37.001235]  paging_init+0x66c/0x7d0
[   37.016416] 
[   37.017898] The buggy address belongs to the physical page:
[   37.023454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87a03
[   37.031349] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   37.038654] raw: 03fffe0000002000 fffffdffc01e80c8 fffffdffc01e80c8 0000000000000000
[   37.046370] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.054091] page dumped because: kasan: bad access detected
[   37.059645] 
[   37.061120] Memory state around the buggy address:
[   37.065902]  ffff800087a03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.073104]  ffff800087a03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   37.080311] >ffff800087a03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   37.087509]                                   ^
[   37.092027]  ffff800087a03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   37.099232]  ffff800087a03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   37.106434] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   36.662016] ==================================================================
[   36.672154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.680137] Free of addr ffff000803260001 by task kunit_try_catch/292
[   36.686560] 
[   36.688048] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.688105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.688120] Hardware name: WinLink E850-96 board (DT)
[   36.688141] Call trace:
[   36.688153]  show_stack+0x20/0x38 (C)
[   36.688189]  dump_stack_lvl+0x8c/0xd0
[   36.688229]  print_report+0x118/0x608
[   36.688257]  kasan_report_invalid_free+0xc0/0xe8
[   36.688291]  __kasan_mempool_poison_object+0xfc/0x150
[   36.688327]  mempool_free+0x28c/0x328
[   36.688361]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.688398]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   36.688435]  kunit_try_run_case+0x170/0x3f0
[   36.688471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.688511]  kthread+0x328/0x630
[   36.688544]  ret_from_fork+0x10/0x20
[   36.688580] 
[   36.762779] The buggy address belongs to the physical page:
[   36.768334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   36.776319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.783957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.790900] page_type: f8(unknown)
[   36.794302] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.802016] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.809742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.817554] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.825367] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff
[   36.833179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.840986] page dumped because: kasan: bad access detected
[   36.846540] 
[   36.848016] Memory state around the buggy address:
[   36.852796]  ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.860001]  ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.867208] >ffff000803260000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.874405]                    ^
[   36.877620]  ffff000803260080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.884825]  ffff000803260100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.892027] ==================================================================
[   36.336045] ==================================================================
[   36.346554] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.354535] Free of addr ffff000802678a01 by task kunit_try_catch/290
[   36.360959] 
[   36.362445] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.362500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.362516] Hardware name: WinLink E850-96 board (DT)
[   36.362537] Call trace:
[   36.362550]  show_stack+0x20/0x38 (C)
[   36.362586]  dump_stack_lvl+0x8c/0xd0
[   36.362624]  print_report+0x118/0x608
[   36.362656]  kasan_report_invalid_free+0xc0/0xe8
[   36.362689]  check_slab_allocation+0xfc/0x108
[   36.362720]  __kasan_mempool_poison_object+0x78/0x150
[   36.362753]  mempool_free+0x28c/0x328
[   36.362790]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.362828]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.362864]  kunit_try_run_case+0x170/0x3f0
[   36.362901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.362941]  kthread+0x328/0x630
[   36.362975]  ret_from_fork+0x10/0x20
[   36.363009] 
[   36.440991] Allocated by task 290:
[   36.444380]  kasan_save_stack+0x3c/0x68
[   36.448195]  kasan_save_track+0x20/0x40
[   36.452015]  kasan_save_alloc_info+0x40/0x58
[   36.456268]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.461565]  remove_element+0x130/0x1f8
[   36.465383]  mempool_alloc_preallocated+0x58/0xc0
[   36.470070]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   36.475626]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.480573]  kunit_try_run_case+0x170/0x3f0
[   36.484741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.490209]  kthread+0x328/0x630
[   36.493420]  ret_from_fork+0x10/0x20
[   36.496980] 
[   36.498457] The buggy address belongs to the object at ffff000802678a00
[   36.498457]  which belongs to the cache kmalloc-128 of size 128
[   36.510958] The buggy address is located 1 bytes inside of
[   36.510958]  128-byte region [ffff000802678a00, ffff000802678a80)
[   36.522500] 
[   36.523978] The buggy address belongs to the physical page:
[   36.529535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   36.537519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.545158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.552101] page_type: f5(slab)
[   36.555238] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.562958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.570684] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.578495] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.586308] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   36.594120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.601927] page dumped because: kasan: bad access detected
[   36.607481] 
[   36.608957] Memory state around the buggy address:
[   36.613741]  ffff000802678900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.620942]  ffff000802678980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.628146] >ffff000802678a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.635346]                    ^
[   36.638561]  ffff000802678a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.645766]  ffff000802678b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.652968] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   35.904841] ==================================================================
[   35.914354] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.921469] Free of addr ffff000803260000 by task kunit_try_catch/286
[   35.927891] 
[   35.929379] CPU: 6 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   35.929433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.929450] Hardware name: WinLink E850-96 board (DT)
[   35.929471] Call trace:
[   35.929484]  show_stack+0x20/0x38 (C)
[   35.929522]  dump_stack_lvl+0x8c/0xd0
[   35.929560]  print_report+0x118/0x608
[   35.929590]  kasan_report_invalid_free+0xc0/0xe8
[   35.929621]  __kasan_mempool_poison_object+0x14c/0x150
[   35.929657]  mempool_free+0x28c/0x328
[   35.929692]  mempool_double_free_helper+0x150/0x2e8
[   35.929729]  mempool_kmalloc_large_double_free+0xc0/0x118
[   35.929765]  kunit_try_run_case+0x170/0x3f0
[   35.929800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.929839]  kthread+0x328/0x630
[   35.929872]  ret_from_fork+0x10/0x20
[   35.929908] 
[   36.003328] The buggy address belongs to the physical page:
[   36.008884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   36.016867] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.024507] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.031448] page_type: f8(unknown)
[   36.034849] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.042566] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.050292] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.058103] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.065917] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff
[   36.073729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.081536] page dumped because: kasan: bad access detected
[   36.087089] 
[   36.088565] Memory state around the buggy address:
[   36.093346]  ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.100550]  ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.107757] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.114954]                    ^
[   36.118169]  ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.125374]  ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.132577] ==================================================================
[   35.530633] ==================================================================
[   35.540314] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   35.547429] Free of addr ffff000802678600 by task kunit_try_catch/284
[   35.553852] 
[   35.555339] CPU: 7 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   35.555393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.555410] Hardware name: WinLink E850-96 board (DT)
[   35.555430] Call trace:
[   35.555442]  show_stack+0x20/0x38 (C)
[   35.555475]  dump_stack_lvl+0x8c/0xd0
[   35.555512]  print_report+0x118/0x608
[   35.555544]  kasan_report_invalid_free+0xc0/0xe8
[   35.555579]  check_slab_allocation+0xd4/0x108
[   35.555611]  __kasan_mempool_poison_object+0x78/0x150
[   35.555642]  mempool_free+0x28c/0x328
[   35.555678]  mempool_double_free_helper+0x150/0x2e8
[   35.555713]  mempool_kmalloc_double_free+0xc0/0x118
[   35.555747]  kunit_try_run_case+0x170/0x3f0
[   35.555784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.555823]  kthread+0x328/0x630
[   35.555858]  ret_from_fork+0x10/0x20
[   35.555894] 
[   35.633017] Allocated by task 284:
[   35.636406]  kasan_save_stack+0x3c/0x68
[   35.640221]  kasan_save_track+0x20/0x40
[   35.644042]  kasan_save_alloc_info+0x40/0x58
[   35.648294]  __kasan_mempool_unpoison_object+0x11c/0x180
[   35.653589]  remove_element+0x130/0x1f8
[   35.657409]  mempool_alloc_preallocated+0x58/0xc0
[   35.662098]  mempool_double_free_helper+0x94/0x2e8
[   35.666870]  mempool_kmalloc_double_free+0xc0/0x118
[   35.671732]  kunit_try_run_case+0x170/0x3f0
[   35.675898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.681367]  kthread+0x328/0x630
[   35.684578]  ret_from_fork+0x10/0x20
[   35.688137] 
[   35.689614] Freed by task 284:
[   35.692651]  kasan_save_stack+0x3c/0x68
[   35.696471]  kasan_save_track+0x20/0x40
[   35.700291]  kasan_save_free_info+0x4c/0x78
[   35.704457]  __kasan_mempool_poison_object+0xc0/0x150
[   35.709491]  mempool_free+0x28c/0x328
[   35.713137]  mempool_double_free_helper+0x100/0x2e8
[   35.717998]  mempool_kmalloc_double_free+0xc0/0x118
[   35.722859]  kunit_try_run_case+0x170/0x3f0
[   35.727026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.732494]  kthread+0x328/0x630
[   35.735708]  ret_from_fork+0x10/0x20
[   35.739265] 
[   35.740743] The buggy address belongs to the object at ffff000802678600
[   35.740743]  which belongs to the cache kmalloc-128 of size 128
[   35.753244] The buggy address is located 0 bytes inside of
[   35.753244]  128-byte region [ffff000802678600, ffff000802678680)
[   35.764785] 
[   35.766265] The buggy address belongs to the physical page:
[   35.771821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   35.779806] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.787444] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.794387] page_type: f5(slab)
[   35.797525] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.805243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.812969] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   35.820783] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.828594] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   35.836406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.844214] page dumped because: kasan: bad access detected
[   35.849767] 
[   35.851242] Memory state around the buggy address:
[   35.856025]  ffff000802678500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.863228]  ffff000802678580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.870435] >ffff000802678600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.877631]                    ^
[   35.880847]  ffff000802678680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.888051]  ffff000802678700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.895254] ==================================================================
[   36.141606] ==================================================================
[   36.152196] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   36.159314] Free of addr ffff000803260000 by task kunit_try_catch/288
[   36.165735] 
[   36.167222] CPU: 6 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.167273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.167292] Hardware name: WinLink E850-96 board (DT)
[   36.167317] Call trace:
[   36.167329]  show_stack+0x20/0x38 (C)
[   36.167366]  dump_stack_lvl+0x8c/0xd0
[   36.167406]  print_report+0x118/0x608
[   36.167436]  kasan_report_invalid_free+0xc0/0xe8
[   36.167469]  __kasan_mempool_poison_pages+0xe0/0xe8
[   36.167502]  mempool_free+0x24c/0x328
[   36.167537]  mempool_double_free_helper+0x150/0x2e8
[   36.167577]  mempool_page_alloc_double_free+0xbc/0x118
[   36.167608]  kunit_try_run_case+0x170/0x3f0
[   36.167648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.167686]  kthread+0x328/0x630
[   36.167719]  ret_from_fork+0x10/0x20
[   36.167757] 
[   36.240650] The buggy address belongs to the physical page:
[   36.246205] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   36.254190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.260713] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.268431] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.276152] page dumped because: kasan: bad access detected
[   36.281705] 
[   36.283180] Memory state around the buggy address:
[   36.287963]  ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.295165]  ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.302371] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.309569]                    ^
[   36.312785]  ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.319989]  ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.327192] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   35.347500] ==================================================================
[   35.352385] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   35.359063] Read of size 1 at addr ffff000803260000 by task kunit_try_catch/282
[   35.366354] 
[   35.367841] CPU: 6 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   35.367896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.367914] Hardware name: WinLink E850-96 board (DT)
[   35.367938] Call trace:
[   35.367952]  show_stack+0x20/0x38 (C)
[   35.367988]  dump_stack_lvl+0x8c/0xd0
[   35.368026]  print_report+0x118/0x608
[   35.368056]  kasan_report+0xdc/0x128
[   35.368085]  __asan_report_load1_noabort+0x20/0x30
[   35.368124]  mempool_uaf_helper+0x314/0x340
[   35.368159]  mempool_page_alloc_uaf+0xc0/0x118
[   35.368192]  kunit_try_run_case+0x170/0x3f0
[   35.368227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.368266]  kthread+0x328/0x630
[   35.368300]  ret_from_fork+0x10/0x20
[   35.368340] 
[   35.435108] The buggy address belongs to the physical page:
[   35.440661] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   35.448647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.455170] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.462887] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.470609] page dumped because: kasan: bad access detected
[   35.476162] 
[   35.477637] Memory state around the buggy address:
[   35.482418]  ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.489620]  ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.496827] >ffff000803260000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.504026]                    ^
[   35.507242]  ffff000803260080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.514446]  ffff000803260100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.521649] ==================================================================
[   34.788938] ==================================================================
[   34.798398] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.805081] Read of size 1 at addr ffff000801eb0000 by task kunit_try_catch/278
[   34.812370] 
[   34.813857] CPU: 4 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   34.813913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.813932] Hardware name: WinLink E850-96 board (DT)
[   34.813954] Call trace:
[   34.813967]  show_stack+0x20/0x38 (C)
[   34.814001]  dump_stack_lvl+0x8c/0xd0
[   34.814040]  print_report+0x118/0x608
[   34.814072]  kasan_report+0xdc/0x128
[   34.814103]  __asan_report_load1_noabort+0x20/0x30
[   34.814141]  mempool_uaf_helper+0x314/0x340
[   34.814175]  mempool_kmalloc_large_uaf+0xc4/0x120
[   34.814210]  kunit_try_run_case+0x170/0x3f0
[   34.814247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.814282]  kthread+0x328/0x630
[   34.814320]  ret_from_fork+0x10/0x20
[   34.814356] 
[   34.881380] The buggy address belongs to the physical page:
[   34.886938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881eb0
[   34.894924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.902562] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.909505] page_type: f8(unknown)
[   34.912902] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.920621] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.928347] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.936159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.943972] head: 0bfffe0000000002 fffffdffe007ac01 00000000ffffffff 00000000ffffffff
[   34.951784] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.959590] page dumped because: kasan: bad access detected
[   34.965145] 
[   34.966620] Memory state around the buggy address:
[   34.971404]  ffff000801eaff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.978603]  ffff000801eaff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.985812] >ffff000801eb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.993009]                    ^
[   34.996225]  ffff000801eb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.003429]  ffff000801eb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.010632] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   34.435252] ==================================================================
[   34.437119] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.444233] Read of size 1 at addr ffff0008018e7300 by task kunit_try_catch/276
[   34.451524] 
[   34.453011] CPU: 2 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   34.453070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.453090] Hardware name: WinLink E850-96 board (DT)
[   34.453114] Call trace:
[   34.453126]  show_stack+0x20/0x38 (C)
[   34.453159]  dump_stack_lvl+0x8c/0xd0
[   34.453195]  print_report+0x118/0x608
[   34.453225]  kasan_report+0xdc/0x128
[   34.453255]  __asan_report_load1_noabort+0x20/0x30
[   34.453291]  mempool_uaf_helper+0x314/0x340
[   34.453326]  mempool_kmalloc_uaf+0xc4/0x120
[   34.453359]  kunit_try_run_case+0x170/0x3f0
[   34.453394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.453430]  kthread+0x328/0x630
[   34.453465]  ret_from_fork+0x10/0x20
[   34.453500] 
[   34.520015] Allocated by task 276:
[   34.523402]  kasan_save_stack+0x3c/0x68
[   34.527217]  kasan_save_track+0x20/0x40
[   34.531037]  kasan_save_alloc_info+0x40/0x58
[   34.535290]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.540585]  remove_element+0x130/0x1f8
[   34.544405]  mempool_alloc_preallocated+0x58/0xc0
[   34.549092]  mempool_uaf_helper+0xa4/0x340
[   34.553172]  mempool_kmalloc_uaf+0xc4/0x120
[   34.557338]  kunit_try_run_case+0x170/0x3f0
[   34.561505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.566974]  kthread+0x328/0x630
[   34.570186]  ret_from_fork+0x10/0x20
[   34.573744] 
[   34.575221] Freed by task 276:
[   34.578260]  kasan_save_stack+0x3c/0x68
[   34.582078]  kasan_save_track+0x20/0x40
[   34.585897]  kasan_save_free_info+0x4c/0x78
[   34.590064]  __kasan_mempool_poison_object+0xc0/0x150
[   34.595098]  mempool_free+0x28c/0x328
[   34.598744]  mempool_uaf_helper+0x104/0x340
[   34.602910]  mempool_kmalloc_uaf+0xc4/0x120
[   34.607077]  kunit_try_run_case+0x170/0x3f0
[   34.611245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.616713]  kthread+0x328/0x630
[   34.619924]  ret_from_fork+0x10/0x20
[   34.623483] 
[   34.624960] The buggy address belongs to the object at ffff0008018e7300
[   34.624960]  which belongs to the cache kmalloc-128 of size 128
[   34.637463] The buggy address is located 0 bytes inside of
[   34.637463]  freed 128-byte region [ffff0008018e7300, ffff0008018e7380)
[   34.649524] 
[   34.651003] The buggy address belongs to the physical page:
[   34.656562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   34.664544] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.672184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.679126] page_type: f5(slab)
[   34.682264] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.689982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.697709] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   34.705520] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.713333] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   34.721145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.728950] page dumped because: kasan: bad access detected
[   34.734505] 
[   34.735981] Memory state around the buggy address:
[   34.740765]  ffff0008018e7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.747964]  ffff0008018e7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.755170] >ffff0008018e7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.762370]                    ^
[   34.765586]  ffff0008018e7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.772792]  ffff0008018e7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.779993] ==================================================================
[   35.020117] ==================================================================
[   35.029561] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   35.036675] Read of size 1 at addr ffff0008067bf240 by task kunit_try_catch/280
[   35.043965] 
[   35.045451] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   35.045507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.045523] Hardware name: WinLink E850-96 board (DT)
[   35.045546] Call trace:
[   35.045558]  show_stack+0x20/0x38 (C)
[   35.045594]  dump_stack_lvl+0x8c/0xd0
[   35.045633]  print_report+0x118/0x608
[   35.045666]  kasan_report+0xdc/0x128
[   35.045697]  __asan_report_load1_noabort+0x20/0x30
[   35.045734]  mempool_uaf_helper+0x314/0x340
[   35.045767]  mempool_slab_uaf+0xc0/0x118
[   35.045794]  kunit_try_run_case+0x170/0x3f0
[   35.045832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.045869]  kthread+0x328/0x630
[   35.045906]  ret_from_fork+0x10/0x20
[   35.045942] 
[   35.112192] Allocated by task 280:
[   35.115581]  kasan_save_stack+0x3c/0x68
[   35.119396]  kasan_save_track+0x20/0x40
[   35.123215]  kasan_save_alloc_info+0x40/0x58
[   35.127469]  __kasan_mempool_unpoison_object+0xbc/0x180
[   35.132677]  remove_element+0x16c/0x1f8
[   35.136496]  mempool_alloc_preallocated+0x58/0xc0
[   35.141185]  mempool_uaf_helper+0xa4/0x340
[   35.145264]  mempool_slab_uaf+0xc0/0x118
[   35.149170]  kunit_try_run_case+0x170/0x3f0
[   35.153337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.158805]  kthread+0x328/0x630
[   35.162017]  ret_from_fork+0x10/0x20
[   35.165576] 
[   35.167053] Freed by task 280:
[   35.170091]  kasan_save_stack+0x3c/0x68
[   35.173909]  kasan_save_track+0x20/0x40
[   35.177729]  kasan_save_free_info+0x4c/0x78
[   35.181895]  __kasan_mempool_poison_object+0xc0/0x150
[   35.186930]  mempool_free+0x28c/0x328
[   35.190575]  mempool_uaf_helper+0x104/0x340
[   35.194742]  mempool_slab_uaf+0xc0/0x118
[   35.198648]  kunit_try_run_case+0x170/0x3f0
[   35.202815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.208283]  kthread+0x328/0x630
[   35.211495]  ret_from_fork+0x10/0x20
[   35.215054] 
[   35.216532] The buggy address belongs to the object at ffff0008067bf240
[   35.216532]  which belongs to the cache test_cache of size 123
[   35.228947] The buggy address is located 0 bytes inside of
[   35.228947]  freed 123-byte region [ffff0008067bf240, ffff0008067bf2bb)
[   35.241009] 
[   35.242488] The buggy address belongs to the physical page:
[   35.248045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8867bf
[   35.256029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.262537] page_type: f5(slab)
[   35.265676] raw: 0bfffe0000000000 ffff000806738000 dead000000000122 0000000000000000
[   35.273394] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   35.281113] page dumped because: kasan: bad access detected
[   35.286668] 
[   35.288143] Memory state around the buggy address:
[   35.292927]  ffff0008067bf100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.300128]  ffff0008067bf180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.307335] >ffff0008067bf200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.314532]                                            ^
[   35.319831]  ffff0008067bf280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.327036]  ffff0008067bf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.334238] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   33.615574] ==================================================================
[   33.615752] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.615887] Read of size 1 at addr ffff000802778473 by task kunit_try_catch/270
[   33.622284] 
[   33.623771] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   33.623825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.623843] Hardware name: WinLink E850-96 board (DT)
[   33.623863] Call trace:
[   33.623879]  show_stack+0x20/0x38 (C)
[   33.623914]  dump_stack_lvl+0x8c/0xd0
[   33.623952]  print_report+0x118/0x608
[   33.623982]  kasan_report+0xdc/0x128
[   33.624010]  __asan_report_load1_noabort+0x20/0x30
[   33.624046]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.624081]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.624116]  kunit_try_run_case+0x170/0x3f0
[   33.624153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624191]  kthread+0x328/0x630
[   33.624226]  ret_from_fork+0x10/0x20
[   33.624262] 
[   33.691815] Allocated by task 270:
[   33.695203]  kasan_save_stack+0x3c/0x68
[   33.699018]  kasan_save_track+0x20/0x40
[   33.702839]  kasan_save_alloc_info+0x40/0x58
[   33.707091]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.712386]  remove_element+0x130/0x1f8
[   33.716205]  mempool_alloc_preallocated+0x58/0xc0
[   33.720893]  mempool_oob_right_helper+0x98/0x2f0
[   33.725493]  mempool_kmalloc_oob_right+0xc4/0x120
[   33.730180]  kunit_try_run_case+0x170/0x3f0
[   33.734347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.739817]  kthread+0x328/0x630
[   33.743028]  ret_from_fork+0x10/0x20
[   33.746587] 
[   33.748065] The buggy address belongs to the object at ffff000802778400
[   33.748065]  which belongs to the cache kmalloc-128 of size 128
[   33.760566] The buggy address is located 0 bytes to the right of
[   33.760566]  allocated 115-byte region [ffff000802778400, ffff000802778473)
[   33.773496] 
[   33.774975] The buggy address belongs to the physical page:
[   33.780532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882778
[   33.788515] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.796155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.803098] page_type: f5(slab)
[   33.806235] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   33.813954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.821681] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   33.829491] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.837309] head: 0bfffe0000000001 fffffdffe009de01 00000000ffffffff 00000000ffffffff
[   33.845116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.852923] page dumped because: kasan: bad access detected
[   33.858477] 
[   33.859953] Memory state around the buggy address:
[   33.864733]  ffff000802778300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.871936]  ffff000802778380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879142] >ffff000802778400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.886342]                                                              ^
[   33.893203]  ffff000802778480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.900407]  ffff000802778500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.907611] ==================================================================
[   33.916578] ==================================================================
[   33.926537] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.934086] Read of size 1 at addr ffff000803262001 by task kunit_try_catch/272
[   33.941376] 
[   33.942862] CPU: 6 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   33.942921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.942939] Hardware name: WinLink E850-96 board (DT)
[   33.942962] Call trace:
[   33.942975]  show_stack+0x20/0x38 (C)
[   33.943011]  dump_stack_lvl+0x8c/0xd0
[   33.943046]  print_report+0x118/0x608
[   33.943081]  kasan_report+0xdc/0x128
[   33.943110]  __asan_report_load1_noabort+0x20/0x30
[   33.943148]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.943184]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   33.943220]  kunit_try_run_case+0x170/0x3f0
[   33.943256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.943293]  kthread+0x328/0x630
[   33.943329]  ret_from_fork+0x10/0x20
[   33.943365] 
[   34.011428] The buggy address belongs to the physical page:
[   34.016987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   34.024970] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.032611] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.039551] page_type: f8(unknown)
[   34.042950] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.050668] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.058395] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.066206] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   34.074020] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff
[   34.081832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   34.089637] page dumped because: kasan: bad access detected
[   34.095192] 
[   34.096667] Memory state around the buggy address:
[   34.101448]  ffff000803261f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.108651]  ffff000803261f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.115859] >ffff000803262000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.123057]                    ^
[   34.126272]  ffff000803262080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.133477]  ffff000803262100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.140680] ==================================================================
[   34.150273] ==================================================================
[   34.160127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.167677] Read of size 1 at addr ffff00080675f2bb by task kunit_try_catch/274
[   34.174967] 
[   34.176454] CPU: 7 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   34.176508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.176525] Hardware name: WinLink E850-96 board (DT)
[   34.176546] Call trace:
[   34.176562]  show_stack+0x20/0x38 (C)
[   34.176596]  dump_stack_lvl+0x8c/0xd0
[   34.176635]  print_report+0x118/0x608
[   34.176663]  kasan_report+0xdc/0x128
[   34.176692]  __asan_report_load1_noabort+0x20/0x30
[   34.176727]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.176763]  mempool_slab_oob_right+0xc0/0x118
[   34.176792]  kunit_try_run_case+0x170/0x3f0
[   34.176829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.176866]  kthread+0x328/0x630
[   34.176902]  ret_from_fork+0x10/0x20
[   34.176936] 
[   34.244237] Allocated by task 274:
[   34.247625]  kasan_save_stack+0x3c/0x68
[   34.251440]  kasan_save_track+0x20/0x40
[   34.255260]  kasan_save_alloc_info+0x40/0x58
[   34.259513]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.264721]  remove_element+0x16c/0x1f8
[   34.268540]  mempool_alloc_preallocated+0x58/0xc0
[   34.273228]  mempool_oob_right_helper+0x98/0x2f0
[   34.277829]  mempool_slab_oob_right+0xc0/0x118
[   34.282256]  kunit_try_run_case+0x170/0x3f0
[   34.286422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.291891]  kthread+0x328/0x630
[   34.295103]  ret_from_fork+0x10/0x20
[   34.298662] 
[   34.300139] The buggy address belongs to the object at ffff00080675f240
[   34.300139]  which belongs to the cache test_cache of size 123
[   34.312553] The buggy address is located 0 bytes to the right of
[   34.312553]  allocated 123-byte region [ffff00080675f240, ffff00080675f2bb)
[   34.325484] 
[   34.326964] The buggy address belongs to the physical page:
[   34.332519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88675f
[   34.340504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.347013] page_type: f5(slab)
[   34.350151] raw: 0bfffe0000000000 ffff000801bca140 dead000000000122 0000000000000000
[   34.357871] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.365591] page dumped because: kasan: bad access detected
[   34.371143] 
[   34.372618] Memory state around the buggy address:
[   34.377401]  ffff00080675f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.384602]  ffff00080675f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.391810] >ffff00080675f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.399008]                                         ^
[   34.404046]  ffff00080675f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.411251]  ffff00080675f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.418453] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.727922] ==================================================================
[   32.728110] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   32.728252] Read of size 1 at addr ffff00080179f7c0 by task kunit_try_catch/264
[   32.731806] 
[   32.733292] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   32.733348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.733365] Hardware name: WinLink E850-96 board (DT)
[   32.733387] Call trace:
[   32.733402]  show_stack+0x20/0x38 (C)
[   32.733438]  dump_stack_lvl+0x8c/0xd0
[   32.733473]  print_report+0x118/0x608
[   32.733505]  kasan_report+0xdc/0x128
[   32.733532]  __kasan_check_byte+0x54/0x70
[   32.733565]  kmem_cache_destroy+0x34/0x218
[   32.733593]  kmem_cache_double_destroy+0x174/0x300
[   32.733628]  kunit_try_run_case+0x170/0x3f0
[   32.733663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.733700]  kthread+0x328/0x630
[   32.733734]  ret_from_fork+0x10/0x20
[   32.733771] 
[   32.800035] Allocated by task 264:
[   32.803422]  kasan_save_stack+0x3c/0x68
[   32.807238]  kasan_save_track+0x20/0x40
[   32.811057]  kasan_save_alloc_info+0x40/0x58
[   32.815310]  __kasan_slab_alloc+0xa8/0xb0
[   32.819304]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.823904]  __kmem_cache_create_args+0x178/0x280
[   32.828592]  kmem_cache_double_destroy+0xc0/0x300
[   32.833279]  kunit_try_run_case+0x170/0x3f0
[   32.837447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.842914]  kthread+0x328/0x630
[   32.846126]  ret_from_fork+0x10/0x20
[   32.849685] 
[   32.851162] Freed by task 264:
[   32.854201]  kasan_save_stack+0x3c/0x68
[   32.858020]  kasan_save_track+0x20/0x40
[   32.861838]  kasan_save_free_info+0x4c/0x78
[   32.866004]  __kasan_slab_free+0x6c/0x98
[   32.869912]  kmem_cache_free+0x260/0x468
[   32.873817]  slab_kmem_cache_release+0x38/0x50
[   32.878244]  kmem_cache_release+0x1c/0x30
[   32.882236]  kobject_put+0x17c/0x420
[   32.885796]  sysfs_slab_release+0x1c/0x30
[   32.889789]  kmem_cache_destroy+0x118/0x218
[   32.893955]  kmem_cache_double_destroy+0x128/0x300
[   32.898730]  kunit_try_run_case+0x170/0x3f0
[   32.902897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.908365]  kthread+0x328/0x630
[   32.911577]  ret_from_fork+0x10/0x20
[   32.915136] 
[   32.916613] The buggy address belongs to the object at ffff00080179f7c0
[   32.916613]  which belongs to the cache kmem_cache of size 208
[   32.929027] The buggy address is located 0 bytes inside of
[   32.929027]  freed 208-byte region [ffff00080179f7c0, ffff00080179f890)
[   32.941090] 
[   32.942570] The buggy address belongs to the physical page:
[   32.948125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88179e
[   32.956109] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.963750] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.970692] page_type: f5(slab)
[   32.973830] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   32.981549] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   32.989274] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000
[   32.997085] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   33.004898] head: 0bfffe0000000001 fffffdffe005e781 00000000ffffffff 00000000ffffffff
[   33.012712] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.020518] page dumped because: kasan: bad access detected
[   33.026071] 
[   33.027547] Memory state around the buggy address:
[   33.032329]  ffff00080179f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.039530]  ffff00080179f700: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   33.046738] >ffff00080179f780: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.053936]                                            ^
[   33.059234]  ffff00080179f800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.066441]  ffff00080179f880: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.073642] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   32.316840] ==================================================================
[   32.317030] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   32.317160] Read of size 1 at addr ffff000802604000 by task kunit_try_catch/262
[   32.320545] 
[   32.322032] CPU: 6 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   32.322088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.322105] Hardware name: WinLink E850-96 board (DT)
[   32.322127] Call trace:
[   32.322140]  show_stack+0x20/0x38 (C)
[   32.322176]  dump_stack_lvl+0x8c/0xd0
[   32.322215]  print_report+0x118/0x608
[   32.322248]  kasan_report+0xdc/0x128
[   32.322276]  __asan_report_load1_noabort+0x20/0x30
[   32.322317]  kmem_cache_rcu_uaf+0x388/0x468
[   32.322349]  kunit_try_run_case+0x170/0x3f0
[   32.322385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.322424]  kthread+0x328/0x630
[   32.322457]  ret_from_fork+0x10/0x20
[   32.322493] 
[   32.384868] Allocated by task 262:
[   32.388255]  kasan_save_stack+0x3c/0x68
[   32.392071]  kasan_save_track+0x20/0x40
[   32.395891]  kasan_save_alloc_info+0x40/0x58
[   32.400144]  __kasan_slab_alloc+0xa8/0xb0
[   32.404137]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.408738]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.412904]  kunit_try_run_case+0x170/0x3f0
[   32.417071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.422541]  kthread+0x328/0x630
[   32.425752]  ret_from_fork+0x10/0x20
[   32.429310] 
[   32.430787] Freed by task 0:
[   32.433654]  kasan_save_stack+0x3c/0x68
[   32.437470]  kasan_save_track+0x20/0x40
[   32.441289]  kasan_save_free_info+0x4c/0x78
[   32.445456]  __kasan_slab_free+0x6c/0x98
[   32.449363]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.454050]  rcu_core+0x9f4/0x1e20
[   32.457435]  rcu_core_si+0x18/0x30
[   32.460820]  handle_softirqs+0x374/0xb28
[   32.464728]  __do_softirq+0x1c/0x28
[   32.468199] 
[   32.469676] Last potentially related work creation:
[   32.474537]  kasan_save_stack+0x3c/0x68
[   32.478355]  kasan_record_aux_stack+0xb4/0xc8
[   32.482696]  kmem_cache_free+0x120/0x468
[   32.486602]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.490768]  kunit_try_run_case+0x170/0x3f0
[   32.494934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.500403]  kthread+0x328/0x630
[   32.503615]  ret_from_fork+0x10/0x20
[   32.507174] 
[   32.508651] The buggy address belongs to the object at ffff000802604000
[   32.508651]  which belongs to the cache test_cache of size 200
[   32.521066] The buggy address is located 0 bytes inside of
[   32.521066]  freed 200-byte region [ffff000802604000, ffff0008026040c8)
[   32.533128] 
[   32.534608] The buggy address belongs to the physical page:
[   32.540163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882604
[   32.548149] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.555786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.562730] page_type: f5(slab)
[   32.565869] raw: 0bfffe0000000040 ffff000802602000 dead000000000122 0000000000000000
[   32.573586] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.581313] head: 0bfffe0000000040 ffff000802602000 dead000000000122 0000000000000000
[   32.589124] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.596937] head: 0bfffe0000000001 fffffdffe0098101 00000000ffffffff 00000000ffffffff
[   32.604749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.612557] page dumped because: kasan: bad access detected
[   32.618109] 
[   32.619585] Memory state around the buggy address:
[   32.624364]  ffff000802603f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.631569]  ffff000802603f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.638774] >ffff000802604000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.645974]                    ^
[   32.649189]  ffff000802604080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.656395]  ffff000802604100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.663597] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.919837] ==================================================================
[   31.923291] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   31.930234] Free of addr ffff000801bca001 by task kunit_try_catch/260
[   31.936656] 
[   31.938142] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   31.938200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.938215] Hardware name: WinLink E850-96 board (DT)
[   31.938240] Call trace:
[   31.938252]  show_stack+0x20/0x38 (C)
[   31.938288]  dump_stack_lvl+0x8c/0xd0
[   31.938325]  print_report+0x118/0x608
[   31.938356]  kasan_report_invalid_free+0xc0/0xe8
[   31.938389]  check_slab_allocation+0xfc/0x108
[   31.938420]  __kasan_slab_pre_free+0x2c/0x48
[   31.938449]  kmem_cache_free+0xf0/0x468
[   31.938479]  kmem_cache_invalid_free+0x184/0x3c8
[   31.938514]  kunit_try_run_case+0x170/0x3f0
[   31.938552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.938588]  kthread+0x328/0x630
[   31.938622]  ret_from_fork+0x10/0x20
[   31.938661] 
[   32.010093] Allocated by task 260:
[   32.013481]  kasan_save_stack+0x3c/0x68
[   32.017296]  kasan_save_track+0x20/0x40
[   32.021115]  kasan_save_alloc_info+0x40/0x58
[   32.025369]  __kasan_slab_alloc+0xa8/0xb0
[   32.029361]  kmem_cache_alloc_noprof+0x10c/0x398
[   32.033962]  kmem_cache_invalid_free+0x12c/0x3c8
[   32.038564]  kunit_try_run_case+0x170/0x3f0
[   32.042730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.048198]  kthread+0x328/0x630
[   32.051410]  ret_from_fork+0x10/0x20
[   32.054969] 
[   32.056446] The buggy address belongs to the object at ffff000801bca000
[   32.056446]  which belongs to the cache test_cache of size 200
[   32.068861] The buggy address is located 1 bytes inside of
[   32.068861]  200-byte region [ffff000801bca000, ffff000801bca0c8)
[   32.080403] 
[   32.081882] The buggy address belongs to the physical page:
[   32.087437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bca
[   32.095422] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.103062] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.110002] page_type: f5(slab)
[   32.113141] raw: 0bfffe0000000040 ffff000801bc6140 dead000000000122 0000000000000000
[   32.120860] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.128586] head: 0bfffe0000000040 ffff000801bc6140 dead000000000122 0000000000000000
[   32.136398] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.144211] head: 0bfffe0000000001 fffffdffe006f281 00000000ffffffff 00000000ffffffff
[   32.152023] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.159829] page dumped because: kasan: bad access detected
[   32.165384] 
[   32.166859] Memory state around the buggy address:
[   32.171639]  ffff000801bc9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.178844]  ffff000801bc9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.186051] >ffff000801bca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.193248]                    ^
[   32.196464]  ffff000801bca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.203668]  ffff000801bca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.210871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.583820] ==================================================================
[   31.584004] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.584131] Free of addr ffff0008018ea000 by task kunit_try_catch/258
[   31.585533] 
[   31.587018] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   31.587074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.587091] Hardware name: WinLink E850-96 board (DT)
[   31.587111] Call trace:
[   31.587123]  show_stack+0x20/0x38 (C)
[   31.587157]  dump_stack_lvl+0x8c/0xd0
[   31.587196]  print_report+0x118/0x608
[   31.587226]  kasan_report_invalid_free+0xc0/0xe8
[   31.587259]  check_slab_allocation+0xd4/0x108
[   31.587291]  __kasan_slab_pre_free+0x2c/0x48
[   31.587319]  kmem_cache_free+0xf0/0x468
[   31.587351]  kmem_cache_double_free+0x190/0x3c8
[   31.587385]  kunit_try_run_case+0x170/0x3f0
[   31.587423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.587461]  kthread+0x328/0x630
[   31.587495]  ret_from_fork+0x10/0x20
[   31.587531] 
[   31.658883] Allocated by task 258:
[   31.662269]  kasan_save_stack+0x3c/0x68
[   31.666086]  kasan_save_track+0x20/0x40
[   31.669905]  kasan_save_alloc_info+0x40/0x58
[   31.674158]  __kasan_slab_alloc+0xa8/0xb0
[   31.678153]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.682752]  kmem_cache_double_free+0x12c/0x3c8
[   31.687266]  kunit_try_run_case+0x170/0x3f0
[   31.691433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.696901]  kthread+0x328/0x630
[   31.700113]  ret_from_fork+0x10/0x20
[   31.703672] 
[   31.705149] Freed by task 258:
[   31.708187]  kasan_save_stack+0x3c/0x68
[   31.712005]  kasan_save_track+0x20/0x40
[   31.715824]  kasan_save_free_info+0x4c/0x78
[   31.719991]  __kasan_slab_free+0x6c/0x98
[   31.723897]  kmem_cache_free+0x260/0x468
[   31.727804]  kmem_cache_double_free+0x140/0x3c8
[   31.732319]  kunit_try_run_case+0x170/0x3f0
[   31.736484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.741953]  kthread+0x328/0x630
[   31.745164]  ret_from_fork+0x10/0x20
[   31.748723] 
[   31.750202] The buggy address belongs to the object at ffff0008018ea000
[   31.750202]  which belongs to the cache test_cache of size 200
[   31.762614] The buggy address is located 0 bytes inside of
[   31.762614]  200-byte region [ffff0008018ea000, ffff0008018ea0c8)
[   31.774157] 
[   31.775637] The buggy address belongs to the physical page:
[   31.781193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818ea
[   31.789176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.796817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.803759] page_type: f5(slab)
[   31.806896] raw: 0bfffe0000000040 ffff0008018c37c0 dead000000000122 0000000000000000
[   31.814615] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.822343] head: 0bfffe0000000040 ffff0008018c37c0 dead000000000122 0000000000000000
[   31.830153] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.837965] head: 0bfffe0000000001 fffffdffe0063a81 00000000ffffffff 00000000ffffffff
[   31.845779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.853583] page dumped because: kasan: bad access detected
[   31.859140] 
[   31.860613] Memory state around the buggy address:
[   31.865397]  ffff0008018e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.872603]  ffff0008018e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.879803] >ffff0008018ea000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.887003]                    ^
[   31.890218]  ffff0008018ea080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.897423]  ffff0008018ea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.904626] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   19.779628] ==================================================================
[   19.794039] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   19.800371] Read of size 1 at addr ffff0008064b0000 by task kunit_try_catch/203
[   19.807663] 
[   19.809148] CPU: 2 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   19.809201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.809216] Hardware name: WinLink E850-96 board (DT)
[   19.809236] Call trace:
[   19.809251]  show_stack+0x20/0x38 (C)
[   19.809286]  dump_stack_lvl+0x8c/0xd0
[   19.809322]  print_report+0x118/0x608
[   19.809351]  kasan_report+0xdc/0x128
[   19.809381]  __asan_report_load1_noabort+0x20/0x30
[   19.809417]  page_alloc_uaf+0x328/0x350
[   19.809443]  kunit_try_run_case+0x170/0x3f0
[   19.809479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.809515]  kthread+0x328/0x630
[   19.809550]  ret_from_fork+0x10/0x20
[   19.809585] 
[   19.871640] The buggy address belongs to the physical page:
[   19.877195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8864b0
[   19.885177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.891688] page_type: f0(buddy)
[   19.894913] raw: 0bfffe0000000000 ffff00087f61bbe0 ffff00087f61bbe0 0000000000000000
[   19.902634] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   19.910352] page dumped because: kasan: bad access detected
[   19.915905] 
[   19.917381] Memory state around the buggy address:
[   19.922163]  ffff0008064aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.929364]  ffff0008064aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.936571] >ffff0008064b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.943770]                    ^
[   19.946985]  ffff0008064b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.954190]  ffff0008064b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.961393] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.251374] ==================================================================
[   31.260893] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   31.267573] Read of size 1 at addr ffff000801bc80c8 by task kunit_try_catch/256
[   31.274864] 
[   31.276349] CPU: 4 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   31.276407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.276424] Hardware name: WinLink E850-96 board (DT)
[   31.276446] Call trace:
[   31.276460]  show_stack+0x20/0x38 (C)
[   31.276494]  dump_stack_lvl+0x8c/0xd0
[   31.276532]  print_report+0x118/0x608
[   31.276563]  kasan_report+0xdc/0x128
[   31.276592]  __asan_report_load1_noabort+0x20/0x30
[   31.276625]  kmem_cache_oob+0x344/0x430
[   31.276657]  kunit_try_run_case+0x170/0x3f0
[   31.276690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.276727]  kthread+0x328/0x630
[   31.276765]  ret_from_fork+0x10/0x20
[   31.276801] 
[   31.338839] Allocated by task 256:
[   31.342225]  kasan_save_stack+0x3c/0x68
[   31.346041]  kasan_save_track+0x20/0x40
[   31.349861]  kasan_save_alloc_info+0x40/0x58
[   31.354115]  __kasan_slab_alloc+0xa8/0xb0
[   31.358108]  kmem_cache_alloc_noprof+0x10c/0x398
[   31.362708]  kmem_cache_oob+0x12c/0x430
[   31.366527]  kunit_try_run_case+0x170/0x3f0
[   31.370694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.376163]  kthread+0x328/0x630
[   31.379374]  ret_from_fork+0x10/0x20
[   31.382934] 
[   31.384410] The buggy address belongs to the object at ffff000801bc8000
[   31.384410]  which belongs to the cache test_cache of size 200
[   31.396826] The buggy address is located 0 bytes to the right of
[   31.396826]  allocated 200-byte region [ffff000801bc8000, ffff000801bc80c8)
[   31.409756] 
[   31.411236] The buggy address belongs to the physical page:
[   31.416791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881bc8
[   31.424775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.432414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.439356] page_type: f5(slab)
[   31.442494] raw: 0bfffe0000000040 ffff000801bc6000 dead000000000122 0000000000000000
[   31.450214] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.457940] head: 0bfffe0000000040 ffff000801bc6000 dead000000000122 0000000000000000
[   31.465752] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   31.473564] head: 0bfffe0000000001 fffffdffe006f201 00000000ffffffff 00000000ffffffff
[   31.481376] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.489183] page dumped because: kasan: bad access detected
[   31.494737] 
[   31.496213] Memory state around the buggy address:
[   31.500995]  ffff000801bc7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.508196]  ffff000801bc8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.515402] >ffff000801bc8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.522602]                                               ^
[   31.528161]  ffff000801bc8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.535366]  ffff000801bc8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.542568] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   30.906460] ==================================================================
[   30.913849] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   30.920531] Read of size 8 at addr ffff000803acdd80 by task kunit_try_catch/249
[   30.927822] 
[   30.929306] CPU: 2 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   30.929363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.929383] Hardware name: WinLink E850-96 board (DT)
[   30.929406] Call trace:
[   30.929420]  show_stack+0x20/0x38 (C)
[   30.929455]  dump_stack_lvl+0x8c/0xd0
[   30.929491]  print_report+0x118/0x608
[   30.929521]  kasan_report+0xdc/0x128
[   30.929550]  __asan_report_load8_noabort+0x20/0x30
[   30.929590]  workqueue_uaf+0x480/0x4a8
[   30.929624]  kunit_try_run_case+0x170/0x3f0
[   30.929661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.929697]  kthread+0x328/0x630
[   30.929733]  ret_from_fork+0x10/0x20
[   30.929767] 
[   30.991709] Allocated by task 249:
[   30.995096]  kasan_save_stack+0x3c/0x68
[   30.998911]  kasan_save_track+0x20/0x40
[   31.002731]  kasan_save_alloc_info+0x40/0x58
[   31.006984]  __kasan_kmalloc+0xd4/0xd8
[   31.010718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.015231]  workqueue_uaf+0x13c/0x4a8
[   31.018963]  kunit_try_run_case+0x170/0x3f0
[   31.023130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.028598]  kthread+0x328/0x630
[   31.031810]  ret_from_fork+0x10/0x20
[   31.035370] 
[   31.036846] Freed by task 67:
[   31.039798]  kasan_save_stack+0x3c/0x68
[   31.043616]  kasan_save_track+0x20/0x40
[   31.047435]  kasan_save_free_info+0x4c/0x78
[   31.051602]  __kasan_slab_free+0x6c/0x98
[   31.055508]  kfree+0x214/0x3c8
[   31.058546]  workqueue_uaf_work+0x18/0x30
[   31.062539]  process_one_work+0x530/0xf98
[   31.066532]  worker_thread+0x618/0xf38
[   31.070266]  kthread+0x328/0x630
[   31.073476]  ret_from_fork+0x10/0x20
[   31.077035] 
[   31.078512] Last potentially related work creation:
[   31.083372]  kasan_save_stack+0x3c/0x68
[   31.087191]  kasan_record_aux_stack+0xb4/0xc8
[   31.091532]  __queue_work+0x65c/0x1008
[   31.095264]  queue_work_on+0xbc/0xf8
[   31.098823]  workqueue_uaf+0x210/0x4a8
[   31.102556]  kunit_try_run_case+0x170/0x3f0
[   31.106723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.112191]  kthread+0x328/0x630
[   31.115403]  ret_from_fork+0x10/0x20
[   31.118962] 
[   31.120439] The buggy address belongs to the object at ffff000803acdd80
[   31.120439]  which belongs to the cache kmalloc-32 of size 32
[   31.132765] The buggy address is located 0 bytes inside of
[   31.132765]  freed 32-byte region [ffff000803acdd80, ffff000803acdda0)
[   31.144743] 
[   31.146221] The buggy address belongs to the physical page:
[   31.151777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883acd
[   31.159762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.166272] page_type: f5(slab)
[   31.169411] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   31.177127] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.184849] page dumped because: kasan: bad access detected
[   31.190401] 
[   31.191877] Memory state around the buggy address:
[   31.196658]  ffff000803acdc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.203860]  ffff000803acdd00: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc
[   31.211066] >ffff000803acdd80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.218266]                    ^
[   31.221483]  ffff000803acde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.228686]  ffff000803acde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235889] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   30.540699] ==================================================================
[   30.540878] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   30.541002] Read of size 4 at addr ffff00080656c280 by task swapper/1/0
[   30.542062] 
[   30.543548] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   30.543600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.543615] Hardware name: WinLink E850-96 board (DT)
[   30.543637] Call trace:
[   30.543650]  show_stack+0x20/0x38 (C)
[   30.543681]  dump_stack_lvl+0x8c/0xd0
[   30.543718]  print_report+0x118/0x608
[   30.543748]  kasan_report+0xdc/0x128
[   30.543780]  __asan_report_load4_noabort+0x20/0x30
[   30.543816]  rcu_uaf_reclaim+0x64/0x70
[   30.543847]  rcu_core+0x9f4/0x1e20
[   30.543877]  rcu_core_si+0x18/0x30
[   30.543904]  handle_softirqs+0x374/0xb28
[   30.543936]  __do_softirq+0x1c/0x28
[   30.543967]  ____do_softirq+0x18/0x30
[   30.543999]  call_on_irq_stack+0x24/0x30
[   30.544027]  do_softirq_own_stack+0x24/0x38
[   30.544058]  __irq_exit_rcu+0x1fc/0x318
[   30.544088]  irq_exit_rcu+0x1c/0x80
[   30.544114]  el1_interrupt+0x38/0x58
[   30.544144]  el1h_64_irq_handler+0x18/0x28
[   30.544172]  el1h_64_irq+0x6c/0x70
[   30.544199]  arch_local_irq_enable+0x4/0x8 (P)
[   30.544231]  do_idle+0x384/0x4e8
[   30.544260]  cpu_startup_entry+0x64/0x80
[   30.544288]  secondary_start_kernel+0x288/0x340
[   30.544327]  __secondary_switched+0xc0/0xc8
[   30.544367] 
[   30.653257] Allocated by task 247:
[   30.656646]  kasan_save_stack+0x3c/0x68
[   30.660462]  kasan_save_track+0x20/0x40
[   30.664281]  kasan_save_alloc_info+0x40/0x58
[   30.668534]  __kasan_kmalloc+0xd4/0xd8
[   30.672267]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.676781]  rcu_uaf+0xb0/0x2d8
[   30.679906]  kunit_try_run_case+0x170/0x3f0
[   30.684073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.689543]  kthread+0x328/0x630
[   30.692753]  ret_from_fork+0x10/0x20
[   30.696312] 
[   30.697789] Freed by task 0:
[   30.700655]  kasan_save_stack+0x3c/0x68
[   30.704471]  kasan_save_track+0x20/0x40
[   30.708291]  kasan_save_free_info+0x4c/0x78
[   30.712457]  __kasan_slab_free+0x6c/0x98
[   30.716365]  kfree+0x214/0x3c8
[   30.719401]  rcu_uaf_reclaim+0x28/0x70
[   30.723134]  rcu_core+0x9f4/0x1e20
[   30.726520]  rcu_core_si+0x18/0x30
[   30.729905]  handle_softirqs+0x374/0xb28
[   30.733811]  __do_softirq+0x1c/0x28
[   30.737284] 
[   30.738760] Last potentially related work creation:
[   30.743620]  kasan_save_stack+0x3c/0x68
[   30.747440]  kasan_record_aux_stack+0xb4/0xc8
[   30.751780]  __call_rcu_common.constprop.0+0x70/0x8b0
[   30.756815]  call_rcu+0x18/0x30
[   30.759939]  rcu_uaf+0x14c/0x2d8
[   30.763151]  kunit_try_run_case+0x170/0x3f0
[   30.767318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.772787]  kthread+0x328/0x630
[   30.775998]  ret_from_fork+0x10/0x20
[   30.779557] 
[   30.781034] The buggy address belongs to the object at ffff00080656c280
[   30.781034]  which belongs to the cache kmalloc-32 of size 32
[   30.793363] The buggy address is located 0 bytes inside of
[   30.793363]  freed 32-byte region [ffff00080656c280, ffff00080656c2a0)
[   30.805338] 
[   30.806818] The buggy address belongs to the physical page:
[   30.812374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88656c
[   30.820357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.826867] page_type: f5(slab)
[   30.830007] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   30.837723] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   30.845443] page dumped because: kasan: bad access detected
[   30.850997] 
[   30.852473] Memory state around the buggy address:
[   30.857256]  ffff00080656c180: 00 00 00 06 fc fc fc fc fa fb fb fb fc fc fc fc
[   30.864456]  ffff00080656c200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.871662] >ffff00080656c280: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   30.878861]                    ^
[   30.882077]  ffff00080656c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.889282]  ffff00080656c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.896484] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   29.490358] ==================================================================
[   29.500231] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.506563] Read of size 1 at addr ffff0008018e7000 by task kunit_try_catch/245
[   29.513852] 
[   29.515340] CPU: 2 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   29.515395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.515410] Hardware name: WinLink E850-96 board (DT)
[   29.515431] Call trace:
[   29.515446]  show_stack+0x20/0x38 (C)
[   29.515482]  dump_stack_lvl+0x8c/0xd0
[   29.515518]  print_report+0x118/0x608
[   29.515549]  kasan_report+0xdc/0x128
[   29.515581]  __kasan_check_byte+0x54/0x70
[   29.515612]  ksize+0x30/0x88
[   29.515640]  ksize_uaf+0x168/0x5f8
[   29.515671]  kunit_try_run_case+0x170/0x3f0
[   29.515711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.515747]  kthread+0x328/0x630
[   29.515780]  ret_from_fork+0x10/0x20
[   29.515815] 
[   29.579477] Allocated by task 245:
[   29.582865]  kasan_save_stack+0x3c/0x68
[   29.586681]  kasan_save_track+0x20/0x40
[   29.590500]  kasan_save_alloc_info+0x40/0x58
[   29.594753]  __kasan_kmalloc+0xd4/0xd8
[   29.598486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.603000]  ksize_uaf+0xb8/0x5f8
[   29.606298]  kunit_try_run_case+0x170/0x3f0
[   29.610465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.615934]  kthread+0x328/0x630
[   29.619145]  ret_from_fork+0x10/0x20
[   29.622705] 
[   29.624181] Freed by task 245:
[   29.627218]  kasan_save_stack+0x3c/0x68
[   29.631038]  kasan_save_track+0x20/0x40
[   29.634857]  kasan_save_free_info+0x4c/0x78
[   29.639024]  __kasan_slab_free+0x6c/0x98
[   29.642930]  kfree+0x214/0x3c8
[   29.645968]  ksize_uaf+0x11c/0x5f8
[   29.649355]  kunit_try_run_case+0x170/0x3f0
[   29.653520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.658988]  kthread+0x328/0x630
[   29.662200]  ret_from_fork+0x10/0x20
[   29.665759] 
[   29.667238] The buggy address belongs to the object at ffff0008018e7000
[   29.667238]  which belongs to the cache kmalloc-128 of size 128
[   29.679738] The buggy address is located 0 bytes inside of
[   29.679738]  freed 128-byte region [ffff0008018e7000, ffff0008018e7080)
[   29.691801] 
[   29.693279] The buggy address belongs to the physical page:
[   29.698838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   29.706820] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.714458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.721402] page_type: f5(slab)
[   29.724540] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.732258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.739985] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.747796] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.755609] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   29.763421] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.771228] page dumped because: kasan: bad access detected
[   29.776782] 
[   29.778257] Memory state around the buggy address:
[   29.783040]  ffff0008018e6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.790241]  ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.797447] >ffff0008018e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.804646]                    ^
[   29.807862]  ffff0008018e7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.815066]  ffff0008018e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.822269] ==================================================================
[   29.829629] ==================================================================
[   29.836679] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.843014] Read of size 1 at addr ffff0008018e7000 by task kunit_try_catch/245
[   29.850305] 
[   29.851791] CPU: 2 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   29.851840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.851856] Hardware name: WinLink E850-96 board (DT)
[   29.851876] Call trace:
[   29.851889]  show_stack+0x20/0x38 (C)
[   29.851925]  dump_stack_lvl+0x8c/0xd0
[   29.851961]  print_report+0x118/0x608
[   29.851990]  kasan_report+0xdc/0x128
[   29.852021]  __asan_report_load1_noabort+0x20/0x30
[   29.852056]  ksize_uaf+0x598/0x5f8
[   29.852087]  kunit_try_run_case+0x170/0x3f0
[   29.852121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.852157]  kthread+0x328/0x630
[   29.852190]  ret_from_fork+0x10/0x20
[   29.852222] 
[   29.913846] Allocated by task 245:
[   29.917235]  kasan_save_stack+0x3c/0x68
[   29.921051]  kasan_save_track+0x20/0x40
[   29.924870]  kasan_save_alloc_info+0x40/0x58
[   29.929123]  __kasan_kmalloc+0xd4/0xd8
[   29.932856]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.937369]  ksize_uaf+0xb8/0x5f8
[   29.940667]  kunit_try_run_case+0x170/0x3f0
[   29.944835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.950304]  kthread+0x328/0x630
[   29.953515]  ret_from_fork+0x10/0x20
[   29.957075] 
[   29.958550] Freed by task 245:
[   29.961588]  kasan_save_stack+0x3c/0x68
[   29.965408]  kasan_save_track+0x20/0x40
[   29.969227]  kasan_save_free_info+0x4c/0x78
[   29.973394]  __kasan_slab_free+0x6c/0x98
[   29.977300]  kfree+0x214/0x3c8
[   29.980338]  ksize_uaf+0x11c/0x5f8
[   29.983723]  kunit_try_run_case+0x170/0x3f0
[   29.987890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.993359]  kthread+0x328/0x630
[   29.996570]  ret_from_fork+0x10/0x20
[   30.000130] 
[   30.001605] The buggy address belongs to the object at ffff0008018e7000
[   30.001605]  which belongs to the cache kmalloc-128 of size 128
[   30.014106] The buggy address is located 0 bytes inside of
[   30.014106]  freed 128-byte region [ffff0008018e7000, ffff0008018e7080)
[   30.026171] 
[   30.027649] The buggy address belongs to the physical page:
[   30.033206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   30.041189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.048828] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.055773] page_type: f5(slab)
[   30.058906] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.066628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.074354] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.082166] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.089979] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   30.097791] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.105596] page dumped because: kasan: bad access detected
[   30.111152] 
[   30.112627] Memory state around the buggy address:
[   30.117409]  ffff0008018e6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.124611]  ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.131815] >ffff0008018e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.139016]                    ^
[   30.142231]  ffff0008018e7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.149436]  ffff0008018e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.156638] ==================================================================
[   30.164055] ==================================================================
[   30.171055] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.177385] Read of size 1 at addr ffff0008018e7078 by task kunit_try_catch/245
[   30.184675] 
[   30.186159] CPU: 2 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   30.186208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.186225] Hardware name: WinLink E850-96 board (DT)
[   30.186245] Call trace:
[   30.186256]  show_stack+0x20/0x38 (C)
[   30.186290]  dump_stack_lvl+0x8c/0xd0
[   30.186327]  print_report+0x118/0x608
[   30.186357]  kasan_report+0xdc/0x128
[   30.186386]  __asan_report_load1_noabort+0x20/0x30
[   30.186420]  ksize_uaf+0x544/0x5f8
[   30.186450]  kunit_try_run_case+0x170/0x3f0
[   30.186485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.186523]  kthread+0x328/0x630
[   30.186556]  ret_from_fork+0x10/0x20
[   30.186588] 
[   30.248216] Allocated by task 245:
[   30.251603]  kasan_save_stack+0x3c/0x68
[   30.255421]  kasan_save_track+0x20/0x40
[   30.259240]  kasan_save_alloc_info+0x40/0x58
[   30.263493]  __kasan_kmalloc+0xd4/0xd8
[   30.267226]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.271740]  ksize_uaf+0xb8/0x5f8
[   30.275038]  kunit_try_run_case+0x170/0x3f0
[   30.279205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.284674]  kthread+0x328/0x630
[   30.287885]  ret_from_fork+0x10/0x20
[   30.291445] 
[   30.292920] Freed by task 245:
[   30.295958]  kasan_save_stack+0x3c/0x68
[   30.299777]  kasan_save_track+0x20/0x40
[   30.303597]  kasan_save_free_info+0x4c/0x78
[   30.307763]  __kasan_slab_free+0x6c/0x98
[   30.311670]  kfree+0x214/0x3c8
[   30.314708]  ksize_uaf+0x11c/0x5f8
[   30.318093]  kunit_try_run_case+0x170/0x3f0
[   30.322260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.327728]  kthread+0x328/0x630
[   30.330940]  ret_from_fork+0x10/0x20
[   30.334499] 
[   30.335975] The buggy address belongs to the object at ffff0008018e7000
[   30.335975]  which belongs to the cache kmalloc-128 of size 128
[   30.348475] The buggy address is located 120 bytes inside of
[   30.348475]  freed 128-byte region [ffff0008018e7000, ffff0008018e7080)
[   30.360714] 
[   30.362192] The buggy address belongs to the physical page:
[   30.367750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   30.375734] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.383370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.390314] page_type: f5(slab)
[   30.393452] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.401172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.408898] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.416708] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.424523] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   30.432335] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.440140] page dumped because: kasan: bad access detected
[   30.445695] 
[   30.447171] Memory state around the buggy address:
[   30.451952]  ffff0008018e6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.459154]  ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.466359] >ffff0008018e7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.473560]                                                                 ^
[   30.480681]  ffff0008018e7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.487886]  ffff0008018e7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.495089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   29.189412] ==================================================================
[   29.196500] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   29.203874] Read of size 1 at addr ffff000800daca7f by task kunit_try_catch/243
[   29.211167] 
[   29.212651] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   29.212700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.212712] Hardware name: WinLink E850-96 board (DT)
[   29.212732] Call trace:
[   29.212746]  show_stack+0x20/0x38 (C)
[   29.212780]  dump_stack_lvl+0x8c/0xd0
[   29.212817]  print_report+0x118/0x608
[   29.212846]  kasan_report+0xdc/0x128
[   29.212875]  __asan_report_load1_noabort+0x20/0x30
[   29.212911]  ksize_unpoisons_memory+0x690/0x740
[   29.212945]  kunit_try_run_case+0x170/0x3f0
[   29.212980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.213017]  kthread+0x328/0x630
[   29.213050]  ret_from_fork+0x10/0x20
[   29.213085] 
[   29.275834] Allocated by task 243:
[   29.279224]  kasan_save_stack+0x3c/0x68
[   29.283039]  kasan_save_track+0x20/0x40
[   29.286858]  kasan_save_alloc_info+0x40/0x58
[   29.291112]  __kasan_kmalloc+0xd4/0xd8
[   29.294845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.299358]  ksize_unpoisons_memory+0xc0/0x740
[   29.303785]  kunit_try_run_case+0x170/0x3f0
[   29.307952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.313424]  kthread+0x328/0x630
[   29.316633]  ret_from_fork+0x10/0x20
[   29.320191] 
[   29.321667] The buggy address belongs to the object at ffff000800daca00
[   29.321667]  which belongs to the cache kmalloc-128 of size 128
[   29.334169] The buggy address is located 12 bytes to the right of
[   29.334169]  allocated 115-byte region [ffff000800daca00, ffff000800daca73)
[   29.347188] 
[   29.348664] The buggy address belongs to the physical page:
[   29.354222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.362206] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.369845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.376790] page_type: f5(slab)
[   29.379926] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.387645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.395372] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.403183] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.410996] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   29.418808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.426613] page dumped because: kasan: bad access detected
[   29.432169] 
[   29.433645] Memory state around the buggy address:
[   29.438426]  ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.445628]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.452834] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.460033]                                                                 ^
[   29.467155]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.474360]  ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.481561] ==================================================================
[   28.588260] ==================================================================
[   28.597987] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   28.605361] Read of size 1 at addr ffff000800daca73 by task kunit_try_catch/243
[   28.612650] 
[   28.614137] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   28.614193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.614209] Hardware name: WinLink E850-96 board (DT)
[   28.614231] Call trace:
[   28.614244]  show_stack+0x20/0x38 (C)
[   28.614283]  dump_stack_lvl+0x8c/0xd0
[   28.614321]  print_report+0x118/0x608
[   28.614350]  kasan_report+0xdc/0x128
[   28.614380]  __asan_report_load1_noabort+0x20/0x30
[   28.614417]  ksize_unpoisons_memory+0x628/0x740
[   28.614454]  kunit_try_run_case+0x170/0x3f0
[   28.614492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.614532]  kthread+0x328/0x630
[   28.614566]  ret_from_fork+0x10/0x20
[   28.614600] 
[   28.677321] Allocated by task 243:
[   28.680708]  kasan_save_stack+0x3c/0x68
[   28.684524]  kasan_save_track+0x20/0x40
[   28.688343]  kasan_save_alloc_info+0x40/0x58
[   28.692597]  __kasan_kmalloc+0xd4/0xd8
[   28.696329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.700844]  ksize_unpoisons_memory+0xc0/0x740
[   28.705270]  kunit_try_run_case+0x170/0x3f0
[   28.709437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.714907]  kthread+0x328/0x630
[   28.718117]  ret_from_fork+0x10/0x20
[   28.721676] 
[   28.723154] The buggy address belongs to the object at ffff000800daca00
[   28.723154]  which belongs to the cache kmalloc-128 of size 128
[   28.735655] The buggy address is located 0 bytes to the right of
[   28.735655]  allocated 115-byte region [ffff000800daca00, ffff000800daca73)
[   28.748586] 
[   28.750064] The buggy address belongs to the physical page:
[   28.755622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   28.763605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.771243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   28.778187] page_type: f5(slab)
[   28.781325] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.789044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.796770] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   28.804581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.812394] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   28.820206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.828011] page dumped because: kasan: bad access detected
[   28.833567] 
[   28.835042] Memory state around the buggy address:
[   28.839826]  ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.847027]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.854232] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.861431]                                                              ^
[   28.868292]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.875498]  ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882701] ==================================================================
[   28.890269] ==================================================================
[   28.897113] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   28.904487] Read of size 1 at addr ffff000800daca78 by task kunit_try_catch/243
[   28.911778] 
[   28.913262] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   28.913316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.913331] Hardware name: WinLink E850-96 board (DT)
[   28.913353] Call trace:
[   28.913367]  show_stack+0x20/0x38 (C)
[   28.913402]  dump_stack_lvl+0x8c/0xd0
[   28.913437]  print_report+0x118/0x608
[   28.913466]  kasan_report+0xdc/0x128
[   28.913497]  __asan_report_load1_noabort+0x20/0x30
[   28.913531]  ksize_unpoisons_memory+0x618/0x740
[   28.913566]  kunit_try_run_case+0x170/0x3f0
[   28.913603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.913639]  kthread+0x328/0x630
[   28.913676]  ret_from_fork+0x10/0x20
[   28.913710] 
[   28.976447] Allocated by task 243:
[   28.979836]  kasan_save_stack+0x3c/0x68
[   28.983651]  kasan_save_track+0x20/0x40
[   28.987471]  kasan_save_alloc_info+0x40/0x58
[   28.991724]  __kasan_kmalloc+0xd4/0xd8
[   28.995457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.999971]  ksize_unpoisons_memory+0xc0/0x740
[   29.004398]  kunit_try_run_case+0x170/0x3f0
[   29.008564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.014035]  kthread+0x328/0x630
[   29.017245]  ret_from_fork+0x10/0x20
[   29.020804] 
[   29.022279] The buggy address belongs to the object at ffff000800daca00
[   29.022279]  which belongs to the cache kmalloc-128 of size 128
[   29.034779] The buggy address is located 5 bytes to the right of
[   29.034779]  allocated 115-byte region [ffff000800daca00, ffff000800daca73)
[   29.047713] 
[   29.049190] The buggy address belongs to the physical page:
[   29.054748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.062732] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.070371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.077315] page_type: f5(slab)
[   29.080451] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.088171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.095897] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.103708] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.111522] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   29.119333] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.127139] page dumped because: kasan: bad access detected
[   29.132693] 
[   29.134170] Memory state around the buggy address:
[   29.138952]  ffff000800dac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.146153]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.153359] >ffff000800daca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.160559]                                                                 ^
[   29.167681]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.174885]  ffff000800dacb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.182086] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   28.274296] ==================================================================
[   28.281323] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   28.287308] Free of addr ffff000800cad020 by task kunit_try_catch/241
[   28.293731] 
[   28.295217] CPU: 6 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   28.295271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.295289] Hardware name: WinLink E850-96 board (DT)
[   28.295307] Call trace:
[   28.295318]  show_stack+0x20/0x38 (C)
[   28.295352]  dump_stack_lvl+0x8c/0xd0
[   28.295388]  print_report+0x118/0x608
[   28.295418]  kasan_report_invalid_free+0xc0/0xe8
[   28.295450]  check_slab_allocation+0xd4/0x108
[   28.295479]  __kasan_slab_pre_free+0x2c/0x48
[   28.295509]  kfree+0xe8/0x3c8
[   28.295535]  kfree_sensitive+0x3c/0xb0
[   28.295562]  kmalloc_double_kzfree+0x168/0x308
[   28.295598]  kunit_try_run_case+0x170/0x3f0
[   28.295635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.295671]  kthread+0x328/0x630
[   28.295702]  ret_from_fork+0x10/0x20
[   28.295733] 
[   28.369860] Allocated by task 241:
[   28.373246]  kasan_save_stack+0x3c/0x68
[   28.377063]  kasan_save_track+0x20/0x40
[   28.380883]  kasan_save_alloc_info+0x40/0x58
[   28.385136]  __kasan_kmalloc+0xd4/0xd8
[   28.388869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.393383]  kmalloc_double_kzfree+0xb8/0x308
[   28.397723]  kunit_try_run_case+0x170/0x3f0
[   28.401890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.407358]  kthread+0x328/0x630
[   28.410570]  ret_from_fork+0x10/0x20
[   28.414129] 
[   28.415605] Freed by task 241:
[   28.418644]  kasan_save_stack+0x3c/0x68
[   28.422462]  kasan_save_track+0x20/0x40
[   28.426281]  kasan_save_free_info+0x4c/0x78
[   28.430448]  __kasan_slab_free+0x6c/0x98
[   28.434354]  kfree+0x214/0x3c8
[   28.437392]  kfree_sensitive+0x80/0xb0
[   28.441125]  kmalloc_double_kzfree+0x11c/0x308
[   28.445552]  kunit_try_run_case+0x170/0x3f0
[   28.449719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.455187]  kthread+0x328/0x630
[   28.458399]  ret_from_fork+0x10/0x20
[   28.461958] 
[   28.463435] The buggy address belongs to the object at ffff000800cad020
[   28.463435]  which belongs to the cache kmalloc-16 of size 16
[   28.475760] The buggy address is located 0 bytes inside of
[   28.475760]  16-byte region [ffff000800cad020, ffff000800cad030)
[   28.487218] 
[   28.488695] The buggy address belongs to the physical page:
[   28.494253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cad
[   28.502235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.508747] page_type: f5(slab)
[   28.511883] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   28.519603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.527322] page dumped because: kasan: bad access detected
[   28.532877] 
[   28.534352] Memory state around the buggy address:
[   28.539134]  ffff000800cacf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.546336]  ffff000800cacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.553542] >ffff000800cad000: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   28.560741]                                ^
[   28.564999]  ffff000800cad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.572203]  ffff000800cad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.579406] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   27.960873] ==================================================================
[   27.974646] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   27.982018] Read of size 1 at addr ffff000800cad020 by task kunit_try_catch/241
[   27.989309] 
[   27.990796] CPU: 6 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   27.990850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.990870] Hardware name: WinLink E850-96 board (DT)
[   27.990894] Call trace:
[   27.990906]  show_stack+0x20/0x38 (C)
[   27.990943]  dump_stack_lvl+0x8c/0xd0
[   27.990979]  print_report+0x118/0x608
[   27.991009]  kasan_report+0xdc/0x128
[   27.991037]  __kasan_check_byte+0x54/0x70
[   27.991066]  kfree_sensitive+0x30/0xb0
[   27.991097]  kmalloc_double_kzfree+0x168/0x308
[   27.991134]  kunit_try_run_case+0x170/0x3f0
[   27.991172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.991210]  kthread+0x328/0x630
[   27.991244]  ret_from_fork+0x10/0x20
[   27.991278] 
[   28.056844] Allocated by task 241:
[   28.060231]  kasan_save_stack+0x3c/0x68
[   28.064047]  kasan_save_track+0x20/0x40
[   28.067867]  kasan_save_alloc_info+0x40/0x58
[   28.072120]  __kasan_kmalloc+0xd4/0xd8
[   28.075852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.080366]  kmalloc_double_kzfree+0xb8/0x308
[   28.084708]  kunit_try_run_case+0x170/0x3f0
[   28.088873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.094342]  kthread+0x328/0x630
[   28.097553]  ret_from_fork+0x10/0x20
[   28.101113] 
[   28.102590] Freed by task 241:
[   28.105628]  kasan_save_stack+0x3c/0x68
[   28.109446]  kasan_save_track+0x20/0x40
[   28.113265]  kasan_save_free_info+0x4c/0x78
[   28.117432]  __kasan_slab_free+0x6c/0x98
[   28.121338]  kfree+0x214/0x3c8
[   28.124376]  kfree_sensitive+0x80/0xb0
[   28.128109]  kmalloc_double_kzfree+0x11c/0x308
[   28.132536]  kunit_try_run_case+0x170/0x3f0
[   28.136704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.142171]  kthread+0x328/0x630
[   28.145383]  ret_from_fork+0x10/0x20
[   28.148942] 
[   28.150419] The buggy address belongs to the object at ffff000800cad020
[   28.150419]  which belongs to the cache kmalloc-16 of size 16
[   28.162747] The buggy address is located 0 bytes inside of
[   28.162747]  freed 16-byte region [ffff000800cad020, ffff000800cad030)
[   28.174722] 
[   28.176201] The buggy address belongs to the physical page:
[   28.181758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cad
[   28.189743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.196251] page_type: f5(slab)
[   28.199390] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   28.207107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.214827] page dumped because: kasan: bad access detected
[   28.220381] 
[   28.221857] Memory state around the buggy address:
[   28.226640]  ffff000800cacf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.233840]  ffff000800cacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.241047] >ffff000800cad000: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   28.248246]                                ^
[   28.252503]  ffff000800cad080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.259708]  ffff000800cad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.266911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   19.544345] ==================================================================
[   19.553761] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   19.559143] Free of addr ffff000806088001 by task kunit_try_catch/199
[   19.565564] 
[   19.567050] CPU: 2 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   19.567102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.567120] Hardware name: WinLink E850-96 board (DT)
[   19.567142] Call trace:
[   19.567155]  show_stack+0x20/0x38 (C)
[   19.567189]  dump_stack_lvl+0x8c/0xd0
[   19.567225]  print_report+0x118/0x608
[   19.567255]  kasan_report_invalid_free+0xc0/0xe8
[   19.567286]  __kasan_kfree_large+0x5c/0xa8
[   19.567316]  free_large_kmalloc+0x64/0x190
[   19.567354]  kfree+0x270/0x3c8
[   19.567376]  kmalloc_large_invalid_free+0x108/0x270
[   19.567413]  kunit_try_run_case+0x170/0x3f0
[   19.567449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.567486]  kthread+0x328/0x630
[   19.567519]  ret_from_fork+0x10/0x20
[   19.567553] 
[   19.638047] The buggy address belongs to the physical page:
[   19.643605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886088
[   19.651589] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.659227] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.666170] page_type: f8(unknown)
[   19.669571] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.677288] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.685015] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.692825] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.700638] head: 0bfffe0000000002 fffffdffe0182201 00000000ffffffff 00000000ffffffff
[   19.708450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.716259] page dumped because: kasan: bad access detected
[   19.721811] 
[   19.723287] Memory state around the buggy address:
[   19.728068]  ffff000806087f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.735272]  ffff000806087f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.742479] >ffff000806088000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.749676]                    ^
[   19.752891]  ffff000806088080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.760096]  ffff000806088100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.767298] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   27.657561] ==================================================================
[   27.666837] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   27.673432] Read of size 1 at addr ffff00080656b028 by task kunit_try_catch/237
[   27.680720] 
[   27.682207] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   27.682263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.682280] Hardware name: WinLink E850-96 board (DT)
[   27.682302] Call trace:
[   27.682314]  show_stack+0x20/0x38 (C)
[   27.682352]  dump_stack_lvl+0x8c/0xd0
[   27.682389]  print_report+0x118/0x608
[   27.682421]  kasan_report+0xdc/0x128
[   27.682452]  __asan_report_load1_noabort+0x20/0x30
[   27.682490]  kmalloc_uaf2+0x3f4/0x468
[   27.682520]  kunit_try_run_case+0x170/0x3f0
[   27.682554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.682594]  kthread+0x328/0x630
[   27.682630]  ret_from_fork+0x10/0x20
[   27.682665] 
[   27.744522] Allocated by task 237:
[   27.747909]  kasan_save_stack+0x3c/0x68
[   27.751725]  kasan_save_track+0x20/0x40
[   27.755545]  kasan_save_alloc_info+0x40/0x58
[   27.759798]  __kasan_kmalloc+0xd4/0xd8
[   27.763531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.768045]  kmalloc_uaf2+0xc4/0x468
[   27.771605]  kunit_try_run_case+0x170/0x3f0
[   27.775770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.781239]  kthread+0x328/0x630
[   27.784451]  ret_from_fork+0x10/0x20
[   27.788010] 
[   27.789487] Freed by task 237:
[   27.792524]  kasan_save_stack+0x3c/0x68
[   27.796343]  kasan_save_track+0x20/0x40
[   27.800163]  kasan_save_free_info+0x4c/0x78
[   27.804329]  __kasan_slab_free+0x6c/0x98
[   27.808235]  kfree+0x214/0x3c8
[   27.811273]  kmalloc_uaf2+0x134/0x468
[   27.814919]  kunit_try_run_case+0x170/0x3f0
[   27.819087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.824554]  kthread+0x328/0x630
[   27.827766]  ret_from_fork+0x10/0x20
[   27.831325] 
[   27.832802] The buggy address belongs to the object at ffff00080656b000
[   27.832802]  which belongs to the cache kmalloc-64 of size 64
[   27.845130] The buggy address is located 40 bytes inside of
[   27.845130]  freed 64-byte region [ffff00080656b000, ffff00080656b040)
[   27.857193] 
[   27.858673] The buggy address belongs to the physical page:
[   27.864228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88656b
[   27.872211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.878722] page_type: f5(slab)
[   27.881859] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   27.889578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.897299] page dumped because: kasan: bad access detected
[   27.902852] 
[   27.904327] Memory state around the buggy address:
[   27.909109]  ffff00080656af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.916311]  ffff00080656af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.923519] >ffff00080656b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.930716]                                   ^
[   27.935234]  ffff00080656b080: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   27.942438]  ffff00080656b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.949641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   27.353328] ==================================================================
[   27.361981] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   27.369094] Write of size 33 at addr ffff000803afaa80 by task kunit_try_catch/235
[   27.376559] 
[   27.378043] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   27.378096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.378114] Hardware name: WinLink E850-96 board (DT)
[   27.378136] Call trace:
[   27.378151]  show_stack+0x20/0x38 (C)
[   27.378185]  dump_stack_lvl+0x8c/0xd0
[   27.378225]  print_report+0x118/0x608
[   27.378257]  kasan_report+0xdc/0x128
[   27.378288]  kasan_check_range+0x100/0x1a8
[   27.378321]  __asan_memset+0x34/0x78
[   27.378353]  kmalloc_uaf_memset+0x170/0x310
[   27.378385]  kunit_try_run_case+0x170/0x3f0
[   27.378421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.378460]  kthread+0x328/0x630
[   27.378495]  ret_from_fork+0x10/0x20
[   27.378529] 
[   27.443744] Allocated by task 235:
[   27.447133]  kasan_save_stack+0x3c/0x68
[   27.450949]  kasan_save_track+0x20/0x40
[   27.454769]  kasan_save_alloc_info+0x40/0x58
[   27.459022]  __kasan_kmalloc+0xd4/0xd8
[   27.462754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.467268]  kmalloc_uaf_memset+0xb8/0x310
[   27.471348]  kunit_try_run_case+0x170/0x3f0
[   27.475514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.480983]  kthread+0x328/0x630
[   27.484195]  ret_from_fork+0x10/0x20
[   27.487754] 
[   27.489231] Freed by task 235:
[   27.492268]  kasan_save_stack+0x3c/0x68
[   27.496087]  kasan_save_track+0x20/0x40
[   27.499907]  kasan_save_free_info+0x4c/0x78
[   27.504073]  __kasan_slab_free+0x6c/0x98
[   27.507979]  kfree+0x214/0x3c8
[   27.511017]  kmalloc_uaf_memset+0x11c/0x310
[   27.515184]  kunit_try_run_case+0x170/0x3f0
[   27.519351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.524819]  kthread+0x328/0x630
[   27.528031]  ret_from_fork+0x10/0x20
[   27.531590] 
[   27.533067] The buggy address belongs to the object at ffff000803afaa80
[   27.533067]  which belongs to the cache kmalloc-64 of size 64
[   27.545396] The buggy address is located 0 bytes inside of
[   27.545396]  freed 64-byte region [ffff000803afaa80, ffff000803afaac0)
[   27.557371] 
[   27.558849] The buggy address belongs to the physical page:
[   27.564407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   27.572390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.578900] page_type: f5(slab)
[   27.582039] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   27.589756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.597474] page dumped because: kasan: bad access detected
[   27.603030] 
[   27.604505] Memory state around the buggy address:
[   27.609287]  ffff000803afa980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.616490]  ffff000803afaa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.623695] >ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.630894]                    ^
[   27.634110]  ffff000803afab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.641314]  ffff000803afab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.648517] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   27.051706] ==================================================================
[   27.061901] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   27.068406] Read of size 1 at addr ffff000804354aa8 by task kunit_try_catch/233
[   27.075694] 
[   27.077182] CPU: 3 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   27.077237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.077253] Hardware name: WinLink E850-96 board (DT)
[   27.077275] Call trace:
[   27.077289]  show_stack+0x20/0x38 (C)
[   27.077326]  dump_stack_lvl+0x8c/0xd0
[   27.077366]  print_report+0x118/0x608
[   27.077398]  kasan_report+0xdc/0x128
[   27.077429]  __asan_report_load1_noabort+0x20/0x30
[   27.077465]  kmalloc_uaf+0x300/0x338
[   27.077498]  kunit_try_run_case+0x170/0x3f0
[   27.077534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.077573]  kthread+0x328/0x630
[   27.077607]  ret_from_fork+0x10/0x20
[   27.077643] 
[   27.139411] Allocated by task 233:
[   27.142796]  kasan_save_stack+0x3c/0x68
[   27.146613]  kasan_save_track+0x20/0x40
[   27.150433]  kasan_save_alloc_info+0x40/0x58
[   27.154686]  __kasan_kmalloc+0xd4/0xd8
[   27.158418]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.162932]  kmalloc_uaf+0xb8/0x338
[   27.166404]  kunit_try_run_case+0x170/0x3f0
[   27.170571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.176040]  kthread+0x328/0x630
[   27.179252]  ret_from_fork+0x10/0x20
[   27.182810] 
[   27.184288] Freed by task 233:
[   27.187326]  kasan_save_stack+0x3c/0x68
[   27.191144]  kasan_save_track+0x20/0x40
[   27.194963]  kasan_save_free_info+0x4c/0x78
[   27.199130]  __kasan_slab_free+0x6c/0x98
[   27.203036]  kfree+0x214/0x3c8
[   27.206074]  kmalloc_uaf+0x11c/0x338
[   27.209633]  kunit_try_run_case+0x170/0x3f0
[   27.213799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.219270]  kthread+0x328/0x630
[   27.222480]  ret_from_fork+0x10/0x20
[   27.226039] 
[   27.227517] The buggy address belongs to the object at ffff000804354aa0
[   27.227517]  which belongs to the cache kmalloc-16 of size 16
[   27.239845] The buggy address is located 8 bytes inside of
[   27.239845]  freed 16-byte region [ffff000804354aa0, ffff000804354ab0)
[   27.251820] 
[   27.253299] The buggy address belongs to the physical page:
[   27.258857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884354
[   27.266839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.273349] page_type: f5(slab)
[   27.276487] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   27.284205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.291926] page dumped because: kasan: bad access detected
[   27.297479] 
[   27.298954] Memory state around the buggy address:
[   27.303736]  ffff000804354980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.310939]  ffff000804354a00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.318145] >ffff000804354a80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   27.325343]                                   ^
[   27.329861]  ffff000804354b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.337066]  ffff000804354b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.344268] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   26.784517] ==================================================================
[   26.795062] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.802958] Read of size 64 at addr ffff000803afaa04 by task kunit_try_catch/231
[   26.810335] 
[   26.811821] CPU: 2 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   26.811877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.811895] Hardware name: WinLink E850-96 board (DT)
[   26.811917] Call trace:
[   26.811929]  show_stack+0x20/0x38 (C)
[   26.811965]  dump_stack_lvl+0x8c/0xd0
[   26.811999]  print_report+0x118/0x608
[   26.812033]  kasan_report+0xdc/0x128
[   26.812063]  kasan_check_range+0x100/0x1a8
[   26.812096]  __asan_memmove+0x3c/0x98
[   26.812126]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   26.812161]  kunit_try_run_case+0x170/0x3f0
[   26.812196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.812235]  kthread+0x328/0x630
[   26.812268]  ret_from_fork+0x10/0x20
[   26.812301] 
[   26.878475] Allocated by task 231:
[   26.881864]  kasan_save_stack+0x3c/0x68
[   26.885679]  kasan_save_track+0x20/0x40
[   26.889500]  kasan_save_alloc_info+0x40/0x58
[   26.893752]  __kasan_kmalloc+0xd4/0xd8
[   26.897485]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.902000]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   26.906947]  kunit_try_run_case+0x170/0x3f0
[   26.911113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.916582]  kthread+0x328/0x630
[   26.919794]  ret_from_fork+0x10/0x20
[   26.923353] 
[   26.924830] The buggy address belongs to the object at ffff000803afaa00
[   26.924830]  which belongs to the cache kmalloc-64 of size 64
[   26.937158] The buggy address is located 4 bytes inside of
[   26.937158]  allocated 64-byte region [ffff000803afaa00, ffff000803afaa40)
[   26.949481] 
[   26.950959] The buggy address belongs to the physical page:
[   26.956517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   26.964500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.971010] page_type: f5(slab)
[   26.974148] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   26.981867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.989586] page dumped because: kasan: bad access detected
[   26.995140] 
[   26.996615] Memory state around the buggy address:
[   27.001397]  ffff000803afa900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.008598]  ffff000803afa980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.015804] >ffff000803afaa00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   27.023004]                                            ^
[   27.028303]  ffff000803afaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.035507]  ffff000803afab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.042710] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   26.520076] ==================================================================
[   26.529700] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   26.537249] Read of size 18446744073709551614 at addr ffff0008049a1484 by task kunit_try_catch/229
[   26.546191] 
[   26.547676] CPU: 3 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   26.547733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.547750] Hardware name: WinLink E850-96 board (DT)
[   26.547772] Call trace:
[   26.547786]  show_stack+0x20/0x38 (C)
[   26.547822]  dump_stack_lvl+0x8c/0xd0
[   26.547862]  print_report+0x118/0x608
[   26.547896]  kasan_report+0xdc/0x128
[   26.547925]  kasan_check_range+0x100/0x1a8
[   26.547957]  __asan_memmove+0x3c/0x98
[   26.547988]  kmalloc_memmove_negative_size+0x154/0x2e0
[   26.548022]  kunit_try_run_case+0x170/0x3f0
[   26.548060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.548099]  kthread+0x328/0x630
[   26.548135]  ret_from_fork+0x10/0x20
[   26.548172] 
[   26.614418] Allocated by task 229:
[   26.617806]  kasan_save_stack+0x3c/0x68
[   26.621621]  kasan_save_track+0x20/0x40
[   26.625441]  kasan_save_alloc_info+0x40/0x58
[   26.629694]  __kasan_kmalloc+0xd4/0xd8
[   26.633426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.637940]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   26.642976]  kunit_try_run_case+0x170/0x3f0
[   26.647141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.652610]  kthread+0x328/0x630
[   26.655822]  ret_from_fork+0x10/0x20
[   26.659381] 
[   26.660859] The buggy address belongs to the object at ffff0008049a1480
[   26.660859]  which belongs to the cache kmalloc-64 of size 64
[   26.673187] The buggy address is located 4 bytes inside of
[   26.673187]  64-byte region [ffff0008049a1480, ffff0008049a14c0)
[   26.684641] 
[   26.686119] The buggy address belongs to the physical page:
[   26.691676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8849a1
[   26.699660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.706170] page_type: f5(slab)
[   26.709308] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   26.717026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.724747] page dumped because: kasan: bad access detected
[   26.730300] 
[   26.731775] Memory state around the buggy address:
[   26.736556]  ffff0008049a1380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.743760]  ffff0008049a1400: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   26.750966] >ffff0008049a1480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.758164]                    ^
[   26.761380]  ffff0008049a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.768584]  ffff0008049a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.775787] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   26.214230] ==================================================================
[   26.223717] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   26.231004] Write of size 16 at addr ffff0008018e6f69 by task kunit_try_catch/227
[   26.238469] 
[   26.239955] CPU: 2 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   26.240010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.240029] Hardware name: WinLink E850-96 board (DT)
[   26.240051] Call trace:
[   26.240064]  show_stack+0x20/0x38 (C)
[   26.240096]  dump_stack_lvl+0x8c/0xd0
[   26.240132]  print_report+0x118/0x608
[   26.240159]  kasan_report+0xdc/0x128
[   26.240188]  kasan_check_range+0x100/0x1a8
[   26.240219]  __asan_memset+0x34/0x78
[   26.240249]  kmalloc_oob_memset_16+0x150/0x2f8
[   26.240282]  kunit_try_run_case+0x170/0x3f0
[   26.240318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.240358]  kthread+0x328/0x630
[   26.240391]  ret_from_fork+0x10/0x20
[   26.240422] 
[   26.305914] Allocated by task 227:
[   26.309303]  kasan_save_stack+0x3c/0x68
[   26.313118]  kasan_save_track+0x20/0x40
[   26.316940]  kasan_save_alloc_info+0x40/0x58
[   26.321191]  __kasan_kmalloc+0xd4/0xd8
[   26.324924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.329438]  kmalloc_oob_memset_16+0xb0/0x2f8
[   26.333778]  kunit_try_run_case+0x170/0x3f0
[   26.337945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.343414]  kthread+0x328/0x630
[   26.346625]  ret_from_fork+0x10/0x20
[   26.350184] 
[   26.351661] The buggy address belongs to the object at ffff0008018e6f00
[   26.351661]  which belongs to the cache kmalloc-128 of size 128
[   26.364163] The buggy address is located 105 bytes inside of
[   26.364163]  allocated 120-byte region [ffff0008018e6f00, ffff0008018e6f78)
[   26.376746] 
[   26.378226] The buggy address belongs to the physical page:
[   26.383781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   26.391765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.399404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.406348] page_type: f5(slab)
[   26.409485] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.417204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.424930] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.432742] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.440555] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   26.448366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.456175] page dumped because: kasan: bad access detected
[   26.461727] 
[   26.463203] Memory state around the buggy address:
[   26.467984]  ffff0008018e6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.475186]  ffff0008018e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.482393] >ffff0008018e6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.489592]                                                                 ^
[   26.496713]  ffff0008018e6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.503920]  ffff0008018e7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.511121] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   25.908714] ==================================================================
[   25.918168] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   25.925364] Write of size 8 at addr ffff000801a3d671 by task kunit_try_catch/225
[   25.932743] 
[   25.934229] CPU: 3 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   25.934282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.934297] Hardware name: WinLink E850-96 board (DT)
[   25.934320] Call trace:
[   25.934332]  show_stack+0x20/0x38 (C)
[   25.934366]  dump_stack_lvl+0x8c/0xd0
[   25.934404]  print_report+0x118/0x608
[   25.934435]  kasan_report+0xdc/0x128
[   25.934463]  kasan_check_range+0x100/0x1a8
[   25.934494]  __asan_memset+0x34/0x78
[   25.934524]  kmalloc_oob_memset_8+0x150/0x2f8
[   25.934559]  kunit_try_run_case+0x170/0x3f0
[   25.934596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.934634]  kthread+0x328/0x630
[   25.934669]  ret_from_fork+0x10/0x20
[   25.934704] 
[   26.000103] Allocated by task 225:
[   26.003492]  kasan_save_stack+0x3c/0x68
[   26.007309]  kasan_save_track+0x20/0x40
[   26.011127]  kasan_save_alloc_info+0x40/0x58
[   26.015380]  __kasan_kmalloc+0xd4/0xd8
[   26.019113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.023627]  kmalloc_oob_memset_8+0xb0/0x2f8
[   26.027881]  kunit_try_run_case+0x170/0x3f0
[   26.032047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.037515]  kthread+0x328/0x630
[   26.040727]  ret_from_fork+0x10/0x20
[   26.044286] 
[   26.045763] The buggy address belongs to the object at ffff000801a3d600
[   26.045763]  which belongs to the cache kmalloc-128 of size 128
[   26.058265] The buggy address is located 113 bytes inside of
[   26.058265]  allocated 120-byte region [ffff000801a3d600, ffff000801a3d678)
[   26.070848] 
[   26.072326] The buggy address belongs to the physical page:
[   26.077884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881a3c
[   26.085868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.093506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.100450] page_type: f5(slab)
[   26.103587] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.111306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.119033] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   26.126843] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.134656] head: 0bfffe0000000001 fffffdffe0068f01 00000000ffffffff 00000000ffffffff
[   26.142468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   26.150274] page dumped because: kasan: bad access detected
[   26.155829] 
[   26.157304] Memory state around the buggy address:
[   26.162086]  ffff000801a3d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.169288]  ffff000801a3d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.176496] >ffff000801a3d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.183694]                                                                 ^
[   26.190815]  ffff000801a3d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.198020]  ffff000801a3d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.205223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   25.602835] ==================================================================
[   25.612612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   25.619815] Write of size 4 at addr ffff0008018e6e75 by task kunit_try_catch/223
[   25.627192] 
[   25.628677] CPU: 2 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   25.628726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.628743] Hardware name: WinLink E850-96 board (DT)
[   25.628764] Call trace:
[   25.628779]  show_stack+0x20/0x38 (C)
[   25.628812]  dump_stack_lvl+0x8c/0xd0
[   25.628847]  print_report+0x118/0x608
[   25.628878]  kasan_report+0xdc/0x128
[   25.628906]  kasan_check_range+0x100/0x1a8
[   25.628937]  __asan_memset+0x34/0x78
[   25.628966]  kmalloc_oob_memset_4+0x150/0x300
[   25.628997]  kunit_try_run_case+0x170/0x3f0
[   25.629034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.629070]  kthread+0x328/0x630
[   25.629105]  ret_from_fork+0x10/0x20
[   25.629138] 
[   25.694552] Allocated by task 223:
[   25.697941]  kasan_save_stack+0x3c/0x68
[   25.701756]  kasan_save_track+0x20/0x40
[   25.705576]  kasan_save_alloc_info+0x40/0x58
[   25.709829]  __kasan_kmalloc+0xd4/0xd8
[   25.713562]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.718076]  kmalloc_oob_memset_4+0xb0/0x300
[   25.722329]  kunit_try_run_case+0x170/0x3f0
[   25.726496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.731964]  kthread+0x328/0x630
[   25.735176]  ret_from_fork+0x10/0x20
[   25.738735] 
[   25.740213] The buggy address belongs to the object at ffff0008018e6e00
[   25.740213]  which belongs to the cache kmalloc-128 of size 128
[   25.752714] The buggy address is located 117 bytes inside of
[   25.752714]  allocated 120-byte region [ffff0008018e6e00, ffff0008018e6e78)
[   25.765297] 
[   25.766776] The buggy address belongs to the physical page:
[   25.772333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   25.780317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.787955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.794899] page_type: f5(slab)
[   25.798034] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.805755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.813481] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.821293] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.829106] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   25.836921] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.844723] page dumped because: kasan: bad access detected
[   25.850278] 
[   25.851754] Memory state around the buggy address:
[   25.856533]  ffff0008018e6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.863737]  ffff0008018e6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.870943] >ffff0008018e6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.878143]                                                                 ^
[   25.885264]  ffff0008018e6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.892469]  ffff0008018e6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.899672] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   25.297536] ==================================================================
[   25.307065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   25.314264] Write of size 2 at addr ffff000801a3d577 by task kunit_try_catch/221
[   25.321642] 
[   25.323129] CPU: 3 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   25.323182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.323199] Hardware name: WinLink E850-96 board (DT)
[   25.323220] Call trace:
[   25.323233]  show_stack+0x20/0x38 (C)
[   25.323265]  dump_stack_lvl+0x8c/0xd0
[   25.323304]  print_report+0x118/0x608
[   25.323335]  kasan_report+0xdc/0x128
[   25.323364]  kasan_check_range+0x100/0x1a8
[   25.323395]  __asan_memset+0x34/0x78
[   25.323422]  kmalloc_oob_memset_2+0x150/0x2f8
[   25.323457]  kunit_try_run_case+0x170/0x3f0
[   25.323493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.323530]  kthread+0x328/0x630
[   25.323564]  ret_from_fork+0x10/0x20
[   25.323599] 
[   25.389002] Allocated by task 221:
[   25.392390]  kasan_save_stack+0x3c/0x68
[   25.396205]  kasan_save_track+0x20/0x40
[   25.400025]  kasan_save_alloc_info+0x40/0x58
[   25.404278]  __kasan_kmalloc+0xd4/0xd8
[   25.408011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.412524]  kmalloc_oob_memset_2+0xb0/0x2f8
[   25.416779]  kunit_try_run_case+0x170/0x3f0
[   25.420945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.426413]  kthread+0x328/0x630
[   25.429625]  ret_from_fork+0x10/0x20
[   25.433184] 
[   25.434661] The buggy address belongs to the object at ffff000801a3d500
[   25.434661]  which belongs to the cache kmalloc-128 of size 128
[   25.447163] The buggy address is located 119 bytes inside of
[   25.447163]  allocated 120-byte region [ffff000801a3d500, ffff000801a3d578)
[   25.459746] 
[   25.461224] The buggy address belongs to the physical page:
[   25.466782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881a3c
[   25.474765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.482404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.489348] page_type: f5(slab)
[   25.492485] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.500204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.507930] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.515741] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.523554] head: 0bfffe0000000001 fffffdffe0068f01 00000000ffffffff 00000000ffffffff
[   25.531366] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.539175] page dumped because: kasan: bad access detected
[   25.544727] 
[   25.546203] Memory state around the buggy address:
[   25.550986]  ffff000801a3d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.558186]  ffff000801a3d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.565392] >ffff000801a3d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.572592]                                                                 ^
[   25.579713]  ffff000801a3d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.586920]  ffff000801a3d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.594121] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   24.992063] ==================================================================
[   25.001164] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   25.008452] Write of size 128 at addr ffff0008018e6d00 by task kunit_try_catch/219
[   25.016003] 
[   25.017488] CPU: 2 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   25.017540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.017556] Hardware name: WinLink E850-96 board (DT)
[   25.017577] Call trace:
[   25.017591]  show_stack+0x20/0x38 (C)
[   25.017626]  dump_stack_lvl+0x8c/0xd0
[   25.017666]  print_report+0x118/0x608
[   25.017697]  kasan_report+0xdc/0x128
[   25.017727]  kasan_check_range+0x100/0x1a8
[   25.017759]  __asan_memset+0x34/0x78
[   25.017789]  kmalloc_oob_in_memset+0x144/0x2d0
[   25.017822]  kunit_try_run_case+0x170/0x3f0
[   25.017857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.017893]  kthread+0x328/0x630
[   25.017929]  ret_from_fork+0x10/0x20
[   25.017963] 
[   25.083450] Allocated by task 219:
[   25.086839]  kasan_save_stack+0x3c/0x68
[   25.090654]  kasan_save_track+0x20/0x40
[   25.094475]  kasan_save_alloc_info+0x40/0x58
[   25.098729]  __kasan_kmalloc+0xd4/0xd8
[   25.102460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.106974]  kmalloc_oob_in_memset+0xb0/0x2d0
[   25.111314]  kunit_try_run_case+0x170/0x3f0
[   25.115480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.120949]  kthread+0x328/0x630
[   25.124160]  ret_from_fork+0x10/0x20
[   25.127720] 
[   25.129198] The buggy address belongs to the object at ffff0008018e6d00
[   25.129198]  which belongs to the cache kmalloc-128 of size 128
[   25.141699] The buggy address is located 0 bytes inside of
[   25.141699]  allocated 120-byte region [ffff0008018e6d00, ffff0008018e6d78)
[   25.154108] 
[   25.155588] The buggy address belongs to the physical page:
[   25.161144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   25.169128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.176766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   25.183710] page_type: f5(slab)
[   25.186848] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.194566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.202292] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   25.210104] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.217916] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   25.225729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   25.233536] page dumped because: kasan: bad access detected
[   25.239089] 
[   25.240565] Memory state around the buggy address:
[   25.245347]  ffff0008018e6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.252548]  ffff0008018e6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.259754] >ffff0008018e6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.266954]                                                                 ^
[   25.274075]  ffff0008018e6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.281282]  ffff0008018e6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.288483] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   24.689640] ==================================================================
[   24.698738] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   24.705505] Read of size 16 at addr ffff000801716f40 by task kunit_try_catch/217
[   24.712884] 
[   24.714369] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   24.714424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.714440] Hardware name: WinLink E850-96 board (DT)
[   24.714462] Call trace:
[   24.714476]  show_stack+0x20/0x38 (C)
[   24.714510]  dump_stack_lvl+0x8c/0xd0
[   24.714546]  print_report+0x118/0x608
[   24.714577]  kasan_report+0xdc/0x128
[   24.714606]  __asan_report_load16_noabort+0x20/0x30
[   24.714642]  kmalloc_uaf_16+0x3bc/0x438
[   24.714672]  kunit_try_run_case+0x170/0x3f0
[   24.714707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.714744]  kthread+0x328/0x630
[   24.714779]  ret_from_fork+0x10/0x20
[   24.714813] 
[   24.776944] Allocated by task 217:
[   24.780333]  kasan_save_stack+0x3c/0x68
[   24.784148]  kasan_save_track+0x20/0x40
[   24.787968]  kasan_save_alloc_info+0x40/0x58
[   24.792221]  __kasan_kmalloc+0xd4/0xd8
[   24.795955]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.800468]  kmalloc_uaf_16+0x140/0x438
[   24.804287]  kunit_try_run_case+0x170/0x3f0
[   24.808454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.813923]  kthread+0x328/0x630
[   24.817135]  ret_from_fork+0x10/0x20
[   24.820693] 
[   24.822170] Freed by task 217:
[   24.825208]  kasan_save_stack+0x3c/0x68
[   24.829026]  kasan_save_track+0x20/0x40
[   24.832846]  kasan_save_free_info+0x4c/0x78
[   24.837012]  __kasan_slab_free+0x6c/0x98
[   24.840918]  kfree+0x214/0x3c8
[   24.843957]  kmalloc_uaf_16+0x190/0x438
[   24.847778]  kunit_try_run_case+0x170/0x3f0
[   24.851942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.857411]  kthread+0x328/0x630
[   24.860623]  ret_from_fork+0x10/0x20
[   24.864182] 
[   24.865660] The buggy address belongs to the object at ffff000801716f40
[   24.865660]  which belongs to the cache kmalloc-16 of size 16
[   24.877988] The buggy address is located 0 bytes inside of
[   24.877988]  freed 16-byte region [ffff000801716f40, ffff000801716f50)
[   24.889963] 
[   24.891441] The buggy address belongs to the physical page:
[   24.896999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881716
[   24.904983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.911492] page_type: f5(slab)
[   24.914630] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   24.922348] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.930068] page dumped because: kasan: bad access detected
[   24.935622] 
[   24.937097] Memory state around the buggy address:
[   24.941881]  ffff000801716e00: 00 02 fc fc 00 06 fc fc 00 06 fc fc 00 04 fc fc
[   24.949080]  ffff000801716e80: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   24.956287] >ffff000801716f00: 00 04 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   24.963486]                                            ^
[   24.968785]  ffff000801716f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.975991]  ffff000801717000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.983192] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   24.429170] ==================================================================
[   24.438153] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   24.444832] Write of size 16 at addr ffff000804354a60 by task kunit_try_catch/215
[   24.452298] 
[   24.453782] CPU: 3 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   24.453834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.453851] Hardware name: WinLink E850-96 board (DT)
[   24.453872] Call trace:
[   24.453890]  show_stack+0x20/0x38 (C)
[   24.453927]  dump_stack_lvl+0x8c/0xd0
[   24.453962]  print_report+0x118/0x608
[   24.453993]  kasan_report+0xdc/0x128
[   24.454022]  __asan_report_store16_noabort+0x20/0x30
[   24.454059]  kmalloc_oob_16+0x3a0/0x3f8
[   24.454091]  kunit_try_run_case+0x170/0x3f0
[   24.454128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.454165]  kthread+0x328/0x630
[   24.454198]  ret_from_fork+0x10/0x20
[   24.454231] 
[   24.516445] Allocated by task 215:
[   24.519834]  kasan_save_stack+0x3c/0x68
[   24.523649]  kasan_save_track+0x20/0x40
[   24.527469]  kasan_save_alloc_info+0x40/0x58
[   24.531722]  __kasan_kmalloc+0xd4/0xd8
[   24.535455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.539968]  kmalloc_oob_16+0xb4/0x3f8
[   24.543701]  kunit_try_run_case+0x170/0x3f0
[   24.547867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.553336]  kthread+0x328/0x630
[   24.556548]  ret_from_fork+0x10/0x20
[   24.560107] 
[   24.561584] The buggy address belongs to the object at ffff000804354a60
[   24.561584]  which belongs to the cache kmalloc-16 of size 16
[   24.573913] The buggy address is located 0 bytes inside of
[   24.573913]  allocated 13-byte region [ffff000804354a60, ffff000804354a6d)
[   24.586235] 
[   24.587715] The buggy address belongs to the physical page:
[   24.593271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884354
[   24.601254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.607764] page_type: f5(slab)
[   24.610901] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   24.618620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.626340] page dumped because: kasan: bad access detected
[   24.631894] 
[   24.633369] Memory state around the buggy address:
[   24.638151]  ffff000804354900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.645353]  ffff000804354980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.652558] >ffff000804354a00: 00 04 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   24.659758]                                                           ^
[   24.666359]  ffff000804354a80: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.673564]  ffff000804354b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.680767] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   23.750901] ==================================================================
[   23.760905] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   23.767500] Read of size 1 at addr ffff000803bc6600 by task kunit_try_catch/213
[   23.774790] 
[   23.776276] CPU: 2 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   23.776331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.776348] Hardware name: WinLink E850-96 board (DT)
[   23.776368] Call trace:
[   23.776383]  show_stack+0x20/0x38 (C)
[   23.776414]  dump_stack_lvl+0x8c/0xd0
[   23.776452]  print_report+0x118/0x608
[   23.776481]  kasan_report+0xdc/0x128
[   23.776511]  __kasan_check_byte+0x54/0x70
[   23.776539]  krealloc_noprof+0x44/0x360
[   23.776570]  krealloc_uaf+0x180/0x520
[   23.776595]  kunit_try_run_case+0x170/0x3f0
[   23.776632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.776668]  kthread+0x328/0x630
[   23.776701]  ret_from_fork+0x10/0x20
[   23.776732] 
[   23.841629] Allocated by task 213:
[   23.845017]  kasan_save_stack+0x3c/0x68
[   23.848832]  kasan_save_track+0x20/0x40
[   23.852652]  kasan_save_alloc_info+0x40/0x58
[   23.856906]  __kasan_kmalloc+0xd4/0xd8
[   23.860638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.865152]  krealloc_uaf+0xc8/0x520
[   23.868711]  kunit_try_run_case+0x170/0x3f0
[   23.872878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.878346]  kthread+0x328/0x630
[   23.881558]  ret_from_fork+0x10/0x20
[   23.885117] 
[   23.886594] Freed by task 213:
[   23.889632]  kasan_save_stack+0x3c/0x68
[   23.893450]  kasan_save_track+0x20/0x40
[   23.897269]  kasan_save_free_info+0x4c/0x78
[   23.901436]  __kasan_slab_free+0x6c/0x98
[   23.905342]  kfree+0x214/0x3c8
[   23.908380]  krealloc_uaf+0x12c/0x520
[   23.912026]  kunit_try_run_case+0x170/0x3f0
[   23.916193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.921663]  kthread+0x328/0x630
[   23.924873]  ret_from_fork+0x10/0x20
[   23.928432] 
[   23.929910] The buggy address belongs to the object at ffff000803bc6600
[   23.929910]  which belongs to the cache kmalloc-256 of size 256
[   23.942411] The buggy address is located 0 bytes inside of
[   23.942411]  freed 256-byte region [ffff000803bc6600, ffff000803bc6700)
[   23.954473] 
[   23.955953] The buggy address belongs to the physical page:
[   23.961508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   23.969493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.977131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.984075] page_type: f5(slab)
[   23.987212] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.994931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.002657] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.010469] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.018282] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   24.026094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.033899] page dumped because: kasan: bad access detected
[   24.039454] 
[   24.040930] Memory state around the buggy address:
[   24.045714]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.052913]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060120] >ffff000803bc6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.067319]                    ^
[   24.070534]  ffff000803bc6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.077739]  ffff000803bc6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.084942] ==================================================================
[   24.092356] ==================================================================
[   24.099355] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   24.105947] Read of size 1 at addr ffff000803bc6600 by task kunit_try_catch/213
[   24.113239] 
[   24.114725] CPU: 2 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   24.114773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.114790] Hardware name: WinLink E850-96 board (DT)
[   24.114810] Call trace:
[   24.114823]  show_stack+0x20/0x38 (C)
[   24.114855]  dump_stack_lvl+0x8c/0xd0
[   24.114890]  print_report+0x118/0x608
[   24.114919]  kasan_report+0xdc/0x128
[   24.114949]  __asan_report_load1_noabort+0x20/0x30
[   24.114979]  krealloc_uaf+0x4c8/0x520
[   24.115003]  kunit_try_run_case+0x170/0x3f0
[   24.115037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.115073]  kthread+0x328/0x630
[   24.115105]  ret_from_fork+0x10/0x20
[   24.115139] 
[   24.177039] Allocated by task 213:
[   24.180428]  kasan_save_stack+0x3c/0x68
[   24.184244]  kasan_save_track+0x20/0x40
[   24.188064]  kasan_save_alloc_info+0x40/0x58
[   24.192317]  __kasan_kmalloc+0xd4/0xd8
[   24.196050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.200563]  krealloc_uaf+0xc8/0x520
[   24.204122]  kunit_try_run_case+0x170/0x3f0
[   24.208289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.213758]  kthread+0x328/0x630
[   24.216970]  ret_from_fork+0x10/0x20
[   24.220528] 
[   24.222004] Freed by task 213:
[   24.225044]  kasan_save_stack+0x3c/0x68
[   24.228862]  kasan_save_track+0x20/0x40
[   24.232681]  kasan_save_free_info+0x4c/0x78
[   24.236848]  __kasan_slab_free+0x6c/0x98
[   24.240754]  kfree+0x214/0x3c8
[   24.243792]  krealloc_uaf+0x12c/0x520
[   24.247438]  kunit_try_run_case+0x170/0x3f0
[   24.251604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.257073]  kthread+0x328/0x630
[   24.260285]  ret_from_fork+0x10/0x20
[   24.263844] 
[   24.265319] The buggy address belongs to the object at ffff000803bc6600
[   24.265319]  which belongs to the cache kmalloc-256 of size 256
[   24.277820] The buggy address is located 0 bytes inside of
[   24.277820]  freed 256-byte region [ffff000803bc6600, ffff000803bc6700)
[   24.289885] 
[   24.291364] The buggy address belongs to the physical page:
[   24.296919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   24.304904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.312542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.319487] page_type: f5(slab)
[   24.322620] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.330343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.338069] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.345880] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.353694] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   24.361505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.369311] page dumped because: kasan: bad access detected
[   24.374866] 
[   24.376342] Memory state around the buggy address:
[   24.381123]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.388325]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.395533] >ffff000803bc6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.402731]                    ^
[   24.405947]  ffff000803bc6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.413151]  ffff000803bc6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.420353] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   20.896757] ==================================================================
[   20.903745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   20.911291] Write of size 1 at addr ffff000803bc64d0 by task kunit_try_catch/207
[   20.918668] 
[   20.920154] CPU: 2 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   20.920206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.920222] Hardware name: WinLink E850-96 board (DT)
[   20.920241] Call trace:
[   20.920253]  show_stack+0x20/0x38 (C)
[   20.920287]  dump_stack_lvl+0x8c/0xd0
[   20.920324]  print_report+0x118/0x608
[   20.920355]  kasan_report+0xdc/0x128
[   20.920385]  __asan_report_store1_noabort+0x20/0x30
[   20.920422]  krealloc_less_oob_helper+0xb9c/0xc50
[   20.920449]  krealloc_less_oob+0x20/0x38
[   20.920473]  kunit_try_run_case+0x170/0x3f0
[   20.920508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.920544]  kthread+0x328/0x630
[   20.920578]  ret_from_fork+0x10/0x20
[   20.920611] 
[   20.987504] Allocated by task 207:
[   20.990892]  kasan_save_stack+0x3c/0x68
[   20.994709]  kasan_save_track+0x20/0x40
[   20.998529]  kasan_save_alloc_info+0x40/0x58
[   21.002782]  __kasan_krealloc+0x118/0x178
[   21.006775]  krealloc_noprof+0x128/0x360
[   21.010681]  krealloc_less_oob_helper+0x168/0xc50
[   21.015369]  krealloc_less_oob+0x20/0x38
[   21.019274]  kunit_try_run_case+0x170/0x3f0
[   21.023441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.028910]  kthread+0x328/0x630
[   21.032121]  ret_from_fork+0x10/0x20
[   21.035680] 
[   21.037159] The buggy address belongs to the object at ffff000803bc6400
[   21.037159]  which belongs to the cache kmalloc-256 of size 256
[   21.049656] The buggy address is located 7 bytes to the right of
[   21.049656]  allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9)
[   21.062590] 
[   21.064067] The buggy address belongs to the physical page:
[   21.069624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   21.077609] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.085248] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.092190] page_type: f5(slab)
[   21.095328] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.103048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.110774] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.118585] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.126398] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   21.134210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.142017] page dumped because: kasan: bad access detected
[   21.147571] 
[   21.149046] Memory state around the buggy address:
[   21.153829]  ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.161030]  ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.168236] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.175436]                                                  ^
[   21.181255]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188460]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195662] ==================================================================
[   23.286767] ==================================================================
[   23.293896] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.301445] Write of size 1 at addr ffff000805d560ea by task kunit_try_catch/211
[   23.308824] 
[   23.310306] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   23.310351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.310366] Hardware name: WinLink E850-96 board (DT)
[   23.310381] Call trace:
[   23.310390]  show_stack+0x20/0x38 (C)
[   23.310421]  dump_stack_lvl+0x8c/0xd0
[   23.310455]  print_report+0x118/0x608
[   23.310484]  kasan_report+0xdc/0x128
[   23.310514]  __asan_report_store1_noabort+0x20/0x30
[   23.310547]  krealloc_less_oob_helper+0xae4/0xc50
[   23.310574]  krealloc_large_less_oob+0x20/0x38
[   23.310601]  kunit_try_run_case+0x170/0x3f0
[   23.310636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.310673]  kthread+0x328/0x630
[   23.310706]  ret_from_fork+0x10/0x20
[   23.310738] 
[   23.378182] The buggy address belongs to the physical page:
[   23.383737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   23.391723] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.399360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.406305] page_type: f8(unknown)
[   23.409701] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.417422] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.425149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.432960] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.440773] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff
[   23.448585] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.456391] page dumped because: kasan: bad access detected
[   23.461946] 
[   23.463422] Memory state around the buggy address:
[   23.468201]  ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.475405]  ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.482609] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.489810]                                                           ^
[   23.496411]  ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.503616]  ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.510819] ==================================================================
[   20.588215] ==================================================================
[   20.597673] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   20.605220] Write of size 1 at addr ffff000803bc64c9 by task kunit_try_catch/207
[   20.612600] 
[   20.614084] CPU: 2 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   20.614140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.614158] Hardware name: WinLink E850-96 board (DT)
[   20.614178] Call trace:
[   20.614192]  show_stack+0x20/0x38 (C)
[   20.614224]  dump_stack_lvl+0x8c/0xd0
[   20.614260]  print_report+0x118/0x608
[   20.614290]  kasan_report+0xdc/0x128
[   20.614320]  __asan_report_store1_noabort+0x20/0x30
[   20.614356]  krealloc_less_oob_helper+0xa48/0xc50
[   20.614387]  krealloc_less_oob+0x20/0x38
[   20.614412]  kunit_try_run_case+0x170/0x3f0
[   20.614447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.614484]  kthread+0x328/0x630
[   20.614519]  ret_from_fork+0x10/0x20
[   20.614553] 
[   20.681433] Allocated by task 207:
[   20.684822]  kasan_save_stack+0x3c/0x68
[   20.688637]  kasan_save_track+0x20/0x40
[   20.692457]  kasan_save_alloc_info+0x40/0x58
[   20.696710]  __kasan_krealloc+0x118/0x178
[   20.700703]  krealloc_noprof+0x128/0x360
[   20.704609]  krealloc_less_oob_helper+0x168/0xc50
[   20.709298]  krealloc_less_oob+0x20/0x38
[   20.713203]  kunit_try_run_case+0x170/0x3f0
[   20.717369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.722838]  kthread+0x328/0x630
[   20.726050]  ret_from_fork+0x10/0x20
[   20.729609] 
[   20.731086] The buggy address belongs to the object at ffff000803bc6400
[   20.731086]  which belongs to the cache kmalloc-256 of size 256
[   20.743588] The buggy address is located 0 bytes to the right of
[   20.743588]  allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9)
[   20.756518] 
[   20.757996] The buggy address belongs to the physical page:
[   20.763553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   20.771538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.779175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.786120] page_type: f5(slab)
[   20.789257] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.796976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.804704] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.812513] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.820326] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   20.828140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.835945] page dumped because: kasan: bad access detected
[   20.841499] 
[   20.842975] Memory state around the buggy address:
[   20.847756]  ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.854958]  ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.862165] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.869364]                                               ^
[   20.874923]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.882128]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.889331] ==================================================================
[   23.055991] ==================================================================
[   23.063088] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.070633] Write of size 1 at addr ffff000805d560da by task kunit_try_catch/211
[   23.078011] 
[   23.079496] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   23.079544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.079558] Hardware name: WinLink E850-96 board (DT)
[   23.079576] Call trace:
[   23.079588]  show_stack+0x20/0x38 (C)
[   23.079620]  dump_stack_lvl+0x8c/0xd0
[   23.079655]  print_report+0x118/0x608
[   23.079686]  kasan_report+0xdc/0x128
[   23.079715]  __asan_report_store1_noabort+0x20/0x30
[   23.079749]  krealloc_less_oob_helper+0xa80/0xc50
[   23.079777]  krealloc_large_less_oob+0x20/0x38
[   23.079803]  kunit_try_run_case+0x170/0x3f0
[   23.079838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.079873]  kthread+0x328/0x630
[   23.079906]  ret_from_fork+0x10/0x20
[   23.079941] 
[   23.147370] The buggy address belongs to the physical page:
[   23.152924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   23.160911] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.168549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.175492] page_type: f8(unknown)
[   23.178890] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.186610] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.194336] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.202147] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.209961] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff
[   23.217773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.225578] page dumped because: kasan: bad access detected
[   23.231133] 
[   23.232609] Memory state around the buggy address:
[   23.237389]  ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.244592]  ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.251799] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.258998]                                                     ^
[   23.265078]  ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.272283]  ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.279485] ==================================================================
[   21.816865] ==================================================================
[   21.823953] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   21.831502] Write of size 1 at addr ffff000803bc64eb by task kunit_try_catch/207
[   21.838880] 
[   21.840364] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   21.840415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.840431] Hardware name: WinLink E850-96 board (DT)
[   21.840450] Call trace:
[   21.840462]  show_stack+0x20/0x38 (C)
[   21.840491]  dump_stack_lvl+0x8c/0xd0
[   21.840528]  print_report+0x118/0x608
[   21.840560]  kasan_report+0xdc/0x128
[   21.840589]  __asan_report_store1_noabort+0x20/0x30
[   21.840624]  krealloc_less_oob_helper+0xa58/0xc50
[   21.840653]  krealloc_less_oob+0x20/0x38
[   21.840679]  kunit_try_run_case+0x170/0x3f0
[   21.840710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.840744]  kthread+0x328/0x630
[   21.840777]  ret_from_fork+0x10/0x20
[   21.840810] 
[   21.907716] Allocated by task 207:
[   21.911103]  kasan_save_stack+0x3c/0x68
[   21.914921]  kasan_save_track+0x20/0x40
[   21.918740]  kasan_save_alloc_info+0x40/0x58
[   21.922994]  __kasan_krealloc+0x118/0x178
[   21.926987]  krealloc_noprof+0x128/0x360
[   21.930893]  krealloc_less_oob_helper+0x168/0xc50
[   21.935580]  krealloc_less_oob+0x20/0x38
[   21.939486]  kunit_try_run_case+0x170/0x3f0
[   21.943653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.949122]  kthread+0x328/0x630
[   21.952334]  ret_from_fork+0x10/0x20
[   21.955892] 
[   21.957371] The buggy address belongs to the object at ffff000803bc6400
[   21.957371]  which belongs to the cache kmalloc-256 of size 256
[   21.969868] The buggy address is located 34 bytes to the right of
[   21.969868]  allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9)
[   21.982889] 
[   21.984366] The buggy address belongs to the physical page:
[   21.989922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   21.997906] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.005545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.012490] page_type: f5(slab)
[   22.015626] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.023346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.031073] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   22.038884] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.046697] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   22.054509] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.062314] page dumped because: kasan: bad access detected
[   22.067870] 
[   22.069345] Memory state around the buggy address:
[   22.074126]  ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.081329]  ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.088535] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.095734]                                                           ^
[   22.102335]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.109540]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.116741] ==================================================================
[   21.509853] ==================================================================
[   21.516754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   21.524302] Write of size 1 at addr ffff000803bc64ea by task kunit_try_catch/207
[   21.531680] 
[   21.533165] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   21.533217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.533232] Hardware name: WinLink E850-96 board (DT)
[   21.533251] Call trace:
[   21.533264]  show_stack+0x20/0x38 (C)
[   21.533296]  dump_stack_lvl+0x8c/0xd0
[   21.533331]  print_report+0x118/0x608
[   21.533362]  kasan_report+0xdc/0x128
[   21.533391]  __asan_report_store1_noabort+0x20/0x30
[   21.533426]  krealloc_less_oob_helper+0xae4/0xc50
[   21.533453]  krealloc_less_oob+0x20/0x38
[   21.533477]  kunit_try_run_case+0x170/0x3f0
[   21.533511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.533547]  kthread+0x328/0x630
[   21.533581]  ret_from_fork+0x10/0x20
[   21.533613] 
[   21.600516] Allocated by task 207:
[   21.603903]  kasan_save_stack+0x3c/0x68
[   21.607722]  kasan_save_track+0x20/0x40
[   21.611540]  kasan_save_alloc_info+0x40/0x58
[   21.615793]  __kasan_krealloc+0x118/0x178
[   21.619786]  krealloc_noprof+0x128/0x360
[   21.623692]  krealloc_less_oob_helper+0x168/0xc50
[   21.628380]  krealloc_less_oob+0x20/0x38
[   21.632286]  kunit_try_run_case+0x170/0x3f0
[   21.636453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.641922]  kthread+0x328/0x630
[   21.645133]  ret_from_fork+0x10/0x20
[   21.648692] 
[   21.650171] The buggy address belongs to the object at ffff000803bc6400
[   21.650171]  which belongs to the cache kmalloc-256 of size 256
[   21.662668] The buggy address is located 33 bytes to the right of
[   21.662668]  allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9)
[   21.675688] 
[   21.677167] The buggy address belongs to the physical page:
[   21.682723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   21.690709] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.698346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.705290] page_type: f5(slab)
[   21.708426] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.716146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.723872] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.731684] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.739497] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   21.747309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.755114] page dumped because: kasan: bad access detected
[   21.760669] 
[   21.762145] Memory state around the buggy address:
[   21.766926]  ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.774128]  ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.781335] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.788534]                                                           ^
[   21.795136]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.802339]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.809542] ==================================================================
[   22.592291] ==================================================================
[   22.602241] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.609791] Write of size 1 at addr ffff000805d560c9 by task kunit_try_catch/211
[   22.617167] 
[   22.618654] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   22.618704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.618720] Hardware name: WinLink E850-96 board (DT)
[   22.618739] Call trace:
[   22.618748]  show_stack+0x20/0x38 (C)
[   22.618781]  dump_stack_lvl+0x8c/0xd0
[   22.618818]  print_report+0x118/0x608
[   22.618846]  kasan_report+0xdc/0x128
[   22.618875]  __asan_report_store1_noabort+0x20/0x30
[   22.618912]  krealloc_less_oob_helper+0xa48/0xc50
[   22.618940]  krealloc_large_less_oob+0x20/0x38
[   22.618966]  kunit_try_run_case+0x170/0x3f0
[   22.619001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.619036]  kthread+0x328/0x630
[   22.619071]  ret_from_fork+0x10/0x20
[   22.619105] 
[   22.686527] The buggy address belongs to the physical page:
[   22.692084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   22.700066] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.707706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.714650] page_type: f8(unknown)
[   22.718047] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.725766] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.733492] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.741303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.749117] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff
[   22.756929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.764734] page dumped because: kasan: bad access detected
[   22.770290] 
[   22.771765] Memory state around the buggy address:
[   22.776547]  ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.783749]  ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.790955] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.798154]                                               ^
[   22.803713]  ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.810918]  ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.818120] ==================================================================
[   22.825654] ==================================================================
[   22.832534] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.840081] Write of size 1 at addr ffff000805d560d0 by task kunit_try_catch/211
[   22.847459] 
[   22.848943] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   22.848990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.849005] Hardware name: WinLink E850-96 board (DT)
[   22.849023] Call trace:
[   22.849035]  show_stack+0x20/0x38 (C)
[   22.849067]  dump_stack_lvl+0x8c/0xd0
[   22.849101]  print_report+0x118/0x608
[   22.849135]  kasan_report+0xdc/0x128
[   22.849166]  __asan_report_store1_noabort+0x20/0x30
[   22.849201]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.849228]  krealloc_large_less_oob+0x20/0x38
[   22.849255]  kunit_try_run_case+0x170/0x3f0
[   22.849290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.849326]  kthread+0x328/0x630
[   22.849360]  ret_from_fork+0x10/0x20
[   22.849392] 
[   22.916818] The buggy address belongs to the physical page:
[   22.922376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   22.930359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.937998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.944940] page_type: f8(unknown)
[   22.948337] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.956058] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.963784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.971595] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.979409] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff
[   22.987221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.995026] page dumped because: kasan: bad access detected
[   23.000581] 
[   23.002057] Memory state around the buggy address:
[   23.006837]  ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.014040]  ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.021246] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.028446]                                                  ^
[   23.034265]  ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.041470]  ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.048672] ==================================================================
[   23.518131] ==================================================================
[   23.525232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.532780] Write of size 1 at addr ffff000805d560eb by task kunit_try_catch/211
[   23.540157] 
[   23.541640] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   23.541690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.541704] Hardware name: WinLink E850-96 board (DT)
[   23.541724] Call trace:
[   23.541738]  show_stack+0x20/0x38 (C)
[   23.541770]  dump_stack_lvl+0x8c/0xd0
[   23.541804]  print_report+0x118/0x608
[   23.541835]  kasan_report+0xdc/0x128
[   23.541863]  __asan_report_store1_noabort+0x20/0x30
[   23.541896]  krealloc_less_oob_helper+0xa58/0xc50
[   23.541926]  krealloc_large_less_oob+0x20/0x38
[   23.541952]  kunit_try_run_case+0x170/0x3f0
[   23.541986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.542023]  kthread+0x328/0x630
[   23.542057]  ret_from_fork+0x10/0x20
[   23.542091] 
[   23.609514] The buggy address belongs to the physical page:
[   23.615073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   23.623057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.630695] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.637638] page_type: f8(unknown)
[   23.641036] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.648755] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.656482] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.664293] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.672107] head: 0bfffe0000000002 fffffdffe0175501 00000000ffffffff 00000000ffffffff
[   23.679918] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.687724] page dumped because: kasan: bad access detected
[   23.693279] 
[   23.694755] Memory state around the buggy address:
[   23.699535]  ffff000805d55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.706738]  ffff000805d56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.713945] >ffff000805d56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.721144]                                                           ^
[   23.727745]  ffff000805d56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.734950]  ffff000805d56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.742152] ==================================================================
[   21.203219] ==================================================================
[   21.210076] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   21.217623] Write of size 1 at addr ffff000803bc64da by task kunit_try_catch/207
[   21.225001] 
[   21.226488] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   21.226542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.226559] Hardware name: WinLink E850-96 board (DT)
[   21.226578] Call trace:
[   21.226590]  show_stack+0x20/0x38 (C)
[   21.226628]  dump_stack_lvl+0x8c/0xd0
[   21.226663]  print_report+0x118/0x608
[   21.226695]  kasan_report+0xdc/0x128
[   21.226726]  __asan_report_store1_noabort+0x20/0x30
[   21.226762]  krealloc_less_oob_helper+0xa80/0xc50
[   21.226791]  krealloc_less_oob+0x20/0x38
[   21.226816]  kunit_try_run_case+0x170/0x3f0
[   21.226850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.226886]  kthread+0x328/0x630
[   21.226921]  ret_from_fork+0x10/0x20
[   21.226957] 
[   21.293836] Allocated by task 207:
[   21.297227]  kasan_save_stack+0x3c/0x68
[   21.301041]  kasan_save_track+0x20/0x40
[   21.304860]  kasan_save_alloc_info+0x40/0x58
[   21.309114]  __kasan_krealloc+0x118/0x178
[   21.313107]  krealloc_noprof+0x128/0x360
[   21.317013]  krealloc_less_oob_helper+0x168/0xc50
[   21.321702]  krealloc_less_oob+0x20/0x38
[   21.325607]  kunit_try_run_case+0x170/0x3f0
[   21.329773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.335242]  kthread+0x328/0x630
[   21.338453]  ret_from_fork+0x10/0x20
[   21.342012] 
[   21.343491] The buggy address belongs to the object at ffff000803bc6400
[   21.343491]  which belongs to the cache kmalloc-256 of size 256
[   21.355990] The buggy address is located 17 bytes to the right of
[   21.355990]  allocated 201-byte region [ffff000803bc6400, ffff000803bc64c9)
[   21.369009] 
[   21.370487] The buggy address belongs to the physical page:
[   21.376043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   21.384028] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.391667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.398609] page_type: f5(slab)
[   21.401747] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.409466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.417193] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   21.425004] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.432817] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   21.440629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.448436] page dumped because: kasan: bad access detected
[   21.453990] 
[   21.455466] Memory state around the buggy address:
[   21.460247]  ffff000803bc6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.467451]  ffff000803bc6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.474655] >ffff000803bc6480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.481854]                                                     ^
[   21.487934]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.495140]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.502342] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   19.970321] ==================================================================
[   19.979369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   19.986914] Write of size 1 at addr ffff000800dec6eb by task kunit_try_catch/205
[   19.994290] 
[   19.995778] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   19.995829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.995844] Hardware name: WinLink E850-96 board (DT)
[   19.995864] Call trace:
[   19.995882]  show_stack+0x20/0x38 (C)
[   19.995917]  dump_stack_lvl+0x8c/0xd0
[   19.995956]  print_report+0x118/0x608
[   19.995988]  kasan_report+0xdc/0x128
[   19.996016]  __asan_report_store1_noabort+0x20/0x30
[   19.996051]  krealloc_more_oob_helper+0x60c/0x678
[   19.996081]  krealloc_more_oob+0x20/0x38
[   19.996107]  kunit_try_run_case+0x170/0x3f0
[   19.996143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.996181]  kthread+0x328/0x630
[   19.996216]  ret_from_fork+0x10/0x20
[   19.996250] 
[   20.063126] Allocated by task 205:
[   20.066517]  kasan_save_stack+0x3c/0x68
[   20.070330]  kasan_save_track+0x20/0x40
[   20.074150]  kasan_save_alloc_info+0x40/0x58
[   20.078403]  __kasan_krealloc+0x118/0x178
[   20.082396]  krealloc_noprof+0x128/0x360
[   20.086302]  krealloc_more_oob_helper+0x168/0x678
[   20.090991]  krealloc_more_oob+0x20/0x38
[   20.094896]  kunit_try_run_case+0x170/0x3f0
[   20.099062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.104531]  kthread+0x328/0x630
[   20.107743]  ret_from_fork+0x10/0x20
[   20.111302] 
[   20.112780] The buggy address belongs to the object at ffff000800dec600
[   20.112780]  which belongs to the cache kmalloc-256 of size 256
[   20.125281] The buggy address is located 0 bytes to the right of
[   20.125281]  allocated 235-byte region [ffff000800dec600, ffff000800dec6eb)
[   20.138211] 
[   20.139692] The buggy address belongs to the physical page:
[   20.145249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dec
[   20.153230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.160869] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.167813] page_type: f5(slab)
[   20.170950] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.178669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.186395] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.194207] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.202020] head: 0bfffe0000000002 fffffdffe0037b01 00000000ffffffff 00000000ffffffff
[   20.209832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.217639] page dumped because: kasan: bad access detected
[   20.223192] 
[   20.224668] Memory state around the buggy address:
[   20.229449]  ffff000800dec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.236653]  ffff000800dec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.243857] >ffff000800dec680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.251057]                                                           ^
[   20.257658]  ffff000800dec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.264863]  ffff000800dec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.272065] ==================================================================
[   22.125619] ==================================================================
[   22.134973] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   22.142522] Write of size 1 at addr ffff00080608a0eb by task kunit_try_catch/209
[   22.149900] 
[   22.151387] CPU: 2 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   22.151440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.151456] Hardware name: WinLink E850-96 board (DT)
[   22.151477] Call trace:
[   22.151491]  show_stack+0x20/0x38 (C)
[   22.151524]  dump_stack_lvl+0x8c/0xd0
[   22.151559]  print_report+0x118/0x608
[   22.151588]  kasan_report+0xdc/0x128
[   22.151616]  __asan_report_store1_noabort+0x20/0x30
[   22.151650]  krealloc_more_oob_helper+0x60c/0x678
[   22.151679]  krealloc_large_more_oob+0x20/0x38
[   22.151706]  kunit_try_run_case+0x170/0x3f0
[   22.151744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.151781]  kthread+0x328/0x630
[   22.151814]  ret_from_fork+0x10/0x20
[   22.151847] 
[   22.219259] The buggy address belongs to the physical page:
[   22.224816] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886088
[   22.232800] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.240438] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.247381] page_type: f8(unknown)
[   22.250780] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.258499] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.266225] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.274036] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.281849] head: 0bfffe0000000002 fffffdffe0182201 00000000ffffffff 00000000ffffffff
[   22.289662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.297470] page dumped because: kasan: bad access detected
[   22.303022] 
[   22.304498] Memory state around the buggy address:
[   22.309281]  ffff000806089f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.316483]  ffff00080608a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.323688] >ffff00080608a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.330887]                                                           ^
[   22.337488]  ffff00080608a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.344692]  ffff00080608a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.351895] ==================================================================
[   22.359298] ==================================================================
[   22.366309] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   22.373855] Write of size 1 at addr ffff00080608a0f0 by task kunit_try_catch/209
[   22.381234] 
[   22.382718] CPU: 2 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   22.382765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.382781] Hardware name: WinLink E850-96 board (DT)
[   22.382801] Call trace:
[   22.382813]  show_stack+0x20/0x38 (C)
[   22.382844]  dump_stack_lvl+0x8c/0xd0
[   22.382879]  print_report+0x118/0x608
[   22.382909]  kasan_report+0xdc/0x128
[   22.382938]  __asan_report_store1_noabort+0x20/0x30
[   22.382973]  krealloc_more_oob_helper+0x5c0/0x678
[   22.383002]  krealloc_large_more_oob+0x20/0x38
[   22.383030]  kunit_try_run_case+0x170/0x3f0
[   22.383065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.383102]  kthread+0x328/0x630
[   22.383135]  ret_from_fork+0x10/0x20
[   22.383167] 
[   22.450594] The buggy address belongs to the physical page:
[   22.456148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886088
[   22.464133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.471772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.478716] page_type: f8(unknown)
[   22.482109] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.489832] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.497558] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.505370] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.513184] head: 0bfffe0000000002 fffffdffe0182201 00000000ffffffff 00000000ffffffff
[   22.520995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.528801] page dumped because: kasan: bad access detected
[   22.534356] 
[   22.535831] Memory state around the buggy address:
[   22.540613]  ffff000806089f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.547815]  ffff00080608a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.555021] >ffff00080608a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.562220]                                                              ^
[   22.569083]  ffff00080608a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.576286]  ffff00080608a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.583487] ==================================================================
[   20.279396] ==================================================================
[   20.286478] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   20.294025] Write of size 1 at addr ffff000800dec6f0 by task kunit_try_catch/205
[   20.301404] 
[   20.302888] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   20.302939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.302953] Hardware name: WinLink E850-96 board (DT)
[   20.302972] Call trace:
[   20.302984]  show_stack+0x20/0x38 (C)
[   20.303016]  dump_stack_lvl+0x8c/0xd0
[   20.303050]  print_report+0x118/0x608
[   20.303081]  kasan_report+0xdc/0x128
[   20.303106]  __asan_report_store1_noabort+0x20/0x30
[   20.303142]  krealloc_more_oob_helper+0x5c0/0x678
[   20.303169]  krealloc_more_oob+0x20/0x38
[   20.303196]  kunit_try_run_case+0x170/0x3f0
[   20.303231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.303269]  kthread+0x328/0x630
[   20.303301]  ret_from_fork+0x10/0x20
[   20.303335] 
[   20.370239] Allocated by task 205:
[   20.373626]  kasan_save_stack+0x3c/0x68
[   20.377444]  kasan_save_track+0x20/0x40
[   20.381263]  kasan_save_alloc_info+0x40/0x58
[   20.385517]  __kasan_krealloc+0x118/0x178
[   20.389510]  krealloc_noprof+0x128/0x360
[   20.393416]  krealloc_more_oob_helper+0x168/0x678
[   20.398103]  krealloc_more_oob+0x20/0x38
[   20.402009]  kunit_try_run_case+0x170/0x3f0
[   20.406176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.411645]  kthread+0x328/0x630
[   20.414856]  ret_from_fork+0x10/0x20
[   20.418416] 
[   20.419893] The buggy address belongs to the object at ffff000800dec600
[   20.419893]  which belongs to the cache kmalloc-256 of size 256
[   20.432393] The buggy address is located 5 bytes to the right of
[   20.432393]  allocated 235-byte region [ffff000800dec600, ffff000800dec6eb)
[   20.445325] 
[   20.446804] The buggy address belongs to the physical page:
[   20.452360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dec
[   20.460342] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.467982] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.474926] page_type: f5(slab)
[   20.478061] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.485783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.493509] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   20.501320] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.509133] head: 0bfffe0000000002 fffffdffe0037b01 00000000ffffffff 00000000ffffffff
[   20.516945] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.524751] page dumped because: kasan: bad access detected
[   20.530306] 
[   20.531782] Memory state around the buggy address:
[   20.536561]  ffff000800dec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.543765]  ffff000800dec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.550971] >ffff000800dec680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.558170]                                                              ^
[   20.565032]  ffff000800dec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.572236]  ffff000800dec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.579437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   19.361157] ==================================================================
[   19.370954] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   19.377550] Read of size 1 at addr ffff000805d54000 by task kunit_try_catch/197
[   19.384840] 
[   19.386325] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   19.386382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.386399] Hardware name: WinLink E850-96 board (DT)
[   19.386420] Call trace:
[   19.386433]  show_stack+0x20/0x38 (C)
[   19.386469]  dump_stack_lvl+0x8c/0xd0
[   19.386506]  print_report+0x118/0x608
[   19.386535]  kasan_report+0xdc/0x128
[   19.386569]  __asan_report_load1_noabort+0x20/0x30
[   19.386605]  kmalloc_large_uaf+0x2cc/0x2f8
[   19.386637]  kunit_try_run_case+0x170/0x3f0
[   19.386672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.386710]  kthread+0x328/0x630
[   19.386744]  ret_from_fork+0x10/0x20
[   19.386777] 
[   19.449076] The buggy address belongs to the physical page:
[   19.454632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d54
[   19.462616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.469140] raw: 0bfffe0000000000 fffffdffe0175608 ffff00085af6f0c0 0000000000000000
[   19.476860] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.484577] page dumped because: kasan: bad access detected
[   19.490131] 
[   19.491606] Memory state around the buggy address:
[   19.496389]  ffff000805d53f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.503589]  ffff000805d53f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510797] >ffff000805d54000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.517995]                    ^
[   19.521211]  ffff000805d54080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.528415]  ffff000805d54100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.535618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   19.133640] ==================================================================
[   19.143091] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   19.150554] Write of size 1 at addr ffff00080310600a by task kunit_try_catch/195
[   19.157931] 
[   19.159419] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   19.159473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.159487] Hardware name: WinLink E850-96 board (DT)
[   19.159509] Call trace:
[   19.159524]  show_stack+0x20/0x38 (C)
[   19.159561]  dump_stack_lvl+0x8c/0xd0
[   19.159596]  print_report+0x118/0x608
[   19.159627]  kasan_report+0xdc/0x128
[   19.159657]  __asan_report_store1_noabort+0x20/0x30
[   19.159692]  kmalloc_large_oob_right+0x278/0x2b8
[   19.159724]  kunit_try_run_case+0x170/0x3f0
[   19.159760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.159798]  kthread+0x328/0x630
[   19.159832]  ret_from_fork+0x10/0x20
[   19.159866] 
[   19.222776] The buggy address belongs to the physical page:
[   19.228334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883104
[   19.236318] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.243956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.250898] page_type: f8(unknown)
[   19.254300] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.262016] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.269742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.277553] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.285367] head: 0bfffe0000000002 fffffdffe00c4101 00000000ffffffff 00000000ffffffff
[   19.293179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.300987] page dumped because: kasan: bad access detected
[   19.306540] 
[   19.308015] Memory state around the buggy address:
[   19.312795]  ffff000803105f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.319998]  ffff000803105f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.327205] >ffff000803106000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.334404]                       ^
[   19.337880]  ffff000803106080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.345085]  ffff000803106100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.352288] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   18.832855] ==================================================================
[   18.843538] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   18.850820] Write of size 1 at addr ffff000805f79f00 by task kunit_try_catch/193
[   18.858197] 
[   18.859682] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.859738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.859753] Hardware name: WinLink E850-96 board (DT)
[   18.859774] Call trace:
[   18.859788]  show_stack+0x20/0x38 (C)
[   18.859822]  dump_stack_lvl+0x8c/0xd0
[   18.859859]  print_report+0x118/0x608
[   18.859888]  kasan_report+0xdc/0x128
[   18.859918]  __asan_report_store1_noabort+0x20/0x30
[   18.859955]  kmalloc_big_oob_right+0x2a4/0x2f0
[   18.859991]  kunit_try_run_case+0x170/0x3f0
[   18.860025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.860063]  kthread+0x328/0x630
[   18.860098]  ret_from_fork+0x10/0x20
[   18.860132] 
[   18.922867] Allocated by task 193:
[   18.926254]  kasan_save_stack+0x3c/0x68
[   18.930071]  kasan_save_track+0x20/0x40
[   18.933891]  kasan_save_alloc_info+0x40/0x58
[   18.938143]  __kasan_kmalloc+0xd4/0xd8
[   18.941875]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.946389]  kmalloc_big_oob_right+0xb8/0x2f0
[   18.950729]  kunit_try_run_case+0x170/0x3f0
[   18.954896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.960364]  kthread+0x328/0x630
[   18.963576]  ret_from_fork+0x10/0x20
[   18.967135] 
[   18.968613] The buggy address belongs to the object at ffff000805f78000
[   18.968613]  which belongs to the cache kmalloc-8k of size 8192
[   18.981115] The buggy address is located 0 bytes to the right of
[   18.981115]  allocated 7936-byte region [ffff000805f78000, ffff000805f79f00)
[   18.994133] 
[   18.995611] The buggy address belongs to the physical page:
[   19.001166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f78
[   19.009150] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.016790] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.023733] page_type: f5(slab)
[   19.026870] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   19.034589] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.042315] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000
[   19.050127] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   19.057940] head: 0bfffe0000000003 fffffdffe017de01 00000000ffffffff 00000000ffffffff
[   19.065752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.073559] page dumped because: kasan: bad access detected
[   19.079113] 
[   19.080588] Memory state around the buggy address:
[   19.085370]  ffff000805f79e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.092573]  ffff000805f79e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.099780] >ffff000805f79f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.106977]                    ^
[   19.110193]  ffff000805f79f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.117399]  ffff000805f7a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.124600] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   18.364896] ==================================================================
[   18.374787] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   18.382859] Write of size 1 at addr ffff0008018e6b78 by task kunit_try_catch/191
[   18.390234] 
[   18.391721] CPU: 2 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.391777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.391793] Hardware name: WinLink E850-96 board (DT)
[   18.391815] Call trace:
[   18.391828]  show_stack+0x20/0x38 (C)
[   18.391861]  dump_stack_lvl+0x8c/0xd0
[   18.391899]  print_report+0x118/0x608
[   18.391931]  kasan_report+0xdc/0x128
[   18.391961]  __asan_report_store1_noabort+0x20/0x30
[   18.391996]  kmalloc_track_caller_oob_right+0x40c/0x488
[   18.392028]  kunit_try_run_case+0x170/0x3f0
[   18.392063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.392102]  kthread+0x328/0x630
[   18.392137]  ret_from_fork+0x10/0x20
[   18.392171] 
[   18.455686] Allocated by task 191:
[   18.459074]  kasan_save_stack+0x3c/0x68
[   18.462889]  kasan_save_track+0x20/0x40
[   18.466709]  kasan_save_alloc_info+0x40/0x58
[   18.470962]  __kasan_kmalloc+0xd4/0xd8
[   18.474695]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   18.480250]  kmalloc_track_caller_oob_right+0xa8/0x488
[   18.485371]  kunit_try_run_case+0x170/0x3f0
[   18.489538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.495006]  kthread+0x328/0x630
[   18.498219]  ret_from_fork+0x10/0x20
[   18.501778] 
[   18.503255] The buggy address belongs to the object at ffff0008018e6b00
[   18.503255]  which belongs to the cache kmalloc-128 of size 128
[   18.515756] The buggy address is located 0 bytes to the right of
[   18.515756]  allocated 120-byte region [ffff0008018e6b00, ffff0008018e6b78)
[   18.528687] 
[   18.530166] The buggy address belongs to the physical page:
[   18.535723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8818e6
[   18.543706] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.551345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.558289] page_type: f5(slab)
[   18.561426] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.569145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.576871] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   18.584682] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.592495] head: 0bfffe0000000001 fffffdffe0063981 00000000ffffffff 00000000ffffffff
[   18.600307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.608113] page dumped because: kasan: bad access detected
[   18.613668] 
[   18.615144] Memory state around the buggy address:
[   18.619926]  ffff0008018e6a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.627127]  ffff0008018e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.634333] >ffff0008018e6b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.641533]                                                                 ^
[   18.648653]  ffff0008018e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.655861]  ffff0008018e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.663061] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   18.065469] ==================================================================
[   18.074620] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   18.081993] Read of size 1 at addr ffff00080476f000 by task kunit_try_catch/189
[   18.089284] 
[   18.090771] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.090823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.090841] Hardware name: WinLink E850-96 board (DT)
[   18.090863] Call trace:
[   18.090875]  show_stack+0x20/0x38 (C)
[   18.090911]  dump_stack_lvl+0x8c/0xd0
[   18.090952]  print_report+0x118/0x608
[   18.090983]  kasan_report+0xdc/0x128
[   18.091013]  __asan_report_load1_noabort+0x20/0x30
[   18.091049]  kmalloc_node_oob_right+0x2f4/0x330
[   18.091077]  kunit_try_run_case+0x170/0x3f0
[   18.091112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.091148]  kthread+0x328/0x630
[   18.091184]  ret_from_fork+0x10/0x20
[   18.091218] 
[   18.153953] Allocated by task 189:
[   18.157342]  kasan_save_stack+0x3c/0x68
[   18.161157]  kasan_save_track+0x20/0x40
[   18.164979]  kasan_save_alloc_info+0x40/0x58
[   18.169231]  __kasan_kmalloc+0xd4/0xd8
[   18.172963]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   18.177911]  kmalloc_node_oob_right+0xbc/0x330
[   18.182338]  kunit_try_run_case+0x170/0x3f0
[   18.186504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.191973]  kthread+0x328/0x630
[   18.195185]  ret_from_fork+0x10/0x20
[   18.198744] 
[   18.200221] The buggy address belongs to the object at ffff00080476e000
[   18.200221]  which belongs to the cache kmalloc-4k of size 4096
[   18.212723] The buggy address is located 0 bytes to the right of
[   18.212723]  allocated 4096-byte region [ffff00080476e000, ffff00080476f000)
[   18.225740] 
[   18.227218] The buggy address belongs to the physical page:
[   18.232774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884768
[   18.240759] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.248398] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.255340] page_type: f5(slab)
[   18.258479] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   18.266198] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.273924] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000
[   18.281735] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   18.289548] head: 0bfffe0000000003 fffffdffe011da01 00000000ffffffff 00000000ffffffff
[   18.297360] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   18.305169] page dumped because: kasan: bad access detected
[   18.310722] 
[   18.312197] Memory state around the buggy address:
[   18.316979]  ffff00080476ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.324180]  ffff00080476ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.331386] >ffff00080476f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.338586]                    ^
[   18.341801]  ffff00080476f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.349006]  ffff00080476f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.356208] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.715385] ==================================================================
[   17.724711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.731565] Read of size 1 at addr ffff000803af22ff by task kunit_try_catch/187
[   17.738856] 
[   17.740340] CPU: 2 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.740392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.740409] Hardware name: WinLink E850-96 board (DT)
[   17.740429] Call trace:
[   17.740443]  show_stack+0x20/0x38 (C)
[   17.740476]  dump_stack_lvl+0x8c/0xd0
[   17.740513]  print_report+0x118/0x608
[   17.740543]  kasan_report+0xdc/0x128
[   17.740575]  __asan_report_load1_noabort+0x20/0x30
[   17.740610]  kmalloc_oob_left+0x2ec/0x320
[   17.740641]  kunit_try_run_case+0x170/0x3f0
[   17.740676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.740711]  kthread+0x328/0x630
[   17.740744]  ret_from_fork+0x10/0x20
[   17.740778] 
[   17.803004] Allocated by task 67:
[   17.806305]  kasan_save_stack+0x3c/0x68
[   17.810121]  kasan_save_track+0x20/0x40
[   17.813940]  kasan_save_alloc_info+0x40/0x58
[   17.818194]  __kasan_kmalloc+0xd4/0xd8
[   17.821928]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.827482]  kstrdup+0x54/0xc8
[   17.830520]  kstrdup_const+0x48/0x60
[   17.834079]  __kernfs_new_node+0xb0/0x578
[   17.838072]  kernfs_new_node+0x128/0x1a8
[   17.841979]  kernfs_create_link+0xac/0x228
[   17.846058]  sysfs_do_create_link_sd+0x8c/0x128
[   17.850572]  sysfs_create_link+0x48/0xb8
[   17.854480]  bus_add_device+0xf4/0x3a0
[   17.858211]  device_add+0x694/0x12b8
[   17.861770]  cdev_device_add+0xdc/0x208
[   17.865589]  mmc_blk_probe+0xa94/0x1508
[   17.869409]  mmc_bus_probe+0x60/0x88
[   17.872967]  really_probe+0x188/0x7f0
[   17.876613]  __driver_probe_device+0x164/0x378
[   17.881041]  driver_probe_device+0x64/0x180
[   17.885208]  __device_attach_driver+0x174/0x280
[   17.889721]  bus_for_each_drv+0x118/0x1b0
[   17.893714]  __device_attach+0x174/0x378
[   17.897620]  device_initial_probe+0x1c/0x30
[   17.901787]  bus_probe_device+0x12c/0x170
[   17.905780]  device_add+0xc44/0x12b8
[   17.909339]  mmc_add_card+0x304/0x660
[   17.912984]  mmc_attach_mmc+0x290/0x388
[   17.916805]  mmc_rescan+0x5d8/0xc80
[   17.920276]  process_one_work+0x530/0xf98
[   17.924269]  worker_thread+0x618/0xf38
[   17.928002]  kthread+0x328/0x630
[   17.931214]  ret_from_fork+0x10/0x20
[   17.934772] 
[   17.936250] The buggy address belongs to the object at ffff000803af22e0
[   17.936250]  which belongs to the cache kmalloc-16 of size 16
[   17.948576] The buggy address is located 19 bytes to the right of
[   17.948576]  allocated 12-byte region [ffff000803af22e0, ffff000803af22ec)
[   17.961508] 
[   17.962987] The buggy address belongs to the physical page:
[   17.968545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883af2
[   17.976529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.983037] page_type: f5(slab)
[   17.986173] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   17.993892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.001613] page dumped because: kasan: bad access detected
[   18.007167] 
[   18.008642] Memory state around the buggy address:
[   18.013423]  ffff000803af2180: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc
[   18.020627]  ffff000803af2200: 00 00 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc
[   18.027835] >ffff000803af2280: 00 05 fc fc 00 04 fc fc 00 04 fc fc 00 04 fc fc
[   18.035031]                                                                 ^
[   18.042153]  ffff000803af2300: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.049358]  ffff000803af2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.056561] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   16.819797] ==================================================================
[   16.826377] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.833315] Write of size 1 at addr ffff000800dac973 by task kunit_try_catch/185
[   16.840691] 
[   16.842179] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc2 #1 PREEMPT 
[   16.842233] Tainted: [N]=TEST
[   16.842247] Hardware name: WinLink E850-96 board (DT)
[   16.842269] Call trace:
[   16.842282]  show_stack+0x20/0x38 (C)
[   16.842317]  dump_stack_lvl+0x8c/0xd0
[   16.842357]  print_report+0x118/0x608
[   16.842389]  kasan_report+0xdc/0x128
[   16.842419]  __asan_report_store1_noabort+0x20/0x30
[   16.842453]  kmalloc_oob_right+0x5a4/0x660
[   16.842490]  kunit_try_run_case+0x170/0x3f0
[   16.842528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.842567]  kthread+0x328/0x630
[   16.842604]  ret_from_fork+0x10/0x20
[   16.842638] 
[   16.903799] Allocated by task 185:
[   16.907188]  kasan_save_stack+0x3c/0x68
[   16.911003]  kasan_save_track+0x20/0x40
[   16.914824]  kasan_save_alloc_info+0x40/0x58
[   16.919075]  __kasan_kmalloc+0xd4/0xd8
[   16.922809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.927322]  kmalloc_oob_right+0xb0/0x660
[   16.931315]  kunit_try_run_case+0x170/0x3f0
[   16.935482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.940950]  kthread+0x328/0x630
[   16.944162]  ret_from_fork+0x10/0x20
[   16.947721] 
[   16.949199] The buggy address belongs to the object at ffff000800dac900
[   16.949199]  which belongs to the cache kmalloc-128 of size 128
[   16.961700] The buggy address is located 0 bytes to the right of
[   16.961700]  allocated 115-byte region [ffff000800dac900, ffff000800dac973)
[   16.974631] 
[   16.976110] The buggy address belongs to the physical page:
[   16.981668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   16.989649] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.997289] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.004232] page_type: f5(slab)
[   17.007368] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.015088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.022815] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.030625] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.038439] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   17.046251] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.054059] page dumped because: kasan: bad access detected
[   17.059612] 
[   17.061087] Memory state around the buggy address:
[   17.065869]  ffff000800dac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.073070]  ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.080279] >ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.087476]                                                              ^
[   17.094337]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.101545]  ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.108745] ==================================================================
[   17.121316] ==================================================================
[   17.128452] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.135392] Write of size 1 at addr ffff000800dac978 by task kunit_try_catch/185
[   17.142770] 
[   17.144256] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.144310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.144325] Hardware name: WinLink E850-96 board (DT)
[   17.144343] Call trace:
[   17.144357]  show_stack+0x20/0x38 (C)
[   17.144390]  dump_stack_lvl+0x8c/0xd0
[   17.144427]  print_report+0x118/0x608
[   17.144457]  kasan_report+0xdc/0x128
[   17.144486]  __asan_report_store1_noabort+0x20/0x30
[   17.144520]  kmalloc_oob_right+0x538/0x660
[   17.144551]  kunit_try_run_case+0x170/0x3f0
[   17.144589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.144628]  kthread+0x328/0x630
[   17.144662]  ret_from_fork+0x10/0x20
[   17.144693] 
[   17.207092] Allocated by task 185:
[   17.210481]  kasan_save_stack+0x3c/0x68
[   17.214297]  kasan_save_track+0x20/0x40
[   17.218118]  kasan_save_alloc_info+0x40/0x58
[   17.222370]  __kasan_kmalloc+0xd4/0xd8
[   17.226103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.230616]  kmalloc_oob_right+0xb0/0x660
[   17.234609]  kunit_try_run_case+0x170/0x3f0
[   17.238776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.244244]  kthread+0x328/0x630
[   17.247456]  ret_from_fork+0x10/0x20
[   17.251015] 
[   17.252492] The buggy address belongs to the object at ffff000800dac900
[   17.252492]  which belongs to the cache kmalloc-128 of size 128
[   17.264991] The buggy address is located 5 bytes to the right of
[   17.264991]  allocated 115-byte region [ffff000800dac900, ffff000800dac973)
[   17.277924] 
[   17.279404] The buggy address belongs to the physical page:
[   17.284961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   17.292943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.300580] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.307525] page_type: f5(slab)
[   17.310661] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.318382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.326108] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.333920] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.341733] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   17.349544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.357350] page dumped because: kasan: bad access detected
[   17.362906] 
[   17.364381] Memory state around the buggy address:
[   17.369161]  ffff000800dac800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.376365]  ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383571] >ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.390770]                                                                 ^
[   17.397893]  ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.405098]  ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.412299] ==================================================================
[   17.419632] ==================================================================
[   17.426711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.433652] Read of size 1 at addr ffff000800dac980 by task kunit_try_catch/185
[   17.440943] 
[   17.442427] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.442478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.442493] Hardware name: WinLink E850-96 board (DT)
[   17.442510] Call trace:
[   17.442523]  show_stack+0x20/0x38 (C)
[   17.442553]  dump_stack_lvl+0x8c/0xd0
[   17.442588]  print_report+0x118/0x608
[   17.442619]  kasan_report+0xdc/0x128
[   17.442649]  __asan_report_load1_noabort+0x20/0x30
[   17.442685]  kmalloc_oob_right+0x5d0/0x660
[   17.442716]  kunit_try_run_case+0x170/0x3f0
[   17.442750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.442785]  kthread+0x328/0x630
[   17.442818]  ret_from_fork+0x10/0x20
[   17.442851] 
[   17.505178] Allocated by task 185:
[   17.508565]  kasan_save_stack+0x3c/0x68
[   17.512383]  kasan_save_track+0x20/0x40
[   17.516202]  kasan_save_alloc_info+0x40/0x58
[   17.520456]  __kasan_kmalloc+0xd4/0xd8
[   17.524188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.528702]  kmalloc_oob_right+0xb0/0x660
[   17.532695]  kunit_try_run_case+0x170/0x3f0
[   17.536861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.542330]  kthread+0x328/0x630
[   17.545542]  ret_from_fork+0x10/0x20
[   17.549101] 
[   17.550577] The buggy address belongs to the object at ffff000800dac900
[   17.550577]  which belongs to the cache kmalloc-128 of size 128
[   17.563077] The buggy address is located 13 bytes to the right of
[   17.563077]  allocated 115-byte region [ffff000800dac900, ffff000800dac973)
[   17.576097] 
[   17.577576] The buggy address belongs to the physical page:
[   17.583132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   17.591115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.598753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.605698] page_type: f5(slab)
[   17.608831] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.616555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.624281] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   17.632094] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.639906] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   17.647717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.655523] page dumped because: kasan: bad access detected
[   17.661078] 
[   17.662554] Memory state around the buggy address:
[   17.667335]  ffff000800dac880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674537]  ffff000800dac900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.681743] >ffff000800dac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.688943]                    ^
[   17.692160]  ffff000800daca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.699363]  ffff000800daca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.706564] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  162.762214] WARNING: CPU: 6 PID: 706 at lib/math/int_log.c:120 intlog10+0x38/0x48
[  162.769680] Modules linked in:
[  162.772727] CPU: 6 UID: 0 PID: 706 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.5-rc2 #1 PREEMPT 
[  162.782625] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  162.788428] Hardware name: WinLink E850-96 board (DT)
[  162.793467] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.800406] pc : intlog10+0x38/0x48
[  162.803878] lr : intlog10_test+0xe4/0x200
[  162.807871] sp : ffff80008ac27c10
[  162.811171] x29: ffff80008ac27c90 x28: 0000000000000000 x27: 0000000000000000
[  162.818287] x26: 1fffe0010031bcc1 x25: 0000000000000000 x24: ffff80008ac27ce0
[  162.825405] x23: ffff80008ac27d00 x22: 0000000000000000 x21: 1ffff00011584f82
[  162.832523] x20: ffff800083c35180 x19: ffff800087bc7990 x18: 000000006135fe5e
[  162.839641] x17: 0000000000000001 x16: ffff00085b014fe0 x15: 000000005b0a5111
[  162.846759] x14: 000000006808c972 x13: 1fffe0010b6029e0 x12: ffff700010f39b71
[  162.853877] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff800081214f04
[  162.860995] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  162.868113] x5 : ffff700011584f82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a30
[  162.875231] x2 : 1ffff00010786a30 x1 : 0000000000000003 x0 : 0000000000000000
[  162.882351] Call trace:
[  162.884782]  intlog10+0x38/0x48 (P)
[  162.888254]  kunit_try_run_case+0x170/0x3f0
[  162.892420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.897888]  kthread+0x328/0x630
[  162.901100]  ret_from_fork+0x10/0x20
[  162.904660] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  162.559786] WARNING: CPU: 3 PID: 688 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[  162.567078] Modules linked in:
[  162.570125] CPU: 3 UID: 0 PID: 688 Comm: kunit_try_catch Tainted: G    B D          N  6.15.5-rc2 #1 PREEMPT 
[  162.580026] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  162.584959] Hardware name: WinLink E850-96 board (DT)
[  162.589998] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  162.596936] pc : intlog2+0xd8/0xf8
[  162.600322] lr : intlog2_test+0xe4/0x200
[  162.604228] sp : ffff80008ab07c10
[  162.607527] x29: ffff80008ab07c90 x28: 0000000000000000 x27: 0000000000000000
[  162.614644] x26: 1fffe001001b4521 x25: 0000000000000000 x24: ffff80008ab07ce0
[  162.621762] x23: ffff80008ab07d00 x22: 0000000000000000 x21: 1ffff00011560f82
[  162.628880] x20: ffff800083c35080 x19: ffff800087bc7990 x18: 00000000acaa77a3
[  162.635998] x17: 0000000000000001 x16: ffff00085afaefe0 x15: 0000000000000000
[  162.643116] x14: 00000000f1f1f1f1 x13: 1fffe0010b5f5de0 x12: ffff700010f39b71
[  162.650234] x11: 1ffff00010f39b70 x10: ffff700010f39b70 x9 : ffff800081215104
[  162.657352] x8 : ffff8000879cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[  162.664470] x5 : ffff700011560f82 x4 : 1ffff00010f78f3a x3 : 1ffff00010786a10
[  162.671588] x2 : 1ffff00010786a10 x1 : 0000000000000003 x0 : 0000000000000000
[  162.678709] Call trace:
[  162.681140]  intlog2+0xd8/0xf8 (P)
[  162.684525]  kunit_try_run_case+0x170/0x3f0
[  162.688689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  162.694157]  kthread+0x328/0x630
[  162.697371]  ret_from_fork+0x10/0x20
[  162.700932] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)