Hay
Date
April 20, 2025, 11:09 p.m.
Failure - log-parser-test/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti
[  116.552034] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI
Failure - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  112.467706] ==================================================================
[  112.474949] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0
[  112.474949] 
[  112.483225] Use-after-free read at 0x000000005a09af96 (in kfence-#30):
[  112.489757]  test_krealloc+0x6fc/0xbe0
[  112.493510]  kunit_try_run_case+0x1a2/0x480
[  112.497706]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  112.503104]  kthread+0x334/0x6f0
[  112.506337]  ret_from_fork+0x3e/0x80
[  112.509924]  ret_from_fork_asm+0x1a/0x30
[  112.513850] 
[  112.515349] kfence-#30: 0x000000005a09af96-0x0000000030ba6615, size=32, cache=kmalloc-32
[  112.515349] 
[  112.524908] allocated by task 380 on cpu 2 at 112.467694s (0.057214s ago):
[  112.531792]  test_alloc+0x364/0x10f0
[  112.535377]  test_krealloc+0xad/0xbe0
[  112.539043]  kunit_try_run_case+0x1a2/0x480
[  112.543228]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  112.548629]  kthread+0x334/0x6f0
[  112.551861]  ret_from_fork+0x3e/0x80
[  112.555450]  ret_from_fork_asm+0x1a/0x30
[  112.559374] 
[  112.560875] freed by task 380 on cpu 2 at 112.467698s (0.093176s ago):
[  112.567410]  krealloc_noprof+0x108/0x340
[  112.571342]  test_krealloc+0x226/0xbe0
[  112.575093]  kunit_try_run_case+0x1a2/0x480
[  112.579282]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  112.584679]  kthread+0x334/0x6f0
[  112.587912]  ret_from_fork+0x3e/0x80
[  112.591491]  ret_from_fork_asm+0x1a/0x30
[  112.595416] 
[  112.596919] CPU: 2 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  112.607795] Tainted: [B]=BAD_PAGE, [N]=TEST
[  112.611988] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  112.619388] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  112.203434] ==================================================================
[  112.210671] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670
[  112.210671] 
[  112.220334] Use-after-free read at 0x000000008ffa412a (in kfence-#25):
[  112.226868]  test_memcache_typesafe_by_rcu+0x2ec/0x670
[  112.232015]  kunit_try_run_case+0x1a2/0x480
[  112.236210]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  112.241607]  kthread+0x334/0x6f0
[  112.244839]  ret_from_fork+0x3e/0x80
[  112.248419]  ret_from_fork_asm+0x1a/0x30
[  112.252345] 
[  112.253846] kfence-#25: 0x000000008ffa412a-0x0000000048d21650, size=32, cache=test
[  112.253846] 
[  112.262893] allocated by task 378 on cpu 2 at 112.179696s (0.083196s ago):
[  112.269774]  test_alloc+0x2a6/0x10f0
[  112.273353]  test_memcache_typesafe_by_rcu+0x16f/0x670
[  112.278501]  kunit_try_run_case+0x1a2/0x480
[  112.282685]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  112.288085]  kthread+0x334/0x6f0
[  112.291317]  ret_from_fork+0x3e/0x80
[  112.294896]  ret_from_fork_asm+0x1a/0x30
[  112.298824] 
[  112.300321] freed by task 378 on cpu 2 at 112.179699s (0.120622s ago):
[  112.306848]  test_memcache_typesafe_by_rcu+0x1bf/0x670
[  112.311988]  kunit_try_run_case+0x1a2/0x480
[  112.316182]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  112.321579]  kthread+0x334/0x6f0
[  112.324814]  ret_from_fork+0x3e/0x80
[  112.328402]  ret_from_fork_asm+0x1a/0x30
[  112.332337] 
[  112.333837] CPU: 2 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  112.344713] Tainted: [B]=BAD_PAGE, [N]=TEST
[  112.348897] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  112.356288] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   88.687590] ==================================================================
[   88.698734] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210
[   88.698734] 
[   88.706831] Invalid read at 0x00000000ca4ac57b:
[   88.711371]  test_invalid_access+0xf0/0x210
[   88.715558]  kunit_try_run_case+0x1a2/0x480
[   88.719753]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   88.725158]  kthread+0x334/0x6f0
[   88.728390]  ret_from_fork+0x3e/0x80
[   88.731972]  ret_from_fork_asm+0x1a/0x30
[   88.735904] 
[   88.737407] CPU: 3 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   88.748274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.752466] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   88.759859] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   88.307698] ==================================================================
[   88.314952] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340
[   88.314952] 
[   88.324527] Corrupted memory at 0x00000000ababc968 [ ! . . . . . . . . . . . . . . . ] (in kfence-#16):
[   88.333954]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   88.339181]  kunit_try_run_case+0x1a2/0x480
[   88.343377]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   88.348784]  kthread+0x334/0x6f0
[   88.352023]  ret_from_fork+0x3e/0x80
[   88.355603]  ret_from_fork_asm+0x1a/0x30
[   88.359528] 
[   88.361028] kfence-#16: 0x00000000c8d6d9e3-0x0000000083d00e9b, size=73, cache=kmalloc-96
[   88.361028] 
[   88.370597] allocated by task 368 on cpu 3 at 88.307690s (0.062907s ago):
[   88.377393]  test_alloc+0x364/0x10f0
[   88.380978]  test_kmalloc_aligned_oob_write+0xc8/0x340
[   88.386117]  kunit_try_run_case+0x1a2/0x480
[   88.390302]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   88.395703]  kthread+0x334/0x6f0
[   88.398935]  ret_from_fork+0x3e/0x80
[   88.402524]  ret_from_fork_asm+0x1a/0x30
[   88.406456] 
[   88.407957] freed by task 368 on cpu 3 at 88.307692s (0.100265s ago):
[   88.414406]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   88.419637]  kunit_try_run_case+0x1a2/0x480
[   88.423823]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   88.429223]  kthread+0x334/0x6f0
[   88.432457]  ret_from_fork+0x3e/0x80
[   88.436043]  ret_from_fork_asm+0x1a/0x30
[   88.439968] 
[   88.441471] CPU: 3 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   88.452347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.456538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   88.463931] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   87.971745] ==================================================================
[   87.978975] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560
[   87.978975] 
[   87.988551] Out-of-bounds read at 0x000000002a674aec (105B right of kfence-#13):
[   87.995955]  test_kmalloc_aligned_oob_read+0x27e/0x560
[   88.001099]  kunit_try_run_case+0x1a2/0x480
[   88.005286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   88.010686]  kthread+0x334/0x6f0
[   88.013926]  ret_from_fork+0x3e/0x80
[   88.017506]  ret_from_fork_asm+0x1a/0x30
[   88.021432] 
[   88.022932] kfence-#13: 0x00000000fecc7103-0x00000000b8d362f2, size=73, cache=kmalloc-96
[   88.022932] 
[   88.032501] allocated by task 366 on cpu 2 at 87.971726s (0.060774s ago):
[   88.039297]  test_alloc+0x364/0x10f0
[   88.042889]  test_kmalloc_aligned_oob_read+0x105/0x560
[   88.048027]  kunit_try_run_case+0x1a2/0x480
[   88.052215]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   88.057623]  kthread+0x334/0x6f0
[   88.060855]  ret_from_fork+0x3e/0x80
[   88.064434]  ret_from_fork_asm+0x1a/0x30
[   88.068360] 
[   88.069863] CPU: 2 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   88.080738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   88.084922] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   88.092314] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-memory-corruption-in-test_corruption
[   83.035695] ==================================================================
[   83.042949] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0
[   83.042949] 
[   83.051215] Corrupted memory at 0x00000000eeb29d35 [ ! ] (in kfence-#220):
[   83.058106]  test_corruption+0x2df/0x3e0
[   83.062031]  kunit_try_run_case+0x1a2/0x480
[   83.066217]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.071618]  kthread+0x334/0x6f0
[   83.074857]  ret_from_fork+0x3e/0x80
[   83.078436]  ret_from_fork_asm+0x1a/0x30
[   83.082362] 
[   83.083862] kfence-#220: 0x000000009708ca1e-0x000000003615cdb2, size=32, cache=kmalloc-32
[   83.083862] 
[   83.093517] allocated by task 354 on cpu 2 at 83.035688s (0.057828s ago):
[   83.100313]  test_alloc+0x364/0x10f0
[   83.103898]  test_corruption+0x1cb/0x3e0
[   83.107823]  kunit_try_run_case+0x1a2/0x480
[   83.112009]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.117410]  kthread+0x334/0x6f0
[   83.120649]  ret_from_fork+0x3e/0x80
[   83.124231]  ret_from_fork_asm+0x1a/0x30
[   83.128163] 
[   83.129664] freed by task 354 on cpu 2 at 83.035690s (0.093973s ago):
[   83.136112]  test_corruption+0x2df/0x3e0
[   83.140047]  kunit_try_run_case+0x1a2/0x480
[   83.144239]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.149640]  kthread+0x334/0x6f0
[   83.152880]  ret_from_fork+0x3e/0x80
[   83.156459]  ret_from_fork_asm+0x1a/0x30
[   83.160386] 
[   83.161885] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   83.172761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.176945] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   83.184340] ==================================================================
[   83.659697] ==================================================================
[   83.666945] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0
[   83.666945] 
[   83.675214] Corrupted memory at 0x0000000069ff76d1 [ ! ] (in kfence-#225):
[   83.682104]  test_corruption+0x216/0x3e0
[   83.686036]  kunit_try_run_case+0x1a2/0x480
[   83.690225]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.695631]  kthread+0x334/0x6f0
[   83.698864]  ret_from_fork+0x3e/0x80
[   83.702443]  ret_from_fork_asm+0x1a/0x30
[   83.706376] 
[   83.707878] kfence-#225: 0x00000000432f78f2-0x00000000fb2ed9ca, size=32, cache=test
[   83.707878] 
[   83.717011] allocated by task 356 on cpu 3 at 83.659690s (0.057320s ago):
[   83.723796]  test_alloc+0x2a6/0x10f0
[   83.727376]  test_corruption+0x1cb/0x3e0
[   83.731301]  kunit_try_run_case+0x1a2/0x480
[   83.735486]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.740887]  kthread+0x334/0x6f0
[   83.744129]  ret_from_fork+0x3e/0x80
[   83.747716]  ret_from_fork_asm+0x1a/0x30
[   83.751642] 
[   83.753140] freed by task 356 on cpu 3 at 83.659692s (0.093447s ago):
[   83.759582]  test_corruption+0x216/0x3e0
[   83.763514]  kunit_try_run_case+0x1a2/0x480
[   83.767700]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.773097]  kthread+0x334/0x6f0
[   83.776330]  ret_from_fork+0x3e/0x80
[   83.779909]  ret_from_fork_asm+0x1a/0x30
[   83.783836] 
[   83.785338] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   83.796213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.800397] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   83.807789] ==================================================================
[   83.395696] ==================================================================
[   83.402947] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0
[   83.402947] 
[   83.411213] Corrupted memory at 0x0000000053246d94 [ ! . . . . . . . . . . . . . . . ] (in kfence-#223):
[   83.420728]  test_corruption+0x131/0x3e0
[   83.424654]  kunit_try_run_case+0x1a2/0x480
[   83.428840]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.434240]  kthread+0x334/0x6f0
[   83.437479]  ret_from_fork+0x3e/0x80
[   83.441061]  ret_from_fork_asm+0x1a/0x30
[   83.444993] 
[   83.446495] kfence-#223: 0x0000000086d5d21f-0x00000000654567f4, size=32, cache=test
[   83.446495] 
[   83.455627] allocated by task 356 on cpu 3 at 83.395689s (0.059937s ago):
[   83.462413]  test_alloc+0x2a6/0x10f0
[   83.465992]  test_corruption+0xe6/0x3e0
[   83.469831]  kunit_try_run_case+0x1a2/0x480
[   83.474017]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.479416]  kthread+0x334/0x6f0
[   83.482648]  ret_from_fork+0x3e/0x80
[   83.486228]  ret_from_fork_asm+0x1a/0x30
[   83.490153] 
[   83.491652] freed by task 356 on cpu 3 at 83.395691s (0.095961s ago):
[   83.498095]  test_corruption+0x131/0x3e0
[   83.502027]  kunit_try_run_case+0x1a2/0x480
[   83.506213]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.511612]  kthread+0x334/0x6f0
[   83.514845]  ret_from_fork+0x3e/0x80
[   83.518422]  ret_from_fork_asm+0x1a/0x30
[   83.522348] 
[   83.523848] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   83.534724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   83.538909] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   83.546303] ==================================================================
[   82.771696] ==================================================================
[   82.778949] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0
[   82.778949] 
[   82.787216] Corrupted memory at 0x00000000ad0417e4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#218):
[   82.796731]  test_corruption+0x2d2/0x3e0
[   82.800657]  kunit_try_run_case+0x1a2/0x480
[   82.804842]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.810243]  kthread+0x334/0x6f0
[   82.813482]  ret_from_fork+0x3e/0x80
[   82.817061]  ret_from_fork_asm+0x1a/0x30
[   82.820987] 
[   82.822489] kfence-#218: 0x00000000c36692e5-0x0000000091b46842, size=32, cache=kmalloc-32
[   82.822489] 
[   82.832141] allocated by task 354 on cpu 2 at 82.771689s (0.060452s ago):
[   82.838930]  test_alloc+0x364/0x10f0
[   82.842515]  test_corruption+0xe6/0x3e0
[   82.846354]  kunit_try_run_case+0x1a2/0x480
[   82.850540]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.855938]  kthread+0x334/0x6f0
[   82.859171]  ret_from_fork+0x3e/0x80
[   82.862751]  ret_from_fork_asm+0x1a/0x30
[   82.866676] 
[   82.868177] freed by task 354 on cpu 2 at 82.771691s (0.096485s ago):
[   82.874627]  test_corruption+0x2d2/0x3e0
[   82.878559]  kunit_try_run_case+0x1a2/0x480
[   82.882751]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.888153]  kthread+0x334/0x6f0
[   82.891393]  ret_from_fork+0x3e/0x80
[   82.894972]  ret_from_fork_asm+0x1a/0x30
[   82.898897] 
[   82.900400] CPU: 2 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   82.911274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.915459] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.922853] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   82.315694] ==================================================================
[   82.322948] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260
[   82.322948] 
[   82.331389] Invalid free of 0x0000000067543a7f (in kfence-#214):
[   82.337403]  test_invalid_addr_free+0x1e1/0x260
[   82.341943]  kunit_try_run_case+0x1a2/0x480
[   82.346129]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.351527]  kthread+0x334/0x6f0
[   82.354760]  ret_from_fork+0x3e/0x80
[   82.358340]  ret_from_fork_asm+0x1a/0x30
[   82.362265] 
[   82.363763] kfence-#214: 0x00000000f19a890d-0x000000004ba9b37d, size=32, cache=kmalloc-32
[   82.363763] 
[   82.373411] allocated by task 350 on cpu 2 at 82.315689s (0.057722s ago):
[   82.380206]  test_alloc+0x364/0x10f0
[   82.383791]  test_invalid_addr_free+0xdb/0x260
[   82.388239]  kunit_try_run_case+0x1a2/0x480
[   82.392434]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.397832]  kthread+0x334/0x6f0
[   82.401065]  ret_from_fork+0x3e/0x80
[   82.404644]  ret_from_fork_asm+0x1a/0x30
[   82.408570] 
[   82.410070] CPU: 2 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   82.420945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.425130] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.432523] ==================================================================
[   82.547698] ==================================================================
[   82.554952] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260
[   82.554952] 
[   82.563306] Invalid free of 0x000000008e99abb9 (in kfence-#216):
[   82.569320]  test_invalid_addr_free+0xfb/0x260
[   82.573765]  kunit_try_run_case+0x1a2/0x480
[   82.577951]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.583349]  kthread+0x334/0x6f0
[   82.586582]  ret_from_fork+0x3e/0x80
[   82.590161]  ret_from_fork_asm+0x1a/0x30
[   82.594087] 
[   82.595588] kfence-#216: 0x00000000fdf017dc-0x000000003d2862a1, size=32, cache=test
[   82.595588] 
[   82.604720] allocated by task 352 on cpu 3 at 82.547692s (0.057027s ago):
[   82.611507]  test_alloc+0x2a6/0x10f0
[   82.615087]  test_invalid_addr_free+0xdb/0x260
[   82.619542]  kunit_try_run_case+0x1a2/0x480
[   82.623734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.629135]  kthread+0x334/0x6f0
[   82.632365]  ret_from_fork+0x3e/0x80
[   82.635945]  ret_from_fork_asm+0x1a/0x30
[   82.639872] 
[   82.641371] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   82.652239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.656424] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.663816] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-invalid-free-in-test_double_free
[   82.059698] ==================================================================
[   82.066954] BUG: KFENCE: invalid free in test_double_free+0x112/0x260
[   82.066954] 
[   82.074874] Invalid free of 0x0000000032446f97 (in kfence-#212):
[   82.080881]  test_double_free+0x112/0x260
[   82.084902]  kunit_try_run_case+0x1a2/0x480
[   82.089097]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.094494]  kthread+0x334/0x6f0
[   82.097726]  ret_from_fork+0x3e/0x80
[   82.101305]  ret_from_fork_asm+0x1a/0x30
[   82.105234] 
[   82.106731] kfence-#212: 0x0000000032446f97-0x000000005a398c24, size=32, cache=test
[   82.106731] 
[   82.115858] allocated by task 348 on cpu 2 at 82.059690s (0.056167s ago):
[   82.122655]  test_alloc+0x2a6/0x10f0
[   82.126240]  test_double_free+0xdb/0x260
[   82.130166]  kunit_try_run_case+0x1a2/0x480
[   82.134352]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.139749]  kthread+0x334/0x6f0
[   82.142981]  ret_from_fork+0x3e/0x80
[   82.146563]  ret_from_fork_asm+0x1a/0x30
[   82.150497] 
[   82.151994] freed by task 348 on cpu 2 at 82.059692s (0.092301s ago):
[   82.158438]  test_double_free+0xfa/0x260
[   82.162370]  kunit_try_run_case+0x1a2/0x480
[   82.166562]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.171964]  kthread+0x334/0x6f0
[   82.175204]  ret_from_fork+0x3e/0x80
[   82.178784]  ret_from_fork_asm+0x1a/0x30
[   82.182709] 
[   82.184209] CPU: 2 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   82.195085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   82.199272] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.206671] ==================================================================
[   81.803703] ==================================================================
[   81.810951] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260
[   81.810951] 
[   81.818865] Invalid free of 0x000000003f9651d0 (in kfence-#210):
[   81.824880]  test_double_free+0x1d3/0x260
[   81.828902]  kunit_try_run_case+0x1a2/0x480
[   81.833094]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.838494]  kthread+0x334/0x6f0
[   81.841734]  ret_from_fork+0x3e/0x80
[   81.845314]  ret_from_fork_asm+0x1a/0x30
[   81.849240] 
[   81.850739] kfence-#210: 0x000000003f9651d0-0x000000006e530434, size=32, cache=kmalloc-32
[   81.850739] 
[   81.860394] allocated by task 346 on cpu 2 at 81.803695s (0.056699s ago):
[   81.867190]  test_alloc+0x364/0x10f0
[   81.870775]  test_double_free+0xdb/0x260
[   81.874701]  kunit_try_run_case+0x1a2/0x480
[   81.878887]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.884285]  kthread+0x334/0x6f0
[   81.887518]  ret_from_fork+0x3e/0x80
[   81.891098]  ret_from_fork_asm+0x1a/0x30
[   81.895025] 
[   81.896522] freed by task 346 on cpu 2 at 81.803697s (0.092825s ago):
[   81.902962]  test_double_free+0x1e0/0x260
[   81.906975]  kunit_try_run_case+0x1a2/0x480
[   81.911168]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.916569]  kthread+0x334/0x6f0
[   81.919801]  ret_from_fork+0x3e/0x80
[   81.923387]  ret_from_fork_asm+0x1a/0x30
[   81.927314] 
[   81.928816] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   81.939691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.943876] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   81.951269] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   81.067696] ==================================================================
[   81.074943] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   81.074943] 
[   81.084165] Use-after-free read at 0x0000000066065150 (in kfence-#204):
[   81.090778]  test_use_after_free_read+0x129/0x270
[   81.095493]  kunit_try_run_case+0x1a2/0x480
[   81.099685]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.105086]  kthread+0x334/0x6f0
[   81.108325]  ret_from_fork+0x3e/0x80
[   81.111905]  ret_from_fork_asm+0x1a/0x30
[   81.115831] 
[   81.117332] kfence-#204: 0x0000000066065150-0x00000000846f7376, size=32, cache=kmalloc-32
[   81.117332] 
[   81.126984] allocated by task 338 on cpu 2 at 81.067691s (0.059293s ago):
[   81.133771]  test_alloc+0x364/0x10f0
[   81.137350]  test_use_after_free_read+0xdc/0x270
[   81.141977]  kunit_try_run_case+0x1a2/0x480
[   81.146163]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.151561]  kthread+0x334/0x6f0
[   81.154794]  ret_from_fork+0x3e/0x80
[   81.158374]  ret_from_fork_asm+0x1a/0x30
[   81.162300] 
[   81.163799] freed by task 338 on cpu 2 at 81.067693s (0.096105s ago):
[   81.170239]  test_use_after_free_read+0x1e7/0x270
[   81.174954]  kunit_try_run_case+0x1a2/0x480
[   81.179146]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.184547]  kthread+0x334/0x6f0
[   81.187787]  ret_from_fork+0x3e/0x80
[   81.191367]  ret_from_fork_asm+0x1a/0x30
[   81.195292] 
[   81.196792] CPU: 2 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   81.207668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.211853] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   81.219247] ==================================================================
[   81.331694] ==================================================================
[   81.338934] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   81.338934] 
[   81.348156] Use-after-free read at 0x0000000089d510cd (in kfence-#206):
[   81.354767]  test_use_after_free_read+0x129/0x270
[   81.359473]  kunit_try_run_case+0x1a2/0x480
[   81.363662]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.369059]  kthread+0x334/0x6f0
[   81.372291]  ret_from_fork+0x3e/0x80
[   81.375870]  ret_from_fork_asm+0x1a/0x30
[   81.379796] 
[   81.381297] kfence-#206: 0x0000000089d510cd-0x00000000633daf41, size=32, cache=test
[   81.381297] 
[   81.390432] allocated by task 340 on cpu 2 at 81.331689s (0.058743s ago):
[   81.397228]  test_alloc+0x2a6/0x10f0
[   81.400813]  test_use_after_free_read+0xdc/0x270
[   81.405432]  kunit_try_run_case+0x1a2/0x480
[   81.409618]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.415015]  kthread+0x334/0x6f0
[   81.418248]  ret_from_fork+0x3e/0x80
[   81.421827]  ret_from_fork_asm+0x1a/0x30
[   81.425753] 
[   81.427254] freed by task 340 on cpu 2 at 81.331691s (0.095563s ago):
[   81.433704]  test_use_after_free_read+0xfb/0x270
[   81.438329]  kunit_try_run_case+0x1a2/0x480
[   81.442515]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.447914]  kthread+0x334/0x6f0
[   81.451147]  ret_from_fork+0x3e/0x80
[   81.454733]  ret_from_fork_asm+0x1a/0x30
[   81.458659] 
[   81.460159] CPU: 2 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   81.471029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.475220] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   81.482612] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   80.835693] ==================================================================
[   80.842923] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   80.842923] 
[   80.852152] Out-of-bounds write at 0x00000000039c6529 (1B left of kfence-#202):
[   80.859464]  test_out_of_bounds_write+0x10d/0x260
[   80.864170]  kunit_try_run_case+0x1a2/0x480
[   80.868356]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.873755]  kthread+0x334/0x6f0
[   80.876989]  ret_from_fork+0x3e/0x80
[   80.880575]  ret_from_fork_asm+0x1a/0x30
[   80.884502] 
[   80.886001] kfence-#202: 0x00000000f61aaf20-0x00000000fbc7c81c, size=32, cache=test
[   80.886001] 
[   80.895128] allocated by task 336 on cpu 3 at 80.835690s (0.059438s ago):
[   80.901924]  test_alloc+0x2a6/0x10f0
[   80.905510]  test_out_of_bounds_write+0xd4/0x260
[   80.910138]  kunit_try_run_case+0x1a2/0x480
[   80.914323]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.919721]  kthread+0x334/0x6f0
[   80.922954]  ret_from_fork+0x3e/0x80
[   80.926534]  ret_from_fork_asm+0x1a/0x30
[   80.930459] 
[   80.931962] CPU: 3 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   80.942836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.947020] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.954413] ==================================================================
[   80.603692] ==================================================================
[   80.610917] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   80.610917] 
[   80.620139] Out-of-bounds write at 0x00000000fbf3aa82 (1B left of kfence-#200):
[   80.627452]  test_out_of_bounds_write+0x10d/0x260
[   80.632159]  kunit_try_run_case+0x1a2/0x480
[   80.636352]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.641752]  kthread+0x334/0x6f0
[   80.644992]  ret_from_fork+0x3e/0x80
[   80.648571]  ret_from_fork_asm+0x1a/0x30
[   80.652497] 
[   80.653998] kfence-#200: 0x00000000aec67ff4-0x000000000aecd525, size=32, cache=kmalloc-32
[   80.653998] 
[   80.663650] allocated by task 334 on cpu 1 at 80.603689s (0.059961s ago):
[   80.670438]  test_alloc+0x364/0x10f0
[   80.674026]  test_out_of_bounds_write+0xd4/0x260
[   80.678653]  kunit_try_run_case+0x1a2/0x480
[   80.682837]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.688236]  kthread+0x334/0x6f0
[   80.691471]  ret_from_fork+0x3e/0x80
[   80.695056]  ret_from_fork_asm+0x1a/0x30
[   80.698983] 
[   80.700484] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   80.711362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.715552] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.722947] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   79.907692] ==================================================================
[   79.914947] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   79.914947] 
[   79.923993] Out-of-bounds read at 0x00000000ccbf4d00 (32B right of kfence-#194):
[   79.931386]  test_out_of_bounds_read+0x216/0x4e0
[   79.936006]  kunit_try_run_case+0x1a2/0x480
[   79.940200]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.945600]  kthread+0x334/0x6f0
[   79.948832]  ret_from_fork+0x3e/0x80
[   79.952420]  ret_from_fork_asm+0x1a/0x30
[   79.956354] 
[   79.957854] kfence-#194: 0x00000000bd9d9feb-0x0000000089105e3b, size=32, cache=kmalloc-32
[   79.957854] 
[   79.967507] allocated by task 330 on cpu 0 at 79.907689s (0.059817s ago):
[   79.974294]  test_alloc+0x364/0x10f0
[   79.977872]  test_out_of_bounds_read+0x1e2/0x4e0
[   79.982492]  kunit_try_run_case+0x1a2/0x480
[   79.986679]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.992084]  kthread+0x334/0x6f0
[   79.995319]  ret_from_fork+0x3e/0x80
[   79.998906]  ret_from_fork_asm+0x1a/0x30
[   80.002831] 
[   80.004332] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   80.015209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.019394] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.026794] ==================================================================
[   80.371692] ==================================================================
[   80.378947] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   80.378947] 
[   80.387996] Out-of-bounds read at 0x00000000c4da9dbb (32B right of kfence-#198):
[   80.395396]  test_out_of_bounds_read+0x216/0x4e0
[   80.400014]  kunit_try_run_case+0x1a2/0x480
[   80.404200]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.409601]  kthread+0x334/0x6f0
[   80.412840]  ret_from_fork+0x3e/0x80
[   80.416419]  ret_from_fork_asm+0x1a/0x30
[   80.420345] 
[   80.421845] kfence-#198: 0x00000000c30b7b0f-0x00000000ff038385, size=32, cache=test
[   80.421845] 
[   80.430971] allocated by task 332 on cpu 2 at 80.371689s (0.059281s ago):
[   80.437767]  test_alloc+0x2a6/0x10f0
[   80.441353]  test_out_of_bounds_read+0x1e2/0x4e0
[   80.445972]  kunit_try_run_case+0x1a2/0x480
[   80.450157]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.455556]  kthread+0x334/0x6f0
[   80.458789]  ret_from_fork+0x3e/0x80
[   80.462368]  ret_from_fork_asm+0x1a/0x30
[   80.466294] 
[   80.467795] CPU: 2 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   80.478670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.482857] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.490247] ==================================================================
[   80.139693] ==================================================================
[   80.146943] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   80.146943] 
[   80.156000] Out-of-bounds read at 0x000000002c8a4e91 (1B left of kfence-#196):
[   80.163226]  test_out_of_bounds_read+0x126/0x4e0
[   80.167844]  kunit_try_run_case+0x1a2/0x480
[   80.172030]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.177432]  kthread+0x334/0x6f0
[   80.180670]  ret_from_fork+0x3e/0x80
[   80.184252]  ret_from_fork_asm+0x1a/0x30
[   80.188187] 
[   80.189685] kfence-#196: 0x0000000019a2b7d3-0x000000007fa0f8a8, size=32, cache=test
[   80.189685] 
[   80.198818] allocated by task 332 on cpu 2 at 80.139690s (0.059127s ago):
[   80.205607]  test_alloc+0x2a6/0x10f0
[   80.209194]  test_out_of_bounds_read+0xed/0x4e0
[   80.213733]  kunit_try_run_case+0x1a2/0x480
[   80.217919]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.223317]  kthread+0x334/0x6f0
[   80.226550]  ret_from_fork+0x3e/0x80
[   80.230130]  ret_from_fork_asm+0x1a/0x30
[   80.234056] 
[   80.235558] CPU: 2 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   80.246434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.250618] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.258017] ==================================================================
[   79.467712] ==================================================================
[   79.474959] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   79.474959] 
[   79.484008] Out-of-bounds read at 0x00000000c858a81c (1B left of kfence-#190):
[   79.491227]  test_out_of_bounds_read+0x126/0x4e0
[   79.495856]  kunit_try_run_case+0x1a2/0x480
[   79.500049]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.505449]  kthread+0x334/0x6f0
[   79.508693]  ret_from_fork+0x3e/0x80
[   79.512293]  ret_from_fork_asm+0x1a/0x30
[   79.516221] 
[   79.517730] kfence-#190: 0x0000000086a6f70f-0x000000005763439a, size=32, cache=kmalloc-32
[   79.517730] 
[   79.527383] allocated by task 330 on cpu 0 at 79.467707s (0.059675s ago):
[   79.534181]  test_alloc+0x364/0x10f0
[   79.537766]  test_out_of_bounds_read+0xed/0x4e0
[   79.542305]  kunit_try_run_case+0x1a2/0x480
[   79.546491]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.551890]  kthread+0x334/0x6f0
[   79.555123]  ret_from_fork+0x3e/0x80
[   79.558721]  ret_from_fork_asm+0x1a/0x30
[   79.562656] 
[   79.564182] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   79.575056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.579241] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   79.586635] ==================================================================
Failure - log-parser-test/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   15.554725] ==================================================================
[   15.578176] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520
[   15.578176] 
[   15.587759] Corrupted memory at 0x00000000096a7a31 [ ! . . . . . . . . . . . . . . . ] (in kfence-#67):
[   15.597181]  kmalloc_track_caller_oob_right+0x288/0x520
[   15.602406]  kunit_try_run_case+0x1a2/0x480
[   15.606592]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.611990]  kthread+0x334/0x6f0
[   15.615224]  ret_from_fork+0x3e/0x80
[   15.618803]  ret_from_fork_asm+0x1a/0x30
[   15.622737] 
[   15.624235] kfence-#67: 0x00000000e6f7e92c-0x00000000a764e060, size=120, cache=kmalloc-128
[   15.624235] 
[   15.633968] allocated by task 185 on cpu 3 at 15.554666s (0.079301s ago):
[   15.640755]  kmalloc_track_caller_oob_right+0x19a/0x520
[   15.645989]  kunit_try_run_case+0x1a2/0x480
[   15.650176]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.655574]  kthread+0x334/0x6f0
[   15.658807]  ret_from_fork+0x3e/0x80
[   15.662384]  ret_from_fork_asm+0x1a/0x30
[   15.666313] 
[   15.667811] freed by task 185 on cpu 3 at 15.554720s (0.113090s ago):
[   15.674251]  kmalloc_track_caller_oob_right+0x288/0x520
[   15.679485]  kunit_try_run_case+0x1a2/0x480
[   15.683687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.689096]  kthread+0x334/0x6f0
[   15.692329]  ret_from_fork+0x3e/0x80
[   15.695915]  ret_from_fork_asm+0x1a/0x30
[   15.699843] 
[   15.701341] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.712209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.716393] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.723785] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[  152.714756] ==================================================================
[  152.727639] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  152.736731] Read of size 12 at addr ffffffffb96ccd00 by task kunit_try_catch/4207
[  152.744215] 
[  152.745738] CPU: 3 UID: 0 PID: 4207 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  152.745745] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  152.745747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  152.745750] Call Trace:
[  152.745752]  <TASK>
[  152.745754]  dump_stack_lvl+0x73/0xb0
[  152.745759]  print_report+0xd1/0x650
[  152.745765]  ? __virt_addr_valid+0x1db/0x2d0
[  152.745769]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  152.745773]  ? kasan_addr_to_slab+0x11/0xa0
[  152.745777]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  152.745781]  kasan_report+0x141/0x180
[  152.745785]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  152.745790]  kasan_check_range+0x10c/0x1c0
[  152.745795]  __asan_memcpy+0x27/0x70
[  152.745798]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  152.745802]  ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10
[  152.745807]  ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10
[  152.745811]  ? __pfx__cs_dsp_remove_wrapper+0x10/0x10
[  152.745816]  cs_dsp_mock_bin_add_info+0x12/0x20
[  152.745819]  bin_patch_name_and_info+0x1a1/0x8d0
[  152.745824]  ? __pfx_bin_patch_name_and_info+0x10/0x10
[  152.745829]  ? __pfx_kfree_action_wrapper+0x10/0x10
[  152.745834]  ? kunit_add_action_or_reset+0x1d/0x40
[  152.745838]  ? ktime_get_ts64+0x83/0x230
[  152.745843]  kunit_try_run_case+0x1a2/0x480
[  152.745847]  ? __pfx_kunit_try_run_case+0x10/0x10
[  152.745851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  152.745856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  152.745860]  ? __kthread_parkme+0x82/0x180
[  152.745864]  ? preempt_count_sub+0x50/0x80
[  152.745869]  ? __pfx_kunit_try_run_case+0x10/0x10
[  152.745873]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  152.745876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  152.745880]  kthread+0x334/0x6f0
[  152.745884]  ? trace_preempt_on+0x20/0xc0
[  152.745889]  ? __pfx_kthread+0x10/0x10
[  152.745893]  ? _raw_spin_unlock_irq+0x47/0x80
[  152.745897]  ? calculate_sigpending+0x7b/0xa0
[  152.745901]  ? __pfx_kthread+0x10/0x10
[  152.745905]  ret_from_fork+0x3e/0x80
[  152.745909]  ? __pfx_kthread+0x10/0x10
[  152.745913]  ret_from_fork_asm+0x1a/0x30
[  152.745919]  </TASK>
[  152.745921] 
[  152.953654] The buggy address belongs to the variable:
[  152.958818]  __loc.16+0x80/0x540
[  152.962052] 
[  152.963549] The buggy address belongs to the physical page:
[  152.969123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23eacc
[  152.977123] flags: 0x200000000002000(reserved|node=0|zone=2)
[  152.982784] raw: 0200000000002000 ffffea0008fab308 ffffea0008fab308 0000000000000000
[  152.990522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  152.998260] page dumped because: kasan: bad access detected
[  153.003831] 
[  153.005330] Memory state around the buggy address:
[  153.010123]  ffffffffb96ccc00: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[  153.017343]  ffffffffb96ccc80: 00 00 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
[  153.024563] >ffffffffb96ccd00: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9
[  153.031780]                       ^
[  153.035274]  ffffffffb96ccd80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9
[  153.042493]  ffffffffb96cce00: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9
[  153.049735] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   79.026243] ==================================================================
[   79.033483] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   79.040444] Write of size 1 at addr ffff888104ee9778 by task kunit_try_catch/328
[   79.047835] 
[   79.049336] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   79.049344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.049346] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   79.049350] Call Trace:
[   79.049351]  <TASK>
[   79.049353]  dump_stack_lvl+0x73/0xb0
[   79.049357]  print_report+0xd1/0x650
[   79.049361]  ? __virt_addr_valid+0x1db/0x2d0
[   79.049365]  ? strncpy_from_user+0x1a5/0x1d0
[   79.049369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   79.049373]  ? strncpy_from_user+0x1a5/0x1d0
[   79.049378]  kasan_report+0x141/0x180
[   79.049382]  ? strncpy_from_user+0x1a5/0x1d0
[   79.049387]  __asan_report_store1_noabort+0x1b/0x30
[   79.049391]  strncpy_from_user+0x1a5/0x1d0
[   79.049396]  copy_user_test_oob+0x760/0x10f0
[   79.049400]  ? __pfx_copy_user_test_oob+0x10/0x10
[   79.049403]  ? finish_task_switch.isra.0+0x153/0x700
[   79.049408]  ? __switch_to+0x5d9/0xf60
[   79.049412]  ? dequeue_task_fair+0x166/0x4e0
[   79.049417]  ? __schedule+0x10cc/0x2b30
[   79.049421]  ? ktime_get_ts64+0x83/0x230
[   79.049426]  kunit_try_run_case+0x1a2/0x480
[   79.049431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.049435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   79.049440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   79.049445]  ? __kthread_parkme+0x82/0x180
[   79.049449]  ? preempt_count_sub+0x50/0x80
[   79.049454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.049458]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.049462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   79.049466]  kthread+0x334/0x6f0
[   79.049471]  ? trace_preempt_on+0x20/0xc0
[   79.049475]  ? __pfx_kthread+0x10/0x10
[   79.049480]  ? _raw_spin_unlock_irq+0x47/0x80
[   79.049484]  ? calculate_sigpending+0x7b/0xa0
[   79.049488]  ? __pfx_kthread+0x10/0x10
[   79.049492]  ret_from_fork+0x3e/0x80
[   79.049497]  ? __pfx_kthread+0x10/0x10
[   79.049501]  ret_from_fork_asm+0x1a/0x30
[   79.049507]  </TASK>
[   79.049509] 
[   79.229764] Allocated by task 328:
[   79.233172]  kasan_save_stack+0x45/0x70
[   79.237011]  kasan_save_track+0x18/0x40
[   79.240851]  kasan_save_alloc_info+0x3b/0x50
[   79.245121]  __kasan_kmalloc+0xb7/0xc0
[   79.248874]  __kmalloc_noprof+0x1c9/0x500
[   79.252887]  kunit_kmalloc_array+0x25/0x60
[   79.256985]  copy_user_test_oob+0xab/0x10f0
[   79.261174]  kunit_try_run_case+0x1a2/0x480
[   79.265366]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.270766]  kthread+0x334/0x6f0
[   79.273998]  ret_from_fork+0x3e/0x80
[   79.277576]  ret_from_fork_asm+0x1a/0x30
[   79.281503] 
[   79.283001] The buggy address belongs to the object at ffff888104ee9700
[   79.283001]  which belongs to the cache kmalloc-128 of size 128
[   79.295509] The buggy address is located 0 bytes to the right of
[   79.295509]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   79.308464] 
[   79.309964] The buggy address belongs to the physical page:
[   79.315535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   79.323535] flags: 0x200000000000000(node=0|zone=2)
[   79.328414] page_type: f5(slab)
[   79.331562] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   79.339309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   79.347056] page dumped because: kasan: bad access detected
[   79.352628] 
[   79.354126] Memory state around the buggy address:
[   79.358918]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.366139]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.373358] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.380576]                                                                 ^
[   79.387708]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.394929]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.402156] ==================================================================
[   78.636281] ==================================================================
[   78.643529] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   78.650408] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   78.657975] 
[   78.659476] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   78.659484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.659486] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.659489] Call Trace:
[   78.659491]  <TASK>
[   78.659493]  dump_stack_lvl+0x73/0xb0
[   78.659497]  print_report+0xd1/0x650
[   78.659501]  ? __virt_addr_valid+0x1db/0x2d0
[   78.659505]  ? strncpy_from_user+0x2e/0x1d0
[   78.659509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.659514]  ? strncpy_from_user+0x2e/0x1d0
[   78.659518]  kasan_report+0x141/0x180
[   78.659522]  ? strncpy_from_user+0x2e/0x1d0
[   78.659527]  kasan_check_range+0x10c/0x1c0
[   78.659532]  __kasan_check_write+0x18/0x20
[   78.659536]  strncpy_from_user+0x2e/0x1d0
[   78.659540]  ? __kasan_check_read+0x15/0x20
[   78.659544]  copy_user_test_oob+0x760/0x10f0
[   78.659548]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.659552]  ? finish_task_switch.isra.0+0x153/0x700
[   78.659556]  ? __switch_to+0x5d9/0xf60
[   78.659560]  ? dequeue_task_fair+0x166/0x4e0
[   78.659565]  ? __schedule+0x10cc/0x2b30
[   78.659569]  ? ktime_get_ts64+0x83/0x230
[   78.659574]  kunit_try_run_case+0x1a2/0x480
[   78.659579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.659583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.659588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.659593]  ? __kthread_parkme+0x82/0x180
[   78.659597]  ? preempt_count_sub+0x50/0x80
[   78.659602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.659606]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.659611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.659615]  kthread+0x334/0x6f0
[   78.659619]  ? trace_preempt_on+0x20/0xc0
[   78.659623]  ? __pfx_kthread+0x10/0x10
[   78.659628]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.659632]  ? calculate_sigpending+0x7b/0xa0
[   78.659636]  ? __pfx_kthread+0x10/0x10
[   78.659641]  ret_from_fork+0x3e/0x80
[   78.659645]  ? __pfx_kthread+0x10/0x10
[   78.659649]  ret_from_fork_asm+0x1a/0x30
[   78.659655]  </TASK>
[   78.659657] 
[   78.847088] Allocated by task 328:
[   78.850495]  kasan_save_stack+0x45/0x70
[   78.854335]  kasan_save_track+0x18/0x40
[   78.858174]  kasan_save_alloc_info+0x3b/0x50
[   78.862446]  __kasan_kmalloc+0xb7/0xc0
[   78.866198]  __kmalloc_noprof+0x1c9/0x500
[   78.870210]  kunit_kmalloc_array+0x25/0x60
[   78.874310]  copy_user_test_oob+0xab/0x10f0
[   78.878495]  kunit_try_run_case+0x1a2/0x480
[   78.882705]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.888123]  kthread+0x334/0x6f0
[   78.891358]  ret_from_fork+0x3e/0x80
[   78.894946]  ret_from_fork_asm+0x1a/0x30
[   78.898880] 
[   78.900377] The buggy address belongs to the object at ffff888104ee9700
[   78.900377]  which belongs to the cache kmalloc-128 of size 128
[   78.912885] The buggy address is located 0 bytes inside of
[   78.912885]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   78.925320] 
[   78.926819] The buggy address belongs to the physical page:
[   78.932392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   78.940399] flags: 0x200000000000000(node=0|zone=2)
[   78.945277] page_type: f5(slab)
[   78.948424] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.956165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.963912] page dumped because: kasan: bad access detected
[   78.969482] 
[   78.970981] Memory state around the buggy address:
[   78.975775]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.982994]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.990212] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.997430]                                                                 ^
[   79.004566]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.011794]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.019019] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   78.253756] ==================================================================
[   78.260997] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   78.268132] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   78.275619] 
[   78.277118] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   78.277126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.277128] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.277131] Call Trace:
[   78.277133]  <TASK>
[   78.277135]  dump_stack_lvl+0x73/0xb0
[   78.277139]  print_report+0xd1/0x650
[   78.277143]  ? __virt_addr_valid+0x1db/0x2d0
[   78.277147]  ? copy_user_test_oob+0x604/0x10f0
[   78.277150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.277155]  ? copy_user_test_oob+0x604/0x10f0
[   78.277158]  kasan_report+0x141/0x180
[   78.277163]  ? copy_user_test_oob+0x604/0x10f0
[   78.277167]  kasan_check_range+0x10c/0x1c0
[   78.277172]  __kasan_check_read+0x15/0x20
[   78.277176]  copy_user_test_oob+0x604/0x10f0
[   78.277180]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.277184]  ? finish_task_switch.isra.0+0x153/0x700
[   78.277188]  ? __switch_to+0x5d9/0xf60
[   78.277192]  ? dequeue_task_fair+0x166/0x4e0
[   78.277197]  ? __schedule+0x10cc/0x2b30
[   78.277201]  ? ktime_get_ts64+0x83/0x230
[   78.277206]  kunit_try_run_case+0x1a2/0x480
[   78.277211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.277215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.277220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.277224]  ? __kthread_parkme+0x82/0x180
[   78.277229]  ? preempt_count_sub+0x50/0x80
[   78.277233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.277238]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.277242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.277246]  kthread+0x334/0x6f0
[   78.277250]  ? trace_preempt_on+0x20/0xc0
[   78.277255]  ? __pfx_kthread+0x10/0x10
[   78.277259]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.277263]  ? calculate_sigpending+0x7b/0xa0
[   78.277267]  ? __pfx_kthread+0x10/0x10
[   78.277272]  ret_from_fork+0x3e/0x80
[   78.277276]  ? __pfx_kthread+0x10/0x10
[   78.277280]  ret_from_fork_asm+0x1a/0x30
[   78.277286]  </TASK>
[   78.277288] 
[   78.457141] Allocated by task 328:
[   78.460548]  kasan_save_stack+0x45/0x70
[   78.464386]  kasan_save_track+0x18/0x40
[   78.468227]  kasan_save_alloc_info+0x3b/0x50
[   78.472500]  __kasan_kmalloc+0xb7/0xc0
[   78.476259]  __kmalloc_noprof+0x1c9/0x500
[   78.480274]  kunit_kmalloc_array+0x25/0x60
[   78.484380]  copy_user_test_oob+0xab/0x10f0
[   78.488567]  kunit_try_run_case+0x1a2/0x480
[   78.492762]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.498159]  kthread+0x334/0x6f0
[   78.501393]  ret_from_fork+0x3e/0x80
[   78.504981]  ret_from_fork_asm+0x1a/0x30
[   78.508905] 
[   78.510405] The buggy address belongs to the object at ffff888104ee9700
[   78.510405]  which belongs to the cache kmalloc-128 of size 128
[   78.522920] The buggy address is located 0 bytes inside of
[   78.522920]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   78.535355] 
[   78.536854] The buggy address belongs to the physical page:
[   78.542426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   78.550426] flags: 0x200000000000000(node=0|zone=2)
[   78.555305] page_type: f5(slab)
[   78.558453] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.566201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.573946] page dumped because: kasan: bad access detected
[   78.579517] 
[   78.581019] Memory state around the buggy address:
[   78.585811]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.593038]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.600258] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.607474]                                                                 ^
[   78.614609]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.621837]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.629056] ==================================================================
[   77.488256] ==================================================================
[   77.495482] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   77.502615] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   77.510102] 
[   77.511601] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   77.511609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.511611] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.511615] Call Trace:
[   77.511617]  <TASK>
[   77.511619]  dump_stack_lvl+0x73/0xb0
[   77.511623]  print_report+0xd1/0x650
[   77.511627]  ? __virt_addr_valid+0x1db/0x2d0
[   77.511631]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.511635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.511639]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.511643]  kasan_report+0x141/0x180
[   77.511647]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.511652]  kasan_check_range+0x10c/0x1c0
[   77.511657]  __kasan_check_read+0x15/0x20
[   77.511661]  copy_user_test_oob+0x4aa/0x10f0
[   77.511665]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.511668]  ? finish_task_switch.isra.0+0x153/0x700
[   77.511690]  ? __switch_to+0x5d9/0xf60
[   77.511694]  ? dequeue_task_fair+0x166/0x4e0
[   77.511699]  ? __schedule+0x10cc/0x2b30
[   77.511704]  ? ktime_get_ts64+0x83/0x230
[   77.511709]  kunit_try_run_case+0x1a2/0x480
[   77.511714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.511718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.511735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.511740]  ? __kthread_parkme+0x82/0x180
[   77.511744]  ? preempt_count_sub+0x50/0x80
[   77.511749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.511753]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.511758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.511762]  kthread+0x334/0x6f0
[   77.511766]  ? trace_preempt_on+0x20/0xc0
[   77.511771]  ? __pfx_kthread+0x10/0x10
[   77.511775]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.511780]  ? calculate_sigpending+0x7b/0xa0
[   77.511784]  ? __pfx_kthread+0x10/0x10
[   77.511788]  ret_from_fork+0x3e/0x80
[   77.511792]  ? __pfx_kthread+0x10/0x10
[   77.511797]  ret_from_fork_asm+0x1a/0x30
[   77.511803]  </TASK>
[   77.511805] 
[   77.691762] Allocated by task 328:
[   77.695170]  kasan_save_stack+0x45/0x70
[   77.699010]  kasan_save_track+0x18/0x40
[   77.702857]  kasan_save_alloc_info+0x3b/0x50
[   77.707129]  __kasan_kmalloc+0xb7/0xc0
[   77.710880]  __kmalloc_noprof+0x1c9/0x500
[   77.714893]  kunit_kmalloc_array+0x25/0x60
[   77.718994]  copy_user_test_oob+0xab/0x10f0
[   77.723179]  kunit_try_run_case+0x1a2/0x480
[   77.727365]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.732764]  kthread+0x334/0x6f0
[   77.735995]  ret_from_fork+0x3e/0x80
[   77.739574]  ret_from_fork_asm+0x1a/0x30
[   77.743500] 
[   77.744999] The buggy address belongs to the object at ffff888104ee9700
[   77.744999]  which belongs to the cache kmalloc-128 of size 128
[   77.757505] The buggy address is located 0 bytes inside of
[   77.757505]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   77.769934] 
[   77.771433] The buggy address belongs to the physical page:
[   77.777006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   77.785012] flags: 0x200000000000000(node=0|zone=2)
[   77.789893] page_type: f5(slab)
[   77.793038] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.800778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.808525] page dumped because: kasan: bad access detected
[   77.814096] 
[   77.815595] Memory state around the buggy address:
[   77.820388]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.827608]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.834837] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.842063]                                                                 ^
[   77.849195]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.856413]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.863632] ==================================================================
[   77.870878] ==================================================================
[   77.878098] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   77.885238] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   77.892804] 
[   77.894305] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   77.894313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.894316] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.894319] Call Trace:
[   77.894321]  <TASK>
[   77.894323]  dump_stack_lvl+0x73/0xb0
[   77.894326]  print_report+0xd1/0x650
[   77.894331]  ? __virt_addr_valid+0x1db/0x2d0
[   77.894335]  ? copy_user_test_oob+0x557/0x10f0
[   77.894338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.894343]  ? copy_user_test_oob+0x557/0x10f0
[   77.894347]  kasan_report+0x141/0x180
[   77.894351]  ? copy_user_test_oob+0x557/0x10f0
[   77.894356]  kasan_check_range+0x10c/0x1c0
[   77.894360]  __kasan_check_write+0x18/0x20
[   77.894364]  copy_user_test_oob+0x557/0x10f0
[   77.894368]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.894372]  ? finish_task_switch.isra.0+0x153/0x700
[   77.894376]  ? __switch_to+0x5d9/0xf60
[   77.894380]  ? dequeue_task_fair+0x166/0x4e0
[   77.894385]  ? __schedule+0x10cc/0x2b30
[   77.894389]  ? ktime_get_ts64+0x83/0x230
[   77.894394]  kunit_try_run_case+0x1a2/0x480
[   77.894399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.894403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.894408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.894413]  ? __kthread_parkme+0x82/0x180
[   77.894417]  ? preempt_count_sub+0x50/0x80
[   77.894421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.894426]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.894430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.894434]  kthread+0x334/0x6f0
[   77.894438]  ? trace_preempt_on+0x20/0xc0
[   77.894443]  ? __pfx_kthread+0x10/0x10
[   77.894447]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.894452]  ? calculate_sigpending+0x7b/0xa0
[   77.894456]  ? __pfx_kthread+0x10/0x10
[   77.894460]  ret_from_fork+0x3e/0x80
[   77.894464]  ? __pfx_kthread+0x10/0x10
[   77.894469]  ret_from_fork_asm+0x1a/0x30
[   77.894475]  </TASK>
[   77.894476] 
[   78.074439] Allocated by task 328:
[   78.077847]  kasan_save_stack+0x45/0x70
[   78.081708]  kasan_save_track+0x18/0x40
[   78.085550]  kasan_save_alloc_info+0x3b/0x50
[   78.089822]  __kasan_kmalloc+0xb7/0xc0
[   78.093574]  __kmalloc_noprof+0x1c9/0x500
[   78.097587]  kunit_kmalloc_array+0x25/0x60
[   78.101705]  copy_user_test_oob+0xab/0x10f0
[   78.105899]  kunit_try_run_case+0x1a2/0x480
[   78.110085]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.115485]  kthread+0x334/0x6f0
[   78.118742]  ret_from_fork+0x3e/0x80
[   78.122322]  ret_from_fork_asm+0x1a/0x30
[   78.126255] 
[   78.127754] The buggy address belongs to the object at ffff888104ee9700
[   78.127754]  which belongs to the cache kmalloc-128 of size 128
[   78.140268] The buggy address is located 0 bytes inside of
[   78.140268]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   78.152704] 
[   78.154231] The buggy address belongs to the physical page:
[   78.159803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   78.167809] flags: 0x200000000000000(node=0|zone=2)
[   78.172705] page_type: f5(slab)
[   78.175879] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.183626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.191364] page dumped because: kasan: bad access detected
[   78.196938] 
[   78.198437] Memory state around the buggy address:
[   78.203230]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.210450]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.217703] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.224930]                                                                 ^
[   78.232061]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.239282]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.246508] ==================================================================
[   77.105322] ==================================================================
[   77.112555] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   77.119705] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   77.127296] 
[   77.128795] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   77.128804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   77.128807] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.128810] Call Trace:
[   77.128812]  <TASK>
[   77.128814]  dump_stack_lvl+0x73/0xb0
[   77.128819]  print_report+0xd1/0x650
[   77.128823]  ? __virt_addr_valid+0x1db/0x2d0
[   77.128827]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.128831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.128836]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.128839]  kasan_report+0x141/0x180
[   77.128844]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.128848]  kasan_check_range+0x10c/0x1c0
[   77.128853]  __kasan_check_write+0x18/0x20
[   77.128857]  copy_user_test_oob+0x3fd/0x10f0
[   77.128861]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.128865]  ? finish_task_switch.isra.0+0x153/0x700
[   77.128870]  ? __switch_to+0x5d9/0xf60
[   77.128874]  ? dequeue_task_fair+0x166/0x4e0
[   77.128878]  ? __schedule+0x10cc/0x2b30
[   77.128883]  ? ktime_get_ts64+0x83/0x230
[   77.128888]  kunit_try_run_case+0x1a2/0x480
[   77.128893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.128897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.128902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.128907]  ? __kthread_parkme+0x82/0x180
[   77.128911]  ? preempt_count_sub+0x50/0x80
[   77.128916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.128920]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.128925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.128929]  kthread+0x334/0x6f0
[   77.128933]  ? trace_preempt_on+0x20/0xc0
[   77.128938]  ? __pfx_kthread+0x10/0x10
[   77.128942]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.128947]  ? calculate_sigpending+0x7b/0xa0
[   77.128951]  ? __pfx_kthread+0x10/0x10
[   77.128955]  ret_from_fork+0x3e/0x80
[   77.128960]  ? __pfx_kthread+0x10/0x10
[   77.128964]  ret_from_fork_asm+0x1a/0x30
[   77.128970]  </TASK>
[   77.128972] 
[   77.308957] Allocated by task 328:
[   77.312363]  kasan_save_stack+0x45/0x70
[   77.316202]  kasan_save_track+0x18/0x40
[   77.320041]  kasan_save_alloc_info+0x3b/0x50
[   77.324315]  __kasan_kmalloc+0xb7/0xc0
[   77.328074]  __kmalloc_noprof+0x1c9/0x500
[   77.332086]  kunit_kmalloc_array+0x25/0x60
[   77.336187]  copy_user_test_oob+0xab/0x10f0
[   77.340372]  kunit_try_run_case+0x1a2/0x480
[   77.344557]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.349957]  kthread+0x334/0x6f0
[   77.353190]  ret_from_fork+0x3e/0x80
[   77.356769]  ret_from_fork_asm+0x1a/0x30
[   77.360707] 
[   77.362229] The buggy address belongs to the object at ffff888104ee9700
[   77.362229]  which belongs to the cache kmalloc-128 of size 128
[   77.374748] The buggy address is located 0 bytes inside of
[   77.374748]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   77.387178] 
[   77.388704] The buggy address belongs to the physical page:
[   77.394303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   77.402311] flags: 0x200000000000000(node=0|zone=2)
[   77.407189] page_type: f5(slab)
[   77.410336] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.418084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.425831] page dumped because: kasan: bad access detected
[   77.431403] 
[   77.432903] Memory state around the buggy address:
[   77.437707]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.444933]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.452160] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.459386]                                                                 ^
[   77.466519]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.473757]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.480982] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user
[   76.721839] ==================================================================
[   76.729064] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x4a/0x70
[   76.735518] Read of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   76.742997] 
[   76.744499] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   76.744508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.744510] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   76.744514] Call Trace:
[   76.744516]  <TASK>
[   76.744517]  dump_stack_lvl+0x73/0xb0
[   76.744521]  print_report+0xd1/0x650
[   76.744526]  ? __virt_addr_valid+0x1db/0x2d0
[   76.744530]  ? _copy_to_user+0x4a/0x70
[   76.744534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   76.744539]  ? _copy_to_user+0x4a/0x70
[   76.744544]  kasan_report+0x141/0x180
[   76.744548]  ? _copy_to_user+0x4a/0x70
[   76.744554]  kasan_check_range+0x10c/0x1c0
[   76.744558]  __kasan_check_read+0x15/0x20
[   76.744562]  _copy_to_user+0x4a/0x70
[   76.744567]  copy_user_test_oob+0x364/0x10f0
[   76.744571]  ? __pfx_copy_user_test_oob+0x10/0x10
[   76.744575]  ? finish_task_switch.isra.0+0x153/0x700
[   76.744579]  ? __switch_to+0x5d9/0xf60
[   76.744583]  ? dequeue_task_fair+0x166/0x4e0
[   76.744588]  ? __schedule+0x10cc/0x2b30
[   76.744593]  ? ktime_get_ts64+0x83/0x230
[   76.744598]  kunit_try_run_case+0x1a2/0x480
[   76.744602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.744607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   76.744611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   76.744616]  ? __kthread_parkme+0x82/0x180
[   76.744620]  ? preempt_count_sub+0x50/0x80
[   76.744625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.744630]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.744634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   76.744639]  kthread+0x334/0x6f0
[   76.744643]  ? trace_preempt_on+0x20/0xc0
[   76.744647]  ? __pfx_kthread+0x10/0x10
[   76.744652]  ? _raw_spin_unlock_irq+0x47/0x80
[   76.744656]  ? calculate_sigpending+0x7b/0xa0
[   76.744660]  ? __pfx_kthread+0x10/0x10
[   76.744665]  ret_from_fork+0x3e/0x80
[   76.744669]  ? __pfx_kthread+0x10/0x10
[   76.744691]  ret_from_fork_asm+0x1a/0x30
[   76.744697]  </TASK>
[   76.744698] 
[   76.926089] Allocated by task 328:
[   76.929495]  kasan_save_stack+0x45/0x70
[   76.933336]  kasan_save_track+0x18/0x40
[   76.937183]  kasan_save_alloc_info+0x3b/0x50
[   76.941455]  __kasan_kmalloc+0xb7/0xc0
[   76.945210]  __kmalloc_noprof+0x1c9/0x500
[   76.949228]  kunit_kmalloc_array+0x25/0x60
[   76.953328]  copy_user_test_oob+0xab/0x10f0
[   76.957516]  kunit_try_run_case+0x1a2/0x480
[   76.961710]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.967132]  kthread+0x334/0x6f0
[   76.970365]  ret_from_fork+0x3e/0x80
[   76.973945]  ret_from_fork_asm+0x1a/0x30
[   76.977870] 
[   76.979370] The buggy address belongs to the object at ffff888104ee9700
[   76.979370]  which belongs to the cache kmalloc-128 of size 128
[   76.991884] The buggy address is located 0 bytes inside of
[   76.991884]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   77.004311] 
[   77.005812] The buggy address belongs to the physical page:
[   77.011385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   77.019391] flags: 0x200000000000000(node=0|zone=2)
[   77.024269] page_type: f5(slab)
[   77.027418] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.035164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.042902] page dumped because: kasan: bad access detected
[   77.048475] 
[   77.049974] Memory state around the buggy address:
[   77.054768]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.061987]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.069214] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.076433]                                                                 ^
[   77.083566]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.090783]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.098002] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user
[   76.331041] ==================================================================
[   76.344368] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90
[   76.350989] Write of size 121 at addr ffff888104ee9700 by task kunit_try_catch/328
[   76.358563] 
[   76.360064] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   76.360073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.360076] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   76.360080] Call Trace:
[   76.360082]  <TASK>
[   76.360084]  dump_stack_lvl+0x73/0xb0
[   76.360088]  print_report+0xd1/0x650
[   76.360092]  ? __virt_addr_valid+0x1db/0x2d0
[   76.360096]  ? _copy_from_user+0x32/0x90
[   76.360101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   76.360105]  ? _copy_from_user+0x32/0x90
[   76.360110]  kasan_report+0x141/0x180
[   76.360114]  ? _copy_from_user+0x32/0x90
[   76.360120]  kasan_check_range+0x10c/0x1c0
[   76.360125]  __kasan_check_write+0x18/0x20
[   76.360129]  _copy_from_user+0x32/0x90
[   76.360133]  copy_user_test_oob+0x2be/0x10f0
[   76.360138]  ? __pfx_copy_user_test_oob+0x10/0x10
[   76.360141]  ? finish_task_switch.isra.0+0x153/0x700
[   76.360146]  ? __switch_to+0x5d9/0xf60
[   76.360150]  ? dequeue_task_fair+0x166/0x4e0
[   76.360154]  ? __schedule+0x10cc/0x2b30
[   76.360159]  ? ktime_get_ts64+0x83/0x230
[   76.360164]  kunit_try_run_case+0x1a2/0x480
[   76.360169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.360173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   76.360178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   76.360183]  ? __kthread_parkme+0x82/0x180
[   76.360187]  ? preempt_count_sub+0x50/0x80
[   76.360191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.360196]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.360200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   76.360204]  kthread+0x334/0x6f0
[   76.360209]  ? trace_preempt_on+0x20/0xc0
[   76.360213]  ? __pfx_kthread+0x10/0x10
[   76.360218]  ? _raw_spin_unlock_irq+0x47/0x80
[   76.360222]  ? calculate_sigpending+0x7b/0xa0
[   76.360226]  ? __pfx_kthread+0x10/0x10
[   76.360230]  ret_from_fork+0x3e/0x80
[   76.360234]  ? __pfx_kthread+0x10/0x10
[   76.360239]  ret_from_fork_asm+0x1a/0x30
[   76.360245]  </TASK>
[   76.360246] 
[   76.542462] Allocated by task 328:
[   76.545867]  kasan_save_stack+0x45/0x70
[   76.549716]  kasan_save_track+0x18/0x40
[   76.553579]  kasan_save_alloc_info+0x3b/0x50
[   76.557851]  __kasan_kmalloc+0xb7/0xc0
[   76.561605]  __kmalloc_noprof+0x1c9/0x500
[   76.565615]  kunit_kmalloc_array+0x25/0x60
[   76.569737]  copy_user_test_oob+0xab/0x10f0
[   76.573929]  kunit_try_run_case+0x1a2/0x480
[   76.578123]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.583522]  kthread+0x334/0x6f0
[   76.586762]  ret_from_fork+0x3e/0x80
[   76.590343]  ret_from_fork_asm+0x1a/0x30
[   76.594275] 
[   76.595777] The buggy address belongs to the object at ffff888104ee9700
[   76.595777]  which belongs to the cache kmalloc-128 of size 128
[   76.608291] The buggy address is located 0 bytes inside of
[   76.608291]  allocated 120-byte region [ffff888104ee9700, ffff888104ee9778)
[   76.620748] 
[   76.622251] The buggy address belongs to the physical page:
[   76.627823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   76.635830] flags: 0x200000000000000(node=0|zone=2)
[   76.640709] page_type: f5(slab)
[   76.643882] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   76.651623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   76.659368] page dumped because: kasan: bad access detected
[   76.664940] 
[   76.666432] Memory state around the buggy address:
[   76.671224]  ffff888104ee9600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.678444]  ffff888104ee9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.685661] >ffff888104ee9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.692907]                                                                 ^
[   76.700039]  ffff888104ee9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.707259]  ffff888104ee9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.714487] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   75.943037] ==================================================================
[   75.950268] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   75.957583] Write of size 8 at addr ffff88810633a778 by task kunit_try_catch/324
[   75.964974] 
[   75.966475] CPU: 3 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   75.966484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.966486] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.966489] Call Trace:
[   75.966491]  <TASK>
[   75.966493]  dump_stack_lvl+0x73/0xb0
[   75.966497]  print_report+0xd1/0x650
[   75.966502]  ? __virt_addr_valid+0x1db/0x2d0
[   75.966506]  ? copy_to_kernel_nofault+0x99/0x260
[   75.966510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.966515]  ? copy_to_kernel_nofault+0x99/0x260
[   75.966520]  kasan_report+0x141/0x180
[   75.966524]  ? copy_to_kernel_nofault+0x99/0x260
[   75.966530]  kasan_check_range+0x10c/0x1c0
[   75.966535]  __kasan_check_write+0x18/0x20
[   75.966539]  copy_to_kernel_nofault+0x99/0x260
[   75.966544]  copy_to_kernel_nofault_oob+0x288/0x560
[   75.966548]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   75.966553]  ? finish_task_switch.isra.0+0x153/0x700
[   75.966558]  ? __schedule+0x10cc/0x2b30
[   75.966562]  ? trace_hardirqs_on+0x37/0xe0
[   75.966568]  ? ktime_get_ts64+0x83/0x230
[   75.966573]  kunit_try_run_case+0x1a2/0x480
[   75.966578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.966582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.966587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.966592]  ? __kthread_parkme+0x82/0x180
[   75.966596]  ? preempt_count_sub+0x50/0x80
[   75.966601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.966605]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.966609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.966614]  kthread+0x334/0x6f0
[   75.966618]  ? trace_preempt_on+0x20/0xc0
[   75.966622]  ? __pfx_kthread+0x10/0x10
[   75.966627]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.966631]  ? calculate_sigpending+0x7b/0xa0
[   75.966635]  ? __pfx_kthread+0x10/0x10
[   75.966639]  ret_from_fork+0x3e/0x80
[   75.966643]  ? __pfx_kthread+0x10/0x10
[   75.966648]  ret_from_fork_asm+0x1a/0x30
[   75.966654]  </TASK>
[   75.966656] 
[   76.148962] Allocated by task 324:
[   76.152367]  kasan_save_stack+0x45/0x70
[   76.156214]  kasan_save_track+0x18/0x40
[   76.160054]  kasan_save_alloc_info+0x3b/0x50
[   76.164335]  __kasan_kmalloc+0xb7/0xc0
[   76.168086]  __kmalloc_cache_noprof+0x189/0x420
[   76.172620]  copy_to_kernel_nofault_oob+0x12f/0x560
[   76.177508]  kunit_try_run_case+0x1a2/0x480
[   76.181692]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.187119]  kthread+0x334/0x6f0
[   76.190359]  ret_from_fork+0x3e/0x80
[   76.193939]  ret_from_fork_asm+0x1a/0x30
[   76.197864] 
[   76.199364] The buggy address belongs to the object at ffff88810633a700
[   76.199364]  which belongs to the cache kmalloc-128 of size 128
[   76.211878] The buggy address is located 0 bytes to the right of
[   76.211878]  allocated 120-byte region [ffff88810633a700, ffff88810633a778)
[   76.224835] 
[   76.226333] The buggy address belongs to the physical page:
[   76.231906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   76.239914] flags: 0x200000000000000(node=0|zone=2)
[   76.244801] page_type: f5(slab)
[   76.247949] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   76.255695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   76.263443] page dumped because: kasan: bad access detected
[   76.269014] 
[   76.270513] Memory state around the buggy address:
[   76.275305]  ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.282525]  ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.289745] >ffff88810633a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.296973]                                                                 ^
[   76.304113]  ffff88810633a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.311331]  ffff88810633a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.318549] ==================================================================
[   75.555721] ==================================================================
[   75.570618] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   75.578017] Read of size 8 at addr ffff88810633a778 by task kunit_try_catch/324
[   75.585324] 
[   75.586824] CPU: 3 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   75.586833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.586835] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.586839] Call Trace:
[   75.586841]  <TASK>
[   75.586843]  dump_stack_lvl+0x73/0xb0
[   75.586847]  print_report+0xd1/0x650
[   75.586852]  ? __virt_addr_valid+0x1db/0x2d0
[   75.586856]  ? copy_to_kernel_nofault+0x225/0x260
[   75.586860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.586865]  ? copy_to_kernel_nofault+0x225/0x260
[   75.586870]  kasan_report+0x141/0x180
[   75.586874]  ? copy_to_kernel_nofault+0x225/0x260
[   75.586880]  __asan_report_load8_noabort+0x18/0x20
[   75.586884]  copy_to_kernel_nofault+0x225/0x260
[   75.586889]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   75.586894]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   75.586899]  ? finish_task_switch.isra.0+0x153/0x700
[   75.586904]  ? __schedule+0x10cc/0x2b30
[   75.586908]  ? trace_hardirqs_on+0x37/0xe0
[   75.586915]  ? ktime_get_ts64+0x83/0x230
[   75.586920]  kunit_try_run_case+0x1a2/0x480
[   75.586924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.586929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.586934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.586938]  ? __kthread_parkme+0x82/0x180
[   75.586943]  ? preempt_count_sub+0x50/0x80
[   75.586947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.586952]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.586957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.586961]  kthread+0x334/0x6f0
[   75.586965]  ? trace_preempt_on+0x20/0xc0
[   75.586970]  ? __pfx_kthread+0x10/0x10
[   75.586974]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.586979]  ? calculate_sigpending+0x7b/0xa0
[   75.586983]  ? __pfx_kthread+0x10/0x10
[   75.586987]  ret_from_fork+0x3e/0x80
[   75.586992]  ? __pfx_kthread+0x10/0x10
[   75.586996]  ret_from_fork_asm+0x1a/0x30
[   75.587002]  </TASK>
[   75.587004] 
[   75.766224] Allocated by task 324:
[   75.769628]  kasan_save_stack+0x45/0x70
[   75.773467]  kasan_save_track+0x18/0x40
[   75.777306]  kasan_save_alloc_info+0x3b/0x50
[   75.781579]  __kasan_kmalloc+0xb7/0xc0
[   75.785331]  __kmalloc_cache_noprof+0x189/0x420
[   75.789865]  copy_to_kernel_nofault_oob+0x12f/0x560
[   75.794745]  kunit_try_run_case+0x1a2/0x480
[   75.798938]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.804336]  kthread+0x334/0x6f0
[   75.807569]  ret_from_fork+0x3e/0x80
[   75.811149]  ret_from_fork_asm+0x1a/0x30
[   75.815076] 
[   75.816573] The buggy address belongs to the object at ffff88810633a700
[   75.816573]  which belongs to the cache kmalloc-128 of size 128
[   75.829079] The buggy address is located 0 bytes to the right of
[   75.829079]  allocated 120-byte region [ffff88810633a700, ffff88810633a778)
[   75.842026] 
[   75.843525] The buggy address belongs to the physical page:
[   75.849098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   75.857107] flags: 0x200000000000000(node=0|zone=2)
[   75.861987] page_type: f5(slab)
[   75.865134] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   75.872880] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   75.880628] page dumped because: kasan: bad access detected
[   75.886198] 
[   75.887698] Memory state around the buggy address:
[   75.892509]  ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.899739]  ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.906964] >ffff88810633a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.914181]                                                                 ^
[   75.921314]  ffff88810633a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.928535]  ffff88810633a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.935761] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   64.520218] ==================================================================
[   64.527446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   64.534840] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   64.542239] 
[   64.543740] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   64.543747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.543749] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.543753] Call Trace:
[   64.543754]  <TASK>
[   64.543756]  dump_stack_lvl+0x73/0xb0
[   64.543760]  print_report+0xd1/0x650
[   64.543764]  ? __virt_addr_valid+0x1db/0x2d0
[   64.543768]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.543772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.543777]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.543781]  kasan_report+0x141/0x180
[   64.543785]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.543790]  __asan_report_store8_noabort+0x1b/0x30
[   64.543794]  kasan_atomics_helper+0x50d4/0x5450
[   64.543798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.543803]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.543807]  ? kasan_atomics+0x152/0x310
[   64.543811]  kasan_atomics+0x1dc/0x310
[   64.543814]  ? __pfx_kasan_atomics+0x10/0x10
[   64.543818]  ? ktime_get_ts64+0x83/0x230
[   64.543823]  kunit_try_run_case+0x1a2/0x480
[   64.543827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.543832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.543837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.543841]  ? __kthread_parkme+0x82/0x180
[   64.543845]  ? preempt_count_sub+0x50/0x80
[   64.543850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.543855]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.543859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.543863]  kthread+0x334/0x6f0
[   64.543867]  ? trace_preempt_on+0x20/0xc0
[   64.543872]  ? __pfx_kthread+0x10/0x10
[   64.543876]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.543881]  ? calculate_sigpending+0x7b/0xa0
[   64.543885]  ? __pfx_kthread+0x10/0x10
[   64.543889]  ret_from_fork+0x3e/0x80
[   64.543894]  ? __pfx_kthread+0x10/0x10
[   64.543898]  ret_from_fork_asm+0x1a/0x30
[   64.543904]  </TASK>
[   64.543906] 
[   64.721510] Allocated by task 308:
[   64.724916]  kasan_save_stack+0x45/0x70
[   64.728755]  kasan_save_track+0x18/0x40
[   64.732594]  kasan_save_alloc_info+0x3b/0x50
[   64.736866]  __kasan_kmalloc+0xb7/0xc0
[   64.740618]  __kmalloc_cache_noprof+0x189/0x420
[   64.745151]  kasan_atomics+0x95/0x310
[   64.748819]  kunit_try_run_case+0x1a2/0x480
[   64.753013]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.758412]  kthread+0x334/0x6f0
[   64.761652]  ret_from_fork+0x3e/0x80
[   64.765232]  ret_from_fork_asm+0x1a/0x30
[   64.769164] 
[   64.770664] The buggy address belongs to the object at ffff8881061f7500
[   64.770664]  which belongs to the cache kmalloc-64 of size 64
[   64.783023] The buggy address is located 0 bytes to the right of
[   64.783023]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   64.795884] 
[   64.797384] The buggy address belongs to the physical page:
[   64.802954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   64.810954] flags: 0x200000000000000(node=0|zone=2)
[   64.815833] page_type: f5(slab)
[   64.818982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.826737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.834484] page dumped because: kasan: bad access detected
[   64.840057] 
[   64.841556] Memory state around the buggy address:
[   64.846347]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.853568]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.860795] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.868021]                                      ^
[   64.872815]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.880035]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.887262] ==================================================================
[   55.483797] ==================================================================
[   55.491027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   55.498333] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   55.505741] 
[   55.507243] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   55.507251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.507253] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.507257] Call Trace:
[   55.507258]  <TASK>
[   55.507260]  dump_stack_lvl+0x73/0xb0
[   55.507264]  print_report+0xd1/0x650
[   55.507268]  ? __virt_addr_valid+0x1db/0x2d0
[   55.507272]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.507276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.507280]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.507285]  kasan_report+0x141/0x180
[   55.507289]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.507294]  kasan_check_range+0x10c/0x1c0
[   55.507299]  __kasan_check_write+0x18/0x20
[   55.507303]  kasan_atomics_helper+0x8f9/0x5450
[   55.507307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.507312]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.507316]  ? kasan_atomics+0x152/0x310
[   55.507320]  kasan_atomics+0x1dc/0x310
[   55.507323]  ? __pfx_kasan_atomics+0x10/0x10
[   55.507327]  ? ktime_get_ts64+0x83/0x230
[   55.507332]  kunit_try_run_case+0x1a2/0x480
[   55.507336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.507341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.507345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.507350]  ? __kthread_parkme+0x82/0x180
[   55.507355]  ? preempt_count_sub+0x50/0x80
[   55.507359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.507364]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.507368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.507373]  kthread+0x334/0x6f0
[   55.507377]  ? trace_preempt_on+0x20/0xc0
[   55.507381]  ? __pfx_kthread+0x10/0x10
[   55.507386]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.507390]  ? calculate_sigpending+0x7b/0xa0
[   55.507394]  ? __pfx_kthread+0x10/0x10
[   55.507399]  ret_from_fork+0x3e/0x80
[   55.507403]  ? __pfx_kthread+0x10/0x10
[   55.507407]  ret_from_fork_asm+0x1a/0x30
[   55.507413]  </TASK>
[   55.507415] 
[   55.687994] Allocated by task 308:
[   55.691400]  kasan_save_stack+0x45/0x70
[   55.695249]  kasan_save_track+0x18/0x40
[   55.699088]  kasan_save_alloc_info+0x3b/0x50
[   55.703358]  __kasan_kmalloc+0xb7/0xc0
[   55.707113]  __kmalloc_cache_noprof+0x189/0x420
[   55.711645]  kasan_atomics+0x95/0x310
[   55.715311]  kunit_try_run_case+0x1a2/0x480
[   55.719505]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.724903]  kthread+0x334/0x6f0
[   55.728136]  ret_from_fork+0x3e/0x80
[   55.731735]  ret_from_fork_asm+0x1a/0x30
[   55.735666] 
[   55.737191] The buggy address belongs to the object at ffff8881061f7500
[   55.737191]  which belongs to the cache kmalloc-64 of size 64
[   55.749525] The buggy address is located 0 bytes to the right of
[   55.749525]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   55.762386] 
[   55.763885] The buggy address belongs to the physical page:
[   55.769457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   55.777456] flags: 0x200000000000000(node=0|zone=2)
[   55.782333] page_type: f5(slab)
[   55.785481] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.793219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.800958] page dumped because: kasan: bad access detected
[   55.806532] 
[   55.808031] Memory state around the buggy address:
[   55.812822]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.820043]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.827269] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.834488]                                      ^
[   55.839283]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.846508]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.853735] ==================================================================
[   64.142438] ==================================================================
[   64.149668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   64.157111] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   64.164511] 
[   64.166013] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   64.166020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.166022] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.166026] Call Trace:
[   64.166028]  <TASK>
[   64.166029]  dump_stack_lvl+0x73/0xb0
[   64.166033]  print_report+0xd1/0x650
[   64.166037]  ? __virt_addr_valid+0x1db/0x2d0
[   64.166041]  ? kasan_atomics_helper+0x1467/0x5450
[   64.166045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.166050]  ? kasan_atomics_helper+0x1467/0x5450
[   64.166054]  kasan_report+0x141/0x180
[   64.166058]  ? kasan_atomics_helper+0x1467/0x5450
[   64.166063]  kasan_check_range+0x10c/0x1c0
[   64.166068]  __kasan_check_write+0x18/0x20
[   64.166072]  kasan_atomics_helper+0x1467/0x5450
[   64.166076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.166081]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.166085]  ? kasan_atomics+0x152/0x310
[   64.166089]  kasan_atomics+0x1dc/0x310
[   64.166092]  ? __pfx_kasan_atomics+0x10/0x10
[   64.166096]  ? ktime_get_ts64+0x83/0x230
[   64.166101]  kunit_try_run_case+0x1a2/0x480
[   64.166106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.166110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.166115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.166119]  ? __kthread_parkme+0x82/0x180
[   64.166124]  ? preempt_count_sub+0x50/0x80
[   64.166129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.166133]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.166137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.166142]  kthread+0x334/0x6f0
[   64.166146]  ? trace_preempt_on+0x20/0xc0
[   64.166150]  ? __pfx_kthread+0x10/0x10
[   64.166155]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.166159]  ? calculate_sigpending+0x7b/0xa0
[   64.166163]  ? __pfx_kthread+0x10/0x10
[   64.166168]  ret_from_fork+0x3e/0x80
[   64.166172]  ? __pfx_kthread+0x10/0x10
[   64.166176]  ret_from_fork_asm+0x1a/0x30
[   64.166182]  </TASK>
[   64.166184] 
[   64.347154] Allocated by task 308:
[   64.350560]  kasan_save_stack+0x45/0x70
[   64.354407]  kasan_save_track+0x18/0x40
[   64.358247]  kasan_save_alloc_info+0x3b/0x50
[   64.362527]  __kasan_kmalloc+0xb7/0xc0
[   64.366280]  __kmalloc_cache_noprof+0x189/0x420
[   64.370813]  kasan_atomics+0x95/0x310
[   64.374477]  kunit_try_run_case+0x1a2/0x480
[   64.378664]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.384096]  kthread+0x334/0x6f0
[   64.387330]  ret_from_fork+0x3e/0x80
[   64.390909]  ret_from_fork_asm+0x1a/0x30
[   64.394836] 
[   64.396334] The buggy address belongs to the object at ffff8881061f7500
[   64.396334]  which belongs to the cache kmalloc-64 of size 64
[   64.408691] The buggy address is located 0 bytes to the right of
[   64.408691]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   64.421578] 
[   64.423078] The buggy address belongs to the physical page:
[   64.428650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   64.436649] flags: 0x200000000000000(node=0|zone=2)
[   64.441527] page_type: f5(slab)
[   64.444691] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.452441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.460188] page dumped because: kasan: bad access detected
[   64.465760] 
[   64.467257] Memory state around the buggy address:
[   64.472051]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.479272]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.486500] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.493742]                                      ^
[   64.498535]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.505755]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.512974] ==================================================================
[   54.729077] ==================================================================
[   54.736310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   54.743623] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   54.751023] 
[   54.752525] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   54.752533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.752535] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.752538] Call Trace:
[   54.752540]  <TASK>
[   54.752542]  dump_stack_lvl+0x73/0xb0
[   54.752546]  print_report+0xd1/0x650
[   54.752550]  ? __virt_addr_valid+0x1db/0x2d0
[   54.752554]  ? kasan_atomics_helper+0x7c7/0x5450
[   54.752558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.752562]  ? kasan_atomics_helper+0x7c7/0x5450
[   54.752567]  kasan_report+0x141/0x180
[   54.752571]  ? kasan_atomics_helper+0x7c7/0x5450
[   54.752576]  kasan_check_range+0x10c/0x1c0
[   54.752581]  __kasan_check_write+0x18/0x20
[   54.752584]  kasan_atomics_helper+0x7c7/0x5450
[   54.752589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.752593]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.752597]  ? kasan_atomics+0x152/0x310
[   54.752601]  kasan_atomics+0x1dc/0x310
[   54.752605]  ? __pfx_kasan_atomics+0x10/0x10
[   54.752609]  ? ktime_get_ts64+0x83/0x230
[   54.752614]  kunit_try_run_case+0x1a2/0x480
[   54.752618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.752623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.752627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.752632]  ? __kthread_parkme+0x82/0x180
[   54.752636]  ? preempt_count_sub+0x50/0x80
[   54.752641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.752646]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.752650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.752654]  kthread+0x334/0x6f0
[   54.752658]  ? trace_preempt_on+0x20/0xc0
[   54.752663]  ? __pfx_kthread+0x10/0x10
[   54.752667]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.752689]  ? calculate_sigpending+0x7b/0xa0
[   54.752693]  ? __pfx_kthread+0x10/0x10
[   54.752698]  ret_from_fork+0x3e/0x80
[   54.752702]  ? __pfx_kthread+0x10/0x10
[   54.752707]  ret_from_fork_asm+0x1a/0x30
[   54.752725]  </TASK>
[   54.752727] 
[   54.933413] Allocated by task 308:
[   54.936819]  kasan_save_stack+0x45/0x70
[   54.940659]  kasan_save_track+0x18/0x40
[   54.944533]  kasan_save_alloc_info+0x3b/0x50
[   54.948804]  __kasan_kmalloc+0xb7/0xc0
[   54.952558]  __kmalloc_cache_noprof+0x189/0x420
[   54.957091]  kasan_atomics+0x95/0x310
[   54.960757]  kunit_try_run_case+0x1a2/0x480
[   54.964948]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.970348]  kthread+0x334/0x6f0
[   54.973582]  ret_from_fork+0x3e/0x80
[   54.977171]  ret_from_fork_asm+0x1a/0x30
[   54.981104] 
[   54.982604] The buggy address belongs to the object at ffff8881061f7500
[   54.982604]  which belongs to the cache kmalloc-64 of size 64
[   54.994945] The buggy address is located 0 bytes to the right of
[   54.994945]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   55.007812] 
[   55.009312] The buggy address belongs to the physical page:
[   55.014884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   55.022885] flags: 0x200000000000000(node=0|zone=2)
[   55.027763] page_type: f5(slab)
[   55.030909] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.038648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.046386] page dumped because: kasan: bad access detected
[   55.051959] 
[   55.053457] Memory state around the buggy address:
[   55.058251]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.065469]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.072718] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.079941]                                      ^
[   55.084739]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.091962]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.099183] ==================================================================
[   69.049053] ==================================================================
[   69.056272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   69.063663] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   69.071084] 
[   69.072582] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   69.072589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.072592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.072595] Call Trace:
[   69.072597]  <TASK>
[   69.072598]  dump_stack_lvl+0x73/0xb0
[   69.072602]  print_report+0xd1/0x650
[   69.072606]  ? __virt_addr_valid+0x1db/0x2d0
[   69.072610]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.072614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.072618]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.072622]  kasan_report+0x141/0x180
[   69.072627]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.072632]  kasan_check_range+0x10c/0x1c0
[   69.072637]  __kasan_check_write+0x18/0x20
[   69.072640]  kasan_atomics_helper+0x1c18/0x5450
[   69.072645]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.072649]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.072653]  ? kasan_atomics+0x152/0x310
[   69.072657]  kasan_atomics+0x1dc/0x310
[   69.072660]  ? __pfx_kasan_atomics+0x10/0x10
[   69.072664]  ? ktime_get_ts64+0x83/0x230
[   69.072669]  kunit_try_run_case+0x1a2/0x480
[   69.072691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.072695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.072700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.072717]  ? __kthread_parkme+0x82/0x180
[   69.072722]  ? preempt_count_sub+0x50/0x80
[   69.072726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.072731]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.072735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.072739]  kthread+0x334/0x6f0
[   69.072743]  ? trace_preempt_on+0x20/0xc0
[   69.072748]  ? __pfx_kthread+0x10/0x10
[   69.072752]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.072757]  ? calculate_sigpending+0x7b/0xa0
[   69.072761]  ? __pfx_kthread+0x10/0x10
[   69.072765]  ret_from_fork+0x3e/0x80
[   69.072769]  ? __pfx_kthread+0x10/0x10
[   69.072773]  ret_from_fork_asm+0x1a/0x30
[   69.072779]  </TASK>
[   69.072781] 
[   69.253863] Allocated by task 308:
[   69.257269]  kasan_save_stack+0x45/0x70
[   69.261109]  kasan_save_track+0x18/0x40
[   69.264946]  kasan_save_alloc_info+0x3b/0x50
[   69.269219]  __kasan_kmalloc+0xb7/0xc0
[   69.272971]  __kmalloc_cache_noprof+0x189/0x420
[   69.277503]  kasan_atomics+0x95/0x310
[   69.281170]  kunit_try_run_case+0x1a2/0x480
[   69.285357]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.290754]  kthread+0x334/0x6f0
[   69.293988]  ret_from_fork+0x3e/0x80
[   69.297568]  ret_from_fork_asm+0x1a/0x30
[   69.301502] 
[   69.303001] The buggy address belongs to the object at ffff8881061f7500
[   69.303001]  which belongs to the cache kmalloc-64 of size 64
[   69.315341] The buggy address is located 0 bytes to the right of
[   69.315341]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   69.328202] 
[   69.329707] The buggy address belongs to the physical page:
[   69.335308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   69.343308] flags: 0x200000000000000(node=0|zone=2)
[   69.348186] page_type: f5(slab)
[   69.351334] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.359080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.366819] page dumped because: kasan: bad access detected
[   69.372393] 
[   69.373890] Memory state around the buggy address:
[   69.378705]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.385946]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.393164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.400383]                                      ^
[   69.405176]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.412396]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.419624] ==================================================================
[   64.894503] ==================================================================
[   64.901742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   64.909134] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   64.916528] 
[   64.918026] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   64.918034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.918036] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.918039] Call Trace:
[   64.918041]  <TASK>
[   64.918043]  dump_stack_lvl+0x73/0xb0
[   64.918046]  print_report+0xd1/0x650
[   64.918051]  ? __virt_addr_valid+0x1db/0x2d0
[   64.918054]  ? kasan_atomics_helper+0x151d/0x5450
[   64.918059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.918063]  ? kasan_atomics_helper+0x151d/0x5450
[   64.918067]  kasan_report+0x141/0x180
[   64.918072]  ? kasan_atomics_helper+0x151d/0x5450
[   64.918077]  kasan_check_range+0x10c/0x1c0
[   64.918082]  __kasan_check_write+0x18/0x20
[   64.918085]  kasan_atomics_helper+0x151d/0x5450
[   64.918090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.918094]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.918098]  ? kasan_atomics+0x152/0x310
[   64.918102]  kasan_atomics+0x1dc/0x310
[   64.918105]  ? __pfx_kasan_atomics+0x10/0x10
[   64.918109]  ? ktime_get_ts64+0x83/0x230
[   64.918114]  kunit_try_run_case+0x1a2/0x480
[   64.918119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.918123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.918128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.918132]  ? __kthread_parkme+0x82/0x180
[   64.918137]  ? preempt_count_sub+0x50/0x80
[   64.918141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.918146]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.918150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.918154]  kthread+0x334/0x6f0
[   64.918158]  ? trace_preempt_on+0x20/0xc0
[   64.918163]  ? __pfx_kthread+0x10/0x10
[   64.918167]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.918171]  ? calculate_sigpending+0x7b/0xa0
[   64.918175]  ? __pfx_kthread+0x10/0x10
[   64.918180]  ret_from_fork+0x3e/0x80
[   64.918184]  ? __pfx_kthread+0x10/0x10
[   64.918189]  ret_from_fork_asm+0x1a/0x30
[   64.918194]  </TASK>
[   64.918196] 
[   65.099135] Allocated by task 308:
[   65.102540]  kasan_save_stack+0x45/0x70
[   65.106387]  kasan_save_track+0x18/0x40
[   65.110227]  kasan_save_alloc_info+0x3b/0x50
[   65.114500]  __kasan_kmalloc+0xb7/0xc0
[   65.118253]  __kmalloc_cache_noprof+0x189/0x420
[   65.122784]  kasan_atomics+0x95/0x310
[   65.126449]  kunit_try_run_case+0x1a2/0x480
[   65.130635]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.136033]  kthread+0x334/0x6f0
[   65.139267]  ret_from_fork+0x3e/0x80
[   65.142846]  ret_from_fork_asm+0x1a/0x30
[   65.146771] 
[   65.148271] The buggy address belongs to the object at ffff8881061f7500
[   65.148271]  which belongs to the cache kmalloc-64 of size 64
[   65.160614] The buggy address is located 0 bytes to the right of
[   65.160614]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   65.173482] 
[   65.174981] The buggy address belongs to the physical page:
[   65.180554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   65.188560] flags: 0x200000000000000(node=0|zone=2)
[   65.193440] page_type: f5(slab)
[   65.196588] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.204333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.212072] page dumped because: kasan: bad access detected
[   65.217644] 
[   65.219144] Memory state around the buggy address:
[   65.223936]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.231156]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.238374] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.245593]                                      ^
[   65.250385]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.257607]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.264834] ==================================================================
[   54.351904] ==================================================================
[   54.359125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   54.366432] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   54.373825] 
[   54.375326] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   54.375334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.375336] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.375339] Call Trace:
[   54.375341]  <TASK>
[   54.375343]  dump_stack_lvl+0x73/0xb0
[   54.375346]  print_report+0xd1/0x650
[   54.375351]  ? __virt_addr_valid+0x1db/0x2d0
[   54.375355]  ? kasan_atomics_helper+0x72f/0x5450
[   54.375359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.375363]  ? kasan_atomics_helper+0x72f/0x5450
[   54.375368]  kasan_report+0x141/0x180
[   54.375372]  ? kasan_atomics_helper+0x72f/0x5450
[   54.375377]  kasan_check_range+0x10c/0x1c0
[   54.375382]  __kasan_check_write+0x18/0x20
[   54.375386]  kasan_atomics_helper+0x72f/0x5450
[   54.375390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.375394]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.375398]  ? kasan_atomics+0x152/0x310
[   54.375402]  kasan_atomics+0x1dc/0x310
[   54.375406]  ? __pfx_kasan_atomics+0x10/0x10
[   54.375410]  ? ktime_get_ts64+0x83/0x230
[   54.375415]  kunit_try_run_case+0x1a2/0x480
[   54.375419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.375424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.375428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.375433]  ? __kthread_parkme+0x82/0x180
[   54.375437]  ? preempt_count_sub+0x50/0x80
[   54.375442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.375446]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.375451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.375455]  kthread+0x334/0x6f0
[   54.375459]  ? trace_preempt_on+0x20/0xc0
[   54.375463]  ? __pfx_kthread+0x10/0x10
[   54.375468]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.375472]  ? calculate_sigpending+0x7b/0xa0
[   54.375476]  ? __pfx_kthread+0x10/0x10
[   54.375481]  ret_from_fork+0x3e/0x80
[   54.375485]  ? __pfx_kthread+0x10/0x10
[   54.375489]  ret_from_fork_asm+0x1a/0x30
[   54.375495]  </TASK>
[   54.375496] 
[   54.556126] Allocated by task 308:
[   54.559532]  kasan_save_stack+0x45/0x70
[   54.563373]  kasan_save_track+0x18/0x40
[   54.567211]  kasan_save_alloc_info+0x3b/0x50
[   54.571486]  __kasan_kmalloc+0xb7/0xc0
[   54.575246]  __kmalloc_cache_noprof+0x189/0x420
[   54.579777]  kasan_atomics+0x95/0x310
[   54.583443]  kunit_try_run_case+0x1a2/0x480
[   54.587628]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.593028]  kthread+0x334/0x6f0
[   54.596262]  ret_from_fork+0x3e/0x80
[   54.599849]  ret_from_fork_asm+0x1a/0x30
[   54.603775] 
[   54.605275] The buggy address belongs to the object at ffff8881061f7500
[   54.605275]  which belongs to the cache kmalloc-64 of size 64
[   54.617615] The buggy address is located 0 bytes to the right of
[   54.617615]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   54.630474] 
[   54.631973] The buggy address belongs to the physical page:
[   54.637549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   54.645554] flags: 0x200000000000000(node=0|zone=2)
[   54.650433] page_type: f5(slab)
[   54.653581] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.661327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.669065] page dumped because: kasan: bad access detected
[   54.674640] 
[   54.676138] Memory state around the buggy address:
[   54.680932]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.688158]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.695378] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.702596]                                      ^
[   54.707387]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.714609]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.721836] ==================================================================
[   52.468093] ==================================================================
[   52.475323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   52.482637] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   52.490030] 
[   52.491528] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   52.491536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.491538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.491541] Call Trace:
[   52.491543]  <TASK>
[   52.491545]  dump_stack_lvl+0x73/0xb0
[   52.491549]  print_report+0xd1/0x650
[   52.491553]  ? __virt_addr_valid+0x1db/0x2d0
[   52.491557]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.491561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.491565]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.491570]  kasan_report+0x141/0x180
[   52.491574]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.491579]  kasan_check_range+0x10c/0x1c0
[   52.491584]  __kasan_check_write+0x18/0x20
[   52.491588]  kasan_atomics_helper+0x4a0/0x5450
[   52.491592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.491597]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.491601]  ? kasan_atomics+0x152/0x310
[   52.491605]  kasan_atomics+0x1dc/0x310
[   52.491608]  ? __pfx_kasan_atomics+0x10/0x10
[   52.491612]  ? ktime_get_ts64+0x83/0x230
[   52.491617]  kunit_try_run_case+0x1a2/0x480
[   52.491621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.491626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.491630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.491635]  ? __kthread_parkme+0x82/0x180
[   52.491639]  ? preempt_count_sub+0x50/0x80
[   52.491644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.491649]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.491653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.491657]  kthread+0x334/0x6f0
[   52.491661]  ? trace_preempt_on+0x20/0xc0
[   52.491666]  ? __pfx_kthread+0x10/0x10
[   52.491687]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.491692]  ? calculate_sigpending+0x7b/0xa0
[   52.491696]  ? __pfx_kthread+0x10/0x10
[   52.491701]  ret_from_fork+0x3e/0x80
[   52.491705]  ? __pfx_kthread+0x10/0x10
[   52.491722]  ret_from_fork_asm+0x1a/0x30
[   52.491728]  </TASK>
[   52.491729] 
[   52.672418] Allocated by task 308:
[   52.675824]  kasan_save_stack+0x45/0x70
[   52.679666]  kasan_save_track+0x18/0x40
[   52.683528]  kasan_save_alloc_info+0x3b/0x50
[   52.687802]  __kasan_kmalloc+0xb7/0xc0
[   52.691555]  __kmalloc_cache_noprof+0x189/0x420
[   52.696088]  kasan_atomics+0x95/0x310
[   52.699753]  kunit_try_run_case+0x1a2/0x480
[   52.703939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.709345]  kthread+0x334/0x6f0
[   52.712579]  ret_from_fork+0x3e/0x80
[   52.716166]  ret_from_fork_asm+0x1a/0x30
[   52.720091] 
[   52.721591] The buggy address belongs to the object at ffff8881061f7500
[   52.721591]  which belongs to the cache kmalloc-64 of size 64
[   52.733933] The buggy address is located 0 bytes to the right of
[   52.733933]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   52.746801] 
[   52.748300] The buggy address belongs to the physical page:
[   52.753875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   52.761881] flags: 0x200000000000000(node=0|zone=2)
[   52.766760] page_type: f5(slab)
[   52.769906] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.777646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.785383] page dumped because: kasan: bad access detected
[   52.790958] 
[   52.792457] Memory state around the buggy address:
[   52.797250]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.804478]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.811703] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.818948]                                      ^
[   52.823752]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.830977]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.838198] ==================================================================
[   55.860990] ==================================================================
[   55.868208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   55.875516] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   55.882915] 
[   55.884416] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   55.884423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.884426] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.884429] Call Trace:
[   55.884431]  <TASK>
[   55.884432]  dump_stack_lvl+0x73/0xb0
[   55.884436]  print_report+0xd1/0x650
[   55.884440]  ? __virt_addr_valid+0x1db/0x2d0
[   55.884444]  ? kasan_atomics_helper+0x992/0x5450
[   55.884448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.884453]  ? kasan_atomics_helper+0x992/0x5450
[   55.884457]  kasan_report+0x141/0x180
[   55.884461]  ? kasan_atomics_helper+0x992/0x5450
[   55.884466]  kasan_check_range+0x10c/0x1c0
[   55.884471]  __kasan_check_write+0x18/0x20
[   55.884475]  kasan_atomics_helper+0x992/0x5450
[   55.884480]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.884484]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.884488]  ? kasan_atomics+0x152/0x310
[   55.884492]  kasan_atomics+0x1dc/0x310
[   55.884496]  ? __pfx_kasan_atomics+0x10/0x10
[   55.884500]  ? ktime_get_ts64+0x83/0x230
[   55.884504]  kunit_try_run_case+0x1a2/0x480
[   55.884509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.884513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.884518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.884523]  ? __kthread_parkme+0x82/0x180
[   55.884527]  ? preempt_count_sub+0x50/0x80
[   55.884532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.884537]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.884541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.884545]  kthread+0x334/0x6f0
[   55.884550]  ? trace_preempt_on+0x20/0xc0
[   55.884554]  ? __pfx_kthread+0x10/0x10
[   55.884558]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.884563]  ? calculate_sigpending+0x7b/0xa0
[   55.884567]  ? __pfx_kthread+0x10/0x10
[   55.884571]  ret_from_fork+0x3e/0x80
[   55.884575]  ? __pfx_kthread+0x10/0x10
[   55.884580]  ret_from_fork_asm+0x1a/0x30
[   55.884586]  </TASK>
[   55.884587] 
[   56.065246] Allocated by task 308:
[   56.068650]  kasan_save_stack+0x45/0x70
[   56.072489]  kasan_save_track+0x18/0x40
[   56.076329]  kasan_save_alloc_info+0x3b/0x50
[   56.080602]  __kasan_kmalloc+0xb7/0xc0
[   56.084355]  __kmalloc_cache_noprof+0x189/0x420
[   56.088887]  kasan_atomics+0x95/0x310
[   56.092553]  kunit_try_run_case+0x1a2/0x480
[   56.096748]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.102155]  kthread+0x334/0x6f0
[   56.105388]  ret_from_fork+0x3e/0x80
[   56.108967]  ret_from_fork_asm+0x1a/0x30
[   56.112899] 
[   56.114399] The buggy address belongs to the object at ffff8881061f7500
[   56.114399]  which belongs to the cache kmalloc-64 of size 64
[   56.126741] The buggy address is located 0 bytes to the right of
[   56.126741]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   56.139603] 
[   56.141099] The buggy address belongs to the physical page:
[   56.146691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   56.154719] flags: 0x200000000000000(node=0|zone=2)
[   56.159605] page_type: f5(slab)
[   56.162752] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.170497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.178237] page dumped because: kasan: bad access detected
[   56.183810] 
[   56.185307] Memory state around the buggy address:
[   56.190099]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.197320]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.204538] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.211757]                                      ^
[   56.216549]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.223769]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.230988] ==================================================================
[   57.747478] ==================================================================
[   57.754719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   57.762126] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   57.769433] 
[   57.770932] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   57.770939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.770942] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.770945] Call Trace:
[   57.770947]  <TASK>
[   57.770948]  dump_stack_lvl+0x73/0xb0
[   57.770952]  print_report+0xd1/0x650
[   57.770956]  ? __virt_addr_valid+0x1db/0x2d0
[   57.770960]  ? kasan_atomics_helper+0x4a84/0x5450
[   57.770965]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.770969]  ? kasan_atomics_helper+0x4a84/0x5450
[   57.770973]  kasan_report+0x141/0x180
[   57.770978]  ? kasan_atomics_helper+0x4a84/0x5450
[   57.770983]  __asan_report_load4_noabort+0x18/0x20
[   57.770987]  kasan_atomics_helper+0x4a84/0x5450
[   57.770991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.770995]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.770999]  ? kasan_atomics+0x152/0x310
[   57.771004]  kasan_atomics+0x1dc/0x310
[   57.771007]  ? __pfx_kasan_atomics+0x10/0x10
[   57.771011]  ? ktime_get_ts64+0x83/0x230
[   57.771016]  kunit_try_run_case+0x1a2/0x480
[   57.771020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.771025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.771029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.771034]  ? __kthread_parkme+0x82/0x180
[   57.771038]  ? preempt_count_sub+0x50/0x80
[   57.771043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.771048]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.771052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.771056]  kthread+0x334/0x6f0
[   57.771061]  ? trace_preempt_on+0x20/0xc0
[   57.771065]  ? __pfx_kthread+0x10/0x10
[   57.771070]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.771074]  ? calculate_sigpending+0x7b/0xa0
[   57.771078]  ? __pfx_kthread+0x10/0x10
[   57.771083]  ret_from_fork+0x3e/0x80
[   57.771087]  ? __pfx_kthread+0x10/0x10
[   57.771091]  ret_from_fork_asm+0x1a/0x30
[   57.771097]  </TASK>
[   57.771099] 
[   57.948734] Allocated by task 308:
[   57.952142]  kasan_save_stack+0x45/0x70
[   57.955981]  kasan_save_track+0x18/0x40
[   57.959821]  kasan_save_alloc_info+0x3b/0x50
[   57.964095]  __kasan_kmalloc+0xb7/0xc0
[   57.967854]  __kmalloc_cache_noprof+0x189/0x420
[   57.972387]  kasan_atomics+0x95/0x310
[   57.976051]  kunit_try_run_case+0x1a2/0x480
[   57.980237]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.985637]  kthread+0x334/0x6f0
[   57.988870]  ret_from_fork+0x3e/0x80
[   57.992448]  ret_from_fork_asm+0x1a/0x30
[   57.996375] 
[   57.997874] The buggy address belongs to the object at ffff8881061f7500
[   57.997874]  which belongs to the cache kmalloc-64 of size 64
[   58.010215] The buggy address is located 0 bytes to the right of
[   58.010215]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   58.023077] 
[   58.024574] The buggy address belongs to the physical page:
[   58.030149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   58.038155] flags: 0x200000000000000(node=0|zone=2)
[   58.043035] page_type: f5(slab)
[   58.046181] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.053930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.061703] page dumped because: kasan: bad access detected
[   58.067300] 
[   58.068798] Memory state around the buggy address:
[   58.073591]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.080811]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.088029] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.095250]                                      ^
[   58.100041]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.107259]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.114478] ==================================================================
[   52.845466] ==================================================================
[   52.852719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   52.860122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   52.867522] 
[   52.869022] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   52.869030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.869032] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.869036] Call Trace:
[   52.869038]  <TASK>
[   52.869040]  dump_stack_lvl+0x73/0xb0
[   52.869043]  print_report+0xd1/0x650
[   52.869048]  ? __virt_addr_valid+0x1db/0x2d0
[   52.869052]  ? kasan_atomics_helper+0x4b3a/0x5450
[   52.869056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.869061]  ? kasan_atomics_helper+0x4b3a/0x5450
[   52.869065]  kasan_report+0x141/0x180
[   52.869069]  ? kasan_atomics_helper+0x4b3a/0x5450
[   52.869075]  __asan_report_store4_noabort+0x1b/0x30
[   52.869079]  kasan_atomics_helper+0x4b3a/0x5450
[   52.869083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.869088]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.869092]  ? kasan_atomics+0x152/0x310
[   52.869096]  kasan_atomics+0x1dc/0x310
[   52.869100]  ? __pfx_kasan_atomics+0x10/0x10
[   52.869104]  ? ktime_get_ts64+0x83/0x230
[   52.869108]  kunit_try_run_case+0x1a2/0x480
[   52.869113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.869118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.869122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.869127]  ? __kthread_parkme+0x82/0x180
[   52.869131]  ? preempt_count_sub+0x50/0x80
[   52.869136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.869141]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.869145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.869149]  kthread+0x334/0x6f0
[   52.869154]  ? trace_preempt_on+0x20/0xc0
[   52.869158]  ? __pfx_kthread+0x10/0x10
[   52.869163]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.869167]  ? calculate_sigpending+0x7b/0xa0
[   52.869171]  ? __pfx_kthread+0x10/0x10
[   52.869176]  ret_from_fork+0x3e/0x80
[   52.869180]  ? __pfx_kthread+0x10/0x10
[   52.869184]  ret_from_fork_asm+0x1a/0x30
[   52.869190]  </TASK>
[   52.869192] 
[   53.046862] Allocated by task 308:
[   53.050267]  kasan_save_stack+0x45/0x70
[   53.054108]  kasan_save_track+0x18/0x40
[   53.057946]  kasan_save_alloc_info+0x3b/0x50
[   53.062219]  __kasan_kmalloc+0xb7/0xc0
[   53.065973]  __kmalloc_cache_noprof+0x189/0x420
[   53.070512]  kasan_atomics+0x95/0x310
[   53.074179]  kunit_try_run_case+0x1a2/0x480
[   53.078375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.083781]  kthread+0x334/0x6f0
[   53.087015]  ret_from_fork+0x3e/0x80
[   53.090602]  ret_from_fork_asm+0x1a/0x30
[   53.094536] 
[   53.096034] The buggy address belongs to the object at ffff8881061f7500
[   53.096034]  which belongs to the cache kmalloc-64 of size 64
[   53.108366] The buggy address is located 0 bytes to the right of
[   53.108366]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   53.121227] 
[   53.122740] The buggy address belongs to the physical page:
[   53.128318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   53.136324] flags: 0x200000000000000(node=0|zone=2)
[   53.141204] page_type: f5(slab)
[   53.144349] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.152088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.159828] page dumped because: kasan: bad access detected
[   53.165400] 
[   53.166900] Memory state around the buggy address:
[   53.171719]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.178945]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.186164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.193384]                                      ^
[   53.198175]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.205394]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.212615] ==================================================================
[   73.244500] ==================================================================
[   73.251744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   73.259141] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   73.266534] 
[   73.268036] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   73.268044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.268046] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.268049] Call Trace:
[   73.268051]  <TASK>
[   73.268053]  dump_stack_lvl+0x73/0xb0
[   73.268057]  print_report+0xd1/0x650
[   73.268061]  ? __virt_addr_valid+0x1db/0x2d0
[   73.268065]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.268069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.268073]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.268078]  kasan_report+0x141/0x180
[   73.268082]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.268087]  kasan_check_range+0x10c/0x1c0
[   73.268092]  __kasan_check_write+0x18/0x20
[   73.268096]  kasan_atomics_helper+0x20c8/0x5450
[   73.268100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.268105]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.268109]  ? kasan_atomics+0x152/0x310
[   73.268113]  kasan_atomics+0x1dc/0x310
[   73.268116]  ? __pfx_kasan_atomics+0x10/0x10
[   73.268120]  ? ktime_get_ts64+0x83/0x230
[   73.268125]  kunit_try_run_case+0x1a2/0x480
[   73.268130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.268134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.268139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.268144]  ? __kthread_parkme+0x82/0x180
[   73.268148]  ? preempt_count_sub+0x50/0x80
[   73.268153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.268157]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.268162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.268166]  kthread+0x334/0x6f0
[   73.268170]  ? trace_preempt_on+0x20/0xc0
[   73.268175]  ? __pfx_kthread+0x10/0x10
[   73.268179]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.268183]  ? calculate_sigpending+0x7b/0xa0
[   73.268187]  ? __pfx_kthread+0x10/0x10
[   73.268192]  ret_from_fork+0x3e/0x80
[   73.268196]  ? __pfx_kthread+0x10/0x10
[   73.268201]  ret_from_fork_asm+0x1a/0x30
[   73.268207]  </TASK>
[   73.268208] 
[   73.449203] Allocated by task 308:
[   73.452608]  kasan_save_stack+0x45/0x70
[   73.456454]  kasan_save_track+0x18/0x40
[   73.460295]  kasan_save_alloc_info+0x3b/0x50
[   73.464568]  __kasan_kmalloc+0xb7/0xc0
[   73.468319]  __kmalloc_cache_noprof+0x189/0x420
[   73.472851]  kasan_atomics+0x95/0x310
[   73.476519]  kunit_try_run_case+0x1a2/0x480
[   73.480734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.486138]  kthread+0x334/0x6f0
[   73.489378]  ret_from_fork+0x3e/0x80
[   73.492958]  ret_from_fork_asm+0x1a/0x30
[   73.496883] 
[   73.498384] The buggy address belongs to the object at ffff8881061f7500
[   73.498384]  which belongs to the cache kmalloc-64 of size 64
[   73.510746] The buggy address is located 0 bytes to the right of
[   73.510746]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   73.523612] 
[   73.525109] The buggy address belongs to the physical page:
[   73.530718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   73.538739] flags: 0x200000000000000(node=0|zone=2)
[   73.543621] page_type: f5(slab)
[   73.546769] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.554516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.562263] page dumped because: kasan: bad access detected
[   73.567834] 
[   73.569332] Memory state around the buggy address:
[   73.574125]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.581344]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.588565] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.595785]                                      ^
[   73.600574]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.607795]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.615015] ==================================================================
[   51.342423] ==================================================================
[   51.349653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   51.357052] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   51.364445] 
[   51.365946] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   51.365954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.365956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.365960] Call Trace:
[   51.365962]  <TASK>
[   51.365963]  dump_stack_lvl+0x73/0xb0
[   51.365967]  print_report+0xd1/0x650
[   51.365971]  ? __virt_addr_valid+0x1db/0x2d0
[   51.365975]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.365980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.365984]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.365988]  kasan_report+0x141/0x180
[   51.365993]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.365998]  __asan_report_store4_noabort+0x1b/0x30
[   51.366002]  kasan_atomics_helper+0x4b6e/0x5450
[   51.366006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.366011]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.366015]  ? kasan_atomics+0x152/0x310
[   51.366019]  kasan_atomics+0x1dc/0x310
[   51.366022]  ? __pfx_kasan_atomics+0x10/0x10
[   51.366026]  ? ktime_get_ts64+0x83/0x230
[   51.366031]  kunit_try_run_case+0x1a2/0x480
[   51.366036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.366040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.366045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.366050]  ? __kthread_parkme+0x82/0x180
[   51.366054]  ? preempt_count_sub+0x50/0x80
[   51.366059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.366063]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.366068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.366072]  kthread+0x334/0x6f0
[   51.366076]  ? trace_preempt_on+0x20/0xc0
[   51.366081]  ? __pfx_kthread+0x10/0x10
[   51.366085]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.366089]  ? calculate_sigpending+0x7b/0xa0
[   51.366094]  ? __pfx_kthread+0x10/0x10
[   51.366098]  ret_from_fork+0x3e/0x80
[   51.366102]  ? __pfx_kthread+0x10/0x10
[   51.366107]  ret_from_fork_asm+0x1a/0x30
[   51.366113]  </TASK>
[   51.366115] 
[   51.543882] Allocated by task 308:
[   51.547288]  kasan_save_stack+0x45/0x70
[   51.551134]  kasan_save_track+0x18/0x40
[   51.554975]  kasan_save_alloc_info+0x3b/0x50
[   51.559245]  __kasan_kmalloc+0xb7/0xc0
[   51.563000]  __kmalloc_cache_noprof+0x189/0x420
[   51.567531]  kasan_atomics+0x95/0x310
[   51.571196]  kunit_try_run_case+0x1a2/0x480
[   51.575384]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.580790]  kthread+0x334/0x6f0
[   51.584024]  ret_from_fork+0x3e/0x80
[   51.587611]  ret_from_fork_asm+0x1a/0x30
[   51.591536] 
[   51.593035] The buggy address belongs to the object at ffff8881061f7500
[   51.593035]  which belongs to the cache kmalloc-64 of size 64
[   51.605367] The buggy address is located 0 bytes to the right of
[   51.605367]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   51.618230] 
[   51.619733] The buggy address belongs to the physical page:
[   51.625310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   51.633316] flags: 0x200000000000000(node=0|zone=2)
[   51.638195] page_type: f5(slab)
[   51.641342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.649089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.656828] page dumped because: kasan: bad access detected
[   51.662400] 
[   51.663901] Memory state around the buggy address:
[   51.668718]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.675948]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.683173] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.690394]                                      ^
[   51.695186]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.702412]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.709633] ==================================================================
[   73.622258] ==================================================================
[   73.629485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   73.636879] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   73.644183] 
[   73.645718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   73.645725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.645728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.645731] Call Trace:
[   73.645733]  <TASK>
[   73.645735]  dump_stack_lvl+0x73/0xb0
[   73.645738]  print_report+0xd1/0x650
[   73.645743]  ? __virt_addr_valid+0x1db/0x2d0
[   73.645746]  ? kasan_atomics_helper+0x4fb2/0x5450
[   73.645751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.645755]  ? kasan_atomics_helper+0x4fb2/0x5450
[   73.645759]  kasan_report+0x141/0x180
[   73.645764]  ? kasan_atomics_helper+0x4fb2/0x5450
[   73.645769]  __asan_report_load8_noabort+0x18/0x20
[   73.645773]  kasan_atomics_helper+0x4fb2/0x5450
[   73.645777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.645782]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.645786]  ? kasan_atomics+0x152/0x310
[   73.645790]  kasan_atomics+0x1dc/0x310
[   73.645793]  ? __pfx_kasan_atomics+0x10/0x10
[   73.645797]  ? ktime_get_ts64+0x83/0x230
[   73.645802]  kunit_try_run_case+0x1a2/0x480
[   73.645807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.645811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.645816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.645821]  ? __kthread_parkme+0x82/0x180
[   73.645825]  ? preempt_count_sub+0x50/0x80
[   73.645830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.645834]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.645839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.645843]  kthread+0x334/0x6f0
[   73.645847]  ? trace_preempt_on+0x20/0xc0
[   73.645852]  ? __pfx_kthread+0x10/0x10
[   73.645856]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.645861]  ? calculate_sigpending+0x7b/0xa0
[   73.645865]  ? __pfx_kthread+0x10/0x10
[   73.645869]  ret_from_fork+0x3e/0x80
[   73.645873]  ? __pfx_kthread+0x10/0x10
[   73.645878]  ret_from_fork_asm+0x1a/0x30
[   73.645884]  </TASK>
[   73.645886] 
[   73.823462] Allocated by task 308:
[   73.826869]  kasan_save_stack+0x45/0x70
[   73.830709]  kasan_save_track+0x18/0x40
[   73.834573]  kasan_save_alloc_info+0x3b/0x50
[   73.838846]  __kasan_kmalloc+0xb7/0xc0
[   73.842597]  __kmalloc_cache_noprof+0x189/0x420
[   73.847132]  kasan_atomics+0x95/0x310
[   73.850797]  kunit_try_run_case+0x1a2/0x480
[   73.854984]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.860391]  kthread+0x334/0x6f0
[   73.863622]  ret_from_fork+0x3e/0x80
[   73.867203]  ret_from_fork_asm+0x1a/0x30
[   73.871136] 
[   73.872636] The buggy address belongs to the object at ffff8881061f7500
[   73.872636]  which belongs to the cache kmalloc-64 of size 64
[   73.884978] The buggy address is located 0 bytes to the right of
[   73.884978]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   73.897847] 
[   73.899345] The buggy address belongs to the physical page:
[   73.904917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   73.912917] flags: 0x200000000000000(node=0|zone=2)
[   73.917794] page_type: f5(slab)
[   73.920944] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.928707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.936472] page dumped because: kasan: bad access detected
[   73.942044] 
[   73.943544] Memory state around the buggy address:
[   73.948336]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.955565]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.962792] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.970018]                                      ^
[   73.974810]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.982031]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.989257] ==================================================================
[   56.615566] ==================================================================
[   56.622799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   56.630112] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   56.637504] 
[   56.639005] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   56.639012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.639015] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.639018] Call Trace:
[   56.639020]  <TASK>
[   56.639022]  dump_stack_lvl+0x73/0xb0
[   56.639025]  print_report+0xd1/0x650
[   56.639030]  ? __virt_addr_valid+0x1db/0x2d0
[   56.639033]  ? kasan_atomics_helper+0xac7/0x5450
[   56.639037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.639042]  ? kasan_atomics_helper+0xac7/0x5450
[   56.639046]  kasan_report+0x141/0x180
[   56.639051]  ? kasan_atomics_helper+0xac7/0x5450
[   56.639056]  kasan_check_range+0x10c/0x1c0
[   56.639061]  __kasan_check_write+0x18/0x20
[   56.639064]  kasan_atomics_helper+0xac7/0x5450
[   56.639069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.639073]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.639077]  ? kasan_atomics+0x152/0x310
[   56.639081]  kasan_atomics+0x1dc/0x310
[   56.639084]  ? __pfx_kasan_atomics+0x10/0x10
[   56.639088]  ? ktime_get_ts64+0x83/0x230
[   56.639093]  kunit_try_run_case+0x1a2/0x480
[   56.639098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.639102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.639106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.639111]  ? __kthread_parkme+0x82/0x180
[   56.639115]  ? preempt_count_sub+0x50/0x80
[   56.639120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.639125]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.639129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.639133]  kthread+0x334/0x6f0
[   56.639137]  ? trace_preempt_on+0x20/0xc0
[   56.639142]  ? __pfx_kthread+0x10/0x10
[   56.639146]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.639150]  ? calculate_sigpending+0x7b/0xa0
[   56.639154]  ? __pfx_kthread+0x10/0x10
[   56.639159]  ret_from_fork+0x3e/0x80
[   56.639163]  ? __pfx_kthread+0x10/0x10
[   56.639167]  ret_from_fork_asm+0x1a/0x30
[   56.639173]  </TASK>
[   56.639175] 
[   56.819912] Allocated by task 308:
[   56.823317]  kasan_save_stack+0x45/0x70
[   56.827157]  kasan_save_track+0x18/0x40
[   56.830996]  kasan_save_alloc_info+0x3b/0x50
[   56.835268]  __kasan_kmalloc+0xb7/0xc0
[   56.839021]  __kmalloc_cache_noprof+0x189/0x420
[   56.843552]  kasan_atomics+0x95/0x310
[   56.847220]  kunit_try_run_case+0x1a2/0x480
[   56.851406]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.856804]  kthread+0x334/0x6f0
[   56.860036]  ret_from_fork+0x3e/0x80
[   56.863615]  ret_from_fork_asm+0x1a/0x30
[   56.867542] 
[   56.869042] The buggy address belongs to the object at ffff8881061f7500
[   56.869042]  which belongs to the cache kmalloc-64 of size 64
[   56.881381] The buggy address is located 0 bytes to the right of
[   56.881381]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   56.894244] 
[   56.895741] The buggy address belongs to the physical page:
[   56.901315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   56.909322] flags: 0x200000000000000(node=0|zone=2)
[   56.914202] page_type: f5(slab)
[   56.917347] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.925086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.932824] page dumped because: kasan: bad access detected
[   56.938399] 
[   56.939898] Memory state around the buggy address:
[   56.944706]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.951943]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.959162] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.966381]                                      ^
[   56.971174]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.978391]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.985611] ==================================================================
[   60.382472] ==================================================================
[   60.389716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   60.397122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   60.404521] 
[   60.406024] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   60.406031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.406033] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.406037] Call Trace:
[   60.406039]  <TASK>
[   60.406040]  dump_stack_lvl+0x73/0xb0
[   60.406044]  print_report+0xd1/0x650
[   60.406048]  ? __virt_addr_valid+0x1db/0x2d0
[   60.406052]  ? kasan_atomics_helper+0x1079/0x5450
[   60.406056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.406061]  ? kasan_atomics_helper+0x1079/0x5450
[   60.406065]  kasan_report+0x141/0x180
[   60.406069]  ? kasan_atomics_helper+0x1079/0x5450
[   60.406075]  kasan_check_range+0x10c/0x1c0
[   60.406079]  __kasan_check_write+0x18/0x20
[   60.406083]  kasan_atomics_helper+0x1079/0x5450
[   60.406087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.406092]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.406096]  ? kasan_atomics+0x152/0x310
[   60.406100]  kasan_atomics+0x1dc/0x310
[   60.406104]  ? __pfx_kasan_atomics+0x10/0x10
[   60.406107]  ? ktime_get_ts64+0x83/0x230
[   60.406112]  kunit_try_run_case+0x1a2/0x480
[   60.406117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.406121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.406126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.406131]  ? __kthread_parkme+0x82/0x180
[   60.406135]  ? preempt_count_sub+0x50/0x80
[   60.406139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.406144]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.406148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.406153]  kthread+0x334/0x6f0
[   60.406157]  ? trace_preempt_on+0x20/0xc0
[   60.406161]  ? __pfx_kthread+0x10/0x10
[   60.406166]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.406170]  ? calculate_sigpending+0x7b/0xa0
[   60.406174]  ? __pfx_kthread+0x10/0x10
[   60.406179]  ret_from_fork+0x3e/0x80
[   60.406183]  ? __pfx_kthread+0x10/0x10
[   60.406187]  ret_from_fork_asm+0x1a/0x30
[   60.406193]  </TASK>
[   60.406195] 
[   60.587223] Allocated by task 308:
[   60.590632]  kasan_save_stack+0x45/0x70
[   60.594478]  kasan_save_track+0x18/0x40
[   60.598316]  kasan_save_alloc_info+0x3b/0x50
[   60.602589]  __kasan_kmalloc+0xb7/0xc0
[   60.606343]  __kmalloc_cache_noprof+0x189/0x420
[   60.610875]  kasan_atomics+0x95/0x310
[   60.614541]  kunit_try_run_case+0x1a2/0x480
[   60.618734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.624133]  kthread+0x334/0x6f0
[   60.627368]  ret_from_fork+0x3e/0x80
[   60.630955]  ret_from_fork_asm+0x1a/0x30
[   60.634887] 
[   60.636388] The buggy address belongs to the object at ffff8881061f7500
[   60.636388]  which belongs to the cache kmalloc-64 of size 64
[   60.648740] The buggy address is located 0 bytes to the right of
[   60.648740]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   60.661608] 
[   60.663105] The buggy address belongs to the physical page:
[   60.668707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   60.676741] flags: 0x200000000000000(node=0|zone=2)
[   60.681618] page_type: f5(slab)
[   60.684763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.692502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.700241] page dumped because: kasan: bad access detected
[   60.705813] 
[   60.707314] Memory state around the buggy address:
[   60.712104]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.719324]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.726543] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.733762]                                      ^
[   60.738556]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.745782]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.753003] ==================================================================
[   50.968124] ==================================================================
[   50.975375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   50.982776] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   50.990088] 
[   50.991590] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   50.991598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.991600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.991603] Call Trace:
[   50.991605]  <TASK>
[   50.991607]  dump_stack_lvl+0x73/0xb0
[   50.991610]  print_report+0xd1/0x650
[   50.991615]  ? __virt_addr_valid+0x1db/0x2d0
[   50.991619]  ? kasan_atomics_helper+0x4b88/0x5450
[   50.991623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.991627]  ? kasan_atomics_helper+0x4b88/0x5450
[   50.991631]  kasan_report+0x141/0x180
[   50.991636]  ? kasan_atomics_helper+0x4b88/0x5450
[   50.991641]  __asan_report_load4_noabort+0x18/0x20
[   50.991645]  kasan_atomics_helper+0x4b88/0x5450
[   50.991649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.991654]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.991657]  ? kasan_atomics+0x152/0x310
[   50.991662]  kasan_atomics+0x1dc/0x310
[   50.991665]  ? __pfx_kasan_atomics+0x10/0x10
[   50.991669]  ? ktime_get_ts64+0x83/0x230
[   50.991691]  kunit_try_run_case+0x1a2/0x480
[   50.991695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.991700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.991705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.991722]  ? __kthread_parkme+0x82/0x180
[   50.991726]  ? preempt_count_sub+0x50/0x80
[   50.991731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.991736]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.991740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.991745]  kthread+0x334/0x6f0
[   50.991749]  ? trace_preempt_on+0x20/0xc0
[   50.991753]  ? __pfx_kthread+0x10/0x10
[   50.991758]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.991762]  ? calculate_sigpending+0x7b/0xa0
[   50.991766]  ? __pfx_kthread+0x10/0x10
[   50.991771]  ret_from_fork+0x3e/0x80
[   50.991775]  ? __pfx_kthread+0x10/0x10
[   50.991779]  ret_from_fork_asm+0x1a/0x30
[   50.991785]  </TASK>
[   50.991787] 
[   51.169412] Allocated by task 308:
[   51.172819]  kasan_save_stack+0x45/0x70
[   51.176666]  kasan_save_track+0x18/0x40
[   51.180531]  kasan_save_alloc_info+0x3b/0x50
[   51.184803]  __kasan_kmalloc+0xb7/0xc0
[   51.188554]  __kmalloc_cache_noprof+0x189/0x420
[   51.193086]  kasan_atomics+0x95/0x310
[   51.196753]  kunit_try_run_case+0x1a2/0x480
[   51.200939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.206339]  kthread+0x334/0x6f0
[   51.209570]  ret_from_fork+0x3e/0x80
[   51.213149]  ret_from_fork_asm+0x1a/0x30
[   51.217077] 
[   51.218574] The buggy address belongs to the object at ffff8881061f7500
[   51.218574]  which belongs to the cache kmalloc-64 of size 64
[   51.230916] The buggy address is located 0 bytes to the right of
[   51.230916]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   51.243779] 
[   51.245277] The buggy address belongs to the physical page:
[   51.250847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   51.258848] flags: 0x200000000000000(node=0|zone=2)
[   51.263741] page_type: f5(slab)
[   51.266892] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.274638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.282386] page dumped because: kasan: bad access detected
[   51.287956] 
[   51.289456] Memory state around the buggy address:
[   51.294250]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.301470]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.308704] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.315949]                                      ^
[   51.320743]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.327961]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.335181] ==================================================================
[   50.593723] ==================================================================
[   50.600999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   50.608391] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   50.615786] 
[   50.617285] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   50.617293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.617295] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.617299] Call Trace:
[   50.617300]  <TASK>
[   50.617302]  dump_stack_lvl+0x73/0xb0
[   50.617306]  print_report+0xd1/0x650
[   50.617311]  ? __virt_addr_valid+0x1db/0x2d0
[   50.617315]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.617319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.617323]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.617327]  kasan_report+0x141/0x180
[   50.617332]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.617337]  __asan_report_store4_noabort+0x1b/0x30
[   50.617341]  kasan_atomics_helper+0x4ba2/0x5450
[   50.617345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.617349]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.617353]  ? kasan_atomics+0x152/0x310
[   50.617358]  kasan_atomics+0x1dc/0x310
[   50.617361]  ? __pfx_kasan_atomics+0x10/0x10
[   50.617365]  ? ktime_get_ts64+0x83/0x230
[   50.617370]  kunit_try_run_case+0x1a2/0x480
[   50.617374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.617378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.617383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.617388]  ? __kthread_parkme+0x82/0x180
[   50.617392]  ? preempt_count_sub+0x50/0x80
[   50.617397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.617401]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.617406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.617410]  kthread+0x334/0x6f0
[   50.617414]  ? trace_preempt_on+0x20/0xc0
[   50.617419]  ? __pfx_kthread+0x10/0x10
[   50.617423]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.617427]  ? calculate_sigpending+0x7b/0xa0
[   50.617432]  ? __pfx_kthread+0x10/0x10
[   50.617436]  ret_from_fork+0x3e/0x80
[   50.617440]  ? __pfx_kthread+0x10/0x10
[   50.617445]  ret_from_fork_asm+0x1a/0x30
[   50.617451]  </TASK>
[   50.617452] 
[   50.795117] Allocated by task 308:
[   50.798522]  kasan_save_stack+0x45/0x70
[   50.802361]  kasan_save_track+0x18/0x40
[   50.806199]  kasan_save_alloc_info+0x3b/0x50
[   50.810474]  __kasan_kmalloc+0xb7/0xc0
[   50.814232]  __kmalloc_cache_noprof+0x189/0x420
[   50.818766]  kasan_atomics+0x95/0x310
[   50.822432]  kunit_try_run_case+0x1a2/0x480
[   50.826625]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.832025]  kthread+0x334/0x6f0
[   50.835258]  ret_from_fork+0x3e/0x80
[   50.838835]  ret_from_fork_asm+0x1a/0x30
[   50.842761] 
[   50.844261] The buggy address belongs to the object at ffff8881061f7500
[   50.844261]  which belongs to the cache kmalloc-64 of size 64
[   50.856604] The buggy address is located 0 bytes to the right of
[   50.856604]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   50.869473] 
[   50.870973] The buggy address belongs to the physical page:
[   50.876545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   50.884553] flags: 0x200000000000000(node=0|zone=2)
[   50.889440] page_type: f5(slab)
[   50.892587] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   50.900332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.908072] page dumped because: kasan: bad access detected
[   50.913644] 
[   50.915143] Memory state around the buggy address:
[   50.919937]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.927165]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.934392] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.941617]                                      ^
[   50.946410]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.953631]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.960848] ==================================================================
[   53.219864] ==================================================================
[   53.227095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   53.234399] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   53.241792] 
[   53.243293] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   53.243300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.243302] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.243306] Call Trace:
[   53.243308]  <TASK>
[   53.243309]  dump_stack_lvl+0x73/0xb0
[   53.243313]  print_report+0xd1/0x650
[   53.243318]  ? __virt_addr_valid+0x1db/0x2d0
[   53.243321]  ? kasan_atomics_helper+0x565/0x5450
[   53.243325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.243330]  ? kasan_atomics_helper+0x565/0x5450
[   53.243334]  kasan_report+0x141/0x180
[   53.243338]  ? kasan_atomics_helper+0x565/0x5450
[   53.243344]  kasan_check_range+0x10c/0x1c0
[   53.243348]  __kasan_check_write+0x18/0x20
[   53.243352]  kasan_atomics_helper+0x565/0x5450
[   53.243357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.243361]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.243365]  ? kasan_atomics+0x152/0x310
[   53.243369]  kasan_atomics+0x1dc/0x310
[   53.243372]  ? __pfx_kasan_atomics+0x10/0x10
[   53.243376]  ? ktime_get_ts64+0x83/0x230
[   53.243381]  kunit_try_run_case+0x1a2/0x480
[   53.243386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.243390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.243395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.243400]  ? __kthread_parkme+0x82/0x180
[   53.243404]  ? preempt_count_sub+0x50/0x80
[   53.243409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.243413]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.243417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.243421]  kthread+0x334/0x6f0
[   53.243426]  ? trace_preempt_on+0x20/0xc0
[   53.243430]  ? __pfx_kthread+0x10/0x10
[   53.243435]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.243439]  ? calculate_sigpending+0x7b/0xa0
[   53.243443]  ? __pfx_kthread+0x10/0x10
[   53.243447]  ret_from_fork+0x3e/0x80
[   53.243452]  ? __pfx_kthread+0x10/0x10
[   53.243456]  ret_from_fork_asm+0x1a/0x30
[   53.243462]  </TASK>
[   53.243463] 
[   53.424217] Allocated by task 308:
[   53.427623]  kasan_save_stack+0x45/0x70
[   53.431464]  kasan_save_track+0x18/0x40
[   53.435311]  kasan_save_alloc_info+0x3b/0x50
[   53.439583]  __kasan_kmalloc+0xb7/0xc0
[   53.443336]  __kmalloc_cache_noprof+0x189/0x420
[   53.447868]  kasan_atomics+0x95/0x310
[   53.451534]  kunit_try_run_case+0x1a2/0x480
[   53.455738]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.461146]  kthread+0x334/0x6f0
[   53.464378]  ret_from_fork+0x3e/0x80
[   53.467955]  ret_from_fork_asm+0x1a/0x30
[   53.471881] 
[   53.473381] The buggy address belongs to the object at ffff8881061f7500
[   53.473381]  which belongs to the cache kmalloc-64 of size 64
[   53.485742] The buggy address is located 0 bytes to the right of
[   53.485742]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   53.498610] 
[   53.500108] The buggy address belongs to the physical page:
[   53.505705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   53.513745] flags: 0x200000000000000(node=0|zone=2)
[   53.518630] page_type: f5(slab)
[   53.521774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.529513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.537252] page dumped because: kasan: bad access detected
[   53.542824] 
[   53.544323] Memory state around the buggy address:
[   53.549115]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.556335]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.563553] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.570772]                                      ^
[   53.575568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.582794]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.590012] ==================================================================
[   61.886452] ==================================================================
[   61.893707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   61.901126] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   61.908519] 
[   61.910017] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   61.910024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.910026] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.910030] Call Trace:
[   61.910032]  <TASK>
[   61.910033]  dump_stack_lvl+0x73/0xb0
[   61.910037]  print_report+0xd1/0x650
[   61.910041]  ? __virt_addr_valid+0x1db/0x2d0
[   61.910045]  ? kasan_atomics_helper+0x1217/0x5450
[   61.910049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.910053]  ? kasan_atomics_helper+0x1217/0x5450
[   61.910058]  kasan_report+0x141/0x180
[   61.910062]  ? kasan_atomics_helper+0x1217/0x5450
[   61.910067]  kasan_check_range+0x10c/0x1c0
[   61.910072]  __kasan_check_write+0x18/0x20
[   61.910076]  kasan_atomics_helper+0x1217/0x5450
[   61.910080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.910085]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.910089]  ? kasan_atomics+0x152/0x310
[   61.910093]  kasan_atomics+0x1dc/0x310
[   61.910096]  ? __pfx_kasan_atomics+0x10/0x10
[   61.910100]  ? ktime_get_ts64+0x83/0x230
[   61.910105]  kunit_try_run_case+0x1a2/0x480
[   61.910109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.910114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.910118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.910123]  ? __kthread_parkme+0x82/0x180
[   61.910127]  ? preempt_count_sub+0x50/0x80
[   61.910132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.910137]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.910141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.910145]  kthread+0x334/0x6f0
[   61.910149]  ? trace_preempt_on+0x20/0xc0
[   61.910154]  ? __pfx_kthread+0x10/0x10
[   61.910158]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.910163]  ? calculate_sigpending+0x7b/0xa0
[   61.910167]  ? __pfx_kthread+0x10/0x10
[   61.910171]  ret_from_fork+0x3e/0x80
[   61.910176]  ? __pfx_kthread+0x10/0x10
[   61.910180]  ret_from_fork_asm+0x1a/0x30
[   61.910186]  </TASK>
[   61.910188] 
[   62.091193] Allocated by task 308:
[   62.094600]  kasan_save_stack+0x45/0x70
[   62.098439]  kasan_save_track+0x18/0x40
[   62.102277]  kasan_save_alloc_info+0x3b/0x50
[   62.106550]  __kasan_kmalloc+0xb7/0xc0
[   62.110304]  __kmalloc_cache_noprof+0x189/0x420
[   62.114836]  kasan_atomics+0x95/0x310
[   62.118500]  kunit_try_run_case+0x1a2/0x480
[   62.122708]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.128131]  kthread+0x334/0x6f0
[   62.131371]  ret_from_fork+0x3e/0x80
[   62.134951]  ret_from_fork_asm+0x1a/0x30
[   62.138875] 
[   62.140376] The buggy address belongs to the object at ffff8881061f7500
[   62.140376]  which belongs to the cache kmalloc-64 of size 64
[   62.152735] The buggy address is located 0 bytes to the right of
[   62.152735]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   62.165595] 
[   62.167093] The buggy address belongs to the physical page:
[   62.172666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   62.180708] flags: 0x200000000000000(node=0|zone=2)
[   62.185612] page_type: f5(slab)
[   62.188760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.196507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.204246] page dumped because: kasan: bad access detected
[   62.209817] 
[   62.211317] Memory state around the buggy address:
[   62.216110]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.223331]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.230555] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.237775]                                      ^
[   62.242568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.249786]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.257007] ==================================================================
[   61.134462] ==================================================================
[   61.141706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   61.149120] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   61.156520] 
[   61.158021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   61.158029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.158031] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.158034] Call Trace:
[   61.158036]  <TASK>
[   61.158038]  dump_stack_lvl+0x73/0xb0
[   61.158042]  print_report+0xd1/0x650
[   61.158046]  ? __virt_addr_valid+0x1db/0x2d0
[   61.158050]  ? kasan_atomics_helper+0x1148/0x5450
[   61.158054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.158058]  ? kasan_atomics_helper+0x1148/0x5450
[   61.158063]  kasan_report+0x141/0x180
[   61.158067]  ? kasan_atomics_helper+0x1148/0x5450
[   61.158072]  kasan_check_range+0x10c/0x1c0
[   61.158077]  __kasan_check_write+0x18/0x20
[   61.158081]  kasan_atomics_helper+0x1148/0x5450
[   61.158086]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.158090]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.158094]  ? kasan_atomics+0x152/0x310
[   61.158098]  kasan_atomics+0x1dc/0x310
[   61.158102]  ? __pfx_kasan_atomics+0x10/0x10
[   61.158105]  ? ktime_get_ts64+0x83/0x230
[   61.158110]  kunit_try_run_case+0x1a2/0x480
[   61.158115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.158119]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.158124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.158129]  ? __kthread_parkme+0x82/0x180
[   61.158133]  ? preempt_count_sub+0x50/0x80
[   61.158138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.158142]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.158147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.158151]  kthread+0x334/0x6f0
[   61.158155]  ? trace_preempt_on+0x20/0xc0
[   61.158160]  ? __pfx_kthread+0x10/0x10
[   61.158164]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.158168]  ? calculate_sigpending+0x7b/0xa0
[   61.158172]  ? __pfx_kthread+0x10/0x10
[   61.158177]  ret_from_fork+0x3e/0x80
[   61.158181]  ? __pfx_kthread+0x10/0x10
[   61.158186]  ret_from_fork_asm+0x1a/0x30
[   61.158191]  </TASK>
[   61.158193] 
[   61.339223] Allocated by task 308:
[   61.342628]  kasan_save_stack+0x45/0x70
[   61.346467]  kasan_save_track+0x18/0x40
[   61.350308]  kasan_save_alloc_info+0x3b/0x50
[   61.354586]  __kasan_kmalloc+0xb7/0xc0
[   61.358341]  __kmalloc_cache_noprof+0x189/0x420
[   61.362882]  kasan_atomics+0x95/0x310
[   61.366548]  kunit_try_run_case+0x1a2/0x480
[   61.370742]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.376139]  kthread+0x334/0x6f0
[   61.379373]  ret_from_fork+0x3e/0x80
[   61.382952]  ret_from_fork_asm+0x1a/0x30
[   61.386878] 
[   61.388377] The buggy address belongs to the object at ffff8881061f7500
[   61.388377]  which belongs to the cache kmalloc-64 of size 64
[   61.400742] The buggy address is located 0 bytes to the right of
[   61.400742]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   61.413607] 
[   61.415103] The buggy address belongs to the physical page:
[   61.420703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   61.428735] flags: 0x200000000000000(node=0|zone=2)
[   61.433614] page_type: f5(slab)
[   61.436762] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.444511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.452256] page dumped because: kasan: bad access detected
[   61.457829] 
[   61.459329] Memory state around the buggy address:
[   61.464122]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.471348]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.478569] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.485796]                                      ^
[   61.490587]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.497806]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.505024] ==================================================================
[   67.915853] ==================================================================
[   67.923096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   67.930491] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   67.937890] 
[   67.939392] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   67.939399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.939401] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.939405] Call Trace:
[   67.939407]  <TASK>
[   67.939408]  dump_stack_lvl+0x73/0xb0
[   67.939412]  print_report+0xd1/0x650
[   67.939416]  ? __virt_addr_valid+0x1db/0x2d0
[   67.939420]  ? kasan_atomics_helper+0x19e3/0x5450
[   67.939424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.939428]  ? kasan_atomics_helper+0x19e3/0x5450
[   67.939433]  kasan_report+0x141/0x180
[   67.939437]  ? kasan_atomics_helper+0x19e3/0x5450
[   67.939442]  kasan_check_range+0x10c/0x1c0
[   67.939447]  __kasan_check_write+0x18/0x20
[   67.939451]  kasan_atomics_helper+0x19e3/0x5450
[   67.939455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.939459]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.939463]  ? kasan_atomics+0x152/0x310
[   67.939467]  kasan_atomics+0x1dc/0x310
[   67.939471]  ? __pfx_kasan_atomics+0x10/0x10
[   67.939475]  ? ktime_get_ts64+0x83/0x230
[   67.939479]  kunit_try_run_case+0x1a2/0x480
[   67.939484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.939488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.939493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.939498]  ? __kthread_parkme+0x82/0x180
[   67.939502]  ? preempt_count_sub+0x50/0x80
[   67.939507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.939511]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.939515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.939520]  kthread+0x334/0x6f0
[   67.939524]  ? trace_preempt_on+0x20/0xc0
[   67.939529]  ? __pfx_kthread+0x10/0x10
[   67.939533]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.939537]  ? calculate_sigpending+0x7b/0xa0
[   67.939541]  ? __pfx_kthread+0x10/0x10
[   67.939546]  ret_from_fork+0x3e/0x80
[   67.939550]  ? __pfx_kthread+0x10/0x10
[   67.939554]  ret_from_fork_asm+0x1a/0x30
[   67.939560]  </TASK>
[   67.939562] 
[   68.120557] Allocated by task 308:
[   68.123964]  kasan_save_stack+0x45/0x70
[   68.127810]  kasan_save_track+0x18/0x40
[   68.131650]  kasan_save_alloc_info+0x3b/0x50
[   68.135924]  __kasan_kmalloc+0xb7/0xc0
[   68.139703]  __kmalloc_cache_noprof+0x189/0x420
[   68.144259]  kasan_atomics+0x95/0x310
[   68.147927]  kunit_try_run_case+0x1a2/0x480
[   68.152122]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.157529]  kthread+0x334/0x6f0
[   68.160760]  ret_from_fork+0x3e/0x80
[   68.164339]  ret_from_fork_asm+0x1a/0x30
[   68.168265] 
[   68.169764] The buggy address belongs to the object at ffff8881061f7500
[   68.169764]  which belongs to the cache kmalloc-64 of size 64
[   68.182096] The buggy address is located 0 bytes to the right of
[   68.182096]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   68.194957] 
[   68.196456] The buggy address belongs to the physical page:
[   68.202030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   68.210038] flags: 0x200000000000000(node=0|zone=2)
[   68.214916] page_type: f5(slab)
[   68.218064] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.225811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.233558] page dumped because: kasan: bad access detected
[   68.239130] 
[   68.240629] Memory state around the buggy address:
[   68.245422]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.252641]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.259859] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.267079]                                      ^
[   68.271873]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.279099]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.286317] ==================================================================
[   57.370133] ==================================================================
[   57.377354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   57.384666] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   57.392086] 
[   57.393584] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   57.393592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.393594] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.393597] Call Trace:
[   57.393599]  <TASK>
[   57.393601]  dump_stack_lvl+0x73/0xb0
[   57.393605]  print_report+0xd1/0x650
[   57.393609]  ? __virt_addr_valid+0x1db/0x2d0
[   57.393613]  ? kasan_atomics_helper+0xc70/0x5450
[   57.393617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.393621]  ? kasan_atomics_helper+0xc70/0x5450
[   57.393626]  kasan_report+0x141/0x180
[   57.393630]  ? kasan_atomics_helper+0xc70/0x5450
[   57.393635]  kasan_check_range+0x10c/0x1c0
[   57.393640]  __kasan_check_write+0x18/0x20
[   57.393644]  kasan_atomics_helper+0xc70/0x5450
[   57.393648]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.393653]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.393657]  ? kasan_atomics+0x152/0x310
[   57.393661]  kasan_atomics+0x1dc/0x310
[   57.393665]  ? __pfx_kasan_atomics+0x10/0x10
[   57.393669]  ? ktime_get_ts64+0x83/0x230
[   57.393691]  kunit_try_run_case+0x1a2/0x480
[   57.393695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.393700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.393717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.393722]  ? __kthread_parkme+0x82/0x180
[   57.393726]  ? preempt_count_sub+0x50/0x80
[   57.393732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.393736]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.393740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.393745]  kthread+0x334/0x6f0
[   57.393749]  ? trace_preempt_on+0x20/0xc0
[   57.393754]  ? __pfx_kthread+0x10/0x10
[   57.393758]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.393763]  ? calculate_sigpending+0x7b/0xa0
[   57.393767]  ? __pfx_kthread+0x10/0x10
[   57.393771]  ret_from_fork+0x3e/0x80
[   57.393775]  ? __pfx_kthread+0x10/0x10
[   57.393780]  ret_from_fork_asm+0x1a/0x30
[   57.393786]  </TASK>
[   57.393788] 
[   57.574440] Allocated by task 308:
[   57.577846]  kasan_save_stack+0x45/0x70
[   57.581706]  kasan_save_track+0x18/0x40
[   57.585568]  kasan_save_alloc_info+0x3b/0x50
[   57.589839]  __kasan_kmalloc+0xb7/0xc0
[   57.593592]  __kmalloc_cache_noprof+0x189/0x420
[   57.598124]  kasan_atomics+0x95/0x310
[   57.601792]  kunit_try_run_case+0x1a2/0x480
[   57.605986]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.611386]  kthread+0x334/0x6f0
[   57.614626]  ret_from_fork+0x3e/0x80
[   57.618206]  ret_from_fork_asm+0x1a/0x30
[   57.622130] 
[   57.623631] The buggy address belongs to the object at ffff8881061f7500
[   57.623631]  which belongs to the cache kmalloc-64 of size 64
[   57.635971] The buggy address is located 0 bytes to the right of
[   57.635971]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   57.648831] 
[   57.650330] The buggy address belongs to the physical page:
[   57.655902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   57.663903] flags: 0x200000000000000(node=0|zone=2)
[   57.668792] page_type: f5(slab)
[   57.671938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.679719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.687466] page dumped because: kasan: bad access detected
[   57.693038] 
[   57.694539] Memory state around the buggy address:
[   57.699331]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.706548]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.713768] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.720986]                                      ^
[   57.725781]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.733009]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.740234] ==================================================================
[   70.178881] ==================================================================
[   70.186109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   70.193502] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   70.200896] 
[   70.202397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   70.202404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.202407] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.202410] Call Trace:
[   70.202412]  <TASK>
[   70.202414]  dump_stack_lvl+0x73/0xb0
[   70.202417]  print_report+0xd1/0x650
[   70.202422]  ? __virt_addr_valid+0x1db/0x2d0
[   70.202425]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.202429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.202434]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.202438]  kasan_report+0x141/0x180
[   70.202443]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.202448]  kasan_check_range+0x10c/0x1c0
[   70.202452]  __kasan_check_write+0x18/0x20
[   70.202456]  kasan_atomics_helper+0x1d7a/0x5450
[   70.202461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.202465]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.202469]  ? kasan_atomics+0x152/0x310
[   70.202473]  kasan_atomics+0x1dc/0x310
[   70.202476]  ? __pfx_kasan_atomics+0x10/0x10
[   70.202480]  ? ktime_get_ts64+0x83/0x230
[   70.202485]  kunit_try_run_case+0x1a2/0x480
[   70.202489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.202494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.202498]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.202503]  ? __kthread_parkme+0x82/0x180
[   70.202507]  ? preempt_count_sub+0x50/0x80
[   70.202512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.202516]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.202521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.202525]  kthread+0x334/0x6f0
[   70.202529]  ? trace_preempt_on+0x20/0xc0
[   70.202533]  ? __pfx_kthread+0x10/0x10
[   70.202538]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.202542]  ? calculate_sigpending+0x7b/0xa0
[   70.202546]  ? __pfx_kthread+0x10/0x10
[   70.202550]  ret_from_fork+0x3e/0x80
[   70.202555]  ? __pfx_kthread+0x10/0x10
[   70.202559]  ret_from_fork_asm+0x1a/0x30
[   70.202565]  </TASK>
[   70.202566] 
[   70.383535] Allocated by task 308:
[   70.386943]  kasan_save_stack+0x45/0x70
[   70.390781]  kasan_save_track+0x18/0x40
[   70.394619]  kasan_save_alloc_info+0x3b/0x50
[   70.398892]  __kasan_kmalloc+0xb7/0xc0
[   70.402645]  __kmalloc_cache_noprof+0x189/0x420
[   70.407179]  kasan_atomics+0x95/0x310
[   70.410844]  kunit_try_run_case+0x1a2/0x480
[   70.415028]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.420427]  kthread+0x334/0x6f0
[   70.423660]  ret_from_fork+0x3e/0x80
[   70.427266]  ret_from_fork_asm+0x1a/0x30
[   70.431192] 
[   70.432707] The buggy address belongs to the object at ffff8881061f7500
[   70.432707]  which belongs to the cache kmalloc-64 of size 64
[   70.445066] The buggy address is located 0 bytes to the right of
[   70.445066]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   70.457929] 
[   70.459425] The buggy address belongs to the physical page:
[   70.465001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   70.473006] flags: 0x200000000000000(node=0|zone=2)
[   70.477885] page_type: f5(slab)
[   70.481034] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.488781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.496527] page dumped because: kasan: bad access detected
[   70.502100] 
[   70.503599] Memory state around the buggy address:
[   70.508392]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.515618]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.522837] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.530057]                                      ^
[   70.534849]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.542069]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.549287] ==================================================================
[   60.760266] ==================================================================
[   60.767501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   60.774901] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   60.782214] 
[   60.783737] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   60.783745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.783747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.783750] Call Trace:
[   60.783752]  <TASK>
[   60.783754]  dump_stack_lvl+0x73/0xb0
[   60.783757]  print_report+0xd1/0x650
[   60.783762]  ? __virt_addr_valid+0x1db/0x2d0
[   60.783766]  ? kasan_atomics_helper+0x4a1c/0x5450
[   60.783770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.783774]  ? kasan_atomics_helper+0x4a1c/0x5450
[   60.783778]  kasan_report+0x141/0x180
[   60.783782]  ? kasan_atomics_helper+0x4a1c/0x5450
[   60.783788]  __asan_report_load4_noabort+0x18/0x20
[   60.783791]  kasan_atomics_helper+0x4a1c/0x5450
[   60.783796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.783800]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.783804]  ? kasan_atomics+0x152/0x310
[   60.783808]  kasan_atomics+0x1dc/0x310
[   60.783812]  ? __pfx_kasan_atomics+0x10/0x10
[   60.783816]  ? ktime_get_ts64+0x83/0x230
[   60.783821]  kunit_try_run_case+0x1a2/0x480
[   60.783825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.783830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.783834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.783839]  ? __kthread_parkme+0x82/0x180
[   60.783843]  ? preempt_count_sub+0x50/0x80
[   60.783848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.783853]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.783857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.783861]  kthread+0x334/0x6f0
[   60.783865]  ? trace_preempt_on+0x20/0xc0
[   60.783870]  ? __pfx_kthread+0x10/0x10
[   60.783874]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.783879]  ? calculate_sigpending+0x7b/0xa0
[   60.783883]  ? __pfx_kthread+0x10/0x10
[   60.783887]  ret_from_fork+0x3e/0x80
[   60.783891]  ? __pfx_kthread+0x10/0x10
[   60.783896]  ret_from_fork_asm+0x1a/0x30
[   60.783901]  </TASK>
[   60.783903] 
[   60.961460] Allocated by task 308:
[   60.964867]  kasan_save_stack+0x45/0x70
[   60.968737]  kasan_save_track+0x18/0x40
[   60.972579]  kasan_save_alloc_info+0x3b/0x50
[   60.976853]  __kasan_kmalloc+0xb7/0xc0
[   60.980613]  __kmalloc_cache_noprof+0x189/0x420
[   60.985145]  kasan_atomics+0x95/0x310
[   60.988810]  kunit_try_run_case+0x1a2/0x480
[   60.992995]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.998397]  kthread+0x334/0x6f0
[   61.001636]  ret_from_fork+0x3e/0x80
[   61.005214]  ret_from_fork_asm+0x1a/0x30
[   61.009141] 
[   61.010641] The buggy address belongs to the object at ffff8881061f7500
[   61.010641]  which belongs to the cache kmalloc-64 of size 64
[   61.022981] The buggy address is located 0 bytes to the right of
[   61.022981]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   61.035842] 
[   61.037343] The buggy address belongs to the physical page:
[   61.042914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   61.050912] flags: 0x200000000000000(node=0|zone=2)
[   61.055792] page_type: f5(slab)
[   61.058938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.066716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.074467] page dumped because: kasan: bad access detected
[   61.080042] 
[   61.081539] Memory state around the buggy address:
[   61.086333]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.093551]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.100771] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.107989]                                      ^
[   61.112782]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.119999]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.127218] ==================================================================
[   55.106458] ==================================================================
[   55.113707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   55.121037] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   55.128431] 
[   55.129931] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   55.129939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.129941] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.129945] Call Trace:
[   55.129946]  <TASK>
[   55.129948]  dump_stack_lvl+0x73/0xb0
[   55.129952]  print_report+0xd1/0x650
[   55.129956]  ? __virt_addr_valid+0x1db/0x2d0
[   55.129960]  ? kasan_atomics_helper+0x860/0x5450
[   55.129964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.129969]  ? kasan_atomics_helper+0x860/0x5450
[   55.129973]  kasan_report+0x141/0x180
[   55.129978]  ? kasan_atomics_helper+0x860/0x5450
[   55.129983]  kasan_check_range+0x10c/0x1c0
[   55.129988]  __kasan_check_write+0x18/0x20
[   55.129992]  kasan_atomics_helper+0x860/0x5450
[   55.129996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.130000]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.130004]  ? kasan_atomics+0x152/0x310
[   55.130009]  kasan_atomics+0x1dc/0x310
[   55.130012]  ? __pfx_kasan_atomics+0x10/0x10
[   55.130016]  ? ktime_get_ts64+0x83/0x230
[   55.130021]  kunit_try_run_case+0x1a2/0x480
[   55.130026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.130030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.130035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.130040]  ? __kthread_parkme+0x82/0x180
[   55.130044]  ? preempt_count_sub+0x50/0x80
[   55.130049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.130054]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.130058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.130062]  kthread+0x334/0x6f0
[   55.130067]  ? trace_preempt_on+0x20/0xc0
[   55.130071]  ? __pfx_kthread+0x10/0x10
[   55.130076]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.130080]  ? calculate_sigpending+0x7b/0xa0
[   55.130084]  ? __pfx_kthread+0x10/0x10
[   55.130089]  ret_from_fork+0x3e/0x80
[   55.130093]  ? __pfx_kthread+0x10/0x10
[   55.130098]  ret_from_fork_asm+0x1a/0x30
[   55.130104]  </TASK>
[   55.130105] 
[   55.310856] Allocated by task 308:
[   55.314262]  kasan_save_stack+0x45/0x70
[   55.318109]  kasan_save_track+0x18/0x40
[   55.321949]  kasan_save_alloc_info+0x3b/0x50
[   55.326230]  __kasan_kmalloc+0xb7/0xc0
[   55.329990]  __kmalloc_cache_noprof+0x189/0x420
[   55.334523]  kasan_atomics+0x95/0x310
[   55.338189]  kunit_try_run_case+0x1a2/0x480
[   55.342375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.347774]  kthread+0x334/0x6f0
[   55.351005]  ret_from_fork+0x3e/0x80
[   55.354585]  ret_from_fork_asm+0x1a/0x30
[   55.358511] 
[   55.360009] The buggy address belongs to the object at ffff8881061f7500
[   55.360009]  which belongs to the cache kmalloc-64 of size 64
[   55.372342] The buggy address is located 0 bytes to the right of
[   55.372342]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   55.385205] 
[   55.386706] The buggy address belongs to the physical page:
[   55.392275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   55.400281] flags: 0x200000000000000(node=0|zone=2)
[   55.405162] page_type: f5(slab)
[   55.408308] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.416047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.423794] page dumped because: kasan: bad access detected
[   55.429368] 
[   55.430866] Memory state around the buggy address:
[   55.435658]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.442877]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.450097] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.457316]                                      ^
[   55.462109]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.469335]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.476554] ==================================================================
[   50.211763] ==================================================================
[   50.226645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   50.234051] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   50.241360] 
[   50.242861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   50.242869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.242872] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.242875] Call Trace:
[   50.242877]  <TASK>
[   50.242879]  dump_stack_lvl+0x73/0xb0
[   50.242884]  print_report+0xd1/0x650
[   50.242888]  ? __virt_addr_valid+0x1db/0x2d0
[   50.242892]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.242896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.242901]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.242905]  kasan_report+0x141/0x180
[   50.242910]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.242915]  __asan_report_load4_noabort+0x18/0x20
[   50.242919]  kasan_atomics_helper+0x4bbc/0x5450
[   50.242923]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.242927]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.242931]  ? kasan_atomics+0x152/0x310
[   50.242935]  kasan_atomics+0x1dc/0x310
[   50.242939]  ? __pfx_kasan_atomics+0x10/0x10
[   50.242943]  ? ktime_get_ts64+0x83/0x230
[   50.242948]  kunit_try_run_case+0x1a2/0x480
[   50.242952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.242957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.242961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.242966]  ? __kthread_parkme+0x82/0x180
[   50.242970]  ? preempt_count_sub+0x50/0x80
[   50.242975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.242980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.242984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.242988]  kthread+0x334/0x6f0
[   50.242993]  ? trace_preempt_on+0x20/0xc0
[   50.242997]  ? __pfx_kthread+0x10/0x10
[   50.243002]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.243006]  ? calculate_sigpending+0x7b/0xa0
[   50.243010]  ? __pfx_kthread+0x10/0x10
[   50.243015]  ret_from_fork+0x3e/0x80
[   50.243019]  ? __pfx_kthread+0x10/0x10
[   50.243023]  ret_from_fork_asm+0x1a/0x30
[   50.243029]  </TASK>
[   50.243031] 
[   50.420629] Allocated by task 308:
[   50.424036]  kasan_save_stack+0x45/0x70
[   50.427882]  kasan_save_track+0x18/0x40
[   50.431722]  kasan_save_alloc_info+0x3b/0x50
[   50.436020]  __kasan_kmalloc+0xb7/0xc0
[   50.439774]  __kmalloc_cache_noprof+0x189/0x420
[   50.444313]  kasan_atomics+0x95/0x310
[   50.447978]  kunit_try_run_case+0x1a2/0x480
[   50.452165]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.457564]  kthread+0x334/0x6f0
[   50.460796]  ret_from_fork+0x3e/0x80
[   50.464377]  ret_from_fork_asm+0x1a/0x30
[   50.468309] 
[   50.469809] The buggy address belongs to the object at ffff8881061f7500
[   50.469809]  which belongs to the cache kmalloc-64 of size 64
[   50.482151] The buggy address is located 0 bytes to the right of
[   50.482151]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   50.495011] 
[   50.496512] The buggy address belongs to the physical page:
[   50.502085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   50.510089] flags: 0x200000000000000(node=0|zone=2)
[   50.514969] page_type: f5(slab)
[   50.518118] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   50.525864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.533610] page dumped because: kasan: bad access detected
[   50.539183] 
[   50.540703] Memory state around the buggy address:
[   50.545502]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.552740]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.559966] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.567185]                                      ^
[   50.571977]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.579197]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.586422] ==================================================================
[   62.638486] ==================================================================
[   62.645737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   62.653131] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   62.660525] 
[   62.662025] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   62.662033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.662035] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.662038] Call Trace:
[   62.662040]  <TASK>
[   62.662041]  dump_stack_lvl+0x73/0xb0
[   62.662045]  print_report+0xd1/0x650
[   62.662049]  ? __virt_addr_valid+0x1db/0x2d0
[   62.662053]  ? kasan_atomics_helper+0x12e6/0x5450
[   62.662057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.662062]  ? kasan_atomics_helper+0x12e6/0x5450
[   62.662066]  kasan_report+0x141/0x180
[   62.662070]  ? kasan_atomics_helper+0x12e6/0x5450
[   62.662075]  kasan_check_range+0x10c/0x1c0
[   62.662080]  __kasan_check_write+0x18/0x20
[   62.662084]  kasan_atomics_helper+0x12e6/0x5450
[   62.662088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.662093]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.662097]  ? kasan_atomics+0x152/0x310
[   62.662101]  kasan_atomics+0x1dc/0x310
[   62.662104]  ? __pfx_kasan_atomics+0x10/0x10
[   62.662108]  ? ktime_get_ts64+0x83/0x230
[   62.662113]  kunit_try_run_case+0x1a2/0x480
[   62.662117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.662122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.662126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.662131]  ? __kthread_parkme+0x82/0x180
[   62.662136]  ? preempt_count_sub+0x50/0x80
[   62.662140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.662145]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.662149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.662153]  kthread+0x334/0x6f0
[   62.662158]  ? trace_preempt_on+0x20/0xc0
[   62.662162]  ? __pfx_kthread+0x10/0x10
[   62.662167]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.662171]  ? calculate_sigpending+0x7b/0xa0
[   62.662175]  ? __pfx_kthread+0x10/0x10
[   62.662180]  ret_from_fork+0x3e/0x80
[   62.662184]  ? __pfx_kthread+0x10/0x10
[   62.662188]  ret_from_fork_asm+0x1a/0x30
[   62.662194]  </TASK>
[   62.662196] 
[   62.843226] Allocated by task 308:
[   62.846634]  kasan_save_stack+0x45/0x70
[   62.850481]  kasan_save_track+0x18/0x40
[   62.854318]  kasan_save_alloc_info+0x3b/0x50
[   62.858592]  __kasan_kmalloc+0xb7/0xc0
[   62.862345]  __kmalloc_cache_noprof+0x189/0x420
[   62.866876]  kasan_atomics+0x95/0x310
[   62.870542]  kunit_try_run_case+0x1a2/0x480
[   62.874749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.880155]  kthread+0x334/0x6f0
[   62.883396]  ret_from_fork+0x3e/0x80
[   62.886984]  ret_from_fork_asm+0x1a/0x30
[   62.890917] 
[   62.892416] The buggy address belongs to the object at ffff8881061f7500
[   62.892416]  which belongs to the cache kmalloc-64 of size 64
[   62.904756] The buggy address is located 0 bytes to the right of
[   62.904756]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   62.917618] 
[   62.919118] The buggy address belongs to the physical page:
[   62.924717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   62.932735] flags: 0x200000000000000(node=0|zone=2)
[   62.937619] page_type: f5(slab)
[   62.940768] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.948514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.956261] page dumped because: kasan: bad access detected
[   62.961833] 
[   62.963333] Memory state around the buggy address:
[   62.968127]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.975353]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.982571] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.989790]                                      ^
[   62.994584]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.001812]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.009031] ==================================================================
[   70.934251] ==================================================================
[   70.941480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   70.948880] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   70.956273] 
[   70.957774] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   70.957782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.957784] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.957787] Call Trace:
[   70.957789]  <TASK>
[   70.957791]  dump_stack_lvl+0x73/0xb0
[   70.957795]  print_report+0xd1/0x650
[   70.957799]  ? __virt_addr_valid+0x1db/0x2d0
[   70.957803]  ? kasan_atomics_helper+0x1eaa/0x5450
[   70.957807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.957811]  ? kasan_atomics_helper+0x1eaa/0x5450
[   70.957816]  kasan_report+0x141/0x180
[   70.957820]  ? kasan_atomics_helper+0x1eaa/0x5450
[   70.957825]  kasan_check_range+0x10c/0x1c0
[   70.957830]  __kasan_check_write+0x18/0x20
[   70.957834]  kasan_atomics_helper+0x1eaa/0x5450
[   70.957838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.957843]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.957847]  ? kasan_atomics+0x152/0x310
[   70.957851]  kasan_atomics+0x1dc/0x310
[   70.957854]  ? __pfx_kasan_atomics+0x10/0x10
[   70.957858]  ? ktime_get_ts64+0x83/0x230
[   70.957863]  kunit_try_run_case+0x1a2/0x480
[   70.957867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.957872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.957876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.957881]  ? __kthread_parkme+0x82/0x180
[   70.957885]  ? preempt_count_sub+0x50/0x80
[   70.957890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.957895]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.957899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.957903]  kthread+0x334/0x6f0
[   70.957907]  ? trace_preempt_on+0x20/0xc0
[   70.957912]  ? __pfx_kthread+0x10/0x10
[   70.957916]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.957921]  ? calculate_sigpending+0x7b/0xa0
[   70.957925]  ? __pfx_kthread+0x10/0x10
[   70.957929]  ret_from_fork+0x3e/0x80
[   70.957933]  ? __pfx_kthread+0x10/0x10
[   70.957938]  ret_from_fork_asm+0x1a/0x30
[   70.957944]  </TASK>
[   70.957945] 
[   71.138912] Allocated by task 308:
[   71.142321]  kasan_save_stack+0x45/0x70
[   71.146167]  kasan_save_track+0x18/0x40
[   71.150006]  kasan_save_alloc_info+0x3b/0x50
[   71.154279]  __kasan_kmalloc+0xb7/0xc0
[   71.158032]  __kmalloc_cache_noprof+0x189/0x420
[   71.162563]  kasan_atomics+0x95/0x310
[   71.166231]  kunit_try_run_case+0x1a2/0x480
[   71.170424]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.175823]  kthread+0x334/0x6f0
[   71.179056]  ret_from_fork+0x3e/0x80
[   71.182635]  ret_from_fork_asm+0x1a/0x30
[   71.186561] 
[   71.188060] The buggy address belongs to the object at ffff8881061f7500
[   71.188060]  which belongs to the cache kmalloc-64 of size 64
[   71.200402] The buggy address is located 0 bytes to the right of
[   71.200402]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   71.213263] 
[   71.214693] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[   71.214760] The buggy address belongs to the physical page:
[   71.220854] rcu: 	2-....: (54 ticks this GP) idle=3e8c/1/0x4000000000000000 softirq=317/318 fqs=230
[   71.226423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   71.235455] rcu: 	(detected by 1, t=21023 jiffies, g=-359, q=45 ncpus=4)
[   71.243444] flags: 0x200000000000000(node=0|zone=2)
[   71.250136] Sending NMI from CPU 1 to CPUs 2:
[   71.250143] NMI backtrace for cpu 2
[   71.250146] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   71.250154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.250156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.250160] RIP: 0010:io_serial_out+0x6c/0xa0
[   71.250166] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 af 5b 07 ff 8b
[   71.250174] RSP: 0000:ffff8881080272e0 EFLAGS: 00000006
[   71.250179] RAX: 0000000000000000 RBX: ffffffffbb4d8b80 RCX: 1ffffffff769b171
[   71.250183] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffbb4d8b88
[   71.250187] RBP: ffff8881080272f0 R08: 0000000000000001 R09: ffffffffbb434940
[   71.250190] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000
[   71.250194] R13: ffffffffbb4d8de0 R14: ffffffffba5ce9c0 R15: ffffffffbb4d8b80
[   71.250198] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[   71.250202] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   71.250206] CR2: 0000000000000000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[   71.250210] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[   71.250213] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   71.250217] Call Trace:
[   71.250218]  <TASK>
[   71.250221]  serial8250_clear_IER+0x8c/0xb0
[   71.250226]  serial8250_console_write+0x1bd/0x1810
[   71.250231]  ? __pfx_serial8250_console_write+0x10/0x10
[   71.250236]  ? __kasan_check_write+0x18/0x20
[   71.250240]  ? _raw_spin_lock+0x8b/0xe0
[   71.250245]  ? __pfx__raw_spin_lock+0x10/0x10
[   71.250250]  univ8250_console_write+0x57/0x80
[   71.250254]  ? _raw_spin_unlock+0x41/0x70
[   71.250258]  console_flush_all+0x57b/0xc00
[   71.250263]  ? __pfx_console_flush_all+0x10/0x10
[   71.250268]  ? __pfx_vprintk_store+0x10/0x10
[   71.250273]  ? __kasan_check_read+0x15/0x20
[   71.250277]  console_unlock+0xf2/0x1f0
[   71.250281]  ? __pfx_console_unlock+0x10/0x10
[   71.250285]  ? __kasan_check_write+0x18/0x20
[   71.250289]  ? _raw_spin_lock+0x8b/0xe0
[   71.250294]  vprintk_emit+0x1e9/0x480
[   71.250299]  ? __pfx_vprintk_emit+0x10/0x10
[   71.250303]  ? _raw_spin_unlock+0x41/0x70
[   71.250308]  vprintk_default+0x21/0x30
[   71.250312]  vprintk+0x12/0x20
[   71.250316]  _printk+0xc3/0xf0
[   71.250319]  ? __pfx__printk+0x10/0x10
[   71.250323]  ? __pfx_vprintk_store+0x10/0x10
[   71.250328]  __dump_page+0x33a/0x8d0
[   71.250333]  ? __pfx___dump_page+0x10/0x10
[   71.250337]  ? __kasan_check_write+0x18/0x20
[   71.250344]  ? _printk+0xc3/0xf0
[   71.250347]  ? __pfx__printk+0x10/0x10
[   71.250351]  ? ret_from_fork_asm+0x1a/0x30
[   71.250356]  dump_page+0x3a/0x80
[   71.250360]  ? dump_page+0x3a/0x80
[   71.250364]  print_report+0x26e/0x650
[   71.250368]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.250373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.250377]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.250381]  kasan_report+0x141/0x180
[   71.250386]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.250391]  kasan_check_range+0x10c/0x1c0
[   71.250396]  __kasan_check_write+0x18/0x20
[   71.250399]  kasan_atomics_helper+0x1eaa/0x5450
[   71.250404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.250408]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.250412]  ? kasan_atomics+0x152/0x310
[   71.250416]  kasan_atomics+0x1dc/0x310
[   71.250420]  ? __pfx_kasan_atomics+0x10/0x10
[   71.250424]  ? ktime_get_ts64+0x83/0x230
[   71.250429]  kunit_try_run_case+0x1a2/0x480
[   71.250433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.250438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.250442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.250447]  ? __kthread_parkme+0x82/0x180
[   71.250452]  ? preempt_count_sub+0x50/0x80
[   71.250456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.250461]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.250465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.250470]  kthread+0x334/0x6f0
[   71.250474]  ? trace_preempt_on+0x20/0xc0
[   71.250478]  ? __pfx_kthread+0x10/0x10
[   71.250483]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.250487]  ? calculate_sigpending+0x7b/0xa0
[   71.250492]  ? __pfx_kthread+0x10/0x10
[   71.250496]  ret_from_fork+0x3e/0x80
[   71.250501]  ? __pfx_kthread+0x10/0x10
[   71.250505]  ret_from_fork_asm+0x1a/0x30
[   71.250511]  </TASK>
[   71.661921] page_type: f5(slab)
[   71.665079] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   71.672826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.680564] page dumped because: kasan: bad access detected
[   71.686138] 
[   71.687636] Memory state around the buggy address:
[   71.692428]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.699648]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.706865] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.714084]                                      ^
[   71.718878]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.726096]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.733317] ==================================================================
[   72.118425] ==================================================================
[   72.125656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   72.133056] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   72.140363] 
[   72.141861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   72.141869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.141871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.141874] Call Trace:
[   72.141876]  <TASK>
[   72.141878]  dump_stack_lvl+0x73/0xb0
[   72.141881]  print_report+0xd1/0x650
[   72.141886]  ? __virt_addr_valid+0x1db/0x2d0
[   72.141890]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.141894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.141898]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.141903]  kasan_report+0x141/0x180
[   72.141907]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.141912]  __asan_report_load8_noabort+0x18/0x20
[   72.141916]  kasan_atomics_helper+0x4f71/0x5450
[   72.141921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.141925]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.141929]  ? kasan_atomics+0x152/0x310
[   72.141933]  kasan_atomics+0x1dc/0x310
[   72.141937]  ? __pfx_kasan_atomics+0x10/0x10
[   72.141940]  ? ktime_get_ts64+0x83/0x230
[   72.141945]  kunit_try_run_case+0x1a2/0x480
[   72.141950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.141954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.141959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.141963]  ? __kthread_parkme+0x82/0x180
[   72.141968]  ? preempt_count_sub+0x50/0x80
[   72.141972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.141977]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.141981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.141985]  kthread+0x334/0x6f0
[   72.141990]  ? trace_preempt_on+0x20/0xc0
[   72.141994]  ? __pfx_kthread+0x10/0x10
[   72.141999]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.142003]  ? calculate_sigpending+0x7b/0xa0
[   72.142007]  ? __pfx_kthread+0x10/0x10
[   72.142011]  ret_from_fork+0x3e/0x80
[   72.142015]  ? __pfx_kthread+0x10/0x10
[   72.142020]  ret_from_fork_asm+0x1a/0x30
[   72.142026]  </TASK>
[   72.142027] 
[   72.319555] Allocated by task 308:
[   72.322959]  kasan_save_stack+0x45/0x70
[   72.326799]  kasan_save_track+0x18/0x40
[   72.330640]  kasan_save_alloc_info+0x3b/0x50
[   72.334920]  __kasan_kmalloc+0xb7/0xc0
[   72.338688]  __kmalloc_cache_noprof+0x189/0x420
[   72.343231]  kasan_atomics+0x95/0x310
[   72.346896]  kunit_try_run_case+0x1a2/0x480
[   72.351083]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.356489]  kthread+0x334/0x6f0
[   72.359738]  ret_from_fork+0x3e/0x80
[   72.363318]  ret_from_fork_asm+0x1a/0x30
[   72.367245] 
[   72.368747] The buggy address belongs to the object at ffff8881061f7500
[   72.368747]  which belongs to the cache kmalloc-64 of size 64
[   72.381086] The buggy address is located 0 bytes to the right of
[   72.381086]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   72.393946] 
[   72.395446] The buggy address belongs to the physical page:
[   72.401016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   72.409016] flags: 0x200000000000000(node=0|zone=2)
[   72.413894] page_type: f5(slab)
[   72.417043] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.424789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.432528] page dumped because: kasan: bad access detected
[   72.438099] 
[   72.439599] Memory state around the buggy address:
[   72.444391]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.451613]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.458838] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.466059]                                      ^
[   72.470852]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.478069]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.485286] ==================================================================
[   56.238232] ==================================================================
[   56.245459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   56.252767] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   56.260168] 
[   56.261667] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   56.261692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.261694] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.261697] Call Trace:
[   56.261699]  <TASK>
[   56.261701]  dump_stack_lvl+0x73/0xb0
[   56.261717]  print_report+0xd1/0x650
[   56.261721]  ? __virt_addr_valid+0x1db/0x2d0
[   56.261725]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.261729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.261734]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.261738]  kasan_report+0x141/0x180
[   56.261742]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.261747]  kasan_check_range+0x10c/0x1c0
[   56.261752]  __kasan_check_write+0x18/0x20
[   56.261756]  kasan_atomics_helper+0xa2b/0x5450
[   56.261760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.261765]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.261769]  ? kasan_atomics+0x152/0x310
[   56.261773]  kasan_atomics+0x1dc/0x310
[   56.261776]  ? __pfx_kasan_atomics+0x10/0x10
[   56.261780]  ? ktime_get_ts64+0x83/0x230
[   56.261785]  kunit_try_run_case+0x1a2/0x480
[   56.261789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.261793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.261798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.261803]  ? __kthread_parkme+0x82/0x180
[   56.261807]  ? preempt_count_sub+0x50/0x80
[   56.261812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.261816]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.261821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.261825]  kthread+0x334/0x6f0
[   56.261829]  ? trace_preempt_on+0x20/0xc0
[   56.261833]  ? __pfx_kthread+0x10/0x10
[   56.261838]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.261842]  ? calculate_sigpending+0x7b/0xa0
[   56.261846]  ? __pfx_kthread+0x10/0x10
[   56.261851]  ret_from_fork+0x3e/0x80
[   56.261855]  ? __pfx_kthread+0x10/0x10
[   56.261859]  ret_from_fork_asm+0x1a/0x30
[   56.261865]  </TASK>
[   56.261867] 
[   56.442616] Allocated by task 308:
[   56.446022]  kasan_save_stack+0x45/0x70
[   56.449863]  kasan_save_track+0x18/0x40
[   56.453711]  kasan_save_alloc_info+0x3b/0x50
[   56.457982]  __kasan_kmalloc+0xb7/0xc0
[   56.461743]  __kmalloc_cache_noprof+0x189/0x420
[   56.466278]  kasan_atomics+0x95/0x310
[   56.469941]  kunit_try_run_case+0x1a2/0x480
[   56.474128]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.479527]  kthread+0x334/0x6f0
[   56.482761]  ret_from_fork+0x3e/0x80
[   56.486347]  ret_from_fork_asm+0x1a/0x30
[   56.490272] 
[   56.491773] The buggy address belongs to the object at ffff8881061f7500
[   56.491773]  which belongs to the cache kmalloc-64 of size 64
[   56.504114] The buggy address is located 0 bytes to the right of
[   56.504114]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   56.516975] 
[   56.518475] The buggy address belongs to the physical page:
[   56.524047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   56.532052] flags: 0x200000000000000(node=0|zone=2)
[   56.536932] page_type: f5(slab)
[   56.540081] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.547826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.555565] page dumped because: kasan: bad access detected
[   56.561136] 
[   56.562637] Memory state around the buggy address:
[   56.567428]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.574647]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.581867] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.589085]                                      ^
[   56.593880]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.601106]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.608326] ==================================================================
[   66.782868] ==================================================================
[   66.790105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   66.797497] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   66.804898] 
[   66.806397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   66.806404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.806406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.806410] Call Trace:
[   66.806412]  <TASK>
[   66.806413]  dump_stack_lvl+0x73/0xb0
[   66.806417]  print_report+0xd1/0x650
[   66.806421]  ? __virt_addr_valid+0x1db/0x2d0
[   66.806425]  ? kasan_atomics_helper+0x1818/0x5450
[   66.806429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.806434]  ? kasan_atomics_helper+0x1818/0x5450
[   66.806438]  kasan_report+0x141/0x180
[   66.806443]  ? kasan_atomics_helper+0x1818/0x5450
[   66.806448]  kasan_check_range+0x10c/0x1c0
[   66.806453]  __kasan_check_write+0x18/0x20
[   66.806456]  kasan_atomics_helper+0x1818/0x5450
[   66.806461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.806465]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.806469]  ? kasan_atomics+0x152/0x310
[   66.806474]  kasan_atomics+0x1dc/0x310
[   66.806477]  ? __pfx_kasan_atomics+0x10/0x10
[   66.806481]  ? ktime_get_ts64+0x83/0x230
[   66.806486]  kunit_try_run_case+0x1a2/0x480
[   66.806491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.806495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.806500]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.806505]  ? __kthread_parkme+0x82/0x180
[   66.806509]  ? preempt_count_sub+0x50/0x80
[   66.806514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.806518]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.806522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.806527]  kthread+0x334/0x6f0
[   66.806531]  ? trace_preempt_on+0x20/0xc0
[   66.806535]  ? __pfx_kthread+0x10/0x10
[   66.806540]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.806544]  ? calculate_sigpending+0x7b/0xa0
[   66.806548]  ? __pfx_kthread+0x10/0x10
[   66.806553]  ret_from_fork+0x3e/0x80
[   66.806557]  ? __pfx_kthread+0x10/0x10
[   66.806561]  ret_from_fork_asm+0x1a/0x30
[   66.806567]  </TASK>
[   66.806569] 
[   66.987479] Allocated by task 308:
[   66.990885]  kasan_save_stack+0x45/0x70
[   66.994736]  kasan_save_track+0x18/0x40
[   66.998579]  kasan_save_alloc_info+0x3b/0x50
[   67.002853]  __kasan_kmalloc+0xb7/0xc0
[   67.006604]  __kmalloc_cache_noprof+0x189/0x420
[   67.011136]  kasan_atomics+0x95/0x310
[   67.014802]  kunit_try_run_case+0x1a2/0x480
[   67.018987]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.024388]  kthread+0x334/0x6f0
[   67.027620]  ret_from_fork+0x3e/0x80
[   67.031199]  ret_from_fork_asm+0x1a/0x30
[   67.035124] 
[   67.036624] The buggy address belongs to the object at ffff8881061f7500
[   67.036624]  which belongs to the cache kmalloc-64 of size 64
[   67.048966] The buggy address is located 0 bytes to the right of
[   67.048966]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   67.061825] 
[   67.063325] The buggy address belongs to the physical page:
[   67.068899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   67.076905] flags: 0x200000000000000(node=0|zone=2)
[   67.081784] page_type: f5(slab)
[   67.084932] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.092689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.100461] page dumped because: kasan: bad access detected
[   67.106032] 
[   67.107532] Memory state around the buggy address:
[   67.112325]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.119543]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.126764] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.133982]                                      ^
[   67.138774]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.145992]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.153213] ==================================================================
[   71.740559] ==================================================================
[   71.747790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   71.755189] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   71.762581] 
[   71.764084] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   71.764092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.764094] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.764097] Call Trace:
[   71.764099]  <TASK>
[   71.764101]  dump_stack_lvl+0x73/0xb0
[   71.764105]  print_report+0xd1/0x650
[   71.764109]  ? __virt_addr_valid+0x1db/0x2d0
[   71.764113]  ? kasan_atomics_helper+0x1f43/0x5450
[   71.764117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.764121]  ? kasan_atomics_helper+0x1f43/0x5450
[   71.764126]  kasan_report+0x141/0x180
[   71.764130]  ? kasan_atomics_helper+0x1f43/0x5450
[   71.764135]  kasan_check_range+0x10c/0x1c0
[   71.764140]  __kasan_check_write+0x18/0x20
[   71.764144]  kasan_atomics_helper+0x1f43/0x5450
[   71.764148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.764152]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.764156]  ? kasan_atomics+0x152/0x310
[   71.764161]  kasan_atomics+0x1dc/0x310
[   71.764164]  ? __pfx_kasan_atomics+0x10/0x10
[   71.764168]  ? ktime_get_ts64+0x83/0x230
[   71.764173]  kunit_try_run_case+0x1a2/0x480
[   71.764177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.764182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.764186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.764191]  ? __kthread_parkme+0x82/0x180
[   71.764195]  ? preempt_count_sub+0x50/0x80
[   71.764200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.764205]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.764209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.764213]  kthread+0x334/0x6f0
[   71.764218]  ? trace_preempt_on+0x20/0xc0
[   71.764222]  ? __pfx_kthread+0x10/0x10
[   71.764227]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.764231]  ? calculate_sigpending+0x7b/0xa0
[   71.764235]  ? __pfx_kthread+0x10/0x10
[   71.764239]  ret_from_fork+0x3e/0x80
[   71.764243]  ? __pfx_kthread+0x10/0x10
[   71.764248]  ret_from_fork_asm+0x1a/0x30
[   71.764254]  </TASK>
[   71.764255] 
[   71.945414] Allocated by task 308:
[   71.948820]  kasan_save_stack+0x45/0x70
[   71.952660]  kasan_save_track+0x18/0x40
[   71.956533]  kasan_save_alloc_info+0x3b/0x50
[   71.960805]  __kasan_kmalloc+0xb7/0xc0
[   71.964557]  __kmalloc_cache_noprof+0x189/0x420
[   71.969089]  kasan_atomics+0x95/0x310
[   71.972757]  kunit_try_run_case+0x1a2/0x480
[   71.976951]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.982359]  kthread+0x334/0x6f0
[   71.985592]  ret_from_fork+0x3e/0x80
[   71.989171]  ret_from_fork_asm+0x1a/0x30
[   71.993105] 
[   71.994605] The buggy address belongs to the object at ffff8881061f7500
[   71.994605]  which belongs to the cache kmalloc-64 of size 64
[   72.006943] The buggy address is located 0 bytes to the right of
[   72.006943]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   72.019806] 
[   72.021306] The buggy address belongs to the physical page:
[   72.026878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   72.034886] flags: 0x200000000000000(node=0|zone=2)
[   72.039763] page_type: f5(slab)
[   72.042910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.050651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.058397] page dumped because: kasan: bad access detected
[   72.063969] 
[   72.065466] Memory state around the buggy address:
[   72.070262]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.077487]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.084722] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.091953]                                      ^
[   72.096746]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.103964]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.111183] ==================================================================
[   72.870251] ==================================================================
[   72.877478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   72.884872] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   72.892177] 
[   72.893718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   72.893725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.893728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.893731] Call Trace:
[   72.893733]  <TASK>
[   72.893734]  dump_stack_lvl+0x73/0xb0
[   72.893738]  print_report+0xd1/0x650
[   72.893742]  ? __virt_addr_valid+0x1db/0x2d0
[   72.893746]  ? kasan_atomics_helper+0x4f98/0x5450
[   72.893750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.893755]  ? kasan_atomics_helper+0x4f98/0x5450
[   72.893759]  kasan_report+0x141/0x180
[   72.893763]  ? kasan_atomics_helper+0x4f98/0x5450
[   72.893768]  __asan_report_load8_noabort+0x18/0x20
[   72.893772]  kasan_atomics_helper+0x4f98/0x5450
[   72.893777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.893781]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.893785]  ? kasan_atomics+0x152/0x310
[   72.893789]  kasan_atomics+0x1dc/0x310
[   72.893793]  ? __pfx_kasan_atomics+0x10/0x10
[   72.893797]  ? ktime_get_ts64+0x83/0x230
[   72.893802]  kunit_try_run_case+0x1a2/0x480
[   72.893806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.893810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.893815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.893820]  ? __kthread_parkme+0x82/0x180
[   72.893824]  ? preempt_count_sub+0x50/0x80
[   72.893829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.893834]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.893838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.893842]  kthread+0x334/0x6f0
[   72.893846]  ? trace_preempt_on+0x20/0xc0
[   72.893851]  ? __pfx_kthread+0x10/0x10
[   72.893855]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.893859]  ? calculate_sigpending+0x7b/0xa0
[   72.893863]  ? __pfx_kthread+0x10/0x10
[   72.893868]  ret_from_fork+0x3e/0x80
[   72.893872]  ? __pfx_kthread+0x10/0x10
[   72.893877]  ret_from_fork_asm+0x1a/0x30
[   72.893883]  </TASK>
[   72.893884] 
[   73.071458] Allocated by task 308:
[   73.074862]  kasan_save_stack+0x45/0x70
[   73.078708]  kasan_save_track+0x18/0x40
[   73.082567]  kasan_save_alloc_info+0x3b/0x50
[   73.086840]  __kasan_kmalloc+0xb7/0xc0
[   73.090593]  __kmalloc_cache_noprof+0x189/0x420
[   73.095133]  kasan_atomics+0x95/0x310
[   73.098798]  kunit_try_run_case+0x1a2/0x480
[   73.102983]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.108383]  kthread+0x334/0x6f0
[   73.111615]  ret_from_fork+0x3e/0x80
[   73.115196]  ret_from_fork_asm+0x1a/0x30
[   73.119122] 
[   73.120619] The buggy address belongs to the object at ffff8881061f7500
[   73.120619]  which belongs to the cache kmalloc-64 of size 64
[   73.132952] The buggy address is located 0 bytes to the right of
[   73.132952]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   73.145814] 
[   73.147312] The buggy address belongs to the physical page:
[   73.152885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   73.160882] flags: 0x200000000000000(node=0|zone=2)
[   73.165763] page_type: f5(slab)
[   73.168910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.176650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.184394] page dumped because: kasan: bad access detected
[   73.189968] 
[   73.191468] Memory state around the buggy address:
[   73.196260]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.203479]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.210708] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.217953]                                      ^
[   73.222745]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.229972]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.237190] ==================================================================
[   70.556540] ==================================================================
[   70.563759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   70.571154] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   70.578552] 
[   70.580053] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   70.580061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.580063] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.580066] Call Trace:
[   70.580068]  <TASK>
[   70.580070]  dump_stack_lvl+0x73/0xb0
[   70.580074]  print_report+0xd1/0x650
[   70.580078]  ? __virt_addr_valid+0x1db/0x2d0
[   70.580082]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.580086]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.580090]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.580094]  kasan_report+0x141/0x180
[   70.580099]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.580104]  kasan_check_range+0x10c/0x1c0
[   70.580109]  __kasan_check_write+0x18/0x20
[   70.580113]  kasan_atomics_helper+0x1e12/0x5450
[   70.580117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.580121]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.580125]  ? kasan_atomics+0x152/0x310
[   70.580129]  kasan_atomics+0x1dc/0x310
[   70.580133]  ? __pfx_kasan_atomics+0x10/0x10
[   70.580137]  ? ktime_get_ts64+0x83/0x230
[   70.580142]  kunit_try_run_case+0x1a2/0x480
[   70.580146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.580150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.580155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.580160]  ? __kthread_parkme+0x82/0x180
[   70.580164]  ? preempt_count_sub+0x50/0x80
[   70.580169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.580173]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.580178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.580182]  kthread+0x334/0x6f0
[   70.580186]  ? trace_preempt_on+0x20/0xc0
[   70.580191]  ? __pfx_kthread+0x10/0x10
[   70.580195]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.580199]  ? calculate_sigpending+0x7b/0xa0
[   70.580203]  ? __pfx_kthread+0x10/0x10
[   70.580208]  ret_from_fork+0x3e/0x80
[   70.580212]  ? __pfx_kthread+0x10/0x10
[   70.580216]  ret_from_fork_asm+0x1a/0x30
[   70.580222]  </TASK>
[   70.580224] 
[   70.761246] Allocated by task 308:
[   70.764652]  kasan_save_stack+0x45/0x70
[   70.768491]  kasan_save_track+0x18/0x40
[   70.772330]  kasan_save_alloc_info+0x3b/0x50
[   70.776603]  __kasan_kmalloc+0xb7/0xc0
[   70.780357]  __kmalloc_cache_noprof+0x189/0x420
[   70.784889]  kasan_atomics+0x95/0x310
[   70.788556]  kunit_try_run_case+0x1a2/0x480
[   70.792749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.798147]  kthread+0x334/0x6f0
[   70.801380]  ret_from_fork+0x3e/0x80
[   70.804960]  ret_from_fork_asm+0x1a/0x30
[   70.808887] 
[   70.810384] The buggy address belongs to the object at ffff8881061f7500
[   70.810384]  which belongs to the cache kmalloc-64 of size 64
[   70.822735] The buggy address is located 0 bytes to the right of
[   70.822735]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   70.835604] 
[   70.837104] The buggy address belongs to the physical page:
[   70.842702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   70.850734] flags: 0x200000000000000(node=0|zone=2)
[   70.855613] page_type: f5(slab)
[   70.858760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.866501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.874246] page dumped because: kasan: bad access detected
[   70.879819] 
[   70.881318] Memory state around the buggy address:
[   70.886112]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.893339]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.900556] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.907775]                                      ^
[   70.912568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.919788]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.927008] ==================================================================
[   63.768063] ==================================================================
[   63.775285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   63.782718] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   63.790034] 
[   63.791533] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   63.791541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.791543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.791546] Call Trace:
[   63.791548]  <TASK>
[   63.791550]  dump_stack_lvl+0x73/0xb0
[   63.791553]  print_report+0xd1/0x650
[   63.791558]  ? __virt_addr_valid+0x1db/0x2d0
[   63.791562]  ? kasan_atomics_helper+0x4eae/0x5450
[   63.791566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.791570]  ? kasan_atomics_helper+0x4eae/0x5450
[   63.791574]  kasan_report+0x141/0x180
[   63.791579]  ? kasan_atomics_helper+0x4eae/0x5450
[   63.791584]  __asan_report_load8_noabort+0x18/0x20
[   63.791588]  kasan_atomics_helper+0x4eae/0x5450
[   63.791592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.791597]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.791601]  ? kasan_atomics+0x152/0x310
[   63.791605]  kasan_atomics+0x1dc/0x310
[   63.791609]  ? __pfx_kasan_atomics+0x10/0x10
[   63.791612]  ? ktime_get_ts64+0x83/0x230
[   63.791617]  kunit_try_run_case+0x1a2/0x480
[   63.791622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.791626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.791631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.791636]  ? __kthread_parkme+0x82/0x180
[   63.791640]  ? preempt_count_sub+0x50/0x80
[   63.791645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.791650]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.791654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.791658]  kthread+0x334/0x6f0
[   63.791662]  ? trace_preempt_on+0x20/0xc0
[   63.791667]  ? __pfx_kthread+0x10/0x10
[   63.791689]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.791693]  ? calculate_sigpending+0x7b/0xa0
[   63.791697]  ? __pfx_kthread+0x10/0x10
[   63.791702]  ret_from_fork+0x3e/0x80
[   63.791719]  ? __pfx_kthread+0x10/0x10
[   63.791723]  ret_from_fork_asm+0x1a/0x30
[   63.791729]  </TASK>
[   63.791731] 
[   63.969417] Allocated by task 308:
[   63.972822]  kasan_save_stack+0x45/0x70
[   63.976662]  kasan_save_track+0x18/0x40
[   63.980534]  kasan_save_alloc_info+0x3b/0x50
[   63.984809]  __kasan_kmalloc+0xb7/0xc0
[   63.988569]  __kmalloc_cache_noprof+0x189/0x420
[   63.993102]  kasan_atomics+0x95/0x310
[   63.996766]  kunit_try_run_case+0x1a2/0x480
[   64.000954]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.006362]  kthread+0x334/0x6f0
[   64.009601]  ret_from_fork+0x3e/0x80
[   64.013180]  ret_from_fork_asm+0x1a/0x30
[   64.017108] 
[   64.018607] The buggy address belongs to the object at ffff8881061f7500
[   64.018607]  which belongs to the cache kmalloc-64 of size 64
[   64.030948] The buggy address is located 0 bytes to the right of
[   64.030948]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   64.043817] 
[   64.045317] The buggy address belongs to the physical page:
[   64.050888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   64.058888] flags: 0x200000000000000(node=0|zone=2)
[   64.063768] page_type: f5(slab)
[   64.066913] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.074653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.082398] page dumped because: kasan: bad access detected
[   64.087971] 
[   64.089469] Memory state around the buggy address:
[   64.094262]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.101484]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.108710] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.115954]                                      ^
[   64.120748]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.127974]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.135193] ==================================================================
[   52.093859] ==================================================================
[   52.101106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   52.108505] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   52.115813] 
[   52.117311] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   52.117318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.117321] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.117324] Call Trace:
[   52.117326]  <TASK>
[   52.117328]  dump_stack_lvl+0x73/0xb0
[   52.117331]  print_report+0xd1/0x650
[   52.117336]  ? __virt_addr_valid+0x1db/0x2d0
[   52.117339]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.117343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.117348]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.117352]  kasan_report+0x141/0x180
[   52.117357]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.117362]  __asan_report_load4_noabort+0x18/0x20
[   52.117366]  kasan_atomics_helper+0x4b54/0x5450
[   52.117370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.117375]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.117379]  ? kasan_atomics+0x152/0x310
[   52.117383]  kasan_atomics+0x1dc/0x310
[   52.117386]  ? __pfx_kasan_atomics+0x10/0x10
[   52.117390]  ? ktime_get_ts64+0x83/0x230
[   52.117395]  kunit_try_run_case+0x1a2/0x480
[   52.117399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.117404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.117409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.117413]  ? __kthread_parkme+0x82/0x180
[   52.117418]  ? preempt_count_sub+0x50/0x80
[   52.117422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.117427]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.117431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.117436]  kthread+0x334/0x6f0
[   52.117440]  ? trace_preempt_on+0x20/0xc0
[   52.117444]  ? __pfx_kthread+0x10/0x10
[   52.117449]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.117453]  ? calculate_sigpending+0x7b/0xa0
[   52.117457]  ? __pfx_kthread+0x10/0x10
[   52.117462]  ret_from_fork+0x3e/0x80
[   52.117466]  ? __pfx_kthread+0x10/0x10
[   52.117470]  ret_from_fork_asm+0x1a/0x30
[   52.117476]  </TASK>
[   52.117478] 
[   52.295134] Allocated by task 308:
[   52.298541]  kasan_save_stack+0x45/0x70
[   52.302387]  kasan_save_track+0x18/0x40
[   52.306226]  kasan_save_alloc_info+0x3b/0x50
[   52.310497]  __kasan_kmalloc+0xb7/0xc0
[   52.314251]  __kmalloc_cache_noprof+0x189/0x420
[   52.318784]  kasan_atomics+0x95/0x310
[   52.322448]  kunit_try_run_case+0x1a2/0x480
[   52.326637]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.332044]  kthread+0x334/0x6f0
[   52.335277]  ret_from_fork+0x3e/0x80
[   52.338864]  ret_from_fork_asm+0x1a/0x30
[   52.342799] 
[   52.344298] The buggy address belongs to the object at ffff8881061f7500
[   52.344298]  which belongs to the cache kmalloc-64 of size 64
[   52.356638] The buggy address is located 0 bytes to the right of
[   52.356638]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   52.369499] 
[   52.370998] The buggy address belongs to the physical page:
[   52.376570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   52.384570] flags: 0x200000000000000(node=0|zone=2)
[   52.389447] page_type: f5(slab)
[   52.392596] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.400342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.408081] page dumped because: kasan: bad access detected
[   52.413653] 
[   52.415152] Memory state around the buggy address:
[   52.419947]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.427172]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.434394] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.441620]                                      ^
[   52.446413]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.453632]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.460851] ==================================================================
[   59.253469] ==================================================================
[   59.260735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   59.268044] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   59.275436] 
[   59.276930] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   59.276938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.276940] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.276943] Call Trace:
[   59.276945]  <TASK>
[   59.276947]  dump_stack_lvl+0x73/0xb0
[   59.276950]  print_report+0xd1/0x650
[   59.276955]  ? __virt_addr_valid+0x1db/0x2d0
[   59.276958]  ? kasan_atomics_helper+0xf10/0x5450
[   59.276962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.276967]  ? kasan_atomics_helper+0xf10/0x5450
[   59.276971]  kasan_report+0x141/0x180
[   59.276975]  ? kasan_atomics_helper+0xf10/0x5450
[   59.276980]  kasan_check_range+0x10c/0x1c0
[   59.276985]  __kasan_check_write+0x18/0x20
[   59.276989]  kasan_atomics_helper+0xf10/0x5450
[   59.276993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.276998]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.277002]  ? kasan_atomics+0x152/0x310
[   59.277006]  kasan_atomics+0x1dc/0x310
[   59.277009]  ? __pfx_kasan_atomics+0x10/0x10
[   59.277013]  ? ktime_get_ts64+0x83/0x230
[   59.277018]  kunit_try_run_case+0x1a2/0x480
[   59.277022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.277027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.277031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.277036]  ? __kthread_parkme+0x82/0x180
[   59.277040]  ? preempt_count_sub+0x50/0x80
[   59.277045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.277050]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.277054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.277058]  kthread+0x334/0x6f0
[   59.277063]  ? trace_preempt_on+0x20/0xc0
[   59.277067]  ? __pfx_kthread+0x10/0x10
[   59.277072]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.277076]  ? calculate_sigpending+0x7b/0xa0
[   59.277080]  ? __pfx_kthread+0x10/0x10
[   59.277084]  ret_from_fork+0x3e/0x80
[   59.277089]  ? __pfx_kthread+0x10/0x10
[   59.277093]  ret_from_fork_asm+0x1a/0x30
[   59.277099]  </TASK>
[   59.277101] 
[   59.457837] Allocated by task 308:
[   59.461242]  kasan_save_stack+0x45/0x70
[   59.465081]  kasan_save_track+0x18/0x40
[   59.468922]  kasan_save_alloc_info+0x3b/0x50
[   59.473194]  __kasan_kmalloc+0xb7/0xc0
[   59.476947]  __kmalloc_cache_noprof+0x189/0x420
[   59.481477]  kasan_atomics+0x95/0x310
[   59.485144]  kunit_try_run_case+0x1a2/0x480
[   59.489329]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.494735]  kthread+0x334/0x6f0
[   59.497969]  ret_from_fork+0x3e/0x80
[   59.501548]  ret_from_fork_asm+0x1a/0x30
[   59.505475] 
[   59.506974] The buggy address belongs to the object at ffff8881061f7500
[   59.506974]  which belongs to the cache kmalloc-64 of size 64
[   59.519317] The buggy address is located 0 bytes to the right of
[   59.519317]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   59.532186] 
[   59.533703] The buggy address belongs to the physical page:
[   59.539299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   59.547297] flags: 0x200000000000000(node=0|zone=2)
[   59.552179] page_type: f5(slab)
[   59.555324] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.563064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.570810] page dumped because: kasan: bad access detected
[   59.576382] 
[   59.577882] Memory state around the buggy address:
[   59.582692]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.589945]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.597165] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.604393]                                      ^
[   59.609186]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.616413]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.623630] ==================================================================
[   69.426875] ==================================================================
[   69.434105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   69.441503] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   69.448811] 
[   69.450309] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   69.450317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.450319] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.450322] Call Trace:
[   69.450324]  <TASK>
[   69.450326]  dump_stack_lvl+0x73/0xb0
[   69.450330]  print_report+0xd1/0x650
[   69.450334]  ? __virt_addr_valid+0x1db/0x2d0
[   69.450338]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.450342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.450346]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.450350]  kasan_report+0x141/0x180
[   69.450355]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.450360]  __asan_report_load8_noabort+0x18/0x20
[   69.450364]  kasan_atomics_helper+0x4f30/0x5450
[   69.450368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.450373]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.450377]  ? kasan_atomics+0x152/0x310
[   69.450381]  kasan_atomics+0x1dc/0x310
[   69.450384]  ? __pfx_kasan_atomics+0x10/0x10
[   69.450388]  ? ktime_get_ts64+0x83/0x230
[   69.450393]  kunit_try_run_case+0x1a2/0x480
[   69.450397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.450406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.450411]  ? __kthread_parkme+0x82/0x180
[   69.450415]  ? preempt_count_sub+0x50/0x80
[   69.450420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450424]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.450429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.450433]  kthread+0x334/0x6f0
[   69.450437]  ? trace_preempt_on+0x20/0xc0
[   69.450441]  ? __pfx_kthread+0x10/0x10
[   69.450446]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.450450]  ? calculate_sigpending+0x7b/0xa0
[   69.450454]  ? __pfx_kthread+0x10/0x10
[   69.450459]  ret_from_fork+0x3e/0x80
[   69.450463]  ? __pfx_kthread+0x10/0x10
[   69.450467]  ret_from_fork_asm+0x1a/0x30
[   69.450473]  </TASK>
[   69.450475] 
[   69.628106] Allocated by task 308:
[   69.631513]  kasan_save_stack+0x45/0x70
[   69.635360]  kasan_save_track+0x18/0x40
[   69.639199]  kasan_save_alloc_info+0x3b/0x50
[   69.643471]  __kasan_kmalloc+0xb7/0xc0
[   69.647224]  __kmalloc_cache_noprof+0x189/0x420
[   69.651757]  kasan_atomics+0x95/0x310
[   69.655423]  kunit_try_run_case+0x1a2/0x480
[   69.659608]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.665009]  kthread+0x334/0x6f0
[   69.668250]  ret_from_fork+0x3e/0x80
[   69.671835]  ret_from_fork_asm+0x1a/0x30
[   69.675761] 
[   69.677261] The buggy address belongs to the object at ffff8881061f7500
[   69.677261]  which belongs to the cache kmalloc-64 of size 64
[   69.689603] The buggy address is located 0 bytes to the right of
[   69.689603]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   69.702471] 
[   69.703971] The buggy address belongs to the physical page:
[   69.709542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   69.717543] flags: 0x200000000000000(node=0|zone=2)
[   69.722420] page_type: f5(slab)
[   69.725569] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.733315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.741055] page dumped because: kasan: bad access detected
[   69.746626] 
[   69.748125] Memory state around the buggy address:
[   69.752919]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.760145]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.767364] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.774583]                                      ^
[   69.779377]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.786596]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.793814] ==================================================================
[   73.996520] ==================================================================
[   74.003744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   74.011139] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   74.018533] 
[   74.020031] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   74.020039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.020041] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.020045] Call Trace:
[   74.020046]  <TASK>
[   74.020048]  dump_stack_lvl+0x73/0xb0
[   74.020052]  print_report+0xd1/0x650
[   74.020056]  ? __virt_addr_valid+0x1db/0x2d0
[   74.020060]  ? kasan_atomics_helper+0x218a/0x5450
[   74.020064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.020069]  ? kasan_atomics_helper+0x218a/0x5450
[   74.020073]  kasan_report+0x141/0x180
[   74.020077]  ? kasan_atomics_helper+0x218a/0x5450
[   74.020082]  kasan_check_range+0x10c/0x1c0
[   74.020087]  __kasan_check_write+0x18/0x20
[   74.020091]  kasan_atomics_helper+0x218a/0x5450
[   74.020096]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.020100]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.020104]  ? kasan_atomics+0x152/0x310
[   74.020108]  kasan_atomics+0x1dc/0x310
[   74.020112]  ? __pfx_kasan_atomics+0x10/0x10
[   74.020116]  ? ktime_get_ts64+0x83/0x230
[   74.020120]  kunit_try_run_case+0x1a2/0x480
[   74.020125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.020129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.020134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.020139]  ? __kthread_parkme+0x82/0x180
[   74.020143]  ? preempt_count_sub+0x50/0x80
[   74.020148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.020153]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.020157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.020161]  kthread+0x334/0x6f0
[   74.020165]  ? trace_preempt_on+0x20/0xc0
[   74.020170]  ? __pfx_kthread+0x10/0x10
[   74.020174]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.020179]  ? calculate_sigpending+0x7b/0xa0
[   74.020183]  ? __pfx_kthread+0x10/0x10
[   74.020187]  ret_from_fork+0x3e/0x80
[   74.020192]  ? __pfx_kthread+0x10/0x10
[   74.020196]  ret_from_fork_asm+0x1a/0x30
[   74.020202]  </TASK>
[   74.020204] 
[   74.201217] Allocated by task 308:
[   74.204622]  kasan_save_stack+0x45/0x70
[   74.208461]  kasan_save_track+0x18/0x40
[   74.212301]  kasan_save_alloc_info+0x3b/0x50
[   74.216572]  __kasan_kmalloc+0xb7/0xc0
[   74.220325]  __kmalloc_cache_noprof+0x189/0x420
[   74.224860]  kasan_atomics+0x95/0x310
[   74.228533]  kunit_try_run_case+0x1a2/0x480
[   74.232734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.238136]  kthread+0x334/0x6f0
[   74.241367]  ret_from_fork+0x3e/0x80
[   74.244948]  ret_from_fork_asm+0x1a/0x30
[   74.248880] 
[   74.250380] The buggy address belongs to the object at ffff8881061f7500
[   74.250380]  which belongs to the cache kmalloc-64 of size 64
[   74.262741] The buggy address is located 0 bytes to the right of
[   74.262741]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   74.275607] 
[   74.277107] The buggy address belongs to the physical page:
[   74.282706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   74.290733] flags: 0x200000000000000(node=0|zone=2)
[   74.295618] page_type: f5(slab)
[   74.298765] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.306505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.314244] page dumped because: kasan: bad access detected
[   74.319814] 
[   74.321315] Memory state around the buggy address:
[   74.326107]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.333325]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.340545] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.347762]                                      ^
[   74.352555]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.359774]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.366996] ==================================================================
[   68.293583] ==================================================================
[   68.300800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   68.308198] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   68.315593] 
[   68.317094] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   68.317101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.317104] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.317107] Call Trace:
[   68.317109]  <TASK>
[   68.317111]  dump_stack_lvl+0x73/0xb0
[   68.317114]  print_report+0xd1/0x650
[   68.317119]  ? __virt_addr_valid+0x1db/0x2d0
[   68.317123]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.317127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.317131]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.317135]  kasan_report+0x141/0x180
[   68.317140]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.317145]  kasan_check_range+0x10c/0x1c0
[   68.317150]  __kasan_check_write+0x18/0x20
[   68.317154]  kasan_atomics_helper+0x1a7f/0x5450
[   68.317158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.317163]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.317167]  ? kasan_atomics+0x152/0x310
[   68.317171]  kasan_atomics+0x1dc/0x310
[   68.317174]  ? __pfx_kasan_atomics+0x10/0x10
[   68.317178]  ? ktime_get_ts64+0x83/0x230
[   68.317183]  kunit_try_run_case+0x1a2/0x480
[   68.317188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.317192]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.317197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.317202]  ? __kthread_parkme+0x82/0x180
[   68.317206]  ? preempt_count_sub+0x50/0x80
[   68.317211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.317215]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.317219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.317224]  kthread+0x334/0x6f0
[   68.317228]  ? trace_preempt_on+0x20/0xc0
[   68.317233]  ? __pfx_kthread+0x10/0x10
[   68.317237]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.317241]  ? calculate_sigpending+0x7b/0xa0
[   68.317246]  ? __pfx_kthread+0x10/0x10
[   68.317250]  ret_from_fork+0x3e/0x80
[   68.317254]  ? __pfx_kthread+0x10/0x10
[   68.317259]  ret_from_fork_asm+0x1a/0x30
[   68.317265]  </TASK>
[   68.317267] 
[   68.498302] Allocated by task 308:
[   68.501721]  kasan_save_stack+0x45/0x70
[   68.505574]  kasan_save_track+0x18/0x40
[   68.509412]  kasan_save_alloc_info+0x3b/0x50
[   68.513707]  __kasan_kmalloc+0xb7/0xc0
[   68.517481]  __kmalloc_cache_noprof+0x189/0x420
[   68.522013]  kasan_atomics+0x95/0x310
[   68.525720]  kunit_try_run_case+0x1a2/0x480
[   68.529916]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.535315]  kthread+0x334/0x6f0
[   68.538549]  ret_from_fork+0x3e/0x80
[   68.542128]  ret_from_fork_asm+0x1a/0x30
[   68.546054] 
[   68.547553] The buggy address belongs to the object at ffff8881061f7500
[   68.547553]  which belongs to the cache kmalloc-64 of size 64
[   68.559895] The buggy address is located 0 bytes to the right of
[   68.559895]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   68.572755] 
[   68.574253] The buggy address belongs to the physical page:
[   68.579827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   68.587835] flags: 0x200000000000000(node=0|zone=2)
[   68.592745] page_type: f5(slab)
[   68.595896] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.603643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.611389] page dumped because: kasan: bad access detected
[   68.616961] 
[   68.618462] Memory state around the buggy address:
[   68.623254]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.630472]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.637719] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.644944]                                      ^
[   68.649746]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.656967]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.664193] ==================================================================
[   75.126181] ==================================================================
[   75.133411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   75.140804] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   75.148112] 
[   75.149610] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   75.149617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.149619] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.149623] Call Trace:
[   75.149624]  <TASK>
[   75.149626]  dump_stack_lvl+0x73/0xb0
[   75.149630]  print_report+0xd1/0x650
[   75.149634]  ? __virt_addr_valid+0x1db/0x2d0
[   75.149638]  ? kasan_atomics_helper+0x5115/0x5450
[   75.149642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.149646]  ? kasan_atomics_helper+0x5115/0x5450
[   75.149651]  kasan_report+0x141/0x180
[   75.149655]  ? kasan_atomics_helper+0x5115/0x5450
[   75.149660]  __asan_report_load8_noabort+0x18/0x20
[   75.149664]  kasan_atomics_helper+0x5115/0x5450
[   75.149668]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   75.149673]  ? __kmalloc_cache_noprof+0x189/0x420
[   75.149694]  ? kasan_atomics+0x152/0x310
[   75.149698]  kasan_atomics+0x1dc/0x310
[   75.149702]  ? __pfx_kasan_atomics+0x10/0x10
[   75.149706]  ? ktime_get_ts64+0x83/0x230
[   75.149723]  kunit_try_run_case+0x1a2/0x480
[   75.149728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.149732]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.149737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.149742]  ? __kthread_parkme+0x82/0x180
[   75.149746]  ? preempt_count_sub+0x50/0x80
[   75.149751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.149755]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.149759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.149764]  kthread+0x334/0x6f0
[   75.149768]  ? trace_preempt_on+0x20/0xc0
[   75.149772]  ? __pfx_kthread+0x10/0x10
[   75.149777]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.149781]  ? calculate_sigpending+0x7b/0xa0
[   75.149785]  ? __pfx_kthread+0x10/0x10
[   75.149790]  ret_from_fork+0x3e/0x80
[   75.149794]  ? __pfx_kthread+0x10/0x10
[   75.149798]  ret_from_fork_asm+0x1a/0x30
[   75.149804]  </TASK>
[   75.149806] 
[   75.327475] Allocated by task 308:
[   75.330883]  kasan_save_stack+0x45/0x70
[   75.334750]  kasan_save_track+0x18/0x40
[   75.338596]  kasan_save_alloc_info+0x3b/0x50
[   75.342868]  __kasan_kmalloc+0xb7/0xc0
[   75.346618]  __kmalloc_cache_noprof+0x189/0x420
[   75.351154]  kasan_atomics+0x95/0x310
[   75.354817]  kunit_try_run_case+0x1a2/0x480
[   75.359003]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.364405]  kthread+0x334/0x6f0
[   75.367644]  ret_from_fork+0x3e/0x80
[   75.371223]  ret_from_fork_asm+0x1a/0x30
[   75.375151] 
[   75.376650] The buggy address belongs to the object at ffff8881061f7500
[   75.376650]  which belongs to the cache kmalloc-64 of size 64
[   75.388991] The buggy address is located 0 bytes to the right of
[   75.388991]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   75.401859] 
[   75.403359] The buggy address belongs to the physical page:
[   75.408931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   75.416939] flags: 0x200000000000000(node=0|zone=2)
[   75.421818] page_type: f5(slab)
[   75.424965] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.432724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.440475] page dumped because: kasan: bad access detected
[   75.446049] 
[   75.447547] Memory state around the buggy address:
[   75.452340]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.459560]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.466777] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.473996]                                      ^
[   75.478788]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.486010]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.493235] ==================================================================
[   63.016352] ==================================================================
[   63.023571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   63.030965] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   63.038279] 
[   63.039779] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   63.039786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.039789] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.039792] Call Trace:
[   63.039794]  <TASK>
[   63.039796]  dump_stack_lvl+0x73/0xb0
[   63.039799]  print_report+0xd1/0x650
[   63.039803]  ? __virt_addr_valid+0x1db/0x2d0
[   63.039807]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.039811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.039816]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.039820]  kasan_report+0x141/0x180
[   63.039824]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.039829]  __asan_report_load4_noabort+0x18/0x20
[   63.039833]  kasan_atomics_helper+0x49ce/0x5450
[   63.039838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.039842]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.039846]  ? kasan_atomics+0x152/0x310
[   63.039850]  kasan_atomics+0x1dc/0x310
[   63.039854]  ? __pfx_kasan_atomics+0x10/0x10
[   63.039857]  ? ktime_get_ts64+0x83/0x230
[   63.039862]  kunit_try_run_case+0x1a2/0x480
[   63.039867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.039871]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.039876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.039881]  ? __kthread_parkme+0x82/0x180
[   63.039885]  ? preempt_count_sub+0x50/0x80
[   63.039890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.039894]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.039899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.039903]  kthread+0x334/0x6f0
[   63.039907]  ? trace_preempt_on+0x20/0xc0
[   63.039912]  ? __pfx_kthread+0x10/0x10
[   63.039916]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.039920]  ? calculate_sigpending+0x7b/0xa0
[   63.039924]  ? __pfx_kthread+0x10/0x10
[   63.039929]  ret_from_fork+0x3e/0x80
[   63.039933]  ? __pfx_kthread+0x10/0x10
[   63.039937]  ret_from_fork_asm+0x1a/0x30
[   63.039943]  </TASK>
[   63.039945] 
[   63.217461] Allocated by task 308:
[   63.220868]  kasan_save_stack+0x45/0x70
[   63.224706]  kasan_save_track+0x18/0x40
[   63.228571]  kasan_save_alloc_info+0x3b/0x50
[   63.232844]  __kasan_kmalloc+0xb7/0xc0
[   63.236598]  __kmalloc_cache_noprof+0x189/0x420
[   63.241130]  kasan_atomics+0x95/0x310
[   63.244796]  kunit_try_run_case+0x1a2/0x480
[   63.248991]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.254398]  kthread+0x334/0x6f0
[   63.257631]  ret_from_fork+0x3e/0x80
[   63.261219]  ret_from_fork_asm+0x1a/0x30
[   63.265151] 
[   63.266651] The buggy address belongs to the object at ffff8881061f7500
[   63.266651]  which belongs to the cache kmalloc-64 of size 64
[   63.278993] The buggy address is located 0 bytes to the right of
[   63.278993]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   63.291861] 
[   63.293362] The buggy address belongs to the physical page:
[   63.298935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   63.306940] flags: 0x200000000000000(node=0|zone=2)
[   63.311819] page_type: f5(slab)
[   63.314968] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.322726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.330480] page dumped because: kasan: bad access detected
[   63.336050] 
[   63.337551] Memory state around the buggy address:
[   63.342343]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.349562]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.356781] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.363998]                                      ^
[   63.368794]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.376020]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.383239] ==================================================================
[   58.876248] ==================================================================
[   58.883480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   58.890786] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   58.898176] 
[   58.899718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   58.899726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.899728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.899732] Call Trace:
[   58.899733]  <TASK>
[   58.899735]  dump_stack_lvl+0x73/0xb0
[   58.899739]  print_report+0xd1/0x650
[   58.899743]  ? __virt_addr_valid+0x1db/0x2d0
[   58.899747]  ? kasan_atomics_helper+0xe78/0x5450
[   58.899751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.899755]  ? kasan_atomics_helper+0xe78/0x5450
[   58.899760]  kasan_report+0x141/0x180
[   58.899764]  ? kasan_atomics_helper+0xe78/0x5450
[   58.899769]  kasan_check_range+0x10c/0x1c0
[   58.899774]  __kasan_check_write+0x18/0x20
[   58.899778]  kasan_atomics_helper+0xe78/0x5450
[   58.899782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.899786]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.899790]  ? kasan_atomics+0x152/0x310
[   58.899794]  kasan_atomics+0x1dc/0x310
[   58.899798]  ? __pfx_kasan_atomics+0x10/0x10
[   58.899802]  ? ktime_get_ts64+0x83/0x230
[   58.899806]  kunit_try_run_case+0x1a2/0x480
[   58.899811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.899815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.899820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.899825]  ? __kthread_parkme+0x82/0x180
[   58.899829]  ? preempt_count_sub+0x50/0x80
[   58.899834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.899838]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.899842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.899846]  kthread+0x334/0x6f0
[   58.899850]  ? trace_preempt_on+0x20/0xc0
[   58.899855]  ? __pfx_kthread+0x10/0x10
[   58.899859]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.899863]  ? calculate_sigpending+0x7b/0xa0
[   58.899867]  ? __pfx_kthread+0x10/0x10
[   58.899872]  ret_from_fork+0x3e/0x80
[   58.899876]  ? __pfx_kthread+0x10/0x10
[   58.899880]  ret_from_fork_asm+0x1a/0x30
[   58.899886]  </TASK>
[   58.899888] 
[   59.080508] Allocated by task 308:
[   59.083915]  kasan_save_stack+0x45/0x70
[   59.087763]  kasan_save_track+0x18/0x40
[   59.091609]  kasan_save_alloc_info+0x3b/0x50
[   59.095880]  __kasan_kmalloc+0xb7/0xc0
[   59.099635]  __kmalloc_cache_noprof+0x189/0x420
[   59.104175]  kasan_atomics+0x95/0x310
[   59.107840]  kunit_try_run_case+0x1a2/0x480
[   59.112027]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.117426]  kthread+0x334/0x6f0
[   59.120657]  ret_from_fork+0x3e/0x80
[   59.124236]  ret_from_fork_asm+0x1a/0x30
[   59.128164] 
[   59.129664] The buggy address belongs to the object at ffff8881061f7500
[   59.129664]  which belongs to the cache kmalloc-64 of size 64
[   59.142021] The buggy address is located 0 bytes to the right of
[   59.142021]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   59.154880] 
[   59.156382] The buggy address belongs to the physical page:
[   59.161955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   59.169961] flags: 0x200000000000000(node=0|zone=2)
[   59.174841] page_type: f5(slab)
[   59.177988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.185742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.193480] page dumped because: kasan: bad access detected
[   59.199052] 
[   59.200552] Memory state around the buggy address:
[   59.205346]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.212564]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.219782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.227002]                                      ^
[   59.231795]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.239015]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.246241] ==================================================================
[   62.264278] ==================================================================
[   62.271513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   62.278907] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   62.286219] 
[   62.287738] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   62.287745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.287747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.287751] Call Trace:
[   62.287752]  <TASK>
[   62.287754]  dump_stack_lvl+0x73/0xb0
[   62.287758]  print_report+0xd1/0x650
[   62.287762]  ? __virt_addr_valid+0x1db/0x2d0
[   62.287766]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.287770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.287774]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.287778]  kasan_report+0x141/0x180
[   62.287783]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.287788]  __asan_report_load4_noabort+0x18/0x20
[   62.287792]  kasan_atomics_helper+0x49e8/0x5450
[   62.287796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.287801]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.287805]  ? kasan_atomics+0x152/0x310
[   62.287809]  kasan_atomics+0x1dc/0x310
[   62.287812]  ? __pfx_kasan_atomics+0x10/0x10
[   62.287816]  ? ktime_get_ts64+0x83/0x230
[   62.287821]  kunit_try_run_case+0x1a2/0x480
[   62.287825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.287830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.287834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.287839]  ? __kthread_parkme+0x82/0x180
[   62.287843]  ? preempt_count_sub+0x50/0x80
[   62.287848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.287852]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.287857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.287861]  kthread+0x334/0x6f0
[   62.287865]  ? trace_preempt_on+0x20/0xc0
[   62.287869]  ? __pfx_kthread+0x10/0x10
[   62.287874]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.287878]  ? calculate_sigpending+0x7b/0xa0
[   62.287882]  ? __pfx_kthread+0x10/0x10
[   62.287887]  ret_from_fork+0x3e/0x80
[   62.287891]  ? __pfx_kthread+0x10/0x10
[   62.287895]  ret_from_fork_asm+0x1a/0x30
[   62.287901]  </TASK>
[   62.287903] 
[   62.465473] Allocated by task 308:
[   62.468878]  kasan_save_stack+0x45/0x70
[   62.472734]  kasan_save_track+0x18/0x40
[   62.476573]  kasan_save_alloc_info+0x3b/0x50
[   62.480848]  __kasan_kmalloc+0xb7/0xc0
[   62.484608]  __kmalloc_cache_noprof+0x189/0x420
[   62.489140]  kasan_atomics+0x95/0x310
[   62.492805]  kunit_try_run_case+0x1a2/0x480
[   62.496991]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.502393]  kthread+0x334/0x6f0
[   62.505632]  ret_from_fork+0x3e/0x80
[   62.509212]  ret_from_fork_asm+0x1a/0x30
[   62.513137] 
[   62.514638] The buggy address belongs to the object at ffff8881061f7500
[   62.514638]  which belongs to the cache kmalloc-64 of size 64
[   62.526977] The buggy address is located 0 bytes to the right of
[   62.526977]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   62.539840] 
[   62.541337] The buggy address belongs to the physical page:
[   62.546910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   62.554918] flags: 0x200000000000000(node=0|zone=2)
[   62.559798] page_type: f5(slab)
[   62.562942] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.570705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.578465] page dumped because: kasan: bad access detected
[   62.584045] 
[   62.585545] Memory state around the buggy address:
[   62.590338]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.597563]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.604782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.612003]                                      ^
[   62.616793]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.624015]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.631240] ==================================================================
[   65.272073] ==================================================================
[   65.279305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   65.286707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   65.294124] 
[   65.295626] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   65.295634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.295636] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.295639] Call Trace:
[   65.295641]  <TASK>
[   65.295643]  dump_stack_lvl+0x73/0xb0
[   65.295646]  print_report+0xd1/0x650
[   65.295651]  ? __virt_addr_valid+0x1db/0x2d0
[   65.295655]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.295659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.295663]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.295668]  kasan_report+0x141/0x180
[   65.295689]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.295694]  kasan_check_range+0x10c/0x1c0
[   65.295700]  __kasan_check_write+0x18/0x20
[   65.295703]  kasan_atomics_helper+0x15b6/0x5450
[   65.295720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.295725]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.295729]  ? kasan_atomics+0x152/0x310
[   65.295733]  kasan_atomics+0x1dc/0x310
[   65.295736]  ? __pfx_kasan_atomics+0x10/0x10
[   65.295740]  ? ktime_get_ts64+0x83/0x230
[   65.295745]  kunit_try_run_case+0x1a2/0x480
[   65.295750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.295754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.295759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.295764]  ? __kthread_parkme+0x82/0x180
[   65.295768]  ? preempt_count_sub+0x50/0x80
[   65.295773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.295777]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.295781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.295786]  kthread+0x334/0x6f0
[   65.295790]  ? trace_preempt_on+0x20/0xc0
[   65.295794]  ? __pfx_kthread+0x10/0x10
[   65.295799]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.295803]  ? calculate_sigpending+0x7b/0xa0
[   65.295807]  ? __pfx_kthread+0x10/0x10
[   65.295812]  ret_from_fork+0x3e/0x80
[   65.295816]  ? __pfx_kthread+0x10/0x10
[   65.295820]  ret_from_fork_asm+0x1a/0x30
[   65.295826]  </TASK>
[   65.295828] 
[   65.476862] Allocated by task 308:
[   65.480266]  kasan_save_stack+0x45/0x70
[   65.484107]  kasan_save_track+0x18/0x40
[   65.487946]  kasan_save_alloc_info+0x3b/0x50
[   65.492217]  __kasan_kmalloc+0xb7/0xc0
[   65.495972]  __kmalloc_cache_noprof+0x189/0x420
[   65.500504]  kasan_atomics+0x95/0x310
[   65.504170]  kunit_try_run_case+0x1a2/0x480
[   65.508365]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.513770]  kthread+0x334/0x6f0
[   65.517002]  ret_from_fork+0x3e/0x80
[   65.520583]  ret_from_fork_asm+0x1a/0x30
[   65.524509] 
[   65.526008] The buggy address belongs to the object at ffff8881061f7500
[   65.526008]  which belongs to the cache kmalloc-64 of size 64
[   65.538348] The buggy address is located 0 bytes to the right of
[   65.538348]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   65.551209] 
[   65.552707] The buggy address belongs to the physical page:
[   65.558308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   65.566316] flags: 0x200000000000000(node=0|zone=2)
[   65.571194] page_type: f5(slab)
[   65.574342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.582089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.589834] page dumped because: kasan: bad access detected
[   65.595406] 
[   65.596907] Memory state around the buggy address:
[   65.601706]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.608926]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.616147] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.623374]                                      ^
[   65.628166]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.635385]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.642605] ==================================================================
[   66.027453] ==================================================================
[   66.034720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   66.042117] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   66.049512] 
[   66.051011] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   66.051018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.051020] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.051024] Call Trace:
[   66.051025]  <TASK>
[   66.051027]  dump_stack_lvl+0x73/0xb0
[   66.051031]  print_report+0xd1/0x650
[   66.051035]  ? __virt_addr_valid+0x1db/0x2d0
[   66.051039]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.051043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.051047]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.051052]  kasan_report+0x141/0x180
[   66.051056]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.051061]  kasan_check_range+0x10c/0x1c0
[   66.051066]  __kasan_check_write+0x18/0x20
[   66.051070]  kasan_atomics_helper+0x16e7/0x5450
[   66.051074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.051079]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.051083]  ? kasan_atomics+0x152/0x310
[   66.051087]  kasan_atomics+0x1dc/0x310
[   66.051090]  ? __pfx_kasan_atomics+0x10/0x10
[   66.051094]  ? ktime_get_ts64+0x83/0x230
[   66.051099]  kunit_try_run_case+0x1a2/0x480
[   66.051104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.051108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.051113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.051118]  ? __kthread_parkme+0x82/0x180
[   66.051122]  ? preempt_count_sub+0x50/0x80
[   66.051127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.051131]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.051135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.051140]  kthread+0x334/0x6f0
[   66.051144]  ? trace_preempt_on+0x20/0xc0
[   66.051148]  ? __pfx_kthread+0x10/0x10
[   66.051153]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.051157]  ? calculate_sigpending+0x7b/0xa0
[   66.051161]  ? __pfx_kthread+0x10/0x10
[   66.051166]  ret_from_fork+0x3e/0x80
[   66.051170]  ? __pfx_kthread+0x10/0x10
[   66.051175]  ret_from_fork_asm+0x1a/0x30
[   66.051180]  </TASK>
[   66.051182] 
[   66.232154] Allocated by task 308:
[   66.235560]  kasan_save_stack+0x45/0x70
[   66.239405]  kasan_save_track+0x18/0x40
[   66.243247]  kasan_save_alloc_info+0x3b/0x50
[   66.247518]  __kasan_kmalloc+0xb7/0xc0
[   66.251270]  __kmalloc_cache_noprof+0x189/0x420
[   66.255803]  kasan_atomics+0x95/0x310
[   66.259468]  kunit_try_run_case+0x1a2/0x480
[   66.263655]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.269054]  kthread+0x334/0x6f0
[   66.272285]  ret_from_fork+0x3e/0x80
[   66.275866]  ret_from_fork_asm+0x1a/0x30
[   66.279800] 
[   66.281299] The buggy address belongs to the object at ffff8881061f7500
[   66.281299]  which belongs to the cache kmalloc-64 of size 64
[   66.293639] The buggy address is located 0 bytes to the right of
[   66.293639]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   66.306501] 
[   66.307999] The buggy address belongs to the physical page:
[   66.313572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   66.321571] flags: 0x200000000000000(node=0|zone=2)
[   66.326451] page_type: f5(slab)
[   66.329598] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.337343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.345083] page dumped because: kasan: bad access detected
[   66.350655] 
[   66.352155] Memory state around the buggy address:
[   66.356949]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.364176]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.371401] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.378622]                                      ^
[   66.383412]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.390633]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.397853] ==================================================================
[   65.649830] ==================================================================
[   65.657077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   65.664470] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   65.671871] 
[   65.673369] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   65.673376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.673378] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.673382] Call Trace:
[   65.673383]  <TASK>
[   65.673385]  dump_stack_lvl+0x73/0xb0
[   65.673389]  print_report+0xd1/0x650
[   65.673393]  ? __virt_addr_valid+0x1db/0x2d0
[   65.673397]  ? kasan_atomics_helper+0x164f/0x5450
[   65.673401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.673405]  ? kasan_atomics_helper+0x164f/0x5450
[   65.673409]  kasan_report+0x141/0x180
[   65.673414]  ? kasan_atomics_helper+0x164f/0x5450
[   65.673419]  kasan_check_range+0x10c/0x1c0
[   65.673424]  __kasan_check_write+0x18/0x20
[   65.673428]  kasan_atomics_helper+0x164f/0x5450
[   65.673432]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.673436]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.673440]  ? kasan_atomics+0x152/0x310
[   65.673445]  kasan_atomics+0x1dc/0x310
[   65.673448]  ? __pfx_kasan_atomics+0x10/0x10
[   65.673452]  ? ktime_get_ts64+0x83/0x230
[   65.673457]  kunit_try_run_case+0x1a2/0x480
[   65.673461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.673466]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.673470]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.673475]  ? __kthread_parkme+0x82/0x180
[   65.673479]  ? preempt_count_sub+0x50/0x80
[   65.673484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.673489]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.673493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.673497]  kthread+0x334/0x6f0
[   65.673501]  ? trace_preempt_on+0x20/0xc0
[   65.673506]  ? __pfx_kthread+0x10/0x10
[   65.673510]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.673515]  ? calculate_sigpending+0x7b/0xa0
[   65.673519]  ? __pfx_kthread+0x10/0x10
[   65.673523]  ret_from_fork+0x3e/0x80
[   65.673528]  ? __pfx_kthread+0x10/0x10
[   65.673532]  ret_from_fork_asm+0x1a/0x30
[   65.673538]  </TASK>
[   65.673540] 
[   65.854485] Allocated by task 308:
[   65.857890]  kasan_save_stack+0x45/0x70
[   65.861734]  kasan_save_track+0x18/0x40
[   65.865579]  kasan_save_alloc_info+0x3b/0x50
[   65.869859]  __kasan_kmalloc+0xb7/0xc0
[   65.873611]  __kmalloc_cache_noprof+0x189/0x420
[   65.878144]  kasan_atomics+0x95/0x310
[   65.881809]  kunit_try_run_case+0x1a2/0x480
[   65.885995]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.891396]  kthread+0x334/0x6f0
[   65.894626]  ret_from_fork+0x3e/0x80
[   65.898206]  ret_from_fork_asm+0x1a/0x30
[   65.902132] 
[   65.903632] The buggy address belongs to the object at ffff8881061f7500
[   65.903632]  which belongs to the cache kmalloc-64 of size 64
[   65.915974] The buggy address is located 0 bytes to the right of
[   65.915974]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   65.928833] 
[   65.930332] The buggy address belongs to the physical page:
[   65.935903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   65.943903] flags: 0x200000000000000(node=0|zone=2)
[   65.948784] page_type: f5(slab)
[   65.951930] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.959718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.967466] page dumped because: kasan: bad access detected
[   65.973039] 
[   65.974539] Memory state around the buggy address:
[   65.979332]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.986550]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.993772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.000999]                                      ^
[   66.005789]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.013010]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.020228] ==================================================================
[   68.671437] ==================================================================
[   68.678667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   68.686082] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   68.693476] 
[   68.694976] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   68.694983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.694985] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.694989] Call Trace:
[   68.694990]  <TASK>
[   68.694992]  dump_stack_lvl+0x73/0xb0
[   68.694996]  print_report+0xd1/0x650
[   68.695000]  ? __virt_addr_valid+0x1db/0x2d0
[   68.695004]  ? kasan_atomics_helper+0x1b22/0x5450
[   68.695008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.695012]  ? kasan_atomics_helper+0x1b22/0x5450
[   68.695017]  kasan_report+0x141/0x180
[   68.695021]  ? kasan_atomics_helper+0x1b22/0x5450
[   68.695026]  kasan_check_range+0x10c/0x1c0
[   68.695031]  __kasan_check_write+0x18/0x20
[   68.695035]  kasan_atomics_helper+0x1b22/0x5450
[   68.695040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.695044]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.695048]  ? kasan_atomics+0x152/0x310
[   68.695052]  kasan_atomics+0x1dc/0x310
[   68.695055]  ? __pfx_kasan_atomics+0x10/0x10
[   68.695059]  ? ktime_get_ts64+0x83/0x230
[   68.695064]  kunit_try_run_case+0x1a2/0x480
[   68.695069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.695073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.695078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.695082]  ? __kthread_parkme+0x82/0x180
[   68.695087]  ? preempt_count_sub+0x50/0x80
[   68.695091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.695096]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.695100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.695105]  kthread+0x334/0x6f0
[   68.695109]  ? trace_preempt_on+0x20/0xc0
[   68.695113]  ? __pfx_kthread+0x10/0x10
[   68.695118]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.695122]  ? calculate_sigpending+0x7b/0xa0
[   68.695126]  ? __pfx_kthread+0x10/0x10
[   68.695131]  ret_from_fork+0x3e/0x80
[   68.695135]  ? __pfx_kthread+0x10/0x10
[   68.695139]  ret_from_fork_asm+0x1a/0x30
[   68.695145]  </TASK>
[   68.695147] 
[   68.876109] Allocated by task 308:
[   68.879513]  kasan_save_stack+0x45/0x70
[   68.883355]  kasan_save_track+0x18/0x40
[   68.887202]  kasan_save_alloc_info+0x3b/0x50
[   68.891475]  __kasan_kmalloc+0xb7/0xc0
[   68.895228]  __kmalloc_cache_noprof+0x189/0x420
[   68.899759]  kasan_atomics+0x95/0x310
[   68.903426]  kunit_try_run_case+0x1a2/0x480
[   68.907611]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.913009]  kthread+0x334/0x6f0
[   68.916243]  ret_from_fork+0x3e/0x80
[   68.919821]  ret_from_fork_asm+0x1a/0x30
[   68.923748] 
[   68.925245] The buggy address belongs to the object at ffff8881061f7500
[   68.925245]  which belongs to the cache kmalloc-64 of size 64
[   68.937580] The buggy address is located 0 bytes to the right of
[   68.937580]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   68.950440] 
[   68.951940] The buggy address belongs to the physical page:
[   68.957512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   68.965520] flags: 0x200000000000000(node=0|zone=2)
[   68.970398] page_type: f5(slab)
[   68.973545] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.981294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.989040] page dumped because: kasan: bad access detected
[   68.994610] 
[   68.996109] Memory state around the buggy address:
[   69.000904]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.008130]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.015350] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.022567]                                      ^
[   69.027362]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.034580]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.041800] ==================================================================
[   56.992852] ==================================================================
[   57.000085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   57.007398] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   57.014791] 
[   57.016290] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   57.016297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.016299] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.016303] Call Trace:
[   57.016305]  <TASK>
[   57.016306]  dump_stack_lvl+0x73/0xb0
[   57.016310]  print_report+0xd1/0x650
[   57.016314]  ? __virt_addr_valid+0x1db/0x2d0
[   57.016318]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.016322]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.016327]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.016331]  kasan_report+0x141/0x180
[   57.016336]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.016341]  kasan_check_range+0x10c/0x1c0
[   57.016346]  __kasan_check_write+0x18/0x20
[   57.016349]  kasan_atomics_helper+0xb6a/0x5450
[   57.016354]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.016358]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.016362]  ? kasan_atomics+0x152/0x310
[   57.016366]  kasan_atomics+0x1dc/0x310
[   57.016370]  ? __pfx_kasan_atomics+0x10/0x10
[   57.016374]  ? ktime_get_ts64+0x83/0x230
[   57.016378]  kunit_try_run_case+0x1a2/0x480
[   57.016383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.016387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.016392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.016397]  ? __kthread_parkme+0x82/0x180
[   57.016401]  ? preempt_count_sub+0x50/0x80
[   57.016406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.016410]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.016415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.016419]  kthread+0x334/0x6f0
[   57.016423]  ? trace_preempt_on+0x20/0xc0
[   57.016427]  ? __pfx_kthread+0x10/0x10
[   57.016432]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.016436]  ? calculate_sigpending+0x7b/0xa0
[   57.016440]  ? __pfx_kthread+0x10/0x10
[   57.016445]  ret_from_fork+0x3e/0x80
[   57.016449]  ? __pfx_kthread+0x10/0x10
[   57.016453]  ret_from_fork_asm+0x1a/0x30
[   57.016459]  </TASK>
[   57.016461] 
[   57.197145] Allocated by task 308:
[   57.200552]  kasan_save_stack+0x45/0x70
[   57.204390]  kasan_save_track+0x18/0x40
[   57.208231]  kasan_save_alloc_info+0x3b/0x50
[   57.212503]  __kasan_kmalloc+0xb7/0xc0
[   57.216254]  __kmalloc_cache_noprof+0x189/0x420
[   57.220786]  kasan_atomics+0x95/0x310
[   57.224454]  kunit_try_run_case+0x1a2/0x480
[   57.228641]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.234047]  kthread+0x334/0x6f0
[   57.237279]  ret_from_fork+0x3e/0x80
[   57.240858]  ret_from_fork_asm+0x1a/0x30
[   57.244784] 
[   57.246283] The buggy address belongs to the object at ffff8881061f7500
[   57.246283]  which belongs to the cache kmalloc-64 of size 64
[   57.258615] The buggy address is located 0 bytes to the right of
[   57.258615]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   57.271478] 
[   57.272976] The buggy address belongs to the physical page:
[   57.278547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   57.286548] flags: 0x200000000000000(node=0|zone=2)
[   57.291436] page_type: f5(slab)
[   57.294583] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.302330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.310077] page dumped because: kasan: bad access detected
[   57.315647] 
[   57.317149] Memory state around the buggy address:
[   57.321942]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.329169]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.336389] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.343614]                                      ^
[   57.348407]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.355627]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.362845] ==================================================================
[   74.374244] ==================================================================
[   74.381474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   74.388868] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   74.396174] 
[   74.397691] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   74.397699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.397701] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.397705] Call Trace:
[   74.397706]  <TASK>
[   74.397708]  dump_stack_lvl+0x73/0xb0
[   74.397712]  print_report+0xd1/0x650
[   74.397717]  ? __virt_addr_valid+0x1db/0x2d0
[   74.397733]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.397737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.397742]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.397746]  kasan_report+0x141/0x180
[   74.397750]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.397755]  __asan_report_load8_noabort+0x18/0x20
[   74.397759]  kasan_atomics_helper+0x4fa5/0x5450
[   74.397764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.397768]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.397772]  ? kasan_atomics+0x152/0x310
[   74.397776]  kasan_atomics+0x1dc/0x310
[   74.397780]  ? __pfx_kasan_atomics+0x10/0x10
[   74.397784]  ? ktime_get_ts64+0x83/0x230
[   74.397789]  kunit_try_run_case+0x1a2/0x480
[   74.397793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.397797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.397802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.397807]  ? __kthread_parkme+0x82/0x180
[   74.397811]  ? preempt_count_sub+0x50/0x80
[   74.397816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.397821]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.397825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.397829]  kthread+0x334/0x6f0
[   74.397833]  ? trace_preempt_on+0x20/0xc0
[   74.397838]  ? __pfx_kthread+0x10/0x10
[   74.397842]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.397847]  ? calculate_sigpending+0x7b/0xa0
[   74.397851]  ? __pfx_kthread+0x10/0x10
[   74.397855]  ret_from_fork+0x3e/0x80
[   74.397859]  ? __pfx_kthread+0x10/0x10
[   74.397864]  ret_from_fork_asm+0x1a/0x30
[   74.397870]  </TASK>
[   74.397871] 
[   74.575470] Allocated by task 308:
[   74.578876]  kasan_save_stack+0x45/0x70
[   74.582739]  kasan_save_track+0x18/0x40
[   74.586581]  kasan_save_alloc_info+0x3b/0x50
[   74.590852]  __kasan_kmalloc+0xb7/0xc0
[   74.594606]  __kmalloc_cache_noprof+0x189/0x420
[   74.599147]  kasan_atomics+0x95/0x310
[   74.602812]  kunit_try_run_case+0x1a2/0x480
[   74.606996]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.612398]  kthread+0x334/0x6f0
[   74.615637]  ret_from_fork+0x3e/0x80
[   74.619216]  ret_from_fork_asm+0x1a/0x30
[   74.623142] 
[   74.624642] The buggy address belongs to the object at ffff8881061f7500
[   74.624642]  which belongs to the cache kmalloc-64 of size 64
[   74.636975] The buggy address is located 0 bytes to the right of
[   74.636975]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   74.649836] 
[   74.651333] The buggy address belongs to the physical page:
[   74.656907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   74.664914] flags: 0x200000000000000(node=0|zone=2)
[   74.669793] page_type: f5(slab)
[   74.672939] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.680717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.688469] page dumped because: kasan: bad access detected
[   74.694043] 
[   74.695541] Memory state around the buggy address:
[   74.700333]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.707552]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.714772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.721991]                                      ^
[   74.726782]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.734001]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.741221] ==================================================================
[   58.121723] ==================================================================
[   58.128968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   58.136274] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   58.143666] 
[   58.145192] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   58.145200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.145202] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.145205] Call Trace:
[   58.145207]  <TASK>
[   58.145209]  dump_stack_lvl+0x73/0xb0
[   58.145213]  print_report+0xd1/0x650
[   58.145217]  ? __virt_addr_valid+0x1db/0x2d0
[   58.145221]  ? kasan_atomics_helper+0xd47/0x5450
[   58.145225]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.145229]  ? kasan_atomics_helper+0xd47/0x5450
[   58.145233]  kasan_report+0x141/0x180
[   58.145238]  ? kasan_atomics_helper+0xd47/0x5450
[   58.145243]  kasan_check_range+0x10c/0x1c0
[   58.145248]  __kasan_check_write+0x18/0x20
[   58.145251]  kasan_atomics_helper+0xd47/0x5450
[   58.145255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.145260]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.145264]  ? kasan_atomics+0x152/0x310
[   58.145268]  kasan_atomics+0x1dc/0x310
[   58.145271]  ? __pfx_kasan_atomics+0x10/0x10
[   58.145275]  ? ktime_get_ts64+0x83/0x230
[   58.145280]  kunit_try_run_case+0x1a2/0x480
[   58.145285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.145289]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.145294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.145298]  ? __kthread_parkme+0x82/0x180
[   58.145302]  ? preempt_count_sub+0x50/0x80
[   58.145307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.145312]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.145316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.145320]  kthread+0x334/0x6f0
[   58.145324]  ? trace_preempt_on+0x20/0xc0
[   58.145329]  ? __pfx_kthread+0x10/0x10
[   58.145333]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.145337]  ? calculate_sigpending+0x7b/0xa0
[   58.145341]  ? __pfx_kthread+0x10/0x10
[   58.145346]  ret_from_fork+0x3e/0x80
[   58.145350]  ? __pfx_kthread+0x10/0x10
[   58.145354]  ret_from_fork_asm+0x1a/0x30
[   58.145360]  </TASK>
[   58.145362] 
[   58.325995] Allocated by task 308:
[   58.329403]  kasan_save_stack+0x45/0x70
[   58.333242]  kasan_save_track+0x18/0x40
[   58.337082]  kasan_save_alloc_info+0x3b/0x50
[   58.341352]  __kasan_kmalloc+0xb7/0xc0
[   58.345105]  __kmalloc_cache_noprof+0x189/0x420
[   58.349639]  kasan_atomics+0x95/0x310
[   58.353304]  kunit_try_run_case+0x1a2/0x480
[   58.357489]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.362890]  kthread+0x334/0x6f0
[   58.366120]  ret_from_fork+0x3e/0x80
[   58.369705]  ret_from_fork_asm+0x1a/0x30
[   58.373660] 
[   58.375187] The buggy address belongs to the object at ffff8881061f7500
[   58.375187]  which belongs to the cache kmalloc-64 of size 64
[   58.387528] The buggy address is located 0 bytes to the right of
[   58.387528]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   58.400396] 
[   58.401895] The buggy address belongs to the physical page:
[   58.407467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   58.415465] flags: 0x200000000000000(node=0|zone=2)
[   58.420346] page_type: f5(slab)
[   58.423494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.431242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.438987] page dumped because: kasan: bad access detected
[   58.444561] 
[   58.446059] Memory state around the buggy address:
[   58.450852]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.458072]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.465299] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.472516]                                      ^
[   58.477311]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.484538]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.491755] ==================================================================
[   53.597277] ==================================================================
[   53.604495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   53.611808] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   53.619200] 
[   53.620719] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   53.620727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.620729] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.620733] Call Trace:
[   53.620735]  <TASK>
[   53.620737]  dump_stack_lvl+0x73/0xb0
[   53.620740]  print_report+0xd1/0x650
[   53.620744]  ? __virt_addr_valid+0x1db/0x2d0
[   53.620748]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.620753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.620757]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.620761]  kasan_report+0x141/0x180
[   53.620766]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.620771]  kasan_check_range+0x10c/0x1c0
[   53.620775]  __kasan_check_write+0x18/0x20
[   53.620779]  kasan_atomics_helper+0x5fe/0x5450
[   53.620783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.620788]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.620792]  ? kasan_atomics+0x152/0x310
[   53.620796]  kasan_atomics+0x1dc/0x310
[   53.620799]  ? __pfx_kasan_atomics+0x10/0x10
[   53.620803]  ? ktime_get_ts64+0x83/0x230
[   53.620808]  kunit_try_run_case+0x1a2/0x480
[   53.620812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.620817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.620822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.620826]  ? __kthread_parkme+0x82/0x180
[   53.620830]  ? preempt_count_sub+0x50/0x80
[   53.620835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.620840]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.620844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.620848]  kthread+0x334/0x6f0
[   53.620852]  ? trace_preempt_on+0x20/0xc0
[   53.620857]  ? __pfx_kthread+0x10/0x10
[   53.620861]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.620866]  ? calculate_sigpending+0x7b/0xa0
[   53.620870]  ? __pfx_kthread+0x10/0x10
[   53.620874]  ret_from_fork+0x3e/0x80
[   53.620878]  ? __pfx_kthread+0x10/0x10
[   53.620882]  ret_from_fork_asm+0x1a/0x30
[   53.620888]  </TASK>
[   53.620890] 
[   53.801512] Allocated by task 308:
[   53.804917]  kasan_save_stack+0x45/0x70
[   53.808758]  kasan_save_track+0x18/0x40
[   53.812595]  kasan_save_alloc_info+0x3b/0x50
[   53.816870]  __kasan_kmalloc+0xb7/0xc0
[   53.820629]  __kmalloc_cache_noprof+0x189/0x420
[   53.825162]  kasan_atomics+0x95/0x310
[   53.828828]  kunit_try_run_case+0x1a2/0x480
[   53.833014]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.838414]  kthread+0x334/0x6f0
[   53.841647]  ret_from_fork+0x3e/0x80
[   53.845234]  ret_from_fork_asm+0x1a/0x30
[   53.849159] 
[   53.850659] The buggy address belongs to the object at ffff8881061f7500
[   53.850659]  which belongs to the cache kmalloc-64 of size 64
[   53.863025] The buggy address is located 0 bytes to the right of
[   53.863025]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   53.875888] 
[   53.877385] The buggy address belongs to the physical page:
[   53.882960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   53.890966] flags: 0x200000000000000(node=0|zone=2)
[   53.895845] page_type: f5(slab)
[   53.898991] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.906739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.914486] page dumped because: kasan: bad access detected
[   53.920058] 
[   53.921558] Memory state around the buggy address:
[   53.926349]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.933569]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.940789] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.948007]                                      ^
[   53.952801]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.960027]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.967246] ==================================================================
[   51.716860] ==================================================================
[   51.724104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   51.731409] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   51.738735] 
[   51.740235] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   51.740243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.740245] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.740248] Call Trace:
[   51.740250]  <TASK>
[   51.740252]  dump_stack_lvl+0x73/0xb0
[   51.740255]  print_report+0xd1/0x650
[   51.740260]  ? __virt_addr_valid+0x1db/0x2d0
[   51.740263]  ? kasan_atomics_helper+0x3df/0x5450
[   51.740267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.740272]  ? kasan_atomics_helper+0x3df/0x5450
[   51.740276]  kasan_report+0x141/0x180
[   51.740280]  ? kasan_atomics_helper+0x3df/0x5450
[   51.740286]  kasan_check_range+0x10c/0x1c0
[   51.740290]  __kasan_check_read+0x15/0x20
[   51.740294]  kasan_atomics_helper+0x3df/0x5450
[   51.740299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.740303]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.740307]  ? kasan_atomics+0x152/0x310
[   51.740311]  kasan_atomics+0x1dc/0x310
[   51.740315]  ? __pfx_kasan_atomics+0x10/0x10
[   51.740318]  ? ktime_get_ts64+0x83/0x230
[   51.740323]  kunit_try_run_case+0x1a2/0x480
[   51.740328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.740332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.740337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.740342]  ? __kthread_parkme+0x82/0x180
[   51.740346]  ? preempt_count_sub+0x50/0x80
[   51.740351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.740355]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.740359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.740364]  kthread+0x334/0x6f0
[   51.740368]  ? trace_preempt_on+0x20/0xc0
[   51.740372]  ? __pfx_kthread+0x10/0x10
[   51.740377]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.740381]  ? calculate_sigpending+0x7b/0xa0
[   51.740385]  ? __pfx_kthread+0x10/0x10
[   51.740390]  ret_from_fork+0x3e/0x80
[   51.740394]  ? __pfx_kthread+0x10/0x10
[   51.740399]  ret_from_fork_asm+0x1a/0x30
[   51.740405]  </TASK>
[   51.740406] 
[   51.920906] Allocated by task 308:
[   51.924313]  kasan_save_stack+0x45/0x70
[   51.928151]  kasan_save_track+0x18/0x40
[   51.931990]  kasan_save_alloc_info+0x3b/0x50
[   51.936264]  __kasan_kmalloc+0xb7/0xc0
[   51.940016]  __kmalloc_cache_noprof+0x189/0x420
[   51.944548]  kasan_atomics+0x95/0x310
[   51.948214]  kunit_try_run_case+0x1a2/0x480
[   51.952399]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.957800]  kthread+0x334/0x6f0
[   51.961041]  ret_from_fork+0x3e/0x80
[   51.964628]  ret_from_fork_asm+0x1a/0x30
[   51.968555] 
[   51.970052] The buggy address belongs to the object at ffff8881061f7500
[   51.970052]  which belongs to the cache kmalloc-64 of size 64
[   51.982386] The buggy address is located 0 bytes to the right of
[   51.982386]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   51.995248] 
[   51.996746] The buggy address belongs to the physical page:
[   52.002318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   52.010324] flags: 0x200000000000000(node=0|zone=2)
[   52.015205] page_type: f5(slab)
[   52.018351] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.026090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.033829] page dumped because: kasan: bad access detected
[   52.039400] 
[   52.040899] Memory state around the buggy address:
[   52.045707]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.052955]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.060175] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.067394]                                      ^
[   52.072184]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.079406]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.086633] ==================================================================
[   60.008096] ==================================================================
[   60.015311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   60.022706] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   60.030036] 
[   60.031537] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   60.031544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.031546] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.031550] Call Trace:
[   60.031552]  <TASK>
[   60.031553]  dump_stack_lvl+0x73/0xb0
[   60.031557]  print_report+0xd1/0x650
[   60.031561]  ? __virt_addr_valid+0x1db/0x2d0
[   60.031565]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.031569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.031573]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.031578]  kasan_report+0x141/0x180
[   60.031582]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.031587]  __asan_report_load4_noabort+0x18/0x20
[   60.031591]  kasan_atomics_helper+0x4a36/0x5450
[   60.031595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.031600]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.031604]  ? kasan_atomics+0x152/0x310
[   60.031608]  kasan_atomics+0x1dc/0x310
[   60.031611]  ? __pfx_kasan_atomics+0x10/0x10
[   60.031615]  ? ktime_get_ts64+0x83/0x230
[   60.031620]  kunit_try_run_case+0x1a2/0x480
[   60.031625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.031629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.031634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.031638]  ? __kthread_parkme+0x82/0x180
[   60.031643]  ? preempt_count_sub+0x50/0x80
[   60.031647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.031652]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.031656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.031661]  kthread+0x334/0x6f0
[   60.031665]  ? trace_preempt_on+0x20/0xc0
[   60.031669]  ? __pfx_kthread+0x10/0x10
[   60.031691]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.031696]  ? calculate_sigpending+0x7b/0xa0
[   60.031700]  ? __pfx_kthread+0x10/0x10
[   60.031704]  ret_from_fork+0x3e/0x80
[   60.031721]  ? __pfx_kthread+0x10/0x10
[   60.031726]  ret_from_fork_asm+0x1a/0x30
[   60.031732]  </TASK>
[   60.031733] 
[   60.209445] Allocated by task 308:
[   60.212849]  kasan_save_stack+0x45/0x70
[   60.216707]  kasan_save_track+0x18/0x40
[   60.220571]  kasan_save_alloc_info+0x3b/0x50
[   60.224844]  __kasan_kmalloc+0xb7/0xc0
[   60.228596]  __kmalloc_cache_noprof+0x189/0x420
[   60.233130]  kasan_atomics+0x95/0x310
[   60.236797]  kunit_try_run_case+0x1a2/0x480
[   60.240989]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.246388]  kthread+0x334/0x6f0
[   60.249621]  ret_from_fork+0x3e/0x80
[   60.253201]  ret_from_fork_asm+0x1a/0x30
[   60.257136] 
[   60.258635] The buggy address belongs to the object at ffff8881061f7500
[   60.258635]  which belongs to the cache kmalloc-64 of size 64
[   60.270977] The buggy address is located 0 bytes to the right of
[   60.270977]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   60.283844] 
[   60.285344] The buggy address belongs to the physical page:
[   60.290915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   60.298916] flags: 0x200000000000000(node=0|zone=2)
[   60.303794] page_type: f5(slab)
[   60.306940] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.314717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.322460] page dumped because: kasan: bad access detected
[   60.328034] 
[   60.329534] Memory state around the buggy address:
[   60.334326]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.341546]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.348773] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.355993]                                      ^
[   60.360784]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.368004]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.375231] ==================================================================
[   61.512267] ==================================================================
[   61.519499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   61.526900] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   61.534212] 
[   61.535735] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   61.535742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.535744] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.535748] Call Trace:
[   61.535750]  <TASK>
[   61.535751]  dump_stack_lvl+0x73/0xb0
[   61.535755]  print_report+0xd1/0x650
[   61.535759]  ? __virt_addr_valid+0x1db/0x2d0
[   61.535763]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.535767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.535772]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.535776]  kasan_report+0x141/0x180
[   61.535780]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.535785]  __asan_report_load4_noabort+0x18/0x20
[   61.535789]  kasan_atomics_helper+0x4a02/0x5450
[   61.535794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.535798]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.535802]  ? kasan_atomics+0x152/0x310
[   61.535806]  kasan_atomics+0x1dc/0x310
[   61.535809]  ? __pfx_kasan_atomics+0x10/0x10
[   61.535813]  ? ktime_get_ts64+0x83/0x230
[   61.535818]  kunit_try_run_case+0x1a2/0x480
[   61.535823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.535827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.535832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.535837]  ? __kthread_parkme+0x82/0x180
[   61.535841]  ? preempt_count_sub+0x50/0x80
[   61.535846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.535850]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.535855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.535859]  kthread+0x334/0x6f0
[   61.535863]  ? trace_preempt_on+0x20/0xc0
[   61.535868]  ? __pfx_kthread+0x10/0x10
[   61.535872]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.535876]  ? calculate_sigpending+0x7b/0xa0
[   61.535880]  ? __pfx_kthread+0x10/0x10
[   61.535885]  ret_from_fork+0x3e/0x80
[   61.535889]  ? __pfx_kthread+0x10/0x10
[   61.535894]  ret_from_fork_asm+0x1a/0x30
[   61.535899]  </TASK>
[   61.535901] 
[   61.713440] Allocated by task 308:
[   61.716846]  kasan_save_stack+0x45/0x70
[   61.720703]  kasan_save_track+0x18/0x40
[   61.724568]  kasan_save_alloc_info+0x3b/0x50
[   61.728841]  __kasan_kmalloc+0xb7/0xc0
[   61.732594]  __kmalloc_cache_noprof+0x189/0x420
[   61.737126]  kasan_atomics+0x95/0x310
[   61.740790]  kunit_try_run_case+0x1a2/0x480
[   61.744977]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.750375]  kthread+0x334/0x6f0
[   61.753608]  ret_from_fork+0x3e/0x80
[   61.757188]  ret_from_fork_asm+0x1a/0x30
[   61.761115] 
[   61.762612] The buggy address belongs to the object at ffff8881061f7500
[   61.762612]  which belongs to the cache kmalloc-64 of size 64
[   61.774955] The buggy address is located 0 bytes to the right of
[   61.774955]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   61.787824] 
[   61.789322] The buggy address belongs to the physical page:
[   61.794894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   61.802894] flags: 0x200000000000000(node=0|zone=2)
[   61.807772] page_type: f5(slab)
[   61.810918] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.818658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.826432] page dumped because: kasan: bad access detected
[   61.832002] 
[   61.833503] Memory state around the buggy address:
[   61.838296]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.845524]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.852755] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.859977]                                      ^
[   61.864770]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.871989]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.879208] ==================================================================
[   53.974488] ==================================================================
[   53.981742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   53.989051] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   53.996450] 
[   53.997950] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   53.997958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.997960] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.997964] Call Trace:
[   53.997965]  <TASK>
[   53.997967]  dump_stack_lvl+0x73/0xb0
[   53.997971]  print_report+0xd1/0x650
[   53.997975]  ? __virt_addr_valid+0x1db/0x2d0
[   53.997979]  ? kasan_atomics_helper+0x697/0x5450
[   53.997983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.997988]  ? kasan_atomics_helper+0x697/0x5450
[   53.997992]  kasan_report+0x141/0x180
[   53.997996]  ? kasan_atomics_helper+0x697/0x5450
[   53.998001]  kasan_check_range+0x10c/0x1c0
[   53.998006]  __kasan_check_write+0x18/0x20
[   53.998010]  kasan_atomics_helper+0x697/0x5450
[   53.998014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.998019]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.998023]  ? kasan_atomics+0x152/0x310
[   53.998027]  kasan_atomics+0x1dc/0x310
[   53.998030]  ? __pfx_kasan_atomics+0x10/0x10
[   53.998034]  ? ktime_get_ts64+0x83/0x230
[   53.998039]  kunit_try_run_case+0x1a2/0x480
[   53.998044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.998048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.998053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.998057]  ? __kthread_parkme+0x82/0x180
[   53.998062]  ? preempt_count_sub+0x50/0x80
[   53.998067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.998071]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.998075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.998080]  kthread+0x334/0x6f0
[   53.998084]  ? trace_preempt_on+0x20/0xc0
[   53.998088]  ? __pfx_kthread+0x10/0x10
[   53.998093]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.998097]  ? calculate_sigpending+0x7b/0xa0
[   53.998101]  ? __pfx_kthread+0x10/0x10
[   53.998106]  ret_from_fork+0x3e/0x80
[   53.998110]  ? __pfx_kthread+0x10/0x10
[   53.998114]  ret_from_fork_asm+0x1a/0x30
[   53.998120]  </TASK>
[   53.998122] 
[   54.178858] Allocated by task 308:
[   54.182264]  kasan_save_stack+0x45/0x70
[   54.186104]  kasan_save_track+0x18/0x40
[   54.189943]  kasan_save_alloc_info+0x3b/0x50
[   54.194217]  __kasan_kmalloc+0xb7/0xc0
[   54.197969]  __kmalloc_cache_noprof+0x189/0x420
[   54.202502]  kasan_atomics+0x95/0x310
[   54.206167]  kunit_try_run_case+0x1a2/0x480
[   54.210352]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.215752]  kthread+0x334/0x6f0
[   54.218984]  ret_from_fork+0x3e/0x80
[   54.222573]  ret_from_fork_asm+0x1a/0x30
[   54.226506] 
[   54.228005] The buggy address belongs to the object at ffff8881061f7500
[   54.228005]  which belongs to the cache kmalloc-64 of size 64
[   54.240337] The buggy address is located 0 bytes to the right of
[   54.240337]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   54.253197] 
[   54.254705] The buggy address belongs to the physical page:
[   54.260278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   54.268278] flags: 0x200000000000000(node=0|zone=2)
[   54.273156] page_type: f5(slab)
[   54.276304] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.284052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.291797] page dumped because: kasan: bad access detected
[   54.297369] 
[   54.298869] Memory state around the buggy address:
[   54.303662]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.310915]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.318134] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.325352]                                      ^
[   54.330147]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.337367]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.344592] ==================================================================
[   69.801069] ==================================================================
[   69.808295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   69.815707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   69.823124] 
[   69.824623] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   69.824631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.824633] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.824637] Call Trace:
[   69.824638]  <TASK>
[   69.824640]  dump_stack_lvl+0x73/0xb0
[   69.824644]  print_report+0xd1/0x650
[   69.824648]  ? __virt_addr_valid+0x1db/0x2d0
[   69.824652]  ? kasan_atomics_helper+0x1ce1/0x5450
[   69.824657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.824661]  ? kasan_atomics_helper+0x1ce1/0x5450
[   69.824665]  kasan_report+0x141/0x180
[   69.824669]  ? kasan_atomics_helper+0x1ce1/0x5450
[   69.824691]  kasan_check_range+0x10c/0x1c0
[   69.824697]  __kasan_check_write+0x18/0x20
[   69.824700]  kasan_atomics_helper+0x1ce1/0x5450
[   69.824717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.824722]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.824726]  ? kasan_atomics+0x152/0x310
[   69.824730]  kasan_atomics+0x1dc/0x310
[   69.824733]  ? __pfx_kasan_atomics+0x10/0x10
[   69.824737]  ? ktime_get_ts64+0x83/0x230
[   69.824742]  kunit_try_run_case+0x1a2/0x480
[   69.824746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.824750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.824755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.824760]  ? __kthread_parkme+0x82/0x180
[   69.824764]  ? preempt_count_sub+0x50/0x80
[   69.824769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.824773]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.824777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.824782]  kthread+0x334/0x6f0
[   69.824786]  ? trace_preempt_on+0x20/0xc0
[   69.824790]  ? __pfx_kthread+0x10/0x10
[   69.824795]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.824799]  ? calculate_sigpending+0x7b/0xa0
[   69.824803]  ? __pfx_kthread+0x10/0x10
[   69.824807]  ret_from_fork+0x3e/0x80
[   69.824811]  ? __pfx_kthread+0x10/0x10
[   69.824816]  ret_from_fork_asm+0x1a/0x30
[   69.824822]  </TASK>
[   69.824823] 
[   70.005868] Allocated by task 308:
[   70.009275]  kasan_save_stack+0x45/0x70
[   70.013116]  kasan_save_track+0x18/0x40
[   70.016962]  kasan_save_alloc_info+0x3b/0x50
[   70.021236]  __kasan_kmalloc+0xb7/0xc0
[   70.024988]  __kmalloc_cache_noprof+0x189/0x420
[   70.029520]  kasan_atomics+0x95/0x310
[   70.033187]  kunit_try_run_case+0x1a2/0x480
[   70.037378]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.042777]  kthread+0x334/0x6f0
[   70.046012]  ret_from_fork+0x3e/0x80
[   70.049601]  ret_from_fork_asm+0x1a/0x30
[   70.053532] 
[   70.055034] The buggy address belongs to the object at ffff8881061f7500
[   70.055034]  which belongs to the cache kmalloc-64 of size 64
[   70.067375] The buggy address is located 0 bytes to the right of
[   70.067375]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   70.080234] 
[   70.081743] The buggy address belongs to the physical page:
[   70.087315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   70.095314] flags: 0x200000000000000(node=0|zone=2)
[   70.100194] page_type: f5(slab)
[   70.103339] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.111078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.118816] page dumped because: kasan: bad access detected
[   70.124388] 
[   70.125888] Memory state around the buggy address:
[   70.130707]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.137954]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.145181] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.152407]                                      ^
[   70.157199]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.164418]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.171637] ==================================================================
[   58.498998] ==================================================================
[   58.506229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   58.513543] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   58.520935] 
[   58.522436] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   58.522444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.522446] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.522449] Call Trace:
[   58.522451]  <TASK>
[   58.522453]  dump_stack_lvl+0x73/0xb0
[   58.522456]  print_report+0xd1/0x650
[   58.522461]  ? __virt_addr_valid+0x1db/0x2d0
[   58.522464]  ? kasan_atomics_helper+0xde0/0x5450
[   58.522468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.522473]  ? kasan_atomics_helper+0xde0/0x5450
[   58.522477]  kasan_report+0x141/0x180
[   58.522481]  ? kasan_atomics_helper+0xde0/0x5450
[   58.522486]  kasan_check_range+0x10c/0x1c0
[   58.522491]  __kasan_check_write+0x18/0x20
[   58.522495]  kasan_atomics_helper+0xde0/0x5450
[   58.522499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.522504]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.522508]  ? kasan_atomics+0x152/0x310
[   58.522512]  kasan_atomics+0x1dc/0x310
[   58.522515]  ? __pfx_kasan_atomics+0x10/0x10
[   58.522519]  ? ktime_get_ts64+0x83/0x230
[   58.522524]  kunit_try_run_case+0x1a2/0x480
[   58.522529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.522533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.522538]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.522542]  ? __kthread_parkme+0x82/0x180
[   58.522547]  ? preempt_count_sub+0x50/0x80
[   58.522552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.522556]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.522560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.522565]  kthread+0x334/0x6f0
[   58.522569]  ? trace_preempt_on+0x20/0xc0
[   58.522573]  ? __pfx_kthread+0x10/0x10
[   58.522578]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.522582]  ? calculate_sigpending+0x7b/0xa0
[   58.522586]  ? __pfx_kthread+0x10/0x10
[   58.522590]  ret_from_fork+0x3e/0x80
[   58.522595]  ? __pfx_kthread+0x10/0x10
[   58.522599]  ret_from_fork_asm+0x1a/0x30
[   58.522605]  </TASK>
[   58.522607] 
[   58.703230] Allocated by task 308:
[   58.706636]  kasan_save_stack+0x45/0x70
[   58.710474]  kasan_save_track+0x18/0x40
[   58.714313]  kasan_save_alloc_info+0x3b/0x50
[   58.718586]  __kasan_kmalloc+0xb7/0xc0
[   58.722338]  __kmalloc_cache_noprof+0x189/0x420
[   58.726872]  kasan_atomics+0x95/0x310
[   58.730538]  kunit_try_run_case+0x1a2/0x480
[   58.734750]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.740156]  kthread+0x334/0x6f0
[   58.743389]  ret_from_fork+0x3e/0x80
[   58.746969]  ret_from_fork_asm+0x1a/0x30
[   58.750895] 
[   58.752394] The buggy address belongs to the object at ffff8881061f7500
[   58.752394]  which belongs to the cache kmalloc-64 of size 64
[   58.764738] The buggy address is located 0 bytes to the right of
[   58.764738]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   58.777605] 
[   58.779104] The buggy address belongs to the physical page:
[   58.784704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   58.792735] flags: 0x200000000000000(node=0|zone=2)
[   58.797614] page_type: f5(slab)
[   58.800763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.808508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.816247] page dumped because: kasan: bad access detected
[   58.821821] 
[   58.823320] Memory state around the buggy address:
[   58.828113]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.835332]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.842557] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.849776]                                      ^
[   58.854568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.861788]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.869007] ==================================================================
[   74.748464] ==================================================================
[   74.755706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   74.763121] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   74.770521] 
[   74.772021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   74.772028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.772030] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.772034] Call Trace:
[   74.772036]  <TASK>
[   74.772037]  dump_stack_lvl+0x73/0xb0
[   74.772041]  print_report+0xd1/0x650
[   74.772045]  ? __virt_addr_valid+0x1db/0x2d0
[   74.772049]  ? kasan_atomics_helper+0x224c/0x5450
[   74.772053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.772057]  ? kasan_atomics_helper+0x224c/0x5450
[   74.772062]  kasan_report+0x141/0x180
[   74.772066]  ? kasan_atomics_helper+0x224c/0x5450
[   74.772071]  kasan_check_range+0x10c/0x1c0
[   74.772076]  __kasan_check_write+0x18/0x20
[   74.772080]  kasan_atomics_helper+0x224c/0x5450
[   74.772084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.772089]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.772092]  ? kasan_atomics+0x152/0x310
[   74.772097]  kasan_atomics+0x1dc/0x310
[   74.772100]  ? __pfx_kasan_atomics+0x10/0x10
[   74.772104]  ? ktime_get_ts64+0x83/0x230
[   74.772109]  kunit_try_run_case+0x1a2/0x480
[   74.772113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.772118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.772122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.772127]  ? __kthread_parkme+0x82/0x180
[   74.772131]  ? preempt_count_sub+0x50/0x80
[   74.772136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.772140]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.772144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.772149]  kthread+0x334/0x6f0
[   74.772153]  ? trace_preempt_on+0x20/0xc0
[   74.772157]  ? __pfx_kthread+0x10/0x10
[   74.772162]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.772166]  ? calculate_sigpending+0x7b/0xa0
[   74.772170]  ? __pfx_kthread+0x10/0x10
[   74.772175]  ret_from_fork+0x3e/0x80
[   74.772179]  ? __pfx_kthread+0x10/0x10
[   74.772183]  ret_from_fork_asm+0x1a/0x30
[   74.772189]  </TASK>
[   74.772191] 
[   74.953154] Allocated by task 308:
[   74.956561]  kasan_save_stack+0x45/0x70
[   74.960408]  kasan_save_track+0x18/0x40
[   74.964247]  kasan_save_alloc_info+0x3b/0x50
[   74.968520]  __kasan_kmalloc+0xb7/0xc0
[   74.972272]  __kmalloc_cache_noprof+0x189/0x420
[   74.976804]  kasan_atomics+0x95/0x310
[   74.980469]  kunit_try_run_case+0x1a2/0x480
[   74.984655]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.990057]  kthread+0x334/0x6f0
[   74.993295]  ret_from_fork+0x3e/0x80
[   74.996876]  ret_from_fork_asm+0x1a/0x30
[   75.000801] 
[   75.002301] The buggy address belongs to the object at ffff8881061f7500
[   75.002301]  which belongs to the cache kmalloc-64 of size 64
[   75.014641] The buggy address is located 0 bytes to the right of
[   75.014641]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   75.027501] 
[   75.029000] The buggy address belongs to the physical page:
[   75.034574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   75.042581] flags: 0x200000000000000(node=0|zone=2)
[   75.047460] page_type: f5(slab)
[   75.050609] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.058354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.066093] page dumped because: kasan: bad access detected
[   75.071665] 
[   75.073189] Memory state around the buggy address:
[   75.077982]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.085202]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.092423] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.099648]                                      ^
[   75.104442]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.111688]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.118940] ==================================================================
[   66.405096] ==================================================================
[   66.412323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   66.419735] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   66.427134] 
[   66.428634] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   66.428642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.428644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.428648] Call Trace:
[   66.428649]  <TASK>
[   66.428651]  dump_stack_lvl+0x73/0xb0
[   66.428655]  print_report+0xd1/0x650
[   66.428659]  ? __virt_addr_valid+0x1db/0x2d0
[   66.428663]  ? kasan_atomics_helper+0x177f/0x5450
[   66.428667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.428688]  ? kasan_atomics_helper+0x177f/0x5450
[   66.428693]  kasan_report+0x141/0x180
[   66.428697]  ? kasan_atomics_helper+0x177f/0x5450
[   66.428702]  kasan_check_range+0x10c/0x1c0
[   66.428720]  __kasan_check_write+0x18/0x20
[   66.428724]  kasan_atomics_helper+0x177f/0x5450
[   66.428728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.428732]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.428736]  ? kasan_atomics+0x152/0x310
[   66.428741]  kasan_atomics+0x1dc/0x310
[   66.428744]  ? __pfx_kasan_atomics+0x10/0x10
[   66.428748]  ? ktime_get_ts64+0x83/0x230
[   66.428753]  kunit_try_run_case+0x1a2/0x480
[   66.428757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.428762]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.428767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.428771]  ? __kthread_parkme+0x82/0x180
[   66.428775]  ? preempt_count_sub+0x50/0x80
[   66.428780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.428785]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.428789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.428793]  kthread+0x334/0x6f0
[   66.428797]  ? trace_preempt_on+0x20/0xc0
[   66.428802]  ? __pfx_kthread+0x10/0x10
[   66.428806]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.428811]  ? calculate_sigpending+0x7b/0xa0
[   66.428815]  ? __pfx_kthread+0x10/0x10
[   66.428819]  ret_from_fork+0x3e/0x80
[   66.428823]  ? __pfx_kthread+0x10/0x10
[   66.428828]  ret_from_fork_asm+0x1a/0x30
[   66.428834]  </TASK>
[   66.428835] 
[   66.609882] Allocated by task 308:
[   66.613286]  kasan_save_stack+0x45/0x70
[   66.617126]  kasan_save_track+0x18/0x40
[   66.620965]  kasan_save_alloc_info+0x3b/0x50
[   66.625238]  __kasan_kmalloc+0xb7/0xc0
[   66.628990]  __kmalloc_cache_noprof+0x189/0x420
[   66.633522]  kasan_atomics+0x95/0x310
[   66.637187]  kunit_try_run_case+0x1a2/0x480
[   66.641373]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.646772]  kthread+0x334/0x6f0
[   66.650006]  ret_from_fork+0x3e/0x80
[   66.653584]  ret_from_fork_asm+0x1a/0x30
[   66.657509] 
[   66.659009] The buggy address belongs to the object at ffff8881061f7500
[   66.659009]  which belongs to the cache kmalloc-64 of size 64
[   66.671349] The buggy address is located 0 bytes to the right of
[   66.671349]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   66.684212] 
[   66.685710] The buggy address belongs to the physical page:
[   66.691281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   66.699282] flags: 0x200000000000000(node=0|zone=2)
[   66.704162] page_type: f5(slab)
[   66.707307] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.715047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.722793] page dumped because: kasan: bad access detected
[   66.728366] 
[   66.729865] Memory state around the buggy address:
[   66.734659]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.741911]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.749131] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.756351]                                      ^
[   66.761143]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.768369]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.775589] ==================================================================
[   59.630875] ==================================================================
[   59.638105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   59.645419] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   59.652820] 
[   59.654321] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   59.654328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.654330] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.654334] Call Trace:
[   59.654335]  <TASK>
[   59.654337]  dump_stack_lvl+0x73/0xb0
[   59.654341]  print_report+0xd1/0x650
[   59.654345]  ? __virt_addr_valid+0x1db/0x2d0
[   59.654349]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.654353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.654357]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.654362]  kasan_report+0x141/0x180
[   59.654366]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.654371]  kasan_check_range+0x10c/0x1c0
[   59.654376]  __kasan_check_write+0x18/0x20
[   59.654380]  kasan_atomics_helper+0xfa9/0x5450
[   59.654384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.654388]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.654392]  ? kasan_atomics+0x152/0x310
[   59.654396]  kasan_atomics+0x1dc/0x310
[   59.654400]  ? __pfx_kasan_atomics+0x10/0x10
[   59.654404]  ? ktime_get_ts64+0x83/0x230
[   59.654408]  kunit_try_run_case+0x1a2/0x480
[   59.654413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.654417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.654422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.654427]  ? __kthread_parkme+0x82/0x180
[   59.654431]  ? preempt_count_sub+0x50/0x80
[   59.654436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.654440]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.654445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.654449]  kthread+0x334/0x6f0
[   59.654453]  ? trace_preempt_on+0x20/0xc0
[   59.654458]  ? __pfx_kthread+0x10/0x10
[   59.654462]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.654467]  ? calculate_sigpending+0x7b/0xa0
[   59.654471]  ? __pfx_kthread+0x10/0x10
[   59.654475]  ret_from_fork+0x3e/0x80
[   59.654479]  ? __pfx_kthread+0x10/0x10
[   59.654484]  ret_from_fork_asm+0x1a/0x30
[   59.654490]  </TASK>
[   59.654491] 
[   59.835113] Allocated by task 308:
[   59.838521]  kasan_save_stack+0x45/0x70
[   59.842369]  kasan_save_track+0x18/0x40
[   59.846217]  kasan_save_alloc_info+0x3b/0x50
[   59.850497]  __kasan_kmalloc+0xb7/0xc0
[   59.854250]  __kmalloc_cache_noprof+0x189/0x420
[   59.858781]  kasan_atomics+0x95/0x310
[   59.862447]  kunit_try_run_case+0x1a2/0x480
[   59.866632]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.872032]  kthread+0x334/0x6f0
[   59.875266]  ret_from_fork+0x3e/0x80
[   59.878851]  ret_from_fork_asm+0x1a/0x30
[   59.882779] 
[   59.884277] The buggy address belongs to the object at ffff8881061f7500
[   59.884277]  which belongs to the cache kmalloc-64 of size 64
[   59.896610] The buggy address is located 0 bytes to the right of
[   59.896610]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   59.909471] 
[   59.910970] The buggy address belongs to the physical page:
[   59.916543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   59.924549] flags: 0x200000000000000(node=0|zone=2)
[   59.929429] page_type: f5(slab)
[   59.932575] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.940324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.948071] page dumped because: kasan: bad access detected
[   59.953641] 
[   59.955142] Memory state around the buggy address:
[   59.959936]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.967163]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.974381] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.981598]                                      ^
[   59.986392]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.993611]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.000830] ==================================================================
[   67.160462] ==================================================================
[   67.167705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   67.175120] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   67.182513] 
[   67.184014] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   67.184022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.184024] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.184027] Call Trace:
[   67.184029]  <TASK>
[   67.184031]  dump_stack_lvl+0x73/0xb0
[   67.184034]  print_report+0xd1/0x650
[   67.184038]  ? __virt_addr_valid+0x1db/0x2d0
[   67.184042]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.184046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.184051]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.184055]  kasan_report+0x141/0x180
[   67.184059]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.184064]  kasan_check_range+0x10c/0x1c0
[   67.184069]  __kasan_check_write+0x18/0x20
[   67.184073]  kasan_atomics_helper+0x18b1/0x5450
[   67.184077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.184082]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.184086]  ? kasan_atomics+0x152/0x310
[   67.184090]  kasan_atomics+0x1dc/0x310
[   67.184093]  ? __pfx_kasan_atomics+0x10/0x10
[   67.184097]  ? ktime_get_ts64+0x83/0x230
[   67.184102]  kunit_try_run_case+0x1a2/0x480
[   67.184106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.184110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.184115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.184120]  ? __kthread_parkme+0x82/0x180
[   67.184124]  ? preempt_count_sub+0x50/0x80
[   67.184129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.184134]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.184138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.184142]  kthread+0x334/0x6f0
[   67.184146]  ? trace_preempt_on+0x20/0xc0
[   67.184151]  ? __pfx_kthread+0x10/0x10
[   67.184155]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.184159]  ? calculate_sigpending+0x7b/0xa0
[   67.184163]  ? __pfx_kthread+0x10/0x10
[   67.184168]  ret_from_fork+0x3e/0x80
[   67.184172]  ? __pfx_kthread+0x10/0x10
[   67.184176]  ret_from_fork_asm+0x1a/0x30
[   67.184182]  </TASK>
[   67.184184] 
[   67.365129] Allocated by task 308:
[   67.368534]  kasan_save_stack+0x45/0x70
[   67.372372]  kasan_save_track+0x18/0x40
[   67.376212]  kasan_save_alloc_info+0x3b/0x50
[   67.380485]  __kasan_kmalloc+0xb7/0xc0
[   67.384236]  __kmalloc_cache_noprof+0x189/0x420
[   67.388771]  kasan_atomics+0x95/0x310
[   67.392435]  kunit_try_run_case+0x1a2/0x480
[   67.396621]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.402019]  kthread+0x334/0x6f0
[   67.405253]  ret_from_fork+0x3e/0x80
[   67.408831]  ret_from_fork_asm+0x1a/0x30
[   67.412759] 
[   67.414258] The buggy address belongs to the object at ffff8881061f7500
[   67.414258]  which belongs to the cache kmalloc-64 of size 64
[   67.426599] The buggy address is located 0 bytes to the right of
[   67.426599]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   67.439468] 
[   67.440967] The buggy address belongs to the physical page:
[   67.446541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   67.454545] flags: 0x200000000000000(node=0|zone=2)
[   67.459426] page_type: f5(slab)
[   67.462573] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.470320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.478059] page dumped because: kasan: bad access detected
[   67.483630] 
[   67.485129] Memory state around the buggy address:
[   67.489923]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.497141]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.504359] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.511578]                                      ^
[   67.516372]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.523592]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.530810] ==================================================================
[   72.492514] ==================================================================
[   72.499761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   72.507161] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   72.514554] 
[   72.516055] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   72.516063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.516065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.516069] Call Trace:
[   72.516070]  <TASK>
[   72.516072]  dump_stack_lvl+0x73/0xb0
[   72.516076]  print_report+0xd1/0x650
[   72.516080]  ? __virt_addr_valid+0x1db/0x2d0
[   72.516084]  ? kasan_atomics_helper+0x2006/0x5450
[   72.516088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.516093]  ? kasan_atomics_helper+0x2006/0x5450
[   72.516097]  kasan_report+0x141/0x180
[   72.516101]  ? kasan_atomics_helper+0x2006/0x5450
[   72.516106]  kasan_check_range+0x10c/0x1c0
[   72.516111]  __kasan_check_write+0x18/0x20
[   72.516115]  kasan_atomics_helper+0x2006/0x5450
[   72.516119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.516124]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.516128]  ? kasan_atomics+0x152/0x310
[   72.516132]  kasan_atomics+0x1dc/0x310
[   72.516135]  ? __pfx_kasan_atomics+0x10/0x10
[   72.516139]  ? ktime_get_ts64+0x83/0x230
[   72.516144]  kunit_try_run_case+0x1a2/0x480
[   72.516149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.516153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.516158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.516162]  ? __kthread_parkme+0x82/0x180
[   72.516167]  ? preempt_count_sub+0x50/0x80
[   72.516171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.516176]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.516180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.516184]  kthread+0x334/0x6f0
[   72.516188]  ? trace_preempt_on+0x20/0xc0
[   72.516193]  ? __pfx_kthread+0x10/0x10
[   72.516197]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.516201]  ? calculate_sigpending+0x7b/0xa0
[   72.516205]  ? __pfx_kthread+0x10/0x10
[   72.516210]  ret_from_fork+0x3e/0x80
[   72.516214]  ? __pfx_kthread+0x10/0x10
[   72.516219]  ret_from_fork_asm+0x1a/0x30
[   72.516224]  </TASK>
[   72.516226] 
[   72.697240] Allocated by task 308:
[   72.700645]  kasan_save_stack+0x45/0x70
[   72.704485]  kasan_save_track+0x18/0x40
[   72.708324]  kasan_save_alloc_info+0x3b/0x50
[   72.712597]  __kasan_kmalloc+0xb7/0xc0
[   72.716356]  __kmalloc_cache_noprof+0x189/0x420
[   72.720890]  kasan_atomics+0x95/0x310
[   72.724556]  kunit_try_run_case+0x1a2/0x480
[   72.728749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.734147]  kthread+0x334/0x6f0
[   72.737380]  ret_from_fork+0x3e/0x80
[   72.740959]  ret_from_fork_asm+0x1a/0x30
[   72.744886] 
[   72.746384] The buggy address belongs to the object at ffff8881061f7500
[   72.746384]  which belongs to the cache kmalloc-64 of size 64
[   72.758736] The buggy address is located 0 bytes to the right of
[   72.758736]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   72.771603] 
[   72.773103] The buggy address belongs to the physical page:
[   72.778694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   72.786718] flags: 0x200000000000000(node=0|zone=2)
[   72.791605] page_type: f5(slab)
[   72.794753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.802501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.810248] page dumped because: kasan: bad access detected
[   72.815820] 
[   72.817319] Memory state around the buggy address:
[   72.822112]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.829330]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.836549] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.843769]                                      ^
[   72.848561]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.855788]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.863005] ==================================================================
[   63.390483] ==================================================================
[   63.397735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   63.405131] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   63.412435] 
[   63.413938] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   63.413945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.413947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.413951] Call Trace:
[   63.413952]  <TASK>
[   63.413954]  dump_stack_lvl+0x73/0xb0
[   63.413958]  print_report+0xd1/0x650
[   63.413962]  ? __virt_addr_valid+0x1db/0x2d0
[   63.413966]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.413970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.413974]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.413978]  kasan_report+0x141/0x180
[   63.413983]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.413988]  kasan_check_range+0x10c/0x1c0
[   63.413993]  __kasan_check_read+0x15/0x20
[   63.413996]  kasan_atomics_helper+0x13b5/0x5450
[   63.414001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.414005]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.414009]  ? kasan_atomics+0x152/0x310
[   63.414013]  kasan_atomics+0x1dc/0x310
[   63.414016]  ? __pfx_kasan_atomics+0x10/0x10
[   63.414020]  ? ktime_get_ts64+0x83/0x230
[   63.414025]  kunit_try_run_case+0x1a2/0x480
[   63.414029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.414034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.414038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.414043]  ? __kthread_parkme+0x82/0x180
[   63.414047]  ? preempt_count_sub+0x50/0x80
[   63.414052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.414057]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.414061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.414065]  kthread+0x334/0x6f0
[   63.414069]  ? trace_preempt_on+0x20/0xc0
[   63.414074]  ? __pfx_kthread+0x10/0x10
[   63.414078]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.414082]  ? calculate_sigpending+0x7b/0xa0
[   63.414086]  ? __pfx_kthread+0x10/0x10
[   63.414091]  ret_from_fork+0x3e/0x80
[   63.414095]  ? __pfx_kthread+0x10/0x10
[   63.414100]  ret_from_fork_asm+0x1a/0x30
[   63.414105]  </TASK>
[   63.414107] 
[   63.595093] Allocated by task 308:
[   63.598502]  kasan_save_stack+0x45/0x70
[   63.602350]  kasan_save_track+0x18/0x40
[   63.606195]  kasan_save_alloc_info+0x3b/0x50
[   63.610470]  __kasan_kmalloc+0xb7/0xc0
[   63.614229]  __kmalloc_cache_noprof+0x189/0x420
[   63.618764]  kasan_atomics+0x95/0x310
[   63.622427]  kunit_try_run_case+0x1a2/0x480
[   63.626614]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.632014]  kthread+0x334/0x6f0
[   63.635253]  ret_from_fork+0x3e/0x80
[   63.638834]  ret_from_fork_asm+0x1a/0x30
[   63.642759] 
[   63.644259] The buggy address belongs to the object at ffff8881061f7500
[   63.644259]  which belongs to the cache kmalloc-64 of size 64
[   63.656599] The buggy address is located 0 bytes to the right of
[   63.656599]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   63.669459] 
[   63.670959] The buggy address belongs to the physical page:
[   63.676532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   63.684530] flags: 0x200000000000000(node=0|zone=2)
[   63.689411] page_type: f5(slab)
[   63.692558] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.700303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.708041] page dumped because: kasan: bad access detected
[   63.713613] 
[   63.715115] Memory state around the buggy address:
[   63.719907]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.727134]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.734353] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.741573]                                      ^
[   63.746365]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.753584]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.760811] ==================================================================
[   67.538082] ==================================================================
[   67.545325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   67.552740] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   67.560136] 
[   67.561637] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   67.561644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.561647] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.561650] Call Trace:
[   67.561652]  <TASK>
[   67.561653]  dump_stack_lvl+0x73/0xb0
[   67.561657]  print_report+0xd1/0x650
[   67.561661]  ? __virt_addr_valid+0x1db/0x2d0
[   67.561665]  ? kasan_atomics_helper+0x194a/0x5450
[   67.561670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.561691]  ? kasan_atomics_helper+0x194a/0x5450
[   67.561695]  kasan_report+0x141/0x180
[   67.561700]  ? kasan_atomics_helper+0x194a/0x5450
[   67.561705]  kasan_check_range+0x10c/0x1c0
[   67.561710]  __kasan_check_write+0x18/0x20
[   67.561714]  kasan_atomics_helper+0x194a/0x5450
[   67.561731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.561736]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.561740]  ? kasan_atomics+0x152/0x310
[   67.561744]  kasan_atomics+0x1dc/0x310
[   67.561747]  ? __pfx_kasan_atomics+0x10/0x10
[   67.561751]  ? ktime_get_ts64+0x83/0x230
[   67.561756]  kunit_try_run_case+0x1a2/0x480
[   67.561761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.561765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.561770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.561774]  ? __kthread_parkme+0x82/0x180
[   67.561779]  ? preempt_count_sub+0x50/0x80
[   67.561784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.561788]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.561793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.561797]  kthread+0x334/0x6f0
[   67.561801]  ? trace_preempt_on+0x20/0xc0
[   67.561805]  ? __pfx_kthread+0x10/0x10
[   67.561810]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.561814]  ? calculate_sigpending+0x7b/0xa0
[   67.561818]  ? __pfx_kthread+0x10/0x10
[   67.561823]  ret_from_fork+0x3e/0x80
[   67.561827]  ? __pfx_kthread+0x10/0x10
[   67.561831]  ret_from_fork_asm+0x1a/0x30
[   67.561837]  </TASK>
[   67.561839] 
[   67.742872] Allocated by task 308:
[   67.746281]  kasan_save_stack+0x45/0x70
[   67.750126]  kasan_save_track+0x18/0x40
[   67.753966]  kasan_save_alloc_info+0x3b/0x50
[   67.758237]  __kasan_kmalloc+0xb7/0xc0
[   67.761990]  __kmalloc_cache_noprof+0x189/0x420
[   67.766523]  kasan_atomics+0x95/0x310
[   67.770188]  kunit_try_run_case+0x1a2/0x480
[   67.774375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.779774]  kthread+0x334/0x6f0
[   67.783007]  ret_from_fork+0x3e/0x80
[   67.786587]  ret_from_fork_asm+0x1a/0x30
[   67.790520] 
[   67.792020] The buggy address belongs to the object at ffff8881061f7500
[   67.792020]  which belongs to the cache kmalloc-64 of size 64
[   67.804362] The buggy address is located 0 bytes to the right of
[   67.804362]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   67.817230] 
[   67.818745] The buggy address belongs to the physical page:
[   67.824319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   67.832326] flags: 0x200000000000000(node=0|zone=2)
[   67.837207] page_type: f5(slab)
[   67.840352] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.848090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.855830] page dumped because: kasan: bad access detected
[   67.861402] 
[   67.862902] Memory state around the buggy address:
[   67.867706]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.874949]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.882166] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.889384]                                      ^
[   67.894178]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.901398]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.908625] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   47.042863] ==================================================================
[   47.050101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.059055] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   47.066454] 
[   47.067955] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   47.067963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.067964] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.067968] Call Trace:
[   47.067969]  <TASK>
[   47.067971]  dump_stack_lvl+0x73/0xb0
[   47.067974]  print_report+0xd1/0x650
[   47.067978]  ? __virt_addr_valid+0x1db/0x2d0
[   47.067982]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.067986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.067990]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.067994]  kasan_report+0x141/0x180
[   47.067999]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.068004]  kasan_check_range+0x10c/0x1c0
[   47.068008]  __kasan_check_write+0x18/0x20
[   47.068012]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.068016]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.068021]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.068024]  ? trace_hardirqs_on+0x37/0xe0
[   47.068028]  ? kasan_bitops_generic+0x92/0x1c0
[   47.068033]  kasan_bitops_generic+0x121/0x1c0
[   47.068036]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.068040]  ? ktime_get_ts64+0x83/0x230
[   47.068044]  kunit_try_run_case+0x1a2/0x480
[   47.068049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.068053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.068057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.068062]  ? __kthread_parkme+0x82/0x180
[   47.068066]  ? preempt_count_sub+0x50/0x80
[   47.068071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.068075]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.068079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.068083]  kthread+0x334/0x6f0
[   47.068087]  ? trace_preempt_on+0x20/0xc0
[   47.068091]  ? __pfx_kthread+0x10/0x10
[   47.068095]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.068100]  ? calculate_sigpending+0x7b/0xa0
[   47.068103]  ? __pfx_kthread+0x10/0x10
[   47.068108]  ret_from_fork+0x3e/0x80
[   47.068112]  ? __pfx_kthread+0x10/0x10
[   47.068116]  ret_from_fork_asm+0x1a/0x30
[   47.068122]  </TASK>
[   47.068123] 
[   47.262874] Allocated by task 304:
[   47.266281]  kasan_save_stack+0x45/0x70
[   47.270119]  kasan_save_track+0x18/0x40
[   47.273960]  kasan_save_alloc_info+0x3b/0x50
[   47.278232]  __kasan_kmalloc+0xb7/0xc0
[   47.281984]  __kmalloc_cache_noprof+0x189/0x420
[   47.286518]  kasan_bitops_generic+0x92/0x1c0
[   47.290789]  kunit_try_run_case+0x1a2/0x480
[   47.294976]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.300382]  kthread+0x334/0x6f0
[   47.303617]  ret_from_fork+0x3e/0x80
[   47.307195]  ret_from_fork_asm+0x1a/0x30
[   47.311121] 
[   47.312621] The buggy address belongs to the object at ffff888104ed9160
[   47.312621]  which belongs to the cache kmalloc-16 of size 16
[   47.324960] The buggy address is located 8 bytes inside of
[   47.324960]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   47.337206] 
[   47.338710] The buggy address belongs to the physical page:
[   47.344304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   47.352312] flags: 0x200000000000000(node=0|zone=2)
[   47.357189] page_type: f5(slab)
[   47.360337] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.368075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.375814] page dumped because: kasan: bad access detected
[   47.381387] 
[   47.382885] Memory state around the buggy address:
[   47.387709]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   47.394951]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   47.402178] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   47.409395]                                                           ^
[   47.416007]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.423229]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.430456] ==================================================================
[   49.017530] ==================================================================
[   49.024763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.033744] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   49.041142] 
[   49.042642] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   49.042650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.042652] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.042655] Call Trace:
[   49.042656]  <TASK>
[   49.042658]  dump_stack_lvl+0x73/0xb0
[   49.042662]  print_report+0xd1/0x650
[   49.042685]  ? __virt_addr_valid+0x1db/0x2d0
[   49.042689]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.042698]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042703]  kasan_report+0x141/0x180
[   49.042720]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042725]  kasan_check_range+0x10c/0x1c0
[   49.042742]  __kasan_check_write+0x18/0x20
[   49.042745]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.042750]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.042754]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.042758]  ? trace_hardirqs_on+0x37/0xe0
[   49.042762]  ? kasan_bitops_generic+0x92/0x1c0
[   49.042766]  kasan_bitops_generic+0x121/0x1c0
[   49.042769]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.042773]  ? ktime_get_ts64+0x83/0x230
[   49.042778]  kunit_try_run_case+0x1a2/0x480
[   49.042782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.042786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.042791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.042795]  ? __kthread_parkme+0x82/0x180
[   49.042799]  ? preempt_count_sub+0x50/0x80
[   49.042804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.042808]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.042812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.042816]  kthread+0x334/0x6f0
[   49.042820]  ? trace_preempt_on+0x20/0xc0
[   49.042824]  ? __pfx_kthread+0x10/0x10
[   49.042829]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.042833]  ? calculate_sigpending+0x7b/0xa0
[   49.042836]  ? __pfx_kthread+0x10/0x10
[   49.042841]  ret_from_fork+0x3e/0x80
[   49.042845]  ? __pfx_kthread+0x10/0x10
[   49.042849]  ret_from_fork_asm+0x1a/0x30
[   49.042855]  </TASK>
[   49.042856] 
[   49.237656] Allocated by task 304:
[   49.241089]  kasan_save_stack+0x45/0x70
[   49.244927]  kasan_save_track+0x18/0x40
[   49.248768]  kasan_save_alloc_info+0x3b/0x50
[   49.253040]  __kasan_kmalloc+0xb7/0xc0
[   49.256794]  __kmalloc_cache_noprof+0x189/0x420
[   49.261326]  kasan_bitops_generic+0x92/0x1c0
[   49.265597]  kunit_try_run_case+0x1a2/0x480
[   49.269782]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.275184]  kthread+0x334/0x6f0
[   49.278423]  ret_from_fork+0x3e/0x80
[   49.282002]  ret_from_fork_asm+0x1a/0x30
[   49.285930] 
[   49.287429] The buggy address belongs to the object at ffff888104ed9160
[   49.287429]  which belongs to the cache kmalloc-16 of size 16
[   49.299768] The buggy address is located 8 bytes inside of
[   49.299768]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   49.312023] 
[   49.313521] The buggy address belongs to the physical page:
[   49.319095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   49.327101] flags: 0x200000000000000(node=0|zone=2)
[   49.331981] page_type: f5(slab)
[   49.335127] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.342866] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.350606] page dumped because: kasan: bad access detected
[   49.356178] 
[   49.357700] Memory state around the buggy address:
[   49.362538]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   49.369759]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   49.376985] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   49.384203]                                                           ^
[   49.390817]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.398034]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.405256] ==================================================================
[   47.832694] ==================================================================
[   47.839961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.848915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   47.856308] 
[   47.857808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   47.857815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.857817] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.857821] Call Trace:
[   47.857822]  <TASK>
[   47.857824]  dump_stack_lvl+0x73/0xb0
[   47.857827]  print_report+0xd1/0x650
[   47.857832]  ? __virt_addr_valid+0x1db/0x2d0
[   47.857835]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.857844]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857848]  kasan_report+0x141/0x180
[   47.857852]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857857]  kasan_check_range+0x10c/0x1c0
[   47.857862]  __kasan_check_write+0x18/0x20
[   47.857866]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   47.857870]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.857874]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.857878]  ? trace_hardirqs_on+0x37/0xe0
[   47.857882]  ? kasan_bitops_generic+0x92/0x1c0
[   47.857886]  kasan_bitops_generic+0x121/0x1c0
[   47.857890]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.857893]  ? ktime_get_ts64+0x83/0x230
[   47.857898]  kunit_try_run_case+0x1a2/0x480
[   47.857902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.857906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.857911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.857915]  ? __kthread_parkme+0x82/0x180
[   47.857919]  ? preempt_count_sub+0x50/0x80
[   47.857924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.857928]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.857932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.857936]  kthread+0x334/0x6f0
[   47.857940]  ? trace_preempt_on+0x20/0xc0
[   47.857944]  ? __pfx_kthread+0x10/0x10
[   47.857948]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.857952]  ? calculate_sigpending+0x7b/0xa0
[   47.857956]  ? __pfx_kthread+0x10/0x10
[   47.857961]  ret_from_fork+0x3e/0x80
[   47.857965]  ? __pfx_kthread+0x10/0x10
[   47.857969]  ret_from_fork_asm+0x1a/0x30
[   47.857974]  </TASK>
[   47.857976] 
[   48.052779] Allocated by task 304:
[   48.056187]  kasan_save_stack+0x45/0x70
[   48.060023]  kasan_save_track+0x18/0x40
[   48.063864]  kasan_save_alloc_info+0x3b/0x50
[   48.068137]  __kasan_kmalloc+0xb7/0xc0
[   48.071890]  __kmalloc_cache_noprof+0x189/0x420
[   48.076421]  kasan_bitops_generic+0x92/0x1c0
[   48.080702]  kunit_try_run_case+0x1a2/0x480
[   48.084941]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.090347]  kthread+0x334/0x6f0
[   48.093581]  ret_from_fork+0x3e/0x80
[   48.097158]  ret_from_fork_asm+0x1a/0x30
[   48.101085] 
[   48.102583] The buggy address belongs to the object at ffff888104ed9160
[   48.102583]  which belongs to the cache kmalloc-16 of size 16
[   48.114918] The buggy address is located 8 bytes inside of
[   48.114918]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   48.127170] 
[   48.128662] The buggy address belongs to the physical page:
[   48.134260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   48.142259] flags: 0x200000000000000(node=0|zone=2)
[   48.147138] page_type: f5(slab)
[   48.150285] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.158034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.165778] page dumped because: kasan: bad access detected
[   48.171351] 
[   48.172849] Memory state around the buggy address:
[   48.177645]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   48.184872]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   48.192090] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.199310]                                                           ^
[   48.205923]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.213148]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.220369] ==================================================================
[   48.622437] ==================================================================
[   48.629706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.638706] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   48.646124] 
[   48.647625] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   48.647632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.647634] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.647637] Call Trace:
[   48.647639]  <TASK>
[   48.647640]  dump_stack_lvl+0x73/0xb0
[   48.647644]  print_report+0xd1/0x650
[   48.647648]  ? __virt_addr_valid+0x1db/0x2d0
[   48.647652]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647656]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.647660]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647684]  kasan_report+0x141/0x180
[   48.647688]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647694]  kasan_check_range+0x10c/0x1c0
[   48.647699]  __kasan_check_write+0x18/0x20
[   48.647703]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.647720]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.647725]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.647728]  ? trace_hardirqs_on+0x37/0xe0
[   48.647745]  ? kasan_bitops_generic+0x92/0x1c0
[   48.647749]  kasan_bitops_generic+0x121/0x1c0
[   48.647752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.647756]  ? ktime_get_ts64+0x83/0x230
[   48.647761]  kunit_try_run_case+0x1a2/0x480
[   48.647765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.647769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.647773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.647778]  ? __kthread_parkme+0x82/0x180
[   48.647782]  ? preempt_count_sub+0x50/0x80
[   48.647786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.647791]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.647794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.647798]  kthread+0x334/0x6f0
[   48.647802]  ? trace_preempt_on+0x20/0xc0
[   48.647807]  ? __pfx_kthread+0x10/0x10
[   48.647811]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.647815]  ? calculate_sigpending+0x7b/0xa0
[   48.647818]  ? __pfx_kthread+0x10/0x10
[   48.647823]  ret_from_fork+0x3e/0x80
[   48.647827]  ? __pfx_kthread+0x10/0x10
[   48.647831]  ret_from_fork_asm+0x1a/0x30
[   48.647836]  </TASK>
[   48.647838] 
[   48.842743] Allocated by task 304:
[   48.846149]  kasan_save_stack+0x45/0x70
[   48.849989]  kasan_save_track+0x18/0x40
[   48.853830]  kasan_save_alloc_info+0x3b/0x50
[   48.858102]  __kasan_kmalloc+0xb7/0xc0
[   48.861854]  __kmalloc_cache_noprof+0x189/0x420
[   48.866385]  kasan_bitops_generic+0x92/0x1c0
[   48.870657]  kunit_try_run_case+0x1a2/0x480
[   48.874880]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.880288]  kthread+0x334/0x6f0
[   48.883520]  ret_from_fork+0x3e/0x80
[   48.887100]  ret_from_fork_asm+0x1a/0x30
[   48.891025] 
[   48.892525] The buggy address belongs to the object at ffff888104ed9160
[   48.892525]  which belongs to the cache kmalloc-16 of size 16
[   48.904863] The buggy address is located 8 bytes inside of
[   48.904863]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   48.917120] 
[   48.918618] The buggy address belongs to the physical page:
[   48.924191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   48.932198] flags: 0x200000000000000(node=0|zone=2)
[   48.937076] page_type: f5(slab)
[   48.940222] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.947963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.955701] page dumped because: kasan: bad access detected
[   48.961300] 
[   48.962798] Memory state around the buggy address:
[   48.967592]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   48.974811]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   48.982036] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.989257]                                                           ^
[   48.995870]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.003087]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.010308] ==================================================================
[   46.648053] ==================================================================
[   46.655285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.664243] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   46.671637] 
[   46.673138] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   46.673145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.673147] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.673151] Call Trace:
[   46.673152]  <TASK>
[   46.673154]  dump_stack_lvl+0x73/0xb0
[   46.673157]  print_report+0xd1/0x650
[   46.673161]  ? __virt_addr_valid+0x1db/0x2d0
[   46.673165]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.673173]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673178]  kasan_report+0x141/0x180
[   46.673182]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673187]  kasan_check_range+0x10c/0x1c0
[   46.673192]  __kasan_check_write+0x18/0x20
[   46.673195]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.673199]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   46.673204]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.673207]  ? trace_hardirqs_on+0x37/0xe0
[   46.673212]  ? kasan_bitops_generic+0x92/0x1c0
[   46.673216]  kasan_bitops_generic+0x121/0x1c0
[   46.673219]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.673223]  ? ktime_get_ts64+0x83/0x230
[   46.673228]  kunit_try_run_case+0x1a2/0x480
[   46.673232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.673236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.673241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.673245]  ? __kthread_parkme+0x82/0x180
[   46.673249]  ? preempt_count_sub+0x50/0x80
[   46.673254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.673258]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.673262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.673266]  kthread+0x334/0x6f0
[   46.673270]  ? trace_preempt_on+0x20/0xc0
[   46.673274]  ? __pfx_kthread+0x10/0x10
[   46.673278]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.673283]  ? calculate_sigpending+0x7b/0xa0
[   46.673286]  ? __pfx_kthread+0x10/0x10
[   46.673291]  ret_from_fork+0x3e/0x80
[   46.673294]  ? __pfx_kthread+0x10/0x10
[   46.673299]  ret_from_fork_asm+0x1a/0x30
[   46.673304]  </TASK>
[   46.673306] 
[   46.868154] Allocated by task 304:
[   46.871560]  kasan_save_stack+0x45/0x70
[   46.875399]  kasan_save_track+0x18/0x40
[   46.879236]  kasan_save_alloc_info+0x3b/0x50
[   46.883510]  __kasan_kmalloc+0xb7/0xc0
[   46.887262]  __kmalloc_cache_noprof+0x189/0x420
[   46.891794]  kasan_bitops_generic+0x92/0x1c0
[   46.896067]  kunit_try_run_case+0x1a2/0x480
[   46.900253]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.905651]  kthread+0x334/0x6f0
[   46.908884]  ret_from_fork+0x3e/0x80
[   46.912464]  ret_from_fork_asm+0x1a/0x30
[   46.916389] 
[   46.917887] The buggy address belongs to the object at ffff888104ed9160
[   46.917887]  which belongs to the cache kmalloc-16 of size 16
[   46.930222] The buggy address is located 8 bytes inside of
[   46.930222]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   46.942475] 
[   46.943973] The buggy address belongs to the physical page:
[   46.949547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   46.957547] flags: 0x200000000000000(node=0|zone=2)
[   46.962426] page_type: f5(slab)
[   46.965573] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.973318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.981059] page dumped because: kasan: bad access detected
[   46.986629] 
[   46.988130] Memory state around the buggy address:
[   46.992921]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   47.000142]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   47.007368] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   47.014588]                                                           ^
[   47.021199]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.028417]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.035639] ==================================================================
[   48.227592] ==================================================================
[   48.234808] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.243768] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   48.251169] 
[   48.252668] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   48.252695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.252697] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.252701] Call Trace:
[   48.252702]  <TASK>
[   48.252704]  dump_stack_lvl+0x73/0xb0
[   48.252708]  print_report+0xd1/0x650
[   48.252712]  ? __virt_addr_valid+0x1db/0x2d0
[   48.252728]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.252737]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252741]  kasan_report+0x141/0x180
[   48.252746]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252751]  kasan_check_range+0x10c/0x1c0
[   48.252756]  __kasan_check_write+0x18/0x20
[   48.252760]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.252764]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.252768]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.252772]  ? trace_hardirqs_on+0x37/0xe0
[   48.252776]  ? kasan_bitops_generic+0x92/0x1c0
[   48.252781]  kasan_bitops_generic+0x121/0x1c0
[   48.252784]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.252788]  ? ktime_get_ts64+0x83/0x230
[   48.252793]  kunit_try_run_case+0x1a2/0x480
[   48.252797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.252801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.252806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.252811]  ? __kthread_parkme+0x82/0x180
[   48.252815]  ? preempt_count_sub+0x50/0x80
[   48.252820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.252824]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.252828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.252832]  kthread+0x334/0x6f0
[   48.252836]  ? trace_preempt_on+0x20/0xc0
[   48.252841]  ? __pfx_kthread+0x10/0x10
[   48.252845]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.252849]  ? calculate_sigpending+0x7b/0xa0
[   48.252853]  ? __pfx_kthread+0x10/0x10
[   48.252858]  ret_from_fork+0x3e/0x80
[   48.252862]  ? __pfx_kthread+0x10/0x10
[   48.252866]  ret_from_fork_asm+0x1a/0x30
[   48.252872]  </TASK>
[   48.252873] 
[   48.447624] Allocated by task 304:
[   48.451028]  kasan_save_stack+0x45/0x70
[   48.454870]  kasan_save_track+0x18/0x40
[   48.458734]  kasan_save_alloc_info+0x3b/0x50
[   48.463007]  __kasan_kmalloc+0xb7/0xc0
[   48.466758]  __kmalloc_cache_noprof+0x189/0x420
[   48.471291]  kasan_bitops_generic+0x92/0x1c0
[   48.475565]  kunit_try_run_case+0x1a2/0x480
[   48.479749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.485150]  kthread+0x334/0x6f0
[   48.488389]  ret_from_fork+0x3e/0x80
[   48.491968]  ret_from_fork_asm+0x1a/0x30
[   48.495893] 
[   48.497386] The buggy address belongs to the object at ffff888104ed9160
[   48.497386]  which belongs to the cache kmalloc-16 of size 16
[   48.509735] The buggy address is located 8 bytes inside of
[   48.509735]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   48.521989] 
[   48.523489] The buggy address belongs to the physical page:
[   48.529061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   48.537067] flags: 0x200000000000000(node=0|zone=2)
[   48.541948] page_type: f5(slab)
[   48.545094] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.552831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.560571] page dumped because: kasan: bad access detected
[   48.566143] 
[   48.567641] Memory state around the buggy address:
[   48.572436]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   48.579655]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   48.586909] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   48.594128]                                                           ^
[   48.600764]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.607986]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.615211] ==================================================================
[   49.412479] ==================================================================
[   49.419761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.428737] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   49.436044] 
[   49.437547] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   49.437555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.437557] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.437560] Call Trace:
[   49.437562]  <TASK>
[   49.437563]  dump_stack_lvl+0x73/0xb0
[   49.437567]  print_report+0xd1/0x650
[   49.437571]  ? __virt_addr_valid+0x1db/0x2d0
[   49.437574]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.437583]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437587]  kasan_report+0x141/0x180
[   49.437592]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437597]  kasan_check_range+0x10c/0x1c0
[   49.437602]  __kasan_check_read+0x15/0x20
[   49.437605]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.437610]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.437614]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.437618]  ? trace_hardirqs_on+0x37/0xe0
[   49.437622]  ? kasan_bitops_generic+0x92/0x1c0
[   49.437626]  kasan_bitops_generic+0x121/0x1c0
[   49.437630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.437634]  ? ktime_get_ts64+0x83/0x230
[   49.437639]  kunit_try_run_case+0x1a2/0x480
[   49.437643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.437647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.437652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.437657]  ? __kthread_parkme+0x82/0x180
[   49.437661]  ? preempt_count_sub+0x50/0x80
[   49.437665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.437689]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.437693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.437698]  kthread+0x334/0x6f0
[   49.437702]  ? trace_preempt_on+0x20/0xc0
[   49.437706]  ? __pfx_kthread+0x10/0x10
[   49.437711]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.437715]  ? calculate_sigpending+0x7b/0xa0
[   49.437733]  ? __pfx_kthread+0x10/0x10
[   49.437738]  ret_from_fork+0x3e/0x80
[   49.437742]  ? __pfx_kthread+0x10/0x10
[   49.437746]  ret_from_fork_asm+0x1a/0x30
[   49.437752]  </TASK>
[   49.437753] 
[   49.632465] Allocated by task 304:
[   49.635874]  kasan_save_stack+0x45/0x70
[   49.639760]  kasan_save_track+0x18/0x40
[   49.643604]  kasan_save_alloc_info+0x3b/0x50
[   49.647876]  __kasan_kmalloc+0xb7/0xc0
[   49.651629]  __kmalloc_cache_noprof+0x189/0x420
[   49.656168]  kasan_bitops_generic+0x92/0x1c0
[   49.660441]  kunit_try_run_case+0x1a2/0x480
[   49.664626]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.670027]  kthread+0x334/0x6f0
[   49.673258]  ret_from_fork+0x3e/0x80
[   49.676839]  ret_from_fork_asm+0x1a/0x30
[   49.680772] 
[   49.682272] The buggy address belongs to the object at ffff888104ed9160
[   49.682272]  which belongs to the cache kmalloc-16 of size 16
[   49.694614] The buggy address is located 8 bytes inside of
[   49.694614]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   49.706868] 
[   49.708367] The buggy address belongs to the physical page:
[   49.713937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   49.721938] flags: 0x200000000000000(node=0|zone=2)
[   49.726816] page_type: f5(slab)
[   49.729963] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.737711] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.745476] page dumped because: kasan: bad access detected
[   49.751047] 
[   49.752548] Memory state around the buggy address:
[   49.757339]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   49.764559]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   49.771787] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   49.779012]                                                           ^
[   49.785628]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.792853]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.800073] ==================================================================
[   49.807298] ==================================================================
[   49.814529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.823489] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   49.830802] 
[   49.832303] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   49.832310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.832312] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.832315] Call Trace:
[   49.832317]  <TASK>
[   49.832319]  dump_stack_lvl+0x73/0xb0
[   49.832322]  print_report+0xd1/0x650
[   49.832326]  ? __virt_addr_valid+0x1db/0x2d0
[   49.832330]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.832338]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832343]  kasan_report+0x141/0x180
[   49.832347]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832352]  __asan_report_load8_noabort+0x18/0x20
[   49.832356]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   49.832360]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.832365]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.832368]  ? trace_hardirqs_on+0x37/0xe0
[   49.832372]  ? kasan_bitops_generic+0x92/0x1c0
[   49.832377]  kasan_bitops_generic+0x121/0x1c0
[   49.832380]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.832384]  ? ktime_get_ts64+0x83/0x230
[   49.832389]  kunit_try_run_case+0x1a2/0x480
[   49.832393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.832397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.832402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.832406]  ? __kthread_parkme+0x82/0x180
[   49.832410]  ? preempt_count_sub+0x50/0x80
[   49.832415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.832419]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.832423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.832427]  kthread+0x334/0x6f0
[   49.832431]  ? trace_preempt_on+0x20/0xc0
[   49.832436]  ? __pfx_kthread+0x10/0x10
[   49.832440]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.832444]  ? calculate_sigpending+0x7b/0xa0
[   49.832448]  ? __pfx_kthread+0x10/0x10
[   49.832452]  ret_from_fork+0x3e/0x80
[   49.832456]  ? __pfx_kthread+0x10/0x10
[   49.832461]  ret_from_fork_asm+0x1a/0x30
[   49.832466]  </TASK>
[   49.832468] 
[   50.023853] Allocated by task 304:
[   50.027259]  kasan_save_stack+0x45/0x70
[   50.031098]  kasan_save_track+0x18/0x40
[   50.034937]  kasan_save_alloc_info+0x3b/0x50
[   50.039210]  __kasan_kmalloc+0xb7/0xc0
[   50.042971]  __kmalloc_cache_noprof+0x189/0x420
[   50.047512]  kasan_bitops_generic+0x92/0x1c0
[   50.051784]  kunit_try_run_case+0x1a2/0x480
[   50.055971]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.061377]  kthread+0x334/0x6f0
[   50.064609]  ret_from_fork+0x3e/0x80
[   50.068189]  ret_from_fork_asm+0x1a/0x30
[   50.072115] 
[   50.073614] The buggy address belongs to the object at ffff888104ed9160
[   50.073614]  which belongs to the cache kmalloc-16 of size 16
[   50.085956] The buggy address is located 8 bytes inside of
[   50.085956]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   50.098209] 
[   50.099710] The buggy address belongs to the physical page:
[   50.105323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   50.113323] flags: 0x200000000000000(node=0|zone=2)
[   50.118204] page_type: f5(slab)
[   50.121349] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   50.129098] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   50.136843] page dumped because: kasan: bad access detected
[   50.142416] 
[   50.143916] Memory state around the buggy address:
[   50.148709]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   50.155954]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   50.163182] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   50.170409]                                                           ^
[   50.177021]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.184238]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.191459] ==================================================================
[   47.437740] ==================================================================
[   47.444963] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.453915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   47.461307] 
[   47.462808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   47.462816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.462818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.462822] Call Trace:
[   47.462823]  <TASK>
[   47.462825]  dump_stack_lvl+0x73/0xb0
[   47.462828]  print_report+0xd1/0x650
[   47.462833]  ? __virt_addr_valid+0x1db/0x2d0
[   47.462836]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.462845]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462849]  kasan_report+0x141/0x180
[   47.462854]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462859]  kasan_check_range+0x10c/0x1c0
[   47.462864]  __kasan_check_write+0x18/0x20
[   47.462868]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.462872]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.462877]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.462880]  ? trace_hardirqs_on+0x37/0xe0
[   47.462884]  ? kasan_bitops_generic+0x92/0x1c0
[   47.462889]  kasan_bitops_generic+0x121/0x1c0
[   47.462892]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.462896]  ? ktime_get_ts64+0x83/0x230
[   47.462901]  kunit_try_run_case+0x1a2/0x480
[   47.462905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.462910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.462914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.462919]  ? __kthread_parkme+0x82/0x180
[   47.462923]  ? preempt_count_sub+0x50/0x80
[   47.462928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.462933]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.462937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.462941]  kthread+0x334/0x6f0
[   47.462945]  ? trace_preempt_on+0x20/0xc0
[   47.462949]  ? __pfx_kthread+0x10/0x10
[   47.462954]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.462958]  ? calculate_sigpending+0x7b/0xa0
[   47.462962]  ? __pfx_kthread+0x10/0x10
[   47.462966]  ret_from_fork+0x3e/0x80
[   47.462970]  ? __pfx_kthread+0x10/0x10
[   47.462975]  ret_from_fork_asm+0x1a/0x30
[   47.462981]  </TASK>
[   47.462982] 
[   47.657789] Allocated by task 304:
[   47.661196]  kasan_save_stack+0x45/0x70
[   47.665044]  kasan_save_track+0x18/0x40
[   47.668890]  kasan_save_alloc_info+0x3b/0x50
[   47.673164]  __kasan_kmalloc+0xb7/0xc0
[   47.676915]  __kmalloc_cache_noprof+0x189/0x420
[   47.681446]  kasan_bitops_generic+0x92/0x1c0
[   47.685762]  kunit_try_run_case+0x1a2/0x480
[   47.689948]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.695348]  kthread+0x334/0x6f0
[   47.698581]  ret_from_fork+0x3e/0x80
[   47.702158]  ret_from_fork_asm+0x1a/0x30
[   47.706086] 
[   47.707586] The buggy address belongs to the object at ffff888104ed9160
[   47.707586]  which belongs to the cache kmalloc-16 of size 16
[   47.719925] The buggy address is located 8 bytes inside of
[   47.719925]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   47.732173] 
[   47.733702] The buggy address belongs to the physical page:
[   47.739320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   47.747319] flags: 0x200000000000000(node=0|zone=2)
[   47.752198] page_type: f5(slab)
[   47.755345] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.763086] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.770830] page dumped because: kasan: bad access detected
[   47.776404] 
[   47.777904] Memory state around the buggy address:
[   47.782702]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   47.789949]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   47.797167] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   47.804387]                                                           ^
[   47.811001]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.818221]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.825447] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   45.867623] ==================================================================
[   45.874843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.883025] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   45.890416] 
[   45.891917] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   45.891925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.891927] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.891930] Call Trace:
[   45.891931]  <TASK>
[   45.891933]  dump_stack_lvl+0x73/0xb0
[   45.891937]  print_report+0xd1/0x650
[   45.891941]  ? __virt_addr_valid+0x1db/0x2d0
[   45.891944]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.891953]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891959]  kasan_report+0x141/0x180
[   45.891963]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891969]  kasan_check_range+0x10c/0x1c0
[   45.891973]  __kasan_check_write+0x18/0x20
[   45.891977]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891982]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.891987]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.891991]  ? trace_hardirqs_on+0x37/0xe0
[   45.891995]  ? kasan_bitops_generic+0x92/0x1c0
[   45.891999]  kasan_bitops_generic+0x116/0x1c0
[   45.892003]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.892006]  ? ktime_get_ts64+0x83/0x230
[   45.892011]  kunit_try_run_case+0x1a2/0x480
[   45.892016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.892020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.892024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.892029]  ? __kthread_parkme+0x82/0x180
[   45.892033]  ? preempt_count_sub+0x50/0x80
[   45.892037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.892042]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.892046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.892049]  kthread+0x334/0x6f0
[   45.892053]  ? trace_preempt_on+0x20/0xc0
[   45.892058]  ? __pfx_kthread+0x10/0x10
[   45.892062]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.892066]  ? calculate_sigpending+0x7b/0xa0
[   45.892070]  ? __pfx_kthread+0x10/0x10
[   45.892074]  ret_from_fork+0x3e/0x80
[   45.892078]  ? __pfx_kthread+0x10/0x10
[   45.892082]  ret_from_fork_asm+0x1a/0x30
[   45.892087]  </TASK>
[   45.892089] 
[   46.083040] Allocated by task 304:
[   46.086447]  kasan_save_stack+0x45/0x70
[   46.090286]  kasan_save_track+0x18/0x40
[   46.094126]  kasan_save_alloc_info+0x3b/0x50
[   46.098398]  __kasan_kmalloc+0xb7/0xc0
[   46.102151]  __kmalloc_cache_noprof+0x189/0x420
[   46.106708]  kasan_bitops_generic+0x92/0x1c0
[   46.111007]  kunit_try_run_case+0x1a2/0x480
[   46.115193]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.120592]  kthread+0x334/0x6f0
[   46.123825]  ret_from_fork+0x3e/0x80
[   46.127405]  ret_from_fork_asm+0x1a/0x30
[   46.131339] 
[   46.132838] The buggy address belongs to the object at ffff888104ed9160
[   46.132838]  which belongs to the cache kmalloc-16 of size 16
[   46.145171] The buggy address is located 8 bytes inside of
[   46.145171]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   46.157424] 
[   46.158922] The buggy address belongs to the physical page:
[   46.164497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   46.172504] flags: 0x200000000000000(node=0|zone=2)
[   46.177382] page_type: f5(slab)
[   46.180529] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.188276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.196016] page dumped because: kasan: bad access detected
[   46.201588] 
[   46.203086] Memory state around the buggy address:
[   46.207881]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   46.215108]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   46.222326] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.229544]                                                           ^
[   46.236158]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.243375]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.250596] ==================================================================
[   46.257821] ==================================================================
[   46.265052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.273232] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   46.280623] 
[   46.282125] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   46.282132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.282134] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.282138] Call Trace:
[   46.282139]  <TASK>
[   46.282141]  dump_stack_lvl+0x73/0xb0
[   46.282144]  print_report+0xd1/0x650
[   46.282148]  ? __virt_addr_valid+0x1db/0x2d0
[   46.282152]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.282161]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282166]  kasan_report+0x141/0x180
[   46.282170]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282176]  kasan_check_range+0x10c/0x1c0
[   46.282181]  __kasan_check_write+0x18/0x20
[   46.282185]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282190]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   46.282195]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.282198]  ? trace_hardirqs_on+0x37/0xe0
[   46.282202]  ? kasan_bitops_generic+0x92/0x1c0
[   46.282206]  kasan_bitops_generic+0x116/0x1c0
[   46.282210]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.282214]  ? ktime_get_ts64+0x83/0x230
[   46.282218]  kunit_try_run_case+0x1a2/0x480
[   46.282222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.282226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.282231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.282235]  ? __kthread_parkme+0x82/0x180
[   46.282239]  ? preempt_count_sub+0x50/0x80
[   46.282244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.282248]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.282252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.282256]  kthread+0x334/0x6f0
[   46.282260]  ? trace_preempt_on+0x20/0xc0
[   46.282264]  ? __pfx_kthread+0x10/0x10
[   46.282268]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.282272]  ? calculate_sigpending+0x7b/0xa0
[   46.282276]  ? __pfx_kthread+0x10/0x10
[   46.282280]  ret_from_fork+0x3e/0x80
[   46.282284]  ? __pfx_kthread+0x10/0x10
[   46.282288]  ret_from_fork_asm+0x1a/0x30
[   46.282294]  </TASK>
[   46.282295] 
[   46.473222] Allocated by task 304:
[   46.476627]  kasan_save_stack+0x45/0x70
[   46.480467]  kasan_save_track+0x18/0x40
[   46.484306]  kasan_save_alloc_info+0x3b/0x50
[   46.488581]  __kasan_kmalloc+0xb7/0xc0
[   46.492340]  __kmalloc_cache_noprof+0x189/0x420
[   46.496872]  kasan_bitops_generic+0x92/0x1c0
[   46.501146]  kunit_try_run_case+0x1a2/0x480
[   46.505332]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.510744]  kthread+0x334/0x6f0
[   46.513982]  ret_from_fork+0x3e/0x80
[   46.517567]  ret_from_fork_asm+0x1a/0x30
[   46.521494] 
[   46.522995] The buggy address belongs to the object at ffff888104ed9160
[   46.522995]  which belongs to the cache kmalloc-16 of size 16
[   46.535333] The buggy address is located 8 bytes inside of
[   46.535333]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   46.547587] 
[   46.549089] The buggy address belongs to the physical page:
[   46.554659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   46.562702] flags: 0x200000000000000(node=0|zone=2)
[   46.567635] page_type: f5(slab)
[   46.570781] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.578528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.586266] page dumped because: kasan: bad access detected
[   46.591837] 
[   46.593330] Memory state around the buggy address:
[   46.598121]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   46.605340]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   46.612561] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.619777]                                                           ^
[   46.626389]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.633609]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.640827] ==================================================================
[   44.696726] ==================================================================
[   44.703980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.712160] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   44.719552] 
[   44.721051] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   44.721059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.721061] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.721064] Call Trace:
[   44.721065]  <TASK>
[   44.721067]  dump_stack_lvl+0x73/0xb0
[   44.721070]  print_report+0xd1/0x650
[   44.721075]  ? __virt_addr_valid+0x1db/0x2d0
[   44.721078]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.721088]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721092]  kasan_report+0x141/0x180
[   44.721097]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721103]  kasan_check_range+0x10c/0x1c0
[   44.721107]  __kasan_check_write+0x18/0x20
[   44.721111]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721116]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.721121]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.721125]  ? trace_hardirqs_on+0x37/0xe0
[   44.721129]  ? kasan_bitops_generic+0x92/0x1c0
[   44.721133]  kasan_bitops_generic+0x116/0x1c0
[   44.721136]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.721140]  ? ktime_get_ts64+0x83/0x230
[   44.721145]  kunit_try_run_case+0x1a2/0x480
[   44.721149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.721153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.721158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.721162]  ? __kthread_parkme+0x82/0x180
[   44.721166]  ? preempt_count_sub+0x50/0x80
[   44.721171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.721175]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.721179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.721183]  kthread+0x334/0x6f0
[   44.721187]  ? trace_preempt_on+0x20/0xc0
[   44.721191]  ? __pfx_kthread+0x10/0x10
[   44.721195]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.721200]  ? calculate_sigpending+0x7b/0xa0
[   44.721203]  ? __pfx_kthread+0x10/0x10
[   44.721208]  ret_from_fork+0x3e/0x80
[   44.721212]  ? __pfx_kthread+0x10/0x10
[   44.721216]  ret_from_fork_asm+0x1a/0x30
[   44.721222]  </TASK>
[   44.721223] 
[   44.912135] Allocated by task 304:
[   44.915539]  kasan_save_stack+0x45/0x70
[   44.919378]  kasan_save_track+0x18/0x40
[   44.923217]  kasan_save_alloc_info+0x3b/0x50
[   44.927490]  __kasan_kmalloc+0xb7/0xc0
[   44.931243]  __kmalloc_cache_noprof+0x189/0x420
[   44.935777]  kasan_bitops_generic+0x92/0x1c0
[   44.940048]  kunit_try_run_case+0x1a2/0x480
[   44.944232]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.949632]  kthread+0x334/0x6f0
[   44.952865]  ret_from_fork+0x3e/0x80
[   44.956443]  ret_from_fork_asm+0x1a/0x30
[   44.960370] 
[   44.961870] The buggy address belongs to the object at ffff888104ed9160
[   44.961870]  which belongs to the cache kmalloc-16 of size 16
[   44.974211] The buggy address is located 8 bytes inside of
[   44.974211]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   44.986466] 
[   44.987963] The buggy address belongs to the physical page:
[   44.993537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   45.001544] flags: 0x200000000000000(node=0|zone=2)
[   45.006421] page_type: f5(slab)
[   45.009570] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.017316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.025054] page dumped because: kasan: bad access detected
[   45.030627] 
[   45.032125] Memory state around the buggy address:
[   45.036919]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   45.044139]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   45.051358] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.058577]                                                           ^
[   45.065187]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.072407]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.079625] ==================================================================
[   43.916228] ==================================================================
[   43.923462] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.931640] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   43.939035] 
[   43.940535] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   43.940542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.940544] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.940548] Call Trace:
[   43.940549]  <TASK>
[   43.940551]  dump_stack_lvl+0x73/0xb0
[   43.940555]  print_report+0xd1/0x650
[   43.940559]  ? __virt_addr_valid+0x1db/0x2d0
[   43.940562]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.940571]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940576]  kasan_report+0x141/0x180
[   43.940581]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940587]  kasan_check_range+0x10c/0x1c0
[   43.940591]  __kasan_check_write+0x18/0x20
[   43.940595]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940600]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   43.940605]  ? __kmalloc_cache_noprof+0x189/0x420
[   43.940609]  ? trace_hardirqs_on+0x37/0xe0
[   43.940613]  ? kasan_bitops_generic+0x92/0x1c0
[   43.940617]  kasan_bitops_generic+0x116/0x1c0
[   43.940621]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   43.940624]  ? ktime_get_ts64+0x83/0x230
[   43.940629]  kunit_try_run_case+0x1a2/0x480
[   43.940634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.940638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.940642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.940647]  ? __kthread_parkme+0x82/0x180
[   43.940651]  ? preempt_count_sub+0x50/0x80
[   43.940655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.940660]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.940664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.940668]  kthread+0x334/0x6f0
[   43.940689]  ? trace_preempt_on+0x20/0xc0
[   43.940693]  ? __pfx_kthread+0x10/0x10
[   43.940698]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.940702]  ? calculate_sigpending+0x7b/0xa0
[   43.940706]  ? __pfx_kthread+0x10/0x10
[   43.940723]  ret_from_fork+0x3e/0x80
[   43.940727]  ? __pfx_kthread+0x10/0x10
[   43.940731]  ret_from_fork_asm+0x1a/0x30
[   43.940737]  </TASK>
[   43.940738] 
[   44.131625] Allocated by task 304:
[   44.135030]  kasan_save_stack+0x45/0x70
[   44.138870]  kasan_save_track+0x18/0x40
[   44.142717]  kasan_save_alloc_info+0x3b/0x50
[   44.147015]  __kasan_kmalloc+0xb7/0xc0
[   44.150768]  __kmalloc_cache_noprof+0x189/0x420
[   44.155301]  kasan_bitops_generic+0x92/0x1c0
[   44.159571]  kunit_try_run_case+0x1a2/0x480
[   44.163760]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.169158]  kthread+0x334/0x6f0
[   44.172390]  ret_from_fork+0x3e/0x80
[   44.175970]  ret_from_fork_asm+0x1a/0x30
[   44.179896] 
[   44.181396] The buggy address belongs to the object at ffff888104ed9160
[   44.181396]  which belongs to the cache kmalloc-16 of size 16
[   44.193760] The buggy address is located 8 bytes inside of
[   44.193760]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   44.206017] 
[   44.207515] The buggy address belongs to the physical page:
[   44.213086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   44.221086] flags: 0x200000000000000(node=0|zone=2)
[   44.225966] page_type: f5(slab)
[   44.229111] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.236852] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.244598] page dumped because: kasan: bad access detected
[   44.250168] 
[   44.251660] Memory state around the buggy address:
[   44.256489]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   44.263751]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   44.270979] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.278204]                                                           ^
[   44.284816]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.292036]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.299254] ==================================================================
[   45.086850] ==================================================================
[   45.094116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.102288] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   45.109702] 
[   45.111252] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   45.111259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.111261] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.111264] Call Trace:
[   45.111266]  <TASK>
[   45.111268]  dump_stack_lvl+0x73/0xb0
[   45.111271]  print_report+0xd1/0x650
[   45.111275]  ? __virt_addr_valid+0x1db/0x2d0
[   45.111278]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.111288]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111293]  kasan_report+0x141/0x180
[   45.111297]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111303]  kasan_check_range+0x10c/0x1c0
[   45.111307]  __kasan_check_write+0x18/0x20
[   45.111311]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111316]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.111321]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.111325]  ? trace_hardirqs_on+0x37/0xe0
[   45.111329]  ? kasan_bitops_generic+0x92/0x1c0
[   45.111333]  kasan_bitops_generic+0x116/0x1c0
[   45.111337]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.111340]  ? ktime_get_ts64+0x83/0x230
[   45.111345]  kunit_try_run_case+0x1a2/0x480
[   45.111349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.111354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.111358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.111363]  ? __kthread_parkme+0x82/0x180
[   45.111367]  ? preempt_count_sub+0x50/0x80
[   45.111371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.111375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.111379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.111383]  kthread+0x334/0x6f0
[   45.111387]  ? trace_preempt_on+0x20/0xc0
[   45.111392]  ? __pfx_kthread+0x10/0x10
[   45.111396]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.111400]  ? calculate_sigpending+0x7b/0xa0
[   45.111404]  ? __pfx_kthread+0x10/0x10
[   45.111408]  ret_from_fork+0x3e/0x80
[   45.111412]  ? __pfx_kthread+0x10/0x10
[   45.111416]  ret_from_fork_asm+0x1a/0x30
[   45.111422]  </TASK>
[   45.111424] 
[   45.302445] Allocated by task 304:
[   45.305851]  kasan_save_stack+0x45/0x70
[   45.309707]  kasan_save_track+0x18/0x40
[   45.313572]  kasan_save_alloc_info+0x3b/0x50
[   45.317846]  __kasan_kmalloc+0xb7/0xc0
[   45.321599]  __kmalloc_cache_noprof+0x189/0x420
[   45.326139]  kasan_bitops_generic+0x92/0x1c0
[   45.330410]  kunit_try_run_case+0x1a2/0x480
[   45.334598]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.339997]  kthread+0x334/0x6f0
[   45.343238]  ret_from_fork+0x3e/0x80
[   45.346815]  ret_from_fork_asm+0x1a/0x30
[   45.350765] 
[   45.352258] The buggy address belongs to the object at ffff888104ed9160
[   45.352258]  which belongs to the cache kmalloc-16 of size 16
[   45.364590] The buggy address is located 8 bytes inside of
[   45.364590]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   45.376846] 
[   45.378346] The buggy address belongs to the physical page:
[   45.383916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   45.391914] flags: 0x200000000000000(node=0|zone=2)
[   45.396795] page_type: f5(slab)
[   45.399943] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.407704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.415487] page dumped because: kasan: bad access detected
[   45.421061] 
[   45.422559] Memory state around the buggy address:
[   45.427354]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   45.434580]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   45.441798] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.449016]                                                           ^
[   45.455630]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.462851]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.470077] ==================================================================
[   43.522098] ==================================================================
[   43.533157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.541337] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   43.548732] 
[   43.550232] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   43.550240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.550242] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.550245] Call Trace:
[   43.550247]  <TASK>
[   43.550249]  dump_stack_lvl+0x73/0xb0
[   43.550252]  print_report+0xd1/0x650
[   43.550257]  ? __virt_addr_valid+0x1db/0x2d0
[   43.550260]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.550270]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550275]  kasan_report+0x141/0x180
[   43.550279]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550285]  kasan_check_range+0x10c/0x1c0
[   43.550289]  __kasan_check_write+0x18/0x20
[   43.550293]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550298]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   43.550303]  ? __kmalloc_cache_noprof+0x189/0x420
[   43.550307]  ? trace_hardirqs_on+0x37/0xe0
[   43.550311]  ? kasan_bitops_generic+0x92/0x1c0
[   43.550315]  kasan_bitops_generic+0x116/0x1c0
[   43.550319]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   43.550323]  ? ktime_get_ts64+0x83/0x230
[   43.550327]  kunit_try_run_case+0x1a2/0x480
[   43.550332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.550336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.550340]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.550345]  ? __kthread_parkme+0x82/0x180
[   43.550349]  ? preempt_count_sub+0x50/0x80
[   43.550354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.550358]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.550362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.550366]  kthread+0x334/0x6f0
[   43.550370]  ? trace_preempt_on+0x20/0xc0
[   43.550375]  ? __pfx_kthread+0x10/0x10
[   43.550379]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.550383]  ? calculate_sigpending+0x7b/0xa0
[   43.550387]  ? __pfx_kthread+0x10/0x10
[   43.550391]  ret_from_fork+0x3e/0x80
[   43.550395]  ? __pfx_kthread+0x10/0x10
[   43.550400]  ret_from_fork_asm+0x1a/0x30
[   43.550405]  </TASK>
[   43.550407] 
[   43.741312] Allocated by task 304:
[   43.744738]  kasan_save_stack+0x45/0x70
[   43.748585]  kasan_save_track+0x18/0x40
[   43.752432]  kasan_save_alloc_info+0x3b/0x50
[   43.756728]  __kasan_kmalloc+0xb7/0xc0
[   43.760482]  __kmalloc_cache_noprof+0x189/0x420
[   43.765014]  kasan_bitops_generic+0x92/0x1c0
[   43.769289]  kunit_try_run_case+0x1a2/0x480
[   43.773483]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.778880]  kthread+0x334/0x6f0
[   43.782112]  ret_from_fork+0x3e/0x80
[   43.785692]  ret_from_fork_asm+0x1a/0x30
[   43.789645] 
[   43.791144] The buggy address belongs to the object at ffff888104ed9160
[   43.791144]  which belongs to the cache kmalloc-16 of size 16
[   43.803484] The buggy address is located 8 bytes inside of
[   43.803484]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   43.815751] 
[   43.817255] The buggy address belongs to the physical page:
[   43.822827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   43.830827] flags: 0x200000000000000(node=0|zone=2)
[   43.835704] page_type: f5(slab)
[   43.838854] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   43.846598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.854337] page dumped because: kasan: bad access detected
[   43.859910] 
[   43.861411] Memory state around the buggy address:
[   43.866203]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   43.873421]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   43.880639] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.887858]                                                           ^
[   43.894471]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.901705]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.908944] ==================================================================
[   45.477304] ==================================================================
[   45.484533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.492726] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   45.500132] 
[   45.501630] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   45.501638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.501640] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.501643] Call Trace:
[   45.501645]  <TASK>
[   45.501646]  dump_stack_lvl+0x73/0xb0
[   45.501650]  print_report+0xd1/0x650
[   45.501654]  ? __virt_addr_valid+0x1db/0x2d0
[   45.501658]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.501686]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501692]  kasan_report+0x141/0x180
[   45.501696]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501702]  kasan_check_range+0x10c/0x1c0
[   45.501720]  __kasan_check_write+0x18/0x20
[   45.501723]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501741]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.501746]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.501750]  ? trace_hardirqs_on+0x37/0xe0
[   45.501754]  ? kasan_bitops_generic+0x92/0x1c0
[   45.501758]  kasan_bitops_generic+0x116/0x1c0
[   45.501761]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.501765]  ? ktime_get_ts64+0x83/0x230
[   45.501770]  kunit_try_run_case+0x1a2/0x480
[   45.501774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.501778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.501782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.501787]  ? __kthread_parkme+0x82/0x180
[   45.501791]  ? preempt_count_sub+0x50/0x80
[   45.501795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.501800]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.501803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.501808]  kthread+0x334/0x6f0
[   45.501811]  ? trace_preempt_on+0x20/0xc0
[   45.501816]  ? __pfx_kthread+0x10/0x10
[   45.501820]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.501824]  ? calculate_sigpending+0x7b/0xa0
[   45.501828]  ? __pfx_kthread+0x10/0x10
[   45.501832]  ret_from_fork+0x3e/0x80
[   45.501836]  ? __pfx_kthread+0x10/0x10
[   45.501840]  ret_from_fork_asm+0x1a/0x30
[   45.501845]  </TASK>
[   45.501847] 
[   45.692763] Allocated by task 304:
[   45.696171]  kasan_save_stack+0x45/0x70
[   45.700011]  kasan_save_track+0x18/0x40
[   45.703857]  kasan_save_alloc_info+0x3b/0x50
[   45.708130]  __kasan_kmalloc+0xb7/0xc0
[   45.711882]  __kmalloc_cache_noprof+0x189/0x420
[   45.716417]  kasan_bitops_generic+0x92/0x1c0
[   45.720703]  kunit_try_run_case+0x1a2/0x480
[   45.724935]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.730333]  kthread+0x334/0x6f0
[   45.733566]  ret_from_fork+0x3e/0x80
[   45.737145]  ret_from_fork_asm+0x1a/0x30
[   45.741072] 
[   45.742570] The buggy address belongs to the object at ffff888104ed9160
[   45.742570]  which belongs to the cache kmalloc-16 of size 16
[   45.754912] The buggy address is located 8 bytes inside of
[   45.754912]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   45.767166] 
[   45.768664] The buggy address belongs to the physical page:
[   45.774272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   45.782278] flags: 0x200000000000000(node=0|zone=2)
[   45.787157] page_type: f5(slab)
[   45.790306] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.798053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.805789] page dumped because: kasan: bad access detected
[   45.811362] 
[   45.812861] Memory state around the buggy address:
[   45.817654]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   45.824907]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   45.832128] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.839345]                                                           ^
[   45.845959]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.853177]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.860397] ==================================================================
[   44.306482] ==================================================================
[   44.313761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.321934] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   44.329327] 
[   44.330827] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   44.330835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.330837] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.330840] Call Trace:
[   44.330841]  <TASK>
[   44.330843]  dump_stack_lvl+0x73/0xb0
[   44.330847]  print_report+0xd1/0x650
[   44.330851]  ? __virt_addr_valid+0x1db/0x2d0
[   44.330854]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.330863]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330869]  kasan_report+0x141/0x180
[   44.330873]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330879]  kasan_check_range+0x10c/0x1c0
[   44.330883]  __kasan_check_write+0x18/0x20
[   44.330887]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330892]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.330897]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.330901]  ? trace_hardirqs_on+0x37/0xe0
[   44.330905]  ? kasan_bitops_generic+0x92/0x1c0
[   44.330909]  kasan_bitops_generic+0x116/0x1c0
[   44.330912]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.330916]  ? ktime_get_ts64+0x83/0x230
[   44.330920]  kunit_try_run_case+0x1a2/0x480
[   44.330925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.330929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.330933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.330938]  ? __kthread_parkme+0x82/0x180
[   44.330942]  ? preempt_count_sub+0x50/0x80
[   44.330946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.330951]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.330955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.330959]  kthread+0x334/0x6f0
[   44.330963]  ? trace_preempt_on+0x20/0xc0
[   44.330967]  ? __pfx_kthread+0x10/0x10
[   44.330971]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.330975]  ? calculate_sigpending+0x7b/0xa0
[   44.330979]  ? __pfx_kthread+0x10/0x10
[   44.330983]  ret_from_fork+0x3e/0x80
[   44.330987]  ? __pfx_kthread+0x10/0x10
[   44.330991]  ret_from_fork_asm+0x1a/0x30
[   44.330997]  </TASK>
[   44.330999] 
[   44.521910] Allocated by task 304:
[   44.525315]  kasan_save_stack+0x45/0x70
[   44.529152]  kasan_save_track+0x18/0x40
[   44.532993]  kasan_save_alloc_info+0x3b/0x50
[   44.537267]  __kasan_kmalloc+0xb7/0xc0
[   44.541026]  __kmalloc_cache_noprof+0x189/0x420
[   44.545558]  kasan_bitops_generic+0x92/0x1c0
[   44.549832]  kunit_try_run_case+0x1a2/0x480
[   44.554019]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.559424]  kthread+0x334/0x6f0
[   44.562657]  ret_from_fork+0x3e/0x80
[   44.566273]  ret_from_fork_asm+0x1a/0x30
[   44.570205] 
[   44.571703] The buggy address belongs to the object at ffff888104ed9160
[   44.571703]  which belongs to the cache kmalloc-16 of size 16
[   44.584073] The buggy address is located 8 bytes inside of
[   44.584073]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   44.596326] 
[   44.597825] The buggy address belongs to the physical page:
[   44.603397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   44.611397] flags: 0x200000000000000(node=0|zone=2)
[   44.616274] page_type: f5(slab)
[   44.619423] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.627161] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.634898] page dumped because: kasan: bad access detected
[   44.640471] 
[   44.641973] Memory state around the buggy address:
[   44.646765]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   44.653993]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   44.661212] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.668429]                                                           ^
[   44.675044]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.682261]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.689481] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   43.101816] ==================================================================
[   43.109056] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   43.115061] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302
[   43.122368] 
[   43.123867] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   43.123875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.123877] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.123880] Call Trace:
[   43.123882]  <TASK>
[   43.123883]  dump_stack_lvl+0x73/0xb0
[   43.123887]  print_report+0xd1/0x650
[   43.123891]  ? __virt_addr_valid+0x1db/0x2d0
[   43.123894]  ? strnlen+0x73/0x80
[   43.123898]  ? kasan_complete_mode_report_info+0x64/0x200
[   43.123902]  ? strnlen+0x73/0x80
[   43.123905]  kasan_report+0x141/0x180
[   43.123909]  ? strnlen+0x73/0x80
[   43.123913]  __asan_report_load1_noabort+0x18/0x20
[   43.123917]  strnlen+0x73/0x80
[   43.123921]  kasan_strings+0x615/0xe80
[   43.123924]  ? trace_hardirqs_on+0x37/0xe0
[   43.123929]  ? __pfx_kasan_strings+0x10/0x10
[   43.123932]  ? finish_task_switch.isra.0+0x153/0x700
[   43.123937]  ? __switch_to+0x5d9/0xf60
[   43.123940]  ? dequeue_task_fair+0x166/0x4e0
[   43.123945]  ? __schedule+0x10cc/0x2b30
[   43.123949]  ? ktime_get_ts64+0x83/0x230
[   43.123954]  kunit_try_run_case+0x1a2/0x480
[   43.123958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.123962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.123966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.123971]  ? __kthread_parkme+0x82/0x180
[   43.123975]  ? preempt_count_sub+0x50/0x80
[   43.123979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.123984]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.123988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.123992]  kthread+0x334/0x6f0
[   43.123996]  ? trace_preempt_on+0x20/0xc0
[   43.124000]  ? __pfx_kthread+0x10/0x10
[   43.124004]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.124008]  ? calculate_sigpending+0x7b/0xa0
[   43.124012]  ? __pfx_kthread+0x10/0x10
[   43.124016]  ret_from_fork+0x3e/0x80
[   43.124020]  ? __pfx_kthread+0x10/0x10
[   43.124025]  ret_from_fork_asm+0x1a/0x30
[   43.124030]  </TASK>
[   43.124032] 
[   43.303197] Allocated by task 302:
[   43.306603]  kasan_save_stack+0x45/0x70
[   43.310443]  kasan_save_track+0x18/0x40
[   43.314281]  kasan_save_alloc_info+0x3b/0x50
[   43.318553]  __kasan_kmalloc+0xb7/0xc0
[   43.322309]  __kmalloc_cache_noprof+0x189/0x420
[   43.326839]  kasan_strings+0xc0/0xe80
[   43.330506]  kunit_try_run_case+0x1a2/0x480
[   43.334704]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.340125]  kthread+0x334/0x6f0
[   43.343359]  ret_from_fork+0x3e/0x80
[   43.346938]  ret_from_fork_asm+0x1a/0x30
[   43.350863] 
[   43.352361] Freed by task 302:
[   43.355420]  kasan_save_stack+0x45/0x70
[   43.359260]  kasan_save_track+0x18/0x40
[   43.363098]  kasan_save_free_info+0x3f/0x60
[   43.367286]  __kasan_slab_free+0x56/0x70
[   43.371221]  kfree+0x222/0x3f0
[   43.374279]  kasan_strings+0x2aa/0xe80
[   43.378031]  kunit_try_run_case+0x1a2/0x480
[   43.382216]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.387615]  kthread+0x334/0x6f0
[   43.390848]  ret_from_fork+0x3e/0x80
[   43.394426]  ret_from_fork_asm+0x1a/0x30
[   43.398354] 
[   43.399852] The buggy address belongs to the object at ffff888107fedd00
[   43.399852]  which belongs to the cache kmalloc-32 of size 32
[   43.412193] The buggy address is located 16 bytes inside of
[   43.412193]  freed 32-byte region [ffff888107fedd00, ffff888107fedd20)
[   43.424276] 
[   43.425772] The buggy address belongs to the physical page:
[   43.431347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed
[   43.439355] flags: 0x200000000000000(node=0|zone=2)
[   43.444233] page_type: f5(slab)
[   43.447379] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   43.455120] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   43.462867] page dumped because: kasan: bad access detected
[   43.468439] 
[   43.469935] Memory state around the buggy address:
[   43.474741]  ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.481967]  ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   43.489185] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.496402]                          ^
[   43.500155]  ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.507376]  ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.514595] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strlen
[   42.682353] ==================================================================
[   42.689591] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   42.695509] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302
[   42.702817] 
[   42.704318] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   42.704325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.704327] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   42.704330] Call Trace:
[   42.704332]  <TASK>
[   42.704334]  dump_stack_lvl+0x73/0xb0
[   42.704337]  print_report+0xd1/0x650
[   42.704341]  ? __virt_addr_valid+0x1db/0x2d0
[   42.704345]  ? strlen+0x8f/0xb0
[   42.704348]  ? kasan_complete_mode_report_info+0x64/0x200
[   42.704352]  ? strlen+0x8f/0xb0
[   42.704355]  kasan_report+0x141/0x180
[   42.704360]  ? strlen+0x8f/0xb0
[   42.704364]  __asan_report_load1_noabort+0x18/0x20
[   42.704367]  strlen+0x8f/0xb0
[   42.704371]  kasan_strings+0x57b/0xe80
[   42.704374]  ? trace_hardirqs_on+0x37/0xe0
[   42.704379]  ? __pfx_kasan_strings+0x10/0x10
[   42.704383]  ? finish_task_switch.isra.0+0x153/0x700
[   42.704387]  ? __switch_to+0x5d9/0xf60
[   42.704391]  ? dequeue_task_fair+0x166/0x4e0
[   42.704395]  ? __schedule+0x10cc/0x2b30
[   42.704399]  ? ktime_get_ts64+0x83/0x230
[   42.704404]  kunit_try_run_case+0x1a2/0x480
[   42.704408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.704412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   42.704417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   42.704422]  ? __kthread_parkme+0x82/0x180
[   42.704425]  ? preempt_count_sub+0x50/0x80
[   42.704430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.704434]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.704438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   42.704442]  kthread+0x334/0x6f0
[   42.704446]  ? trace_preempt_on+0x20/0xc0
[   42.704451]  ? __pfx_kthread+0x10/0x10
[   42.704455]  ? _raw_spin_unlock_irq+0x47/0x80
[   42.704459]  ? calculate_sigpending+0x7b/0xa0
[   42.704463]  ? __pfx_kthread+0x10/0x10
[   42.704467]  ret_from_fork+0x3e/0x80
[   42.704471]  ? __pfx_kthread+0x10/0x10
[   42.704476]  ret_from_fork_asm+0x1a/0x30
[   42.704481]  </TASK>
[   42.704483] 
[   42.883231] Allocated by task 302:
[   42.886636]  kasan_save_stack+0x45/0x70
[   42.890477]  kasan_save_track+0x18/0x40
[   42.894314]  kasan_save_alloc_info+0x3b/0x50
[   42.898588]  __kasan_kmalloc+0xb7/0xc0
[   42.902340]  __kmalloc_cache_noprof+0x189/0x420
[   42.906872]  kasan_strings+0xc0/0xe80
[   42.910539]  kunit_try_run_case+0x1a2/0x480
[   42.914737]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.920139]  kthread+0x334/0x6f0
[   42.923372]  ret_from_fork+0x3e/0x80
[   42.926952]  ret_from_fork_asm+0x1a/0x30
[   42.930879] 
[   42.932379] Freed by task 302:
[   42.935436]  kasan_save_stack+0x45/0x70
[   42.939277]  kasan_save_track+0x18/0x40
[   42.943123]  kasan_save_free_info+0x3f/0x60
[   42.947309]  __kasan_slab_free+0x56/0x70
[   42.951235]  kfree+0x222/0x3f0
[   42.954294]  kasan_strings+0x2aa/0xe80
[   42.958047]  kunit_try_run_case+0x1a2/0x480
[   42.962231]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.967631]  kthread+0x334/0x6f0
[   42.970864]  ret_from_fork+0x3e/0x80
[   42.974443]  ret_from_fork_asm+0x1a/0x30
[   42.978370] 
[   42.979869] The buggy address belongs to the object at ffff888107fedd00
[   42.979869]  which belongs to the cache kmalloc-32 of size 32
[   42.992210] The buggy address is located 16 bytes inside of
[   42.992210]  freed 32-byte region [ffff888107fedd00, ffff888107fedd20)
[   43.004289] 
[   43.005788] The buggy address belongs to the physical page:
[   43.011360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed
[   43.019359] flags: 0x200000000000000(node=0|zone=2)
[   43.024240] page_type: f5(slab)
[   43.027388] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   43.035134] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   43.042873] page dumped because: kasan: bad access detected
[   43.048446] 
[   43.049944] Memory state around the buggy address:
[   43.054741]  ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.061965]  ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   43.069184] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.076401]                          ^
[   43.080155]  ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.087374]  ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.094594] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   42.262351] ==================================================================
[   42.269589] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   42.276289] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302
[   42.283595] 
[   42.285094] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   42.285102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.285104] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   42.285107] Call Trace:
[   42.285108]  <TASK>
[   42.285110]  dump_stack_lvl+0x73/0xb0
[   42.285114]  print_report+0xd1/0x650
[   42.285118]  ? __virt_addr_valid+0x1db/0x2d0
[   42.285122]  ? kasan_strings+0xcbc/0xe80
[   42.285126]  ? kasan_complete_mode_report_info+0x64/0x200
[   42.285130]  ? kasan_strings+0xcbc/0xe80
[   42.285134]  kasan_report+0x141/0x180
[   42.285138]  ? kasan_strings+0xcbc/0xe80
[   42.285143]  __asan_report_load1_noabort+0x18/0x20
[   42.285147]  kasan_strings+0xcbc/0xe80
[   42.285151]  ? trace_hardirqs_on+0x37/0xe0
[   42.285155]  ? __pfx_kasan_strings+0x10/0x10
[   42.285159]  ? finish_task_switch.isra.0+0x153/0x700
[   42.285163]  ? __switch_to+0x5d9/0xf60
[   42.285167]  ? dequeue_task_fair+0x166/0x4e0
[   42.285171]  ? __schedule+0x10cc/0x2b30
[   42.285176]  ? ktime_get_ts64+0x83/0x230
[   42.285180]  kunit_try_run_case+0x1a2/0x480
[   42.285185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.285189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   42.285194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   42.285198]  ? __kthread_parkme+0x82/0x180
[   42.285202]  ? preempt_count_sub+0x50/0x80
[   42.285207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.285211]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.285216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   42.285220]  kthread+0x334/0x6f0
[   42.285224]  ? trace_preempt_on+0x20/0xc0
[   42.285228]  ? __pfx_kthread+0x10/0x10
[   42.285233]  ? _raw_spin_unlock_irq+0x47/0x80
[   42.285237]  ? calculate_sigpending+0x7b/0xa0
[   42.285241]  ? __pfx_kthread+0x10/0x10
[   42.285245]  ret_from_fork+0x3e/0x80
[   42.285249]  ? __pfx_kthread+0x10/0x10
[   42.285253]  ret_from_fork_asm+0x1a/0x30
[   42.285259]  </TASK>
[   42.285261] 
[   42.463489] Allocated by task 302:
[   42.466894]  kasan_save_stack+0x45/0x70
[   42.470746]  kasan_save_track+0x18/0x40
[   42.474581]  kasan_save_alloc_info+0x3b/0x50
[   42.478855]  __kasan_kmalloc+0xb7/0xc0
[   42.482607]  __kmalloc_cache_noprof+0x189/0x420
[   42.487141]  kasan_strings+0xc0/0xe80
[   42.490813]  kunit_try_run_case+0x1a2/0x480
[   42.494998]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.500399]  kthread+0x334/0x6f0
[   42.503631]  ret_from_fork+0x3e/0x80
[   42.507209]  ret_from_fork_asm+0x1a/0x30
[   42.511135] 
[   42.512636] Freed by task 302:
[   42.515740]  kasan_save_stack+0x45/0x70
[   42.519613]  kasan_save_track+0x18/0x40
[   42.523452]  kasan_save_free_info+0x3f/0x60
[   42.527637]  __kasan_slab_free+0x56/0x70
[   42.531564]  kfree+0x222/0x3f0
[   42.534622]  kasan_strings+0x2aa/0xe80
[   42.538374]  kunit_try_run_case+0x1a2/0x480
[   42.542561]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.547958]  kthread+0x334/0x6f0
[   42.551193]  ret_from_fork+0x3e/0x80
[   42.554778]  ret_from_fork_asm+0x1a/0x30
[   42.558705] 
[   42.560223] The buggy address belongs to the object at ffff888107fedd00
[   42.560223]  which belongs to the cache kmalloc-32 of size 32
[   42.572562] The buggy address is located 16 bytes inside of
[   42.572562]  freed 32-byte region [ffff888107fedd00, ffff888107fedd20)
[   42.584643] 
[   42.586141] The buggy address belongs to the physical page:
[   42.591755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed
[   42.599791] flags: 0x200000000000000(node=0|zone=2)
[   42.604689] page_type: f5(slab)
[   42.607871] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   42.615617] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   42.623357] page dumped because: kasan: bad access detected
[   42.628929] 
[   42.630428] Memory state around the buggy address:
[   42.635221]  ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.642439]  ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   42.649659] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.656910]                          ^
[   42.660665]  ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.667909]  ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.675129] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   41.825909] ==================================================================
[   41.849813] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   41.855736] Read of size 1 at addr ffff888107fedd10 by task kunit_try_catch/302
[   41.863047] 
[   41.864547] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   41.864556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.864558] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.864561] Call Trace:
[   41.864563]  <TASK>
[   41.864565]  dump_stack_lvl+0x73/0xb0
[   41.864569]  print_report+0xd1/0x650
[   41.864574]  ? __virt_addr_valid+0x1db/0x2d0
[   41.864578]  ? strcmp+0xb0/0xc0
[   41.864581]  ? kasan_complete_mode_report_info+0x64/0x200
[   41.864585]  ? strcmp+0xb0/0xc0
[   41.864588]  kasan_report+0x141/0x180
[   41.864592]  ? strcmp+0xb0/0xc0
[   41.864597]  __asan_report_load1_noabort+0x18/0x20
[   41.864600]  strcmp+0xb0/0xc0
[   41.864604]  kasan_strings+0x431/0xe80
[   41.864608]  ? trace_hardirqs_on+0x37/0xe0
[   41.864612]  ? __pfx_kasan_strings+0x10/0x10
[   41.864616]  ? finish_task_switch.isra.0+0x153/0x700
[   41.864620]  ? __switch_to+0x5d9/0xf60
[   41.864624]  ? dequeue_task_fair+0x166/0x4e0
[   41.864629]  ? __schedule+0x10cc/0x2b30
[   41.864633]  ? ktime_get_ts64+0x83/0x230
[   41.864638]  kunit_try_run_case+0x1a2/0x480
[   41.864642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.864646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.864651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.864655]  ? __kthread_parkme+0x82/0x180
[   41.864659]  ? preempt_count_sub+0x50/0x80
[   41.864664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.864685]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.864690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.864694]  kthread+0x334/0x6f0
[   41.864698]  ? trace_preempt_on+0x20/0xc0
[   41.864702]  ? __pfx_kthread+0x10/0x10
[   41.864719]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.864723]  ? calculate_sigpending+0x7b/0xa0
[   41.864727]  ? __pfx_kthread+0x10/0x10
[   41.864731]  ret_from_fork+0x3e/0x80
[   41.864735]  ? __pfx_kthread+0x10/0x10
[   41.864739]  ret_from_fork_asm+0x1a/0x30
[   41.864745]  </TASK>
[   41.864747] 
[   42.043460] Allocated by task 302:
[   42.046867]  kasan_save_stack+0x45/0x70
[   42.050745]  kasan_save_track+0x18/0x40
[   42.054596]  kasan_save_alloc_info+0x3b/0x50
[   42.058871]  __kasan_kmalloc+0xb7/0xc0
[   42.062622]  __kmalloc_cache_noprof+0x189/0x420
[   42.067153]  kasan_strings+0xc0/0xe80
[   42.070820]  kunit_try_run_case+0x1a2/0x480
[   42.075005]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.080404]  kthread+0x334/0x6f0
[   42.083637]  ret_from_fork+0x3e/0x80
[   42.087216]  ret_from_fork_asm+0x1a/0x30
[   42.091143] 
[   42.092642] Freed by task 302:
[   42.095702]  kasan_save_stack+0x45/0x70
[   42.099567]  kasan_save_track+0x18/0x40
[   42.103406]  kasan_save_free_info+0x3f/0x60
[   42.107590]  __kasan_slab_free+0x56/0x70
[   42.111519]  kfree+0x222/0x3f0
[   42.114575]  kasan_strings+0x2aa/0xe80
[   42.118329]  kunit_try_run_case+0x1a2/0x480
[   42.122515]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.127913]  kthread+0x334/0x6f0
[   42.131147]  ret_from_fork+0x3e/0x80
[   42.134758]  ret_from_fork_asm+0x1a/0x30
[   42.138757] 
[   42.140279] The buggy address belongs to the object at ffff888107fedd00
[   42.140279]  which belongs to the cache kmalloc-32 of size 32
[   42.152612] The buggy address is located 16 bytes inside of
[   42.152612]  freed 32-byte region [ffff888107fedd00, ffff888107fedd20)
[   42.164704] 
[   42.166220] The buggy address belongs to the physical page:
[   42.171791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed
[   42.179797] flags: 0x200000000000000(node=0|zone=2)
[   42.184703] page_type: f5(slab)
[   42.187876] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   42.195616] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   42.203352] page dumped because: kasan: bad access detected
[   42.208926] 
[   42.210425] Memory state around the buggy address:
[   42.215218]  ffff888107fedc00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.222438]  ffff888107fedc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   42.229665] >ffff888107fedd00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.236910]                          ^
[   42.240662]  ffff888107fedd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.247907]  ffff888107fede00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.255126] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   41.413347] ==================================================================
[   41.424326] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   41.430341] Read of size 1 at addr ffff888107fedc18 by task kunit_try_catch/300
[   41.437653] 
[   41.439154] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   41.439163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.439165] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.439168] Call Trace:
[   41.439170]  <TASK>
[   41.439171]  dump_stack_lvl+0x73/0xb0
[   41.439175]  print_report+0xd1/0x650
[   41.439180]  ? __virt_addr_valid+0x1db/0x2d0
[   41.439184]  ? memcmp+0x1b4/0x1d0
[   41.439187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   41.439191]  ? memcmp+0x1b4/0x1d0
[   41.439195]  kasan_report+0x141/0x180
[   41.439199]  ? memcmp+0x1b4/0x1d0
[   41.439203]  __asan_report_load1_noabort+0x18/0x20
[   41.439207]  memcmp+0x1b4/0x1d0
[   41.439211]  kasan_memcmp+0x18f/0x390
[   41.439214]  ? trace_hardirqs_on+0x37/0xe0
[   41.439219]  ? __pfx_kasan_memcmp+0x10/0x10
[   41.439223]  ? finish_task_switch.isra.0+0x153/0x700
[   41.439227]  ? __switch_to+0x5d9/0xf60
[   41.439231]  ? dequeue_task_fair+0x166/0x4e0
[   41.439236]  ? ktime_get_ts64+0x83/0x230
[   41.439241]  kunit_try_run_case+0x1a2/0x480
[   41.439245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.439249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.439254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.439259]  ? __kthread_parkme+0x82/0x180
[   41.439263]  ? preempt_count_sub+0x50/0x80
[   41.439267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.439272]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.439276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.439280]  kthread+0x334/0x6f0
[   41.439284]  ? trace_preempt_on+0x20/0xc0
[   41.439288]  ? __pfx_kthread+0x10/0x10
[   41.439293]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.439297]  ? calculate_sigpending+0x7b/0xa0
[   41.439301]  ? __pfx_kthread+0x10/0x10
[   41.439305]  ret_from_fork+0x3e/0x80
[   41.439309]  ? __pfx_kthread+0x10/0x10
[   41.439313]  ret_from_fork_asm+0x1a/0x30
[   41.439319]  </TASK>
[   41.439321] 
[   41.614739] Allocated by task 300:
[   41.618147]  kasan_save_stack+0x45/0x70
[   41.621985]  kasan_save_track+0x18/0x40
[   41.625826]  kasan_save_alloc_info+0x3b/0x50
[   41.630096]  __kasan_kmalloc+0xb7/0xc0
[   41.633850]  __kmalloc_cache_noprof+0x189/0x420
[   41.638382]  kasan_memcmp+0xb7/0x390
[   41.641961]  kunit_try_run_case+0x1a2/0x480
[   41.646147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.651546]  kthread+0x334/0x6f0
[   41.654778]  ret_from_fork+0x3e/0x80
[   41.658359]  ret_from_fork_asm+0x1a/0x30
[   41.662285] 
[   41.663783] The buggy address belongs to the object at ffff888107fedc00
[   41.663783]  which belongs to the cache kmalloc-32 of size 32
[   41.676125] The buggy address is located 0 bytes to the right of
[   41.676125]  allocated 24-byte region [ffff888107fedc00, ffff888107fedc18)
[   41.688994] 
[   41.690494] The buggy address belongs to the physical page:
[   41.696066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fed
[   41.704072] flags: 0x200000000000000(node=0|zone=2)
[   41.708952] page_type: f5(slab)
[   41.712098] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   41.719837] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.727577] page dumped because: kasan: bad access detected
[   41.733147] 
[   41.734640] Memory state around the buggy address:
[   41.739431]  ffff888107fedb00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   41.746649]  ffff888107fedb80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.753870] >ffff888107fedc00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.761088]                             ^
[   41.765100]  ffff888107fedc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.772321]  ffff888107fedd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.779548] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   41.082091] ==================================================================
[   41.093499] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   41.101075] Read of size 1 at addr ffff88810527fc4a by task kunit_try_catch/296
[   41.108390] 
[   41.109888] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   41.109896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.109898] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.109902] Call Trace:
[   41.109904]  <TASK>
[   41.109905]  dump_stack_lvl+0x73/0xb0
[   41.109909]  print_report+0xd1/0x650
[   41.109914]  ? __virt_addr_valid+0x1db/0x2d0
[   41.109918]  ? kasan_alloca_oob_right+0x329/0x390
[   41.109922]  ? kasan_addr_to_slab+0x11/0xa0
[   41.109926]  ? kasan_alloca_oob_right+0x329/0x390
[   41.109931]  kasan_report+0x141/0x180
[   41.109935]  ? kasan_alloca_oob_right+0x329/0x390
[   41.109940]  __asan_report_load1_noabort+0x18/0x20
[   41.109944]  kasan_alloca_oob_right+0x329/0x390
[   41.109949]  ? finish_task_switch.isra.0+0x153/0x700
[   41.109953]  ? rwsem_down_read_slowpath+0x64e/0xb90
[   41.109957]  ? trace_hardirqs_on+0x37/0xe0
[   41.109962]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   41.109967]  ? __schedule+0x10cc/0x2b30
[   41.109972]  ? ktime_get_ts64+0x83/0x230
[   41.109976]  kunit_try_run_case+0x1a2/0x480
[   41.109981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.109985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.109990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.109994]  ? __kthread_parkme+0x82/0x180
[   41.109999]  ? preempt_count_sub+0x50/0x80
[   41.110003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.110008]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.110012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.110016]  kthread+0x334/0x6f0
[   41.110020]  ? trace_preempt_on+0x20/0xc0
[   41.110025]  ? __pfx_kthread+0x10/0x10
[   41.110029]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.110033]  ? calculate_sigpending+0x7b/0xa0
[   41.110037]  ? __pfx_kthread+0x10/0x10
[   41.110041]  ret_from_fork+0x3e/0x80
[   41.110046]  ? __pfx_kthread+0x10/0x10
[   41.110050]  ret_from_fork_asm+0x1a/0x30
[   41.110056]  </TASK>
[   41.110057] 
[   41.287781] The buggy address belongs to stack of task kunit_try_catch/296
[   41.294654] 
[   41.296150] The buggy address belongs to the physical page:
[   41.301736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   41.309743] flags: 0x200000000000000(node=0|zone=2)
[   41.314630] raw: 0200000000000000 dead000000000100 dead000000000122 0000000000000000
[   41.322376] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   41.330114] page dumped because: kasan: bad access detected
[   41.335704] 
[   41.337222] Memory state around the buggy address:
[   41.342013]  ffff88810527fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.349232]  ffff88810527fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.356452] >ffff88810527fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   41.363686]                                               ^
[   41.369288]  ffff88810527fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   41.376515]  ffff88810527fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   41.383741] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   40.774577] ==================================================================
[   40.785458] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   40.792944] Read of size 1 at addr ffff888107f5fc3f by task kunit_try_catch/294
[   40.800251] 
[   40.801751] CPU: 2 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   40.801760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.801762] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.801765] Call Trace:
[   40.801767]  <TASK>
[   40.801769]  dump_stack_lvl+0x73/0xb0
[   40.801773]  print_report+0xd1/0x650
[   40.801777]  ? __virt_addr_valid+0x1db/0x2d0
[   40.801781]  ? kasan_alloca_oob_left+0x320/0x380
[   40.801785]  ? kasan_addr_to_slab+0x11/0xa0
[   40.801789]  ? kasan_alloca_oob_left+0x320/0x380
[   40.801794]  kasan_report+0x141/0x180
[   40.801798]  ? kasan_alloca_oob_left+0x320/0x380
[   40.801803]  __asan_report_load1_noabort+0x18/0x20
[   40.801807]  kasan_alloca_oob_left+0x320/0x380
[   40.801811]  ? finish_task_switch.isra.0+0x153/0x700
[   40.801816]  ? rwsem_down_read_slowpath+0x64e/0xb90
[   40.801820]  ? trace_hardirqs_on+0x37/0xe0
[   40.801824]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   40.801829]  ? __schedule+0x10cc/0x2b30
[   40.801834]  ? ktime_get_ts64+0x83/0x230
[   40.801838]  kunit_try_run_case+0x1a2/0x480
[   40.801843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.801847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.801851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.801856]  ? __kthread_parkme+0x82/0x180
[   40.801860]  ? preempt_count_sub+0x50/0x80
[   40.801864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.801869]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.801873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.801877]  kthread+0x334/0x6f0
[   40.801881]  ? trace_preempt_on+0x20/0xc0
[   40.801885]  ? __pfx_kthread+0x10/0x10
[   40.801889]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.801894]  ? calculate_sigpending+0x7b/0xa0
[   40.801897]  ? __pfx_kthread+0x10/0x10
[   40.801902]  ret_from_fork+0x3e/0x80
[   40.801906]  ? __pfx_kthread+0x10/0x10
[   40.801910]  ret_from_fork_asm+0x1a/0x30
[   40.801916]  </TASK>
[   40.801917] 
[   40.979105] The buggy address belongs to stack of task kunit_try_catch/294
[   40.985980] 
[   40.987476] The buggy address belongs to the physical page:
[   40.993049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f5f
[   41.001055] flags: 0x200000000000000(node=0|zone=2)
[   41.005938] raw: 0200000000000000 ffffea00041fd7c8 ffffea00041fd7c8 0000000000000000
[   41.013718] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   41.021465] page dumped because: kasan: bad access detected
[   41.027040] 
[   41.028536] Memory state around the buggy address:
[   41.033330]  ffff888107f5fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.040549]  ffff888107f5fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.047769] >ffff888107f5fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   41.054996]                                         ^
[   41.060048]  ffff888107f5fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   41.067269]  ffff888107f5fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   41.074496] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   40.441515] ==================================================================
[   40.456565] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   40.463444] Read of size 1 at addr ffff888107fcfd02 by task kunit_try_catch/292
[   40.470750] 
[   40.472250] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   40.472259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.472261] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.472265] Call Trace:
[   40.472266]  <TASK>
[   40.472268]  dump_stack_lvl+0x73/0xb0
[   40.472272]  print_report+0xd1/0x650
[   40.472277]  ? __virt_addr_valid+0x1db/0x2d0
[   40.472281]  ? kasan_stack_oob+0x2b5/0x300
[   40.472284]  ? kasan_addr_to_slab+0x11/0xa0
[   40.472288]  ? kasan_stack_oob+0x2b5/0x300
[   40.472292]  kasan_report+0x141/0x180
[   40.472296]  ? kasan_stack_oob+0x2b5/0x300
[   40.472301]  __asan_report_load1_noabort+0x18/0x20
[   40.472304]  kasan_stack_oob+0x2b5/0x300
[   40.472308]  ? __pfx_kasan_stack_oob+0x10/0x10
[   40.472312]  ? finish_task_switch.isra.0+0x153/0x700
[   40.472316]  ? __switch_to+0x5d9/0xf60
[   40.472321]  ? dequeue_task_fair+0x166/0x4e0
[   40.472325]  ? __schedule+0x10cc/0x2b30
[   40.472329]  ? ktime_get_ts64+0x83/0x230
[   40.472334]  kunit_try_run_case+0x1a2/0x480
[   40.472339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.472343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.472347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.472352]  ? __kthread_parkme+0x82/0x180
[   40.472356]  ? preempt_count_sub+0x50/0x80
[   40.472360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.472365]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.472369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.472373]  kthread+0x334/0x6f0
[   40.472377]  ? trace_preempt_on+0x20/0xc0
[   40.472382]  ? __pfx_kthread+0x10/0x10
[   40.472386]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.472390]  ? calculate_sigpending+0x7b/0xa0
[   40.472394]  ? __pfx_kthread+0x10/0x10
[   40.472398]  ret_from_fork+0x3e/0x80
[   40.472402]  ? __pfx_kthread+0x10/0x10
[   40.472406]  ret_from_fork_asm+0x1a/0x30
[   40.472412]  </TASK>
[   40.472413] 
[   40.646085] The buggy address belongs to stack of task kunit_try_catch/292
[   40.652958]  and is located at offset 138 in frame:
[   40.657839]  kasan_stack_oob+0x0/0x300
[   40.661591] 
[   40.663089] This frame has 4 objects:
[   40.666754]  [48, 49) '__assertion'
[   40.666758]  [64, 72) 'array'
[   40.670248]  [96, 112) '__assertion'
[   40.673222]  [128, 138) 'stack_array'
[   40.676799] 
[   40.681957] The buggy address belongs to the physical page:
[   40.687530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fcf
[   40.695536] flags: 0x200000000000000(node=0|zone=2)
[   40.700417] raw: 0200000000000000 dead000000000100 dead000000000122 0000000000000000
[   40.708163] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   40.715901] page dumped because: kasan: bad access detected
[   40.721473] 
[   40.722964] Memory state around the buggy address:
[   40.727758]  ffff888107fcfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   40.734977]  ffff888107fcfc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   40.742197] >ffff888107fcfd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   40.749415]                    ^
[   40.752649]  ffff888107fcfd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   40.759866]  ffff888107fcfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.767085] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   40.140390] ==================================================================
[   40.152934] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   40.160507] Read of size 1 at addr ffffffffbb49a28d by task kunit_try_catch/288
[   40.167812] 
[   40.169315] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   40.169322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.169325] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.169328] Call Trace:
[   40.169329]  <TASK>
[   40.169331]  dump_stack_lvl+0x73/0xb0
[   40.169335]  print_report+0xd1/0x650
[   40.169339]  ? __virt_addr_valid+0x1db/0x2d0
[   40.169343]  ? kasan_global_oob_right+0x286/0x2d0
[   40.169347]  ? kasan_addr_to_slab+0x11/0xa0
[   40.169351]  ? kasan_global_oob_right+0x286/0x2d0
[   40.169355]  kasan_report+0x141/0x180
[   40.169359]  ? kasan_global_oob_right+0x286/0x2d0
[   40.169364]  __asan_report_load1_noabort+0x18/0x20
[   40.169368]  kasan_global_oob_right+0x286/0x2d0
[   40.169372]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   40.169376]  ? __schedule+0x10cc/0x2b30
[   40.169381]  ? ktime_get_ts64+0x83/0x230
[   40.169386]  kunit_try_run_case+0x1a2/0x480
[   40.169390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.169394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.169399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.169403]  ? __kthread_parkme+0x82/0x180
[   40.169408]  ? preempt_count_sub+0x50/0x80
[   40.169412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.169416]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.169421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.169425]  kthread+0x334/0x6f0
[   40.169429]  ? trace_preempt_on+0x20/0xc0
[   40.169433]  ? __pfx_kthread+0x10/0x10
[   40.169437]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.169441]  ? calculate_sigpending+0x7b/0xa0
[   40.169445]  ? __pfx_kthread+0x10/0x10
[   40.169449]  ret_from_fork+0x3e/0x80
[   40.169453]  ? __pfx_kthread+0x10/0x10
[   40.169458]  ret_from_fork_asm+0x1a/0x30
[   40.169463]  </TASK>
[   40.169465] 
[   40.333218] The buggy address belongs to the variable:
[   40.338357]  global_array+0xd/0x40
[   40.341772] 
[   40.343269] The buggy address belongs to the physical page:
[   40.348842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24089a
[   40.356842] flags: 0x200000000002000(reserved|node=0|zone=2)
[   40.362510] raw: 0200000000002000 ffffea0009022688 ffffea0009022688 0000000000000000
[   40.370256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   40.377995] page dumped because: kasan: bad access detected
[   40.383567] 
[   40.385066] Memory state around the buggy address:
[   40.389858]  ffffffffbb49a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.397080]  ffffffffbb49a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.404305] >ffffffffbb49a280: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   40.411526]                       ^
[   40.415018]  ffffffffbb49a300: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   40.422238]  ffffffffbb49a380: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   40.429455] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   39.345978] ==================================================================
[   39.358176] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.366183] Free of addr ffff888107f05a01 by task kunit_try_catch/284
[   39.372622] 
[   39.374122] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   39.374130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.374132] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   39.374136] Call Trace:
[   39.374137]  <TASK>
[   39.374139]  dump_stack_lvl+0x73/0xb0
[   39.374143]  print_report+0xd1/0x650
[   39.374147]  ? __virt_addr_valid+0x1db/0x2d0
[   39.374151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   39.374155]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.374160]  kasan_report_invalid_free+0x10a/0x130
[   39.374165]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.374171]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.374175]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.374180]  check_slab_allocation+0x11f/0x130
[   39.374184]  __kasan_mempool_poison_object+0x91/0x1d0
[   39.374189]  mempool_free+0x2ec/0x380
[   39.374193]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.374198]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   39.374203]  ? dequeue_entities+0xa24/0x1790
[   39.374207]  ? finish_task_switch.isra.0+0x153/0x700
[   39.374212]  mempool_kmalloc_invalid_free+0xed/0x140
[   39.374217]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   39.374222]  ? dequeue_task_fair+0x166/0x4e0
[   39.374226]  ? __pfx_mempool_kmalloc+0x10/0x10
[   39.374229]  ? __pfx_mempool_kfree+0x10/0x10
[   39.374233]  ? ktime_get_ts64+0x83/0x230
[   39.374238]  kunit_try_run_case+0x1a2/0x480
[   39.374242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.374246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   39.374251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   39.374255]  ? __kthread_parkme+0x82/0x180
[   39.374259]  ? preempt_count_sub+0x50/0x80
[   39.374264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.374268]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.374272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   39.374276]  kthread+0x334/0x6f0
[   39.374280]  ? trace_preempt_on+0x20/0xc0
[   39.374284]  ? __pfx_kthread+0x10/0x10
[   39.374289]  ? _raw_spin_unlock_irq+0x47/0x80
[   39.374293]  ? calculate_sigpending+0x7b/0xa0
[   39.374296]  ? __pfx_kthread+0x10/0x10
[   39.374301]  ret_from_fork+0x3e/0x80
[   39.374305]  ? __pfx_kthread+0x10/0x10
[   39.374309]  ret_from_fork_asm+0x1a/0x30
[   39.374315]  </TASK>
[   39.374316] 
[   39.589139] Allocated by task 284:
[   39.592546]  kasan_save_stack+0x45/0x70
[   39.596384]  kasan_save_track+0x18/0x40
[   39.600224]  kasan_save_alloc_info+0x3b/0x50
[   39.604498]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   39.609818]  remove_element+0x11e/0x190
[   39.613656]  mempool_alloc_preallocated+0x4d/0x90
[   39.618388]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   39.623962]  mempool_kmalloc_invalid_free+0xed/0x140
[   39.628937]  kunit_try_run_case+0x1a2/0x480
[   39.633130]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.638528]  kthread+0x334/0x6f0
[   39.641760]  ret_from_fork+0x3e/0x80
[   39.645339]  ret_from_fork_asm+0x1a/0x30
[   39.649265] 
[   39.650765] The buggy address belongs to the object at ffff888107f05a00
[   39.650765]  which belongs to the cache kmalloc-128 of size 128
[   39.663272] The buggy address is located 1 bytes inside of
[   39.663272]  128-byte region [ffff888107f05a00, ffff888107f05a80)
[   39.674833] 
[   39.676330] The buggy address belongs to the physical page:
[   39.681904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   39.689903] flags: 0x200000000000000(node=0|zone=2)
[   39.694781] page_type: f5(slab)
[   39.697928] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   39.705691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.713457] page dumped because: kasan: bad access detected
[   39.719032] 
[   39.720531] Memory state around the buggy address:
[   39.725322]  ffff888107f05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.732542]  ffff888107f05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.739760] >ffff888107f05a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.746978]                    ^
[   39.750212]  ffff888107f05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.757430]  ffff888107f05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.764651] ==================================================================
[   39.772216] ==================================================================
[   39.784226] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.792234] Free of addr ffff888105238001 by task kunit_try_catch/286
[   39.798687] 
[   39.800207] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   39.800215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.800217] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   39.800220] Call Trace:
[   39.800222]  <TASK>
[   39.800224]  dump_stack_lvl+0x73/0xb0
[   39.800227]  print_report+0xd1/0x650
[   39.800231]  ? __virt_addr_valid+0x1db/0x2d0
[   39.800235]  ? kasan_addr_to_slab+0x11/0xa0
[   39.800239]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.800244]  kasan_report_invalid_free+0x10a/0x130
[   39.800249]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.800254]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.800259]  __kasan_mempool_poison_object+0x102/0x1d0
[   39.800264]  mempool_free+0x2ec/0x380
[   39.800268]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.800273]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   39.800278]  ? dequeue_entities+0xa24/0x1790
[   39.800282]  ? finish_task_switch.isra.0+0x153/0x700
[   39.800287]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   39.800292]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   39.800297]  ? dequeue_task_fair+0x166/0x4e0
[   39.800301]  ? __pfx_mempool_kmalloc+0x10/0x10
[   39.800304]  ? __pfx_mempool_kfree+0x10/0x10
[   39.800308]  ? ktime_get_ts64+0x83/0x230
[   39.800313]  kunit_try_run_case+0x1a2/0x480
[   39.800318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.800322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   39.800326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   39.800331]  ? __kthread_parkme+0x82/0x180
[   39.800335]  ? preempt_count_sub+0x50/0x80
[   39.800339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.800344]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.800348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   39.800352]  kthread+0x334/0x6f0
[   39.800356]  ? trace_preempt_on+0x20/0xc0
[   39.800360]  ? __pfx_kthread+0x10/0x10
[   39.800364]  ? _raw_spin_unlock_irq+0x47/0x80
[   39.800368]  ? calculate_sigpending+0x7b/0xa0
[   39.800372]  ? __pfx_kthread+0x10/0x10
[   39.800376]  ret_from_fork+0x3e/0x80
[   39.800380]  ? __pfx_kthread+0x10/0x10
[   39.800385]  ret_from_fork_asm+0x1a/0x30
[   39.800390]  </TASK>
[   39.800392] 
[   40.004885] The buggy address belongs to the physical page:
[   40.010460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238
[   40.018467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.026119] flags: 0x200000000000040(head|node=0|zone=2)
[   40.031433] page_type: f8(unknown)
[   40.034837] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   40.042579] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   40.050325] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   40.058151] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   40.065978] head: 0200000000000002 ffffea0004148e01 00000000ffffffff 00000000ffffffff
[   40.073810] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.081635] page dumped because: kasan: bad access detected
[   40.087207] 
[   40.088707] Memory state around the buggy address:
[   40.093499]  ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.100720]  ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.107965] >ffff888105238000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.115192]                    ^
[   40.118423]  ffff888105238080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.125644]  ffff888105238100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.132887] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   38.187291] ==================================================================
[   38.198794] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   38.205934] Free of addr ffff888107f05600 by task kunit_try_catch/278
[   38.212374] 
[   38.213874] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   38.213882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.213884] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   38.213887] Call Trace:
[   38.213889]  <TASK>
[   38.213891]  dump_stack_lvl+0x73/0xb0
[   38.213895]  print_report+0xd1/0x650
[   38.213899]  ? __virt_addr_valid+0x1db/0x2d0
[   38.213903]  ? kasan_complete_mode_report_info+0x64/0x200
[   38.213907]  ? mempool_double_free_helper+0x184/0x370
[   38.213912]  kasan_report_invalid_free+0x10a/0x130
[   38.213917]  ? mempool_double_free_helper+0x184/0x370
[   38.213922]  ? mempool_double_free_helper+0x184/0x370
[   38.213927]  ? mempool_double_free_helper+0x184/0x370
[   38.213931]  check_slab_allocation+0x101/0x130
[   38.213935]  __kasan_mempool_poison_object+0x91/0x1d0
[   38.213940]  mempool_free+0x2ec/0x380
[   38.213944]  mempool_double_free_helper+0x184/0x370
[   38.213948]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   38.213953]  ? dequeue_entities+0xa24/0x1790
[   38.213958]  ? finish_task_switch.isra.0+0x153/0x700
[   38.213963]  mempool_kmalloc_double_free+0xed/0x140
[   38.213967]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   38.213972]  ? dequeue_task_fair+0x166/0x4e0
[   38.213976]  ? __pfx_mempool_kmalloc+0x10/0x10
[   38.213979]  ? __pfx_mempool_kfree+0x10/0x10
[   38.213983]  ? ktime_get_ts64+0x83/0x230
[   38.213988]  kunit_try_run_case+0x1a2/0x480
[   38.213992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.213997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   38.214001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   38.214006]  ? __kthread_parkme+0x82/0x180
[   38.214010]  ? preempt_count_sub+0x50/0x80
[   38.214014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.214019]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.214023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   38.214027]  kthread+0x334/0x6f0
[   38.214031]  ? trace_preempt_on+0x20/0xc0
[   38.214035]  ? __pfx_kthread+0x10/0x10
[   38.214039]  ? _raw_spin_unlock_irq+0x47/0x80
[   38.214044]  ? calculate_sigpending+0x7b/0xa0
[   38.214047]  ? __pfx_kthread+0x10/0x10
[   38.214052]  ret_from_fork+0x3e/0x80
[   38.214056]  ? __pfx_kthread+0x10/0x10
[   38.214060]  ret_from_fork_asm+0x1a/0x30
[   38.214066]  </TASK>
[   38.214067] 
[   38.424029] Allocated by task 278:
[   38.427435]  kasan_save_stack+0x45/0x70
[   38.431275]  kasan_save_track+0x18/0x40
[   38.435112]  kasan_save_alloc_info+0x3b/0x50
[   38.439388]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   38.444708]  remove_element+0x11e/0x190
[   38.448563]  mempool_alloc_preallocated+0x4d/0x90
[   38.453269]  mempool_double_free_helper+0x8a/0x370
[   38.458062]  mempool_kmalloc_double_free+0xed/0x140
[   38.462940]  kunit_try_run_case+0x1a2/0x480
[   38.467129]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.472525]  kthread+0x334/0x6f0
[   38.475767]  ret_from_fork+0x3e/0x80
[   38.479346]  ret_from_fork_asm+0x1a/0x30
[   38.483271] 
[   38.484766] Freed by task 278:
[   38.487829]  kasan_save_stack+0x45/0x70
[   38.491700]  kasan_save_track+0x18/0x40
[   38.495596]  kasan_save_free_info+0x3f/0x60
[   38.499782]  __kasan_mempool_poison_object+0x131/0x1d0
[   38.504930]  mempool_free+0x2ec/0x380
[   38.508594]  mempool_double_free_helper+0x109/0x370
[   38.513474]  mempool_kmalloc_double_free+0xed/0x140
[   38.518352]  kunit_try_run_case+0x1a2/0x480
[   38.522538]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.527939]  kthread+0x334/0x6f0
[   38.531178]  ret_from_fork+0x3e/0x80
[   38.534760]  ret_from_fork_asm+0x1a/0x30
[   38.538702] 
[   38.540245] The buggy address belongs to the object at ffff888107f05600
[   38.540245]  which belongs to the cache kmalloc-128 of size 128
[   38.552765] The buggy address is located 0 bytes inside of
[   38.552765]  128-byte region [ffff888107f05600, ffff888107f05680)
[   38.564320] 
[   38.565818] The buggy address belongs to the physical page:
[   38.571391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   38.579390] flags: 0x200000000000000(node=0|zone=2)
[   38.584269] page_type: f5(slab)
[   38.587417] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   38.595164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.602911] page dumped because: kasan: bad access detected
[   38.608483] 
[   38.609981] Memory state around the buggy address:
[   38.614776]  ffff888107f05500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.622002]  ffff888107f05580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.629221] >ffff888107f05600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.636441]                    ^
[   38.639703]  ffff888107f05680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.646970]  ffff888107f05700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.654189] ==================================================================
[   38.661625] ==================================================================
[   38.673548] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   38.680701] Free of addr ffff888105238000 by task kunit_try_catch/280
[   38.687181] 
[   38.688702] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   38.688723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.688738] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   38.688741] Call Trace:
[   38.688743]  <TASK>
[   38.688744]  dump_stack_lvl+0x73/0xb0
[   38.688748]  print_report+0xd1/0x650
[   38.688752]  ? __virt_addr_valid+0x1db/0x2d0
[   38.688756]  ? kasan_addr_to_slab+0x11/0xa0
[   38.688760]  ? mempool_double_free_helper+0x184/0x370
[   38.688765]  kasan_report_invalid_free+0x10a/0x130
[   38.688770]  ? mempool_double_free_helper+0x184/0x370
[   38.688775]  ? mempool_double_free_helper+0x184/0x370
[   38.688779]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   38.688784]  mempool_free+0x2ec/0x380
[   38.688788]  mempool_double_free_helper+0x184/0x370
[   38.688793]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   38.688797]  ? dequeue_entities+0xa24/0x1790
[   38.688802]  ? finish_task_switch.isra.0+0x153/0x700
[   38.688807]  mempool_kmalloc_large_double_free+0xed/0x140
[   38.688812]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   38.688817]  ? dequeue_task_fair+0x166/0x4e0
[   38.688821]  ? __pfx_mempool_kmalloc+0x10/0x10
[   38.688824]  ? __pfx_mempool_kfree+0x10/0x10
[   38.688828]  ? ktime_get_ts64+0x83/0x230
[   38.688833]  kunit_try_run_case+0x1a2/0x480
[   38.688837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.688841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   38.688846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   38.688851]  ? __kthread_parkme+0x82/0x180
[   38.688855]  ? preempt_count_sub+0x50/0x80
[   38.688859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.688863]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.688867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   38.688872]  kthread+0x334/0x6f0
[   38.688876]  ? trace_preempt_on+0x20/0xc0
[   38.688880]  ? __pfx_kthread+0x10/0x10
[   38.688884]  ? _raw_spin_unlock_irq+0x47/0x80
[   38.688888]  ? calculate_sigpending+0x7b/0xa0
[   38.688892]  ? __pfx_kthread+0x10/0x10
[   38.688897]  ret_from_fork+0x3e/0x80
[   38.688901]  ? __pfx_kthread+0x10/0x10
[   38.688905]  ret_from_fork_asm+0x1a/0x30
[   38.688910]  </TASK>
[   38.688912] 
[   38.889373] The buggy address belongs to the physical page:
[   38.894946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238
[   38.902947] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.910605] flags: 0x200000000000040(head|node=0|zone=2)
[   38.915919] page_type: f8(unknown)
[   38.919325] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   38.927065] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.934812] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   38.942646] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   38.950470] head: 0200000000000002 ffffea0004148e01 00000000ffffffff 00000000ffffffff
[   38.958297] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   38.966123] page dumped because: kasan: bad access detected
[   38.971702] 
[   38.973220] Memory state around the buggy address:
[   38.978012]  ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.985231]  ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.992450] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.999701]                    ^
[   39.002981]  ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.010200]  ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.017417] ==================================================================
[   39.024955] ==================================================================
[   39.037401] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   39.044535] Free of addr ffff888105238000 by task kunit_try_catch/282
[   39.050974] 
[   39.052475] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   39.052483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.052485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   39.052488] Call Trace:
[   39.052490]  <TASK>
[   39.052492]  dump_stack_lvl+0x73/0xb0
[   39.052495]  print_report+0xd1/0x650
[   39.052499]  ? __virt_addr_valid+0x1db/0x2d0
[   39.052503]  ? kasan_addr_to_slab+0x11/0xa0
[   39.052507]  ? mempool_double_free_helper+0x184/0x370
[   39.052512]  kasan_report_invalid_free+0x10a/0x130
[   39.052516]  ? mempool_double_free_helper+0x184/0x370
[   39.052521]  ? mempool_double_free_helper+0x184/0x370
[   39.052526]  __kasan_mempool_poison_pages+0x115/0x130
[   39.052530]  mempool_free+0x290/0x380
[   39.052535]  mempool_double_free_helper+0x184/0x370
[   39.052539]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   39.052544]  ? dequeue_entities+0xa24/0x1790
[   39.052548]  ? finish_task_switch.isra.0+0x153/0x700
[   39.052553]  mempool_page_alloc_double_free+0xe8/0x140
[   39.052557]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   39.052561]  ? dequeue_task_fair+0x166/0x4e0
[   39.052565]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   39.052569]  ? __pfx_mempool_free_pages+0x10/0x10
[   39.052573]  ? ktime_get_ts64+0x83/0x230
[   39.052578]  kunit_try_run_case+0x1a2/0x480
[   39.052582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.052586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   39.052591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   39.052595]  ? __kthread_parkme+0x82/0x180
[   39.052599]  ? preempt_count_sub+0x50/0x80
[   39.052604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.052608]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.052612]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   39.052616]  kthread+0x334/0x6f0
[   39.052620]  ? trace_preempt_on+0x20/0xc0
[   39.052624]  ? __pfx_kthread+0x10/0x10
[   39.052629]  ? _raw_spin_unlock_irq+0x47/0x80
[   39.052633]  ? calculate_sigpending+0x7b/0xa0
[   39.052636]  ? __pfx_kthread+0x10/0x10
[   39.052641]  ret_from_fork+0x3e/0x80
[   39.052645]  ? __pfx_kthread+0x10/0x10
[   39.052649]  ret_from_fork_asm+0x1a/0x30
[   39.052655]  </TASK>
[   39.052656] 
[   39.253191] The buggy address belongs to the physical page:
[   39.258764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238
[   39.266764] flags: 0x200000000000000(node=0|zone=2)
[   39.271643] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   39.279383] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.287130] page dumped because: kasan: bad access detected
[   39.292702] 
[   39.294218] Memory state around the buggy address:
[   39.299012]  ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.306239]  ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.313456] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.320703]                    ^
[   39.323962]  ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.331179]  ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.338397] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   37.877096] ==================================================================
[   37.888082] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   37.894790] Read of size 1 at addr ffff888105238000 by task kunit_try_catch/276
[   37.902103] 
[   37.903604] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   37.903613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.903615] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   37.903619] Call Trace:
[   37.903620]  <TASK>
[   37.903622]  dump_stack_lvl+0x73/0xb0
[   37.903627]  print_report+0xd1/0x650
[   37.903631]  ? __virt_addr_valid+0x1db/0x2d0
[   37.903635]  ? mempool_uaf_helper+0x392/0x400
[   37.903639]  ? kasan_addr_to_slab+0x11/0xa0
[   37.903643]  ? mempool_uaf_helper+0x392/0x400
[   37.903648]  kasan_report+0x141/0x180
[   37.903652]  ? mempool_uaf_helper+0x392/0x400
[   37.903657]  __asan_report_load1_noabort+0x18/0x20
[   37.903661]  mempool_uaf_helper+0x392/0x400
[   37.903685]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   37.903690]  ? dequeue_entities+0xa24/0x1790
[   37.903695]  ? finish_task_switch.isra.0+0x153/0x700
[   37.903700]  mempool_page_alloc_uaf+0xed/0x140
[   37.903704]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   37.903708]  ? dequeue_task_fair+0x166/0x4e0
[   37.903724]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   37.903728]  ? __pfx_mempool_free_pages+0x10/0x10
[   37.903745]  ? ktime_get_ts64+0x83/0x230
[   37.903750]  kunit_try_run_case+0x1a2/0x480
[   37.903754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.903759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   37.903763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   37.903768]  ? __kthread_parkme+0x82/0x180
[   37.903772]  ? preempt_count_sub+0x50/0x80
[   37.903776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.903781]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.903785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   37.903789]  kthread+0x334/0x6f0
[   37.903793]  ? trace_preempt_on+0x20/0xc0
[   37.903797]  ? __pfx_kthread+0x10/0x10
[   37.903801]  ? _raw_spin_unlock_irq+0x47/0x80
[   37.903806]  ? calculate_sigpending+0x7b/0xa0
[   37.903810]  ? __pfx_kthread+0x10/0x10
[   37.903814]  ret_from_fork+0x3e/0x80
[   37.903818]  ? __pfx_kthread+0x10/0x10
[   37.903822]  ret_from_fork_asm+0x1a/0x30
[   37.903828]  </TASK>
[   37.903830] 
[   38.094618] The buggy address belongs to the physical page:
[   38.100189] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105238
[   38.108197] flags: 0x200000000000000(node=0|zone=2)
[   38.113077] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   38.120825] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.128572] page dumped because: kasan: bad access detected
[   38.134142] 
[   38.135643] Memory state around the buggy address:
[   38.140435]  ffff888105237f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.147653]  ffff888105237f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.154908] >ffff888105238000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.162127]                    ^
[   38.165360]  ffff888105238080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.172580]  ffff888105238100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.179807] ==================================================================
[   37.069712] ==================================================================
[   37.080950] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   37.087687] Read of size 1 at addr ffff888106b0c000 by task kunit_try_catch/272
[   37.095050] 
[   37.096551] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   37.096560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.096562] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   37.096566] Call Trace:
[   37.096567]  <TASK>
[   37.096569]  dump_stack_lvl+0x73/0xb0
[   37.096574]  print_report+0xd1/0x650
[   37.096578]  ? __virt_addr_valid+0x1db/0x2d0
[   37.096582]  ? mempool_uaf_helper+0x392/0x400
[   37.096586]  ? kasan_addr_to_slab+0x11/0xa0
[   37.096590]  ? mempool_uaf_helper+0x392/0x400
[   37.096595]  kasan_report+0x141/0x180
[   37.096599]  ? mempool_uaf_helper+0x392/0x400
[   37.096604]  __asan_report_load1_noabort+0x18/0x20
[   37.096608]  mempool_uaf_helper+0x392/0x400
[   37.096612]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   37.096617]  ? dequeue_entities+0xa24/0x1790
[   37.096621]  ? finish_task_switch.isra.0+0x153/0x700
[   37.096626]  mempool_kmalloc_large_uaf+0xef/0x140
[   37.096631]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   37.096635]  ? dequeue_task_fair+0x166/0x4e0
[   37.096640]  ? __pfx_mempool_kmalloc+0x10/0x10
[   37.096643]  ? __pfx_mempool_kfree+0x10/0x10
[   37.096647]  ? ktime_get_ts64+0x83/0x230
[   37.096652]  kunit_try_run_case+0x1a2/0x480
[   37.096656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.096660]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   37.096685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   37.096690]  ? __kthread_parkme+0x82/0x180
[   37.096695]  ? preempt_count_sub+0x50/0x80
[   37.096699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.096704]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.096724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   37.096728]  kthread+0x334/0x6f0
[   37.096745]  ? trace_preempt_on+0x20/0xc0
[   37.096749]  ? __pfx_kthread+0x10/0x10
[   37.096753]  ? _raw_spin_unlock_irq+0x47/0x80
[   37.096757]  ? calculate_sigpending+0x7b/0xa0
[   37.096761]  ? __pfx_kthread+0x10/0x10
[   37.096766]  ret_from_fork+0x3e/0x80
[   37.096770]  ? __pfx_kthread+0x10/0x10
[   37.096774]  ret_from_fork_asm+0x1a/0x30
[   37.096780]  </TASK>
[   37.096782] 
[   37.287224] The buggy address belongs to the physical page:
[   37.292796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b0c
[   37.300806] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.308464] flags: 0x200000000000040(head|node=0|zone=2)
[   37.313776] page_type: f8(unknown)
[   37.317184] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   37.324925] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.332690] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   37.340575] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.348410] head: 0200000000000002 ffffea00041ac301 00000000ffffffff 00000000ffffffff
[   37.356242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.364066] page dumped because: kasan: bad access detected
[   37.369641] 
[   37.371138] Memory state around the buggy address:
[   37.375934]  ffff888106b0bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.383161]  ffff888106b0bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.390379] >ffff888106b0c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.397596]                    ^
[   37.400830]  ffff888106b0c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.408049]  ffff888106b0c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.415268] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   37.422957] ==================================================================
[   37.434732] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   37.441872] Read of size 1 at addr ffff8881061f7240 by task kunit_try_catch/274
[   37.449180] 
[   37.450714] CPU: 2 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   37.450736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.450738] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   37.450742] Call Trace:
[   37.450743]  <TASK>
[   37.450745]  dump_stack_lvl+0x73/0xb0
[   37.450749]  print_report+0xd1/0x650
[   37.450754]  ? __virt_addr_valid+0x1db/0x2d0
[   37.450758]  ? mempool_uaf_helper+0x392/0x400
[   37.450762]  ? kasan_complete_mode_report_info+0x64/0x200
[   37.450766]  ? mempool_uaf_helper+0x392/0x400
[   37.450770]  kasan_report+0x141/0x180
[   37.450775]  ? mempool_uaf_helper+0x392/0x400
[   37.450780]  __asan_report_load1_noabort+0x18/0x20
[   37.450784]  mempool_uaf_helper+0x392/0x400
[   37.450788]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   37.450793]  ? finish_task_switch.isra.0+0x153/0x700
[   37.450798]  mempool_slab_uaf+0xea/0x140
[   37.450802]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   37.450805]  ? dequeue_task_fair+0x166/0x4e0
[   37.450809]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   37.450813]  ? __pfx_mempool_free_slab+0x10/0x10
[   37.450817]  ? ktime_get_ts64+0x83/0x230
[   37.450822]  kunit_try_run_case+0x1a2/0x480
[   37.450826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.450830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   37.450835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   37.450840]  ? __kthread_parkme+0x82/0x180
[   37.450844]  ? preempt_count_sub+0x50/0x80
[   37.450848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.450853]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.450857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   37.450861]  kthread+0x334/0x6f0
[   37.450865]  ? trace_preempt_on+0x20/0xc0
[   37.450869]  ? __pfx_kthread+0x10/0x10
[   37.450873]  ? _raw_spin_unlock_irq+0x47/0x80
[   37.450878]  ? calculate_sigpending+0x7b/0xa0
[   37.450881]  ? __pfx_kthread+0x10/0x10
[   37.450886]  ret_from_fork+0x3e/0x80
[   37.450890]  ? __pfx_kthread+0x10/0x10
[   37.450894]  ret_from_fork_asm+0x1a/0x30
[   37.450899]  </TASK>
[   37.450901] 
[   37.637428] Allocated by task 274:
[   37.640834]  kasan_save_stack+0x45/0x70
[   37.644714]  kasan_save_track+0x18/0x40
[   37.648590]  kasan_save_alloc_info+0x3b/0x50
[   37.652861]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   37.658173]  remove_element+0x11e/0x190
[   37.662015]  mempool_alloc_preallocated+0x4d/0x90
[   37.666732]  mempool_uaf_helper+0x96/0x400
[   37.670836]  mempool_slab_uaf+0xea/0x140
[   37.674762]  kunit_try_run_case+0x1a2/0x480
[   37.678948]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.684348]  kthread+0x334/0x6f0
[   37.687589]  ret_from_fork+0x3e/0x80
[   37.691175]  ret_from_fork_asm+0x1a/0x30
[   37.695101] 
[   37.696601] Freed by task 274:
[   37.699659]  kasan_save_stack+0x45/0x70
[   37.703534]  kasan_save_track+0x18/0x40
[   37.707373]  kasan_save_free_info+0x3f/0x60
[   37.711558]  __kasan_mempool_poison_object+0x131/0x1d0
[   37.716700]  mempool_free+0x2ec/0x380
[   37.720407]  mempool_uaf_helper+0x11a/0x400
[   37.724593]  mempool_slab_uaf+0xea/0x140
[   37.728520]  kunit_try_run_case+0x1a2/0x480
[   37.732735]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.738163]  kthread+0x334/0x6f0
[   37.741397]  ret_from_fork+0x3e/0x80
[   37.744975]  ret_from_fork_asm+0x1a/0x30
[   37.748902] 
[   37.750401] The buggy address belongs to the object at ffff8881061f7240
[   37.750401]  which belongs to the cache test_cache of size 123
[   37.762830] The buggy address is located 0 bytes inside of
[   37.762830]  freed 123-byte region [ffff8881061f7240, ffff8881061f72bb)
[   37.774917] 
[   37.776417] The buggy address belongs to the physical page:
[   37.781991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   37.789997] flags: 0x200000000000000(node=0|zone=2)
[   37.794875] page_type: f5(slab)
[   37.798024] raw: 0200000000000000 ffff888100dbcf00 dead000000000122 0000000000000000
[   37.805771] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.813510] page dumped because: kasan: bad access detected
[   37.819082] 
[   37.820580] Memory state around the buggy address:
[   37.825373]  ffff8881061f7100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.832593]  ffff8881061f7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.839812] >ffff8881061f7200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.847030]                                            ^
[   37.852341]  ffff8881061f7280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.859563]  ffff8881061f7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.866790] ==================================================================
[   36.616059] ==================================================================
[   36.627565] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   36.634734] Read of size 1 at addr ffff8881061dfb00 by task kunit_try_catch/270
[   36.642047] 
[   36.643547] CPU: 2 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   36.643557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.643559] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.643563] Call Trace:
[   36.643565]  <TASK>
[   36.643567]  dump_stack_lvl+0x73/0xb0
[   36.643572]  print_report+0xd1/0x650
[   36.643577]  ? __virt_addr_valid+0x1db/0x2d0
[   36.643581]  ? mempool_uaf_helper+0x392/0x400
[   36.643585]  ? kasan_complete_mode_report_info+0x64/0x200
[   36.643590]  ? mempool_uaf_helper+0x392/0x400
[   36.643594]  kasan_report+0x141/0x180
[   36.643598]  ? mempool_uaf_helper+0x392/0x400
[   36.643603]  __asan_report_load1_noabort+0x18/0x20
[   36.643607]  mempool_uaf_helper+0x392/0x400
[   36.643612]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   36.643616]  ? dequeue_entities+0xa24/0x1790
[   36.643621]  ? finish_task_switch.isra.0+0x153/0x700
[   36.643626]  mempool_kmalloc_uaf+0xef/0x140
[   36.643631]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   36.643635]  ? dequeue_task_fair+0x166/0x4e0
[   36.643639]  ? __pfx_mempool_kmalloc+0x10/0x10
[   36.643643]  ? __pfx_mempool_kfree+0x10/0x10
[   36.643647]  ? ktime_get_ts64+0x83/0x230
[   36.643652]  kunit_try_run_case+0x1a2/0x480
[   36.643658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.643662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.643667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.643688]  ? __kthread_parkme+0x82/0x180
[   36.643693]  ? preempt_count_sub+0x50/0x80
[   36.643698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.643703]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.643719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.643724]  kthread+0x334/0x6f0
[   36.643728]  ? trace_preempt_on+0x20/0xc0
[   36.643733]  ? __pfx_kthread+0x10/0x10
[   36.643737]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.643742]  ? calculate_sigpending+0x7b/0xa0
[   36.643746]  ? __pfx_kthread+0x10/0x10
[   36.643750]  ret_from_fork+0x3e/0x80
[   36.643755]  ? __pfx_kthread+0x10/0x10
[   36.643759]  ret_from_fork_asm+0x1a/0x30
[   36.643765]  </TASK>
[   36.643767] 
[   36.834403] Allocated by task 270:
[   36.837808]  kasan_save_stack+0x45/0x70
[   36.841647]  kasan_save_track+0x18/0x40
[   36.845488]  kasan_save_alloc_info+0x3b/0x50
[   36.849761]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   36.855081]  remove_element+0x11e/0x190
[   36.858919]  mempool_alloc_preallocated+0x4d/0x90
[   36.863625]  mempool_uaf_helper+0x96/0x400
[   36.867762]  mempool_kmalloc_uaf+0xef/0x140
[   36.871953]  kunit_try_run_case+0x1a2/0x480
[   36.876139]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.881538]  kthread+0x334/0x6f0
[   36.884772]  ret_from_fork+0x3e/0x80
[   36.888350]  ret_from_fork_asm+0x1a/0x30
[   36.892276] 
[   36.893776] Freed by task 270:
[   36.896835]  kasan_save_stack+0x45/0x70
[   36.900703]  kasan_save_track+0x18/0x40
[   36.904592]  kasan_save_free_info+0x3f/0x60
[   36.908778]  __kasan_mempool_poison_object+0x131/0x1d0
[   36.913925]  mempool_free+0x2ec/0x380
[   36.917590]  mempool_uaf_helper+0x11a/0x400
[   36.921775]  mempool_kmalloc_uaf+0xef/0x140
[   36.925962]  kunit_try_run_case+0x1a2/0x480
[   36.930147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.935547]  kthread+0x334/0x6f0
[   36.938778]  ret_from_fork+0x3e/0x80
[   36.942359]  ret_from_fork_asm+0x1a/0x30
[   36.946284] 
[   36.947783] The buggy address belongs to the object at ffff8881061dfb00
[   36.947783]  which belongs to the cache kmalloc-128 of size 128
[   36.960298] The buggy address is located 0 bytes inside of
[   36.960298]  freed 128-byte region [ffff8881061dfb00, ffff8881061dfb80)
[   36.972380] 
[   36.973876] The buggy address belongs to the physical page:
[   36.979450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061df
[   36.987458] flags: 0x200000000000000(node=0|zone=2)
[   36.992338] page_type: f5(slab)
[   36.995484] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   37.003232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.010970] page dumped because: kasan: bad access detected
[   37.016541] 
[   37.018041] Memory state around the buggy address:
[   37.022835]  ffff8881061dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.030063]  ffff8881061dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.037291] >ffff8881061dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.044515]                    ^
[   37.047768]  ffff8881061dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.054985]  ffff8881061dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.062206] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   36.196168] ==================================================================
[   36.208439] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   36.216013] Read of size 1 at addr ffff8881080522bb by task kunit_try_catch/268
[   36.223327] 
[   36.224829] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   36.224837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.224840] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.224843] Call Trace:
[   36.224845]  <TASK>
[   36.224847]  dump_stack_lvl+0x73/0xb0
[   36.224851]  print_report+0xd1/0x650
[   36.224855]  ? __virt_addr_valid+0x1db/0x2d0
[   36.224859]  ? mempool_oob_right_helper+0x318/0x380
[   36.224863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.224868]  ? mempool_oob_right_helper+0x318/0x380
[   36.224872]  kasan_report+0x141/0x180
[   36.224876]  ? mempool_oob_right_helper+0x318/0x380
[   36.224882]  __asan_report_load1_noabort+0x18/0x20
[   36.224886]  mempool_oob_right_helper+0x318/0x380
[   36.224890]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   36.224896]  ? finish_task_switch.isra.0+0x153/0x700
[   36.224901]  mempool_slab_oob_right+0xed/0x140
[   36.224904]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   36.224908]  ? dequeue_task_fair+0x166/0x4e0
[   36.224912]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   36.224916]  ? __pfx_mempool_free_slab+0x10/0x10
[   36.224920]  ? ktime_get_ts64+0x83/0x230
[   36.224925]  kunit_try_run_case+0x1a2/0x480
[   36.224929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.224933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.224938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.224942]  ? __kthread_parkme+0x82/0x180
[   36.224947]  ? preempt_count_sub+0x50/0x80
[   36.224951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.224955]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.224959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.224964]  kthread+0x334/0x6f0
[   36.224968]  ? trace_preempt_on+0x20/0xc0
[   36.224972]  ? __pfx_kthread+0x10/0x10
[   36.224976]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.224980]  ? calculate_sigpending+0x7b/0xa0
[   36.224984]  ? __pfx_kthread+0x10/0x10
[   36.224988]  ret_from_fork+0x3e/0x80
[   36.224992]  ? __pfx_kthread+0x10/0x10
[   36.224997]  ret_from_fork_asm+0x1a/0x30
[   36.225002]  </TASK>
[   36.225004] 
[   36.414991] Allocated by task 268:
[   36.418396]  kasan_save_stack+0x45/0x70
[   36.422235]  kasan_save_track+0x18/0x40
[   36.426074]  kasan_save_alloc_info+0x3b/0x50
[   36.430346]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   36.435659]  remove_element+0x11e/0x190
[   36.439532]  mempool_alloc_preallocated+0x4d/0x90
[   36.444240]  mempool_oob_right_helper+0x8a/0x380
[   36.448867]  mempool_slab_oob_right+0xed/0x140
[   36.453312]  kunit_try_run_case+0x1a2/0x480
[   36.457497]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.462899]  kthread+0x334/0x6f0
[   36.466140]  ret_from_fork+0x3e/0x80
[   36.469762]  ret_from_fork_asm+0x1a/0x30
[   36.473702] 
[   36.475247] The buggy address belongs to the object at ffff888108052240
[   36.475247]  which belongs to the cache test_cache of size 123
[   36.487702] The buggy address is located 0 bytes to the right of
[   36.487702]  allocated 123-byte region [ffff888108052240, ffff8881080522bb)
[   36.500703] 
[   36.502251] The buggy address belongs to the physical page:
[   36.507824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108052
[   36.515832] flags: 0x200000000000000(node=0|zone=2)
[   36.520721] page_type: f5(slab)
[   36.523902] raw: 0200000000000000 ffff888100ac7680 dead000000000122 0000000000000000
[   36.531649] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.539420] page dumped because: kasan: bad access detected
[   36.544993] 
[   36.546492] Memory state around the buggy address:
[   36.551286]  ffff888108052180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.558513]  ffff888108052200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.565764] >ffff888108052280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.572986]                                         ^
[   36.578039]  ffff888108052300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.585256]  ffff888108052380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.592475] ==================================================================
[   35.429176] ==================================================================
[   35.440080] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   35.447687] Read of size 1 at addr ffff888104ee9573 by task kunit_try_catch/264
[   35.455020] 
[   35.456521] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   35.456530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.456533] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   35.456537] Call Trace:
[   35.456538]  <TASK>
[   35.456541]  dump_stack_lvl+0x73/0xb0
[   35.456545]  print_report+0xd1/0x650
[   35.456550]  ? __virt_addr_valid+0x1db/0x2d0
[   35.456554]  ? mempool_oob_right_helper+0x318/0x380
[   35.456559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.456563]  ? mempool_oob_right_helper+0x318/0x380
[   35.456568]  kasan_report+0x141/0x180
[   35.456572]  ? mempool_oob_right_helper+0x318/0x380
[   35.456578]  __asan_report_load1_noabort+0x18/0x20
[   35.456581]  mempool_oob_right_helper+0x318/0x380
[   35.456586]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   35.456591]  ? dequeue_entities+0xa24/0x1790
[   35.456596]  ? finish_task_switch.isra.0+0x153/0x700
[   35.456601]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.456606]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   35.456611]  ? dequeue_task_fair+0x166/0x4e0
[   35.456615]  ? __pfx_mempool_kmalloc+0x10/0x10
[   35.456619]  ? __pfx_mempool_kfree+0x10/0x10
[   35.456623]  ? ktime_get_ts64+0x83/0x230
[   35.456628]  kunit_try_run_case+0x1a2/0x480
[   35.456633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.456637]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   35.456642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.456647]  ? __kthread_parkme+0x82/0x180
[   35.456651]  ? preempt_count_sub+0x50/0x80
[   35.456656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.456675]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.456679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.456684]  kthread+0x334/0x6f0
[   35.456688]  ? trace_preempt_on+0x20/0xc0
[   35.456705]  ? __pfx_kthread+0x10/0x10
[   35.456710]  ? _raw_spin_unlock_irq+0x47/0x80
[   35.456714]  ? calculate_sigpending+0x7b/0xa0
[   35.456718]  ? __pfx_kthread+0x10/0x10
[   35.456722]  ret_from_fork+0x3e/0x80
[   35.456727]  ? __pfx_kthread+0x10/0x10
[   35.456731]  ret_from_fork_asm+0x1a/0x30
[   35.456738]  </TASK>
[   35.456739] 
[   35.650938] Allocated by task 264:
[   35.654342]  kasan_save_stack+0x45/0x70
[   35.658183]  kasan_save_track+0x18/0x40
[   35.662020]  kasan_save_alloc_info+0x3b/0x50
[   35.666294]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   35.671605]  remove_element+0x11e/0x190
[   35.675444]  mempool_alloc_preallocated+0x4d/0x90
[   35.680153]  mempool_oob_right_helper+0x8a/0x380
[   35.684779]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.689486]  kunit_try_run_case+0x1a2/0x480
[   35.693687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.699089]  kthread+0x334/0x6f0
[   35.702328]  ret_from_fork+0x3e/0x80
[   35.705908]  ret_from_fork_asm+0x1a/0x30
[   35.709833] 
[   35.711334] The buggy address belongs to the object at ffff888104ee9500
[   35.711334]  which belongs to the cache kmalloc-128 of size 128
[   35.723848] The buggy address is located 0 bytes to the right of
[   35.723848]  allocated 115-byte region [ffff888104ee9500, ffff888104ee9573)
[   35.736795] 
[   35.738293] The buggy address belongs to the physical page:
[   35.743865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   35.751873] flags: 0x200000000000000(node=0|zone=2)
[   35.756752] page_type: f5(slab)
[   35.759899] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   35.767639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   35.775384] page dumped because: kasan: bad access detected
[   35.780958] 
[   35.782457] Memory state around the buggy address:
[   35.787250]  ffff888104ee9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.794467]  ffff888104ee9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.801688] >ffff888104ee9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.808932]                                                              ^
[   35.815806]  ffff888104ee9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.823031]  ffff888104ee9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.830252] ==================================================================
[   35.838032] ==================================================================
[   35.849784] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   35.857358] Read of size 1 at addr ffff888105ec2001 by task kunit_try_catch/266
[   35.864665] 
[   35.866191] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   35.866199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.866201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   35.866205] Call Trace:
[   35.866206]  <TASK>
[   35.866208]  dump_stack_lvl+0x73/0xb0
[   35.866212]  print_report+0xd1/0x650
[   35.866217]  ? __virt_addr_valid+0x1db/0x2d0
[   35.866221]  ? mempool_oob_right_helper+0x318/0x380
[   35.866225]  ? kasan_addr_to_slab+0x11/0xa0
[   35.866229]  ? mempool_oob_right_helper+0x318/0x380
[   35.866234]  kasan_report+0x141/0x180
[   35.866238]  ? mempool_oob_right_helper+0x318/0x380
[   35.866243]  __asan_report_load1_noabort+0x18/0x20
[   35.866247]  mempool_oob_right_helper+0x318/0x380
[   35.866252]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   35.866256]  ? dequeue_entities+0xa24/0x1790
[   35.866261]  ? finish_task_switch.isra.0+0x153/0x700
[   35.866266]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   35.866271]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   35.866276]  ? dequeue_task_fair+0x166/0x4e0
[   35.866280]  ? __pfx_mempool_kmalloc+0x10/0x10
[   35.866283]  ? __pfx_mempool_kfree+0x10/0x10
[   35.866288]  ? ktime_get_ts64+0x83/0x230
[   35.866292]  kunit_try_run_case+0x1a2/0x480
[   35.866297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.866301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   35.866306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.866310]  ? __kthread_parkme+0x82/0x180
[   35.866314]  ? preempt_count_sub+0x50/0x80
[   35.866319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.866323]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.866328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.866332]  kthread+0x334/0x6f0
[   35.866336]  ? trace_preempt_on+0x20/0xc0
[   35.866340]  ? __pfx_kthread+0x10/0x10
[   35.866344]  ? _raw_spin_unlock_irq+0x47/0x80
[   35.866348]  ? calculate_sigpending+0x7b/0xa0
[   35.866352]  ? __pfx_kthread+0x10/0x10
[   35.866357]  ret_from_fork+0x3e/0x80
[   35.866361]  ? __pfx_kthread+0x10/0x10
[   35.866365]  ret_from_fork_asm+0x1a/0x30
[   35.866371]  </TASK>
[   35.866372] 
[   36.060435] The buggy address belongs to the physical page:
[   36.066007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec0
[   36.074008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.081686] flags: 0x200000000000040(head|node=0|zone=2)
[   36.087034] page_type: f8(unknown)
[   36.090439] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.098178] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.105919] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.113751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.121577] head: 0200000000000002 ffffea000417b001 00000000ffffffff 00000000ffffffff
[   36.129402] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.137227] page dumped because: kasan: bad access detected
[   36.142799] 
[   36.144300] Memory state around the buggy address:
[   36.149091]  ffff888105ec1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.156311]  ffff888105ec1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.163529] >ffff888105ec2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.170750]                    ^
[   36.173982]  ffff888105ec2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.181200]  ffff888105ec2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.188418] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   34.392619] ==================================================================
[   34.403775] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   34.411524] Read of size 1 at addr ffff888100ac7540 by task kunit_try_catch/258
[   34.418836] 
[   34.420337] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   34.420347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.420349] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   34.420353] Call Trace:
[   34.420355]  <TASK>
[   34.420357]  dump_stack_lvl+0x73/0xb0
[   34.420362]  print_report+0xd1/0x650
[   34.420366]  ? __virt_addr_valid+0x1db/0x2d0
[   34.420371]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.420374]  ? kasan_complete_mode_report_info+0x64/0x200
[   34.420379]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.420382]  kasan_report+0x141/0x180
[   34.420386]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.420391]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.420394]  __kasan_check_byte+0x3d/0x50
[   34.420399]  kmem_cache_destroy+0x25/0x1d0
[   34.420404]  kmem_cache_double_destroy+0x1bf/0x380
[   34.420407]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   34.420411]  ? finish_task_switch.isra.0+0x153/0x700
[   34.420416]  ? __switch_to+0x5d9/0xf60
[   34.420420]  ? dequeue_task_fair+0x166/0x4e0
[   34.420426]  ? ktime_get_ts64+0x83/0x230
[   34.420431]  kunit_try_run_case+0x1a2/0x480
[   34.420436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.420440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.420445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.420450]  ? __kthread_parkme+0x82/0x180
[   34.420454]  ? preempt_count_sub+0x50/0x80
[   34.420459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.420463]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.420467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.420471]  kthread+0x334/0x6f0
[   34.420475]  ? trace_preempt_on+0x20/0xc0
[   34.420480]  ? __pfx_kthread+0x10/0x10
[   34.420484]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.420489]  ? calculate_sigpending+0x7b/0xa0
[   34.420493]  ? __pfx_kthread+0x10/0x10
[   34.420497]  ret_from_fork+0x3e/0x80
[   34.420501]  ? __pfx_kthread+0x10/0x10
[   34.420506]  ret_from_fork_asm+0x1a/0x30
[   34.420512]  </TASK>
[   34.420513] 
[   34.604192] Allocated by task 258:
[   34.607596]  kasan_save_stack+0x45/0x70
[   34.611436]  kasan_save_track+0x18/0x40
[   34.615276]  kasan_save_alloc_info+0x3b/0x50
[   34.619547]  __kasan_slab_alloc+0x91/0xa0
[   34.623561]  kmem_cache_alloc_noprof+0x123/0x3f0
[   34.628187]  __kmem_cache_create_args+0x169/0x240
[   34.632893]  kmem_cache_double_destroy+0xd5/0x380
[   34.637600]  kunit_try_run_case+0x1a2/0x480
[   34.641786]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.647186]  kthread+0x334/0x6f0
[   34.650426]  ret_from_fork+0x3e/0x80
[   34.654006]  ret_from_fork_asm+0x1a/0x30
[   34.657940] 
[   34.659439] Freed by task 258:
[   34.662499]  kasan_save_stack+0x45/0x70
[   34.666336]  kasan_save_track+0x18/0x40
[   34.670177]  kasan_save_free_info+0x3f/0x60
[   34.674361]  __kasan_slab_free+0x56/0x70
[   34.678289]  kmem_cache_free+0x249/0x420
[   34.682213]  slab_kmem_cache_release+0x2e/0x40
[   34.686660]  kmem_cache_release+0x16/0x20
[   34.690702]  kobject_put+0x17e/0x450
[   34.694330]  sysfs_slab_release+0x16/0x20
[   34.698351]  kmem_cache_destroy+0xf0/0x1d0
[   34.702457]  kmem_cache_double_destroy+0x14e/0x380
[   34.707250]  kunit_try_run_case+0x1a2/0x480
[   34.711435]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.716835]  kthread+0x334/0x6f0
[   34.720069]  ret_from_fork+0x3e/0x80
[   34.723655]  ret_from_fork_asm+0x1a/0x30
[   34.727617] 
[   34.729114] The buggy address belongs to the object at ffff888100ac7540
[   34.729114]  which belongs to the cache kmem_cache of size 208
[   34.741534] The buggy address is located 0 bytes inside of
[   34.741534]  freed 208-byte region [ffff888100ac7540, ffff888100ac7610)
[   34.753617] 
[   34.755114] The buggy address belongs to the physical page:
[   34.760703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac6
[   34.768765] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.776423] flags: 0x200000000000040(head|node=0|zone=2)
[   34.781760] page_type: f5(slab)
[   34.784901] raw: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000
[   34.792647] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   34.800389] head: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000
[   34.808221] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   34.816049] head: 0200000000000001 ffffea000402b181 00000000ffffffff 00000000ffffffff
[   34.823882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.831758] page dumped because: kasan: bad access detected
[   34.837330] 
[   34.838820] Memory state around the buggy address:
[   34.843616]  ffff888100ac7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.850842]  ffff888100ac7480: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   34.858060] >ffff888100ac7500: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   34.865281]                                            ^
[   34.870592]  ffff888100ac7580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.877813]  ffff888100ac7600: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.885038] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   33.856965] ==================================================================
[   33.868583] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   33.875747] Read of size 1 at addr ffff888100e06000 by task kunit_try_catch/256
[   33.883054] 
[   33.884556] CPU: 2 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   33.884565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.884567] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   33.884571] Call Trace:
[   33.884572]  <TASK>
[   33.884575]  dump_stack_lvl+0x73/0xb0
[   33.884580]  print_report+0xd1/0x650
[   33.884585]  ? __virt_addr_valid+0x1db/0x2d0
[   33.884589]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   33.884593]  ? kasan_complete_mode_report_info+0x64/0x200
[   33.884597]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   33.884600]  kasan_report+0x141/0x180
[   33.884605]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   33.884609]  __asan_report_load1_noabort+0x18/0x20
[   33.884613]  kmem_cache_rcu_uaf+0x3e3/0x510
[   33.884616]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   33.884619]  ? finish_task_switch.isra.0+0x153/0x700
[   33.884624]  ? __switch_to+0x5d9/0xf60
[   33.884628]  ? dequeue_task_fair+0x166/0x4e0
[   33.884634]  ? ktime_get_ts64+0x83/0x230
[   33.884639]  kunit_try_run_case+0x1a2/0x480
[   33.884644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.884648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.884654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.884658]  ? __kthread_parkme+0x82/0x180
[   33.884663]  ? preempt_count_sub+0x50/0x80
[   33.884667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.884689]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.884693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.884697]  kthread+0x334/0x6f0
[   33.884719]  ? trace_preempt_on+0x20/0xc0
[   33.884725]  ? __pfx_kthread+0x10/0x10
[   33.884741]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.884746]  ? calculate_sigpending+0x7b/0xa0
[   33.884750]  ? __pfx_kthread+0x10/0x10
[   33.884755]  ret_from_fork+0x3e/0x80
[   33.884759]  ? __pfx_kthread+0x10/0x10
[   33.884764]  ret_from_fork_asm+0x1a/0x30
[   33.884782]  </TASK>
[   33.884784] 
[   34.057195] Allocated by task 256:
[   34.060601]  kasan_save_stack+0x45/0x70
[   34.064447]  kasan_save_track+0x18/0x40
[   34.068288]  kasan_save_alloc_info+0x3b/0x50
[   34.072560]  __kasan_slab_alloc+0x91/0xa0
[   34.076580]  kmem_cache_alloc_noprof+0x123/0x3f0
[   34.081199]  kmem_cache_rcu_uaf+0x155/0x510
[   34.085386]  kunit_try_run_case+0x1a2/0x480
[   34.089570]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.094971]  kthread+0x334/0x6f0
[   34.098202]  ret_from_fork+0x3e/0x80
[   34.101782]  ret_from_fork_asm+0x1a/0x30
[   34.105708] 
[   34.107223] Freed by task 0:
[   34.110111]  kasan_save_stack+0x45/0x70
[   34.113949]  kasan_save_track+0x18/0x40
[   34.117788]  kasan_save_free_info+0x3f/0x60
[   34.121974]  __kasan_slab_free+0x56/0x70
[   34.125899]  slab_free_after_rcu_debug+0xe4/0x310
[   34.130606]  rcu_core+0x669/0x1c30
[   34.134013]  rcu_core_si+0x12/0x20
[   34.137427]  handle_softirqs+0x206/0x730
[   34.141360]  __irq_exit_rcu+0xc9/0x110
[   34.145112]  irq_exit_rcu+0x12/0x20
[   34.148607]  sysvec_apic_timer_interrupt+0x81/0x90
[   34.153406]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   34.158546] 
[   34.160045] Last potentially related work creation:
[   34.164925]  kasan_save_stack+0x45/0x70
[   34.168787]  kasan_record_aux_stack+0xb2/0xc0
[   34.173148]  kmem_cache_free+0x131/0x420
[   34.177073]  kmem_cache_rcu_uaf+0x194/0x510
[   34.181259]  kunit_try_run_case+0x1a2/0x480
[   34.185446]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.190845]  kthread+0x334/0x6f0
[   34.194077]  ret_from_fork+0x3e/0x80
[   34.197656]  ret_from_fork_asm+0x1a/0x30
[   34.201610] 
[   34.203108] The buggy address belongs to the object at ffff888100e06000
[   34.203108]  which belongs to the cache test_cache of size 200
[   34.215537] The buggy address is located 0 bytes inside of
[   34.215537]  freed 200-byte region [ffff888100e06000, ffff888100e060c8)
[   34.227624] 
[   34.229123] The buggy address belongs to the physical page:
[   34.234702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e06
[   34.242738] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.250390] flags: 0x200000000000040(head|node=0|zone=2)
[   34.255703] page_type: f5(slab)
[   34.258878] raw: 0200000000000040 ffff888100dbcc80 dead000000000122 0000000000000000
[   34.266624] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.274373] head: 0200000000000040 ffff888100dbcc80 dead000000000122 0000000000000000
[   34.282206] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.290031] head: 0200000000000001 ffffea0004038181 00000000ffffffff 00000000ffffffff
[   34.297857] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.305700] page dumped because: kasan: bad access detected
[   34.311325] 
[   34.312823] Memory state around the buggy address:
[   34.317616]  ffff888100e05f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324835]  ffff888100e05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.332053] >ffff888100e06000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.339271]                    ^
[   34.342505]  ffff888100e06080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.349747]  ffff888100e06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.356970] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.393413] ==================================================================
[   33.404943] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   33.411930] Free of addr ffff888106ce4001 by task kunit_try_catch/254
[   33.418370] 
[   33.419871] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   33.419879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.419882] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   33.419885] Call Trace:
[   33.419887]  <TASK>
[   33.419889]  dump_stack_lvl+0x73/0xb0
[   33.419893]  print_report+0xd1/0x650
[   33.419898]  ? __virt_addr_valid+0x1db/0x2d0
[   33.419902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.419907]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.419910]  kasan_report_invalid_free+0x10a/0x130
[   33.419915]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.419919]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.419923]  check_slab_allocation+0x11f/0x130
[   33.419927]  __kasan_slab_pre_free+0x28/0x40
[   33.419931]  kmem_cache_free+0xed/0x420
[   33.419935]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   33.419939]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.419943]  kmem_cache_invalid_free+0x1d8/0x460
[   33.419947]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   33.419950]  ? finish_task_switch.isra.0+0x153/0x700
[   33.419955]  ? __switch_to+0x5d9/0xf60
[   33.419960]  ? dequeue_task_fair+0x166/0x4e0
[   33.419965]  ? ktime_get_ts64+0x83/0x230
[   33.419970]  kunit_try_run_case+0x1a2/0x480
[   33.419974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.419978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.419984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.419988]  ? __kthread_parkme+0x82/0x180
[   33.419993]  ? preempt_count_sub+0x50/0x80
[   33.419997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.420002]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.420006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.420010]  kthread+0x334/0x6f0
[   33.420014]  ? trace_preempt_on+0x20/0xc0
[   33.420019]  ? __pfx_kthread+0x10/0x10
[   33.420023]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.420027]  ? calculate_sigpending+0x7b/0xa0
[   33.420031]  ? __pfx_kthread+0x10/0x10
[   33.420035]  ret_from_fork+0x3e/0x80
[   33.420040]  ? __pfx_kthread+0x10/0x10
[   33.420044]  ret_from_fork_asm+0x1a/0x30
[   33.420050]  </TASK>
[   33.420052] 
[   33.613109] Allocated by task 254:
[   33.616515]  kasan_save_stack+0x45/0x70
[   33.620362]  kasan_save_track+0x18/0x40
[   33.624201]  kasan_save_alloc_info+0x3b/0x50
[   33.628475]  __kasan_slab_alloc+0x91/0xa0
[   33.632494]  kmem_cache_alloc_noprof+0x123/0x3f0
[   33.637115]  kmem_cache_invalid_free+0x157/0x460
[   33.641761]  kunit_try_run_case+0x1a2/0x480
[   33.645954]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.651360]  kthread+0x334/0x6f0
[   33.654594]  ret_from_fork+0x3e/0x80
[   33.658174]  ret_from_fork_asm+0x1a/0x30
[   33.662099] 
[   33.663598] The buggy address belongs to the object at ffff888106ce4000
[   33.663598]  which belongs to the cache test_cache of size 200
[   33.676025] The buggy address is located 1 bytes inside of
[   33.676025]  200-byte region [ffff888106ce4000, ffff888106ce40c8)
[   33.687586] 
[   33.689084] The buggy address belongs to the physical page:
[   33.694657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce4
[   33.702707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.710378] flags: 0x200000000000040(head|node=0|zone=2)
[   33.715704] page_type: f5(slab)
[   33.718898] raw: 0200000000000040 ffff888100ac7400 dead000000000122 0000000000000000
[   33.726637] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.734377] head: 0200000000000040 ffff888100ac7400 dead000000000122 0000000000000000
[   33.742210] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.750038] head: 0200000000000001 ffffea00041b3901 00000000ffffffff 00000000ffffffff
[   33.757871] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.765717] page dumped because: kasan: bad access detected
[   33.771319] 
[   33.772819] Memory state around the buggy address:
[   33.777613]  ffff888106ce3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.784832]  ffff888106ce3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.792049] >ffff888106ce4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.799269]                    ^
[   33.802503]  ffff888106ce4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.809760]  ffff888106ce4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.816981] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   32.912279] ==================================================================
[   32.923094] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   32.929893] Free of addr ffff888100e06000 by task kunit_try_catch/252
[   32.936332] 
[   32.937837] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   32.937846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.937848] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   32.937852] Call Trace:
[   32.937854]  <TASK>
[   32.937856]  dump_stack_lvl+0x73/0xb0
[   32.937861]  print_report+0xd1/0x650
[   32.937866]  ? __virt_addr_valid+0x1db/0x2d0
[   32.937871]  ? kasan_complete_mode_report_info+0x64/0x200
[   32.937875]  ? kmem_cache_double_free+0x1e5/0x480
[   32.937878]  kasan_report_invalid_free+0x10a/0x130
[   32.937883]  ? kmem_cache_double_free+0x1e5/0x480
[   32.937887]  ? kmem_cache_double_free+0x1e5/0x480
[   32.937891]  check_slab_allocation+0x101/0x130
[   32.937895]  __kasan_slab_pre_free+0x28/0x40
[   32.937899]  kmem_cache_free+0xed/0x420
[   32.937903]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   32.937907]  ? kmem_cache_double_free+0x1e5/0x480
[   32.937911]  kmem_cache_double_free+0x1e5/0x480
[   32.937915]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   32.937918]  ? finish_task_switch.isra.0+0x153/0x700
[   32.937923]  ? __switch_to+0x5d9/0xf60
[   32.937927]  ? dequeue_task_fair+0x166/0x4e0
[   32.937933]  ? ktime_get_ts64+0x83/0x230
[   32.937938]  kunit_try_run_case+0x1a2/0x480
[   32.937944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.937948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.937953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.937957]  ? __kthread_parkme+0x82/0x180
[   32.937962]  ? preempt_count_sub+0x50/0x80
[   32.937966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.937970]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.937975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.937979]  kthread+0x334/0x6f0
[   32.937983]  ? trace_preempt_on+0x20/0xc0
[   32.937988]  ? __pfx_kthread+0x10/0x10
[   32.937992]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.937996]  ? calculate_sigpending+0x7b/0xa0
[   32.938000]  ? __pfx_kthread+0x10/0x10
[   32.938004]  ret_from_fork+0x3e/0x80
[   32.938009]  ? __pfx_kthread+0x10/0x10
[   32.938013]  ret_from_fork_asm+0x1a/0x30
[   32.938019]  </TASK>
[   32.938021] 
[   33.130485] Allocated by task 252:
[   33.133889]  kasan_save_stack+0x45/0x70
[   33.137747]  kasan_save_track+0x18/0x40
[   33.141586]  kasan_save_alloc_info+0x3b/0x50
[   33.145857]  __kasan_slab_alloc+0x91/0xa0
[   33.149871]  kmem_cache_alloc_noprof+0x123/0x3f0
[   33.154490]  kmem_cache_double_free+0x14f/0x480
[   33.159021]  kunit_try_run_case+0x1a2/0x480
[   33.163206]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.168608]  kthread+0x334/0x6f0
[   33.171848]  ret_from_fork+0x3e/0x80
[   33.175427]  ret_from_fork_asm+0x1a/0x30
[   33.179352] 
[   33.180854] Freed by task 252:
[   33.183911]  kasan_save_stack+0x45/0x70
[   33.187750]  kasan_save_track+0x18/0x40
[   33.191590]  kasan_save_free_info+0x3f/0x60
[   33.195776]  __kasan_slab_free+0x56/0x70
[   33.199717]  kmem_cache_free+0x249/0x420
[   33.203654]  kmem_cache_double_free+0x16a/0x480
[   33.208220]  kunit_try_run_case+0x1a2/0x480
[   33.212407]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.217805]  kthread+0x334/0x6f0
[   33.221037]  ret_from_fork+0x3e/0x80
[   33.224616]  ret_from_fork_asm+0x1a/0x30
[   33.228543] 
[   33.230042] The buggy address belongs to the object at ffff888100e06000
[   33.230042]  which belongs to the cache test_cache of size 200
[   33.242471] The buggy address is located 0 bytes inside of
[   33.242471]  200-byte region [ffff888100e06000, ffff888100e060c8)
[   33.254038] 
[   33.255539] The buggy address belongs to the physical page:
[   33.261111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e06
[   33.269117] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.276770] flags: 0x200000000000040(head|node=0|zone=2)
[   33.282084] page_type: f5(slab)
[   33.285230] raw: 0200000000000040 ffff888100dbcb40 dead000000000122 0000000000000000
[   33.292977] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.300733] head: 0200000000000040 ffff888100dbcb40 dead000000000122 0000000000000000
[   33.308559] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.316386] head: 0200000000000001 ffffea0004038181 00000000ffffffff 00000000ffffffff
[   33.324221] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.332053] page dumped because: kasan: bad access detected
[   33.337626] 
[   33.339125] Memory state around the buggy address:
[   33.343918]  ffff888100e05f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.351136]  ffff888100e05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.358356] >ffff888100e06000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.365583]                    ^
[   33.368815]  ffff888100e06080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.376036]  ffff888100e06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.383261] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   32.483043] ==================================================================
[   32.493851] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   32.500550] Read of size 1 at addr ffff888107fba0c8 by task kunit_try_catch/250
[   32.507858] 
[   32.509358] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   32.509366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.509369] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   32.509372] Call Trace:
[   32.509374]  <TASK>
[   32.509375]  dump_stack_lvl+0x73/0xb0
[   32.509379]  print_report+0xd1/0x650
[   32.509384]  ? __virt_addr_valid+0x1db/0x2d0
[   32.509388]  ? kmem_cache_oob+0x402/0x530
[   32.509391]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.509395]  ? kmem_cache_oob+0x402/0x530
[   32.509398]  kasan_report+0x141/0x180
[   32.509403]  ? kmem_cache_oob+0x402/0x530
[   32.509407]  __asan_report_load1_noabort+0x18/0x20
[   32.509410]  kmem_cache_oob+0x402/0x530
[   32.509413]  ? trace_hardirqs_on+0x37/0xe0
[   32.509418]  ? __pfx_kmem_cache_oob+0x10/0x10
[   32.509421]  ? finish_task_switch.isra.0+0x153/0x700
[   32.509425]  ? __switch_to+0x5d9/0xf60
[   32.509429]  ? dequeue_task_fair+0x166/0x4e0
[   32.509435]  ? ktime_get_ts64+0x83/0x230
[   32.509440]  kunit_try_run_case+0x1a2/0x480
[   32.509444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.509448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.509453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.509457]  ? __kthread_parkme+0x82/0x180
[   32.509461]  ? preempt_count_sub+0x50/0x80
[   32.509466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.509470]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.509475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.509479]  kthread+0x334/0x6f0
[   32.509483]  ? trace_preempt_on+0x20/0xc0
[   32.509487]  ? __pfx_kthread+0x10/0x10
[   32.509491]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.509495]  ? calculate_sigpending+0x7b/0xa0
[   32.509499]  ? __pfx_kthread+0x10/0x10
[   32.509503]  ret_from_fork+0x3e/0x80
[   32.509507]  ? __pfx_kthread+0x10/0x10
[   32.509512]  ret_from_fork_asm+0x1a/0x30
[   32.509517]  </TASK>
[   32.509519] 
[   32.684396] Allocated by task 250:
[   32.687803]  kasan_save_stack+0x45/0x70
[   32.691641]  kasan_save_track+0x18/0x40
[   32.695481]  kasan_save_alloc_info+0x3b/0x50
[   32.699760]  __kasan_slab_alloc+0x91/0xa0
[   32.703774]  kmem_cache_alloc_noprof+0x123/0x3f0
[   32.708393]  kmem_cache_oob+0x157/0x530
[   32.712233]  kunit_try_run_case+0x1a2/0x480
[   32.716417]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.721817]  kthread+0x334/0x6f0
[   32.725050]  ret_from_fork+0x3e/0x80
[   32.728630]  ret_from_fork_asm+0x1a/0x30
[   32.732554] 
[   32.734054] The buggy address belongs to the object at ffff888107fba000
[   32.734054]  which belongs to the cache test_cache of size 200
[   32.746482] The buggy address is located 0 bytes to the right of
[   32.746482]  allocated 200-byte region [ffff888107fba000, ffff888107fba0c8)
[   32.759428] 
[   32.760927] The buggy address belongs to the physical page:
[   32.766503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fba
[   32.774508] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.782160] flags: 0x200000000000040(head|node=0|zone=2)
[   32.787474] page_type: f5(slab)
[   32.790622] raw: 0200000000000040 ffff8881003423c0 dead000000000122 0000000000000000
[   32.798367] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.806108] head: 0200000000000040 ffff8881003423c0 dead000000000122 0000000000000000
[   32.813940] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   32.821766] head: 0200000000000001 ffffea00041fee81 00000000ffffffff 00000000ffffffff
[   32.829592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.837418] page dumped because: kasan: bad access detected
[   32.842989] 
[   32.844489] Memory state around the buggy address:
[   32.849281]  ffff888107fb9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.856500]  ffff888107fba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.863758] >ffff888107fba080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.870980]                                               ^
[   32.876554]  ffff888107fba100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.883774]  ffff888107fba180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.890992] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.025420] ==================================================================
[   32.035614] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560
[   32.042330] Read of size 8 at addr ffff888105bf9a00 by task kunit_try_catch/243
[   32.049635] 
[   32.051137] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   32.051146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.051148] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   32.051152] Call Trace:
[   32.051154]  <TASK>
[   32.051156]  dump_stack_lvl+0x73/0xb0
[   32.051161]  print_report+0xd1/0x650
[   32.051165]  ? __virt_addr_valid+0x1db/0x2d0
[   32.051170]  ? workqueue_uaf+0x4d6/0x560
[   32.051174]  ? kasan_complete_mode_report_info+0x64/0x200
[   32.051178]  ? workqueue_uaf+0x4d6/0x560
[   32.051182]  kasan_report+0x141/0x180
[   32.051186]  ? workqueue_uaf+0x4d6/0x560
[   32.051191]  __asan_report_load8_noabort+0x18/0x20
[   32.051195]  workqueue_uaf+0x4d6/0x560
[   32.051199]  ? __pfx_workqueue_uaf+0x10/0x10
[   32.051203]  ? __schedule+0x10cc/0x2b30
[   32.051208]  ? ktime_get_ts64+0x83/0x230
[   32.051214]  kunit_try_run_case+0x1a2/0x480
[   32.051219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.051223]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.051227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.051232]  ? __kthread_parkme+0x82/0x180
[   32.051236]  ? preempt_count_sub+0x50/0x80
[   32.051241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.051245]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.051250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.051253]  kthread+0x334/0x6f0
[   32.051258]  ? trace_preempt_on+0x20/0xc0
[   32.051262]  ? __pfx_kthread+0x10/0x10
[   32.051267]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.051271]  ? calculate_sigpending+0x7b/0xa0
[   32.051275]  ? __pfx_kthread+0x10/0x10
[   32.051279]  ret_from_fork+0x3e/0x80
[   32.051284]  ? __pfx_kthread+0x10/0x10
[   32.051288]  ret_from_fork_asm+0x1a/0x30
[   32.051294]  </TASK>
[   32.051296] 
[   32.212474] Allocated by task 243:
[   32.215881]  kasan_save_stack+0x45/0x70
[   32.219755]  kasan_save_track+0x18/0x40
[   32.223593]  kasan_save_alloc_info+0x3b/0x50
[   32.227867]  __kasan_kmalloc+0xb7/0xc0
[   32.231619]  __kmalloc_cache_noprof+0x189/0x420
[   32.236151]  workqueue_uaf+0x152/0x560
[   32.239902]  kunit_try_run_case+0x1a2/0x480
[   32.244091]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.249490]  kthread+0x334/0x6f0
[   32.252749]  ret_from_fork+0x3e/0x80
[   32.256336]  ret_from_fork_asm+0x1a/0x30
[   32.260271] 
[   32.261769] Freed by task 10:
[   32.264762]  kasan_save_stack+0x45/0x70
[   32.268607]  kasan_save_track+0x18/0x40
[   32.272447]  kasan_save_free_info+0x3f/0x60
[   32.276631]  __kasan_slab_free+0x56/0x70
[   32.280558]  kfree+0x222/0x3f0
[   32.283617]  workqueue_uaf_work+0x12/0x20
[   32.287630]  process_one_work+0x5eb/0xf60
[   32.291651]  worker_thread+0x725/0x1320
[   32.295524]  kthread+0x334/0x6f0
[   32.298763]  ret_from_fork+0x3e/0x80
[   32.302343]  ret_from_fork_asm+0x1a/0x30
[   32.306269] 
[   32.307767] Last potentially related work creation:
[   32.312649]  kasan_save_stack+0x45/0x70
[   32.316487]  kasan_record_aux_stack+0xb2/0xc0
[   32.320846]  __queue_work+0x626/0xeb0
[   32.324513]  queue_work_on+0xb6/0xc0
[   32.328093]  workqueue_uaf+0x26d/0x560
[   32.331843]  kunit_try_run_case+0x1a2/0x480
[   32.336029]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.341430]  kthread+0x334/0x6f0
[   32.344660]  ret_from_fork+0x3e/0x80
[   32.348268]  ret_from_fork_asm+0x1a/0x30
[   32.352192] 
[   32.353702] The buggy address belongs to the object at ffff888105bf9a00
[   32.353702]  which belongs to the cache kmalloc-32 of size 32
[   32.366086] The buggy address is located 0 bytes inside of
[   32.366086]  freed 32-byte region [ffff888105bf9a00, ffff888105bf9a20)
[   32.378080] 
[   32.379578] The buggy address belongs to the physical page:
[   32.385150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bf9
[   32.393150] flags: 0x200000000000000(node=0|zone=2)
[   32.398029] page_type: f5(slab)
[   32.401175] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   32.408913] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.416653] page dumped because: kasan: bad access detected
[   32.422260] 
[   32.423761] Memory state around the buggy address:
[   32.428552]  ffff888105bf9900: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   32.435769]  ffff888105bf9980: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   32.442988] >ffff888105bf9a00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.450209]                    ^
[   32.453442]  ffff888105bf9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.460698]  ffff888105bf9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.467964] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.489776] ==================================================================
[   31.500171] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   31.506884] Read of size 4 at addr ffff888107f04880 by task swapper/1/0
[   31.513497] 
[   31.514998] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   31.515006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.515009] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   31.515012] Call Trace:
[   31.515014]  <IRQ>
[   31.515016]  dump_stack_lvl+0x73/0xb0
[   31.515021]  print_report+0xd1/0x650
[   31.515026]  ? __virt_addr_valid+0x1db/0x2d0
[   31.515030]  ? rcu_uaf_reclaim+0x50/0x60
[   31.515034]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.515038]  ? rcu_uaf_reclaim+0x50/0x60
[   31.515042]  kasan_report+0x141/0x180
[   31.515046]  ? rcu_uaf_reclaim+0x50/0x60
[   31.515051]  __asan_report_load4_noabort+0x18/0x20
[   31.515054]  rcu_uaf_reclaim+0x50/0x60
[   31.515058]  rcu_core+0x669/0x1c30
[   31.515063]  ? enqueue_hrtimer+0xfe/0x210
[   31.515068]  ? __pfx_rcu_core+0x10/0x10
[   31.515072]  ? ktime_get+0x68/0x150
[   31.515077]  ? handle_softirqs+0x18e/0x730
[   31.515082]  rcu_core_si+0x12/0x20
[   31.515086]  handle_softirqs+0x206/0x730
[   31.515090]  ? hrtimer_interrupt+0x2fe/0x780
[   31.515094]  ? __pfx_handle_softirqs+0x10/0x10
[   31.515099]  __irq_exit_rcu+0xc9/0x110
[   31.515103]  irq_exit_rcu+0x12/0x20
[   31.515108]  sysvec_apic_timer_interrupt+0x81/0x90
[   31.515113]  </IRQ>
[   31.515114]  <TASK>
[   31.515116]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   31.515120] RIP: 0010:cpuidle_enter_state+0xe5/0x2f0
[   31.515125] Code: ff ff ff 48 89 45 c0 e8 89 e3 f3 fe 31 ff e8 42 27 6b fc 80 7d d0 00 0f 85 27 01 00 00 e8 23 ef f3 fe 84 c0 0f 84 0f 01 00 00 <45> 85 ed 0f 88 ef 00 00 00 4d 63 fd 48 8b 7d c0 4b 8d 04 7f 49 8d
[   31.515133] RSP: 0000:ffff8881008efd70 EFLAGS: 00000246
[   31.515137] RAX: 0000000000000000 RBX: ffff8881042a6000 RCX: 000000000000001f
[   31.515141] RDX: 1ffff11083ed6c0f RSI: 0000000000000001 RDI: ffff88841f6b6078
[   31.515145] RBP: ffff8881008efdb8 R08: 0000000000000002 R09: ffffed1083ed6102
[   31.515148] R10: ffff88841f6b0813 R11: 0000000000000006 R12: ffffffffba5a6e80
[   31.515151] R13: 0000000000000002 R14: 0000000000000002 R15: ffffffffba5a6f68
[   31.515156]  ? check_tsc_sync_source+0x260/0x290
[   31.515161]  cpuidle_enter+0x53/0xb0
[   31.515165]  ? cpuidle_select+0x5f/0xb0
[   31.515169]  do_idle+0x360/0x4f0
[   31.515173]  ? __pfx_do_idle+0x10/0x10
[   31.515176]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   31.515181]  ? complete+0x15b/0x1d0
[   31.515186]  cpu_startup_entry+0x5c/0x70
[   31.515189]  start_secondary+0x211/0x290
[   31.515193]  ? __pfx_start_secondary+0x10/0x10
[   31.515197]  common_startup_64+0x13e/0x148
[   31.515203]  </TASK>
[   31.515205] 
[   31.750633] Allocated by task 241:
[   31.754038]  kasan_save_stack+0x45/0x70
[   31.757879]  kasan_save_track+0x18/0x40
[   31.761737]  kasan_save_alloc_info+0x3b/0x50
[   31.766014]  __kasan_kmalloc+0xb7/0xc0
[   31.769769]  __kmalloc_cache_noprof+0x189/0x420
[   31.774309]  rcu_uaf+0xb0/0x330
[   31.777455]  kunit_try_run_case+0x1a2/0x480
[   31.781649]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.787048]  kthread+0x334/0x6f0
[   31.790280]  ret_from_fork+0x3e/0x80
[   31.793859]  ret_from_fork_asm+0x1a/0x30
[   31.797786] 
[   31.799284] Freed by task 0:
[   31.802171]  kasan_save_stack+0x45/0x70
[   31.806011]  kasan_save_track+0x18/0x40
[   31.809850]  kasan_save_free_info+0x3f/0x60
[   31.814036]  __kasan_slab_free+0x56/0x70
[   31.817960]  kfree+0x222/0x3f0
[   31.821021]  rcu_uaf_reclaim+0x1f/0x60
[   31.824780]  rcu_core+0x669/0x1c30
[   31.828187]  rcu_core_si+0x12/0x20
[   31.831593]  handle_softirqs+0x206/0x730
[   31.835527]  __irq_exit_rcu+0xc9/0x110
[   31.839281]  irq_exit_rcu+0x12/0x20
[   31.842780]  sysvec_apic_timer_interrupt+0x81/0x90
[   31.847573]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   31.852734] 
[   31.854230] Last potentially related work creation:
[   31.859107]  kasan_save_stack+0x45/0x70
[   31.862947]  kasan_record_aux_stack+0xb2/0xc0
[   31.867305]  __call_rcu_common.constprop.0+0x72/0x9c0
[   31.872359]  call_rcu+0x12/0x20
[   31.875503]  rcu_uaf+0x168/0x330
[   31.878757]  kunit_try_run_case+0x1a2/0x480
[   31.882948]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.888349]  kthread+0x334/0x6f0
[   31.891580]  ret_from_fork+0x3e/0x80
[   31.895160]  ret_from_fork_asm+0x1a/0x30
[   31.899087] 
[   31.900585] The buggy address belongs to the object at ffff888107f04880
[   31.900585]  which belongs to the cache kmalloc-32 of size 32
[   31.912925] The buggy address is located 0 bytes inside of
[   31.912925]  freed 32-byte region [ffff888107f04880, ffff888107f048a0)
[   31.924920] 
[   31.926418] The buggy address belongs to the physical page:
[   31.931991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f04
[   31.939989] flags: 0x200000000000000(node=0|zone=2)
[   31.944868] page_type: f5(slab)
[   31.948016] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   31.955765] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.963510] page dumped because: kasan: bad access detected
[   31.969082] 
[   31.970581] Memory state around the buggy address:
[   31.975376]  ffff888107f04780: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.982593]  ffff888107f04800: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   31.989814] >ffff888107f04880: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   31.997031]                    ^
[   32.000265]  ffff888107f04900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.007484]  ffff888107f04980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.014715] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.271466] ==================================================================
[   30.282984] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   30.289343] Read of size 1 at addr ffff88810633a600 by task kunit_try_catch/239
[   30.296651] 
[   30.298151] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   30.298159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.298162] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   30.298165] Call Trace:
[   30.298167]  <TASK>
[   30.298169]  dump_stack_lvl+0x73/0xb0
[   30.298172]  print_report+0xd1/0x650
[   30.298177]  ? __virt_addr_valid+0x1db/0x2d0
[   30.298180]  ? ksize_uaf+0x19d/0x6c0
[   30.298184]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.298189]  ? ksize_uaf+0x19d/0x6c0
[   30.298193]  kasan_report+0x141/0x180
[   30.298197]  ? ksize_uaf+0x19d/0x6c0
[   30.298201]  ? ksize_uaf+0x19d/0x6c0
[   30.298205]  __kasan_check_byte+0x3d/0x50
[   30.298210]  ksize+0x20/0x60
[   30.298213]  ksize_uaf+0x19d/0x6c0
[   30.298217]  ? __pfx_ksize_uaf+0x10/0x10
[   30.298221]  ? __schedule+0x10cc/0x2b30
[   30.298226]  ? ktime_get_ts64+0x83/0x230
[   30.298230]  kunit_try_run_case+0x1a2/0x480
[   30.298235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.298239]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.298244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.298248]  ? __kthread_parkme+0x82/0x180
[   30.298252]  ? preempt_count_sub+0x50/0x80
[   30.298257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.298261]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.298265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.298269]  kthread+0x334/0x6f0
[   30.298273]  ? trace_preempt_on+0x20/0xc0
[   30.298277]  ? __pfx_kthread+0x10/0x10
[   30.298282]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.298286]  ? calculate_sigpending+0x7b/0xa0
[   30.298290]  ? __pfx_kthread+0x10/0x10
[   30.298294]  ret_from_fork+0x3e/0x80
[   30.298298]  ? __pfx_kthread+0x10/0x10
[   30.298302]  ret_from_fork_asm+0x1a/0x30
[   30.298308]  </TASK>
[   30.298309] 
[   30.463303] Allocated by task 239:
[   30.466755]  kasan_save_stack+0x45/0x70
[   30.470599]  kasan_save_track+0x18/0x40
[   30.474438]  kasan_save_alloc_info+0x3b/0x50
[   30.478723]  __kasan_kmalloc+0xb7/0xc0
[   30.482505]  __kmalloc_cache_noprof+0x189/0x420
[   30.487040]  ksize_uaf+0xaa/0x6c0
[   30.490358]  kunit_try_run_case+0x1a2/0x480
[   30.494545]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.499943]  kthread+0x334/0x6f0
[   30.503174]  ret_from_fork+0x3e/0x80
[   30.506764]  ret_from_fork_asm+0x1a/0x30
[   30.510703] 
[   30.512249] Freed by task 239:
[   30.515310]  kasan_save_stack+0x45/0x70
[   30.519147]  kasan_save_track+0x18/0x40
[   30.522987]  kasan_save_free_info+0x3f/0x60
[   30.527171]  __kasan_slab_free+0x56/0x70
[   30.531099]  kfree+0x222/0x3f0
[   30.534158]  ksize_uaf+0x12c/0x6c0
[   30.537562]  kunit_try_run_case+0x1a2/0x480
[   30.541757]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.547157]  kthread+0x334/0x6f0
[   30.550389]  ret_from_fork+0x3e/0x80
[   30.553969]  ret_from_fork_asm+0x1a/0x30
[   30.557894] 
[   30.559394] The buggy address belongs to the object at ffff88810633a600
[   30.559394]  which belongs to the cache kmalloc-128 of size 128
[   30.571908] The buggy address is located 0 bytes inside of
[   30.571908]  freed 128-byte region [ffff88810633a600, ffff88810633a680)
[   30.583989] 
[   30.585486] The buggy address belongs to the physical page:
[   30.591060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   30.599058] flags: 0x200000000000000(node=0|zone=2)
[   30.603939] page_type: f5(slab)
[   30.607084] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.614825] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.622571] page dumped because: kasan: bad access detected
[   30.628142] 
[   30.629642] Memory state around the buggy address:
[   30.634436]  ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.641654]  ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.648908] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.656125]                    ^
[   30.659361]  ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666587]  ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.673805] ==================================================================
[   31.080729] ==================================================================
[   31.087959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   31.094318] Read of size 1 at addr ffff88810633a678 by task kunit_try_catch/239
[   31.101625] 
[   31.103125] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   31.103133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.103135] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   31.103138] Call Trace:
[   31.103139]  <TASK>
[   31.103141]  dump_stack_lvl+0x73/0xb0
[   31.103144]  print_report+0xd1/0x650
[   31.103149]  ? __virt_addr_valid+0x1db/0x2d0
[   31.103152]  ? ksize_uaf+0x5e4/0x6c0
[   31.103156]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.103160]  ? ksize_uaf+0x5e4/0x6c0
[   31.103164]  kasan_report+0x141/0x180
[   31.103168]  ? ksize_uaf+0x5e4/0x6c0
[   31.103173]  __asan_report_load1_noabort+0x18/0x20
[   31.103176]  ksize_uaf+0x5e4/0x6c0
[   31.103180]  ? __pfx_ksize_uaf+0x10/0x10
[   31.103184]  ? __schedule+0x10cc/0x2b30
[   31.103189]  ? ktime_get_ts64+0x83/0x230
[   31.103193]  kunit_try_run_case+0x1a2/0x480
[   31.103197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.103201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.103206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.103210]  ? __kthread_parkme+0x82/0x180
[   31.103214]  ? preempt_count_sub+0x50/0x80
[   31.103219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.103223]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.103226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.103230]  kthread+0x334/0x6f0
[   31.103234]  ? trace_preempt_on+0x20/0xc0
[   31.103239]  ? __pfx_kthread+0x10/0x10
[   31.103243]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.103247]  ? calculate_sigpending+0x7b/0xa0
[   31.103250]  ? __pfx_kthread+0x10/0x10
[   31.103254]  ret_from_fork+0x3e/0x80
[   31.103258]  ? __pfx_kthread+0x10/0x10
[   31.103262]  ret_from_fork_asm+0x1a/0x30
[   31.103268]  </TASK>
[   31.103269] 
[   31.262617] Allocated by task 239:
[   31.266022]  kasan_save_stack+0x45/0x70
[   31.269862]  kasan_save_track+0x18/0x40
[   31.273704]  kasan_save_alloc_info+0x3b/0x50
[   31.278019]  __kasan_kmalloc+0xb7/0xc0
[   31.281771]  __kmalloc_cache_noprof+0x189/0x420
[   31.286302]  ksize_uaf+0xaa/0x6c0
[   31.289621]  kunit_try_run_case+0x1a2/0x480
[   31.293807]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.299208]  kthread+0x334/0x6f0
[   31.302438]  ret_from_fork+0x3e/0x80
[   31.306018]  ret_from_fork_asm+0x1a/0x30
[   31.309944] 
[   31.311445] Freed by task 239:
[   31.314502]  kasan_save_stack+0x45/0x70
[   31.318343]  kasan_save_track+0x18/0x40
[   31.322182]  kasan_save_free_info+0x3f/0x60
[   31.326367]  __kasan_slab_free+0x56/0x70
[   31.330294]  kfree+0x222/0x3f0
[   31.333353]  ksize_uaf+0x12c/0x6c0
[   31.336766]  kunit_try_run_case+0x1a2/0x480
[   31.340953]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.346352]  kthread+0x334/0x6f0
[   31.349593]  ret_from_fork+0x3e/0x80
[   31.353172]  ret_from_fork_asm+0x1a/0x30
[   31.357098] 
[   31.358597] The buggy address belongs to the object at ffff88810633a600
[   31.358597]  which belongs to the cache kmalloc-128 of size 128
[   31.371112] The buggy address is located 120 bytes inside of
[   31.371112]  freed 128-byte region [ffff88810633a600, ffff88810633a680)
[   31.383365] 
[   31.384864] The buggy address belongs to the physical page:
[   31.390437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   31.398445] flags: 0x200000000000000(node=0|zone=2)
[   31.403322] page_type: f5(slab)
[   31.406471] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   31.414219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.421965] page dumped because: kasan: bad access detected
[   31.427536] 
[   31.429037] Memory state around the buggy address:
[   31.433830]  ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.441057]  ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.448275] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.455494]                                                                 ^
[   31.462626]  ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.469845]  ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.477065] ==================================================================
[   30.681051] ==================================================================
[   30.688280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   30.694639] Read of size 1 at addr ffff88810633a600 by task kunit_try_catch/239
[   30.701946] 
[   30.703445] CPU: 3 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   30.703453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.703455] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   30.703458] Call Trace:
[   30.703460]  <TASK>
[   30.703462]  dump_stack_lvl+0x73/0xb0
[   30.703465]  print_report+0xd1/0x650
[   30.703469]  ? __virt_addr_valid+0x1db/0x2d0
[   30.703473]  ? ksize_uaf+0x5fe/0x6c0
[   30.703477]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.703481]  ? ksize_uaf+0x5fe/0x6c0
[   30.703485]  kasan_report+0x141/0x180
[   30.703489]  ? ksize_uaf+0x5fe/0x6c0
[   30.703494]  __asan_report_load1_noabort+0x18/0x20
[   30.703497]  ksize_uaf+0x5fe/0x6c0
[   30.703501]  ? __pfx_ksize_uaf+0x10/0x10
[   30.703505]  ? __schedule+0x10cc/0x2b30
[   30.703510]  ? ktime_get_ts64+0x83/0x230
[   30.703514]  kunit_try_run_case+0x1a2/0x480
[   30.703519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.703523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.703527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.703532]  ? __kthread_parkme+0x82/0x180
[   30.703535]  ? preempt_count_sub+0x50/0x80
[   30.703540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.703544]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.703548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.703552]  kthread+0x334/0x6f0
[   30.703556]  ? trace_preempt_on+0x20/0xc0
[   30.703560]  ? __pfx_kthread+0x10/0x10
[   30.703564]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.703568]  ? calculate_sigpending+0x7b/0xa0
[   30.703572]  ? __pfx_kthread+0x10/0x10
[   30.703576]  ret_from_fork+0x3e/0x80
[   30.703580]  ? __pfx_kthread+0x10/0x10
[   30.703584]  ret_from_fork_asm+0x1a/0x30
[   30.703590]  </TASK>
[   30.703591] 
[   30.862913] Allocated by task 239:
[   30.866318]  kasan_save_stack+0x45/0x70
[   30.870158]  kasan_save_track+0x18/0x40
[   30.873996]  kasan_save_alloc_info+0x3b/0x50
[   30.878270]  __kasan_kmalloc+0xb7/0xc0
[   30.882022]  __kmalloc_cache_noprof+0x189/0x420
[   30.886555]  ksize_uaf+0xaa/0x6c0
[   30.889874]  kunit_try_run_case+0x1a2/0x480
[   30.894057]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.899458]  kthread+0x334/0x6f0
[   30.902702]  ret_from_fork+0x3e/0x80
[   30.906330]  ret_from_fork_asm+0x1a/0x30
[   30.910255] 
[   30.911754] Freed by task 239:
[   30.914814]  kasan_save_stack+0x45/0x70
[   30.918653]  kasan_save_track+0x18/0x40
[   30.922517]  kasan_save_free_info+0x3f/0x60
[   30.926718]  __kasan_slab_free+0x56/0x70
[   30.930700]  kfree+0x222/0x3f0
[   30.933784]  ksize_uaf+0x12c/0x6c0
[   30.937192]  kunit_try_run_case+0x1a2/0x480
[   30.941386]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.946786]  kthread+0x334/0x6f0
[   30.950024]  ret_from_fork+0x3e/0x80
[   30.953603]  ret_from_fork_asm+0x1a/0x30
[   30.957532] 
[   30.959030] The buggy address belongs to the object at ffff88810633a600
[   30.959030]  which belongs to the cache kmalloc-128 of size 128
[   30.971543] The buggy address is located 0 bytes inside of
[   30.971543]  freed 128-byte region [ffff88810633a600, ffff88810633a680)
[   30.983624] 
[   30.985125] The buggy address belongs to the physical page:
[   30.990703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   30.998752] flags: 0x200000000000000(node=0|zone=2)
[   31.003635] page_type: f5(slab)
[   31.006782] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   31.014529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.022268] page dumped because: kasan: bad access detected
[   31.027839] 
[   31.029340] Memory state around the buggy address:
[   31.034134]  ffff88810633a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.041361]  ffff88810633a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.048587] >ffff88810633a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.055805]                    ^
[   31.059039]  ffff88810633a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.066259]  ffff88810633a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.073487] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   29.515305] ==================================================================
[   29.522536] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   29.529935] Read of size 1 at addr ffff888107f05378 by task kunit_try_catch/237
[   29.537244] 
[   29.538765] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   29.538773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.538775] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.538778] Call Trace:
[   29.538779]  <TASK>
[   29.538781]  dump_stack_lvl+0x73/0xb0
[   29.538785]  print_report+0xd1/0x650
[   29.538789]  ? __virt_addr_valid+0x1db/0x2d0
[   29.538792]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.538801]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538805]  kasan_report+0x141/0x180
[   29.538810]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538815]  __asan_report_load1_noabort+0x18/0x20
[   29.538819]  ksize_unpoisons_memory+0x7e9/0x9b0
[   29.538823]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.538828]  ? finish_task_switch.isra.0+0x153/0x700
[   29.538832]  ? __switch_to+0x5d9/0xf60
[   29.538836]  ? dequeue_task_fair+0x166/0x4e0
[   29.538840]  ? __schedule+0x10cc/0x2b30
[   29.538844]  ? ktime_get_ts64+0x83/0x230
[   29.538849]  kunit_try_run_case+0x1a2/0x480
[   29.538853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.538857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.538862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.538866]  ? __kthread_parkme+0x82/0x180
[   29.538870]  ? preempt_count_sub+0x50/0x80
[   29.538875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.538879]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.538883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.538887]  kthread+0x334/0x6f0
[   29.538891]  ? trace_preempt_on+0x20/0xc0
[   29.538895]  ? __pfx_kthread+0x10/0x10
[   29.538899]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.538903]  ? calculate_sigpending+0x7b/0xa0
[   29.538907]  ? __pfx_kthread+0x10/0x10
[   29.538911]  ret_from_fork+0x3e/0x80
[   29.538915]  ? __pfx_kthread+0x10/0x10
[   29.538920]  ret_from_fork_asm+0x1a/0x30
[   29.538925]  </TASK>
[   29.538927] 
[   29.716876] Allocated by task 237:
[   29.720282]  kasan_save_stack+0x45/0x70
[   29.724122]  kasan_save_track+0x18/0x40
[   29.727961]  kasan_save_alloc_info+0x3b/0x50
[   29.732233]  __kasan_kmalloc+0xb7/0xc0
[   29.735986]  __kmalloc_cache_noprof+0x189/0x420
[   29.740518]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.744971]  kunit_try_run_case+0x1a2/0x480
[   29.749158]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.754558]  kthread+0x334/0x6f0
[   29.757789]  ret_from_fork+0x3e/0x80
[   29.761370]  ret_from_fork_asm+0x1a/0x30
[   29.765296] 
[   29.766794] The buggy address belongs to the object at ffff888107f05300
[   29.766794]  which belongs to the cache kmalloc-128 of size 128
[   29.779309] The buggy address is located 5 bytes to the right of
[   29.779309]  allocated 115-byte region [ffff888107f05300, ffff888107f05373)
[   29.792255] 
[   29.793763] The buggy address belongs to the physical page:
[   29.799336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   29.807336] flags: 0x200000000000000(node=0|zone=2)
[   29.812213] page_type: f5(slab)
[   29.815361] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.823110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.830856] page dumped because: kasan: bad access detected
[   29.836428] 
[   29.837927] Memory state around the buggy address:
[   29.842763]  ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.849982]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.857201] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.864421]                                                                 ^
[   29.871551]  ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.878772]  ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.885990] ==================================================================
[   29.893231] ==================================================================
[   29.900462] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   29.907855] Read of size 1 at addr ffff888107f0537f by task kunit_try_catch/237
[   29.915160] 
[   29.916660] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   29.916688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916690] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.916693] Call Trace:
[   29.916695]  <TASK>
[   29.916696]  dump_stack_lvl+0x73/0xb0
[   29.916700]  print_report+0xd1/0x650
[   29.916704]  ? __virt_addr_valid+0x1db/0x2d0
[   29.916720]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.916741]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916746]  kasan_report+0x141/0x180
[   29.916750]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916755]  __asan_report_load1_noabort+0x18/0x20
[   29.916759]  ksize_unpoisons_memory+0x7b6/0x9b0
[   29.916763]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.916768]  ? finish_task_switch.isra.0+0x153/0x700
[   29.916772]  ? __switch_to+0x5d9/0xf60
[   29.916775]  ? dequeue_task_fair+0x166/0x4e0
[   29.916780]  ? __schedule+0x10cc/0x2b30
[   29.916784]  ? ktime_get_ts64+0x83/0x230
[   29.916789]  kunit_try_run_case+0x1a2/0x480
[   29.916793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.916797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.916801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.916806]  ? __kthread_parkme+0x82/0x180
[   29.916810]  ? preempt_count_sub+0x50/0x80
[   29.916814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.916818]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.916822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.916826]  kthread+0x334/0x6f0
[   29.916830]  ? trace_preempt_on+0x20/0xc0
[   29.916834]  ? __pfx_kthread+0x10/0x10
[   29.916838]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.916842]  ? calculate_sigpending+0x7b/0xa0
[   29.916846]  ? __pfx_kthread+0x10/0x10
[   29.916850]  ret_from_fork+0x3e/0x80
[   29.916854]  ? __pfx_kthread+0x10/0x10
[   29.916858]  ret_from_fork_asm+0x1a/0x30
[   29.916864]  </TASK>
[   29.916865] 
[   30.094883] Allocated by task 237:
[   30.098287]  kasan_save_stack+0x45/0x70
[   30.102128]  kasan_save_track+0x18/0x40
[   30.105965]  kasan_save_alloc_info+0x3b/0x50
[   30.110239]  __kasan_kmalloc+0xb7/0xc0
[   30.113990]  __kmalloc_cache_noprof+0x189/0x420
[   30.118523]  ksize_unpoisons_memory+0xc7/0x9b0
[   30.122971]  kunit_try_run_case+0x1a2/0x480
[   30.127165]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.132570]  kthread+0x334/0x6f0
[   30.135803]  ret_from_fork+0x3e/0x80
[   30.139384]  ret_from_fork_asm+0x1a/0x30
[   30.143307] 
[   30.144798] The buggy address belongs to the object at ffff888107f05300
[   30.144798]  which belongs to the cache kmalloc-128 of size 128
[   30.157304] The buggy address is located 12 bytes to the right of
[   30.157304]  allocated 115-byte region [ffff888107f05300, ffff888107f05373)
[   30.170339] 
[   30.171838] The buggy address belongs to the physical page:
[   30.177412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   30.185418] flags: 0x200000000000000(node=0|zone=2)
[   30.190298] page_type: f5(slab)
[   30.193443] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.201183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.208921] page dumped because: kasan: bad access detected
[   30.214494] 
[   30.215994] Memory state around the buggy address:
[   30.220787]  ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.228015]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.235240] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.242459]                                                                 ^
[   30.249592]  ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.256812]  ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.264031] ==================================================================
[   29.133247] ==================================================================
[   29.144662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   29.152131] Read of size 1 at addr ffff888107f05373 by task kunit_try_catch/237
[   29.159437] 
[   29.160937] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   29.160945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.160947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.160951] Call Trace:
[   29.160952]  <TASK>
[   29.160954]  dump_stack_lvl+0x73/0xb0
[   29.160958]  print_report+0xd1/0x650
[   29.160962]  ? __virt_addr_valid+0x1db/0x2d0
[   29.160966]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.160970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.160974]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.160979]  kasan_report+0x141/0x180
[   29.160983]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.160988]  __asan_report_load1_noabort+0x18/0x20
[   29.160992]  ksize_unpoisons_memory+0x81c/0x9b0
[   29.160996]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.161001]  ? finish_task_switch.isra.0+0x153/0x700
[   29.161005]  ? __switch_to+0x5d9/0xf60
[   29.161009]  ? dequeue_task_fair+0x166/0x4e0
[   29.161013]  ? __schedule+0x10cc/0x2b30
[   29.161018]  ? ktime_get_ts64+0x83/0x230
[   29.161022]  kunit_try_run_case+0x1a2/0x480
[   29.161026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.161031]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.161035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.161039]  ? __kthread_parkme+0x82/0x180
[   29.161043]  ? preempt_count_sub+0x50/0x80
[   29.161048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.161052]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.161056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.161060]  kthread+0x334/0x6f0
[   29.161064]  ? trace_preempt_on+0x20/0xc0
[   29.161068]  ? __pfx_kthread+0x10/0x10
[   29.161072]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.161076]  ? calculate_sigpending+0x7b/0xa0
[   29.161080]  ? __pfx_kthread+0x10/0x10
[   29.161084]  ret_from_fork+0x3e/0x80
[   29.161088]  ? __pfx_kthread+0x10/0x10
[   29.161093]  ret_from_fork_asm+0x1a/0x30
[   29.161098]  </TASK>
[   29.161100] 
[   29.339106] Allocated by task 237:
[   29.342511]  kasan_save_stack+0x45/0x70
[   29.346351]  kasan_save_track+0x18/0x40
[   29.350189]  kasan_save_alloc_info+0x3b/0x50
[   29.354461]  __kasan_kmalloc+0xb7/0xc0
[   29.358215]  __kmalloc_cache_noprof+0x189/0x420
[   29.362759]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.367211]  kunit_try_run_case+0x1a2/0x480
[   29.371396]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.376794]  kthread+0x334/0x6f0
[   29.380028]  ret_from_fork+0x3e/0x80
[   29.383608]  ret_from_fork_asm+0x1a/0x30
[   29.387532] 
[   29.389032] The buggy address belongs to the object at ffff888107f05300
[   29.389032]  which belongs to the cache kmalloc-128 of size 128
[   29.401547] The buggy address is located 0 bytes to the right of
[   29.401547]  allocated 115-byte region [ffff888107f05300, ffff888107f05373)
[   29.414501] 
[   29.416000] The buggy address belongs to the physical page:
[   29.421574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   29.429583] flags: 0x200000000000000(node=0|zone=2)
[   29.434469] page_type: f5(slab)
[   29.437616] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.445356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.453102] page dumped because: kasan: bad access detected
[   29.458699] 
[   29.460243] Memory state around the buggy address:
[   29.465035]  ffff888107f05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.472253]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.479473] >ffff888107f05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.486699]                                                              ^
[   29.493618]  ffff888107f05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.500835]  ffff888107f05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.508056] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-double-free-in-kfree_sensitive
[   28.707490] ==================================================================
[   28.714754] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   28.720757] Free of addr ffff888105b98560 by task kunit_try_catch/235
[   28.727198] 
[   28.728715] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   28.728723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.728725] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.728729] Call Trace:
[   28.728742]  <TASK>
[   28.728744]  dump_stack_lvl+0x73/0xb0
[   28.728748]  print_report+0xd1/0x650
[   28.728752]  ? __virt_addr_valid+0x1db/0x2d0
[   28.728756]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.728760]  ? kfree_sensitive+0x2e/0x90
[   28.728764]  kasan_report_invalid_free+0x10a/0x130
[   28.728768]  ? kfree_sensitive+0x2e/0x90
[   28.728772]  ? kfree_sensitive+0x2e/0x90
[   28.728776]  check_slab_allocation+0x101/0x130
[   28.728780]  __kasan_slab_pre_free+0x28/0x40
[   28.728784]  kfree+0xf0/0x3f0
[   28.728787]  ? kfree_sensitive+0x2e/0x90
[   28.728791]  kfree_sensitive+0x2e/0x90
[   28.728794]  kmalloc_double_kzfree+0x19c/0x350
[   28.728799]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   28.728804]  ? __schedule+0x10cc/0x2b30
[   28.728808]  ? ktime_get_ts64+0x83/0x230
[   28.728813]  kunit_try_run_case+0x1a2/0x480
[   28.728817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.728821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.728825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.728830]  ? __kthread_parkme+0x82/0x180
[   28.728834]  ? preempt_count_sub+0x50/0x80
[   28.728838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.728842]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.728846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.728850]  kthread+0x334/0x6f0
[   28.728854]  ? trace_preempt_on+0x20/0xc0
[   28.728858]  ? __pfx_kthread+0x10/0x10
[   28.728862]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.728866]  ? calculate_sigpending+0x7b/0xa0
[   28.728870]  ? __pfx_kthread+0x10/0x10
[   28.728874]  ret_from_fork+0x3e/0x80
[   28.728878]  ? __pfx_kthread+0x10/0x10
[   28.728882]  ret_from_fork_asm+0x1a/0x30
[   28.728888]  </TASK>
[   28.728890] 
[   28.907109] Allocated by task 235:
[   28.910515]  kasan_save_stack+0x45/0x70
[   28.914355]  kasan_save_track+0x18/0x40
[   28.918193]  kasan_save_alloc_info+0x3b/0x50
[   28.922467]  __kasan_kmalloc+0xb7/0xc0
[   28.926219]  __kmalloc_cache_noprof+0x189/0x420
[   28.930760]  kmalloc_double_kzfree+0xa9/0x350
[   28.935117]  kunit_try_run_case+0x1a2/0x480
[   28.939305]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.944717]  kthread+0x334/0x6f0
[   28.947980]  ret_from_fork+0x3e/0x80
[   28.951558]  ret_from_fork_asm+0x1a/0x30
[   28.955485] 
[   28.956984] Freed by task 235:
[   28.960043]  kasan_save_stack+0x45/0x70
[   28.963882]  kasan_save_track+0x18/0x40
[   28.967759]  kasan_save_free_info+0x3f/0x60
[   28.971951]  __kasan_slab_free+0x56/0x70
[   28.975878]  kfree+0x222/0x3f0
[   28.978934]  kfree_sensitive+0x67/0x90
[   28.982699]  kmalloc_double_kzfree+0x12b/0x350
[   28.987169]  kunit_try_run_case+0x1a2/0x480
[   28.991355]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.996762]  kthread+0x334/0x6f0
[   28.999993]  ret_from_fork+0x3e/0x80
[   29.003574]  ret_from_fork_asm+0x1a/0x30
[   29.007498] 
[   29.009000] The buggy address belongs to the object at ffff888105b98560
[   29.009000]  which belongs to the cache kmalloc-16 of size 16
[   29.021341] The buggy address is located 0 bytes inside of
[   29.021341]  16-byte region [ffff888105b98560, ffff888105b98570)
[   29.032814] 
[   29.034313] The buggy address belongs to the physical page:
[   29.039886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98
[   29.047893] flags: 0x200000000000000(node=0|zone=2)
[   29.052771] page_type: f5(slab)
[   29.055919] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   29.063659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.071429] page dumped because: kasan: bad access detected
[   29.077003] 
[   29.078503] Memory state around the buggy address:
[   29.083296]  ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.090514]  ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc
[   29.097756] >ffff888105b98500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.104977]                                                        ^
[   29.111329]  ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.118549]  ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.125767] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   28.278017] ==================================================================
[   28.292463] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350
[   28.299865] Read of size 1 at addr ffff888105b98560 by task kunit_try_catch/235
[   28.307178] 
[   28.308716] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   28.308724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.308739] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.308742] Call Trace:
[   28.308744]  <TASK>
[   28.308746]  dump_stack_lvl+0x73/0xb0
[   28.308750]  print_report+0xd1/0x650
[   28.308754]  ? __virt_addr_valid+0x1db/0x2d0
[   28.308758]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.308762]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.308766]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.308770]  kasan_report+0x141/0x180
[   28.308775]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.308780]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.308784]  __kasan_check_byte+0x3d/0x50
[   28.308788]  kfree_sensitive+0x22/0x90
[   28.308792]  kmalloc_double_kzfree+0x19c/0x350
[   28.308797]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   28.308801]  ? __schedule+0x10cc/0x2b30
[   28.308806]  ? ktime_get_ts64+0x83/0x230
[   28.308810]  kunit_try_run_case+0x1a2/0x480
[   28.308815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.308819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.308823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.308828]  ? __kthread_parkme+0x82/0x180
[   28.308832]  ? preempt_count_sub+0x50/0x80
[   28.308836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.308840]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.308844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.308848]  kthread+0x334/0x6f0
[   28.308852]  ? trace_preempt_on+0x20/0xc0
[   28.308857]  ? __pfx_kthread+0x10/0x10
[   28.308861]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.308865]  ? calculate_sigpending+0x7b/0xa0
[   28.308869]  ? __pfx_kthread+0x10/0x10
[   28.308873]  ret_from_fork+0x3e/0x80
[   28.308877]  ? __pfx_kthread+0x10/0x10
[   28.308881]  ret_from_fork_asm+0x1a/0x30
[   28.308887]  </TASK>
[   28.308888] 
[   28.480912] Allocated by task 235:
[   28.484317]  kasan_save_stack+0x45/0x70
[   28.488156]  kasan_save_track+0x18/0x40
[   28.491994]  kasan_save_alloc_info+0x3b/0x50
[   28.496267]  __kasan_kmalloc+0xb7/0xc0
[   28.500021]  __kmalloc_cache_noprof+0x189/0x420
[   28.504551]  kmalloc_double_kzfree+0xa9/0x350
[   28.508913]  kunit_try_run_case+0x1a2/0x480
[   28.513105]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.518504]  kthread+0x334/0x6f0
[   28.521762]  ret_from_fork+0x3e/0x80
[   28.525342]  ret_from_fork_asm+0x1a/0x30
[   28.529270] 
[   28.530766] Freed by task 235:
[   28.533827]  kasan_save_stack+0x45/0x70
[   28.537686]  kasan_save_track+0x18/0x40
[   28.541532]  kasan_save_free_info+0x3f/0x60
[   28.545760]  __kasan_slab_free+0x56/0x70
[   28.549699]  kfree+0x222/0x3f0
[   28.552807]  kfree_sensitive+0x67/0x90
[   28.556560]  kmalloc_double_kzfree+0x12b/0x350
[   28.561013]  kunit_try_run_case+0x1a2/0x480
[   28.565199]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.570599]  kthread+0x334/0x6f0
[   28.573832]  ret_from_fork+0x3e/0x80
[   28.577420]  ret_from_fork_asm+0x1a/0x30
[   28.581344] 
[   28.582843] The buggy address belongs to the object at ffff888105b98560
[   28.582843]  which belongs to the cache kmalloc-16 of size 16
[   28.595185] The buggy address is located 0 bytes inside of
[   28.595185]  freed 16-byte region [ffff888105b98560, ffff888105b98570)
[   28.607188] 
[   28.608699] The buggy address belongs to the physical page:
[   28.614311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98
[   28.622319] flags: 0x200000000000000(node=0|zone=2)
[   28.627196] page_type: f5(slab)
[   28.630346] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   28.638093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.645840] page dumped because: kasan: bad access detected
[   28.651412] 
[   28.652911] Memory state around the buggy address:
[   28.657703]  ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.664949]  ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc
[   28.672167] >ffff888105b98500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.679385]                                                        ^
[   28.685764]  ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.692984]  ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.700201] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   27.854456] ==================================================================
[   27.865608] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   27.872228] Read of size 1 at addr ffff888106799b28 by task kunit_try_catch/231
[   27.879540] 
[   27.881041] CPU: 3 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   27.881050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.881052] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.881055] Call Trace:
[   27.881057]  <TASK>
[   27.881059]  dump_stack_lvl+0x73/0xb0
[   27.881063]  print_report+0xd1/0x650
[   27.881067]  ? __virt_addr_valid+0x1db/0x2d0
[   27.881071]  ? kmalloc_uaf2+0x4a8/0x520
[   27.881074]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.881079]  ? kmalloc_uaf2+0x4a8/0x520
[   27.881082]  kasan_report+0x141/0x180
[   27.881087]  ? kmalloc_uaf2+0x4a8/0x520
[   27.881091]  __asan_report_load1_noabort+0x18/0x20
[   27.881095]  kmalloc_uaf2+0x4a8/0x520
[   27.881099]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   27.881103]  ? finish_task_switch.isra.0+0x153/0x700
[   27.881107]  ? __switch_to+0x5d9/0xf60
[   27.881111]  ? dequeue_task_fair+0x166/0x4e0
[   27.881115]  ? __schedule+0x10cc/0x2b30
[   27.881120]  ? ktime_get_ts64+0x83/0x230
[   27.881124]  kunit_try_run_case+0x1a2/0x480
[   27.881129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.881133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.881137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.881142]  ? __kthread_parkme+0x82/0x180
[   27.881146]  ? preempt_count_sub+0x50/0x80
[   27.881150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.881155]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.881159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.881163]  kthread+0x334/0x6f0
[   27.881167]  ? trace_preempt_on+0x20/0xc0
[   27.881171]  ? __pfx_kthread+0x10/0x10
[   27.881176]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.881180]  ? calculate_sigpending+0x7b/0xa0
[   27.881183]  ? __pfx_kthread+0x10/0x10
[   27.881188]  ret_from_fork+0x3e/0x80
[   27.881192]  ? __pfx_kthread+0x10/0x10
[   27.881196]  ret_from_fork_asm+0x1a/0x30
[   27.881202]  </TASK>
[   27.881203] 
[   28.054887] Allocated by task 231:
[   28.058292]  kasan_save_stack+0x45/0x70
[   28.062131]  kasan_save_track+0x18/0x40
[   28.065971]  kasan_save_alloc_info+0x3b/0x50
[   28.070243]  __kasan_kmalloc+0xb7/0xc0
[   28.073996]  __kmalloc_cache_noprof+0x189/0x420
[   28.078527]  kmalloc_uaf2+0xc6/0x520
[   28.082108]  kunit_try_run_case+0x1a2/0x480
[   28.086292]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.091699]  kthread+0x334/0x6f0
[   28.094975]  ret_from_fork+0x3e/0x80
[   28.098556]  ret_from_fork_asm+0x1a/0x30
[   28.102482] 
[   28.103979] Freed by task 231:
[   28.107040]  kasan_save_stack+0x45/0x70
[   28.110879]  kasan_save_track+0x18/0x40
[   28.114733]  kasan_save_free_info+0x3f/0x60
[   28.118920]  __kasan_slab_free+0x56/0x70
[   28.122848]  kfree+0x222/0x3f0
[   28.125907]  kmalloc_uaf2+0x14c/0x520
[   28.129572]  kunit_try_run_case+0x1a2/0x480
[   28.133759]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.139156]  kthread+0x334/0x6f0
[   28.142389]  ret_from_fork+0x3e/0x80
[   28.145967]  ret_from_fork_asm+0x1a/0x30
[   28.149894] 
[   28.151392] The buggy address belongs to the object at ffff888106799b00
[   28.151392]  which belongs to the cache kmalloc-64 of size 64
[   28.163762] The buggy address is located 40 bytes inside of
[   28.163762]  freed 64-byte region [ffff888106799b00, ffff888106799b40)
[   28.175841] 
[   28.177341] The buggy address belongs to the physical page:
[   28.182915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106799
[   28.190920] flags: 0x200000000000000(node=0|zone=2)
[   28.195799] page_type: f5(slab)
[   28.198947] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   28.206715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.214483] page dumped because: kasan: bad access detected
[   28.220057] 
[   28.221557] Memory state around the buggy address:
[   28.226350]  ffff888106799a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.233575]  ffff888106799a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.240794] >ffff888106799b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.248015]                                   ^
[   28.252546]  ffff888106799b80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   28.259767]  ffff888106799c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.266983] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   27.442029] ==================================================================
[   27.452582] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360
[   27.459761] Write of size 33 at addr ffff888107f06400 by task kunit_try_catch/229
[   27.467244] 
[   27.468765] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   27.468773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.468775] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.468779] Call Trace:
[   27.468780]  <TASK>
[   27.468782]  dump_stack_lvl+0x73/0xb0
[   27.468786]  print_report+0xd1/0x650
[   27.468790]  ? __virt_addr_valid+0x1db/0x2d0
[   27.468794]  ? kmalloc_uaf_memset+0x1a3/0x360
[   27.468798]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.468802]  ? kmalloc_uaf_memset+0x1a3/0x360
[   27.468807]  kasan_report+0x141/0x180
[   27.468811]  ? kmalloc_uaf_memset+0x1a3/0x360
[   27.468816]  kasan_check_range+0x10c/0x1c0
[   27.468820]  __asan_memset+0x27/0x50
[   27.468824]  kmalloc_uaf_memset+0x1a3/0x360
[   27.468828]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   27.468832]  ? __schedule+0x10cc/0x2b30
[   27.468837]  ? ktime_get_ts64+0x83/0x230
[   27.468841]  kunit_try_run_case+0x1a2/0x480
[   27.468846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.468850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.468855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.468859]  ? __kthread_parkme+0x82/0x180
[   27.468863]  ? preempt_count_sub+0x50/0x80
[   27.468868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.468872]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.468876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.468880]  kthread+0x334/0x6f0
[   27.468884]  ? trace_preempt_on+0x20/0xc0
[   27.468888]  ? __pfx_kthread+0x10/0x10
[   27.468893]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.468897]  ? calculate_sigpending+0x7b/0xa0
[   27.468901]  ? __pfx_kthread+0x10/0x10
[   27.468905]  ret_from_fork+0x3e/0x80
[   27.468909]  ? __pfx_kthread+0x10/0x10
[   27.468913]  ret_from_fork_asm+0x1a/0x30
[   27.468919]  </TASK>
[   27.468920] 
[   27.635125] Allocated by task 229:
[   27.638533]  kasan_save_stack+0x45/0x70
[   27.642373]  kasan_save_track+0x18/0x40
[   27.646212]  kasan_save_alloc_info+0x3b/0x50
[   27.650482]  __kasan_kmalloc+0xb7/0xc0
[   27.654236]  __kmalloc_cache_noprof+0x189/0x420
[   27.658770]  kmalloc_uaf_memset+0xa9/0x360
[   27.662877]  kunit_try_run_case+0x1a2/0x480
[   27.667063]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.672471]  kthread+0x334/0x6f0
[   27.675701]  ret_from_fork+0x3e/0x80
[   27.679325]  ret_from_fork_asm+0x1a/0x30
[   27.683250] 
[   27.684757] Freed by task 229:
[   27.687819]  kasan_save_stack+0x45/0x70
[   27.691656]  kasan_save_track+0x18/0x40
[   27.695530]  kasan_save_free_info+0x3f/0x60
[   27.699754]  __kasan_slab_free+0x56/0x70
[   27.703705]  kfree+0x222/0x3f0
[   27.706813]  kmalloc_uaf_memset+0x12b/0x360
[   27.710999]  kunit_try_run_case+0x1a2/0x480
[   27.715187]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.720585]  kthread+0x334/0x6f0
[   27.723818]  ret_from_fork+0x3e/0x80
[   27.727397]  ret_from_fork_asm+0x1a/0x30
[   27.731322] 
[   27.732820] The buggy address belongs to the object at ffff888107f06400
[   27.732820]  which belongs to the cache kmalloc-64 of size 64
[   27.745153] The buggy address is located 0 bytes inside of
[   27.745153]  freed 64-byte region [ffff888107f06400, ffff888107f06440)
[   27.757147] 
[   27.758648] The buggy address belongs to the physical page:
[   27.764220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06
[   27.772229] flags: 0x200000000000000(node=0|zone=2)
[   27.777105] page_type: f5(slab)
[   27.780253] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   27.788002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.795760] page dumped because: kasan: bad access detected
[   27.801338] 
[   27.802836] Memory state around the buggy address:
[   27.807630]  ffff888107f06300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.814850]  ffff888107f06380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.822076] >ffff888107f06400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.829293]                    ^
[   27.832527]  ffff888107f06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.839763]  ffff888107f06500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.846981] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   27.033790] ==================================================================
[   27.045804] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380
[   27.052338] Read of size 1 at addr ffff888105b98548 by task kunit_try_catch/227
[   27.059654] 
[   27.061152] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   27.061161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.061163] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.061166] Call Trace:
[   27.061168]  <TASK>
[   27.061170]  dump_stack_lvl+0x73/0xb0
[   27.061174]  print_report+0xd1/0x650
[   27.061178]  ? __virt_addr_valid+0x1db/0x2d0
[   27.061181]  ? kmalloc_uaf+0x320/0x380
[   27.061185]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.061189]  ? kmalloc_uaf+0x320/0x380
[   27.061193]  kasan_report+0x141/0x180
[   27.061197]  ? kmalloc_uaf+0x320/0x380
[   27.061202]  __asan_report_load1_noabort+0x18/0x20
[   27.061205]  kmalloc_uaf+0x320/0x380
[   27.061209]  ? __pfx_kmalloc_uaf+0x10/0x10
[   27.061213]  ? __schedule+0x10cc/0x2b30
[   27.061217]  ? ktime_get_ts64+0x83/0x230
[   27.061222]  kunit_try_run_case+0x1a2/0x480
[   27.061227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.061231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.061235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.061239]  ? __kthread_parkme+0x82/0x180
[   27.061243]  ? preempt_count_sub+0x50/0x80
[   27.061248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.061252]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.061256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.061260]  kthread+0x334/0x6f0
[   27.061264]  ? trace_preempt_on+0x20/0xc0
[   27.061268]  ? __pfx_kthread+0x10/0x10
[   27.061273]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.061277]  ? calculate_sigpending+0x7b/0xa0
[   27.061280]  ? __pfx_kthread+0x10/0x10
[   27.061284]  ret_from_fork+0x3e/0x80
[   27.061288]  ? __pfx_kthread+0x10/0x10
[   27.061292]  ret_from_fork_asm+0x1a/0x30
[   27.061298]  </TASK>
[   27.061300] 
[   27.221608] Allocated by task 227:
[   27.225013]  kasan_save_stack+0x45/0x70
[   27.228854]  kasan_save_track+0x18/0x40
[   27.232699]  kasan_save_alloc_info+0x3b/0x50
[   27.237015]  __kasan_kmalloc+0xb7/0xc0
[   27.240769]  __kmalloc_cache_noprof+0x189/0x420
[   27.245300]  kmalloc_uaf+0xaa/0x380
[   27.248792]  kunit_try_run_case+0x1a2/0x480
[   27.252980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.258385]  kthread+0x334/0x6f0
[   27.261620]  ret_from_fork+0x3e/0x80
[   27.265198]  ret_from_fork_asm+0x1a/0x30
[   27.269124] 
[   27.270625] Freed by task 227:
[   27.273702]  kasan_save_stack+0x45/0x70
[   27.277558]  kasan_save_track+0x18/0x40
[   27.281394]  kasan_save_free_info+0x3f/0x60
[   27.285581]  __kasan_slab_free+0x56/0x70
[   27.289507]  kfree+0x222/0x3f0
[   27.292568]  kmalloc_uaf+0x12c/0x380
[   27.296146]  kunit_try_run_case+0x1a2/0x480
[   27.300332]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.305757]  kthread+0x334/0x6f0
[   27.308990]  ret_from_fork+0x3e/0x80
[   27.312576]  ret_from_fork_asm+0x1a/0x30
[   27.316502] 
[   27.318002] The buggy address belongs to the object at ffff888105b98540
[   27.318002]  which belongs to the cache kmalloc-16 of size 16
[   27.330342] The buggy address is located 8 bytes inside of
[   27.330342]  freed 16-byte region [ffff888105b98540, ffff888105b98550)
[   27.342328] 
[   27.343827] The buggy address belongs to the physical page:
[   27.349401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98
[   27.357407] flags: 0x200000000000000(node=0|zone=2)
[   27.362288] page_type: f5(slab)
[   27.365433] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   27.373172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.380910] page dumped because: kasan: bad access detected
[   27.386483] 
[   27.387984] Memory state around the buggy address:
[   27.392775]  ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.399994]  ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc
[   27.407213] >ffff888105b98500: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   27.414432]                                               ^
[   27.420005]  ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.427224]  ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.434443] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   26.659488] ==================================================================
[   26.671596] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   26.679515] Read of size 64 at addr ffff888107f06204 by task kunit_try_catch/225
[   26.686906] 
[   26.688409] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   26.688417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.688419] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.688422] Call Trace:
[   26.688423]  <TASK>
[   26.688425]  dump_stack_lvl+0x73/0xb0
[   26.688429]  print_report+0xd1/0x650
[   26.688433]  ? __virt_addr_valid+0x1db/0x2d0
[   26.688436]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.688445]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688450]  kasan_report+0x141/0x180
[   26.688454]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688459]  kasan_check_range+0x10c/0x1c0
[   26.688464]  __asan_memmove+0x27/0x70
[   26.688467]  kmalloc_memmove_invalid_size+0x16f/0x330
[   26.688472]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   26.688477]  ? __schedule+0x10cc/0x2b30
[   26.688481]  ? ktime_get_ts64+0x83/0x230
[   26.688486]  kunit_try_run_case+0x1a2/0x480
[   26.688490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.688494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.688499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.688503]  ? __kthread_parkme+0x82/0x180
[   26.688507]  ? preempt_count_sub+0x50/0x80
[   26.688512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.688516]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.688520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.688524]  kthread+0x334/0x6f0
[   26.688528]  ? trace_preempt_on+0x20/0xc0
[   26.688532]  ? __pfx_kthread+0x10/0x10
[   26.688536]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.688540]  ? calculate_sigpending+0x7b/0xa0
[   26.688544]  ? __pfx_kthread+0x10/0x10
[   26.688548]  ret_from_fork+0x3e/0x80
[   26.688552]  ? __pfx_kthread+0x10/0x10
[   26.688556]  ret_from_fork_asm+0x1a/0x30
[   26.688562]  </TASK>
[   26.688563] 
[   26.859210] Allocated by task 225:
[   26.862617]  kasan_save_stack+0x45/0x70
[   26.866454]  kasan_save_track+0x18/0x40
[   26.870296]  kasan_save_alloc_info+0x3b/0x50
[   26.874567]  __kasan_kmalloc+0xb7/0xc0
[   26.878319]  __kmalloc_cache_noprof+0x189/0x420
[   26.882852]  kmalloc_memmove_invalid_size+0xac/0x330
[   26.887827]  kunit_try_run_case+0x1a2/0x480
[   26.892012]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.897412]  kthread+0x334/0x6f0
[   26.900644]  ret_from_fork+0x3e/0x80
[   26.904248]  ret_from_fork_asm+0x1a/0x30
[   26.908175] 
[   26.909687] The buggy address belongs to the object at ffff888107f06200
[   26.909687]  which belongs to the cache kmalloc-64 of size 64
[   26.922040] The buggy address is located 4 bytes inside of
[   26.922040]  allocated 64-byte region [ffff888107f06200, ffff888107f06240)
[   26.934383] 
[   26.935881] The buggy address belongs to the physical page:
[   26.941452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06
[   26.949451] flags: 0x200000000000000(node=0|zone=2)
[   26.954331] page_type: f5(slab)
[   26.957478] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   26.965216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.972955] page dumped because: kasan: bad access detected
[   26.978527] 
[   26.980025] Memory state around the buggy address:
[   26.984818]  ffff888107f06100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   26.992038]  ffff888107f06180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.999256] >ffff888107f06200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   27.006475]                                            ^
[   27.011788]  ffff888107f06280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.019008]  ffff888107f06300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.026227] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   26.287332] ==================================================================
[   26.298762] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   26.306338] Read of size 18446744073709551614 at addr ffff888107f06084 by task kunit_try_catch/223
[   26.315299] 
[   26.316797] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   26.316805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.316807] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.316810] Call Trace:
[   26.316812]  <TASK>
[   26.316813]  dump_stack_lvl+0x73/0xb0
[   26.316817]  print_report+0xd1/0x650
[   26.316821]  ? __virt_addr_valid+0x1db/0x2d0
[   26.316824]  ? kmalloc_memmove_negative_size+0x171/0x330
[   26.316829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.316833]  ? kmalloc_memmove_negative_size+0x171/0x330
[   26.316838]  kasan_report+0x141/0x180
[   26.316842]  ? kmalloc_memmove_negative_size+0x171/0x330
[   26.316848]  kasan_check_range+0x10c/0x1c0
[   26.316853]  __asan_memmove+0x27/0x70
[   26.316856]  kmalloc_memmove_negative_size+0x171/0x330
[   26.316861]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   26.316866]  ? __schedule+0x10cc/0x2b30
[   26.316871]  ? ktime_get_ts64+0x83/0x230
[   26.316875]  kunit_try_run_case+0x1a2/0x480
[   26.316879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.316883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.316888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.316892]  ? __kthread_parkme+0x82/0x180
[   26.316896]  ? preempt_count_sub+0x50/0x80
[   26.316901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.316905]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.316909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.316913]  kthread+0x334/0x6f0
[   26.316917]  ? trace_preempt_on+0x20/0xc0
[   26.316921]  ? __pfx_kthread+0x10/0x10
[   26.316926]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.316930]  ? calculate_sigpending+0x7b/0xa0
[   26.316933]  ? __pfx_kthread+0x10/0x10
[   26.316938]  ret_from_fork+0x3e/0x80
[   26.316941]  ? __pfx_kthread+0x10/0x10
[   26.316946]  ret_from_fork_asm+0x1a/0x30
[   26.316951]  </TASK>
[   26.316953] 
[   26.487896] Allocated by task 223:
[   26.491300]  kasan_save_stack+0x45/0x70
[   26.495141]  kasan_save_track+0x18/0x40
[   26.498979]  kasan_save_alloc_info+0x3b/0x50
[   26.503251]  __kasan_kmalloc+0xb7/0xc0
[   26.507005]  __kmalloc_cache_noprof+0x189/0x420
[   26.511536]  kmalloc_memmove_negative_size+0xac/0x330
[   26.516588]  kunit_try_run_case+0x1a2/0x480
[   26.520776]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.526184]  kthread+0x334/0x6f0
[   26.529416]  ret_from_fork+0x3e/0x80
[   26.532993]  ret_from_fork_asm+0x1a/0x30
[   26.536921] 
[   26.538419] The buggy address belongs to the object at ffff888107f06080
[   26.538419]  which belongs to the cache kmalloc-64 of size 64
[   26.550757] The buggy address is located 4 bytes inside of
[   26.550757]  64-byte region [ffff888107f06080, ffff888107f060c0)
[   26.562226] 
[   26.563756] The buggy address belongs to the physical page:
[   26.569334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f06
[   26.577341] flags: 0x200000000000000(node=0|zone=2)
[   26.582218] page_type: f5(slab)
[   26.585365] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   26.593104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.600842] page dumped because: kasan: bad access detected
[   26.606415] 
[   26.607915] Memory state around the buggy address:
[   26.612721]  ffff888107f05f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.619971]  ffff888107f06000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.627198] >ffff888107f06080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.634415]                    ^
[   26.637648]  ffff888107f06100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.644866]  ffff888107f06180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.652088] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   25.916056] ==================================================================
[   25.927389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   25.934703] Write of size 16 at addr ffff888107f05269 by task kunit_try_catch/221
[   25.942207] 
[   25.943720] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.943728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.943730] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.943734] Call Trace:
[   25.943735]  <TASK>
[   25.943737]  dump_stack_lvl+0x73/0xb0
[   25.943740]  print_report+0xd1/0x650
[   25.943745]  ? __virt_addr_valid+0x1db/0x2d0
[   25.943748]  ? kmalloc_oob_memset_16+0x166/0x330
[   25.943752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.943756]  ? kmalloc_oob_memset_16+0x166/0x330
[   25.943760]  kasan_report+0x141/0x180
[   25.943765]  ? kmalloc_oob_memset_16+0x166/0x330
[   25.943770]  kasan_check_range+0x10c/0x1c0
[   25.943774]  __asan_memset+0x27/0x50
[   25.943778]  kmalloc_oob_memset_16+0x166/0x330
[   25.943782]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   25.943786]  ? __schedule+0x10cc/0x2b30
[   25.943791]  ? ktime_get_ts64+0x83/0x230
[   25.943795]  kunit_try_run_case+0x1a2/0x480
[   25.943799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.943803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.943808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.943812]  ? __kthread_parkme+0x82/0x180
[   25.943816]  ? preempt_count_sub+0x50/0x80
[   25.943821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.943825]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.943829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.943833]  kthread+0x334/0x6f0
[   25.943837]  ? trace_preempt_on+0x20/0xc0
[   25.943841]  ? __pfx_kthread+0x10/0x10
[   25.943845]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.943849]  ? calculate_sigpending+0x7b/0xa0
[   25.943853]  ? __pfx_kthread+0x10/0x10
[   25.943857]  ret_from_fork+0x3e/0x80
[   25.943861]  ? __pfx_kthread+0x10/0x10
[   25.943865]  ret_from_fork_asm+0x1a/0x30
[   25.943871]  </TASK>
[   25.943872] 
[   26.111241] Allocated by task 221:
[   26.114648]  kasan_save_stack+0x45/0x70
[   26.118486]  kasan_save_track+0x18/0x40
[   26.122325]  kasan_save_alloc_info+0x3b/0x50
[   26.126598]  __kasan_kmalloc+0xb7/0xc0
[   26.130352]  __kmalloc_cache_noprof+0x189/0x420
[   26.134884]  kmalloc_oob_memset_16+0xac/0x330
[   26.139242]  kunit_try_run_case+0x1a2/0x480
[   26.143428]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.148827]  kthread+0x334/0x6f0
[   26.152060]  ret_from_fork+0x3e/0x80
[   26.155639]  ret_from_fork_asm+0x1a/0x30
[   26.159565] 
[   26.161063] The buggy address belongs to the object at ffff888107f05200
[   26.161063]  which belongs to the cache kmalloc-128 of size 128
[   26.173571] The buggy address is located 105 bytes inside of
[   26.173571]  allocated 120-byte region [ffff888107f05200, ffff888107f05278)
[   26.186171] 
[   26.187687] The buggy address belongs to the physical page:
[   26.193268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   26.201269] flags: 0x200000000000000(node=0|zone=2)
[   26.206147] page_type: f5(slab)
[   26.209293] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   26.217040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.224780] page dumped because: kasan: bad access detected
[   26.230351] 
[   26.231851] Memory state around the buggy address:
[   26.236642]  ffff888107f05100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.243863]  ffff888107f05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.251083] >ffff888107f05200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.258301]                                                                 ^
[   26.265433]  ffff888107f05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.272652]  ffff888107f05300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.279905] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   25.545320] ==================================================================
[   25.556644] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   25.563871] Write of size 8 at addr ffff888107f05171 by task kunit_try_catch/219
[   25.571263] 
[   25.572764] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.572772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.572774] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.572778] Call Trace:
[   25.572779]  <TASK>
[   25.572781]  dump_stack_lvl+0x73/0xb0
[   25.572785]  print_report+0xd1/0x650
[   25.572789]  ? __virt_addr_valid+0x1db/0x2d0
[   25.572793]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.572797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.572801]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.572806]  kasan_report+0x141/0x180
[   25.572810]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.572815]  kasan_check_range+0x10c/0x1c0
[   25.572819]  __asan_memset+0x27/0x50
[   25.572823]  kmalloc_oob_memset_8+0x166/0x330
[   25.572827]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   25.572832]  ? __schedule+0x10cc/0x2b30
[   25.572836]  ? ktime_get_ts64+0x83/0x230
[   25.572841]  kunit_try_run_case+0x1a2/0x480
[   25.572845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.572849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.572854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.572858]  ? __kthread_parkme+0x82/0x180
[   25.572862]  ? preempt_count_sub+0x50/0x80
[   25.572867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.572871]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.572875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.572879]  kthread+0x334/0x6f0
[   25.572883]  ? trace_preempt_on+0x20/0xc0
[   25.572887]  ? __pfx_kthread+0x10/0x10
[   25.572891]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.572895]  ? calculate_sigpending+0x7b/0xa0
[   25.572899]  ? __pfx_kthread+0x10/0x10
[   25.572903]  ret_from_fork+0x3e/0x80
[   25.572907]  ? __pfx_kthread+0x10/0x10
[   25.572912]  ret_from_fork_asm+0x1a/0x30
[   25.572917]  </TASK>
[   25.572919] 
[   25.739900] Allocated by task 219:
[   25.743308]  kasan_save_stack+0x45/0x70
[   25.747153]  kasan_save_track+0x18/0x40
[   25.750995]  kasan_save_alloc_info+0x3b/0x50
[   25.755265]  __kasan_kmalloc+0xb7/0xc0
[   25.759018]  __kmalloc_cache_noprof+0x189/0x420
[   25.763550]  kmalloc_oob_memset_8+0xac/0x330
[   25.767822]  kunit_try_run_case+0x1a2/0x480
[   25.772009]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.777410]  kthread+0x334/0x6f0
[   25.780649]  ret_from_fork+0x3e/0x80
[   25.784228]  ret_from_fork_asm+0x1a/0x30
[   25.788156] 
[   25.789654] The buggy address belongs to the object at ffff888107f05100
[   25.789654]  which belongs to the cache kmalloc-128 of size 128
[   25.802194] The buggy address is located 113 bytes inside of
[   25.802194]  allocated 120-byte region [ffff888107f05100, ffff888107f05178)
[   25.814795] 
[   25.816293] The buggy address belongs to the physical page:
[   25.821868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   25.829873] flags: 0x200000000000000(node=0|zone=2)
[   25.834754] page_type: f5(slab)
[   25.837902] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   25.845648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.853395] page dumped because: kasan: bad access detected
[   25.858966] 
[   25.860467] Memory state around the buggy address:
[   25.865260]  ffff888107f05000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.872478]  ffff888107f05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.879701] >ffff888107f05100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.886923]                                                                 ^
[   25.894058]  ffff888107f05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.901277]  ffff888107f05200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.908502] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   25.174505] ==================================================================
[   25.185832] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   25.193060] Write of size 4 at addr ffff888104ee9275 by task kunit_try_catch/217
[   25.200453] 
[   25.201952] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.201961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.201963] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.201966] Call Trace:
[   25.201968]  <TASK>
[   25.201970]  dump_stack_lvl+0x73/0xb0
[   25.201974]  print_report+0xd1/0x650
[   25.201978]  ? __virt_addr_valid+0x1db/0x2d0
[   25.201982]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.201986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.201990]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.201994]  kasan_report+0x141/0x180
[   25.201998]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.202003]  kasan_check_range+0x10c/0x1c0
[   25.202008]  __asan_memset+0x27/0x50
[   25.202011]  kmalloc_oob_memset_4+0x166/0x330
[   25.202015]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   25.202020]  ? __schedule+0x10cc/0x2b30
[   25.202024]  ? ktime_get_ts64+0x83/0x230
[   25.202029]  kunit_try_run_case+0x1a2/0x480
[   25.202033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.202037]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.202042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.202046]  ? __kthread_parkme+0x82/0x180
[   25.202050]  ? preempt_count_sub+0x50/0x80
[   25.202055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.202059]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.202063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.202067]  kthread+0x334/0x6f0
[   25.202071]  ? trace_preempt_on+0x20/0xc0
[   25.202075]  ? __pfx_kthread+0x10/0x10
[   25.202080]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.202084]  ? calculate_sigpending+0x7b/0xa0
[   25.202087]  ? __pfx_kthread+0x10/0x10
[   25.202092]  ret_from_fork+0x3e/0x80
[   25.202096]  ? __pfx_kthread+0x10/0x10
[   25.202100]  ret_from_fork_asm+0x1a/0x30
[   25.202105]  </TASK>
[   25.202107] 
[   25.369115] Allocated by task 217:
[   25.372522]  kasan_save_stack+0x45/0x70
[   25.376369]  kasan_save_track+0x18/0x40
[   25.380209]  kasan_save_alloc_info+0x3b/0x50
[   25.384481]  __kasan_kmalloc+0xb7/0xc0
[   25.388234]  __kmalloc_cache_noprof+0x189/0x420
[   25.392765]  kmalloc_oob_memset_4+0xac/0x330
[   25.397037]  kunit_try_run_case+0x1a2/0x480
[   25.401224]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.406624]  kthread+0x334/0x6f0
[   25.409863]  ret_from_fork+0x3e/0x80
[   25.413441]  ret_from_fork_asm+0x1a/0x30
[   25.417368] 
[   25.418869] The buggy address belongs to the object at ffff888104ee9200
[   25.418869]  which belongs to the cache kmalloc-128 of size 128
[   25.431381] The buggy address is located 117 bytes inside of
[   25.431381]  allocated 120-byte region [ffff888104ee9200, ffff888104ee9278)
[   25.443982] 
[   25.445482] The buggy address belongs to the physical page:
[   25.451053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   25.459055] flags: 0x200000000000000(node=0|zone=2)
[   25.463932] page_type: f5(slab)
[   25.467081] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   25.474828] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.482574] page dumped because: kasan: bad access detected
[   25.488146] 
[   25.489644] Memory state around the buggy address:
[   25.494439]  ffff888104ee9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.501684]  ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.508911] >ffff888104ee9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.516128]                                                                 ^
[   25.523262]  ffff888104ee9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.530481]  ffff888104ee9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.537707] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   24.803587] ==================================================================
[   24.815002] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   24.822223] Write of size 2 at addr ffff888107f05077 by task kunit_try_catch/215
[   24.829621] 
[   24.831122] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.831131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.831133] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.831136] Call Trace:
[   24.831138]  <TASK>
[   24.831140]  dump_stack_lvl+0x73/0xb0
[   24.831144]  print_report+0xd1/0x650
[   24.831148]  ? __virt_addr_valid+0x1db/0x2d0
[   24.831152]  ? kmalloc_oob_memset_2+0x166/0x330
[   24.831156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.831160]  ? kmalloc_oob_memset_2+0x166/0x330
[   24.831164]  kasan_report+0x141/0x180
[   24.831168]  ? kmalloc_oob_memset_2+0x166/0x330
[   24.831173]  kasan_check_range+0x10c/0x1c0
[   24.831177]  __asan_memset+0x27/0x50
[   24.831181]  kmalloc_oob_memset_2+0x166/0x330
[   24.831185]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   24.831189]  ? __schedule+0x10cc/0x2b30
[   24.831194]  ? ktime_get_ts64+0x83/0x230
[   24.831198]  kunit_try_run_case+0x1a2/0x480
[   24.831203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.831207]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.831211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.831216]  ? __kthread_parkme+0x82/0x180
[   24.831220]  ? preempt_count_sub+0x50/0x80
[   24.831224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.831228]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.831233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.831237]  kthread+0x334/0x6f0
[   24.831240]  ? trace_preempt_on+0x20/0xc0
[   24.831245]  ? __pfx_kthread+0x10/0x10
[   24.831249]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.831253]  ? calculate_sigpending+0x7b/0xa0
[   24.831257]  ? __pfx_kthread+0x10/0x10
[   24.831261]  ret_from_fork+0x3e/0x80
[   24.831265]  ? __pfx_kthread+0x10/0x10
[   24.831269]  ret_from_fork_asm+0x1a/0x30
[   24.831275]  </TASK>
[   24.831276] 
[   24.998293] Allocated by task 215:
[   25.001700]  kasan_save_stack+0x45/0x70
[   25.005582]  kasan_save_track+0x18/0x40
[   25.009420]  kasan_save_alloc_info+0x3b/0x50
[   25.013714]  __kasan_kmalloc+0xb7/0xc0
[   25.017499]  __kmalloc_cache_noprof+0x189/0x420
[   25.022030]  kmalloc_oob_memset_2+0xac/0x330
[   25.026304]  kunit_try_run_case+0x1a2/0x480
[   25.030490]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.035889]  kthread+0x334/0x6f0
[   25.039121]  ret_from_fork+0x3e/0x80
[   25.042701]  ret_from_fork_asm+0x1a/0x30
[   25.046699] 
[   25.048213] The buggy address belongs to the object at ffff888107f05000
[   25.048213]  which belongs to the cache kmalloc-128 of size 128
[   25.060761] The buggy address is located 119 bytes inside of
[   25.060761]  allocated 120-byte region [ffff888107f05000, ffff888107f05078)
[   25.073362] 
[   25.074860] The buggy address belongs to the physical page:
[   25.080432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f05
[   25.088434] flags: 0x200000000000000(node=0|zone=2)
[   25.093320] page_type: f5(slab)
[   25.096468] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   25.104213] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.111953] page dumped because: kasan: bad access detected
[   25.117525] 
[   25.119024] Memory state around the buggy address:
[   25.123817]  ffff888107f04f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.131035]  ffff888107f04f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.138254] >ffff888107f05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.145473]                                                                 ^
[   25.152605]  ffff888107f05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.159827]  ffff888107f05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.167053] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   24.432623] ==================================================================
[   24.443429] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   24.450742] Write of size 128 at addr ffff888104ee9100 by task kunit_try_catch/213
[   24.458316] 
[   24.459817] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.459825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.459827] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.459831] Call Trace:
[   24.459832]  <TASK>
[   24.459834]  dump_stack_lvl+0x73/0xb0
[   24.459838]  print_report+0xd1/0x650
[   24.459842]  ? __virt_addr_valid+0x1db/0x2d0
[   24.459846]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.459850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.459854]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.459859]  kasan_report+0x141/0x180
[   24.459863]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.459868]  kasan_check_range+0x10c/0x1c0
[   24.459872]  __asan_memset+0x27/0x50
[   24.459876]  kmalloc_oob_in_memset+0x15f/0x320
[   24.459880]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   24.459884]  ? __schedule+0x10cc/0x2b30
[   24.459889]  ? ktime_get_ts64+0x83/0x230
[   24.459893]  kunit_try_run_case+0x1a2/0x480
[   24.459898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.459902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.459906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.459911]  ? __kthread_parkme+0x82/0x180
[   24.459915]  ? preempt_count_sub+0x50/0x80
[   24.459919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.459923]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.459927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.459932]  kthread+0x334/0x6f0
[   24.459936]  ? trace_preempt_on+0x20/0xc0
[   24.459940]  ? __pfx_kthread+0x10/0x10
[   24.459944]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.459948]  ? calculate_sigpending+0x7b/0xa0
[   24.459952]  ? __pfx_kthread+0x10/0x10
[   24.459956]  ret_from_fork+0x3e/0x80
[   24.459960]  ? __pfx_kthread+0x10/0x10
[   24.459964]  ret_from_fork_asm+0x1a/0x30
[   24.459970]  </TASK>
[   24.459971] 
[   24.627455] Allocated by task 213:
[   24.630863]  kasan_save_stack+0x45/0x70
[   24.634702]  kasan_save_track+0x18/0x40
[   24.638592]  kasan_save_alloc_info+0x3b/0x50
[   24.642865]  __kasan_kmalloc+0xb7/0xc0
[   24.646617]  __kmalloc_cache_noprof+0x189/0x420
[   24.651148]  kmalloc_oob_in_memset+0xac/0x320
[   24.655507]  kunit_try_run_case+0x1a2/0x480
[   24.659702]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.665144]  kthread+0x334/0x6f0
[   24.668377]  ret_from_fork+0x3e/0x80
[   24.671957]  ret_from_fork_asm+0x1a/0x30
[   24.675883] 
[   24.677381] The buggy address belongs to the object at ffff888104ee9100
[   24.677381]  which belongs to the cache kmalloc-128 of size 128
[   24.689888] The buggy address is located 0 bytes inside of
[   24.689888]  allocated 120-byte region [ffff888104ee9100, ffff888104ee9178)
[   24.702315] 
[   24.703814] The buggy address belongs to the physical page:
[   24.709387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   24.717393] flags: 0x200000000000000(node=0|zone=2)
[   24.722274] page_type: f5(slab)
[   24.725420] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   24.733158] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.740898] page dumped because: kasan: bad access detected
[   24.746469] 
[   24.747970] Memory state around the buggy address:
[   24.752762]  ffff888104ee9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.759982]  ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.767210] >ffff888104ee9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.774426]                                                                 ^
[   24.781560]  ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.788780]  ffff888104ee9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.796007] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   24.023437] ==================================================================
[   24.034240] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   24.041026] Read of size 16 at addr ffff888104ed9140 by task kunit_try_catch/211
[   24.048421] 
[   24.049921] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.049929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.049931] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.049934] Call Trace:
[   24.049936]  <TASK>
[   24.049938]  dump_stack_lvl+0x73/0xb0
[   24.049942]  print_report+0xd1/0x650
[   24.049946]  ? __virt_addr_valid+0x1db/0x2d0
[   24.049950]  ? kmalloc_uaf_16+0x47b/0x4c0
[   24.049954]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.049958]  ? kmalloc_uaf_16+0x47b/0x4c0
[   24.049962]  kasan_report+0x141/0x180
[   24.049966]  ? kmalloc_uaf_16+0x47b/0x4c0
[   24.049970]  __asan_report_load16_noabort+0x18/0x20
[   24.049974]  kmalloc_uaf_16+0x47b/0x4c0
[   24.049978]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   24.049982]  ? __schedule+0x10cc/0x2b30
[   24.049987]  ? ktime_get_ts64+0x83/0x230
[   24.049991]  kunit_try_run_case+0x1a2/0x480
[   24.049996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.050000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.050004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.050009]  ? __kthread_parkme+0x82/0x180
[   24.050013]  ? preempt_count_sub+0x50/0x80
[   24.050017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.050022]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.050025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.050029]  kthread+0x334/0x6f0
[   24.050033]  ? trace_preempt_on+0x20/0xc0
[   24.050038]  ? __pfx_kthread+0x10/0x10
[   24.050042]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.050046]  ? calculate_sigpending+0x7b/0xa0
[   24.050050]  ? __pfx_kthread+0x10/0x10
[   24.050054]  ret_from_fork+0x3e/0x80
[   24.050058]  ? __pfx_kthread+0x10/0x10
[   24.050062]  ret_from_fork_asm+0x1a/0x30
[   24.050068]  </TASK>
[   24.050069] 
[   24.211760] Allocated by task 211:
[   24.215169]  kasan_save_stack+0x45/0x70
[   24.219016]  kasan_save_track+0x18/0x40
[   24.222861]  kasan_save_alloc_info+0x3b/0x50
[   24.227136]  __kasan_kmalloc+0xb7/0xc0
[   24.230896]  __kmalloc_cache_noprof+0x189/0x420
[   24.235430]  kmalloc_uaf_16+0x15b/0x4c0
[   24.239268]  kunit_try_run_case+0x1a2/0x480
[   24.243454]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.248854]  kthread+0x334/0x6f0
[   24.252095]  ret_from_fork+0x3e/0x80
[   24.255713]  ret_from_fork_asm+0x1a/0x30
[   24.259699] 
[   24.261245] Freed by task 211:
[   24.264304]  kasan_save_stack+0x45/0x70
[   24.268143]  kasan_save_track+0x18/0x40
[   24.271983]  kasan_save_free_info+0x3f/0x60
[   24.276170]  __kasan_slab_free+0x56/0x70
[   24.280104]  kfree+0x222/0x3f0
[   24.283161]  kmalloc_uaf_16+0x1d6/0x4c0
[   24.287003]  kunit_try_run_case+0x1a2/0x480
[   24.291197]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.296595]  kthread+0x334/0x6f0
[   24.299828]  ret_from_fork+0x3e/0x80
[   24.303405]  ret_from_fork_asm+0x1a/0x30
[   24.307332] 
[   24.308832] The buggy address belongs to the object at ffff888104ed9140
[   24.308832]  which belongs to the cache kmalloc-16 of size 16
[   24.321172] The buggy address is located 0 bytes inside of
[   24.321172]  freed 16-byte region [ffff888104ed9140, ffff888104ed9150)
[   24.333168] 
[   24.334685] The buggy address belongs to the physical page:
[   24.340292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   24.348299] flags: 0x200000000000000(node=0|zone=2)
[   24.353177] page_type: f5(slab)
[   24.356324] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   24.364064] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.371809] page dumped because: kasan: bad access detected
[   24.377384] 
[   24.378881] Memory state around the buggy address:
[   24.383713]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   24.390961]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   24.398181] >ffff888104ed9100: 00 05 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   24.405401]                                            ^
[   24.410748]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.417977]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.425193] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   23.663724] ==================================================================
[   23.674359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   23.681064] Write of size 16 at addr ffff888105b98500 by task kunit_try_catch/209
[   23.688546] 
[   23.690045] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.690054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.690056] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.690059] Call Trace:
[   23.690061]  <TASK>
[   23.690063]  dump_stack_lvl+0x73/0xb0
[   23.690067]  print_report+0xd1/0x650
[   23.690071]  ? __virt_addr_valid+0x1db/0x2d0
[   23.690075]  ? kmalloc_oob_16+0x452/0x4a0
[   23.690078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.690083]  ? kmalloc_oob_16+0x452/0x4a0
[   23.690087]  kasan_report+0x141/0x180
[   23.690091]  ? kmalloc_oob_16+0x452/0x4a0
[   23.690095]  __asan_report_store16_noabort+0x1b/0x30
[   23.690099]  kmalloc_oob_16+0x452/0x4a0
[   23.690103]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.690107]  ? __schedule+0x10cc/0x2b30
[   23.690112]  ? ktime_get_ts64+0x83/0x230
[   23.690116]  kunit_try_run_case+0x1a2/0x480
[   23.690121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.690125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.690129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.690134]  ? __kthread_parkme+0x82/0x180
[   23.690138]  ? preempt_count_sub+0x50/0x80
[   23.690142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.690147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.690151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.690155]  kthread+0x334/0x6f0
[   23.690159]  ? trace_preempt_on+0x20/0xc0
[   23.690163]  ? __pfx_kthread+0x10/0x10
[   23.690167]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.690171]  ? calculate_sigpending+0x7b/0xa0
[   23.690175]  ? __pfx_kthread+0x10/0x10
[   23.690179]  ret_from_fork+0x3e/0x80
[   23.690183]  ? __pfx_kthread+0x10/0x10
[   23.690187]  ret_from_fork_asm+0x1a/0x30
[   23.690193]  </TASK>
[   23.690195] 
[   23.851885] Allocated by task 209:
[   23.855291]  kasan_save_stack+0x45/0x70
[   23.859132]  kasan_save_track+0x18/0x40
[   23.862971]  kasan_save_alloc_info+0x3b/0x50
[   23.867243]  __kasan_kmalloc+0xb7/0xc0
[   23.870994]  __kmalloc_cache_noprof+0x189/0x420
[   23.875529]  kmalloc_oob_16+0xa8/0x4a0
[   23.879287]  kunit_try_run_case+0x1a2/0x480
[   23.883474]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.888875]  kthread+0x334/0x6f0
[   23.892115]  ret_from_fork+0x3e/0x80
[   23.895701]  ret_from_fork_asm+0x1a/0x30
[   23.899654] 
[   23.901155] The buggy address belongs to the object at ffff888105b98500
[   23.901155]  which belongs to the cache kmalloc-16 of size 16
[   23.913494] The buggy address is located 0 bytes inside of
[   23.913494]  allocated 13-byte region [ffff888105b98500, ffff888105b9850d)
[   23.925836] 
[   23.927336] The buggy address belongs to the physical page:
[   23.932908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b98
[   23.940914] flags: 0x200000000000000(node=0|zone=2)
[   23.945795] page_type: f5(slab)
[   23.948940] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   23.956704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.964469] page dumped because: kasan: bad access detected
[   23.970040] 
[   23.971532] Memory state around the buggy address:
[   23.976325]  ffff888105b98400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.983544]  ffff888105b98480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 06 fc fc
[   23.990763] >ffff888105b98500: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.997983]                       ^
[   24.001473]  ffff888105b98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.008703]  ffff888105b98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.015922] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   22.744141] ==================================================================
[   22.755745] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   22.762363] Read of size 1 at addr ffff8881038cac00 by task kunit_try_catch/207
[   22.769687] 
[   22.771221] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.771229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.771231] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.771234] Call Trace:
[   22.771236]  <TASK>
[   22.771237]  dump_stack_lvl+0x73/0xb0
[   22.771241]  print_report+0xd1/0x650
[   22.771245]  ? __virt_addr_valid+0x1db/0x2d0
[   22.771249]  ? krealloc_uaf+0x1b8/0x5e0
[   22.771253]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.771257]  ? krealloc_uaf+0x1b8/0x5e0
[   22.771261]  kasan_report+0x141/0x180
[   22.771265]  ? krealloc_uaf+0x1b8/0x5e0
[   22.771269]  ? krealloc_uaf+0x1b8/0x5e0
[   22.771274]  __kasan_check_byte+0x3d/0x50
[   22.771278]  krealloc_noprof+0x3f/0x340
[   22.771282]  krealloc_uaf+0x1b8/0x5e0
[   22.771286]  ? __pfx_krealloc_uaf+0x10/0x10
[   22.771290]  ? finish_task_switch.isra.0+0x153/0x700
[   22.771294]  ? __switch_to+0x5d9/0xf60
[   22.771298]  ? dequeue_task_fair+0x166/0x4e0
[   22.771302]  ? __schedule+0x10cc/0x2b30
[   22.771306]  ? ktime_get_ts64+0x83/0x230
[   22.771311]  kunit_try_run_case+0x1a2/0x480
[   22.771315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.771319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.771324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.771328]  ? __kthread_parkme+0x82/0x180
[   22.771332]  ? preempt_count_sub+0x50/0x80
[   22.771337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.771341]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.771345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.771349]  kthread+0x334/0x6f0
[   22.771353]  ? trace_preempt_on+0x20/0xc0
[   22.771357]  ? __pfx_kthread+0x10/0x10
[   22.771361]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.771365]  ? calculate_sigpending+0x7b/0xa0
[   22.771369]  ? __pfx_kthread+0x10/0x10
[   22.771373]  ret_from_fork+0x3e/0x80
[   22.771377]  ? __pfx_kthread+0x10/0x10
[   22.771381]  ret_from_fork_asm+0x1a/0x30
[   22.771387]  </TASK>
[   22.771388] 
[   22.951937] Allocated by task 207:
[   22.955343]  kasan_save_stack+0x45/0x70
[   22.959183]  kasan_save_track+0x18/0x40
[   22.963021]  kasan_save_alloc_info+0x3b/0x50
[   22.967294]  __kasan_kmalloc+0xb7/0xc0
[   22.971045]  __kmalloc_cache_noprof+0x189/0x420
[   22.975579]  krealloc_uaf+0xbb/0x5e0
[   22.979159]  kunit_try_run_case+0x1a2/0x480
[   22.983353]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.988758]  kthread+0x334/0x6f0
[   22.992019]  ret_from_fork+0x3e/0x80
[   22.995599]  ret_from_fork_asm+0x1a/0x30
[   22.999531] 
[   23.001031] Freed by task 207:
[   23.004093]  kasan_save_stack+0x45/0x70
[   23.007931]  kasan_save_track+0x18/0x40
[   23.011770]  kasan_save_free_info+0x3f/0x60
[   23.015956]  __kasan_slab_free+0x56/0x70
[   23.019879]  kfree+0x222/0x3f0
[   23.022940]  krealloc_uaf+0x13d/0x5e0
[   23.026605]  kunit_try_run_case+0x1a2/0x480
[   23.030792]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.036191]  kthread+0x334/0x6f0
[   23.039424]  ret_from_fork+0x3e/0x80
[   23.043004]  ret_from_fork_asm+0x1a/0x30
[   23.046938] 
[   23.048435] The buggy address belongs to the object at ffff8881038cac00
[   23.048435]  which belongs to the cache kmalloc-256 of size 256
[   23.060941] The buggy address is located 0 bytes inside of
[   23.060941]  freed 256-byte region [ffff8881038cac00, ffff8881038cad00)
[   23.073023] 
[   23.074521] The buggy address belongs to the physical page:
[   23.080094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca
[   23.088103] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.095762] flags: 0x200000000000040(head|node=0|zone=2)
[   23.101074] page_type: f5(slab)
[   23.104221] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.111960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.119702] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.127553] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.135385] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff
[   23.143212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.151046] page dumped because: kasan: bad access detected
[   23.156617] 
[   23.158116] Memory state around the buggy address:
[   23.162909]  ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.170127]  ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.177347] >ffff8881038cac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.184567]                    ^
[   23.187799]  ffff8881038cac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.195017]  ffff8881038cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.202238] ==================================================================
[   23.209478] ==================================================================
[   23.216708] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   23.223346] Read of size 1 at addr ffff8881038cac00 by task kunit_try_catch/207
[   23.230652] 
[   23.232154] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.232162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.232164] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.232167] Call Trace:
[   23.232169]  <TASK>
[   23.232170]  dump_stack_lvl+0x73/0xb0
[   23.232174]  print_report+0xd1/0x650
[   23.232178]  ? __virt_addr_valid+0x1db/0x2d0
[   23.232181]  ? krealloc_uaf+0x53c/0x5e0
[   23.232185]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.232189]  ? krealloc_uaf+0x53c/0x5e0
[   23.232193]  kasan_report+0x141/0x180
[   23.232197]  ? krealloc_uaf+0x53c/0x5e0
[   23.232202]  __asan_report_load1_noabort+0x18/0x20
[   23.232206]  krealloc_uaf+0x53c/0x5e0
[   23.232210]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.232214]  ? finish_task_switch.isra.0+0x153/0x700
[   23.232218]  ? __switch_to+0x5d9/0xf60
[   23.232222]  ? dequeue_task_fair+0x166/0x4e0
[   23.232226]  ? __schedule+0x10cc/0x2b30
[   23.232231]  ? ktime_get_ts64+0x83/0x230
[   23.232235]  kunit_try_run_case+0x1a2/0x480
[   23.232240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.232244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.232248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.232252]  ? __kthread_parkme+0x82/0x180
[   23.232256]  ? preempt_count_sub+0x50/0x80
[   23.232261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.232265]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.232269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.232273]  kthread+0x334/0x6f0
[   23.232277]  ? trace_preempt_on+0x20/0xc0
[   23.232281]  ? __pfx_kthread+0x10/0x10
[   23.232285]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.232289]  ? calculate_sigpending+0x7b/0xa0
[   23.232293]  ? __pfx_kthread+0x10/0x10
[   23.232297]  ret_from_fork+0x3e/0x80
[   23.232301]  ? __pfx_kthread+0x10/0x10
[   23.232305]  ret_from_fork_asm+0x1a/0x30
[   23.232311]  </TASK>
[   23.232312] 
[   23.405930] Allocated by task 207:
[   23.409334]  kasan_save_stack+0x45/0x70
[   23.413174]  kasan_save_track+0x18/0x40
[   23.417013]  kasan_save_alloc_info+0x3b/0x50
[   23.421286]  __kasan_kmalloc+0xb7/0xc0
[   23.425037]  __kmalloc_cache_noprof+0x189/0x420
[   23.429571]  krealloc_uaf+0xbb/0x5e0
[   23.433148]  kunit_try_run_case+0x1a2/0x480
[   23.437334]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.442733]  kthread+0x334/0x6f0
[   23.445966]  ret_from_fork+0x3e/0x80
[   23.449547]  ret_from_fork_asm+0x1a/0x30
[   23.453481] 
[   23.454979] Freed by task 207:
[   23.458038]  kasan_save_stack+0x45/0x70
[   23.461879]  kasan_save_track+0x18/0x40
[   23.465741]  kasan_save_free_info+0x3f/0x60
[   23.469928]  __kasan_slab_free+0x56/0x70
[   23.473856]  kfree+0x222/0x3f0
[   23.476913]  krealloc_uaf+0x13d/0x5e0
[   23.480578]  kunit_try_run_case+0x1a2/0x480
[   23.484767]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.490174]  kthread+0x334/0x6f0
[   23.493405]  ret_from_fork+0x3e/0x80
[   23.496984]  ret_from_fork_asm+0x1a/0x30
[   23.500910] 
[   23.502410] The buggy address belongs to the object at ffff8881038cac00
[   23.502410]  which belongs to the cache kmalloc-256 of size 256
[   23.514923] The buggy address is located 0 bytes inside of
[   23.514923]  freed 256-byte region [ffff8881038cac00, ffff8881038cad00)
[   23.527004] 
[   23.528505] The buggy address belongs to the physical page:
[   23.534077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca
[   23.542083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.549737] flags: 0x200000000000040(head|node=0|zone=2)
[   23.555048] page_type: f5(slab)
[   23.558197] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.565944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.573743] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.581576] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.589404] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff
[   23.597236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.605063] page dumped because: kasan: bad access detected
[   23.610634] 
[   23.612132] Memory state around the buggy address:
[   23.616927]  ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.624145]  ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.631364] >ffff8881038cac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.638582]                    ^
[   23.641816]  ffff8881038cac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.649034]  ffff8881038cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.656254] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   18.220783] ==================================================================
[   18.231855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   18.239516] Write of size 1 at addr ffff888100350ec9 by task kunit_try_catch/201
[   18.246909] 
[   18.248410] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.248418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.248420] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.248423] Call Trace:
[   18.248425]  <TASK>
[   18.248427]  dump_stack_lvl+0x73/0xb0
[   18.248431]  print_report+0xd1/0x650
[   18.248435]  ? __virt_addr_valid+0x1db/0x2d0
[   18.248439]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.248444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.248448]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.248452]  kasan_report+0x141/0x180
[   18.248457]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.248462]  __asan_report_store1_noabort+0x1b/0x30
[   18.248466]  krealloc_less_oob_helper+0xd70/0x11d0
[   18.248471]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.248476]  ? finish_task_switch.isra.0+0x153/0x700
[   18.248480]  ? __switch_to+0x5d9/0xf60
[   18.248484]  ? dequeue_task_fair+0x166/0x4e0
[   18.248488]  ? __schedule+0x10cc/0x2b30
[   18.248493]  krealloc_less_oob+0x1c/0x30
[   18.248497]  kunit_try_run_case+0x1a2/0x480
[   18.248502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.248506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.248510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.248515]  ? __kthread_parkme+0x82/0x180
[   18.248519]  ? preempt_count_sub+0x50/0x80
[   18.248523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.248527]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.248532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.248536]  kthread+0x334/0x6f0
[   18.248540]  ? trace_preempt_on+0x20/0xc0
[   18.248544]  ? __pfx_kthread+0x10/0x10
[   18.248548]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.248552]  ? calculate_sigpending+0x7b/0xa0
[   18.248556]  ? __pfx_kthread+0x10/0x10
[   18.248560]  ret_from_fork+0x3e/0x80
[   18.248564]  ? __pfx_kthread+0x10/0x10
[   18.248568]  ret_from_fork_asm+0x1a/0x30
[   18.248574]  </TASK>
[   18.248576] 
[   18.427853] Allocated by task 201:
[   18.431259]  kasan_save_stack+0x45/0x70
[   18.435106]  kasan_save_track+0x18/0x40
[   18.438944]  kasan_save_alloc_info+0x3b/0x50
[   18.443219]  __kasan_krealloc+0x190/0x1f0
[   18.447237]  krealloc_noprof+0xf3/0x340
[   18.451079]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.455878]  krealloc_less_oob+0x1c/0x30
[   18.459806]  kunit_try_run_case+0x1a2/0x480
[   18.463998]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.469397]  kthread+0x334/0x6f0
[   18.472631]  ret_from_fork+0x3e/0x80
[   18.476210]  ret_from_fork_asm+0x1a/0x30
[   18.480135] 
[   18.481635] The buggy address belongs to the object at ffff888100350e00
[   18.481635]  which belongs to the cache kmalloc-256 of size 256
[   18.494150] The buggy address is located 0 bytes to the right of
[   18.494150]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   18.507104] 
[   18.508603] The buggy address belongs to the physical page:
[   18.514177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   18.522183] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.529836] flags: 0x200000000000040(head|node=0|zone=2)
[   18.535149] page_type: f5(slab)
[   18.538296] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.546043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.553784] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.561617] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.569450] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   18.577275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.585102] page dumped because: kasan: bad access detected
[   18.590689] 
[   18.592215] Memory state around the buggy address:
[   18.597008]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.604227]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.611449] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.618684]                                               ^
[   18.624292]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.631519]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.638738] ==================================================================
[   19.489501] ==================================================================
[   19.496735] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   19.504393] Write of size 1 at addr ffff888100350eea by task kunit_try_catch/201
[   19.511784] 
[   19.513278] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.513285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.513287] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.513290] Call Trace:
[   19.513292]  <TASK>
[   19.513293]  dump_stack_lvl+0x73/0xb0
[   19.513297]  print_report+0xd1/0x650
[   19.513301]  ? __virt_addr_valid+0x1db/0x2d0
[   19.513304]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.513309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.513313]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.513317]  kasan_report+0x141/0x180
[   19.513321]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.513327]  __asan_report_store1_noabort+0x1b/0x30
[   19.513331]  krealloc_less_oob_helper+0xe90/0x11d0
[   19.513336]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.513340]  ? finish_task_switch.isra.0+0x153/0x700
[   19.513345]  ? __switch_to+0x5d9/0xf60
[   19.513348]  ? dequeue_task_fair+0x166/0x4e0
[   19.513352]  ? __schedule+0x10cc/0x2b30
[   19.513357]  krealloc_less_oob+0x1c/0x30
[   19.513362]  kunit_try_run_case+0x1a2/0x480
[   19.513366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.513370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.513374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.513378]  ? __kthread_parkme+0x82/0x180
[   19.513382]  ? preempt_count_sub+0x50/0x80
[   19.513387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.513391]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.513395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.513399]  kthread+0x334/0x6f0
[   19.513403]  ? trace_preempt_on+0x20/0xc0
[   19.513407]  ? __pfx_kthread+0x10/0x10
[   19.513411]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.513415]  ? calculate_sigpending+0x7b/0xa0
[   19.513419]  ? __pfx_kthread+0x10/0x10
[   19.513423]  ret_from_fork+0x3e/0x80
[   19.513427]  ? __pfx_kthread+0x10/0x10
[   19.513431]  ret_from_fork_asm+0x1a/0x30
[   19.513437]  </TASK>
[   19.513438] 
[   19.692745] Allocated by task 201:
[   19.696150]  kasan_save_stack+0x45/0x70
[   19.699990]  kasan_save_track+0x18/0x40
[   19.703828]  kasan_save_alloc_info+0x3b/0x50
[   19.708104]  __kasan_krealloc+0x190/0x1f0
[   19.712116]  krealloc_noprof+0xf3/0x340
[   19.715962]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.720756]  krealloc_less_oob+0x1c/0x30
[   19.724704]  kunit_try_run_case+0x1a2/0x480
[   19.728908]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.734310]  kthread+0x334/0x6f0
[   19.737543]  ret_from_fork+0x3e/0x80
[   19.741130]  ret_from_fork_asm+0x1a/0x30
[   19.745064] 
[   19.746563] The buggy address belongs to the object at ffff888100350e00
[   19.746563]  which belongs to the cache kmalloc-256 of size 256
[   19.759077] The buggy address is located 33 bytes to the right of
[   19.759077]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   19.772111] 
[   19.773611] The buggy address belongs to the physical page:
[   19.779182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   19.787181] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.794834] flags: 0x200000000000040(head|node=0|zone=2)
[   19.800145] page_type: f5(slab)
[   19.803292] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.811032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.818773] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.826607] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.834439] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   19.842266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.850098] page dumped because: kasan: bad access detected
[   19.855689] 
[   19.857214] Memory state around the buggy address:
[   19.862005]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.869225]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.876445] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.883664]                                                           ^
[   19.890309]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.897530]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904749] ==================================================================
[   19.911990] ==================================================================
[   19.919220] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   19.926875] Write of size 1 at addr ffff888100350eeb by task kunit_try_catch/201
[   19.934275] 
[   19.935776] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.935784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935785] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.935788] Call Trace:
[   19.935790]  <TASK>
[   19.935791]  dump_stack_lvl+0x73/0xb0
[   19.935795]  print_report+0xd1/0x650
[   19.935799]  ? __virt_addr_valid+0x1db/0x2d0
[   19.935802]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   19.935807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.935811]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   19.935815]  kasan_report+0x141/0x180
[   19.935820]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   19.935825]  __asan_report_store1_noabort+0x1b/0x30
[   19.935829]  krealloc_less_oob_helper+0xd47/0x11d0
[   19.935834]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.935838]  ? finish_task_switch.isra.0+0x153/0x700
[   19.935843]  ? __switch_to+0x5d9/0xf60
[   19.935846]  ? dequeue_task_fair+0x166/0x4e0
[   19.935850]  ? __schedule+0x10cc/0x2b30
[   19.935855]  krealloc_less_oob+0x1c/0x30
[   19.935859]  kunit_try_run_case+0x1a2/0x480
[   19.935864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.935868]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.935872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.935876]  ? __kthread_parkme+0x82/0x180
[   19.935880]  ? preempt_count_sub+0x50/0x80
[   19.935885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.935889]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.935893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.935897]  kthread+0x334/0x6f0
[   19.935901]  ? trace_preempt_on+0x20/0xc0
[   19.935905]  ? __pfx_kthread+0x10/0x10
[   19.935909]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.935913]  ? calculate_sigpending+0x7b/0xa0
[   19.935917]  ? __pfx_kthread+0x10/0x10
[   19.935921]  ret_from_fork+0x3e/0x80
[   19.935925]  ? __pfx_kthread+0x10/0x10
[   19.935929]  ret_from_fork_asm+0x1a/0x30
[   19.935935]  </TASK>
[   19.935936] 
[   20.115147] Allocated by task 201:
[   20.118555]  kasan_save_stack+0x45/0x70
[   20.122401]  kasan_save_track+0x18/0x40
[   20.126241]  kasan_save_alloc_info+0x3b/0x50
[   20.130513]  __kasan_krealloc+0x190/0x1f0
[   20.134526]  krealloc_noprof+0xf3/0x340
[   20.138365]  krealloc_less_oob_helper+0x1aa/0x11d0
[   20.143156]  krealloc_less_oob+0x1c/0x30
[   20.147083]  kunit_try_run_case+0x1a2/0x480
[   20.151269]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.156667]  kthread+0x334/0x6f0
[   20.159953]  ret_from_fork+0x3e/0x80
[   20.163533]  ret_from_fork_asm+0x1a/0x30
[   20.167456] 
[   20.168957] The buggy address belongs to the object at ffff888100350e00
[   20.168957]  which belongs to the cache kmalloc-256 of size 256
[   20.181470] The buggy address is located 34 bytes to the right of
[   20.181470]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   20.194504] 
[   20.196005] The buggy address belongs to the physical page:
[   20.201577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   20.209577] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.217236] flags: 0x200000000000040(head|node=0|zone=2)
[   20.222549] page_type: f5(slab)
[   20.225715] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.233461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.241201] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.249033] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.256860] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   20.264717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.272555] page dumped because: kasan: bad access detected
[   20.278126] 
[   20.279626] Memory state around the buggy address:
[   20.284419]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.291646]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.298865] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.306084]                                                           ^
[   20.312700]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.319942]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.327160] ==================================================================
[   18.645988] ==================================================================
[   18.653218] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   18.660881] Write of size 1 at addr ffff888100350ed0 by task kunit_try_catch/201
[   18.668279] 
[   18.669781] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.669789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.669791] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.669794] Call Trace:
[   18.669796]  <TASK>
[   18.669797]  dump_stack_lvl+0x73/0xb0
[   18.669801]  print_report+0xd1/0x650
[   18.669805]  ? __virt_addr_valid+0x1db/0x2d0
[   18.669809]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.669813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.669817]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.669822]  kasan_report+0x141/0x180
[   18.669826]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.669832]  __asan_report_store1_noabort+0x1b/0x30
[   18.669835]  krealloc_less_oob_helper+0xe23/0x11d0
[   18.669840]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.669845]  ? finish_task_switch.isra.0+0x153/0x700
[   18.669850]  ? __switch_to+0x5d9/0xf60
[   18.669853]  ? dequeue_task_fair+0x166/0x4e0
[   18.669858]  ? __schedule+0x10cc/0x2b30
[   18.669863]  krealloc_less_oob+0x1c/0x30
[   18.669867]  kunit_try_run_case+0x1a2/0x480
[   18.669871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.669875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.669879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.669884]  ? __kthread_parkme+0x82/0x180
[   18.669888]  ? preempt_count_sub+0x50/0x80
[   18.669892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.669896]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.669900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.669904]  kthread+0x334/0x6f0
[   18.669908]  ? trace_preempt_on+0x20/0xc0
[   18.669912]  ? __pfx_kthread+0x10/0x10
[   18.669916]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.669920]  ? calculate_sigpending+0x7b/0xa0
[   18.669924]  ? __pfx_kthread+0x10/0x10
[   18.669928]  ret_from_fork+0x3e/0x80
[   18.669932]  ? __pfx_kthread+0x10/0x10
[   18.669936]  ret_from_fork_asm+0x1a/0x30
[   18.669942]  </TASK>
[   18.669944] 
[   18.849190] Allocated by task 201:
[   18.852595]  kasan_save_stack+0x45/0x70
[   18.856434]  kasan_save_track+0x18/0x40
[   18.860274]  kasan_save_alloc_info+0x3b/0x50
[   18.864555]  __kasan_krealloc+0x190/0x1f0
[   18.868566]  krealloc_noprof+0xf3/0x340
[   18.872404]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.877198]  krealloc_less_oob+0x1c/0x30
[   18.881123]  kunit_try_run_case+0x1a2/0x480
[   18.885309]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.890722]  kthread+0x334/0x6f0
[   18.893967]  ret_from_fork+0x3e/0x80
[   18.897545]  ret_from_fork_asm+0x1a/0x30
[   18.901473] 
[   18.902970] The buggy address belongs to the object at ffff888100350e00
[   18.902970]  which belongs to the cache kmalloc-256 of size 256
[   18.915478] The buggy address is located 7 bytes to the right of
[   18.915478]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   18.928432] 
[   18.929932] The buggy address belongs to the physical page:
[   18.935506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   18.943512] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.951165] flags: 0x200000000000040(head|node=0|zone=2)
[   18.956477] page_type: f5(slab)
[   18.959622] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.967363] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.975110] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.982935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.990763] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   18.998595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.006422] page dumped because: kasan: bad access detected
[   19.011993] 
[   19.013493] Memory state around the buggy address:
[   19.018284]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.025503]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.032731] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.039950]                                                  ^
[   19.045784]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.053011]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.060230] ==================================================================
[   21.036104] ==================================================================
[   21.047720] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.055385] Write of size 1 at addr ffff888106ce20c9 by task kunit_try_catch/205
[   21.062778] 
[   21.064278] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.064287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.064289] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.064292] Call Trace:
[   21.064294]  <TASK>
[   21.064296]  dump_stack_lvl+0x73/0xb0
[   21.064300]  print_report+0xd1/0x650
[   21.064304]  ? __virt_addr_valid+0x1db/0x2d0
[   21.064308]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.064312]  ? kasan_addr_to_slab+0x11/0xa0
[   21.064316]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.064320]  kasan_report+0x141/0x180
[   21.064325]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.064330]  __asan_report_store1_noabort+0x1b/0x30
[   21.064334]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.064339]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.064343]  ? finish_task_switch.isra.0+0x153/0x700
[   21.064348]  ? __switch_to+0x5d9/0xf60
[   21.064351]  ? dequeue_task_fair+0x166/0x4e0
[   21.064356]  ? __schedule+0x10cc/0x2b30
[   21.064361]  krealloc_large_less_oob+0x1c/0x30
[   21.064365]  kunit_try_run_case+0x1a2/0x480
[   21.064369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.064373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.064378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.064383]  ? __kthread_parkme+0x82/0x180
[   21.064386]  ? preempt_count_sub+0x50/0x80
[   21.064391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.064395]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.064399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.064403]  kthread+0x334/0x6f0
[   21.064407]  ? trace_preempt_on+0x20/0xc0
[   21.064411]  ? __pfx_kthread+0x10/0x10
[   21.064416]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.064420]  ? calculate_sigpending+0x7b/0xa0
[   21.064423]  ? __pfx_kthread+0x10/0x10
[   21.064428]  ret_from_fork+0x3e/0x80
[   21.064432]  ? __pfx_kthread+0x10/0x10
[   21.064436]  ret_from_fork_asm+0x1a/0x30
[   21.064442]  </TASK>
[   21.064443] 
[   21.243070] The buggy address belongs to the physical page:
[   21.248646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   21.256651] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.264305] flags: 0x200000000000040(head|node=0|zone=2)
[   21.269625] page_type: f8(unknown)
[   21.273031] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.280771] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.288517] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.296342] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.304169] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   21.311995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.319827] page dumped because: kasan: bad access detected
[   21.325399] 
[   21.326901] Memory state around the buggy address:
[   21.331701]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.338947]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.346167] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.353392]                                               ^
[   21.358966]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.366185]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.373404] ==================================================================
[   22.061546] ==================================================================
[   22.068785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   22.076446] Write of size 1 at addr ffff888106ce20ea by task kunit_try_catch/205
[   22.083848] 
[   22.085347] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.085354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.085356] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.085359] Call Trace:
[   22.085361]  <TASK>
[   22.085362]  dump_stack_lvl+0x73/0xb0
[   22.085366]  print_report+0xd1/0x650
[   22.085370]  ? __virt_addr_valid+0x1db/0x2d0
[   22.085373]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.085378]  ? kasan_addr_to_slab+0x11/0xa0
[   22.085381]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.085386]  kasan_report+0x141/0x180
[   22.085390]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.085396]  __asan_report_store1_noabort+0x1b/0x30
[   22.085399]  krealloc_less_oob_helper+0xe90/0x11d0
[   22.085404]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.085409]  ? finish_task_switch.isra.0+0x153/0x700
[   22.085413]  ? __switch_to+0x5d9/0xf60
[   22.085417]  ? dequeue_task_fair+0x166/0x4e0
[   22.085421]  ? __schedule+0x10cc/0x2b30
[   22.085426]  krealloc_large_less_oob+0x1c/0x30
[   22.085430]  kunit_try_run_case+0x1a2/0x480
[   22.085434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.085438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.085443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.085447]  ? __kthread_parkme+0x82/0x180
[   22.085451]  ? preempt_count_sub+0x50/0x80
[   22.085456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.085460]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.085464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.085468]  kthread+0x334/0x6f0
[   22.085472]  ? trace_preempt_on+0x20/0xc0
[   22.085476]  ? __pfx_kthread+0x10/0x10
[   22.085480]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.085484]  ? calculate_sigpending+0x7b/0xa0
[   22.085488]  ? __pfx_kthread+0x10/0x10
[   22.085492]  ret_from_fork+0x3e/0x80
[   22.085496]  ? __pfx_kthread+0x10/0x10
[   22.085500]  ret_from_fork_asm+0x1a/0x30
[   22.085506]  </TASK>
[   22.085507] 
[   22.264068] The buggy address belongs to the physical page:
[   22.269642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   22.277642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.285295] flags: 0x200000000000040(head|node=0|zone=2)
[   22.290613] page_type: f8(unknown)
[   22.294021] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.301759] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.309498] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.317327] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.325151] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   22.332986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.340817] page dumped because: kasan: bad access detected
[   22.346392] 
[   22.347891] Memory state around the buggy address:
[   22.352714]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.359947]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.367165] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.374383]                                                           ^
[   22.380994]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.388213]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.395433] ==================================================================
[   22.402660] ==================================================================
[   22.409940] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   22.417592] Write of size 1 at addr ffff888106ce20eb by task kunit_try_catch/205
[   22.424985] 
[   22.426487] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.426494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.426496] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.426499] Call Trace:
[   22.426501]  <TASK>
[   22.426502]  dump_stack_lvl+0x73/0xb0
[   22.426506]  print_report+0xd1/0x650
[   22.426510]  ? __virt_addr_valid+0x1db/0x2d0
[   22.426513]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.426518]  ? kasan_addr_to_slab+0x11/0xa0
[   22.426521]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.426526]  kasan_report+0x141/0x180
[   22.426530]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.426536]  __asan_report_store1_noabort+0x1b/0x30
[   22.426539]  krealloc_less_oob_helper+0xd47/0x11d0
[   22.426544]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.426549]  ? finish_task_switch.isra.0+0x153/0x700
[   22.426553]  ? __switch_to+0x5d9/0xf60
[   22.426557]  ? dequeue_task_fair+0x166/0x4e0
[   22.426561]  ? __schedule+0x10cc/0x2b30
[   22.426566]  krealloc_large_less_oob+0x1c/0x30
[   22.426570]  kunit_try_run_case+0x1a2/0x480
[   22.426575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.426579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.426583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.426587]  ? __kthread_parkme+0x82/0x180
[   22.426591]  ? preempt_count_sub+0x50/0x80
[   22.426596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.426600]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.426604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.426608]  kthread+0x334/0x6f0
[   22.426612]  ? trace_preempt_on+0x20/0xc0
[   22.426616]  ? __pfx_kthread+0x10/0x10
[   22.426620]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.426624]  ? calculate_sigpending+0x7b/0xa0
[   22.426628]  ? __pfx_kthread+0x10/0x10
[   22.426632]  ret_from_fork+0x3e/0x80
[   22.426636]  ? __pfx_kthread+0x10/0x10
[   22.426640]  ret_from_fork_asm+0x1a/0x30
[   22.426645]  </TASK>
[   22.426647] 
[   22.605287] The buggy address belongs to the physical page:
[   22.610860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   22.618868] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.626521] flags: 0x200000000000040(head|node=0|zone=2)
[   22.631831] page_type: f8(unknown)
[   22.635238] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.642979] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.650732] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.658559] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.666384] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   22.674210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.682036] page dumped because: kasan: bad access detected
[   22.687607] 
[   22.689107] Memory state around the buggy address:
[   22.693898]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.701120]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.708346] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.715565]                                                           ^
[   22.722179]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.729404]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.736625] ==================================================================
[   21.380660] ==================================================================
[   21.387885] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.395546] Write of size 1 at addr ffff888106ce20d0 by task kunit_try_catch/205
[   21.402946] 
[   21.404446] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.404454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.404456] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.404459] Call Trace:
[   21.404460]  <TASK>
[   21.404462]  dump_stack_lvl+0x73/0xb0
[   21.404466]  print_report+0xd1/0x650
[   21.404470]  ? __virt_addr_valid+0x1db/0x2d0
[   21.404474]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.404478]  ? kasan_addr_to_slab+0x11/0xa0
[   21.404482]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.404486]  kasan_report+0x141/0x180
[   21.404490]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.404496]  __asan_report_store1_noabort+0x1b/0x30
[   21.404500]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.404504]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.404509]  ? finish_task_switch.isra.0+0x153/0x700
[   21.404513]  ? __switch_to+0x5d9/0xf60
[   21.404517]  ? dequeue_task_fair+0x166/0x4e0
[   21.404521]  ? __schedule+0x10cc/0x2b30
[   21.404526]  krealloc_large_less_oob+0x1c/0x30
[   21.404531]  kunit_try_run_case+0x1a2/0x480
[   21.404535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.404539]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.404543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.404548]  ? __kthread_parkme+0x82/0x180
[   21.404552]  ? preempt_count_sub+0x50/0x80
[   21.404556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.404560]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.404564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.404568]  kthread+0x334/0x6f0
[   21.404572]  ? trace_preempt_on+0x20/0xc0
[   21.404576]  ? __pfx_kthread+0x10/0x10
[   21.404581]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.404585]  ? calculate_sigpending+0x7b/0xa0
[   21.404588]  ? __pfx_kthread+0x10/0x10
[   21.404593]  ret_from_fork+0x3e/0x80
[   21.404597]  ? __pfx_kthread+0x10/0x10
[   21.404601]  ret_from_fork_asm+0x1a/0x30
[   21.404606]  </TASK>
[   21.404608] 
[   21.583197] The buggy address belongs to the physical page:
[   21.588767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   21.596766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.604419] flags: 0x200000000000040(head|node=0|zone=2)
[   21.609732] page_type: f8(unknown)
[   21.613138] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.620878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.628617] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.636442] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.644268] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   21.652093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.659918] page dumped because: kasan: bad access detected
[   21.665492] 
[   21.666989] Memory state around the buggy address:
[   21.671784]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.679003]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.686222] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.693439]                                                  ^
[   21.699272]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.706491]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.713712] ==================================================================
[   21.720982] ==================================================================
[   21.728208] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.735860] Write of size 1 at addr ffff888106ce20da by task kunit_try_catch/205
[   21.743253] 
[   21.744753] CPU: 3 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.744761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.744763] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.744766] Call Trace:
[   21.744768]  <TASK>
[   21.744769]  dump_stack_lvl+0x73/0xb0
[   21.744773]  print_report+0xd1/0x650
[   21.744777]  ? __virt_addr_valid+0x1db/0x2d0
[   21.744780]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.744785]  ? kasan_addr_to_slab+0x11/0xa0
[   21.744789]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.744793]  kasan_report+0x141/0x180
[   21.744797]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.744803]  __asan_report_store1_noabort+0x1b/0x30
[   21.744807]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.744811]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.744816]  ? finish_task_switch.isra.0+0x153/0x700
[   21.744820]  ? __switch_to+0x5d9/0xf60
[   21.744824]  ? dequeue_task_fair+0x166/0x4e0
[   21.744828]  ? __schedule+0x10cc/0x2b30
[   21.744833]  krealloc_large_less_oob+0x1c/0x30
[   21.744838]  kunit_try_run_case+0x1a2/0x480
[   21.744842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.744846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.744850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.744855]  ? __kthread_parkme+0x82/0x180
[   21.744859]  ? preempt_count_sub+0x50/0x80
[   21.744863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.744868]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.744871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.744875]  kthread+0x334/0x6f0
[   21.744879]  ? trace_preempt_on+0x20/0xc0
[   21.744884]  ? __pfx_kthread+0x10/0x10
[   21.744888]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.744892]  ? calculate_sigpending+0x7b/0xa0
[   21.744896]  ? __pfx_kthread+0x10/0x10
[   21.744900]  ret_from_fork+0x3e/0x80
[   21.744904]  ? __pfx_kthread+0x10/0x10
[   21.744908]  ret_from_fork_asm+0x1a/0x30
[   21.744913]  </TASK>
[   21.744915] 
[   21.923469] The buggy address belongs to the physical page:
[   21.929041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ce0
[   21.937047] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.944704] flags: 0x200000000000040(head|node=0|zone=2)
[   21.950040] page_type: f8(unknown)
[   21.953446] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.961184] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.968925] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.976759] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.984591] head: 0200000000000002 ffffea00041b3801 00000000ffffffff 00000000ffffffff
[   21.992419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.000250] page dumped because: kasan: bad access detected
[   22.005823] 
[   22.007323] Memory state around the buggy address:
[   22.012118]  ffff888106ce1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.019345]  ffff888106ce2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.026572] >ffff888106ce2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.033791]                                                     ^
[   22.039882]  ffff888106ce2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.047100]  ffff888106ce2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.054322] ==================================================================
[   19.067495] ==================================================================
[   19.074745] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   19.082407] Write of size 1 at addr ffff888100350eda by task kunit_try_catch/201
[   19.089808] 
[   19.091309] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.091316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.091318] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.091321] Call Trace:
[   19.091323]  <TASK>
[   19.091325]  dump_stack_lvl+0x73/0xb0
[   19.091328]  print_report+0xd1/0x650
[   19.091332]  ? __virt_addr_valid+0x1db/0x2d0
[   19.091336]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.091340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.091344]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.091349]  kasan_report+0x141/0x180
[   19.091353]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.091358]  __asan_report_store1_noabort+0x1b/0x30
[   19.091362]  krealloc_less_oob_helper+0xec6/0x11d0
[   19.091367]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.091372]  ? finish_task_switch.isra.0+0x153/0x700
[   19.091376]  ? __switch_to+0x5d9/0xf60
[   19.091380]  ? dequeue_task_fair+0x166/0x4e0
[   19.091384]  ? __schedule+0x10cc/0x2b30
[   19.091389]  krealloc_less_oob+0x1c/0x30
[   19.091393]  kunit_try_run_case+0x1a2/0x480
[   19.091397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.091401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.091406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.091410]  ? __kthread_parkme+0x82/0x180
[   19.091414]  ? preempt_count_sub+0x50/0x80
[   19.091418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.091423]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.091426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.091430]  kthread+0x334/0x6f0
[   19.091434]  ? trace_preempt_on+0x20/0xc0
[   19.091439]  ? __pfx_kthread+0x10/0x10
[   19.091443]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.091447]  ? calculate_sigpending+0x7b/0xa0
[   19.091450]  ? __pfx_kthread+0x10/0x10
[   19.091455]  ret_from_fork+0x3e/0x80
[   19.091459]  ? __pfx_kthread+0x10/0x10
[   19.091463]  ret_from_fork_asm+0x1a/0x30
[   19.091468]  </TASK>
[   19.091470] 
[   19.270750] Allocated by task 201:
[   19.274156]  kasan_save_stack+0x45/0x70
[   19.277995]  kasan_save_track+0x18/0x40
[   19.281835]  kasan_save_alloc_info+0x3b/0x50
[   19.286106]  __kasan_krealloc+0x190/0x1f0
[   19.290120]  krealloc_noprof+0xf3/0x340
[   19.293959]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.298761]  krealloc_less_oob+0x1c/0x30
[   19.302715]  kunit_try_run_case+0x1a2/0x480
[   19.306914]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.312314]  kthread+0x334/0x6f0
[   19.315546]  ret_from_fork+0x3e/0x80
[   19.319126]  ret_from_fork_asm+0x1a/0x30
[   19.323053] 
[   19.324552] The buggy address belongs to the object at ffff888100350e00
[   19.324552]  which belongs to the cache kmalloc-256 of size 256
[   19.337065] The buggy address is located 17 bytes to the right of
[   19.337065]  allocated 201-byte region [ffff888100350e00, ffff888100350ec9)
[   19.350100] 
[   19.351599] The buggy address belongs to the physical page:
[   19.357170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   19.365169] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.372821] flags: 0x200000000000040(head|node=0|zone=2)
[   19.378135] page_type: f5(slab)
[   19.381282] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.389029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.396768] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.404603] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.412437] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   19.420272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.428105] page dumped because: kasan: bad access detected
[   19.433716] 
[   19.435218] Memory state around the buggy address:
[   19.440011]  ffff888100350d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.447232]  ffff888100350e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.454459] >ffff888100350e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.461701]                                                     ^
[   19.467822]  ffff888100350f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.475041]  ffff888100350f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.482261] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   20.342783] ==================================================================
[   20.353878] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   20.361452] Write of size 1 at addr ffff888105eba0eb by task kunit_try_catch/203
[   20.368843] 
[   20.370344] CPU: 2 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   20.370352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.370354] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.370358] Call Trace:
[   20.370359]  <TASK>
[   20.370361]  dump_stack_lvl+0x73/0xb0
[   20.370365]  print_report+0xd1/0x650
[   20.370369]  ? __virt_addr_valid+0x1db/0x2d0
[   20.370373]  ? krealloc_more_oob_helper+0x821/0x930
[   20.370378]  ? kasan_addr_to_slab+0x11/0xa0
[   20.370382]  ? krealloc_more_oob_helper+0x821/0x930
[   20.370386]  kasan_report+0x141/0x180
[   20.370390]  ? krealloc_more_oob_helper+0x821/0x930
[   20.370396]  __asan_report_store1_noabort+0x1b/0x30
[   20.370399]  krealloc_more_oob_helper+0x821/0x930
[   20.370404]  ? __schedule+0x10cc/0x2b30
[   20.370408]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.370413]  ? finish_task_switch.isra.0+0x153/0x700
[   20.370417]  ? __switch_to+0x5d9/0xf60
[   20.370421]  ? dequeue_task_fair+0x166/0x4e0
[   20.370425]  ? __schedule+0x10cc/0x2b30
[   20.370430]  krealloc_large_more_oob+0x1c/0x30
[   20.370434]  kunit_try_run_case+0x1a2/0x480
[   20.370439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.370443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.370447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.370452]  ? __kthread_parkme+0x82/0x180
[   20.370456]  ? preempt_count_sub+0x50/0x80
[   20.370460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.370465]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.370469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.370473]  kthread+0x334/0x6f0
[   20.370477]  ? trace_preempt_on+0x20/0xc0
[   20.370481]  ? __pfx_kthread+0x10/0x10
[   20.370485]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.370489]  ? calculate_sigpending+0x7b/0xa0
[   20.370493]  ? __pfx_kthread+0x10/0x10
[   20.370497]  ret_from_fork+0x3e/0x80
[   20.370501]  ? __pfx_kthread+0x10/0x10
[   20.370505]  ret_from_fork_asm+0x1a/0x30
[   20.370511]  </TASK>
[   20.370512] 
[   20.552456] The buggy address belongs to the physical page:
[   20.558029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8
[   20.566036] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.573688] flags: 0x200000000000040(head|node=0|zone=2)
[   20.579026] page_type: f8(unknown)
[   20.582433] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.590173] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.597912] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.605737] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.613562] head: 0200000000000002 ffffea000417ae01 00000000ffffffff 00000000ffffffff
[   20.621388] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.629213] page dumped because: kasan: bad access detected
[   20.634787] 
[   20.636285] Memory state around the buggy address:
[   20.641077]  ffff888105eb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.648297]  ffff888105eba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.655516] >ffff888105eba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.662735]                                                           ^
[   20.669348]  ffff888105eba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.676567]  ffff888105eba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.683785] ==================================================================
[   20.691069] ==================================================================
[   20.698300] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   20.705867] Write of size 1 at addr ffff888105eba0f0 by task kunit_try_catch/203
[   20.713260] 
[   20.714758] CPU: 2 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   20.714766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.714768] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.714772] Call Trace:
[   20.714773]  <TASK>
[   20.714775]  dump_stack_lvl+0x73/0xb0
[   20.714779]  print_report+0xd1/0x650
[   20.714783]  ? __virt_addr_valid+0x1db/0x2d0
[   20.714786]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.714791]  ? kasan_addr_to_slab+0x11/0xa0
[   20.714795]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.714799]  kasan_report+0x141/0x180
[   20.714803]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.714809]  __asan_report_store1_noabort+0x1b/0x30
[   20.714812]  krealloc_more_oob_helper+0x7eb/0x930
[   20.714817]  ? __schedule+0x10cc/0x2b30
[   20.714821]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.714826]  ? finish_task_switch.isra.0+0x153/0x700
[   20.714830]  ? __switch_to+0x5d9/0xf60
[   20.714834]  ? dequeue_task_fair+0x166/0x4e0
[   20.714838]  ? __schedule+0x10cc/0x2b30
[   20.714843]  krealloc_large_more_oob+0x1c/0x30
[   20.714847]  kunit_try_run_case+0x1a2/0x480
[   20.714852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.714856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.714860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.714865]  ? __kthread_parkme+0x82/0x180
[   20.714869]  ? preempt_count_sub+0x50/0x80
[   20.714873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.714877]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.714881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.714885]  kthread+0x334/0x6f0
[   20.714889]  ? trace_preempt_on+0x20/0xc0
[   20.714893]  ? __pfx_kthread+0x10/0x10
[   20.714897]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.714901]  ? calculate_sigpending+0x7b/0xa0
[   20.714905]  ? __pfx_kthread+0x10/0x10
[   20.714909]  ret_from_fork+0x3e/0x80
[   20.714913]  ? __pfx_kthread+0x10/0x10
[   20.714917]  ret_from_fork_asm+0x1a/0x30
[   20.714923]  </TASK>
[   20.714925] 
[   20.896898] The buggy address belongs to the physical page:
[   20.902469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8
[   20.910470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.918128] flags: 0x200000000000040(head|node=0|zone=2)
[   20.923442] page_type: f8(unknown)
[   20.926850] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.934588] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.942335] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.950161] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.957985] head: 0200000000000002 ffffea000417ae01 00000000ffffffff 00000000ffffffff
[   20.965811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.973636] page dumped because: kasan: bad access detected
[   20.979210] 
[   20.980731] Memory state around the buggy address:
[   20.985529]  ffff888105eb9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.992756]  ffff888105eba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.999974] >ffff888105eba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.007194]                                                              ^
[   21.014067]  ffff888105eba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.021284]  ffff888105eba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.028504] ==================================================================
[   17.794697] ==================================================================
[   17.801948] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   17.809513] Write of size 1 at addr ffff8881038caaf0 by task kunit_try_catch/199
[   17.816907] 
[   17.818408] CPU: 3 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.818416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.818418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.818421] Call Trace:
[   17.818423]  <TASK>
[   17.818424]  dump_stack_lvl+0x73/0xb0
[   17.818428]  print_report+0xd1/0x650
[   17.818432]  ? __virt_addr_valid+0x1db/0x2d0
[   17.818436]  ? krealloc_more_oob_helper+0x7eb/0x930
[   17.818440]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.818444]  ? krealloc_more_oob_helper+0x7eb/0x930
[   17.818449]  kasan_report+0x141/0x180
[   17.818453]  ? krealloc_more_oob_helper+0x7eb/0x930
[   17.818459]  __asan_report_store1_noabort+0x1b/0x30
[   17.818462]  krealloc_more_oob_helper+0x7eb/0x930
[   17.818467]  ? __schedule+0x10cc/0x2b30
[   17.818471]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   17.818476]  ? finish_task_switch.isra.0+0x153/0x700
[   17.818480]  ? __switch_to+0x5d9/0xf60
[   17.818484]  ? dequeue_task_fair+0x166/0x4e0
[   17.818488]  ? __schedule+0x10cc/0x2b30
[   17.818493]  krealloc_more_oob+0x1c/0x30
[   17.818497]  kunit_try_run_case+0x1a2/0x480
[   17.818501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.818505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.818510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.818514]  ? __kthread_parkme+0x82/0x180
[   17.818518]  ? preempt_count_sub+0x50/0x80
[   17.818523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.818527]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.818531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.818535]  kthread+0x334/0x6f0
[   17.818539]  ? trace_preempt_on+0x20/0xc0
[   17.818543]  ? __pfx_kthread+0x10/0x10
[   17.818547]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.818551]  ? calculate_sigpending+0x7b/0xa0
[   17.818555]  ? __pfx_kthread+0x10/0x10
[   17.818559]  ret_from_fork+0x3e/0x80
[   17.818563]  ? __pfx_kthread+0x10/0x10
[   17.818567]  ret_from_fork_asm+0x1a/0x30
[   17.818573]  </TASK>
[   17.818575] 
[   18.001227] Allocated by task 199:
[   18.004634]  kasan_save_stack+0x45/0x70
[   18.008473]  kasan_save_track+0x18/0x40
[   18.012314]  kasan_save_alloc_info+0x3b/0x50
[   18.016587]  __kasan_krealloc+0x190/0x1f0
[   18.020599]  krealloc_noprof+0xf3/0x340
[   18.024437]  krealloc_more_oob_helper+0x1a9/0x930
[   18.029143]  krealloc_more_oob+0x1c/0x30
[   18.033068]  kunit_try_run_case+0x1a2/0x480
[   18.037255]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.042654]  kthread+0x334/0x6f0
[   18.045885]  ret_from_fork+0x3e/0x80
[   18.049465]  ret_from_fork_asm+0x1a/0x30
[   18.053391] 
[   18.054890] The buggy address belongs to the object at ffff8881038caa00
[   18.054890]  which belongs to the cache kmalloc-256 of size 256
[   18.067398] The buggy address is located 5 bytes to the right of
[   18.067398]  allocated 235-byte region [ffff8881038caa00, ffff8881038caaeb)
[   18.080351] 
[   18.081852] The buggy address belongs to the physical page:
[   18.087424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca
[   18.095431] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.103082] flags: 0x200000000000040(head|node=0|zone=2)
[   18.108396] page_type: f5(slab)
[   18.111543] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.119282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.127030] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.134865] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.142706] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff
[   18.150558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.158382] page dumped because: kasan: bad access detected
[   18.163955] 
[   18.165455] Memory state around the buggy address:
[   18.170248]  ffff8881038ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.177467]  ffff8881038caa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.184704] >ffff8881038caa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.191921]                                                              ^
[   18.198794]  ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.206013]  ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.213232] ==================================================================
[   17.365445] ==================================================================
[   17.376246] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   17.383817] Write of size 1 at addr ffff8881038caaeb by task kunit_try_catch/199
[   17.391211] 
[   17.392713] CPU: 3 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.392734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.392736] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.392739] Call Trace:
[   17.392741]  <TASK>
[   17.392743]  dump_stack_lvl+0x73/0xb0
[   17.392747]  print_report+0xd1/0x650
[   17.392751]  ? __virt_addr_valid+0x1db/0x2d0
[   17.392755]  ? krealloc_more_oob_helper+0x821/0x930
[   17.392759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.392763]  ? krealloc_more_oob_helper+0x821/0x930
[   17.392768]  kasan_report+0x141/0x180
[   17.392772]  ? krealloc_more_oob_helper+0x821/0x930
[   17.392778]  __asan_report_store1_noabort+0x1b/0x30
[   17.392781]  krealloc_more_oob_helper+0x821/0x930
[   17.392786]  ? __schedule+0x10cc/0x2b30
[   17.392790]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   17.392795]  ? finish_task_switch.isra.0+0x153/0x700
[   17.392799]  ? __switch_to+0x5d9/0xf60
[   17.392803]  ? dequeue_task_fair+0x166/0x4e0
[   17.392809]  ? __schedule+0x10cc/0x2b30
[   17.392813]  krealloc_more_oob+0x1c/0x30
[   17.392818]  kunit_try_run_case+0x1a2/0x480
[   17.392822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.392826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.392831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.392835]  ? __kthread_parkme+0x82/0x180
[   17.392839]  ? preempt_count_sub+0x50/0x80
[   17.392843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.392848]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.392852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.392856]  kthread+0x334/0x6f0
[   17.392860]  ? trace_preempt_on+0x20/0xc0
[   17.392864]  ? __pfx_kthread+0x10/0x10
[   17.392868]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.392872]  ? calculate_sigpending+0x7b/0xa0
[   17.392876]  ? __pfx_kthread+0x10/0x10
[   17.392880]  ret_from_fork+0x3e/0x80
[   17.392884]  ? __pfx_kthread+0x10/0x10
[   17.392889]  ret_from_fork_asm+0x1a/0x30
[   17.392894]  </TASK>
[   17.392896] 
[   17.575567] Allocated by task 199:
[   17.578975]  kasan_save_stack+0x45/0x70
[   17.582821]  kasan_save_track+0x18/0x40
[   17.586660]  kasan_save_alloc_info+0x3b/0x50
[   17.590959]  __kasan_krealloc+0x190/0x1f0
[   17.594972]  krealloc_noprof+0xf3/0x340
[   17.598812]  krealloc_more_oob_helper+0x1a9/0x930
[   17.603525]  krealloc_more_oob+0x1c/0x30
[   17.607451]  kunit_try_run_case+0x1a2/0x480
[   17.611638]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.617035]  kthread+0x334/0x6f0
[   17.620268]  ret_from_fork+0x3e/0x80
[   17.623849]  ret_from_fork_asm+0x1a/0x30
[   17.627774] 
[   17.629274] The buggy address belongs to the object at ffff8881038caa00
[   17.629274]  which belongs to the cache kmalloc-256 of size 256
[   17.641788] The buggy address is located 0 bytes to the right of
[   17.641788]  allocated 235-byte region [ffff8881038caa00, ffff8881038caaeb)
[   17.654745] 
[   17.656242] The buggy address belongs to the physical page:
[   17.661815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca
[   17.669815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.677475] flags: 0x200000000000040(head|node=0|zone=2)
[   17.682786] page_type: f5(slab)
[   17.685935] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   17.693704] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.701464] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   17.709299] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.717131] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff
[   17.724959] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.732793] page dumped because: kasan: bad access detected
[   17.738363] 
[   17.739862] Memory state around the buggy address:
[   17.744656]  ffff8881038ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.751901]  ffff8881038caa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.759119] >ffff8881038caa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.766339]                                                           ^
[   17.772953]  ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.780178]  ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.787397] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   17.078843] ==================================================================
[   17.093916] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   17.100284] Read of size 1 at addr ffff888107fb0000 by task kunit_try_catch/197
[   17.107598] 
[   17.109099] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   17.109107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.109109] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.109113] Call Trace:
[   17.109114]  <TASK>
[   17.109116]  dump_stack_lvl+0x73/0xb0
[   17.109120]  print_report+0xd1/0x650
[   17.109125]  ? __virt_addr_valid+0x1db/0x2d0
[   17.109128]  ? page_alloc_uaf+0x356/0x3d0
[   17.109133]  ? kasan_addr_to_slab+0x11/0xa0
[   17.109136]  ? page_alloc_uaf+0x356/0x3d0
[   17.109141]  kasan_report+0x141/0x180
[   17.109145]  ? page_alloc_uaf+0x356/0x3d0
[   17.109150]  __asan_report_load1_noabort+0x18/0x20
[   17.109153]  page_alloc_uaf+0x356/0x3d0
[   17.109158]  ? __pfx_page_alloc_uaf+0x10/0x10
[   17.109162]  ? __schedule+0x10cc/0x2b30
[   17.109166]  ? ktime_get_ts64+0x83/0x230
[   17.109171]  kunit_try_run_case+0x1a2/0x480
[   17.109175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.109180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.109184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.109189]  ? __kthread_parkme+0x82/0x180
[   17.109193]  ? preempt_count_sub+0x50/0x80
[   17.109197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.109201]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.109205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.109209]  kthread+0x334/0x6f0
[   17.109213]  ? trace_preempt_on+0x20/0xc0
[   17.109218]  ? __pfx_kthread+0x10/0x10
[   17.109222]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.109226]  ? calculate_sigpending+0x7b/0xa0
[   17.109230]  ? __pfx_kthread+0x10/0x10
[   17.109234]  ret_from_fork+0x3e/0x80
[   17.109238]  ? __pfx_kthread+0x10/0x10
[   17.109242]  ret_from_fork_asm+0x1a/0x30
[   17.109248]  </TASK>
[   17.109249] 
[   17.269543] The buggy address belongs to the physical page:
[   17.275118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107fb0
[   17.283125] flags: 0x200000000000000(node=0|zone=2)
[   17.288003] page_type: f0(buddy)
[   17.291237] raw: 0200000000000000 ffff88846fffd3e0 ffff88846fffd3e0 0000000000000000
[   17.298978] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.306732] page dumped because: kasan: bad access detected
[   17.312303] 
[   17.313804] Memory state around the buggy address:
[   17.318596]  ffff888107faff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.325816]  ffff888107faff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.333034] >ffff888107fb0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.340252]                    ^
[   17.343486]  ffff888107fb0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.350704]  ffff888107fb0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.357940] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-invalid-free-in-kfree
[   16.746483] ==================================================================
[   16.757466] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   16.762871] Free of addr ffff888105eb8001 by task kunit_try_catch/193
[   16.769312] 
[   16.770812] CPU: 2 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   16.770821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.770823] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.770826] Call Trace:
[   16.770827]  <TASK>
[   16.770829]  dump_stack_lvl+0x73/0xb0
[   16.770833]  print_report+0xd1/0x650
[   16.770837]  ? __virt_addr_valid+0x1db/0x2d0
[   16.770841]  ? kasan_addr_to_slab+0x11/0xa0
[   16.770845]  ? kfree+0x274/0x3f0
[   16.770848]  kasan_report_invalid_free+0x10a/0x130
[   16.770853]  ? kfree+0x274/0x3f0
[   16.770856]  ? kfree+0x274/0x3f0
[   16.770859]  __kasan_kfree_large+0x86/0xd0
[   16.770863]  free_large_kmalloc+0x4b/0x110
[   16.770868]  kfree+0x274/0x3f0
[   16.770871]  kmalloc_large_invalid_free+0x120/0x2b0
[   16.770876]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   16.770880]  ? __schedule+0x10cc/0x2b30
[   16.770885]  ? ktime_get_ts64+0x83/0x230
[   16.770889]  kunit_try_run_case+0x1a2/0x480
[   16.770894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.770898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.770902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.770907]  ? __kthread_parkme+0x82/0x180
[   16.770911]  ? preempt_count_sub+0x50/0x80
[   16.770915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.770919]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.770923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.770927]  kthread+0x334/0x6f0
[   16.770931]  ? trace_preempt_on+0x20/0xc0
[   16.770936]  ? __pfx_kthread+0x10/0x10
[   16.770940]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.770944]  ? calculate_sigpending+0x7b/0xa0
[   16.770948]  ? __pfx_kthread+0x10/0x10
[   16.770952]  ret_from_fork+0x3e/0x80
[   16.770956]  ? __pfx_kthread+0x10/0x10
[   16.770960]  ret_from_fork_asm+0x1a/0x30
[   16.770965]  </TASK>
[   16.770967] 
[   16.938615] The buggy address belongs to the physical page:
[   16.944188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8
[   16.952194] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.959846] flags: 0x200000000000040(head|node=0|zone=2)
[   16.965160] page_type: f8(unknown)
[   16.968568] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.976313] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.984054] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.991886] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.999736] head: 0200000000000002 ffffea000417ae01 00000000ffffffff 00000000ffffffff
[   17.007565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.015398] page dumped because: kasan: bad access detected
[   17.020971] 
[   17.022470] Memory state around the buggy address:
[   17.027262]  ffff888105eb7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.034483]  ffff888105eb7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.041707] >ffff888105eb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.048954]                    ^
[   17.052186]  ffff888105eb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.059406]  ffff888105eb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.066625] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   16.465000] ==================================================================
[   16.476521] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   16.483144] Read of size 1 at addr ffff888105eb8000 by task kunit_try_catch/191
[   16.490455] 
[   16.491958] CPU: 2 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   16.491966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.491969] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.491972] Call Trace:
[   16.491973]  <TASK>
[   16.491975]  dump_stack_lvl+0x73/0xb0
[   16.491979]  print_report+0xd1/0x650
[   16.491984]  ? __virt_addr_valid+0x1db/0x2d0
[   16.491987]  ? kmalloc_large_uaf+0x2f1/0x340
[   16.491991]  ? kasan_addr_to_slab+0x11/0xa0
[   16.491995]  ? kmalloc_large_uaf+0x2f1/0x340
[   16.491999]  kasan_report+0x141/0x180
[   16.492003]  ? kmalloc_large_uaf+0x2f1/0x340
[   16.492008]  __asan_report_load1_noabort+0x18/0x20
[   16.492012]  kmalloc_large_uaf+0x2f1/0x340
[   16.492016]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   16.492020]  ? __schedule+0x10cc/0x2b30
[   16.492025]  ? ktime_get_ts64+0x83/0x230
[   16.492029]  kunit_try_run_case+0x1a2/0x480
[   16.492034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.492038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.492042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.492047]  ? __kthread_parkme+0x82/0x180
[   16.492051]  ? preempt_count_sub+0x50/0x80
[   16.492056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.492060]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.492064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.492068]  kthread+0x334/0x6f0
[   16.492072]  ? trace_preempt_on+0x20/0xc0
[   16.492076]  ? __pfx_kthread+0x10/0x10
[   16.492081]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.492085]  ? calculate_sigpending+0x7b/0xa0
[   16.492089]  ? __pfx_kthread+0x10/0x10
[   16.492093]  ret_from_fork+0x3e/0x80
[   16.492097]  ? __pfx_kthread+0x10/0x10
[   16.492101]  ret_from_fork_asm+0x1a/0x30
[   16.492107]  </TASK>
[   16.492109] 
[   16.653736] The buggy address belongs to the physical page:
[   16.659311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eb8
[   16.667317] flags: 0x200000000000000(node=0|zone=2)
[   16.672196] raw: 0200000000000000 ffffea000417af08 ffff88841f739a80 0000000000000000
[   16.679937] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.687703] page dumped because: kasan: bad access detected
[   16.693298] 
[   16.694796] Memory state around the buggy address:
[   16.699592]  ffff888105eb7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.706820]  ffff888105eb7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.714046] >ffff888105eb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.721265]                    ^
[   16.724497]  ffff888105eb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.731740]  ffff888105eb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.738961] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   16.136953] ==================================================================
[   16.148286] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   16.155775] Write of size 1 at addr ffff88810802a00a by task kunit_try_catch/189
[   16.163174] 
[   16.164692] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   16.164700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.164702] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.164718] Call Trace:
[   16.164719]  <TASK>
[   16.164721]  dump_stack_lvl+0x73/0xb0
[   16.164725]  print_report+0xd1/0x650
[   16.164730]  ? __virt_addr_valid+0x1db/0x2d0
[   16.164733]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.164737]  ? kasan_addr_to_slab+0x11/0xa0
[   16.164741]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.164745]  kasan_report+0x141/0x180
[   16.164750]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.164755]  __asan_report_store1_noabort+0x1b/0x30
[   16.164758]  kmalloc_large_oob_right+0x2e9/0x330
[   16.164762]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   16.164767]  ? __schedule+0x10cc/0x2b30
[   16.164771]  ? ktime_get_ts64+0x83/0x230
[   16.164776]  kunit_try_run_case+0x1a2/0x480
[   16.164780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.164784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.164789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.164793]  ? __kthread_parkme+0x82/0x180
[   16.164797]  ? preempt_count_sub+0x50/0x80
[   16.164802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.164806]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.164810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.164814]  kthread+0x334/0x6f0
[   16.164818]  ? trace_preempt_on+0x20/0xc0
[   16.164822]  ? __pfx_kthread+0x10/0x10
[   16.164826]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.164830]  ? calculate_sigpending+0x7b/0xa0
[   16.164834]  ? __pfx_kthread+0x10/0x10
[   16.164838]  ret_from_fork+0x3e/0x80
[   16.164842]  ? __pfx_kthread+0x10/0x10
[   16.164846]  ret_from_fork_asm+0x1a/0x30
[   16.164852]  </TASK>
[   16.164853] 
[   16.329118] The buggy address belongs to the physical page:
[   16.334701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108028
[   16.342746] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.350402] flags: 0x200000000000040(head|node=0|zone=2)
[   16.355734] page_type: f8(unknown)
[   16.359145] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.366885] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.374634] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.382466] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.390294] head: 0200000000000002 ffffea0004200a01 00000000ffffffff 00000000ffffffff
[   16.398128] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.405960] page dumped because: kasan: bad access detected
[   16.411532] 
[   16.413031] Memory state around the buggy address:
[   16.417824]  ffff888108029f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.425045]  ffff888108029f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.432264] >ffff88810802a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.439483]                       ^
[   16.442973]  ffff88810802a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.450192]  ffff88810802a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.457413] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   15.731298] ==================================================================
[   15.743779] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   15.751094] Write of size 1 at addr ffff888101a95f00 by task kunit_try_catch/187
[   15.758496] 
[   15.759996] CPU: 2 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.760004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.760006] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.760009] Call Trace:
[   15.760011]  <TASK>
[   15.760013]  dump_stack_lvl+0x73/0xb0
[   15.760017]  print_report+0xd1/0x650
[   15.760021]  ? __virt_addr_valid+0x1db/0x2d0
[   15.760025]  ? kmalloc_big_oob_right+0x316/0x370
[   15.760029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.760033]  ? kmalloc_big_oob_right+0x316/0x370
[   15.760038]  kasan_report+0x141/0x180
[   15.760042]  ? kmalloc_big_oob_right+0x316/0x370
[   15.760047]  __asan_report_store1_noabort+0x1b/0x30
[   15.760051]  kmalloc_big_oob_right+0x316/0x370
[   15.760055]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   15.760060]  ? __schedule+0x10cc/0x2b30
[   15.760064]  ? ktime_get_ts64+0x83/0x230
[   15.760069]  kunit_try_run_case+0x1a2/0x480
[   15.760073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.760082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.760086]  ? __kthread_parkme+0x82/0x180
[   15.760090]  ? preempt_count_sub+0x50/0x80
[   15.760095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760099]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.760103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.760107]  kthread+0x334/0x6f0
[   15.760111]  ? trace_preempt_on+0x20/0xc0
[   15.760116]  ? __pfx_kthread+0x10/0x10
[   15.760120]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.760124]  ? calculate_sigpending+0x7b/0xa0
[   15.760128]  ? __pfx_kthread+0x10/0x10
[   15.760132]  ret_from_fork+0x3e/0x80
[   15.760136]  ? __pfx_kthread+0x10/0x10
[   15.760141]  ret_from_fork_asm+0x1a/0x30
[   15.760146]  </TASK>
[   15.760148] 
[   15.924748] Allocated by task 187:
[   15.928154]  kasan_save_stack+0x45/0x70
[   15.931993]  kasan_save_track+0x18/0x40
[   15.935833]  kasan_save_alloc_info+0x3b/0x50
[   15.940105]  __kasan_kmalloc+0xb7/0xc0
[   15.943856]  __kmalloc_cache_noprof+0x189/0x420
[   15.948391]  kmalloc_big_oob_right+0xa9/0x370
[   15.952757]  kunit_try_run_case+0x1a2/0x480
[   15.956943]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.962342]  kthread+0x334/0x6f0
[   15.965575]  ret_from_fork+0x3e/0x80
[   15.969155]  ret_from_fork_asm+0x1a/0x30
[   15.973079] 
[   15.974571] The buggy address belongs to the object at ffff888101a94000
[   15.974571]  which belongs to the cache kmalloc-8k of size 8192
[   15.987087] The buggy address is located 0 bytes to the right of
[   15.987087]  allocated 7936-byte region [ffff888101a94000, ffff888101a95f00)
[   16.000127] 
[   16.001627] The buggy address belongs to the physical page:
[   16.007199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a90
[   16.015206] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.022858] flags: 0x200000000000040(head|node=0|zone=2)
[   16.028172] page_type: f5(slab)
[   16.031319] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   16.039066] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.046813] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   16.054640] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.062472] head: 0200000000000003 ffffea000406a401 00000000ffffffff 00000000ffffffff
[   16.070300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.078124] page dumped because: kasan: bad access detected
[   16.083700] 
[   16.085211] Memory state around the buggy address:
[   16.090006]  ffff888101a95e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.097225]  ffff888101a95e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.104443] >ffff888101a95f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.111661]                    ^
[   16.114922]  ffff888101a95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.122140]  ffff888101a96000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129360] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   15.179200] ==================================================================
[   15.190630] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.198735] Write of size 1 at addr ffff88810633a478 by task kunit_try_catch/185
[   15.206133] 
[   15.207634] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.207642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.207644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.207648] Call Trace:
[   15.207649]  <TASK>
[   15.207651]  dump_stack_lvl+0x73/0xb0
[   15.207655]  print_report+0xd1/0x650
[   15.207659]  ? __virt_addr_valid+0x1db/0x2d0
[   15.207663]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207685]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.207689]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207694]  kasan_report+0x141/0x180
[   15.207699]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207705]  __asan_report_store1_noabort+0x1b/0x30
[   15.207708]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.207726]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   15.207732]  ? __schedule+0x10cc/0x2b30
[   15.207736]  ? ktime_get_ts64+0x83/0x230
[   15.207741]  kunit_try_run_case+0x1a2/0x480
[   15.207745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.207749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.207754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.207758]  ? __kthread_parkme+0x82/0x180
[   15.207762]  ? preempt_count_sub+0x50/0x80
[   15.207767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.207771]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.207775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.207780]  kthread+0x334/0x6f0
[   15.207784]  ? trace_preempt_on+0x20/0xc0
[   15.207788]  ? __pfx_kthread+0x10/0x10
[   15.207792]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.207796]  ? calculate_sigpending+0x7b/0xa0
[   15.207800]  ? __pfx_kthread+0x10/0x10
[   15.207804]  ret_from_fork+0x3e/0x80
[   15.207808]  ? __pfx_kthread+0x10/0x10
[   15.207813]  ret_from_fork_asm+0x1a/0x30
[   15.207818]  </TASK>
[   15.207820] 
[   15.376434] Allocated by task 185:
[   15.379839]  kasan_save_stack+0x45/0x70
[   15.383704]  kasan_save_track+0x18/0x40
[   15.387570]  kasan_save_alloc_info+0x3b/0x50
[   15.391843]  __kasan_kmalloc+0xb7/0xc0
[   15.395596]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   15.401166]  kmalloc_track_caller_oob_right+0x99/0x520
[   15.406305]  kunit_try_run_case+0x1a2/0x480
[   15.410493]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.415898]  kthread+0x334/0x6f0
[   15.419131]  ret_from_fork+0x3e/0x80
[   15.422735]  ret_from_fork_asm+0x1a/0x30
[   15.426664] 
[   15.428189] The buggy address belongs to the object at ffff88810633a400
[   15.428189]  which belongs to the cache kmalloc-128 of size 128
[   15.440704] The buggy address is located 0 bytes to the right of
[   15.440704]  allocated 120-byte region [ffff88810633a400, ffff88810633a478)
[   15.453667] 
[   15.455194] The buggy address belongs to the physical page:
[   15.460764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10633a
[   15.468763] flags: 0x200000000000000(node=0|zone=2)
[   15.473643] page_type: f5(slab)
[   15.476789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   15.484529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.492275] page dumped because: kasan: bad access detected
[   15.497849] 
[   15.499346] Memory state around the buggy address:
[   15.504141]  ffff88810633a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.511359]  ffff88810633a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.518579] >ffff88810633a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.525796]                                                                 ^
[   15.532931]  ffff88810633a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540147]  ffff88810633a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.547368] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   14.774318] ==================================================================
[   14.785238] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   14.792638] Read of size 1 at addr ffff888105eed000 by task kunit_try_catch/183
[   14.799944] 
[   14.801436] CPU: 2 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.801444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.801446] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.801449] Call Trace:
[   14.801451]  <TASK>
[   14.801453]  dump_stack_lvl+0x73/0xb0
[   14.801456]  print_report+0xd1/0x650
[   14.801460]  ? __virt_addr_valid+0x1db/0x2d0
[   14.801464]  ? kmalloc_node_oob_right+0x369/0x3c0
[   14.801469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.801473]  ? kmalloc_node_oob_right+0x369/0x3c0
[   14.801477]  kasan_report+0x141/0x180
[   14.801481]  ? kmalloc_node_oob_right+0x369/0x3c0
[   14.801487]  __asan_report_load1_noabort+0x18/0x20
[   14.801491]  kmalloc_node_oob_right+0x369/0x3c0
[   14.801495]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   14.801500]  ? __schedule+0x10cc/0x2b30
[   14.801504]  ? ktime_get_ts64+0x83/0x230
[   14.801509]  kunit_try_run_case+0x1a2/0x480
[   14.801513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.801517]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.801522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.801526]  ? __kthread_parkme+0x82/0x180
[   14.801530]  ? preempt_count_sub+0x50/0x80
[   14.801535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.801539]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.801543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.801547]  kthread+0x334/0x6f0
[   14.801551]  ? trace_preempt_on+0x20/0xc0
[   14.801555]  ? __pfx_kthread+0x10/0x10
[   14.801559]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.801563]  ? calculate_sigpending+0x7b/0xa0
[   14.801567]  ? __pfx_kthread+0x10/0x10
[   14.801572]  ret_from_fork+0x3e/0x80
[   14.801576]  ? __pfx_kthread+0x10/0x10
[   14.801580]  ret_from_fork_asm+0x1a/0x30
[   14.801585]  </TASK>
[   14.801587] 
[   14.966528] Allocated by task 183:
[   14.969935]  kasan_save_stack+0x45/0x70
[   14.973782]  kasan_save_track+0x18/0x40
[   14.977620]  kasan_save_alloc_info+0x3b/0x50
[   14.981893]  __kasan_kmalloc+0xb7/0xc0
[   14.985645]  __kmalloc_cache_node_noprof+0x188/0x420
[   14.990611]  kmalloc_node_oob_right+0xab/0x3c0
[   14.995056]  kunit_try_run_case+0x1a2/0x480
[   14.999242]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.004642]  kthread+0x334/0x6f0
[   15.007874]  ret_from_fork+0x3e/0x80
[   15.011454]  ret_from_fork_asm+0x1a/0x30
[   15.015379] 
[   15.016880] The buggy address belongs to the object at ffff888105eec000
[   15.016880]  which belongs to the cache kmalloc-4k of size 4096
[   15.029394] The buggy address is located 0 bytes to the right of
[   15.029394]  allocated 4096-byte region [ffff888105eec000, ffff888105eed000)
[   15.042435] 
[   15.043935] The buggy address belongs to the physical page:
[   15.049507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ee8
[   15.057506] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.065158] flags: 0x200000000000040(head|node=0|zone=2)
[   15.070471] page_type: f5(slab)
[   15.073619] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000
[   15.081367] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   15.089114] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000
[   15.096947] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   15.104774] head: 0200000000000003 ffffea000417ba01 00000000ffffffff 00000000ffffffff
[   15.112607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   15.120432] page dumped because: kasan: bad access detected
[   15.126005] 
[   15.127504] Memory state around the buggy address:
[   15.132297]  ffff888105eecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.139516]  ffff888105eecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.146740] >ffff888105eed000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153963]                    ^
[   15.157195]  ffff888105eed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164414]  ffff888105eed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.171631] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   14.369018] ==================================================================
[   14.379994] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   14.386875] Read of size 1 at addr ffff888101425c1f by task kunit_try_catch/181
[   14.394180] 
[   14.395684] CPU: 2 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.395692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.395694] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.395698] Call Trace:
[   14.395700]  <TASK>
[   14.395701]  dump_stack_lvl+0x73/0xb0
[   14.395706]  print_report+0xd1/0x650
[   14.395710]  ? __virt_addr_valid+0x1db/0x2d0
[   14.395714]  ? kmalloc_oob_left+0x361/0x3c0
[   14.395718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.395722]  ? kmalloc_oob_left+0x361/0x3c0
[   14.395726]  kasan_report+0x141/0x180
[   14.395731]  ? kmalloc_oob_left+0x361/0x3c0
[   14.395736]  __asan_report_load1_noabort+0x18/0x20
[   14.395739]  kmalloc_oob_left+0x361/0x3c0
[   14.395744]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   14.395748]  ? __schedule+0x10cc/0x2b30
[   14.395753]  ? ktime_get_ts64+0x83/0x230
[   14.395758]  kunit_try_run_case+0x1a2/0x480
[   14.395762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.395771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.395776]  ? __kthread_parkme+0x82/0x180
[   14.395780]  ? preempt_count_sub+0x50/0x80
[   14.395785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395789]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.395793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.395797]  kthread+0x334/0x6f0
[   14.395801]  ? trace_preempt_on+0x20/0xc0
[   14.395806]  ? __pfx_kthread+0x10/0x10
[   14.395810]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.395814]  ? calculate_sigpending+0x7b/0xa0
[   14.395818]  ? __pfx_kthread+0x10/0x10
[   14.395822]  ret_from_fork+0x3e/0x80
[   14.395826]  ? __pfx_kthread+0x10/0x10
[   14.395831]  ret_from_fork_asm+0x1a/0x30
[   14.395837]  </TASK>
[   14.395838] 
[   14.558121] Allocated by task 1:
[   14.561354]  kasan_save_stack+0x45/0x70
[   14.565193]  kasan_save_track+0x18/0x40
[   14.569031]  kasan_save_alloc_info+0x3b/0x50
[   14.573304]  __kasan_kmalloc+0xb7/0xc0
[   14.577057]  __kmalloc_node_noprof+0x1cd/0x510
[   14.581502]  __vmalloc_node_range_noprof+0x302/0x1120
[   14.586557]  __vmalloc_node_noprof+0x94/0x100
[   14.590915]  vmalloc_noprof+0x25/0x30
[   14.594581]  igb_setup_rx_resources+0x176/0x510
[   14.599122]  igb_setup_all_rx_resources+0xf1/0x1c0
[   14.603915]  __igb_open+0x5a1/0x12e0
[   14.607492]  igb_open+0x14/0x20
[   14.610639]  __dev_open+0x2d7/0x6e0
[   14.614133]  __dev_change_flags+0x3f5/0x590
[   14.618325]  netif_change_flags+0x87/0x160
[   14.622426]  dev_change_flags+0x9a/0x140
[   14.626352]  ip_auto_config+0x565/0x2f60
[   14.630286]  do_one_initcall+0xd5/0x370
[   14.634123]  kernel_init_freeable+0x420/0x6f0
[   14.638483]  kernel_init+0x23/0x1e0
[   14.641976]  ret_from_fork+0x3e/0x80
[   14.645554]  ret_from_fork_asm+0x1a/0x30
[   14.649481] 
[   14.650982] The buggy address belongs to the object at ffff888101425c00
[   14.650982]  which belongs to the cache kmalloc-16 of size 16
[   14.663322] The buggy address is located 15 bytes to the right of
[   14.663322]  allocated 16-byte region [ffff888101425c00, ffff888101425c10)
[   14.676278] 
[   14.677778] The buggy address belongs to the physical page:
[   14.683348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101425
[   14.691348] flags: 0x200000000000000(node=0|zone=2)
[   14.696226] page_type: f5(slab)
[   14.699374] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   14.707114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.714859] page dumped because: kasan: bad access detected
[   14.720433] 
[   14.721932] Memory state around the buggy address:
[   14.726725]  ffff888101425b00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.733945]  ffff888101425b80: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   14.741172] >ffff888101425c00: 00 00 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   14.748390]                             ^
[   14.752403]  ffff888101425c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.759622]  ffff888101425d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.766840] ==================================================================
Failure - log-parser-test/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   13.282470] ==================================================================
[   13.289702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.296678] Write of size 1 at addr ffff888104ee9073 by task kunit_try_catch/179
[   13.304080] 
[   13.305580] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G                 N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.305588] Tainted: [N]=TEST
[   13.305590] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   13.305594] Call Trace:
[   13.305596]  <TASK>
[   13.305598]  dump_stack_lvl+0x73/0xb0
[   13.305602]  print_report+0xd1/0x650
[   13.305607]  ? __virt_addr_valid+0x1db/0x2d0
[   13.305612]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.305616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.305620]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.305624]  kasan_report+0x141/0x180
[   13.305628]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.305633]  __asan_report_store1_noabort+0x1b/0x30
[   13.305637]  kmalloc_oob_right+0x6f0/0x7f0
[   13.305641]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.305645]  ? __schedule+0x10cc/0x2b30
[   13.305650]  ? ktime_get_ts64+0x83/0x230
[   13.305655]  kunit_try_run_case+0x1a2/0x480
[   13.305660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.305664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.305669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.305674]  ? __kthread_parkme+0x82/0x180
[   13.305678]  ? preempt_count_sub+0x50/0x80
[   13.305683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.305687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.305692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.305696]  kthread+0x334/0x6f0
[   13.305700]  ? trace_preempt_on+0x20/0xc0
[   13.305705]  ? __pfx_kthread+0x10/0x10
[   13.305709]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.305713]  ? calculate_sigpending+0x7b/0xa0
[   13.305717]  ? __pfx_kthread+0x10/0x10
[   13.305722]  ret_from_fork+0x3e/0x80
[   13.305726]  ? __pfx_kthread+0x10/0x10
[   13.305730]  ret_from_fork_asm+0x1a/0x30
[   13.305736]  </TASK>
[   13.305738] 
[   13.467369] Allocated by task 179:
[   13.470773]  kasan_save_stack+0x45/0x70
[   13.474612]  kasan_save_track+0x18/0x40
[   13.478452]  kasan_save_alloc_info+0x3b/0x50
[   13.482726]  __kasan_kmalloc+0xb7/0xc0
[   13.486477]  __kmalloc_cache_noprof+0x189/0x420
[   13.491008]  kmalloc_oob_right+0xa9/0x7f0
[   13.495021]  kunit_try_run_case+0x1a2/0x480
[   13.499209]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.504606]  kthread+0x334/0x6f0
[   13.507841]  ret_from_fork+0x3e/0x80
[   13.511426]  ret_from_fork_asm+0x1a/0x30
[   13.515354] 
[   13.516852] The buggy address belongs to the object at ffff888104ee9000
[   13.516852]  which belongs to the cache kmalloc-128 of size 128
[   13.529366] The buggy address is located 0 bytes to the right of
[   13.529366]  allocated 115-byte region [ffff888104ee9000, ffff888104ee9073)
[   13.542315] 
[   13.543813] The buggy address belongs to the physical page:
[   13.549385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   13.557394] flags: 0x200000000000000(node=0|zone=2)
[   13.562282] page_type: f5(slab)
[   13.565429] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   13.573175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.580914] page dumped because: kasan: bad access detected
[   13.586486] 
[   13.587985] Memory state around the buggy address:
[   13.592777]  ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.599999]  ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.607226] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.614450]                                                              ^
[   13.621325]  ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.628545]  ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.635762] ==================================================================
[   14.010421] ==================================================================
[   14.017651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   14.024634] Read of size 1 at addr ffff888104ee9080 by task kunit_try_catch/179
[   14.031942] 
[   14.033441] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.033448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.033450] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.033453] Call Trace:
[   14.033455]  <TASK>
[   14.033457]  dump_stack_lvl+0x73/0xb0
[   14.033460]  print_report+0xd1/0x650
[   14.033464]  ? __virt_addr_valid+0x1db/0x2d0
[   14.033468]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.033472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.033476]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.033480]  kasan_report+0x141/0x180
[   14.033484]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.033489]  __asan_report_load1_noabort+0x18/0x20
[   14.033493]  kmalloc_oob_right+0x68a/0x7f0
[   14.033497]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   14.033502]  ? __schedule+0x10cc/0x2b30
[   14.033506]  ? ktime_get_ts64+0x83/0x230
[   14.033511]  kunit_try_run_case+0x1a2/0x480
[   14.033515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.033524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.033528]  ? __kthread_parkme+0x82/0x180
[   14.033532]  ? preempt_count_sub+0x50/0x80
[   14.033537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033541]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.033545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.033548]  kthread+0x334/0x6f0
[   14.033552]  ? trace_preempt_on+0x20/0xc0
[   14.033557]  ? __pfx_kthread+0x10/0x10
[   14.033561]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.033565]  ? calculate_sigpending+0x7b/0xa0
[   14.033569]  ? __pfx_kthread+0x10/0x10
[   14.033573]  ret_from_fork+0x3e/0x80
[   14.033577]  ? __pfx_kthread+0x10/0x10
[   14.033581]  ret_from_fork_asm+0x1a/0x30
[   14.033587]  </TASK>
[   14.033588] 
[   14.196425] Allocated by task 179:
[   14.199834]  kasan_save_stack+0x45/0x70
[   14.203699]  kasan_save_track+0x18/0x40
[   14.207545]  kasan_save_alloc_info+0x3b/0x50
[   14.211818]  __kasan_kmalloc+0xb7/0xc0
[   14.215569]  __kmalloc_cache_noprof+0x189/0x420
[   14.220104]  kmalloc_oob_right+0xa9/0x7f0
[   14.224124]  kunit_try_run_case+0x1a2/0x480
[   14.228310]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.233722]  kthread+0x334/0x6f0
[   14.236958]  ret_from_fork+0x3e/0x80
[   14.240538]  ret_from_fork_asm+0x1a/0x30
[   14.244463] 
[   14.245962] The buggy address belongs to the object at ffff888104ee9000
[   14.245962]  which belongs to the cache kmalloc-128 of size 128
[   14.258468] The buggy address is located 13 bytes to the right of
[   14.258468]  allocated 115-byte region [ffff888104ee9000, ffff888104ee9073)
[   14.271502] 
[   14.273002] The buggy address belongs to the physical page:
[   14.278575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   14.286581] flags: 0x200000000000000(node=0|zone=2)
[   14.291459] page_type: f5(slab)
[   14.294609] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.302354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.310094] page dumped because: kasan: bad access detected
[   14.315689] 
[   14.317209] Memory state around the buggy address:
[   14.322000]  ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.329221]  ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.336437] >ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.343673]                    ^
[   14.346933]  ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.354152]  ffff888104ee9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.361372] ==================================================================
[   13.648445] ==================================================================
[   13.655679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   13.662645] Write of size 1 at addr ffff888104ee9078 by task kunit_try_catch/179
[   13.670047] 
[   13.671545] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.671553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.671555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   13.671559] Call Trace:
[   13.671560]  <TASK>
[   13.671562]  dump_stack_lvl+0x73/0xb0
[   13.671566]  print_report+0xd1/0x650
[   13.671570]  ? __virt_addr_valid+0x1db/0x2d0
[   13.671573]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.671577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.671581]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.671585]  kasan_report+0x141/0x180
[   13.671590]  ? kmalloc_oob_right+0x6bd/0x7f0
[   13.671595]  __asan_report_store1_noabort+0x1b/0x30
[   13.671598]  kmalloc_oob_right+0x6bd/0x7f0
[   13.671602]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.671607]  ? __schedule+0x10cc/0x2b30
[   13.671611]  ? ktime_get_ts64+0x83/0x230
[   13.671616]  kunit_try_run_case+0x1a2/0x480
[   13.671620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.671624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.671629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.671633]  ? __kthread_parkme+0x82/0x180
[   13.671637]  ? preempt_count_sub+0x50/0x80
[   13.671642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.671646]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.671650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.671654]  kthread+0x334/0x6f0
[   13.671658]  ? trace_preempt_on+0x20/0xc0
[   13.671662]  ? __pfx_kthread+0x10/0x10
[   13.671666]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.671670]  ? calculate_sigpending+0x7b/0xa0
[   13.671674]  ? __pfx_kthread+0x10/0x10
[   13.671678]  ret_from_fork+0x3e/0x80
[   13.671682]  ? __pfx_kthread+0x10/0x10
[   13.671686]  ret_from_fork_asm+0x1a/0x30
[   13.671692]  </TASK>
[   13.671694] 
[   13.834549] Allocated by task 179:
[   13.837955]  kasan_save_stack+0x45/0x70
[   13.841793]  kasan_save_track+0x18/0x40
[   13.845633]  kasan_save_alloc_info+0x3b/0x50
[   13.849907]  __kasan_kmalloc+0xb7/0xc0
[   13.853657]  __kmalloc_cache_noprof+0x189/0x420
[   13.858191]  kmalloc_oob_right+0xa9/0x7f0
[   13.862204]  kunit_try_run_case+0x1a2/0x480
[   13.866388]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.871787]  kthread+0x334/0x6f0
[   13.875022]  ret_from_fork+0x3e/0x80
[   13.878607]  ret_from_fork_asm+0x1a/0x30
[   13.882535] 
[   13.884035] The buggy address belongs to the object at ffff888104ee9000
[   13.884035]  which belongs to the cache kmalloc-128 of size 128
[   13.896549] The buggy address is located 5 bytes to the right of
[   13.896549]  allocated 115-byte region [ffff888104ee9000, ffff888104ee9073)
[   13.909496] 
[   13.910993] The buggy address belongs to the physical page:
[   13.916567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ee9
[   13.924575] flags: 0x200000000000000(node=0|zone=2)
[   13.929452] page_type: f5(slab)
[   13.932599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   13.940341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.948086] page dumped because: kasan: bad access detected
[   13.953658] 
[   13.955158] Memory state around the buggy address:
[   13.959950]  ffff888104ee8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.967170]  ffff888104ee8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.974389] >ffff888104ee9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   13.981608]                                                                 ^
[   13.988739]  ffff888104ee9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.995959]  ffff888104ee9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.003178] ==================================================================
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
------------[ cut here ]------------
[  136.044181] WARNING: CPU: 0 PID: 2763 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  136.053669] Modules linked in:
[  136.056772] CPU: 0 UID: 0 PID: 2763 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  136.067736] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  136.073596] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  136.081018] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  136.086189] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  136.104963] RSP: 0000:ffff88811a2efc78 EFLAGS: 00010286
[  136.110221] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  136.117379] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffb942327c
[  136.124539] RBP: ffff88811a2efca0 R08: 0000000000000000 R09: ffffed102338e3a0
[  136.131721] R10: ffff888119c71d07 R11: 0000000000000000 R12: ffffffffb9423268
[  136.138906] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88811a2efd38
[  136.146066] FS:  0000000000000000(0000) GS:ffff88846423b000(0000) knlGS:0000000000000000
[  136.154176] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  136.159947] CR2: ffff88841dd87000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  136.167109] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  136.174264] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  136.181423] Call Trace:
[  136.183887]  <TASK>
[  136.186020]  drm_test_rect_calc_vscale+0x108/0x270
[  136.190821]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  136.196159]  ? __schedule+0x10cc/0x2b30
[  136.200039]  ? ktime_get_ts64+0x83/0x230
[  136.203991]  kunit_try_run_case+0x1a2/0x480
[  136.208202]  ? __pfx_kunit_try_run_case+0x10/0x10
[  136.212935]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  136.217580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  136.222571]  ? __kthread_parkme+0x82/0x180
[  136.226722]  ? preempt_count_sub+0x50/0x80
[  136.230873]  ? __pfx_kunit_try_run_case+0x10/0x10
[  136.235605]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  136.241030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  136.247150]  kthread+0x334/0x6f0
[  136.250393]  ? trace_preempt_on+0x20/0xc0
[  136.254431]  ? __pfx_kthread+0x10/0x10
[  136.258201]  ? _raw_spin_unlock_irq+0x47/0x80
[  136.262587]  ? calculate_sigpending+0x7b/0xa0
[  136.266985]  ? __pfx_kthread+0x10/0x10
[  136.270766]  ret_from_fork+0x3e/0x80
[  136.274362]  ? __pfx_kthread+0x10/0x10
[  136.278142]  ret_from_fork_asm+0x1a/0x30
[  136.282100]  </TASK>
[  136.284301] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  136.297596] WARNING: CPU: 2 PID: 2765 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x130/0x190
[  136.307085] Modules linked in:
[  136.310173] CPU: 2 UID: 0 PID: 2765 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  136.321151] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  136.326992] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  136.334384] RIP: 0010:drm_rect_calc_vscale+0x130/0x190
[  136.339550] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  136.358311] RSP: 0000:ffff88810b3f7c78 EFLAGS: 00010286
[  136.363563] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  136.370734] RDX: 0000000000000007 RSI: 0000000000000000 RDI: ffffffffb94232b4
[  136.377907] RBP: ffff88810b3f7ca0 R08: 0000000000000000 R09: ffffed102338e3e0
[  136.385046] R10: ffff888119c71f07 R11: 0000000000000000 R12: ffffffffb94232a0
[  136.392204] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88810b3f7d38
[  136.399339] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[  136.407451] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  136.413224] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  136.420369] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  136.427527] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  136.434662] Call Trace:
[  136.437148]  <TASK>
[  136.439254]  drm_test_rect_calc_vscale+0x108/0x270
[  136.444056]  ? __pfx_drm_test_rect_calc_vscale+0x10/0x10
[  136.449394]  ? __schedule+0x10cc/0x2b30
[  136.453243]  ? ktime_get_ts64+0x83/0x230
[  136.457196]  kunit_try_run_case+0x1a2/0x480
[  136.461387]  ? __pfx_kunit_try_run_case+0x10/0x10
[  136.466121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  136.470766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  136.475797]  ? __kthread_parkme+0x82/0x180
[  136.479910]  ? preempt_count_sub+0x50/0x80
[  136.484033]  ? __pfx_kunit_try_run_case+0x10/0x10
[  136.488765]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  136.494191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  136.500308]  kthread+0x334/0x6f0
[  136.503568]  ? trace_preempt_on+0x20/0xc0
[  136.507588]  ? __pfx_kthread+0x10/0x10
[  136.511367]  ? _raw_spin_unlock_irq+0x47/0x80
[  136.515765]  ? calculate_sigpending+0x7b/0xa0
[  136.520155]  ? __pfx_kthread+0x10/0x10
[  136.523934]  ret_from_fork+0x3e/0x80
[  136.527539]  ? __pfx_kthread+0x10/0x10
[  136.531298]  ret_from_fork_asm+0x1a/0x30
[  136.535268]  </TASK>
[  136.537470] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
------------[ cut here ]------------
[  135.755037] WARNING: CPU: 2 PID: 2753 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  135.764583] Modules linked in:
[  135.767656] CPU: 2 UID: 0 PID: 2753 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  135.778662] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  135.784552] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  135.791945] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  135.797110] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  135.815866] RSP: 0000:ffff88811a607c78 EFLAGS: 00010286
[  135.821115] RAX: 0000000000010000 RBX: 00000000ffff0000 RCX: 00000000ffff0000
[  135.828247] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffb94232b8
[  135.835407] RBP: ffff88811a607ca0 R08: 0000000000000000 R09: ffffed10233be0e0
[  135.842546] R10: ffff888119df0707 R11: 0000000000000000 R12: ffffffffb94232a0
[  135.849712] R13: 0000000000000000 R14: 000000007fffffff R15: ffff88811a607d38
[  135.856899] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[  135.864994] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  135.870769] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  135.877915] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  135.885072] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  135.892205] Call Trace:
[  135.894710]  <TASK>
[  135.896817]  drm_test_rect_calc_hscale+0x108/0x270
[  135.901625]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  135.906964]  ? __schedule+0x10cc/0x2b30
[  135.910814]  ? ktime_get_ts64+0x83/0x230
[  135.914768]  kunit_try_run_case+0x1a2/0x480
[  135.918967]  ? __pfx_kunit_try_run_case+0x10/0x10
[  135.923709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  135.928360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  135.933352]  ? __kthread_parkme+0x82/0x180
[  135.937462]  ? preempt_count_sub+0x50/0x80
[  135.941587]  ? __pfx_kunit_try_run_case+0x10/0x10
[  135.946300]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  135.951748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  135.957844]  kthread+0x334/0x6f0
[  135.961101]  ? trace_preempt_on+0x20/0xc0
[  135.965123]  ? __pfx_kthread+0x10/0x10
[  135.968884]  ? _raw_spin_unlock_irq+0x47/0x80
[  135.973270]  ? calculate_sigpending+0x7b/0xa0
[  135.977638]  ? __pfx_kthread+0x10/0x10
[  135.981443]  ret_from_fork+0x3e/0x80
[  135.985040]  ? __pfx_kthread+0x10/0x10
[  135.988816]  ret_from_fork_asm+0x1a/0x30
[  135.992769]  </TASK>
[  135.994969] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  135.501963] WARNING: CPU: 0 PID: 2751 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x125/0x190
[  135.511454] Modules linked in:
[  135.514540] CPU: 0 UID: 0 PID: 2751 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  135.525518] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  135.531360] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  135.538761] RIP: 0010:drm_rect_calc_hscale+0x125/0x190
[  135.543927] Code: 7f 43 41 39 ce 7c 3e 48 83 c4 08 89 c8 5b 41 5c 41 5d 41 5e 5d c3 cc cc cc cc 8d 44 08 ff 99 f7 f9 89 c1 85 c0 79 d6 eb de 90 <0f> 0b 90 b9 ea ff ff ff 48 83 c4 08 5b 89 c8 41 5c 41 5d 41 5e 5d
[  135.562698] RSP: 0000:ffff888119c0fc78 EFLAGS: 00010286
[  135.567973] RAX: 00000000ffff0000 RBX: 00000000ffff0000 RCX: 0000000000010000
[  135.575132] RDX: 0000000000000003 RSI: 0000000000000000 RDI: ffffffffb9423280
[  135.582281] RBP: ffff888119c0fca0 R08: 0000000000000000 R09: ffffed10233be0a0
[  135.589423] R10: ffff888119df0507 R11: 0000000000000000 R12: ffffffffb9423268
[  135.596581] R13: 0000000000000000 R14: 000000007fffffff R15: ffff888119c0fd38
[  135.603741] FS:  0000000000000000(0000) GS:ffff88846423b000(0000) knlGS:0000000000000000
[  135.611851] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  135.617622] CR2: ffff88841dd87000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  135.624773] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  135.631913] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  135.639046] Call Trace:
[  135.641524]  <TASK>
[  135.643633]  drm_test_rect_calc_hscale+0x108/0x270
[  135.648442]  ? __pfx_drm_test_rect_calc_hscale+0x10/0x10
[  135.653779]  ? __schedule+0x10cc/0x2b30
[  135.657626]  ? ktime_get_ts64+0x83/0x230
[  135.661578]  kunit_try_run_case+0x1a2/0x480
[  135.665775]  ? __pfx_kunit_try_run_case+0x10/0x10
[  135.670504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  135.675132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  135.680123]  ? __kthread_parkme+0x82/0x180
[  135.684249]  ? preempt_count_sub+0x50/0x80
[  135.688357]  ? __pfx_kunit_try_run_case+0x10/0x10
[  135.693090]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  135.698498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  135.704617]  kthread+0x334/0x6f0
[  135.707856]  ? trace_preempt_on+0x20/0xc0
[  135.711895]  ? __pfx_kthread+0x10/0x10
[  135.715659]  ? _raw_spin_unlock_irq+0x47/0x80
[  135.720040]  ? calculate_sigpending+0x7b/0xa0
[  135.724409]  ? __pfx_kthread+0x10/0x10
[  135.728187]  ret_from_fork+0x3e/0x80
[  135.731783]  ? __pfx_kthread+0x10/0x10
[  135.735562]  ret_from_fork_asm+0x1a/0x30
[  135.739500]  </TASK>
[  135.741700] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
------------[ cut here ]------------
[  134.216105] WARNING: CPU: 2 PID: 2549 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x44/0x300
[  134.226114] Modules linked in:
[  134.229175] CPU: 2 UID: 0 PID: 2549 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  134.240138] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  134.245971] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  134.253371] RIP: 0010:drm_framebuffer_init+0x44/0x300
[  134.258431] Code: 56 49 89 d6 48 89 f2 41 55 48 c1 ea 03 41 54 49 89 fc 53 48 89 f3 48 83 ec 18 80 3c 02 00 0f 85 00 02 00 00 4c 39 23 74 20 90 <0f> 0b 90 41 bd ea ff ff ff 48 83 c4 18 44 89 e8 5b 41 5c 41 5d 41
[  134.277185] RSP: 0000:ffff888119b2fb30 EFLAGS: 00010246
[  134.282420] RAX: dffffc0000000000 RBX: ffff888119b2fc28 RCX: 0000000000000000
[  134.289562] RDX: 1ffff11023365f8e RSI: ffff888119b2fc28 RDI: ffff888119b2fc70
[  134.296710] RBP: ffff888119b2fb70 R08: ffff88810213d000 R09: ffffffffb93c9f20
[  134.303896] R10: 0000000000000003 R11: 00000000fcca6b63 R12: ffff88810213d000
[  134.311037] R13: ffff888100327ae8 R14: ffff888119b2fba8 R15: 0000000000000000
[  134.318176] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[  134.326266] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  134.332024] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  134.339158] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  134.346292] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  134.353431] Call Trace:
[  134.355884]  <TASK>
[  134.357989]  ? add_dr+0xc1/0x1d0
[  134.361260]  drm_test_framebuffer_init_bad_format+0xfc/0x240
[  134.366928]  ? add_dr+0x148/0x1d0
[  134.370260]  ? __pfx_drm_test_framebuffer_init_bad_format+0x10/0x10
[  134.376536]  ? __drmm_add_action+0x1a4/0x280
[  134.380815]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  134.386390]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  134.391971]  ? __drmm_add_action_or_reset+0x22/0x50
[  134.396861]  ? __schedule+0x10cc/0x2b30
[  134.400727]  ? ktime_get_ts64+0x83/0x230
[  134.404709]  kunit_try_run_case+0x1a2/0x480
[  134.408924]  ? __pfx_kunit_try_run_case+0x10/0x10
[  134.413643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  134.418264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  134.423240]  ? __kthread_parkme+0x82/0x180
[  134.427354]  ? preempt_count_sub+0x50/0x80
[  134.431467]  ? __pfx_kunit_try_run_case+0x10/0x10
[  134.436186]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  134.441592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  134.447710]  kthread+0x334/0x6f0
[  134.450988]  ? trace_preempt_on+0x20/0xc0
[  134.455012]  ? __pfx_kthread+0x10/0x10
[  134.458777]  ? _raw_spin_unlock_irq+0x47/0x80
[  134.463146]  ? calculate_sigpending+0x7b/0xa0
[  134.467513]  ? __pfx_kthread+0x10/0x10
[  134.471277]  ret_from_fork+0x3e/0x80
[  134.474873]  ? __pfx_kthread+0x10/0x10
[  134.478633]  ret_from_fork_asm+0x1a/0x30
[  134.482570]  </TASK>
[  134.484773] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-drm-kunit-mock-device-drm_test_framebuffer_freedrm-kunit-mock-device-drm-drm_warn_onlist_empty-filp_head
------------[ cut here ]------------
[  133.927823] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head))
[  133.927856] WARNING: CPU: 3 PID: 2545 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x13f/0x1c0
[  133.949628] Modules linked in:
[  133.952713] CPU: 3 UID: 0 PID: 2545 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  133.963714] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  133.969559] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  133.976951] RIP: 0010:drm_framebuffer_free+0x13f/0x1c0
[  133.982116] Code: 8b 7d 50 4d 85 ff 74 2b 4c 89 ef e8 1b 87 84 00 48 c7 c1 20 4f 3c b9 4c 89 fa 48 c7 c7 80 4f 3c b9 48 89 c6 e8 62 0f 82 fe 90 <0f> 0b 90 90 e9 1c ff ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 ea
[  134.000871] RSP: 0000:ffff888119fa7b68 EFLAGS: 00010282
[  134.006122] RAX: 0000000000000000 RBX: ffff888119fa7c40 RCX: 1ffffffff7424ab4
[  134.013265] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[  134.020422] RBP: ffff888119fa7b90 R08: 0000000000000000 R09: fffffbfff7424ab4
[  134.027580] R10: 0000000000000003 R11: 000000000003b658 R12: ffff888119fa7c18
[  134.034760] R13: ffff888118876000 R14: ffff888101d3f000 R15: ffff88811879bd80
[  134.041915] FS:  0000000000000000(0000) GS:ffff8884643bb000(0000) knlGS:0000000000000000
[  134.050008] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  134.055780] CR2: ffffffffffffffff CR3: 000000023f4ba001 CR4: 00000000003726f0
[  134.062911] DR0: ffffffffbb48888c DR1: ffffffffbb48888d DR2: ffffffffbb48888e
[  134.070073] DR3: ffffffffbb48888f DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  134.077212] Call Trace:
[  134.079712]  <TASK>
[  134.081850]  drm_test_framebuffer_free+0x1ab/0x610
[  134.086660]  ? __pfx_drm_test_framebuffer_free+0x10/0x10
[  134.092030]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  134.097604]  ? __pfx_drm_mode_config_init_release+0x10/0x10
[  134.103201]  ? __drmm_add_action_or_reset+0x22/0x50
[  134.108108]  ? __schedule+0x10cc/0x2b30
[  134.111965]  ? ktime_get_ts64+0x83/0x230
[  134.115907]  kunit_try_run_case+0x1a2/0x480
[  134.120118]  ? __pfx_kunit_try_run_case+0x10/0x10
[  134.124832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  134.129478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  134.134454]  ? __kthread_parkme+0x82/0x180
[  134.138577]  ? preempt_count_sub+0x50/0x80
[  134.142712]  ? __pfx_kunit_try_run_case+0x10/0x10
[  134.147434]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  134.152842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  134.158962]  kthread+0x334/0x6f0
[  134.162210]  ? trace_preempt_on+0x20/0xc0
[  134.166249]  ? __pfx_kthread+0x10/0x10
[  134.170025]  ? _raw_spin_unlock_irq+0x47/0x80
[  134.174397]  ? calculate_sigpending+0x7b/0xa0
[  134.178766]  ? __pfx_kthread+0x10/0x10
[  134.182543]  ret_from_fork+0x3e/0x80
[  134.186137]  ? __pfx_kthread+0x10/0x10
[  134.189892]  ret_from_fork_asm+0x1a/0x30
[  134.193843]  </TASK>
[  134.196043] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
------------[ cut here ]------------
[  131.056351] WARNING: CPU: 2 PID: 1983 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110
[  131.067054] Modules linked in:
[  131.070141] CPU: 2 UID: 0 PID: 1983 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  131.081120] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  131.086960] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  131.094378] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  131.100305] Code: 49 8d 7c 24 58 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 58 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 d8
[  131.119078] RSP: 0000:ffff888118d77c90 EFLAGS: 00010246
[  131.124330] RAX: dffffc0000000000 RBX: ffff888118eda000 RCX: 0000000000000000
[  131.131469] RDX: 1ffff110231db432 RSI: ffffffffb65eed08 RDI: ffff888118eda190
[  131.138627] RBP: ffff888118d77ca0 R08: 1ffff11020064f69 R09: ffffed10231aef65
[  131.145760] R10: 0000000000000003 R11: ffffffffb5b7ec38 R12: 0000000000000000
[  131.152920] R13: ffff888118d77d38 R14: ffff888100327c50 R15: ffff888100327c58
[  131.160078] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[  131.168172] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  131.173945] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  131.181086] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  131.188246] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  131.195402] Call Trace:
[  131.197879]  <TASK>
[  131.199985]  drm_test_drm_connector_dynamic_register_no_init+0x104/0x290
[  131.206724]  ? __pfx_drm_test_drm_connector_dynamic_register_no_init+0x10/0x10
[  131.213974]  ? __schedule+0x10cc/0x2b30
[  131.217830]  ? ktime_get_ts64+0x83/0x230
[  131.221782]  kunit_try_run_case+0x1a2/0x480
[  131.225985]  ? __pfx_kunit_try_run_case+0x10/0x10
[  131.230738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  131.235360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  131.240354]  ? __kthread_parkme+0x82/0x180
[  131.244460]  ? preempt_count_sub+0x50/0x80
[  131.248588]  ? __pfx_kunit_try_run_case+0x10/0x10
[  131.253301]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  131.258727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  131.264845]  kthread+0x334/0x6f0
[  131.268103]  ? trace_preempt_on+0x20/0xc0
[  131.272133]  ? __pfx_kthread+0x10/0x10
[  131.275894]  ? _raw_spin_unlock_irq+0x47/0x80
[  131.280278]  ? calculate_sigpending+0x7b/0xa0
[  131.284648]  ? __pfx_kthread+0x10/0x10
[  131.288460]  ret_from_fork+0x3e/0x80
[  131.292060]  ? __pfx_kthread+0x10/0x10
[  131.295845]  ret_from_fork_asm+0x1a/0x30
[  131.299796]  </TASK>
[  131.301997] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  130.699828] WARNING: CPU: 2 PID: 1975 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0xbf/0x110
[  130.710558] Modules linked in:
[  130.713645] CPU: 2 UID: 0 PID: 1975 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  130.724650] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  130.730492] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  130.737893] RIP: 0010:drm_connector_dynamic_register+0xbf/0x110
[  130.743838] Code: 49 8d 7c 24 58 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 02 7e 36 31 c0 41 80 7c 24 58 00 75 1b 5b 41 5c 5d c3 cc cc cc cc 90 <0f> 0b 90 b8 ea ff ff ff 5b 41 5c 5d c3 cc cc cc cc 48 89 df e8 d8
[  130.762619] RSP: 0000:ffff888118c17c90 EFLAGS: 00010246
[  130.767860] RAX: dffffc0000000000 RBX: ffff888118abe000 RCX: 0000000000000000
[  130.775001] RDX: 1ffff11023157c32 RSI: ffffffffb65eed08 RDI: ffff888118abe190
[  130.782158] RBP: ffff888118c17ca0 R08: 1ffff11020064f69 R09: ffffed1023182f65
[  130.789293] R10: 0000000000000003 R11: ffffffffb50049aa R12: 0000000000000000
[  130.796450] R13: ffff888118c17d38 R14: ffff888100327c50 R15: ffff888100327c58
[  130.803592] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[  130.811716] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  130.817503] CR2: 00007ffff7ffe000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  130.824650] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  130.831807] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  130.838942] Call Trace:
[  130.841419]  <TASK>
[  130.843525]  drm_test_drm_connector_dynamic_register_early_no_init+0x104/0x290
[  130.850761]  ? __pfx_drm_test_drm_connector_dynamic_register_early_no_init+0x10/0x10
[  130.858525]  ? __schedule+0x10cc/0x2b30
[  130.862374]  ? ktime_get_ts64+0x83/0x230
[  130.866326]  kunit_try_run_case+0x1a2/0x480
[  130.870546]  ? __pfx_kunit_try_run_case+0x10/0x10
[  130.875261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  130.879897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  130.884897]  ? __kthread_parkme+0x82/0x180
[  130.889007]  ? preempt_count_sub+0x50/0x80
[  130.893130]  ? __pfx_kunit_try_run_case+0x10/0x10
[  130.897845]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  130.903270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  130.909370]  kthread+0x334/0x6f0
[  130.912629]  ? trace_preempt_on+0x20/0xc0
[  130.916650]  ? __pfx_kthread+0x10/0x10
[  130.920430]  ? _raw_spin_unlock_irq+0x47/0x80
[  130.924815]  ? calculate_sigpending+0x7b/0xa0
[  130.929191]  ? __pfx_kthread+0x10/0x10
[  130.932969]  ret_from_fork+0x3e/0x80
[  130.936556]  ? __pfx_kthread+0x10/0x10
[  130.940319]  ret_from_fork_asm+0x1a/0x30
[  130.944274]  </TASK>
[  130.946479] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  118.180828] WARNING: CPU: 0 PID: 699 at lib/math/int_log.c:120 intlog10+0x2a/0x40
[  118.188325] Modules linked in:
[  118.191412] CPU: 0 UID: 0 PID: 699 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  118.202301] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  118.208142] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  118.215536] RIP: 0010:intlog10+0x2a/0x40
[  118.219489] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90
[  118.238243] RSP: 0000:ffff888116e07cb0 EFLAGS: 00010246
[  118.243494] RAX: 0000000000000000 RBX: ffff888100327ae8 RCX: 1ffff11022dc0fb4
[  118.250634] RDX: 1ffffffff7252458 RSI: 1ffff11022dc0fb3 RDI: 0000000000000000
[  118.257811] RBP: ffff888116e07d60 R08: 0000000000000000 R09: ffffed1022612e80
[  118.264951] R10: ffff888113097407 R11: 0000000000000000 R12: 1ffff11022dc0f97
[  118.272085] R13: ffffffffb92922c0 R14: 0000000000000000 R15: ffff888116e07d38
[  118.279242] FS:  0000000000000000(0000) GS:ffff88846423b000(0000) knlGS:0000000000000000
[  118.287336] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  118.293109] CR2: ffff88841dd87000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[  118.300265] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[  118.307405] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  118.314540] Call Trace:
[  118.317019]  <TASK>
[  118.319133]  ? intlog10_test+0xf2/0x220
[  118.322981]  ? __pfx_intlog10_test+0x10/0x10
[  118.327280]  ? __schedule+0x10cc/0x2b30
[  118.331136]  ? ktime_get_ts64+0x83/0x230
[  118.335086]  kunit_try_run_case+0x1a2/0x480
[  118.339282]  ? __pfx_kunit_try_run_case+0x10/0x10
[  118.344013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  118.348641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  118.353713]  ? __kthread_parkme+0x82/0x180
[  118.357836]  ? preempt_count_sub+0x50/0x80
[  118.361962]  ? __pfx_kunit_try_run_case+0x10/0x10
[  118.366694]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  118.372145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  118.378245]  kthread+0x334/0x6f0
[  118.381502]  ? trace_preempt_on+0x20/0xc0
[  118.385524]  ? __pfx_kthread+0x10/0x10
[  118.389287]  ? _raw_spin_unlock_irq+0x47/0x80
[  118.393672]  ? calculate_sigpending+0x7b/0xa0
[  118.398058]  ? __pfx_kthread+0x10/0x10
[  118.401834]  ret_from_fork+0x3e/0x80
[  118.405423]  ? __pfx_kthread+0x10/0x10
[  118.409183]  ret_from_fork_asm+0x1a/0x30
[  118.413139]  </TASK>
[  118.415335] ---[ end trace 0000000000000000 ]---
Failure - log-parser-test/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  117.883313] WARNING: CPU: 1 PID: 681 at lib/math/int_log.c:63 intlog2+0xdf/0x110
[  117.890732] Modules linked in:
[  117.893821] CPU: 1 UID: 0 PID: 681 Comm: kunit_try_catch Tainted: G    B D          N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  117.904696] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  117.909683] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  117.917088] RIP: 0010:intlog2+0xdf/0x110
[  117.921038] Code: 29 b9 c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 89 45 e4 e8 1f e5 56 ff 8b 45 e4 eb
[  117.939794] RSP: 0000:ffff888117107cb0 EFLAGS: 00010246
[  117.945046] RAX: 0000000000000000 RBX: ffff888100327ae8 RCX: 1ffff11022e20fb4
[  117.952187] RDX: 1ffffffff72524ac RSI: 1ffff11022e20fb3 RDI: 0000000000000000
[  117.959345] RBP: ffff888117107d60 R08: 0000000000000000 R09: ffffed1020fe0440
[  117.966486] R10: ffff888107f02207 R11: 0000000000000000 R12: 1ffff11022e20f97
[  117.973653] R13: ffffffffb9292560 R14: 0000000000000000 R15: ffff888117107d38
[  117.980811] FS:  0000000000000000(0000) GS:ffff8884642bb000(0000) knlGS:0000000000000000
[  117.988923] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  117.994696] CR2: ffff88841dd91fff CR3: 000000023f4ba002 CR4: 00000000003726f0
[  118.001852] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488883
[  118.008994] DR3: ffffffffbb488885 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  118.016135] Call Trace:
[  118.018613]  <TASK>
[  118.020730]  ? intlog2_test+0xf2/0x220
[  118.024497]  ? __pfx_intlog2_test+0x10/0x10
[  118.028731]  ? __schedule+0x10cc/0x2b30
[  118.032583]  ? ktime_get_ts64+0x83/0x230
[  118.036535]  kunit_try_run_case+0x1a2/0x480
[  118.040739]  ? __pfx_kunit_try_run_case+0x10/0x10
[  118.045470]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  118.050106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  118.055097]  ? __kthread_parkme+0x82/0x180
[  118.059205]  ? preempt_count_sub+0x50/0x80
[  118.063331]  ? __pfx_kunit_try_run_case+0x10/0x10
[  118.068045]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  118.073471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  118.079573]  kthread+0x334/0x6f0
[  118.082829]  ? trace_preempt_on+0x20/0xc0
[  118.086851]  ? __pfx_kthread+0x10/0x10
[  118.090629]  ? _raw_spin_unlock_irq+0x47/0x80
[  118.094997]  ? calculate_sigpending+0x7b/0xa0
[  118.099384]  ? __pfx_kthread+0x10/0x10
[  118.103151]  ret_from_fork+0x3e/0x80
[  118.106758]  ? __pfx_kthread+0x10/0x10
[  118.110520]  ret_from_fork_asm+0x1a/0x30
[  118.114477]  </TASK>
[  118.116709] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/read-feedback
(no logs available)
Failure - lava/bootloader-action
(no logs available)
Failure - lava/bootloader-retry
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)