Hay
Date
July 6, 2025, 11:09 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   19.509095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   19.533715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   19.412681] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.388593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   94.252399] Internal error: Oops: 0000000096000005 [#1]  SMP
[   94.260969] Modules linked in:
[   94.262148] CPU: 0 UID: 0 PID: 533 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   94.263407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.264335] Hardware name: linux,dummy-virt (DT)
[   94.265000] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.265812] pc : kunit_test_null_dereference+0x70/0x170
[   94.266480] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.267280] sp : ffff800080f27d30
[   94.267851] x29: ffff800080f27d90 x28: 0000000000000000 x27: 0000000000000000
[   94.268739] x26: 1ffe000018ef74c1 x25: 0000000000000000 x24: 0000000000000004
[   94.269642] x23: fff00000c77ba60c x22: ffff91de9ec235b8 x21: fff00000c3e1ca88
[   94.270231] x20: 1ffff000101e4fa6 x19: ffff800080087990 x18: 00000000970be057
[   94.270590] x17: 0000000000000001 x16: fff00000c097583c x15: fff00000ff616b08
[   94.271789] x14: 0000000000018fff x13: 1ffe00001b48e9cd x12: fffd800018ad63a4
[   94.272627] x11: 1ffe000018ad63a3 x10: fffd800018ad63a3 x9 : ffff91de9ec1aa20
[   94.273516] x8 : ffff800080f27c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   94.274356] x5 : ffff7000101e4fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   94.275282] x2 : dfff800000000000 x1 : fff00000c56b1440 x0 : ffff800080087990
[   94.275677] Call trace:
[   94.275841]  kunit_test_null_dereference+0x70/0x170 (P)
[   94.276130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.276809]  kthread+0x328/0x630
[   94.277052]  ret_from_fork+0x10/0x20
[   94.277503] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   94.278113] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   49.903667] ==================================================================
[   49.903737] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   49.903737] 
[   49.903823] Use-after-free read at 0x000000005bb9d36f (in kfence-#140):
[   49.903874]  test_krealloc+0x51c/0x830
[   49.903917]  kunit_try_run_case+0x170/0x3f0
[   49.903962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.904021]  kthread+0x328/0x630
[   49.904059]  ret_from_fork+0x10/0x20
[   49.904100] 
[   49.904125] kfence-#140: 0x000000005bb9d36f-0x00000000ccec1f7e, size=32, cache=kmalloc-32
[   49.904125] 
[   49.904180] allocated by task 338 on cpu 0 at 49.902996s (0.001179s ago):
[   49.904249]  test_alloc+0x29c/0x628
[   49.904289]  test_krealloc+0xc0/0x830
[   49.904328]  kunit_try_run_case+0x170/0x3f0
[   49.904367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.904410]  kthread+0x328/0x630
[   49.904445]  ret_from_fork+0x10/0x20
[   49.904483] 
[   49.904508] freed by task 338 on cpu 0 at 49.903275s (0.001228s ago):
[   49.904569]  krealloc_noprof+0x148/0x360
[   49.904609]  test_krealloc+0x1dc/0x830
[   49.904650]  kunit_try_run_case+0x170/0x3f0
[   49.904689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.904731]  kthread+0x328/0x630
[   49.904767]  ret_from_fork+0x10/0x20
[   49.904806] 
[   49.904849] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   49.904928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.904957] Hardware name: linux,dummy-virt (DT)
[   49.905001] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   49.827481] ==================================================================
[   49.827584] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   49.827584] 
[   49.827687] Use-after-free read at 0x00000000e4389591 (in kfence-#139):
[   49.827741]  test_memcache_typesafe_by_rcu+0x280/0x560
[   49.827791]  kunit_try_run_case+0x170/0x3f0
[   49.827838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.827882]  kthread+0x328/0x630
[   49.827920]  ret_from_fork+0x10/0x20
[   49.827960] 
[   49.828000] kfence-#139: 0x00000000e4389591-0x0000000077048349, size=32, cache=test
[   49.828000] 
[   49.828051] allocated by task 336 on cpu 1 at 49.795211s (0.032836s ago):
[   49.828124]  test_alloc+0x230/0x628
[   49.828167]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   49.828210]  kunit_try_run_case+0x170/0x3f0
[   49.828249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.828290]  kthread+0x328/0x630
[   49.828326]  ret_from_fork+0x10/0x20
[   49.828364] 
[   49.828387] freed by task 336 on cpu 1 at 49.795328s (0.033055s ago):
[   49.828443]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   49.828486]  kunit_try_run_case+0x170/0x3f0
[   49.828523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.828567]  kthread+0x328/0x630
[   49.828605]  ret_from_fork+0x10/0x20
[   49.828642] 
[   49.828689] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   49.828769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.828797] Hardware name: linux,dummy-virt (DT)
[   49.828833] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   26.622460] ==================================================================
[   26.622613] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   26.622613] 
[   26.622719] Invalid read at 0x00000000f22f2ff6:
[   26.623147]  test_invalid_access+0xdc/0x1f0
[   26.623256]  kunit_try_run_case+0x170/0x3f0
[   26.623627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.623934]  kthread+0x328/0x630
[   26.623996]  ret_from_fork+0x10/0x20
[   26.624875] 
[   26.627208] CPU: 0 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   26.627544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.627647] Hardware name: linux,dummy-virt (DT)
[   26.627705] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   26.395419] ==================================================================
[   26.395511] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   26.395511] 
[   26.395575] Corrupted memory at 0x00000000f5282cf0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#135):
[   26.395881]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   26.395929]  kunit_try_run_case+0x170/0x3f0
[   26.395971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.396034]  kthread+0x328/0x630
[   26.396070]  ret_from_fork+0x10/0x20
[   26.396109] 
[   26.396133] kfence-#135: 0x000000002ee40edf-0x000000008b03ed33, size=73, cache=kmalloc-96
[   26.396133] 
[   26.396187] allocated by task 326 on cpu 1 at 26.395215s (0.000968s ago):
[   26.396250]  test_alloc+0x29c/0x628
[   26.396289]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   26.396332]  kunit_try_run_case+0x170/0x3f0
[   26.396372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.396413]  kthread+0x328/0x630
[   26.396449]  ret_from_fork+0x10/0x20
[   26.396486] 
[   26.396510] freed by task 326 on cpu 1 at 26.395333s (0.001174s ago):
[   26.396571]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   26.396612]  kunit_try_run_case+0x170/0x3f0
[   26.396651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.396694]  kthread+0x328/0x630
[   26.396728]  ret_from_fork+0x10/0x20
[   26.396767] 
[   26.396809] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   26.396886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.396915] Hardware name: linux,dummy-virt (DT)
[   26.396948] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   26.291236] ==================================================================
[   26.291327] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   26.291327] 
[   26.291423] Out-of-bounds read at 0x000000005264e4b5 (105B right of kfence-#134):
[   26.291484]  test_kmalloc_aligned_oob_read+0x238/0x468
[   26.291534]  kunit_try_run_case+0x170/0x3f0
[   26.291579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.291622]  kthread+0x328/0x630
[   26.291662]  ret_from_fork+0x10/0x20
[   26.291703] 
[   26.291727] kfence-#134: 0x000000004ea2de3b-0x00000000c135e964, size=73, cache=kmalloc-96
[   26.291727] 
[   26.291780] allocated by task 324 on cpu 1 at 26.291002s (0.000774s ago):
[   26.291851]  test_alloc+0x29c/0x628
[   26.291890]  test_kmalloc_aligned_oob_read+0x100/0x468
[   26.291934]  kunit_try_run_case+0x170/0x3f0
[   26.291989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.292033]  kthread+0x328/0x630
[   26.292069]  ret_from_fork+0x10/0x20
[   26.292109] 
[   26.292154] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   26.292236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.292266] Hardware name: linux,dummy-virt (DT)
[   26.292301] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   22.755216] ==================================================================
[   22.755307] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   22.755307] 
[   22.755369] Corrupted memory at 0x0000000083bfc31e [ ! ] (in kfence-#100):
[   22.755485]  test_corruption+0x1d8/0x378
[   22.755529]  kunit_try_run_case+0x170/0x3f0
[   22.755571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.755617]  kthread+0x328/0x630
[   22.755653]  ret_from_fork+0x10/0x20
[   22.755693] 
[   22.755717] kfence-#100: 0x00000000ffa72f0f-0x00000000e3df1aa4, size=32, cache=test
[   22.755717] 
[   22.755770] allocated by task 314 on cpu 1 at 22.755077s (0.000689s ago):
[   22.755829]  test_alloc+0x230/0x628
[   22.755870]  test_corruption+0x198/0x378
[   22.755908]  kunit_try_run_case+0x170/0x3f0
[   22.755947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.756002]  kthread+0x328/0x630
[   22.756037]  ret_from_fork+0x10/0x20
[   22.756077] 
[   22.756098] freed by task 314 on cpu 1 at 22.755136s (0.000959s ago):
[   22.756159]  test_corruption+0x1d8/0x378
[   22.756197]  kunit_try_run_case+0x170/0x3f0
[   22.756236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.756278]  kthread+0x328/0x630
[   22.756312]  ret_from_fork+0x10/0x20
[   22.756349] 
[   22.756391] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.756468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.756497] Hardware name: linux,dummy-virt (DT)
[   22.756530] ==================================================================
[   22.443313] ==================================================================
[   22.443404] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   22.443404] 
[   22.443469] Corrupted memory at 0x00000000bf0fc562 [ ! . . . . . . . . . . . . . . . ] (in kfence-#97):
[   22.443774]  test_corruption+0x278/0x378
[   22.443821]  kunit_try_run_case+0x170/0x3f0
[   22.443864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.443909]  kthread+0x328/0x630
[   22.443947]  ret_from_fork+0x10/0x20
[   22.444000] 
[   22.444024] kfence-#97: 0x000000006f845ed1-0x00000000b994ee49, size=32, cache=kmalloc-32
[   22.444024] 
[   22.444081] allocated by task 312 on cpu 1 at 22.443081s (0.000996s ago):
[   22.444143]  test_alloc+0x29c/0x628
[   22.444183]  test_corruption+0xdc/0x378
[   22.444223]  kunit_try_run_case+0x170/0x3f0
[   22.444262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.444305]  kthread+0x328/0x630
[   22.444341]  ret_from_fork+0x10/0x20
[   22.444380] 
[   22.444402] freed by task 312 on cpu 1 at 22.443189s (0.001209s ago):
[   22.444463]  test_corruption+0x278/0x378
[   22.444501]  kunit_try_run_case+0x170/0x3f0
[   22.444541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.444585]  kthread+0x328/0x630
[   22.444620]  ret_from_fork+0x10/0x20
[   22.444659] 
[   22.444703] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.444781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.444811] Hardware name: linux,dummy-virt (DT)
[   22.444846] ==================================================================
[   22.651195] ==================================================================
[   22.651285] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   22.651285] 
[   22.651348] Corrupted memory at 0x00000000eea02e86 [ ! . . . . . . . . . . . . . . . ] (in kfence-#99):
[   22.651655]  test_corruption+0x120/0x378
[   22.651702]  kunit_try_run_case+0x170/0x3f0
[   22.651745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.651789]  kthread+0x328/0x630
[   22.651827]  ret_from_fork+0x10/0x20
[   22.651867] 
[   22.651890] kfence-#99: 0x000000008b367333-0x00000000ccae760f, size=32, cache=test
[   22.651890] 
[   22.651944] allocated by task 314 on cpu 1 at 22.651044s (0.000896s ago):
[   22.652021]  test_alloc+0x230/0x628
[   22.652062]  test_corruption+0xdc/0x378
[   22.652101]  kunit_try_run_case+0x170/0x3f0
[   22.652141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.652185]  kthread+0x328/0x630
[   22.652219]  ret_from_fork+0x10/0x20
[   22.652258] 
[   22.652281] freed by task 314 on cpu 1 at 22.651104s (0.001174s ago):
[   22.652341]  test_corruption+0x120/0x378
[   22.652380]  kunit_try_run_case+0x170/0x3f0
[   22.652420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.652463]  kthread+0x328/0x630
[   22.652497]  ret_from_fork+0x10/0x20
[   22.652537] 
[   22.652580] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.652655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.652683] Hardware name: linux,dummy-virt (DT)
[   22.652715] ==================================================================
[   22.547341] ==================================================================
[   22.547431] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   22.547431] 
[   22.547492] Corrupted memory at 0x000000008acec362 [ ! ] (in kfence-#98):
[   22.547619]  test_corruption+0x284/0x378
[   22.547665]  kunit_try_run_case+0x170/0x3f0
[   22.547708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.547752]  kthread+0x328/0x630
[   22.547789]  ret_from_fork+0x10/0x20
[   22.547829] 
[   22.547851] kfence-#98: 0x000000009fcb9fcc-0x0000000076853f19, size=32, cache=kmalloc-32
[   22.547851] 
[   22.547907] allocated by task 312 on cpu 1 at 22.547065s (0.000838s ago):
[   22.547968]  test_alloc+0x29c/0x628
[   22.548022]  test_corruption+0x198/0x378
[   22.548060]  kunit_try_run_case+0x170/0x3f0
[   22.548100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.548143]  kthread+0x328/0x630
[   22.548177]  ret_from_fork+0x10/0x20
[   22.548216] 
[   22.548238] freed by task 312 on cpu 1 at 22.547175s (0.001060s ago):
[   22.548297]  test_corruption+0x284/0x378
[   22.548337]  kunit_try_run_case+0x170/0x3f0
[   22.548374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.548417]  kthread+0x328/0x630
[   22.548452]  ret_from_fork+0x10/0x20
[   22.548489] 
[   22.548530] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.548607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.548635] Hardware name: linux,dummy-virt (DT)
[   22.548668] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   22.235237] ==================================================================
[   22.235324] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   22.235324] 
[   22.235386] Invalid free of 0x000000009a4289e7 (in kfence-#95):
[   22.235441]  test_invalid_addr_free+0x1ac/0x238
[   22.235491]  kunit_try_run_case+0x170/0x3f0
[   22.235534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.235576]  kthread+0x328/0x630
[   22.235615]  ret_from_fork+0x10/0x20
[   22.235655] 
[   22.235680] kfence-#95: 0x000000004c6c5a8f-0x00000000d9a0fc35, size=32, cache=kmalloc-32
[   22.235680] 
[   22.235735] allocated by task 308 on cpu 1 at 22.235098s (0.000634s ago):
[   22.235798]  test_alloc+0x29c/0x628
[   22.235838]  test_invalid_addr_free+0xd4/0x238
[   22.235879]  kunit_try_run_case+0x170/0x3f0
[   22.235919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.235962]  kthread+0x328/0x630
[   22.236013]  ret_from_fork+0x10/0x20
[   22.236055] 
[   22.236103] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.236183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.236213] Hardware name: linux,dummy-virt (DT)
[   22.236248] ==================================================================
[   22.339109] ==================================================================
[   22.339202] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   22.339202] 
[   22.339263] Invalid free of 0x0000000078184a5d (in kfence-#96):
[   22.339317]  test_invalid_addr_free+0xec/0x238
[   22.339364]  kunit_try_run_case+0x170/0x3f0
[   22.339406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.339450]  kthread+0x328/0x630
[   22.339487]  ret_from_fork+0x10/0x20
[   22.339526] 
[   22.339549] kfence-#96: 0x00000000e0b64c6c-0x000000002d235205, size=32, cache=test
[   22.339549] 
[   22.339601] allocated by task 310 on cpu 1 at 22.338986s (0.000611s ago):
[   22.339663]  test_alloc+0x230/0x628
[   22.339703]  test_invalid_addr_free+0xd4/0x238
[   22.339743]  kunit_try_run_case+0x170/0x3f0
[   22.339782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.339825]  kthread+0x328/0x630
[   22.339859]  ret_from_fork+0x10/0x20
[   22.339899] 
[   22.339941] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.340030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.340059] Hardware name: linux,dummy-virt (DT)
[   22.340093] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   22.027381] ==================================================================
[   22.027508] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   22.027508] 
[   22.027579] Invalid free of 0x0000000018b1b923 (in kfence-#93):
[   22.027650]  test_double_free+0x1bc/0x238
[   22.027698]  kunit_try_run_case+0x170/0x3f0
[   22.027744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.027786]  kthread+0x328/0x630
[   22.027825]  ret_from_fork+0x10/0x20
[   22.027864] 
[   22.027888] kfence-#93: 0x0000000018b1b923-0x00000000f6588c4b, size=32, cache=kmalloc-32
[   22.027888] 
[   22.027941] allocated by task 304 on cpu 0 at 22.027098s (0.000840s ago):
[   22.028022]  test_alloc+0x29c/0x628
[   22.028062]  test_double_free+0xd4/0x238
[   22.028101]  kunit_try_run_case+0x170/0x3f0
[   22.028143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028184]  kthread+0x328/0x630
[   22.028218]  ret_from_fork+0x10/0x20
[   22.028257] 
[   22.028281] freed by task 304 on cpu 0 at 22.027170s (0.001108s ago):
[   22.028343]  test_double_free+0x1ac/0x238
[   22.028383]  kunit_try_run_case+0x170/0x3f0
[   22.028423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028465]  kthread+0x328/0x630
[   22.028501]  ret_from_fork+0x10/0x20
[   22.028540] 
[   22.028586] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.028666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.028695] Hardware name: linux,dummy-virt (DT)
[   22.028730] ==================================================================
[   22.131214] ==================================================================
[   22.131306] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   22.131306] 
[   22.131366] Invalid free of 0x0000000067dadba1 (in kfence-#94):
[   22.131422]  test_double_free+0x100/0x238
[   22.131468]  kunit_try_run_case+0x170/0x3f0
[   22.131508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.131550]  kthread+0x328/0x630
[   22.131588]  ret_from_fork+0x10/0x20
[   22.131626] 
[   22.131649] kfence-#94: 0x0000000067dadba1-0x000000001af14dd3, size=32, cache=test
[   22.131649] 
[   22.131701] allocated by task 306 on cpu 0 at 22.131007s (0.000691s ago):
[   22.131763]  test_alloc+0x230/0x628
[   22.131802]  test_double_free+0xd4/0x238
[   22.131842]  kunit_try_run_case+0x170/0x3f0
[   22.131880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.131924]  kthread+0x328/0x630
[   22.131958]  ret_from_fork+0x10/0x20
[   22.132010] 
[   22.132035] freed by task 306 on cpu 0 at 22.131066s (0.000966s ago):
[   22.132095]  test_double_free+0xf0/0x238
[   22.132136]  kunit_try_run_case+0x170/0x3f0
[   22.132176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.132219]  kthread+0x328/0x630
[   22.132253]  ret_from_fork+0x10/0x20
[   22.132290] 
[   22.132332] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.132409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.132439] Hardware name: linux,dummy-virt (DT)
[   22.132472] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   21.712429] ==================================================================
[   21.712510] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   21.712510] 
[   21.712676] Use-after-free read at 0x0000000034c703aa (in kfence-#90):
[   21.712751]  test_use_after_free_read+0x114/0x248
[   21.712808]  kunit_try_run_case+0x170/0x3f0
[   21.713195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.713255]  kthread+0x328/0x630
[   21.713354]  ret_from_fork+0x10/0x20
[   21.713399] 
[   21.713460] kfence-#90: 0x0000000034c703aa-0x0000000022d7428b, size=32, cache=test
[   21.713460] 
[   21.713581] allocated by task 298 on cpu 1 at 21.711879s (0.001648s ago):
[   21.713685]  test_alloc+0x230/0x628
[   21.713744]  test_use_after_free_read+0xd0/0x248
[   21.713786]  kunit_try_run_case+0x170/0x3f0
[   21.714091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.714177]  kthread+0x328/0x630
[   21.714617]  ret_from_fork+0x10/0x20
[   21.714945] 
[   21.714992] freed by task 298 on cpu 1 at 21.711972s (0.003014s ago):
[   21.715174]  test_use_after_free_read+0xf0/0x248
[   21.715334]  kunit_try_run_case+0x170/0x3f0
[   21.715397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.715463]  kthread+0x328/0x630
[   21.715539]  ret_from_fork+0x10/0x20
[   21.715723] 
[   21.715790] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.715878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.715908] Hardware name: linux,dummy-virt (DT)
[   21.715950] ==================================================================
[   21.605067] ==================================================================
[   21.605177] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   21.605177] 
[   21.605270] Use-after-free read at 0x000000006d6fb5eb (in kfence-#89):
[   21.605322]  test_use_after_free_read+0x114/0x248
[   21.605369]  kunit_try_run_case+0x170/0x3f0
[   21.605469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.605530]  kthread+0x328/0x630
[   21.605570]  ret_from_fork+0x10/0x20
[   21.605608] 
[   21.605641] kfence-#89: 0x000000006d6fb5eb-0x00000000c4ebda01, size=32, cache=kmalloc-32
[   21.605641] 
[   21.606405] allocated by task 296 on cpu 1 at 21.604377s (0.001984s ago):
[   21.606485]  test_alloc+0x29c/0x628
[   21.606634]  test_use_after_free_read+0xd0/0x248
[   21.606741]  kunit_try_run_case+0x170/0x3f0
[   21.607219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.607311]  kthread+0x328/0x630
[   21.607495]  ret_from_fork+0x10/0x20
[   21.607560] 
[   21.607587] freed by task 296 on cpu 1 at 21.604448s (0.003135s ago):
[   21.607682]  test_use_after_free_read+0x1c0/0x248
[   21.608110]  kunit_try_run_case+0x170/0x3f0
[   21.608232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.608373]  kthread+0x328/0x630
[   21.608534]  ret_from_fork+0x10/0x20
[   21.608580] 
[   21.608629] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.608749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.609090] Hardware name: linux,dummy-virt (DT)
[   21.609198] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   21.501348] ==================================================================
[   21.501426] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   21.501426] 
[   21.501508] Out-of-bounds write at 0x00000000e80c0767 (1B left of kfence-#88):
[   21.501741]  test_out_of_bounds_write+0x100/0x240
[   21.501817]  kunit_try_run_case+0x170/0x3f0
[   21.501864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.501909]  kthread+0x328/0x630
[   21.501947]  ret_from_fork+0x10/0x20
[   21.501998] 
[   21.502023] kfence-#88: 0x00000000834f5000-0x00000000e791c5cd, size=32, cache=test
[   21.502023] 
[   21.502540] allocated by task 294 on cpu 1 at 21.501266s (0.000806s ago):
[   21.503243]  test_alloc+0x230/0x628
[   21.503343]  test_out_of_bounds_write+0xc8/0x240
[   21.503439]  kunit_try_run_case+0x170/0x3f0
[   21.503630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.503744]  kthread+0x328/0x630
[   21.503925]  ret_from_fork+0x10/0x20
[   21.504056] 
[   21.504108] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.504518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.504649] Hardware name: linux,dummy-virt (DT)
[   21.504736] ==================================================================
[   21.395263] ==================================================================
[   21.395317] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   21.395317] 
[   21.395483] Out-of-bounds write at 0x00000000969e6833 (1B left of kfence-#87):
[   21.395634]  test_out_of_bounds_write+0x100/0x240
[   21.395777]  kunit_try_run_case+0x170/0x3f0
[   21.395918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.396090]  kthread+0x328/0x630
[   21.396197]  ret_from_fork+0x10/0x20
[   21.396352] 
[   21.396378] kfence-#87: 0x00000000a9ce361d-0x00000000081d47db, size=32, cache=kmalloc-32
[   21.396378] 
[   21.396771] allocated by task 292 on cpu 1 at 21.395140s (0.001618s ago):
[   21.397018]  test_alloc+0x29c/0x628
[   21.397098]  test_out_of_bounds_write+0xc8/0x240
[   21.397141]  kunit_try_run_case+0x170/0x3f0
[   21.397182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.397228]  kthread+0x328/0x630
[   21.397264]  ret_from_fork+0x10/0x20
[   21.397303] 
[   21.397346] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.397480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.397581] Hardware name: linux,dummy-virt (DT)
[   21.397670] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   20.652922] ==================================================================
[   20.653015] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   20.653015] 
[   20.653114] Out-of-bounds read at 0x00000000f0f6ae81 (32B right of kfence-#80):
[   20.653186]  test_out_of_bounds_read+0x1c8/0x3e0
[   20.653235]  kunit_try_run_case+0x170/0x3f0
[   20.653586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.653673]  kthread+0x328/0x630
[   20.653714]  ret_from_fork+0x10/0x20
[   20.654130] 
[   20.654318] kfence-#80: 0x00000000337b69bc-0x00000000ca4ddb6b, size=32, cache=kmalloc-32
[   20.654318] 
[   20.654396] allocated by task 288 on cpu 1 at 20.652666s (0.001712s ago):
[   20.654492]  test_alloc+0x29c/0x628
[   20.654533]  test_out_of_bounds_read+0x198/0x3e0
[   20.654580]  kunit_try_run_case+0x170/0x3f0
[   20.654751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.655137]  kthread+0x328/0x630
[   20.655303]  ret_from_fork+0x10/0x20
[   20.655346] 
[   20.655698] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.655942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.655973] Hardware name: linux,dummy-virt (DT)
[   20.656075] ==================================================================
[   20.760141] ==================================================================
[   20.760343] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   20.760343] 
[   20.760424] Out-of-bounds read at 0x00000000c59cc4ab (1B left of kfence-#81):
[   20.760481]  test_out_of_bounds_read+0x114/0x3e0
[   20.760526]  kunit_try_run_case+0x170/0x3f0
[   20.760570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.760613]  kthread+0x328/0x630
[   20.760660]  ret_from_fork+0x10/0x20
[   20.760856] 
[   20.760892] kfence-#81: 0x00000000ebb73be9-0x000000006505a437, size=32, cache=test
[   20.760892] 
[   20.761351] allocated by task 290 on cpu 1 at 20.759944s (0.001351s ago):
[   20.762165]  test_alloc+0x230/0x628
[   20.762486]  test_out_of_bounds_read+0xdc/0x3e0
[   20.762589]  kunit_try_run_case+0x170/0x3f0
[   20.762926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.762985]  kthread+0x328/0x630
[   20.763021]  ret_from_fork+0x10/0x20
[   20.763060] 
[   20.763337] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.763502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.763531] Hardware name: linux,dummy-virt (DT)
[   20.763584] ==================================================================
[   21.288797] ==================================================================
[   21.288910] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.288910] 
[   21.289062] Out-of-bounds read at 0x000000004dfdaab0 (32B right of kfence-#86):
[   21.289120]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.289168]  kunit_try_run_case+0x170/0x3f0
[   21.289212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.289258]  kthread+0x328/0x630
[   21.289295]  ret_from_fork+0x10/0x20
[   21.289684] 
[   21.289758] kfence-#86: 0x000000002b2ded71-0x000000001feb644a, size=32, cache=test
[   21.289758] 
[   21.290354] allocated by task 290 on cpu 1 at 21.288293s (0.001951s ago):
[   21.290444]  test_alloc+0x230/0x628
[   21.290486]  test_out_of_bounds_read+0x198/0x3e0
[   21.290580]  kunit_try_run_case+0x170/0x3f0
[   21.290673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.290854]  kthread+0x328/0x630
[   21.290892]  ret_from_fork+0x10/0x20
[   21.290962] 
[   21.291400] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.291600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.291635] Hardware name: linux,dummy-virt (DT)
[   21.291945] ==================================================================
[   20.552191] ==================================================================
[   20.552572] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   20.552572] 
[   20.552922] Out-of-bounds read at 0x00000000f125e9f0 (1B left of kfence-#79):
[   20.553060]  test_out_of_bounds_read+0x114/0x3e0
[   20.553114]  kunit_try_run_case+0x170/0x3f0
[   20.553355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.553576]  kthread+0x328/0x630
[   20.553655]  ret_from_fork+0x10/0x20
[   20.553809] 
[   20.553835] kfence-#79: 0x00000000f252a979-0x00000000db7c753c, size=32, cache=kmalloc-32
[   20.553835] 
[   20.553895] allocated by task 288 on cpu 1 at 20.551139s (0.002747s ago):
[   20.554279]  test_alloc+0x29c/0x628
[   20.554396]  test_out_of_bounds_read+0xdc/0x3e0
[   20.554584]  kunit_try_run_case+0x170/0x3f0
[   20.554733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.554869]  kthread+0x328/0x630
[   20.554905]  ret_from_fork+0x10/0x20
[   20.554966] 
[   20.555268] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.555364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.555392] Hardware name: linux,dummy-virt (DT)
[   20.555427] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_16
[   16.859689] ==================================================================
[   16.859762] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8
[   16.859762] 
[   16.859819] Corrupted memory at 0x000000009dbacbd7 [ ! ! ! . . . . . . . . . . . . . ] (in kfence-#52):
[   16.863032]  kmalloc_oob_16+0x1f0/0x3f8
[   16.863223]  kunit_try_run_case+0x170/0x3f0
[   16.863266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.863308]  kthread+0x328/0x630
[   16.863340]  ret_from_fork+0x10/0x20
[   16.863383] 
[   16.864161] kfence-#52: 0x0000000087ffd4b9-0x00000000f9e28ecd, size=13, cache=kmalloc-16
[   16.864161] 
[   16.865195] allocated by task 167 on cpu 0 at 16.856258s (0.008839s ago):
[   16.865429]  kmalloc_oob_16+0xb4/0x3f8
[   16.865531]  kunit_try_run_case+0x170/0x3f0
[   16.865570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.865861]  kthread+0x328/0x630
[   16.865971]  ret_from_fork+0x10/0x20
[   16.866075] 
[   16.866506] freed by task 167 on cpu 0 at 16.858253s (0.007886s ago):
[   16.866748]  kmalloc_oob_16+0x1f0/0x3f8
[   16.866792]  kunit_try_run_case+0x170/0x3f0
[   16.866852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.866895]  kthread+0x328/0x630
[   16.867155]  ret_from_fork+0x10/0x20
[   16.867219] 
[   16.867426] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.867759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.868102] Hardware name: linux,dummy-virt (DT)
[   16.868154] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   20.264870] ==================================================================
[   20.266404] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   20.266512] Write of size 1 at addr fff00000c77ac378 by task kunit_try_catch/286
[   20.266563] 
[   20.266600] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.267224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.267263] Hardware name: linux,dummy-virt (DT)
[   20.267324] Call trace:
[   20.267348]  show_stack+0x20/0x38 (C)
[   20.267399]  dump_stack_lvl+0x8c/0xd0
[   20.267657]  print_report+0x118/0x608
[   20.267942]  kasan_report+0xdc/0x128
[   20.268262]  __asan_report_store1_noabort+0x20/0x30
[   20.268484]  strncpy_from_user+0x270/0x2a0
[   20.268544]  copy_user_test_oob+0x5c0/0xec8
[   20.268855]  kunit_try_run_case+0x170/0x3f0
[   20.268938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.269125]  kthread+0x328/0x630
[   20.269265]  ret_from_fork+0x10/0x20
[   20.269593] 
[   20.269626] Allocated by task 286:
[   20.269658]  kasan_save_stack+0x3c/0x68
[   20.270177]  kasan_save_track+0x20/0x40
[   20.270442]  kasan_save_alloc_info+0x40/0x58
[   20.270508]  __kasan_kmalloc+0xd4/0xd8
[   20.270549]  __kmalloc_noprof+0x198/0x4c8
[   20.271043]  kunit_kmalloc_array+0x34/0x88
[   20.271100]  copy_user_test_oob+0xac/0xec8
[   20.271142]  kunit_try_run_case+0x170/0x3f0
[   20.271182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.271227]  kthread+0x328/0x630
[   20.271261]  ret_from_fork+0x10/0x20
[   20.271998] 
[   20.272185] The buggy address belongs to the object at fff00000c77ac300
[   20.272185]  which belongs to the cache kmalloc-128 of size 128
[   20.272349] The buggy address is located 0 bytes to the right of
[   20.272349]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.272539] 
[   20.272658] The buggy address belongs to the physical page:
[   20.272869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.273161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.273736] page_type: f5(slab)
[   20.273937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.274039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.274420] page dumped because: kasan: bad access detected
[   20.274496] 
[   20.274562] Memory state around the buggy address:
[   20.274937]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.275205]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.275347] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.275393]                                                                 ^
[   20.275578]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.275866]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.276125] ==================================================================
[   20.254544] ==================================================================
[   20.254995] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   20.255341] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.255397] 
[   20.255429] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.256056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.256685] Hardware name: linux,dummy-virt (DT)
[   20.256913] Call trace:
[   20.256939]  show_stack+0x20/0x38 (C)
[   20.257151]  dump_stack_lvl+0x8c/0xd0
[   20.257388]  print_report+0x118/0x608
[   20.257437]  kasan_report+0xdc/0x128
[   20.257484]  kasan_check_range+0x100/0x1a8
[   20.257532]  __kasan_check_write+0x20/0x30
[   20.257578]  strncpy_from_user+0x3c/0x2a0
[   20.258084]  copy_user_test_oob+0x5c0/0xec8
[   20.258161]  kunit_try_run_case+0x170/0x3f0
[   20.258215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.258270]  kthread+0x328/0x630
[   20.258571]  ret_from_fork+0x10/0x20
[   20.258695] 
[   20.258716] Allocated by task 286:
[   20.258906]  kasan_save_stack+0x3c/0x68
[   20.258956]  kasan_save_track+0x20/0x40
[   20.259121]  kasan_save_alloc_info+0x40/0x58
[   20.259199]  __kasan_kmalloc+0xd4/0xd8
[   20.259241]  __kmalloc_noprof+0x198/0x4c8
[   20.259280]  kunit_kmalloc_array+0x34/0x88
[   20.259319]  copy_user_test_oob+0xac/0xec8
[   20.259499]  kunit_try_run_case+0x170/0x3f0
[   20.259939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.260189]  kthread+0x328/0x630
[   20.260224]  ret_from_fork+0x10/0x20
[   20.260262] 
[   20.260489] The buggy address belongs to the object at fff00000c77ac300
[   20.260489]  which belongs to the cache kmalloc-128 of size 128
[   20.260777] The buggy address is located 0 bytes inside of
[   20.260777]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.260912] 
[   20.261063] The buggy address belongs to the physical page:
[   20.261120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.261405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.261630] page_type: f5(slab)
[   20.261673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.261726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.262047] page dumped because: kasan: bad access detected
[   20.262240] 
[   20.262296] Memory state around the buggy address:
[   20.262656]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.262724]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.262854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.263064]                                                                 ^
[   20.263120]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.263175]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.263598] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   20.223415] ==================================================================
[   20.223473] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.223526] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.223578] 
[   20.223614] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.225209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.225255] Hardware name: linux,dummy-virt (DT)
[   20.225288] Call trace:
[   20.225348]  show_stack+0x20/0x38 (C)
[   20.225612]  dump_stack_lvl+0x8c/0xd0
[   20.225669]  print_report+0x118/0x608
[   20.225718]  kasan_report+0xdc/0x128
[   20.225762]  kasan_check_range+0x100/0x1a8
[   20.225811]  __kasan_check_read+0x20/0x30
[   20.226143]  copy_user_test_oob+0x3c8/0xec8
[   20.226206]  kunit_try_run_case+0x170/0x3f0
[   20.226701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.226913]  kthread+0x328/0x630
[   20.226960]  ret_from_fork+0x10/0x20
[   20.227023] 
[   20.227044] Allocated by task 286:
[   20.227592]  kasan_save_stack+0x3c/0x68
[   20.227659]  kasan_save_track+0x20/0x40
[   20.227699]  kasan_save_alloc_info+0x40/0x58
[   20.227749]  __kasan_kmalloc+0xd4/0xd8
[   20.227929]  __kmalloc_noprof+0x198/0x4c8
[   20.228299]  kunit_kmalloc_array+0x34/0x88
[   20.228408]  copy_user_test_oob+0xac/0xec8
[   20.228742]  kunit_try_run_case+0x170/0x3f0
[   20.229194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.229440]  kthread+0x328/0x630
[   20.229482]  ret_from_fork+0x10/0x20
[   20.229521] 
[   20.229543] The buggy address belongs to the object at fff00000c77ac300
[   20.229543]  which belongs to the cache kmalloc-128 of size 128
[   20.229656] The buggy address is located 0 bytes inside of
[   20.229656]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.230089] 
[   20.230321] The buggy address belongs to the physical page:
[   20.230569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.230695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.230748] page_type: f5(slab)
[   20.230962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.231038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.231084] page dumped because: kasan: bad access detected
[   20.231194] 
[   20.231359] Memory state around the buggy address:
[   20.231400]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.231470]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.231858] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.232060]                                                                 ^
[   20.232121]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.232206]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.232248] ==================================================================
[   20.243668] ==================================================================
[   20.243722] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.243773] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.243827] 
[   20.243859] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.244674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.244730] Hardware name: linux,dummy-virt (DT)
[   20.244952] Call trace:
[   20.244987]  show_stack+0x20/0x38 (C)
[   20.245268]  dump_stack_lvl+0x8c/0xd0
[   20.245439]  print_report+0x118/0x608
[   20.245734]  kasan_report+0xdc/0x128
[   20.245791]  kasan_check_range+0x100/0x1a8
[   20.245922]  __kasan_check_read+0x20/0x30
[   20.246132]  copy_user_test_oob+0x4a0/0xec8
[   20.246184]  kunit_try_run_case+0x170/0x3f0
[   20.246513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.246568]  kthread+0x328/0x630
[   20.246851]  ret_from_fork+0x10/0x20
[   20.247340] 
[   20.247448] Allocated by task 286:
[   20.247491]  kasan_save_stack+0x3c/0x68
[   20.247535]  kasan_save_track+0x20/0x40
[   20.247575]  kasan_save_alloc_info+0x40/0x58
[   20.247624]  __kasan_kmalloc+0xd4/0xd8
[   20.247663]  __kmalloc_noprof+0x198/0x4c8
[   20.247937]  kunit_kmalloc_array+0x34/0x88
[   20.247991]  copy_user_test_oob+0xac/0xec8
[   20.248608]  kunit_try_run_case+0x170/0x3f0
[   20.248895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.249284]  kthread+0x328/0x630
[   20.249323]  ret_from_fork+0x10/0x20
[   20.249362] 
[   20.249763] The buggy address belongs to the object at fff00000c77ac300
[   20.249763]  which belongs to the cache kmalloc-128 of size 128
[   20.250036] The buggy address is located 0 bytes inside of
[   20.250036]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.250106] 
[   20.250129] The buggy address belongs to the physical page:
[   20.250160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.250220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.250382] page_type: f5(slab)
[   20.250644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.250994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.251042] page dumped because: kasan: bad access detected
[   20.251076] 
[   20.251096] Memory state around the buggy address:
[   20.251341]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.251601]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.251854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.251900]                                                                 ^
[   20.252479]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.252814]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.252861] ==================================================================
[   20.234572] ==================================================================
[   20.234669] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.234723] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.234777] 
[   20.234814] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.234895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.234924] Hardware name: linux,dummy-virt (DT)
[   20.234987] Call trace:
[   20.235013]  show_stack+0x20/0x38 (C)
[   20.235295]  dump_stack_lvl+0x8c/0xd0
[   20.235359]  print_report+0x118/0x608
[   20.235408]  kasan_report+0xdc/0x128
[   20.235493]  kasan_check_range+0x100/0x1a8
[   20.235602]  __kasan_check_write+0x20/0x30
[   20.235670]  copy_user_test_oob+0x434/0xec8
[   20.236336]  kunit_try_run_case+0x170/0x3f0
[   20.236395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.236778]  kthread+0x328/0x630
[   20.237016]  ret_from_fork+0x10/0x20
[   20.237070] 
[   20.237091] Allocated by task 286:
[   20.237484]  kasan_save_stack+0x3c/0x68
[   20.237541]  kasan_save_track+0x20/0x40
[   20.237582]  kasan_save_alloc_info+0x40/0x58
[   20.237649]  __kasan_kmalloc+0xd4/0xd8
[   20.237688]  __kmalloc_noprof+0x198/0x4c8
[   20.237726]  kunit_kmalloc_array+0x34/0x88
[   20.237765]  copy_user_test_oob+0xac/0xec8
[   20.238250]  kunit_try_run_case+0x170/0x3f0
[   20.238490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.238631]  kthread+0x328/0x630
[   20.238669]  ret_from_fork+0x10/0x20
[   20.238708] 
[   20.238729] The buggy address belongs to the object at fff00000c77ac300
[   20.238729]  which belongs to the cache kmalloc-128 of size 128
[   20.238933] The buggy address is located 0 bytes inside of
[   20.238933]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.239010] 
[   20.239033] The buggy address belongs to the physical page:
[   20.239174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.239615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.239676] page_type: f5(slab)
[   20.239716] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.239768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.240140] page dumped because: kasan: bad access detected
[   20.240183] 
[   20.240203] Memory state around the buggy address:
[   20.240241]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.240507]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.240860] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.240967]                                                                 ^
[   20.241190]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.241236]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.241277] ==================================================================
[   20.168789] ==================================================================
[   20.168892] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.169714] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.170319] 
[   20.170385] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.170824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.171223] Hardware name: linux,dummy-virt (DT)
[   20.171264] Call trace:
[   20.171303]  show_stack+0x20/0x38 (C)
[   20.171920]  dump_stack_lvl+0x8c/0xd0
[   20.172002]  print_report+0x118/0x608
[   20.172280]  kasan_report+0xdc/0x128
[   20.172469]  kasan_check_range+0x100/0x1a8
[   20.172639]  __kasan_check_write+0x20/0x30
[   20.172724]  copy_user_test_oob+0x234/0xec8
[   20.172970]  kunit_try_run_case+0x170/0x3f0
[   20.173060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.173358]  kthread+0x328/0x630
[   20.173410]  ret_from_fork+0x10/0x20
[   20.173683] 
[   20.173745] Allocated by task 286:
[   20.173810]  kasan_save_stack+0x3c/0x68
[   20.174222]  kasan_save_track+0x20/0x40
[   20.174281]  kasan_save_alloc_info+0x40/0x58
[   20.174997]  __kasan_kmalloc+0xd4/0xd8
[   20.175054]  __kmalloc_noprof+0x198/0x4c8
[   20.175098]  kunit_kmalloc_array+0x34/0x88
[   20.177221]  copy_user_test_oob+0xac/0xec8
[   20.177320]  kunit_try_run_case+0x170/0x3f0
[   20.177373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.177555]  kthread+0x328/0x630
[   20.177941]  ret_from_fork+0x10/0x20
[   20.178002] 
[   20.178133] The buggy address belongs to the object at fff00000c77ac300
[   20.178133]  which belongs to the cache kmalloc-128 of size 128
[   20.178521] The buggy address is located 0 bytes inside of
[   20.178521]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.178719] 
[   20.178747] The buggy address belongs to the physical page:
[   20.178996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.179082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.179177] page_type: f5(slab)
[   20.179246] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.179528] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.179574] page dumped because: kasan: bad access detected
[   20.179611] 
[   20.179633] Memory state around the buggy address:
[   20.179671]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.179717]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179762] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.179803]                                                                 ^
[   20.179845]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179890]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.179932] ==================================================================
[   20.212527] ==================================================================
[   20.213091] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.213151] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.213204] 
[   20.213765] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.213865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.213893] Hardware name: linux,dummy-virt (DT)
[   20.214202] Call trace:
[   20.214503]  show_stack+0x20/0x38 (C)
[   20.214830]  dump_stack_lvl+0x8c/0xd0
[   20.214879]  print_report+0x118/0x608
[   20.215073]  kasan_report+0xdc/0x128
[   20.215122]  kasan_check_range+0x100/0x1a8
[   20.215173]  __kasan_check_write+0x20/0x30
[   20.215390]  copy_user_test_oob+0x35c/0xec8
[   20.215967]  kunit_try_run_case+0x170/0x3f0
[   20.216039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.216518]  kthread+0x328/0x630
[   20.216564]  ret_from_fork+0x10/0x20
[   20.217021] 
[   20.217048] Allocated by task 286:
[   20.217079]  kasan_save_stack+0x3c/0x68
[   20.217126]  kasan_save_track+0x20/0x40
[   20.217166]  kasan_save_alloc_info+0x40/0x58
[   20.217208]  __kasan_kmalloc+0xd4/0xd8
[   20.217725]  __kmalloc_noprof+0x198/0x4c8
[   20.217766]  kunit_kmalloc_array+0x34/0x88
[   20.217902]  copy_user_test_oob+0xac/0xec8
[   20.217941]  kunit_try_run_case+0x170/0x3f0
[   20.218458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.218508]  kthread+0x328/0x630
[   20.218541]  ret_from_fork+0x10/0x20
[   20.219159] 
[   20.219189] The buggy address belongs to the object at fff00000c77ac300
[   20.219189]  which belongs to the cache kmalloc-128 of size 128
[   20.219361] The buggy address is located 0 bytes inside of
[   20.219361]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.219431] 
[   20.219452] The buggy address belongs to the physical page:
[   20.219494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.219553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.219972] page_type: f5(slab)
[   20.220034] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.220416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.220464] page dumped because: kasan: bad access detected
[   20.220499] 
[   20.220552] Memory state around the buggy address:
[   20.220664]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.220744]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221157] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.221204]                                                                 ^
[   20.221249]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221472]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.221821] ==================================================================
[   20.189854] ==================================================================
[   20.189916] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.191897] Read of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.192051] 
[   20.192092] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.192200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.192227] Hardware name: linux,dummy-virt (DT)
[   20.192259] Call trace:
[   20.192283]  show_stack+0x20/0x38 (C)
[   20.192798]  dump_stack_lvl+0x8c/0xd0
[   20.192863]  print_report+0x118/0x608
[   20.192947]  kasan_report+0xdc/0x128
[   20.193424]  kasan_check_range+0x100/0x1a8
[   20.193806]  __kasan_check_read+0x20/0x30
[   20.193870]  copy_user_test_oob+0x728/0xec8
[   20.194187]  kunit_try_run_case+0x170/0x3f0
[   20.194308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.194365]  kthread+0x328/0x630
[   20.194407]  ret_from_fork+0x10/0x20
[   20.194878] 
[   20.194903] Allocated by task 286:
[   20.194934]  kasan_save_stack+0x3c/0x68
[   20.195165]  kasan_save_track+0x20/0x40
[   20.195440]  kasan_save_alloc_info+0x40/0x58
[   20.195867]  __kasan_kmalloc+0xd4/0xd8
[   20.195919]  __kmalloc_noprof+0x198/0x4c8
[   20.196075]  kunit_kmalloc_array+0x34/0x88
[   20.196151]  copy_user_test_oob+0xac/0xec8
[   20.196288]  kunit_try_run_case+0x170/0x3f0
[   20.196779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.197315]  kthread+0x328/0x630
[   20.197372]  ret_from_fork+0x10/0x20
[   20.197413] 
[   20.197758] The buggy address belongs to the object at fff00000c77ac300
[   20.197758]  which belongs to the cache kmalloc-128 of size 128
[   20.197918] The buggy address is located 0 bytes inside of
[   20.197918]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.198001] 
[   20.198129] The buggy address belongs to the physical page:
[   20.198164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.198239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.198903] page_type: f5(slab)
[   20.199070] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.199124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.199372] page dumped because: kasan: bad access detected
[   20.199413] 
[   20.199433] Memory state around the buggy address:
[   20.199602]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.199713]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.199759] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.200126]                                                                 ^
[   20.200518]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201032]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201528] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   20.069525] ==================================================================
[   20.069593] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.069673] Read of size 8 at addr fff00000c77ac278 by task kunit_try_catch/282
[   20.077995] 
[   20.078616] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.078715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.079384] Hardware name: linux,dummy-virt (DT)
[   20.079748] Call trace:
[   20.079781]  show_stack+0x20/0x38 (C)
[   20.080495]  dump_stack_lvl+0x8c/0xd0
[   20.080936]  print_report+0x118/0x608
[   20.080999]  kasan_report+0xdc/0x128
[   20.082528]  __asan_report_load8_noabort+0x20/0x30
[   20.082748]  copy_to_kernel_nofault+0x204/0x250
[   20.083022]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.083204]  kunit_try_run_case+0x170/0x3f0
[   20.083259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.083313]  kthread+0x328/0x630
[   20.083946]  ret_from_fork+0x10/0x20
[   20.084828] 
[   20.085961] Allocated by task 282:
[   20.086162]  kasan_save_stack+0x3c/0x68
[   20.086754]  kasan_save_track+0x20/0x40
[   20.087484]  kasan_save_alloc_info+0x40/0x58
[   20.087796]  __kasan_kmalloc+0xd4/0xd8
[   20.088433]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.088765]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.089125]  kunit_try_run_case+0x170/0x3f0
[   20.089172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.089218]  kthread+0x328/0x630
[   20.090137]  ret_from_fork+0x10/0x20
[   20.090452] 
[   20.090524] The buggy address belongs to the object at fff00000c77ac200
[   20.090524]  which belongs to the cache kmalloc-128 of size 128
[   20.091015] The buggy address is located 0 bytes to the right of
[   20.091015]  allocated 120-byte region [fff00000c77ac200, fff00000c77ac278)
[   20.091156] 
[   20.091182] The buggy address belongs to the physical page:
[   20.091220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.092461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.093009] page_type: f5(slab)
[   20.093465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.093648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.094037] page dumped because: kasan: bad access detected
[   20.094075] 
[   20.094656] Memory state around the buggy address:
[   20.094862]  fff00000c77ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.094912]  fff00000c77ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095115] >fff00000c77ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.095163]                                                                 ^
[   20.095208]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095253]  fff00000c77ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095296] ==================================================================
[   20.097777] ==================================================================
[   20.097838] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.097894] Write of size 8 at addr fff00000c77ac278 by task kunit_try_catch/282
[   20.097947] 
[   20.097995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.098080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.098109] Hardware name: linux,dummy-virt (DT)
[   20.099269] Call trace:
[   20.099311]  show_stack+0x20/0x38 (C)
[   20.099435]  dump_stack_lvl+0x8c/0xd0
[   20.099489]  print_report+0x118/0x608
[   20.099536]  kasan_report+0xdc/0x128
[   20.099582]  kasan_check_range+0x100/0x1a8
[   20.099631]  __kasan_check_write+0x20/0x30
[   20.099727]  copy_to_kernel_nofault+0x8c/0x250
[   20.099787]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.100354]  kunit_try_run_case+0x170/0x3f0
[   20.101407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.101717]  kthread+0x328/0x630
[   20.101950]  ret_from_fork+0x10/0x20
[   20.102232] 
[   20.102256] Allocated by task 282:
[   20.102524]  kasan_save_stack+0x3c/0x68
[   20.102633]  kasan_save_track+0x20/0x40
[   20.102997]  kasan_save_alloc_info+0x40/0x58
[   20.103046]  __kasan_kmalloc+0xd4/0xd8
[   20.103085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.103125]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.103169]  kunit_try_run_case+0x170/0x3f0
[   20.103869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.104133]  kthread+0x328/0x630
[   20.104298]  ret_from_fork+0x10/0x20
[   20.104338] 
[   20.104620] The buggy address belongs to the object at fff00000c77ac200
[   20.104620]  which belongs to the cache kmalloc-128 of size 128
[   20.104832] The buggy address is located 0 bytes to the right of
[   20.104832]  allocated 120-byte region [fff00000c77ac200, fff00000c77ac278)
[   20.104901] 
[   20.105249] The buggy address belongs to the physical page:
[   20.105290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.106016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.106298] page_type: f5(slab)
[   20.106512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.106573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.106938] page dumped because: kasan: bad access detected
[   20.106995] 
[   20.107328] Memory state around the buggy address:
[   20.107366]  fff00000c77ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.107546]  fff00000c77ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.107721] >fff00000c77ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.107814]                                                                 ^
[   20.107859]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.107905]  fff00000c77ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.107945] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   19.974320] ==================================================================
[   19.974446] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   19.974508] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270
[   19.974561] 
[   19.974597] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.974681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.974709] Hardware name: linux,dummy-virt (DT)
[   19.974780] Call trace:
[   19.974916]  show_stack+0x20/0x38 (C)
[   19.975098]  dump_stack_lvl+0x8c/0xd0
[   19.975206]  print_report+0x310/0x608
[   19.975340]  kasan_report+0xdc/0x128
[   19.975424]  __asan_report_load1_noabort+0x20/0x30
[   19.975586]  vmalloc_oob+0x578/0x5d0
[   19.975734]  kunit_try_run_case+0x170/0x3f0
[   19.975816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.975873]  kthread+0x328/0x630
[   19.975932]  ret_from_fork+0x10/0x20
[   19.975991] 
[   19.976019] The buggy address belongs to the virtual mapping at
[   19.976019]  [ffff8000800fe000, ffff800080100000) created by:
[   19.976019]  vmalloc_oob+0x98/0x5d0
[   19.976283] 
[   19.976310] The buggy address belongs to the physical page:
[   19.976346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e
[   19.976435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.976530] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.976619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.976731] page dumped because: kasan: bad access detected
[   19.976811] 
[   19.976926] Memory state around the buggy address:
[   19.977056]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.977226]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.977442] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.977537]                                                              ^
[   19.977690]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.977773]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.977926] ==================================================================
[   19.979151] ==================================================================
[   19.979214] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   19.979276] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270
[   19.979354] 
[   19.979388] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.979496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.979533] Hardware name: linux,dummy-virt (DT)
[   19.979615] Call trace:
[   19.979641]  show_stack+0x20/0x38 (C)
[   19.979689]  dump_stack_lvl+0x8c/0xd0
[   19.979735]  print_report+0x310/0x608
[   19.979784]  kasan_report+0xdc/0x128
[   19.979829]  __asan_report_load1_noabort+0x20/0x30
[   19.979881]  vmalloc_oob+0x51c/0x5d0
[   19.980236]  kunit_try_run_case+0x170/0x3f0
[   19.980321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.980437]  kthread+0x328/0x630
[   19.980509]  ret_from_fork+0x10/0x20
[   19.980611] 
[   19.980645] The buggy address belongs to the virtual mapping at
[   19.980645]  [ffff8000800fe000, ffff800080100000) created by:
[   19.980645]  vmalloc_oob+0x98/0x5d0
[   19.980721] 
[   19.980851] The buggy address belongs to the physical page:
[   19.980925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e
[   19.980999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.981137] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.981225] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.981293] page dumped because: kasan: bad access detected
[   19.981327] 
[   19.981358] Memory state around the buggy address:
[   19.981403]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.981462]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.981506] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.981546]                                                                 ^
[   19.981589]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.981635]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.981677] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   19.846855] ==================================================================
[   19.846900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.846949] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.847015] 
[   19.847045] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.847128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.847155] Hardware name: linux,dummy-virt (DT)
[   19.847188] Call trace:
[   19.847220]  show_stack+0x20/0x38 (C)
[   19.847268]  dump_stack_lvl+0x8c/0xd0
[   19.847352]  print_report+0x118/0x608
[   19.847401]  kasan_report+0xdc/0x128
[   19.848439]  __asan_report_load8_noabort+0x20/0x30
[   19.848508]  kasan_atomics_helper+0x3f04/0x4858
[   19.848566]  kasan_atomics+0x198/0x2e0
[   19.848847]  kunit_try_run_case+0x170/0x3f0
[   19.849014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849168]  kthread+0x328/0x630
[   19.849275]  ret_from_fork+0x10/0x20
[   19.849396] 
[   19.849415] Allocated by task 266:
[   19.849443]  kasan_save_stack+0x3c/0x68
[   19.849486]  kasan_save_track+0x20/0x40
[   19.849523]  kasan_save_alloc_info+0x40/0x58
[   19.849565]  __kasan_kmalloc+0xd4/0xd8
[   19.849602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.849648]  kasan_atomics+0xb8/0x2e0
[   19.849687]  kunit_try_run_case+0x170/0x3f0
[   19.849726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849803]  kthread+0x328/0x630
[   19.849938]  ret_from_fork+0x10/0x20
[   19.849985] 
[   19.850014] The buggy address belongs to the object at fff00000c77bfc80
[   19.850014]  which belongs to the cache kmalloc-64 of size 64
[   19.850189] The buggy address is located 0 bytes to the right of
[   19.850189]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.850256] 
[   19.850275] The buggy address belongs to the physical page:
[   19.850308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.850363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.850419] page_type: f5(slab)
[   19.850613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.850668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.850711] page dumped because: kasan: bad access detected
[   19.850776] 
[   19.850798] Memory state around the buggy address:
[   19.850833]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.850881]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.850930] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.850986]                                      ^
[   19.851019]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851074]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851226] ==================================================================
[   19.865358] ==================================================================
[   19.865409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.865458] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.865732] 
[   19.865937] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.866393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.866825] Hardware name: linux,dummy-virt (DT)
[   19.866866] Call trace:
[   19.866889]  show_stack+0x20/0x38 (C)
[   19.867149]  dump_stack_lvl+0x8c/0xd0
[   19.867336]  print_report+0x118/0x608
[   19.867385]  kasan_report+0xdc/0x128
[   19.867463]  kasan_check_range+0x100/0x1a8
[   19.867594]  __kasan_check_write+0x20/0x30
[   19.867662]  kasan_atomics_helper+0x15b4/0x4858
[   19.867711]  kasan_atomics+0x198/0x2e0
[   19.867757]  kunit_try_run_case+0x170/0x3f0
[   19.867805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868228]  kthread+0x328/0x630
[   19.868283]  ret_from_fork+0x10/0x20
[   19.868330] 
[   19.868549] Allocated by task 266:
[   19.868586]  kasan_save_stack+0x3c/0x68
[   19.868654]  kasan_save_track+0x20/0x40
[   19.869006]  kasan_save_alloc_info+0x40/0x58
[   19.869320]  __kasan_kmalloc+0xd4/0xd8
[   19.869362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.869403]  kasan_atomics+0xb8/0x2e0
[   19.869443]  kunit_try_run_case+0x170/0x3f0
[   19.869481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.869527]  kthread+0x328/0x630
[   19.870406]  ret_from_fork+0x10/0x20
[   19.870459] 
[   19.870575] The buggy address belongs to the object at fff00000c77bfc80
[   19.870575]  which belongs to the cache kmalloc-64 of size 64
[   19.870694] The buggy address is located 0 bytes to the right of
[   19.870694]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.871230] 
[   19.871951] The buggy address belongs to the physical page:
[   19.872283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.872483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.873023] page_type: f5(slab)
[   19.873314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.873381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.873469] page dumped because: kasan: bad access detected
[   19.873591] 
[   19.873789] Memory state around the buggy address:
[   19.873831]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.873878]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.874353] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.874628]                                      ^
[   19.874766]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.874816]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.875079] ==================================================================
[   19.819384] ==================================================================
[   19.819462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.819553] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.819744] 
[   19.819781] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.819965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.820083] Hardware name: linux,dummy-virt (DT)
[   19.820118] Call trace:
[   19.820169]  show_stack+0x20/0x38 (C)
[   19.820222]  dump_stack_lvl+0x8c/0xd0
[   19.820298]  print_report+0x118/0x608
[   19.820371]  kasan_report+0xdc/0x128
[   19.820423]  kasan_check_range+0x100/0x1a8
[   19.820473]  __kasan_check_write+0x20/0x30
[   19.820529]  kasan_atomics_helper+0x10c0/0x4858
[   19.820880]  kasan_atomics+0x198/0x2e0
[   19.820944]  kunit_try_run_case+0x170/0x3f0
[   19.821005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.821059]  kthread+0x328/0x630
[   19.821101]  ret_from_fork+0x10/0x20
[   19.821148] 
[   19.821169] Allocated by task 266:
[   19.821197]  kasan_save_stack+0x3c/0x68
[   19.821242]  kasan_save_track+0x20/0x40
[   19.821280]  kasan_save_alloc_info+0x40/0x58
[   19.822296]  __kasan_kmalloc+0xd4/0xd8
[   19.822371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.822415]  kasan_atomics+0xb8/0x2e0
[   19.822459]  kunit_try_run_case+0x170/0x3f0
[   19.822521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.822567]  kthread+0x328/0x630
[   19.822682]  ret_from_fork+0x10/0x20
[   19.822720] 
[   19.822743] The buggy address belongs to the object at fff00000c77bfc80
[   19.822743]  which belongs to the cache kmalloc-64 of size 64
[   19.822810] The buggy address is located 0 bytes to the right of
[   19.822810]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.823128] 
[   19.823161] The buggy address belongs to the physical page:
[   19.823195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.823454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.823567] page_type: f5(slab)
[   19.823605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.823664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.823755] page dumped because: kasan: bad access detected
[   19.823789] 
[   19.823871] Memory state around the buggy address:
[   19.823997]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.824043]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.824088] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.824130]                                      ^
[   19.824162]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824206]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824247] ==================================================================
[   19.752598] ==================================================================
[   19.752653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.752703] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.752755] 
[   19.752787] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.752869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.752898] Hardware name: linux,dummy-virt (DT)
[   19.752930] Call trace:
[   19.752953]  show_stack+0x20/0x38 (C)
[   19.753016]  dump_stack_lvl+0x8c/0xd0
[   19.753079]  print_report+0x118/0x608
[   19.753128]  kasan_report+0xdc/0x128
[   19.753173]  kasan_check_range+0x100/0x1a8
[   19.753222]  __kasan_check_read+0x20/0x30
[   19.753267]  kasan_atomics_helper+0xdd4/0x4858
[   19.753314]  kasan_atomics+0x198/0x2e0
[   19.753360]  kunit_try_run_case+0x170/0x3f0
[   19.753406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.753459]  kthread+0x328/0x630
[   19.753510]  ret_from_fork+0x10/0x20
[   19.753559] 
[   19.753588] Allocated by task 266:
[   19.753624]  kasan_save_stack+0x3c/0x68
[   19.753667]  kasan_save_track+0x20/0x40
[   19.753705]  kasan_save_alloc_info+0x40/0x58
[   19.753747]  __kasan_kmalloc+0xd4/0xd8
[   19.753785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.753825]  kasan_atomics+0xb8/0x2e0
[   19.753870]  kunit_try_run_case+0x170/0x3f0
[   19.753910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.753955]  kthread+0x328/0x630
[   19.754320]  ret_from_fork+0x10/0x20
[   19.754393] 
[   19.754759] The buggy address belongs to the object at fff00000c77bfc80
[   19.754759]  which belongs to the cache kmalloc-64 of size 64
[   19.754840] The buggy address is located 0 bytes to the right of
[   19.754840]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.754960] 
[   19.755310] The buggy address belongs to the physical page:
[   19.755704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.756071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.756388] page_type: f5(slab)
[   19.756596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.756921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.757114] page dumped because: kasan: bad access detected
[   19.757450] 
[   19.757510] Memory state around the buggy address:
[   19.757659]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.757727]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.757935] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.758195]                                      ^
[   19.758436]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759246]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759393] ==================================================================
[   19.759804] ==================================================================
[   19.759854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.760229] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.760497] 
[   19.760685] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.760781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.760809] Hardware name: linux,dummy-virt (DT)
[   19.760843] Call trace:
[   19.760866]  show_stack+0x20/0x38 (C)
[   19.761128]  dump_stack_lvl+0x8c/0xd0
[   19.761438]  print_report+0x118/0x608
[   19.761668]  kasan_report+0xdc/0x128
[   19.761913]  __asan_report_load8_noabort+0x20/0x30
[   19.762116]  kasan_atomics_helper+0x3f58/0x4858
[   19.762178]  kasan_atomics+0x198/0x2e0
[   19.762444]  kunit_try_run_case+0x170/0x3f0
[   19.762595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.762838]  kthread+0x328/0x630
[   19.762893]  ret_from_fork+0x10/0x20
[   19.762946] 
[   19.762966] Allocated by task 266:
[   19.763005]  kasan_save_stack+0x3c/0x68
[   19.763550]  kasan_save_track+0x20/0x40
[   19.763751]  kasan_save_alloc_info+0x40/0x58
[   19.764015]  __kasan_kmalloc+0xd4/0xd8
[   19.764323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.764621]  kasan_atomics+0xb8/0x2e0
[   19.764812]  kunit_try_run_case+0x170/0x3f0
[   19.765041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.765152]  kthread+0x328/0x630
[   19.765246]  ret_from_fork+0x10/0x20
[   19.765896] 
[   19.765952] The buggy address belongs to the object at fff00000c77bfc80
[   19.765952]  which belongs to the cache kmalloc-64 of size 64
[   19.766262] The buggy address is located 0 bytes to the right of
[   19.766262]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.766661] 
[   19.766698] The buggy address belongs to the physical page:
[   19.766860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.767094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.767187] page_type: f5(slab)
[   19.767553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.767631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.767862] page dumped because: kasan: bad access detected
[   19.768040] 
[   19.768256] Memory state around the buggy address:
[   19.768302]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768543]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768668] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.769064]                                      ^
[   19.769573]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769986]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.770077] ==================================================================
[   19.722331] ==================================================================
[   19.722400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.722454] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.722515] 
[   19.722549] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.723239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.723315] Hardware name: linux,dummy-virt (DT)
[   19.723378] Call trace:
[   19.723531]  show_stack+0x20/0x38 (C)
[   19.723673]  dump_stack_lvl+0x8c/0xd0
[   19.723737]  print_report+0x118/0x608
[   19.724143]  kasan_report+0xdc/0x128
[   19.724223]  __asan_report_load4_noabort+0x20/0x30
[   19.724466]  kasan_atomics_helper+0x3dd8/0x4858
[   19.724672]  kasan_atomics+0x198/0x2e0
[   19.724839]  kunit_try_run_case+0x170/0x3f0
[   19.725140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.725316]  kthread+0x328/0x630
[   19.725612]  ret_from_fork+0x10/0x20
[   19.726061] 
[   19.726131] Allocated by task 266:
[   19.726208]  kasan_save_stack+0x3c/0x68
[   19.726278]  kasan_save_track+0x20/0x40
[   19.726318]  kasan_save_alloc_info+0x40/0x58
[   19.726910]  __kasan_kmalloc+0xd4/0xd8
[   19.727086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.727240]  kasan_atomics+0xb8/0x2e0
[   19.727286]  kunit_try_run_case+0x170/0x3f0
[   19.727349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.727715]  kthread+0x328/0x630
[   19.728105]  ret_from_fork+0x10/0x20
[   19.728176] 
[   19.728382] The buggy address belongs to the object at fff00000c77bfc80
[   19.728382]  which belongs to the cache kmalloc-64 of size 64
[   19.728486] The buggy address is located 0 bytes to the right of
[   19.728486]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.728743] 
[   19.728836] The buggy address belongs to the physical page:
[   19.729213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.729280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.729895] page_type: f5(slab)
[   19.730099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.730334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.730743] page dumped because: kasan: bad access detected
[   19.730811] 
[   19.730949] Memory state around the buggy address:
[   19.731072]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.731327]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.731558] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.731625]                                      ^
[   19.731918]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.732045]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.732121] ==================================================================
[   19.923147] ==================================================================
[   19.923205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.924462] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.924534] 
[   19.924571] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.924662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.924690] Hardware name: linux,dummy-virt (DT)
[   19.925133] Call trace:
[   19.925362]  show_stack+0x20/0x38 (C)
[   19.925420]  dump_stack_lvl+0x8c/0xd0
[   19.925468]  print_report+0x118/0x608
[   19.926048]  kasan_report+0xdc/0x128
[   19.926118]  __asan_report_load8_noabort+0x20/0x30
[   19.926325]  kasan_atomics_helper+0x3e10/0x4858
[   19.926453]  kasan_atomics+0x198/0x2e0
[   19.926602]  kunit_try_run_case+0x170/0x3f0
[   19.926944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.927379]  kthread+0x328/0x630
[   19.927638]  ret_from_fork+0x10/0x20
[   19.927701] 
[   19.927721] Allocated by task 266:
[   19.927758]  kasan_save_stack+0x3c/0x68
[   19.927894]  kasan_save_track+0x20/0x40
[   19.927986]  kasan_save_alloc_info+0x40/0x58
[   19.928046]  __kasan_kmalloc+0xd4/0xd8
[   19.928087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.928528]  kasan_atomics+0xb8/0x2e0
[   19.928577]  kunit_try_run_case+0x170/0x3f0
[   19.928913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.929259]  kthread+0x328/0x630
[   19.929458]  ret_from_fork+0x10/0x20
[   19.929498] 
[   19.929765] The buggy address belongs to the object at fff00000c77bfc80
[   19.929765]  which belongs to the cache kmalloc-64 of size 64
[   19.929834] The buggy address is located 0 bytes to the right of
[   19.929834]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.930120] 
[   19.930147] The buggy address belongs to the physical page:
[   19.930183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.930387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.930439] page_type: f5(slab)
[   19.930479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.930813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.930871] page dumped because: kasan: bad access detected
[   19.930992] 
[   19.931016] Memory state around the buggy address:
[   19.931179]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.931430]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.931751] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.931800]                                      ^
[   19.931836]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932098]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932293] ==================================================================
[   19.950232] ==================================================================
[   19.950287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.950337] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.950388] 
[   19.950421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.953099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.953131] Hardware name: linux,dummy-virt (DT)
[   19.953164] Call trace:
[   19.953189]  show_stack+0x20/0x38 (C)
[   19.953240]  dump_stack_lvl+0x8c/0xd0
[   19.953291]  print_report+0x118/0x608
[   19.953337]  kasan_report+0xdc/0x128
[   19.953384]  __asan_report_load8_noabort+0x20/0x30
[   19.953436]  kasan_atomics_helper+0x3e20/0x4858
[   19.953484]  kasan_atomics+0x198/0x2e0
[   19.953531]  kunit_try_run_case+0x170/0x3f0
[   19.953578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.953637]  kthread+0x328/0x630
[   19.953680]  ret_from_fork+0x10/0x20
[   19.953727] 
[   19.953747] Allocated by task 266:
[   19.953777]  kasan_save_stack+0x3c/0x68
[   19.953818]  kasan_save_track+0x20/0x40
[   19.953857]  kasan_save_alloc_info+0x40/0x58
[   19.953920]  __kasan_kmalloc+0xd4/0xd8
[   19.953996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.954039]  kasan_atomics+0xb8/0x2e0
[   19.954075]  kunit_try_run_case+0x170/0x3f0
[   19.954114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.954157]  kthread+0x328/0x630
[   19.954193]  ret_from_fork+0x10/0x20
[   19.954239] 
[   19.954268] The buggy address belongs to the object at fff00000c77bfc80
[   19.954268]  which belongs to the cache kmalloc-64 of size 64
[   19.954336] The buggy address is located 0 bytes to the right of
[   19.954336]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.954414] 
[   19.954451] The buggy address belongs to the physical page:
[   19.954491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.954545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.954604] page_type: f5(slab)
[   19.954926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.955214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.955375] page dumped because: kasan: bad access detected
[   19.955447] 
[   19.955624] Memory state around the buggy address:
[   19.955824]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.955941]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.956074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.956116]                                      ^
[   19.956150]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.956196]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.956236] ==================================================================
[   19.862241] ==================================================================
[   19.862287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.862334] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.862384] 
[   19.862413] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.862495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.862521] Hardware name: linux,dummy-virt (DT)
[   19.862554] Call trace:
[   19.862575]  show_stack+0x20/0x38 (C)
[   19.862634]  dump_stack_lvl+0x8c/0xd0
[   19.862681]  print_report+0x118/0x608
[   19.862727]  kasan_report+0xdc/0x128
[   19.862772]  kasan_check_range+0x100/0x1a8
[   19.862823]  __kasan_check_write+0x20/0x30
[   19.862868]  kasan_atomics_helper+0x154c/0x4858
[   19.862915]  kasan_atomics+0x198/0x2e0
[   19.862961]  kunit_try_run_case+0x170/0x3f0
[   19.863019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863070]  kthread+0x328/0x630
[   19.863112]  ret_from_fork+0x10/0x20
[   19.863158] 
[   19.863211] Allocated by task 266:
[   19.863245]  kasan_save_stack+0x3c/0x68
[   19.863286]  kasan_save_track+0x20/0x40
[   19.863325]  kasan_save_alloc_info+0x40/0x58
[   19.863367]  __kasan_kmalloc+0xd4/0xd8
[   19.863405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.863493]  kasan_atomics+0xb8/0x2e0
[   19.863531]  kunit_try_run_case+0x170/0x3f0
[   19.863569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863636]  kthread+0x328/0x630
[   19.863672]  ret_from_fork+0x10/0x20
[   19.863710] 
[   19.863730] The buggy address belongs to the object at fff00000c77bfc80
[   19.863730]  which belongs to the cache kmalloc-64 of size 64
[   19.863790] The buggy address is located 0 bytes to the right of
[   19.863790]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.863855] 
[   19.863876] The buggy address belongs to the physical page:
[   19.863909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.863961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.864021] page_type: f5(slab)
[   19.864057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.864110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.864152] page dumped because: kasan: bad access detected
[   19.864186] 
[   19.864205] Memory state around the buggy address:
[   19.864238]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.864283]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.864329] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.864370]                                      ^
[   19.864484]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.864582]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.864728] ==================================================================
[   19.883414] ==================================================================
[   19.883522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.883571] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.883623] 
[   19.883654] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.883737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.883766] Hardware name: linux,dummy-virt (DT)
[   19.883797] Call trace:
[   19.883823]  show_stack+0x20/0x38 (C)
[   19.883869]  dump_stack_lvl+0x8c/0xd0
[   19.884203]  print_report+0x118/0x608
[   19.884282]  kasan_report+0xdc/0x128
[   19.884937]  kasan_check_range+0x100/0x1a8
[   19.885209]  __kasan_check_write+0x20/0x30
[   19.885258]  kasan_atomics_helper+0x1644/0x4858
[   19.886714]  kasan_atomics+0x198/0x2e0
[   19.887216]  kunit_try_run_case+0x170/0x3f0
[   19.887410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.887484]  kthread+0x328/0x630
[   19.887843]  ret_from_fork+0x10/0x20
[   19.888098] 
[   19.888137] Allocated by task 266:
[   19.888283]  kasan_save_stack+0x3c/0x68
[   19.888601]  kasan_save_track+0x20/0x40
[   19.888644]  kasan_save_alloc_info+0x40/0x58
[   19.888846]  __kasan_kmalloc+0xd4/0xd8
[   19.888887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.889440]  kasan_atomics+0xb8/0x2e0
[   19.889522]  kunit_try_run_case+0x170/0x3f0
[   19.889736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889852]  kthread+0x328/0x630
[   19.890061]  ret_from_fork+0x10/0x20
[   19.890501] 
[   19.890599] The buggy address belongs to the object at fff00000c77bfc80
[   19.890599]  which belongs to the cache kmalloc-64 of size 64
[   19.890671] The buggy address is located 0 bytes to the right of
[   19.890671]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.890739] 
[   19.890760] The buggy address belongs to the physical page:
[   19.890795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.891373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.891430] page_type: f5(slab)
[   19.891471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.892257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.892701] page dumped because: kasan: bad access detected
[   19.892941] 
[   19.892963] Memory state around the buggy address:
[   19.893011]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.893060]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.893106] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.893829]                                      ^
[   19.894187]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894237]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894344] ==================================================================
[   19.827331] ==================================================================
[   19.827380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.827492] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.827670] 
[   19.827701] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.827791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.828178] Hardware name: linux,dummy-virt (DT)
[   19.828251] Call trace:
[   19.828435]  show_stack+0x20/0x38 (C)
[   19.828487]  dump_stack_lvl+0x8c/0xd0
[   19.828532]  print_report+0x118/0x608
[   19.828648]  kasan_report+0xdc/0x128
[   19.828718]  kasan_check_range+0x100/0x1a8
[   19.829106]  __kasan_check_write+0x20/0x30
[   19.829154]  kasan_atomics_helper+0x1190/0x4858
[   19.829201]  kasan_atomics+0x198/0x2e0
[   19.829328]  kunit_try_run_case+0x170/0x3f0
[   19.829538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.829804]  kthread+0x328/0x630
[   19.829854]  ret_from_fork+0x10/0x20
[   19.829958] 
[   19.829987] Allocated by task 266:
[   19.830017]  kasan_save_stack+0x3c/0x68
[   19.830057]  kasan_save_track+0x20/0x40
[   19.830097]  kasan_save_alloc_info+0x40/0x58
[   19.830138]  __kasan_kmalloc+0xd4/0xd8
[   19.830175]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.830216]  kasan_atomics+0xb8/0x2e0
[   19.830251]  kunit_try_run_case+0x170/0x3f0
[   19.830292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.830335]  kthread+0x328/0x630
[   19.830368]  ret_from_fork+0x10/0x20
[   19.830405] 
[   19.830425] The buggy address belongs to the object at fff00000c77bfc80
[   19.830425]  which belongs to the cache kmalloc-64 of size 64
[   19.830498] The buggy address is located 0 bytes to the right of
[   19.830498]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.830756] 
[   19.830778] The buggy address belongs to the physical page:
[   19.830812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.830890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.830939] page_type: f5(slab)
[   19.830986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.831039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.831081] page dumped because: kasan: bad access detected
[   19.831115] 
[   19.831135] Memory state around the buggy address:
[   19.831174]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.831219]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.831265] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.831364]                                      ^
[   19.831588]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.831639]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.831753] ==================================================================
[   19.734107] ==================================================================
[   19.734466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.734849] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.735010] 
[   19.735209] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.735346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.735387] Hardware name: linux,dummy-virt (DT)
[   19.735426] Call trace:
[   19.735451]  show_stack+0x20/0x38 (C)
[   19.735510]  dump_stack_lvl+0x8c/0xd0
[   19.735744]  print_report+0x118/0x608
[   19.735962]  kasan_report+0xdc/0x128
[   19.736234]  kasan_check_range+0x100/0x1a8
[   19.736484]  __kasan_check_write+0x20/0x30
[   19.736637]  kasan_atomics_helper+0xd3c/0x4858
[   19.736898]  kasan_atomics+0x198/0x2e0
[   19.736956]  kunit_try_run_case+0x170/0x3f0
[   19.737020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.737074]  kthread+0x328/0x630
[   19.737116]  ret_from_fork+0x10/0x20
[   19.737306] 
[   19.737339] Allocated by task 266:
[   19.737395]  kasan_save_stack+0x3c/0x68
[   19.737443]  kasan_save_track+0x20/0x40
[   19.737484]  kasan_save_alloc_info+0x40/0x58
[   19.737528]  __kasan_kmalloc+0xd4/0xd8
[   19.737578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.737646]  kasan_atomics+0xb8/0x2e0
[   19.737692]  kunit_try_run_case+0x170/0x3f0
[   19.737732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.737786]  kthread+0x328/0x630
[   19.737831]  ret_from_fork+0x10/0x20
[   19.737869] 
[   19.737898] The buggy address belongs to the object at fff00000c77bfc80
[   19.737898]  which belongs to the cache kmalloc-64 of size 64
[   19.737957] The buggy address is located 0 bytes to the right of
[   19.737957]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.738035] 
[   19.738067] The buggy address belongs to the physical page:
[   19.738109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.738181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.738231] page_type: f5(slab)
[   19.738300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.738371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.738425] page dumped because: kasan: bad access detected
[   19.738471] 
[   19.738501] Memory state around the buggy address:
[   19.738534]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738579]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738883] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.739184]                                      ^
[   19.739230]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.739278]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.739689] ==================================================================
[   19.648160] ==================================================================
[   19.648364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.648418] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.648994] 
[   19.649199] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.649421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.649536] Hardware name: linux,dummy-virt (DT)
[   19.649717] Call trace:
[   19.649759]  show_stack+0x20/0x38 (C)
[   19.649812]  dump_stack_lvl+0x8c/0xd0
[   19.650141]  print_report+0x118/0x608
[   19.650469]  kasan_report+0xdc/0x128
[   19.650539]  kasan_check_range+0x100/0x1a8
[   19.650591]  __kasan_check_write+0x20/0x30
[   19.650702]  kasan_atomics_helper+0xa6c/0x4858
[   19.650782]  kasan_atomics+0x198/0x2e0
[   19.650927]  kunit_try_run_case+0x170/0x3f0
[   19.650992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.651341]  kthread+0x328/0x630
[   19.651509]  ret_from_fork+0x10/0x20
[   19.651598] 
[   19.651812] Allocated by task 266:
[   19.651850]  kasan_save_stack+0x3c/0x68
[   19.651905]  kasan_save_track+0x20/0x40
[   19.651944]  kasan_save_alloc_info+0x40/0x58
[   19.651996]  __kasan_kmalloc+0xd4/0xd8
[   19.652034]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.652077]  kasan_atomics+0xb8/0x2e0
[   19.652114]  kunit_try_run_case+0x170/0x3f0
[   19.652155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.652200]  kthread+0x328/0x630
[   19.652235]  ret_from_fork+0x10/0x20
[   19.652274] 
[   19.652294] The buggy address belongs to the object at fff00000c77bfc80
[   19.652294]  which belongs to the cache kmalloc-64 of size 64
[   19.652354] The buggy address is located 0 bytes to the right of
[   19.652354]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.652421] 
[   19.652441] The buggy address belongs to the physical page:
[   19.652474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.652529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.652578] page_type: f5(slab)
[   19.652617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.652669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.652711] page dumped because: kasan: bad access detected
[   19.652909] 
[   19.652934] Memory state around the buggy address:
[   19.652971]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.653381]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.653541] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.653917]                                      ^
[   19.654096]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.654191]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.654233] ==================================================================
[   19.673254] ==================================================================
[   19.673578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   19.673656] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.673709] 
[   19.673745] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.674328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.674429] Hardware name: linux,dummy-virt (DT)
[   19.674490] Call trace:
[   19.674527]  show_stack+0x20/0x38 (C)
[   19.674581]  dump_stack_lvl+0x8c/0xd0
[   19.674913]  print_report+0x118/0x608
[   19.674993]  kasan_report+0xdc/0x128
[   19.675448]  kasan_check_range+0x100/0x1a8
[   19.675610]  __kasan_check_write+0x20/0x30
[   19.675825]  kasan_atomics_helper+0xb70/0x4858
[   19.676061]  kasan_atomics+0x198/0x2e0
[   19.676183]  kunit_try_run_case+0x170/0x3f0
[   19.676270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.676340]  kthread+0x328/0x630
[   19.677335]  ret_from_fork+0x10/0x20
[   19.677434] 
[   19.677488] Allocated by task 266:
[   19.677639]  kasan_save_stack+0x3c/0x68
[   19.677851]  kasan_save_track+0x20/0x40
[   19.677994]  kasan_save_alloc_info+0x40/0x58
[   19.678086]  __kasan_kmalloc+0xd4/0xd8
[   19.678186]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.678252]  kasan_atomics+0xb8/0x2e0
[   19.678358]  kunit_try_run_case+0x170/0x3f0
[   19.678434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.678628]  kthread+0x328/0x630
[   19.678824]  ret_from_fork+0x10/0x20
[   19.678894] 
[   19.679161] The buggy address belongs to the object at fff00000c77bfc80
[   19.679161]  which belongs to the cache kmalloc-64 of size 64
[   19.679246] The buggy address is located 0 bytes to the right of
[   19.679246]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.679446] 
[   19.679474] The buggy address belongs to the physical page:
[   19.679508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.679720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.680035] page_type: f5(slab)
[   19.680462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.680547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.680591] page dumped because: kasan: bad access detected
[   19.680778] 
[   19.681304] Memory state around the buggy address:
[   19.681425]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.681543]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.681652] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.682106]                                      ^
[   19.682171]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.682236]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.682279] ==================================================================
[   19.639300] ==================================================================
[   19.639373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   19.639444] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.639514] 
[   19.639547] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.639631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.640358] Hardware name: linux,dummy-virt (DT)
[   19.640412] Call trace:
[   19.640528]  show_stack+0x20/0x38 (C)
[   19.640634]  dump_stack_lvl+0x8c/0xd0
[   19.640687]  print_report+0x118/0x608
[   19.640733]  kasan_report+0xdc/0x128
[   19.640926]  kasan_check_range+0x100/0x1a8
[   19.641154]  __kasan_check_write+0x20/0x30
[   19.641224]  kasan_atomics_helper+0xa04/0x4858
[   19.641542]  kasan_atomics+0x198/0x2e0
[   19.641645]  kunit_try_run_case+0x170/0x3f0
[   19.641697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.642175]  kthread+0x328/0x630
[   19.642287]  ret_from_fork+0x10/0x20
[   19.642352] 
[   19.642372] Allocated by task 266:
[   19.642403]  kasan_save_stack+0x3c/0x68
[   19.642450]  kasan_save_track+0x20/0x40
[   19.642900]  kasan_save_alloc_info+0x40/0x58
[   19.643159]  __kasan_kmalloc+0xd4/0xd8
[   19.643296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.643410]  kasan_atomics+0xb8/0x2e0
[   19.643452]  kunit_try_run_case+0x170/0x3f0
[   19.643611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.643829]  kthread+0x328/0x630
[   19.644048]  ret_from_fork+0x10/0x20
[   19.644107] 
[   19.644397] The buggy address belongs to the object at fff00000c77bfc80
[   19.644397]  which belongs to the cache kmalloc-64 of size 64
[   19.644523] The buggy address is located 0 bytes to the right of
[   19.644523]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.644593] 
[   19.644636] The buggy address belongs to the physical page:
[   19.644679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.644754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.644812] page_type: f5(slab)
[   19.644866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.644919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.644971] page dumped because: kasan: bad access detected
[   19.645040] 
[   19.645094] Memory state around the buggy address:
[   19.645156]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645636]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645716] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.646001]                                      ^
[   19.646044]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.646479]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.646762] ==================================================================
[   19.839131] ==================================================================
[   19.839186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.839352] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.839474] 
[   19.839504] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.839607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.839636] Hardware name: linux,dummy-virt (DT)
[   19.839666] Call trace:
[   19.839691]  show_stack+0x20/0x38 (C)
[   19.839738]  dump_stack_lvl+0x8c/0xd0
[   19.839785]  print_report+0x118/0x608
[   19.839830]  kasan_report+0xdc/0x128
[   19.839876]  kasan_check_range+0x100/0x1a8
[   19.839945]  __kasan_check_write+0x20/0x30
[   19.840056]  kasan_atomics_helper+0x12d8/0x4858
[   19.840195]  kasan_atomics+0x198/0x2e0
[   19.840267]  kunit_try_run_case+0x170/0x3f0
[   19.840321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.840549]  kthread+0x328/0x630
[   19.840700]  ret_from_fork+0x10/0x20
[   19.840747] 
[   19.840767] Allocated by task 266:
[   19.840795]  kasan_save_stack+0x3c/0x68
[   19.840837]  kasan_save_track+0x20/0x40
[   19.840874]  kasan_save_alloc_info+0x40/0x58
[   19.840916]  __kasan_kmalloc+0xd4/0xd8
[   19.840954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.841001]  kasan_atomics+0xb8/0x2e0
[   19.841039]  kunit_try_run_case+0x170/0x3f0
[   19.841085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.841304]  kthread+0x328/0x630
[   19.841485]  ret_from_fork+0x10/0x20
[   19.841562] 
[   19.841582] The buggy address belongs to the object at fff00000c77bfc80
[   19.841582]  which belongs to the cache kmalloc-64 of size 64
[   19.841818] The buggy address is located 0 bytes to the right of
[   19.841818]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.842666] 
[   19.842692] The buggy address belongs to the physical page:
[   19.842725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.842779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.842828] page_type: f5(slab)
[   19.842866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.842919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.842961] page dumped because: kasan: bad access detected
[   19.843005] 
[   19.843025] Memory state around the buggy address:
[   19.843059]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843111]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843156] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.843198]                                      ^
[   19.843230]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843273]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843312] ==================================================================
[   19.683299] ==================================================================
[   19.683587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   19.683894] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.683963] 
[   19.684010] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.684093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.684483] Hardware name: linux,dummy-virt (DT)
[   19.684537] Call trace:
[   19.684768]  show_stack+0x20/0x38 (C)
[   19.684836]  dump_stack_lvl+0x8c/0xd0
[   19.685089]  print_report+0x118/0x608
[   19.685165]  kasan_report+0xdc/0x128
[   19.685417]  __asan_report_load4_noabort+0x20/0x30
[   19.685665]  kasan_atomics_helper+0x3dbc/0x4858
[   19.685819]  kasan_atomics+0x198/0x2e0
[   19.685872]  kunit_try_run_case+0x170/0x3f0
[   19.685956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.686027]  kthread+0x328/0x630
[   19.686071]  ret_from_fork+0x10/0x20
[   19.686326] 
[   19.686631] Allocated by task 266:
[   19.686920]  kasan_save_stack+0x3c/0x68
[   19.687019]  kasan_save_track+0x20/0x40
[   19.687372]  kasan_save_alloc_info+0x40/0x58
[   19.687447]  __kasan_kmalloc+0xd4/0xd8
[   19.687606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.687856]  kasan_atomics+0xb8/0x2e0
[   19.688038]  kunit_try_run_case+0x170/0x3f0
[   19.688259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.688440]  kthread+0x328/0x630
[   19.688517]  ret_from_fork+0x10/0x20
[   19.688865] 
[   19.689173] The buggy address belongs to the object at fff00000c77bfc80
[   19.689173]  which belongs to the cache kmalloc-64 of size 64
[   19.689726] The buggy address is located 0 bytes to the right of
[   19.689726]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.689906] 
[   19.689987] The buggy address belongs to the physical page:
[   19.690064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.690225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.690297] page_type: f5(slab)
[   19.690346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.690418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.690463] page dumped because: kasan: bad access detected
[   19.690495] 
[   19.690523] Memory state around the buggy address:
[   19.690558]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.690612]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.690998] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.691182]                                      ^
[   19.691225]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.691271]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.691313] ==================================================================
[   19.600758] ==================================================================
[   19.600813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   19.600865] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.600918] 
[   19.600950] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.601431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.601715] Hardware name: linux,dummy-virt (DT)
[   19.601803] Call trace:
[   19.603030]  kasan_check_range+0x100/0x1a8
[   19.603500]  kasan_atomics+0x198/0x2e0
[   19.603664]  kunit_try_run_case+0x170/0x3f0
[   19.603721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.603777]  kthread+0x328/0x630
[   19.604323] 
[   19.604752]  kasan_save_stack+0x3c/0x68
[   19.605219]  kasan_save_alloc_info+0x40/0x58
[   19.605859]  kasan_atomics+0xb8/0x2e0
[   19.606721]  ret_from_fork+0x10/0x20
[   19.607141] 
[   19.607291] The buggy address belongs to the physical page:
[   19.607338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.607454] page_type: f5(slab)
[   19.607652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.608021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.608300] page dumped because: kasan: bad access detected
[   19.610579] 
[   19.613585]  __kasan_check_write+0x20/0x30
[   19.616403] 
[   19.617620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.619337]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.620807] Call trace:
[   19.621912]  kthread+0x328/0x630
[   19.622759]  ret_from_fork+0x10/0x20
[   19.623311] 
[   19.623380] The buggy address belongs to the physical page:
[   19.623473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.623571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.623633] page_type: f5(slab)
[   19.623673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.623876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.624149] page dumped because: kasan: bad access detected
[   19.624235] 
[   19.624311] Memory state around the buggy address:
[   19.624435]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.624519]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.624592] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.625660] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.626761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.627238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.628126] 
[   19.629317]  dump_stack_lvl+0x8c/0xd0
[   19.629518]  print_report+0x118/0x608
[   19.629639]  kasan_report+0xdc/0x128
[   19.629718]  kasan_check_range+0x100/0x1a8
[   19.630728]  __kasan_check_write+0x20/0x30
[   19.630796]  kasan_atomics_helper+0x934/0x4858
[   19.630847]  kasan_atomics+0x198/0x2e0
[   19.631076]  kunit_try_run_case+0x170/0x3f0
[   19.631161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.631266]  kthread+0x328/0x630
[   19.631318]  ret_from_fork+0x10/0x20
[   19.631460] 
[   19.631532] Allocated by task 266:
[   19.631612]  kasan_save_stack+0x3c/0x68
[   19.631722]  kasan_save_track+0x20/0x40
[   19.631763]  kasan_save_alloc_info+0x40/0x58
[   19.631814]  __kasan_kmalloc+0xd4/0xd8
[   19.631854]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.631893]  kasan_atomics+0xb8/0x2e0
[   19.632146]  kunit_try_run_case+0x170/0x3f0
[   19.632232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.632344]  kthread+0x328/0x630
[   19.632411]  ret_from_fork+0x10/0x20
[   19.632483] 
[   19.632523] The buggy address belongs to the object at fff00000c77bfc80
[   19.632523]  which belongs to the cache kmalloc-64 of size 64
[   19.632592] The buggy address is located 0 bytes to the right of
[   19.632592]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.632657] 
[   19.632842] The buggy address belongs to the physical page:
[   19.632924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.633026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.633074] page_type: f5(slab)
[   19.633131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.633183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.633225] page dumped because: kasan: bad access detected
[   19.633450] 
[   19.633521] Memory state around the buggy address:
[   19.633610]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.633674]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.633727] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.634141]                                      ^
[   19.634206]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.634269]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.634332] ==================================================================
[   19.855562] ==================================================================
[   19.855600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.855645] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.855694] 
[   19.855724] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.855805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.855831] Hardware name: linux,dummy-virt (DT)
[   19.855864] Call trace:
[   19.855886]  show_stack+0x20/0x38 (C)
[   19.855933]  dump_stack_lvl+0x8c/0xd0
[   19.855990]  print_report+0x118/0x608
[   19.856038]  kasan_report+0xdc/0x128
[   19.856083]  kasan_check_range+0x100/0x1a8
[   19.856131]  __kasan_check_write+0x20/0x30
[   19.856176]  kasan_atomics_helper+0x147c/0x4858
[   19.856223]  kasan_atomics+0x198/0x2e0
[   19.856269]  kunit_try_run_case+0x170/0x3f0
[   19.856318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.856370]  kthread+0x328/0x630
[   19.856412]  ret_from_fork+0x10/0x20
[   19.856458] 
[   19.856477] Allocated by task 266:
[   19.856506]  kasan_save_stack+0x3c/0x68
[   19.856545]  kasan_save_track+0x20/0x40
[   19.856585]  kasan_save_alloc_info+0x40/0x58
[   19.856626]  __kasan_kmalloc+0xd4/0xd8
[   19.856663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.856704]  kasan_atomics+0xb8/0x2e0
[   19.856741]  kunit_try_run_case+0x170/0x3f0
[   19.856779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.856824]  kthread+0x328/0x630
[   19.856858]  ret_from_fork+0x10/0x20
[   19.856895] 
[   19.856914] The buggy address belongs to the object at fff00000c77bfc80
[   19.856914]  which belongs to the cache kmalloc-64 of size 64
[   19.857349] The buggy address is located 0 bytes to the right of
[   19.857349]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.857424] 
[   19.857446] The buggy address belongs to the physical page:
[   19.857478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.857531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.857579] page_type: f5(slab)
[   19.857622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.857675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.857717] page dumped because: kasan: bad access detected
[   19.857751] 
[   19.857770] Memory state around the buggy address:
[   19.857803]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.857848]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.857894] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.857935]                                      ^
[   19.857967]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.858023]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.858064] ==================================================================
[   19.801908] ==================================================================
[   19.801998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.802082] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.802135] 
[   19.802168] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.802261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.802293] Hardware name: linux,dummy-virt (DT)
[   19.802325] Call trace:
[   19.802348]  show_stack+0x20/0x38 (C)
[   19.802394]  dump_stack_lvl+0x8c/0xd0
[   19.802442]  print_report+0x118/0x608
[   19.802488]  kasan_report+0xdc/0x128
[   19.802546]  kasan_check_range+0x100/0x1a8
[   19.802594]  __kasan_check_write+0x20/0x30
[   19.802674]  kasan_atomics_helper+0xf88/0x4858
[   19.802721]  kasan_atomics+0x198/0x2e0
[   19.802769]  kunit_try_run_case+0x170/0x3f0
[   19.803084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.803153]  kthread+0x328/0x630
[   19.803221]  ret_from_fork+0x10/0x20
[   19.803322] 
[   19.803398] Allocated by task 266:
[   19.803476]  kasan_save_stack+0x3c/0x68
[   19.803528]  kasan_save_track+0x20/0x40
[   19.803566]  kasan_save_alloc_info+0x40/0x58
[   19.803643]  __kasan_kmalloc+0xd4/0xd8
[   19.803844]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.803891]  kasan_atomics+0xb8/0x2e0
[   19.803928]  kunit_try_run_case+0x170/0x3f0
[   19.803967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.804025]  kthread+0x328/0x630
[   19.804211]  ret_from_fork+0x10/0x20
[   19.804307] 
[   19.804427] The buggy address belongs to the object at fff00000c77bfc80
[   19.804427]  which belongs to the cache kmalloc-64 of size 64
[   19.804553] The buggy address is located 0 bytes to the right of
[   19.804553]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.805033] 
[   19.805093] The buggy address belongs to the physical page:
[   19.805153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.805230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.805280] page_type: f5(slab)
[   19.805556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.805736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.805854] page dumped because: kasan: bad access detected
[   19.805919] 
[   19.806177] Memory state around the buggy address:
[   19.806314]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.806399]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.806446] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.806487]                                      ^
[   19.806552]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806718]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806884] ==================================================================
[   19.876026] ==================================================================
[   19.876076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.876242] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.876293] 
[   19.876324] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.876899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876931] Hardware name: linux,dummy-virt (DT)
[   19.876966] Call trace:
[   19.877000]  show_stack+0x20/0x38 (C)
[   19.877052]  dump_stack_lvl+0x8c/0xd0
[   19.877098]  print_report+0x118/0x608
[   19.877146]  kasan_report+0xdc/0x128
[   19.877191]  __asan_report_load8_noabort+0x20/0x30
[   19.877244]  kasan_atomics_helper+0x3db0/0x4858
[   19.877999]  kasan_atomics+0x198/0x2e0
[   19.878075]  kunit_try_run_case+0x170/0x3f0
[   19.878188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.878244]  kthread+0x328/0x630
[   19.878286]  ret_from_fork+0x10/0x20
[   19.878771] 
[   19.878803] Allocated by task 266:
[   19.878863]  kasan_save_stack+0x3c/0x68
[   19.879153]  kasan_save_track+0x20/0x40
[   19.879194]  kasan_save_alloc_info+0x40/0x58
[   19.879236]  __kasan_kmalloc+0xd4/0xd8
[   19.879387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.879437]  kasan_atomics+0xb8/0x2e0
[   19.879747]  kunit_try_run_case+0x170/0x3f0
[   19.879917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.879961]  kthread+0x328/0x630
[   19.880510]  ret_from_fork+0x10/0x20
[   19.880791] 
[   19.880822] The buggy address belongs to the object at fff00000c77bfc80
[   19.880822]  which belongs to the cache kmalloc-64 of size 64
[   19.880902] The buggy address is located 0 bytes to the right of
[   19.880902]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.881001] 
[   19.881262] The buggy address belongs to the physical page:
[   19.881322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.881379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.881816] page_type: f5(slab)
[   19.881864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.882024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.882068] page dumped because: kasan: bad access detected
[   19.882354] 
[   19.882389] Memory state around the buggy address:
[   19.882426]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.882515]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.882561] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.882603]                                      ^
[   19.882636]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.882681]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.883069] ==================================================================
[   19.775819] ==================================================================
[   19.775859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.777073] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.777243] 
[   19.777300] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.777456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.777486] Hardware name: linux,dummy-virt (DT)
[   19.777519] Call trace:
[   19.777569]  show_stack+0x20/0x38 (C)
[   19.777910]  dump_stack_lvl+0x8c/0xd0
[   19.778279]  print_report+0x118/0x608
[   19.778391]  kasan_report+0xdc/0x128
[   19.778526]  __asan_report_store8_noabort+0x20/0x30
[   19.778612]  kasan_atomics_helper+0x3e5c/0x4858
[   19.778800]  kasan_atomics+0x198/0x2e0
[   19.778858]  kunit_try_run_case+0x170/0x3f0
[   19.778906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.779273]  kthread+0x328/0x630
[   19.779379]  ret_from_fork+0x10/0x20
[   19.779739] 
[   19.779787] Allocated by task 266:
[   19.779966]  kasan_save_stack+0x3c/0x68
[   19.780094]  kasan_save_track+0x20/0x40
[   19.780181]  kasan_save_alloc_info+0x40/0x58
[   19.780227]  __kasan_kmalloc+0xd4/0xd8
[   19.780516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.780800]  kasan_atomics+0xb8/0x2e0
[   19.781035]  kunit_try_run_case+0x170/0x3f0
[   19.781085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.781353]  kthread+0x328/0x630
[   19.781652]  ret_from_fork+0x10/0x20
[   19.781723] 
[   19.781744] The buggy address belongs to the object at fff00000c77bfc80
[   19.781744]  which belongs to the cache kmalloc-64 of size 64
[   19.782274] The buggy address is located 0 bytes to the right of
[   19.782274]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.782501] 
[   19.782538] The buggy address belongs to the physical page:
[   19.782892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.783181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.783361] page_type: f5(slab)
[   19.783536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.783605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.783669] page dumped because: kasan: bad access detected
[   19.783708] 
[   19.783729] Memory state around the buggy address:
[   19.783765]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.784288]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.784529] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.784576]                                      ^
[   19.784638]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.784877]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.785006] ==================================================================
[   19.812387] ==================================================================
[   19.812472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.812551] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.812603] 
[   19.812837] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.812933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.812960] Hardware name: linux,dummy-virt (DT)
[   19.813122] Call trace:
[   19.813156]  show_stack+0x20/0x38 (C)
[   19.813210]  dump_stack_lvl+0x8c/0xd0
[   19.813286]  print_report+0x118/0x608
[   19.813369]  kasan_report+0xdc/0x128
[   19.813441]  kasan_check_range+0x100/0x1a8
[   19.813491]  __kasan_check_write+0x20/0x30
[   19.813547]  kasan_atomics_helper+0x1058/0x4858
[   19.813854]  kasan_atomics+0x198/0x2e0
[   19.813919]  kunit_try_run_case+0x170/0x3f0
[   19.814027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.814299]  kthread+0x328/0x630
[   19.814356]  ret_from_fork+0x10/0x20
[   19.814513] 
[   19.814541] Allocated by task 266:
[   19.814578]  kasan_save_stack+0x3c/0x68
[   19.814656]  kasan_save_track+0x20/0x40
[   19.814694]  kasan_save_alloc_info+0x40/0x58
[   19.814749]  __kasan_kmalloc+0xd4/0xd8
[   19.814789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.815072]  kasan_atomics+0xb8/0x2e0
[   19.815220]  kunit_try_run_case+0x170/0x3f0
[   19.815325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815521]  kthread+0x328/0x630
[   19.815685]  ret_from_fork+0x10/0x20
[   19.815793] 
[   19.815938] The buggy address belongs to the object at fff00000c77bfc80
[   19.815938]  which belongs to the cache kmalloc-64 of size 64
[   19.816102] The buggy address is located 0 bytes to the right of
[   19.816102]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.816239] 
[   19.816315] The buggy address belongs to the physical page:
[   19.816446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.816513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.816562] page_type: f5(slab)
[   19.816937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.817119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.817194] page dumped because: kasan: bad access detected
[   19.817261] 
[   19.817452] Memory state around the buggy address:
[   19.817490]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.817691]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.818031] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.818138]                                      ^
[   19.818292]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.818508]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.818706] ==================================================================
[   19.824389] ==================================================================
[   19.824431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.824477] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.824527] 
[   19.824558] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.824639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.824666] Hardware name: linux,dummy-virt (DT)
[   19.824699] Call trace:
[   19.824721]  show_stack+0x20/0x38 (C)
[   19.824769]  dump_stack_lvl+0x8c/0xd0
[   19.824814]  print_report+0x118/0x608
[   19.824861]  kasan_report+0xdc/0x128
[   19.824906]  kasan_check_range+0x100/0x1a8
[   19.825079]  __kasan_check_write+0x20/0x30
[   19.825136]  kasan_atomics_helper+0x1128/0x4858
[   19.825186]  kasan_atomics+0x198/0x2e0
[   19.825230]  kunit_try_run_case+0x170/0x3f0
[   19.825283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.825336]  kthread+0x328/0x630
[   19.825377]  ret_from_fork+0x10/0x20
[   19.825424] 
[   19.825445] Allocated by task 266:
[   19.825474]  kasan_save_stack+0x3c/0x68
[   19.825515]  kasan_save_track+0x20/0x40
[   19.825553]  kasan_save_alloc_info+0x40/0x58
[   19.825606]  __kasan_kmalloc+0xd4/0xd8
[   19.825652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.825691]  kasan_atomics+0xb8/0x2e0
[   19.825728]  kunit_try_run_case+0x170/0x3f0
[   19.825766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.825824]  kthread+0x328/0x630
[   19.825857]  ret_from_fork+0x10/0x20
[   19.825926] 
[   19.825946] The buggy address belongs to the object at fff00000c77bfc80
[   19.825946]  which belongs to the cache kmalloc-64 of size 64
[   19.826018] The buggy address is located 0 bytes to the right of
[   19.826018]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.826085] 
[   19.826106] The buggy address belongs to the physical page:
[   19.826138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.826405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.826467] page_type: f5(slab)
[   19.826568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.826735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.826791] page dumped because: kasan: bad access detected
[   19.826825] 
[   19.826845] Memory state around the buggy address:
[   19.826879]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.826923]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.826969] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.827020]                                      ^
[   19.827055]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.827097]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.827138] ==================================================================
[   19.843452] ==================================================================
[   19.843494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.843539] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.843589] 
[   19.843620] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.843699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.843727] Hardware name: linux,dummy-virt (DT)
[   19.843758] Call trace:
[   19.843783]  show_stack+0x20/0x38 (C)
[   19.843829]  dump_stack_lvl+0x8c/0xd0
[   19.843876]  print_report+0x118/0x608
[   19.843921]  kasan_report+0xdc/0x128
[   19.843969]  kasan_check_range+0x100/0x1a8
[   19.844103]  __kasan_check_write+0x20/0x30
[   19.844152]  kasan_atomics_helper+0x1384/0x4858
[   19.844201]  kasan_atomics+0x198/0x2e0
[   19.844246]  kunit_try_run_case+0x170/0x3f0
[   19.844294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.844347]  kthread+0x328/0x630
[   19.844388]  ret_from_fork+0x10/0x20
[   19.844436] 
[   19.844455] Allocated by task 266:
[   19.844509]  kasan_save_stack+0x3c/0x68
[   19.844553]  kasan_save_track+0x20/0x40
[   19.844591]  kasan_save_alloc_info+0x40/0x58
[   19.844633]  __kasan_kmalloc+0xd4/0xd8
[   19.844672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.844724]  kasan_atomics+0xb8/0x2e0
[   19.844764]  kunit_try_run_case+0x170/0x3f0
[   19.844851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.844934]  kthread+0x328/0x630
[   19.844969]  ret_from_fork+0x10/0x20
[   19.845017] 
[   19.845306] The buggy address belongs to the object at fff00000c77bfc80
[   19.845306]  which belongs to the cache kmalloc-64 of size 64
[   19.845368] The buggy address is located 0 bytes to the right of
[   19.845368]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.845440] 
[   19.845507] The buggy address belongs to the physical page:
[   19.845675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.845747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.845830] page_type: f5(slab)
[   19.845900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.845953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.846005] page dumped because: kasan: bad access detected
[   19.846085] 
[   19.846174] Memory state around the buggy address:
[   19.846274]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.846344]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.846389] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.846432]                                      ^
[   19.846464]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.846510]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.846597] ==================================================================
[   19.654569] ==================================================================
[   19.654620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.654669] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.654721] 
[   19.654751] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.654833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.654860] Hardware name: linux,dummy-virt (DT)
[   19.654893] Call trace:
[   19.654915]  show_stack+0x20/0x38 (C)
[   19.654961]  dump_stack_lvl+0x8c/0xd0
[   19.655025]  print_report+0x118/0x608
[   19.655071]  kasan_report+0xdc/0x128
[   19.655117]  kasan_check_range+0x100/0x1a8
[   19.655167]  __kasan_check_write+0x20/0x30
[   19.655212]  kasan_atomics_helper+0xad4/0x4858
[   19.655261]  kasan_atomics+0x198/0x2e0
[   19.655306]  kunit_try_run_case+0x170/0x3f0
[   19.655354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655408]  kthread+0x328/0x630
[   19.655448]  ret_from_fork+0x10/0x20
[   19.655496] 
[   19.655536] Allocated by task 266:
[   19.655573]  kasan_save_stack+0x3c/0x68
[   19.655617]  kasan_save_track+0x20/0x40
[   19.655656]  kasan_save_alloc_info+0x40/0x58
[   19.655699]  __kasan_kmalloc+0xd4/0xd8
[   19.655737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.655778]  kasan_atomics+0xb8/0x2e0
[   19.655816]  kunit_try_run_case+0x170/0x3f0
[   19.655864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655909]  kthread+0x328/0x630
[   19.655944]  ret_from_fork+0x10/0x20
[   19.656221] 
[   19.656516] The buggy address belongs to the object at fff00000c77bfc80
[   19.656516]  which belongs to the cache kmalloc-64 of size 64
[   19.656819] The buggy address is located 0 bytes to the right of
[   19.656819]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.657712] 
[   19.657758] The buggy address belongs to the physical page:
[   19.657818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.657896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.657967] page_type: f5(slab)
[   19.658407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.658498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.658641] page dumped because: kasan: bad access detected
[   19.659072] 
[   19.659098] Memory state around the buggy address:
[   19.659356]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.659729]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660172] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.660237]                                      ^
[   19.660653]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660720]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660851] ==================================================================
[   19.957033] ==================================================================
[   19.957091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.957191] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.957428] 
[   19.957473] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.957568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.957655] Hardware name: linux,dummy-virt (DT)
[   19.957709] Call trace:
[   19.957759]  show_stack+0x20/0x38 (C)
[   19.957830]  dump_stack_lvl+0x8c/0xd0
[   19.958129]  print_report+0x118/0x608
[   19.958234]  kasan_report+0xdc/0x128
[   19.958300]  kasan_check_range+0x100/0x1a8
[   19.958376]  __kasan_check_write+0x20/0x30
[   19.958459]  kasan_atomics_helper+0x17ec/0x4858
[   19.958513]  kasan_atomics+0x198/0x2e0
[   19.958579]  kunit_try_run_case+0x170/0x3f0
[   19.958643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.958697]  kthread+0x328/0x630
[   19.959048]  ret_from_fork+0x10/0x20
[   19.959166] 
[   19.959209] Allocated by task 266:
[   19.959536]  kasan_save_stack+0x3c/0x68
[   19.959665]  kasan_save_track+0x20/0x40
[   19.959753]  kasan_save_alloc_info+0x40/0x58
[   19.959834]  __kasan_kmalloc+0xd4/0xd8
[   19.959923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.960031]  kasan_atomics+0xb8/0x2e0
[   19.960147]  kunit_try_run_case+0x170/0x3f0
[   19.960234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960307]  kthread+0x328/0x630
[   19.960343]  ret_from_fork+0x10/0x20
[   19.960380] 
[   19.960411] The buggy address belongs to the object at fff00000c77bfc80
[   19.960411]  which belongs to the cache kmalloc-64 of size 64
[   19.960472] The buggy address is located 0 bytes to the right of
[   19.960472]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.960783] 
[   19.960844] The buggy address belongs to the physical page:
[   19.960899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.961035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.961139] page_type: f5(slab)
[   19.961413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.961471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.961757] page dumped because: kasan: bad access detected
[   19.961821] 
[   19.961851] Memory state around the buggy address:
[   19.961899]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.961947]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.962001] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.962043]                                      ^
[   19.962077]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962124]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962163] ==================================================================
[   19.895295] ==================================================================
[   19.895349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.896083] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.896255] 
[   19.896526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.896613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.896642] Hardware name: linux,dummy-virt (DT)
[   19.896675] Call trace:
[   19.896942]  show_stack+0x20/0x38 (C)
[   19.897369]  dump_stack_lvl+0x8c/0xd0
[   19.897690]  print_report+0x118/0x608
[   19.897861]  kasan_report+0xdc/0x128
[   19.897911]  __asan_report_load8_noabort+0x20/0x30
[   19.897965]  kasan_atomics_helper+0x3df4/0x4858
[   19.898024]  kasan_atomics+0x198/0x2e0
[   19.898071]  kunit_try_run_case+0x170/0x3f0
[   19.898119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899145]  kthread+0x328/0x630
[   19.899265]  ret_from_fork+0x10/0x20
[   19.899413] 
[   19.899479] Allocated by task 266:
[   19.899572]  kasan_save_stack+0x3c/0x68
[   19.899699]  kasan_save_track+0x20/0x40
[   19.899903]  kasan_save_alloc_info+0x40/0x58
[   19.900116]  __kasan_kmalloc+0xd4/0xd8
[   19.900334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.900393]  kasan_atomics+0xb8/0x2e0
[   19.900715]  kunit_try_run_case+0x170/0x3f0
[   19.900937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.901148]  kthread+0x328/0x630
[   19.901413]  ret_from_fork+0x10/0x20
[   19.901535] 
[   19.901759] The buggy address belongs to the object at fff00000c77bfc80
[   19.901759]  which belongs to the cache kmalloc-64 of size 64
[   19.902208] The buggy address is located 0 bytes to the right of
[   19.902208]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.902284] 
[   19.902306] The buggy address belongs to the physical page:
[   19.902343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.902857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.903239] page_type: f5(slab)
[   19.903292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.903405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.903849] page dumped because: kasan: bad access detected
[   19.904204] 
[   19.904293] Memory state around the buggy address:
[   19.904333]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.904380]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.904427] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.904469]                                      ^
[   19.904505]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.905110]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.905755] ==================================================================
[   19.635488] ==================================================================
[   19.635548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.635646] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.635717] 
[   19.635764] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.635849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.635885] Hardware name: linux,dummy-virt (DT)
[   19.635917] Call trace:
[   19.636182]  show_stack+0x20/0x38 (C)
[   19.636246]  dump_stack_lvl+0x8c/0xd0
[   19.636375]  print_report+0x118/0x608
[   19.636444]  kasan_report+0xdc/0x128
[   19.636492]  kasan_check_range+0x100/0x1a8
[   19.636541]  __kasan_check_write+0x20/0x30
[   19.636587]  kasan_atomics_helper+0x99c/0x4858
[   19.636637]  kasan_atomics+0x198/0x2e0
[   19.636691]  kunit_try_run_case+0x170/0x3f0
[   19.636739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.636793]  kthread+0x328/0x630
[   19.636835]  ret_from_fork+0x10/0x20
[   19.636884] 
[   19.636913] Allocated by task 266:
[   19.636945]  kasan_save_stack+0x3c/0x68
[   19.636996]  kasan_save_track+0x20/0x40
[   19.637034]  kasan_save_alloc_info+0x40/0x58
[   19.637114]  __kasan_kmalloc+0xd4/0xd8
[   19.637153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.637512]  kasan_atomics+0xb8/0x2e0
[   19.637589]  kunit_try_run_case+0x170/0x3f0
[   19.637653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637700]  kthread+0x328/0x630
[   19.637733]  ret_from_fork+0x10/0x20
[   19.637787] 
[   19.637827] The buggy address belongs to the object at fff00000c77bfc80
[   19.637827]  which belongs to the cache kmalloc-64 of size 64
[   19.637889] The buggy address is located 0 bytes to the right of
[   19.637889]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.638107] 
[   19.638133] The buggy address belongs to the physical page:
[   19.638189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.638262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.638342] page_type: f5(slab)
[   19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.638437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.638481] page dumped because: kasan: bad access detected
[   19.638519] 
[   19.638557] Memory state around the buggy address:
[   19.638591]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.638655]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.638729] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.638770]                                      ^
[   19.638805]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638848]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638900] ==================================================================
[   19.712860] ==================================================================
[   19.712914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.712968] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.713039] 
[   19.713071] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.713154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.713181] Hardware name: linux,dummy-virt (DT)
[   19.713213] Call trace:
[   19.713237]  show_stack+0x20/0x38 (C)
[   19.713284]  dump_stack_lvl+0x8c/0xd0
[   19.713332]  print_report+0x118/0x608
[   19.713378]  kasan_report+0xdc/0x128
[   19.713424]  kasan_check_range+0x100/0x1a8
[   19.713472]  __kasan_check_write+0x20/0x30
[   19.713519]  kasan_atomics_helper+0xca0/0x4858
[   19.713569]  kasan_atomics+0x198/0x2e0
[   19.713613]  kunit_try_run_case+0x170/0x3f0
[   19.713666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714418]  kthread+0x328/0x630
[   19.714489]  ret_from_fork+0x10/0x20
[   19.714542] 
[   19.714562] Allocated by task 266:
[   19.715287]  kasan_save_stack+0x3c/0x68
[   19.715393]  kasan_save_track+0x20/0x40
[   19.715685]  kasan_save_alloc_info+0x40/0x58
[   19.715794]  __kasan_kmalloc+0xd4/0xd8
[   19.715893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.716254]  kasan_atomics+0xb8/0x2e0
[   19.716318]  kunit_try_run_case+0x170/0x3f0
[   19.716620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.716919]  kthread+0x328/0x630
[   19.717045]  ret_from_fork+0x10/0x20
[   19.717091] 
[   19.717121] The buggy address belongs to the object at fff00000c77bfc80
[   19.717121]  which belongs to the cache kmalloc-64 of size 64
[   19.717519] The buggy address is located 0 bytes to the right of
[   19.717519]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.717876] 
[   19.717920] The buggy address belongs to the physical page:
[   19.717964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.718149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.718389] page_type: f5(slab)
[   19.718775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.719022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.719420] page dumped because: kasan: bad access detected
[   19.719602] 
[   19.719649] Memory state around the buggy address:
[   19.719790]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.719840]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.720323] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.720373]                                      ^
[   19.720408]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721016]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721206] ==================================================================
[   19.771468] ==================================================================
[   19.771524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.771577] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.772075] 
[   19.772292] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.772419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.772541] Hardware name: linux,dummy-virt (DT)
[   19.772579] Call trace:
[   19.772603]  show_stack+0x20/0x38 (C)
[   19.772683]  dump_stack_lvl+0x8c/0xd0
[   19.772916]  print_report+0x118/0x608
[   19.773009]  kasan_report+0xdc/0x128
[   19.773284]  kasan_check_range+0x100/0x1a8
[   19.773367]  __kasan_check_write+0x20/0x30
[   19.773415]  kasan_atomics_helper+0xe44/0x4858
[   19.773465]  kasan_atomics+0x198/0x2e0
[   19.773509]  kunit_try_run_case+0x170/0x3f0
[   19.773696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.773763]  kthread+0x328/0x630
[   19.773805]  ret_from_fork+0x10/0x20
[   19.773870] 
[   19.773900] Allocated by task 266:
[   19.773932]  kasan_save_stack+0x3c/0x68
[   19.773993]  kasan_save_track+0x20/0x40
[   19.774035]  kasan_save_alloc_info+0x40/0x58
[   19.774083]  __kasan_kmalloc+0xd4/0xd8
[   19.774123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.774167]  kasan_atomics+0xb8/0x2e0
[   19.774211]  kunit_try_run_case+0x170/0x3f0
[   19.774252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.774297]  kthread+0x328/0x630
[   19.774332]  ret_from_fork+0x10/0x20
[   19.774370] 
[   19.774391] The buggy address belongs to the object at fff00000c77bfc80
[   19.774391]  which belongs to the cache kmalloc-64 of size 64
[   19.774450] The buggy address is located 0 bytes to the right of
[   19.774450]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.774517] 
[   19.774538] The buggy address belongs to the physical page:
[   19.774571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.775012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.775251] page_type: f5(slab)
[   19.775297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.775349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.775392] page dumped because: kasan: bad access detected
[   19.775426] 
[   19.775445] Memory state around the buggy address:
[   19.775479]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.775525]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.775568] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.775608]                                      ^
[   19.775643]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775690]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775728] ==================================================================
[   19.705758] ==================================================================
[   19.705885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   19.705993] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.706295] 
[   19.706644] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.706748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.706932] Hardware name: linux,dummy-virt (DT)
[   19.707010] Call trace:
[   19.707149]  show_stack+0x20/0x38 (C)
[   19.707243]  dump_stack_lvl+0x8c/0xd0
[   19.707299]  print_report+0x118/0x608
[   19.707347]  kasan_report+0xdc/0x128
[   19.707393]  __asan_report_load4_noabort+0x20/0x30
[   19.707918]  kasan_atomics_helper+0x3de4/0x4858
[   19.708071]  kasan_atomics+0x198/0x2e0
[   19.708207]  kunit_try_run_case+0x170/0x3f0
[   19.708262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708337]  kthread+0x328/0x630
[   19.708418]  ret_from_fork+0x10/0x20
[   19.708482] 
[   19.708519] Allocated by task 266:
[   19.708548]  kasan_save_stack+0x3c/0x68
[   19.708607]  kasan_save_track+0x20/0x40
[   19.708655]  kasan_save_alloc_info+0x40/0x58
[   19.708708]  __kasan_kmalloc+0xd4/0xd8
[   19.708746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.708787]  kasan_atomics+0xb8/0x2e0
[   19.708834]  kunit_try_run_case+0x170/0x3f0
[   19.708874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708927]  kthread+0x328/0x630
[   19.708969]  ret_from_fork+0x10/0x20
[   19.709035] 
[   19.709090] The buggy address belongs to the object at fff00000c77bfc80
[   19.709090]  which belongs to the cache kmalloc-64 of size 64
[   19.709642] The buggy address is located 0 bytes to the right of
[   19.709642]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.709904] 
[   19.710271] The buggy address belongs to the physical page:
[   19.710504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.711137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.711316] page_type: f5(slab)
[   19.711434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.711498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.711698] page dumped because: kasan: bad access detected
[   19.711804] 
[   19.711826] Memory state around the buggy address:
[   19.711972]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.712056]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.712126] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.712167]                                      ^
[   19.712211]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712277]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712319] ==================================================================
[   19.835586] ==================================================================
[   19.835634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.835805] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.836016] 
[   19.836127] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.836265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.836400] Hardware name: linux,dummy-virt (DT)
[   19.836431] Call trace:
[   19.836455]  show_stack+0x20/0x38 (C)
[   19.836527]  dump_stack_lvl+0x8c/0xd0
[   19.836576]  print_report+0x118/0x608
[   19.836621]  kasan_report+0xdc/0x128
[   19.836667]  kasan_check_range+0x100/0x1a8
[   19.836714]  __kasan_check_write+0x20/0x30
[   19.836760]  kasan_atomics_helper+0x126c/0x4858
[   19.836809]  kasan_atomics+0x198/0x2e0
[   19.836854]  kunit_try_run_case+0x170/0x3f0
[   19.836902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.836970]  kthread+0x328/0x630
[   19.837134]  ret_from_fork+0x10/0x20
[   19.837211] 
[   19.837231] Allocated by task 266:
[   19.837259]  kasan_save_stack+0x3c/0x68
[   19.837302]  kasan_save_track+0x20/0x40
[   19.837340]  kasan_save_alloc_info+0x40/0x58
[   19.837381]  __kasan_kmalloc+0xd4/0xd8
[   19.837429]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.837469]  kasan_atomics+0xb8/0x2e0
[   19.837506]  kunit_try_run_case+0x170/0x3f0
[   19.837546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.837589]  kthread+0x328/0x630
[   19.837632]  ret_from_fork+0x10/0x20
[   19.837670] 
[   19.837690] The buggy address belongs to the object at fff00000c77bfc80
[   19.837690]  which belongs to the cache kmalloc-64 of size 64
[   19.837904] The buggy address is located 0 bytes to the right of
[   19.837904]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.837972] 
[   19.838008] The buggy address belongs to the physical page:
[   19.838058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.838111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.838158] page_type: f5(slab)
[   19.838196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.838249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.838291] page dumped because: kasan: bad access detected
[   19.838324] 
[   19.838343] Memory state around the buggy address:
[   19.838377]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.838422]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.838544] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.838772]                                      ^
[   19.838813]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.838859]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.838898] ==================================================================
[   19.795456] ==================================================================
[   19.795670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.795733] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.795786] 
[   19.795820] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.796106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.796170] Hardware name: linux,dummy-virt (DT)
[   19.796205] Call trace:
[   19.796231]  show_stack+0x20/0x38 (C)
[   19.796283]  dump_stack_lvl+0x8c/0xd0
[   19.796350]  print_report+0x118/0x608
[   19.796415]  kasan_report+0xdc/0x128
[   19.796486]  kasan_check_range+0x100/0x1a8
[   19.796535]  __kasan_check_write+0x20/0x30
[   19.796581]  kasan_atomics_helper+0xf20/0x4858
[   19.796867]  kasan_atomics+0x198/0x2e0
[   19.796996]  kunit_try_run_case+0x170/0x3f0
[   19.797051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.797370]  kthread+0x328/0x630
[   19.797498]  ret_from_fork+0x10/0x20
[   19.797589] 
[   19.797636] Allocated by task 266:
[   19.797694]  kasan_save_stack+0x3c/0x68
[   19.797757]  kasan_save_track+0x20/0x40
[   19.797827]  kasan_save_alloc_info+0x40/0x58
[   19.797885]  __kasan_kmalloc+0xd4/0xd8
[   19.797928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.798004]  kasan_atomics+0xb8/0x2e0
[   19.798056]  kunit_try_run_case+0x170/0x3f0
[   19.798114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.798161]  kthread+0x328/0x630
[   19.798197]  ret_from_fork+0x10/0x20
[   19.798513] 
[   19.798547] The buggy address belongs to the object at fff00000c77bfc80
[   19.798547]  which belongs to the cache kmalloc-64 of size 64
[   19.798688] The buggy address is located 0 bytes to the right of
[   19.798688]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.798776] 
[   19.798874] The buggy address belongs to the physical page:
[   19.799052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.799249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.799558] page_type: f5(slab)
[   19.799607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.799774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.799867] page dumped because: kasan: bad access detected
[   19.799972] 
[   19.800043] Memory state around the buggy address:
[   19.800107]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.800292]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.800526] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.800643]                                      ^
[   19.800707]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800750]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800792] ==================================================================
[   19.832134] ==================================================================
[   19.832184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.832230] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.832282] 
[   19.832311] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.832392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.832420] Hardware name: linux,dummy-virt (DT)
[   19.832450] Call trace:
[   19.832488]  show_stack+0x20/0x38 (C)
[   19.832536]  dump_stack_lvl+0x8c/0xd0
[   19.832583]  print_report+0x118/0x608
[   19.832629]  kasan_report+0xdc/0x128
[   19.832714]  kasan_check_range+0x100/0x1a8
[   19.832804]  __kasan_check_write+0x20/0x30
[   19.833010]  kasan_atomics_helper+0x11f8/0x4858
[   19.833063]  kasan_atomics+0x198/0x2e0
[   19.833113]  kunit_try_run_case+0x170/0x3f0
[   19.833168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.833227]  kthread+0x328/0x630
[   19.833277]  ret_from_fork+0x10/0x20
[   19.833481] 
[   19.833580] Allocated by task 266:
[   19.833712]  kasan_save_stack+0x3c/0x68
[   19.833754]  kasan_save_track+0x20/0x40
[   19.833792]  kasan_save_alloc_info+0x40/0x58
[   19.833834]  __kasan_kmalloc+0xd4/0xd8
[   19.833872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.833918]  kasan_atomics+0xb8/0x2e0
[   19.834103]  kunit_try_run_case+0x170/0x3f0
[   19.834305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.834355]  kthread+0x328/0x630
[   19.834528]  ret_from_fork+0x10/0x20
[   19.834582] 
[   19.834602] The buggy address belongs to the object at fff00000c77bfc80
[   19.834602]  which belongs to the cache kmalloc-64 of size 64
[   19.834692] The buggy address is located 0 bytes to the right of
[   19.834692]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.834758] 
[   19.834778] The buggy address belongs to the physical page:
[   19.834811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.834862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.834910] page_type: f5(slab)
[   19.834948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.835010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.835052] page dumped because: kasan: bad access detected
[   19.835086] 
[   19.835105] Memory state around the buggy address:
[   19.835139]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.835184]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.835229] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.835271]                                      ^
[   19.835303]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.835347]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.835386] ==================================================================
[   19.787452] ==================================================================
[   19.787509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.787559] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.787610] 
[   19.787642] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.787726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.787753] Hardware name: linux,dummy-virt (DT)
[   19.787784] Call trace:
[   19.787807]  show_stack+0x20/0x38 (C)
[   19.787855]  dump_stack_lvl+0x8c/0xd0
[   19.787902]  print_report+0x118/0x608
[   19.787949]  kasan_report+0xdc/0x128
[   19.788010]  kasan_check_range+0x100/0x1a8
[   19.788060]  __kasan_check_write+0x20/0x30
[   19.788105]  kasan_atomics_helper+0xeb8/0x4858
[   19.788154]  kasan_atomics+0x198/0x2e0
[   19.788198]  kunit_try_run_case+0x170/0x3f0
[   19.788247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.788300]  kthread+0x328/0x630
[   19.788341]  ret_from_fork+0x10/0x20
[   19.788387] 
[   19.788408] Allocated by task 266:
[   19.788436]  kasan_save_stack+0x3c/0x68
[   19.788477]  kasan_save_track+0x20/0x40
[   19.788516]  kasan_save_alloc_info+0x40/0x58
[   19.788556]  __kasan_kmalloc+0xd4/0xd8
[   19.788596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.788636]  kasan_atomics+0xb8/0x2e0
[   19.788672]  kunit_try_run_case+0x170/0x3f0
[   19.788712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.788758]  kthread+0x328/0x630
[   19.788792]  ret_from_fork+0x10/0x20
[   19.788830] 
[   19.788850] The buggy address belongs to the object at fff00000c77bfc80
[   19.788850]  which belongs to the cache kmalloc-64 of size 64
[   19.788910] The buggy address is located 0 bytes to the right of
[   19.788910]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.791232] 
[   19.791271] The buggy address belongs to the physical page:
[   19.791307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.791366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.791416] page_type: f5(slab)
[   19.791456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.791509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.791555] page dumped because: kasan: bad access detected
[   19.791590] 
[   19.791612] Memory state around the buggy address:
[   19.791647]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.791693]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.791738] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.791777]                                      ^
[   19.791811]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791857]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791898] ==================================================================
[   19.693006] ==================================================================
[   19.693582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   19.693657] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.693710] 
[   19.694085] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.694183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.694254] Hardware name: linux,dummy-virt (DT)
[   19.694290] Call trace:
[   19.694314]  show_stack+0x20/0x38 (C)
[   19.694393]  dump_stack_lvl+0x8c/0xd0
[   19.694990]  print_report+0x118/0x608
[   19.695069]  kasan_report+0xdc/0x128
[   19.695134]  kasan_check_range+0x100/0x1a8
[   19.695232]  __kasan_check_write+0x20/0x30
[   19.695427]  kasan_atomics_helper+0xc08/0x4858
[   19.695788]  kasan_atomics+0x198/0x2e0
[   19.695870]  kunit_try_run_case+0x170/0x3f0
[   19.696042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.696126]  kthread+0x328/0x630
[   19.696483]  ret_from_fork+0x10/0x20
[   19.696668] 
[   19.696728] Allocated by task 266:
[   19.696838]  kasan_save_stack+0x3c/0x68
[   19.696913]  kasan_save_track+0x20/0x40
[   19.696953]  kasan_save_alloc_info+0x40/0x58
[   19.697307]  __kasan_kmalloc+0xd4/0xd8
[   19.697664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.697945]  kasan_atomics+0xb8/0x2e0
[   19.698020]  kunit_try_run_case+0x170/0x3f0
[   19.698270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.698477]  kthread+0x328/0x630
[   19.698604]  ret_from_fork+0x10/0x20
[   19.698894] 
[   19.699036] The buggy address belongs to the object at fff00000c77bfc80
[   19.699036]  which belongs to the cache kmalloc-64 of size 64
[   19.699246] The buggy address is located 0 bytes to the right of
[   19.699246]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.700169] 
[   19.700242] The buggy address belongs to the physical page:
[   19.700759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.700993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.701340] page_type: f5(slab)
[   19.701464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.701725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.701905] page dumped because: kasan: bad access detected
[   19.702158] 
[   19.702391] Memory state around the buggy address:
[   19.702450]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.702498]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.703122] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.703180]                                      ^
[   19.703339]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.703399]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.703531] ==================================================================
[   19.741514] ==================================================================
[   19.741567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.741780] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.742241] 
[   19.742298] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.742544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.742581] Hardware name: linux,dummy-virt (DT)
[   19.742656] Call trace:
[   19.742922]  show_stack+0x20/0x38 (C)
[   19.743175]  dump_stack_lvl+0x8c/0xd0
[   19.743299]  print_report+0x118/0x608
[   19.743396]  kasan_report+0xdc/0x128
[   19.743582]  __asan_report_load4_noabort+0x20/0x30
[   19.743861]  kasan_atomics_helper+0x3e04/0x4858
[   19.743987]  kasan_atomics+0x198/0x2e0
[   19.744093]  kunit_try_run_case+0x170/0x3f0
[   19.744434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.744792]  kthread+0x328/0x630
[   19.745012]  ret_from_fork+0x10/0x20
[   19.745116] 
[   19.745211] Allocated by task 266:
[   19.745281]  kasan_save_stack+0x3c/0x68
[   19.745405]  kasan_save_track+0x20/0x40
[   19.745473]  kasan_save_alloc_info+0x40/0x58
[   19.745517]  __kasan_kmalloc+0xd4/0xd8
[   19.745678]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.745914]  kasan_atomics+0xb8/0x2e0
[   19.746205]  kunit_try_run_case+0x170/0x3f0
[   19.746405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.746729]  kthread+0x328/0x630
[   19.747016]  ret_from_fork+0x10/0x20
[   19.747154] 
[   19.747274] The buggy address belongs to the object at fff00000c77bfc80
[   19.747274]  which belongs to the cache kmalloc-64 of size 64
[   19.747515] The buggy address is located 0 bytes to the right of
[   19.747515]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.747990] 
[   19.748127] The buggy address belongs to the physical page:
[   19.748263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.748345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.748733] page_type: f5(slab)
[   19.749112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.749191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.749239] page dumped because: kasan: bad access detected
[   19.749509] 
[   19.749636] Memory state around the buggy address:
[   19.749698]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.749931]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.750144] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.750389]                                      ^
[   19.750555]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750607]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750860] ==================================================================
[   19.807677] ==================================================================
[   19.807731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.807783] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.807860] 
[   19.807893] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.807990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808022] Hardware name: linux,dummy-virt (DT)
[   19.808058] Call trace:
[   19.808081]  show_stack+0x20/0x38 (C)
[   19.808129]  dump_stack_lvl+0x8c/0xd0
[   19.808176]  print_report+0x118/0x608
[   19.808222]  kasan_report+0xdc/0x128
[   19.808268]  kasan_check_range+0x100/0x1a8
[   19.808315]  __kasan_check_write+0x20/0x30
[   19.808362]  kasan_atomics_helper+0xff0/0x4858
[   19.808409]  kasan_atomics+0x198/0x2e0
[   19.808454]  kunit_try_run_case+0x170/0x3f0
[   19.808500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.808576]  kthread+0x328/0x630
[   19.808620]  ret_from_fork+0x10/0x20
[   19.808668] 
[   19.808687] Allocated by task 266:
[   19.808717]  kasan_save_stack+0x3c/0x68
[   19.808758]  kasan_save_track+0x20/0x40
[   19.808923]  kasan_save_alloc_info+0x40/0x58
[   19.808997]  __kasan_kmalloc+0xd4/0xd8
[   19.809476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.809541]  kasan_atomics+0xb8/0x2e0
[   19.809579]  kunit_try_run_case+0x170/0x3f0
[   19.809626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.809829]  kthread+0x328/0x630
[   19.809903]  ret_from_fork+0x10/0x20
[   19.809968] 
[   19.810034] The buggy address belongs to the object at fff00000c77bfc80
[   19.810034]  which belongs to the cache kmalloc-64 of size 64
[   19.810107] The buggy address is located 0 bytes to the right of
[   19.810107]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.810175] 
[   19.810197] The buggy address belongs to the physical page:
[   19.810231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.810422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.810478] page_type: f5(slab)
[   19.810542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.810597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.810685] page dumped because: kasan: bad access detected
[   19.810722] 
[   19.810773] Memory state around the buggy address:
[   19.810811]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.811021]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.811174] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.811253]                                      ^
[   19.811321]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.811365]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.811542] ==================================================================
[   19.933658] ==================================================================
[   19.933713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.934322] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.934392] 
[   19.934427] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.935048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935145] Hardware name: linux,dummy-virt (DT)
[   19.935177] Call trace:
[   19.935203]  show_stack+0x20/0x38 (C)
[   19.935522]  dump_stack_lvl+0x8c/0xd0
[   19.935833]  print_report+0x118/0x608
[   19.936192]  kasan_report+0xdc/0x128
[   19.936598]  kasan_check_range+0x100/0x1a8
[   19.936791]  __kasan_check_write+0x20/0x30
[   19.936839]  kasan_atomics_helper+0x175c/0x4858
[   19.936888]  kasan_atomics+0x198/0x2e0
[   19.937819]  kunit_try_run_case+0x170/0x3f0
[   19.938036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.938092]  kthread+0x328/0x630
[   19.938133]  ret_from_fork+0x10/0x20
[   19.938185] 
[   19.938628] Allocated by task 266:
[   19.939325]  kasan_save_stack+0x3c/0x68
[   19.939779]  kasan_save_track+0x20/0x40
[   19.939930]  kasan_save_alloc_info+0x40/0x58
[   19.940369]  __kasan_kmalloc+0xd4/0xd8
[   19.940606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.941291]  kasan_atomics+0xb8/0x2e0
[   19.941607]  kunit_try_run_case+0x170/0x3f0
[   19.942220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.942797]  kthread+0x328/0x630
[   19.943228]  ret_from_fork+0x10/0x20
[   19.943270] 
[   19.943292] The buggy address belongs to the object at fff00000c77bfc80
[   19.943292]  which belongs to the cache kmalloc-64 of size 64
[   19.943357] The buggy address is located 0 bytes to the right of
[   19.943357]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.943424] 
[   19.943445] The buggy address belongs to the physical page:
[   19.943482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.945058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.945481] page_type: f5(slab)
[   19.945845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.945952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.946547] page dumped because: kasan: bad access detected
[   19.946931] 
[   19.947144] Memory state around the buggy address:
[   19.947281]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.947776]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.948074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.948399]                                      ^
[   19.948609]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.948657]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.948698] ==================================================================
[   19.662269] ==================================================================
[   19.662432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.662528] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.662601] 
[   19.662811] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.663139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.663352] Hardware name: linux,dummy-virt (DT)
[   19.663426] Call trace:
[   19.663593]  show_stack+0x20/0x38 (C)
[   19.663652]  dump_stack_lvl+0x8c/0xd0
[   19.663953]  print_report+0x118/0x608
[   19.664281]  kasan_report+0xdc/0x128
[   19.664484]  __asan_report_load4_noabort+0x20/0x30
[   19.664580]  kasan_atomics_helper+0x3dcc/0x4858
[   19.664787]  kasan_atomics+0x198/0x2e0
[   19.665040]  kunit_try_run_case+0x170/0x3f0
[   19.665132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665400]  kthread+0x328/0x630
[   19.665580]  ret_from_fork+0x10/0x20
[   19.665708] 
[   19.665812] Allocated by task 266:
[   19.665846]  kasan_save_stack+0x3c/0x68
[   19.666237]  kasan_save_track+0x20/0x40
[   19.666654]  kasan_save_alloc_info+0x40/0x58
[   19.666887]  __kasan_kmalloc+0xd4/0xd8
[   19.666936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.666991]  kasan_atomics+0xb8/0x2e0
[   19.667291]  kunit_try_run_case+0x170/0x3f0
[   19.667409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667769]  kthread+0x328/0x630
[   19.667815]  ret_from_fork+0x10/0x20
[   19.668123] 
[   19.668364] The buggy address belongs to the object at fff00000c77bfc80
[   19.668364]  which belongs to the cache kmalloc-64 of size 64
[   19.668554] The buggy address is located 0 bytes to the right of
[   19.668554]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.668841] 
[   19.669030] The buggy address belongs to the physical page:
[   19.669097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.669296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.669543] page_type: f5(slab)
[   19.669601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.670018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.670307] page dumped because: kasan: bad access detected
[   19.670387] 
[   19.670407] Memory state around the buggy address:
[   19.670727]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.671086]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.671327] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.671553]                                      ^
[   19.671758]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671828]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671927] ==================================================================
[   19.909902] ==================================================================
[   19.910387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.910457] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.910825] 
[   19.910907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.911179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.911332] Hardware name: linux,dummy-virt (DT)
[   19.911554] Call trace:
[   19.911584]  show_stack+0x20/0x38 (C)
[   19.911836]  dump_stack_lvl+0x8c/0xd0
[   19.911895]  print_report+0x118/0x608
[   19.912156]  kasan_report+0xdc/0x128
[   19.912662]  kasan_check_range+0x100/0x1a8
[   19.912889]  __kasan_check_write+0x20/0x30
[   19.913237]  kasan_atomics_helper+0x16d0/0x4858
[   19.913562]  kasan_atomics+0x198/0x2e0
[   19.913612]  kunit_try_run_case+0x170/0x3f0
[   19.913666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.913718]  kthread+0x328/0x630
[   19.913761]  ret_from_fork+0x10/0x20
[   19.914615] 
[   19.914817] Allocated by task 266:
[   19.914852]  kasan_save_stack+0x3c/0x68
[   19.914994]  kasan_save_track+0x20/0x40
[   19.915093]  kasan_save_alloc_info+0x40/0x58
[   19.915135]  __kasan_kmalloc+0xd4/0xd8
[   19.915633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.915828]  kasan_atomics+0xb8/0x2e0
[   19.917052]  kunit_try_run_case+0x170/0x3f0
[   19.917376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.917470]  kthread+0x328/0x630
[   19.917794]  ret_from_fork+0x10/0x20
[   19.918030] 
[   19.918324] The buggy address belongs to the object at fff00000c77bfc80
[   19.918324]  which belongs to the cache kmalloc-64 of size 64
[   19.918548] The buggy address is located 0 bytes to the right of
[   19.918548]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.918900] 
[   19.918927] The buggy address belongs to the physical page:
[   19.919118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.919228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.919289] page_type: f5(slab)
[   19.919328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.919659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.920168] page dumped because: kasan: bad access detected
[   19.920214] 
[   19.920235] Memory state around the buggy address:
[   19.920618]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.920967]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.921376] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.921564]                                      ^
[   19.921839]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.921887]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.922270] ==================================================================
[   19.851569] ==================================================================
[   19.851618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.851714] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.851767] 
[   19.851798] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.851879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.851908] Hardware name: linux,dummy-virt (DT)
[   19.851938] Call trace:
[   19.851963]  show_stack+0x20/0x38 (C)
[   19.852048]  dump_stack_lvl+0x8c/0xd0
[   19.852096]  print_report+0x118/0x608
[   19.852142]  kasan_report+0xdc/0x128
[   19.852188]  kasan_check_range+0x100/0x1a8
[   19.852236]  __kasan_check_write+0x20/0x30
[   19.852283]  kasan_atomics_helper+0x1414/0x4858
[   19.852333]  kasan_atomics+0x198/0x2e0
[   19.852443]  kunit_try_run_case+0x170/0x3f0
[   19.852499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.852723]  kthread+0x328/0x630
[   19.852782]  ret_from_fork+0x10/0x20
[   19.852830] 
[   19.852855] Allocated by task 266:
[   19.853025]  kasan_save_stack+0x3c/0x68
[   19.853193]  kasan_save_track+0x20/0x40
[   19.853231]  kasan_save_alloc_info+0x40/0x58
[   19.853350]  __kasan_kmalloc+0xd4/0xd8
[   19.853396]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.853561]  kasan_atomics+0xb8/0x2e0
[   19.853599]  kunit_try_run_case+0x170/0x3f0
[   19.853643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.853686]  kthread+0x328/0x630
[   19.853727]  ret_from_fork+0x10/0x20
[   19.853909] 
[   19.854665] The buggy address belongs to the object at fff00000c77bfc80
[   19.854665]  which belongs to the cache kmalloc-64 of size 64
[   19.854736] The buggy address is located 0 bytes to the right of
[   19.854736]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.854801] 
[   19.854823] The buggy address belongs to the physical page:
[   19.854856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.854909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.854960] page_type: f5(slab)
[   19.855011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.855069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.855110] page dumped because: kasan: bad access detected
[   19.855144] 
[   19.855163] Memory state around the buggy address:
[   19.855196]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.855247]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.855293] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.855334]                                      ^
[   19.855366]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855411]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855451] ==================================================================
[   19.858446] ==================================================================
[   19.858565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.858612] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.858662] 
[   19.858692] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.858773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.858800] Hardware name: linux,dummy-virt (DT)
[   19.858832] Call trace:
[   19.858855]  show_stack+0x20/0x38 (C)
[   19.858902]  dump_stack_lvl+0x8c/0xd0
[   19.858956]  print_report+0x118/0x608
[   19.859195]  kasan_report+0xdc/0x128
[   19.859241]  kasan_check_range+0x100/0x1a8
[   19.859290]  __kasan_check_write+0x20/0x30
[   19.859336]  kasan_atomics_helper+0x14e4/0x4858
[   19.859392]  kasan_atomics+0x198/0x2e0
[   19.859438]  kunit_try_run_case+0x170/0x3f0
[   19.859486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.859537]  kthread+0x328/0x630
[   19.859579]  ret_from_fork+0x10/0x20
[   19.859625] 
[   19.859644] Allocated by task 266:
[   19.859716]  kasan_save_stack+0x3c/0x68
[   19.859928]  kasan_save_track+0x20/0x40
[   19.860601]  kasan_save_alloc_info+0x40/0x58
[   19.860768]  __kasan_kmalloc+0xd4/0xd8
[   19.860869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.860910]  kasan_atomics+0xb8/0x2e0
[   19.861008]  kunit_try_run_case+0x170/0x3f0
[   19.861050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.861095]  kthread+0x328/0x630
[   19.861130]  ret_from_fork+0x10/0x20
[   19.861168] 
[   19.861199] The buggy address belongs to the object at fff00000c77bfc80
[   19.861199]  which belongs to the cache kmalloc-64 of size 64
[   19.861266] The buggy address is located 0 bytes to the right of
[   19.861266]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.861331] 
[   19.861353] The buggy address belongs to the physical page:
[   19.861385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.861437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.861486] page_type: f5(slab)
[   19.861523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.861575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.861627] page dumped because: kasan: bad access detected
[   19.861661] 
[   19.861680] Memory state around the buggy address:
[   19.861713]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.861759]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.861804] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.861846]                                      ^
[   19.861878]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861921]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861994] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   19.322856] ==================================================================
[   19.322912] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   19.322991] Read of size 1 at addr fff00000c77ad110 by task kunit_try_catch/260
[   19.323143] 
[   19.323281] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.323365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.323393] Hardware name: linux,dummy-virt (DT)
[   19.323426] Call trace:
[   19.323448]  show_stack+0x20/0x38 (C)
[   19.323497]  dump_stack_lvl+0x8c/0xd0
[   19.323585]  print_report+0x118/0x608
[   19.323631]  kasan_report+0xdc/0x128
[   19.323678]  __asan_report_load1_noabort+0x20/0x30
[   19.323745]  strlen+0xa8/0xb0
[   19.323846]  kasan_strings+0x418/0xb00
[   19.323938]  kunit_try_run_case+0x170/0x3f0
[   19.323998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.324053]  kthread+0x328/0x630
[   19.324095]  ret_from_fork+0x10/0x20
[   19.324152] 
[   19.324201] Allocated by task 260:
[   19.324229]  kasan_save_stack+0x3c/0x68
[   19.324316]  kasan_save_track+0x20/0x40
[   19.324355]  kasan_save_alloc_info+0x40/0x58
[   19.324395]  __kasan_kmalloc+0xd4/0xd8
[   19.324433]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.324492]  kasan_strings+0xc8/0xb00
[   19.324529]  kunit_try_run_case+0x170/0x3f0
[   19.324568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.324718]  kthread+0x328/0x630
[   19.324802]  ret_from_fork+0x10/0x20
[   19.324846] 
[   19.324865] Freed by task 260:
[   19.324894]  kasan_save_stack+0x3c/0x68
[   19.324931]  kasan_save_track+0x20/0x40
[   19.324969]  kasan_save_free_info+0x4c/0x78
[   19.325018]  __kasan_slab_free+0x6c/0x98
[   19.325085]  kfree+0x214/0x3c8
[   19.325120]  kasan_strings+0x24c/0xb00
[   19.325157]  kunit_try_run_case+0x170/0x3f0
[   19.325322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.325367]  kthread+0x328/0x630
[   19.325401]  ret_from_fork+0x10/0x20
[   19.326232] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.326781]  fff00000c77ad200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.328109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.328518]  kunit_try_run_case+0x170/0x3f0
[   19.329364]  kasan_strings+0xc8/0xb00
[   19.329968] 
[   19.330114]  kasan_save_free_info+0x4c/0x78
[   19.330440]  ret_from_fork+0x10/0x20
[   19.330797] 
[   19.330931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.331219] Memory state around the buggy address:
[   19.331306]  fff00000c77ad000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.331601]                          ^
[   19.336050]     not ok 62 kasan_strings
[   19.337328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.337747] Hardware name: linux,dummy-virt (DT)
[   19.337949]  kasan_report+0xdc/0x128
[   19.338163]  kasan_bitops_generic+0x110/0x1c8
[   19.339254]  kasan_save_track+0x20/0x40
[   19.339459]  kunit_try_run_case+0x170/0x3f0
[   19.339735] The buggy address is located 8 bytes inside of
[   19.339735]  allocated 9-byte region [fff00000c1ab8b80, fff00000c1ab8b89)
[   19.340588] page dumped because: kasan: bad access detected
[   19.340763] 
[   19.340783] Memory state around the buggy address:
[   19.341333]                       ^
[   19.343490] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   19.317499] ==================================================================
[   19.317595] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   19.317656] Read of size 1 at addr fff00000c77ad110 by task kunit_try_catch/260
[   19.317727] 
[   19.317759] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.317857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.317886] Hardware name: linux,dummy-virt (DT)
[   19.317917] Call trace:
[   19.317942]  show_stack+0x20/0x38 (C)
[   19.318004]  dump_stack_lvl+0x8c/0xd0
[   19.318104]  print_report+0x118/0x608
[   19.318315]  kasan_report+0xdc/0x128
[   19.318380]  __asan_report_load1_noabort+0x20/0x30
[   19.318547]  kasan_strings+0x95c/0xb00
[   19.318680]  kunit_try_run_case+0x170/0x3f0
[   19.318731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.318811]  kthread+0x328/0x630
[   19.318852]  ret_from_fork+0x10/0x20
[   19.318900] 
[   19.318929] Allocated by task 260:
[   19.319143]  kasan_save_stack+0x3c/0x68
[   19.319187]  kasan_save_track+0x20/0x40
[   19.319225]  kasan_save_alloc_info+0x40/0x58
[   19.319290]  __kasan_kmalloc+0xd4/0xd8
[   19.319329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.319389]  kasan_strings+0xc8/0xb00
[   19.319425]  kunit_try_run_case+0x170/0x3f0
[   19.319465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.319508]  kthread+0x328/0x630
[   19.319543]  ret_from_fork+0x10/0x20
[   19.319688] 
[   19.319747] Freed by task 260:
[   19.319855]  kasan_save_stack+0x3c/0x68
[   19.319896]  kasan_save_track+0x20/0x40
[   19.319934]  kasan_save_free_info+0x4c/0x78
[   19.319987]  __kasan_slab_free+0x6c/0x98
[   19.320026]  kfree+0x214/0x3c8
[   19.320061]  kasan_strings+0x24c/0xb00
[   19.320110]  kunit_try_run_case+0x170/0x3f0
[   19.320192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.320257]  kthread+0x328/0x630
[   19.320290]  ret_from_fork+0x10/0x20
[   19.320328] 
[   19.320348] The buggy address belongs to the object at fff00000c77ad100
[   19.320348]  which belongs to the cache kmalloc-32 of size 32
[   19.320503] The buggy address is located 16 bytes inside of
[   19.320503]  freed 32-byte region [fff00000c77ad100, fff00000c77ad120)
[   19.320575] 
[   19.320672] The buggy address belongs to the physical page:
[   19.320766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ad
[   19.320837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.320956] page_type: f5(slab)
[   19.321011] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.321141] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.321269] page dumped because: kasan: bad access detected
[   19.321302] 
[   19.321323] Memory state around the buggy address:
[   19.321363]  fff00000c77ad000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.321556]  fff00000c77ad080: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.321601] >fff00000c77ad100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.321670]                          ^
[   19.321829]  fff00000c77ad180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.322233]  fff00000c77ad200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.322274] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   19.312531] ==================================================================
[   19.312588] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   19.312643] Read of size 1 at addr fff00000c77ad110 by task kunit_try_catch/260
[   19.312693] 
[   19.312733] CPU: 1 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.312819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.312861] Hardware name: linux,dummy-virt (DT)
[   19.313015] Call trace:
[   19.313150]  show_stack+0x20/0x38 (C)
[   19.313259]  dump_stack_lvl+0x8c/0xd0
[   19.313409]  print_report+0x118/0x608
[   19.313476]  kasan_report+0xdc/0x128
[   19.313641]  __asan_report_load1_noabort+0x20/0x30
[   19.313701]  strcmp+0xc0/0xc8
[   19.313904]  kasan_strings+0x340/0xb00
[   19.314181]  kunit_try_run_case+0x170/0x3f0
[   19.314239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.314292]  kthread+0x328/0x630
[   19.314335]  ret_from_fork+0x10/0x20
[   19.314419] 
[   19.314445] Allocated by task 260:
[   19.314476]  kasan_save_stack+0x3c/0x68
[   19.314520]  kasan_save_track+0x20/0x40
[   19.314559]  kasan_save_alloc_info+0x40/0x58
[   19.314633]  __kasan_kmalloc+0xd4/0xd8
[   19.314676]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.314718]  kasan_strings+0xc8/0xb00
[   19.314756]  kunit_try_run_case+0x170/0x3f0
[   19.314794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.314872]  kthread+0x328/0x630
[   19.314907]  ret_from_fork+0x10/0x20
[   19.314944] 
[   19.314964] Freed by task 260:
[   19.315006]  kasan_save_stack+0x3c/0x68
[   19.315073]  kasan_save_track+0x20/0x40
[   19.315152]  kasan_save_free_info+0x4c/0x78
[   19.315246]  __kasan_slab_free+0x6c/0x98
[   19.315284]  kfree+0x214/0x3c8
[   19.315326]  kasan_strings+0x24c/0xb00
[   19.315427]  kunit_try_run_case+0x170/0x3f0
[   19.315468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.315572]  kthread+0x328/0x630
[   19.315607]  ret_from_fork+0x10/0x20
[   19.315643] 
[   19.315682] The buggy address belongs to the object at fff00000c77ad100
[   19.315682]  which belongs to the cache kmalloc-32 of size 32
[   19.315743] The buggy address is located 16 bytes inside of
[   19.315743]  freed 32-byte region [fff00000c77ad100, fff00000c77ad120)
[   19.315826] 
[   19.315880] The buggy address belongs to the physical page:
[   19.315998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ad
[   19.316054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.316106] page_type: f5(slab)
[   19.316146] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.316208] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.316249] page dumped because: kasan: bad access detected
[   19.316302] 
[   19.316322] Memory state around the buggy address:
[   19.316357]  fff00000c77ad000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.316403]  fff00000c77ad080: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.316513] >fff00000c77ad100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.316595]                          ^
[   19.316692]  fff00000c77ad180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.316737]  fff00000c77ad200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.316853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   19.294603] ==================================================================
[   19.294836] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   19.294894] Read of size 1 at addr fff00000c65c2f58 by task kunit_try_catch/258
[   19.294944] 
[   19.294995] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.295078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.295121] Hardware name: linux,dummy-virt (DT)
[   19.295155] Call trace:
[   19.295180]  show_stack+0x20/0x38 (C)
[   19.295231]  dump_stack_lvl+0x8c/0xd0
[   19.295279]  print_report+0x118/0x608
[   19.295325]  kasan_report+0xdc/0x128
[   19.295372]  __asan_report_load1_noabort+0x20/0x30
[   19.295422]  memcmp+0x198/0x1d8
[   19.295465]  kasan_memcmp+0x16c/0x300
[   19.295509]  kunit_try_run_case+0x170/0x3f0
[   19.295560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295614]  kthread+0x328/0x630
[   19.295657]  ret_from_fork+0x10/0x20
[   19.295705] 
[   19.295726] Allocated by task 258:
[   19.295758]  kasan_save_stack+0x3c/0x68
[   19.295799]  kasan_save_track+0x20/0x40
[   19.295839]  kasan_save_alloc_info+0x40/0x58
[   19.295881]  __kasan_kmalloc+0xd4/0xd8
[   19.295917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.296016]  kasan_memcmp+0xbc/0x300
[   19.296054]  kunit_try_run_case+0x170/0x3f0
[   19.296092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.296137]  kthread+0x328/0x630
[   19.296370]  ret_from_fork+0x10/0x20
[   19.296428] 
[   19.296450] The buggy address belongs to the object at fff00000c65c2f40
[   19.296450]  which belongs to the cache kmalloc-32 of size 32
[   19.296512] The buggy address is located 0 bytes to the right of
[   19.296512]  allocated 24-byte region [fff00000c65c2f40, fff00000c65c2f58)
[   19.296593] 
[   19.296655] The buggy address belongs to the physical page:
[   19.296765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c2
[   19.296931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.297044] page_type: f5(slab)
[   19.297084] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.297137] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.297182] page dumped because: kasan: bad access detected
[   19.297225] 
[   19.297244] Memory state around the buggy address:
[   19.297278]  fff00000c65c2e00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.297724]  fff00000c65c2e80: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.297880] >fff00000c65c2f00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.297958]                                                     ^
[   19.298042]  fff00000c65c2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.298089]  fff00000c65c3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.298148] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   19.277429] ==================================================================
[   19.277493] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   19.277552] Read of size 1 at addr ffff800080997b4a by task kunit_try_catch/254
[   19.277604] 
[   19.277654] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.277739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.277769] Hardware name: linux,dummy-virt (DT)
[   19.277802] Call trace:
[   19.277827]  show_stack+0x20/0x38 (C)
[   19.277876]  dump_stack_lvl+0x8c/0xd0
[   19.277925]  print_report+0x310/0x608
[   19.277973]  kasan_report+0xdc/0x128
[   19.278032]  __asan_report_load1_noabort+0x20/0x30
[   19.278085]  kasan_alloca_oob_right+0x2dc/0x340
[   19.278133]  kunit_try_run_case+0x170/0x3f0
[   19.278182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.278266]  kthread+0x328/0x630
[   19.278489]  ret_from_fork+0x10/0x20
[   19.278720] 
[   19.278753] The buggy address belongs to stack of task kunit_try_catch/254
[   19.278853] 
[   19.278881] The buggy address belongs to the virtual mapping at
[   19.278881]  [ffff800080990000, ffff800080999000) created by:
[   19.278881]  kernel_clone+0x150/0x7a8
[   19.279155] 
[   19.279185] The buggy address belongs to the physical page:
[   19.279222] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af
[   19.279280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.279365] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.279418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.279461] page dumped because: kasan: bad access detected
[   19.279586] 
[   19.279682] Memory state around the buggy address:
[   19.279717]  ffff800080997a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.279765]  ffff800080997a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.279818] >ffff800080997b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   19.279859]                                               ^
[   19.279895]  ffff800080997b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   19.280956]  ffff800080997c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.281022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   19.261928] ==================================================================
[   19.262025] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   19.262774] Read of size 1 at addr ffff800080997b5f by task kunit_try_catch/252
[   19.262877] 
[   19.263005] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.263104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.263134] Hardware name: linux,dummy-virt (DT)
[   19.263168] Call trace:
[   19.263194]  show_stack+0x20/0x38 (C)
[   19.263248]  dump_stack_lvl+0x8c/0xd0
[   19.263301]  print_report+0x310/0x608
[   19.263348]  kasan_report+0xdc/0x128
[   19.263639]  __asan_report_load1_noabort+0x20/0x30
[   19.263746]  kasan_alloca_oob_left+0x2b8/0x310
[   19.263816]  kunit_try_run_case+0x170/0x3f0
[   19.263899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.264091]  kthread+0x328/0x630
[   19.264221]  ret_from_fork+0x10/0x20
[   19.264274] 
[   19.264296] The buggy address belongs to stack of task kunit_try_catch/252
[   19.265276] 
[   19.265314] The buggy address belongs to the virtual mapping at
[   19.265314]  [ffff800080990000, ffff800080999000) created by:
[   19.265314]  kernel_clone+0x150/0x7a8
[   19.265402] 
[   19.265427] The buggy address belongs to the physical page:
[   19.265460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af
[   19.265517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.265581] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.265640] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.265682] page dumped because: kasan: bad access detected
[   19.265716] 
[   19.265735] Memory state around the buggy address:
[   19.265771]  ffff800080997a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.265817]  ffff800080997a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.265862] >ffff800080997b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   19.265902]                                                     ^
[   19.265941]  ffff800080997b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   19.267499]  ffff800080997c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.267564] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   19.249734] ==================================================================
[   19.249814] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   19.249873] Read of size 1 at addr ffff800080997c2a by task kunit_try_catch/250
[   19.249926] 
[   19.249965] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.250074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.250103] Hardware name: linux,dummy-virt (DT)
[   19.250158] Call trace:
[   19.250184]  show_stack+0x20/0x38 (C)
[   19.250268]  dump_stack_lvl+0x8c/0xd0
[   19.250333]  print_report+0x310/0x608
[   19.250385]  kasan_report+0xdc/0x128
[   19.250433]  __asan_report_load1_noabort+0x20/0x30
[   19.250489]  kasan_stack_oob+0x238/0x270
[   19.250544]  kunit_try_run_case+0x170/0x3f0
[   19.250778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.251435]  kthread+0x328/0x630
[   19.252101]  ret_from_fork+0x10/0x20
[   19.252160] 
[   19.252232] The buggy address belongs to stack of task kunit_try_catch/250
[   19.252351]  and is located at offset 138 in frame:
[   19.252389]  kasan_stack_oob+0x0/0x270
[   19.252521] 
[   19.252552] This frame has 4 objects:
[   19.252654]  [48, 49) '__assertion'
[   19.252696]  [64, 72) 'array'
[   19.252731]  [96, 112) '__assertion'
[   19.252776]  [128, 138) 'stack_array'
[   19.252820] 
[   19.252859] The buggy address belongs to the virtual mapping at
[   19.252859]  [ffff800080990000, ffff800080999000) created by:
[   19.252859]  kernel_clone+0x150/0x7a8
[   19.252951] 
[   19.252986] The buggy address belongs to the physical page:
[   19.253709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af
[   19.253889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.254302] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.254368] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.254461] page dumped because: kasan: bad access detected
[   19.254516] 
[   19.254851] Memory state around the buggy address:
[   19.254894]  ffff800080997b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.254973]  ffff800080997b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   19.255036] >ffff800080997c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   19.255082]                                   ^
[   19.255119]  ffff800080997c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   19.255172]  ffff800080997d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.255484] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   19.218266] ==================================================================
[   19.218340] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   19.218396] Read of size 1 at addr ffff91dea554f58d by task kunit_try_catch/246
[   19.219698] 
[   19.219758] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.219845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.219884] Hardware name: linux,dummy-virt (DT)
[   19.219917] Call trace:
[   19.220190]  show_stack+0x20/0x38 (C)
[   19.220251]  dump_stack_lvl+0x8c/0xd0
[   19.220298]  print_report+0x310/0x608
[   19.220345]  kasan_report+0xdc/0x128
[   19.221948]  __asan_report_load1_noabort+0x20/0x30
[   19.222586]  kasan_global_oob_right+0x230/0x270
[   19.222646]  kunit_try_run_case+0x170/0x3f0
[   19.223538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.224433]  kthread+0x328/0x630
[   19.224919]  ret_from_fork+0x10/0x20
[   19.225230] 
[   19.225581] The buggy address belongs to the variable:
[   19.225666]  global_array+0xd/0x40
[   19.225720] 
[   19.226453] The buggy address belongs to the virtual mapping at
[   19.226453]  [ffff91dea3700000, ffff91dea5601000) created by:
[   19.226453]  paging_init+0x66c/0x7d0
[   19.226953] 
[   19.227228] The buggy address belongs to the physical page:
[   19.227267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   19.228127] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   19.228298] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   19.228600] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.228781] page dumped because: kasan: bad access detected
[   19.228817] 
[   19.229214] Memory state around the buggy address:
[   19.229260]  ffff91dea554f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.229520]  ffff91dea554f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   19.229579] >ffff91dea554f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   19.230790]                       ^
[   19.230827]  ffff91dea554f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   19.230872]  ffff91dea554f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.231803] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   19.194174] ==================================================================
[   19.194239] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.194297] Free of addr fff00000c69b6e01 by task kunit_try_catch/242
[   19.194338] 
[   19.194373] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.194454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.194481] Hardware name: linux,dummy-virt (DT)
[   19.194524] Call trace:
[   19.194548]  show_stack+0x20/0x38 (C)
[   19.194644]  dump_stack_lvl+0x8c/0xd0
[   19.194695]  print_report+0x118/0x608
[   19.195041]  kasan_report_invalid_free+0xc0/0xe8
[   19.195240]  check_slab_allocation+0xfc/0x108
[   19.195362]  __kasan_mempool_poison_object+0x78/0x150
[   19.195431]  mempool_free+0x28c/0x328
[   19.195477]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.195553]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.195679]  kunit_try_run_case+0x170/0x3f0
[   19.195739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.196199]  kthread+0x328/0x630
[   19.196251]  ret_from_fork+0x10/0x20
[   19.196300] 
[   19.196317] Allocated by task 242:
[   19.196365]  kasan_save_stack+0x3c/0x68
[   19.196422]  kasan_save_track+0x20/0x40
[   19.196460]  kasan_save_alloc_info+0x40/0x58
[   19.196498]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.196540]  remove_element+0x130/0x1f8
[   19.196576]  mempool_alloc_preallocated+0x58/0xc0
[   19.196613]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   19.196655]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.196694]  kunit_try_run_case+0x170/0x3f0
[   19.196730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.196773]  kthread+0x328/0x630
[   19.196804]  ret_from_fork+0x10/0x20
[   19.196838] 
[   19.196857] The buggy address belongs to the object at fff00000c69b6e00
[   19.196857]  which belongs to the cache kmalloc-128 of size 128
[   19.196917] The buggy address is located 1 bytes inside of
[   19.196917]  128-byte region [fff00000c69b6e00, fff00000c69b6e80)
[   19.196985] 
[   19.197005] The buggy address belongs to the physical page:
[   19.197036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   19.197091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.197140] page_type: f5(slab)
[   19.197178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.197228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.197269] page dumped because: kasan: bad access detected
[   19.197299] 
[   19.197316] Memory state around the buggy address:
[   19.197349]  fff00000c69b6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.197392]  fff00000c69b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197433] >fff00000c69b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.197472]                    ^
[   19.197497]  fff00000c69b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197538]  fff00000c69b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.197577] ==================================================================
[   19.206116] ==================================================================
[   19.206441] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.206660] Free of addr fff00000c7904001 by task kunit_try_catch/244
[   19.206706] 
[   19.206740] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.206821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.206849] Hardware name: linux,dummy-virt (DT)
[   19.207009] Call trace:
[   19.207036]  show_stack+0x20/0x38 (C)
[   19.207238]  dump_stack_lvl+0x8c/0xd0
[   19.207370]  print_report+0x118/0x608
[   19.207456]  kasan_report_invalid_free+0xc0/0xe8
[   19.207554]  __kasan_mempool_poison_object+0xfc/0x150
[   19.207638]  mempool_free+0x28c/0x328
[   19.207685]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.207742]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   19.207865]  kunit_try_run_case+0x170/0x3f0
[   19.208076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.208153]  kthread+0x328/0x630
[   19.208192]  ret_from_fork+0x10/0x20
[   19.208281] 
[   19.208336] The buggy address belongs to the physical page:
[   19.208431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107904
[   19.208585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.208634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.208690] page_type: f8(unknown)
[   19.209638] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.210177] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.210578] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.210883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.211015] head: 0bfffe0000000002 ffffc1ffc31e4101 00000000ffffffff 00000000ffffffff
[   19.211088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.211162] page dumped because: kasan: bad access detected
[   19.211228] 
[   19.211252] Memory state around the buggy address:
[   19.211289]  fff00000c7903f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.211357]  fff00000c7903f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.211401] >fff00000c7904000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211440]                    ^
[   19.211466]  fff00000c7904080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211640]  fff00000c7904100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.211692] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   19.153505] ==================================================================
[   19.154067] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.154481] Free of addr fff00000c7900000 by task kunit_try_catch/238
[   19.154523] 
[   19.154674] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.154912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.155009] Hardware name: linux,dummy-virt (DT)
[   19.155067] Call trace:
[   19.155090]  show_stack+0x20/0x38 (C)
[   19.155474]  dump_stack_lvl+0x8c/0xd0
[   19.155562]  print_report+0x118/0x608
[   19.155683]  kasan_report_invalid_free+0xc0/0xe8
[   19.155782]  __kasan_mempool_poison_object+0x14c/0x150
[   19.155860]  mempool_free+0x28c/0x328
[   19.156093]  mempool_double_free_helper+0x150/0x2e8
[   19.156309]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.156489]  kunit_try_run_case+0x170/0x3f0
[   19.156592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.157225]  kthread+0x328/0x630
[   19.157364]  ret_from_fork+0x10/0x20
[   19.157535] 
[   19.157593] The buggy address belongs to the physical page:
[   19.157909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   19.158159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.158392] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.158559] page_type: f8(unknown)
[   19.158738] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.158866] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.159079] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.159136] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.160022] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   19.160123] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.160167] page dumped because: kasan: bad access detected
[   19.160228] 
[   19.160282] Memory state around the buggy address:
[   19.160534]  fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.161038]  fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.161509] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.161667]                    ^
[   19.161763]  fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.163049]  fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.163099] ==================================================================
[   19.174764] ==================================================================
[   19.174823] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.174876] Free of addr fff00000c7900000 by task kunit_try_catch/240
[   19.174917] 
[   19.174952] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.175044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.175070] Hardware name: linux,dummy-virt (DT)
[   19.176011] Call trace:
[   19.176052]  show_stack+0x20/0x38 (C)
[   19.176106]  dump_stack_lvl+0x8c/0xd0
[   19.176162]  print_report+0x118/0x608
[   19.176210]  kasan_report_invalid_free+0xc0/0xe8
[   19.176518]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.176935]  mempool_free+0x24c/0x328
[   19.177097]  mempool_double_free_helper+0x150/0x2e8
[   19.177447]  mempool_page_alloc_double_free+0xbc/0x118
[   19.177541]  kunit_try_run_case+0x170/0x3f0
[   19.177592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.178673]  kthread+0x328/0x630
[   19.179182]  ret_from_fork+0x10/0x20
[   19.179821] 
[   19.179854] The buggy address belongs to the physical page:
[   19.180113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   19.180682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.180755] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.180806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.180855] page dumped because: kasan: bad access detected
[   19.180885] 
[   19.181393] Memory state around the buggy address:
[   19.182572]  fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.182945]  fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.183003] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.183656]                    ^
[   19.183983]  fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.184406]  fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.185158] ==================================================================
[   19.126456] ==================================================================
[   19.126520] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.126573] Free of addr fff00000c69b6a00 by task kunit_try_catch/236
[   19.127212] 
[   19.127259] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.127698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.127972] Hardware name: linux,dummy-virt (DT)
[   19.128209] Call trace:
[   19.128606]  show_stack+0x20/0x38 (C)
[   19.128932]  dump_stack_lvl+0x8c/0xd0
[   19.129280]  print_report+0x118/0x608
[   19.129476]  kasan_report_invalid_free+0xc0/0xe8
[   19.129690]  check_slab_allocation+0xd4/0x108
[   19.130022]  __kasan_mempool_poison_object+0x78/0x150
[   19.130338]  mempool_free+0x28c/0x328
[   19.130561]  mempool_double_free_helper+0x150/0x2e8
[   19.130819]  mempool_kmalloc_double_free+0xc0/0x118
[   19.130971]  kunit_try_run_case+0x170/0x3f0
[   19.131044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.131590]  kthread+0x328/0x630
[   19.131654]  ret_from_fork+0x10/0x20
[   19.131886] 
[   19.132092] Allocated by task 236:
[   19.132195]  kasan_save_stack+0x3c/0x68
[   19.132260]  kasan_save_track+0x20/0x40
[   19.132311]  kasan_save_alloc_info+0x40/0x58
[   19.132376]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.132930]  remove_element+0x130/0x1f8
[   19.133046]  mempool_alloc_preallocated+0x58/0xc0
[   19.133207]  mempool_double_free_helper+0x94/0x2e8
[   19.133381]  mempool_kmalloc_double_free+0xc0/0x118
[   19.133438]  kunit_try_run_case+0x170/0x3f0
[   19.133681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.133900]  kthread+0x328/0x630
[   19.133954]  ret_from_fork+0x10/0x20
[   19.134194] 
[   19.134360] Freed by task 236:
[   19.134424]  kasan_save_stack+0x3c/0x68
[   19.134484]  kasan_save_track+0x20/0x40
[   19.134650]  kasan_save_free_info+0x4c/0x78
[   19.135039]  __kasan_mempool_poison_object+0xc0/0x150
[   19.135098]  mempool_free+0x28c/0x328
[   19.135158]  mempool_double_free_helper+0x100/0x2e8
[   19.135372]  mempool_kmalloc_double_free+0xc0/0x118
[   19.135532]  kunit_try_run_case+0x170/0x3f0
[   19.135668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.135899]  kthread+0x328/0x630
[   19.136004]  ret_from_fork+0x10/0x20
[   19.136155] 
[   19.136231] The buggy address belongs to the object at fff00000c69b6a00
[   19.136231]  which belongs to the cache kmalloc-128 of size 128
[   19.136324] The buggy address is located 0 bytes inside of
[   19.136324]  128-byte region [fff00000c69b6a00, fff00000c69b6a80)
[   19.136533] 
[   19.136705] The buggy address belongs to the physical page:
[   19.136744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   19.137345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.137522] page_type: f5(slab)
[   19.137878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.138136] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.138256] page dumped because: kasan: bad access detected
[   19.138389] 
[   19.138591] Memory state around the buggy address:
[   19.138699]  fff00000c69b6900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.138918]  fff00000c69b6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.138964] >fff00000c69b6a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.139012]                    ^
[   19.139286]  fff00000c69b6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139495]  fff00000c69b6b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.139556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   19.109624] ==================================================================
[   19.109735] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.110104] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/234
[   19.110321] 
[   19.110401] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.110775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.111077] Hardware name: linux,dummy-virt (DT)
[   19.111316] Call trace:
[   19.111375]  show_stack+0x20/0x38 (C)
[   19.111489]  dump_stack_lvl+0x8c/0xd0
[   19.111581]  print_report+0x118/0x608
[   19.111763]  kasan_report+0xdc/0x128
[   19.111869]  __asan_report_load1_noabort+0x20/0x30
[   19.112045]  mempool_uaf_helper+0x314/0x340
[   19.112344]  mempool_page_alloc_uaf+0xc0/0x118
[   19.112561]  kunit_try_run_case+0x170/0x3f0
[   19.112658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.113097]  kthread+0x328/0x630
[   19.113172]  ret_from_fork+0x10/0x20
[   19.113649] 
[   19.113678] The buggy address belongs to the physical page:
[   19.113746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   19.114224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.114374] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.114504] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.114547] page dumped because: kasan: bad access detected
[   19.114579] 
[   19.114788] Memory state around the buggy address:
[   19.115127]  fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115225]  fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115308] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115440]                    ^
[   19.115535]  fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115601]  fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.115839] ==================================================================
[   19.050033] ==================================================================
[   19.050229] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.050421] Read of size 1 at addr fff00000c7900000 by task kunit_try_catch/230
[   19.050549] 
[   19.050595] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.051145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.051299] Hardware name: linux,dummy-virt (DT)
[   19.051347] Call trace:
[   19.051373]  show_stack+0x20/0x38 (C)
[   19.051642]  dump_stack_lvl+0x8c/0xd0
[   19.051821]  print_report+0x118/0x608
[   19.051965]  kasan_report+0xdc/0x128
[   19.052087]  __asan_report_load1_noabort+0x20/0x30
[   19.052165]  mempool_uaf_helper+0x314/0x340
[   19.052271]  mempool_kmalloc_large_uaf+0xc4/0x120
[   19.052324]  kunit_try_run_case+0x170/0x3f0
[   19.052384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.052438]  kthread+0x328/0x630
[   19.052487]  ret_from_fork+0x10/0x20
[   19.052537] 
[   19.052568] The buggy address belongs to the physical page:
[   19.052612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900
[   19.052686] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.052735] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.052792] page_type: f8(unknown)
[   19.052841] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.052896] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.052946] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.053016] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.053070] head: 0bfffe0000000002 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff
[   19.053122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.053163] page dumped because: kasan: bad access detected
[   19.053195] 
[   19.053213] Memory state around the buggy address:
[   19.053258]  fff00000c78fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.053302]  fff00000c78fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.053346] >fff00000c7900000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.053389]                    ^
[   19.053437]  fff00000c7900080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.053488]  fff00000c7900100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.053537] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   19.028739] ==================================================================
[   19.029064] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.029557] Read of size 1 at addr fff00000c69b6600 by task kunit_try_catch/228
[   19.029642] 
[   19.029951] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.030058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.030085] Hardware name: linux,dummy-virt (DT)
[   19.030153] Call trace:
[   19.030179]  show_stack+0x20/0x38 (C)
[   19.030233]  dump_stack_lvl+0x8c/0xd0
[   19.030283]  print_report+0x118/0x608
[   19.030809]  kasan_report+0xdc/0x128
[   19.030887]  __asan_report_load1_noabort+0x20/0x30
[   19.030947]  mempool_uaf_helper+0x314/0x340
[   19.031004]  mempool_kmalloc_uaf+0xc4/0x120
[   19.031392]  kunit_try_run_case+0x170/0x3f0
[   19.031540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.031692]  kthread+0x328/0x630
[   19.031755]  ret_from_fork+0x10/0x20
[   19.032145] 
[   19.032205] Allocated by task 228:
[   19.032242]  kasan_save_stack+0x3c/0x68
[   19.032556]  kasan_save_track+0x20/0x40
[   19.032668]  kasan_save_alloc_info+0x40/0x58
[   19.032711]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.032994]  remove_element+0x130/0x1f8
[   19.033132]  mempool_alloc_preallocated+0x58/0xc0
[   19.033465]  mempool_uaf_helper+0xa4/0x340
[   19.033645]  mempool_kmalloc_uaf+0xc4/0x120
[   19.033737]  kunit_try_run_case+0x170/0x3f0
[   19.033877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.034350]  kthread+0x328/0x630
[   19.034432]  ret_from_fork+0x10/0x20
[   19.034555] 
[   19.034574] Freed by task 228:
[   19.034855]  kasan_save_stack+0x3c/0x68
[   19.035018]  kasan_save_track+0x20/0x40
[   19.035119]  kasan_save_free_info+0x4c/0x78
[   19.035250]  __kasan_mempool_poison_object+0xc0/0x150
[   19.035480]  mempool_free+0x28c/0x328
[   19.035542]  mempool_uaf_helper+0x104/0x340
[   19.035580]  mempool_kmalloc_uaf+0xc4/0x120
[   19.035617]  kunit_try_run_case+0x170/0x3f0
[   19.035664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.035709]  kthread+0x328/0x630
[   19.035760]  ret_from_fork+0x10/0x20
[   19.035797] 
[   19.035819] The buggy address belongs to the object at fff00000c69b6600
[   19.035819]  which belongs to the cache kmalloc-128 of size 128
[   19.036485] The buggy address is located 0 bytes inside of
[   19.036485]  freed 128-byte region [fff00000c69b6600, fff00000c69b6680)
[   19.036569] 
[   19.036678] The buggy address belongs to the physical page:
[   19.036756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   19.037157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.037239] page_type: f5(slab)
[   19.037301] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.037419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.037538] page dumped because: kasan: bad access detected
[   19.037606] 
[   19.037728] Memory state around the buggy address:
[   19.037793]  fff00000c69b6500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.037859]  fff00000c69b6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.038224] >fff00000c69b6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.038286]                    ^
[   19.038395]  fff00000c69b6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.038488]  fff00000c69b6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.038648] ==================================================================
[   19.068732] ==================================================================
[   19.068812] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.068872] Read of size 1 at addr fff00000c65c5240 by task kunit_try_catch/232
[   19.068920] 
[   19.068965] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.069063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.069088] Hardware name: linux,dummy-virt (DT)
[   19.069443] Call trace:
[   19.069654]  show_stack+0x20/0x38 (C)
[   19.069718]  dump_stack_lvl+0x8c/0xd0
[   19.069766]  print_report+0x118/0x608
[   19.069812]  kasan_report+0xdc/0x128
[   19.069856]  __asan_report_load1_noabort+0x20/0x30
[   19.070502]  mempool_uaf_helper+0x314/0x340
[   19.070901]  mempool_slab_uaf+0xc0/0x118
[   19.070961]  kunit_try_run_case+0x170/0x3f0
[   19.071031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.071419]  kthread+0x328/0x630
[   19.071537]  ret_from_fork+0x10/0x20
[   19.071591] 
[   19.071612] Allocated by task 232:
[   19.071669]  kasan_save_stack+0x3c/0x68
[   19.072026]  kasan_save_track+0x20/0x40
[   19.072103]  kasan_save_alloc_info+0x40/0x58
[   19.072155]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.072441]  remove_element+0x16c/0x1f8
[   19.072620]  mempool_alloc_preallocated+0x58/0xc0
[   19.072716]  mempool_uaf_helper+0xa4/0x340
[   19.072760]  mempool_slab_uaf+0xc0/0x118
[   19.073017]  kunit_try_run_case+0x170/0x3f0
[   19.073151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.073351]  kthread+0x328/0x630
[   19.073419]  ret_from_fork+0x10/0x20
[   19.073476] 
[   19.073496] Freed by task 232:
[   19.073808]  kasan_save_stack+0x3c/0x68
[   19.073924]  kasan_save_track+0x20/0x40
[   19.073964]  kasan_save_free_info+0x4c/0x78
[   19.074229]  __kasan_mempool_poison_object+0xc0/0x150
[   19.074365]  mempool_free+0x28c/0x328
[   19.074422]  mempool_uaf_helper+0x104/0x340
[   19.074734]  mempool_slab_uaf+0xc0/0x118
[   19.074827]  kunit_try_run_case+0x170/0x3f0
[   19.074894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.075220]  kthread+0x328/0x630
[   19.075370]  ret_from_fork+0x10/0x20
[   19.075455] 
[   19.075587] The buggy address belongs to the object at fff00000c65c5240
[   19.075587]  which belongs to the cache test_cache of size 123
[   19.075711] The buggy address is located 0 bytes inside of
[   19.075711]  freed 123-byte region [fff00000c65c5240, fff00000c65c52bb)
[   19.076203] 
[   19.076255] The buggy address belongs to the physical page:
[   19.076320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   19.076481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.076537] page_type: f5(slab)
[   19.076913] raw: 0bfffe0000000000 fff00000c1aa5c80 dead000000000122 0000000000000000
[   19.077108] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.077340] page dumped because: kasan: bad access detected
[   19.077510] 
[   19.077601] Memory state around the buggy address:
[   19.077696]  fff00000c65c5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.077784]  fff00000c65c5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.077966] >fff00000c65c5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.078027]                                            ^
[   19.078327]  fff00000c65c5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.078394]  fff00000c65c5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.078647] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   18.964722] ==================================================================
[   18.964787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.964842] Read of size 1 at addr fff00000c78fe001 by task kunit_try_catch/224
[   18.964891] 
[   18.964928] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.965030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.966734] Hardware name: linux,dummy-virt (DT)
[   18.966848] Call trace:
[   18.967376]  show_stack+0x20/0x38 (C)
[   18.967729]  dump_stack_lvl+0x8c/0xd0
[   18.968039]  print_report+0x118/0x608
[   18.968245]  kasan_report+0xdc/0x128
[   18.968505]  __asan_report_load1_noabort+0x20/0x30
[   18.968772]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.968827]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.968878]  kunit_try_run_case+0x170/0x3f0
[   18.969128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.969260]  kthread+0x328/0x630
[   18.969360]  ret_from_fork+0x10/0x20
[   18.969606] 
[   18.969901] The buggy address belongs to the physical page:
[   18.970124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078fc
[   18.970362] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.970591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.970737] page_type: f8(unknown)
[   18.970988] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.971051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.971234] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.971320] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.971556] head: 0bfffe0000000002 ffffc1ffc31e3f01 00000000ffffffff 00000000ffffffff
[   18.971605] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.971645] page dumped because: kasan: bad access detected
[   18.971679] 
[   18.971765] Memory state around the buggy address:
[   18.971801]  fff00000c78fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.972341]  fff00000c78fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.972411] >fff00000c78fe000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.972816]                    ^
[   18.972881]  fff00000c78fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.972930]  fff00000c78fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.972972] ==================================================================
[   18.987641] ==================================================================
[   18.987712] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.988137] Read of size 1 at addr fff00000c77ab2bb by task kunit_try_catch/226
[   18.988207] 
[   18.988287] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.988399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.988456] Hardware name: linux,dummy-virt (DT)
[   18.988503] Call trace:
[   18.988529]  show_stack+0x20/0x38 (C)
[   18.988578]  dump_stack_lvl+0x8c/0xd0
[   18.988636]  print_report+0x118/0x608
[   18.988868]  kasan_report+0xdc/0x128
[   18.988927]  __asan_report_load1_noabort+0x20/0x30
[   18.989032]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.989108]  mempool_slab_oob_right+0xc0/0x118
[   18.989156]  kunit_try_run_case+0x170/0x3f0
[   18.989205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.989430]  kthread+0x328/0x630
[   18.989487]  ret_from_fork+0x10/0x20
[   18.989592] 
[   18.989654] Allocated by task 226:
[   18.989703]  kasan_save_stack+0x3c/0x68
[   18.989746]  kasan_save_track+0x20/0x40
[   18.989791]  kasan_save_alloc_info+0x40/0x58
[   18.989830]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.990090]  remove_element+0x16c/0x1f8
[   18.990187]  mempool_alloc_preallocated+0x58/0xc0
[   18.990229]  mempool_oob_right_helper+0x98/0x2f0
[   18.990285]  mempool_slab_oob_right+0xc0/0x118
[   18.990325]  kunit_try_run_case+0x170/0x3f0
[   18.990371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.990424]  kthread+0x328/0x630
[   18.990464]  ret_from_fork+0x10/0x20
[   18.990501] 
[   18.990520] The buggy address belongs to the object at fff00000c77ab240
[   18.990520]  which belongs to the cache test_cache of size 123
[   18.990581] The buggy address is located 0 bytes to the right of
[   18.990581]  allocated 123-byte region [fff00000c77ab240, fff00000c77ab2bb)
[   18.990659] 
[   18.990679] The buggy address belongs to the physical page:
[   18.990712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ab
[   18.990880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.990936] page_type: f5(slab)
[   18.991099] raw: 0bfffe0000000000 fff00000c1aa5b40 dead000000000122 0000000000000000
[   18.991155] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.991196] page dumped because: kasan: bad access detected
[   18.991278] 
[   18.991355] Memory state around the buggy address:
[   18.991498]  fff00000c77ab180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.991571]  fff00000c77ab200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.991611] >fff00000c77ab280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.991722]                                         ^
[   18.991807]  fff00000c77ab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.991885]  fff00000c77ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.992010] ==================================================================
[   18.945431] ==================================================================
[   18.945509] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.945581] Read of size 1 at addr fff00000c69b6273 by task kunit_try_catch/222
[   18.945638] 
[   18.945682] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.945770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.945797] Hardware name: linux,dummy-virt (DT)
[   18.945831] Call trace:
[   18.945855]  show_stack+0x20/0x38 (C)
[   18.945906]  dump_stack_lvl+0x8c/0xd0
[   18.945956]  print_report+0x118/0x608
[   18.946017]  kasan_report+0xdc/0x128
[   18.946060]  __asan_report_load1_noabort+0x20/0x30
[   18.946110]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.946159]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.946206]  kunit_try_run_case+0x170/0x3f0
[   18.946255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.946307]  kthread+0x328/0x630
[   18.946348]  ret_from_fork+0x10/0x20
[   18.946397] 
[   18.946416] Allocated by task 222:
[   18.946447]  kasan_save_stack+0x3c/0x68
[   18.946488]  kasan_save_track+0x20/0x40
[   18.946524]  kasan_save_alloc_info+0x40/0x58
[   18.946564]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.946616]  remove_element+0x130/0x1f8
[   18.947083]  mempool_alloc_preallocated+0x58/0xc0
[   18.947124]  mempool_oob_right_helper+0x98/0x2f0
[   18.947162]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.947202]  kunit_try_run_case+0x170/0x3f0
[   18.947238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.947280]  kthread+0x328/0x630
[   18.947314]  ret_from_fork+0x10/0x20
[   18.947348] 
[   18.947369] The buggy address belongs to the object at fff00000c69b6200
[   18.947369]  which belongs to the cache kmalloc-128 of size 128
[   18.947429] The buggy address is located 0 bytes to the right of
[   18.947429]  allocated 115-byte region [fff00000c69b6200, fff00000c69b6273)
[   18.947492] 
[   18.947515] The buggy address belongs to the physical page:
[   18.947547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b6
[   18.947603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.947654] page_type: f5(slab)
[   18.947695] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.947744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.947784] page dumped because: kasan: bad access detected
[   18.947816] 
[   18.947834] Memory state around the buggy address:
[   18.947868]  fff00000c69b6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.947913]  fff00000c69b6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.947954] >fff00000c69b6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.948003]                                                              ^
[   18.948044]  fff00000c69b6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.948085]  fff00000c69b6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.948124] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   18.393468] ==================================================================
[   18.393556] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   18.393641] Read of size 1 at addr fff00000c1aa58c0 by task kunit_try_catch/216
[   18.393693] 
[   18.393738] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.393825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.393853] Hardware name: linux,dummy-virt (DT)
[   18.393887] Call trace:
[   18.393911]  show_stack+0x20/0x38 (C)
[   18.393963]  dump_stack_lvl+0x8c/0xd0
[   18.394029]  print_report+0x118/0x608
[   18.394075]  kasan_report+0xdc/0x128
[   18.394119]  __kasan_check_byte+0x54/0x70
[   18.394166]  kmem_cache_destroy+0x34/0x218
[   18.394214]  kmem_cache_double_destroy+0x174/0x300
[   18.394262]  kunit_try_run_case+0x170/0x3f0
[   18.394311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.394363]  kthread+0x328/0x630
[   18.394406]  ret_from_fork+0x10/0x20
[   18.394455] 
[   18.394473] Allocated by task 216:
[   18.394502]  kasan_save_stack+0x3c/0x68
[   18.394545]  kasan_save_track+0x20/0x40
[   18.394582]  kasan_save_alloc_info+0x40/0x58
[   18.394638]  __kasan_slab_alloc+0xa8/0xb0
[   18.394677]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.394719]  __kmem_cache_create_args+0x178/0x280
[   18.394758]  kmem_cache_double_destroy+0xc0/0x300
[   18.394798]  kunit_try_run_case+0x170/0x3f0
[   18.394836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.394879]  kthread+0x328/0x630
[   18.394912]  ret_from_fork+0x10/0x20
[   18.394948] 
[   18.394966] Freed by task 216:
[   18.395006]  kasan_save_stack+0x3c/0x68
[   18.395044]  kasan_save_track+0x20/0x40
[   18.395081]  kasan_save_free_info+0x4c/0x78
[   18.395120]  __kasan_slab_free+0x6c/0x98
[   18.395156]  kmem_cache_free+0x260/0x468
[   18.395191]  slab_kmem_cache_release+0x38/0x50
[   18.395230]  kmem_cache_release+0x1c/0x30
[   18.395264]  kobject_put+0x17c/0x420
[   18.395300]  sysfs_slab_release+0x1c/0x30
[   18.395339]  kmem_cache_destroy+0x118/0x218
[   18.395376]  kmem_cache_double_destroy+0x128/0x300
[   18.395415]  kunit_try_run_case+0x170/0x3f0
[   18.395453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.395494]  kthread+0x328/0x630
[   18.395527]  ret_from_fork+0x10/0x20
[   18.395562] 
[   18.395580] The buggy address belongs to the object at fff00000c1aa58c0
[   18.395580]  which belongs to the cache kmem_cache of size 208
[   18.395638] The buggy address is located 0 bytes inside of
[   18.395638]  freed 208-byte region [fff00000c1aa58c0, fff00000c1aa5990)
[   18.395698] 
[   18.395720] The buggy address belongs to the physical page:
[   18.395754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aa5
[   18.395809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.395862] page_type: f5(slab)
[   18.395903] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   18.395952] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   18.396004] page dumped because: kasan: bad access detected
[   18.396035] 
[   18.396053] Memory state around the buggy address:
[   18.396089]  fff00000c1aa5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.396132]  fff00000c1aa5800: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   18.396174] >fff00000c1aa5880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.396212]                                            ^
[   18.396246]  fff00000c1aa5900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.396287]  fff00000c1aa5980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.396325] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   18.188556] ==================================================================
[   18.188714] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   18.188792] Read of size 1 at addr fff00000c77a0000 by task kunit_try_catch/214
[   18.188845] 
[   18.188888] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.188971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.189010] Hardware name: linux,dummy-virt (DT)
[   18.189967] Call trace:
[   18.190031]  show_stack+0x20/0x38 (C)
[   18.190146]  dump_stack_lvl+0x8c/0xd0
[   18.190200]  print_report+0x118/0x608
[   18.190248]  kasan_report+0xdc/0x128
[   18.190362]  __asan_report_load1_noabort+0x20/0x30
[   18.190864]  kmem_cache_rcu_uaf+0x388/0x468
[   18.190918]  kunit_try_run_case+0x170/0x3f0
[   18.190971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.191395]  kthread+0x328/0x630
[   18.191562]  ret_from_fork+0x10/0x20
[   18.191736] 
[   18.191853] Allocated by task 214:
[   18.191887]  kasan_save_stack+0x3c/0x68
[   18.192203]  kasan_save_track+0x20/0x40
[   18.192451]  kasan_save_alloc_info+0x40/0x58
[   18.192492]  __kasan_slab_alloc+0xa8/0xb0
[   18.192527]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.192574]  kmem_cache_rcu_uaf+0x12c/0x468
[   18.192611]  kunit_try_run_case+0x170/0x3f0
[   18.192647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.192907]  kthread+0x328/0x630
[   18.192951]  ret_from_fork+0x10/0x20
[   18.193290] 
[   18.193316] Freed by task 0:
[   18.193345]  kasan_save_stack+0x3c/0x68
[   18.193797]  kasan_save_track+0x20/0x40
[   18.194097]  kasan_save_free_info+0x4c/0x78
[   18.194154]  __kasan_slab_free+0x6c/0x98
[   18.194273]  slab_free_after_rcu_debug+0xd4/0x2f8
[   18.194584]  rcu_core+0x9f4/0x1e20
[   18.194750]  rcu_core_si+0x18/0x30
[   18.194788]  handle_softirqs+0x374/0xb28
[   18.194856]  __do_softirq+0x1c/0x28
[   18.194898] 
[   18.194969] Last potentially related work creation:
[   18.195156]  kasan_save_stack+0x3c/0x68
[   18.195311]  kasan_record_aux_stack+0xb4/0xc8
[   18.195390]  kmem_cache_free+0x120/0x468
[   18.195690]  kmem_cache_rcu_uaf+0x16c/0x468
[   18.195944]  kunit_try_run_case+0x170/0x3f0
[   18.196328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.196445]  kthread+0x328/0x630
[   18.196480]  ret_from_fork+0x10/0x20
[   18.197132] 
[   18.197293] The buggy address belongs to the object at fff00000c77a0000
[   18.197293]  which belongs to the cache test_cache of size 200
[   18.197855] The buggy address is located 0 bytes inside of
[   18.197855]  freed 200-byte region [fff00000c77a0000, fff00000c77a00c8)
[   18.198204] 
[   18.198238] The buggy address belongs to the physical page:
[   18.198444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a0
[   18.198758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.198820] page_type: f5(slab)
[   18.198862] raw: 0bfffe0000000000 fff00000c5d09500 dead000000000122 0000000000000000
[   18.199107] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.199205] page dumped because: kasan: bad access detected
[   18.199283] 
[   18.199300] Memory state around the buggy address:
[   18.199337]  fff00000c779ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.199381]  fff00000c779ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.199423] >fff00000c77a0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.200028]                    ^
[   18.200358]  fff00000c77a0080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.200412]  fff00000c77a0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200453] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   17.616739] ==================================================================
[   17.616815] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.616879] Free of addr fff00000c77a1001 by task kunit_try_catch/212
[   17.616923] 
[   17.616963] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.617332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.617666] Hardware name: linux,dummy-virt (DT)
[   17.617819] Call trace:
[   17.617965]  show_stack+0x20/0x38 (C)
[   17.618086]  dump_stack_lvl+0x8c/0xd0
[   17.618338]  print_report+0x118/0x608
[   17.618558]  kasan_report_invalid_free+0xc0/0xe8
[   17.618656]  check_slab_allocation+0xfc/0x108
[   17.618706]  __kasan_slab_pre_free+0x2c/0x48
[   17.618754]  kmem_cache_free+0xf0/0x468
[   17.618799]  kmem_cache_invalid_free+0x184/0x3c8
[   17.618961]  kunit_try_run_case+0x170/0x3f0
[   17.619461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.619692]  kthread+0x328/0x630
[   17.619740]  ret_from_fork+0x10/0x20
[   17.619788] 
[   17.619808] Allocated by task 212:
[   17.619902]  kasan_save_stack+0x3c/0x68
[   17.620199]  kasan_save_track+0x20/0x40
[   17.620366]  kasan_save_alloc_info+0x40/0x58
[   17.620415]  __kasan_slab_alloc+0xa8/0xb0
[   17.620556]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.620629]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.620685]  kunit_try_run_case+0x170/0x3f0
[   17.620747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.620790]  kthread+0x328/0x630
[   17.620821]  ret_from_fork+0x10/0x20
[   17.621123] 
[   17.621146] The buggy address belongs to the object at fff00000c77a1000
[   17.621146]  which belongs to the cache test_cache of size 200
[   17.621553] The buggy address is located 1 bytes inside of
[   17.621553]  200-byte region [fff00000c77a1000, fff00000c77a10c8)
[   17.621829] 
[   17.621851] The buggy address belongs to the physical page:
[   17.621897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a1
[   17.621961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.622039] page_type: f5(slab)
[   17.622080] raw: 0bfffe0000000000 fff00000c5d093c0 dead000000000122 0000000000000000
[   17.622131] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.622638] page dumped because: kasan: bad access detected
[   17.622678] 
[   17.622695] Memory state around the buggy address:
[   17.622733]  fff00000c77a0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.622778]  fff00000c77a0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.623081] >fff00000c77a1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.623334]                    ^
[   17.623404]  fff00000c77a1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.623450]  fff00000c77a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.623489] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   17.581863] ==================================================================
[   17.582656] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   17.582733] Free of addr fff00000c77a5000 by task kunit_try_catch/210
[   17.582776] 
[   17.582818] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.582902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.583572] Hardware name: linux,dummy-virt (DT)
[   17.583616] Call trace:
[   17.583897]  show_stack+0x20/0x38 (C)
[   17.584151]  dump_stack_lvl+0x8c/0xd0
[   17.584204]  print_report+0x118/0x608
[   17.584251]  kasan_report_invalid_free+0xc0/0xe8
[   17.584663]  check_slab_allocation+0xd4/0x108
[   17.584726]  __kasan_slab_pre_free+0x2c/0x48
[   17.584805]  kmem_cache_free+0xf0/0x468
[   17.584855]  kmem_cache_double_free+0x190/0x3c8
[   17.584901]  kunit_try_run_case+0x170/0x3f0
[   17.584958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.585073]  kthread+0x328/0x630
[   17.585183]  ret_from_fork+0x10/0x20
[   17.585343] 
[   17.585450] Allocated by task 210:
[   17.585607]  kasan_save_stack+0x3c/0x68
[   17.585683]  kasan_save_track+0x20/0x40
[   17.585826]  kasan_save_alloc_info+0x40/0x58
[   17.585865]  __kasan_slab_alloc+0xa8/0xb0
[   17.585903]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.586225]  kmem_cache_double_free+0x12c/0x3c8
[   17.586475]  kunit_try_run_case+0x170/0x3f0
[   17.586551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.586595]  kthread+0x328/0x630
[   17.586631]  ret_from_fork+0x10/0x20
[   17.586669] 
[   17.586732] Freed by task 210:
[   17.586819]  kasan_save_stack+0x3c/0x68
[   17.586991]  kasan_save_track+0x20/0x40
[   17.587032]  kasan_save_free_info+0x4c/0x78
[   17.587073]  __kasan_slab_free+0x6c/0x98
[   17.587110]  kmem_cache_free+0x260/0x468
[   17.587716]  kmem_cache_double_free+0x140/0x3c8
[   17.587763]  kunit_try_run_case+0x170/0x3f0
[   17.587829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.587873]  kthread+0x328/0x630
[   17.587903]  ret_from_fork+0x10/0x20
[   17.587939] 
[   17.587960] The buggy address belongs to the object at fff00000c77a5000
[   17.587960]  which belongs to the cache test_cache of size 200
[   17.588032] The buggy address is located 0 bytes inside of
[   17.588032]  200-byte region [fff00000c77a5000, fff00000c77a50c8)
[   17.588489] 
[   17.588617] The buggy address belongs to the physical page:
[   17.588845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a5
[   17.588953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.589022] page_type: f5(slab)
[   17.589063] raw: 0bfffe0000000000 fff00000c5d09280 dead000000000122 0000000000000000
[   17.589114] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.589435] page dumped because: kasan: bad access detected
[   17.589525] 
[   17.589589] Memory state around the buggy address:
[   17.589672]  fff00000c77a4f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.589747]  fff00000c77a4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.589867] >fff00000c77a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.589907]                    ^
[   17.589972]  fff00000c77a5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.590034]  fff00000c77a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.590348] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   17.419825] ==================================================================
[   17.419887] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   17.419941] Read of size 1 at addr fff00000c77a60c8 by task kunit_try_catch/208
[   17.420024] 
[   17.420059] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.420140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.420166] Hardware name: linux,dummy-virt (DT)
[   17.420197] Call trace:
[   17.420219]  show_stack+0x20/0x38 (C)
[   17.420419]  dump_stack_lvl+0x8c/0xd0
[   17.420570]  print_report+0x118/0x608
[   17.420638]  kasan_report+0xdc/0x128
[   17.420683]  __asan_report_load1_noabort+0x20/0x30
[   17.420734]  kmem_cache_oob+0x344/0x430
[   17.420778]  kunit_try_run_case+0x170/0x3f0
[   17.420842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.420915]  kthread+0x328/0x630
[   17.420962]  ret_from_fork+0x10/0x20
[   17.421048] 
[   17.421087] Allocated by task 208:
[   17.421133]  kasan_save_stack+0x3c/0x68
[   17.421182]  kasan_save_track+0x20/0x40
[   17.421238]  kasan_save_alloc_info+0x40/0x58
[   17.421294]  __kasan_slab_alloc+0xa8/0xb0
[   17.421332]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.421378]  kmem_cache_oob+0x12c/0x430
[   17.421413]  kunit_try_run_case+0x170/0x3f0
[   17.421451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.421498]  kthread+0x328/0x630
[   17.421530]  ret_from_fork+0x10/0x20
[   17.421566] 
[   17.421584] The buggy address belongs to the object at fff00000c77a6000
[   17.421584]  which belongs to the cache test_cache of size 200
[   17.421802] The buggy address is located 0 bytes to the right of
[   17.421802]  allocated 200-byte region [fff00000c77a6000, fff00000c77a60c8)
[   17.421873] 
[   17.421921] The buggy address belongs to the physical page:
[   17.421953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a6
[   17.422045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.422096] page_type: f5(slab)
[   17.422170] raw: 0bfffe0000000000 fff00000c5d09140 dead000000000122 0000000000000000
[   17.422222] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.422279] page dumped because: kasan: bad access detected
[   17.422320] 
[   17.422358] Memory state around the buggy address:
[   17.422406]  fff00000c77a5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.422450]  fff00000c77a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.422493] >fff00000c77a6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.422530]                                               ^
[   17.422754]  fff00000c77a6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.422830]  fff00000c77a6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.422968] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   17.393354] ==================================================================
[   17.393467] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   17.393521] Read of size 8 at addr fff00000c77d50c0 by task kunit_try_catch/201
[   17.393607] 
[   17.393668] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.393750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.393777] Hardware name: linux,dummy-virt (DT)
[   17.393806] Call trace:
[   17.393859]  show_stack+0x20/0x38 (C)
[   17.393925]  dump_stack_lvl+0x8c/0xd0
[   17.393998]  print_report+0x118/0x608
[   17.394063]  kasan_report+0xdc/0x128
[   17.394144]  __asan_report_load8_noabort+0x20/0x30
[   17.394222]  workqueue_uaf+0x480/0x4a8
[   17.394267]  kunit_try_run_case+0x170/0x3f0
[   17.394313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.394562]  kthread+0x328/0x630
[   17.394660]  ret_from_fork+0x10/0x20
[   17.394853] 
[   17.394929] Allocated by task 201:
[   17.395085]  kasan_save_stack+0x3c/0x68
[   17.395179]  kasan_save_track+0x20/0x40
[   17.395319]  kasan_save_alloc_info+0x40/0x58
[   17.395454]  __kasan_kmalloc+0xd4/0xd8
[   17.395527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.395578]  workqueue_uaf+0x13c/0x4a8
[   17.395620]  kunit_try_run_case+0x170/0x3f0
[   17.395658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.395699]  kthread+0x328/0x630
[   17.395732]  ret_from_fork+0x10/0x20
[   17.395767] 
[   17.395784] Freed by task 76:
[   17.395811]  kasan_save_stack+0x3c/0x68
[   17.395847]  kasan_save_track+0x20/0x40
[   17.395903]  kasan_save_free_info+0x4c/0x78
[   17.395943]  __kasan_slab_free+0x6c/0x98
[   17.395991]  kfree+0x214/0x3c8
[   17.396024]  workqueue_uaf_work+0x18/0x30
[   17.396124]  process_one_work+0x530/0xf98
[   17.396196]  worker_thread+0x618/0xf38
[   17.396355]  kthread+0x328/0x630
[   17.396489]  ret_from_fork+0x10/0x20
[   17.396638] 
[   17.396716] Last potentially related work creation:
[   17.396824]  kasan_save_stack+0x3c/0x68
[   17.396874]  kasan_record_aux_stack+0xb4/0xc8
[   17.396914]  __queue_work+0x65c/0x1008
[   17.397126]  queue_work_on+0xbc/0xf8
[   17.397255]  workqueue_uaf+0x210/0x4a8
[   17.397386]  kunit_try_run_case+0x170/0x3f0
[   17.397424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.397590]  kthread+0x328/0x630
[   17.397629]  ret_from_fork+0x10/0x20
[   17.397666] 
[   17.397686] The buggy address belongs to the object at fff00000c77d50c0
[   17.397686]  which belongs to the cache kmalloc-32 of size 32
[   17.397856] The buggy address is located 0 bytes inside of
[   17.397856]  freed 32-byte region [fff00000c77d50c0, fff00000c77d50e0)
[   17.397973] 
[   17.398078] The buggy address belongs to the physical page:
[   17.398137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d5
[   17.398223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.398325] page_type: f5(slab)
[   17.398398] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.398462] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.398800] page dumped because: kasan: bad access detected
[   17.398920] 
[   17.398989] Memory state around the buggy address:
[   17.399050]  fff00000c77d4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399104]  fff00000c77d5000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.399145] >fff00000c77d5080: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   17.399182]                                            ^
[   17.399222]  fff00000c77d5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399273]  fff00000c77d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   17.377219] ==================================================================
[   17.377576] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   17.377655] Read of size 4 at addr fff00000c69bfec0 by task swapper/0/0
[   17.377703] 
[   17.377742] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.377823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.377851] Hardware name: linux,dummy-virt (DT)
[   17.378639] Call trace:
[   17.378677]  show_stack+0x20/0x38 (C)
[   17.379297]  dump_stack_lvl+0x8c/0xd0
[   17.379359]  print_report+0x118/0x608
[   17.379439]  kasan_report+0xdc/0x128
[   17.379484]  __asan_report_load4_noabort+0x20/0x30
[   17.379565]  rcu_uaf_reclaim+0x64/0x70
[   17.379611]  rcu_core+0x9f4/0x1e20
[   17.379657]  rcu_core_si+0x18/0x30
[   17.379698]  handle_softirqs+0x374/0xb28
[   17.379744]  __do_softirq+0x1c/0x28
[   17.379784]  ____do_softirq+0x18/0x30
[   17.379826]  call_on_irq_stack+0x24/0x30
[   17.379870]  do_softirq_own_stack+0x24/0x38
[   17.379916]  __irq_exit_rcu+0x1fc/0x318
[   17.379959]  irq_exit_rcu+0x1c/0x80
[   17.380049]  el1_interrupt+0x38/0x58
[   17.380119]  el1h_64_irq_handler+0x18/0x28
[   17.380172]  el1h_64_irq+0x6c/0x70
[   17.380302]  arch_local_irq_enable+0x4/0x8 (P)
[   17.380355]  do_idle+0x384/0x4e8
[   17.380401]  cpu_startup_entry+0x64/0x80
[   17.380446]  rest_init+0x160/0x188
[   17.380487]  start_kernel+0x30c/0x3d0
[   17.380538]  __primary_switched+0x8c/0xa0
[   17.380604] 
[   17.380623] Allocated by task 199:
[   17.380674]  kasan_save_stack+0x3c/0x68
[   17.380716]  kasan_save_track+0x20/0x40
[   17.380795]  kasan_save_alloc_info+0x40/0x58
[   17.380929]  __kasan_kmalloc+0xd4/0xd8
[   17.381013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.381180]  rcu_uaf+0xb0/0x2d8
[   17.381246]  kunit_try_run_case+0x170/0x3f0
[   17.381285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.381433]  kthread+0x328/0x630
[   17.381466]  ret_from_fork+0x10/0x20
[   17.381503] 
[   17.381554] Freed by task 0:
[   17.381580]  kasan_save_stack+0x3c/0x68
[   17.381689]  kasan_save_track+0x20/0x40
[   17.381733]  kasan_save_free_info+0x4c/0x78
[   17.381771]  __kasan_slab_free+0x6c/0x98
[   17.381950]  kfree+0x214/0x3c8
[   17.382003]  rcu_uaf_reclaim+0x28/0x70
[   17.382038]  rcu_core+0x9f4/0x1e20
[   17.382073]  rcu_core_si+0x18/0x30
[   17.382177]  handle_softirqs+0x374/0xb28
[   17.382306]  __do_softirq+0x1c/0x28
[   17.382340] 
[   17.382369] Last potentially related work creation:
[   17.382403]  kasan_save_stack+0x3c/0x68
[   17.382440]  kasan_record_aux_stack+0xb4/0xc8
[   17.382481]  __call_rcu_common.constprop.0+0x74/0x8c8
[   17.382523]  call_rcu+0x18/0x30
[   17.382556]  rcu_uaf+0x14c/0x2d8
[   17.382588]  kunit_try_run_case+0x170/0x3f0
[   17.382624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.382667]  kthread+0x328/0x630
[   17.382700]  ret_from_fork+0x10/0x20
[   17.382830] 
[   17.382902] The buggy address belongs to the object at fff00000c69bfec0
[   17.382902]  which belongs to the cache kmalloc-32 of size 32
[   17.382989] The buggy address is located 0 bytes inside of
[   17.382989]  freed 32-byte region [fff00000c69bfec0, fff00000c69bfee0)
[   17.383052] 
[   17.383072] The buggy address belongs to the physical page:
[   17.383105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bf
[   17.383163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.383256] page_type: f5(slab)
[   17.383298] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.383349] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.383389] page dumped because: kasan: bad access detected
[   17.383422] 
[   17.383439] Memory state around the buggy address:
[   17.383474]  fff00000c69bfd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.383542]  fff00000c69bfe00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.383625] >fff00000c69bfe80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   17.383677]                                            ^
[   17.383731]  fff00000c69bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383827]  fff00000c69bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383875] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   17.129489] ==================================================================
[   17.129666] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.129726] Read of size 1 at addr fff00000c77d7078 by task kunit_try_catch/197
[   17.129777] 
[   17.129811] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.130495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.130536] Hardware name: linux,dummy-virt (DT)
[   17.130567] Call trace:
[   17.130591]  show_stack+0x20/0x38 (C)
[   17.130730]  dump_stack_lvl+0x8c/0xd0
[   17.130802]  print_report+0x118/0x608
[   17.130965]  kasan_report+0xdc/0x128
[   17.131018]  __asan_report_load1_noabort+0x20/0x30
[   17.131517]  ksize_uaf+0x544/0x5f8
[   17.131687]  kunit_try_run_case+0x170/0x3f0
[   17.131735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.132676]  kthread+0x328/0x630
[   17.132904]  ret_from_fork+0x10/0x20
[   17.133245] 
[   17.133678] Allocated by task 197:
[   17.133767]  kasan_save_stack+0x3c/0x68
[   17.133812]  kasan_save_track+0x20/0x40
[   17.133850]  kasan_save_alloc_info+0x40/0x58
[   17.133891]  __kasan_kmalloc+0xd4/0xd8
[   17.133929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.133968]  ksize_uaf+0xb8/0x5f8
[   17.134964]  kunit_try_run_case+0x170/0x3f0
[   17.135408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.135458]  kthread+0x328/0x630
[   17.135490]  ret_from_fork+0x10/0x20
[   17.136013] 
[   17.136094] Freed by task 197:
[   17.136184]  kasan_save_stack+0x3c/0x68
[   17.136283]  kasan_save_track+0x20/0x40
[   17.136483]  kasan_save_free_info+0x4c/0x78
[   17.136809]  __kasan_slab_free+0x6c/0x98
[   17.136851]  kfree+0x214/0x3c8
[   17.137659]  ksize_uaf+0x11c/0x5f8
[   17.138498]  kunit_try_run_case+0x170/0x3f0
[   17.138778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.138888]  kthread+0x328/0x630
[   17.138921]  ret_from_fork+0x10/0x20
[   17.139090] 
[   17.139201] The buggy address belongs to the object at fff00000c77d7000
[   17.139201]  which belongs to the cache kmalloc-128 of size 128
[   17.139346] The buggy address is located 120 bytes inside of
[   17.139346]  freed 128-byte region [fff00000c77d7000, fff00000c77d7080)
[   17.140217] 
[   17.140610] The buggy address belongs to the physical page:
[   17.140950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7
[   17.141457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.141984] page_type: f5(slab)
[   17.142344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.142400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.142441] page dumped because: kasan: bad access detected
[   17.143002] 
[   17.143043] Memory state around the buggy address:
[   17.143235]  fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.143632]  fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.143756] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.143913]                                                                 ^
[   17.144108]  fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144237]  fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144530] ==================================================================
[   17.108772] ==================================================================
[   17.108836] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.108887] Read of size 1 at addr fff00000c77d7000 by task kunit_try_catch/197
[   17.108935] 
[   17.108969] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.109066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.109093] Hardware name: linux,dummy-virt (DT)
[   17.109121] Call trace:
[   17.109144]  show_stack+0x20/0x38 (C)
[   17.109191]  dump_stack_lvl+0x8c/0xd0
[   17.109424]  print_report+0x118/0x608
[   17.109486]  kasan_report+0xdc/0x128
[   17.109546]  __kasan_check_byte+0x54/0x70
[   17.110085]  ksize+0x30/0x88
[   17.110353]  ksize_uaf+0x168/0x5f8
[   17.110581]  kunit_try_run_case+0x170/0x3f0
[   17.110804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.111335]  kthread+0x328/0x630
[   17.111486]  ret_from_fork+0x10/0x20
[   17.112015] 
[   17.112039] Allocated by task 197:
[   17.112070]  kasan_save_stack+0x3c/0x68
[   17.112282]  kasan_save_track+0x20/0x40
[   17.112585]  kasan_save_alloc_info+0x40/0x58
[   17.112645]  __kasan_kmalloc+0xd4/0xd8
[   17.112684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.112723]  ksize_uaf+0xb8/0x5f8
[   17.113195]  kunit_try_run_case+0x170/0x3f0
[   17.113244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.113303]  kthread+0x328/0x630
[   17.113500]  ret_from_fork+0x10/0x20
[   17.113734] 
[   17.113754] Freed by task 197:
[   17.114079]  kasan_save_stack+0x3c/0x68
[   17.114260]  kasan_save_track+0x20/0x40
[   17.114522]  kasan_save_free_info+0x4c/0x78
[   17.114568]  __kasan_slab_free+0x6c/0x98
[   17.114935]  kfree+0x214/0x3c8
[   17.115063]  ksize_uaf+0x11c/0x5f8
[   17.115496]  kunit_try_run_case+0x170/0x3f0
[   17.115539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.115809]  kthread+0x328/0x630
[   17.115998]  ret_from_fork+0x10/0x20
[   17.116091] 
[   17.116220] The buggy address belongs to the object at fff00000c77d7000
[   17.116220]  which belongs to the cache kmalloc-128 of size 128
[   17.116551] The buggy address is located 0 bytes inside of
[   17.116551]  freed 128-byte region [fff00000c77d7000, fff00000c77d7080)
[   17.116854] 
[   17.116995] The buggy address belongs to the physical page:
[   17.117051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7
[   17.117119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.117299] page_type: f5(slab)
[   17.117389] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.117578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.117684] page dumped because: kasan: bad access detected
[   17.117740] 
[   17.117799] Memory state around the buggy address:
[   17.117912]  fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.118089]  fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.118145] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.118199]                    ^
[   17.118539]  fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.118603]  fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.118698] ==================================================================
[   17.119767] ==================================================================
[   17.119822] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.119869] Read of size 1 at addr fff00000c77d7000 by task kunit_try_catch/197
[   17.120255] 
[   17.120351] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.120502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.120559] Hardware name: linux,dummy-virt (DT)
[   17.120598] Call trace:
[   17.120690]  show_stack+0x20/0x38 (C)
[   17.120760]  dump_stack_lvl+0x8c/0xd0
[   17.120880]  print_report+0x118/0x608
[   17.120953]  kasan_report+0xdc/0x128
[   17.121016]  __asan_report_load1_noabort+0x20/0x30
[   17.121288]  ksize_uaf+0x598/0x5f8
[   17.121356]  kunit_try_run_case+0x170/0x3f0
[   17.121403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.121453]  kthread+0x328/0x630
[   17.121493]  ret_from_fork+0x10/0x20
[   17.121539] 
[   17.121558] Allocated by task 197:
[   17.121586]  kasan_save_stack+0x3c/0x68
[   17.121638]  kasan_save_track+0x20/0x40
[   17.121676]  kasan_save_alloc_info+0x40/0x58
[   17.121715]  __kasan_kmalloc+0xd4/0xd8
[   17.121755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.121834]  ksize_uaf+0xb8/0x5f8
[   17.121872]  kunit_try_run_case+0x170/0x3f0
[   17.122060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.122122]  kthread+0x328/0x630
[   17.122517]  ret_from_fork+0x10/0x20
[   17.122570] 
[   17.122862] Freed by task 197:
[   17.122894]  kasan_save_stack+0x3c/0x68
[   17.123193]  kasan_save_track+0x20/0x40
[   17.123281]  kasan_save_free_info+0x4c/0x78
[   17.123337]  __kasan_slab_free+0x6c/0x98
[   17.123374]  kfree+0x214/0x3c8
[   17.123630]  ksize_uaf+0x11c/0x5f8
[   17.123671]  kunit_try_run_case+0x170/0x3f0
[   17.123938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.123993]  kthread+0x328/0x630
[   17.124026]  ret_from_fork+0x10/0x20
[   17.124062] 
[   17.124081] The buggy address belongs to the object at fff00000c77d7000
[   17.124081]  which belongs to the cache kmalloc-128 of size 128
[   17.124141] The buggy address is located 0 bytes inside of
[   17.124141]  freed 128-byte region [fff00000c77d7000, fff00000c77d7080)
[   17.124200] 
[   17.125036] The buggy address belongs to the physical page:
[   17.125074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077d7
[   17.125140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.125194] page_type: f5(slab)
[   17.125231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.125719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.126027] page dumped because: kasan: bad access detected
[   17.126143] 
[   17.126162] Memory state around the buggy address:
[   17.126273]  fff00000c77d6f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.126683]  fff00000c77d6f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.126926] >fff00000c77d7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.127337]                    ^
[   17.127378]  fff00000c77d7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.127423]  fff00000c77d7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.127466] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   17.085262] ==================================================================
[   17.085311] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   17.085361] Read of size 1 at addr fff00000c635af7f by task kunit_try_catch/195
[   17.085409] 
[   17.085439] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.085521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.085549] Hardware name: linux,dummy-virt (DT)
[   17.085578] Call trace:
[   17.085600]  show_stack+0x20/0x38 (C)
[   17.085651]  dump_stack_lvl+0x8c/0xd0
[   17.085698]  print_report+0x118/0x608
[   17.085742]  kasan_report+0xdc/0x128
[   17.086239]  __asan_report_load1_noabort+0x20/0x30
[   17.086324]  ksize_unpoisons_memory+0x690/0x740
[   17.086371]  kunit_try_run_case+0x170/0x3f0
[   17.087243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.087902]  kthread+0x328/0x630
[   17.087970]  ret_from_fork+0x10/0x20
[   17.088046] 
[   17.088079] Allocated by task 195:
[   17.088107]  kasan_save_stack+0x3c/0x68
[   17.088383]  kasan_save_track+0x20/0x40
[   17.088623]  kasan_save_alloc_info+0x40/0x58
[   17.088683]  __kasan_kmalloc+0xd4/0xd8
[   17.088719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.088757]  ksize_unpoisons_memory+0xc0/0x740
[   17.088795]  kunit_try_run_case+0x170/0x3f0
[   17.088832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.089674]  kthread+0x328/0x630
[   17.089720]  ret_from_fork+0x10/0x20
[   17.089757] 
[   17.089776] The buggy address belongs to the object at fff00000c635af00
[   17.089776]  which belongs to the cache kmalloc-128 of size 128
[   17.089836] The buggy address is located 12 bytes to the right of
[   17.089836]  allocated 115-byte region [fff00000c635af00, fff00000c635af73)
[   17.089901] 
[   17.089919] The buggy address belongs to the physical page:
[   17.090076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   17.090149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.091608] page_type: f5(slab)
[   17.091723] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.091879] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.091938] page dumped because: kasan: bad access detected
[   17.091970] 
[   17.091999] Memory state around the buggy address:
[   17.092227]  fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.092276]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.092320] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.092812]                                                                 ^
[   17.092954]  fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.093007]  fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.093045] ==================================================================
[   17.066220] ==================================================================
[   17.066290] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   17.066684] Read of size 1 at addr fff00000c635af73 by task kunit_try_catch/195
[   17.067318] 
[   17.067391] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.067473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.067500] Hardware name: linux,dummy-virt (DT)
[   17.067537] Call trace:
[   17.067660]  show_stack+0x20/0x38 (C)
[   17.067711]  dump_stack_lvl+0x8c/0xd0
[   17.067758]  print_report+0x118/0x608
[   17.067805]  kasan_report+0xdc/0x128
[   17.067849]  __asan_report_load1_noabort+0x20/0x30
[   17.068196]  ksize_unpoisons_memory+0x628/0x740
[   17.068390]  kunit_try_run_case+0x170/0x3f0
[   17.068549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.069022]  kthread+0x328/0x630
[   17.069078]  ret_from_fork+0x10/0x20
[   17.069256] 
[   17.069431] Allocated by task 195:
[   17.069464]  kasan_save_stack+0x3c/0x68
[   17.069509]  kasan_save_track+0x20/0x40
[   17.069627]  kasan_save_alloc_info+0x40/0x58
[   17.069785]  __kasan_kmalloc+0xd4/0xd8
[   17.069824]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.069862]  ksize_unpoisons_memory+0xc0/0x740
[   17.069900]  kunit_try_run_case+0x170/0x3f0
[   17.069936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.070369]  kthread+0x328/0x630
[   17.070416]  ret_from_fork+0x10/0x20
[   17.070466] 
[   17.070485] The buggy address belongs to the object at fff00000c635af00
[   17.070485]  which belongs to the cache kmalloc-128 of size 128
[   17.070724] The buggy address is located 0 bytes to the right of
[   17.070724]  allocated 115-byte region [fff00000c635af00, fff00000c635af73)
[   17.071118] 
[   17.071261] The buggy address belongs to the physical page:
[   17.071308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   17.071364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.071413] page_type: f5(slab)
[   17.071740] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.071810] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.071990] page dumped because: kasan: bad access detected
[   17.072026] 
[   17.072043] Memory state around the buggy address:
[   17.072214]  fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.072264]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.072714] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.072766]                                                              ^
[   17.073049]  fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.073285]  fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.073587] ==================================================================
[   17.076607] ==================================================================
[   17.076662] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   17.076712] Read of size 1 at addr fff00000c635af78 by task kunit_try_catch/195
[   17.076759] 
[   17.076790] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.076869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.076895] Hardware name: linux,dummy-virt (DT)
[   17.077303] Call trace:
[   17.077449]  show_stack+0x20/0x38 (C)
[   17.077504]  dump_stack_lvl+0x8c/0xd0
[   17.077550]  print_report+0x118/0x608
[   17.077934]  kasan_report+0xdc/0x128
[   17.078025]  __asan_report_load1_noabort+0x20/0x30
[   17.078273]  ksize_unpoisons_memory+0x618/0x740
[   17.078325]  kunit_try_run_case+0x170/0x3f0
[   17.078370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.078420]  kthread+0x328/0x630
[   17.078838]  ret_from_fork+0x10/0x20
[   17.078919] 
[   17.078937] Allocated by task 195:
[   17.079011]  kasan_save_stack+0x3c/0x68
[   17.079452]  kasan_save_track+0x20/0x40
[   17.079514]  kasan_save_alloc_info+0x40/0x58
[   17.079591]  __kasan_kmalloc+0xd4/0xd8
[   17.079640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.079677]  ksize_unpoisons_memory+0xc0/0x740
[   17.079715]  kunit_try_run_case+0x170/0x3f0
[   17.079754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.079796]  kthread+0x328/0x630
[   17.080194]  ret_from_fork+0x10/0x20
[   17.080255] 
[   17.080274] The buggy address belongs to the object at fff00000c635af00
[   17.080274]  which belongs to the cache kmalloc-128 of size 128
[   17.080543] The buggy address is located 5 bytes to the right of
[   17.080543]  allocated 115-byte region [fff00000c635af00, fff00000c635af73)
[   17.080929] 
[   17.081248] The buggy address belongs to the physical page:
[   17.081281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   17.081578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.081697] page_type: f5(slab)
[   17.082124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.082354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.082401] page dumped because: kasan: bad access detected
[   17.082433] 
[   17.082799] Memory state around the buggy address:
[   17.083057]  fff00000c635ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.083394]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.083600] >fff00000c635af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.083640]                                                                 ^
[   17.083682]  fff00000c635af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.083725]  fff00000c635b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.083762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   17.052293] ==================================================================
[   17.052368] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   17.052416] Free of addr fff00000c5fbe840 by task kunit_try_catch/193
[   17.052457] 
[   17.052486] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.052565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.052590] Hardware name: linux,dummy-virt (DT)
[   17.052620] Call trace:
[   17.052640]  show_stack+0x20/0x38 (C)
[   17.052684]  dump_stack_lvl+0x8c/0xd0
[   17.052730]  print_report+0x118/0x608
[   17.052773]  kasan_report_invalid_free+0xc0/0xe8
[   17.052821]  check_slab_allocation+0xd4/0x108
[   17.052867]  __kasan_slab_pre_free+0x2c/0x48
[   17.052913]  kfree+0xe8/0x3c8
[   17.052953]  kfree_sensitive+0x3c/0xb0
[   17.053009]  kmalloc_double_kzfree+0x168/0x308
[   17.053053]  kunit_try_run_case+0x170/0x3f0
[   17.053099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.053149]  kthread+0x328/0x630
[   17.053188]  ret_from_fork+0x10/0x20
[   17.053234] 
[   17.053251] Allocated by task 193:
[   17.053278]  kasan_save_stack+0x3c/0x68
[   17.053316]  kasan_save_track+0x20/0x40
[   17.053353]  kasan_save_alloc_info+0x40/0x58
[   17.053391]  __kasan_kmalloc+0xd4/0xd8
[   17.053428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.053466]  kmalloc_double_kzfree+0xb8/0x308
[   17.053502]  kunit_try_run_case+0x170/0x3f0
[   17.053539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.053581]  kthread+0x328/0x630
[   17.053613]  ret_from_fork+0x10/0x20
[   17.053656] 
[   17.053674] Freed by task 193:
[   17.053698]  kasan_save_stack+0x3c/0x68
[   17.053735]  kasan_save_track+0x20/0x40
[   17.053770]  kasan_save_free_info+0x4c/0x78
[   17.053808]  __kasan_slab_free+0x6c/0x98
[   17.053845]  kfree+0x214/0x3c8
[   17.053876]  kfree_sensitive+0x80/0xb0
[   17.053910]  kmalloc_double_kzfree+0x11c/0x308
[   17.053947]  kunit_try_run_case+0x170/0x3f0
[   17.054016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.054060]  kthread+0x328/0x630
[   17.054130]  ret_from_fork+0x10/0x20
[   17.054186] 
[   17.054250] The buggy address belongs to the object at fff00000c5fbe840
[   17.054250]  which belongs to the cache kmalloc-16 of size 16
[   17.054314] The buggy address is located 0 bytes inside of
[   17.054314]  16-byte region [fff00000c5fbe840, fff00000c5fbe850)
[   17.054403] 
[   17.054442] The buggy address belongs to the physical page:
[   17.054490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe
[   17.054557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.054619] page_type: f5(slab)
[   17.054704] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.054757] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.054797] page dumped because: kasan: bad access detected
[   17.054829] 
[   17.054847] Memory state around the buggy address:
[   17.054881]  fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.054924]  fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.054965] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   17.055013]                                            ^
[   17.055047]  fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.055089]  fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.055126] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   17.045854] ==================================================================
[   17.045935] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   17.046009] Read of size 1 at addr fff00000c5fbe840 by task kunit_try_catch/193
[   17.046058] 
[   17.046093] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.046174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.046202] Hardware name: linux,dummy-virt (DT)
[   17.046231] Call trace:
[   17.046255]  show_stack+0x20/0x38 (C)
[   17.046301]  dump_stack_lvl+0x8c/0xd0
[   17.046347]  print_report+0x118/0x608
[   17.046391]  kasan_report+0xdc/0x128
[   17.046436]  __kasan_check_byte+0x54/0x70
[   17.046480]  kfree_sensitive+0x30/0xb0
[   17.046527]  kmalloc_double_kzfree+0x168/0x308
[   17.046571]  kunit_try_run_case+0x170/0x3f0
[   17.046652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.046705]  kthread+0x328/0x630
[   17.047033]  ret_from_fork+0x10/0x20
[   17.047126] 
[   17.047145] Allocated by task 193:
[   17.047199]  kasan_save_stack+0x3c/0x68
[   17.047268]  kasan_save_track+0x20/0x40
[   17.047385]  kasan_save_alloc_info+0x40/0x58
[   17.047485]  __kasan_kmalloc+0xd4/0xd8
[   17.047593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.047669]  kmalloc_double_kzfree+0xb8/0x308
[   17.047718]  kunit_try_run_case+0x170/0x3f0
[   17.047787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.047831]  kthread+0x328/0x630
[   17.047862]  ret_from_fork+0x10/0x20
[   17.047898] 
[   17.047915] Freed by task 193:
[   17.047942]  kasan_save_stack+0x3c/0x68
[   17.048140]  kasan_save_track+0x20/0x40
[   17.048296]  kasan_save_free_info+0x4c/0x78
[   17.048429]  __kasan_slab_free+0x6c/0x98
[   17.048505]  kfree+0x214/0x3c8
[   17.048598]  kfree_sensitive+0x80/0xb0
[   17.048686]  kmalloc_double_kzfree+0x11c/0x308
[   17.048805]  kunit_try_run_case+0x170/0x3f0
[   17.048901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.049058]  kthread+0x328/0x630
[   17.049102]  ret_from_fork+0x10/0x20
[   17.049146] 
[   17.049202] The buggy address belongs to the object at fff00000c5fbe840
[   17.049202]  which belongs to the cache kmalloc-16 of size 16
[   17.049270] The buggy address is located 0 bytes inside of
[   17.049270]  freed 16-byte region [fff00000c5fbe840, fff00000c5fbe850)
[   17.049610] 
[   17.049685] The buggy address belongs to the physical page:
[   17.049754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe
[   17.049875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.049959] page_type: f5(slab)
[   17.050297] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.050392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.050493] page dumped because: kasan: bad access detected
[   17.050570] 
[   17.050714] Memory state around the buggy address:
[   17.050777]  fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.050874]  fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.050999] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   17.051110]                                            ^
[   17.051143]  fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051195]  fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051234] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   17.021445] ==================================================================
[   17.021505] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   17.021587] Read of size 1 at addr fff00000c69bd428 by task kunit_try_catch/189
[   17.021783] 
[   17.021859] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.021945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.021972] Hardware name: linux,dummy-virt (DT)
[   17.022014] Call trace:
[   17.022036]  show_stack+0x20/0x38 (C)
[   17.022088]  dump_stack_lvl+0x8c/0xd0
[   17.022142]  print_report+0x118/0x608
[   17.022188]  kasan_report+0xdc/0x128
[   17.022232]  __asan_report_load1_noabort+0x20/0x30
[   17.022282]  kmalloc_uaf2+0x3f4/0x468
[   17.022323]  kunit_try_run_case+0x170/0x3f0
[   17.022370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.022426]  kthread+0x328/0x630
[   17.022466]  ret_from_fork+0x10/0x20
[   17.022513] 
[   17.022540] Allocated by task 189:
[   17.022567]  kasan_save_stack+0x3c/0x68
[   17.022639]  kasan_save_track+0x20/0x40
[   17.022681]  kasan_save_alloc_info+0x40/0x58
[   17.022839]  __kasan_kmalloc+0xd4/0xd8
[   17.022890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.022929]  kmalloc_uaf2+0xc4/0x468
[   17.022961]  kunit_try_run_case+0x170/0x3f0
[   17.023013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.023056]  kthread+0x328/0x630
[   17.023088]  ret_from_fork+0x10/0x20
[   17.023121] 
[   17.023280] Freed by task 189:
[   17.023353]  kasan_save_stack+0x3c/0x68
[   17.023424]  kasan_save_track+0x20/0x40
[   17.023524]  kasan_save_free_info+0x4c/0x78
[   17.023634]  __kasan_slab_free+0x6c/0x98
[   17.023720]  kfree+0x214/0x3c8
[   17.023789]  kmalloc_uaf2+0x134/0x468
[   17.023841]  kunit_try_run_case+0x170/0x3f0
[   17.023879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.023922]  kthread+0x328/0x630
[   17.023952]  ret_from_fork+0x10/0x20
[   17.024124] 
[   17.024174] The buggy address belongs to the object at fff00000c69bd400
[   17.024174]  which belongs to the cache kmalloc-64 of size 64
[   17.024327] The buggy address is located 40 bytes inside of
[   17.024327]  freed 64-byte region [fff00000c69bd400, fff00000c69bd440)
[   17.024401] 
[   17.024421] The buggy address belongs to the physical page:
[   17.024451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bd
[   17.024649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.024739] page_type: f5(slab)
[   17.024814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.024923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.025051] page dumped because: kasan: bad access detected
[   17.025082] 
[   17.025099] Memory state around the buggy address:
[   17.025164]  fff00000c69bd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025481]  fff00000c69bd380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025597] >fff00000c69bd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025681]                                   ^
[   17.025807]  fff00000c69bd480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   17.025851]  fff00000c69bd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.026030] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   17.008956] ==================================================================
[   17.009204] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   17.009288] Write of size 33 at addr fff00000c69bd280 by task kunit_try_catch/187
[   17.009341] 
[   17.009374] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.009606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.009669] Hardware name: linux,dummy-virt (DT)
[   17.009704] Call trace:
[   17.009727]  show_stack+0x20/0x38 (C)
[   17.009777]  dump_stack_lvl+0x8c/0xd0
[   17.009841]  print_report+0x118/0x608
[   17.009927]  kasan_report+0xdc/0x128
[   17.009971]  kasan_check_range+0x100/0x1a8
[   17.010057]  __asan_memset+0x34/0x78
[   17.010109]  kmalloc_uaf_memset+0x170/0x310
[   17.010153]  kunit_try_run_case+0x170/0x3f0
[   17.010228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.010290]  kthread+0x328/0x630
[   17.010346]  ret_from_fork+0x10/0x20
[   17.010410] 
[   17.010428] Allocated by task 187:
[   17.010472]  kasan_save_stack+0x3c/0x68
[   17.010512]  kasan_save_track+0x20/0x40
[   17.010547]  kasan_save_alloc_info+0x40/0x58
[   17.010587]  __kasan_kmalloc+0xd4/0xd8
[   17.010648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.010687]  kmalloc_uaf_memset+0xb8/0x310
[   17.010882]  kunit_try_run_case+0x170/0x3f0
[   17.010961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.011142]  kthread+0x328/0x630
[   17.011218]  ret_from_fork+0x10/0x20
[   17.011310] 
[   17.011389] Freed by task 187:
[   17.011475]  kasan_save_stack+0x3c/0x68
[   17.011583]  kasan_save_track+0x20/0x40
[   17.011678]  kasan_save_free_info+0x4c/0x78
[   17.011717]  __kasan_slab_free+0x6c/0x98
[   17.011778]  kfree+0x214/0x3c8
[   17.011812]  kmalloc_uaf_memset+0x11c/0x310
[   17.011846]  kunit_try_run_case+0x170/0x3f0
[   17.012021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.012132]  kthread+0x328/0x630
[   17.012239]  ret_from_fork+0x10/0x20
[   17.012358] 
[   17.012438] The buggy address belongs to the object at fff00000c69bd280
[   17.012438]  which belongs to the cache kmalloc-64 of size 64
[   17.012580] The buggy address is located 0 bytes inside of
[   17.012580]  freed 64-byte region [fff00000c69bd280, fff00000c69bd2c0)
[   17.012678] 
[   17.012754] The buggy address belongs to the physical page:
[   17.012840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bd
[   17.012930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.013015] page_type: f5(slab)
[   17.013080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.013130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.013434] page dumped because: kasan: bad access detected
[   17.013509] 
[   17.013603] Memory state around the buggy address:
[   17.013680]  fff00000c69bd180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.013736]  fff00000c69bd200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.013779] >fff00000c69bd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.014084]                    ^
[   17.014158]  fff00000c69bd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.014225]  fff00000c69bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.014295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   16.996695] ==================================================================
[   16.996892] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   16.996953] Read of size 1 at addr fff00000c5fbe828 by task kunit_try_catch/185
[   16.997045] 
[   16.997103] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.997187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.997213] Hardware name: linux,dummy-virt (DT)
[   16.997338] Call trace:
[   16.997409]  show_stack+0x20/0x38 (C)
[   16.997461]  dump_stack_lvl+0x8c/0xd0
[   16.997505]  print_report+0x118/0x608
[   16.997549]  kasan_report+0xdc/0x128
[   16.997592]  __asan_report_load1_noabort+0x20/0x30
[   16.997758]  kmalloc_uaf+0x300/0x338
[   16.997811]  kunit_try_run_case+0x170/0x3f0
[   16.997882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.997934]  kthread+0x328/0x630
[   16.997973]  ret_from_fork+0x10/0x20
[   16.998214] 
[   16.998278] Allocated by task 185:
[   16.998338]  kasan_save_stack+0x3c/0x68
[   16.998420]  kasan_save_track+0x20/0x40
[   16.998476]  kasan_save_alloc_info+0x40/0x58
[   16.998538]  __kasan_kmalloc+0xd4/0xd8
[   16.998587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.998674]  kmalloc_uaf+0xb8/0x338
[   16.998707]  kunit_try_run_case+0x170/0x3f0
[   16.998746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.998814]  kthread+0x328/0x630
[   16.998846]  ret_from_fork+0x10/0x20
[   16.999056] 
[   16.999133] Freed by task 185:
[   16.999221]  kasan_save_stack+0x3c/0x68
[   16.999315]  kasan_save_track+0x20/0x40
[   16.999441]  kasan_save_free_info+0x4c/0x78
[   16.999544]  __kasan_slab_free+0x6c/0x98
[   16.999583]  kfree+0x214/0x3c8
[   16.999614]  kmalloc_uaf+0x11c/0x338
[   16.999712]  kunit_try_run_case+0x170/0x3f0
[   17.000039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.000161]  kthread+0x328/0x630
[   17.000239]  ret_from_fork+0x10/0x20
[   17.000375] 
[   17.000433] The buggy address belongs to the object at fff00000c5fbe820
[   17.000433]  which belongs to the cache kmalloc-16 of size 16
[   17.000501] The buggy address is located 8 bytes inside of
[   17.000501]  freed 16-byte region [fff00000c5fbe820, fff00000c5fbe830)
[   17.000685] 
[   17.000717] The buggy address belongs to the physical page:
[   17.000873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe
[   17.000995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.001076] page_type: f5(slab)
[   17.001134] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.001317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.001515] page dumped because: kasan: bad access detected
[   17.001609] 
[   17.001683] Memory state around the buggy address:
[   17.001756]  fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.001799]  fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.002088] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   17.002158]                                   ^
[   17.002192]  fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.002262]  fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.002538] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   16.986016] ==================================================================
[   16.986072] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.986160] Read of size 64 at addr fff00000c779bf84 by task kunit_try_catch/183
[   16.986497] 
[   16.986544] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.986663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.986691] Hardware name: linux,dummy-virt (DT)
[   16.986721] Call trace:
[   16.986742]  show_stack+0x20/0x38 (C)
[   16.986793]  dump_stack_lvl+0x8c/0xd0
[   16.987092]  print_report+0x118/0x608
[   16.987171]  kasan_report+0xdc/0x128
[   16.987217]  kasan_check_range+0x100/0x1a8
[   16.987262]  __asan_memmove+0x3c/0x98
[   16.987304]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.987499]  kunit_try_run_case+0x170/0x3f0
[   16.987658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.987811]  kthread+0x328/0x630
[   16.987931]  ret_from_fork+0x10/0x20
[   16.988038] 
[   16.988095] Allocated by task 183:
[   16.988143]  kasan_save_stack+0x3c/0x68
[   16.988185]  kasan_save_track+0x20/0x40
[   16.988222]  kasan_save_alloc_info+0x40/0x58
[   16.988277]  __kasan_kmalloc+0xd4/0xd8
[   16.988312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.988360]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   16.988401]  kunit_try_run_case+0x170/0x3f0
[   16.988451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.988503]  kthread+0x328/0x630
[   16.988542]  ret_from_fork+0x10/0x20
[   16.988586] 
[   16.988605] The buggy address belongs to the object at fff00000c779bf80
[   16.988605]  which belongs to the cache kmalloc-64 of size 64
[   16.988662] The buggy address is located 4 bytes inside of
[   16.988662]  allocated 64-byte region [fff00000c779bf80, fff00000c779bfc0)
[   16.988722] 
[   16.988741] The buggy address belongs to the physical page:
[   16.988771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10779b
[   16.988822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.988882] page_type: f5(slab)
[   16.988938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.989018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.989072] page dumped because: kasan: bad access detected
[   16.989113] 
[   16.989130] Memory state around the buggy address:
[   16.989183]  fff00000c779be80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.989232]  fff00000c779bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.989282] >fff00000c779bf80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.989318]                                            ^
[   16.989360]  fff00000c779c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.989403]  fff00000c779c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.989441] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   16.976887] ==================================================================
[   16.976999] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   16.977051] Read of size 18446744073709551614 at addr fff00000c779bd84 by task kunit_try_catch/181
[   16.977153] 
[   16.977222] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.977301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.977326] Hardware name: linux,dummy-virt (DT)
[   16.977354] Call trace:
[   16.977375]  show_stack+0x20/0x38 (C)
[   16.977554]  dump_stack_lvl+0x8c/0xd0
[   16.977639]  print_report+0x118/0x608
[   16.977704]  kasan_report+0xdc/0x128
[   16.977748]  kasan_check_range+0x100/0x1a8
[   16.977802]  __asan_memmove+0x3c/0x98
[   16.977869]  kmalloc_memmove_negative_size+0x154/0x2e0
[   16.977952]  kunit_try_run_case+0x170/0x3f0
[   16.978026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.978077]  kthread+0x328/0x630
[   16.978116]  ret_from_fork+0x10/0x20
[   16.978161] 
[   16.978183] Allocated by task 181:
[   16.978210]  kasan_save_stack+0x3c/0x68
[   16.978287]  kasan_save_track+0x20/0x40
[   16.978323]  kasan_save_alloc_info+0x40/0x58
[   16.978390]  __kasan_kmalloc+0xd4/0xd8
[   16.978426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.978464]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   16.978502]  kunit_try_run_case+0x170/0x3f0
[   16.978538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.978856]  kthread+0x328/0x630
[   16.978923]  ret_from_fork+0x10/0x20
[   16.978959] 
[   16.979031] The buggy address belongs to the object at fff00000c779bd80
[   16.979031]  which belongs to the cache kmalloc-64 of size 64
[   16.979207] The buggy address is located 4 bytes inside of
[   16.979207]  64-byte region [fff00000c779bd80, fff00000c779bdc0)
[   16.979313] 
[   16.979367] The buggy address belongs to the physical page:
[   16.979442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10779b
[   16.979538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.979655] page_type: f5(slab)
[   16.979719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.979767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.979834] page dumped because: kasan: bad access detected
[   16.979864] 
[   16.980093] Memory state around the buggy address:
[   16.980309]  fff00000c779bc80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.980408]  fff00000c779bd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.981257] >fff00000c779bd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.981331]                    ^
[   16.981438]  fff00000c779be00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.981511]  fff00000c779be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.981637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   16.966470] ==================================================================
[   16.966612] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.966667] Write of size 16 at addr fff00000c635ae69 by task kunit_try_catch/179
[   16.966803] 
[   16.966890] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.967031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.967100] Hardware name: linux,dummy-virt (DT)
[   16.967221] Call trace:
[   16.967288]  show_stack+0x20/0x38 (C)
[   16.967395]  dump_stack_lvl+0x8c/0xd0
[   16.967514]  print_report+0x118/0x608
[   16.967591]  kasan_report+0xdc/0x128
[   16.967646]  kasan_check_range+0x100/0x1a8
[   16.967692]  __asan_memset+0x34/0x78
[   16.967732]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.967775]  kunit_try_run_case+0x170/0x3f0
[   16.967864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.967918]  kthread+0x328/0x630
[   16.967957]  ret_from_fork+0x10/0x20
[   16.968013] 
[   16.968031] Allocated by task 179:
[   16.968057]  kasan_save_stack+0x3c/0x68
[   16.968097]  kasan_save_track+0x20/0x40
[   16.968271]  kasan_save_alloc_info+0x40/0x58
[   16.968315]  __kasan_kmalloc+0xd4/0xd8
[   16.968363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.968461]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.968508]  kunit_try_run_case+0x170/0x3f0
[   16.968594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.968669]  kthread+0x328/0x630
[   16.968804]  ret_from_fork+0x10/0x20
[   16.968859] 
[   16.968878] The buggy address belongs to the object at fff00000c635ae00
[   16.968878]  which belongs to the cache kmalloc-128 of size 128
[   16.968988] The buggy address is located 105 bytes inside of
[   16.968988]  allocated 120-byte region [fff00000c635ae00, fff00000c635ae78)
[   16.969060] 
[   16.969097] The buggy address belongs to the physical page:
[   16.969149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.969222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.969285] page_type: f5(slab)
[   16.969322] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.969392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.969664] page dumped because: kasan: bad access detected
[   16.969725] 
[   16.969776] Memory state around the buggy address:
[   16.969828]  fff00000c635ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.969897]  fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.969964] >fff00000c635ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.970010]                                                                 ^
[   16.970083]  fff00000c635ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.970204]  fff00000c635af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.970273] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   16.957917] ==================================================================
[   16.957991] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.958043] Write of size 8 at addr fff00000c635ad71 by task kunit_try_catch/177
[   16.958091] 
[   16.958122] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.958200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.958224] Hardware name: linux,dummy-virt (DT)
[   16.958253] Call trace:
[   16.958274]  show_stack+0x20/0x38 (C)
[   16.958409]  dump_stack_lvl+0x8c/0xd0
[   16.958454]  print_report+0x118/0x608
[   16.958513]  kasan_report+0xdc/0x128
[   16.958557]  kasan_check_range+0x100/0x1a8
[   16.958602]  __asan_memset+0x34/0x78
[   16.958685]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.958786]  kunit_try_run_case+0x170/0x3f0
[   16.958957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.959016]  kthread+0x328/0x630
[   16.959054]  ret_from_fork+0x10/0x20
[   16.959100] 
[   16.959117] Allocated by task 177:
[   16.959167]  kasan_save_stack+0x3c/0x68
[   16.959209]  kasan_save_track+0x20/0x40
[   16.959244]  kasan_save_alloc_info+0x40/0x58
[   16.959283]  __kasan_kmalloc+0xd4/0xd8
[   16.959318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.959479]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.959660]  kunit_try_run_case+0x170/0x3f0
[   16.959831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.959954]  kthread+0x328/0x630
[   16.960053]  ret_from_fork+0x10/0x20
[   16.960163] 
[   16.960183] The buggy address belongs to the object at fff00000c635ad00
[   16.960183]  which belongs to the cache kmalloc-128 of size 128
[   16.960250] The buggy address is located 113 bytes inside of
[   16.960250]  allocated 120-byte region [fff00000c635ad00, fff00000c635ad78)
[   16.960310] 
[   16.960329] The buggy address belongs to the physical page:
[   16.960358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.960408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.960527] page_type: f5(slab)
[   16.960703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.960818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.960957] page dumped because: kasan: bad access detected
[   16.961015] 
[   16.961033] Memory state around the buggy address:
[   16.961196]  fff00000c635ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.961309]  fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.961497] >fff00000c635ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.961665]                                                                 ^
[   16.961751]  fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.961890]  fff00000c635ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.961927] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   16.949415] ==================================================================
[   16.949478] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   16.949529] Write of size 4 at addr fff00000c635ac75 by task kunit_try_catch/175
[   16.949577] 
[   16.949610] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.949700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.949725] Hardware name: linux,dummy-virt (DT)
[   16.949753] Call trace:
[   16.949774]  show_stack+0x20/0x38 (C)
[   16.949818]  dump_stack_lvl+0x8c/0xd0
[   16.949862]  print_report+0x118/0x608
[   16.949905]  kasan_report+0xdc/0x128
[   16.949947]  kasan_check_range+0x100/0x1a8
[   16.950008]  __asan_memset+0x34/0x78
[   16.950123]  kmalloc_oob_memset_4+0x150/0x300
[   16.950178]  kunit_try_run_case+0x170/0x3f0
[   16.950253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.950329]  kthread+0x328/0x630
[   16.950396]  ret_from_fork+0x10/0x20
[   16.950458] 
[   16.950476] Allocated by task 175:
[   16.950503]  kasan_save_stack+0x3c/0x68
[   16.950568]  kasan_save_track+0x20/0x40
[   16.950605]  kasan_save_alloc_info+0x40/0x58
[   16.950680]  __kasan_kmalloc+0xd4/0xd8
[   16.950715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.950776]  kmalloc_oob_memset_4+0xb0/0x300
[   16.950815]  kunit_try_run_case+0x170/0x3f0
[   16.950852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.950894]  kthread+0x328/0x630
[   16.951063]  ret_from_fork+0x10/0x20
[   16.951264] 
[   16.951317] The buggy address belongs to the object at fff00000c635ac00
[   16.951317]  which belongs to the cache kmalloc-128 of size 128
[   16.951448] The buggy address is located 117 bytes inside of
[   16.951448]  allocated 120-byte region [fff00000c635ac00, fff00000c635ac78)
[   16.951519] 
[   16.951539] The buggy address belongs to the physical page:
[   16.951568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.951628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.951683] page_type: f5(slab)
[   16.951720] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.951776] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.951814] page dumped because: kasan: bad access detected
[   16.951844] 
[   16.951861] Memory state around the buggy address:
[   16.951902]  fff00000c635ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.951942]  fff00000c635ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952288] >fff00000c635ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.952465]                                                                 ^
[   16.952561]  fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952602]  fff00000c635ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952640] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   16.927917] ==================================================================
[   16.928187] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   16.928349] Write of size 2 at addr fff00000c635ab77 by task kunit_try_catch/173
[   16.928604] 
[   16.928902] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.930041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.930083] Hardware name: linux,dummy-virt (DT)
[   16.930114] Call trace:
[   16.930136]  show_stack+0x20/0x38 (C)
[   16.930196]  dump_stack_lvl+0x8c/0xd0
[   16.930243]  print_report+0x118/0x608
[   16.930287]  kasan_report+0xdc/0x128
[   16.930329]  kasan_check_range+0x100/0x1a8
[   16.930374]  __asan_memset+0x34/0x78
[   16.930414]  kmalloc_oob_memset_2+0x150/0x2f8
[   16.930457]  kunit_try_run_case+0x170/0x3f0
[   16.930502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.930551]  kthread+0x328/0x630
[   16.930589]  ret_from_fork+0x10/0x20
[   16.930641] 
[   16.930658] Allocated by task 173:
[   16.930685]  kasan_save_stack+0x3c/0x68
[   16.930724]  kasan_save_track+0x20/0x40
[   16.930759]  kasan_save_alloc_info+0x40/0x58
[   16.930797]  __kasan_kmalloc+0xd4/0xd8
[   16.930831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.930868]  kmalloc_oob_memset_2+0xb0/0x2f8
[   16.930904]  kunit_try_run_case+0x170/0x3f0
[   16.930940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.930990]  kthread+0x328/0x630
[   16.931021]  ret_from_fork+0x10/0x20
[   16.931055] 
[   16.931073] The buggy address belongs to the object at fff00000c635ab00
[   16.931073]  which belongs to the cache kmalloc-128 of size 128
[   16.931965] The buggy address is located 119 bytes inside of
[   16.931965]  allocated 120-byte region [fff00000c635ab00, fff00000c635ab78)
[   16.932046] 
[   16.932065] The buggy address belongs to the physical page:
[   16.932095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.932147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.932253] page_type: f5(slab)
[   16.932337] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.932389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.932591] page dumped because: kasan: bad access detected
[   16.932634] 
[   16.932652] Memory state around the buggy address:
[   16.932685]  fff00000c635aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.932727]  fff00000c635aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.932767] >fff00000c635ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.932803]                                                                 ^
[   16.932841]  fff00000c635ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.932882]  fff00000c635ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.932918] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   16.900347] ==================================================================
[   16.900523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   16.900577] Write of size 128 at addr fff00000c635aa00 by task kunit_try_catch/171
[   16.900625] 
[   16.900917] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.901178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.901212] Hardware name: linux,dummy-virt (DT)
[   16.901313] Call trace:
[   16.901334]  show_stack+0x20/0x38 (C)
[   16.901488]  dump_stack_lvl+0x8c/0xd0
[   16.901559]  print_report+0x118/0x608
[   16.901699]  kasan_report+0xdc/0x128
[   16.901792]  kasan_check_range+0x100/0x1a8
[   16.901842]  __asan_memset+0x34/0x78
[   16.902178]  kmalloc_oob_in_memset+0x144/0x2d0
[   16.902279]  kunit_try_run_case+0x170/0x3f0
[   16.902325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.902375]  kthread+0x328/0x630
[   16.902717]  ret_from_fork+0x10/0x20
[   16.903049] 
[   16.903069] Allocated by task 171:
[   16.903096]  kasan_save_stack+0x3c/0x68
[   16.903136]  kasan_save_track+0x20/0x40
[   16.903172]  kasan_save_alloc_info+0x40/0x58
[   16.903519]  __kasan_kmalloc+0xd4/0xd8
[   16.903650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.903725]  kmalloc_oob_in_memset+0xb0/0x2d0
[   16.903762]  kunit_try_run_case+0x170/0x3f0
[   16.903798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.904128]  kthread+0x328/0x630
[   16.904225]  ret_from_fork+0x10/0x20
[   16.904316] 
[   16.904348] The buggy address belongs to the object at fff00000c635aa00
[   16.904348]  which belongs to the cache kmalloc-128 of size 128
[   16.904440] The buggy address is located 0 bytes inside of
[   16.904440]  allocated 120-byte region [fff00000c635aa00, fff00000c635aa78)
[   16.904519] 
[   16.904626] The buggy address belongs to the physical page:
[   16.904705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.904764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.904857] page_type: f5(slab)
[   16.904894] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.904941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.904990] page dumped because: kasan: bad access detected
[   16.905019] 
[   16.905037] Memory state around the buggy address:
[   16.905068]  fff00000c635a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.905109]  fff00000c635a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.905150] >fff00000c635aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.905279]                                                                 ^
[   16.905575]  fff00000c635aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.905772]  fff00000c635ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.905812] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   16.880254] ==================================================================
[   16.880848] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   16.881179] Read of size 16 at addr fff00000c5fbe800 by task kunit_try_catch/169
[   16.881245] 
[   16.881377] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.881486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.881512] Hardware name: linux,dummy-virt (DT)
[   16.881541] Call trace:
[   16.881813]  show_stack+0x20/0x38 (C)
[   16.881902]  dump_stack_lvl+0x8c/0xd0
[   16.881949]  print_report+0x118/0x608
[   16.882287]  kasan_report+0xdc/0x128
[   16.882449]  __asan_report_load16_noabort+0x20/0x30
[   16.882500]  kmalloc_uaf_16+0x3bc/0x438
[   16.882824]  kunit_try_run_case+0x170/0x3f0
[   16.882913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.882964]  kthread+0x328/0x630
[   16.883016]  ret_from_fork+0x10/0x20
[   16.883087] 
[   16.883108] Allocated by task 169:
[   16.883247]  kasan_save_stack+0x3c/0x68
[   16.883302]  kasan_save_track+0x20/0x40
[   16.883345]  kasan_save_alloc_info+0x40/0x58
[   16.883383]  __kasan_kmalloc+0xd4/0xd8
[   16.883433]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.883471]  kmalloc_uaf_16+0x140/0x438
[   16.883504]  kunit_try_run_case+0x170/0x3f0
[   16.883539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.884013]  kthread+0x328/0x630
[   16.884051]  ret_from_fork+0x10/0x20
[   16.884250] 
[   16.884270] Freed by task 169:
[   16.884311]  kasan_save_stack+0x3c/0x68
[   16.884389]  kasan_save_track+0x20/0x40
[   16.884530]  kasan_save_free_info+0x4c/0x78
[   16.884568]  __kasan_slab_free+0x6c/0x98
[   16.884609]  kfree+0x214/0x3c8
[   16.884757]  kmalloc_uaf_16+0x190/0x438
[   16.884831]  kunit_try_run_case+0x170/0x3f0
[   16.884924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.884965]  kthread+0x328/0x630
[   16.885256]  ret_from_fork+0x10/0x20
[   16.885299] 
[   16.885318] The buggy address belongs to the object at fff00000c5fbe800
[   16.885318]  which belongs to the cache kmalloc-16 of size 16
[   16.885374] The buggy address is located 0 bytes inside of
[   16.885374]  freed 16-byte region [fff00000c5fbe800, fff00000c5fbe810)
[   16.885921] 
[   16.885952] The buggy address belongs to the physical page:
[   16.886124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe
[   16.886188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.886237] page_type: f5(slab)
[   16.886277] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.886326] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.886364] page dumped because: kasan: bad access detected
[   16.886410] 
[   16.886428] Memory state around the buggy address:
[   16.886459]  fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.886998]  fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   16.887174] >fff00000c5fbe800: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.887213]                    ^
[   16.887240]  fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.887351]  fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.887735] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   16.838379] ==================================================================
[   16.838571] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.838781] Read of size 1 at addr fff00000c45a8c00 by task kunit_try_catch/165
[   16.838830] 
[   16.838861] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.839448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.839639] Hardware name: linux,dummy-virt (DT)
[   16.839720] Call trace:
[   16.839950]  show_stack+0x20/0x38 (C)
[   16.840039]  dump_stack_lvl+0x8c/0xd0
[   16.840173]  print_report+0x118/0x608
[   16.840218]  kasan_report+0xdc/0x128
[   16.840261]  __asan_report_load1_noabort+0x20/0x30
[   16.840609]  krealloc_uaf+0x4c8/0x520
[   16.840653]  kunit_try_run_case+0x170/0x3f0
[   16.840734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.840906]  kthread+0x328/0x630
[   16.840964]  ret_from_fork+0x10/0x20
[   16.841021] 
[   16.841038] Allocated by task 165:
[   16.841111]  kasan_save_stack+0x3c/0x68
[   16.841289]  kasan_save_track+0x20/0x40
[   16.841374]  kasan_save_alloc_info+0x40/0x58
[   16.841474]  __kasan_kmalloc+0xd4/0xd8
[   16.841585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.841676]  krealloc_uaf+0xc8/0x520
[   16.841764]  kunit_try_run_case+0x170/0x3f0
[   16.841800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.841842]  kthread+0x328/0x630
[   16.841872]  ret_from_fork+0x10/0x20
[   16.841952] 
[   16.841995] Freed by task 165:
[   16.842019]  kasan_save_stack+0x3c/0x68
[   16.842055]  kasan_save_track+0x20/0x40
[   16.842090]  kasan_save_free_info+0x4c/0x78
[   16.842127]  __kasan_slab_free+0x6c/0x98
[   16.842162]  kfree+0x214/0x3c8
[   16.842194]  krealloc_uaf+0x12c/0x520
[   16.842371]  kunit_try_run_case+0x170/0x3f0
[   16.842638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.842963]  kthread+0x328/0x630
[   16.843276]  ret_from_fork+0x10/0x20
[   16.843357] 
[   16.843660] The buggy address belongs to the object at fff00000c45a8c00
[   16.843660]  which belongs to the cache kmalloc-256 of size 256
[   16.843722] The buggy address is located 0 bytes inside of
[   16.843722]  freed 256-byte region [fff00000c45a8c00, fff00000c45a8d00)
[   16.843780] 
[   16.843800] The buggy address belongs to the physical page:
[   16.843841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.843940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.844395] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.844489] page_type: f5(slab)
[   16.844713] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.844838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.844927] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.845113] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.845278] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.845325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.845363] page dumped because: kasan: bad access detected
[   16.845824] 
[   16.845861] Memory state around the buggy address:
[   16.845895]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845937]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845991] >fff00000c45a8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.846027]                    ^
[   16.846054]  fff00000c45a8c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.846104]  fff00000c45a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.846140] ==================================================================
[   16.826549] ==================================================================
[   16.826653] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.826705] Read of size 1 at addr fff00000c45a8c00 by task kunit_try_catch/165
[   16.826752] 
[   16.826784] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.826862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.826887] Hardware name: linux,dummy-virt (DT)
[   16.826916] Call trace:
[   16.826936]  show_stack+0x20/0x38 (C)
[   16.826996]  dump_stack_lvl+0x8c/0xd0
[   16.827201]  print_report+0x118/0x608
[   16.827353]  kasan_report+0xdc/0x128
[   16.827738]  __kasan_check_byte+0x54/0x70
[   16.827789]  krealloc_noprof+0x44/0x360
[   16.827834]  krealloc_uaf+0x180/0x520
[   16.828105]  kunit_try_run_case+0x170/0x3f0
[   16.828264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.828899]  kthread+0x328/0x630
[   16.828947]  ret_from_fork+0x10/0x20
[   16.829640] 
[   16.829660] Allocated by task 165:
[   16.830269]  kasan_save_stack+0x3c/0x68
[   16.830333]  kasan_save_track+0x20/0x40
[   16.830370]  kasan_save_alloc_info+0x40/0x58
[   16.830409]  __kasan_kmalloc+0xd4/0xd8
[   16.830935]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.831370]  krealloc_uaf+0xc8/0x520
[   16.831587]  kunit_try_run_case+0x170/0x3f0
[   16.831717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.831760]  kthread+0x328/0x630
[   16.831792]  ret_from_fork+0x10/0x20
[   16.831837] 
[   16.831991] Freed by task 165:
[   16.832120]  kasan_save_stack+0x3c/0x68
[   16.832160]  kasan_save_track+0x20/0x40
[   16.832254]  kasan_save_free_info+0x4c/0x78
[   16.832312]  __kasan_slab_free+0x6c/0x98
[   16.832426]  kfree+0x214/0x3c8
[   16.832459]  krealloc_uaf+0x12c/0x520
[   16.832494]  kunit_try_run_case+0x170/0x3f0
[   16.832530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.832611]  kthread+0x328/0x630
[   16.832767]  ret_from_fork+0x10/0x20
[   16.832950] 
[   16.832973] The buggy address belongs to the object at fff00000c45a8c00
[   16.832973]  which belongs to the cache kmalloc-256 of size 256
[   16.833198] The buggy address is located 0 bytes inside of
[   16.833198]  freed 256-byte region [fff00000c45a8c00, fff00000c45a8d00)
[   16.833311] 
[   16.833332] The buggy address belongs to the physical page:
[   16.833866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.834236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.834407] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.834503] page_type: f5(slab)
[   16.834540] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.834766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.834964] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.835025] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.835260] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.835411] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.835692] page dumped because: kasan: bad access detected
[   16.835815] 
[   16.835909] Memory state around the buggy address:
[   16.835944]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.835997]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.836038] >fff00000c45a8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.836074]                    ^
[   16.836101]  fff00000c45a8c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.836154]  fff00000c45a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.836189] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   16.744481] ==================================================================
[   16.744564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.744625] Write of size 1 at addr fff00000c45a8ac9 by task kunit_try_catch/159
[   16.744710] 
[   16.744779] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.744858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.744884] Hardware name: linux,dummy-virt (DT)
[   16.745042] Call trace:
[   16.745244]  show_stack+0x20/0x38 (C)
[   16.745304]  dump_stack_lvl+0x8c/0xd0
[   16.745397]  print_report+0x118/0x608
[   16.745441]  kasan_report+0xdc/0x128
[   16.745484]  __asan_report_store1_noabort+0x20/0x30
[   16.745544]  krealloc_less_oob_helper+0xa48/0xc50
[   16.745591]  krealloc_less_oob+0x20/0x38
[   16.745665]  kunit_try_run_case+0x170/0x3f0
[   16.745730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.745781]  kthread+0x328/0x630
[   16.745868]  ret_from_fork+0x10/0x20
[   16.745915] 
[   16.745932] Allocated by task 159:
[   16.745959]  kasan_save_stack+0x3c/0x68
[   16.746009]  kasan_save_track+0x20/0x40
[   16.746044]  kasan_save_alloc_info+0x40/0x58
[   16.746099]  __kasan_krealloc+0x118/0x178
[   16.746238]  krealloc_noprof+0x128/0x360
[   16.746287]  krealloc_less_oob_helper+0x168/0xc50
[   16.746418]  krealloc_less_oob+0x20/0x38
[   16.746462]  kunit_try_run_case+0x170/0x3f0
[   16.746499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.746590]  kthread+0x328/0x630
[   16.746716]  ret_from_fork+0x10/0x20
[   16.746762] 
[   16.746788] The buggy address belongs to the object at fff00000c45a8a00
[   16.746788]  which belongs to the cache kmalloc-256 of size 256
[   16.746854] The buggy address is located 0 bytes to the right of
[   16.746854]  allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9)
[   16.746915] 
[   16.747222] The buggy address belongs to the physical page:
[   16.747260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.747367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.747443] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.747566] page_type: f5(slab)
[   16.747666] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.747801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.747904] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.748012] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.748103] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.748150] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.748202] page dumped because: kasan: bad access detected
[   16.748231] 
[   16.748248] Memory state around the buggy address:
[   16.748278]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.748332]  fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.748373] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.748424]                                               ^
[   16.748463]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.748504]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.748549] ==================================================================
[   16.810912] ==================================================================
[   16.811112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.811176] Write of size 1 at addr fff00000c78420ea by task kunit_try_catch/163
[   16.811284] 
[   16.811385] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.811461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.811486] Hardware name: linux,dummy-virt (DT)
[   16.811515] Call trace:
[   16.811759]  show_stack+0x20/0x38 (C)
[   16.811817]  dump_stack_lvl+0x8c/0xd0
[   16.811864]  print_report+0x118/0x608
[   16.811926]  kasan_report+0xdc/0x128
[   16.811970]  __asan_report_store1_noabort+0x20/0x30
[   16.812032]  krealloc_less_oob_helper+0xae4/0xc50
[   16.812261]  krealloc_large_less_oob+0x20/0x38
[   16.812477]  kunit_try_run_case+0x170/0x3f0
[   16.812656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.812767]  kthread+0x328/0x630
[   16.812806]  ret_from_fork+0x10/0x20
[   16.813182] 
[   16.813213] The buggy address belongs to the physical page:
[   16.813244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.813295] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.813514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.813744] page_type: f8(unknown)
[   16.813783] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.813832] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.813879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.813936] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.813996] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.814456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.814579] page dumped because: kasan: bad access detected
[   16.814640] 
[   16.814658] Memory state around the buggy address:
[   16.814743]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.814785]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.814826] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.814916]                                                           ^
[   16.815116]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.815291]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.815374] ==================================================================
[   16.797026] ==================================================================
[   16.797271] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.797324] Write of size 1 at addr fff00000c78420c9 by task kunit_try_catch/163
[   16.797456] 
[   16.797569] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.797661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.797686] Hardware name: linux,dummy-virt (DT)
[   16.797715] Call trace:
[   16.797805]  show_stack+0x20/0x38 (C)
[   16.797863]  dump_stack_lvl+0x8c/0xd0
[   16.797907]  print_report+0x118/0x608
[   16.797951]  kasan_report+0xdc/0x128
[   16.798042]  __asan_report_store1_noabort+0x20/0x30
[   16.798093]  krealloc_less_oob_helper+0xa48/0xc50
[   16.798139]  krealloc_large_less_oob+0x20/0x38
[   16.798209]  kunit_try_run_case+0x170/0x3f0
[   16.798284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.798335]  kthread+0x328/0x630
[   16.798395]  ret_from_fork+0x10/0x20
[   16.798460] 
[   16.798497] The buggy address belongs to the physical page:
[   16.798551] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.798602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.798685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.798736] page_type: f8(unknown)
[   16.798791] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.798840] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.798887] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.798934] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.798993] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.799236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.799345] page dumped because: kasan: bad access detected
[   16.799414] 
[   16.799476] Memory state around the buggy address:
[   16.799596]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.799638]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.799687] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.799858]                                               ^
[   16.800077]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.800205]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.800308] ==================================================================
[   16.756112] ==================================================================
[   16.756200] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.756265] Write of size 1 at addr fff00000c45a8ada by task kunit_try_catch/159
[   16.756329] 
[   16.756369] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.756460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.756486] Hardware name: linux,dummy-virt (DT)
[   16.756517] Call trace:
[   16.756638]  show_stack+0x20/0x38 (C)
[   16.756844]  dump_stack_lvl+0x8c/0xd0
[   16.756890]  print_report+0x118/0x608
[   16.756933]  kasan_report+0xdc/0x128
[   16.756989]  __asan_report_store1_noabort+0x20/0x30
[   16.757057]  krealloc_less_oob_helper+0xa80/0xc50
[   16.757137]  krealloc_less_oob+0x20/0x38
[   16.757181]  kunit_try_run_case+0x170/0x3f0
[   16.757225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.757275]  kthread+0x328/0x630
[   16.757406]  ret_from_fork+0x10/0x20
[   16.757601] 
[   16.757646] Allocated by task 159:
[   16.757675]  kasan_save_stack+0x3c/0x68
[   16.757717]  kasan_save_track+0x20/0x40
[   16.757761]  kasan_save_alloc_info+0x40/0x58
[   16.757800]  __kasan_krealloc+0x118/0x178
[   16.757835]  krealloc_noprof+0x128/0x360
[   16.757870]  krealloc_less_oob_helper+0x168/0xc50
[   16.757907]  krealloc_less_oob+0x20/0x38
[   16.757942]  kunit_try_run_case+0x170/0x3f0
[   16.757988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.758029]  kthread+0x328/0x630
[   16.758059]  ret_from_fork+0x10/0x20
[   16.758095] 
[   16.758113] The buggy address belongs to the object at fff00000c45a8a00
[   16.758113]  which belongs to the cache kmalloc-256 of size 256
[   16.758167] The buggy address is located 17 bytes to the right of
[   16.758167]  allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9)
[   16.758441] 
[   16.758485] The buggy address belongs to the physical page:
[   16.758533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.758585] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.758657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.758715] page_type: f5(slab)
[   16.758761] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.758827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.758875] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.759091] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.759188] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.759254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.759338] page dumped because: kasan: bad access detected
[   16.759408] 
[   16.759486] Memory state around the buggy address:
[   16.759552]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.759593]  fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.759750] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.759871]                                                     ^
[   16.760072]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.760135]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.760210] ==================================================================
[   16.816426] ==================================================================
[   16.816472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.816584] Write of size 1 at addr fff00000c78420eb by task kunit_try_catch/163
[   16.816781] 
[   16.816867] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.817010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.817035] Hardware name: linux,dummy-virt (DT)
[   16.817064] Call trace:
[   16.817254]  show_stack+0x20/0x38 (C)
[   16.817303]  dump_stack_lvl+0x8c/0xd0
[   16.817348]  print_report+0x118/0x608
[   16.817513]  kasan_report+0xdc/0x128
[   16.817650]  __asan_report_store1_noabort+0x20/0x30
[   16.817837]  krealloc_less_oob_helper+0xa58/0xc50
[   16.817885]  krealloc_large_less_oob+0x20/0x38
[   16.817930]  kunit_try_run_case+0x170/0x3f0
[   16.817987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.818038]  kthread+0x328/0x630
[   16.818078]  ret_from_fork+0x10/0x20
[   16.818123] 
[   16.818153] The buggy address belongs to the physical page:
[   16.818182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.818564] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.818620] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.819070] page_type: f8(unknown)
[   16.819115] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.819180] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.819321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.819367] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.819414] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.819461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.819499] page dumped because: kasan: bad access detected
[   16.819567] 
[   16.819621] Memory state around the buggy address:
[   16.819651]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.819692]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.819732] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.819768]                                                           ^
[   16.819805]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.819847]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.819927] ==================================================================
[   16.806016] ==================================================================
[   16.806074] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.806120] Write of size 1 at addr fff00000c78420da by task kunit_try_catch/163
[   16.806168] 
[   16.806197] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.806273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.806299] Hardware name: linux,dummy-virt (DT)
[   16.806328] Call trace:
[   16.806348]  show_stack+0x20/0x38 (C)
[   16.806401]  dump_stack_lvl+0x8c/0xd0
[   16.806446]  print_report+0x118/0x608
[   16.806490]  kasan_report+0xdc/0x128
[   16.806532]  __asan_report_store1_noabort+0x20/0x30
[   16.806593]  krealloc_less_oob_helper+0xa80/0xc50
[   16.806680]  krealloc_large_less_oob+0x20/0x38
[   16.806725]  kunit_try_run_case+0x170/0x3f0
[   16.806927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.806987]  kthread+0x328/0x630
[   16.807027]  ret_from_fork+0x10/0x20
[   16.807717] 
[   16.807745] The buggy address belongs to the physical page:
[   16.807783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.807857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.807902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.807951] page_type: f8(unknown)
[   16.808244] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.808424] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.808476] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.808650] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.808723] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.808852] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.808890] page dumped because: kasan: bad access detected
[   16.808939] 
[   16.809021] Memory state around the buggy address:
[   16.809051]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.809172]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.809216] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.809252]                                                     ^
[   16.809288]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.809328]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.809391] ==================================================================
[   16.766767] ==================================================================
[   16.766850] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.767167] Write of size 1 at addr fff00000c45a8aeb by task kunit_try_catch/159
[   16.767603] 
[   16.767650] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.767729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.767754] Hardware name: linux,dummy-virt (DT)
[   16.768109] Call trace:
[   16.768218]  show_stack+0x20/0x38 (C)
[   16.768297]  dump_stack_lvl+0x8c/0xd0
[   16.768484]  print_report+0x118/0x608
[   16.768894]  kasan_report+0xdc/0x128
[   16.769092]  __asan_report_store1_noabort+0x20/0x30
[   16.769157]  krealloc_less_oob_helper+0xa58/0xc50
[   16.769291]  krealloc_less_oob+0x20/0x38
[   16.769384]  kunit_try_run_case+0x170/0x3f0
[   16.769632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.769896]  kthread+0x328/0x630
[   16.770148]  ret_from_fork+0x10/0x20
[   16.770385] 
[   16.770457] Allocated by task 159:
[   16.770525]  kasan_save_stack+0x3c/0x68
[   16.770689]  kasan_save_track+0x20/0x40
[   16.771076]  kasan_save_alloc_info+0x40/0x58
[   16.771309]  __kasan_krealloc+0x118/0x178
[   16.771467]  krealloc_noprof+0x128/0x360
[   16.771553]  krealloc_less_oob_helper+0x168/0xc50
[   16.771632]  krealloc_less_oob+0x20/0x38
[   16.771762]  kunit_try_run_case+0x170/0x3f0
[   16.772036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.772118]  kthread+0x328/0x630
[   16.772175]  ret_from_fork+0x10/0x20
[   16.772355] 
[   16.772533] The buggy address belongs to the object at fff00000c45a8a00
[   16.772533]  which belongs to the cache kmalloc-256 of size 256
[   16.772678] The buggy address is located 34 bytes to the right of
[   16.772678]  allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9)
[   16.772777] 
[   16.772797] The buggy address belongs to the physical page:
[   16.772847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.773056] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.773252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.773348] page_type: f5(slab)
[   16.773396] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.773554] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.773713] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.773775] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.773997] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.774241] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.774316] page dumped because: kasan: bad access detected
[   16.774451] 
[   16.774519] Memory state around the buggy address:
[   16.774638]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.774749]  fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.774791] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.774826]                                                           ^
[   16.775283]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775424]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.775505] ==================================================================
[   16.801388] ==================================================================
[   16.801452] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.801514] Write of size 1 at addr fff00000c78420d0 by task kunit_try_catch/163
[   16.801563] 
[   16.801713] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.801939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.802028] Hardware name: linux,dummy-virt (DT)
[   16.802064] Call trace:
[   16.802085]  show_stack+0x20/0x38 (C)
[   16.802151]  dump_stack_lvl+0x8c/0xd0
[   16.802197]  print_report+0x118/0x608
[   16.802241]  kasan_report+0xdc/0x128
[   16.802284]  __asan_report_store1_noabort+0x20/0x30
[   16.802332]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.802378]  krealloc_large_less_oob+0x20/0x38
[   16.802424]  kunit_try_run_case+0x170/0x3f0
[   16.802468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.802528]  kthread+0x328/0x630
[   16.802569]  ret_from_fork+0x10/0x20
[   16.802642] 
[   16.802661] The buggy address belongs to the physical page:
[   16.802690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.802972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.803032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.803145] page_type: f8(unknown)
[   16.803220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.803370] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.803447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.803551] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.803637] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.803757] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.803842] page dumped because: kasan: bad access detected
[   16.803943] 
[   16.803961] Memory state around the buggy address:
[   16.804004]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.804082]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.804339] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.804484]                                                  ^
[   16.804550]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.804617]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.804731] ==================================================================
[   16.749496] ==================================================================
[   16.750047] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.750148] Write of size 1 at addr fff00000c45a8ad0 by task kunit_try_catch/159
[   16.750214] 
[   16.750263] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.750368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.750394] Hardware name: linux,dummy-virt (DT)
[   16.750423] Call trace:
[   16.750443]  show_stack+0x20/0x38 (C)
[   16.750488]  dump_stack_lvl+0x8c/0xd0
[   16.750532]  print_report+0x118/0x608
[   16.750577]  kasan_report+0xdc/0x128
[   16.750690]  __asan_report_store1_noabort+0x20/0x30
[   16.750881]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.750970]  krealloc_less_oob+0x20/0x38
[   16.751078]  kunit_try_run_case+0x170/0x3f0
[   16.751226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.751331]  kthread+0x328/0x630
[   16.751432]  ret_from_fork+0x10/0x20
[   16.751519] 
[   16.751548] Allocated by task 159:
[   16.751575]  kasan_save_stack+0x3c/0x68
[   16.751636]  kasan_save_track+0x20/0x40
[   16.751672]  kasan_save_alloc_info+0x40/0x58
[   16.751745]  __kasan_krealloc+0x118/0x178
[   16.751782]  krealloc_noprof+0x128/0x360
[   16.751909]  krealloc_less_oob_helper+0x168/0xc50
[   16.751950]  krealloc_less_oob+0x20/0x38
[   16.751997]  kunit_try_run_case+0x170/0x3f0
[   16.752100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.752186]  kthread+0x328/0x630
[   16.752282]  ret_from_fork+0x10/0x20
[   16.752380] 
[   16.752445] The buggy address belongs to the object at fff00000c45a8a00
[   16.752445]  which belongs to the cache kmalloc-256 of size 256
[   16.752798] The buggy address is located 7 bytes to the right of
[   16.752798]  allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9)
[   16.752986] 
[   16.753120] The buggy address belongs to the physical page:
[   16.753223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.753285] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.753331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.753422] page_type: f5(slab)
[   16.753762] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.753869] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.754010] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.754090] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.754196] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.754289] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.754383] page dumped because: kasan: bad access detected
[   16.754420] 
[   16.754437] Memory state around the buggy address:
[   16.754467]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.754644]  fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.754847] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.754884]                                                  ^
[   16.754920]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.754961]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.755008] ==================================================================
[   16.761332] ==================================================================
[   16.761378] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.761423] Write of size 1 at addr fff00000c45a8aea by task kunit_try_catch/159
[   16.761470] 
[   16.761499] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.761575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.761630] Hardware name: linux,dummy-virt (DT)
[   16.761669] Call trace:
[   16.761702]  show_stack+0x20/0x38 (C)
[   16.761831]  dump_stack_lvl+0x8c/0xd0
[   16.761890]  print_report+0x118/0x608
[   16.761934]  kasan_report+0xdc/0x128
[   16.761989]  __asan_report_store1_noabort+0x20/0x30
[   16.762039]  krealloc_less_oob_helper+0xae4/0xc50
[   16.762086]  krealloc_less_oob+0x20/0x38
[   16.763068]  kunit_try_run_case+0x170/0x3f0
[   16.763187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.763242]  kthread+0x328/0x630
[   16.763290]  ret_from_fork+0x10/0x20
[   16.763338] 
[   16.763356] Allocated by task 159:
[   16.763400]  kasan_save_stack+0x3c/0x68
[   16.763445]  kasan_save_track+0x20/0x40
[   16.763489]  kasan_save_alloc_info+0x40/0x58
[   16.763538]  __kasan_krealloc+0x118/0x178
[   16.763574]  krealloc_noprof+0x128/0x360
[   16.763611]  krealloc_less_oob_helper+0x168/0xc50
[   16.763648]  krealloc_less_oob+0x20/0x38
[   16.763682]  kunit_try_run_case+0x170/0x3f0
[   16.763718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.763768]  kthread+0x328/0x630
[   16.763807]  ret_from_fork+0x10/0x20
[   16.763850] 
[   16.763868] The buggy address belongs to the object at fff00000c45a8a00
[   16.763868]  which belongs to the cache kmalloc-256 of size 256
[   16.763923] The buggy address is located 33 bytes to the right of
[   16.763923]  allocated 201-byte region [fff00000c45a8a00, fff00000c45a8ac9)
[   16.764011] 
[   16.764054] The buggy address belongs to the physical page:
[   16.764092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.764143] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.764196] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.764246] page_type: f5(slab)
[   16.764291] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.764355] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.764412] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.764468] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.764515] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.764570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.764623] page dumped because: kasan: bad access detected
[   16.764658] 
[   16.764675] Memory state around the buggy address:
[   16.764705]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.764746]  fff00000c45a8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.764786] >fff00000c45a8a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.764822]                                                           ^
[   16.764857]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.764899]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.764944] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   16.782585] ==================================================================
[   16.782691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.782845] Write of size 1 at addr fff00000c78420eb by task kunit_try_catch/161
[   16.782943] 
[   16.783024] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.783128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.783162] Hardware name: linux,dummy-virt (DT)
[   16.783191] Call trace:
[   16.783238]  show_stack+0x20/0x38 (C)
[   16.783287]  dump_stack_lvl+0x8c/0xd0
[   16.783333]  print_report+0x118/0x608
[   16.783523]  kasan_report+0xdc/0x128
[   16.783756]  __asan_report_store1_noabort+0x20/0x30
[   16.783857]  krealloc_more_oob_helper+0x60c/0x678
[   16.784047]  krealloc_large_more_oob+0x20/0x38
[   16.784159]  kunit_try_run_case+0x170/0x3f0
[   16.784260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.784342]  kthread+0x328/0x630
[   16.784382]  ret_from_fork+0x10/0x20
[   16.784712] 
[   16.784744] The buggy address belongs to the physical page:
[   16.784775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.785125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.785292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.785387] page_type: f8(unknown)
[   16.785501] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.785563] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.785628] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.785705] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.785770] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.785837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.785894] page dumped because: kasan: bad access detected
[   16.785939] 
[   16.785966] Memory state around the buggy address:
[   16.786259]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.786308]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.786349] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.786385]                                                           ^
[   16.786577]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.787040]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.787129] ==================================================================
[   16.730892] ==================================================================
[   16.731057] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.731175] Write of size 1 at addr fff00000c45a88f0 by task kunit_try_catch/157
[   16.731257] 
[   16.731294] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.731370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.731395] Hardware name: linux,dummy-virt (DT)
[   16.731545] Call trace:
[   16.731610]  show_stack+0x20/0x38 (C)
[   16.731707]  dump_stack_lvl+0x8c/0xd0
[   16.731772]  print_report+0x118/0x608
[   16.731850]  kasan_report+0xdc/0x128
[   16.731933]  __asan_report_store1_noabort+0x20/0x30
[   16.732038]  krealloc_more_oob_helper+0x5c0/0x678
[   16.732141]  krealloc_more_oob+0x20/0x38
[   16.732238]  kunit_try_run_case+0x170/0x3f0
[   16.732332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.732417]  kthread+0x328/0x630
[   16.732515]  ret_from_fork+0x10/0x20
[   16.732560] 
[   16.732577] Allocated by task 157:
[   16.732603]  kasan_save_stack+0x3c/0x68
[   16.732789]  kasan_save_track+0x20/0x40
[   16.732851]  kasan_save_alloc_info+0x40/0x58
[   16.732950]  __kasan_krealloc+0x118/0x178
[   16.733071]  krealloc_noprof+0x128/0x360
[   16.733147]  krealloc_more_oob_helper+0x168/0x678
[   16.733193]  krealloc_more_oob+0x20/0x38
[   16.733280]  kunit_try_run_case+0x170/0x3f0
[   16.733404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.733489]  kthread+0x328/0x630
[   16.733595]  ret_from_fork+0x10/0x20
[   16.733639] 
[   16.733659] The buggy address belongs to the object at fff00000c45a8800
[   16.733659]  which belongs to the cache kmalloc-256 of size 256
[   16.734043] The buggy address is located 5 bytes to the right of
[   16.734043]  allocated 235-byte region [fff00000c45a8800, fff00000c45a88eb)
[   16.734167] 
[   16.734318] The buggy address belongs to the physical page:
[   16.734358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.734534] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.734804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.734884] page_type: f5(slab)
[   16.734948] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.735009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.735068] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.735115] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.735288] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.735453] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.735550] page dumped because: kasan: bad access detected
[   16.735667] 
[   16.735743] Memory state around the buggy address:
[   16.735864]  fff00000c45a8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.735927]  fff00000c45a8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.736006] >fff00000c45a8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.736144]                                                              ^
[   16.736215]  fff00000c45a8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.736316]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.736381] ==================================================================
[   16.725782] ==================================================================
[   16.725854] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.725924] Write of size 1 at addr fff00000c45a88eb by task kunit_try_catch/157
[   16.725987] 
[   16.726018] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.726095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.726119] Hardware name: linux,dummy-virt (DT)
[   16.726148] Call trace:
[   16.726315]  show_stack+0x20/0x38 (C)
[   16.726445]  dump_stack_lvl+0x8c/0xd0
[   16.726518]  print_report+0x118/0x608
[   16.726674]  kasan_report+0xdc/0x128
[   16.726730]  __asan_report_store1_noabort+0x20/0x30
[   16.726779]  krealloc_more_oob_helper+0x60c/0x678
[   16.726825]  krealloc_more_oob+0x20/0x38
[   16.726868]  kunit_try_run_case+0x170/0x3f0
[   16.726942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.727092]  kthread+0x328/0x630
[   16.727313]  ret_from_fork+0x10/0x20
[   16.727443] 
[   16.727494] Allocated by task 157:
[   16.727566]  kasan_save_stack+0x3c/0x68
[   16.727622]  kasan_save_track+0x20/0x40
[   16.727659]  kasan_save_alloc_info+0x40/0x58
[   16.727697]  __kasan_krealloc+0x118/0x178
[   16.727753]  krealloc_noprof+0x128/0x360
[   16.727789]  krealloc_more_oob_helper+0x168/0x678
[   16.727826]  krealloc_more_oob+0x20/0x38
[   16.728088]  kunit_try_run_case+0x170/0x3f0
[   16.728231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.728287]  kthread+0x328/0x630
[   16.728326]  ret_from_fork+0x10/0x20
[   16.728372] 
[   16.728392] The buggy address belongs to the object at fff00000c45a8800
[   16.728392]  which belongs to the cache kmalloc-256 of size 256
[   16.728458] The buggy address is located 0 bytes to the right of
[   16.728458]  allocated 235-byte region [fff00000c45a8800, fff00000c45a88eb)
[   16.728534] 
[   16.728561] The buggy address belongs to the physical page:
[   16.728592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.728644] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.728690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.728746] page_type: f5(slab)
[   16.728787] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.728846] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.728900] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.728949] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.729017] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.729063] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.729101] page dumped because: kasan: bad access detected
[   16.729136] 
[   16.729158] Memory state around the buggy address:
[   16.729189]  fff00000c45a8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.729244]  fff00000c45a8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.729292] >fff00000c45a8880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.729328]                                                           ^
[   16.729373]  fff00000c45a8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.729422]  fff00000c45a8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.729472] ==================================================================
[   16.788247] ==================================================================
[   16.788317] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.788415] Write of size 1 at addr fff00000c78420f0 by task kunit_try_catch/161
[   16.788493] 
[   16.788540] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.788617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.788670] Hardware name: linux,dummy-virt (DT)
[   16.788719] Call trace:
[   16.788757]  show_stack+0x20/0x38 (C)
[   16.788827]  dump_stack_lvl+0x8c/0xd0
[   16.788933]  print_report+0x118/0x608
[   16.788994]  kasan_report+0xdc/0x128
[   16.789056]  __asan_report_store1_noabort+0x20/0x30
[   16.789106]  krealloc_more_oob_helper+0x5c0/0x678
[   16.789424]  krealloc_large_more_oob+0x20/0x38
[   16.789524]  kunit_try_run_case+0x170/0x3f0
[   16.789570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.789839]  kthread+0x328/0x630
[   16.789933]  ret_from_fork+0x10/0x20
[   16.790025] 
[   16.790075] The buggy address belongs to the physical page:
[   16.790112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.790165] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.790217] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.790307] page_type: f8(unknown)
[   16.790382] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.790441] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.790495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.790542] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.790589] head: 0bfffe0000000002 ffffc1ffc31e1001 00000000ffffffff 00000000ffffffff
[   16.790642] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.790680] page dumped because: kasan: bad access detected
[   16.790730] 
[   16.790749] Memory state around the buggy address:
[   16.790780]  fff00000c7841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.790821]  fff00000c7842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.791085] >fff00000c7842080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.791162]                                                              ^
[   16.791212]  fff00000c7842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.791281]  fff00000c7842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.791330] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   16.717003] ==================================================================
[   16.717077] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   16.717132] Read of size 1 at addr fff00000c7840000 by task kunit_try_catch/155
[   16.717186] 
[   16.717220] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.717326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.717353] Hardware name: linux,dummy-virt (DT)
[   16.717382] Call trace:
[   16.717404]  show_stack+0x20/0x38 (C)
[   16.717461]  dump_stack_lvl+0x8c/0xd0
[   16.717507]  print_report+0x118/0x608
[   16.717550]  kasan_report+0xdc/0x128
[   16.717776]  __asan_report_load1_noabort+0x20/0x30
[   16.717852]  page_alloc_uaf+0x328/0x350
[   16.717896]  kunit_try_run_case+0x170/0x3f0
[   16.717943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.718019]  kthread+0x328/0x630
[   16.718099]  ret_from_fork+0x10/0x20
[   16.718145] 
[   16.718171] The buggy address belongs to the physical page:
[   16.718217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107840
[   16.718270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.718317] page_type: f0(buddy)
[   16.718516] raw: 0bfffe0000000000 fff00000ff616170 fff00000ff616170 0000000000000000
[   16.718568] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   16.718621] page dumped because: kasan: bad access detected
[   16.718697] 
[   16.718774] Memory state around the buggy address:
[   16.718840]  fff00000c783ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.718952]  fff00000c783ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.719028] >fff00000c7840000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.719065]                    ^
[   16.719091]  fff00000c7840080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.719149]  fff00000c7840100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.719186] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   16.701188] ==================================================================
[   16.701292] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   16.701356] Free of addr fff00000c6530001 by task kunit_try_catch/151
[   16.701409] 
[   16.701441] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.701733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.701798] Hardware name: linux,dummy-virt (DT)
[   16.701828] Call trace:
[   16.701850]  show_stack+0x20/0x38 (C)
[   16.701899]  dump_stack_lvl+0x8c/0xd0
[   16.701945]  print_report+0x118/0x608
[   16.702034]  kasan_report_invalid_free+0xc0/0xe8
[   16.702089]  __kasan_kfree_large+0x5c/0xa8
[   16.702135]  free_large_kmalloc+0x64/0x190
[   16.702178]  kfree+0x270/0x3c8
[   16.702492]  kmalloc_large_invalid_free+0x108/0x270
[   16.702558]  kunit_try_run_case+0x170/0x3f0
[   16.702679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.702795]  kthread+0x328/0x630
[   16.702883]  ret_from_fork+0x10/0x20
[   16.703028] 
[   16.703106] The buggy address belongs to the physical page:
[   16.703200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   16.703310] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.703374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.703424] page_type: f8(unknown)
[   16.703482] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.703530] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.703576] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.703633] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.703680] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff
[   16.703733] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.703771] page dumped because: kasan: bad access detected
[   16.703801] 
[   16.703818] Memory state around the buggy address:
[   16.703991]  fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.704057]  fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.704156] >fff00000c6530000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704261]                    ^
[   16.704298]  fff00000c6530080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704355]  fff00000c6530100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.704500] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   16.693889] ==================================================================
[   16.694213] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   16.694288] Read of size 1 at addr fff00000c6530000 by task kunit_try_catch/149
[   16.694355] 
[   16.694403] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.694541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.694567] Hardware name: linux,dummy-virt (DT)
[   16.694596] Call trace:
[   16.694627]  show_stack+0x20/0x38 (C)
[   16.694724]  dump_stack_lvl+0x8c/0xd0
[   16.695029]  print_report+0x118/0x608
[   16.695147]  kasan_report+0xdc/0x128
[   16.695284]  __asan_report_load1_noabort+0x20/0x30
[   16.695375]  kmalloc_large_uaf+0x2cc/0x2f8
[   16.695460]  kunit_try_run_case+0x170/0x3f0
[   16.695547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.695671]  kthread+0x328/0x630
[   16.695749]  ret_from_fork+0x10/0x20
[   16.695817] 
[   16.695836] The buggy address belongs to the physical page:
[   16.695891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   16.695943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.696012] raw: 0bfffe0000000000 fff00000da456c40 fff00000da456c40 0000000000000000
[   16.696060] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.696098] page dumped because: kasan: bad access detected
[   16.696127] 
[   16.696329] Memory state around the buggy address:
[   16.696421]  fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696516]  fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696599] >fff00000c6530000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.696673]                    ^
[   16.696758]  fff00000c6530080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.696814]  fff00000c6530100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.696871] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   16.684351] ==================================================================
[   16.684417] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.684480] Write of size 1 at addr fff00000c653200a by task kunit_try_catch/147
[   16.684537] 
[   16.684605] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.684722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.684747] Hardware name: linux,dummy-virt (DT)
[   16.684776] Call trace:
[   16.684814]  show_stack+0x20/0x38 (C)
[   16.684943]  dump_stack_lvl+0x8c/0xd0
[   16.685030]  print_report+0x118/0x608
[   16.685090]  kasan_report+0xdc/0x128
[   16.685134]  __asan_report_store1_noabort+0x20/0x30
[   16.685193]  kmalloc_large_oob_right+0x278/0x2b8
[   16.685249]  kunit_try_run_case+0x170/0x3f0
[   16.685294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.685353]  kthread+0x328/0x630
[   16.685392]  ret_from_fork+0x10/0x20
[   16.685445] 
[   16.685488] The buggy address belongs to the physical page:
[   16.685520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   16.685570] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.685621] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.685677] page_type: f8(unknown)
[   16.685713] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.685809] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.685911] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.686067] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.686211] head: 0bfffe0000000002 ffffc1ffc3194c01 00000000ffffffff 00000000ffffffff
[   16.686304] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.686418] page dumped because: kasan: bad access detected
[   16.686477] 
[   16.686528] Memory state around the buggy address:
[   16.686961]  fff00000c6531f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.687021]  fff00000c6531f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.687062] >fff00000c6532000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.687098]                       ^
[   16.687126]  fff00000c6532080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.687166]  fff00000c6532100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.687202] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   16.669330] ==================================================================
[   16.669394] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   16.669445] Write of size 1 at addr fff00000c6595f00 by task kunit_try_catch/145
[   16.669493] 
[   16.669524] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.669603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.669634] Hardware name: linux,dummy-virt (DT)
[   16.669663] Call trace:
[   16.669684]  show_stack+0x20/0x38 (C)
[   16.669728]  dump_stack_lvl+0x8c/0xd0
[   16.669772]  print_report+0x118/0x608
[   16.669814]  kasan_report+0xdc/0x128
[   16.669856]  __asan_report_store1_noabort+0x20/0x30
[   16.669904]  kmalloc_big_oob_right+0x2a4/0x2f0
[   16.669947]  kunit_try_run_case+0x170/0x3f0
[   16.670218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.670285]  kthread+0x328/0x630
[   16.670328]  ret_from_fork+0x10/0x20
[   16.670372] 
[   16.670390] Allocated by task 145:
[   16.670416]  kasan_save_stack+0x3c/0x68
[   16.670455]  kasan_save_track+0x20/0x40
[   16.670491]  kasan_save_alloc_info+0x40/0x58
[   16.670528]  __kasan_kmalloc+0xd4/0xd8
[   16.670563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.670680]  kmalloc_big_oob_right+0xb8/0x2f0
[   16.672834]  kunit_try_run_case+0x170/0x3f0
[   16.673997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.674054]  kthread+0x328/0x630
[   16.674099]  ret_from_fork+0x10/0x20
[   16.674136] 
[   16.674157] The buggy address belongs to the object at fff00000c6594000
[   16.674157]  which belongs to the cache kmalloc-8k of size 8192
[   16.674213] The buggy address is located 0 bytes to the right of
[   16.674213]  allocated 7936-byte region [fff00000c6594000, fff00000c6595f00)
[   16.674274] 
[   16.674292] The buggy address belongs to the physical page:
[   16.674332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106590
[   16.674394] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.674501] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.674556] page_type: f5(slab)
[   16.674593] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.674640] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.674687] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.674733] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.674780] head: 0bfffe0000000003 ffffc1ffc3196401 00000000ffffffff 00000000ffffffff
[   16.676536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.676658] page dumped because: kasan: bad access detected
[   16.676693] 
[   16.676711] Memory state around the buggy address:
[   16.676743]  fff00000c6595e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.676785]  fff00000c6595e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.677683] >fff00000c6595f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678081]                    ^
[   16.678124]  fff00000c6595f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678595]  fff00000c6596000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.679057] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   16.656266] ==================================================================
[   16.656324] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.656372] Write of size 1 at addr fff00000c635a878 by task kunit_try_catch/143
[   16.656791] 
[   16.656836] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.656916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.656942] Hardware name: linux,dummy-virt (DT)
[   16.657068] Call trace:
[   16.657095]  show_stack+0x20/0x38 (C)
[   16.657160]  dump_stack_lvl+0x8c/0xd0
[   16.657350]  print_report+0x118/0x608
[   16.657396]  kasan_report+0xdc/0x128
[   16.657442]  __asan_report_store1_noabort+0x20/0x30
[   16.657651]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.657716]  kunit_try_run_case+0x170/0x3f0
[   16.657761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.657811]  kthread+0x328/0x630
[   16.657850]  ret_from_fork+0x10/0x20
[   16.657895] 
[   16.657913] Allocated by task 143:
[   16.657948]  kasan_save_stack+0x3c/0x68
[   16.658000]  kasan_save_track+0x20/0x40
[   16.658036]  kasan_save_alloc_info+0x40/0x58
[   16.658074]  __kasan_kmalloc+0xd4/0xd8
[   16.658113]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.658156]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.658195]  kunit_try_run_case+0x170/0x3f0
[   16.658241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.658282]  kthread+0x328/0x630
[   16.658313]  ret_from_fork+0x10/0x20
[   16.658346] 
[   16.658371] The buggy address belongs to the object at fff00000c635a800
[   16.658371]  which belongs to the cache kmalloc-128 of size 128
[   16.658434] The buggy address is located 0 bytes to the right of
[   16.658434]  allocated 120-byte region [fff00000c635a800, fff00000c635a878)
[   16.658495] 
[   16.658526] The buggy address belongs to the physical page:
[   16.658555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.658605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.658926] page_type: f5(slab)
[   16.659315] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.659504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.659592] page dumped because: kasan: bad access detected
[   16.659747] 
[   16.659818] Memory state around the buggy address:
[   16.659895]  fff00000c635a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.660056]  fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.660099] >fff00000c635a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.660323]                                                                 ^
[   16.660503]  fff00000c635a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.660570]  fff00000c635a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.660699] ==================================================================
[   16.649195] ==================================================================
[   16.649378] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.649530] Write of size 1 at addr fff00000c635a778 by task kunit_try_catch/143
[   16.649584] 
[   16.649638] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.649725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.649751] Hardware name: linux,dummy-virt (DT)
[   16.649779] Call trace:
[   16.649800]  show_stack+0x20/0x38 (C)
[   16.650106]  dump_stack_lvl+0x8c/0xd0
[   16.650439]  print_report+0x118/0x608
[   16.650499]  kasan_report+0xdc/0x128
[   16.650543]  __asan_report_store1_noabort+0x20/0x30
[   16.650659]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.650759]  kunit_try_run_case+0x170/0x3f0
[   16.650955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.651033]  kthread+0x328/0x630
[   16.651183]  ret_from_fork+0x10/0x20
[   16.651346] 
[   16.651395] Allocated by task 143:
[   16.651500]  kasan_save_stack+0x3c/0x68
[   16.651579]  kasan_save_track+0x20/0x40
[   16.651671]  kasan_save_alloc_info+0x40/0x58
[   16.651810]  __kasan_kmalloc+0xd4/0xd8
[   16.651886]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.652011]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.652052]  kunit_try_run_case+0x170/0x3f0
[   16.652104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.652450]  kthread+0x328/0x630
[   16.652504]  ret_from_fork+0x10/0x20
[   16.652615] 
[   16.652654] The buggy address belongs to the object at fff00000c635a700
[   16.652654]  which belongs to the cache kmalloc-128 of size 128
[   16.652744] The buggy address is located 0 bytes to the right of
[   16.652744]  allocated 120-byte region [fff00000c635a700, fff00000c635a778)
[   16.652894] 
[   16.652915] The buggy address belongs to the physical page:
[   16.652962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.653286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.653380] page_type: f5(slab)
[   16.653419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.653724] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.653843] page dumped because: kasan: bad access detected
[   16.653925] 
[   16.653963] Memory state around the buggy address:
[   16.654079]  fff00000c635a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.654145]  fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654223] >fff00000c635a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.654367]                                                                 ^
[   16.654419]  fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654466]  fff00000c635a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654716] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   16.634926] ==================================================================
[   16.635321] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.635480] Read of size 1 at addr fff00000c650f000 by task kunit_try_catch/141
[   16.635565] 
[   16.635883] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.635989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.636016] Hardware name: linux,dummy-virt (DT)
[   16.636045] Call trace:
[   16.636067]  show_stack+0x20/0x38 (C)
[   16.636165]  dump_stack_lvl+0x8c/0xd0
[   16.636214]  print_report+0x118/0x608
[   16.636268]  kasan_report+0xdc/0x128
[   16.636311]  __asan_report_load1_noabort+0x20/0x30
[   16.636359]  kmalloc_node_oob_right+0x2f4/0x330
[   16.636405]  kunit_try_run_case+0x170/0x3f0
[   16.636451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.636501]  kthread+0x328/0x630
[   16.636541]  ret_from_fork+0x10/0x20
[   16.636587] 
[   16.636606] Allocated by task 141:
[   16.636641]  kasan_save_stack+0x3c/0x68
[   16.636680]  kasan_save_track+0x20/0x40
[   16.636724]  kasan_save_alloc_info+0x40/0x58
[   16.636762]  __kasan_kmalloc+0xd4/0xd8
[   16.636802]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   16.636841]  kmalloc_node_oob_right+0xbc/0x330
[   16.636878]  kunit_try_run_case+0x170/0x3f0
[   16.636922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.636963]  kthread+0x328/0x630
[   16.637004]  ret_from_fork+0x10/0x20
[   16.637037] 
[   16.637055] The buggy address belongs to the object at fff00000c650e000
[   16.637055]  which belongs to the cache kmalloc-4k of size 4096
[   16.637109] The buggy address is located 0 bytes to the right of
[   16.637109]  allocated 4096-byte region [fff00000c650e000, fff00000c650f000)
[   16.637171] 
[   16.637190] The buggy address belongs to the physical page:
[   16.637282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106508
[   16.637457] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.637504] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.637580] page_type: f5(slab)
[   16.637622] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.637680] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.637753] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.637801] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.637849] head: 0bfffe0000000003 ffffc1ffc3194201 00000000ffffffff 00000000ffffffff
[   16.637897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.637953] page dumped because: kasan: bad access detected
[   16.638809] 
[   16.638835] Memory state around the buggy address:
[   16.638896]  fff00000c650ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.638953]  fff00000c650ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.639015] >fff00000c650f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.639099]                    ^
[   16.639127]  fff00000c650f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.639503]  fff00000c650f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.639671] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   16.622390] ==================================================================
[   16.622461] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   16.622770] Read of size 1 at addr fff00000c5fbe79f by task kunit_try_catch/139
[   16.623023] 
[   16.623128] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.623316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.623366] Hardware name: linux,dummy-virt (DT)
[   16.623398] Call trace:
[   16.623419]  show_stack+0x20/0x38 (C)
[   16.623819]  dump_stack_lvl+0x8c/0xd0
[   16.623902]  print_report+0x118/0x608
[   16.624033]  kasan_report+0xdc/0x128
[   16.624085]  __asan_report_load1_noabort+0x20/0x30
[   16.624150]  kmalloc_oob_left+0x2ec/0x320
[   16.624194]  kunit_try_run_case+0x170/0x3f0
[   16.624242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.624298]  kthread+0x328/0x630
[   16.624344]  ret_from_fork+0x10/0x20
[   16.624400] 
[   16.624424] Allocated by task 9:
[   16.624459]  kasan_save_stack+0x3c/0x68
[   16.624508]  kasan_save_track+0x20/0x40
[   16.624543]  kasan_save_alloc_info+0x40/0x58
[   16.624587]  __kasan_kmalloc+0xd4/0xd8
[   16.624631]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.624690]  kvasprintf+0xe0/0x180
[   16.624724]  __kthread_create_on_node+0x16c/0x350
[   16.624770]  kthread_create_on_node+0xe4/0x130
[   16.624807]  create_worker+0x380/0x6b8
[   16.624851]  worker_thread+0x808/0xf38
[   16.624884]  kthread+0x328/0x630
[   16.624916]  ret_from_fork+0x10/0x20
[   16.624950] 
[   16.624968] The buggy address belongs to the object at fff00000c5fbe780
[   16.624968]  which belongs to the cache kmalloc-16 of size 16
[   16.625473] The buggy address is located 19 bytes to the right of
[   16.625473]  allocated 12-byte region [fff00000c5fbe780, fff00000c5fbe78c)
[   16.625559] 
[   16.625731] The buggy address belongs to the physical page:
[   16.625825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe
[   16.626014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.626099] page_type: f5(slab)
[   16.626245] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.626343] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.626447] page dumped because: kasan: bad access detected
[   16.626539] 
[   16.626582] Memory state around the buggy address:
[   16.626902]  fff00000c5fbe680: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   16.626994]  fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.627050] >fff00000c5fbe780: 00 04 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   16.627185]                             ^
[   16.627274]  fff00000c5fbe800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.627393]  fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.627429] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   16.586661] ==================================================================
[   16.587037] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.587840] Write of size 1 at addr fff00000c635a673 by task kunit_try_catch/137
[   16.587943] 
[   16.588698] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc5 #1 PREEMPT 
[   16.588840] Tainted: [N]=TEST
[   16.588873] Hardware name: linux,dummy-virt (DT)
[   16.589106] Call trace:
[   16.589273]  show_stack+0x20/0x38 (C)
[   16.589405]  dump_stack_lvl+0x8c/0xd0
[   16.589464]  print_report+0x118/0x608
[   16.589510]  kasan_report+0xdc/0x128
[   16.589554]  __asan_report_store1_noabort+0x20/0x30
[   16.589604]  kmalloc_oob_right+0x5a4/0x660
[   16.589654]  kunit_try_run_case+0x170/0x3f0
[   16.589703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.589754]  kthread+0x328/0x630
[   16.589797]  ret_from_fork+0x10/0x20
[   16.589949] 
[   16.589997] Allocated by task 137:
[   16.590110]  kasan_save_stack+0x3c/0x68
[   16.590173]  kasan_save_track+0x20/0x40
[   16.590210]  kasan_save_alloc_info+0x40/0x58
[   16.590248]  __kasan_kmalloc+0xd4/0xd8
[   16.590283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.590322]  kmalloc_oob_right+0xb0/0x660
[   16.590356]  kunit_try_run_case+0x170/0x3f0
[   16.590392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.590434]  kthread+0x328/0x630
[   16.590464]  ret_from_fork+0x10/0x20
[   16.590516] 
[   16.590574] The buggy address belongs to the object at fff00000c635a600
[   16.590574]  which belongs to the cache kmalloc-128 of size 128
[   16.590722] The buggy address is located 0 bytes to the right of
[   16.590722]  allocated 115-byte region [fff00000c635a600, fff00000c635a673)
[   16.590792] 
[   16.590884] The buggy address belongs to the physical page:
[   16.591068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.591329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.591608] page_type: f5(slab)
[   16.591910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.591973] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.592090] page dumped because: kasan: bad access detected
[   16.592128] 
[   16.592153] Memory state around the buggy address:
[   16.592371]  fff00000c635a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.592434]  fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592486] >fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.592538]                                                              ^
[   16.592617]  fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592658]  fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592716] ==================================================================
[   16.599524] ==================================================================
[   16.599570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.599911] Read of size 1 at addr fff00000c635a680 by task kunit_try_catch/137
[   16.600103] 
[   16.600142] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.600376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.600443] Hardware name: linux,dummy-virt (DT)
[   16.600473] Call trace:
[   16.600493]  show_stack+0x20/0x38 (C)
[   16.600764]  dump_stack_lvl+0x8c/0xd0
[   16.601103]  print_report+0x118/0x608
[   16.601177]  kasan_report+0xdc/0x128
[   16.601340]  __asan_report_load1_noabort+0x20/0x30
[   16.601522]  kmalloc_oob_right+0x5d0/0x660
[   16.601655]  kunit_try_run_case+0x170/0x3f0
[   16.601705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.601756]  kthread+0x328/0x630
[   16.602126]  ret_from_fork+0x10/0x20
[   16.602196] 
[   16.602214] Allocated by task 137:
[   16.602240]  kasan_save_stack+0x3c/0x68
[   16.602525]  kasan_save_track+0x20/0x40
[   16.602716]  kasan_save_alloc_info+0x40/0x58
[   16.602833]  __kasan_kmalloc+0xd4/0xd8
[   16.602919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.603048]  kmalloc_oob_right+0xb0/0x660
[   16.603088]  kunit_try_run_case+0x170/0x3f0
[   16.603136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.603184]  kthread+0x328/0x630
[   16.603214]  ret_from_fork+0x10/0x20
[   16.603248] 
[   16.603267] The buggy address belongs to the object at fff00000c635a600
[   16.603267]  which belongs to the cache kmalloc-128 of size 128
[   16.603322] The buggy address is located 13 bytes to the right of
[   16.603322]  allocated 115-byte region [fff00000c635a600, fff00000c635a673)
[   16.603384] 
[   16.603404] The buggy address belongs to the physical page:
[   16.603434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.603835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.603902] page_type: f5(slab)
[   16.603942] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.604255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.604376] page dumped because: kasan: bad access detected
[   16.604448] 
[   16.604466] Memory state around the buggy address:
[   16.604517]  fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.604943]  fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.605041] >fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605186]                    ^
[   16.605216]  fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605502]  fff00000c635a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.605581] ==================================================================
[   16.593432] ==================================================================
[   16.593475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.593519] Write of size 1 at addr fff00000c635a678 by task kunit_try_catch/137
[   16.593694] 
[   16.593728] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.593807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.593832] Hardware name: linux,dummy-virt (DT)
[   16.593860] Call trace:
[   16.593880]  show_stack+0x20/0x38 (C)
[   16.593927]  dump_stack_lvl+0x8c/0xd0
[   16.594253]  print_report+0x118/0x608
[   16.594726]  kasan_report+0xdc/0x128
[   16.594920]  __asan_report_store1_noabort+0x20/0x30
[   16.594991]  kmalloc_oob_right+0x538/0x660
[   16.595319]  kunit_try_run_case+0x170/0x3f0
[   16.595406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.596018]  kthread+0x328/0x630
[   16.596074]  ret_from_fork+0x10/0x20
[   16.596161] 
[   16.596204] Allocated by task 137:
[   16.596390]  kasan_save_stack+0x3c/0x68
[   16.596437]  kasan_save_track+0x20/0x40
[   16.596551]  kasan_save_alloc_info+0x40/0x58
[   16.596657]  __kasan_kmalloc+0xd4/0xd8
[   16.597013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.597088]  kmalloc_oob_right+0xb0/0x660
[   16.597124]  kunit_try_run_case+0x170/0x3f0
[   16.597199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.597246]  kthread+0x328/0x630
[   16.597277]  ret_from_fork+0x10/0x20
[   16.597311] 
[   16.597337] The buggy address belongs to the object at fff00000c635a600
[   16.597337]  which belongs to the cache kmalloc-128 of size 128
[   16.597403] The buggy address is located 5 bytes to the right of
[   16.597403]  allocated 115-byte region [fff00000c635a600, fff00000c635a673)
[   16.597465] 
[   16.597483] The buggy address belongs to the physical page:
[   16.597511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.597566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.597628] page_type: f5(slab)
[   16.597664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.597722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.597760] page dumped because: kasan: bad access detected
[   16.597799] 
[   16.597823] Memory state around the buggy address:
[   16.597853]  fff00000c635a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.597894]  fff00000c635a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.597935] >fff00000c635a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.597970]                                                                 ^
[   16.598035]  fff00000c635a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.598076]  fff00000c635a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.598111] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   95.178653] WARNING: CPU: 1 PID: 657 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   95.180040] Modules linked in:
[   95.180252] CPU: 1 UID: 0 PID: 657 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc5 #1 PREEMPT 
[   95.180779] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   95.181130] Hardware name: linux,dummy-virt (DT)
[   95.181399] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.181773] pc : intlog10+0x38/0x48
[   95.182011] lr : intlog10_test+0xe4/0x200
[   95.182260] sp : ffff8000821f7c10
[   95.182467] x29: ffff8000821f7c90 x28: 0000000000000000 x27: 0000000000000000
[   95.182913] x26: 1ffe000018ae94c1 x25: 0000000000000000 x24: ffff8000821f7ce0
[   95.183305] x23: ffff8000821f7d00 x22: 0000000000000000 x21: 1ffff0001043ef82
[   95.183647] x20: ffff91dea1689e80 x19: ffff800080087990 x18: 000000009a2e7f45
[   95.184132] x17: 00000000fc3d57f6 x16: fff00000c0975c3c x15: fff00000ff616b08
[   95.184606] x14: 00000000f1f1f1f1 x13: 1ffe00001b48a5cd x12: ffff723bd4aa3379
[   95.185137] x11: 1ffff23bd4aa3378 x10: ffff723bd4aa3378 x9 : ffff91de9ec35fdc
[   95.185598] x8 : ffff91dea5519bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.186025] x5 : ffff70001043ef82 x4 : 1ffff00010010f3a x3 : 1ffff23bd42d13d0
[   95.186440] x2 : 1ffff23bd42d13d0 x1 : 0000000000000003 x0 : 0000000000000000
[   95.187049] Call trace:
[   95.187190]  intlog10+0x38/0x48 (P)
[   95.188410]  kunit_try_run_case+0x170/0x3f0
[   95.188645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.188887]  kthread+0x328/0x630
[   95.189082]  ret_from_fork+0x10/0x20
[   95.189276] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   95.131065] WARNING: CPU: 1 PID: 639 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   95.135168] Modules linked in:
[   95.135919] CPU: 1 UID: 0 PID: 639 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc5 #1 PREEMPT 
[   95.137073] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   95.137301] Hardware name: linux,dummy-virt (DT)
[   95.137504] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.137788] pc : intlog2+0xd8/0xf8
[   95.137998] lr : intlog2_test+0xe4/0x200
[   95.138888] sp : ffff800082157c10
[   95.139439] x29: ffff800082157c90 x28: 0000000000000000 x27: 0000000000000000
[   95.140587] x26: 1ffe000018b856c1 x25: 0000000000000000 x24: ffff800082157ce0
[   95.141462] x23: ffff800082157d00 x22: 0000000000000000 x21: 1ffff0001042af82
[   95.142259] x20: ffff91dea1689d80 x19: ffff800080087990 x18: 000000006f585566
[   95.143185] x17: 000000000cfdaa41 x16: fff00000c0975c3c x15: fff00000ff616b08
[   95.144131] x14: 0000000000018fff x13: 1ffe00001b48a5cd x12: ffff723bd4aa3379
[   95.144896] x11: 1ffff23bd4aa3378 x10: ffff723bd4aa3378 x9 : ffff91de9ec361dc
[   95.145649] x8 : ffff91dea5519bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.146175] x5 : ffff70001042af82 x4 : 1ffff00010010f3a x3 : 1ffff23bd42d13b0
[   95.146520] x2 : 1ffff23bd42d13b0 x1 : 0000000000000003 x0 : 0000000000000000
[   95.146870] Call trace:
[   95.147032]  intlog2+0xd8/0xf8 (P)
[   95.147259]  kunit_try_run_case+0x170/0x3f0
[   95.147490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.147816]  kthread+0x328/0x630
[   95.148056]  ret_from_fork+0x10/0x20
[   95.148484] ---[ end trace 0000000000000000 ]---