Hay
Date
July 6, 2025, 11:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   25.041771] ==================================================================
[   25.053177] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   25.060406] Write of size 2 at addr ffff8881066f8277 by task kunit_try_catch/213
[   25.067806] 
[   25.069306] CPU: 3 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   25.069315] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   25.069318] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.069321] Call Trace:
[   25.069323]  <TASK>
[   25.069325]  dump_stack_lvl+0x73/0xb0
[   25.069346]  print_report+0xd1/0x650
[   25.069351]  ? __virt_addr_valid+0x1db/0x2d0
[   25.069355]  ? kmalloc_oob_memset_2+0x166/0x330
[   25.069359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.069364]  ? kmalloc_oob_memset_2+0x166/0x330
[   25.069368]  kasan_report+0x141/0x180
[   25.069372]  ? kmalloc_oob_memset_2+0x166/0x330
[   25.069377]  kasan_check_range+0x10c/0x1c0
[   25.069394]  __asan_memset+0x27/0x50
[   25.069397]  kmalloc_oob_memset_2+0x166/0x330
[   25.069401]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   25.069406]  ? __schedule+0x10cc/0x2b60
[   25.069410]  ? ktime_get_ts64+0x83/0x230
[   25.069414]  kunit_try_run_case+0x1a2/0x480
[   25.069418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.069422]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.069427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.069431]  ? __kthread_parkme+0x82/0x180
[   25.069434]  ? preempt_count_sub+0x50/0x80
[   25.069438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.069443]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.069447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.069451]  kthread+0x334/0x6f0
[   25.069455]  ? trace_preempt_on+0x20/0xc0
[   25.069459]  ? __pfx_kthread+0x10/0x10
[   25.069462]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.069466]  ? calculate_sigpending+0x7b/0xa0
[   25.069471]  ? __pfx_kthread+0x10/0x10
[   25.069474]  ret_from_fork+0x113/0x1d0
[   25.069478]  ? __pfx_kthread+0x10/0x10
[   25.069481]  ret_from_fork_asm+0x1a/0x30
[   25.069487]  </TASK>
[   25.069489] 
[   25.238581] Allocated by task 213:
[   25.241987]  kasan_save_stack+0x45/0x70
[   25.245827]  kasan_save_track+0x18/0x40
[   25.249666]  kasan_save_alloc_info+0x3b/0x50
[   25.253941]  __kasan_kmalloc+0xb7/0xc0
[   25.257692]  __kmalloc_cache_noprof+0x189/0x420
[   25.262223]  kmalloc_oob_memset_2+0xac/0x330
[   25.266497]  kunit_try_run_case+0x1a2/0x480
[   25.270683]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.276083]  kthread+0x334/0x6f0
[   25.279316]  ret_from_fork+0x113/0x1d0
[   25.283103]  ret_from_fork_asm+0x1a/0x30
[   25.287030] 
[   25.288527] The buggy address belongs to the object at ffff8881066f8200
[   25.288527]  which belongs to the cache kmalloc-128 of size 128
[   25.301041] The buggy address is located 119 bytes inside of
[   25.301041]  allocated 120-byte region [ffff8881066f8200, ffff8881066f8278)
[   25.313645] 
[   25.315143] The buggy address belongs to the physical page:
[   25.320717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   25.328725] flags: 0x200000000000000(node=0|zone=2)
[   25.333604] page_type: f5(slab)
[   25.336751] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   25.344498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.352236] page dumped because: kasan: bad access detected
[   25.357809] 
[   25.359309] Memory state around the buggy address:
[   25.364100]  ffff8881066f8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.371320]  ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.378567] >ffff8881066f8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.385786]                                                                 ^
[   25.392919]  ffff8881066f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400136]  ffff8881066f8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.407361] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   24.668454] ==================================================================
[   24.679274] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   24.686589] Write of size 128 at addr ffff8881066f8100 by task kunit_try_catch/211
[   24.694160] 
[   24.695663] CPU: 3 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   24.695672] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   24.695675] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.695678] Call Trace:
[   24.695680]  <TASK>
[   24.695682]  dump_stack_lvl+0x73/0xb0
[   24.695686]  print_report+0xd1/0x650
[   24.695690]  ? __virt_addr_valid+0x1db/0x2d0
[   24.695694]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.695698]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.695703]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.695707]  kasan_report+0x141/0x180
[   24.695711]  ? kmalloc_oob_in_memset+0x15f/0x320
[   24.695716]  kasan_check_range+0x10c/0x1c0
[   24.695721]  __asan_memset+0x27/0x50
[   24.695724]  kmalloc_oob_in_memset+0x15f/0x320
[   24.695728]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   24.695732]  ? __schedule+0x10cc/0x2b60
[   24.695736]  ? ktime_get_ts64+0x83/0x230
[   24.695740]  kunit_try_run_case+0x1a2/0x480
[   24.695745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.695749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.695753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.695757]  ? __kthread_parkme+0x82/0x180
[   24.695761]  ? preempt_count_sub+0x50/0x80
[   24.695765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.695769]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.695773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.695777]  kthread+0x334/0x6f0
[   24.695781]  ? trace_preempt_on+0x20/0xc0
[   24.695785]  ? __pfx_kthread+0x10/0x10
[   24.695789]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.695792]  ? calculate_sigpending+0x7b/0xa0
[   24.695797]  ? __pfx_kthread+0x10/0x10
[   24.695801]  ret_from_fork+0x113/0x1d0
[   24.695804]  ? __pfx_kthread+0x10/0x10
[   24.695807]  ret_from_fork_asm+0x1a/0x30
[   24.695813]  </TASK>
[   24.695815] 
[   24.865224] Allocated by task 211:
[   24.868629]  kasan_save_stack+0x45/0x70
[   24.872468]  kasan_save_track+0x18/0x40
[   24.876310]  kasan_save_alloc_info+0x3b/0x50
[   24.880589]  __kasan_kmalloc+0xb7/0xc0
[   24.884368]  __kmalloc_cache_noprof+0x189/0x420
[   24.888927]  kmalloc_oob_in_memset+0xac/0x320
[   24.893285]  kunit_try_run_case+0x1a2/0x480
[   24.897471]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.902870]  kthread+0x334/0x6f0
[   24.906104]  ret_from_fork+0x113/0x1d0
[   24.909856]  ret_from_fork_asm+0x1a/0x30
[   24.913782] 
[   24.915283] The buggy address belongs to the object at ffff8881066f8100
[   24.915283]  which belongs to the cache kmalloc-128 of size 128
[   24.927799] The buggy address is located 0 bytes inside of
[   24.927799]  allocated 120-byte region [ffff8881066f8100, ffff8881066f8178)
[   24.940234] 
[   24.941733] The buggy address belongs to the physical page:
[   24.947305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   24.955306] flags: 0x200000000000000(node=0|zone=2)
[   24.960185] page_type: f5(slab)
[   24.963349] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   24.971148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.978886] page dumped because: kasan: bad access detected
[   24.984461] 
[   24.985957] Memory state around the buggy address:
[   24.990752]  ffff8881066f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.997980]  ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.005199] >ffff8881066f8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.012418]                                                                 ^
[   25.019549]  ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.026770]  ffff8881066f8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.033990] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   24.259101] ==================================================================
[   24.269913] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   24.276699] Read of size 16 at addr ffff888100c91680 by task kunit_try_catch/209
[   24.284091] 
[   24.285594] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   24.285603] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   24.285606] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.285609] Call Trace:
[   24.285611]  <TASK>
[   24.285613]  dump_stack_lvl+0x73/0xb0
[   24.285617]  print_report+0xd1/0x650
[   24.285621]  ? __virt_addr_valid+0x1db/0x2d0
[   24.285626]  ? kmalloc_uaf_16+0x47b/0x4c0
[   24.285629]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.285634]  ? kmalloc_uaf_16+0x47b/0x4c0
[   24.285638]  kasan_report+0x141/0x180
[   24.285642]  ? kmalloc_uaf_16+0x47b/0x4c0
[   24.285646]  __asan_report_load16_noabort+0x18/0x20
[   24.285651]  kmalloc_uaf_16+0x47b/0x4c0
[   24.285655]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   24.285659]  ? __schedule+0x10cc/0x2b60
[   24.285663]  ? ktime_get_ts64+0x83/0x230
[   24.285667]  kunit_try_run_case+0x1a2/0x480
[   24.285672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.285676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.285680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.285684]  ? __kthread_parkme+0x82/0x180
[   24.285688]  ? preempt_count_sub+0x50/0x80
[   24.285692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.285696]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.285701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.285705]  kthread+0x334/0x6f0
[   24.285708]  ? trace_preempt_on+0x20/0xc0
[   24.285712]  ? __pfx_kthread+0x10/0x10
[   24.285716]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.285720]  ? calculate_sigpending+0x7b/0xa0
[   24.285724]  ? __pfx_kthread+0x10/0x10
[   24.285728]  ret_from_fork+0x113/0x1d0
[   24.285731]  ? __pfx_kthread+0x10/0x10
[   24.285735]  ret_from_fork_asm+0x1a/0x30
[   24.285741]  </TASK>
[   24.285742] 
[   24.449259] Allocated by task 209:
[   24.452668]  kasan_save_stack+0x45/0x70
[   24.456513]  kasan_save_track+0x18/0x40
[   24.460363]  kasan_save_alloc_info+0x3b/0x50
[   24.464661]  __kasan_kmalloc+0xb7/0xc0
[   24.468415]  __kmalloc_cache_noprof+0x189/0x420
[   24.472956]  kmalloc_uaf_16+0x15b/0x4c0
[   24.476794]  kunit_try_run_case+0x1a2/0x480
[   24.480979]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.486392]  kthread+0x334/0x6f0
[   24.489630]  ret_from_fork+0x113/0x1d0
[   24.493406]  ret_from_fork_asm+0x1a/0x30
[   24.497362] 
[   24.498886] Freed by task 209:
[   24.501946]  kasan_save_stack+0x45/0x70
[   24.505783]  kasan_save_track+0x18/0x40
[   24.509625]  kasan_save_free_info+0x3f/0x60
[   24.513816]  __kasan_slab_free+0x56/0x70
[   24.517743]  kfree+0x222/0x3f0
[   24.520802]  kmalloc_uaf_16+0x1d6/0x4c0
[   24.524642]  kunit_try_run_case+0x1a2/0x480
[   24.528828]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.534229]  kthread+0x334/0x6f0
[   24.537460]  ret_from_fork+0x113/0x1d0
[   24.541212]  ret_from_fork_asm+0x1a/0x30
[   24.545140] 
[   24.546637] The buggy address belongs to the object at ffff888100c91680
[   24.546637]  which belongs to the cache kmalloc-16 of size 16
[   24.558972] The buggy address is located 0 bytes inside of
[   24.558972]  freed 16-byte region [ffff888100c91680, ffff888100c91690)
[   24.570967] 
[   24.572466] The buggy address belongs to the physical page:
[   24.578039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c91
[   24.586044] flags: 0x200000000000000(node=0|zone=2)
[   24.590925] page_type: f5(slab)
[   24.594073] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   24.601820] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.609559] page dumped because: kasan: bad access detected
[   24.615131] 
[   24.616629] Memory state around the buggy address:
[   24.621424]  ffff888100c91580: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 00 fc fc
[   24.628644]  ffff888100c91600: 00 00 fc fc 00 04 fc fc 00 06 fc fc 00 00 fc fc
[   24.635871] >ffff888100c91680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.643090]                    ^
[   24.646322]  ffff888100c91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.653568]  ffff888100c91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.660785] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   23.895081] ==================================================================
[   23.905706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   23.912408] Write of size 16 at addr ffff888106713140 by task kunit_try_catch/207
[   23.919894] 
[   23.921410] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   23.921419] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   23.921421] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.921424] Call Trace:
[   23.921426]  <TASK>
[   23.921428]  dump_stack_lvl+0x73/0xb0
[   23.921433]  print_report+0xd1/0x650
[   23.921437]  ? __virt_addr_valid+0x1db/0x2d0
[   23.921441]  ? kmalloc_oob_16+0x452/0x4a0
[   23.921445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.921450]  ? kmalloc_oob_16+0x452/0x4a0
[   23.921453]  kasan_report+0x141/0x180
[   23.921457]  ? kmalloc_oob_16+0x452/0x4a0
[   23.921462]  __asan_report_store16_noabort+0x1b/0x30
[   23.921467]  kmalloc_oob_16+0x452/0x4a0
[   23.921470]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   23.921474]  ? __schedule+0x10cc/0x2b60
[   23.921478]  ? ktime_get_ts64+0x83/0x230
[   23.921483]  kunit_try_run_case+0x1a2/0x480
[   23.921487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921491]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.921495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.921500]  ? __kthread_parkme+0x82/0x180
[   23.921503]  ? preempt_count_sub+0x50/0x80
[   23.921507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921512]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.921516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.921520]  kthread+0x334/0x6f0
[   23.921523]  ? trace_preempt_on+0x20/0xc0
[   23.921527]  ? __pfx_kthread+0x10/0x10
[   23.921531]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.921535]  ? calculate_sigpending+0x7b/0xa0
[   23.921539]  ? __pfx_kthread+0x10/0x10
[   23.921543]  ret_from_fork+0x113/0x1d0
[   23.921546]  ? __pfx_kthread+0x10/0x10
[   23.921550]  ret_from_fork_asm+0x1a/0x30
[   23.921556]  </TASK>
[   23.921557] 
[   24.085243] Allocated by task 207:
[   24.088651]  kasan_save_stack+0x45/0x70
[   24.092491]  kasan_save_track+0x18/0x40
[   24.096328]  kasan_save_alloc_info+0x3b/0x50
[   24.100627]  __kasan_kmalloc+0xb7/0xc0
[   24.104417]  __kmalloc_cache_noprof+0x189/0x420
[   24.108972]  kmalloc_oob_16+0xa8/0x4a0
[   24.112726]  kunit_try_run_case+0x1a2/0x480
[   24.116911]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.122311]  kthread+0x334/0x6f0
[   24.125543]  ret_from_fork+0x113/0x1d0
[   24.129298]  ret_from_fork_asm+0x1a/0x30
[   24.133224] 
[   24.134721] The buggy address belongs to the object at ffff888106713140
[   24.134721]  which belongs to the cache kmalloc-16 of size 16
[   24.147054] The buggy address is located 0 bytes inside of
[   24.147054]  allocated 13-byte region [ffff888106713140, ffff88810671314d)
[   24.159420] 
[   24.160923] The buggy address belongs to the physical page:
[   24.166495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   24.174504] flags: 0x200000000000000(node=0|zone=2)
[   24.179415] page_type: f5(slab)
[   24.182590] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   24.190378] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.198127] page dumped because: kasan: bad access detected
[   24.203700] 
[   24.205199] Memory state around the buggy address:
[   24.209992]  ffff888106713000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.217211]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.224452] >ffff888106713100: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   24.231674]                                               ^
[   24.237248]  ffff888106713180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.244469]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.251689] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   23.442665] ==================================================================
[   23.449896] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   23.456516] Read of size 1 at addr ffff88810033ec00 by task kunit_try_catch/205
[   23.463830] 
[   23.465348] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   23.465356] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   23.465359] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.465362] Call Trace:
[   23.465363]  <TASK>
[   23.465365]  dump_stack_lvl+0x73/0xb0
[   23.465369]  print_report+0xd1/0x650
[   23.465386]  ? __virt_addr_valid+0x1db/0x2d0
[   23.465390]  ? krealloc_uaf+0x53c/0x5e0
[   23.465393]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.465398]  ? krealloc_uaf+0x53c/0x5e0
[   23.465402]  kasan_report+0x141/0x180
[   23.465406]  ? krealloc_uaf+0x53c/0x5e0
[   23.465411]  __asan_report_load1_noabort+0x18/0x20
[   23.465416]  krealloc_uaf+0x53c/0x5e0
[   23.465419]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.465423]  ? finish_task_switch.isra.0+0x153/0x700
[   23.465427]  ? __switch_to+0x544/0xf50
[   23.465432]  ? __schedule+0x10cc/0x2b60
[   23.465436]  ? ktime_get_ts64+0x83/0x230
[   23.465440]  kunit_try_run_case+0x1a2/0x480
[   23.465444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.465449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.465453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.465457]  ? __kthread_parkme+0x82/0x180
[   23.465460]  ? preempt_count_sub+0x50/0x80
[   23.465464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.465469]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.465473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.465477]  kthread+0x334/0x6f0
[   23.465480]  ? trace_preempt_on+0x20/0xc0
[   23.465484]  ? __pfx_kthread+0x10/0x10
[   23.465488]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.465492]  ? calculate_sigpending+0x7b/0xa0
[   23.465496]  ? __pfx_kthread+0x10/0x10
[   23.465500]  ret_from_fork+0x113/0x1d0
[   23.465503]  ? __pfx_kthread+0x10/0x10
[   23.465507]  ret_from_fork_asm+0x1a/0x30
[   23.465513]  </TASK>
[   23.465514] 
[   23.636904] Allocated by task 205:
[   23.640307]  kasan_save_stack+0x45/0x70
[   23.644148]  kasan_save_track+0x18/0x40
[   23.647986]  kasan_save_alloc_info+0x3b/0x50
[   23.652259]  __kasan_kmalloc+0xb7/0xc0
[   23.656013]  __kmalloc_cache_noprof+0x189/0x420
[   23.660553]  krealloc_uaf+0xbb/0x5e0
[   23.664133]  kunit_try_run_case+0x1a2/0x480
[   23.668320]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.673753]  kthread+0x334/0x6f0
[   23.676986]  ret_from_fork+0x113/0x1d0
[   23.680739]  ret_from_fork_asm+0x1a/0x30
[   23.684665] 
[   23.686163] Freed by task 205:
[   23.689222]  kasan_save_stack+0x45/0x70
[   23.693061]  kasan_save_track+0x18/0x40
[   23.696902]  kasan_save_free_info+0x3f/0x60
[   23.701087]  __kasan_slab_free+0x56/0x70
[   23.705015]  kfree+0x222/0x3f0
[   23.708073]  krealloc_uaf+0x13d/0x5e0
[   23.711740]  kunit_try_run_case+0x1a2/0x480
[   23.715925]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.721326]  kthread+0x334/0x6f0
[   23.724583]  ret_from_fork+0x113/0x1d0
[   23.728363]  ret_from_fork_asm+0x1a/0x30
[   23.732313] 
[   23.733814] The buggy address belongs to the object at ffff88810033ec00
[   23.733814]  which belongs to the cache kmalloc-256 of size 256
[   23.746328] The buggy address is located 0 bytes inside of
[   23.746328]  freed 256-byte region [ffff88810033ec00, ffff88810033ed00)
[   23.758426] 
[   23.759926] The buggy address belongs to the physical page:
[   23.765497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   23.773498] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.781149] flags: 0x200000000000040(head|node=0|zone=2)
[   23.786463] page_type: f5(slab)
[   23.789611] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.797362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.805131] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.812957] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.820782] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   23.828611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.836444] page dumped because: kasan: bad access detected
[   23.842016] 
[   23.843514] Memory state around the buggy address:
[   23.848308]  ffff88810033eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.855526]  ffff88810033eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.862746] >ffff88810033ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.869964]                    ^
[   23.873198]  ffff88810033ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.880418]  ffff88810033ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.887636] ==================================================================
[   22.979323] ==================================================================
[   22.990929] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   22.997548] Read of size 1 at addr ffff88810033ec00 by task kunit_try_catch/205
[   23.004862] 
[   23.006365] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   23.006373] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   23.006388] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.006391] Call Trace:
[   23.006393]  <TASK>
[   23.006394]  dump_stack_lvl+0x73/0xb0
[   23.006399]  print_report+0xd1/0x650
[   23.006403]  ? __virt_addr_valid+0x1db/0x2d0
[   23.006407]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006410]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.006415]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006419]  kasan_report+0x141/0x180
[   23.006423]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006427]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006431]  __kasan_check_byte+0x3d/0x50
[   23.006435]  krealloc_noprof+0x3f/0x340
[   23.006439]  krealloc_uaf+0x1b8/0x5e0
[   23.006443]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.006447]  ? finish_task_switch.isra.0+0x153/0x700
[   23.006451]  ? __switch_to+0x544/0xf50
[   23.006455]  ? __schedule+0x10cc/0x2b60
[   23.006459]  ? ktime_get_ts64+0x83/0x230
[   23.006463]  kunit_try_run_case+0x1a2/0x480
[   23.006468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.006472]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.006476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.006480]  ? __kthread_parkme+0x82/0x180
[   23.006483]  ? preempt_count_sub+0x50/0x80
[   23.006487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.006492]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.006496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.006500]  kthread+0x334/0x6f0
[   23.006503]  ? trace_preempt_on+0x20/0xc0
[   23.006507]  ? __pfx_kthread+0x10/0x10
[   23.006511]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.006515]  ? calculate_sigpending+0x7b/0xa0
[   23.006519]  ? __pfx_kthread+0x10/0x10
[   23.006523]  ret_from_fork+0x113/0x1d0
[   23.006526]  ? __pfx_kthread+0x10/0x10
[   23.006530]  ret_from_fork_asm+0x1a/0x30
[   23.006535]  </TASK>
[   23.006537] 
[   23.184740] Allocated by task 205:
[   23.188145]  kasan_save_stack+0x45/0x70
[   23.191985]  kasan_save_track+0x18/0x40
[   23.195824]  kasan_save_alloc_info+0x3b/0x50
[   23.200097]  __kasan_kmalloc+0xb7/0xc0
[   23.203850]  __kmalloc_cache_noprof+0x189/0x420
[   23.208405]  krealloc_uaf+0xbb/0x5e0
[   23.211986]  kunit_try_run_case+0x1a2/0x480
[   23.216173]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.221573]  kthread+0x334/0x6f0
[   23.224804]  ret_from_fork+0x113/0x1d0
[   23.228556]  ret_from_fork_asm+0x1a/0x30
[   23.232483] 
[   23.233982] Freed by task 205:
[   23.237041]  kasan_save_stack+0x45/0x70
[   23.240881]  kasan_save_track+0x18/0x40
[   23.244722]  kasan_save_free_info+0x3f/0x60
[   23.248914]  __kasan_slab_free+0x56/0x70
[   23.252841]  kfree+0x222/0x3f0
[   23.255901]  krealloc_uaf+0x13d/0x5e0
[   23.259565]  kunit_try_run_case+0x1a2/0x480
[   23.263753]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.269153]  kthread+0x334/0x6f0
[   23.272405]  ret_from_fork+0x113/0x1d0
[   23.276163]  ret_from_fork_asm+0x1a/0x30
[   23.280090] 
[   23.281589] The buggy address belongs to the object at ffff88810033ec00
[   23.281589]  which belongs to the cache kmalloc-256 of size 256
[   23.294103] The buggy address is located 0 bytes inside of
[   23.294103]  freed 256-byte region [ffff88810033ec00, ffff88810033ed00)
[   23.306185] 
[   23.307684] The buggy address belongs to the physical page:
[   23.313256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   23.321263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.328915] flags: 0x200000000000040(head|node=0|zone=2)
[   23.334228] page_type: f5(slab)
[   23.337376] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.345141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.352881] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.360706] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.368532] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   23.376365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.384220] page dumped because: kasan: bad access detected
[   23.389792] 
[   23.391291] Memory state around the buggy address:
[   23.396082]  ffff88810033eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.403303]  ffff88810033eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.410524] >ffff88810033ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.417749]                    ^
[   23.420984]  ffff88810033ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.428201]  ffff88810033ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.435421] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   21.282185] ==================================================================
[   21.293768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   21.301428] Write of size 1 at addr ffff888104eb20c9 by task kunit_try_catch/203
[   21.308822] 
[   21.310343] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   21.310353] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   21.310356] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.310359] Call Trace:
[   21.310373]  <TASK>
[   21.310375]  dump_stack_lvl+0x73/0xb0
[   21.310380]  print_report+0xd1/0x650
[   21.310397]  ? __virt_addr_valid+0x1db/0x2d0
[   21.310401]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.310405]  ? kasan_addr_to_slab+0x11/0xa0
[   21.310409]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.310413]  kasan_report+0x141/0x180
[   21.310417]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   21.310422]  __asan_report_store1_noabort+0x1b/0x30
[   21.310427]  krealloc_less_oob_helper+0xd70/0x11d0
[   21.310432]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.310437]  ? finish_task_switch.isra.0+0x153/0x700
[   21.310441]  ? __switch_to+0x544/0xf50
[   21.310445]  ? __schedule+0x10cc/0x2b60
[   21.310450]  krealloc_large_less_oob+0x1c/0x30
[   21.310454]  kunit_try_run_case+0x1a2/0x480
[   21.310459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.310463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.310467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.310471]  ? __kthread_parkme+0x82/0x180
[   21.310475]  ? preempt_count_sub+0x50/0x80
[   21.310479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.310483]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.310487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.310491]  kthread+0x334/0x6f0
[   21.310495]  ? trace_preempt_on+0x20/0xc0
[   21.310499]  ? __pfx_kthread+0x10/0x10
[   21.310503]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.310506]  ? calculate_sigpending+0x7b/0xa0
[   21.310511]  ? __pfx_kthread+0x10/0x10
[   21.310514]  ret_from_fork+0x113/0x1d0
[   21.310518]  ? __pfx_kthread+0x10/0x10
[   21.310521]  ret_from_fork_asm+0x1a/0x30
[   21.310527]  </TASK>
[   21.310529] 
[   21.486859] The buggy address belongs to the physical page:
[   21.492434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0
[   21.500439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.508094] flags: 0x200000000000040(head|node=0|zone=2)
[   21.513423] page_type: f8(unknown)
[   21.516830] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.524569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.532309] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.540168] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.547996] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff
[   21.555829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.563655] page dumped because: kasan: bad access detected
[   21.569229] 
[   21.570725] Memory state around the buggy address:
[   21.575520]  ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.582738]  ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.589957] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.597177]                                               ^
[   21.602751]  ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.609969]  ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.617188] ==================================================================
[   22.301071] ==================================================================
[   22.308317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   22.316006] Write of size 1 at addr ffff888104eb20ea by task kunit_try_catch/203
[   22.323430] 
[   22.324923] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   22.324931] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   22.324933] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.324936] Call Trace:
[   22.324938]  <TASK>
[   22.324940]  dump_stack_lvl+0x73/0xb0
[   22.324944]  print_report+0xd1/0x650
[   22.324948]  ? __virt_addr_valid+0x1db/0x2d0
[   22.324951]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.324956]  ? kasan_addr_to_slab+0x11/0xa0
[   22.324959]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.324964]  kasan_report+0x141/0x180
[   22.324968]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   22.324973]  __asan_report_store1_noabort+0x1b/0x30
[   22.324978]  krealloc_less_oob_helper+0xe90/0x11d0
[   22.324982]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.324987]  ? finish_task_switch.isra.0+0x153/0x700
[   22.324991]  ? __switch_to+0x544/0xf50
[   22.324996]  ? __schedule+0x10cc/0x2b60
[   22.325000]  krealloc_large_less_oob+0x1c/0x30
[   22.325004]  kunit_try_run_case+0x1a2/0x480
[   22.325009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.325013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.325017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.325021]  ? __kthread_parkme+0x82/0x180
[   22.325024]  ? preempt_count_sub+0x50/0x80
[   22.325028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.325033]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.325037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.325041]  kthread+0x334/0x6f0
[   22.325044]  ? trace_preempt_on+0x20/0xc0
[   22.325048]  ? __pfx_kthread+0x10/0x10
[   22.325052]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.325056]  ? calculate_sigpending+0x7b/0xa0
[   22.325060]  ? __pfx_kthread+0x10/0x10
[   22.325064]  ret_from_fork+0x113/0x1d0
[   22.325067]  ? __pfx_kthread+0x10/0x10
[   22.325071]  ret_from_fork_asm+0x1a/0x30
[   22.325076]  </TASK>
[   22.325078] 
[   22.501418] The buggy address belongs to the physical page:
[   22.506991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0
[   22.514991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.522643] flags: 0x200000000000040(head|node=0|zone=2)
[   22.527954] page_type: f8(unknown)
[   22.531363] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.539128] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.546869] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.554701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.562527] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff
[   22.570361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.578240] page dumped because: kasan: bad access detected
[   22.583813] 
[   22.585311] Memory state around the buggy address:
[   22.590138]  ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.597375]  ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.604629] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.611847]                                                           ^
[   22.618461]  ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.625682]  ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.632909] ==================================================================
[   18.905164] ==================================================================
[   18.912403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   18.920057] Write of size 1 at addr ffff88810561ced0 by task kunit_try_catch/199
[   18.927457] 
[   18.928959] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.928967] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   18.928970] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.928973] Call Trace:
[   18.928974]  <TASK>
[   18.928976]  dump_stack_lvl+0x73/0xb0
[   18.928980]  print_report+0xd1/0x650
[   18.928984]  ? __virt_addr_valid+0x1db/0x2d0
[   18.928988]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.928992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.928997]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.929002]  kasan_report+0x141/0x180
[   18.929006]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   18.929011]  __asan_report_store1_noabort+0x1b/0x30
[   18.929016]  krealloc_less_oob_helper+0xe23/0x11d0
[   18.929020]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.929025]  ? finish_task_switch.isra.0+0x153/0x700
[   18.929029]  ? __switch_to+0x544/0xf50
[   18.929033]  ? __schedule+0x10cc/0x2b60
[   18.929038]  krealloc_less_oob+0x1c/0x30
[   18.929042]  kunit_try_run_case+0x1a2/0x480
[   18.929046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.929050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.929054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.929059]  ? __kthread_parkme+0x82/0x180
[   18.929062]  ? preempt_count_sub+0x50/0x80
[   18.929066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.929070]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.929075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.929079]  kthread+0x334/0x6f0
[   18.929082]  ? trace_preempt_on+0x20/0xc0
[   18.929086]  ? __pfx_kthread+0x10/0x10
[   18.929090]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.929093]  ? calculate_sigpending+0x7b/0xa0
[   18.929098]  ? __pfx_kthread+0x10/0x10
[   18.929102]  ret_from_fork+0x113/0x1d0
[   18.929105]  ? __pfx_kthread+0x10/0x10
[   18.929109]  ret_from_fork_asm+0x1a/0x30
[   18.929114]  </TASK>
[   18.929116] 
[   19.106093] Allocated by task 199:
[   19.109500]  kasan_save_stack+0x45/0x70
[   19.113361]  kasan_save_track+0x18/0x40
[   19.117223]  kasan_save_alloc_info+0x3b/0x50
[   19.121504]  __kasan_krealloc+0x190/0x1f0
[   19.125524]  krealloc_noprof+0xf3/0x340
[   19.129367]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.134182]  krealloc_less_oob+0x1c/0x30
[   19.138107]  kunit_try_run_case+0x1a2/0x480
[   19.142293]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.147695]  kthread+0x334/0x6f0
[   19.150925]  ret_from_fork+0x113/0x1d0
[   19.154678]  ret_from_fork_asm+0x1a/0x30
[   19.158605] 
[   19.160105] The buggy address belongs to the object at ffff88810561ce00
[   19.160105]  which belongs to the cache kmalloc-256 of size 256
[   19.172620] The buggy address is located 7 bytes to the right of
[   19.172620]  allocated 201-byte region [ffff88810561ce00, ffff88810561cec9)
[   19.185566] 
[   19.187067] The buggy address belongs to the physical page:
[   19.192638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   19.200638] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.208291] flags: 0x200000000000040(head|node=0|zone=2)
[   19.213604] page_type: f5(slab)
[   19.216750] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.224499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.232246] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.240073] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.247907] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   19.255741] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.263566] page dumped because: kasan: bad access detected
[   19.269138] 
[   19.270630] Memory state around the buggy address:
[   19.275423]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.282641]  ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.289862] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.297079]                                                  ^
[   19.302912]  ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.310132]  ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.317362] ==================================================================
[   19.324613] ==================================================================
[   19.331861] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   19.339520] Write of size 1 at addr ffff88810561ceda by task kunit_try_catch/199
[   19.346913] 
[   19.348413] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   19.348421] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   19.348423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.348426] Call Trace:
[   19.348428]  <TASK>
[   19.348429]  dump_stack_lvl+0x73/0xb0
[   19.348434]  print_report+0xd1/0x650
[   19.348438]  ? __virt_addr_valid+0x1db/0x2d0
[   19.348441]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.348446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.348451]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.348455]  kasan_report+0x141/0x180
[   19.348459]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   19.348465]  __asan_report_store1_noabort+0x1b/0x30
[   19.348469]  krealloc_less_oob_helper+0xec6/0x11d0
[   19.348474]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.348479]  ? finish_task_switch.isra.0+0x153/0x700
[   19.348482]  ? __switch_to+0x544/0xf50
[   19.348487]  ? __schedule+0x10cc/0x2b60
[   19.348492]  krealloc_less_oob+0x1c/0x30
[   19.348496]  kunit_try_run_case+0x1a2/0x480
[   19.348500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.348504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.348508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.348512]  ? __kthread_parkme+0x82/0x180
[   19.348516]  ? preempt_count_sub+0x50/0x80
[   19.348520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.348524]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.348528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.348532]  kthread+0x334/0x6f0
[   19.348536]  ? trace_preempt_on+0x20/0xc0
[   19.348540]  ? __pfx_kthread+0x10/0x10
[   19.348543]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.348547]  ? calculate_sigpending+0x7b/0xa0
[   19.348551]  ? __pfx_kthread+0x10/0x10
[   19.348555]  ret_from_fork+0x113/0x1d0
[   19.348558]  ? __pfx_kthread+0x10/0x10
[   19.348562]  ret_from_fork_asm+0x1a/0x30
[   19.348567]  </TASK>
[   19.348569] 
[   19.525560] Allocated by task 199:
[   19.528965]  kasan_save_stack+0x45/0x70
[   19.532805]  kasan_save_track+0x18/0x40
[   19.536644]  kasan_save_alloc_info+0x3b/0x50
[   19.540926]  __kasan_krealloc+0x190/0x1f0
[   19.544938]  krealloc_noprof+0xf3/0x340
[   19.548776]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.553570]  krealloc_less_oob+0x1c/0x30
[   19.557504]  kunit_try_run_case+0x1a2/0x480
[   19.561691]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.567099]  kthread+0x334/0x6f0
[   19.570348]  ret_from_fork+0x113/0x1d0
[   19.574109]  ret_from_fork_asm+0x1a/0x30
[   19.578036] 
[   19.579534] The buggy address belongs to the object at ffff88810561ce00
[   19.579534]  which belongs to the cache kmalloc-256 of size 256
[   19.592050] The buggy address is located 17 bytes to the right of
[   19.592050]  allocated 201-byte region [ffff88810561ce00, ffff88810561cec9)
[   19.605093] 
[   19.606591] The buggy address belongs to the physical page:
[   19.612164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   19.620163] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.627816] flags: 0x200000000000040(head|node=0|zone=2)
[   19.633128] page_type: f5(slab)
[   19.636276] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.644023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.651764] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   19.659588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.667420] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   19.675248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.683075] page dumped because: kasan: bad access detected
[   19.688647] 
[   19.690147] Memory state around the buggy address:
[   19.694938]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702159]  ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.709389] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.716614]                                                     ^
[   19.722709]  ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.729935]  ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.737154] ==================================================================
[   21.962657] ==================================================================
[   21.969902] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   21.977554] Write of size 1 at addr ffff888104eb20da by task kunit_try_catch/203
[   21.984947] 
[   21.986448] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   21.986456] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   21.986458] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.986461] Call Trace:
[   21.986463]  <TASK>
[   21.986465]  dump_stack_lvl+0x73/0xb0
[   21.986469]  print_report+0xd1/0x650
[   21.986473]  ? __virt_addr_valid+0x1db/0x2d0
[   21.986477]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.986481]  ? kasan_addr_to_slab+0x11/0xa0
[   21.986485]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.986489]  kasan_report+0x141/0x180
[   21.986493]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   21.986498]  __asan_report_store1_noabort+0x1b/0x30
[   21.986503]  krealloc_less_oob_helper+0xec6/0x11d0
[   21.986508]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.986512]  ? finish_task_switch.isra.0+0x153/0x700
[   21.986516]  ? __switch_to+0x544/0xf50
[   21.986521]  ? __schedule+0x10cc/0x2b60
[   21.986525]  krealloc_large_less_oob+0x1c/0x30
[   21.986529]  kunit_try_run_case+0x1a2/0x480
[   21.986534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.986538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.986542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.986546]  ? __kthread_parkme+0x82/0x180
[   21.986550]  ? preempt_count_sub+0x50/0x80
[   21.986554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.986558]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.986562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.986566]  kthread+0x334/0x6f0
[   21.986570]  ? trace_preempt_on+0x20/0xc0
[   21.986574]  ? __pfx_kthread+0x10/0x10
[   21.986577]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.986581]  ? calculate_sigpending+0x7b/0xa0
[   21.986585]  ? __pfx_kthread+0x10/0x10
[   21.986589]  ret_from_fork+0x113/0x1d0
[   21.986592]  ? __pfx_kthread+0x10/0x10
[   21.986596]  ret_from_fork_asm+0x1a/0x30
[   21.986602]  </TASK>
[   21.986603] 
[   22.162979] The buggy address belongs to the physical page:
[   22.168552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0
[   22.176559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.184210] flags: 0x200000000000040(head|node=0|zone=2)
[   22.189523] page_type: f8(unknown)
[   22.192930] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.200669] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.208416] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.216244] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.224078] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff
[   22.231906] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.239737] page dumped because: kasan: bad access detected
[   22.245309] 
[   22.246809] Memory state around the buggy address:
[   22.251604]  ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.258823]  ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.266041] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.273260]                                                     ^
[   22.279359]  ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.286626]  ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.293844] ==================================================================
[   19.744392] ==================================================================
[   19.751636] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   19.759290] Write of size 1 at addr ffff88810561ceea by task kunit_try_catch/199
[   19.766691] 
[   19.768191] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   19.768199] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   19.768201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.768204] Call Trace:
[   19.768206]  <TASK>
[   19.768207]  dump_stack_lvl+0x73/0xb0
[   19.768212]  print_report+0xd1/0x650
[   19.768215]  ? __virt_addr_valid+0x1db/0x2d0
[   19.768219]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.768224]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.768229]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.768233]  kasan_report+0x141/0x180
[   19.768237]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   19.768242]  __asan_report_store1_noabort+0x1b/0x30
[   19.768247]  krealloc_less_oob_helper+0xe90/0x11d0
[   19.768252]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.768256]  ? finish_task_switch.isra.0+0x153/0x700
[   19.768260]  ? __switch_to+0x544/0xf50
[   19.768265]  ? __schedule+0x10cc/0x2b60
[   19.768269]  krealloc_less_oob+0x1c/0x30
[   19.768273]  kunit_try_run_case+0x1a2/0x480
[   19.768277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.768282]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.768286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.768290]  ? __kthread_parkme+0x82/0x180
[   19.768293]  ? preempt_count_sub+0x50/0x80
[   19.768297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.768302]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.768306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.768310]  kthread+0x334/0x6f0
[   19.768313]  ? trace_preempt_on+0x20/0xc0
[   19.768317]  ? __pfx_kthread+0x10/0x10
[   19.768321]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.768324]  ? calculate_sigpending+0x7b/0xa0
[   19.768346]  ? __pfx_kthread+0x10/0x10
[   19.768350]  ret_from_fork+0x113/0x1d0
[   19.768353]  ? __pfx_kthread+0x10/0x10
[   19.768357]  ret_from_fork_asm+0x1a/0x30
[   19.768363]  </TASK>
[   19.768364] 
[   19.945275] Allocated by task 199:
[   19.948682]  kasan_save_stack+0x45/0x70
[   19.952521]  kasan_save_track+0x18/0x40
[   19.956359]  kasan_save_alloc_info+0x3b/0x50
[   19.960657]  __kasan_krealloc+0x190/0x1f0
[   19.964669]  krealloc_noprof+0xf3/0x340
[   19.968510]  krealloc_less_oob_helper+0x1aa/0x11d0
[   19.973303]  krealloc_less_oob+0x1c/0x30
[   19.977229]  kunit_try_run_case+0x1a2/0x480
[   19.981415]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.986814]  kthread+0x334/0x6f0
[   19.990046]  ret_from_fork+0x113/0x1d0
[   19.993798]  ret_from_fork_asm+0x1a/0x30
[   19.997726] 
[   19.999224] The buggy address belongs to the object at ffff88810561ce00
[   19.999224]  which belongs to the cache kmalloc-256 of size 256
[   20.011730] The buggy address is located 33 bytes to the right of
[   20.011730]  allocated 201-byte region [ffff88810561ce00, ffff88810561cec9)
[   20.024764] 
[   20.026264] The buggy address belongs to the physical page:
[   20.031839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   20.039845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.047496] flags: 0x200000000000040(head|node=0|zone=2)
[   20.052811] page_type: f5(slab)
[   20.055958] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.063706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.071454] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.079287] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.087114] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   20.094939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.102765] page dumped because: kasan: bad access detected
[   20.108363] 
[   20.109862] Memory state around the buggy address:
[   20.114655]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.121874]  ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.129095] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.136312]                                                           ^
[   20.142927]  ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.150144]  ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.157366] ==================================================================
[   21.624478] ==================================================================
[   21.631723] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   21.639399] Write of size 1 at addr ffff888104eb20d0 by task kunit_try_catch/203
[   21.646793] 
[   21.648295] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   21.648303] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   21.648306] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.648309] Call Trace:
[   21.648311]  <TASK>
[   21.648313]  dump_stack_lvl+0x73/0xb0
[   21.648317]  print_report+0xd1/0x650
[   21.648321]  ? __virt_addr_valid+0x1db/0x2d0
[   21.648344]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.648349]  ? kasan_addr_to_slab+0x11/0xa0
[   21.648353]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.648357]  kasan_report+0x141/0x180
[   21.648374]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   21.648379]  __asan_report_store1_noabort+0x1b/0x30
[   21.648396]  krealloc_less_oob_helper+0xe23/0x11d0
[   21.648401]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.648406]  ? finish_task_switch.isra.0+0x153/0x700
[   21.648410]  ? __switch_to+0x544/0xf50
[   21.648414]  ? __schedule+0x10cc/0x2b60
[   21.648419]  krealloc_large_less_oob+0x1c/0x30
[   21.648423]  kunit_try_run_case+0x1a2/0x480
[   21.648428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.648432]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.648436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.648440]  ? __kthread_parkme+0x82/0x180
[   21.648444]  ? preempt_count_sub+0x50/0x80
[   21.648448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.648452]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.648456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.648460]  kthread+0x334/0x6f0
[   21.648464]  ? trace_preempt_on+0x20/0xc0
[   21.648468]  ? __pfx_kthread+0x10/0x10
[   21.648471]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.648475]  ? calculate_sigpending+0x7b/0xa0
[   21.648479]  ? __pfx_kthread+0x10/0x10
[   21.648483]  ret_from_fork+0x113/0x1d0
[   21.648486]  ? __pfx_kthread+0x10/0x10
[   21.648490]  ret_from_fork_asm+0x1a/0x30
[   21.648496]  </TASK>
[   21.648497] 
[   21.824849] The buggy address belongs to the physical page:
[   21.830428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0
[   21.838430] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.846084] flags: 0x200000000000040(head|node=0|zone=2)
[   21.851417] page_type: f8(unknown)
[   21.854820] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.862559] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.870299] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.878133] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.885960] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff
[   21.893793] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.901620] page dumped because: kasan: bad access detected
[   21.907191] 
[   21.908689] Memory state around the buggy address:
[   21.913485]  ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.920704]  ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.927922] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.935140]                                                  ^
[   21.940975]  ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.948194]  ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.955429] ==================================================================
[   18.482195] ==================================================================
[   18.493250] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   18.500903] Write of size 1 at addr ffff88810561cec9 by task kunit_try_catch/199
[   18.508295] 
[   18.509798] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.509806] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   18.509809] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.509812] Call Trace:
[   18.509813]  <TASK>
[   18.509815]  dump_stack_lvl+0x73/0xb0
[   18.509819]  print_report+0xd1/0x650
[   18.509823]  ? __virt_addr_valid+0x1db/0x2d0
[   18.509827]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.509832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.509837]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.509841]  kasan_report+0x141/0x180
[   18.509845]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   18.509850]  __asan_report_store1_noabort+0x1b/0x30
[   18.509855]  krealloc_less_oob_helper+0xd70/0x11d0
[   18.509860]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   18.509864]  ? finish_task_switch.isra.0+0x153/0x700
[   18.509868]  ? __switch_to+0x544/0xf50
[   18.509873]  ? __schedule+0x10cc/0x2b60
[   18.509877]  krealloc_less_oob+0x1c/0x30
[   18.509881]  kunit_try_run_case+0x1a2/0x480
[   18.509886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.509890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.509894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.509898]  ? __kthread_parkme+0x82/0x180
[   18.509902]  ? preempt_count_sub+0x50/0x80
[   18.509906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.509910]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.509914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.509918]  kthread+0x334/0x6f0
[   18.509922]  ? trace_preempt_on+0x20/0xc0
[   18.509926]  ? __pfx_kthread+0x10/0x10
[   18.509929]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.509933]  ? calculate_sigpending+0x7b/0xa0
[   18.509938]  ? __pfx_kthread+0x10/0x10
[   18.509941]  ret_from_fork+0x113/0x1d0
[   18.509945]  ? __pfx_kthread+0x10/0x10
[   18.509948]  ret_from_fork_asm+0x1a/0x30
[   18.509954]  </TASK>
[   18.509955] 
[   18.686899] Allocated by task 199:
[   18.690305]  kasan_save_stack+0x45/0x70
[   18.694142]  kasan_save_track+0x18/0x40
[   18.697983]  kasan_save_alloc_info+0x3b/0x50
[   18.702254]  __kasan_krealloc+0x190/0x1f0
[   18.706268]  krealloc_noprof+0xf3/0x340
[   18.710108]  krealloc_less_oob_helper+0x1aa/0x11d0
[   18.714909]  krealloc_less_oob+0x1c/0x30
[   18.718836]  kunit_try_run_case+0x1a2/0x480
[   18.723029]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.728428]  kthread+0x334/0x6f0
[   18.731661]  ret_from_fork+0x113/0x1d0
[   18.735414]  ret_from_fork_asm+0x1a/0x30
[   18.739364] 
[   18.740866] The buggy address belongs to the object at ffff88810561ce00
[   18.740866]  which belongs to the cache kmalloc-256 of size 256
[   18.753403] The buggy address is located 0 bytes to the right of
[   18.753403]  allocated 201-byte region [ffff88810561ce00, ffff88810561cec9)
[   18.766364] 
[   18.767863] The buggy address belongs to the physical page:
[   18.773435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   18.781441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.789095] flags: 0x200000000000040(head|node=0|zone=2)
[   18.794409] page_type: f5(slab)
[   18.797556] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.805302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.813040] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.820866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.828693] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   18.836520] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.844364] page dumped because: kasan: bad access detected
[   18.849960] 
[   18.851460] Memory state around the buggy address:
[   18.856253]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.863471]  ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.870690] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.877911]                                               ^
[   18.883482]  ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.890701]  ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.897923] ==================================================================
[   20.164615] ==================================================================
[   20.171854] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   20.179509] Write of size 1 at addr ffff88810561ceeb by task kunit_try_catch/199
[   20.186909] 
[   20.188411] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   20.188418] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   20.188421] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.188424] Call Trace:
[   20.188426]  <TASK>
[   20.188427]  dump_stack_lvl+0x73/0xb0
[   20.188431]  print_report+0xd1/0x650
[   20.188435]  ? __virt_addr_valid+0x1db/0x2d0
[   20.188439]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   20.188443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.188448]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   20.188453]  kasan_report+0x141/0x180
[   20.188457]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   20.188462]  __asan_report_store1_noabort+0x1b/0x30
[   20.188467]  krealloc_less_oob_helper+0xd47/0x11d0
[   20.188472]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   20.188476]  ? finish_task_switch.isra.0+0x153/0x700
[   20.188480]  ? __switch_to+0x544/0xf50
[   20.188484]  ? __schedule+0x10cc/0x2b60
[   20.188489]  krealloc_less_oob+0x1c/0x30
[   20.188493]  kunit_try_run_case+0x1a2/0x480
[   20.188497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.188501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.188505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.188509]  ? __kthread_parkme+0x82/0x180
[   20.188513]  ? preempt_count_sub+0x50/0x80
[   20.188517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.188521]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.188525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.188529]  kthread+0x334/0x6f0
[   20.188533]  ? trace_preempt_on+0x20/0xc0
[   20.188537]  ? __pfx_kthread+0x10/0x10
[   20.188540]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.188544]  ? calculate_sigpending+0x7b/0xa0
[   20.188548]  ? __pfx_kthread+0x10/0x10
[   20.188552]  ret_from_fork+0x113/0x1d0
[   20.188556]  ? __pfx_kthread+0x10/0x10
[   20.188559]  ret_from_fork_asm+0x1a/0x30
[   20.188565]  </TASK>
[   20.188566] 
[   20.365572] Allocated by task 199:
[   20.368976]  kasan_save_stack+0x45/0x70
[   20.372817]  kasan_save_track+0x18/0x40
[   20.376658]  kasan_save_alloc_info+0x3b/0x50
[   20.380938]  __kasan_krealloc+0x190/0x1f0
[   20.384950]  krealloc_noprof+0xf3/0x340
[   20.388790]  krealloc_less_oob_helper+0x1aa/0x11d0
[   20.393583]  krealloc_less_oob+0x1c/0x30
[   20.397516]  kunit_try_run_case+0x1a2/0x480
[   20.401704]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.407112]  kthread+0x334/0x6f0
[   20.410363]  ret_from_fork+0x113/0x1d0
[   20.414138]  ret_from_fork_asm+0x1a/0x30
[   20.418064] 
[   20.419565] The buggy address belongs to the object at ffff88810561ce00
[   20.419565]  which belongs to the cache kmalloc-256 of size 256
[   20.432080] The buggy address is located 34 bytes to the right of
[   20.432080]  allocated 201-byte region [ffff88810561ce00, ffff88810561cec9)
[   20.445114] 
[   20.446612] The buggy address belongs to the physical page:
[   20.452186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   20.460192] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.467845] flags: 0x200000000000040(head|node=0|zone=2)
[   20.473159] page_type: f5(slab)
[   20.476306] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.484044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.491786] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   20.499619] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.507444] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   20.515271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.523096] page dumped because: kasan: bad access detected
[   20.528667] 
[   20.530160] Memory state around the buggy address:
[   20.534953]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.542171]  ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.549403] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.556628]                                                           ^
[   20.563240]  ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.570459]  ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.577678] ==================================================================
[   22.640133] ==================================================================
[   22.647414] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   22.655069] Write of size 1 at addr ffff888104eb20eb by task kunit_try_catch/203
[   22.662462] 
[   22.663962] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   22.663969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   22.663972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.663975] Call Trace:
[   22.663977]  <TASK>
[   22.663978]  dump_stack_lvl+0x73/0xb0
[   22.663982]  print_report+0xd1/0x650
[   22.663986]  ? __virt_addr_valid+0x1db/0x2d0
[   22.663990]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.663994]  ? kasan_addr_to_slab+0x11/0xa0
[   22.663998]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.664002]  kasan_report+0x141/0x180
[   22.664006]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   22.664011]  __asan_report_store1_noabort+0x1b/0x30
[   22.664016]  krealloc_less_oob_helper+0xd47/0x11d0
[   22.664021]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.664025]  ? finish_task_switch.isra.0+0x153/0x700
[   22.664029]  ? __switch_to+0x544/0xf50
[   22.664034]  ? __schedule+0x10cc/0x2b60
[   22.664038]  krealloc_large_less_oob+0x1c/0x30
[   22.664043]  kunit_try_run_case+0x1a2/0x480
[   22.664047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.664051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.664055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.664059]  ? __kthread_parkme+0x82/0x180
[   22.664063]  ? preempt_count_sub+0x50/0x80
[   22.664067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.664071]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.664075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.664079]  kthread+0x334/0x6f0
[   22.664083]  ? trace_preempt_on+0x20/0xc0
[   22.664087]  ? __pfx_kthread+0x10/0x10
[   22.664090]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.664094]  ? calculate_sigpending+0x7b/0xa0
[   22.664098]  ? __pfx_kthread+0x10/0x10
[   22.664102]  ret_from_fork+0x113/0x1d0
[   22.664105]  ? __pfx_kthread+0x10/0x10
[   22.664109]  ret_from_fork_asm+0x1a/0x30
[   22.664115]  </TASK>
[   22.664116] 
[   22.840449] The buggy address belongs to the physical page:
[   22.846020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0
[   22.854020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.861674] flags: 0x200000000000040(head|node=0|zone=2)
[   22.866985] page_type: f8(unknown)
[   22.870421] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.878165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.885904] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.893733] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.901565] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff
[   22.909415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.917244] page dumped because: kasan: bad access detected
[   22.922817] 
[   22.924315] Memory state around the buggy address:
[   22.929143]  ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.936365]  ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.943607] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.950828]                                                           ^
[   22.957439]  ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.964659]  ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.971878] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   20.939434] ==================================================================
[   20.946661] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   20.954235] Write of size 1 at addr ffff888104ffa0f0 by task kunit_try_catch/201
[   20.961628] 
[   20.963127] CPU: 3 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   20.963135] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   20.963138] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.963141] Call Trace:
[   20.963143]  <TASK>
[   20.963144]  dump_stack_lvl+0x73/0xb0
[   20.963149]  print_report+0xd1/0x650
[   20.963152]  ? __virt_addr_valid+0x1db/0x2d0
[   20.963156]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.963161]  ? kasan_addr_to_slab+0x11/0xa0
[   20.963164]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.963168]  kasan_report+0x141/0x180
[   20.963172]  ? krealloc_more_oob_helper+0x7eb/0x930
[   20.963178]  __asan_report_store1_noabort+0x1b/0x30
[   20.963182]  krealloc_more_oob_helper+0x7eb/0x930
[   20.963186]  ? __schedule+0x10cc/0x2b60
[   20.963190]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.963195]  ? finish_task_switch.isra.0+0x153/0x700
[   20.963199]  ? __switch_to+0x544/0xf50
[   20.963203]  ? __schedule+0x10cc/0x2b60
[   20.963208]  krealloc_large_more_oob+0x1c/0x30
[   20.963212]  kunit_try_run_case+0x1a2/0x480
[   20.963216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.963220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.963224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.963229]  ? __kthread_parkme+0x82/0x180
[   20.963232]  ? preempt_count_sub+0x50/0x80
[   20.963236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.963240]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.963244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.963249]  kthread+0x334/0x6f0
[   20.963252]  ? trace_preempt_on+0x20/0xc0
[   20.963256]  ? __pfx_kthread+0x10/0x10
[   20.963260]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.963263]  ? calculate_sigpending+0x7b/0xa0
[   20.963268]  ? __pfx_kthread+0x10/0x10
[   20.963272]  ret_from_fork+0x113/0x1d0
[   20.963275]  ? __pfx_kthread+0x10/0x10
[   20.963278]  ret_from_fork_asm+0x1a/0x30
[   20.963284]  </TASK>
[   20.963286] 
[   21.143063] The buggy address belongs to the physical page:
[   21.148636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8
[   21.156644] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.164298] flags: 0x200000000000040(head|node=0|zone=2)
[   21.169617] page_type: f8(unknown)
[   21.173025] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.180765] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.188513] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.196365] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.204215] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff
[   21.212041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.219867] page dumped because: kasan: bad access detected
[   21.225440] 
[   21.226939] Memory state around the buggy address:
[   21.231733]  ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.238959]  ffff888104ffa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.246181] >ffff888104ffa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   21.253407]                                                              ^
[   21.260279]  ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.267498]  ffff888104ffa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.274717] ==================================================================
[   18.058241] ==================================================================
[   18.065465] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   18.073032] Write of size 1 at addr ffff88810561ccf0 by task kunit_try_catch/197
[   18.080425] 
[   18.081926] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.081934] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   18.081937] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.081940] Call Trace:
[   18.081941]  <TASK>
[   18.081943]  dump_stack_lvl+0x73/0xb0
[   18.081948]  print_report+0xd1/0x650
[   18.081952]  ? __virt_addr_valid+0x1db/0x2d0
[   18.081955]  ? krealloc_more_oob_helper+0x7eb/0x930
[   18.081960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.081965]  ? krealloc_more_oob_helper+0x7eb/0x930
[   18.081969]  kasan_report+0x141/0x180
[   18.081973]  ? krealloc_more_oob_helper+0x7eb/0x930
[   18.081978]  __asan_report_store1_noabort+0x1b/0x30
[   18.081983]  krealloc_more_oob_helper+0x7eb/0x930
[   18.081987]  ? __schedule+0x10cc/0x2b60
[   18.081991]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   18.081996]  ? finish_task_switch.isra.0+0x153/0x700
[   18.082000]  ? __switch_to+0x544/0xf50
[   18.082004]  ? __schedule+0x10cc/0x2b60
[   18.082009]  krealloc_more_oob+0x1c/0x30
[   18.082013]  kunit_try_run_case+0x1a2/0x480
[   18.082017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.082021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.082025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.082029]  ? __kthread_parkme+0x82/0x180
[   18.082033]  ? preempt_count_sub+0x50/0x80
[   18.082037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.082041]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.082045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.082050]  kthread+0x334/0x6f0
[   18.082053]  ? trace_preempt_on+0x20/0xc0
[   18.082057]  ? __pfx_kthread+0x10/0x10
[   18.082061]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.082064]  ? calculate_sigpending+0x7b/0xa0
[   18.082069]  ? __pfx_kthread+0x10/0x10
[   18.082073]  ret_from_fork+0x113/0x1d0
[   18.082076]  ? __pfx_kthread+0x10/0x10
[   18.082080]  ret_from_fork_asm+0x1a/0x30
[   18.082085]  </TASK>
[   18.082087] 
[   18.262509] Allocated by task 197:
[   18.265917]  kasan_save_stack+0x45/0x70
[   18.269756]  kasan_save_track+0x18/0x40
[   18.273595]  kasan_save_alloc_info+0x3b/0x50
[   18.277866]  __kasan_krealloc+0x190/0x1f0
[   18.281880]  krealloc_noprof+0xf3/0x340
[   18.285719]  krealloc_more_oob_helper+0x1a9/0x930
[   18.290425]  krealloc_more_oob+0x1c/0x30
[   18.294363]  kunit_try_run_case+0x1a2/0x480
[   18.298572]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.303971]  kthread+0x334/0x6f0
[   18.307205]  ret_from_fork+0x113/0x1d0
[   18.310956]  ret_from_fork_asm+0x1a/0x30
[   18.314882] 
[   18.316394] The buggy address belongs to the object at ffff88810561cc00
[   18.316394]  which belongs to the cache kmalloc-256 of size 256
[   18.328914] The buggy address is located 5 bytes to the right of
[   18.328914]  allocated 235-byte region [ffff88810561cc00, ffff88810561cceb)
[   18.341861] 
[   18.343364] The buggy address belongs to the physical page:
[   18.348942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   18.356941] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.364593] flags: 0x200000000000040(head|node=0|zone=2)
[   18.369908] page_type: f5(slab)
[   18.373054] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.380792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.388534] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   18.396367] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.404220] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   18.412055] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.419888] page dumped because: kasan: bad access detected
[   18.425461] 
[   18.426960] Memory state around the buggy address:
[   18.431753]  ffff88810561cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.438972]  ffff88810561cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.446193] >ffff88810561cc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.453417]                                                              ^
[   18.460291]  ffff88810561cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.467512]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.474729] ==================================================================
[   17.630962] ==================================================================
[   17.641773] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   17.649363] Write of size 1 at addr ffff88810561cceb by task kunit_try_catch/197
[   17.656782] 
[   17.658282] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.658291] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   17.658294] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.658297] Call Trace:
[   17.658299]  <TASK>
[   17.658301]  dump_stack_lvl+0x73/0xb0
[   17.658306]  print_report+0xd1/0x650
[   17.658310]  ? __virt_addr_valid+0x1db/0x2d0
[   17.658314]  ? krealloc_more_oob_helper+0x821/0x930
[   17.658318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.658323]  ? krealloc_more_oob_helper+0x821/0x930
[   17.658327]  kasan_report+0x141/0x180
[   17.658348]  ? krealloc_more_oob_helper+0x821/0x930
[   17.658354]  __asan_report_store1_noabort+0x1b/0x30
[   17.658359]  krealloc_more_oob_helper+0x821/0x930
[   17.658363]  ? __schedule+0x10cc/0x2b60
[   17.658367]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   17.658384]  ? finish_task_switch.isra.0+0x153/0x700
[   17.658388]  ? __switch_to+0x544/0xf50
[   17.658393]  ? __schedule+0x10cc/0x2b60
[   17.658397]  krealloc_more_oob+0x1c/0x30
[   17.658401]  kunit_try_run_case+0x1a2/0x480
[   17.658406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.658410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.658414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.658418]  ? __kthread_parkme+0x82/0x180
[   17.658422]  ? preempt_count_sub+0x50/0x80
[   17.658426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.658430]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.658434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.658439]  kthread+0x334/0x6f0
[   17.658442]  ? trace_preempt_on+0x20/0xc0
[   17.658446]  ? __pfx_kthread+0x10/0x10
[   17.658450]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.658454]  ? calculate_sigpending+0x7b/0xa0
[   17.658458]  ? __pfx_kthread+0x10/0x10
[   17.658462]  ret_from_fork+0x113/0x1d0
[   17.658465]  ? __pfx_kthread+0x10/0x10
[   17.658469]  ret_from_fork_asm+0x1a/0x30
[   17.658474]  </TASK>
[   17.658476] 
[   17.838902] Allocated by task 197:
[   17.842309]  kasan_save_stack+0x45/0x70
[   17.846147]  kasan_save_track+0x18/0x40
[   17.849986]  kasan_save_alloc_info+0x3b/0x50
[   17.854259]  __kasan_krealloc+0x190/0x1f0
[   17.858272]  krealloc_noprof+0xf3/0x340
[   17.862113]  krealloc_more_oob_helper+0x1a9/0x930
[   17.866827]  krealloc_more_oob+0x1c/0x30
[   17.870754]  kunit_try_run_case+0x1a2/0x480
[   17.874947]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.880363]  kthread+0x334/0x6f0
[   17.883612]  ret_from_fork+0x113/0x1d0
[   17.887367]  ret_from_fork_asm+0x1a/0x30
[   17.891317] 
[   17.892817] The buggy address belongs to the object at ffff88810561cc00
[   17.892817]  which belongs to the cache kmalloc-256 of size 256
[   17.905323] The buggy address is located 0 bytes to the right of
[   17.905323]  allocated 235-byte region [ffff88810561cc00, ffff88810561cceb)
[   17.918288] 
[   17.919789] The buggy address belongs to the physical page:
[   17.925364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c
[   17.933403] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.941057] flags: 0x200000000000040(head|node=0|zone=2)
[   17.946370] page_type: f5(slab)
[   17.949534] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   17.957282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.965031] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   17.972864] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.980697] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff
[   17.988525] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.996365] page dumped because: kasan: bad access detected
[   18.001964] 
[   18.003466] Memory state around the buggy address:
[   18.008256]  ffff88810561cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.015478]  ffff88810561cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.022698] >ffff88810561cc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.029922]                                                           ^
[   18.036536]  ffff88810561cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.043755]  ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.050976] ==================================================================
[   20.593258] ==================================================================
[   20.604329] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   20.611947] Write of size 1 at addr ffff888104ffa0eb by task kunit_try_catch/201
[   20.619364] 
[   20.620891] CPU: 3 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   20.620900] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   20.620902] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.620905] Call Trace:
[   20.620907]  <TASK>
[   20.620909]  dump_stack_lvl+0x73/0xb0
[   20.620914]  print_report+0xd1/0x650
[   20.620918]  ? __virt_addr_valid+0x1db/0x2d0
[   20.620922]  ? krealloc_more_oob_helper+0x821/0x930
[   20.620926]  ? kasan_addr_to_slab+0x11/0xa0
[   20.620930]  ? krealloc_more_oob_helper+0x821/0x930
[   20.620934]  kasan_report+0x141/0x180
[   20.620938]  ? krealloc_more_oob_helper+0x821/0x930
[   20.620943]  __asan_report_store1_noabort+0x1b/0x30
[   20.620948]  krealloc_more_oob_helper+0x821/0x930
[   20.620952]  ? __schedule+0x10cc/0x2b60
[   20.620956]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   20.620961]  ? finish_task_switch.isra.0+0x153/0x700
[   20.620965]  ? __switch_to+0x544/0xf50
[   20.620970]  ? __schedule+0x10cc/0x2b60
[   20.620974]  krealloc_large_more_oob+0x1c/0x30
[   20.620978]  kunit_try_run_case+0x1a2/0x480
[   20.620983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.620987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.620991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.620995]  ? __kthread_parkme+0x82/0x180
[   20.620999]  ? preempt_count_sub+0x50/0x80
[   20.621003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.621007]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.621011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.621015]  kthread+0x334/0x6f0
[   20.621019]  ? trace_preempt_on+0x20/0xc0
[   20.621023]  ? __pfx_kthread+0x10/0x10
[   20.621027]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.621030]  ? calculate_sigpending+0x7b/0xa0
[   20.621035]  ? __pfx_kthread+0x10/0x10
[   20.621039]  ret_from_fork+0x113/0x1d0
[   20.621042]  ? __pfx_kthread+0x10/0x10
[   20.621046]  ret_from_fork_asm+0x1a/0x30
[   20.621051]  </TASK>
[   20.621053] 
[   20.800802] The buggy address belongs to the physical page:
[   20.806395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8
[   20.814404] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.822060] flags: 0x200000000000040(head|node=0|zone=2)
[   20.827393] page_type: f8(unknown)
[   20.830806] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.838552] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.846294] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.854128] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.861953] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff
[   20.869778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.877603] page dumped because: kasan: bad access detected
[   20.883176] 
[   20.884675] Memory state around the buggy address:
[   20.889470]  ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.896688]  ffff888104ffa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.903910] >ffff888104ffa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.911137]                                                           ^
[   20.917748]  ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.924969]  ffff888104ffa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.932187] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[  114.658368] ==================================================================
[  114.665616] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0
[  114.665616] 
[  114.673892] Use-after-free read at 0x0000000096fb9f2f (in kfence-#15):
[  114.680420]  test_krealloc+0x6fc/0xbe0
[  114.684171]  kunit_try_run_case+0x1a2/0x480
[  114.688358]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  114.693758]  kthread+0x334/0x6f0
[  114.696997]  ret_from_fork+0x113/0x1d0
[  114.700752]  ret_from_fork_asm+0x1a/0x30
[  114.704685] 
[  114.706184] kfence-#15: 0x0000000096fb9f2f-0x0000000089c6bd6c, size=32, cache=kmalloc-32
[  114.706184] 
[  114.715746] allocated by task 378 on cpu 0 at 114.658356s (0.057390s ago):
[  114.722628]  test_alloc+0x364/0x10f0
[  114.726214]  test_krealloc+0xad/0xbe0
[  114.729878]  kunit_try_run_case+0x1a2/0x480
[  114.734064]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  114.739463]  kthread+0x334/0x6f0
[  114.742699]  ret_from_fork+0x113/0x1d0
[  114.746451]  ret_from_fork_asm+0x1a/0x30
[  114.750376] 
[  114.751874] freed by task 378 on cpu 0 at 114.658360s (0.093514s ago):
[  114.758403]  krealloc_noprof+0x108/0x340
[  114.762338]  test_krealloc+0x226/0xbe0
[  114.766089]  kunit_try_run_case+0x1a2/0x480
[  114.770275]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  114.775673]  kthread+0x334/0x6f0
[  114.778906]  ret_from_fork+0x113/0x1d0
[  114.782661]  ret_from_fork_asm+0x1a/0x30
[  114.786586] 
[  114.788085] CPU: 0 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[  114.798965] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[  114.804977] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  114.812376] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[  114.388687] ==================================================================
[  114.395921] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670
[  114.395921] 
[  114.405583] Use-after-free read at 0x00000000657c9be8 (in kfence-#13):
[  114.412118]  test_memcache_typesafe_by_rcu+0x2ec/0x670
[  114.417266]  kunit_try_run_case+0x1a2/0x480
[  114.421462]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  114.426869]  kthread+0x334/0x6f0
[  114.430102]  ret_from_fork+0x113/0x1d0
[  114.433861]  ret_from_fork_asm+0x1a/0x30
[  114.437787] 
[  114.439286] kfence-#13: 0x00000000657c9be8-0x00000000f1c15b0b, size=32, cache=test
[  114.439286] 
[  114.448327] allocated by task 376 on cpu 1 at 114.362358s (0.085968s ago):
[  114.455210]  test_alloc+0x2a6/0x10f0
[  114.458795]  test_memcache_typesafe_by_rcu+0x16f/0x670
[  114.463936]  kunit_try_run_case+0x1a2/0x480
[  114.468131]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  114.473529]  kthread+0x334/0x6f0
[  114.476760]  ret_from_fork+0x113/0x1d0
[  114.480516]  ret_from_fork_asm+0x1a/0x30
[  114.484451] 
[  114.485948] freed by task 376 on cpu 1 at 114.362360s (0.123588s ago):
[  114.492477]  test_memcache_typesafe_by_rcu+0x1bf/0x670
[  114.497624]  kunit_try_run_case+0x1a2/0x480
[  114.501818]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  114.507216]  kthread+0x334/0x6f0
[  114.510449]  ret_from_fork+0x113/0x1d0
[  114.514200]  ret_from_fork_asm+0x1a/0x30
[  114.518126] 
[  114.519630] CPU: 1 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[  114.530504] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[  114.536510] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  114.543902] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   91.082824] ==================================================================
[   91.093996] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210
[   91.093996] 
[   91.102097] Invalid read at 0x00000000161be419:
[   91.106631]  test_invalid_access+0xf0/0x210
[   91.110816]  kunit_try_run_case+0x1a2/0x480
[   91.115010]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   91.120409]  kthread+0x334/0x6f0
[   91.123643]  ret_from_fork+0x113/0x1d0
[   91.127396]  ret_from_fork_asm+0x1a/0x30
[   91.131353] 
[   91.132873] CPU: 1 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   91.143751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   91.149762] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   91.157156] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   90.690360] ==================================================================
[   90.697610] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340
[   90.697610] 
[   90.707176] Corrupted memory at 0x00000000667be82d [ ! . . . . . . . . . . . . . . . ] (in kfence-#6):
[   90.716521]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   90.721753]  kunit_try_run_case+0x1a2/0x480
[   90.725941]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   90.731338]  kthread+0x334/0x6f0
[   90.734572]  ret_from_fork+0x113/0x1d0
[   90.738324]  ret_from_fork_asm+0x1a/0x30
[   90.742251] 
[   90.743750] kfence-#6: 0x00000000a62209e0-0x00000000de8deca9, size=73, cache=kmalloc-96
[   90.743750] 
[   90.753231] allocated by task 366 on cpu 3 at 90.690351s (0.062880s ago):
[   90.760029]  test_alloc+0x364/0x10f0
[   90.763615]  test_kmalloc_aligned_oob_write+0xc8/0x340
[   90.768753]  kunit_try_run_case+0x1a2/0x480
[   90.772940]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   90.778337]  kthread+0x334/0x6f0
[   90.781569]  ret_from_fork+0x113/0x1d0
[   90.785324]  ret_from_fork_asm+0x1a/0x30
[   90.789250] 
[   90.790748] freed by task 366 on cpu 3 at 90.690353s (0.100394s ago):
[   90.797192]  test_kmalloc_aligned_oob_write+0x24f/0x340
[   90.802424]  kunit_try_run_case+0x1a2/0x480
[   90.806609]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   90.812008]  kthread+0x334/0x6f0
[   90.815241]  ret_from_fork+0x113/0x1d0
[   90.818994]  ret_from_fork_asm+0x1a/0x30
[   90.822920] 
[   90.824420] CPU: 3 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   90.835298] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   90.841300] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   90.848695] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   14.277512] ==================================================================
[   14.284736] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   14.291704] Write of size 1 at addr ffff8881066f8078 by task kunit_try_catch/177
[   14.299098] 
[   14.300596] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.300604] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   14.300607] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.300610] Call Trace:
[   14.300611]  <TASK>
[   14.300613]  dump_stack_lvl+0x73/0xb0
[   14.300618]  print_report+0xd1/0x650
[   14.300621]  ? __virt_addr_valid+0x1db/0x2d0
[   14.300625]  ? kmalloc_oob_right+0x6bd/0x7f0
[   14.300629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.300634]  ? kmalloc_oob_right+0x6bd/0x7f0
[   14.300638]  kasan_report+0x141/0x180
[   14.300642]  ? kmalloc_oob_right+0x6bd/0x7f0
[   14.300647]  __asan_report_store1_noabort+0x1b/0x30
[   14.300651]  kmalloc_oob_right+0x6bd/0x7f0
[   14.300655]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   14.300659]  ? __schedule+0x10cc/0x2b60
[   14.300663]  ? ktime_get_ts64+0x83/0x230
[   14.300668]  kunit_try_run_case+0x1a2/0x480
[   14.300672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.300676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.300680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.300684]  ? __kthread_parkme+0x82/0x180
[   14.300688]  ? preempt_count_sub+0x50/0x80
[   14.300692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.300696]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.300700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.300704]  kthread+0x334/0x6f0
[   14.300708]  ? trace_preempt_on+0x20/0xc0
[   14.300712]  ? __pfx_kthread+0x10/0x10
[   14.300715]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.300719]  ? calculate_sigpending+0x7b/0xa0
[   14.300723]  ? __pfx_kthread+0x10/0x10
[   14.300727]  ret_from_fork+0x113/0x1d0
[   14.300730]  ? __pfx_kthread+0x10/0x10
[   14.300734]  ret_from_fork_asm+0x1a/0x30
[   14.300740]  </TASK>
[   14.300741] 
[   14.465730] Allocated by task 177:
[   14.469136]  kasan_save_stack+0x45/0x70
[   14.472975]  kasan_save_track+0x18/0x40
[   14.476814]  kasan_save_alloc_info+0x3b/0x50
[   14.481086]  __kasan_kmalloc+0xb7/0xc0
[   14.484840]  __kmalloc_cache_noprof+0x189/0x420
[   14.489385]  kmalloc_oob_right+0xa9/0x7f0
[   14.493403]  kunit_try_run_case+0x1a2/0x480
[   14.497587]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.502988]  kthread+0x334/0x6f0
[   14.506219]  ret_from_fork+0x113/0x1d0
[   14.509972]  ret_from_fork_asm+0x1a/0x30
[   14.513898] 
[   14.515398] The buggy address belongs to the object at ffff8881066f8000
[   14.515398]  which belongs to the cache kmalloc-128 of size 128
[   14.527912] The buggy address is located 5 bytes to the right of
[   14.527912]  allocated 115-byte region [ffff8881066f8000, ffff8881066f8073)
[   14.540861] 
[   14.542362] The buggy address belongs to the physical page:
[   14.547960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   14.555967] flags: 0x200000000000000(node=0|zone=2)
[   14.560845] page_type: f5(slab)
[   14.563993] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.571733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.579470] page dumped because: kasan: bad access detected
[   14.585044] 
[   14.586544] Memory state around the buggy address:
[   14.591347]  ffff8881066f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.598590]  ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.605811] >ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.613036]                                                                 ^
[   14.620170]  ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627402]  ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634626] ==================================================================
[   14.641868] ==================================================================
[   14.649100] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   14.656067] Read of size 1 at addr ffff8881066f8080 by task kunit_try_catch/177
[   14.663386] 
[   14.664880] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.664888] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   14.664891] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   14.664894] Call Trace:
[   14.664896]  <TASK>
[   14.664897]  dump_stack_lvl+0x73/0xb0
[   14.664902]  print_report+0xd1/0x650
[   14.664905]  ? __virt_addr_valid+0x1db/0x2d0
[   14.664909]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.664913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.664918]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.664922]  kasan_report+0x141/0x180
[   14.664926]  ? kmalloc_oob_right+0x68a/0x7f0
[   14.664931]  __asan_report_load1_noabort+0x18/0x20
[   14.664935]  kmalloc_oob_right+0x68a/0x7f0
[   14.664939]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   14.664943]  ? __schedule+0x10cc/0x2b60
[   14.664947]  ? ktime_get_ts64+0x83/0x230
[   14.664951]  kunit_try_run_case+0x1a2/0x480
[   14.664956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.664960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.664964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.664968]  ? __kthread_parkme+0x82/0x180
[   14.664971]  ? preempt_count_sub+0x50/0x80
[   14.664976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.664980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.664984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.664988]  kthread+0x334/0x6f0
[   14.664991]  ? trace_preempt_on+0x20/0xc0
[   14.664995]  ? __pfx_kthread+0x10/0x10
[   14.664999]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.665003]  ? calculate_sigpending+0x7b/0xa0
[   14.665007]  ? __pfx_kthread+0x10/0x10
[   14.665011]  ret_from_fork+0x113/0x1d0
[   14.665014]  ? __pfx_kthread+0x10/0x10
[   14.665018]  ret_from_fork_asm+0x1a/0x30
[   14.665024]  </TASK>
[   14.665025] 
[   14.829834] Allocated by task 177:
[   14.833240]  kasan_save_stack+0x45/0x70
[   14.837078]  kasan_save_track+0x18/0x40
[   14.840916]  kasan_save_alloc_info+0x3b/0x50
[   14.845190]  __kasan_kmalloc+0xb7/0xc0
[   14.848942]  __kmalloc_cache_noprof+0x189/0x420
[   14.853476]  kmalloc_oob_right+0xa9/0x7f0
[   14.857489]  kunit_try_run_case+0x1a2/0x480
[   14.861681]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.867082]  kthread+0x334/0x6f0
[   14.870313]  ret_from_fork+0x113/0x1d0
[   14.874067]  ret_from_fork_asm+0x1a/0x30
[   14.877991] 
[   14.879493] The buggy address belongs to the object at ffff8881066f8000
[   14.879493]  which belongs to the cache kmalloc-128 of size 128
[   14.892006] The buggy address is located 13 bytes to the right of
[   14.892006]  allocated 115-byte region [ffff8881066f8000, ffff8881066f8073)
[   14.905041] 
[   14.906541] The buggy address belongs to the physical page:
[   14.912113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   14.920114] flags: 0x200000000000000(node=0|zone=2)
[   14.924992] page_type: f5(slab)
[   14.928140] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.935888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.943633] page dumped because: kasan: bad access detected
[   14.949206] 
[   14.950706] Memory state around the buggy address:
[   14.955498]  ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.962717]  ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.969939] >ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.977166]                    ^
[   14.980397]  ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987618]  ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.994836] ==================================================================
[   13.909169] ==================================================================
[   13.916407] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   13.923384] Write of size 1 at addr ffff8881066f8073 by task kunit_try_catch/177
[   13.930781] 
[   13.932284] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S               N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.932293] Tainted: [S]=CPU_OUT_OF_SPEC, [N]=TEST
[   13.932296] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   13.932299] Call Trace:
[   13.932301]  <TASK>
[   13.932303]  dump_stack_lvl+0x73/0xb0
[   13.932309]  print_report+0xd1/0x650
[   13.932313]  ? __virt_addr_valid+0x1db/0x2d0
[   13.932333]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.932336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.932342]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.932346]  kasan_report+0x141/0x180
[   13.932350]  ? kmalloc_oob_right+0x6f0/0x7f0
[   13.932367]  __asan_report_store1_noabort+0x1b/0x30
[   13.932372]  kmalloc_oob_right+0x6f0/0x7f0
[   13.932376]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   13.932380]  ? __schedule+0x10cc/0x2b60
[   13.932385]  ? ktime_get_ts64+0x83/0x230
[   13.932389]  kunit_try_run_case+0x1a2/0x480
[   13.932394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.932399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.932403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.932408]  ? __kthread_parkme+0x82/0x180
[   13.932411]  ? preempt_count_sub+0x50/0x80
[   13.932416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.932421]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   13.932425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.932429]  kthread+0x334/0x6f0
[   13.932432]  ? trace_preempt_on+0x20/0xc0
[   13.932437]  ? __pfx_kthread+0x10/0x10
[   13.932441]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.932444]  ? calculate_sigpending+0x7b/0xa0
[   13.932449]  ? __pfx_kthread+0x10/0x10
[   13.932453]  ret_from_fork+0x113/0x1d0
[   13.932457]  ? __pfx_kthread+0x10/0x10
[   13.932460]  ret_from_fork_asm+0x1a/0x30
[   13.932466]  </TASK>
[   13.932468] 
[   14.096220] Allocated by task 177:
[   14.099624]  kasan_save_stack+0x45/0x70
[   14.103466]  kasan_save_track+0x18/0x40
[   14.107303]  kasan_save_alloc_info+0x3b/0x50
[   14.111603]  __kasan_kmalloc+0xb7/0xc0
[   14.115369]  __kmalloc_cache_noprof+0x189/0x420
[   14.119916]  kmalloc_oob_right+0xa9/0x7f0
[   14.123926]  kunit_try_run_case+0x1a2/0x480
[   14.128114]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   14.133511]  kthread+0x334/0x6f0
[   14.136746]  ret_from_fork+0x113/0x1d0
[   14.140499]  ret_from_fork_asm+0x1a/0x30
[   14.144432] 
[   14.145932] The buggy address belongs to the object at ffff8881066f8000
[   14.145932]  which belongs to the cache kmalloc-128 of size 128
[   14.158448] The buggy address is located 0 bytes to the right of
[   14.158448]  allocated 115-byte region [ffff8881066f8000, ffff8881066f8073)
[   14.171404] 
[   14.172901] The buggy address belongs to the physical page:
[   14.178477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   14.186484] flags: 0x200000000000000(node=0|zone=2)
[   14.191384] page_type: f5(slab)
[   14.194536] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   14.202282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.210020] page dumped because: kasan: bad access detected
[   14.215594] 
[   14.217092] Memory state around the buggy address:
[   14.221886]  ffff8881066f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.229104]  ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.236351] >ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.243594]                                                              ^
[   14.250468]  ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.257689]  ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264906] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   90.354356] ==================================================================
[   90.361611] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560
[   90.361611] 
[   90.371190] Out-of-bounds read at 0x0000000033c106e2 (105B right of kfence-#2):
[   90.378503]  test_kmalloc_aligned_oob_read+0x27e/0x560
[   90.383642]  kunit_try_run_case+0x1a2/0x480
[   90.387829]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   90.393229]  kthread+0x334/0x6f0
[   90.396469]  ret_from_fork+0x113/0x1d0
[   90.400220]  ret_from_fork_asm+0x1a/0x30
[   90.404147] 
[   90.405648] kfence-#2: 0x00000000a1e945ac-0x00000000dc35735b, size=73, cache=kmalloc-96
[   90.405648] 
[   90.415130] allocated by task 364 on cpu 0 at 90.354351s (0.060778s ago):
[   90.421925]  test_alloc+0x364/0x10f0
[   90.425510]  test_kmalloc_aligned_oob_read+0x105/0x560
[   90.430649]  kunit_try_run_case+0x1a2/0x480
[   90.434838]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   90.440235]  kthread+0x334/0x6f0
[   90.443468]  ret_from_fork+0x113/0x1d0
[   90.447220]  ret_from_fork_asm+0x1a/0x30
[   90.451146] 
[   90.452648] CPU: 0 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   90.463525] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   90.469538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   90.476929] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   83.890356] ==================================================================
[   83.897609] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0
[   83.897609] 
[   83.905876] Corrupted memory at 0x000000003aa360ce [ ! . . . . . . . . . . . . . . . ] (in kfence-#196):
[   83.915394]  test_corruption+0x2d2/0x3e0
[   83.919326]  kunit_try_run_case+0x1a2/0x480
[   83.923511]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.928912]  kthread+0x334/0x6f0
[   83.932144]  ret_from_fork+0x113/0x1d0
[   83.935898]  ret_from_fork_asm+0x1a/0x30
[   83.939833] 
[   83.941332] kfence-#196: 0x00000000f926adfa-0x0000000013e31388, size=32, cache=kmalloc-32
[   83.941332] 
[   83.950986] allocated by task 352 on cpu 0 at 83.890348s (0.060637s ago):
[   83.957775]  test_alloc+0x364/0x10f0
[   83.961359]  test_corruption+0xe6/0x3e0
[   83.965200]  kunit_try_run_case+0x1a2/0x480
[   83.969394]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.974794]  kthread+0x334/0x6f0
[   83.978026]  ret_from_fork+0x113/0x1d0
[   83.981779]  ret_from_fork_asm+0x1a/0x30
[   83.985706] 
[   83.987204] freed by task 352 on cpu 0 at 83.890350s (0.096853s ago):
[   83.993645]  test_corruption+0x2d2/0x3e0
[   83.997570]  kunit_try_run_case+0x1a2/0x480
[   84.001756]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   84.007154]  kthread+0x334/0x6f0
[   84.010393]  ret_from_fork+0x113/0x1d0
[   84.014149]  ret_from_fork_asm+0x1a/0x30
[   84.018074] 
[   84.019576] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   84.030454] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   84.036458] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   84.043849] ==================================================================
[   84.154355] ==================================================================
[   84.161585] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0
[   84.161585] 
[   84.169843] Corrupted memory at 0x00000000fec71d90 [ ! ] (in kfence-#198):
[   84.176736]  test_corruption+0x2df/0x3e0
[   84.180661]  kunit_try_run_case+0x1a2/0x480
[   84.184847]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   84.190245]  kthread+0x334/0x6f0
[   84.193480]  ret_from_fork+0x113/0x1d0
[   84.197231]  ret_from_fork_asm+0x1a/0x30
[   84.201156] 
[   84.202658] kfence-#198: 0x00000000972808e0-0x00000000eaa2685c, size=32, cache=kmalloc-32
[   84.202658] 
[   84.212311] allocated by task 352 on cpu 0 at 84.154348s (0.057963s ago):
[   84.219099]  test_alloc+0x364/0x10f0
[   84.222686]  test_corruption+0x1cb/0x3e0
[   84.226620]  kunit_try_run_case+0x1a2/0x480
[   84.230805]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   84.236205]  kthread+0x334/0x6f0
[   84.239438]  ret_from_fork+0x113/0x1d0
[   84.243191]  ret_from_fork_asm+0x1a/0x30
[   84.247125] 
[   84.248625] freed by task 352 on cpu 0 at 84.154350s (0.094275s ago):
[   84.255065]  test_corruption+0x2df/0x3e0
[   84.258999]  kunit_try_run_case+0x1a2/0x480
[   84.263194]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   84.268600]  kthread+0x334/0x6f0
[   84.271832]  ret_from_fork+0x113/0x1d0
[   84.275585]  ret_from_fork_asm+0x1a/0x30
[   84.279512] 
[   84.281011] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   84.291882] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   84.297893] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   84.305285] ==================================================================
[   85.202354] ==================================================================
[   85.209605] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0
[   85.209605] 
[   85.217864] Corrupted memory at 0x00000000bca51629 [ ! ] (in kfence-#207):
[   85.224754]  test_corruption+0x216/0x3e0
[   85.228680]  kunit_try_run_case+0x1a2/0x480
[   85.232866]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   85.238267]  kthread+0x334/0x6f0
[   85.241500]  ret_from_fork+0x113/0x1d0
[   85.245252]  ret_from_fork_asm+0x1a/0x30
[   85.249178] 
[   85.250677] kfence-#207: 0x000000004faa9cd9-0x00000000eb1bb2a6, size=32, cache=test
[   85.250677] 
[   85.259803] allocated by task 354 on cpu 1 at 85.202348s (0.057454s ago):
[   85.266591]  test_alloc+0x2a6/0x10f0
[   85.270178]  test_corruption+0x1cb/0x3e0
[   85.274112]  kunit_try_run_case+0x1a2/0x480
[   85.278298]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   85.283696]  kthread+0x334/0x6f0
[   85.286928]  ret_from_fork+0x113/0x1d0
[   85.290682]  ret_from_fork_asm+0x1a/0x30
[   85.294607] 
[   85.296106] freed by task 354 on cpu 1 at 85.202350s (0.093756s ago):
[   85.302548]  test_corruption+0x216/0x3e0
[   85.306472]  kunit_try_run_case+0x1a2/0x480
[   85.310657]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   85.316058]  kthread+0x334/0x6f0
[   85.319290]  ret_from_fork+0x113/0x1d0
[   85.323042]  ret_from_fork_asm+0x1a/0x30
[   85.326970] 
[   85.328469] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   85.339337] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   85.345343] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   85.352734] ==================================================================
[   84.938356] ==================================================================
[   84.945613] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0
[   84.945613] 
[   84.953880] Corrupted memory at 0x00000000fd8cedfb [ ! . . . . . . . . . . . . . . . ] (in kfence-#205):
[   84.963397]  test_corruption+0x131/0x3e0
[   84.967329]  kunit_try_run_case+0x1a2/0x480
[   84.971516]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   84.976914]  kthread+0x334/0x6f0
[   84.980149]  ret_from_fork+0x113/0x1d0
[   84.983901]  ret_from_fork_asm+0x1a/0x30
[   84.987825] 
[   84.989340] kfence-#205: 0x00000000bb3fb3b1-0x000000003852deeb, size=32, cache=test
[   84.989340] 
[   84.998495] allocated by task 354 on cpu 1 at 84.938349s (0.060145s ago):
[   85.005283]  test_alloc+0x2a6/0x10f0
[   85.008871]  test_corruption+0xe6/0x3e0
[   85.012709]  kunit_try_run_case+0x1a2/0x480
[   85.016902]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   85.022303]  kthread+0x334/0x6f0
[   85.025536]  ret_from_fork+0x113/0x1d0
[   85.029289]  ret_from_fork_asm+0x1a/0x30
[   85.033214] 
[   85.034714] freed by task 354 on cpu 1 at 84.938351s (0.096362s ago):
[   85.041164]  test_corruption+0x131/0x3e0
[   85.045095]  kunit_try_run_case+0x1a2/0x480
[   85.049282]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   85.054680]  kthread+0x334/0x6f0
[   85.057914]  ret_from_fork+0x113/0x1d0
[   85.061668]  ret_from_fork_asm+0x1a/0x30
[   85.065600] 
[   85.067102] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   85.077979] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   85.083982] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   85.091388] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   83.242354] ==================================================================
[   83.249607] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260
[   83.249607] 
[   83.257961] Invalid free of 0x000000001d4d85c2 (in kfence-#190):
[   83.263975]  test_invalid_addr_free+0xfb/0x260
[   83.268427]  kunit_try_run_case+0x1a2/0x480
[   83.272614]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.278012]  kthread+0x334/0x6f0
[   83.281245]  ret_from_fork+0x113/0x1d0
[   83.285001]  ret_from_fork_asm+0x1a/0x30
[   83.288933] 
[   83.290432] kfence-#190: 0x00000000c9936bc5-0x000000004965f527, size=32, cache=test
[   83.290432] 
[   83.299559] allocated by task 350 on cpu 1 at 83.242349s (0.057210s ago):
[   83.306345]  test_alloc+0x2a6/0x10f0
[   83.309925]  test_invalid_addr_free+0xdb/0x260
[   83.314370]  kunit_try_run_case+0x1a2/0x480
[   83.318557]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.323955]  kthread+0x334/0x6f0
[   83.327187]  ret_from_fork+0x113/0x1d0
[   83.330942]  ret_from_fork_asm+0x1a/0x30
[   83.334877] 
[   83.336376] CPU: 1 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   83.347254] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   83.353257] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   83.360651] ==================================================================
[   83.010356] ==================================================================
[   83.017610] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260
[   83.017610] 
[   83.026050] Invalid free of 0x0000000058d7f59a (in kfence-#188):
[   83.032065]  test_invalid_addr_free+0x1e1/0x260
[   83.036606]  kunit_try_run_case+0x1a2/0x480
[   83.040799]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.046198]  kthread+0x334/0x6f0
[   83.049433]  ret_from_fork+0x113/0x1d0
[   83.053191]  ret_from_fork_asm+0x1a/0x30
[   83.057120] 
[   83.058618] kfence-#188: 0x0000000041211a33-0x0000000040647611, size=32, cache=kmalloc-32
[   83.058618] 
[   83.068273] allocated by task 348 on cpu 0 at 83.010350s (0.057922s ago):
[   83.075059]  test_alloc+0x364/0x10f0
[   83.078638]  test_invalid_addr_free+0xdb/0x260
[   83.083085]  kunit_try_run_case+0x1a2/0x480
[   83.087271]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   83.092668]  kthread+0x334/0x6f0
[   83.095903]  ret_from_fork+0x113/0x1d0
[   83.099655]  ret_from_fork_asm+0x1a/0x30
[   83.103580] 
[   83.105083] CPU: 0 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   83.115958] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   83.121964] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   83.129356] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   82.746358] ==================================================================
[   82.753615] BUG: KFENCE: invalid free in test_double_free+0x112/0x260
[   82.753615] 
[   82.761536] Invalid free of 0x00000000f11130fc (in kfence-#186):
[   82.767549]  test_double_free+0x112/0x260
[   82.771562]  kunit_try_run_case+0x1a2/0x480
[   82.775749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.781147]  kthread+0x334/0x6f0
[   82.784380]  ret_from_fork+0x113/0x1d0
[   82.788133]  ret_from_fork_asm+0x1a/0x30
[   82.792058] 
[   82.793559] kfence-#186: 0x00000000f11130fc-0x00000000b89beab0, size=32, cache=test
[   82.793559] 
[   82.802693] allocated by task 346 on cpu 1 at 82.746351s (0.056341s ago):
[   82.809479]  test_alloc+0x2a6/0x10f0
[   82.813058]  test_double_free+0xdb/0x260
[   82.816983]  kunit_try_run_case+0x1a2/0x480
[   82.821170]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.826568]  kthread+0x334/0x6f0
[   82.829801]  ret_from_fork+0x113/0x1d0
[   82.833555]  ret_from_fork_asm+0x1a/0x30
[   82.837481] 
[   82.838979] freed by task 346 on cpu 1 at 82.746353s (0.092625s ago):
[   82.845422]  test_double_free+0xfa/0x260
[   82.849354]  kunit_try_run_case+0x1a2/0x480
[   82.853540]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.858940]  kthread+0x334/0x6f0
[   82.862173]  ret_from_fork+0x113/0x1d0
[   82.865925]  ret_from_fork_asm+0x1a/0x30
[   82.869851] 
[   82.871353] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   82.882228] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   82.888231] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.895624] ==================================================================
[   82.482363] ==================================================================
[   82.489619] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260
[   82.489619] 
[   82.497540] Invalid free of 0x00000000dc6b3dc2 (in kfence-#184):
[   82.503548]  test_double_free+0x1d3/0x260
[   82.507567]  kunit_try_run_case+0x1a2/0x480
[   82.511753]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.517154]  kthread+0x334/0x6f0
[   82.520386]  ret_from_fork+0x113/0x1d0
[   82.524139]  ret_from_fork_asm+0x1a/0x30
[   82.528065] 
[   82.529563] kfence-#184: 0x00000000dc6b3dc2-0x000000003276d158, size=32, cache=kmalloc-32
[   82.529563] 
[   82.539209] allocated by task 344 on cpu 0 at 82.482355s (0.056854s ago):
[   82.545998]  test_alloc+0x364/0x10f0
[   82.549584]  test_double_free+0xdb/0x260
[   82.553509]  kunit_try_run_case+0x1a2/0x480
[   82.557695]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.563096]  kthread+0x334/0x6f0
[   82.566328]  ret_from_fork+0x113/0x1d0
[   82.570080]  ret_from_fork_asm+0x1a/0x30
[   82.574006] 
[   82.575507] freed by task 344 on cpu 0 at 82.482357s (0.093150s ago):
[   82.581956]  test_double_free+0x1e0/0x260
[   82.585976]  kunit_try_run_case+0x1a2/0x480
[   82.590169]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.595570]  kthread+0x334/0x6f0
[   82.598802]  ret_from_fork+0x113/0x1d0
[   82.602554]  ret_from_fork_asm+0x1a/0x30
[   82.606480] 
[   82.607981] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   82.618859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   82.624872] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.632263] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   82.010355] ==================================================================
[   82.017608] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   82.017608] 
[   82.026830] Use-after-free read at 0x00000000ed776a4e (in kfence-#180):
[   82.033443]  test_use_after_free_read+0x129/0x270
[   82.038159]  kunit_try_run_case+0x1a2/0x480
[   82.042352]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.047750]  kthread+0x334/0x6f0
[   82.050983]  ret_from_fork+0x113/0x1d0
[   82.054738]  ret_from_fork_asm+0x1a/0x30
[   82.058670] 
[   82.060172] kfence-#180: 0x00000000ed776a4e-0x000000002d024017, size=32, cache=test
[   82.060172] 
[   82.069305] allocated by task 338 on cpu 0 at 82.010349s (0.058954s ago):
[   82.076092]  test_alloc+0x2a6/0x10f0
[   82.079671]  test_use_after_free_read+0xdc/0x270
[   82.084289]  kunit_try_run_case+0x1a2/0x480
[   82.088475]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.093876]  kthread+0x334/0x6f0
[   82.097109]  ret_from_fork+0x113/0x1d0
[   82.100861]  ret_from_fork_asm+0x1a/0x30
[   82.104786] 
[   82.106287] freed by task 338 on cpu 0 at 82.010351s (0.095935s ago):
[   82.112736]  test_use_after_free_read+0xfb/0x270
[   82.117363]  kunit_try_run_case+0x1a2/0x480
[   82.121558]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   82.126964]  kthread+0x334/0x6f0
[   82.130196]  ret_from_fork+0x113/0x1d0
[   82.133950]  ret_from_fork_asm+0x1a/0x30
[   82.137876] 
[   82.139376] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   82.150254] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   82.156267] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   82.163659] ==================================================================
[   81.746355] ==================================================================
[   81.753607] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270
[   81.753607] 
[   81.762836] Use-after-free read at 0x000000008a4c0fd5 (in kfence-#178):
[   81.769448]  test_use_after_free_read+0x129/0x270
[   81.774154]  kunit_try_run_case+0x1a2/0x480
[   81.778340]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.783739]  kthread+0x334/0x6f0
[   81.786972]  ret_from_fork+0x113/0x1d0
[   81.790726]  ret_from_fork_asm+0x1a/0x30
[   81.794652] 
[   81.796151] kfence-#178: 0x000000008a4c0fd5-0x00000000935a1876, size=32, cache=kmalloc-32
[   81.796151] 
[   81.805805] allocated by task 336 on cpu 2 at 81.746349s (0.059455s ago):
[   81.812602]  test_alloc+0x364/0x10f0
[   81.816188]  test_use_after_free_read+0xdc/0x270
[   81.820807]  kunit_try_run_case+0x1a2/0x480
[   81.824993]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.830394]  kthread+0x334/0x6f0
[   81.833633]  ret_from_fork+0x113/0x1d0
[   81.837387]  ret_from_fork_asm+0x1a/0x30
[   81.841320] 
[   81.842821] freed by task 336 on cpu 2 at 81.746352s (0.096469s ago):
[   81.849261]  test_use_after_free_read+0x1e7/0x270
[   81.853973]  kunit_try_run_case+0x1a2/0x480
[   81.858160]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.863558]  kthread+0x334/0x6f0
[   81.866794]  ret_from_fork+0x113/0x1d0
[   81.870546]  ret_from_fork_asm+0x1a/0x30
[   81.874479] 
[   81.875979] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   81.886859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   81.892869] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   81.900262] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   81.514355] ==================================================================
[   81.521610] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   81.521610] 
[   81.530841] Out-of-bounds write at 0x000000001daa3ee0 (1B left of kfence-#176):
[   81.538155]  test_out_of_bounds_write+0x10d/0x260
[   81.542867]  kunit_try_run_case+0x1a2/0x480
[   81.547056]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.552464]  kthread+0x334/0x6f0
[   81.555703]  ret_from_fork+0x113/0x1d0
[   81.559455]  ret_from_fork_asm+0x1a/0x30
[   81.563381] 
[   81.564883] kfence-#176: 0x00000000a60ede31-0x0000000062755bc0, size=32, cache=test
[   81.564883] 
[   81.574016] allocated by task 334 on cpu 2 at 81.514352s (0.059663s ago):
[   81.580803]  test_alloc+0x2a6/0x10f0
[   81.584382]  test_out_of_bounds_write+0xd4/0x260
[   81.589001]  kunit_try_run_case+0x1a2/0x480
[   81.593186]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.598585]  kthread+0x334/0x6f0
[   81.601821]  ret_from_fork+0x113/0x1d0
[   81.605572]  ret_from_fork_asm+0x1a/0x30
[   81.609498] 
[   81.611000] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   81.621877] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   81.627880] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   81.635274] ==================================================================
[   81.178355] ==================================================================
[   81.185606] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260
[   81.185606] 
[   81.194827] Out-of-bounds write at 0x00000000b87b4796 (1B left of kfence-#173):
[   81.202139]  test_out_of_bounds_write+0x10d/0x260
[   81.206845]  kunit_try_run_case+0x1a2/0x480
[   81.211032]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.216430]  kthread+0x334/0x6f0
[   81.219664]  ret_from_fork+0x113/0x1d0
[   81.223417]  ret_from_fork_asm+0x1a/0x30
[   81.227343] 
[   81.228842] kfence-#173: 0x000000006587152e-0x00000000b2107960, size=32, cache=kmalloc-32
[   81.228842] 
[   81.238498] allocated by task 332 on cpu 2 at 81.178350s (0.060147s ago):
[   81.245294]  test_alloc+0x364/0x10f0
[   81.248879]  test_out_of_bounds_write+0xd4/0x260
[   81.253499]  kunit_try_run_case+0x1a2/0x480
[   81.257685]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   81.263083]  kthread+0x334/0x6f0
[   81.266315]  ret_from_fork+0x113/0x1d0
[   81.270068]  ret_from_fork_asm+0x1a/0x30
[   81.273997] 
[   81.275496] CPU: 2 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   81.286374] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   81.292385] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   81.299779] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   80.842354] ==================================================================
[   80.849607] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   80.849607] 
[   80.858648] Out-of-bounds read at 0x00000000134e28bf (32B right of kfence-#170):
[   80.866049]  test_out_of_bounds_read+0x216/0x4e0
[   80.870667]  kunit_try_run_case+0x1a2/0x480
[   80.874852]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.880253]  kthread+0x334/0x6f0
[   80.883486]  ret_from_fork+0x113/0x1d0
[   80.887239]  ret_from_fork_asm+0x1a/0x30
[   80.891173] 
[   80.892674] kfence-#170: 0x00000000b1723849-0x000000003b6f25f9, size=32, cache=test
[   80.892674] 
[   80.901807] allocated by task 330 on cpu 0 at 80.842351s (0.059455s ago):
[   80.908603]  test_alloc+0x2a6/0x10f0
[   80.912188]  test_out_of_bounds_read+0x1e2/0x4e0
[   80.916809]  kunit_try_run_case+0x1a2/0x480
[   80.920994]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.926394]  kthread+0x334/0x6f0
[   80.929626]  ret_from_fork+0x113/0x1d0
[   80.933380]  ret_from_fork_asm+0x1a/0x30
[   80.937315] 
[   80.938814] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   80.949682] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   80.955687] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.963080] ==================================================================
[   80.274350] ==================================================================
[   80.281597] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0
[   80.281597] 
[   80.290644] Out-of-bounds read at 0x00000000588bf01b (32B right of kfence-#165):
[   80.298038]  test_out_of_bounds_read+0x216/0x4e0
[   80.302657]  kunit_try_run_case+0x1a2/0x480
[   80.306844]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.312242]  kthread+0x334/0x6f0
[   80.315475]  ret_from_fork+0x113/0x1d0
[   80.319228]  ret_from_fork_asm+0x1a/0x30
[   80.323154] 
[   80.324653] kfence-#165: 0x000000009011091b-0x00000000ffc8fa62, size=32, cache=kmalloc-32
[   80.324653] 
[   80.334298] allocated by task 328 on cpu 2 at 80.274348s (0.059950s ago):
[   80.341087]  test_alloc+0x364/0x10f0
[   80.344672]  test_out_of_bounds_read+0x1e2/0x4e0
[   80.349291]  kunit_try_run_case+0x1a2/0x480
[   80.353477]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.358876]  kthread+0x334/0x6f0
[   80.362109]  ret_from_fork+0x113/0x1d0
[   80.365864]  ret_from_fork_asm+0x1a/0x30
[   80.369797] 
[   80.371299] CPU: 2 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   80.382174] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   80.388178] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.395571] ==================================================================
[   80.610352] ==================================================================
[   80.617604] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   80.617604] 
[   80.626658] Out-of-bounds read at 0x00000000f1915cbb (1B left of kfence-#168):
[   80.633888]  test_out_of_bounds_read+0x126/0x4e0
[   80.638514]  kunit_try_run_case+0x1a2/0x480
[   80.642700]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.648100]  kthread+0x334/0x6f0
[   80.651332]  ret_from_fork+0x113/0x1d0
[   80.655086]  ret_from_fork_asm+0x1a/0x30
[   80.659019] 
[   80.660520] kfence-#168: 0x00000000ec667a24-0x00000000ecda7ce5, size=32, cache=test
[   80.660520] 
[   80.669655] allocated by task 330 on cpu 0 at 80.610348s (0.059307s ago):
[   80.676451]  test_alloc+0x2a6/0x10f0
[   80.680038]  test_out_of_bounds_read+0xed/0x4e0
[   80.684569]  kunit_try_run_case+0x1a2/0x480
[   80.688756]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.694163]  kthread+0x334/0x6f0
[   80.697395]  ret_from_fork+0x113/0x1d0
[   80.701148]  ret_from_fork_asm+0x1a/0x30
[   80.705073] 
[   80.706575] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   80.717452] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   80.723466] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.730858] ==================================================================
[   79.938354] ==================================================================
[   79.945611] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0
[   79.945611] 
[   79.954666] Out-of-bounds read at 0x000000009587dcd6 (1B left of kfence-#162):
[   79.961895]  test_out_of_bounds_read+0x126/0x4e0
[   79.966523]  kunit_try_run_case+0x1a2/0x480
[   79.970715]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.976116]  kthread+0x334/0x6f0
[   79.979357]  ret_from_fork+0x113/0x1d0
[   79.983108]  ret_from_fork_asm+0x1a/0x30
[   79.987037] 
[   79.988535] kfence-#162: 0x0000000048469835-0x000000001b1beb73, size=32, cache=kmalloc-32
[   79.988535] 
[   79.998191] allocated by task 328 on cpu 2 at 79.938349s (0.059842s ago):
[   80.004988]  test_alloc+0x364/0x10f0
[   80.008572]  test_out_of_bounds_read+0xed/0x4e0
[   80.013106]  kunit_try_run_case+0x1a2/0x480
[   80.017290]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   80.022691]  kthread+0x334/0x6f0
[   80.025923]  ret_from_fork+0x113/0x1d0
[   80.029677]  ret_from_fork_asm+0x1a/0x30
[   80.033610] 
[   80.035113] CPU: 2 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   80.045980] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   80.051993] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   80.059392] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   15.806860] ==================================================================
[   15.830316] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520
[   15.830316] 
[   15.839912] Corrupted memory at 0x0000000012ef1a8f [ ! . . . . . . . . . . . . . . . ] (in kfence-#70):
[   15.849373]  kmalloc_track_caller_oob_right+0x288/0x520
[   15.854636]  kunit_try_run_case+0x1a2/0x480
[   15.858830]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.864229]  kthread+0x334/0x6f0
[   15.867463]  ret_from_fork+0x113/0x1d0
[   15.871214]  ret_from_fork_asm+0x1a/0x30
[   15.875141] 
[   15.876641] kfence-#70: 0x000000004a7c7daf-0x0000000007811704, size=120, cache=kmalloc-128
[   15.876641] 
[   15.886419] allocated by task 183 on cpu 1 at 15.806815s (0.079604s ago):
[   15.893210]  kmalloc_track_caller_oob_right+0x19a/0x520
[   15.898436]  kunit_try_run_case+0x1a2/0x480
[   15.902622]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.908020]  kthread+0x334/0x6f0
[   15.911255]  ret_from_fork+0x113/0x1d0
[   15.915008]  ret_from_fork_asm+0x1a/0x30
[   15.918942] 
[   15.920441] freed by task 183 on cpu 1 at 15.806855s (0.113585s ago):
[   15.926882]  kmalloc_track_caller_oob_right+0x288/0x520
[   15.932113]  kunit_try_run_case+0x1a2/0x480
[   15.936299]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.941701]  kthread+0x334/0x6f0
[   15.944932]  ret_from_fork+0x113/0x1d0
[   15.948687]  ret_from_fork_asm+0x1a/0x30
[   15.952620] 
[   15.954121] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.964996] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   15.971003] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.978422] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   79.037519] ==================================================================
[   79.044765] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   79.051638] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   79.059213] 
[   79.060712] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   79.060720] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   79.060723] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   79.060727] Call Trace:
[   79.060728]  <TASK>
[   79.060730]  dump_stack_lvl+0x73/0xb0
[   79.060735]  print_report+0xd1/0x650
[   79.060739]  ? __virt_addr_valid+0x1db/0x2d0
[   79.060743]  ? strncpy_from_user+0x2e/0x1d0
[   79.060747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   79.060753]  ? strncpy_from_user+0x2e/0x1d0
[   79.060757]  kasan_report+0x141/0x180
[   79.060761]  ? strncpy_from_user+0x2e/0x1d0
[   79.060767]  kasan_check_range+0x10c/0x1c0
[   79.060771]  __kasan_check_write+0x18/0x20
[   79.060775]  strncpy_from_user+0x2e/0x1d0
[   79.060779]  ? __kasan_check_read+0x15/0x20
[   79.060783]  copy_user_test_oob+0x760/0x10f0
[   79.060788]  ? __pfx_copy_user_test_oob+0x10/0x10
[   79.060793]  ? finish_task_switch.isra.0+0x153/0x700
[   79.060797]  ? __switch_to+0x544/0xf50
[   79.060802]  ? __schedule+0x10cc/0x2b60
[   79.060806]  ? ktime_get_ts64+0x83/0x230
[   79.060810]  kunit_try_run_case+0x1a2/0x480
[   79.060815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.060819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   79.060824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   79.060828]  ? __kthread_parkme+0x82/0x180
[   79.060832]  ? preempt_count_sub+0x50/0x80
[   79.060836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.060841]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.060845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   79.060850]  kthread+0x334/0x6f0
[   79.060853]  ? trace_preempt_on+0x20/0xc0
[   79.060857]  ? __pfx_kthread+0x10/0x10
[   79.060861]  ? _raw_spin_unlock_irq+0x47/0x80
[   79.060865]  ? calculate_sigpending+0x7b/0xa0
[   79.060870]  ? __pfx_kthread+0x10/0x10
[   79.060874]  ret_from_fork+0x113/0x1d0
[   79.060878]  ? __pfx_kthread+0x10/0x10
[   79.060881]  ret_from_fork_asm+0x1a/0x30
[   79.060887]  </TASK>
[   79.060889] 
[   79.246046] Allocated by task 326:
[   79.249452]  kasan_save_stack+0x45/0x70
[   79.253293]  kasan_save_track+0x18/0x40
[   79.257133]  kasan_save_alloc_info+0x3b/0x50
[   79.261421]  __kasan_kmalloc+0xb7/0xc0
[   79.265176]  __kmalloc_noprof+0x1c9/0x500
[   79.269189]  kunit_kmalloc_array+0x25/0x60
[   79.273297]  copy_user_test_oob+0xab/0x10f0
[   79.277492]  kunit_try_run_case+0x1a2/0x480
[   79.281684]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.287086]  kthread+0x334/0x6f0
[   79.290325]  ret_from_fork+0x113/0x1d0
[   79.294155]  ret_from_fork_asm+0x1a/0x30
[   79.298081] 
[   79.299581] The buggy address belongs to the object at ffff8881066e9300
[   79.299581]  which belongs to the cache kmalloc-128 of size 128
[   79.312098] The buggy address is located 0 bytes inside of
[   79.312098]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   79.324525] 
[   79.326022] The buggy address belongs to the physical page:
[   79.331596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   79.339596] flags: 0x200000000000000(node=0|zone=2)
[   79.344476] page_type: f5(slab)
[   79.347622] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   79.355406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   79.363150] page dumped because: kasan: bad access detected
[   79.368723] 
[   79.370224] Memory state around the buggy address:
[   79.375016]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.382235]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.389456] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.396683]                                                                 ^
[   79.403815]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.411035]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.418254] ==================================================================
[   79.425481] ==================================================================
[   79.432727] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   79.439686] Write of size 1 at addr ffff8881066e9378 by task kunit_try_catch/326
[   79.447080] 
[   79.448581] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   79.448589] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   79.448592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   79.448595] Call Trace:
[   79.448597]  <TASK>
[   79.448599]  dump_stack_lvl+0x73/0xb0
[   79.448603]  print_report+0xd1/0x650
[   79.448607]  ? __virt_addr_valid+0x1db/0x2d0
[   79.448611]  ? strncpy_from_user+0x1a5/0x1d0
[   79.448616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   79.448621]  ? strncpy_from_user+0x1a5/0x1d0
[   79.448626]  kasan_report+0x141/0x180
[   79.448630]  ? strncpy_from_user+0x1a5/0x1d0
[   79.448635]  __asan_report_store1_noabort+0x1b/0x30
[   79.448640]  strncpy_from_user+0x1a5/0x1d0
[   79.448645]  copy_user_test_oob+0x760/0x10f0
[   79.448650]  ? __pfx_copy_user_test_oob+0x10/0x10
[   79.448655]  ? finish_task_switch.isra.0+0x153/0x700
[   79.448659]  ? __switch_to+0x544/0xf50
[   79.448664]  ? __schedule+0x10cc/0x2b60
[   79.448668]  ? ktime_get_ts64+0x83/0x230
[   79.448672]  kunit_try_run_case+0x1a2/0x480
[   79.448677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.448681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   79.448686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   79.448690]  ? __kthread_parkme+0x82/0x180
[   79.448694]  ? preempt_count_sub+0x50/0x80
[   79.448698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.448703]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.448707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   79.448712]  kthread+0x334/0x6f0
[   79.448715]  ? trace_preempt_on+0x20/0xc0
[   79.448719]  ? __pfx_kthread+0x10/0x10
[   79.448723]  ? _raw_spin_unlock_irq+0x47/0x80
[   79.448727]  ? calculate_sigpending+0x7b/0xa0
[   79.448732]  ? __pfx_kthread+0x10/0x10
[   79.448736]  ret_from_fork+0x113/0x1d0
[   79.448740]  ? __pfx_kthread+0x10/0x10
[   79.448744]  ret_from_fork_asm+0x1a/0x30
[   79.448749]  </TASK>
[   79.448751] 
[   79.626763] Allocated by task 326:
[   79.630170]  kasan_save_stack+0x45/0x70
[   79.634011]  kasan_save_track+0x18/0x40
[   79.637857]  kasan_save_alloc_info+0x3b/0x50
[   79.642130]  __kasan_kmalloc+0xb7/0xc0
[   79.645882]  __kmalloc_noprof+0x1c9/0x500
[   79.649896]  kunit_kmalloc_array+0x25/0x60
[   79.653994]  copy_user_test_oob+0xab/0x10f0
[   79.658179]  kunit_try_run_case+0x1a2/0x480
[   79.662380]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.667808]  kthread+0x334/0x6f0
[   79.671041]  ret_from_fork+0x113/0x1d0
[   79.674795]  ret_from_fork_asm+0x1a/0x30
[   79.678720] 
[   79.680219] The buggy address belongs to the object at ffff8881066e9300
[   79.680219]  which belongs to the cache kmalloc-128 of size 128
[   79.692725] The buggy address is located 0 bytes to the right of
[   79.692725]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   79.705673] 
[   79.707174] The buggy address belongs to the physical page:
[   79.712746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   79.720755] flags: 0x200000000000000(node=0|zone=2)
[   79.725641] page_type: f5(slab)
[   79.728789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   79.736538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   79.744284] page dumped because: kasan: bad access detected
[   79.749855] 
[   79.751363] Memory state around the buggy address:
[   79.756185]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.763425]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.770647] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.777868]                                                                 ^
[   79.784998]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.792218]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.799437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   78.275945] ==================================================================
[   78.283177] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0
[   78.290317] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   78.297919] 
[   78.299420] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   78.299429] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   78.299432] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.299435] Call Trace:
[   78.299437]  <TASK>
[   78.299439]  dump_stack_lvl+0x73/0xb0
[   78.299443]  print_report+0xd1/0x650
[   78.299448]  ? __virt_addr_valid+0x1db/0x2d0
[   78.299452]  ? copy_user_test_oob+0x557/0x10f0
[   78.299456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.299461]  ? copy_user_test_oob+0x557/0x10f0
[   78.299466]  kasan_report+0x141/0x180
[   78.299470]  ? copy_user_test_oob+0x557/0x10f0
[   78.299476]  kasan_check_range+0x10c/0x1c0
[   78.299480]  __kasan_check_write+0x18/0x20
[   78.299484]  copy_user_test_oob+0x557/0x10f0
[   78.299489]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.299493]  ? finish_task_switch.isra.0+0x153/0x700
[   78.299498]  ? __switch_to+0x544/0xf50
[   78.299502]  ? __schedule+0x10cc/0x2b60
[   78.299507]  ? ktime_get_ts64+0x83/0x230
[   78.299511]  kunit_try_run_case+0x1a2/0x480
[   78.299516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.299520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.299525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.299529]  ? __kthread_parkme+0x82/0x180
[   78.299533]  ? preempt_count_sub+0x50/0x80
[   78.299537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.299542]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.299546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.299550]  kthread+0x334/0x6f0
[   78.299554]  ? trace_preempt_on+0x20/0xc0
[   78.299558]  ? __pfx_kthread+0x10/0x10
[   78.299562]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.299566]  ? calculate_sigpending+0x7b/0xa0
[   78.299571]  ? __pfx_kthread+0x10/0x10
[   78.299575]  ret_from_fork+0x113/0x1d0
[   78.299578]  ? __pfx_kthread+0x10/0x10
[   78.299582]  ret_from_fork_asm+0x1a/0x30
[   78.299588]  </TASK>
[   78.299590] 
[   78.477467] Allocated by task 326:
[   78.480872]  kasan_save_stack+0x45/0x70
[   78.484712]  kasan_save_track+0x18/0x40
[   78.488558]  kasan_save_alloc_info+0x3b/0x50
[   78.492832]  __kasan_kmalloc+0xb7/0xc0
[   78.496584]  __kmalloc_noprof+0x1c9/0x500
[   78.500595]  kunit_kmalloc_array+0x25/0x60
[   78.504694]  copy_user_test_oob+0xab/0x10f0
[   78.508882]  kunit_try_run_case+0x1a2/0x480
[   78.513067]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.518466]  kthread+0x334/0x6f0
[   78.521699]  ret_from_fork+0x113/0x1d0
[   78.525451]  ret_from_fork_asm+0x1a/0x30
[   78.529399] 
[   78.530904] The buggy address belongs to the object at ffff8881066e9300
[   78.530904]  which belongs to the cache kmalloc-128 of size 128
[   78.543420] The buggy address is located 0 bytes inside of
[   78.543420]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   78.555856] 
[   78.557376] The buggy address belongs to the physical page:
[   78.562980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   78.570986] flags: 0x200000000000000(node=0|zone=2)
[   78.575867] page_type: f5(slab)
[   78.579012] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.586753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.594501] page dumped because: kasan: bad access detected
[   78.600072] 
[   78.601570] Memory state around the buggy address:
[   78.606377]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.613626]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.620846] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.628067]                                                                 ^
[   78.635199]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.642421]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.649646] ==================================================================
[   78.656888] ==================================================================
[   78.664120] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0
[   78.671261] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   78.678746] 
[   78.680248] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   78.680257] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   78.680260] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   78.680263] Call Trace:
[   78.680265]  <TASK>
[   78.680267]  dump_stack_lvl+0x73/0xb0
[   78.680271]  print_report+0xd1/0x650
[   78.680275]  ? __virt_addr_valid+0x1db/0x2d0
[   78.680279]  ? copy_user_test_oob+0x604/0x10f0
[   78.680284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   78.680289]  ? copy_user_test_oob+0x604/0x10f0
[   78.680294]  kasan_report+0x141/0x180
[   78.680298]  ? copy_user_test_oob+0x604/0x10f0
[   78.680304]  kasan_check_range+0x10c/0x1c0
[   78.680308]  __kasan_check_read+0x15/0x20
[   78.680312]  copy_user_test_oob+0x604/0x10f0
[   78.680317]  ? __pfx_copy_user_test_oob+0x10/0x10
[   78.680321]  ? finish_task_switch.isra.0+0x153/0x700
[   78.680346]  ? __switch_to+0x544/0xf50
[   78.680351]  ? __schedule+0x10cc/0x2b60
[   78.680355]  ? ktime_get_ts64+0x83/0x230
[   78.680360]  kunit_try_run_case+0x1a2/0x480
[   78.680365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.680382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   78.680386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   78.680391]  ? __kthread_parkme+0x82/0x180
[   78.680394]  ? preempt_count_sub+0x50/0x80
[   78.680399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   78.680403]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.680408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   78.680412]  kthread+0x334/0x6f0
[   78.680416]  ? trace_preempt_on+0x20/0xc0
[   78.680420]  ? __pfx_kthread+0x10/0x10
[   78.680424]  ? _raw_spin_unlock_irq+0x47/0x80
[   78.680428]  ? calculate_sigpending+0x7b/0xa0
[   78.680433]  ? __pfx_kthread+0x10/0x10
[   78.680437]  ret_from_fork+0x113/0x1d0
[   78.680440]  ? __pfx_kthread+0x10/0x10
[   78.680444]  ret_from_fork_asm+0x1a/0x30
[   78.680450]  </TASK>
[   78.680452] 
[   78.858103] Allocated by task 326:
[   78.861510]  kasan_save_stack+0x45/0x70
[   78.865364]  kasan_save_track+0x18/0x40
[   78.869248]  kasan_save_alloc_info+0x3b/0x50
[   78.873522]  __kasan_kmalloc+0xb7/0xc0
[   78.877273]  __kmalloc_noprof+0x1c9/0x500
[   78.881287]  kunit_kmalloc_array+0x25/0x60
[   78.885393]  copy_user_test_oob+0xab/0x10f0
[   78.889581]  kunit_try_run_case+0x1a2/0x480
[   78.893767]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.899166]  kthread+0x334/0x6f0
[   78.902399]  ret_from_fork+0x113/0x1d0
[   78.906178]  ret_from_fork_asm+0x1a/0x30
[   78.910113] 
[   78.911610] The buggy address belongs to the object at ffff8881066e9300
[   78.911610]  which belongs to the cache kmalloc-128 of size 128
[   78.924119] The buggy address is located 0 bytes inside of
[   78.924119]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   78.936555] 
[   78.938052] The buggy address belongs to the physical page:
[   78.943627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   78.951634] flags: 0x200000000000000(node=0|zone=2)
[   78.956512] page_type: f5(slab)
[   78.959660] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.967430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.975173] page dumped because: kasan: bad access detected
[   78.980746] 
[   78.982245] Memory state around the buggy address:
[   78.987038]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.994266]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.001494] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.008714]                                                                 ^
[   79.015853]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.023073]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.030292] ==================================================================
[   77.895457] ==================================================================
[   77.902685] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0
[   77.909819] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   77.917307] 
[   77.918808] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   77.918817] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   77.918820] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.918823] Call Trace:
[   77.918825]  <TASK>
[   77.918827]  dump_stack_lvl+0x73/0xb0
[   77.918831]  print_report+0xd1/0x650
[   77.918835]  ? __virt_addr_valid+0x1db/0x2d0
[   77.918840]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.918844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.918849]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.918854]  kasan_report+0x141/0x180
[   77.918858]  ? copy_user_test_oob+0x4aa/0x10f0
[   77.918864]  kasan_check_range+0x10c/0x1c0
[   77.918869]  __kasan_check_read+0x15/0x20
[   77.918872]  copy_user_test_oob+0x4aa/0x10f0
[   77.918877]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.918882]  ? finish_task_switch.isra.0+0x153/0x700
[   77.918886]  ? __switch_to+0x544/0xf50
[   77.918891]  ? __schedule+0x10cc/0x2b60
[   77.918895]  ? ktime_get_ts64+0x83/0x230
[   77.918899]  kunit_try_run_case+0x1a2/0x480
[   77.918904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.918908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.918913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.918917]  ? __kthread_parkme+0x82/0x180
[   77.918921]  ? preempt_count_sub+0x50/0x80
[   77.918925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.918930]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.918934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.918939]  kthread+0x334/0x6f0
[   77.918942]  ? trace_preempt_on+0x20/0xc0
[   77.918947]  ? __pfx_kthread+0x10/0x10
[   77.918951]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.918955]  ? calculate_sigpending+0x7b/0xa0
[   77.918959]  ? __pfx_kthread+0x10/0x10
[   77.918963]  ret_from_fork+0x113/0x1d0
[   77.918967]  ? __pfx_kthread+0x10/0x10
[   77.918971]  ret_from_fork_asm+0x1a/0x30
[   77.918977]  </TASK>
[   77.918978] 
[   78.096618] Allocated by task 326:
[   78.100026]  kasan_save_stack+0x45/0x70
[   78.103874]  kasan_save_track+0x18/0x40
[   78.107720]  kasan_save_alloc_info+0x3b/0x50
[   78.111994]  __kasan_kmalloc+0xb7/0xc0
[   78.115746]  __kmalloc_noprof+0x1c9/0x500
[   78.119760]  kunit_kmalloc_array+0x25/0x60
[   78.123866]  copy_user_test_oob+0xab/0x10f0
[   78.128053]  kunit_try_run_case+0x1a2/0x480
[   78.132238]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   78.137639]  kthread+0x334/0x6f0
[   78.140872]  ret_from_fork+0x113/0x1d0
[   78.144623]  ret_from_fork_asm+0x1a/0x30
[   78.148549] 
[   78.150048] The buggy address belongs to the object at ffff8881066e9300
[   78.150048]  which belongs to the cache kmalloc-128 of size 128
[   78.162562] The buggy address is located 0 bytes inside of
[   78.162562]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   78.174990] 
[   78.176491] The buggy address belongs to the physical page:
[   78.182062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   78.190063] flags: 0x200000000000000(node=0|zone=2)
[   78.194942] page_type: f5(slab)
[   78.198090] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   78.205836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   78.213575] page dumped because: kasan: bad access detected
[   78.219147] 
[   78.220648] Memory state around the buggy address:
[   78.225439]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   78.232659]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.239878] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   78.247097]                                                                 ^
[   78.254231]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.261451]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.268678] ==================================================================
[   77.514557] ==================================================================
[   77.521788] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0
[   77.528930] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   77.536503] 
[   77.538004] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   77.538013] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   77.538016] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.538019] Call Trace:
[   77.538021]  <TASK>
[   77.538023]  dump_stack_lvl+0x73/0xb0
[   77.538028]  print_report+0xd1/0x650
[   77.538032]  ? __virt_addr_valid+0x1db/0x2d0
[   77.538036]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.538041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.538046]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.538051]  kasan_report+0x141/0x180
[   77.538055]  ? copy_user_test_oob+0x3fd/0x10f0
[   77.538061]  kasan_check_range+0x10c/0x1c0
[   77.538065]  __kasan_check_write+0x18/0x20
[   77.538069]  copy_user_test_oob+0x3fd/0x10f0
[   77.538074]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.538078]  ? finish_task_switch.isra.0+0x153/0x700
[   77.538083]  ? __switch_to+0x544/0xf50
[   77.538088]  ? __schedule+0x10cc/0x2b60
[   77.538092]  ? ktime_get_ts64+0x83/0x230
[   77.538096]  kunit_try_run_case+0x1a2/0x480
[   77.538101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.538106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.538110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.538114]  ? __kthread_parkme+0x82/0x180
[   77.538118]  ? preempt_count_sub+0x50/0x80
[   77.538122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.538127]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.538131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.538136]  kthread+0x334/0x6f0
[   77.538140]  ? trace_preempt_on+0x20/0xc0
[   77.538144]  ? __pfx_kthread+0x10/0x10
[   77.538148]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.538152]  ? calculate_sigpending+0x7b/0xa0
[   77.538157]  ? __pfx_kthread+0x10/0x10
[   77.538161]  ret_from_fork+0x113/0x1d0
[   77.538164]  ? __pfx_kthread+0x10/0x10
[   77.538168]  ret_from_fork_asm+0x1a/0x30
[   77.538174]  </TASK>
[   77.538176] 
[   77.715980] Allocated by task 326:
[   77.719393]  kasan_save_stack+0x45/0x70
[   77.723236]  kasan_save_track+0x18/0x40
[   77.727072]  kasan_save_alloc_info+0x3b/0x50
[   77.731364]  __kasan_kmalloc+0xb7/0xc0
[   77.735167]  __kmalloc_noprof+0x1c9/0x500
[   77.739180]  kunit_kmalloc_array+0x25/0x60
[   77.743282]  copy_user_test_oob+0xab/0x10f0
[   77.747476]  kunit_try_run_case+0x1a2/0x480
[   77.751661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.757062]  kthread+0x334/0x6f0
[   77.760294]  ret_from_fork+0x113/0x1d0
[   77.764045]  ret_from_fork_asm+0x1a/0x30
[   77.767971] 
[   77.769473] The buggy address belongs to the object at ffff8881066e9300
[   77.769473]  which belongs to the cache kmalloc-128 of size 128
[   77.781986] The buggy address is located 0 bytes inside of
[   77.781986]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   77.794419] 
[   77.795921] The buggy address belongs to the physical page:
[   77.801493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   77.809494] flags: 0x200000000000000(node=0|zone=2)
[   77.814386] page_type: f5(slab)
[   77.817564] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.825312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.833059] page dumped because: kasan: bad access detected
[   77.838631] 
[   77.840131] Memory state around the buggy address:
[   77.844922]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.852144]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.859382] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.866633]                                                                 ^
[   77.873764]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.880984]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.888203] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user
[   77.132912] ==================================================================
[   77.140145] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70
[   77.146592] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   77.154070] 
[   77.155571] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   77.155580] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   77.155583] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   77.155586] Call Trace:
[   77.155588]  <TASK>
[   77.155590]  dump_stack_lvl+0x73/0xb0
[   77.155595]  print_report+0xd1/0x650
[   77.155599]  ? __virt_addr_valid+0x1db/0x2d0
[   77.155603]  ? _copy_to_user+0x3c/0x70
[   77.155607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   77.155612]  ? _copy_to_user+0x3c/0x70
[   77.155615]  kasan_report+0x141/0x180
[   77.155620]  ? _copy_to_user+0x3c/0x70
[   77.155624]  kasan_check_range+0x10c/0x1c0
[   77.155629]  __kasan_check_read+0x15/0x20
[   77.155632]  _copy_to_user+0x3c/0x70
[   77.155635]  copy_user_test_oob+0x364/0x10f0
[   77.155641]  ? __pfx_copy_user_test_oob+0x10/0x10
[   77.155645]  ? finish_task_switch.isra.0+0x153/0x700
[   77.155650]  ? __switch_to+0x544/0xf50
[   77.155655]  ? __schedule+0x10cc/0x2b60
[   77.155659]  ? ktime_get_ts64+0x83/0x230
[   77.155663]  kunit_try_run_case+0x1a2/0x480
[   77.155668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.155672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   77.155677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   77.155681]  ? __kthread_parkme+0x82/0x180
[   77.155685]  ? preempt_count_sub+0x50/0x80
[   77.155689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   77.155694]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.155698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   77.155703]  kthread+0x334/0x6f0
[   77.155707]  ? trace_preempt_on+0x20/0xc0
[   77.155711]  ? __pfx_kthread+0x10/0x10
[   77.155715]  ? _raw_spin_unlock_irq+0x47/0x80
[   77.155719]  ? calculate_sigpending+0x7b/0xa0
[   77.155724]  ? __pfx_kthread+0x10/0x10
[   77.155728]  ret_from_fork+0x113/0x1d0
[   77.155731]  ? __pfx_kthread+0x10/0x10
[   77.155735]  ret_from_fork_asm+0x1a/0x30
[   77.155741]  </TASK>
[   77.155743] 
[   77.335083] Allocated by task 326:
[   77.338489]  kasan_save_stack+0x45/0x70
[   77.342347]  kasan_save_track+0x18/0x40
[   77.346246]  kasan_save_alloc_info+0x3b/0x50
[   77.350525]  __kasan_kmalloc+0xb7/0xc0
[   77.354279]  __kmalloc_noprof+0x1c9/0x500
[   77.358292]  kunit_kmalloc_array+0x25/0x60
[   77.362394]  copy_user_test_oob+0xab/0x10f0
[   77.366584]  kunit_try_run_case+0x1a2/0x480
[   77.370771]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   77.376172]  kthread+0x334/0x6f0
[   77.379418]  ret_from_fork+0x113/0x1d0
[   77.383172]  ret_from_fork_asm+0x1a/0x30
[   77.387099] 
[   77.388597] The buggy address belongs to the object at ffff8881066e9300
[   77.388597]  which belongs to the cache kmalloc-128 of size 128
[   77.401107] The buggy address is located 0 bytes inside of
[   77.401107]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   77.413540] 
[   77.415042] The buggy address belongs to the physical page:
[   77.420613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   77.428612] flags: 0x200000000000000(node=0|zone=2)
[   77.433492] page_type: f5(slab)
[   77.436641] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.444417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.452159] page dumped because: kasan: bad access detected
[   77.457734] 
[   77.459232] Memory state around the buggy address:
[   77.464025]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.471253]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.478471] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.485691]                                                                 ^
[   77.492823]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.500043]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.507261] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user
[   76.744116] ==================================================================
[   76.757444] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90
[   76.764064] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   76.771632] 
[   76.773131] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   76.773140] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   76.773143] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   76.773147] Call Trace:
[   76.773149]  <TASK>
[   76.773151]  dump_stack_lvl+0x73/0xb0
[   76.773156]  print_report+0xd1/0x650
[   76.773161]  ? __virt_addr_valid+0x1db/0x2d0
[   76.773165]  ? _copy_from_user+0x32/0x90
[   76.773168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   76.773174]  ? _copy_from_user+0x32/0x90
[   76.773177]  kasan_report+0x141/0x180
[   76.773181]  ? _copy_from_user+0x32/0x90
[   76.773186]  kasan_check_range+0x10c/0x1c0
[   76.773190]  __kasan_check_write+0x18/0x20
[   76.773194]  _copy_from_user+0x32/0x90
[   76.773198]  copy_user_test_oob+0x2be/0x10f0
[   76.773203]  ? __pfx_copy_user_test_oob+0x10/0x10
[   76.773207]  ? finish_task_switch.isra.0+0x153/0x700
[   76.773212]  ? __switch_to+0x544/0xf50
[   76.773217]  ? __schedule+0x10cc/0x2b60
[   76.773221]  ? ktime_get_ts64+0x83/0x230
[   76.773225]  kunit_try_run_case+0x1a2/0x480
[   76.773230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.773235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   76.773239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   76.773244]  ? __kthread_parkme+0x82/0x180
[   76.773247]  ? preempt_count_sub+0x50/0x80
[   76.773252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.773256]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.773261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   76.773265]  kthread+0x334/0x6f0
[   76.773269]  ? trace_preempt_on+0x20/0xc0
[   76.773273]  ? __pfx_kthread+0x10/0x10
[   76.773277]  ? _raw_spin_unlock_irq+0x47/0x80
[   76.773281]  ? calculate_sigpending+0x7b/0xa0
[   76.773286]  ? __pfx_kthread+0x10/0x10
[   76.773290]  ret_from_fork+0x113/0x1d0
[   76.773294]  ? __pfx_kthread+0x10/0x10
[   76.773297]  ret_from_fork_asm+0x1a/0x30
[   76.773304]  </TASK>
[   76.773305] 
[   76.953301] Allocated by task 326:
[   76.956706]  kasan_save_stack+0x45/0x70
[   76.960547]  kasan_save_track+0x18/0x40
[   76.964392]  kasan_save_alloc_info+0x3b/0x50
[   76.968685]  __kasan_kmalloc+0xb7/0xc0
[   76.972437]  __kmalloc_noprof+0x1c9/0x500
[   76.976450]  kunit_kmalloc_array+0x25/0x60
[   76.980557]  copy_user_test_oob+0xab/0x10f0
[   76.984742]  kunit_try_run_case+0x1a2/0x480
[   76.988929]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.994346]  kthread+0x334/0x6f0
[   76.997613]  ret_from_fork+0x113/0x1d0
[   77.001365]  ret_from_fork_asm+0x1a/0x30
[   77.005362] 
[   77.006903] The buggy address belongs to the object at ffff8881066e9300
[   77.006903]  which belongs to the cache kmalloc-128 of size 128
[   77.019418] The buggy address is located 0 bytes inside of
[   77.019418]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   77.031847] 
[   77.033362] The buggy address belongs to the physical page:
[   77.038962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   77.046970] flags: 0x200000000000000(node=0|zone=2)
[   77.051849] page_type: f5(slab)
[   77.054995] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   77.062743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   77.070480] page dumped because: kasan: bad access detected
[   77.076054] 
[   77.077553] Memory state around the buggy address:
[   77.082362]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.089602]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.096828] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   77.104047]                                                                 ^
[   77.111182]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.118432]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.125653] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   76.353990] ==================================================================
[   76.361240] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   76.368554] Write of size 8 at addr ffff888100cff178 by task kunit_try_catch/322
[   76.375948] 
[   76.377449] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   76.377458] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   76.377461] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   76.377465] Call Trace:
[   76.377466]  <TASK>
[   76.377468]  dump_stack_lvl+0x73/0xb0
[   76.377473]  print_report+0xd1/0x650
[   76.377477]  ? __virt_addr_valid+0x1db/0x2d0
[   76.377482]  ? copy_to_kernel_nofault+0x99/0x260
[   76.377486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   76.377492]  ? copy_to_kernel_nofault+0x99/0x260
[   76.377496]  kasan_report+0x141/0x180
[   76.377500]  ? copy_to_kernel_nofault+0x99/0x260
[   76.377506]  kasan_check_range+0x10c/0x1c0
[   76.377510]  __kasan_check_write+0x18/0x20
[   76.377514]  copy_to_kernel_nofault+0x99/0x260
[   76.377519]  copy_to_kernel_nofault_oob+0x288/0x560
[   76.377523]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   76.377528]  ? finish_task_switch.isra.0+0x153/0x700
[   76.377532]  ? __schedule+0x10cc/0x2b60
[   76.377536]  ? trace_hardirqs_on+0x37/0xe0
[   76.377542]  ? ktime_get_ts64+0x83/0x230
[   76.377546]  kunit_try_run_case+0x1a2/0x480
[   76.377551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.377556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   76.377560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   76.377564]  ? __kthread_parkme+0x82/0x180
[   76.377568]  ? preempt_count_sub+0x50/0x80
[   76.377573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.377577]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.377582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   76.377586]  kthread+0x334/0x6f0
[   76.377590]  ? trace_preempt_on+0x20/0xc0
[   76.377594]  ? __pfx_kthread+0x10/0x10
[   76.377598]  ? _raw_spin_unlock_irq+0x47/0x80
[   76.377602]  ? calculate_sigpending+0x7b/0xa0
[   76.377606]  ? __pfx_kthread+0x10/0x10
[   76.377611]  ret_from_fork+0x113/0x1d0
[   76.377614]  ? __pfx_kthread+0x10/0x10
[   76.377618]  ret_from_fork_asm+0x1a/0x30
[   76.377624]  </TASK>
[   76.377626] 
[   76.561967] Allocated by task 322:
[   76.565373]  kasan_save_stack+0x45/0x70
[   76.569212]  kasan_save_track+0x18/0x40
[   76.573051]  kasan_save_alloc_info+0x3b/0x50
[   76.577325]  __kasan_kmalloc+0xb7/0xc0
[   76.581111]  __kmalloc_cache_noprof+0x189/0x420
[   76.585646]  copy_to_kernel_nofault_oob+0x12f/0x560
[   76.590534]  kunit_try_run_case+0x1a2/0x480
[   76.594726]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.600126]  kthread+0x334/0x6f0
[   76.603363]  ret_from_fork+0x113/0x1d0
[   76.607122]  ret_from_fork_asm+0x1a/0x30
[   76.611055] 
[   76.612555] The buggy address belongs to the object at ffff888100cff100
[   76.612555]  which belongs to the cache kmalloc-128 of size 128
[   76.625070] The buggy address is located 0 bytes to the right of
[   76.625070]  allocated 120-byte region [ffff888100cff100, ffff888100cff178)
[   76.638025] 
[   76.639524] The buggy address belongs to the physical page:
[   76.645099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cff
[   76.653105] flags: 0x200000000000000(node=0|zone=2)
[   76.657984] page_type: f5(slab)
[   76.661133] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   76.668881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   76.676628] page dumped because: kasan: bad access detected
[   76.682199] 
[   76.683698] Memory state around the buggy address:
[   76.688493]  ffff888100cff000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.695721]  ffff888100cff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.702948] >ffff888100cff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.710166]                                                                 ^
[   76.717298]  ffff888100cff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.724519]  ffff888100cff200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.731738] ==================================================================
[   75.964511] ==================================================================
[   75.979398] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   75.986806] Read of size 8 at addr ffff888100cff178 by task kunit_try_catch/322
[   75.994112] 
[   75.995613] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   75.995622] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   75.995626] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.995629] Call Trace:
[   75.995631]  <TASK>
[   75.995633]  dump_stack_lvl+0x73/0xb0
[   75.995639]  print_report+0xd1/0x650
[   75.995643]  ? __virt_addr_valid+0x1db/0x2d0
[   75.995647]  ? copy_to_kernel_nofault+0x225/0x260
[   75.995652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.995657]  ? copy_to_kernel_nofault+0x225/0x260
[   75.995662]  kasan_report+0x141/0x180
[   75.995666]  ? copy_to_kernel_nofault+0x225/0x260
[   75.995672]  __asan_report_load8_noabort+0x18/0x20
[   75.995677]  copy_to_kernel_nofault+0x225/0x260
[   75.995681]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   75.995686]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   75.995690]  ? finish_task_switch.isra.0+0x153/0x700
[   75.995695]  ? __schedule+0x10cc/0x2b60
[   75.995699]  ? trace_hardirqs_on+0x37/0xe0
[   75.995705]  ? ktime_get_ts64+0x83/0x230
[   75.995709]  kunit_try_run_case+0x1a2/0x480
[   75.995714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.995718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.995723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.995727]  ? __kthread_parkme+0x82/0x180
[   75.995731]  ? preempt_count_sub+0x50/0x80
[   75.995736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.995740]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.995745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.995749]  kthread+0x334/0x6f0
[   75.995753]  ? trace_preempt_on+0x20/0xc0
[   75.995757]  ? __pfx_kthread+0x10/0x10
[   75.995761]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.995765]  ? calculate_sigpending+0x7b/0xa0
[   75.995770]  ? __pfx_kthread+0x10/0x10
[   75.995774]  ret_from_fork+0x113/0x1d0
[   75.995777]  ? __pfx_kthread+0x10/0x10
[   75.995781]  ret_from_fork_asm+0x1a/0x30
[   75.995787]  </TASK>
[   75.995789] 
[   76.176952] Allocated by task 322:
[   76.180372]  kasan_save_stack+0x45/0x70
[   76.184225]  kasan_save_track+0x18/0x40
[   76.188062]  kasan_save_alloc_info+0x3b/0x50
[   76.192350]  __kasan_kmalloc+0xb7/0xc0
[   76.196133]  __kmalloc_cache_noprof+0x189/0x420
[   76.200674]  copy_to_kernel_nofault_oob+0x12f/0x560
[   76.205561]  kunit_try_run_case+0x1a2/0x480
[   76.209746]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.215146]  kthread+0x334/0x6f0
[   76.218387]  ret_from_fork+0x113/0x1d0
[   76.222140]  ret_from_fork_asm+0x1a/0x30
[   76.226066] 
[   76.227565] The buggy address belongs to the object at ffff888100cff100
[   76.227565]  which belongs to the cache kmalloc-128 of size 128
[   76.240080] The buggy address is located 0 bytes to the right of
[   76.240080]  allocated 120-byte region [ffff888100cff100, ffff888100cff178)
[   76.253028] 
[   76.254527] The buggy address belongs to the physical page:
[   76.260100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cff
[   76.268109] flags: 0x200000000000000(node=0|zone=2)
[   76.272996] page_type: f5(slab)
[   76.276142] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   76.283883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   76.291631] page dumped because: kasan: bad access detected
[   76.297203] 
[   76.298701] Memory state around the buggy address:
[   76.303496]  ffff888100cff000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.310721]  ffff888100cff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.317942] >ffff888100cff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.325162]                                                                 ^
[   76.332303]  ffff888100cff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.339520]  ffff888100cff200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.346739] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   56.916940] ==================================================================
[   56.924180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   56.931485] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   56.938887] 
[   56.940417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   56.940425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   56.940428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.940432] Call Trace:
[   56.940433]  <TASK>
[   56.940435]  dump_stack_lvl+0x73/0xb0
[   56.940440]  print_report+0xd1/0x650
[   56.940444]  ? __virt_addr_valid+0x1db/0x2d0
[   56.940448]  ? kasan_atomics_helper+0xac7/0x5450
[   56.940452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.940457]  ? kasan_atomics_helper+0xac7/0x5450
[   56.940461]  kasan_report+0x141/0x180
[   56.940466]  ? kasan_atomics_helper+0xac7/0x5450
[   56.940470]  kasan_check_range+0x10c/0x1c0
[   56.940475]  __kasan_check_write+0x18/0x20
[   56.940479]  kasan_atomics_helper+0xac7/0x5450
[   56.940483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.940487]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.940492]  ? kasan_atomics+0x152/0x310
[   56.940497]  kasan_atomics+0x1dc/0x310
[   56.940501]  ? __pfx_kasan_atomics+0x10/0x10
[   56.940506]  ? ktime_get_ts64+0x83/0x230
[   56.940511]  kunit_try_run_case+0x1a2/0x480
[   56.940515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.940520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.940524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.940528]  ? __kthread_parkme+0x82/0x180
[   56.940532]  ? preempt_count_sub+0x50/0x80
[   56.940537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.940541]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.940545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.940550]  kthread+0x334/0x6f0
[   56.940553]  ? trace_preempt_on+0x20/0xc0
[   56.940558]  ? __pfx_kthread+0x10/0x10
[   56.940562]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.940566]  ? calculate_sigpending+0x7b/0xa0
[   56.940570]  ? __pfx_kthread+0x10/0x10
[   56.940574]  ret_from_fork+0x113/0x1d0
[   56.940578]  ? __pfx_kthread+0x10/0x10
[   56.940582]  ret_from_fork_asm+0x1a/0x30
[   56.940588]  </TASK>
[   56.940589] 
[   57.123288] Allocated by task 306:
[   57.126692]  kasan_save_stack+0x45/0x70
[   57.130531]  kasan_save_track+0x18/0x40
[   57.134413]  kasan_save_alloc_info+0x3b/0x50
[   57.138686]  __kasan_kmalloc+0xb7/0xc0
[   57.142439]  __kmalloc_cache_noprof+0x189/0x420
[   57.146972]  kasan_atomics+0x95/0x310
[   57.150637]  kunit_try_run_case+0x1a2/0x480
[   57.154824]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.160223]  kthread+0x334/0x6f0
[   57.163457]  ret_from_fork+0x113/0x1d0
[   57.167208]  ret_from_fork_asm+0x1a/0x30
[   57.171135] 
[   57.172635] The buggy address belongs to the object at ffff8881066eaf00
[   57.172635]  which belongs to the cache kmalloc-64 of size 64
[   57.184975] The buggy address is located 0 bytes to the right of
[   57.184975]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   57.197837] 
[   57.199361] The buggy address belongs to the physical page:
[   57.204978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   57.212986] flags: 0x200000000000000(node=0|zone=2)
[   57.217865] page_type: f5(slab)
[   57.221011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.228751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.236490] page dumped because: kasan: bad access detected
[   57.242061] 
[   57.243562] Memory state around the buggy address:
[   57.248376]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.255627]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   57.262854] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.270082]                                      ^
[   57.274875]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.282094]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.289312] ==================================================================
[   62.219675] ==================================================================
[   62.226925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   62.234318] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   62.241744] 
[   62.243243] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   62.243251] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   62.243254] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.243257] Call Trace:
[   62.243259]  <TASK>
[   62.243261]  dump_stack_lvl+0x73/0xb0
[   62.243265]  print_report+0xd1/0x650
[   62.243269]  ? __virt_addr_valid+0x1db/0x2d0
[   62.243273]  ? kasan_atomics_helper+0x1217/0x5450
[   62.243277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.243283]  ? kasan_atomics_helper+0x1217/0x5450
[   62.243287]  kasan_report+0x141/0x180
[   62.243291]  ? kasan_atomics_helper+0x1217/0x5450
[   62.243296]  kasan_check_range+0x10c/0x1c0
[   62.243300]  __kasan_check_write+0x18/0x20
[   62.243304]  kasan_atomics_helper+0x1217/0x5450
[   62.243308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.243312]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.243317]  ? kasan_atomics+0x152/0x310
[   62.243322]  kasan_atomics+0x1dc/0x310
[   62.243346]  ? __pfx_kasan_atomics+0x10/0x10
[   62.243352]  ? ktime_get_ts64+0x83/0x230
[   62.243356]  kunit_try_run_case+0x1a2/0x480
[   62.243361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.243379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.243383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.243388]  ? __kthread_parkme+0x82/0x180
[   62.243392]  ? preempt_count_sub+0x50/0x80
[   62.243396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.243413]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.243418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.243422]  kthread+0x334/0x6f0
[   62.243426]  ? trace_preempt_on+0x20/0xc0
[   62.243430]  ? __pfx_kthread+0x10/0x10
[   62.243434]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.243438]  ? calculate_sigpending+0x7b/0xa0
[   62.243443]  ? __pfx_kthread+0x10/0x10
[   62.243447]  ret_from_fork+0x113/0x1d0
[   62.243450]  ? __pfx_kthread+0x10/0x10
[   62.243454]  ret_from_fork_asm+0x1a/0x30
[   62.243460]  </TASK>
[   62.243462] 
[   62.426775] Allocated by task 306:
[   62.430183]  kasan_save_stack+0x45/0x70
[   62.434022]  kasan_save_track+0x18/0x40
[   62.437861]  kasan_save_alloc_info+0x3b/0x50
[   62.442133]  __kasan_kmalloc+0xb7/0xc0
[   62.445885]  __kmalloc_cache_noprof+0x189/0x420
[   62.450421]  kasan_atomics+0x95/0x310
[   62.454094]  kunit_try_run_case+0x1a2/0x480
[   62.458278]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.463680]  kthread+0x334/0x6f0
[   62.466911]  ret_from_fork+0x113/0x1d0
[   62.470663]  ret_from_fork_asm+0x1a/0x30
[   62.474589] 
[   62.476089] The buggy address belongs to the object at ffff8881066eaf00
[   62.476089]  which belongs to the cache kmalloc-64 of size 64
[   62.488433] The buggy address is located 0 bytes to the right of
[   62.488433]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   62.501302] 
[   62.502800] The buggy address belongs to the physical page:
[   62.508394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   62.516417] flags: 0x200000000000000(node=0|zone=2)
[   62.521305] page_type: f5(slab)
[   62.524449] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.532188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.539927] page dumped because: kasan: bad access detected
[   62.545500] 
[   62.547001] Memory state around the buggy address:
[   62.551793]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.559013]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   62.566233] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.573458]                                      ^
[   62.578252]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.585470]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.592691] ==================================================================
[   54.259925] ==================================================================
[   54.267172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   54.274478] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   54.281872] 
[   54.283395] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   54.283415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   54.283418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.283422] Call Trace:
[   54.283424]  <TASK>
[   54.283425]  dump_stack_lvl+0x73/0xb0
[   54.283430]  print_report+0xd1/0x650
[   54.283434]  ? __virt_addr_valid+0x1db/0x2d0
[   54.283439]  ? kasan_atomics_helper+0x697/0x5450
[   54.283442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.283448]  ? kasan_atomics_helper+0x697/0x5450
[   54.283452]  kasan_report+0x141/0x180
[   54.283456]  ? kasan_atomics_helper+0x697/0x5450
[   54.283461]  kasan_check_range+0x10c/0x1c0
[   54.283466]  __kasan_check_write+0x18/0x20
[   54.283469]  kasan_atomics_helper+0x697/0x5450
[   54.283473]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.283477]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.283482]  ? kasan_atomics+0x152/0x310
[   54.283488]  kasan_atomics+0x1dc/0x310
[   54.283492]  ? __pfx_kasan_atomics+0x10/0x10
[   54.283497]  ? ktime_get_ts64+0x83/0x230
[   54.283501]  kunit_try_run_case+0x1a2/0x480
[   54.283506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.283510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.283515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.283519]  ? __kthread_parkme+0x82/0x180
[   54.283523]  ? preempt_count_sub+0x50/0x80
[   54.283528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.283532]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.283537]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.283541]  kthread+0x334/0x6f0
[   54.283545]  ? trace_preempt_on+0x20/0xc0
[   54.283549]  ? __pfx_kthread+0x10/0x10
[   54.283553]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.283557]  ? calculate_sigpending+0x7b/0xa0
[   54.283562]  ? __pfx_kthread+0x10/0x10
[   54.283566]  ret_from_fork+0x113/0x1d0
[   54.283569]  ? __pfx_kthread+0x10/0x10
[   54.283573]  ret_from_fork_asm+0x1a/0x30
[   54.283579]  </TASK>
[   54.283581] 
[   54.466281] Allocated by task 306:
[   54.469687]  kasan_save_stack+0x45/0x70
[   54.473525]  kasan_save_track+0x18/0x40
[   54.477364]  kasan_save_alloc_info+0x3b/0x50
[   54.481682]  __kasan_kmalloc+0xb7/0xc0
[   54.485432]  __kmalloc_cache_noprof+0x189/0x420
[   54.489966]  kasan_atomics+0x95/0x310
[   54.493632]  kunit_try_run_case+0x1a2/0x480
[   54.497819]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.503217]  kthread+0x334/0x6f0
[   54.506450]  ret_from_fork+0x113/0x1d0
[   54.510202]  ret_from_fork_asm+0x1a/0x30
[   54.514129] 
[   54.515629] The buggy address belongs to the object at ffff8881066eaf00
[   54.515629]  which belongs to the cache kmalloc-64 of size 64
[   54.527969] The buggy address is located 0 bytes to the right of
[   54.527969]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   54.540831] 
[   54.542348] The buggy address belongs to the physical page:
[   54.547927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   54.555928] flags: 0x200000000000000(node=0|zone=2)
[   54.560807] page_type: f5(slab)
[   54.563953] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.571694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.579441] page dumped because: kasan: bad access detected
[   54.585012] 
[   54.586512] Memory state around the buggy address:
[   54.591307]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.598533]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   54.605754] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.612981]                                      ^
[   54.617774]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.624992]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.632213] ==================================================================
[   55.398520] ==================================================================
[   55.405760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   55.413067] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   55.420466] 
[   55.421966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   55.421974] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   55.421977] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.421981] Call Trace:
[   55.421983]  <TASK>
[   55.421984]  dump_stack_lvl+0x73/0xb0
[   55.421989]  print_report+0xd1/0x650
[   55.421993]  ? __virt_addr_valid+0x1db/0x2d0
[   55.421997]  ? kasan_atomics_helper+0x860/0x5450
[   55.422001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.422006]  ? kasan_atomics_helper+0x860/0x5450
[   55.422010]  kasan_report+0x141/0x180
[   55.422015]  ? kasan_atomics_helper+0x860/0x5450
[   55.422019]  kasan_check_range+0x10c/0x1c0
[   55.422024]  __kasan_check_write+0x18/0x20
[   55.422028]  kasan_atomics_helper+0x860/0x5450
[   55.422032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.422036]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.422041]  ? kasan_atomics+0x152/0x310
[   55.422046]  kasan_atomics+0x1dc/0x310
[   55.422051]  ? __pfx_kasan_atomics+0x10/0x10
[   55.422055]  ? ktime_get_ts64+0x83/0x230
[   55.422060]  kunit_try_run_case+0x1a2/0x480
[   55.422065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.422069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.422073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.422078]  ? __kthread_parkme+0x82/0x180
[   55.422082]  ? preempt_count_sub+0x50/0x80
[   55.422086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.422091]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.422095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.422100]  kthread+0x334/0x6f0
[   55.422103]  ? trace_preempt_on+0x20/0xc0
[   55.422108]  ? __pfx_kthread+0x10/0x10
[   55.422112]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.422115]  ? calculate_sigpending+0x7b/0xa0
[   55.422120]  ? __pfx_kthread+0x10/0x10
[   55.422124]  ret_from_fork+0x113/0x1d0
[   55.422128]  ? __pfx_kthread+0x10/0x10
[   55.422132]  ret_from_fork_asm+0x1a/0x30
[   55.422138]  </TASK>
[   55.422140] 
[   55.605068] Allocated by task 306:
[   55.608474]  kasan_save_stack+0x45/0x70
[   55.612310]  kasan_save_track+0x18/0x40
[   55.616151]  kasan_save_alloc_info+0x3b/0x50
[   55.620432]  __kasan_kmalloc+0xb7/0xc0
[   55.624184]  __kmalloc_cache_noprof+0x189/0x420
[   55.628716]  kasan_atomics+0x95/0x310
[   55.632415]  kunit_try_run_case+0x1a2/0x480
[   55.636604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.642004]  kthread+0x334/0x6f0
[   55.645235]  ret_from_fork+0x113/0x1d0
[   55.648989]  ret_from_fork_asm+0x1a/0x30
[   55.652915] 
[   55.654424] The buggy address belongs to the object at ffff8881066eaf00
[   55.654424]  which belongs to the cache kmalloc-64 of size 64
[   55.666764] The buggy address is located 0 bytes to the right of
[   55.666764]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   55.679625] 
[   55.681126] The buggy address belongs to the physical page:
[   55.686696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   55.694697] flags: 0x200000000000000(node=0|zone=2)
[   55.699575] page_type: f5(slab)
[   55.702723] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.710471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.718218] page dumped because: kasan: bad access detected
[   55.723789] 
[   55.725290] Memory state around the buggy address:
[   55.730084]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.737312]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.744538] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.751759]                                      ^
[   55.756550]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.763769]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.770988] ==================================================================
[   61.463200] ==================================================================
[   61.470442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   61.477841] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   61.485233] 
[   61.486735] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   61.486743] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   61.486746] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.486749] Call Trace:
[   61.486751]  <TASK>
[   61.486753]  dump_stack_lvl+0x73/0xb0
[   61.486757]  print_report+0xd1/0x650
[   61.486761]  ? __virt_addr_valid+0x1db/0x2d0
[   61.486766]  ? kasan_atomics_helper+0x1148/0x5450
[   61.486770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.486775]  ? kasan_atomics_helper+0x1148/0x5450
[   61.486779]  kasan_report+0x141/0x180
[   61.486783]  ? kasan_atomics_helper+0x1148/0x5450
[   61.486788]  kasan_check_range+0x10c/0x1c0
[   61.486793]  __kasan_check_write+0x18/0x20
[   61.486796]  kasan_atomics_helper+0x1148/0x5450
[   61.486800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.486804]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.486809]  ? kasan_atomics+0x152/0x310
[   61.486815]  kasan_atomics+0x1dc/0x310
[   61.486819]  ? __pfx_kasan_atomics+0x10/0x10
[   61.486824]  ? ktime_get_ts64+0x83/0x230
[   61.486828]  kunit_try_run_case+0x1a2/0x480
[   61.486833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.486837]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.486842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.486846]  ? __kthread_parkme+0x82/0x180
[   61.486850]  ? preempt_count_sub+0x50/0x80
[   61.486854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.486859]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.486863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.486868]  kthread+0x334/0x6f0
[   61.486871]  ? trace_preempt_on+0x20/0xc0
[   61.486876]  ? __pfx_kthread+0x10/0x10
[   61.486880]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.486884]  ? calculate_sigpending+0x7b/0xa0
[   61.486888]  ? __pfx_kthread+0x10/0x10
[   61.486892]  ret_from_fork+0x113/0x1d0
[   61.486896]  ? __pfx_kthread+0x10/0x10
[   61.486900]  ret_from_fork_asm+0x1a/0x30
[   61.486906]  </TASK>
[   61.486908] 
[   61.670033] Allocated by task 306:
[   61.673440]  kasan_save_stack+0x45/0x70
[   61.677277]  kasan_save_track+0x18/0x40
[   61.681116]  kasan_save_alloc_info+0x3b/0x50
[   61.685426]  __kasan_kmalloc+0xb7/0xc0
[   61.689185]  __kmalloc_cache_noprof+0x189/0x420
[   61.693719]  kasan_atomics+0x95/0x310
[   61.697427]  kunit_try_run_case+0x1a2/0x480
[   61.701614]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.707012]  kthread+0x334/0x6f0
[   61.710247]  ret_from_fork+0x113/0x1d0
[   61.713998]  ret_from_fork_asm+0x1a/0x30
[   61.717925] 
[   61.719427] The buggy address belongs to the object at ffff8881066eaf00
[   61.719427]  which belongs to the cache kmalloc-64 of size 64
[   61.731766] The buggy address is located 0 bytes to the right of
[   61.731766]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   61.744626] 
[   61.746126] The buggy address belongs to the physical page:
[   61.751700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   61.759706] flags: 0x200000000000000(node=0|zone=2)
[   61.764584] page_type: f5(slab)
[   61.767733] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.775472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.783220] page dumped because: kasan: bad access detected
[   61.788791] 
[   61.790292] Memory state around the buggy address:
[   61.795084]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.802303]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   61.809522] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.816742]                                      ^
[   61.821533]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.828754]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.835972] ==================================================================
[   74.396209] ==================================================================
[   74.403449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   74.410841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   74.418242] 
[   74.419743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   74.419751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   74.419754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.419757] Call Trace:
[   74.419759]  <TASK>
[   74.419761]  dump_stack_lvl+0x73/0xb0
[   74.419765]  print_report+0xd1/0x650
[   74.419769]  ? __virt_addr_valid+0x1db/0x2d0
[   74.419774]  ? kasan_atomics_helper+0x218a/0x5450
[   74.419777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.419783]  ? kasan_atomics_helper+0x218a/0x5450
[   74.419787]  kasan_report+0x141/0x180
[   74.419791]  ? kasan_atomics_helper+0x218a/0x5450
[   74.419796]  kasan_check_range+0x10c/0x1c0
[   74.419801]  __kasan_check_write+0x18/0x20
[   74.419804]  kasan_atomics_helper+0x218a/0x5450
[   74.419809]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.419813]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.419818]  ? kasan_atomics+0x152/0x310
[   74.419823]  kasan_atomics+0x1dc/0x310
[   74.419827]  ? __pfx_kasan_atomics+0x10/0x10
[   74.419832]  ? ktime_get_ts64+0x83/0x230
[   74.419837]  kunit_try_run_case+0x1a2/0x480
[   74.419841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.419846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.419850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.419855]  ? __kthread_parkme+0x82/0x180
[   74.419858]  ? preempt_count_sub+0x50/0x80
[   74.419863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.419867]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.419872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.419876]  kthread+0x334/0x6f0
[   74.419880]  ? trace_preempt_on+0x20/0xc0
[   74.419884]  ? __pfx_kthread+0x10/0x10
[   74.419888]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.419892]  ? calculate_sigpending+0x7b/0xa0
[   74.419896]  ? __pfx_kthread+0x10/0x10
[   74.419901]  ret_from_fork+0x113/0x1d0
[   74.419904]  ? __pfx_kthread+0x10/0x10
[   74.419908]  ret_from_fork_asm+0x1a/0x30
[   74.419914]  </TASK>
[   74.419916] 
[   74.603059] Allocated by task 306:
[   74.606465]  kasan_save_stack+0x45/0x70
[   74.610303]  kasan_save_track+0x18/0x40
[   74.614142]  kasan_save_alloc_info+0x3b/0x50
[   74.618418]  __kasan_kmalloc+0xb7/0xc0
[   74.622178]  __kmalloc_cache_noprof+0x189/0x420
[   74.626718]  kasan_atomics+0x95/0x310
[   74.630416]  kunit_try_run_case+0x1a2/0x480
[   74.634604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.640004]  kthread+0x334/0x6f0
[   74.643236]  ret_from_fork+0x113/0x1d0
[   74.646989]  ret_from_fork_asm+0x1a/0x30
[   74.650915] 
[   74.652421] The buggy address belongs to the object at ffff8881066eaf00
[   74.652421]  which belongs to the cache kmalloc-64 of size 64
[   74.664756] The buggy address is located 0 bytes to the right of
[   74.664756]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   74.677617] 
[   74.679117] The buggy address belongs to the physical page:
[   74.684689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   74.692689] flags: 0x200000000000000(node=0|zone=2)
[   74.697569] page_type: f5(slab)
[   74.700713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.708453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.716194] page dumped because: kasan: bad access detected
[   74.721765] 
[   74.723263] Memory state around the buggy address:
[   74.728058]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.735287]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   74.742513] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.749732]                                      ^
[   74.754524]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761745]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.768962] ==================================================================
[   53.124206] ==================================================================
[   53.131446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   53.138840] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   53.146239] 
[   53.147740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   53.147748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   53.147751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.147755] Call Trace:
[   53.147756]  <TASK>
[   53.147758]  dump_stack_lvl+0x73/0xb0
[   53.147763]  print_report+0xd1/0x650
[   53.147767]  ? __virt_addr_valid+0x1db/0x2d0
[   53.147771]  ? kasan_atomics_helper+0x4b3a/0x5450
[   53.147775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.147781]  ? kasan_atomics_helper+0x4b3a/0x5450
[   53.147785]  kasan_report+0x141/0x180
[   53.147789]  ? kasan_atomics_helper+0x4b3a/0x5450
[   53.147794]  __asan_report_store4_noabort+0x1b/0x30
[   53.147799]  kasan_atomics_helper+0x4b3a/0x5450
[   53.147803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.147807]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.147813]  ? kasan_atomics+0x152/0x310
[   53.147818]  kasan_atomics+0x1dc/0x310
[   53.147822]  ? __pfx_kasan_atomics+0x10/0x10
[   53.147827]  ? ktime_get_ts64+0x83/0x230
[   53.147832]  kunit_try_run_case+0x1a2/0x480
[   53.147836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.147841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.147845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.147849]  ? __kthread_parkme+0x82/0x180
[   53.147853]  ? preempt_count_sub+0x50/0x80
[   53.147858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.147862]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.147866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.147871]  kthread+0x334/0x6f0
[   53.147875]  ? trace_preempt_on+0x20/0xc0
[   53.147879]  ? __pfx_kthread+0x10/0x10
[   53.147883]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.147887]  ? calculate_sigpending+0x7b/0xa0
[   53.147891]  ? __pfx_kthread+0x10/0x10
[   53.147896]  ret_from_fork+0x113/0x1d0
[   53.147899]  ? __pfx_kthread+0x10/0x10
[   53.147903]  ret_from_fork_asm+0x1a/0x30
[   53.147909]  </TASK>
[   53.147911] 
[   53.327764] Allocated by task 306:
[   53.331169]  kasan_save_stack+0x45/0x70
[   53.335008]  kasan_save_track+0x18/0x40
[   53.338847]  kasan_save_alloc_info+0x3b/0x50
[   53.343121]  __kasan_kmalloc+0xb7/0xc0
[   53.346883]  __kmalloc_cache_noprof+0x189/0x420
[   53.351428]  kasan_atomics+0x95/0x310
[   53.355096]  kunit_try_run_case+0x1a2/0x480
[   53.359282]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.364684]  kthread+0x334/0x6f0
[   53.367925]  ret_from_fork+0x113/0x1d0
[   53.371677]  ret_from_fork_asm+0x1a/0x30
[   53.375602] 
[   53.377103] The buggy address belongs to the object at ffff8881066eaf00
[   53.377103]  which belongs to the cache kmalloc-64 of size 64
[   53.389443] The buggy address is located 0 bytes to the right of
[   53.389443]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   53.402305] 
[   53.403805] The buggy address belongs to the physical page:
[   53.409422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   53.417427] flags: 0x200000000000000(node=0|zone=2)
[   53.422309] page_type: f5(slab)
[   53.425453] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.433195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.440940] page dumped because: kasan: bad access detected
[   53.446511] 
[   53.448011] Memory state around the buggy address:
[   53.452806]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.460033]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   53.467253] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.474470]                                      ^
[   53.479264]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.486485]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.493710] ==================================================================
[   52.367913] ==================================================================
[   52.375155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   52.382555] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   52.389869] 
[   52.391393] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   52.391414] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   52.391417] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.391420] Call Trace:
[   52.391422]  <TASK>
[   52.391424]  dump_stack_lvl+0x73/0xb0
[   52.391428]  print_report+0xd1/0x650
[   52.391432]  ? __virt_addr_valid+0x1db/0x2d0
[   52.391437]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.391441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.391446]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.391450]  kasan_report+0x141/0x180
[   52.391454]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.391459]  __asan_report_load4_noabort+0x18/0x20
[   52.391464]  kasan_atomics_helper+0x4b54/0x5450
[   52.391468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.391472]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.391477]  ? kasan_atomics+0x152/0x310
[   52.391482]  kasan_atomics+0x1dc/0x310
[   52.391487]  ? __pfx_kasan_atomics+0x10/0x10
[   52.391492]  ? ktime_get_ts64+0x83/0x230
[   52.391496]  kunit_try_run_case+0x1a2/0x480
[   52.391501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.391505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.391510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.391514]  ? __kthread_parkme+0x82/0x180
[   52.391518]  ? preempt_count_sub+0x50/0x80
[   52.391522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.391527]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.391531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.391536]  kthread+0x334/0x6f0
[   52.391539]  ? trace_preempt_on+0x20/0xc0
[   52.391544]  ? __pfx_kthread+0x10/0x10
[   52.391547]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.391551]  ? calculate_sigpending+0x7b/0xa0
[   52.391556]  ? __pfx_kthread+0x10/0x10
[   52.391560]  ret_from_fork+0x113/0x1d0
[   52.391564]  ? __pfx_kthread+0x10/0x10
[   52.391568]  ret_from_fork_asm+0x1a/0x30
[   52.391574]  </TASK>
[   52.391575] 
[   52.571279] Allocated by task 306:
[   52.574686]  kasan_save_stack+0x45/0x70
[   52.578533]  kasan_save_track+0x18/0x40
[   52.582413]  kasan_save_alloc_info+0x3b/0x50
[   52.586687]  __kasan_kmalloc+0xb7/0xc0
[   52.590441]  __kmalloc_cache_noprof+0x189/0x420
[   52.594983]  kasan_atomics+0x95/0x310
[   52.598657]  kunit_try_run_case+0x1a2/0x480
[   52.602844]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.608241]  kthread+0x334/0x6f0
[   52.611475]  ret_from_fork+0x113/0x1d0
[   52.615228]  ret_from_fork_asm+0x1a/0x30
[   52.619161] 
[   52.620660] The buggy address belongs to the object at ffff8881066eaf00
[   52.620660]  which belongs to the cache kmalloc-64 of size 64
[   52.633003] The buggy address is located 0 bytes to the right of
[   52.633003]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   52.645863] 
[   52.647362] The buggy address belongs to the physical page:
[   52.652954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   52.660960] flags: 0x200000000000000(node=0|zone=2)
[   52.665840] page_type: f5(slab)
[   52.668989] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.676734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.684473] page dumped because: kasan: bad access detected
[   52.690047] 
[   52.691546] Memory state around the buggy address:
[   52.696364]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.703629]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   52.710855] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.718075]                                      ^
[   52.722868]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.730096]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.737313] ==================================================================
[   67.906181] ==================================================================
[   67.913427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   67.920820] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   67.928214] 
[   67.929713] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   67.929721] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   67.929724] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.929727] Call Trace:
[   67.929729]  <TASK>
[   67.929731]  dump_stack_lvl+0x73/0xb0
[   67.929735]  print_report+0xd1/0x650
[   67.929739]  ? __virt_addr_valid+0x1db/0x2d0
[   67.929743]  ? kasan_atomics_helper+0x194a/0x5450
[   67.929747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.929753]  ? kasan_atomics_helper+0x194a/0x5450
[   67.929757]  kasan_report+0x141/0x180
[   67.929761]  ? kasan_atomics_helper+0x194a/0x5450
[   67.929766]  kasan_check_range+0x10c/0x1c0
[   67.929770]  __kasan_check_write+0x18/0x20
[   67.929774]  kasan_atomics_helper+0x194a/0x5450
[   67.929778]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.929782]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.929787]  ? kasan_atomics+0x152/0x310
[   67.929792]  kasan_atomics+0x1dc/0x310
[   67.929797]  ? __pfx_kasan_atomics+0x10/0x10
[   67.929802]  ? ktime_get_ts64+0x83/0x230
[   67.929806]  kunit_try_run_case+0x1a2/0x480
[   67.929811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.929815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.929820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.929824]  ? __kthread_parkme+0x82/0x180
[   67.929828]  ? preempt_count_sub+0x50/0x80
[   67.929832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.929837]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.929841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.929845]  kthread+0x334/0x6f0
[   67.929849]  ? trace_preempt_on+0x20/0xc0
[   67.929853]  ? __pfx_kthread+0x10/0x10
[   67.929857]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.929861]  ? calculate_sigpending+0x7b/0xa0
[   67.929866]  ? __pfx_kthread+0x10/0x10
[   67.929870]  ret_from_fork+0x113/0x1d0
[   67.929874]  ? __pfx_kthread+0x10/0x10
[   67.929878]  ret_from_fork_asm+0x1a/0x30
[   67.929883]  </TASK>
[   67.929885] 
[   68.113071] Allocated by task 306:
[   68.116479]  kasan_save_stack+0x45/0x70
[   68.120318]  kasan_save_track+0x18/0x40
[   68.124190]  kasan_save_alloc_info+0x3b/0x50
[   68.128463]  __kasan_kmalloc+0xb7/0xc0
[   68.132218]  __kmalloc_cache_noprof+0x189/0x420
[   68.136756]  kasan_atomics+0x95/0x310
[   68.140424]  kunit_try_run_case+0x1a2/0x480
[   68.144610]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.150018]  kthread+0x334/0x6f0
[   68.153252]  ret_from_fork+0x113/0x1d0
[   68.157002]  ret_from_fork_asm+0x1a/0x30
[   68.160929] 
[   68.162428] The buggy address belongs to the object at ffff8881066eaf00
[   68.162428]  which belongs to the cache kmalloc-64 of size 64
[   68.174769] The buggy address is located 0 bytes to the right of
[   68.174769]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   68.187632] 
[   68.189130] The buggy address belongs to the physical page:
[   68.194703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   68.202710] flags: 0x200000000000000(node=0|zone=2)
[   68.207591] page_type: f5(slab)
[   68.210739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.218485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.226232] page dumped because: kasan: bad access detected
[   68.231805] 
[   68.233303] Memory state around the buggy address:
[   68.238098]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.245345]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   68.252571] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.259797]                                      ^
[   68.264592]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.271819]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.279037] ==================================================================
[   69.426325] ==================================================================
[   69.433571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   69.440965] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   69.448379] 
[   69.449910] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   69.449917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   69.449920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.449924] Call Trace:
[   69.449925]  <TASK>
[   69.449927]  dump_stack_lvl+0x73/0xb0
[   69.449932]  print_report+0xd1/0x650
[   69.449936]  ? __virt_addr_valid+0x1db/0x2d0
[   69.449940]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.449944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.449949]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.449953]  kasan_report+0x141/0x180
[   69.449957]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.449962]  kasan_check_range+0x10c/0x1c0
[   69.449967]  __kasan_check_write+0x18/0x20
[   69.449970]  kasan_atomics_helper+0x1c18/0x5450
[   69.449974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.449979]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.449984]  ? kasan_atomics+0x152/0x310
[   69.449989]  kasan_atomics+0x1dc/0x310
[   69.449993]  ? __pfx_kasan_atomics+0x10/0x10
[   69.449998]  ? ktime_get_ts64+0x83/0x230
[   69.450002]  kunit_try_run_case+0x1a2/0x480
[   69.450007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.450016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.450020]  ? __kthread_parkme+0x82/0x180
[   69.450024]  ? preempt_count_sub+0x50/0x80
[   69.450028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450033]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.450037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.450042]  kthread+0x334/0x6f0
[   69.450045]  ? trace_preempt_on+0x20/0xc0
[   69.450050]  ? __pfx_kthread+0x10/0x10
[   69.450054]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.450058]  ? calculate_sigpending+0x7b/0xa0
[   69.450062]  ? __pfx_kthread+0x10/0x10
[   69.450066]  ret_from_fork+0x113/0x1d0
[   69.450070]  ? __pfx_kthread+0x10/0x10
[   69.450074]  ret_from_fork_asm+0x1a/0x30
[   69.450080]  </TASK>
[   69.450082] 
[   69.633154] Allocated by task 306:
[   69.636562]  kasan_save_stack+0x45/0x70
[   69.640420]  kasan_save_track+0x18/0x40
[   69.644265]  kasan_save_alloc_info+0x3b/0x50
[   69.648538]  __kasan_kmalloc+0xb7/0xc0
[   69.652290]  __kmalloc_cache_noprof+0x189/0x420
[   69.656824]  kasan_atomics+0x95/0x310
[   69.660489]  kunit_try_run_case+0x1a2/0x480
[   69.664675]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.670076]  kthread+0x334/0x6f0
[   69.673316]  ret_from_fork+0x113/0x1d0
[   69.677104]  ret_from_fork_asm+0x1a/0x30
[   69.681038] 
[   69.682538] The buggy address belongs to the object at ffff8881066eaf00
[   69.682538]  which belongs to the cache kmalloc-64 of size 64
[   69.694880] The buggy address is located 0 bytes to the right of
[   69.694880]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   69.707741] 
[   69.709239] The buggy address belongs to the physical page:
[   69.714813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   69.722821] flags: 0x200000000000000(node=0|zone=2)
[   69.727698] page_type: f5(slab)
[   69.730847] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.738596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.746368] page dumped because: kasan: bad access detected
[   69.751983] 
[   69.753481] Memory state around the buggy address:
[   69.758275]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.765493]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   69.772714] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.779932]                                      ^
[   69.784725]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.791945]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   69.799165] ==================================================================
[   51.612021] ==================================================================
[   51.619267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   51.626659] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   51.634053] 
[   51.635552] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   51.635561] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   51.635563] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.635567] Call Trace:
[   51.635569]  <TASK>
[   51.635571]  dump_stack_lvl+0x73/0xb0
[   51.635575]  print_report+0xd1/0x650
[   51.635579]  ? __virt_addr_valid+0x1db/0x2d0
[   51.635583]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.635587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.635593]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.635597]  kasan_report+0x141/0x180
[   51.635601]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.635606]  __asan_report_store4_noabort+0x1b/0x30
[   51.635611]  kasan_atomics_helper+0x4b6e/0x5450
[   51.635615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.635619]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.635624]  ? kasan_atomics+0x152/0x310
[   51.635629]  kasan_atomics+0x1dc/0x310
[   51.635634]  ? __pfx_kasan_atomics+0x10/0x10
[   51.635639]  ? ktime_get_ts64+0x83/0x230
[   51.635643]  kunit_try_run_case+0x1a2/0x480
[   51.635648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.635652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.635656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.635661]  ? __kthread_parkme+0x82/0x180
[   51.635665]  ? preempt_count_sub+0x50/0x80
[   51.635669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.635674]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.635678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.635682]  kthread+0x334/0x6f0
[   51.635686]  ? trace_preempt_on+0x20/0xc0
[   51.635690]  ? __pfx_kthread+0x10/0x10
[   51.635694]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.635698]  ? calculate_sigpending+0x7b/0xa0
[   51.635703]  ? __pfx_kthread+0x10/0x10
[   51.635707]  ret_from_fork+0x113/0x1d0
[   51.635711]  ? __pfx_kthread+0x10/0x10
[   51.635715]  ret_from_fork_asm+0x1a/0x30
[   51.635720]  </TASK>
[   51.635722] 
[   51.815376] Allocated by task 306:
[   51.818789]  kasan_save_stack+0x45/0x70
[   51.822628]  kasan_save_track+0x18/0x40
[   51.826468]  kasan_save_alloc_info+0x3b/0x50
[   51.830742]  __kasan_kmalloc+0xb7/0xc0
[   51.834493]  __kmalloc_cache_noprof+0x189/0x420
[   51.839026]  kasan_atomics+0x95/0x310
[   51.842693]  kunit_try_run_case+0x1a2/0x480
[   51.846887]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.852288]  kthread+0x334/0x6f0
[   51.855520]  ret_from_fork+0x113/0x1d0
[   51.859273]  ret_from_fork_asm+0x1a/0x30
[   51.863197] 
[   51.864698] The buggy address belongs to the object at ffff8881066eaf00
[   51.864698]  which belongs to the cache kmalloc-64 of size 64
[   51.877039] The buggy address is located 0 bytes to the right of
[   51.877039]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   51.889899] 
[   51.891423] The buggy address belongs to the physical page:
[   51.896998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   51.905007] flags: 0x200000000000000(node=0|zone=2)
[   51.909884] page_type: f5(slab)
[   51.913032] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.920781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.928526] page dumped because: kasan: bad access detected
[   51.934100] 
[   51.935601] Memory state around the buggy address:
[   51.940417]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.947637]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   51.954856] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.962077]                                      ^
[   51.966869]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.974087]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.981307] ==================================================================
[   68.286280] ==================================================================
[   68.293512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   68.300902] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   68.308295] 
[   68.309798] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   68.309805] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   68.309808] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.309812] Call Trace:
[   68.309813]  <TASK>
[   68.309815]  dump_stack_lvl+0x73/0xb0
[   68.309820]  print_report+0xd1/0x650
[   68.309824]  ? __virt_addr_valid+0x1db/0x2d0
[   68.309828]  ? kasan_atomics_helper+0x19e3/0x5450
[   68.309832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.309837]  ? kasan_atomics_helper+0x19e3/0x5450
[   68.309841]  kasan_report+0x141/0x180
[   68.309845]  ? kasan_atomics_helper+0x19e3/0x5450
[   68.309850]  kasan_check_range+0x10c/0x1c0
[   68.309855]  __kasan_check_write+0x18/0x20
[   68.309858]  kasan_atomics_helper+0x19e3/0x5450
[   68.309862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.309866]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.309871]  ? kasan_atomics+0x152/0x310
[   68.309876]  kasan_atomics+0x1dc/0x310
[   68.309881]  ? __pfx_kasan_atomics+0x10/0x10
[   68.309886]  ? ktime_get_ts64+0x83/0x230
[   68.309890]  kunit_try_run_case+0x1a2/0x480
[   68.309895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.309899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.309904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.309908]  ? __kthread_parkme+0x82/0x180
[   68.309912]  ? preempt_count_sub+0x50/0x80
[   68.309916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.309921]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.309925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.309930]  kthread+0x334/0x6f0
[   68.309934]  ? trace_preempt_on+0x20/0xc0
[   68.309938]  ? __pfx_kthread+0x10/0x10
[   68.309942]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.309946]  ? calculate_sigpending+0x7b/0xa0
[   68.309950]  ? __pfx_kthread+0x10/0x10
[   68.309955]  ret_from_fork+0x113/0x1d0
[   68.309958]  ? __pfx_kthread+0x10/0x10
[   68.309962]  ret_from_fork_asm+0x1a/0x30
[   68.309968]  </TASK>
[   68.309970] 
[   68.493078] Allocated by task 306:
[   68.496483]  kasan_save_stack+0x45/0x70
[   68.500323]  kasan_save_track+0x18/0x40
[   68.504213]  kasan_save_alloc_info+0x3b/0x50
[   68.508485]  __kasan_kmalloc+0xb7/0xc0
[   68.512239]  __kmalloc_cache_noprof+0x189/0x420
[   68.516773]  kasan_atomics+0x95/0x310
[   68.520446]  kunit_try_run_case+0x1a2/0x480
[   68.524632]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.530031]  kthread+0x334/0x6f0
[   68.533266]  ret_from_fork+0x113/0x1d0
[   68.537019]  ret_from_fork_asm+0x1a/0x30
[   68.540954] 
[   68.542453] The buggy address belongs to the object at ffff8881066eaf00
[   68.542453]  which belongs to the cache kmalloc-64 of size 64
[   68.554793] The buggy address is located 0 bytes to the right of
[   68.554793]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   68.567654] 
[   68.569155] The buggy address belongs to the physical page:
[   68.574725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   68.582725] flags: 0x200000000000000(node=0|zone=2)
[   68.587605] page_type: f5(slab)
[   68.590753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.598498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.606237] page dumped because: kasan: bad access detected
[   68.611810] 
[   68.613310] Memory state around the buggy address:
[   68.618103]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.625321]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   68.632567] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.639786]                                      ^
[   68.644579]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.651799]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.659016] ==================================================================
[   64.489430] ==================================================================
[   64.496670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   64.504063] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   64.511457] 
[   64.512956] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   64.512964] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   64.512966] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.512970] Call Trace:
[   64.512971]  <TASK>
[   64.512973]  dump_stack_lvl+0x73/0xb0
[   64.512978]  print_report+0xd1/0x650
[   64.512982]  ? __virt_addr_valid+0x1db/0x2d0
[   64.512986]  ? kasan_atomics_helper+0x1467/0x5450
[   64.512990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.512995]  ? kasan_atomics_helper+0x1467/0x5450
[   64.512999]  kasan_report+0x141/0x180
[   64.513004]  ? kasan_atomics_helper+0x1467/0x5450
[   64.513009]  kasan_check_range+0x10c/0x1c0
[   64.513013]  __kasan_check_write+0x18/0x20
[   64.513017]  kasan_atomics_helper+0x1467/0x5450
[   64.513021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.513025]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.513030]  ? kasan_atomics+0x152/0x310
[   64.513035]  kasan_atomics+0x1dc/0x310
[   64.513040]  ? __pfx_kasan_atomics+0x10/0x10
[   64.513045]  ? ktime_get_ts64+0x83/0x230
[   64.513049]  kunit_try_run_case+0x1a2/0x480
[   64.513054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.513058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.513063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.513067]  ? __kthread_parkme+0x82/0x180
[   64.513071]  ? preempt_count_sub+0x50/0x80
[   64.513075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.513080]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.513084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.513089]  kthread+0x334/0x6f0
[   64.513092]  ? trace_preempt_on+0x20/0xc0
[   64.513097]  ? __pfx_kthread+0x10/0x10
[   64.513101]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.513104]  ? calculate_sigpending+0x7b/0xa0
[   64.513109]  ? __pfx_kthread+0x10/0x10
[   64.513113]  ret_from_fork+0x113/0x1d0
[   64.513117]  ? __pfx_kthread+0x10/0x10
[   64.513121]  ret_from_fork_asm+0x1a/0x30
[   64.513127]  </TASK>
[   64.513129] 
[   64.696149] Allocated by task 306:
[   64.699556]  kasan_save_stack+0x45/0x70
[   64.703394]  kasan_save_track+0x18/0x40
[   64.707253]  kasan_save_alloc_info+0x3b/0x50
[   64.711533]  __kasan_kmalloc+0xb7/0xc0
[   64.715288]  __kmalloc_cache_noprof+0x189/0x420
[   64.719829]  kasan_atomics+0x95/0x310
[   64.723501]  kunit_try_run_case+0x1a2/0x480
[   64.727687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.733089]  kthread+0x334/0x6f0
[   64.736348]  ret_from_fork+0x113/0x1d0
[   64.740161]  ret_from_fork_asm+0x1a/0x30
[   64.744093] 
[   64.745594] The buggy address belongs to the object at ffff8881066eaf00
[   64.745594]  which belongs to the cache kmalloc-64 of size 64
[   64.757935] The buggy address is located 0 bytes to the right of
[   64.757935]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   64.770796] 
[   64.772294] The buggy address belongs to the physical page:
[   64.777868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   64.785867] flags: 0x200000000000000(node=0|zone=2)
[   64.790747] page_type: f5(slab)
[   64.793893] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.801643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.809422] page dumped because: kasan: bad access detected
[   64.814997] 
[   64.816494] Memory state around the buggy address:
[   64.821287]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.828508]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   64.835727] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.842946]                                      ^
[   64.847739]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.854959]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.862184] ==================================================================
[   57.676189] ==================================================================
[   57.683430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   57.690743] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   57.698134] 
[   57.699635] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   57.699643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   57.699646] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.699649] Call Trace:
[   57.699651]  <TASK>
[   57.699653]  dump_stack_lvl+0x73/0xb0
[   57.699657]  print_report+0xd1/0x650
[   57.699662]  ? __virt_addr_valid+0x1db/0x2d0
[   57.699666]  ? kasan_atomics_helper+0xc70/0x5450
[   57.699669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.699675]  ? kasan_atomics_helper+0xc70/0x5450
[   57.699679]  kasan_report+0x141/0x180
[   57.699683]  ? kasan_atomics_helper+0xc70/0x5450
[   57.699688]  kasan_check_range+0x10c/0x1c0
[   57.699693]  __kasan_check_write+0x18/0x20
[   57.699696]  kasan_atomics_helper+0xc70/0x5450
[   57.699700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.699704]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.699709]  ? kasan_atomics+0x152/0x310
[   57.699715]  kasan_atomics+0x1dc/0x310
[   57.699719]  ? __pfx_kasan_atomics+0x10/0x10
[   57.699724]  ? ktime_get_ts64+0x83/0x230
[   57.699728]  kunit_try_run_case+0x1a2/0x480
[   57.699733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.699737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.699742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.699746]  ? __kthread_parkme+0x82/0x180
[   57.699750]  ? preempt_count_sub+0x50/0x80
[   57.699754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.699759]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.699763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.699768]  kthread+0x334/0x6f0
[   57.699772]  ? trace_preempt_on+0x20/0xc0
[   57.699776]  ? __pfx_kthread+0x10/0x10
[   57.699780]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.699784]  ? calculate_sigpending+0x7b/0xa0
[   57.699788]  ? __pfx_kthread+0x10/0x10
[   57.699793]  ret_from_fork+0x113/0x1d0
[   57.699796]  ? __pfx_kthread+0x10/0x10
[   57.699800]  ret_from_fork_asm+0x1a/0x30
[   57.699806]  </TASK>
[   57.699808] 
[   57.882526] Allocated by task 306:
[   57.885932]  kasan_save_stack+0x45/0x70
[   57.889772]  kasan_save_track+0x18/0x40
[   57.893610]  kasan_save_alloc_info+0x3b/0x50
[   57.897885]  __kasan_kmalloc+0xb7/0xc0
[   57.901643]  __kmalloc_cache_noprof+0x189/0x420
[   57.906178]  kasan_atomics+0x95/0x310
[   57.909850]  kunit_try_run_case+0x1a2/0x480
[   57.914037]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.919438]  kthread+0x334/0x6f0
[   57.922670]  ret_from_fork+0x113/0x1d0
[   57.926422]  ret_from_fork_asm+0x1a/0x30
[   57.930376] 
[   57.931908] The buggy address belongs to the object at ffff8881066eaf00
[   57.931908]  which belongs to the cache kmalloc-64 of size 64
[   57.944249] The buggy address is located 0 bytes to the right of
[   57.944249]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   57.957110] 
[   57.958611] The buggy address belongs to the physical page:
[   57.964182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   57.972183] flags: 0x200000000000000(node=0|zone=2)
[   57.977062] page_type: f5(slab)
[   57.980207] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.987949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.995696] page dumped because: kasan: bad access detected
[   58.001267] 
[   58.002768] Memory state around the buggy address:
[   58.007560]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.014778]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   58.021999] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.029217]                                      ^
[   58.034010]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.041229]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.048448] ==================================================================
[   54.639445] ==================================================================
[   54.646684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   54.653992] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   54.661422] 
[   54.662919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   54.662927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   54.662930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.662933] Call Trace:
[   54.662935]  <TASK>
[   54.662937]  dump_stack_lvl+0x73/0xb0
[   54.662942]  print_report+0xd1/0x650
[   54.662946]  ? __virt_addr_valid+0x1db/0x2d0
[   54.662950]  ? kasan_atomics_helper+0x72f/0x5450
[   54.662954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.662959]  ? kasan_atomics_helper+0x72f/0x5450
[   54.662963]  kasan_report+0x141/0x180
[   54.662967]  ? kasan_atomics_helper+0x72f/0x5450
[   54.662972]  kasan_check_range+0x10c/0x1c0
[   54.662977]  __kasan_check_write+0x18/0x20
[   54.662980]  kasan_atomics_helper+0x72f/0x5450
[   54.662984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.662989]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.662994]  ? kasan_atomics+0x152/0x310
[   54.662999]  kasan_atomics+0x1dc/0x310
[   54.663003]  ? __pfx_kasan_atomics+0x10/0x10
[   54.663008]  ? ktime_get_ts64+0x83/0x230
[   54.663013]  kunit_try_run_case+0x1a2/0x480
[   54.663017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.663022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.663026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.663031]  ? __kthread_parkme+0x82/0x180
[   54.663035]  ? preempt_count_sub+0x50/0x80
[   54.663039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.663044]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.663048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.663052]  kthread+0x334/0x6f0
[   54.663056]  ? trace_preempt_on+0x20/0xc0
[   54.663060]  ? __pfx_kthread+0x10/0x10
[   54.663064]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.663068]  ? calculate_sigpending+0x7b/0xa0
[   54.663073]  ? __pfx_kthread+0x10/0x10
[   54.663077]  ret_from_fork+0x113/0x1d0
[   54.663081]  ? __pfx_kthread+0x10/0x10
[   54.663085]  ret_from_fork_asm+0x1a/0x30
[   54.663090]  </TASK>
[   54.663092] 
[   54.845782] Allocated by task 306:
[   54.849190]  kasan_save_stack+0x45/0x70
[   54.853030]  kasan_save_track+0x18/0x40
[   54.856876]  kasan_save_alloc_info+0x3b/0x50
[   54.861151]  __kasan_kmalloc+0xb7/0xc0
[   54.864901]  __kmalloc_cache_noprof+0x189/0x420
[   54.869434]  kasan_atomics+0x95/0x310
[   54.873100]  kunit_try_run_case+0x1a2/0x480
[   54.877286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.882687]  kthread+0x334/0x6f0
[   54.885928]  ret_from_fork+0x113/0x1d0
[   54.889679]  ret_from_fork_asm+0x1a/0x30
[   54.893607] 
[   54.895105] The buggy address belongs to the object at ffff8881066eaf00
[   54.895105]  which belongs to the cache kmalloc-64 of size 64
[   54.907448] The buggy address is located 0 bytes to the right of
[   54.907448]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   54.920316] 
[   54.921842] The buggy address belongs to the physical page:
[   54.927430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   54.935432] flags: 0x200000000000000(node=0|zone=2)
[   54.940311] page_type: f5(slab)
[   54.943456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.951198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.958943] page dumped because: kasan: bad access detected
[   54.964516] 
[   54.966014] Memory state around the buggy address:
[   54.970807]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.978026]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   54.985247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.992467]                                      ^
[   54.997258]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.004480]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.011707] ==================================================================
[   58.811698] ==================================================================
[   58.818937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   58.826245] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   58.833645] 
[   58.835144] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   58.835152] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   58.835155] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.835158] Call Trace:
[   58.835160]  <TASK>
[   58.835162]  dump_stack_lvl+0x73/0xb0
[   58.835167]  print_report+0xd1/0x650
[   58.835171]  ? __virt_addr_valid+0x1db/0x2d0
[   58.835175]  ? kasan_atomics_helper+0xde0/0x5450
[   58.835179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.835184]  ? kasan_atomics_helper+0xde0/0x5450
[   58.835188]  kasan_report+0x141/0x180
[   58.835192]  ? kasan_atomics_helper+0xde0/0x5450
[   58.835197]  kasan_check_range+0x10c/0x1c0
[   58.835202]  __kasan_check_write+0x18/0x20
[   58.835205]  kasan_atomics_helper+0xde0/0x5450
[   58.835209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.835213]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.835218]  ? kasan_atomics+0x152/0x310
[   58.835224]  kasan_atomics+0x1dc/0x310
[   58.835228]  ? __pfx_kasan_atomics+0x10/0x10
[   58.835233]  ? ktime_get_ts64+0x83/0x230
[   58.835237]  kunit_try_run_case+0x1a2/0x480
[   58.835242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.835246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.835251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.835255]  ? __kthread_parkme+0x82/0x180
[   58.835259]  ? preempt_count_sub+0x50/0x80
[   58.835263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.835268]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.835272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.835276]  kthread+0x334/0x6f0
[   58.835280]  ? trace_preempt_on+0x20/0xc0
[   58.835284]  ? __pfx_kthread+0x10/0x10
[   58.835288]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.835292]  ? calculate_sigpending+0x7b/0xa0
[   58.835297]  ? __pfx_kthread+0x10/0x10
[   58.835301]  ret_from_fork+0x113/0x1d0
[   58.835304]  ? __pfx_kthread+0x10/0x10
[   58.835308]  ret_from_fork_asm+0x1a/0x30
[   58.835314]  </TASK>
[   58.835316] 
[   59.018096] Allocated by task 306:
[   59.021504]  kasan_save_stack+0x45/0x70
[   59.025365]  kasan_save_track+0x18/0x40
[   59.029251]  kasan_save_alloc_info+0x3b/0x50
[   59.033522]  __kasan_kmalloc+0xb7/0xc0
[   59.037276]  __kmalloc_cache_noprof+0x189/0x420
[   59.041808]  kasan_atomics+0x95/0x310
[   59.045475]  kunit_try_run_case+0x1a2/0x480
[   59.049661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.055060]  kthread+0x334/0x6f0
[   59.058291]  ret_from_fork+0x113/0x1d0
[   59.062046]  ret_from_fork_asm+0x1a/0x30
[   59.065972] 
[   59.067471] The buggy address belongs to the object at ffff8881066eaf00
[   59.067471]  which belongs to the cache kmalloc-64 of size 64
[   59.079812] The buggy address is located 0 bytes to the right of
[   59.079812]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   59.092673] 
[   59.094173] The buggy address belongs to the physical page:
[   59.099744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   59.107744] flags: 0x200000000000000(node=0|zone=2)
[   59.112624] page_type: f5(slab)
[   59.115772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.123517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.131258] page dumped because: kasan: bad access detected
[   59.136828] 
[   59.138348] Memory state around the buggy address:
[   59.143193]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.150420]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   59.157646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.164866]                                      ^
[   59.169659]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.176880]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.184107] ==================================================================
[   69.046385] ==================================================================
[   69.053652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   69.061045] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   69.068438] 
[   69.069937] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   69.069944] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   69.069947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.069951] Call Trace:
[   69.069952]  <TASK>
[   69.069954]  dump_stack_lvl+0x73/0xb0
[   69.069959]  print_report+0xd1/0x650
[   69.069963]  ? __virt_addr_valid+0x1db/0x2d0
[   69.069967]  ? kasan_atomics_helper+0x1b22/0x5450
[   69.069971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.069976]  ? kasan_atomics_helper+0x1b22/0x5450
[   69.069980]  kasan_report+0x141/0x180
[   69.069984]  ? kasan_atomics_helper+0x1b22/0x5450
[   69.069989]  kasan_check_range+0x10c/0x1c0
[   69.069994]  __kasan_check_write+0x18/0x20
[   69.069997]  kasan_atomics_helper+0x1b22/0x5450
[   69.070001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.070005]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.070010]  ? kasan_atomics+0x152/0x310
[   69.070015]  kasan_atomics+0x1dc/0x310
[   69.070020]  ? __pfx_kasan_atomics+0x10/0x10
[   69.070025]  ? ktime_get_ts64+0x83/0x230
[   69.070029]  kunit_try_run_case+0x1a2/0x480
[   69.070034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.070038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.070043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.070047]  ? __kthread_parkme+0x82/0x180
[   69.070051]  ? preempt_count_sub+0x50/0x80
[   69.070055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.070060]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.070064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.070069]  kthread+0x334/0x6f0
[   69.070072]  ? trace_preempt_on+0x20/0xc0
[   69.070077]  ? __pfx_kthread+0x10/0x10
[   69.070081]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.070085]  ? calculate_sigpending+0x7b/0xa0
[   69.070089]  ? __pfx_kthread+0x10/0x10
[   69.070093]  ret_from_fork+0x113/0x1d0
[   69.070097]  ? __pfx_kthread+0x10/0x10
[   69.070101]  ret_from_fork_asm+0x1a/0x30
[   69.070107]  </TASK>
[   69.070109] 
[   69.253108] Allocated by task 306:
[   69.256512]  kasan_save_stack+0x45/0x70
[   69.260376]  kasan_save_track+0x18/0x40
[   69.264253]  kasan_save_alloc_info+0x3b/0x50
[   69.268534]  __kasan_kmalloc+0xb7/0xc0
[   69.272286]  __kmalloc_cache_noprof+0x189/0x420
[   69.276826]  kasan_atomics+0x95/0x310
[   69.280493]  kunit_try_run_case+0x1a2/0x480
[   69.284677]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.290077]  kthread+0x334/0x6f0
[   69.293310]  ret_from_fork+0x113/0x1d0
[   69.297063]  ret_from_fork_asm+0x1a/0x30
[   69.300988] 
[   69.302489] The buggy address belongs to the object at ffff8881066eaf00
[   69.302489]  which belongs to the cache kmalloc-64 of size 64
[   69.314829] The buggy address is located 0 bytes to the right of
[   69.314829]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   69.327691] 
[   69.329190] The buggy address belongs to the physical page:
[   69.334764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   69.342762] flags: 0x200000000000000(node=0|zone=2)
[   69.347642] page_type: f5(slab)
[   69.350788] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.358528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.366274] page dumped because: kasan: bad access detected
[   69.371848] 
[   69.373376] Memory state around the buggy address:
[   69.378202]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.385429]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   69.392646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.399866]                                      ^
[   69.404659]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.411880]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   69.419098] ==================================================================
[   72.125911] ==================================================================
[   72.133155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   72.140549] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   72.147949] 
[   72.149452] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   72.149460] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   72.149463] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.149467] Call Trace:
[   72.149469]  <TASK>
[   72.149471]  dump_stack_lvl+0x73/0xb0
[   72.149475]  print_report+0xd1/0x650
[   72.149479]  ? __virt_addr_valid+0x1db/0x2d0
[   72.149483]  ? kasan_atomics_helper+0x1f43/0x5450
[   72.149487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.149493]  ? kasan_atomics_helper+0x1f43/0x5450
[   72.149497]  kasan_report+0x141/0x180
[   72.149501]  ? kasan_atomics_helper+0x1f43/0x5450
[   72.149506]  kasan_check_range+0x10c/0x1c0
[   72.149510]  __kasan_check_write+0x18/0x20
[   72.149514]  kasan_atomics_helper+0x1f43/0x5450
[   72.149518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.149522]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.149527]  ? kasan_atomics+0x152/0x310
[   72.149532]  kasan_atomics+0x1dc/0x310
[   72.149537]  ? __pfx_kasan_atomics+0x10/0x10
[   72.149542]  ? ktime_get_ts64+0x83/0x230
[   72.149546]  kunit_try_run_case+0x1a2/0x480
[   72.149551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.149555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.149560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.149564]  ? __kthread_parkme+0x82/0x180
[   72.149568]  ? preempt_count_sub+0x50/0x80
[   72.149572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.149577]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.149581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.149586]  kthread+0x334/0x6f0
[   72.149589]  ? trace_preempt_on+0x20/0xc0
[   72.149594]  ? __pfx_kthread+0x10/0x10
[   72.149597]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.149601]  ? calculate_sigpending+0x7b/0xa0
[   72.149606]  ? __pfx_kthread+0x10/0x10
[   72.149610]  ret_from_fork+0x113/0x1d0
[   72.149614]  ? __pfx_kthread+0x10/0x10
[   72.149617]  ret_from_fork_asm+0x1a/0x30
[   72.149623]  </TASK>
[   72.149625] 
[   72.332767] Allocated by task 306:
[   72.336171]  kasan_save_stack+0x45/0x70
[   72.340012]  kasan_save_track+0x18/0x40
[   72.343849]  kasan_save_alloc_info+0x3b/0x50
[   72.348123]  __kasan_kmalloc+0xb7/0xc0
[   72.351875]  __kmalloc_cache_noprof+0x189/0x420
[   72.356422]  kasan_atomics+0x95/0x310
[   72.360093]  kunit_try_run_case+0x1a2/0x480
[   72.364286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.369685]  kthread+0x334/0x6f0
[   72.372918]  ret_from_fork+0x113/0x1d0
[   72.376670]  ret_from_fork_asm+0x1a/0x30
[   72.380596] 
[   72.382097] The buggy address belongs to the object at ffff8881066eaf00
[   72.382097]  which belongs to the cache kmalloc-64 of size 64
[   72.394439] The buggy address is located 0 bytes to the right of
[   72.394439]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   72.407309] 
[   72.408806] The buggy address belongs to the physical page:
[   72.414422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   72.422423] flags: 0x200000000000000(node=0|zone=2)
[   72.427303] page_type: f5(slab)
[   72.430447] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.438188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.445936] page dumped because: kasan: bad access detected
[   72.451507] 
[   72.453007] Memory state around the buggy address:
[   72.457800]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.465018]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   72.472237] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.479458]                                      ^
[   72.484252]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.491480]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.498719] ==================================================================
[   73.262980] ==================================================================
[   73.270226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   73.277618] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   73.284925] 
[   73.286425] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   73.286433] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   73.286436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.286440] Call Trace:
[   73.286442]  <TASK>
[   73.286443]  dump_stack_lvl+0x73/0xb0
[   73.286448]  print_report+0xd1/0x650
[   73.286452]  ? __virt_addr_valid+0x1db/0x2d0
[   73.286456]  ? kasan_atomics_helper+0x4f98/0x5450
[   73.286460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.286466]  ? kasan_atomics_helper+0x4f98/0x5450
[   73.286470]  kasan_report+0x141/0x180
[   73.286474]  ? kasan_atomics_helper+0x4f98/0x5450
[   73.286479]  __asan_report_load8_noabort+0x18/0x20
[   73.286484]  kasan_atomics_helper+0x4f98/0x5450
[   73.286488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.286492]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.286497]  ? kasan_atomics+0x152/0x310
[   73.286502]  kasan_atomics+0x1dc/0x310
[   73.286507]  ? __pfx_kasan_atomics+0x10/0x10
[   73.286511]  ? ktime_get_ts64+0x83/0x230
[   73.286516]  kunit_try_run_case+0x1a2/0x480
[   73.286521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.286525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.286529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.286534]  ? __kthread_parkme+0x82/0x180
[   73.286538]  ? preempt_count_sub+0x50/0x80
[   73.286542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.286547]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.286551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.286555]  kthread+0x334/0x6f0
[   73.286559]  ? trace_preempt_on+0x20/0xc0
[   73.286563]  ? __pfx_kthread+0x10/0x10
[   73.286567]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.286571]  ? calculate_sigpending+0x7b/0xa0
[   73.286576]  ? __pfx_kthread+0x10/0x10
[   73.286580]  ret_from_fork+0x113/0x1d0
[   73.286583]  ? __pfx_kthread+0x10/0x10
[   73.286587]  ret_from_fork_asm+0x1a/0x30
[   73.286593]  </TASK>
[   73.286595] 
[   73.466266] Allocated by task 306:
[   73.469672]  kasan_save_stack+0x45/0x70
[   73.473511]  kasan_save_track+0x18/0x40
[   73.477376]  kasan_save_alloc_info+0x3b/0x50
[   73.481674]  __kasan_kmalloc+0xb7/0xc0
[   73.485427]  __kmalloc_cache_noprof+0x189/0x420
[   73.489969]  kasan_atomics+0x95/0x310
[   73.493633]  kunit_try_run_case+0x1a2/0x480
[   73.497821]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.503219]  kthread+0x334/0x6f0
[   73.506454]  ret_from_fork+0x113/0x1d0
[   73.510204]  ret_from_fork_asm+0x1a/0x30
[   73.514132] 
[   73.515632] The buggy address belongs to the object at ffff8881066eaf00
[   73.515632]  which belongs to the cache kmalloc-64 of size 64
[   73.527972] The buggy address is located 0 bytes to the right of
[   73.527972]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   73.540841] 
[   73.542378] The buggy address belongs to the physical page:
[   73.547983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   73.555990] flags: 0x200000000000000(node=0|zone=2)
[   73.560870] page_type: f5(slab)
[   73.564018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.571766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.579512] page dumped because: kasan: bad access detected
[   73.585085] 
[   73.586585] Memory state around the buggy address:
[   73.591400]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.598639]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.605859] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.613078]                                      ^
[   73.617872]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.625101]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.632348] ==================================================================
[   61.086682] ==================================================================
[   61.093927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   61.101319] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   61.108661] 
[   61.110162] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   61.110169] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   61.110172] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.110176] Call Trace:
[   61.110178]  <TASK>
[   61.110179]  dump_stack_lvl+0x73/0xb0
[   61.110184]  print_report+0xd1/0x650
[   61.110188]  ? __virt_addr_valid+0x1db/0x2d0
[   61.110192]  ? kasan_atomics_helper+0x4a1c/0x5450
[   61.110196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.110201]  ? kasan_atomics_helper+0x4a1c/0x5450
[   61.110205]  kasan_report+0x141/0x180
[   61.110210]  ? kasan_atomics_helper+0x4a1c/0x5450
[   61.110215]  __asan_report_load4_noabort+0x18/0x20
[   61.110219]  kasan_atomics_helper+0x4a1c/0x5450
[   61.110224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.110228]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.110233]  ? kasan_atomics+0x152/0x310
[   61.110238]  kasan_atomics+0x1dc/0x310
[   61.110242]  ? __pfx_kasan_atomics+0x10/0x10
[   61.110247]  ? ktime_get_ts64+0x83/0x230
[   61.110252]  kunit_try_run_case+0x1a2/0x480
[   61.110256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.110261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.110265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.110269]  ? __kthread_parkme+0x82/0x180
[   61.110273]  ? preempt_count_sub+0x50/0x80
[   61.110278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.110282]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.110287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.110291]  kthread+0x334/0x6f0
[   61.110295]  ? trace_preempt_on+0x20/0xc0
[   61.110299]  ? __pfx_kthread+0x10/0x10
[   61.110303]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.110307]  ? calculate_sigpending+0x7b/0xa0
[   61.110312]  ? __pfx_kthread+0x10/0x10
[   61.110316]  ret_from_fork+0x113/0x1d0
[   61.110319]  ? __pfx_kthread+0x10/0x10
[   61.110323]  ret_from_fork_asm+0x1a/0x30
[   61.110349]  </TASK>
[   61.110351] 
[   61.290080] Allocated by task 306:
[   61.293485]  kasan_save_stack+0x45/0x70
[   61.297325]  kasan_save_track+0x18/0x40
[   61.301189]  kasan_save_alloc_info+0x3b/0x50
[   61.305463]  __kasan_kmalloc+0xb7/0xc0
[   61.309214]  __kmalloc_cache_noprof+0x189/0x420
[   61.313749]  kasan_atomics+0x95/0x310
[   61.317428]  kunit_try_run_case+0x1a2/0x480
[   61.321617]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.327017]  kthread+0x334/0x6f0
[   61.330248]  ret_from_fork+0x113/0x1d0
[   61.334001]  ret_from_fork_asm+0x1a/0x30
[   61.337926] 
[   61.339429] The buggy address belongs to the object at ffff8881066eaf00
[   61.339429]  which belongs to the cache kmalloc-64 of size 64
[   61.351768] The buggy address is located 0 bytes to the right of
[   61.351768]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   61.364630] 
[   61.366130] The buggy address belongs to the physical page:
[   61.371701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   61.379702] flags: 0x200000000000000(node=0|zone=2)
[   61.384587] page_type: f5(slab)
[   61.387736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.395484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.403222] page dumped because: kasan: bad access detected
[   61.408795] 
[   61.410294] Memory state around the buggy address:
[   61.415088]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.422305]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   61.429527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.436744]                                      ^
[   61.441538]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.448757]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.455976] ==================================================================
[   61.843200] ==================================================================
[   61.850446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   61.857838] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   61.865144] 
[   61.866646] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   61.866654] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   61.866657] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.866660] Call Trace:
[   61.866662]  <TASK>
[   61.866664]  dump_stack_lvl+0x73/0xb0
[   61.866668]  print_report+0xd1/0x650
[   61.866672]  ? __virt_addr_valid+0x1db/0x2d0
[   61.866676]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.866680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.866685]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.866689]  kasan_report+0x141/0x180
[   61.866694]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.866699]  __asan_report_load4_noabort+0x18/0x20
[   61.866703]  kasan_atomics_helper+0x4a02/0x5450
[   61.866708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.866712]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.866717]  ? kasan_atomics+0x152/0x310
[   61.866722]  kasan_atomics+0x1dc/0x310
[   61.866726]  ? __pfx_kasan_atomics+0x10/0x10
[   61.866731]  ? ktime_get_ts64+0x83/0x230
[   61.866735]  kunit_try_run_case+0x1a2/0x480
[   61.866740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.866745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.866749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.866753]  ? __kthread_parkme+0x82/0x180
[   61.866757]  ? preempt_count_sub+0x50/0x80
[   61.866762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.866766]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.866770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.866775]  kthread+0x334/0x6f0
[   61.866779]  ? trace_preempt_on+0x20/0xc0
[   61.866783]  ? __pfx_kthread+0x10/0x10
[   61.866787]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.866791]  ? calculate_sigpending+0x7b/0xa0
[   61.866795]  ? __pfx_kthread+0x10/0x10
[   61.866800]  ret_from_fork+0x113/0x1d0
[   61.866803]  ? __pfx_kthread+0x10/0x10
[   61.866807]  ret_from_fork_asm+0x1a/0x30
[   61.866813]  </TASK>
[   61.866815] 
[   62.046485] Allocated by task 306:
[   62.049890]  kasan_save_stack+0x45/0x70
[   62.053729]  kasan_save_track+0x18/0x40
[   62.057568]  kasan_save_alloc_info+0x3b/0x50
[   62.061843]  __kasan_kmalloc+0xb7/0xc0
[   62.065595]  __kmalloc_cache_noprof+0x189/0x420
[   62.070138]  kasan_atomics+0x95/0x310
[   62.073812]  kunit_try_run_case+0x1a2/0x480
[   62.077996]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.083395]  kthread+0x334/0x6f0
[   62.086647]  ret_from_fork+0x113/0x1d0
[   62.090418]  ret_from_fork_asm+0x1a/0x30
[   62.094364] 
[   62.095909] The buggy address belongs to the object at ffff8881066eaf00
[   62.095909]  which belongs to the cache kmalloc-64 of size 64
[   62.108245] The buggy address is located 0 bytes to the right of
[   62.108245]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   62.121114] 
[   62.122612] The buggy address belongs to the physical page:
[   62.128187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   62.136193] flags: 0x200000000000000(node=0|zone=2)
[   62.141072] page_type: f5(slab)
[   62.144219] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.151957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.159698] page dumped because: kasan: bad access detected
[   62.165271] 
[   62.166770] Memory state around the buggy address:
[   62.171562]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.178781]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   62.186000] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.193220]                                      ^
[   62.198014]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.205232]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.212451] ==================================================================
[   50.474233] ==================================================================
[   50.489124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   50.496522] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   50.503830] 
[   50.505348] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   50.505358] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   50.505361] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.505365] Call Trace:
[   50.505367]  <TASK>
[   50.505369]  dump_stack_lvl+0x73/0xb0
[   50.505386]  print_report+0xd1/0x650
[   50.505390]  ? __virt_addr_valid+0x1db/0x2d0
[   50.505407]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.505411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.505416]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.505420]  kasan_report+0x141/0x180
[   50.505424]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.505429]  __asan_report_load4_noabort+0x18/0x20
[   50.505434]  kasan_atomics_helper+0x4bbc/0x5450
[   50.505437]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.505441]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.505446]  ? kasan_atomics+0x152/0x310
[   50.505451]  kasan_atomics+0x1dc/0x310
[   50.505455]  ? __pfx_kasan_atomics+0x10/0x10
[   50.505460]  ? ktime_get_ts64+0x83/0x230
[   50.505464]  kunit_try_run_case+0x1a2/0x480
[   50.505469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.505473]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.505477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.505481]  ? __kthread_parkme+0x82/0x180
[   50.505485]  ? preempt_count_sub+0x50/0x80
[   50.505489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.505493]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.505497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.505502]  kthread+0x334/0x6f0
[   50.505505]  ? trace_preempt_on+0x20/0xc0
[   50.505509]  ? __pfx_kthread+0x10/0x10
[   50.505513]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.505517]  ? calculate_sigpending+0x7b/0xa0
[   50.505521]  ? __pfx_kthread+0x10/0x10
[   50.505525]  ret_from_fork+0x113/0x1d0
[   50.505528]  ? __pfx_kthread+0x10/0x10
[   50.505532]  ret_from_fork_asm+0x1a/0x30
[   50.505538]  </TASK>
[   50.505540] 
[   50.685309] Allocated by task 306:
[   50.688715]  kasan_save_stack+0x45/0x70
[   50.692552]  kasan_save_track+0x18/0x40
[   50.696415]  kasan_save_alloc_info+0x3b/0x50
[   50.700691]  __kasan_kmalloc+0xb7/0xc0
[   50.704444]  __kmalloc_cache_noprof+0x189/0x420
[   50.708978]  kasan_atomics+0x95/0x310
[   50.712651]  kunit_try_run_case+0x1a2/0x480
[   50.716838]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.722245]  kthread+0x334/0x6f0
[   50.725477]  ret_from_fork+0x113/0x1d0
[   50.729229]  ret_from_fork_asm+0x1a/0x30
[   50.733156] 
[   50.734654] The buggy address belongs to the object at ffff8881066eaf00
[   50.734654]  which belongs to the cache kmalloc-64 of size 64
[   50.746988] The buggy address is located 0 bytes to the right of
[   50.746988]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   50.759851] 
[   50.761363] The buggy address belongs to the physical page:
[   50.766965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   50.774965] flags: 0x200000000000000(node=0|zone=2)
[   50.779843] page_type: f5(slab)
[   50.782990] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   50.790731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.798476] page dumped because: kasan: bad access detected
[   50.804050] 
[   50.805549] Memory state around the buggy address:
[   50.810377]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.817632]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   50.824860] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.832078]                                      ^
[   50.836870]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.844088]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.851308] ==================================================================
[   59.950519] ==================================================================
[   59.957757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   59.965065] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   59.972467] 
[   59.973966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   59.973973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   59.973976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.973979] Call Trace:
[   59.973981]  <TASK>
[   59.973983]  dump_stack_lvl+0x73/0xb0
[   59.973988]  print_report+0xd1/0x650
[   59.973992]  ? __virt_addr_valid+0x1db/0x2d0
[   59.973996]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.973999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.974005]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.974009]  kasan_report+0x141/0x180
[   59.974013]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.974018]  kasan_check_range+0x10c/0x1c0
[   59.974023]  __kasan_check_write+0x18/0x20
[   59.974027]  kasan_atomics_helper+0xfa9/0x5450
[   59.974031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.974035]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.974040]  ? kasan_atomics+0x152/0x310
[   59.974045]  kasan_atomics+0x1dc/0x310
[   59.974049]  ? __pfx_kasan_atomics+0x10/0x10
[   59.974054]  ? ktime_get_ts64+0x83/0x230
[   59.974059]  kunit_try_run_case+0x1a2/0x480
[   59.974063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.974068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.974072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.974077]  ? __kthread_parkme+0x82/0x180
[   59.974080]  ? preempt_count_sub+0x50/0x80
[   59.974085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.974090]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.974094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.974099]  kthread+0x334/0x6f0
[   59.974102]  ? trace_preempt_on+0x20/0xc0
[   59.974106]  ? __pfx_kthread+0x10/0x10
[   59.974111]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.974114]  ? calculate_sigpending+0x7b/0xa0
[   59.974119]  ? __pfx_kthread+0x10/0x10
[   59.974123]  ret_from_fork+0x113/0x1d0
[   59.974127]  ? __pfx_kthread+0x10/0x10
[   59.974131]  ret_from_fork_asm+0x1a/0x30
[   59.974137]  </TASK>
[   59.974138] 
[   60.156858] Allocated by task 306:
[   60.160264]  kasan_save_stack+0x45/0x70
[   60.164101]  kasan_save_track+0x18/0x40
[   60.167941]  kasan_save_alloc_info+0x3b/0x50
[   60.172216]  __kasan_kmalloc+0xb7/0xc0
[   60.175976]  __kmalloc_cache_noprof+0x189/0x420
[   60.180517]  kasan_atomics+0x95/0x310
[   60.184182]  kunit_try_run_case+0x1a2/0x480
[   60.188404]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.193811]  kthread+0x334/0x6f0
[   60.197044]  ret_from_fork+0x113/0x1d0
[   60.200797]  ret_from_fork_asm+0x1a/0x30
[   60.204722] 
[   60.206221] The buggy address belongs to the object at ffff8881066eaf00
[   60.206221]  which belongs to the cache kmalloc-64 of size 64
[   60.218563] The buggy address is located 0 bytes to the right of
[   60.218563]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   60.231428] 
[   60.232925] The buggy address belongs to the physical page:
[   60.238496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   60.246495] flags: 0x200000000000000(node=0|zone=2)
[   60.251394] page_type: f5(slab)
[   60.254565] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.262306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.270051] page dumped because: kasan: bad access detected
[   60.275623] 
[   60.277123] Memory state around the buggy address:
[   60.281917]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.289145]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   60.296376] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.303627]                                      ^
[   60.308427]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.315646]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.322866] ==================================================================
[   67.146265] ==================================================================
[   67.153512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   67.160905] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   67.168306] 
[   67.169807] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   67.169815] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   67.169818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.169821] Call Trace:
[   67.169823]  <TASK>
[   67.169825]  dump_stack_lvl+0x73/0xb0
[   67.169829]  print_report+0xd1/0x650
[   67.169834]  ? __virt_addr_valid+0x1db/0x2d0
[   67.169838]  ? kasan_atomics_helper+0x1818/0x5450
[   67.169842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.169847]  ? kasan_atomics_helper+0x1818/0x5450
[   67.169851]  kasan_report+0x141/0x180
[   67.169855]  ? kasan_atomics_helper+0x1818/0x5450
[   67.169860]  kasan_check_range+0x10c/0x1c0
[   67.169865]  __kasan_check_write+0x18/0x20
[   67.169868]  kasan_atomics_helper+0x1818/0x5450
[   67.169873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.169877]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.169882]  ? kasan_atomics+0x152/0x310
[   67.169887]  kasan_atomics+0x1dc/0x310
[   67.169891]  ? __pfx_kasan_atomics+0x10/0x10
[   67.169896]  ? ktime_get_ts64+0x83/0x230
[   67.169901]  kunit_try_run_case+0x1a2/0x480
[   67.169905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.169910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.169914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.169919]  ? __kthread_parkme+0x82/0x180
[   67.169922]  ? preempt_count_sub+0x50/0x80
[   67.169927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.169931]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.169936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.169940]  kthread+0x334/0x6f0
[   67.169944]  ? trace_preempt_on+0x20/0xc0
[   67.169948]  ? __pfx_kthread+0x10/0x10
[   67.169952]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.169956]  ? calculate_sigpending+0x7b/0xa0
[   67.169961]  ? __pfx_kthread+0x10/0x10
[   67.169965]  ret_from_fork+0x113/0x1d0
[   67.169968]  ? __pfx_kthread+0x10/0x10
[   67.169972]  ret_from_fork_asm+0x1a/0x30
[   67.169978]  </TASK>
[   67.169980] 
[   67.353060] Allocated by task 306:
[   67.356466]  kasan_save_stack+0x45/0x70
[   67.360307]  kasan_save_track+0x18/0x40
[   67.364156]  kasan_save_alloc_info+0x3b/0x50
[   67.368436]  __kasan_kmalloc+0xb7/0xc0
[   67.372188]  __kmalloc_cache_noprof+0x189/0x420
[   67.376722]  kasan_atomics+0x95/0x310
[   67.380419]  kunit_try_run_case+0x1a2/0x480
[   67.384606]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.390008]  kthread+0x334/0x6f0
[   67.393239]  ret_from_fork+0x113/0x1d0
[   67.396992]  ret_from_fork_asm+0x1a/0x30
[   67.400918] 
[   67.402421] The buggy address belongs to the object at ffff8881066eaf00
[   67.402421]  which belongs to the cache kmalloc-64 of size 64
[   67.414757] The buggy address is located 0 bytes to the right of
[   67.414757]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   67.427621] 
[   67.429119] The buggy address belongs to the physical page:
[   67.434691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   67.442691] flags: 0x200000000000000(node=0|zone=2)
[   67.447570] page_type: f5(slab)
[   67.450718] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.458465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.466204] page dumped because: kasan: bad access detected
[   67.471777] 
[   67.473276] Memory state around the buggy address:
[   67.478070]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.485298]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   67.492526] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.499751]                                      ^
[   67.504545]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.511764]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.518983] ==================================================================
[   65.246254] ==================================================================
[   65.253501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   65.260894] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   65.268295] 
[   65.269795] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   65.269803] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   65.269806] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.269809] Call Trace:
[   65.269811]  <TASK>
[   65.269813]  dump_stack_lvl+0x73/0xb0
[   65.269818]  print_report+0xd1/0x650
[   65.269822]  ? __virt_addr_valid+0x1db/0x2d0
[   65.269826]  ? kasan_atomics_helper+0x151d/0x5450
[   65.269830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.269835]  ? kasan_atomics_helper+0x151d/0x5450
[   65.269839]  kasan_report+0x141/0x180
[   65.269843]  ? kasan_atomics_helper+0x151d/0x5450
[   65.269848]  kasan_check_range+0x10c/0x1c0
[   65.269853]  __kasan_check_write+0x18/0x20
[   65.269856]  kasan_atomics_helper+0x151d/0x5450
[   65.269861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.269865]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.269870]  ? kasan_atomics+0x152/0x310
[   65.269875]  kasan_atomics+0x1dc/0x310
[   65.269879]  ? __pfx_kasan_atomics+0x10/0x10
[   65.269884]  ? ktime_get_ts64+0x83/0x230
[   65.269889]  kunit_try_run_case+0x1a2/0x480
[   65.269893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.269898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.269902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.269907]  ? __kthread_parkme+0x82/0x180
[   65.269910]  ? preempt_count_sub+0x50/0x80
[   65.269915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.269919]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.269923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.269928]  kthread+0x334/0x6f0
[   65.269932]  ? trace_preempt_on+0x20/0xc0
[   65.269936]  ? __pfx_kthread+0x10/0x10
[   65.269940]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.269944]  ? calculate_sigpending+0x7b/0xa0
[   65.269948]  ? __pfx_kthread+0x10/0x10
[   65.269952]  ret_from_fork+0x113/0x1d0
[   65.269956]  ? __pfx_kthread+0x10/0x10
[   65.269960]  ret_from_fork_asm+0x1a/0x30
[   65.269966]  </TASK>
[   65.269967] 
[   65.453042] Allocated by task 306:
[   65.456448]  kasan_save_stack+0x45/0x70
[   65.460287]  kasan_save_track+0x18/0x40
[   65.464127]  kasan_save_alloc_info+0x3b/0x50
[   65.468422]  __kasan_kmalloc+0xb7/0xc0
[   65.472176]  __kmalloc_cache_noprof+0x189/0x420
[   65.476709]  kasan_atomics+0x95/0x310
[   65.480415]  kunit_try_run_case+0x1a2/0x480
[   65.484604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.490005]  kthread+0x334/0x6f0
[   65.493237]  ret_from_fork+0x113/0x1d0
[   65.496990]  ret_from_fork_asm+0x1a/0x30
[   65.500916] 
[   65.502419] The buggy address belongs to the object at ffff8881066eaf00
[   65.502419]  which belongs to the cache kmalloc-64 of size 64
[   65.514757] The buggy address is located 0 bytes to the right of
[   65.514757]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   65.527618] 
[   65.529116] The buggy address belongs to the physical page:
[   65.534691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   65.542698] flags: 0x200000000000000(node=0|zone=2)
[   65.547577] page_type: f5(slab)
[   65.550724] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.558470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.566210] page dumped because: kasan: bad access detected
[   65.571783] 
[   65.573282] Memory state around the buggy address:
[   65.578076]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.585302]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   65.592523] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.599742]                                      ^
[   65.604534]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.611753]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.618973] ==================================================================
[   71.322980] ==================================================================
[   71.330218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   71.337613] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   71.345005] 
[   71.346505] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   71.346513] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   71.346515] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.346519] Call Trace:
[   71.346521]  <TASK>
[   71.346522]  dump_stack_lvl+0x73/0xb0
[   71.346527]  print_report+0xd1/0x650
[   71.346531]  ? __virt_addr_valid+0x1db/0x2d0
[   71.346535]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.346539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.346544]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.346548]  kasan_report+0x141/0x180
[   71.346552]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.346557]  kasan_check_range+0x10c/0x1c0
[   71.346562]  __kasan_check_write+0x18/0x20
[   71.346565]  kasan_atomics_helper+0x1eaa/0x5450
[   71.346570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.346574]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.346579]  ? kasan_atomics+0x152/0x310
[   71.346584]  kasan_atomics+0x1dc/0x310
[   71.346588]  ? __pfx_kasan_atomics+0x10/0x10
[   71.346593]  ? ktime_get_ts64+0x83/0x230
[   71.346597]  kunit_try_run_case+0x1a2/0x480
[   71.346602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.346607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.346611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.346615]  ? __kthread_parkme+0x82/0x180
[   71.346619]  ? preempt_count_sub+0x50/0x80
[   71.346623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.346628]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.346632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.346637]  kthread+0x334/0x6f0
[   71.346640]  ? trace_preempt_on+0x20/0xc0
[   71.346645]  ? __pfx_kthread+0x10/0x10
[   71.346648]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.346652]  ? calculate_sigpending+0x7b/0xa0
[   71.346657]  ? __pfx_kthread+0x10/0x10
[   71.346661]  ret_from_fork+0x113/0x1d0
[   71.346665]  ? __pfx_kthread+0x10/0x10
[   71.346669]  ret_from_fork_asm+0x1a/0x30
[   71.346675]  </TASK>
[   71.346676] 
[   71.485352] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[   71.491252] Allocated by task 306:
[   71.494484] rcu: \t3-....: (56 ticks this GP) idle=2e54/1/0x4000000000000000 softirq=321/321 fqs=5250
[   71.498489]  kasan_save_stack+0x45/0x70
[   71.502232] rcu: \t(detected by 2, t=21018 jiffies, g=-327, q=19 ncpus=4)
[   71.506583]  kasan_save_track+0x18/0x40
[   71.510934] Sending NMI from CPU 2 to CPUs 3:
[   71.510941] NMI backtrace for cpu 3
[   71.510944] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   71.510952] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   71.510955] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.510959] RIP: 0010:io_serial_out+0x6c/0xa0
[   71.510964] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 2f 1f 05 ff 8b
[   71.510972] RSP: 0000:ffff888106c5f510 EFLAGS: 00000006
[   71.510977] RAX: 0000000000000000 RBX: ffffffffaaaa07c0 RCX: 1ffffffff55540f9
[   71.510982] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffaaaa07c8
[   71.510986] RBP: ffff888106c5f520 R08: 0000000000000001 R09: ffffffffaa9fc480
[   71.510990] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000
[   71.510993] R13: ffffffffaaaa0a20 R14: ffffffffa9bd8ec0 R15: ffffffffaaaa07c0
[   71.510997] FS:  0000000000000000(0000) GS:ffff888474df4000(0000) knlGS:0000000000000000
[   71.511002] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   71.511006] CR2: 0000000000000000 CR3: 00000003a84bc001 CR4: 00000000003726f0
[   71.511010] DR0: ffffffffaaa50440 DR1: ffffffffaaa50441 DR2: ffffffffaaa50443
[   71.511013] DR3: ffffffffaaa50445 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[   71.511017] Call Trace:
[   71.511019]  <TASK>
[   71.511021]  serial8250_clear_IER+0x8c/0xb0
[   71.511026]  serial8250_console_write+0x1bd/0x1810
[   71.511032]  ? __pfx_serial8250_console_write+0x10/0x10
[   71.511038]  ? __kasan_check_write+0x18/0x20
[   71.511042]  ? _raw_spin_lock+0x8b/0xe0
[   71.511046]  ? __pfx__raw_spin_lock+0x10/0x10
[   71.511050]  univ8250_console_write+0x57/0x80
[   71.511055]  ? _raw_spin_unlock+0x41/0x70
[   71.511059]  console_flush_all+0x57b/0xc00
[   71.511064]  ? __pfx_console_flush_all+0x10/0x10
[   71.511068]  ? __pfx_vprintk_store+0x10/0x10
[   71.511073]  ? __kasan_check_read+0x15/0x20
[   71.511077]  console_unlock+0xf2/0x1f0
[   71.511080]  ? __pfx_console_unlock+0x10/0x10
[   71.511084]  ? __kasan_check_write+0x18/0x20
[   71.511088]  ? _raw_spin_lock+0x8b/0xe0
[   71.511093]  vprintk_emit+0x1e9/0x480
[   71.511097]  ? __pfx_vprintk_emit+0x10/0x10
[   71.511101]  ? vprintk_emit+0x169/0x480
[   71.511105]  vprintk_default+0x21/0x30
[   71.511109]  vprintk+0x12/0x20
[   71.511112]  _printk+0xc3/0xf0
[   71.511117]  ? __pfx__printk+0x10/0x10
[   71.511121]  ? vprintk+0x12/0x20
[   71.511125]  ? _printk+0xc3/0xf0
[   71.511129]  ? __pfx__printk+0x10/0x10
[   71.511133]  ? kasan_save_track+0x18/0x40
[   71.511137]  stack_trace_print+0x5d/0x90
[   71.511142]  stack_depot_print+0x48/0x50
[   71.511147]  print_report+0x61a/0x650
[   71.511151]  ? __virt_addr_valid+0x1db/0x2d0
[   71.511156]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.511160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.511165]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.511169]  kasan_report+0x141/0x180
[   71.511173]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.511178]  kasan_check_range+0x10c/0x1c0
[   71.511183]  __kasan_check_write+0x18/0x20
[   71.511186]  kasan_atomics_helper+0x1eaa/0x5450
[   71.511191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.511195]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.511200]  ? kasan_atomics+0x152/0x310
[   71.511205]  kasan_atomics+0x1dc/0x310
[   71.511209]  ? __pfx_kasan_atomics+0x10/0x10
[   71.511214]  ? ktime_get_ts64+0x83/0x230
[   71.511219]  kunit_try_run_case+0x1a2/0x480
[   71.511223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.511228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.511232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.511237]  ? __kthread_parkme+0x82/0x180
[   71.511240]  ? preempt_count_sub+0x50/0x80
[   71.511245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.511250]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.511254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.511258]  kthread+0x334/0x6f0
[   71.511262]  ? trace_preempt_on+0x20/0xc0
[   71.511267]  ? __pfx_kthread+0x10/0x10
[   71.511271]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.511274]  ? calculate_sigpending+0x7b/0xa0
[   71.511279]  ? __pfx_kthread+0x10/0x10
[   71.511283]  ret_from_fork+0x113/0x1d0
[   71.511287]  ? __pfx_kthread+0x10/0x10
[   71.511291]  ret_from_fork_asm+0x1a/0x30
[   71.511297]  </TASK>
[   71.963843]  kasan_save_alloc_info+0x3b/0x50
[   71.968126]  __kasan_kmalloc+0xb7/0xc0
[   71.971879]  __kmalloc_cache_noprof+0x189/0x420
[   71.976420]  kasan_atomics+0x95/0x310
[   71.980087]  kunit_try_run_case+0x1a2/0x480
[   71.984280]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.989680]  kthread+0x334/0x6f0
[   71.992912]  ret_from_fork+0x113/0x1d0
[   71.996666]  ret_from_fork_asm+0x1a/0x30
[   72.000602] 
[   72.002099] The buggy address belongs to the object at ffff8881066eaf00
[   72.002099]  which belongs to the cache kmalloc-64 of size 64
[   72.014442] The buggy address is located 0 bytes to the right of
[   72.014442]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   72.027311] 
[   72.028811] The buggy address belongs to the physical page:
[   72.034415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   72.042417] flags: 0x200000000000000(node=0|zone=2)
[   72.047295] page_type: f5(slab)
[   72.050444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.058191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.065929] page dumped because: kasan: bad access detected
[   72.071500] 
[   72.073002] Memory state around the buggy address:
[   72.077793]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.085013]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   72.092232] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.099453]                                      ^
[   72.104245]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.111464]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.118683] ==================================================================
[   58.432204] ==================================================================
[   58.439460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   58.446767] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   58.454169] 
[   58.455669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   58.455677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   58.455680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.455683] Call Trace:
[   58.455685]  <TASK>
[   58.455687]  dump_stack_lvl+0x73/0xb0
[   58.455691]  print_report+0xd1/0x650
[   58.455695]  ? __virt_addr_valid+0x1db/0x2d0
[   58.455700]  ? kasan_atomics_helper+0xd47/0x5450
[   58.455704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.455709]  ? kasan_atomics_helper+0xd47/0x5450
[   58.455713]  kasan_report+0x141/0x180
[   58.455717]  ? kasan_atomics_helper+0xd47/0x5450
[   58.455722]  kasan_check_range+0x10c/0x1c0
[   58.455727]  __kasan_check_write+0x18/0x20
[   58.455730]  kasan_atomics_helper+0xd47/0x5450
[   58.455734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.455739]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.455744]  ? kasan_atomics+0x152/0x310
[   58.455749]  kasan_atomics+0x1dc/0x310
[   58.455753]  ? __pfx_kasan_atomics+0x10/0x10
[   58.455758]  ? ktime_get_ts64+0x83/0x230
[   58.455762]  kunit_try_run_case+0x1a2/0x480
[   58.455767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.455772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.455776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.455780]  ? __kthread_parkme+0x82/0x180
[   58.455784]  ? preempt_count_sub+0x50/0x80
[   58.455789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.455793]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.455798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.455802]  kthread+0x334/0x6f0
[   58.455806]  ? trace_preempt_on+0x20/0xc0
[   58.455810]  ? __pfx_kthread+0x10/0x10
[   58.455814]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.455818]  ? calculate_sigpending+0x7b/0xa0
[   58.455823]  ? __pfx_kthread+0x10/0x10
[   58.455827]  ret_from_fork+0x113/0x1d0
[   58.455830]  ? __pfx_kthread+0x10/0x10
[   58.455834]  ret_from_fork_asm+0x1a/0x30
[   58.455840]  </TASK>
[   58.455842] 
[   58.638445] Allocated by task 306:
[   58.641853]  kasan_save_stack+0x45/0x70
[   58.645693]  kasan_save_track+0x18/0x40
[   58.649530]  kasan_save_alloc_info+0x3b/0x50
[   58.653803]  __kasan_kmalloc+0xb7/0xc0
[   58.657556]  __kmalloc_cache_noprof+0x189/0x420
[   58.662088]  kasan_atomics+0x95/0x310
[   58.665754]  kunit_try_run_case+0x1a2/0x480
[   58.669940]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.675362]  kthread+0x334/0x6f0
[   58.678616]  ret_from_fork+0x113/0x1d0
[   58.682416]  ret_from_fork_asm+0x1a/0x30
[   58.686361] 
[   58.687907] The buggy address belongs to the object at ffff8881066eaf00
[   58.687907]  which belongs to the cache kmalloc-64 of size 64
[   58.700247] The buggy address is located 0 bytes to the right of
[   58.700247]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   58.713111] 
[   58.714609] The buggy address belongs to the physical page:
[   58.720183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   58.728188] flags: 0x200000000000000(node=0|zone=2)
[   58.733070] page_type: f5(slab)
[   58.736216] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.743964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.751709] page dumped because: kasan: bad access detected
[   58.757285] 
[   58.758781] Memory state around the buggy address:
[   58.763575]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.770797]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   58.778023] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.785241]                                      ^
[   58.790035]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.797254]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.804475] ==================================================================
[   64.869435] ==================================================================
[   64.876686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   64.884086] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   64.891479] 
[   64.892981] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   64.892989] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   64.892992] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.892995] Call Trace:
[   64.892997]  <TASK>
[   64.892998]  dump_stack_lvl+0x73/0xb0
[   64.893003]  print_report+0xd1/0x650
[   64.893007]  ? __virt_addr_valid+0x1db/0x2d0
[   64.893011]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.893015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.893021]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.893024]  kasan_report+0x141/0x180
[   64.893029]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.893034]  __asan_report_store8_noabort+0x1b/0x30
[   64.893039]  kasan_atomics_helper+0x50d4/0x5450
[   64.893043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.893047]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.893052]  ? kasan_atomics+0x152/0x310
[   64.893057]  kasan_atomics+0x1dc/0x310
[   64.893062]  ? __pfx_kasan_atomics+0x10/0x10
[   64.893066]  ? ktime_get_ts64+0x83/0x230
[   64.893071]  kunit_try_run_case+0x1a2/0x480
[   64.893075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.893080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.893084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.893089]  ? __kthread_parkme+0x82/0x180
[   64.893093]  ? preempt_count_sub+0x50/0x80
[   64.893097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.893102]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.893106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.893110]  kthread+0x334/0x6f0
[   64.893114]  ? trace_preempt_on+0x20/0xc0
[   64.893118]  ? __pfx_kthread+0x10/0x10
[   64.893122]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.893126]  ? calculate_sigpending+0x7b/0xa0
[   64.893131]  ? __pfx_kthread+0x10/0x10
[   64.893135]  ret_from_fork+0x113/0x1d0
[   64.893139]  ? __pfx_kthread+0x10/0x10
[   64.893143]  ret_from_fork_asm+0x1a/0x30
[   64.893149]  </TASK>
[   64.893150] 
[   65.072925] Allocated by task 306:
[   65.076360]  kasan_save_stack+0x45/0x70
[   65.080247]  kasan_save_track+0x18/0x40
[   65.084086]  kasan_save_alloc_info+0x3b/0x50
[   65.088361]  __kasan_kmalloc+0xb7/0xc0
[   65.092154]  __kmalloc_cache_noprof+0x189/0x420
[   65.096688]  kasan_atomics+0x95/0x310
[   65.100361]  kunit_try_run_case+0x1a2/0x480
[   65.104590]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.109991]  kthread+0x334/0x6f0
[   65.113232]  ret_from_fork+0x113/0x1d0
[   65.116985]  ret_from_fork_asm+0x1a/0x30
[   65.120919] 
[   65.122425] The buggy address belongs to the object at ffff8881066eaf00
[   65.122425]  which belongs to the cache kmalloc-64 of size 64
[   65.134760] The buggy address is located 0 bytes to the right of
[   65.134760]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   65.147620] 
[   65.149120] The buggy address belongs to the physical page:
[   65.154694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   65.162702] flags: 0x200000000000000(node=0|zone=2)
[   65.167590] page_type: f5(slab)
[   65.170737] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.178482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.186221] page dumped because: kasan: bad access detected
[   65.191794] 
[   65.193295] Memory state around the buggy address:
[   65.198088]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.205315]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   65.212569] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.219788]                                      ^
[   65.224581]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.231801]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.239027] ==================================================================
[   53.500938] ==================================================================
[   53.508186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   53.515500] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   53.522901] 
[   53.524419] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   53.524427] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   53.524430] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.524433] Call Trace:
[   53.524435]  <TASK>
[   53.524437]  dump_stack_lvl+0x73/0xb0
[   53.524441]  print_report+0xd1/0x650
[   53.524445]  ? __virt_addr_valid+0x1db/0x2d0
[   53.524449]  ? kasan_atomics_helper+0x565/0x5450
[   53.524453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.524459]  ? kasan_atomics_helper+0x565/0x5450
[   53.524463]  kasan_report+0x141/0x180
[   53.524467]  ? kasan_atomics_helper+0x565/0x5450
[   53.524472]  kasan_check_range+0x10c/0x1c0
[   53.524477]  __kasan_check_write+0x18/0x20
[   53.524480]  kasan_atomics_helper+0x565/0x5450
[   53.524484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.524489]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.524494]  ? kasan_atomics+0x152/0x310
[   53.524499]  kasan_atomics+0x1dc/0x310
[   53.524503]  ? __pfx_kasan_atomics+0x10/0x10
[   53.524508]  ? ktime_get_ts64+0x83/0x230
[   53.524513]  kunit_try_run_case+0x1a2/0x480
[   53.524517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.524522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.524526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.524531]  ? __kthread_parkme+0x82/0x180
[   53.524535]  ? preempt_count_sub+0x50/0x80
[   53.524539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.524544]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.524548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.524553]  kthread+0x334/0x6f0
[   53.524556]  ? trace_preempt_on+0x20/0xc0
[   53.524561]  ? __pfx_kthread+0x10/0x10
[   53.524565]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.524569]  ? calculate_sigpending+0x7b/0xa0
[   53.524573]  ? __pfx_kthread+0x10/0x10
[   53.524578]  ret_from_fork+0x113/0x1d0
[   53.524581]  ? __pfx_kthread+0x10/0x10
[   53.524585]  ret_from_fork_asm+0x1a/0x30
[   53.524591]  </TASK>
[   53.524593] 
[   53.707299] Allocated by task 306:
[   53.710707]  kasan_save_stack+0x45/0x70
[   53.714545]  kasan_save_track+0x18/0x40
[   53.718424]  kasan_save_alloc_info+0x3b/0x50
[   53.722701]  __kasan_kmalloc+0xb7/0xc0
[   53.726452]  __kmalloc_cache_noprof+0x189/0x420
[   53.730986]  kasan_atomics+0x95/0x310
[   53.734652]  kunit_try_run_case+0x1a2/0x480
[   53.738839]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.744247]  kthread+0x334/0x6f0
[   53.747478]  ret_from_fork+0x113/0x1d0
[   53.751231]  ret_from_fork_asm+0x1a/0x30
[   53.755157] 
[   53.756657] The buggy address belongs to the object at ffff8881066eaf00
[   53.756657]  which belongs to the cache kmalloc-64 of size 64
[   53.768997] The buggy address is located 0 bytes to the right of
[   53.768997]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   53.781860] 
[   53.783375] The buggy address belongs to the physical page:
[   53.788956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   53.796957] flags: 0x200000000000000(node=0|zone=2)
[   53.801837] page_type: f5(slab)
[   53.804982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.812721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.820462] page dumped because: kasan: bad access detected
[   53.826034] 
[   53.827533] Memory state around the buggy address:
[   53.832346]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.839580]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   53.846797] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.854019]                                      ^
[   53.858812]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.866037]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.873257] ==================================================================
[   72.882688] ==================================================================
[   72.889934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   72.897349] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   72.904797] 
[   72.906298] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   72.906306] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   72.906309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.906313] Call Trace:
[   72.906315]  <TASK>
[   72.906317]  dump_stack_lvl+0x73/0xb0
[   72.906321]  print_report+0xd1/0x650
[   72.906325]  ? __virt_addr_valid+0x1db/0x2d0
[   72.906349]  ? kasan_atomics_helper+0x2006/0x5450
[   72.906353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.906359]  ? kasan_atomics_helper+0x2006/0x5450
[   72.906376]  kasan_report+0x141/0x180
[   72.906381]  ? kasan_atomics_helper+0x2006/0x5450
[   72.906398]  kasan_check_range+0x10c/0x1c0
[   72.906402]  __kasan_check_write+0x18/0x20
[   72.906406]  kasan_atomics_helper+0x2006/0x5450
[   72.906410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.906414]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.906419]  ? kasan_atomics+0x152/0x310
[   72.906424]  kasan_atomics+0x1dc/0x310
[   72.906429]  ? __pfx_kasan_atomics+0x10/0x10
[   72.906434]  ? ktime_get_ts64+0x83/0x230
[   72.906438]  kunit_try_run_case+0x1a2/0x480
[   72.906443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.906447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.906452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.906456]  ? __kthread_parkme+0x82/0x180
[   72.906460]  ? preempt_count_sub+0x50/0x80
[   72.906464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.906469]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.906473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.906478]  kthread+0x334/0x6f0
[   72.906481]  ? trace_preempt_on+0x20/0xc0
[   72.906486]  ? __pfx_kthread+0x10/0x10
[   72.906490]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.906493]  ? calculate_sigpending+0x7b/0xa0
[   72.906498]  ? __pfx_kthread+0x10/0x10
[   72.906502]  ret_from_fork+0x113/0x1d0
[   72.906506]  ? __pfx_kthread+0x10/0x10
[   72.906510]  ret_from_fork_asm+0x1a/0x30
[   72.906515]  </TASK>
[   72.906517] 
[   73.089761] Allocated by task 306:
[   73.093166]  kasan_save_stack+0x45/0x70
[   73.097008]  kasan_save_track+0x18/0x40
[   73.100845]  kasan_save_alloc_info+0x3b/0x50
[   73.105118]  __kasan_kmalloc+0xb7/0xc0
[   73.108871]  __kmalloc_cache_noprof+0x189/0x420
[   73.113421]  kasan_atomics+0x95/0x310
[   73.117088]  kunit_try_run_case+0x1a2/0x480
[   73.121283]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.126682]  kthread+0x334/0x6f0
[   73.129915]  ret_from_fork+0x113/0x1d0
[   73.133665]  ret_from_fork_asm+0x1a/0x30
[   73.137594] 
[   73.139092] The buggy address belongs to the object at ffff8881066eaf00
[   73.139092]  which belongs to the cache kmalloc-64 of size 64
[   73.151434] The buggy address is located 0 bytes to the right of
[   73.151434]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   73.164296] 
[   73.165794] The buggy address belongs to the physical page:
[   73.171365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   73.179428] flags: 0x200000000000000(node=0|zone=2)
[   73.184314] page_type: f5(slab)
[   73.187497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.195243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.202982] page dumped because: kasan: bad access detected
[   73.208553] 
[   73.210054] Memory state around the buggy address:
[   73.214848]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.222067]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.229287] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.236512]                                      ^
[   73.241306]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.248526]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.255752] ==================================================================
[   75.152701] ==================================================================
[   75.159941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   75.167362] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   75.174778] 
[   75.176279] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   75.176287] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   75.176290] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.176293] Call Trace:
[   75.176295]  <TASK>
[   75.176297]  dump_stack_lvl+0x73/0xb0
[   75.176301]  print_report+0xd1/0x650
[   75.176305]  ? __virt_addr_valid+0x1db/0x2d0
[   75.176309]  ? kasan_atomics_helper+0x224c/0x5450
[   75.176313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.176319]  ? kasan_atomics_helper+0x224c/0x5450
[   75.176323]  kasan_report+0x141/0x180
[   75.176347]  ? kasan_atomics_helper+0x224c/0x5450
[   75.176352]  kasan_check_range+0x10c/0x1c0
[   75.176357]  __kasan_check_write+0x18/0x20
[   75.176361]  kasan_atomics_helper+0x224c/0x5450
[   75.176378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   75.176382]  ? __kmalloc_cache_noprof+0x189/0x420
[   75.176400]  ? kasan_atomics+0x152/0x310
[   75.176405]  kasan_atomics+0x1dc/0x310
[   75.176409]  ? __pfx_kasan_atomics+0x10/0x10
[   75.176414]  ? ktime_get_ts64+0x83/0x230
[   75.176419]  kunit_try_run_case+0x1a2/0x480
[   75.176423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.176428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.176432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.176437]  ? __kthread_parkme+0x82/0x180
[   75.176441]  ? preempt_count_sub+0x50/0x80
[   75.176445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.176450]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.176454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.176458]  kthread+0x334/0x6f0
[   75.176462]  ? trace_preempt_on+0x20/0xc0
[   75.176466]  ? __pfx_kthread+0x10/0x10
[   75.176470]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.176474]  ? calculate_sigpending+0x7b/0xa0
[   75.176479]  ? __pfx_kthread+0x10/0x10
[   75.176483]  ret_from_fork+0x113/0x1d0
[   75.176486]  ? __pfx_kthread+0x10/0x10
[   75.176490]  ret_from_fork_asm+0x1a/0x30
[   75.176496]  </TASK>
[   75.176498] 
[   75.359613] Allocated by task 306:
[   75.363018]  kasan_save_stack+0x45/0x70
[   75.366857]  kasan_save_track+0x18/0x40
[   75.370698]  kasan_save_alloc_info+0x3b/0x50
[   75.374977]  __kasan_kmalloc+0xb7/0xc0
[   75.378729]  __kmalloc_cache_noprof+0x189/0x420
[   75.383264]  kasan_atomics+0x95/0x310
[   75.386928]  kunit_try_run_case+0x1a2/0x480
[   75.391115]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.396514]  kthread+0x334/0x6f0
[   75.399747]  ret_from_fork+0x113/0x1d0
[   75.403501]  ret_from_fork_asm+0x1a/0x30
[   75.407435] 
[   75.408934] The buggy address belongs to the object at ffff8881066eaf00
[   75.408934]  which belongs to the cache kmalloc-64 of size 64
[   75.421273] The buggy address is located 0 bytes to the right of
[   75.421273]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   75.434137] 
[   75.435636] The buggy address belongs to the physical page:
[   75.441209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   75.449217] flags: 0x200000000000000(node=0|zone=2)
[   75.454096] page_type: f5(slab)
[   75.457243] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.464989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.472730] page dumped because: kasan: bad access detected
[   75.478302] 
[   75.479801] Memory state around the buggy address:
[   75.484592]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.491813]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.499031] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.506252]                                      ^
[   75.511043]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.518263]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.525481] ==================================================================
[   75.532707] ==================================================================
[   75.539947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   75.547362] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   75.554715] 
[   75.556215] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   75.556223] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   75.556225] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.556229] Call Trace:
[   75.556231]  <TASK>
[   75.556232]  dump_stack_lvl+0x73/0xb0
[   75.556237]  print_report+0xd1/0x650
[   75.556241]  ? __virt_addr_valid+0x1db/0x2d0
[   75.556245]  ? kasan_atomics_helper+0x5115/0x5450
[   75.556249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.556254]  ? kasan_atomics_helper+0x5115/0x5450
[   75.556258]  kasan_report+0x141/0x180
[   75.556263]  ? kasan_atomics_helper+0x5115/0x5450
[   75.556268]  __asan_report_load8_noabort+0x18/0x20
[   75.556273]  kasan_atomics_helper+0x5115/0x5450
[   75.556277]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   75.556281]  ? __kmalloc_cache_noprof+0x189/0x420
[   75.556286]  ? kasan_atomics+0x152/0x310
[   75.556291]  kasan_atomics+0x1dc/0x310
[   75.556296]  ? __pfx_kasan_atomics+0x10/0x10
[   75.556300]  ? ktime_get_ts64+0x83/0x230
[   75.556305]  kunit_try_run_case+0x1a2/0x480
[   75.556310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.556314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.556319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.556323]  ? __kthread_parkme+0x82/0x180
[   75.556327]  ? preempt_count_sub+0x50/0x80
[   75.556351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.556356]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.556360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.556377]  kthread+0x334/0x6f0
[   75.556381]  ? trace_preempt_on+0x20/0xc0
[   75.556386]  ? __pfx_kthread+0x10/0x10
[   75.556402]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.556406]  ? calculate_sigpending+0x7b/0xa0
[   75.556411]  ? __pfx_kthread+0x10/0x10
[   75.556415]  ret_from_fork+0x113/0x1d0
[   75.556418]  ? __pfx_kthread+0x10/0x10
[   75.556422]  ret_from_fork_asm+0x1a/0x30
[   75.556428]  </TASK>
[   75.556430] 
[   75.736090] Allocated by task 306:
[   75.739495]  kasan_save_stack+0x45/0x70
[   75.743364]  kasan_save_track+0x18/0x40
[   75.747226]  kasan_save_alloc_info+0x3b/0x50
[   75.751497]  __kasan_kmalloc+0xb7/0xc0
[   75.755252]  __kmalloc_cache_noprof+0x189/0x420
[   75.759794]  kasan_atomics+0x95/0x310
[   75.763469]  kunit_try_run_case+0x1a2/0x480
[   75.767661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.773061]  kthread+0x334/0x6f0
[   75.776293]  ret_from_fork+0x113/0x1d0
[   75.780048]  ret_from_fork_asm+0x1a/0x30
[   75.783981] 
[   75.785480] The buggy address belongs to the object at ffff8881066eaf00
[   75.785480]  which belongs to the cache kmalloc-64 of size 64
[   75.797813] The buggy address is located 0 bytes to the right of
[   75.797813]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   75.810676] 
[   75.812175] The buggy address belongs to the physical page:
[   75.817747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   75.825746] flags: 0x200000000000000(node=0|zone=2)
[   75.830626] page_type: f5(slab)
[   75.833774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.841521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.849268] page dumped because: kasan: bad access detected
[   75.854841] 
[   75.856364] Memory state around the buggy address:
[   75.861201]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.868420]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.875640] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.882859]                                      ^
[   75.887653]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.894872]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.902092] ==================================================================
[   59.191352] ==================================================================
[   59.198605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   59.205912] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   59.213311] 
[   59.214814] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   59.214822] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   59.214825] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.214828] Call Trace:
[   59.214830]  <TASK>
[   59.214832]  dump_stack_lvl+0x73/0xb0
[   59.214837]  print_report+0xd1/0x650
[   59.214841]  ? __virt_addr_valid+0x1db/0x2d0
[   59.214845]  ? kasan_atomics_helper+0xe78/0x5450
[   59.214849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.214854]  ? kasan_atomics_helper+0xe78/0x5450
[   59.214858]  kasan_report+0x141/0x180
[   59.214863]  ? kasan_atomics_helper+0xe78/0x5450
[   59.214867]  kasan_check_range+0x10c/0x1c0
[   59.214872]  __kasan_check_write+0x18/0x20
[   59.214876]  kasan_atomics_helper+0xe78/0x5450
[   59.214880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.214884]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.214889]  ? kasan_atomics+0x152/0x310
[   59.214894]  kasan_atomics+0x1dc/0x310
[   59.214899]  ? __pfx_kasan_atomics+0x10/0x10
[   59.214904]  ? ktime_get_ts64+0x83/0x230
[   59.214908]  kunit_try_run_case+0x1a2/0x480
[   59.214913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.214917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.214921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.214926]  ? __kthread_parkme+0x82/0x180
[   59.214930]  ? preempt_count_sub+0x50/0x80
[   59.214934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.214939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.214943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.214947]  kthread+0x334/0x6f0
[   59.214951]  ? trace_preempt_on+0x20/0xc0
[   59.214955]  ? __pfx_kthread+0x10/0x10
[   59.214959]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.214963]  ? calculate_sigpending+0x7b/0xa0
[   59.214968]  ? __pfx_kthread+0x10/0x10
[   59.214972]  ret_from_fork+0x113/0x1d0
[   59.214975]  ? __pfx_kthread+0x10/0x10
[   59.214979]  ret_from_fork_asm+0x1a/0x30
[   59.214985]  </TASK>
[   59.214987] 
[   59.397774] Allocated by task 306:
[   59.401180]  kasan_save_stack+0x45/0x70
[   59.405017]  kasan_save_track+0x18/0x40
[   59.408859]  kasan_save_alloc_info+0x3b/0x50
[   59.413139]  __kasan_kmalloc+0xb7/0xc0
[   59.416892]  __kmalloc_cache_noprof+0x189/0x420
[   59.421431]  kasan_atomics+0x95/0x310
[   59.425100]  kunit_try_run_case+0x1a2/0x480
[   59.429293]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.434694]  kthread+0x334/0x6f0
[   59.437934]  ret_from_fork+0x113/0x1d0
[   59.441686]  ret_from_fork_asm+0x1a/0x30
[   59.445612] 
[   59.447112] The buggy address belongs to the object at ffff8881066eaf00
[   59.447112]  which belongs to the cache kmalloc-64 of size 64
[   59.459455] The buggy address is located 0 bytes to the right of
[   59.459455]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   59.472315] 
[   59.473849] The buggy address belongs to the physical page:
[   59.479432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   59.487437] flags: 0x200000000000000(node=0|zone=2)
[   59.492318] page_type: f5(slab)
[   59.495499] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.503238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.510978] page dumped because: kasan: bad access detected
[   59.516549] 
[   59.518050] Memory state around the buggy address:
[   59.522843]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.530068]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   59.537290] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.544516]                                      ^
[   59.549310]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.556530]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.563756] ==================================================================
[   63.732930] ==================================================================
[   63.740170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   63.747563] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   63.754878] 
[   63.756417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   63.756425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   63.756428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.756431] Call Trace:
[   63.756433]  <TASK>
[   63.756435]  dump_stack_lvl+0x73/0xb0
[   63.756439]  print_report+0xd1/0x650
[   63.756443]  ? __virt_addr_valid+0x1db/0x2d0
[   63.756447]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.756451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.756456]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.756460]  kasan_report+0x141/0x180
[   63.756465]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.756470]  kasan_check_range+0x10c/0x1c0
[   63.756474]  __kasan_check_read+0x15/0x20
[   63.756478]  kasan_atomics_helper+0x13b5/0x5450
[   63.756482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.756486]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.756491]  ? kasan_atomics+0x152/0x310
[   63.756496]  kasan_atomics+0x1dc/0x310
[   63.756500]  ? __pfx_kasan_atomics+0x10/0x10
[   63.756505]  ? ktime_get_ts64+0x83/0x230
[   63.756510]  kunit_try_run_case+0x1a2/0x480
[   63.756514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.756519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.756523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.756528]  ? __kthread_parkme+0x82/0x180
[   63.756531]  ? preempt_count_sub+0x50/0x80
[   63.756536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.756540]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.756545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.756549]  kthread+0x334/0x6f0
[   63.756553]  ? trace_preempt_on+0x20/0xc0
[   63.756557]  ? __pfx_kthread+0x10/0x10
[   63.756561]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.756565]  ? calculate_sigpending+0x7b/0xa0
[   63.756570]  ? __pfx_kthread+0x10/0x10
[   63.756574]  ret_from_fork+0x113/0x1d0
[   63.756577]  ? __pfx_kthread+0x10/0x10
[   63.756581]  ret_from_fork_asm+0x1a/0x30
[   63.756587]  </TASK>
[   63.756589] 
[   63.939598] Allocated by task 306:
[   63.943002]  kasan_save_stack+0x45/0x70
[   63.946843]  kasan_save_track+0x18/0x40
[   63.950682]  kasan_save_alloc_info+0x3b/0x50
[   63.954964]  __kasan_kmalloc+0xb7/0xc0
[   63.958716]  __kmalloc_cache_noprof+0x189/0x420
[   63.963249]  kasan_atomics+0x95/0x310
[   63.966915]  kunit_try_run_case+0x1a2/0x480
[   63.971109]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.976508]  kthread+0x334/0x6f0
[   63.979740]  ret_from_fork+0x113/0x1d0
[   63.983495]  ret_from_fork_asm+0x1a/0x30
[   63.987431] 
[   63.988936] The buggy address belongs to the object at ffff8881066eaf00
[   63.988936]  which belongs to the cache kmalloc-64 of size 64
[   64.001270] The buggy address is located 0 bytes to the right of
[   64.001270]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   64.014137] 
[   64.015639] The buggy address belongs to the physical page:
[   64.021211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   64.029220] flags: 0x200000000000000(node=0|zone=2)
[   64.034106] page_type: f5(slab)
[   64.037255] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.045002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.052748] page dumped because: kasan: bad access detected
[   64.058323] 
[   64.059854] Memory state around the buggy address:
[   64.064649]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.071869]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   64.079095] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.086313]                                      ^
[   64.091143]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.098365]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.105632] ==================================================================
[   51.988532] ==================================================================
[   51.995771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   52.003078] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   52.010417] 
[   52.011919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   52.011927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   52.011930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.011934] Call Trace:
[   52.011935]  <TASK>
[   52.011937]  dump_stack_lvl+0x73/0xb0
[   52.011942]  print_report+0xd1/0x650
[   52.011946]  ? __virt_addr_valid+0x1db/0x2d0
[   52.011950]  ? kasan_atomics_helper+0x3df/0x5450
[   52.011954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.011959]  ? kasan_atomics_helper+0x3df/0x5450
[   52.011963]  kasan_report+0x141/0x180
[   52.011967]  ? kasan_atomics_helper+0x3df/0x5450
[   52.011972]  kasan_check_range+0x10c/0x1c0
[   52.011977]  __kasan_check_read+0x15/0x20
[   52.011980]  kasan_atomics_helper+0x3df/0x5450
[   52.011985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.011989]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.011994]  ? kasan_atomics+0x152/0x310
[   52.011999]  kasan_atomics+0x1dc/0x310
[   52.012003]  ? __pfx_kasan_atomics+0x10/0x10
[   52.012008]  ? ktime_get_ts64+0x83/0x230
[   52.012013]  kunit_try_run_case+0x1a2/0x480
[   52.012017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.012022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.012026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.012030]  ? __kthread_parkme+0x82/0x180
[   52.012034]  ? preempt_count_sub+0x50/0x80
[   52.012038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.012043]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.012048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.012052]  kthread+0x334/0x6f0
[   52.012056]  ? trace_preempt_on+0x20/0xc0
[   52.012060]  ? __pfx_kthread+0x10/0x10
[   52.012064]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.012068]  ? calculate_sigpending+0x7b/0xa0
[   52.012072]  ? __pfx_kthread+0x10/0x10
[   52.012076]  ret_from_fork+0x113/0x1d0
[   52.012080]  ? __pfx_kthread+0x10/0x10
[   52.012084]  ret_from_fork_asm+0x1a/0x30
[   52.012090]  </TASK>
[   52.012092] 
[   52.194775] Allocated by task 306:
[   52.198180]  kasan_save_stack+0x45/0x70
[   52.202019]  kasan_save_track+0x18/0x40
[   52.205859]  kasan_save_alloc_info+0x3b/0x50
[   52.210133]  __kasan_kmalloc+0xb7/0xc0
[   52.213883]  __kmalloc_cache_noprof+0x189/0x420
[   52.218419]  kasan_atomics+0x95/0x310
[   52.222092]  kunit_try_run_case+0x1a2/0x480
[   52.226278]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.231676]  kthread+0x334/0x6f0
[   52.234909]  ret_from_fork+0x113/0x1d0
[   52.238661]  ret_from_fork_asm+0x1a/0x30
[   52.242589] 
[   52.244089] The buggy address belongs to the object at ffff8881066eaf00
[   52.244089]  which belongs to the cache kmalloc-64 of size 64
[   52.256428] The buggy address is located 0 bytes to the right of
[   52.256428]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   52.269291] 
[   52.270788] The buggy address belongs to the physical page:
[   52.276376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   52.284418] flags: 0x200000000000000(node=0|zone=2)
[   52.289302] page_type: f5(slab)
[   52.292450] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.300196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.307933] page dumped because: kasan: bad access detected
[   52.313508] 
[   52.315008] Memory state around the buggy address:
[   52.319800]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.327018]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   52.334238] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.341457]                                      ^
[   52.346249]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.353469]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.360689] ==================================================================
[   62.599915] ==================================================================
[   62.607155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   62.614546] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   62.621855] 
[   62.623376] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   62.623384] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   62.623387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.623391] Call Trace:
[   62.623393]  <TASK>
[   62.623395]  dump_stack_lvl+0x73/0xb0
[   62.623412]  print_report+0xd1/0x650
[   62.623416]  ? __virt_addr_valid+0x1db/0x2d0
[   62.623420]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.623424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.623429]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.623433]  kasan_report+0x141/0x180
[   62.623437]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.623442]  __asan_report_load4_noabort+0x18/0x20
[   62.623447]  kasan_atomics_helper+0x49e8/0x5450
[   62.623451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.623455]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.623460]  ? kasan_atomics+0x152/0x310
[   62.623465]  kasan_atomics+0x1dc/0x310
[   62.623469]  ? __pfx_kasan_atomics+0x10/0x10
[   62.623474]  ? ktime_get_ts64+0x83/0x230
[   62.623479]  kunit_try_run_case+0x1a2/0x480
[   62.623483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.623488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.623492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.623497]  ? __kthread_parkme+0x82/0x180
[   62.623500]  ? preempt_count_sub+0x50/0x80
[   62.623505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.623509]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.623514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.623518]  kthread+0x334/0x6f0
[   62.623522]  ? trace_preempt_on+0x20/0xc0
[   62.623526]  ? __pfx_kthread+0x10/0x10
[   62.623530]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.623534]  ? calculate_sigpending+0x7b/0xa0
[   62.623539]  ? __pfx_kthread+0x10/0x10
[   62.623543]  ret_from_fork+0x113/0x1d0
[   62.623547]  ? __pfx_kthread+0x10/0x10
[   62.623551]  ret_from_fork_asm+0x1a/0x30
[   62.623557]  </TASK>
[   62.623558] 
[   62.803263] Allocated by task 306:
[   62.806669]  kasan_save_stack+0x45/0x70
[   62.810507]  kasan_save_track+0x18/0x40
[   62.814362]  kasan_save_alloc_info+0x3b/0x50
[   62.818682]  __kasan_kmalloc+0xb7/0xc0
[   62.822434]  __kmalloc_cache_noprof+0x189/0x420
[   62.826966]  kasan_atomics+0x95/0x310
[   62.830632]  kunit_try_run_case+0x1a2/0x480
[   62.834819]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.840217]  kthread+0x334/0x6f0
[   62.843449]  ret_from_fork+0x113/0x1d0
[   62.847203]  ret_from_fork_asm+0x1a/0x30
[   62.851129] 
[   62.852630] The buggy address belongs to the object at ffff8881066eaf00
[   62.852630]  which belongs to the cache kmalloc-64 of size 64
[   62.864969] The buggy address is located 0 bytes to the right of
[   62.864969]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   62.877831] 
[   62.879361] The buggy address belongs to the physical page:
[   62.884957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   62.892963] flags: 0x200000000000000(node=0|zone=2)
[   62.897844] page_type: f5(slab)
[   62.900988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.908728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.916469] page dumped because: kasan: bad access detected
[   62.922041] 
[   62.923538] Memory state around the buggy address:
[   62.928363]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.935631]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   62.942847] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.950069]                                      ^
[   62.954860]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.962080]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.969307] ==================================================================
[   74.776191] ==================================================================
[   74.783437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   74.790837] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   74.798145] 
[   74.799645] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   74.799653] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   74.799656] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.799659] Call Trace:
[   74.799661]  <TASK>
[   74.799663]  dump_stack_lvl+0x73/0xb0
[   74.799667]  print_report+0xd1/0x650
[   74.799671]  ? __virt_addr_valid+0x1db/0x2d0
[   74.799675]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.799679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.799685]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.799689]  kasan_report+0x141/0x180
[   74.799693]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.799698]  __asan_report_load8_noabort+0x18/0x20
[   74.799703]  kasan_atomics_helper+0x4fa5/0x5450
[   74.799707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.799712]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.799717]  ? kasan_atomics+0x152/0x310
[   74.799722]  kasan_atomics+0x1dc/0x310
[   74.799726]  ? __pfx_kasan_atomics+0x10/0x10
[   74.799731]  ? ktime_get_ts64+0x83/0x230
[   74.799735]  kunit_try_run_case+0x1a2/0x480
[   74.799740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.799745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.799749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.799754]  ? __kthread_parkme+0x82/0x180
[   74.799757]  ? preempt_count_sub+0x50/0x80
[   74.799762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.799766]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.799771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.799775]  kthread+0x334/0x6f0
[   74.799779]  ? trace_preempt_on+0x20/0xc0
[   74.799783]  ? __pfx_kthread+0x10/0x10
[   74.799787]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.799791]  ? calculate_sigpending+0x7b/0xa0
[   74.799795]  ? __pfx_kthread+0x10/0x10
[   74.799800]  ret_from_fork+0x113/0x1d0
[   74.799803]  ? __pfx_kthread+0x10/0x10
[   74.799807]  ret_from_fork_asm+0x1a/0x30
[   74.799813]  </TASK>
[   74.799815] 
[   74.979469] Allocated by task 306:
[   74.982875]  kasan_save_stack+0x45/0x70
[   74.986721]  kasan_save_track+0x18/0x40
[   74.990559]  kasan_save_alloc_info+0x3b/0x50
[   74.994835]  __kasan_kmalloc+0xb7/0xc0
[   74.998586]  __kmalloc_cache_noprof+0x189/0x420
[   75.003118]  kasan_atomics+0x95/0x310
[   75.006786]  kunit_try_run_case+0x1a2/0x480
[   75.010980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.016413]  kthread+0x334/0x6f0
[   75.019646]  ret_from_fork+0x113/0x1d0
[   75.023414]  ret_from_fork_asm+0x1a/0x30
[   75.027363] 
[   75.028909] The buggy address belongs to the object at ffff8881066eaf00
[   75.028909]  which belongs to the cache kmalloc-64 of size 64
[   75.041242] The buggy address is located 0 bytes to the right of
[   75.041242]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   75.054104] 
[   75.055604] The buggy address belongs to the physical page:
[   75.061176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   75.069184] flags: 0x200000000000000(node=0|zone=2)
[   75.074065] page_type: f5(slab)
[   75.077212] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.084959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.092706] page dumped because: kasan: bad access detected
[   75.098279] 
[   75.099778] Memory state around the buggy address:
[   75.104571]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.111790]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.119017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.126236]                                      ^
[   75.131028]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.138250]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.145477] ==================================================================
[   60.330093] ==================================================================
[   60.337365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   60.344810] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   60.352117] 
[   60.353617] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   60.353625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   60.353628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.353631] Call Trace:
[   60.353633]  <TASK>
[   60.353635]  dump_stack_lvl+0x73/0xb0
[   60.353639]  print_report+0xd1/0x650
[   60.353643]  ? __virt_addr_valid+0x1db/0x2d0
[   60.353647]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.353651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.353657]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.353661]  kasan_report+0x141/0x180
[   60.353665]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.353670]  __asan_report_load4_noabort+0x18/0x20
[   60.353675]  kasan_atomics_helper+0x4a36/0x5450
[   60.353679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.353683]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.353688]  ? kasan_atomics+0x152/0x310
[   60.353693]  kasan_atomics+0x1dc/0x310
[   60.353697]  ? __pfx_kasan_atomics+0x10/0x10
[   60.353702]  ? ktime_get_ts64+0x83/0x230
[   60.353707]  kunit_try_run_case+0x1a2/0x480
[   60.353711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.353716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.353720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.353725]  ? __kthread_parkme+0x82/0x180
[   60.353729]  ? preempt_count_sub+0x50/0x80
[   60.353733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.353738]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.353742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.353746]  kthread+0x334/0x6f0
[   60.353750]  ? trace_preempt_on+0x20/0xc0
[   60.353754]  ? __pfx_kthread+0x10/0x10
[   60.353758]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.353762]  ? calculate_sigpending+0x7b/0xa0
[   60.353767]  ? __pfx_kthread+0x10/0x10
[   60.353771]  ret_from_fork+0x113/0x1d0
[   60.353775]  ? __pfx_kthread+0x10/0x10
[   60.353779]  ret_from_fork_asm+0x1a/0x30
[   60.353785]  </TASK>
[   60.353786] 
[   60.533428] Allocated by task 306:
[   60.536835]  kasan_save_stack+0x45/0x70
[   60.540675]  kasan_save_track+0x18/0x40
[   60.544516]  kasan_save_alloc_info+0x3b/0x50
[   60.548797]  __kasan_kmalloc+0xb7/0xc0
[   60.552549]  __kmalloc_cache_noprof+0x189/0x420
[   60.557092]  kasan_atomics+0x95/0x310
[   60.560764]  kunit_try_run_case+0x1a2/0x480
[   60.564950]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.570363]  kthread+0x334/0x6f0
[   60.573618]  ret_from_fork+0x113/0x1d0
[   60.577371]  ret_from_fork_asm+0x1a/0x30
[   60.581363] 
[   60.582884] The buggy address belongs to the object at ffff8881066eaf00
[   60.582884]  which belongs to the cache kmalloc-64 of size 64
[   60.595224] The buggy address is located 0 bytes to the right of
[   60.595224]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   60.608086] 
[   60.609583] The buggy address belongs to the physical page:
[   60.615157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   60.623164] flags: 0x200000000000000(node=0|zone=2)
[   60.628046] page_type: f5(slab)
[   60.631192] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.638939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.646687] page dumped because: kasan: bad access detected
[   60.652258] 
[   60.653757] Memory state around the buggy address:
[   60.658550]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.665770]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   60.672991] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.680217]                                      ^
[   60.685011]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.692237]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.699457] ==================================================================
[   70.182972] ==================================================================
[   70.190211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   70.197605] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   70.204996] 
[   70.206498] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   70.206506] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   70.206509] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.206512] Call Trace:
[   70.206514]  <TASK>
[   70.206516]  dump_stack_lvl+0x73/0xb0
[   70.206520]  print_report+0xd1/0x650
[   70.206524]  ? __virt_addr_valid+0x1db/0x2d0
[   70.206528]  ? kasan_atomics_helper+0x1ce1/0x5450
[   70.206532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.206538]  ? kasan_atomics_helper+0x1ce1/0x5450
[   70.206542]  kasan_report+0x141/0x180
[   70.206546]  ? kasan_atomics_helper+0x1ce1/0x5450
[   70.206551]  kasan_check_range+0x10c/0x1c0
[   70.206555]  __kasan_check_write+0x18/0x20
[   70.206559]  kasan_atomics_helper+0x1ce1/0x5450
[   70.206563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.206567]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.206572]  ? kasan_atomics+0x152/0x310
[   70.206577]  kasan_atomics+0x1dc/0x310
[   70.206582]  ? __pfx_kasan_atomics+0x10/0x10
[   70.206587]  ? ktime_get_ts64+0x83/0x230
[   70.206591]  kunit_try_run_case+0x1a2/0x480
[   70.206596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.206600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.206604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.206609]  ? __kthread_parkme+0x82/0x180
[   70.206612]  ? preempt_count_sub+0x50/0x80
[   70.206617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.206621]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.206626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.206630]  kthread+0x334/0x6f0
[   70.206634]  ? trace_preempt_on+0x20/0xc0
[   70.206638]  ? __pfx_kthread+0x10/0x10
[   70.206642]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.206646]  ? calculate_sigpending+0x7b/0xa0
[   70.206651]  ? __pfx_kthread+0x10/0x10
[   70.206655]  ret_from_fork+0x113/0x1d0
[   70.206659]  ? __pfx_kthread+0x10/0x10
[   70.206662]  ret_from_fork_asm+0x1a/0x30
[   70.206668]  </TASK>
[   70.206670] 
[   70.389794] Allocated by task 306:
[   70.393200]  kasan_save_stack+0x45/0x70
[   70.397040]  kasan_save_track+0x18/0x40
[   70.400880]  kasan_save_alloc_info+0x3b/0x50
[   70.405153]  __kasan_kmalloc+0xb7/0xc0
[   70.408906]  __kmalloc_cache_noprof+0x189/0x420
[   70.413446]  kasan_atomics+0x95/0x310
[   70.417111]  kunit_try_run_case+0x1a2/0x480
[   70.421298]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.426698]  kthread+0x334/0x6f0
[   70.429930]  ret_from_fork+0x113/0x1d0
[   70.433682]  ret_from_fork_asm+0x1a/0x30
[   70.437609] 
[   70.439109] The buggy address belongs to the object at ffff8881066eaf00
[   70.439109]  which belongs to the cache kmalloc-64 of size 64
[   70.451451] The buggy address is located 0 bytes to the right of
[   70.451451]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   70.464319] 
[   70.465852] The buggy address belongs to the physical page:
[   70.471432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   70.479435] flags: 0x200000000000000(node=0|zone=2)
[   70.484314] page_type: f5(slab)
[   70.487496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.495242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.502981] page dumped because: kasan: bad access detected
[   70.508552] 
[   70.510052] Memory state around the buggy address:
[   70.514847]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.522075]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   70.529303] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.536531]                                      ^
[   70.541323]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.548594]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   70.555812] ==================================================================
[   50.858588] ==================================================================
[   50.865818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   50.873219] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   50.880618] 
[   50.882120] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   50.882129] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   50.882131] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.882135] Call Trace:
[   50.882136]  <TASK>
[   50.882138]  dump_stack_lvl+0x73/0xb0
[   50.882143]  print_report+0xd1/0x650
[   50.882147]  ? __virt_addr_valid+0x1db/0x2d0
[   50.882151]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.882155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.882160]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.882164]  kasan_report+0x141/0x180
[   50.882169]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.882173]  __asan_report_store4_noabort+0x1b/0x30
[   50.882179]  kasan_atomics_helper+0x4ba2/0x5450
[   50.882183]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.882187]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.882192]  ? kasan_atomics+0x152/0x310
[   50.882197]  kasan_atomics+0x1dc/0x310
[   50.882201]  ? __pfx_kasan_atomics+0x10/0x10
[   50.882206]  ? ktime_get_ts64+0x83/0x230
[   50.882211]  kunit_try_run_case+0x1a2/0x480
[   50.882215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.882220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.882224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.882229]  ? __kthread_parkme+0x82/0x180
[   50.882233]  ? preempt_count_sub+0x50/0x80
[   50.882237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.882242]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.882246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.882250]  kthread+0x334/0x6f0
[   50.882254]  ? trace_preempt_on+0x20/0xc0
[   50.882258]  ? __pfx_kthread+0x10/0x10
[   50.882262]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.882266]  ? calculate_sigpending+0x7b/0xa0
[   50.882271]  ? __pfx_kthread+0x10/0x10
[   50.882275]  ret_from_fork+0x113/0x1d0
[   50.882279]  ? __pfx_kthread+0x10/0x10
[   50.882283]  ret_from_fork_asm+0x1a/0x30
[   50.882289]  </TASK>
[   50.882291] 
[   51.062089] Allocated by task 306:
[   51.065494]  kasan_save_stack+0x45/0x70
[   51.069363]  kasan_save_track+0x18/0x40
[   51.073245]  kasan_save_alloc_info+0x3b/0x50
[   51.077524]  __kasan_kmalloc+0xb7/0xc0
[   51.081278]  __kmalloc_cache_noprof+0x189/0x420
[   51.085811]  kasan_atomics+0x95/0x310
[   51.089485]  kunit_try_run_case+0x1a2/0x480
[   51.093671]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.099071]  kthread+0x334/0x6f0
[   51.102302]  ret_from_fork+0x113/0x1d0
[   51.106056]  ret_from_fork_asm+0x1a/0x30
[   51.109981] 
[   51.111480] The buggy address belongs to the object at ffff8881066eaf00
[   51.111480]  which belongs to the cache kmalloc-64 of size 64
[   51.123824] The buggy address is located 0 bytes to the right of
[   51.123824]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   51.136694] 
[   51.138193] The buggy address belongs to the physical page:
[   51.143763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   51.151762] flags: 0x200000000000000(node=0|zone=2)
[   51.156643] page_type: f5(slab)
[   51.159789] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.167529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.175267] page dumped because: kasan: bad access detected
[   51.180839] 
[   51.182362] Memory state around the buggy address:
[   51.187201]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.194420]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   51.201641] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.208859]                                      ^
[   51.213651]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.220872]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.228090] ==================================================================
[   55.018931] ==================================================================
[   55.026170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   55.033476] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   55.040870] 
[   55.042382] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   55.042403] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   55.042406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.042410] Call Trace:
[   55.042411]  <TASK>
[   55.042413]  dump_stack_lvl+0x73/0xb0
[   55.042418]  print_report+0xd1/0x650
[   55.042422]  ? __virt_addr_valid+0x1db/0x2d0
[   55.042426]  ? kasan_atomics_helper+0x7c7/0x5450
[   55.042430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.042435]  ? kasan_atomics_helper+0x7c7/0x5450
[   55.042439]  kasan_report+0x141/0x180
[   55.042443]  ? kasan_atomics_helper+0x7c7/0x5450
[   55.042448]  kasan_check_range+0x10c/0x1c0
[   55.042453]  __kasan_check_write+0x18/0x20
[   55.042456]  kasan_atomics_helper+0x7c7/0x5450
[   55.042461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.042465]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.042470]  ? kasan_atomics+0x152/0x310
[   55.042475]  kasan_atomics+0x1dc/0x310
[   55.042479]  ? __pfx_kasan_atomics+0x10/0x10
[   55.042484]  ? ktime_get_ts64+0x83/0x230
[   55.042489]  kunit_try_run_case+0x1a2/0x480
[   55.042493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.042498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.042502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.042507]  ? __kthread_parkme+0x82/0x180
[   55.042511]  ? preempt_count_sub+0x50/0x80
[   55.042515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.042520]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.042524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.042528]  kthread+0x334/0x6f0
[   55.042532]  ? trace_preempt_on+0x20/0xc0
[   55.042536]  ? __pfx_kthread+0x10/0x10
[   55.042540]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.042544]  ? calculate_sigpending+0x7b/0xa0
[   55.042549]  ? __pfx_kthread+0x10/0x10
[   55.042553]  ret_from_fork+0x113/0x1d0
[   55.042557]  ? __pfx_kthread+0x10/0x10
[   55.042561]  ret_from_fork_asm+0x1a/0x30
[   55.042567]  </TASK>
[   55.042569] 
[   55.225251] Allocated by task 306:
[   55.228657]  kasan_save_stack+0x45/0x70
[   55.232496]  kasan_save_track+0x18/0x40
[   55.236376]  kasan_save_alloc_info+0x3b/0x50
[   55.240677]  __kasan_kmalloc+0xb7/0xc0
[   55.244431]  __kmalloc_cache_noprof+0x189/0x420
[   55.248964]  kasan_atomics+0x95/0x310
[   55.252637]  kunit_try_run_case+0x1a2/0x480
[   55.256823]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.262225]  kthread+0x334/0x6f0
[   55.265465]  ret_from_fork+0x113/0x1d0
[   55.269216]  ret_from_fork_asm+0x1a/0x30
[   55.273142] 
[   55.274643] The buggy address belongs to the object at ffff8881066eaf00
[   55.274643]  which belongs to the cache kmalloc-64 of size 64
[   55.286984] The buggy address is located 0 bytes to the right of
[   55.286984]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   55.299846] 
[   55.301364] The buggy address belongs to the physical page:
[   55.306986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   55.314985] flags: 0x200000000000000(node=0|zone=2)
[   55.319864] page_type: f5(slab)
[   55.323011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.330752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.338499] page dumped because: kasan: bad access detected
[   55.344072] 
[   55.345571] Memory state around the buggy address:
[   55.350365]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.357626]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.364844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.372065]                                      ^
[   55.376857]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.384076]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.391296] ==================================================================
[   73.639578] ==================================================================
[   73.646816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   73.654210] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   73.661602] 
[   73.663102] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   73.663110] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   73.663113] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.663116] Call Trace:
[   73.663118]  <TASK>
[   73.663120]  dump_stack_lvl+0x73/0xb0
[   73.663125]  print_report+0xd1/0x650
[   73.663129]  ? __virt_addr_valid+0x1db/0x2d0
[   73.663133]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.663137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.663142]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.663146]  kasan_report+0x141/0x180
[   73.663151]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.663155]  kasan_check_range+0x10c/0x1c0
[   73.663160]  __kasan_check_write+0x18/0x20
[   73.663164]  kasan_atomics_helper+0x20c8/0x5450
[   73.663168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.663172]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.663177]  ? kasan_atomics+0x152/0x310
[   73.663182]  kasan_atomics+0x1dc/0x310
[   73.663187]  ? __pfx_kasan_atomics+0x10/0x10
[   73.663192]  ? ktime_get_ts64+0x83/0x230
[   73.663196]  kunit_try_run_case+0x1a2/0x480
[   73.663201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.663205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.663209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.663214]  ? __kthread_parkme+0x82/0x180
[   73.663218]  ? preempt_count_sub+0x50/0x80
[   73.663222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.663226]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.663231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.663235]  kthread+0x334/0x6f0
[   73.663239]  ? trace_preempt_on+0x20/0xc0
[   73.663243]  ? __pfx_kthread+0x10/0x10
[   73.663247]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.663251]  ? calculate_sigpending+0x7b/0xa0
[   73.663256]  ? __pfx_kthread+0x10/0x10
[   73.663260]  ret_from_fork+0x113/0x1d0
[   73.663263]  ? __pfx_kthread+0x10/0x10
[   73.663267]  ret_from_fork_asm+0x1a/0x30
[   73.663273]  </TASK>
[   73.663275] 
[   73.846454] Allocated by task 306:
[   73.849860]  kasan_save_stack+0x45/0x70
[   73.853697]  kasan_save_track+0x18/0x40
[   73.857537]  kasan_save_alloc_info+0x3b/0x50
[   73.861811]  __kasan_kmalloc+0xb7/0xc0
[   73.865563]  __kmalloc_cache_noprof+0x189/0x420
[   73.870105]  kasan_atomics+0x95/0x310
[   73.873770]  kunit_try_run_case+0x1a2/0x480
[   73.877957]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.883365]  kthread+0x334/0x6f0
[   73.886648]  ret_from_fork+0x113/0x1d0
[   73.890419]  ret_from_fork_asm+0x1a/0x30
[   73.894363] 
[   73.895906] The buggy address belongs to the object at ffff8881066eaf00
[   73.895906]  which belongs to the cache kmalloc-64 of size 64
[   73.908246] The buggy address is located 0 bytes to the right of
[   73.908246]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   73.921107] 
[   73.922606] The buggy address belongs to the physical page:
[   73.928179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   73.936179] flags: 0x200000000000000(node=0|zone=2)
[   73.941059] page_type: f5(slab)
[   73.944204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.951943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.959684] page dumped because: kasan: bad access detected
[   73.965257] 
[   73.966754] Memory state around the buggy address:
[   73.971548]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.978767]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.985985] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.993205]                                      ^
[   73.997999]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.005227]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.012444] ==================================================================
[   53.880499] ==================================================================
[   53.887748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   53.895056] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   53.902455] 
[   53.903957] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   53.903965] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   53.903968] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.903971] Call Trace:
[   53.903973]  <TASK>
[   53.903975]  dump_stack_lvl+0x73/0xb0
[   53.903979]  print_report+0xd1/0x650
[   53.903983]  ? __virt_addr_valid+0x1db/0x2d0
[   53.903988]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.903991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.903997]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.904001]  kasan_report+0x141/0x180
[   53.904005]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.904010]  kasan_check_range+0x10c/0x1c0
[   53.904015]  __kasan_check_write+0x18/0x20
[   53.904018]  kasan_atomics_helper+0x5fe/0x5450
[   53.904022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.904026]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.904031]  ? kasan_atomics+0x152/0x310
[   53.904037]  kasan_atomics+0x1dc/0x310
[   53.904041]  ? __pfx_kasan_atomics+0x10/0x10
[   53.904046]  ? ktime_get_ts64+0x83/0x230
[   53.904050]  kunit_try_run_case+0x1a2/0x480
[   53.904055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.904060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.904064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.904069]  ? __kthread_parkme+0x82/0x180
[   53.904072]  ? preempt_count_sub+0x50/0x80
[   53.904077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.904082]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.904086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.904090]  kthread+0x334/0x6f0
[   53.904094]  ? trace_preempt_on+0x20/0xc0
[   53.904098]  ? __pfx_kthread+0x10/0x10
[   53.904102]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.904106]  ? calculate_sigpending+0x7b/0xa0
[   53.904111]  ? __pfx_kthread+0x10/0x10
[   53.904115]  ret_from_fork+0x113/0x1d0
[   53.904119]  ? __pfx_kthread+0x10/0x10
[   53.904123]  ret_from_fork_asm+0x1a/0x30
[   53.904129]  </TASK>
[   53.904130] 
[   54.086776] Allocated by task 306:
[   54.090185]  kasan_save_stack+0x45/0x70
[   54.094022]  kasan_save_track+0x18/0x40
[   54.097862]  kasan_save_alloc_info+0x3b/0x50
[   54.102144]  __kasan_kmalloc+0xb7/0xc0
[   54.105896]  __kmalloc_cache_noprof+0x189/0x420
[   54.110428]  kasan_atomics+0x95/0x310
[   54.114094]  kunit_try_run_case+0x1a2/0x480
[   54.118281]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.123681]  kthread+0x334/0x6f0
[   54.126920]  ret_from_fork+0x113/0x1d0
[   54.130673]  ret_from_fork_asm+0x1a/0x30
[   54.134600] 
[   54.136100] The buggy address belongs to the object at ffff8881066eaf00
[   54.136100]  which belongs to the cache kmalloc-64 of size 64
[   54.148440] The buggy address is located 0 bytes to the right of
[   54.148440]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   54.161302] 
[   54.162801] The buggy address belongs to the physical page:
[   54.168416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   54.176417] flags: 0x200000000000000(node=0|zone=2)
[   54.181295] page_type: f5(slab)
[   54.184444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.192191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.199937] page dumped because: kasan: bad access detected
[   54.205509] 
[   54.207010] Memory state around the buggy address:
[   54.211802]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.219020]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   54.226242] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.233469]                                      ^
[   54.238262]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.245481]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.252700] ==================================================================
[   67.526210] ==================================================================
[   67.533457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   67.540848] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   67.548243] 
[   67.549742] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   67.549750] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   67.549752] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.549756] Call Trace:
[   67.549757]  <TASK>
[   67.549759]  dump_stack_lvl+0x73/0xb0
[   67.549764]  print_report+0xd1/0x650
[   67.549768]  ? __virt_addr_valid+0x1db/0x2d0
[   67.549772]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.549776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.549781]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.549785]  kasan_report+0x141/0x180
[   67.549789]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.549794]  kasan_check_range+0x10c/0x1c0
[   67.549799]  __kasan_check_write+0x18/0x20
[   67.549802]  kasan_atomics_helper+0x18b1/0x5450
[   67.549807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.549811]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.549816]  ? kasan_atomics+0x152/0x310
[   67.549821]  kasan_atomics+0x1dc/0x310
[   67.549825]  ? __pfx_kasan_atomics+0x10/0x10
[   67.549830]  ? ktime_get_ts64+0x83/0x230
[   67.549835]  kunit_try_run_case+0x1a2/0x480
[   67.549839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.549844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.549848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.549853]  ? __kthread_parkme+0x82/0x180
[   67.549856]  ? preempt_count_sub+0x50/0x80
[   67.549861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.549865]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.549870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.549874]  kthread+0x334/0x6f0
[   67.549878]  ? trace_preempt_on+0x20/0xc0
[   67.549882]  ? __pfx_kthread+0x10/0x10
[   67.549886]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.549890]  ? calculate_sigpending+0x7b/0xa0
[   67.549895]  ? __pfx_kthread+0x10/0x10
[   67.549899]  ret_from_fork+0x113/0x1d0
[   67.549902]  ? __pfx_kthread+0x10/0x10
[   67.549906]  ret_from_fork_asm+0x1a/0x30
[   67.549912]  </TASK>
[   67.549914] 
[   67.733067] Allocated by task 306:
[   67.736473]  kasan_save_stack+0x45/0x70
[   67.740312]  kasan_save_track+0x18/0x40
[   67.744150]  kasan_save_alloc_info+0x3b/0x50
[   67.748422]  __kasan_kmalloc+0xb7/0xc0
[   67.752175]  __kmalloc_cache_noprof+0x189/0x420
[   67.756710]  kasan_atomics+0x95/0x310
[   67.760416]  kunit_try_run_case+0x1a2/0x480
[   67.764604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.770003]  kthread+0x334/0x6f0
[   67.773235]  ret_from_fork+0x113/0x1d0
[   67.776989]  ret_from_fork_asm+0x1a/0x30
[   67.780915] 
[   67.782420] The buggy address belongs to the object at ffff8881066eaf00
[   67.782420]  which belongs to the cache kmalloc-64 of size 64
[   67.794756] The buggy address is located 0 bytes to the right of
[   67.794756]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   67.807618] 
[   67.809116] The buggy address belongs to the physical page:
[   67.814688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   67.822688] flags: 0x200000000000000(node=0|zone=2)
[   67.827568] page_type: f5(slab)
[   67.830714] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.838453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.846192] page dumped because: kasan: bad access detected
[   67.851764] 
[   67.853264] Memory state around the buggy address:
[   67.858058]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.865285]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   67.872503] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.879723]                                      ^
[   67.884516]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.891734]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.898955] ==================================================================
[   72.505949] ==================================================================
[   72.513187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   72.520581] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   72.527896] 
[   72.529423] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   72.529431] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   72.529434] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.529437] Call Trace:
[   72.529439]  <TASK>
[   72.529441]  dump_stack_lvl+0x73/0xb0
[   72.529445]  print_report+0xd1/0x650
[   72.529450]  ? __virt_addr_valid+0x1db/0x2d0
[   72.529454]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.529458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.529463]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.529467]  kasan_report+0x141/0x180
[   72.529471]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.529476]  __asan_report_load8_noabort+0x18/0x20
[   72.529481]  kasan_atomics_helper+0x4f71/0x5450
[   72.529485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.529489]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.529494]  ? kasan_atomics+0x152/0x310
[   72.529499]  kasan_atomics+0x1dc/0x310
[   72.529504]  ? __pfx_kasan_atomics+0x10/0x10
[   72.529509]  ? ktime_get_ts64+0x83/0x230
[   72.529513]  kunit_try_run_case+0x1a2/0x480
[   72.529518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.529522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.529527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.529531]  ? __kthread_parkme+0x82/0x180
[   72.529535]  ? preempt_count_sub+0x50/0x80
[   72.529539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.529544]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.529548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.529552]  kthread+0x334/0x6f0
[   72.529556]  ? trace_preempt_on+0x20/0xc0
[   72.529560]  ? __pfx_kthread+0x10/0x10
[   72.529564]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.529568]  ? calculate_sigpending+0x7b/0xa0
[   72.529573]  ? __pfx_kthread+0x10/0x10
[   72.529577]  ret_from_fork+0x113/0x1d0
[   72.529580]  ? __pfx_kthread+0x10/0x10
[   72.529584]  ret_from_fork_asm+0x1a/0x30
[   72.529590]  </TASK>
[   72.529592] 
[   72.709350] Allocated by task 306:
[   72.712808]  kasan_save_stack+0x45/0x70
[   72.716645]  kasan_save_track+0x18/0x40
[   72.720486]  kasan_save_alloc_info+0x3b/0x50
[   72.724766]  __kasan_kmalloc+0xb7/0xc0
[   72.728518]  __kmalloc_cache_noprof+0x189/0x420
[   72.733051]  kasan_atomics+0x95/0x310
[   72.736718]  kunit_try_run_case+0x1a2/0x480
[   72.740912]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.746312]  kthread+0x334/0x6f0
[   72.749577]  ret_from_fork+0x113/0x1d0
[   72.753362]  ret_from_fork_asm+0x1a/0x30
[   72.757364] 
[   72.758896] The buggy address belongs to the object at ffff8881066eaf00
[   72.758896]  which belongs to the cache kmalloc-64 of size 64
[   72.771238] The buggy address is located 0 bytes to the right of
[   72.771238]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   72.784106] 
[   72.785606] The buggy address belongs to the physical page:
[   72.791177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   72.799177] flags: 0x200000000000000(node=0|zone=2)
[   72.804057] page_type: f5(slab)
[   72.807206] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.814953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.822701] page dumped because: kasan: bad access detected
[   72.828270] 
[   72.829771] Memory state around the buggy address:
[   72.834563]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.841785]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   72.849011] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.856230]                                      ^
[   72.861023]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.868241]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.875461] ==================================================================
[   51.235319] ==================================================================
[   51.242582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   51.249982] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   51.257289] 
[   51.258788] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   51.258796] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   51.258799] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.258802] Call Trace:
[   51.258804]  <TASK>
[   51.258806]  dump_stack_lvl+0x73/0xb0
[   51.258811]  print_report+0xd1/0x650
[   51.258815]  ? __virt_addr_valid+0x1db/0x2d0
[   51.258819]  ? kasan_atomics_helper+0x4b88/0x5450
[   51.258823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.258828]  ? kasan_atomics_helper+0x4b88/0x5450
[   51.258833]  kasan_report+0x141/0x180
[   51.258837]  ? kasan_atomics_helper+0x4b88/0x5450
[   51.258842]  __asan_report_load4_noabort+0x18/0x20
[   51.258847]  kasan_atomics_helper+0x4b88/0x5450
[   51.258851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.258855]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.258860]  ? kasan_atomics+0x152/0x310
[   51.258865]  kasan_atomics+0x1dc/0x310
[   51.258870]  ? __pfx_kasan_atomics+0x10/0x10
[   51.258874]  ? ktime_get_ts64+0x83/0x230
[   51.258879]  kunit_try_run_case+0x1a2/0x480
[   51.258884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.258888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.258892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.258897]  ? __kthread_parkme+0x82/0x180
[   51.258901]  ? preempt_count_sub+0x50/0x80
[   51.258905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.258910]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.258914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.258918]  kthread+0x334/0x6f0
[   51.258922]  ? trace_preempt_on+0x20/0xc0
[   51.258926]  ? __pfx_kthread+0x10/0x10
[   51.258930]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.258934]  ? calculate_sigpending+0x7b/0xa0
[   51.258939]  ? __pfx_kthread+0x10/0x10
[   51.258943]  ret_from_fork+0x113/0x1d0
[   51.258947]  ? __pfx_kthread+0x10/0x10
[   51.258951]  ret_from_fork_asm+0x1a/0x30
[   51.258956]  </TASK>
[   51.258958] 
[   51.438767] Allocated by task 306:
[   51.442174]  kasan_save_stack+0x45/0x70
[   51.446013]  kasan_save_track+0x18/0x40
[   51.449853]  kasan_save_alloc_info+0x3b/0x50
[   51.454132]  __kasan_kmalloc+0xb7/0xc0
[   51.457887]  __kmalloc_cache_noprof+0x189/0x420
[   51.462428]  kasan_atomics+0x95/0x310
[   51.466103]  kunit_try_run_case+0x1a2/0x480
[   51.470287]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.475687]  kthread+0x334/0x6f0
[   51.478921]  ret_from_fork+0x113/0x1d0
[   51.482671]  ret_from_fork_asm+0x1a/0x30
[   51.486598] 
[   51.488098] The buggy address belongs to the object at ffff8881066eaf00
[   51.488098]  which belongs to the cache kmalloc-64 of size 64
[   51.500439] The buggy address is located 0 bytes to the right of
[   51.500439]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   51.513309] 
[   51.514808] The buggy address belongs to the physical page:
[   51.520421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   51.528425] flags: 0x200000000000000(node=0|zone=2)
[   51.533312] page_type: f5(slab)
[   51.536494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.544241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.551987] page dumped because: kasan: bad access detected
[   51.557561] 
[   51.559061] Memory state around the buggy address:
[   51.563853]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.571072]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   51.578293] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.585519]                                      ^
[   51.590313]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.597568]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.604793] ==================================================================
[   66.386200] ==================================================================
[   66.393441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   66.400841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   66.408243] 
[   66.409743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   66.409751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   66.409754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.409758] Call Trace:
[   66.409759]  <TASK>
[   66.409761]  dump_stack_lvl+0x73/0xb0
[   66.409766]  print_report+0xd1/0x650
[   66.409770]  ? __virt_addr_valid+0x1db/0x2d0
[   66.409774]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.409778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.409783]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.409787]  kasan_report+0x141/0x180
[   66.409792]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.409796]  kasan_check_range+0x10c/0x1c0
[   66.409801]  __kasan_check_write+0x18/0x20
[   66.409805]  kasan_atomics_helper+0x16e7/0x5450
[   66.409809]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.409813]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.409818]  ? kasan_atomics+0x152/0x310
[   66.409823]  kasan_atomics+0x1dc/0x310
[   66.409827]  ? __pfx_kasan_atomics+0x10/0x10
[   66.409832]  ? ktime_get_ts64+0x83/0x230
[   66.409837]  kunit_try_run_case+0x1a2/0x480
[   66.409842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.409846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.409850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.409855]  ? __kthread_parkme+0x82/0x180
[   66.409859]  ? preempt_count_sub+0x50/0x80
[   66.409863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.409868]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.409872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.409877]  kthread+0x334/0x6f0
[   66.409880]  ? trace_preempt_on+0x20/0xc0
[   66.409885]  ? __pfx_kthread+0x10/0x10
[   66.409889]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.409893]  ? calculate_sigpending+0x7b/0xa0
[   66.409897]  ? __pfx_kthread+0x10/0x10
[   66.409902]  ret_from_fork+0x113/0x1d0
[   66.409905]  ? __pfx_kthread+0x10/0x10
[   66.409909]  ret_from_fork_asm+0x1a/0x30
[   66.409915]  </TASK>
[   66.409917] 
[   66.593041] Allocated by task 306:
[   66.596447]  kasan_save_stack+0x45/0x70
[   66.600286]  kasan_save_track+0x18/0x40
[   66.604125]  kasan_save_alloc_info+0x3b/0x50
[   66.608421]  __kasan_kmalloc+0xb7/0xc0
[   66.612177]  __kmalloc_cache_noprof+0x189/0x420
[   66.616718]  kasan_atomics+0x95/0x310
[   66.620418]  kunit_try_run_case+0x1a2/0x480
[   66.624604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.630005]  kthread+0x334/0x6f0
[   66.633236]  ret_from_fork+0x113/0x1d0
[   66.636991]  ret_from_fork_asm+0x1a/0x30
[   66.640924] 
[   66.642423] The buggy address belongs to the object at ffff8881066eaf00
[   66.642423]  which belongs to the cache kmalloc-64 of size 64
[   66.654764] The buggy address is located 0 bytes to the right of
[   66.654764]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   66.667627] 
[   66.669125] The buggy address belongs to the physical page:
[   66.674699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   66.682707] flags: 0x200000000000000(node=0|zone=2)
[   66.687594] page_type: f5(slab)
[   66.690741] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.698490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.706237] page dumped because: kasan: bad access detected
[   66.711809] 
[   66.713306] Memory state around the buggy address:
[   66.718101]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.725321]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   66.732574] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.739792]                                      ^
[   66.744586]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.751806]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.759023] ==================================================================
[   68.666243] ==================================================================
[   68.673481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   68.680876] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   68.688275] 
[   68.689776] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   68.689784] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   68.689786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.689790] Call Trace:
[   68.689792]  <TASK>
[   68.689793]  dump_stack_lvl+0x73/0xb0
[   68.689798]  print_report+0xd1/0x650
[   68.689802]  ? __virt_addr_valid+0x1db/0x2d0
[   68.689806]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.689810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.689815]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.689819]  kasan_report+0x141/0x180
[   68.689824]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.689829]  kasan_check_range+0x10c/0x1c0
[   68.689833]  __kasan_check_write+0x18/0x20
[   68.689837]  kasan_atomics_helper+0x1a7f/0x5450
[   68.689841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.689845]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.689850]  ? kasan_atomics+0x152/0x310
[   68.689855]  kasan_atomics+0x1dc/0x310
[   68.689859]  ? __pfx_kasan_atomics+0x10/0x10
[   68.689864]  ? ktime_get_ts64+0x83/0x230
[   68.689869]  kunit_try_run_case+0x1a2/0x480
[   68.689873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.689878]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.689882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.689887]  ? __kthread_parkme+0x82/0x180
[   68.689891]  ? preempt_count_sub+0x50/0x80
[   68.689895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.689899]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.689904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.689908]  kthread+0x334/0x6f0
[   68.689912]  ? trace_preempt_on+0x20/0xc0
[   68.689916]  ? __pfx_kthread+0x10/0x10
[   68.689920]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.689924]  ? calculate_sigpending+0x7b/0xa0
[   68.689929]  ? __pfx_kthread+0x10/0x10
[   68.689933]  ret_from_fork+0x113/0x1d0
[   68.689936]  ? __pfx_kthread+0x10/0x10
[   68.689940]  ret_from_fork_asm+0x1a/0x30
[   68.689946]  </TASK>
[   68.689948] 
[   68.873100] Allocated by task 306:
[   68.876508]  kasan_save_stack+0x45/0x70
[   68.880377]  kasan_save_track+0x18/0x40
[   68.884246]  kasan_save_alloc_info+0x3b/0x50
[   68.888527]  __kasan_kmalloc+0xb7/0xc0
[   68.892279]  __kmalloc_cache_noprof+0x189/0x420
[   68.896812]  kasan_atomics+0x95/0x310
[   68.900479]  kunit_try_run_case+0x1a2/0x480
[   68.904674]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.910080]  kthread+0x334/0x6f0
[   68.913313]  ret_from_fork+0x113/0x1d0
[   68.917102]  ret_from_fork_asm+0x1a/0x30
[   68.921034] 
[   68.922536] The buggy address belongs to the object at ffff8881066eaf00
[   68.922536]  which belongs to the cache kmalloc-64 of size 64
[   68.934877] The buggy address is located 0 bytes to the right of
[   68.934877]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   68.947737] 
[   68.949237] The buggy address belongs to the physical page:
[   68.954808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   68.962808] flags: 0x200000000000000(node=0|zone=2)
[   68.967687] page_type: f5(slab)
[   68.970836] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.978582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.986323] page dumped because: kasan: bad access detected
[   68.991945] 
[   68.993445] Memory state around the buggy address:
[   68.998238]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.005457]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   69.012678] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.019896]                                      ^
[   69.024690]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.031915]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   69.039135] ==================================================================
[   60.706682] ==================================================================
[   60.713922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   60.721316] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   60.728741] 
[   60.730241] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   60.730249] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   60.730251] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.730255] Call Trace:
[   60.730257]  <TASK>
[   60.730258]  dump_stack_lvl+0x73/0xb0
[   60.730263]  print_report+0xd1/0x650
[   60.730267]  ? __virt_addr_valid+0x1db/0x2d0
[   60.730271]  ? kasan_atomics_helper+0x1079/0x5450
[   60.730275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.730281]  ? kasan_atomics_helper+0x1079/0x5450
[   60.730285]  kasan_report+0x141/0x180
[   60.730289]  ? kasan_atomics_helper+0x1079/0x5450
[   60.730294]  kasan_check_range+0x10c/0x1c0
[   60.730298]  __kasan_check_write+0x18/0x20
[   60.730302]  kasan_atomics_helper+0x1079/0x5450
[   60.730306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.730310]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.730315]  ? kasan_atomics+0x152/0x310
[   60.730321]  kasan_atomics+0x1dc/0x310
[   60.730325]  ? __pfx_kasan_atomics+0x10/0x10
[   60.730350]  ? ktime_get_ts64+0x83/0x230
[   60.730354]  kunit_try_run_case+0x1a2/0x480
[   60.730359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.730364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.730381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.730386]  ? __kthread_parkme+0x82/0x180
[   60.730402]  ? preempt_count_sub+0x50/0x80
[   60.730407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.730411]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.730416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.730420]  kthread+0x334/0x6f0
[   60.730424]  ? trace_preempt_on+0x20/0xc0
[   60.730428]  ? __pfx_kthread+0x10/0x10
[   60.730432]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.730436]  ? calculate_sigpending+0x7b/0xa0
[   60.730441]  ? __pfx_kthread+0x10/0x10
[   60.730445]  ret_from_fork+0x113/0x1d0
[   60.730448]  ? __pfx_kthread+0x10/0x10
[   60.730452]  ret_from_fork_asm+0x1a/0x30
[   60.730458]  </TASK>
[   60.730460] 
[   60.913505] Allocated by task 306:
[   60.916910]  kasan_save_stack+0x45/0x70
[   60.920751]  kasan_save_track+0x18/0x40
[   60.924591]  kasan_save_alloc_info+0x3b/0x50
[   60.928870]  __kasan_kmalloc+0xb7/0xc0
[   60.932625]  __kmalloc_cache_noprof+0x189/0x420
[   60.937166]  kasan_atomics+0x95/0x310
[   60.940840]  kunit_try_run_case+0x1a2/0x480
[   60.945025]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.950426]  kthread+0x334/0x6f0
[   60.953658]  ret_from_fork+0x113/0x1d0
[   60.957425]  ret_from_fork_asm+0x1a/0x30
[   60.961363] 
[   60.962905] The buggy address belongs to the object at ffff8881066eaf00
[   60.962905]  which belongs to the cache kmalloc-64 of size 64
[   60.975246] The buggy address is located 0 bytes to the right of
[   60.975246]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   60.988108] 
[   60.989608] The buggy address belongs to the physical page:
[   60.995180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   61.003179] flags: 0x200000000000000(node=0|zone=2)
[   61.008060] page_type: f5(slab)
[   61.011204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.018944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.026684] page dumped because: kasan: bad access detected
[   61.032255] 
[   61.033755] Memory state around the buggy address:
[   61.038550]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.045777]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   61.053004] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.060224]                                      ^
[   61.065014]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.072236]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.079454] ==================================================================
[   70.942940] ==================================================================
[   70.950179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   70.957572] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   70.964974] 
[   70.966474] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   70.966482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   70.966485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.966488] Call Trace:
[   70.966490]  <TASK>
[   70.966492]  dump_stack_lvl+0x73/0xb0
[   70.966496]  print_report+0xd1/0x650
[   70.966500]  ? __virt_addr_valid+0x1db/0x2d0
[   70.966504]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.966508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.966514]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.966518]  kasan_report+0x141/0x180
[   70.966522]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.966527]  kasan_check_range+0x10c/0x1c0
[   70.966531]  __kasan_check_write+0x18/0x20
[   70.966535]  kasan_atomics_helper+0x1e12/0x5450
[   70.966539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.966543]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.966548]  ? kasan_atomics+0x152/0x310
[   70.966553]  kasan_atomics+0x1dc/0x310
[   70.966558]  ? __pfx_kasan_atomics+0x10/0x10
[   70.966563]  ? ktime_get_ts64+0x83/0x230
[   70.966567]  kunit_try_run_case+0x1a2/0x480
[   70.966572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.966576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.966581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.966585]  ? __kthread_parkme+0x82/0x180
[   70.966589]  ? preempt_count_sub+0x50/0x80
[   70.966593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.966598]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.966602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.966606]  kthread+0x334/0x6f0
[   70.966610]  ? trace_preempt_on+0x20/0xc0
[   70.966614]  ? __pfx_kthread+0x10/0x10
[   70.966618]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.966622]  ? calculate_sigpending+0x7b/0xa0
[   70.966627]  ? __pfx_kthread+0x10/0x10
[   70.966631]  ret_from_fork+0x113/0x1d0
[   70.966634]  ? __pfx_kthread+0x10/0x10
[   70.966638]  ret_from_fork_asm+0x1a/0x30
[   70.966644]  </TASK>
[   70.966646] 
[   71.149763] Allocated by task 306:
[   71.153168]  kasan_save_stack+0x45/0x70
[   71.157007]  kasan_save_track+0x18/0x40
[   71.160848]  kasan_save_alloc_info+0x3b/0x50
[   71.165129]  __kasan_kmalloc+0xb7/0xc0
[   71.168880]  __kmalloc_cache_noprof+0x189/0x420
[   71.173421]  kasan_atomics+0x95/0x310
[   71.177089]  kunit_try_run_case+0x1a2/0x480
[   71.181284]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.186681]  kthread+0x334/0x6f0
[   71.189916]  ret_from_fork+0x113/0x1d0
[   71.193669]  ret_from_fork_asm+0x1a/0x30
[   71.197602] 
[   71.199101] The buggy address belongs to the object at ffff8881066eaf00
[   71.199101]  which belongs to the cache kmalloc-64 of size 64
[   71.211436] The buggy address is located 0 bytes to the right of
[   71.211436]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   71.224297] 
[   71.225796] The buggy address belongs to the physical page:
[   71.231379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   71.239431] flags: 0x200000000000000(node=0|zone=2)
[   71.244317] page_type: f5(slab)
[   71.247496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   71.255237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.262984] page dumped because: kasan: bad access detected
[   71.268558] 
[   71.270056] Memory state around the buggy address:
[   71.274847]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.282067]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   71.289289] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.296514]                                      ^
[   71.301309]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.308536]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   71.315753] ==================================================================
[   63.356478] ==================================================================
[   63.363717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   63.371109] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   63.378423] 
[   63.379924] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   63.379932] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   63.379935] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.379938] Call Trace:
[   63.379940]  <TASK>
[   63.379942]  dump_stack_lvl+0x73/0xb0
[   63.379946]  print_report+0xd1/0x650
[   63.379950]  ? __virt_addr_valid+0x1db/0x2d0
[   63.379955]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.379958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.379964]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.379968]  kasan_report+0x141/0x180
[   63.379972]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.379977]  __asan_report_load4_noabort+0x18/0x20
[   63.379982]  kasan_atomics_helper+0x49ce/0x5450
[   63.379986]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.379990]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.379995]  ? kasan_atomics+0x152/0x310
[   63.380000]  kasan_atomics+0x1dc/0x310
[   63.380005]  ? __pfx_kasan_atomics+0x10/0x10
[   63.380010]  ? ktime_get_ts64+0x83/0x230
[   63.380014]  kunit_try_run_case+0x1a2/0x480
[   63.380019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.380023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.380027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.380032]  ? __kthread_parkme+0x82/0x180
[   63.380036]  ? preempt_count_sub+0x50/0x80
[   63.380040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.380045]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.380049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.380053]  kthread+0x334/0x6f0
[   63.380057]  ? trace_preempt_on+0x20/0xc0
[   63.380061]  ? __pfx_kthread+0x10/0x10
[   63.380065]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.380069]  ? calculate_sigpending+0x7b/0xa0
[   63.380074]  ? __pfx_kthread+0x10/0x10
[   63.380078]  ret_from_fork+0x113/0x1d0
[   63.380081]  ? __pfx_kthread+0x10/0x10
[   63.380085]  ret_from_fork_asm+0x1a/0x30
[   63.380091]  </TASK>
[   63.380093] 
[   63.559772] Allocated by task 306:
[   63.563178]  kasan_save_stack+0x45/0x70
[   63.567018]  kasan_save_track+0x18/0x40
[   63.570857]  kasan_save_alloc_info+0x3b/0x50
[   63.575129]  __kasan_kmalloc+0xb7/0xc0
[   63.578883]  __kmalloc_cache_noprof+0x189/0x420
[   63.583428]  kasan_atomics+0x95/0x310
[   63.587099]  kunit_try_run_case+0x1a2/0x480
[   63.591286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.596692]  kthread+0x334/0x6f0
[   63.599925]  ret_from_fork+0x113/0x1d0
[   63.603678]  ret_from_fork_asm+0x1a/0x30
[   63.607605] 
[   63.609104] The buggy address belongs to the object at ffff8881066eaf00
[   63.609104]  which belongs to the cache kmalloc-64 of size 64
[   63.621447] The buggy address is located 0 bytes to the right of
[   63.621447]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   63.634315] 
[   63.635848] The buggy address belongs to the physical page:
[   63.641426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   63.649429] flags: 0x200000000000000(node=0|zone=2)
[   63.654310] page_type: f5(slab)
[   63.657456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.665195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.672935] page dumped because: kasan: bad access detected
[   63.678508] 
[   63.680007] Memory state around the buggy address:
[   63.684800]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.692027]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   63.699246] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.706465]                                      ^
[   63.711259]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.718485]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.725706] ==================================================================
[   74.019671] ==================================================================
[   74.026908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   74.034301] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   74.041610] 
[   74.043108] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   74.043115] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   74.043118] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.043122] Call Trace:
[   74.043124]  <TASK>
[   74.043126]  dump_stack_lvl+0x73/0xb0
[   74.043130]  print_report+0xd1/0x650
[   74.043134]  ? __virt_addr_valid+0x1db/0x2d0
[   74.043138]  ? kasan_atomics_helper+0x4fb2/0x5450
[   74.043142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.043148]  ? kasan_atomics_helper+0x4fb2/0x5450
[   74.043152]  kasan_report+0x141/0x180
[   74.043156]  ? kasan_atomics_helper+0x4fb2/0x5450
[   74.043161]  __asan_report_load8_noabort+0x18/0x20
[   74.043166]  kasan_atomics_helper+0x4fb2/0x5450
[   74.043170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.043174]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.043179]  ? kasan_atomics+0x152/0x310
[   74.043184]  kasan_atomics+0x1dc/0x310
[   74.043189]  ? __pfx_kasan_atomics+0x10/0x10
[   74.043194]  ? ktime_get_ts64+0x83/0x230
[   74.043198]  kunit_try_run_case+0x1a2/0x480
[   74.043203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.043207]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.043212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.043216]  ? __kthread_parkme+0x82/0x180
[   74.043220]  ? preempt_count_sub+0x50/0x80
[   74.043224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.043229]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.043233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.043237]  kthread+0x334/0x6f0
[   74.043241]  ? trace_preempt_on+0x20/0xc0
[   74.043245]  ? __pfx_kthread+0x10/0x10
[   74.043249]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.043253]  ? calculate_sigpending+0x7b/0xa0
[   74.043258]  ? __pfx_kthread+0x10/0x10
[   74.043262]  ret_from_fork+0x113/0x1d0
[   74.043265]  ? __pfx_kthread+0x10/0x10
[   74.043269]  ret_from_fork_asm+0x1a/0x30
[   74.043275]  </TASK>
[   74.043277] 
[   74.222982] Allocated by task 306:
[   74.226416]  kasan_save_stack+0x45/0x70
[   74.230263]  kasan_save_track+0x18/0x40
[   74.234104]  kasan_save_alloc_info+0x3b/0x50
[   74.238416]  __kasan_kmalloc+0xb7/0xc0
[   74.242171]  __kmalloc_cache_noprof+0x189/0x420
[   74.246705]  kasan_atomics+0x95/0x310
[   74.250403]  kunit_try_run_case+0x1a2/0x480
[   74.254598]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.259997]  kthread+0x334/0x6f0
[   74.263232]  ret_from_fork+0x113/0x1d0
[   74.266984]  ret_from_fork_asm+0x1a/0x30
[   74.270910] 
[   74.272421] The buggy address belongs to the object at ffff8881066eaf00
[   74.272421]  which belongs to the cache kmalloc-64 of size 64
[   74.284758] The buggy address is located 0 bytes to the right of
[   74.284758]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   74.297620] 
[   74.299120] The buggy address belongs to the physical page:
[   74.304694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   74.312701] flags: 0x200000000000000(node=0|zone=2)
[   74.317590] page_type: f5(slab)
[   74.320734] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.328475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.336214] page dumped because: kasan: bad access detected
[   74.341786] 
[   74.343285] Memory state around the buggy address:
[   74.348077]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.355297]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   74.362518] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.369744]                                      ^
[   74.374537]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.381758]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.388983] ==================================================================
[   59.570983] ==================================================================
[   59.578229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   59.585536] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   59.592938] 
[   59.594436] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   59.594444] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   59.594447] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.594450] Call Trace:
[   59.594452]  <TASK>
[   59.594454]  dump_stack_lvl+0x73/0xb0
[   59.594458]  print_report+0xd1/0x650
[   59.594462]  ? __virt_addr_valid+0x1db/0x2d0
[   59.594466]  ? kasan_atomics_helper+0xf10/0x5450
[   59.594470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.594476]  ? kasan_atomics_helper+0xf10/0x5450
[   59.594480]  kasan_report+0x141/0x180
[   59.594484]  ? kasan_atomics_helper+0xf10/0x5450
[   59.594489]  kasan_check_range+0x10c/0x1c0
[   59.594493]  __kasan_check_write+0x18/0x20
[   59.594497]  kasan_atomics_helper+0xf10/0x5450
[   59.594501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.594505]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.594510]  ? kasan_atomics+0x152/0x310
[   59.594515]  kasan_atomics+0x1dc/0x310
[   59.594520]  ? __pfx_kasan_atomics+0x10/0x10
[   59.594525]  ? ktime_get_ts64+0x83/0x230
[   59.594529]  kunit_try_run_case+0x1a2/0x480
[   59.594534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.594538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.594543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.594547]  ? __kthread_parkme+0x82/0x180
[   59.594551]  ? preempt_count_sub+0x50/0x80
[   59.594555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.594560]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.594564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.594569]  kthread+0x334/0x6f0
[   59.594572]  ? trace_preempt_on+0x20/0xc0
[   59.594577]  ? __pfx_kthread+0x10/0x10
[   59.594581]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.594585]  ? calculate_sigpending+0x7b/0xa0
[   59.594589]  ? __pfx_kthread+0x10/0x10
[   59.594594]  ret_from_fork+0x113/0x1d0
[   59.594597]  ? __pfx_kthread+0x10/0x10
[   59.594601]  ret_from_fork_asm+0x1a/0x30
[   59.594607]  </TASK>
[   59.594609] 
[   59.777260] Allocated by task 306:
[   59.780664]  kasan_save_stack+0x45/0x70
[   59.784503]  kasan_save_track+0x18/0x40
[   59.788362]  kasan_save_alloc_info+0x3b/0x50
[   59.792685]  __kasan_kmalloc+0xb7/0xc0
[   59.796437]  __kmalloc_cache_noprof+0x189/0x420
[   59.800970]  kasan_atomics+0x95/0x310
[   59.804637]  kunit_try_run_case+0x1a2/0x480
[   59.808833]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.814240]  kthread+0x334/0x6f0
[   59.817481]  ret_from_fork+0x113/0x1d0
[   59.821234]  ret_from_fork_asm+0x1a/0x30
[   59.825160] 
[   59.826657] The buggy address belongs to the object at ffff8881066eaf00
[   59.826657]  which belongs to the cache kmalloc-64 of size 64
[   59.838993] The buggy address is located 0 bytes to the right of
[   59.838993]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   59.851852] 
[   59.853361] The buggy address belongs to the physical page:
[   59.858985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   59.866994] flags: 0x200000000000000(node=0|zone=2)
[   59.871873] page_type: f5(slab)
[   59.875018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.882757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.890496] page dumped because: kasan: bad access detected
[   59.896068] 
[   59.897567] Memory state around the buggy address:
[   59.902363]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.909625]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   59.916844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.924063]                                      ^
[   59.928856]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.936074]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.943294] ==================================================================
[   55.778231] ==================================================================
[   55.785463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   55.792770] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   55.800168] 
[   55.801669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   55.801677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   55.801680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.801683] Call Trace:
[   55.801685]  <TASK>
[   55.801687]  dump_stack_lvl+0x73/0xb0
[   55.801691]  print_report+0xd1/0x650
[   55.801695]  ? __virt_addr_valid+0x1db/0x2d0
[   55.801700]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.801703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.801709]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.801713]  kasan_report+0x141/0x180
[   55.801717]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.801722]  kasan_check_range+0x10c/0x1c0
[   55.801727]  __kasan_check_write+0x18/0x20
[   55.801730]  kasan_atomics_helper+0x8f9/0x5450
[   55.801734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.801739]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.801744]  ? kasan_atomics+0x152/0x310
[   55.801749]  kasan_atomics+0x1dc/0x310
[   55.801753]  ? __pfx_kasan_atomics+0x10/0x10
[   55.801758]  ? ktime_get_ts64+0x83/0x230
[   55.801762]  kunit_try_run_case+0x1a2/0x480
[   55.801767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.801772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.801776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.801780]  ? __kthread_parkme+0x82/0x180
[   55.801784]  ? preempt_count_sub+0x50/0x80
[   55.801788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.801793]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.801798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.801802]  kthread+0x334/0x6f0
[   55.801806]  ? trace_preempt_on+0x20/0xc0
[   55.801810]  ? __pfx_kthread+0x10/0x10
[   55.801814]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.801818]  ? calculate_sigpending+0x7b/0xa0
[   55.801823]  ? __pfx_kthread+0x10/0x10
[   55.801827]  ret_from_fork+0x113/0x1d0
[   55.801830]  ? __pfx_kthread+0x10/0x10
[   55.801834]  ret_from_fork_asm+0x1a/0x30
[   55.801840]  </TASK>
[   55.801842] 
[   55.984481] Allocated by task 306:
[   55.987888]  kasan_save_stack+0x45/0x70
[   55.991728]  kasan_save_track+0x18/0x40
[   55.995566]  kasan_save_alloc_info+0x3b/0x50
[   55.999841]  __kasan_kmalloc+0xb7/0xc0
[   56.003592]  __kmalloc_cache_noprof+0x189/0x420
[   56.008124]  kasan_atomics+0x95/0x310
[   56.011791]  kunit_try_run_case+0x1a2/0x480
[   56.015977]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.021420]  kthread+0x334/0x6f0
[   56.024654]  ret_from_fork+0x113/0x1d0
[   56.028417]  ret_from_fork_asm+0x1a/0x30
[   56.032365] 
[   56.033908] The buggy address belongs to the object at ffff8881066eaf00
[   56.033908]  which belongs to the cache kmalloc-64 of size 64
[   56.046251] The buggy address is located 0 bytes to the right of
[   56.046251]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   56.059112] 
[   56.060610] The buggy address belongs to the physical page:
[   56.066184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   56.074191] flags: 0x200000000000000(node=0|zone=2)
[   56.079072] page_type: f5(slab)
[   56.082217] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.089966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.097711] page dumped because: kasan: bad access detected
[   56.103283] 
[   56.104784] Memory state around the buggy address:
[   56.109576]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.116796]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.124017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.131233]                                      ^
[   56.136029]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.143246]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   56.150464] ==================================================================
[   66.006221] ==================================================================
[   66.013460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   66.020854] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   66.028253] 
[   66.029754] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   66.029762] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   66.029765] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.029769] Call Trace:
[   66.029770]  <TASK>
[   66.029772]  dump_stack_lvl+0x73/0xb0
[   66.029777]  print_report+0xd1/0x650
[   66.029781]  ? __virt_addr_valid+0x1db/0x2d0
[   66.029785]  ? kasan_atomics_helper+0x164f/0x5450
[   66.029789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.029794]  ? kasan_atomics_helper+0x164f/0x5450
[   66.029798]  kasan_report+0x141/0x180
[   66.029802]  ? kasan_atomics_helper+0x164f/0x5450
[   66.029807]  kasan_check_range+0x10c/0x1c0
[   66.029812]  __kasan_check_write+0x18/0x20
[   66.029816]  kasan_atomics_helper+0x164f/0x5450
[   66.029820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.029824]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.029829]  ? kasan_atomics+0x152/0x310
[   66.029834]  kasan_atomics+0x1dc/0x310
[   66.029839]  ? __pfx_kasan_atomics+0x10/0x10
[   66.029844]  ? ktime_get_ts64+0x83/0x230
[   66.029848]  kunit_try_run_case+0x1a2/0x480
[   66.029853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.029857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.029862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.029866]  ? __kthread_parkme+0x82/0x180
[   66.029870]  ? preempt_count_sub+0x50/0x80
[   66.029874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.029879]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.029884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.029888]  kthread+0x334/0x6f0
[   66.029892]  ? trace_preempt_on+0x20/0xc0
[   66.029896]  ? __pfx_kthread+0x10/0x10
[   66.029900]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.029904]  ? calculate_sigpending+0x7b/0xa0
[   66.029909]  ? __pfx_kthread+0x10/0x10
[   66.029913]  ret_from_fork+0x113/0x1d0
[   66.029916]  ? __pfx_kthread+0x10/0x10
[   66.029920]  ret_from_fork_asm+0x1a/0x30
[   66.029926]  </TASK>
[   66.029928] 
[   66.213060] Allocated by task 306:
[   66.216467]  kasan_save_stack+0x45/0x70
[   66.220308]  kasan_save_track+0x18/0x40
[   66.224147]  kasan_save_alloc_info+0x3b/0x50
[   66.228428]  __kasan_kmalloc+0xb7/0xc0
[   66.232180]  __kmalloc_cache_noprof+0x189/0x420
[   66.236714]  kasan_atomics+0x95/0x310
[   66.240415]  kunit_try_run_case+0x1a2/0x480
[   66.244607]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.250008]  kthread+0x334/0x6f0
[   66.253249]  ret_from_fork+0x113/0x1d0
[   66.257000]  ret_from_fork_asm+0x1a/0x30
[   66.260928] 
[   66.262426] The buggy address belongs to the object at ffff8881066eaf00
[   66.262426]  which belongs to the cache kmalloc-64 of size 64
[   66.274768] The buggy address is located 0 bytes to the right of
[   66.274768]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   66.287630] 
[   66.289127] The buggy address belongs to the physical page:
[   66.294702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   66.302708] flags: 0x200000000000000(node=0|zone=2)
[   66.307589] page_type: f5(slab)
[   66.310736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.318482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.326221] page dumped because: kasan: bad access detected
[   66.331793] 
[   66.333292] Memory state around the buggy address:
[   66.338086]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.345306]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   66.352525] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.359745]                                      ^
[   66.364538]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.371757]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.378975] ==================================================================
[   52.744576] ==================================================================
[   52.751822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   52.759129] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   52.766528] 
[   52.768029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   52.768037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   52.768040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.768043] Call Trace:
[   52.768045]  <TASK>
[   52.768047]  dump_stack_lvl+0x73/0xb0
[   52.768052]  print_report+0xd1/0x650
[   52.768056]  ? __virt_addr_valid+0x1db/0x2d0
[   52.768060]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.768064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.768069]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.768073]  kasan_report+0x141/0x180
[   52.768078]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.768082]  kasan_check_range+0x10c/0x1c0
[   52.768087]  __kasan_check_write+0x18/0x20
[   52.768091]  kasan_atomics_helper+0x4a0/0x5450
[   52.768095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.768099]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.768104]  ? kasan_atomics+0x152/0x310
[   52.768109]  kasan_atomics+0x1dc/0x310
[   52.768114]  ? __pfx_kasan_atomics+0x10/0x10
[   52.768118]  ? ktime_get_ts64+0x83/0x230
[   52.768123]  kunit_try_run_case+0x1a2/0x480
[   52.768128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.768132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.768136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.768141]  ? __kthread_parkme+0x82/0x180
[   52.768145]  ? preempt_count_sub+0x50/0x80
[   52.768149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.768153]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.768158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.768162]  kthread+0x334/0x6f0
[   52.768166]  ? trace_preempt_on+0x20/0xc0
[   52.768170]  ? __pfx_kthread+0x10/0x10
[   52.768174]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.768178]  ? calculate_sigpending+0x7b/0xa0
[   52.768183]  ? __pfx_kthread+0x10/0x10
[   52.768187]  ret_from_fork+0x113/0x1d0
[   52.768191]  ? __pfx_kthread+0x10/0x10
[   52.768195]  ret_from_fork_asm+0x1a/0x30
[   52.768200]  </TASK>
[   52.768202] 
[   52.950989] Allocated by task 306:
[   52.954418]  kasan_save_stack+0x45/0x70
[   52.958261]  kasan_save_track+0x18/0x40
[   52.962102]  kasan_save_alloc_info+0x3b/0x50
[   52.966418]  __kasan_kmalloc+0xb7/0xc0
[   52.970169]  __kmalloc_cache_noprof+0x189/0x420
[   52.974709]  kasan_atomics+0x95/0x310
[   52.978418]  kunit_try_run_case+0x1a2/0x480
[   52.982606]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.988006]  kthread+0x334/0x6f0
[   52.991238]  ret_from_fork+0x113/0x1d0
[   52.994990]  ret_from_fork_asm+0x1a/0x30
[   52.998917] 
[   53.000416] The buggy address belongs to the object at ffff8881066eaf00
[   53.000416]  which belongs to the cache kmalloc-64 of size 64
[   53.012757] The buggy address is located 0 bytes to the right of
[   53.012757]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   53.025620] 
[   53.027117] The buggy address belongs to the physical page:
[   53.032692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   53.040698] flags: 0x200000000000000(node=0|zone=2)
[   53.045577] page_type: f5(slab)
[   53.048726] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.056472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.064210] page dumped because: kasan: bad access detected
[   53.069784] 
[   53.071283] Memory state around the buggy address:
[   53.076075]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.083294]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   53.090515] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.097741]                                      ^
[   53.102536]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.109763]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.116981] ==================================================================
[   66.766248] ==================================================================
[   66.773487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   66.780883] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   66.788282] 
[   66.789782] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   66.789790] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   66.789793] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.789796] Call Trace:
[   66.789798]  <TASK>
[   66.789800]  dump_stack_lvl+0x73/0xb0
[   66.789805]  print_report+0xd1/0x650
[   66.789809]  ? __virt_addr_valid+0x1db/0x2d0
[   66.789813]  ? kasan_atomics_helper+0x177f/0x5450
[   66.789817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.789822]  ? kasan_atomics_helper+0x177f/0x5450
[   66.789826]  kasan_report+0x141/0x180
[   66.789830]  ? kasan_atomics_helper+0x177f/0x5450
[   66.789835]  kasan_check_range+0x10c/0x1c0
[   66.789840]  __kasan_check_write+0x18/0x20
[   66.789844]  kasan_atomics_helper+0x177f/0x5450
[   66.789848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.789852]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.789857]  ? kasan_atomics+0x152/0x310
[   66.789862]  kasan_atomics+0x1dc/0x310
[   66.789866]  ? __pfx_kasan_atomics+0x10/0x10
[   66.789871]  ? ktime_get_ts64+0x83/0x230
[   66.789876]  kunit_try_run_case+0x1a2/0x480
[   66.789880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.789885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.789889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.789894]  ? __kthread_parkme+0x82/0x180
[   66.789897]  ? preempt_count_sub+0x50/0x80
[   66.789902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.789906]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.789911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.789915]  kthread+0x334/0x6f0
[   66.789919]  ? trace_preempt_on+0x20/0xc0
[   66.789923]  ? __pfx_kthread+0x10/0x10
[   66.789927]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.789931]  ? calculate_sigpending+0x7b/0xa0
[   66.789936]  ? __pfx_kthread+0x10/0x10
[   66.789940]  ret_from_fork+0x113/0x1d0
[   66.789944]  ? __pfx_kthread+0x10/0x10
[   66.789948]  ret_from_fork_asm+0x1a/0x30
[   66.789954]  </TASK>
[   66.789955] 
[   66.973038] Allocated by task 306:
[   66.976443]  kasan_save_stack+0x45/0x70
[   66.980282]  kasan_save_track+0x18/0x40
[   66.984123]  kasan_save_alloc_info+0x3b/0x50
[   66.988424]  __kasan_kmalloc+0xb7/0xc0
[   66.992183]  __kmalloc_cache_noprof+0x189/0x420
[   66.996723]  kasan_atomics+0x95/0x310
[   67.000418]  kunit_try_run_case+0x1a2/0x480
[   67.004611]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.010020]  kthread+0x334/0x6f0
[   67.013261]  ret_from_fork+0x113/0x1d0
[   67.017012]  ret_from_fork_asm+0x1a/0x30
[   67.020939] 
[   67.022438] The buggy address belongs to the object at ffff8881066eaf00
[   67.022438]  which belongs to the cache kmalloc-64 of size 64
[   67.034778] The buggy address is located 0 bytes to the right of
[   67.034778]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   67.047641] 
[   67.049141] The buggy address belongs to the physical page:
[   67.054713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   67.062712] flags: 0x200000000000000(node=0|zone=2)
[   67.067592] page_type: f5(slab)
[   67.070739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.078486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.086233] page dumped because: kasan: bad access detected
[   67.091806] 
[   67.093303] Memory state around the buggy address:
[   67.098099]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.105325]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   67.112570] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.119791]                                      ^
[   67.124584]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.131812]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.139037] ==================================================================
[   70.563039] ==================================================================
[   70.570288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   70.577689] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   70.585089] 
[   70.586590] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   70.586598] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   70.586600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.586604] Call Trace:
[   70.586605]  <TASK>
[   70.586607]  dump_stack_lvl+0x73/0xb0
[   70.586612]  print_report+0xd1/0x650
[   70.586616]  ? __virt_addr_valid+0x1db/0x2d0
[   70.586620]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.586624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.586629]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.586633]  kasan_report+0x141/0x180
[   70.586637]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.586642]  kasan_check_range+0x10c/0x1c0
[   70.586647]  __kasan_check_write+0x18/0x20
[   70.586650]  kasan_atomics_helper+0x1d7a/0x5450
[   70.586654]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.586659]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.586664]  ? kasan_atomics+0x152/0x310
[   70.586669]  kasan_atomics+0x1dc/0x310
[   70.586673]  ? __pfx_kasan_atomics+0x10/0x10
[   70.586678]  ? ktime_get_ts64+0x83/0x230
[   70.586682]  kunit_try_run_case+0x1a2/0x480
[   70.586687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.586691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.586696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.586700]  ? __kthread_parkme+0x82/0x180
[   70.586704]  ? preempt_count_sub+0x50/0x80
[   70.586708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.586713]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.586717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.586722]  kthread+0x334/0x6f0
[   70.586725]  ? trace_preempt_on+0x20/0xc0
[   70.586729]  ? __pfx_kthread+0x10/0x10
[   70.586733]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.586737]  ? calculate_sigpending+0x7b/0xa0
[   70.586742]  ? __pfx_kthread+0x10/0x10
[   70.586746]  ret_from_fork+0x113/0x1d0
[   70.586750]  ? __pfx_kthread+0x10/0x10
[   70.586754]  ret_from_fork_asm+0x1a/0x30
[   70.586760]  </TASK>
[   70.586761] 
[   70.769764] Allocated by task 306:
[   70.773172]  kasan_save_stack+0x45/0x70
[   70.777011]  kasan_save_track+0x18/0x40
[   70.780852]  kasan_save_alloc_info+0x3b/0x50
[   70.785133]  __kasan_kmalloc+0xb7/0xc0
[   70.788885]  __kmalloc_cache_noprof+0x189/0x420
[   70.793425]  kasan_atomics+0x95/0x310
[   70.797091]  kunit_try_run_case+0x1a2/0x480
[   70.801279]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.806686]  kthread+0x334/0x6f0
[   70.809920]  ret_from_fork+0x113/0x1d0
[   70.813672]  ret_from_fork_asm+0x1a/0x30
[   70.817597] 
[   70.819096] The buggy address belongs to the object at ffff8881066eaf00
[   70.819096]  which belongs to the cache kmalloc-64 of size 64
[   70.831437] The buggy address is located 0 bytes to the right of
[   70.831437]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   70.844299] 
[   70.845798] The buggy address belongs to the physical page:
[   70.851393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   70.859430] flags: 0x200000000000000(node=0|zone=2)
[   70.864309] page_type: f5(slab)
[   70.867458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.875204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.882944] page dumped because: kasan: bad access detected
[   70.888517] 
[   70.890014] Memory state around the buggy address:
[   70.894808]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.902028]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   70.909247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.916467]                                      ^
[   70.921259]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.928480]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   70.935707] ==================================================================
[   56.537332] ==================================================================
[   56.544590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   56.551896] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   56.559287] 
[   56.560790] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   56.560798] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   56.560800] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.560804] Call Trace:
[   56.560805]  <TASK>
[   56.560807]  dump_stack_lvl+0x73/0xb0
[   56.560812]  print_report+0xd1/0x650
[   56.560816]  ? __virt_addr_valid+0x1db/0x2d0
[   56.560820]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.560824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.560829]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.560833]  kasan_report+0x141/0x180
[   56.560838]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.560843]  kasan_check_range+0x10c/0x1c0
[   56.560847]  __kasan_check_write+0x18/0x20
[   56.560851]  kasan_atomics_helper+0xa2b/0x5450
[   56.560855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.560859]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.560864]  ? kasan_atomics+0x152/0x310
[   56.560870]  kasan_atomics+0x1dc/0x310
[   56.560874]  ? __pfx_kasan_atomics+0x10/0x10
[   56.560879]  ? ktime_get_ts64+0x83/0x230
[   56.560883]  kunit_try_run_case+0x1a2/0x480
[   56.560888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.560892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.560897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.560901]  ? __kthread_parkme+0x82/0x180
[   56.560905]  ? preempt_count_sub+0x50/0x80
[   56.560910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.560914]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.560919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.560923]  kthread+0x334/0x6f0
[   56.560927]  ? trace_preempt_on+0x20/0xc0
[   56.560931]  ? __pfx_kthread+0x10/0x10
[   56.560935]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.560939]  ? calculate_sigpending+0x7b/0xa0
[   56.560944]  ? __pfx_kthread+0x10/0x10
[   56.560948]  ret_from_fork+0x113/0x1d0
[   56.560951]  ? __pfx_kthread+0x10/0x10
[   56.560955]  ret_from_fork_asm+0x1a/0x30
[   56.560961]  </TASK>
[   56.560963] 
[   56.743773] Allocated by task 306:
[   56.747180]  kasan_save_stack+0x45/0x70
[   56.751020]  kasan_save_track+0x18/0x40
[   56.754861]  kasan_save_alloc_info+0x3b/0x50
[   56.759141]  __kasan_kmalloc+0xb7/0xc0
[   56.762893]  __kmalloc_cache_noprof+0x189/0x420
[   56.767428]  kasan_atomics+0x95/0x310
[   56.771099]  kunit_try_run_case+0x1a2/0x480
[   56.775288]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.780694]  kthread+0x334/0x6f0
[   56.783928]  ret_from_fork+0x113/0x1d0
[   56.787679]  ret_from_fork_asm+0x1a/0x30
[   56.791604] 
[   56.793105] The buggy address belongs to the object at ffff8881066eaf00
[   56.793105]  which belongs to the cache kmalloc-64 of size 64
[   56.805445] The buggy address is located 0 bytes to the right of
[   56.805445]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   56.818309] 
[   56.819806] The buggy address belongs to the physical page:
[   56.825422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   56.833427] flags: 0x200000000000000(node=0|zone=2)
[   56.838309] page_type: f5(slab)
[   56.841458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.849204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.856943] page dumped because: kasan: bad access detected
[   56.862515] 
[   56.864016] Memory state around the buggy address:
[   56.868809]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.876026]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.883248] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.890475]                                      ^
[   56.895267]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.902488]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   56.909714] ==================================================================
[   69.806432] ==================================================================
[   69.813673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   69.821073] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   69.828423] 
[   69.829922] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   69.829930] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   69.829932] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.829936] Call Trace:
[   69.829937]  <TASK>
[   69.829939]  dump_stack_lvl+0x73/0xb0
[   69.829944]  print_report+0xd1/0x650
[   69.829948]  ? __virt_addr_valid+0x1db/0x2d0
[   69.829952]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.829956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.829962]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.829966]  kasan_report+0x141/0x180
[   69.829970]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.829975]  __asan_report_load8_noabort+0x18/0x20
[   69.829980]  kasan_atomics_helper+0x4f30/0x5450
[   69.829984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.829988]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.829993]  ? kasan_atomics+0x152/0x310
[   69.829998]  kasan_atomics+0x1dc/0x310
[   69.830002]  ? __pfx_kasan_atomics+0x10/0x10
[   69.830007]  ? ktime_get_ts64+0x83/0x230
[   69.830012]  kunit_try_run_case+0x1a2/0x480
[   69.830016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.830021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.830025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.830030]  ? __kthread_parkme+0x82/0x180
[   69.830033]  ? preempt_count_sub+0x50/0x80
[   69.830038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.830042]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.830047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.830051]  kthread+0x334/0x6f0
[   69.830055]  ? trace_preempt_on+0x20/0xc0
[   69.830059]  ? __pfx_kthread+0x10/0x10
[   69.830063]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.830067]  ? calculate_sigpending+0x7b/0xa0
[   69.830072]  ? __pfx_kthread+0x10/0x10
[   69.830076]  ret_from_fork+0x113/0x1d0
[   69.830079]  ? __pfx_kthread+0x10/0x10
[   69.830083]  ret_from_fork_asm+0x1a/0x30
[   69.830089]  </TASK>
[   69.830091] 
[   70.009790] Allocated by task 306:
[   70.013195]  kasan_save_stack+0x45/0x70
[   70.017034]  kasan_save_track+0x18/0x40
[   70.020873]  kasan_save_alloc_info+0x3b/0x50
[   70.025147]  __kasan_kmalloc+0xb7/0xc0
[   70.028900]  __kmalloc_cache_noprof+0x189/0x420
[   70.033442]  kasan_atomics+0x95/0x310
[   70.037114]  kunit_try_run_case+0x1a2/0x480
[   70.041302]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.046709]  kthread+0x334/0x6f0
[   70.049941]  ret_from_fork+0x113/0x1d0
[   70.053694]  ret_from_fork_asm+0x1a/0x30
[   70.057622] 
[   70.059119] The buggy address belongs to the object at ffff8881066eaf00
[   70.059119]  which belongs to the cache kmalloc-64 of size 64
[   70.071461] The buggy address is located 0 bytes to the right of
[   70.071461]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   70.084324] 
[   70.085848] The buggy address belongs to the physical page:
[   70.091430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   70.099438] flags: 0x200000000000000(node=0|zone=2)
[   70.104317] page_type: f5(slab)
[   70.107497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.115236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.122977] page dumped because: kasan: bad access detected
[   70.128549] 
[   70.130048] Memory state around the buggy address:
[   70.134842]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.142069]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   70.149297] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.156515]                                      ^
[   70.161307]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.168527]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   70.175745] ==================================================================
[   62.976533] ==================================================================
[   62.983772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   62.991165] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   62.998558] 
[   63.000059] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   63.000067] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   63.000070] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.000073] Call Trace:
[   63.000075]  <TASK>
[   63.000077]  dump_stack_lvl+0x73/0xb0
[   63.000081]  print_report+0xd1/0x650
[   63.000085]  ? __virt_addr_valid+0x1db/0x2d0
[   63.000089]  ? kasan_atomics_helper+0x12e6/0x5450
[   63.000093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.000098]  ? kasan_atomics_helper+0x12e6/0x5450
[   63.000102]  kasan_report+0x141/0x180
[   63.000107]  ? kasan_atomics_helper+0x12e6/0x5450
[   63.000111]  kasan_check_range+0x10c/0x1c0
[   63.000116]  __kasan_check_write+0x18/0x20
[   63.000120]  kasan_atomics_helper+0x12e6/0x5450
[   63.000124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.000128]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.000133]  ? kasan_atomics+0x152/0x310
[   63.000138]  kasan_atomics+0x1dc/0x310
[   63.000142]  ? __pfx_kasan_atomics+0x10/0x10
[   63.000147]  ? ktime_get_ts64+0x83/0x230
[   63.000152]  kunit_try_run_case+0x1a2/0x480
[   63.000156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.000161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.000165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.000170]  ? __kthread_parkme+0x82/0x180
[   63.000173]  ? preempt_count_sub+0x50/0x80
[   63.000178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.000183]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.000187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.000191]  kthread+0x334/0x6f0
[   63.000195]  ? trace_preempt_on+0x20/0xc0
[   63.000199]  ? __pfx_kthread+0x10/0x10
[   63.000203]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.000207]  ? calculate_sigpending+0x7b/0xa0
[   63.000212]  ? __pfx_kthread+0x10/0x10
[   63.000216]  ret_from_fork+0x113/0x1d0
[   63.000219]  ? __pfx_kthread+0x10/0x10
[   63.000223]  ret_from_fork_asm+0x1a/0x30
[   63.000229]  </TASK>
[   63.000231] 
[   63.183287] Allocated by task 306:
[   63.186692]  kasan_save_stack+0x45/0x70
[   63.190533]  kasan_save_track+0x18/0x40
[   63.194415]  kasan_save_alloc_info+0x3b/0x50
[   63.198686]  __kasan_kmalloc+0xb7/0xc0
[   63.202439]  __kmalloc_cache_noprof+0x189/0x420
[   63.206971]  kasan_atomics+0x95/0x310
[   63.210638]  kunit_try_run_case+0x1a2/0x480
[   63.214825]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.220223]  kthread+0x334/0x6f0
[   63.223457]  ret_from_fork+0x113/0x1d0
[   63.227209]  ret_from_fork_asm+0x1a/0x30
[   63.231135] 
[   63.232633] The buggy address belongs to the object at ffff8881066eaf00
[   63.232633]  which belongs to the cache kmalloc-64 of size 64
[   63.244966] The buggy address is located 0 bytes to the right of
[   63.244966]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   63.257829] 
[   63.259346] The buggy address belongs to the physical page:
[   63.264927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   63.272934] flags: 0x200000000000000(node=0|zone=2)
[   63.277813] page_type: f5(slab)
[   63.280960] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.288700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.296448] page dumped because: kasan: bad access detected
[   63.302021] 
[   63.303517] Memory state around the buggy address:
[   63.308311]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.315565]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   63.322784] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.330003]                                      ^
[   63.334798]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.342024]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.349245] ==================================================================
[   58.055675] ==================================================================
[   58.062921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   58.070315] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   58.077655] 
[   58.079157] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   58.079165] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   58.079167] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.079171] Call Trace:
[   58.079173]  <TASK>
[   58.079175]  dump_stack_lvl+0x73/0xb0
[   58.079179]  print_report+0xd1/0x650
[   58.079183]  ? __virt_addr_valid+0x1db/0x2d0
[   58.079187]  ? kasan_atomics_helper+0x4a84/0x5450
[   58.079191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.079197]  ? kasan_atomics_helper+0x4a84/0x5450
[   58.079201]  kasan_report+0x141/0x180
[   58.079205]  ? kasan_atomics_helper+0x4a84/0x5450
[   58.079210]  __asan_report_load4_noabort+0x18/0x20
[   58.079215]  kasan_atomics_helper+0x4a84/0x5450
[   58.079219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.079223]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.079228]  ? kasan_atomics+0x152/0x310
[   58.079233]  kasan_atomics+0x1dc/0x310
[   58.079238]  ? __pfx_kasan_atomics+0x10/0x10
[   58.079242]  ? ktime_get_ts64+0x83/0x230
[   58.079247]  kunit_try_run_case+0x1a2/0x480
[   58.079252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.079256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.079261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.079265]  ? __kthread_parkme+0x82/0x180
[   58.079269]  ? preempt_count_sub+0x50/0x80
[   58.079273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.079278]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.079282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.079286]  kthread+0x334/0x6f0
[   58.079290]  ? trace_preempt_on+0x20/0xc0
[   58.079294]  ? __pfx_kthread+0x10/0x10
[   58.079298]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.079302]  ? calculate_sigpending+0x7b/0xa0
[   58.079307]  ? __pfx_kthread+0x10/0x10
[   58.079311]  ret_from_fork+0x113/0x1d0
[   58.079315]  ? __pfx_kthread+0x10/0x10
[   58.079319]  ret_from_fork_asm+0x1a/0x30
[   58.079325]  </TASK>
[   58.079346] 
[   58.259047] Allocated by task 306:
[   58.262453]  kasan_save_stack+0x45/0x70
[   58.266294]  kasan_save_track+0x18/0x40
[   58.270132]  kasan_save_alloc_info+0x3b/0x50
[   58.274422]  __kasan_kmalloc+0xb7/0xc0
[   58.278173]  __kmalloc_cache_noprof+0x189/0x420
[   58.282709]  kasan_atomics+0x95/0x310
[   58.286416]  kunit_try_run_case+0x1a2/0x480
[   58.290603]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.296003]  kthread+0x334/0x6f0
[   58.299235]  ret_from_fork+0x113/0x1d0
[   58.302988]  ret_from_fork_asm+0x1a/0x30
[   58.306921] 
[   58.308427] The buggy address belongs to the object at ffff8881066eaf00
[   58.308427]  which belongs to the cache kmalloc-64 of size 64
[   58.320762] The buggy address is located 0 bytes to the right of
[   58.320762]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   58.333624] 
[   58.335124] The buggy address belongs to the physical page:
[   58.340697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   58.348703] flags: 0x200000000000000(node=0|zone=2)
[   58.353583] page_type: f5(slab)
[   58.356730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.364477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.372216] page dumped because: kasan: bad access detected
[   58.377787] 
[   58.379290] Memory state around the buggy address:
[   58.384083]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.391310]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   58.398529] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.405747]                                      ^
[   58.410540]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.417759]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.424977] ==================================================================
[   65.626199] ==================================================================
[   65.633445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   65.640840] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   65.648239] 
[   65.649740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   65.649748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   65.649751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.649754] Call Trace:
[   65.649756]  <TASK>
[   65.649758]  dump_stack_lvl+0x73/0xb0
[   65.649763]  print_report+0xd1/0x650
[   65.649767]  ? __virt_addr_valid+0x1db/0x2d0
[   65.649771]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.649775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.649780]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.649784]  kasan_report+0x141/0x180
[   65.649788]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.649793]  kasan_check_range+0x10c/0x1c0
[   65.649798]  __kasan_check_write+0x18/0x20
[   65.649802]  kasan_atomics_helper+0x15b6/0x5450
[   65.649806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.649810]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.649815]  ? kasan_atomics+0x152/0x310
[   65.649820]  kasan_atomics+0x1dc/0x310
[   65.649825]  ? __pfx_kasan_atomics+0x10/0x10
[   65.649829]  ? ktime_get_ts64+0x83/0x230
[   65.649834]  kunit_try_run_case+0x1a2/0x480
[   65.649839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.649843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.649847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.649852]  ? __kthread_parkme+0x82/0x180
[   65.649855]  ? preempt_count_sub+0x50/0x80
[   65.649860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.649865]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.649869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.649873]  kthread+0x334/0x6f0
[   65.649877]  ? trace_preempt_on+0x20/0xc0
[   65.649881]  ? __pfx_kthread+0x10/0x10
[   65.649885]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.649889]  ? calculate_sigpending+0x7b/0xa0
[   65.649894]  ? __pfx_kthread+0x10/0x10
[   65.649898]  ret_from_fork+0x113/0x1d0
[   65.649901]  ? __pfx_kthread+0x10/0x10
[   65.649905]  ret_from_fork_asm+0x1a/0x30
[   65.649911]  </TASK>
[   65.649913] 
[   65.833065] Allocated by task 306:
[   65.836469]  kasan_save_stack+0x45/0x70
[   65.840309]  kasan_save_track+0x18/0x40
[   65.844148]  kasan_save_alloc_info+0x3b/0x50
[   65.848423]  __kasan_kmalloc+0xb7/0xc0
[   65.852173]  __kmalloc_cache_noprof+0x189/0x420
[   65.856706]  kasan_atomics+0x95/0x310
[   65.860418]  kunit_try_run_case+0x1a2/0x480
[   65.864610]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.870010]  kthread+0x334/0x6f0
[   65.873242]  ret_from_fork+0x113/0x1d0
[   65.876995]  ret_from_fork_asm+0x1a/0x30
[   65.880920] 
[   65.882421] The buggy address belongs to the object at ffff8881066eaf00
[   65.882421]  which belongs to the cache kmalloc-64 of size 64
[   65.894762] The buggy address is located 0 bytes to the right of
[   65.894762]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   65.907623] 
[   65.909121] The buggy address belongs to the physical page:
[   65.914697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   65.922703] flags: 0x200000000000000(node=0|zone=2)
[   65.927583] page_type: f5(slab)
[   65.930730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.938478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.946226] page dumped because: kasan: bad access detected
[   65.951797] 
[   65.953297] Memory state around the buggy address:
[   65.958089]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.965310]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   65.972527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.979747]                                      ^
[   65.984542]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.991769]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.998996] ==================================================================
[   57.296573] ==================================================================
[   57.303822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   57.311134] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   57.318529] 
[   57.320029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   57.320037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   57.320040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.320044] Call Trace:
[   57.320046]  <TASK>
[   57.320047]  dump_stack_lvl+0x73/0xb0
[   57.320052]  print_report+0xd1/0x650
[   57.320056]  ? __virt_addr_valid+0x1db/0x2d0
[   57.320060]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.320064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.320070]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.320074]  kasan_report+0x141/0x180
[   57.320078]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.320083]  kasan_check_range+0x10c/0x1c0
[   57.320087]  __kasan_check_write+0x18/0x20
[   57.320091]  kasan_atomics_helper+0xb6a/0x5450
[   57.320095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.320099]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.320104]  ? kasan_atomics+0x152/0x310
[   57.320109]  kasan_atomics+0x1dc/0x310
[   57.320114]  ? __pfx_kasan_atomics+0x10/0x10
[   57.320119]  ? ktime_get_ts64+0x83/0x230
[   57.320123]  kunit_try_run_case+0x1a2/0x480
[   57.320128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.320132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.320137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.320141]  ? __kthread_parkme+0x82/0x180
[   57.320145]  ? preempt_count_sub+0x50/0x80
[   57.320149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.320153]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.320158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.320162]  kthread+0x334/0x6f0
[   57.320166]  ? trace_preempt_on+0x20/0xc0
[   57.320170]  ? __pfx_kthread+0x10/0x10
[   57.320174]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.320178]  ? calculate_sigpending+0x7b/0xa0
[   57.320183]  ? __pfx_kthread+0x10/0x10
[   57.320187]  ret_from_fork+0x113/0x1d0
[   57.320190]  ? __pfx_kthread+0x10/0x10
[   57.320194]  ret_from_fork_asm+0x1a/0x30
[   57.320200]  </TASK>
[   57.320202] 
[   57.502955] Allocated by task 306:
[   57.506376]  kasan_save_stack+0x45/0x70
[   57.510244]  kasan_save_track+0x18/0x40
[   57.514080]  kasan_save_alloc_info+0x3b/0x50
[   57.518361]  __kasan_kmalloc+0xb7/0xc0
[   57.522157]  __kmalloc_cache_noprof+0x189/0x420
[   57.526690]  kasan_atomics+0x95/0x310
[   57.530361]  kunit_try_run_case+0x1a2/0x480
[   57.534595]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.539995]  kthread+0x334/0x6f0
[   57.543227]  ret_from_fork+0x113/0x1d0
[   57.546981]  ret_from_fork_asm+0x1a/0x30
[   57.550905] 
[   57.552420] The buggy address belongs to the object at ffff8881066eaf00
[   57.552420]  which belongs to the cache kmalloc-64 of size 64
[   57.564755] The buggy address is located 0 bytes to the right of
[   57.564755]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   57.577616] 
[   57.579117] The buggy address belongs to the physical page:
[   57.584688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   57.592688] flags: 0x200000000000000(node=0|zone=2)
[   57.597569] page_type: f5(slab)
[   57.600713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.608454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.616190] page dumped because: kasan: bad access detected
[   57.621765] 
[   57.623263] Memory state around the buggy address:
[   57.628056]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.635278]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   57.642504] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.649724]                                      ^
[   57.654517]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.661744]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.668963] ==================================================================
[   56.157694] ==================================================================
[   56.164938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   56.172246] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   56.179647] 
[   56.181146] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   56.181154] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   56.181156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.181160] Call Trace:
[   56.181162]  <TASK>
[   56.181163]  dump_stack_lvl+0x73/0xb0
[   56.181168]  print_report+0xd1/0x650
[   56.181172]  ? __virt_addr_valid+0x1db/0x2d0
[   56.181176]  ? kasan_atomics_helper+0x992/0x5450
[   56.181180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.181186]  ? kasan_atomics_helper+0x992/0x5450
[   56.181190]  kasan_report+0x141/0x180
[   56.181194]  ? kasan_atomics_helper+0x992/0x5450
[   56.181199]  kasan_check_range+0x10c/0x1c0
[   56.181203]  __kasan_check_write+0x18/0x20
[   56.181207]  kasan_atomics_helper+0x992/0x5450
[   56.181211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.181215]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.181220]  ? kasan_atomics+0x152/0x310
[   56.181225]  kasan_atomics+0x1dc/0x310
[   56.181230]  ? __pfx_kasan_atomics+0x10/0x10
[   56.181235]  ? ktime_get_ts64+0x83/0x230
[   56.181239]  kunit_try_run_case+0x1a2/0x480
[   56.181244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.181248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.181253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.181257]  ? __kthread_parkme+0x82/0x180
[   56.181261]  ? preempt_count_sub+0x50/0x80
[   56.181265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.181270]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.181274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.181279]  kthread+0x334/0x6f0
[   56.181282]  ? trace_preempt_on+0x20/0xc0
[   56.181286]  ? __pfx_kthread+0x10/0x10
[   56.181290]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.181294]  ? calculate_sigpending+0x7b/0xa0
[   56.181299]  ? __pfx_kthread+0x10/0x10
[   56.181303]  ret_from_fork+0x113/0x1d0
[   56.181307]  ? __pfx_kthread+0x10/0x10
[   56.181311]  ret_from_fork_asm+0x1a/0x30
[   56.181316]  </TASK>
[   56.181318] 
[   56.364088] Allocated by task 306:
[   56.367494]  kasan_save_stack+0x45/0x70
[   56.371367]  kasan_save_track+0x18/0x40
[   56.375233]  kasan_save_alloc_info+0x3b/0x50
[   56.379507]  __kasan_kmalloc+0xb7/0xc0
[   56.383259]  __kmalloc_cache_noprof+0x189/0x420
[   56.387792]  kasan_atomics+0x95/0x310
[   56.391460]  kunit_try_run_case+0x1a2/0x480
[   56.395652]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.401053]  kthread+0x334/0x6f0
[   56.404286]  ret_from_fork+0x113/0x1d0
[   56.408038]  ret_from_fork_asm+0x1a/0x30
[   56.411963] 
[   56.413463] The buggy address belongs to the object at ffff8881066eaf00
[   56.413463]  which belongs to the cache kmalloc-64 of size 64
[   56.425804] The buggy address is located 0 bytes to the right of
[   56.425804]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   56.438667] 
[   56.440166] The buggy address belongs to the physical page:
[   56.445738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   56.453746] flags: 0x200000000000000(node=0|zone=2)
[   56.458624] page_type: f5(slab)
[   56.461772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.469513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.477258] page dumped because: kasan: bad access detected
[   56.482831] 
[   56.484362] Memory state around the buggy address:
[   56.489184]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.496419]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.503639] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.510858]                                      ^
[   56.515652]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.522872]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   56.530089] ==================================================================
[   64.112856] ==================================================================
[   64.120097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   64.127491] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   64.134803] 
[   64.136306] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   64.136314] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   64.136317] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.136320] Call Trace:
[   64.136322]  <TASK>
[   64.136324]  dump_stack_lvl+0x73/0xb0
[   64.136348]  print_report+0xd1/0x650
[   64.136352]  ? __virt_addr_valid+0x1db/0x2d0
[   64.136357]  ? kasan_atomics_helper+0x4eae/0x5450
[   64.136361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.136367]  ? kasan_atomics_helper+0x4eae/0x5450
[   64.136383]  kasan_report+0x141/0x180
[   64.136388]  ? kasan_atomics_helper+0x4eae/0x5450
[   64.136405]  __asan_report_load8_noabort+0x18/0x20
[   64.136410]  kasan_atomics_helper+0x4eae/0x5450
[   64.136414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.136419]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.136423]  ? kasan_atomics+0x152/0x310
[   64.136429]  kasan_atomics+0x1dc/0x310
[   64.136433]  ? __pfx_kasan_atomics+0x10/0x10
[   64.136438]  ? ktime_get_ts64+0x83/0x230
[   64.136442]  kunit_try_run_case+0x1a2/0x480
[   64.136447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.136451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.136456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.136460]  ? __kthread_parkme+0x82/0x180
[   64.136464]  ? preempt_count_sub+0x50/0x80
[   64.136468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.136473]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.136477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.136482]  kthread+0x334/0x6f0
[   64.136485]  ? trace_preempt_on+0x20/0xc0
[   64.136490]  ? __pfx_kthread+0x10/0x10
[   64.136494]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.136498]  ? calculate_sigpending+0x7b/0xa0
[   64.136502]  ? __pfx_kthread+0x10/0x10
[   64.136506]  ret_from_fork+0x113/0x1d0
[   64.136510]  ? __pfx_kthread+0x10/0x10
[   64.136514]  ret_from_fork_asm+0x1a/0x30
[   64.136520]  </TASK>
[   64.136521] 
[   64.316214] Allocated by task 306:
[   64.319621]  kasan_save_stack+0x45/0x70
[   64.323468]  kasan_save_track+0x18/0x40
[   64.327306]  kasan_save_alloc_info+0x3b/0x50
[   64.331581]  __kasan_kmalloc+0xb7/0xc0
[   64.335361]  __kmalloc_cache_noprof+0x189/0x420
[   64.339918]  kasan_atomics+0x95/0x310
[   64.343591]  kunit_try_run_case+0x1a2/0x480
[   64.347777]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.353178]  kthread+0x334/0x6f0
[   64.356419]  ret_from_fork+0x113/0x1d0
[   64.360171]  ret_from_fork_asm+0x1a/0x30
[   64.364097] 
[   64.365597] The buggy address belongs to the object at ffff8881066eaf00
[   64.365597]  which belongs to the cache kmalloc-64 of size 64
[   64.377938] The buggy address is located 0 bytes to the right of
[   64.377938]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   64.390800] 
[   64.392300] The buggy address belongs to the physical page:
[   64.397871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   64.405870] flags: 0x200000000000000(node=0|zone=2)
[   64.410749] page_type: f5(slab)
[   64.413895] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.421635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.429410] page dumped because: kasan: bad access detected
[   64.434990] 
[   64.436489] Memory state around the buggy address:
[   64.441282]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.448502]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   64.455722] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.462941]                                      ^
[   64.467731]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.474953]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.482171] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   47.304860] ==================================================================
[   47.312100] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.321052] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   47.328445] 
[   47.329946] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   47.329953] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   47.329956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.329959] Call Trace:
[   47.329960]  <TASK>
[   47.329962]  dump_stack_lvl+0x73/0xb0
[   47.329966]  print_report+0xd1/0x650
[   47.329970]  ? __virt_addr_valid+0x1db/0x2d0
[   47.329974]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.329979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.329984]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.329990]  kasan_report+0x141/0x180
[   47.329994]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.330000]  kasan_check_range+0x10c/0x1c0
[   47.330004]  __kasan_check_write+0x18/0x20
[   47.330008]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.330013]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.330018]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.330023]  ? trace_hardirqs_on+0x37/0xe0
[   47.330027]  ? kasan_bitops_generic+0x92/0x1c0
[   47.330032]  kasan_bitops_generic+0x121/0x1c0
[   47.330036]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.330041]  ? ktime_get_ts64+0x83/0x230
[   47.330045]  kunit_try_run_case+0x1a2/0x480
[   47.330050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.330054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.330058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.330062]  ? __kthread_parkme+0x82/0x180
[   47.330066]  ? preempt_count_sub+0x50/0x80
[   47.330070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.330074]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.330078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.330083]  kthread+0x334/0x6f0
[   47.330086]  ? trace_preempt_on+0x20/0xc0
[   47.330090]  ? __pfx_kthread+0x10/0x10
[   47.330094]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.330097]  ? calculate_sigpending+0x7b/0xa0
[   47.330102]  ? __pfx_kthread+0x10/0x10
[   47.330106]  ret_from_fork+0x113/0x1d0
[   47.330109]  ? __pfx_kthread+0x10/0x10
[   47.330113]  ret_from_fork_asm+0x1a/0x30
[   47.330119]  </TASK>
[   47.330120] 
[   47.526904] Allocated by task 302:
[   47.530308]  kasan_save_stack+0x45/0x70
[   47.534149]  kasan_save_track+0x18/0x40
[   47.537986]  kasan_save_alloc_info+0x3b/0x50
[   47.542259]  __kasan_kmalloc+0xb7/0xc0
[   47.546014]  __kmalloc_cache_noprof+0x189/0x420
[   47.550553]  kasan_bitops_generic+0x92/0x1c0
[   47.554827]  kunit_try_run_case+0x1a2/0x480
[   47.559013]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.564411]  kthread+0x334/0x6f0
[   47.567646]  ret_from_fork+0x113/0x1d0
[   47.571409]  ret_from_fork_asm+0x1a/0x30
[   47.575366] 
[   47.576867] The buggy address belongs to the object at ffff8881067131a0
[   47.576867]  which belongs to the cache kmalloc-16 of size 16
[   47.589208] The buggy address is located 8 bytes inside of
[   47.589208]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   47.601462] 
[   47.602963] The buggy address belongs to the physical page:
[   47.608534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   47.616534] flags: 0x200000000000000(node=0|zone=2)
[   47.621413] page_type: f5(slab)
[   47.624561] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.632309] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.640054] page dumped because: kasan: bad access detected
[   47.645626] 
[   47.647117] Memory state around the buggy address:
[   47.651911]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.659130]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.666363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   47.673585]                                   ^
[   47.678120]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.685366]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.692608] ==================================================================
[   48.094842] ==================================================================
[   48.102080] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.111035] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   48.118426] 
[   48.119928] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   48.119936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   48.119939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.119942] Call Trace:
[   48.119943]  <TASK>
[   48.119945]  dump_stack_lvl+0x73/0xb0
[   48.119949]  print_report+0xd1/0x650
[   48.119953]  ? __virt_addr_valid+0x1db/0x2d0
[   48.119957]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.119968]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119973]  kasan_report+0x141/0x180
[   48.119977]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119983]  kasan_check_range+0x10c/0x1c0
[   48.119988]  __kasan_check_write+0x18/0x20
[   48.119992]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119997]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.120003]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.120007]  ? trace_hardirqs_on+0x37/0xe0
[   48.120011]  ? kasan_bitops_generic+0x92/0x1c0
[   48.120016]  kasan_bitops_generic+0x121/0x1c0
[   48.120020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.120025]  ? ktime_get_ts64+0x83/0x230
[   48.120030]  kunit_try_run_case+0x1a2/0x480
[   48.120034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.120038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.120042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.120047]  ? __kthread_parkme+0x82/0x180
[   48.120050]  ? preempt_count_sub+0x50/0x80
[   48.120054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.120059]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.120063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.120067]  kthread+0x334/0x6f0
[   48.120070]  ? trace_preempt_on+0x20/0xc0
[   48.120074]  ? __pfx_kthread+0x10/0x10
[   48.120078]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.120082]  ? calculate_sigpending+0x7b/0xa0
[   48.120086]  ? __pfx_kthread+0x10/0x10
[   48.120090]  ret_from_fork+0x113/0x1d0
[   48.120093]  ? __pfx_kthread+0x10/0x10
[   48.120097]  ret_from_fork_asm+0x1a/0x30
[   48.120103]  </TASK>
[   48.120104] 
[   48.316909] Allocated by task 302:
[   48.320314]  kasan_save_stack+0x45/0x70
[   48.324154]  kasan_save_track+0x18/0x40
[   48.327993]  kasan_save_alloc_info+0x3b/0x50
[   48.332268]  __kasan_kmalloc+0xb7/0xc0
[   48.336019]  __kmalloc_cache_noprof+0x189/0x420
[   48.340552]  kasan_bitops_generic+0x92/0x1c0
[   48.344825]  kunit_try_run_case+0x1a2/0x480
[   48.349009]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.354420]  kthread+0x334/0x6f0
[   48.357651]  ret_from_fork+0x113/0x1d0
[   48.361404]  ret_from_fork_asm+0x1a/0x30
[   48.365348] 
[   48.366856] The buggy address belongs to the object at ffff8881067131a0
[   48.366856]  which belongs to the cache kmalloc-16 of size 16
[   48.379198] The buggy address is located 8 bytes inside of
[   48.379198]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   48.391452] 
[   48.392950] The buggy address belongs to the physical page:
[   48.398524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   48.406530] flags: 0x200000000000000(node=0|zone=2)
[   48.411412] page_type: f5(slab)
[   48.414557] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.422305] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.430043] page dumped because: kasan: bad access detected
[   48.435616] 
[   48.437116] Memory state around the buggy address:
[   48.441909]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.449129]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.456366] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.463610]                                   ^
[   48.468143]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.475365]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.482588] ==================================================================
[   46.909854] ==================================================================
[   46.917092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.926045] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   46.933440] 
[   46.934937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   46.934945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   46.934948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.934951] Call Trace:
[   46.934953]  <TASK>
[   46.934954]  dump_stack_lvl+0x73/0xb0
[   46.934959]  print_report+0xd1/0x650
[   46.934963]  ? __virt_addr_valid+0x1db/0x2d0
[   46.934966]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.934972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.934977]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.934982]  kasan_report+0x141/0x180
[   46.934986]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.934993]  kasan_check_range+0x10c/0x1c0
[   46.934997]  __kasan_check_write+0x18/0x20
[   46.935000]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.935006]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   46.935011]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.935016]  ? trace_hardirqs_on+0x37/0xe0
[   46.935020]  ? kasan_bitops_generic+0x92/0x1c0
[   46.935025]  kasan_bitops_generic+0x121/0x1c0
[   46.935029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.935034]  ? ktime_get_ts64+0x83/0x230
[   46.935038]  kunit_try_run_case+0x1a2/0x480
[   46.935042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.935047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.935051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.935055]  ? __kthread_parkme+0x82/0x180
[   46.935059]  ? preempt_count_sub+0x50/0x80
[   46.935063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.935067]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.935071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.935075]  kthread+0x334/0x6f0
[   46.935079]  ? trace_preempt_on+0x20/0xc0
[   46.935083]  ? __pfx_kthread+0x10/0x10
[   46.935087]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.935090]  ? calculate_sigpending+0x7b/0xa0
[   46.935095]  ? __pfx_kthread+0x10/0x10
[   46.935099]  ret_from_fork+0x113/0x1d0
[   46.935102]  ? __pfx_kthread+0x10/0x10
[   46.935106]  ret_from_fork_asm+0x1a/0x30
[   46.935111]  </TASK>
[   46.935113] 
[   47.131955] Allocated by task 302:
[   47.135364]  kasan_save_stack+0x45/0x70
[   47.139209]  kasan_save_track+0x18/0x40
[   47.143049]  kasan_save_alloc_info+0x3b/0x50
[   47.147322]  __kasan_kmalloc+0xb7/0xc0
[   47.151099]  __kmalloc_cache_noprof+0x189/0x420
[   47.155635]  kasan_bitops_generic+0x92/0x1c0
[   47.159915]  kunit_try_run_case+0x1a2/0x480
[   47.164100]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.169500]  kthread+0x334/0x6f0
[   47.172731]  ret_from_fork+0x113/0x1d0
[   47.176484]  ret_from_fork_asm+0x1a/0x30
[   47.180411] 
[   47.181910] The buggy address belongs to the object at ffff8881067131a0
[   47.181910]  which belongs to the cache kmalloc-16 of size 16
[   47.194243] The buggy address is located 8 bytes inside of
[   47.194243]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   47.206488] 
[   47.207989] The buggy address belongs to the physical page:
[   47.213560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   47.221559] flags: 0x200000000000000(node=0|zone=2)
[   47.226441] page_type: f5(slab)
[   47.229588] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.237351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.245099] page dumped because: kasan: bad access detected
[   47.250673] 
[   47.252170] Memory state around the buggy address:
[   47.256963]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.264184]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.271409] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   47.278630]                                   ^
[   47.283164]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.290404]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.297635] ==================================================================
[   49.674882] ==================================================================
[   49.682128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.691082] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   49.698419] 
[   49.699915] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   49.699923] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   49.699925] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.699929] Call Trace:
[   49.699930]  <TASK>
[   49.699932]  dump_stack_lvl+0x73/0xb0
[   49.699936]  print_report+0xd1/0x650
[   49.699940]  ? __virt_addr_valid+0x1db/0x2d0
[   49.699944]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.699955]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699960]  kasan_report+0x141/0x180
[   49.699964]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699970]  kasan_check_range+0x10c/0x1c0
[   49.699974]  __kasan_check_read+0x15/0x20
[   49.699978]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699983]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.699988]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.699993]  ? trace_hardirqs_on+0x37/0xe0
[   49.699997]  ? kasan_bitops_generic+0x92/0x1c0
[   49.700002]  kasan_bitops_generic+0x121/0x1c0
[   49.700006]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.700011]  ? ktime_get_ts64+0x83/0x230
[   49.700015]  kunit_try_run_case+0x1a2/0x480
[   49.700020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.700024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.700028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.700032]  ? __kthread_parkme+0x82/0x180
[   49.700036]  ? preempt_count_sub+0x50/0x80
[   49.700040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.700045]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.700049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.700053]  kthread+0x334/0x6f0
[   49.700056]  ? trace_preempt_on+0x20/0xc0
[   49.700060]  ? __pfx_kthread+0x10/0x10
[   49.700064]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.700068]  ? calculate_sigpending+0x7b/0xa0
[   49.700072]  ? __pfx_kthread+0x10/0x10
[   49.700076]  ret_from_fork+0x113/0x1d0
[   49.700079]  ? __pfx_kthread+0x10/0x10
[   49.700083]  ret_from_fork_asm+0x1a/0x30
[   49.700089]  </TASK>
[   49.700090] 
[   49.896817] Allocated by task 302:
[   49.900226]  kasan_save_stack+0x45/0x70
[   49.904064]  kasan_save_track+0x18/0x40
[   49.907904]  kasan_save_alloc_info+0x3b/0x50
[   49.912184]  __kasan_kmalloc+0xb7/0xc0
[   49.915938]  __kmalloc_cache_noprof+0x189/0x420
[   49.920468]  kasan_bitops_generic+0x92/0x1c0
[   49.924742]  kunit_try_run_case+0x1a2/0x480
[   49.928927]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.934328]  kthread+0x334/0x6f0
[   49.937585]  ret_from_fork+0x113/0x1d0
[   49.941364]  ret_from_fork_asm+0x1a/0x30
[   49.945316] 
[   49.946817] The buggy address belongs to the object at ffff8881067131a0
[   49.946817]  which belongs to the cache kmalloc-16 of size 16
[   49.959159] The buggy address is located 8 bytes inside of
[   49.959159]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   49.971412] 
[   49.972911] The buggy address belongs to the physical page:
[   49.978483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   49.986484] flags: 0x200000000000000(node=0|zone=2)
[   49.991364] page_type: f5(slab)
[   49.994509] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   50.002248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   50.009988] page dumped because: kasan: bad access detected
[   50.015559] 
[   50.017059] Memory state around the buggy address:
[   50.021854]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.029082]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.036308] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.043528]                                   ^
[   50.048059]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.055279]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.062499] ==================================================================
[   50.069723] ==================================================================
[   50.076962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.085915] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   50.093221] 
[   50.094721] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   50.094729] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   50.094732] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.094735] Call Trace:
[   50.094736]  <TASK>
[   50.094738]  dump_stack_lvl+0x73/0xb0
[   50.094742]  print_report+0xd1/0x650
[   50.094746]  ? __virt_addr_valid+0x1db/0x2d0
[   50.094750]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.094760]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094766]  kasan_report+0x141/0x180
[   50.094770]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094776]  __asan_report_load8_noabort+0x18/0x20
[   50.094781]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094786]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   50.094791]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.094796]  ? trace_hardirqs_on+0x37/0xe0
[   50.094800]  ? kasan_bitops_generic+0x92/0x1c0
[   50.094805]  kasan_bitops_generic+0x121/0x1c0
[   50.094809]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.094814]  ? ktime_get_ts64+0x83/0x230
[   50.094818]  kunit_try_run_case+0x1a2/0x480
[   50.094823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.094827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.094831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.094835]  ? __kthread_parkme+0x82/0x180
[   50.094839]  ? preempt_count_sub+0x50/0x80
[   50.094843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.094847]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.094852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.094856]  kthread+0x334/0x6f0
[   50.094859]  ? trace_preempt_on+0x20/0xc0
[   50.094863]  ? __pfx_kthread+0x10/0x10
[   50.094867]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.094870]  ? calculate_sigpending+0x7b/0xa0
[   50.094875]  ? __pfx_kthread+0x10/0x10
[   50.094879]  ret_from_fork+0x113/0x1d0
[   50.094882]  ? __pfx_kthread+0x10/0x10
[   50.094886]  ret_from_fork_asm+0x1a/0x30
[   50.094892]  </TASK>
[   50.094893] 
[   50.288255] Allocated by task 302:
[   50.291662]  kasan_save_stack+0x45/0x70
[   50.295508]  kasan_save_track+0x18/0x40
[   50.299366]  kasan_save_alloc_info+0x3b/0x50
[   50.303664]  __kasan_kmalloc+0xb7/0xc0
[   50.307416]  __kmalloc_cache_noprof+0x189/0x420
[   50.311948]  kasan_bitops_generic+0x92/0x1c0
[   50.316223]  kunit_try_run_case+0x1a2/0x480
[   50.320409]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.325807]  kthread+0x334/0x6f0
[   50.329039]  ret_from_fork+0x113/0x1d0
[   50.332791]  ret_from_fork_asm+0x1a/0x30
[   50.336720] 
[   50.338220] The buggy address belongs to the object at ffff8881067131a0
[   50.338220]  which belongs to the cache kmalloc-16 of size 16
[   50.350560] The buggy address is located 8 bytes inside of
[   50.350560]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   50.362814] 
[   50.364314] The buggy address belongs to the physical page:
[   50.369888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   50.377893] flags: 0x200000000000000(node=0|zone=2)
[   50.382774] page_type: f5(slab)
[   50.385922] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   50.393667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   50.401406] page dumped because: kasan: bad access detected
[   50.406978] 
[   50.408471] Memory state around the buggy address:
[   50.413264]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.420483]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.427700] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.434922]                                   ^
[   50.439454]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.446673]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.453890] ==================================================================
[   48.884875] ==================================================================
[   48.892115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.901074] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   48.908467] 
[   48.909967] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   48.909975] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   48.909978] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.909981] Call Trace:
[   48.909982]  <TASK>
[   48.909984]  dump_stack_lvl+0x73/0xb0
[   48.909989]  print_report+0xd1/0x650
[   48.909992]  ? __virt_addr_valid+0x1db/0x2d0
[   48.909996]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.910007]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910012]  kasan_report+0x141/0x180
[   48.910016]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910023]  kasan_check_range+0x10c/0x1c0
[   48.910027]  __kasan_check_write+0x18/0x20
[   48.910031]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910036]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.910042]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.910046]  ? trace_hardirqs_on+0x37/0xe0
[   48.910050]  ? kasan_bitops_generic+0x92/0x1c0
[   48.910055]  kasan_bitops_generic+0x121/0x1c0
[   48.910060]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.910065]  ? ktime_get_ts64+0x83/0x230
[   48.910069]  kunit_try_run_case+0x1a2/0x480
[   48.910073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.910077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.910082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.910086]  ? __kthread_parkme+0x82/0x180
[   48.910089]  ? preempt_count_sub+0x50/0x80
[   48.910093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.910098]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.910102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.910106]  kthread+0x334/0x6f0
[   48.910110]  ? trace_preempt_on+0x20/0xc0
[   48.910114]  ? __pfx_kthread+0x10/0x10
[   48.910117]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.910121]  ? calculate_sigpending+0x7b/0xa0
[   48.910126]  ? __pfx_kthread+0x10/0x10
[   48.910130]  ret_from_fork+0x113/0x1d0
[   48.910133]  ? __pfx_kthread+0x10/0x10
[   48.910137]  ret_from_fork_asm+0x1a/0x30
[   48.910142]  </TASK>
[   48.910144] 
[   49.106968] Allocated by task 302:
[   49.110373]  kasan_save_stack+0x45/0x70
[   49.114214]  kasan_save_track+0x18/0x40
[   49.118052]  kasan_save_alloc_info+0x3b/0x50
[   49.122324]  __kasan_kmalloc+0xb7/0xc0
[   49.126103]  __kmalloc_cache_noprof+0x189/0x420
[   49.130636]  kasan_bitops_generic+0x92/0x1c0
[   49.134908]  kunit_try_run_case+0x1a2/0x480
[   49.139094]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.144495]  kthread+0x334/0x6f0
[   49.147726]  ret_from_fork+0x113/0x1d0
[   49.151478]  ret_from_fork_asm+0x1a/0x30
[   49.155408] 
[   49.156904] The buggy address belongs to the object at ffff8881067131a0
[   49.156904]  which belongs to the cache kmalloc-16 of size 16
[   49.169239] The buggy address is located 8 bytes inside of
[   49.169239]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   49.181493] 
[   49.182991] The buggy address belongs to the physical page:
[   49.188563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   49.196563] flags: 0x200000000000000(node=0|zone=2)
[   49.201444] page_type: f5(slab)
[   49.204591] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.212365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.220128] page dumped because: kasan: bad access detected
[   49.225700] 
[   49.227200] Memory state around the buggy address:
[   49.231992]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.239211]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.246431] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.253650]                                   ^
[   49.258185]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.265414]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.272631] ==================================================================
[   48.489815] ==================================================================
[   48.497053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.506008] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   48.513408] 
[   48.514909] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   48.514917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   48.514920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.514923] Call Trace:
[   48.514925]  <TASK>
[   48.514926]  dump_stack_lvl+0x73/0xb0
[   48.514930]  print_report+0xd1/0x650
[   48.514934]  ? __virt_addr_valid+0x1db/0x2d0
[   48.514938]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.514949]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514954]  kasan_report+0x141/0x180
[   48.514958]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514964]  kasan_check_range+0x10c/0x1c0
[   48.514969]  __kasan_check_write+0x18/0x20
[   48.514972]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514977]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.514983]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.514988]  ? trace_hardirqs_on+0x37/0xe0
[   48.514992]  ? kasan_bitops_generic+0x92/0x1c0
[   48.514997]  kasan_bitops_generic+0x121/0x1c0
[   48.515001]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.515006]  ? ktime_get_ts64+0x83/0x230
[   48.515010]  kunit_try_run_case+0x1a2/0x480
[   48.515014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.515019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.515023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.515027]  ? __kthread_parkme+0x82/0x180
[   48.515031]  ? preempt_count_sub+0x50/0x80
[   48.515035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.515039]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.515043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.515048]  kthread+0x334/0x6f0
[   48.515051]  ? trace_preempt_on+0x20/0xc0
[   48.515055]  ? __pfx_kthread+0x10/0x10
[   48.515059]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.515063]  ? calculate_sigpending+0x7b/0xa0
[   48.515067]  ? __pfx_kthread+0x10/0x10
[   48.515071]  ret_from_fork+0x113/0x1d0
[   48.515074]  ? __pfx_kthread+0x10/0x10
[   48.515078]  ret_from_fork_asm+0x1a/0x30
[   48.515084]  </TASK>
[   48.515085] 
[   48.711969] Allocated by task 302:
[   48.715375]  kasan_save_stack+0x45/0x70
[   48.719241]  kasan_save_track+0x18/0x40
[   48.723081]  kasan_save_alloc_info+0x3b/0x50
[   48.727365]  __kasan_kmalloc+0xb7/0xc0
[   48.731138]  __kmalloc_cache_noprof+0x189/0x420
[   48.735673]  kasan_bitops_generic+0x92/0x1c0
[   48.739955]  kunit_try_run_case+0x1a2/0x480
[   48.744149]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.749546]  kthread+0x334/0x6f0
[   48.752781]  ret_from_fork+0x113/0x1d0
[   48.756532]  ret_from_fork_asm+0x1a/0x30
[   48.760458] 
[   48.761958] The buggy address belongs to the object at ffff8881067131a0
[   48.761958]  which belongs to the cache kmalloc-16 of size 16
[   48.774301] The buggy address is located 8 bytes inside of
[   48.774301]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   48.786553] 
[   48.788053] The buggy address belongs to the physical page:
[   48.793627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   48.801634] flags: 0x200000000000000(node=0|zone=2)
[   48.806513] page_type: f5(slab)
[   48.809659] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.817413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.825155] page dumped because: kasan: bad access detected
[   48.830729] 
[   48.832227] Memory state around the buggy address:
[   48.837019]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.844238]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.851459] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.858679]                                   ^
[   48.863212]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.870430]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.877648] ==================================================================
[   49.279856] ==================================================================
[   49.287094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.296049] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   49.303449] 
[   49.304951] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   49.304958] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   49.304961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.304964] Call Trace:
[   49.304966]  <TASK>
[   49.304968]  dump_stack_lvl+0x73/0xb0
[   49.304972]  print_report+0xd1/0x650
[   49.304976]  ? __virt_addr_valid+0x1db/0x2d0
[   49.304980]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.304985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.304990]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.304996]  kasan_report+0x141/0x180
[   49.305000]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.305006]  kasan_check_range+0x10c/0x1c0
[   49.305010]  __kasan_check_write+0x18/0x20
[   49.305014]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.305019]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.305024]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.305029]  ? trace_hardirqs_on+0x37/0xe0
[   49.305033]  ? kasan_bitops_generic+0x92/0x1c0
[   49.305038]  kasan_bitops_generic+0x121/0x1c0
[   49.305042]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.305047]  ? ktime_get_ts64+0x83/0x230
[   49.305051]  kunit_try_run_case+0x1a2/0x480
[   49.305056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.305060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.305064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.305068]  ? __kthread_parkme+0x82/0x180
[   49.305072]  ? preempt_count_sub+0x50/0x80
[   49.305076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.305080]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.305085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.305089]  kthread+0x334/0x6f0
[   49.305092]  ? trace_preempt_on+0x20/0xc0
[   49.305096]  ? __pfx_kthread+0x10/0x10
[   49.305100]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.305104]  ? calculate_sigpending+0x7b/0xa0
[   49.305108]  ? __pfx_kthread+0x10/0x10
[   49.305112]  ret_from_fork+0x113/0x1d0
[   49.305115]  ? __pfx_kthread+0x10/0x10
[   49.305119]  ret_from_fork_asm+0x1a/0x30
[   49.305125]  </TASK>
[   49.305126] 
[   49.501966] Allocated by task 302:
[   49.505395]  kasan_save_stack+0x45/0x70
[   49.509239]  kasan_save_track+0x18/0x40
[   49.513079]  kasan_save_alloc_info+0x3b/0x50
[   49.517366]  __kasan_kmalloc+0xb7/0xc0
[   49.521146]  __kmalloc_cache_noprof+0x189/0x420
[   49.525687]  kasan_bitops_generic+0x92/0x1c0
[   49.529961]  kunit_try_run_case+0x1a2/0x480
[   49.534154]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.539555]  kthread+0x334/0x6f0
[   49.542787]  ret_from_fork+0x113/0x1d0
[   49.546540]  ret_from_fork_asm+0x1a/0x30
[   49.550466] 
[   49.551964] The buggy address belongs to the object at ffff8881067131a0
[   49.551964]  which belongs to the cache kmalloc-16 of size 16
[   49.564299] The buggy address is located 8 bytes inside of
[   49.564299]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   49.576551] 
[   49.578051] The buggy address belongs to the physical page:
[   49.583623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   49.591622] flags: 0x200000000000000(node=0|zone=2)
[   49.596502] page_type: f5(slab)
[   49.599650] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.607409] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.615154] page dumped because: kasan: bad access detected
[   49.620727] 
[   49.622224] Memory state around the buggy address:
[   49.627018]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.634236]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.641457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.648674]                                   ^
[   49.653208]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.660429]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.667657] ==================================================================
[   47.699836] ==================================================================
[   47.707082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.716043] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   47.723435] 
[   47.724937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   47.724945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   47.724948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.724951] Call Trace:
[   47.724953]  <TASK>
[   47.724954]  dump_stack_lvl+0x73/0xb0
[   47.724959]  print_report+0xd1/0x650
[   47.724963]  ? __virt_addr_valid+0x1db/0x2d0
[   47.724966]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.724972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.724977]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.724982]  kasan_report+0x141/0x180
[   47.724986]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.724992]  kasan_check_range+0x10c/0x1c0
[   47.724997]  __kasan_check_write+0x18/0x20
[   47.725000]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.725005]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.725011]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.725015]  ? trace_hardirqs_on+0x37/0xe0
[   47.725019]  ? kasan_bitops_generic+0x92/0x1c0
[   47.725024]  kasan_bitops_generic+0x121/0x1c0
[   47.725028]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.725033]  ? ktime_get_ts64+0x83/0x230
[   47.725038]  kunit_try_run_case+0x1a2/0x480
[   47.725042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.725046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.725050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.725054]  ? __kthread_parkme+0x82/0x180
[   47.725058]  ? preempt_count_sub+0x50/0x80
[   47.725062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.725067]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.725071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.725075]  kthread+0x334/0x6f0
[   47.725078]  ? trace_preempt_on+0x20/0xc0
[   47.725082]  ? __pfx_kthread+0x10/0x10
[   47.725086]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.725090]  ? calculate_sigpending+0x7b/0xa0
[   47.725094]  ? __pfx_kthread+0x10/0x10
[   47.725098]  ret_from_fork+0x113/0x1d0
[   47.725101]  ? __pfx_kthread+0x10/0x10
[   47.725105]  ret_from_fork_asm+0x1a/0x30
[   47.725111]  </TASK>
[   47.725112] 
[   47.921901] Allocated by task 302:
[   47.925309]  kasan_save_stack+0x45/0x70
[   47.929147]  kasan_save_track+0x18/0x40
[   47.932985]  kasan_save_alloc_info+0x3b/0x50
[   47.937259]  __kasan_kmalloc+0xb7/0xc0
[   47.941012]  __kmalloc_cache_noprof+0x189/0x420
[   47.945545]  kasan_bitops_generic+0x92/0x1c0
[   47.949816]  kunit_try_run_case+0x1a2/0x480
[   47.954004]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.959413]  kthread+0x334/0x6f0
[   47.962644]  ret_from_fork+0x113/0x1d0
[   47.966417]  ret_from_fork_asm+0x1a/0x30
[   47.970363] 
[   47.971863] The buggy address belongs to the object at ffff8881067131a0
[   47.971863]  which belongs to the cache kmalloc-16 of size 16
[   47.984199] The buggy address is located 8 bytes inside of
[   47.984199]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   47.996451] 
[   47.997952] The buggy address belongs to the physical page:
[   48.003524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   48.011524] flags: 0x200000000000000(node=0|zone=2)
[   48.016404] page_type: f5(slab)
[   48.019550] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.027296] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.035037] page dumped because: kasan: bad access detected
[   48.040607] 
[   48.042108] Memory state around the buggy address:
[   48.046902]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.054129]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.061363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.068612]                                   ^
[   48.073145]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.080373]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.087618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   45.739150] ==================================================================
[   45.746418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.754596] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   45.761995] 
[   45.763497] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   45.763504] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   45.763507] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.763510] Call Trace:
[   45.763512]  <TASK>
[   45.763513]  dump_stack_lvl+0x73/0xb0
[   45.763518]  print_report+0xd1/0x650
[   45.763521]  ? __virt_addr_valid+0x1db/0x2d0
[   45.763525]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.763535]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763540]  kasan_report+0x141/0x180
[   45.763544]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763550]  kasan_check_range+0x10c/0x1c0
[   45.763555]  __kasan_check_write+0x18/0x20
[   45.763558]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763563]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.763568]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.763572]  ? trace_hardirqs_on+0x37/0xe0
[   45.763576]  ? kasan_bitops_generic+0x92/0x1c0
[   45.763581]  kasan_bitops_generic+0x116/0x1c0
[   45.763586]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.763591]  ? ktime_get_ts64+0x83/0x230
[   45.763595]  kunit_try_run_case+0x1a2/0x480
[   45.763599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.763604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.763608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.763612]  ? __kthread_parkme+0x82/0x180
[   45.763616]  ? preempt_count_sub+0x50/0x80
[   45.763620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.763624]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.763628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.763632]  kthread+0x334/0x6f0
[   45.763636]  ? trace_preempt_on+0x20/0xc0
[   45.763640]  ? __pfx_kthread+0x10/0x10
[   45.763644]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.763647]  ? calculate_sigpending+0x7b/0xa0
[   45.763652]  ? __pfx_kthread+0x10/0x10
[   45.763656]  ret_from_fork+0x113/0x1d0
[   45.763659]  ? __pfx_kthread+0x10/0x10
[   45.763663]  ret_from_fork_asm+0x1a/0x30
[   45.763669]  </TASK>
[   45.763670] 
[   45.956552] Allocated by task 302:
[   45.959960]  kasan_save_stack+0x45/0x70
[   45.963800]  kasan_save_track+0x18/0x40
[   45.967639]  kasan_save_alloc_info+0x3b/0x50
[   45.971921]  __kasan_kmalloc+0xb7/0xc0
[   45.975673]  __kmalloc_cache_noprof+0x189/0x420
[   45.980214]  kasan_bitops_generic+0x92/0x1c0
[   45.984495]  kunit_try_run_case+0x1a2/0x480
[   45.988680]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.994080]  kthread+0x334/0x6f0
[   45.997312]  ret_from_fork+0x113/0x1d0
[   46.001064]  ret_from_fork_asm+0x1a/0x30
[   46.004992] 
[   46.006489] The buggy address belongs to the object at ffff8881067131a0
[   46.006489]  which belongs to the cache kmalloc-16 of size 16
[   46.018824] The buggy address is located 8 bytes inside of
[   46.018824]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   46.031079] 
[   46.032578] The buggy address belongs to the physical page:
[   46.038151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   46.046157] flags: 0x200000000000000(node=0|zone=2)
[   46.051037] page_type: f5(slab)
[   46.054183] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.061922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.069662] page dumped because: kasan: bad access detected
[   46.075236] 
[   46.076733] Memory state around the buggy address:
[   46.081526]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.088747]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.095965] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.103184]                                   ^
[   46.107716]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.114936]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.122157] ==================================================================
[   43.783794] ==================================================================
[   43.794890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.803069] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   43.810464] 
[   43.811963] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   43.811971] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   43.811974] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.811977] Call Trace:
[   43.811979]  <TASK>
[   43.811980]  dump_stack_lvl+0x73/0xb0
[   43.811985]  print_report+0xd1/0x650
[   43.811989]  ? __virt_addr_valid+0x1db/0x2d0
[   43.811993]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.811998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.812003]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.812008]  kasan_report+0x141/0x180
[   43.812012]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.812018]  kasan_check_range+0x10c/0x1c0
[   43.812022]  __kasan_check_write+0x18/0x20
[   43.812026]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.812030]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   43.812036]  ? __kmalloc_cache_noprof+0x189/0x420
[   43.812040]  ? trace_hardirqs_on+0x37/0xe0
[   43.812044]  ? kasan_bitops_generic+0x92/0x1c0
[   43.812049]  kasan_bitops_generic+0x116/0x1c0
[   43.812054]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   43.812059]  ? ktime_get_ts64+0x83/0x230
[   43.812063]  kunit_try_run_case+0x1a2/0x480
[   43.812067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.812072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.812076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.812080]  ? __kthread_parkme+0x82/0x180
[   43.812084]  ? preempt_count_sub+0x50/0x80
[   43.812088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.812092]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.812096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.812101]  kthread+0x334/0x6f0
[   43.812104]  ? trace_preempt_on+0x20/0xc0
[   43.812108]  ? __pfx_kthread+0x10/0x10
[   43.812112]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.812116]  ? calculate_sigpending+0x7b/0xa0
[   43.812120]  ? __pfx_kthread+0x10/0x10
[   43.812124]  ret_from_fork+0x113/0x1d0
[   43.812128]  ? __pfx_kthread+0x10/0x10
[   43.812131]  ret_from_fork_asm+0x1a/0x30
[   43.812137]  </TASK>
[   43.812139] 
[   44.005047] Allocated by task 302:
[   44.008451]  kasan_save_stack+0x45/0x70
[   44.012291]  kasan_save_track+0x18/0x40
[   44.016130]  kasan_save_alloc_info+0x3b/0x50
[   44.020402]  __kasan_kmalloc+0xb7/0xc0
[   44.024156]  __kmalloc_cache_noprof+0x189/0x420
[   44.028687]  kasan_bitops_generic+0x92/0x1c0
[   44.032960]  kunit_try_run_case+0x1a2/0x480
[   44.037147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.042546]  kthread+0x334/0x6f0
[   44.045780]  ret_from_fork+0x113/0x1d0
[   44.049530]  ret_from_fork_asm+0x1a/0x30
[   44.053456] 
[   44.054956] The buggy address belongs to the object at ffff8881067131a0
[   44.054956]  which belongs to the cache kmalloc-16 of size 16
[   44.067298] The buggy address is located 8 bytes inside of
[   44.067298]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   44.079553] 
[   44.081050] The buggy address belongs to the physical page:
[   44.086625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   44.094632] flags: 0x200000000000000(node=0|zone=2)
[   44.099512] page_type: f5(slab)
[   44.102658] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.110411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.118155] page dumped because: kasan: bad access detected
[   44.123726] 
[   44.125226] Memory state around the buggy address:
[   44.130019]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.137237]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.144457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.151678]                                   ^
[   44.156210]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.163427]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.170648] ==================================================================
[   44.177897] ==================================================================
[   44.185146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.193318] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   44.200739] 
[   44.202238] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   44.202246] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   44.202249] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.202252] Call Trace:
[   44.202254]  <TASK>
[   44.202255]  dump_stack_lvl+0x73/0xb0
[   44.202260]  print_report+0xd1/0x650
[   44.202264]  ? __virt_addr_valid+0x1db/0x2d0
[   44.202267]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.202277]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202282]  kasan_report+0x141/0x180
[   44.202286]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202292]  kasan_check_range+0x10c/0x1c0
[   44.202296]  __kasan_check_write+0x18/0x20
[   44.202300]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202305]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.202310]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.202315]  ? trace_hardirqs_on+0x37/0xe0
[   44.202318]  ? kasan_bitops_generic+0x92/0x1c0
[   44.202324]  kasan_bitops_generic+0x116/0x1c0
[   44.202328]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.202350]  ? ktime_get_ts64+0x83/0x230
[   44.202354]  kunit_try_run_case+0x1a2/0x480
[   44.202359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.202363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.202368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.202372]  ? __kthread_parkme+0x82/0x180
[   44.202376]  ? preempt_count_sub+0x50/0x80
[   44.202380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.202385]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.202402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.202406]  kthread+0x334/0x6f0
[   44.202409]  ? trace_preempt_on+0x20/0xc0
[   44.202413]  ? __pfx_kthread+0x10/0x10
[   44.202417]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.202421]  ? calculate_sigpending+0x7b/0xa0
[   44.202426]  ? __pfx_kthread+0x10/0x10
[   44.202430]  ret_from_fork+0x113/0x1d0
[   44.202433]  ? __pfx_kthread+0x10/0x10
[   44.202437]  ret_from_fork_asm+0x1a/0x30
[   44.202443]  </TASK>
[   44.202444] 
[   44.395366] Allocated by task 302:
[   44.398798]  kasan_save_stack+0x45/0x70
[   44.402646]  kasan_save_track+0x18/0x40
[   44.406494]  kasan_save_alloc_info+0x3b/0x50
[   44.410774]  __kasan_kmalloc+0xb7/0xc0
[   44.414527]  __kmalloc_cache_noprof+0x189/0x420
[   44.419069]  kasan_bitops_generic+0x92/0x1c0
[   44.423365]  kunit_try_run_case+0x1a2/0x480
[   44.427580]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.432986]  kthread+0x334/0x6f0
[   44.436218]  ret_from_fork+0x113/0x1d0
[   44.439973]  ret_from_fork_asm+0x1a/0x30
[   44.443906] 
[   44.445406] The buggy address belongs to the object at ffff8881067131a0
[   44.445406]  which belongs to the cache kmalloc-16 of size 16
[   44.457747] The buggy address is located 8 bytes inside of
[   44.457747]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   44.470002] 
[   44.471502] The buggy address belongs to the physical page:
[   44.477073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   44.485074] flags: 0x200000000000000(node=0|zone=2)
[   44.489951] page_type: f5(slab)
[   44.493099] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.500837] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.508576] page dumped because: kasan: bad access detected
[   44.514150] 
[   44.515649] Memory state around the buggy address:
[   44.520443]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.527661]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.534880] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.542100]                                   ^
[   44.546633]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.553861]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.561079] ==================================================================
[   46.129394] ==================================================================
[   46.136636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.144810] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   46.152204] 
[   46.153704] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   46.153712] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   46.153714] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.153717] Call Trace:
[   46.153719]  <TASK>
[   46.153721]  dump_stack_lvl+0x73/0xb0
[   46.153725]  print_report+0xd1/0x650
[   46.153729]  ? __virt_addr_valid+0x1db/0x2d0
[   46.153733]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.153743]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153748]  kasan_report+0x141/0x180
[   46.153752]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153758]  kasan_check_range+0x10c/0x1c0
[   46.153762]  __kasan_check_write+0x18/0x20
[   46.153765]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153770]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   46.153775]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.153780]  ? trace_hardirqs_on+0x37/0xe0
[   46.153784]  ? kasan_bitops_generic+0x92/0x1c0
[   46.153789]  kasan_bitops_generic+0x116/0x1c0
[   46.153793]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.153798]  ? ktime_get_ts64+0x83/0x230
[   46.153803]  kunit_try_run_case+0x1a2/0x480
[   46.153807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.153811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.153816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.153820]  ? __kthread_parkme+0x82/0x180
[   46.153823]  ? preempt_count_sub+0x50/0x80
[   46.153828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.153832]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.153836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.153841]  kthread+0x334/0x6f0
[   46.153844]  ? trace_preempt_on+0x20/0xc0
[   46.153848]  ? __pfx_kthread+0x10/0x10
[   46.153852]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.153855]  ? calculate_sigpending+0x7b/0xa0
[   46.153860]  ? __pfx_kthread+0x10/0x10
[   46.153864]  ret_from_fork+0x113/0x1d0
[   46.153867]  ? __pfx_kthread+0x10/0x10
[   46.153871]  ret_from_fork_asm+0x1a/0x30
[   46.153876]  </TASK>
[   46.153878] 
[   46.346759] Allocated by task 302:
[   46.350165]  kasan_save_stack+0x45/0x70
[   46.354004]  kasan_save_track+0x18/0x40
[   46.357843]  kasan_save_alloc_info+0x3b/0x50
[   46.362116]  __kasan_kmalloc+0xb7/0xc0
[   46.365870]  __kmalloc_cache_noprof+0x189/0x420
[   46.370421]  kasan_bitops_generic+0x92/0x1c0
[   46.374701]  kunit_try_run_case+0x1a2/0x480
[   46.378886]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.384287]  kthread+0x334/0x6f0
[   46.387518]  ret_from_fork+0x113/0x1d0
[   46.391272]  ret_from_fork_asm+0x1a/0x30
[   46.395206] 
[   46.396705] The buggy address belongs to the object at ffff8881067131a0
[   46.396705]  which belongs to the cache kmalloc-16 of size 16
[   46.409048] The buggy address is located 8 bytes inside of
[   46.409048]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   46.421302] 
[   46.422801] The buggy address belongs to the physical page:
[   46.428374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   46.436411] flags: 0x200000000000000(node=0|zone=2)
[   46.441295] page_type: f5(slab)
[   46.444441] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.452183] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.459927] page dumped because: kasan: bad access detected
[   46.465501] 
[   46.467000] Memory state around the buggy address:
[   46.471795]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.479013]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.486232] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.493451]                                   ^
[   46.497984]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.505205]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.512432] ==================================================================
[   44.568305] ==================================================================
[   44.575578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.583752] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   44.591142] 
[   44.592634] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   44.592643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   44.592645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.592648] Call Trace:
[   44.592650]  <TASK>
[   44.592651]  dump_stack_lvl+0x73/0xb0
[   44.592656]  print_report+0xd1/0x650
[   44.592659]  ? __virt_addr_valid+0x1db/0x2d0
[   44.592663]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.592673]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592678]  kasan_report+0x141/0x180
[   44.592682]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592688]  kasan_check_range+0x10c/0x1c0
[   44.592692]  __kasan_check_write+0x18/0x20
[   44.592695]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592700]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.592705]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.592710]  ? trace_hardirqs_on+0x37/0xe0
[   44.592714]  ? kasan_bitops_generic+0x92/0x1c0
[   44.592719]  kasan_bitops_generic+0x116/0x1c0
[   44.592723]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.592728]  ? ktime_get_ts64+0x83/0x230
[   44.592733]  kunit_try_run_case+0x1a2/0x480
[   44.592737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.592741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.592745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.592750]  ? __kthread_parkme+0x82/0x180
[   44.592753]  ? preempt_count_sub+0x50/0x80
[   44.592757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.592762]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.592766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.592770]  kthread+0x334/0x6f0
[   44.592774]  ? trace_preempt_on+0x20/0xc0
[   44.592778]  ? __pfx_kthread+0x10/0x10
[   44.592781]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.592785]  ? calculate_sigpending+0x7b/0xa0
[   44.592790]  ? __pfx_kthread+0x10/0x10
[   44.592793]  ret_from_fork+0x113/0x1d0
[   44.592797]  ? __pfx_kthread+0x10/0x10
[   44.592800]  ret_from_fork_asm+0x1a/0x30
[   44.592806]  </TASK>
[   44.592808] 
[   44.785657] Allocated by task 302:
[   44.789062]  kasan_save_stack+0x45/0x70
[   44.792902]  kasan_save_track+0x18/0x40
[   44.796742]  kasan_save_alloc_info+0x3b/0x50
[   44.801013]  __kasan_kmalloc+0xb7/0xc0
[   44.804767]  __kmalloc_cache_noprof+0x189/0x420
[   44.809300]  kasan_bitops_generic+0x92/0x1c0
[   44.813571]  kunit_try_run_case+0x1a2/0x480
[   44.817757]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.823159]  kthread+0x334/0x6f0
[   44.826411]  ret_from_fork+0x113/0x1d0
[   44.830168]  ret_from_fork_asm+0x1a/0x30
[   44.834096] 
[   44.835596] The buggy address belongs to the object at ffff8881067131a0
[   44.835596]  which belongs to the cache kmalloc-16 of size 16
[   44.847936] The buggy address is located 8 bytes inside of
[   44.847936]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   44.860191] 
[   44.861688] The buggy address belongs to the physical page:
[   44.867262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   44.875261] flags: 0x200000000000000(node=0|zone=2)
[   44.880140] page_type: f5(slab)
[   44.883287] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.891028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.898774] page dumped because: kasan: bad access detected
[   44.904362] 
[   44.905864] Memory state around the buggy address:
[   44.910656]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.917876]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.925096] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.932314]                                   ^
[   44.936847]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.944066]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.951284] ==================================================================
[   44.958529] ==================================================================
[   44.965758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.973931] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   44.981323] 
[   44.982851] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   44.982859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   44.982862] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.982865] Call Trace:
[   44.982866]  <TASK>
[   44.982868]  dump_stack_lvl+0x73/0xb0
[   44.982872]  print_report+0xd1/0x650
[   44.982876]  ? __virt_addr_valid+0x1db/0x2d0
[   44.982880]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.982890]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982895]  kasan_report+0x141/0x180
[   44.982899]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982905]  kasan_check_range+0x10c/0x1c0
[   44.982909]  __kasan_check_write+0x18/0x20
[   44.982912]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982917]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.982922]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.982927]  ? trace_hardirqs_on+0x37/0xe0
[   44.982931]  ? kasan_bitops_generic+0x92/0x1c0
[   44.982936]  kasan_bitops_generic+0x116/0x1c0
[   44.982940]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.982945]  ? ktime_get_ts64+0x83/0x230
[   44.982949]  kunit_try_run_case+0x1a2/0x480
[   44.982954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.982958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.982962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.982966]  ? __kthread_parkme+0x82/0x180
[   44.982970]  ? preempt_count_sub+0x50/0x80
[   44.982974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.982979]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.982983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.982987]  kthread+0x334/0x6f0
[   44.982991]  ? trace_preempt_on+0x20/0xc0
[   44.982995]  ? __pfx_kthread+0x10/0x10
[   44.982998]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.983002]  ? calculate_sigpending+0x7b/0xa0
[   44.983007]  ? __pfx_kthread+0x10/0x10
[   44.983010]  ret_from_fork+0x113/0x1d0
[   44.983014]  ? __pfx_kthread+0x10/0x10
[   44.983017]  ret_from_fork_asm+0x1a/0x30
[   44.983023]  </TASK>
[   44.983025] 
[   45.175959] Allocated by task 302:
[   45.179364]  kasan_save_stack+0x45/0x70
[   45.183206]  kasan_save_track+0x18/0x40
[   45.187043]  kasan_save_alloc_info+0x3b/0x50
[   45.191315]  __kasan_kmalloc+0xb7/0xc0
[   45.195096]  __kmalloc_cache_noprof+0x189/0x420
[   45.199635]  kasan_bitops_generic+0x92/0x1c0
[   45.203910]  kunit_try_run_case+0x1a2/0x480
[   45.208103]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.213502]  kthread+0x334/0x6f0
[   45.216736]  ret_from_fork+0x113/0x1d0
[   45.220487]  ret_from_fork_asm+0x1a/0x30
[   45.224415] 
[   45.225914] The buggy address belongs to the object at ffff8881067131a0
[   45.225914]  which belongs to the cache kmalloc-16 of size 16
[   45.238256] The buggy address is located 8 bytes inside of
[   45.238256]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   45.250509] 
[   45.252008] The buggy address belongs to the physical page:
[   45.257583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   45.265588] flags: 0x200000000000000(node=0|zone=2)
[   45.270468] page_type: f5(slab)
[   45.273616] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.281364] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.289129] page dumped because: kasan: bad access detected
[   45.294700] 
[   45.296200] Memory state around the buggy address:
[   45.300992]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.308211]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.315433] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.322660]                                   ^
[   45.327193]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.334422]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.341639] ==================================================================
[   45.348864] ==================================================================
[   45.356105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.364286] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   45.371686] 
[   45.373186] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   45.373194] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   45.373197] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.373200] Call Trace:
[   45.373201]  <TASK>
[   45.373203]  dump_stack_lvl+0x73/0xb0
[   45.373207]  print_report+0xd1/0x650
[   45.373211]  ? __virt_addr_valid+0x1db/0x2d0
[   45.373215]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.373225]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373230]  kasan_report+0x141/0x180
[   45.373234]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373240]  kasan_check_range+0x10c/0x1c0
[   45.373244]  __kasan_check_write+0x18/0x20
[   45.373247]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373252]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.373257]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.373262]  ? trace_hardirqs_on+0x37/0xe0
[   45.373266]  ? kasan_bitops_generic+0x92/0x1c0
[   45.373271]  kasan_bitops_generic+0x116/0x1c0
[   45.373275]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.373280]  ? ktime_get_ts64+0x83/0x230
[   45.373284]  kunit_try_run_case+0x1a2/0x480
[   45.373289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.373293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.373297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.373302]  ? __kthread_parkme+0x82/0x180
[   45.373305]  ? preempt_count_sub+0x50/0x80
[   45.373309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.373314]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.373318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.373322]  kthread+0x334/0x6f0
[   45.373326]  ? trace_preempt_on+0x20/0xc0
[   45.373347]  ? __pfx_kthread+0x10/0x10
[   45.373351]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.373354]  ? calculate_sigpending+0x7b/0xa0
[   45.373359]  ? __pfx_kthread+0x10/0x10
[   45.373363]  ret_from_fork+0x113/0x1d0
[   45.373367]  ? __pfx_kthread+0x10/0x10
[   45.373370]  ret_from_fork_asm+0x1a/0x30
[   45.373389]  </TASK>
[   45.373390] 
[   45.566271] Allocated by task 302:
[   45.569675]  kasan_save_stack+0x45/0x70
[   45.573515]  kasan_save_track+0x18/0x40
[   45.577366]  kasan_save_alloc_info+0x3b/0x50
[   45.581661]  __kasan_kmalloc+0xb7/0xc0
[   45.585414]  __kmalloc_cache_noprof+0x189/0x420
[   45.589945]  kasan_bitops_generic+0x92/0x1c0
[   45.594220]  kunit_try_run_case+0x1a2/0x480
[   45.598420]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.603823]  kthread+0x334/0x6f0
[   45.607054]  ret_from_fork+0x113/0x1d0
[   45.610807]  ret_from_fork_asm+0x1a/0x30
[   45.614735] 
[   45.616233] The buggy address belongs to the object at ffff8881067131a0
[   45.616233]  which belongs to the cache kmalloc-16 of size 16
[   45.628574] The buggy address is located 8 bytes inside of
[   45.628574]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   45.640829] 
[   45.642328] The buggy address belongs to the physical page:
[   45.647926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   45.655925] flags: 0x200000000000000(node=0|zone=2)
[   45.660804] page_type: f5(slab)
[   45.663951] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.671691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.679429] page dumped because: kasan: bad access detected
[   45.685003] 
[   45.686502] Memory state around the buggy address:
[   45.691294]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.698514]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.705732] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.712951]                                   ^
[   45.717486]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.724704]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.731923] ==================================================================
[   46.519656] ==================================================================
[   46.526895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.535068] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   46.542460] 
[   46.543962] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   46.543969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   46.543972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.543975] Call Trace:
[   46.543977]  <TASK>
[   46.543979]  dump_stack_lvl+0x73/0xb0
[   46.543983]  print_report+0xd1/0x650
[   46.543987]  ? __virt_addr_valid+0x1db/0x2d0
[   46.543991]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.543996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.544001]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.544005]  kasan_report+0x141/0x180
[   46.544010]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.544015]  kasan_check_range+0x10c/0x1c0
[   46.544020]  __kasan_check_write+0x18/0x20
[   46.544023]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.544028]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   46.544033]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.544038]  ? trace_hardirqs_on+0x37/0xe0
[   46.544042]  ? kasan_bitops_generic+0x92/0x1c0
[   46.544047]  kasan_bitops_generic+0x116/0x1c0
[   46.544051]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.544056]  ? ktime_get_ts64+0x83/0x230
[   46.544060]  kunit_try_run_case+0x1a2/0x480
[   46.544065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.544069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.544073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.544077]  ? __kthread_parkme+0x82/0x180
[   46.544081]  ? preempt_count_sub+0x50/0x80
[   46.544085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.544089]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.544094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.544098]  kthread+0x334/0x6f0
[   46.544101]  ? trace_preempt_on+0x20/0xc0
[   46.544105]  ? __pfx_kthread+0x10/0x10
[   46.544109]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.544113]  ? calculate_sigpending+0x7b/0xa0
[   46.544117]  ? __pfx_kthread+0x10/0x10
[   46.544121]  ret_from_fork+0x113/0x1d0
[   46.544124]  ? __pfx_kthread+0x10/0x10
[   46.544128]  ret_from_fork_asm+0x1a/0x30
[   46.544134]  </TASK>
[   46.544135] 
[   46.737036] Allocated by task 302:
[   46.740440]  kasan_save_stack+0x45/0x70
[   46.744280]  kasan_save_track+0x18/0x40
[   46.748119]  kasan_save_alloc_info+0x3b/0x50
[   46.752407]  __kasan_kmalloc+0xb7/0xc0
[   46.756162]  __kmalloc_cache_noprof+0x189/0x420
[   46.760694]  kasan_bitops_generic+0x92/0x1c0
[   46.764966]  kunit_try_run_case+0x1a2/0x480
[   46.769154]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.774554]  kthread+0x334/0x6f0
[   46.777786]  ret_from_fork+0x113/0x1d0
[   46.781539]  ret_from_fork_asm+0x1a/0x30
[   46.785466] 
[   46.786962] The buggy address belongs to the object at ffff8881067131a0
[   46.786962]  which belongs to the cache kmalloc-16 of size 16
[   46.799295] The buggy address is located 8 bytes inside of
[   46.799295]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   46.811552] 
[   46.813049] The buggy address belongs to the physical page:
[   46.818623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   46.826622] flags: 0x200000000000000(node=0|zone=2)
[   46.831502] page_type: f5(slab)
[   46.834649] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.842396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.850136] page dumped because: kasan: bad access detected
[   46.855709] 
[   46.857205] Memory state around the buggy address:
[   46.862000]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.869218]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.876438] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.883658]                                   ^
[   46.888191]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.895409]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.902627] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   43.365302] ==================================================================
[   43.372572] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   43.378578] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300
[   43.385886] 
[   43.387407] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   43.387415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   43.387418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.387421] Call Trace:
[   43.387423]  <TASK>
[   43.387424]  dump_stack_lvl+0x73/0xb0
[   43.387429]  print_report+0xd1/0x650
[   43.387433]  ? __virt_addr_valid+0x1db/0x2d0
[   43.387437]  ? strnlen+0x73/0x80
[   43.387441]  ? kasan_complete_mode_report_info+0x64/0x200
[   43.387446]  ? strnlen+0x73/0x80
[   43.387450]  kasan_report+0x141/0x180
[   43.387454]  ? strnlen+0x73/0x80
[   43.387459]  __asan_report_load1_noabort+0x18/0x20
[   43.387464]  strnlen+0x73/0x80
[   43.387468]  kasan_strings+0x615/0xe80
[   43.387471]  ? trace_hardirqs_on+0x37/0xe0
[   43.387475]  ? __pfx_kasan_strings+0x10/0x10
[   43.387479]  ? finish_task_switch.isra.0+0x153/0x700
[   43.387483]  ? __switch_to+0x544/0xf50
[   43.387488]  ? __schedule+0x10cc/0x2b60
[   43.387492]  ? ktime_get_ts64+0x83/0x230
[   43.387496]  kunit_try_run_case+0x1a2/0x480
[   43.387501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.387505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.387509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.387513]  ? __kthread_parkme+0x82/0x180
[   43.387517]  ? preempt_count_sub+0x50/0x80
[   43.387521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.387525]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.387530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.387534]  kthread+0x334/0x6f0
[   43.387537]  ? trace_preempt_on+0x20/0xc0
[   43.387541]  ? __pfx_kthread+0x10/0x10
[   43.387545]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.387549]  ? calculate_sigpending+0x7b/0xa0
[   43.387553]  ? __pfx_kthread+0x10/0x10
[   43.387557]  ret_from_fork+0x113/0x1d0
[   43.387560]  ? __pfx_kthread+0x10/0x10
[   43.387564]  ret_from_fork_asm+0x1a/0x30
[   43.387570]  </TASK>
[   43.387571] 
[   43.564468] Allocated by task 300:
[   43.567875]  kasan_save_stack+0x45/0x70
[   43.571714]  kasan_save_track+0x18/0x40
[   43.575554]  kasan_save_alloc_info+0x3b/0x50
[   43.579826]  __kasan_kmalloc+0xb7/0xc0
[   43.583578]  __kmalloc_cache_noprof+0x189/0x420
[   43.588111]  kasan_strings+0xc0/0xe80
[   43.591778]  kunit_try_run_case+0x1a2/0x480
[   43.595962]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.601365]  kthread+0x334/0x6f0
[   43.604620]  ret_from_fork+0x113/0x1d0
[   43.608374]  ret_from_fork_asm+0x1a/0x30
[   43.612326] 
[   43.613853] Freed by task 300:
[   43.616911]  kasan_save_stack+0x45/0x70
[   43.620751]  kasan_save_track+0x18/0x40
[   43.624590]  kasan_save_free_info+0x3f/0x60
[   43.628774]  __kasan_slab_free+0x56/0x70
[   43.632702]  kfree+0x222/0x3f0
[   43.635761]  kasan_strings+0x2aa/0xe80
[   43.639513]  kunit_try_run_case+0x1a2/0x480
[   43.643699]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.649098]  kthread+0x334/0x6f0
[   43.652349]  ret_from_fork+0x113/0x1d0
[   43.656111]  ret_from_fork_asm+0x1a/0x30
[   43.660035] 
[   43.661534] The buggy address belongs to the object at ffff8881066e8400
[   43.661534]  which belongs to the cache kmalloc-32 of size 32
[   43.673868] The buggy address is located 16 bytes inside of
[   43.673868]  freed 32-byte region [ffff8881066e8400, ffff8881066e8420)
[   43.685950] 
[   43.687450] The buggy address belongs to the physical page:
[   43.693022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8
[   43.701022] flags: 0x200000000000000(node=0|zone=2)
[   43.705909] page_type: f5(slab)
[   43.709055] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   43.716794] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   43.724532] page dumped because: kasan: bad access detected
[   43.730106] 
[   43.731604] Memory state around the buggy address:
[   43.736407]  ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.743627]  ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   43.750844] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.758064]                          ^
[   43.761816]  ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.769037]  ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.776257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   42.947370] ==================================================================
[   42.954643] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   42.960571] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300
[   42.967884] 
[   42.969416] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   42.969424] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   42.969427] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   42.969443] Call Trace:
[   42.969444]  <TASK>
[   42.969446]  dump_stack_lvl+0x73/0xb0
[   42.969450]  print_report+0xd1/0x650
[   42.969454]  ? __virt_addr_valid+0x1db/0x2d0
[   42.969458]  ? strlen+0x8f/0xb0
[   42.969462]  ? kasan_complete_mode_report_info+0x64/0x200
[   42.969468]  ? strlen+0x8f/0xb0
[   42.969471]  kasan_report+0x141/0x180
[   42.969476]  ? strlen+0x8f/0xb0
[   42.969480]  __asan_report_load1_noabort+0x18/0x20
[   42.969485]  strlen+0x8f/0xb0
[   42.969489]  kasan_strings+0x57b/0xe80
[   42.969493]  ? trace_hardirqs_on+0x37/0xe0
[   42.969497]  ? __pfx_kasan_strings+0x10/0x10
[   42.969501]  ? finish_task_switch.isra.0+0x153/0x700
[   42.969505]  ? __switch_to+0x544/0xf50
[   42.969509]  ? __schedule+0x10cc/0x2b60
[   42.969513]  ? ktime_get_ts64+0x83/0x230
[   42.969518]  kunit_try_run_case+0x1a2/0x480
[   42.969522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.969526]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   42.969531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   42.969535]  ? __kthread_parkme+0x82/0x180
[   42.969538]  ? preempt_count_sub+0x50/0x80
[   42.969543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.969547]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.969551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   42.969555]  kthread+0x334/0x6f0
[   42.969559]  ? trace_preempt_on+0x20/0xc0
[   42.969563]  ? __pfx_kthread+0x10/0x10
[   42.969567]  ? _raw_spin_unlock_irq+0x47/0x80
[   42.969570]  ? calculate_sigpending+0x7b/0xa0
[   42.969575]  ? __pfx_kthread+0x10/0x10
[   42.969579]  ret_from_fork+0x113/0x1d0
[   42.969582]  ? __pfx_kthread+0x10/0x10
[   42.969586]  ret_from_fork_asm+0x1a/0x30
[   42.969592]  </TASK>
[   42.969593] 
[   43.146096] Allocated by task 300:
[   43.149502]  kasan_save_stack+0x45/0x70
[   43.153402]  kasan_save_track+0x18/0x40
[   43.157250]  kasan_save_alloc_info+0x3b/0x50
[   43.161521]  __kasan_kmalloc+0xb7/0xc0
[   43.165275]  __kmalloc_cache_noprof+0x189/0x420
[   43.169807]  kasan_strings+0xc0/0xe80
[   43.173475]  kunit_try_run_case+0x1a2/0x480
[   43.177659]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.183058]  kthread+0x334/0x6f0
[   43.186291]  ret_from_fork+0x113/0x1d0
[   43.190045]  ret_from_fork_asm+0x1a/0x30
[   43.193972] 
[   43.195471] Freed by task 300:
[   43.198531]  kasan_save_stack+0x45/0x70
[   43.202382]  kasan_save_track+0x18/0x40
[   43.206250]  kasan_save_free_info+0x3f/0x60
[   43.210437]  __kasan_slab_free+0x56/0x70
[   43.214367]  kfree+0x222/0x3f0
[   43.217422]  kasan_strings+0x2aa/0xe80
[   43.221193]  kunit_try_run_case+0x1a2/0x480
[   43.225412]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.230839]  kthread+0x334/0x6f0
[   43.234073]  ret_from_fork+0x113/0x1d0
[   43.237825]  ret_from_fork_asm+0x1a/0x30
[   43.241750] 
[   43.243250] The buggy address belongs to the object at ffff8881066e8400
[   43.243250]  which belongs to the cache kmalloc-32 of size 32
[   43.255592] The buggy address is located 16 bytes inside of
[   43.255592]  freed 32-byte region [ffff8881066e8400, ffff8881066e8420)
[   43.267671] 
[   43.269172] The buggy address belongs to the physical page:
[   43.274743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8
[   43.282744] flags: 0x200000000000000(node=0|zone=2)
[   43.287622] page_type: f5(slab)
[   43.290770] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   43.298517] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   43.306256] page dumped because: kasan: bad access detected
[   43.311829] 
[   43.313328] Memory state around the buggy address:
[   43.318191]  ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.325419]  ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   43.332662] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.339883]                          ^
[   43.343634]  ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   43.350853]  ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   43.358072] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   42.529427] ==================================================================
[   42.536661] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80
[   42.543367] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300
[   42.550700] 
[   42.552199] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   42.552208] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   42.552210] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   42.552214] Call Trace:
[   42.552215]  <TASK>
[   42.552217]  dump_stack_lvl+0x73/0xb0
[   42.552222]  print_report+0xd1/0x650
[   42.552226]  ? __virt_addr_valid+0x1db/0x2d0
[   42.552230]  ? kasan_strings+0xcbc/0xe80
[   42.552233]  ? kasan_complete_mode_report_info+0x64/0x200
[   42.552239]  ? kasan_strings+0xcbc/0xe80
[   42.552242]  kasan_report+0x141/0x180
[   42.552246]  ? kasan_strings+0xcbc/0xe80
[   42.552251]  __asan_report_load1_noabort+0x18/0x20
[   42.552256]  kasan_strings+0xcbc/0xe80
[   42.552259]  ? trace_hardirqs_on+0x37/0xe0
[   42.552263]  ? __pfx_kasan_strings+0x10/0x10
[   42.552267]  ? finish_task_switch.isra.0+0x153/0x700
[   42.552271]  ? __switch_to+0x544/0xf50
[   42.552276]  ? __schedule+0x10cc/0x2b60
[   42.552280]  ? ktime_get_ts64+0x83/0x230
[   42.552284]  kunit_try_run_case+0x1a2/0x480
[   42.552289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.552293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   42.552297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   42.552301]  ? __kthread_parkme+0x82/0x180
[   42.552305]  ? preempt_count_sub+0x50/0x80
[   42.552309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.552314]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.552318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   42.552322]  kthread+0x334/0x6f0
[   42.552325]  ? trace_preempt_on+0x20/0xc0
[   42.552347]  ? __pfx_kthread+0x10/0x10
[   42.552351]  ? _raw_spin_unlock_irq+0x47/0x80
[   42.552354]  ? calculate_sigpending+0x7b/0xa0
[   42.552377]  ? __pfx_kthread+0x10/0x10
[   42.552381]  ret_from_fork+0x113/0x1d0
[   42.552385]  ? __pfx_kthread+0x10/0x10
[   42.552401]  ret_from_fork_asm+0x1a/0x30
[   42.552407]  </TASK>
[   42.552409] 
[   42.728278] Allocated by task 300:
[   42.731685]  kasan_save_stack+0x45/0x70
[   42.735524]  kasan_save_track+0x18/0x40
[   42.739364]  kasan_save_alloc_info+0x3b/0x50
[   42.743661]  __kasan_kmalloc+0xb7/0xc0
[   42.747415]  __kmalloc_cache_noprof+0x189/0x420
[   42.751947]  kasan_strings+0xc0/0xe80
[   42.755612]  kunit_try_run_case+0x1a2/0x480
[   42.759800]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.765207]  kthread+0x334/0x6f0
[   42.768463]  ret_from_fork+0x113/0x1d0
[   42.772218]  ret_from_fork_asm+0x1a/0x30
[   42.776144] 
[   42.777642] Freed by task 300:
[   42.780701]  kasan_save_stack+0x45/0x70
[   42.784543]  kasan_save_track+0x18/0x40
[   42.788415]  kasan_save_free_info+0x3f/0x60
[   42.792602]  __kasan_slab_free+0x56/0x70
[   42.796527]  kfree+0x222/0x3f0
[   42.799586]  kasan_strings+0x2aa/0xe80
[   42.803363]  kunit_try_run_case+0x1a2/0x480
[   42.807551]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.812950]  kthread+0x334/0x6f0
[   42.816184]  ret_from_fork+0x113/0x1d0
[   42.819935]  ret_from_fork_asm+0x1a/0x30
[   42.823863] 
[   42.825363] The buggy address belongs to the object at ffff8881066e8400
[   42.825363]  which belongs to the cache kmalloc-32 of size 32
[   42.837722] The buggy address is located 16 bytes inside of
[   42.837722]  freed 32-byte region [ffff8881066e8400, ffff8881066e8420)
[   42.849801] 
[   42.851302] The buggy address belongs to the physical page:
[   42.856874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8
[   42.864874] flags: 0x200000000000000(node=0|zone=2)
[   42.869753] page_type: f5(slab)
[   42.872900] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   42.880646] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   42.888416] page dumped because: kasan: bad access detected
[   42.893994] 
[   42.895493] Memory state around the buggy address:
[   42.900286]  ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.907505]  ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   42.914724] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.921942]                          ^
[   42.925697]  ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.932925]  ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.940144] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   42.094876] ==================================================================
[   42.118799] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   42.124726] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300
[   42.132042] 
[   42.133542] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   42.133551] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   42.133554] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   42.133558] Call Trace:
[   42.133559]  <TASK>
[   42.133561]  dump_stack_lvl+0x73/0xb0
[   42.133566]  print_report+0xd1/0x650
[   42.133570]  ? __virt_addr_valid+0x1db/0x2d0
[   42.133575]  ? strcmp+0xb0/0xc0
[   42.133578]  ? kasan_complete_mode_report_info+0x64/0x200
[   42.133584]  ? strcmp+0xb0/0xc0
[   42.133588]  kasan_report+0x141/0x180
[   42.133592]  ? strcmp+0xb0/0xc0
[   42.133597]  __asan_report_load1_noabort+0x18/0x20
[   42.133601]  strcmp+0xb0/0xc0
[   42.133606]  kasan_strings+0x431/0xe80
[   42.133609]  ? trace_hardirqs_on+0x37/0xe0
[   42.133614]  ? __pfx_kasan_strings+0x10/0x10
[   42.133617]  ? finish_task_switch.isra.0+0x153/0x700
[   42.133621]  ? __switch_to+0x544/0xf50
[   42.133626]  ? __schedule+0x10cc/0x2b60
[   42.133630]  ? ktime_get_ts64+0x83/0x230
[   42.133635]  kunit_try_run_case+0x1a2/0x480
[   42.133639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.133644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   42.133648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   42.133652]  ? __kthread_parkme+0x82/0x180
[   42.133656]  ? preempt_count_sub+0x50/0x80
[   42.133660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   42.133664]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.133669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   42.133673]  kthread+0x334/0x6f0
[   42.133676]  ? trace_preempt_on+0x20/0xc0
[   42.133680]  ? __pfx_kthread+0x10/0x10
[   42.133684]  ? _raw_spin_unlock_irq+0x47/0x80
[   42.133688]  ? calculate_sigpending+0x7b/0xa0
[   42.133693]  ? __pfx_kthread+0x10/0x10
[   42.133697]  ret_from_fork+0x113/0x1d0
[   42.133700]  ? __pfx_kthread+0x10/0x10
[   42.133704]  ret_from_fork_asm+0x1a/0x30
[   42.133710]  </TASK>
[   42.133711] 
[   42.310236] Allocated by task 300:
[   42.313640]  kasan_save_stack+0x45/0x70
[   42.317479]  kasan_save_track+0x18/0x40
[   42.321319]  kasan_save_alloc_info+0x3b/0x50
[   42.325626]  __kasan_kmalloc+0xb7/0xc0
[   42.329380]  __kmalloc_cache_noprof+0x189/0x420
[   42.333938]  kasan_strings+0xc0/0xe80
[   42.337604]  kunit_try_run_case+0x1a2/0x480
[   42.341790]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.347190]  kthread+0x334/0x6f0
[   42.350423]  ret_from_fork+0x113/0x1d0
[   42.354176]  ret_from_fork_asm+0x1a/0x30
[   42.358108] 
[   42.359607] Freed by task 300:
[   42.362668]  kasan_save_stack+0x45/0x70
[   42.366506]  kasan_save_track+0x18/0x40
[   42.370383]  kasan_save_free_info+0x3f/0x60
[   42.374602]  __kasan_slab_free+0x56/0x70
[   42.378529]  kfree+0x222/0x3f0
[   42.381594]  kasan_strings+0x2aa/0xe80
[   42.385364]  kunit_try_run_case+0x1a2/0x480
[   42.389577]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   42.394977]  kthread+0x334/0x6f0
[   42.398208]  ret_from_fork+0x113/0x1d0
[   42.401962]  ret_from_fork_asm+0x1a/0x30
[   42.405889] 
[   42.407406] The buggy address belongs to the object at ffff8881066e8400
[   42.407406]  which belongs to the cache kmalloc-32 of size 32
[   42.419745] The buggy address is located 16 bytes inside of
[   42.419745]  freed 32-byte region [ffff8881066e8400, ffff8881066e8420)
[   42.431828] 
[   42.433325] The buggy address belongs to the physical page:
[   42.438924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8
[   42.446926] flags: 0x200000000000000(node=0|zone=2)
[   42.451803] page_type: f5(slab)
[   42.454952] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   42.462700] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   42.470445] page dumped because: kasan: bad access detected
[   42.476018] 
[   42.477518] Memory state around the buggy address:
[   42.482311]  ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.489531]  ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   42.496750] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.503969]                          ^
[   42.507722]  ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.514942]  ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   42.522158] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   41.684217] ==================================================================
[   41.695190] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   41.701198] Read of size 1 at addr ffff888101328f98 by task kunit_try_catch/298
[   41.708510] 
[   41.710012] CPU: 2 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   41.710021] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   41.710024] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.710027] Call Trace:
[   41.710029]  <TASK>
[   41.710031]  dump_stack_lvl+0x73/0xb0
[   41.710036]  print_report+0xd1/0x650
[   41.710040]  ? __virt_addr_valid+0x1db/0x2d0
[   41.710044]  ? memcmp+0x1b4/0x1d0
[   41.710047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   41.710052]  ? memcmp+0x1b4/0x1d0
[   41.710055]  kasan_report+0x141/0x180
[   41.710059]  ? memcmp+0x1b4/0x1d0
[   41.710063]  __asan_report_load1_noabort+0x18/0x20
[   41.710068]  memcmp+0x1b4/0x1d0
[   41.710071]  kasan_memcmp+0x18f/0x390
[   41.710075]  ? trace_hardirqs_on+0x37/0xe0
[   41.710079]  ? __pfx_kasan_memcmp+0x10/0x10
[   41.710083]  ? finish_task_switch.isra.0+0x153/0x700
[   41.710087]  ? __switch_to+0x544/0xf50
[   41.710092]  ? ktime_get_ts64+0x83/0x230
[   41.710096]  kunit_try_run_case+0x1a2/0x480
[   41.710101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.710105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.710110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.710114]  ? __kthread_parkme+0x82/0x180
[   41.710117]  ? preempt_count_sub+0x50/0x80
[   41.710121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.710126]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.710130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.710134]  kthread+0x334/0x6f0
[   41.710138]  ? trace_preempt_on+0x20/0xc0
[   41.710142]  ? __pfx_kthread+0x10/0x10
[   41.710146]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.710150]  ? calculate_sigpending+0x7b/0xa0
[   41.710154]  ? __pfx_kthread+0x10/0x10
[   41.710158]  ret_from_fork+0x113/0x1d0
[   41.710161]  ? __pfx_kthread+0x10/0x10
[   41.710165]  ret_from_fork_asm+0x1a/0x30
[   41.710171]  </TASK>
[   41.710173] 
[   41.883391] Allocated by task 298:
[   41.886802]  kasan_save_stack+0x45/0x70
[   41.890650]  kasan_save_track+0x18/0x40
[   41.894489]  kasan_save_alloc_info+0x3b/0x50
[   41.898769]  __kasan_kmalloc+0xb7/0xc0
[   41.902521]  __kmalloc_cache_noprof+0x189/0x420
[   41.907056]  kasan_memcmp+0xb7/0x390
[   41.910635]  kunit_try_run_case+0x1a2/0x480
[   41.914819]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.920219]  kthread+0x334/0x6f0
[   41.923452]  ret_from_fork+0x113/0x1d0
[   41.927206]  ret_from_fork_asm+0x1a/0x30
[   41.931129] 
[   41.932629] The buggy address belongs to the object at ffff888101328f80
[   41.932629]  which belongs to the cache kmalloc-32 of size 32
[   41.944972] The buggy address is located 0 bytes to the right of
[   41.944972]  allocated 24-byte region [ffff888101328f80, ffff888101328f98)
[   41.957841] 
[   41.959349] The buggy address belongs to the physical page:
[   41.964949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101328
[   41.972957] flags: 0x200000000000000(node=0|zone=2)
[   41.977843] page_type: f5(slab)
[   41.980991] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   41.988737] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   41.996477] page dumped because: kasan: bad access detected
[   42.002050] 
[   42.003548] Memory state around the buggy address:
[   42.008350]  ffff888101328e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.015596]  ffff888101328f00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   42.022814] >ffff888101328f80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.030033]                             ^
[   42.034046]  ffff888101329000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb
[   42.041268]  ffff888101329080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb
[   42.048485] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   41.341990] ==================================================================
[   41.353404] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   41.360979] Read of size 1 at addr ffff8881081bfc4a by task kunit_try_catch/294
[   41.368284] 
[   41.369786] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   41.369795] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   41.369798] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.369801] Call Trace:
[   41.369802]  <TASK>
[   41.369804]  dump_stack_lvl+0x73/0xb0
[   41.369809]  print_report+0xd1/0x650
[   41.369813]  ? __virt_addr_valid+0x1db/0x2d0
[   41.369817]  ? kasan_alloca_oob_right+0x329/0x390
[   41.369821]  ? kasan_addr_to_slab+0x11/0xa0
[   41.369825]  ? kasan_alloca_oob_right+0x329/0x390
[   41.369829]  kasan_report+0x141/0x180
[   41.369833]  ? kasan_alloca_oob_right+0x329/0x390
[   41.369838]  __asan_report_load1_noabort+0x18/0x20
[   41.369842]  kasan_alloca_oob_right+0x329/0x390
[   41.369846]  ? __kasan_check_write+0x18/0x20
[   41.369850]  ? __pfx_sched_clock_cpu+0x10/0x10
[   41.369853]  ? finish_task_switch.isra.0+0x153/0x700
[   41.369857]  ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90
[   41.369862]  ? trace_hardirqs_on+0x37/0xe0
[   41.369867]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   41.369871]  ? __schedule+0x10cc/0x2b60
[   41.369875]  ? ktime_get_ts64+0x83/0x230
[   41.369880]  kunit_try_run_case+0x1a2/0x480
[   41.369884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.369888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.369893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.369897]  ? __kthread_parkme+0x82/0x180
[   41.369900]  ? preempt_count_sub+0x50/0x80
[   41.369904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.369909]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.369913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.369918]  kthread+0x334/0x6f0
[   41.369921]  ? trace_preempt_on+0x20/0xc0
[   41.369925]  ? __pfx_kthread+0x10/0x10
[   41.369929]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.369933]  ? calculate_sigpending+0x7b/0xa0
[   41.369937]  ? __pfx_kthread+0x10/0x10
[   41.369941]  ret_from_fork+0x113/0x1d0
[   41.369945]  ? __pfx_kthread+0x10/0x10
[   41.369948]  ret_from_fork_asm+0x1a/0x30
[   41.369954]  </TASK>
[   41.369956] 
[   41.558753] The buggy address belongs to stack of task kunit_try_catch/294
[   41.565628] 
[   41.567124] The buggy address belongs to the physical page:
[   41.572697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081bf
[   41.580705] flags: 0x200000000000000(node=0|zone=2)
[   41.585586] raw: 0200000000000000 ffffea0004206fc8 ffffea0004206fc8 0000000000000000
[   41.593361] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   41.601123] page dumped because: kasan: bad access detected
[   41.606694] 
[   41.608187] Memory state around the buggy address:
[   41.612979]  ffff8881081bfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.620197]  ffff8881081bfb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.627419] >ffff8881081bfc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   41.634637]                                               ^
[   41.640211]  ffff8881081bfc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   41.647437]  ffff8881081bfd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   41.654657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   41.023303] ==================================================================
[   41.034195] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   41.041674] Read of size 1 at addr ffff888108327c3f by task kunit_try_catch/292
[   41.048979] 
[   41.050474] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   41.050482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   41.050485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.050488] Call Trace:
[   41.050490]  <TASK>
[   41.050492]  dump_stack_lvl+0x73/0xb0
[   41.050496]  print_report+0xd1/0x650
[   41.050500]  ? __virt_addr_valid+0x1db/0x2d0
[   41.050504]  ? kasan_alloca_oob_left+0x320/0x380
[   41.050508]  ? kasan_addr_to_slab+0x11/0xa0
[   41.050512]  ? kasan_alloca_oob_left+0x320/0x380
[   41.050516]  kasan_report+0x141/0x180
[   41.050520]  ? kasan_alloca_oob_left+0x320/0x380
[   41.050525]  __asan_report_load1_noabort+0x18/0x20
[   41.050530]  kasan_alloca_oob_left+0x320/0x380
[   41.050533]  ? __kasan_check_write+0x18/0x20
[   41.050537]  ? __pfx_sched_clock_cpu+0x10/0x10
[   41.050541]  ? finish_task_switch.isra.0+0x153/0x700
[   41.050545]  ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90
[   41.050550]  ? trace_hardirqs_on+0x37/0xe0
[   41.050554]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   41.050559]  ? __schedule+0x10cc/0x2b60
[   41.050563]  ? ktime_get_ts64+0x83/0x230
[   41.050567]  kunit_try_run_case+0x1a2/0x480
[   41.050572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.050576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.050580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.050584]  ? __kthread_parkme+0x82/0x180
[   41.050588]  ? preempt_count_sub+0x50/0x80
[   41.050592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.050596]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.050600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.050605]  kthread+0x334/0x6f0
[   41.050608]  ? trace_preempt_on+0x20/0xc0
[   41.050612]  ? __pfx_kthread+0x10/0x10
[   41.050616]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.050620]  ? calculate_sigpending+0x7b/0xa0
[   41.050624]  ? __pfx_kthread+0x10/0x10
[   41.050628]  ret_from_fork+0x113/0x1d0
[   41.050631]  ? __pfx_kthread+0x10/0x10
[   41.050635]  ret_from_fork_asm+0x1a/0x30
[   41.050641]  </TASK>
[   41.050643] 
[   41.239049] The buggy address belongs to stack of task kunit_try_catch/292
[   41.245923] 
[   41.247421] The buggy address belongs to the physical page:
[   41.252993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108327
[   41.261001] flags: 0x200000000000000(node=0|zone=2)
[   41.265883] raw: 0200000000000000 ffffea000420c9c8 ffffea000420c9c8 0000000000000000
[   41.273628] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   41.281369] page dumped because: kasan: bad access detected
[   41.286967] 
[   41.288464] Memory state around the buggy address:
[   41.293258]  ffff888108327b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.300479]  ffff888108327b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.307705] >ffff888108327c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   41.314926]                                         ^
[   41.319978]  ffff888108327c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   41.327197]  ffff888108327d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   41.334416] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   40.692415] ==================================================================
[   40.707491] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   40.714371] Read of size 1 at addr ffff88810830fd02 by task kunit_try_catch/290
[   40.721702] 
[   40.723204] CPU: 3 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   40.723213] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   40.723216] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.723219] Call Trace:
[   40.723221]  <TASK>
[   40.723223]  dump_stack_lvl+0x73/0xb0
[   40.723228]  print_report+0xd1/0x650
[   40.723232]  ? __virt_addr_valid+0x1db/0x2d0
[   40.723236]  ? kasan_stack_oob+0x2b5/0x300
[   40.723239]  ? kasan_addr_to_slab+0x11/0xa0
[   40.723243]  ? kasan_stack_oob+0x2b5/0x300
[   40.723246]  kasan_report+0x141/0x180
[   40.723250]  ? kasan_stack_oob+0x2b5/0x300
[   40.723255]  __asan_report_load1_noabort+0x18/0x20
[   40.723259]  kasan_stack_oob+0x2b5/0x300
[   40.723263]  ? __pfx_kasan_stack_oob+0x10/0x10
[   40.723266]  ? finish_task_switch.isra.0+0x153/0x700
[   40.723270]  ? __switch_to+0x544/0xf50
[   40.723276]  ? __schedule+0x10cc/0x2b60
[   40.723280]  ? ktime_get_ts64+0x83/0x230
[   40.723285]  kunit_try_run_case+0x1a2/0x480
[   40.723289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.723293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.723298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.723302]  ? __kthread_parkme+0x82/0x180
[   40.723305]  ? preempt_count_sub+0x50/0x80
[   40.723310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.723314]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.723318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.723322]  kthread+0x334/0x6f0
[   40.723326]  ? trace_preempt_on+0x20/0xc0
[   40.723347]  ? __pfx_kthread+0x10/0x10
[   40.723351]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.723355]  ? calculate_sigpending+0x7b/0xa0
[   40.723360]  ? __pfx_kthread+0x10/0x10
[   40.723364]  ret_from_fork+0x113/0x1d0
[   40.723379]  ? __pfx_kthread+0x10/0x10
[   40.723383]  ret_from_fork_asm+0x1a/0x30
[   40.723389]  </TASK>
[   40.723390] 
[   40.894768] The buggy address belongs to stack of task kunit_try_catch/290
[   40.901648]  and is located at offset 138 in frame:
[   40.906527]  kasan_stack_oob+0x0/0x300
[   40.910279] 
[   40.911778] This frame has 4 objects:
[   40.915447]  [48, 49) '__assertion'
[   40.915451]  [64, 72) 'array'
[   40.918947]  [96, 112) '__assertion'
[   40.921918]  [128, 138) 'stack_array'
[   40.925500] 
[   40.930665] The buggy address belongs to the physical page:
[   40.936236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10830f
[   40.944236] flags: 0x200000000000000(node=0|zone=2)
[   40.949117] raw: 0200000000000000 ffffea000420c3c8 ffffea000420c3c8 0000000000000000
[   40.956865] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   40.964609] page dumped because: kasan: bad access detected
[   40.970182] 
[   40.971675] Memory state around the buggy address:
[   40.976466]  ffff88810830fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   40.983686]  ffff88810830fc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   40.990906] >ffff88810830fd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   40.998125]                    ^
[   41.001364]  ffff88810830fd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   41.008611]  ffff88810830fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.015830] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   40.389062] ==================================================================
[   40.401619] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   40.409193] Read of size 1 at addr ffffffffaaa61e8d by task kunit_try_catch/286
[   40.416507] 
[   40.418009] CPU: 3 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   40.418018] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   40.418021] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.418024] Call Trace:
[   40.418026]  <TASK>
[   40.418028]  dump_stack_lvl+0x73/0xb0
[   40.418033]  print_report+0xd1/0x650
[   40.418037]  ? __virt_addr_valid+0x1db/0x2d0
[   40.418041]  ? kasan_global_oob_right+0x286/0x2d0
[   40.418045]  ? kasan_addr_to_slab+0x11/0xa0
[   40.418048]  ? kasan_global_oob_right+0x286/0x2d0
[   40.418052]  kasan_report+0x141/0x180
[   40.418056]  ? kasan_global_oob_right+0x286/0x2d0
[   40.418061]  __asan_report_load1_noabort+0x18/0x20
[   40.418065]  kasan_global_oob_right+0x286/0x2d0
[   40.418069]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   40.418074]  ? __schedule+0x10cc/0x2b60
[   40.418078]  ? ktime_get_ts64+0x83/0x230
[   40.418082]  kunit_try_run_case+0x1a2/0x480
[   40.418087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.418091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.418096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.418100]  ? __kthread_parkme+0x82/0x180
[   40.418104]  ? preempt_count_sub+0x50/0x80
[   40.418108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.418112]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.418116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.418121]  kthread+0x334/0x6f0
[   40.418124]  ? trace_preempt_on+0x20/0xc0
[   40.418129]  ? __pfx_kthread+0x10/0x10
[   40.418132]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.418136]  ? calculate_sigpending+0x7b/0xa0
[   40.418141]  ? __pfx_kthread+0x10/0x10
[   40.418145]  ret_from_fork+0x113/0x1d0
[   40.418148]  ? __pfx_kthread+0x10/0x10
[   40.418152]  ret_from_fork_asm+0x1a/0x30
[   40.418158]  </TASK>
[   40.418159] 
[   40.583913] The buggy address belongs to the variable:
[   40.589052]  global_array+0xd/0x40
[   40.592467] 
[   40.593965] The buggy address belongs to the physical page:
[   40.599537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3a9861
[   40.607538] flags: 0x200000000002000(reserved|node=0|zone=2)
[   40.613207] raw: 0200000000002000 ffffea000ea61848 ffffea000ea61848 0000000000000000
[   40.620953] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   40.628693] page dumped because: kasan: bad access detected
[   40.634264] 
[   40.635764] Memory state around the buggy address:
[   40.640556]  ffffffffaaa61d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.647778]  ffffffffaaa61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.655004] >ffffffffaaa61e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   40.662223]                       ^
[   40.665718]  ffffffffaaa61f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   40.672936]  ffffffffaaa61f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   40.680155] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   40.023043] ==================================================================
[   40.035072] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.043081] Free of addr ffff888104eb8001 by task kunit_try_catch/284
[   40.049527] 
[   40.051028] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   40.051037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   40.051040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.051044] Call Trace:
[   40.051046]  <TASK>
[   40.051048]  dump_stack_lvl+0x73/0xb0
[   40.051053]  print_report+0xd1/0x650
[   40.051057]  ? __virt_addr_valid+0x1db/0x2d0
[   40.051061]  ? kasan_addr_to_slab+0x11/0xa0
[   40.051064]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051070]  kasan_report_invalid_free+0x10a/0x130
[   40.051074]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051079]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051084]  __kasan_mempool_poison_object+0x102/0x1d0
[   40.051089]  mempool_free+0x2ec/0x380
[   40.051094]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   40.051098]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   40.051104]  ? __pfx_sched_clock_cpu+0x10/0x10
[   40.051108]  ? finish_task_switch.isra.0+0x153/0x700
[   40.051112]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   40.051117]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   40.051122]  ? __pfx_mempool_kmalloc+0x10/0x10
[   40.051126]  ? __pfx_mempool_kfree+0x10/0x10
[   40.051131]  ? ktime_get_ts64+0x83/0x230
[   40.051136]  kunit_try_run_case+0x1a2/0x480
[   40.051140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.051144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.051149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.051153]  ? __kthread_parkme+0x82/0x180
[   40.051157]  ? preempt_count_sub+0x50/0x80
[   40.051161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.051165]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.051169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.051174]  kthread+0x334/0x6f0
[   40.051177]  ? trace_preempt_on+0x20/0xc0
[   40.051181]  ? __pfx_kthread+0x10/0x10
[   40.051185]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.051189]  ? calculate_sigpending+0x7b/0xa0
[   40.051193]  ? __pfx_kthread+0x10/0x10
[   40.051197]  ret_from_fork+0x113/0x1d0
[   40.051200]  ? __pfx_kthread+0x10/0x10
[   40.051204]  ret_from_fork_asm+0x1a/0x30
[   40.051210]  </TASK>
[   40.051212] 
[   40.253515] The buggy address belongs to the physical page:
[   40.259086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8
[   40.267085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.274739] flags: 0x200000000000040(head|node=0|zone=2)
[   40.280051] page_type: f8(unknown)
[   40.283458] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   40.291205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   40.298945] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   40.306772] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   40.314597] head: 0200000000000002 ffffea000413ae01 00000000ffffffff 00000000ffffffff
[   40.322424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.330256] page dumped because: kasan: bad access detected
[   40.335829] 
[   40.337330] Memory state around the buggy address:
[   40.342150]  ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   40.349378]  ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   40.356621] >ffff888104eb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.363839]                    ^
[   40.367075]  ffff888104eb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.374302]  ffff888104eb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.381519] ==================================================================
[   39.594219] ==================================================================
[   39.606404] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.614412] Free of addr ffff8881066f8f01 by task kunit_try_catch/282
[   39.620852] 
[   39.622365] CPU: 3 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   39.622374] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   39.622389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   39.622393] Call Trace:
[   39.622394]  <TASK>
[   39.622396]  dump_stack_lvl+0x73/0xb0
[   39.622401]  print_report+0xd1/0x650
[   39.622405]  ? __virt_addr_valid+0x1db/0x2d0
[   39.622409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   39.622414]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622419]  kasan_report_invalid_free+0x10a/0x130
[   39.622424]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622429]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622434]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622438]  check_slab_allocation+0x11f/0x130
[   39.622442]  __kasan_mempool_poison_object+0x91/0x1d0
[   39.622447]  mempool_free+0x2ec/0x380
[   39.622452]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   39.622456]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   39.622462]  ? __kasan_check_write+0x18/0x20
[   39.622465]  ? __pfx_sched_clock_cpu+0x10/0x10
[   39.622469]  ? finish_task_switch.isra.0+0x153/0x700
[   39.622474]  mempool_kmalloc_invalid_free+0xed/0x140
[   39.622478]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   39.622483]  ? __pfx_mempool_kmalloc+0x10/0x10
[   39.622487]  ? __pfx_mempool_kfree+0x10/0x10
[   39.622492]  ? ktime_get_ts64+0x83/0x230
[   39.622496]  kunit_try_run_case+0x1a2/0x480
[   39.622501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.622505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   39.622509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   39.622513]  ? __kthread_parkme+0x82/0x180
[   39.622517]  ? preempt_count_sub+0x50/0x80
[   39.622521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.622526]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.622530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   39.622534]  kthread+0x334/0x6f0
[   39.622538]  ? trace_preempt_on+0x20/0xc0
[   39.622542]  ? __pfx_kthread+0x10/0x10
[   39.622545]  ? _raw_spin_unlock_irq+0x47/0x80
[   39.622549]  ? calculate_sigpending+0x7b/0xa0
[   39.622554]  ? __pfx_kthread+0x10/0x10
[   39.622558]  ret_from_fork+0x113/0x1d0
[   39.622561]  ? __pfx_kthread+0x10/0x10
[   39.622565]  ret_from_fork_asm+0x1a/0x30
[   39.622570]  </TASK>
[   39.622572] 
[   39.839578] Allocated by task 282:
[   39.842986]  kasan_save_stack+0x45/0x70
[   39.846831]  kasan_save_track+0x18/0x40
[   39.850672]  kasan_save_alloc_info+0x3b/0x50
[   39.854945]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   39.860259]  remove_element+0x11e/0x190
[   39.864106]  mempool_alloc_preallocated+0x4d/0x90
[   39.868812]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   39.874405]  mempool_kmalloc_invalid_free+0xed/0x140
[   39.879387]  kunit_try_run_case+0x1a2/0x480
[   39.883578]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.888979]  kthread+0x334/0x6f0
[   39.892210]  ret_from_fork+0x113/0x1d0
[   39.895963]  ret_from_fork_asm+0x1a/0x30
[   39.899889] 
[   39.901409] The buggy address belongs to the object at ffff8881066f8f00
[   39.901409]  which belongs to the cache kmalloc-128 of size 128
[   39.913923] The buggy address is located 1 bytes inside of
[   39.913923]  128-byte region [ffff8881066f8f00, ffff8881066f8f80)
[   39.925492] 
[   39.926991] The buggy address belongs to the physical page:
[   39.932563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   39.940570] flags: 0x200000000000000(node=0|zone=2)
[   39.945451] page_type: f5(slab)
[   39.948599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   39.956370] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   39.964134] page dumped because: kasan: bad access detected
[   39.969708] 
[   39.971207] Memory state around the buggy address:
[   39.976000]  ffff8881066f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.983221]  ffff8881066f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.990438] >ffff8881066f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.997658]                    ^
[   40.000890]  ffff8881066f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.008111]  ffff8881066f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   40.015347] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   39.275428] ==================================================================
[   39.287887] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   39.295030] Free of addr ffff8881081fc000 by task kunit_try_catch/280
[   39.301478] 
[   39.302976] CPU: 3 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   39.302985] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   39.302988] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   39.302991] Call Trace:
[   39.302993]  <TASK>
[   39.302995]  dump_stack_lvl+0x73/0xb0
[   39.302999]  print_report+0xd1/0x650
[   39.303003]  ? __virt_addr_valid+0x1db/0x2d0
[   39.303007]  ? kasan_addr_to_slab+0x11/0xa0
[   39.303011]  ? mempool_double_free_helper+0x184/0x370
[   39.303016]  kasan_report_invalid_free+0x10a/0x130
[   39.303020]  ? mempool_double_free_helper+0x184/0x370
[   39.303025]  ? mempool_double_free_helper+0x184/0x370
[   39.303029]  __kasan_mempool_poison_pages+0x115/0x130
[   39.303034]  mempool_free+0x290/0x380
[   39.303039]  mempool_double_free_helper+0x184/0x370
[   39.303043]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   39.303048]  ? __pfx_sched_clock_cpu+0x10/0x10
[   39.303052]  ? finish_task_switch.isra.0+0x153/0x700
[   39.303057]  mempool_page_alloc_double_free+0xe8/0x140
[   39.303062]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   39.303067]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   39.303072]  ? __pfx_mempool_free_pages+0x10/0x10
[   39.303077]  ? ktime_get_ts64+0x83/0x230
[   39.303081]  kunit_try_run_case+0x1a2/0x480
[   39.303086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.303090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   39.303094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   39.303098]  ? __kthread_parkme+0x82/0x180
[   39.303102]  ? preempt_count_sub+0x50/0x80
[   39.303106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   39.303111]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   39.303115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   39.303119]  kthread+0x334/0x6f0
[   39.303122]  ? trace_preempt_on+0x20/0xc0
[   39.303126]  ? __pfx_kthread+0x10/0x10
[   39.303130]  ? _raw_spin_unlock_irq+0x47/0x80
[   39.303134]  ? calculate_sigpending+0x7b/0xa0
[   39.303138]  ? __pfx_kthread+0x10/0x10
[   39.303142]  ret_from_fork+0x113/0x1d0
[   39.303146]  ? __pfx_kthread+0x10/0x10
[   39.303149]  ret_from_fork_asm+0x1a/0x30
[   39.303155]  </TASK>
[   39.303157] 
[   39.501562] The buggy address belongs to the physical page:
[   39.507137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081fc
[   39.515145] flags: 0x200000000000000(node=0|zone=2)
[   39.520034] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   39.527780] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.535517] page dumped because: kasan: bad access detected
[   39.541090] 
[   39.542582] Memory state around the buggy address:
[   39.547375]  ffff8881081fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.554621]  ffff8881081fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.561839] >ffff8881081fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.569058]                    ^
[   39.572290]  ffff8881081fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.579510]  ffff8881081fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.586729] ==================================================================
[   38.909901] ==================================================================
[   38.921836] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   38.928977] Free of addr ffff8881081fc000 by task kunit_try_catch/278
[   38.935423] 
[   38.936925] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   38.936934] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   38.936937] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   38.936941] Call Trace:
[   38.936942]  <TASK>
[   38.936944]  dump_stack_lvl+0x73/0xb0
[   38.936949]  print_report+0xd1/0x650
[   38.936953]  ? __virt_addr_valid+0x1db/0x2d0
[   38.936958]  ? kasan_addr_to_slab+0x11/0xa0
[   38.936961]  ? mempool_double_free_helper+0x184/0x370
[   38.936966]  kasan_report_invalid_free+0x10a/0x130
[   38.936970]  ? mempool_double_free_helper+0x184/0x370
[   38.936975]  ? mempool_double_free_helper+0x184/0x370
[   38.936980]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   38.936984]  mempool_free+0x2ec/0x380
[   38.936989]  mempool_double_free_helper+0x184/0x370
[   38.936993]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   38.936998]  ? __kasan_check_write+0x18/0x20
[   38.937002]  ? __pfx_sched_clock_cpu+0x10/0x10
[   38.937005]  ? finish_task_switch.isra.0+0x153/0x700
[   38.937010]  mempool_kmalloc_large_double_free+0xed/0x140
[   38.937015]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   38.937020]  ? __pfx_mempool_kmalloc+0x10/0x10
[   38.937024]  ? __pfx_mempool_kfree+0x10/0x10
[   38.937029]  ? ktime_get_ts64+0x83/0x230
[   38.937033]  kunit_try_run_case+0x1a2/0x480
[   38.937038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.937042]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   38.937046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   38.937051]  ? __kthread_parkme+0x82/0x180
[   38.937054]  ? preempt_count_sub+0x50/0x80
[   38.937058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.937063]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.937067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   38.937071]  kthread+0x334/0x6f0
[   38.937075]  ? trace_preempt_on+0x20/0xc0
[   38.937079]  ? __pfx_kthread+0x10/0x10
[   38.937083]  ? _raw_spin_unlock_irq+0x47/0x80
[   38.937086]  ? calculate_sigpending+0x7b/0xa0
[   38.937091]  ? __pfx_kthread+0x10/0x10
[   38.937095]  ret_from_fork+0x113/0x1d0
[   38.937098]  ? __pfx_kthread+0x10/0x10
[   38.937102]  ret_from_fork_asm+0x1a/0x30
[   38.937108]  </TASK>
[   38.937109] 
[   39.139767] The buggy address belongs to the physical page:
[   39.145363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081fc
[   39.153407] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.161058] flags: 0x200000000000040(head|node=0|zone=2)
[   39.166372] page_type: f8(unknown)
[   39.169806] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   39.177554] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   39.185303] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   39.193137] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   39.200970] head: 0200000000000002 ffffea0004207f01 00000000ffffffff 00000000ffffffff
[   39.208797] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.216629] page dumped because: kasan: bad access detected
[   39.222202] 
[   39.223702] Memory state around the buggy address:
[   39.228495]  ffff8881081fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.235715]  ffff8881081fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.242944] >ffff8881081fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.250171]                    ^
[   39.253410]  ffff8881081fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.260630]  ffff8881081fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.267849] ==================================================================
[   38.433024] ==================================================================
[   38.444521] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370
[   38.451661] Free of addr ffff8881066f8b00 by task kunit_try_catch/276
[   38.458101] 
[   38.459603] CPU: 3 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   38.459612] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   38.459615] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   38.459619] Call Trace:
[   38.459620]  <TASK>
[   38.459622]  dump_stack_lvl+0x73/0xb0
[   38.459627]  print_report+0xd1/0x650
[   38.459631]  ? __virt_addr_valid+0x1db/0x2d0
[   38.459636]  ? kasan_complete_mode_report_info+0x64/0x200
[   38.459641]  ? mempool_double_free_helper+0x184/0x370
[   38.459645]  kasan_report_invalid_free+0x10a/0x130
[   38.459650]  ? mempool_double_free_helper+0x184/0x370
[   38.459655]  ? mempool_double_free_helper+0x184/0x370
[   38.459659]  ? mempool_double_free_helper+0x184/0x370
[   38.459663]  check_slab_allocation+0x101/0x130
[   38.459667]  __kasan_mempool_poison_object+0x91/0x1d0
[   38.459672]  mempool_free+0x2ec/0x380
[   38.459677]  mempool_double_free_helper+0x184/0x370
[   38.459681]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   38.459686]  ? __kasan_check_write+0x18/0x20
[   38.459690]  ? __pfx_sched_clock_cpu+0x10/0x10
[   38.459693]  ? finish_task_switch.isra.0+0x153/0x700
[   38.459698]  mempool_kmalloc_double_free+0xed/0x140
[   38.459703]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   38.459708]  ? __pfx_mempool_kmalloc+0x10/0x10
[   38.459712]  ? __pfx_mempool_kfree+0x10/0x10
[   38.459717]  ? ktime_get_ts64+0x83/0x230
[   38.459721]  kunit_try_run_case+0x1a2/0x480
[   38.459726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.459730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   38.459735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   38.459739]  ? __kthread_parkme+0x82/0x180
[   38.459742]  ? preempt_count_sub+0x50/0x80
[   38.459747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.459751]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.459755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   38.459760]  kthread+0x334/0x6f0
[   38.459763]  ? trace_preempt_on+0x20/0xc0
[   38.459767]  ? __pfx_kthread+0x10/0x10
[   38.459771]  ? _raw_spin_unlock_irq+0x47/0x80
[   38.459775]  ? calculate_sigpending+0x7b/0xa0
[   38.459779]  ? __pfx_kthread+0x10/0x10
[   38.459783]  ret_from_fork+0x113/0x1d0
[   38.459786]  ? __pfx_kthread+0x10/0x10
[   38.459790]  ret_from_fork_asm+0x1a/0x30
[   38.459796]  </TASK>
[   38.459798] 
[   38.671906] Allocated by task 276:
[   38.675314]  kasan_save_stack+0x45/0x70
[   38.679162]  kasan_save_track+0x18/0x40
[   38.682998]  kasan_save_alloc_info+0x3b/0x50
[   38.687272]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   38.692585]  remove_element+0x11e/0x190
[   38.696424]  mempool_alloc_preallocated+0x4d/0x90
[   38.701132]  mempool_double_free_helper+0x8a/0x370
[   38.705931]  mempool_kmalloc_double_free+0xed/0x140
[   38.710812]  kunit_try_run_case+0x1a2/0x480
[   38.714997]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.720407]  kthread+0x334/0x6f0
[   38.723645]  ret_from_fork+0x113/0x1d0
[   38.727409]  ret_from_fork_asm+0x1a/0x30
[   38.731362] 
[   38.732886] Freed by task 276:
[   38.735944]  kasan_save_stack+0x45/0x70
[   38.739783]  kasan_save_track+0x18/0x40
[   38.743624]  kasan_save_free_info+0x3f/0x60
[   38.747816]  __kasan_mempool_poison_object+0x131/0x1d0
[   38.752957]  mempool_free+0x2ec/0x380
[   38.756622]  mempool_double_free_helper+0x109/0x370
[   38.761502]  mempool_kmalloc_double_free+0xed/0x140
[   38.766402]  kunit_try_run_case+0x1a2/0x480
[   38.770593]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.775992]  kthread+0x334/0x6f0
[   38.779225]  ret_from_fork+0x113/0x1d0
[   38.782979]  ret_from_fork_asm+0x1a/0x30
[   38.786903] 
[   38.788409] The buggy address belongs to the object at ffff8881066f8b00
[   38.788409]  which belongs to the cache kmalloc-128 of size 128
[   38.800918] The buggy address is located 0 bytes inside of
[   38.800918]  128-byte region [ffff8881066f8b00, ffff8881066f8b80)
[   38.812480] 
[   38.813979] The buggy address belongs to the physical page:
[   38.819552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   38.827559] flags: 0x200000000000000(node=0|zone=2)
[   38.832440] page_type: f5(slab)
[   38.835587] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   38.843349] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   38.851099] page dumped because: kasan: bad access detected
[   38.856671] 
[   38.858168] Memory state around the buggy address:
[   38.862962]  ffff8881066f8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.870182]  ffff8881066f8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.877400] >ffff8881066f8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.884622]                    ^
[   38.887854]  ffff8881066f8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.895073]  ffff8881066f8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.902290] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   37.313510] ==================================================================
[   37.324749] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   37.331457] Read of size 1 at addr ffff8881081f8000 by task kunit_try_catch/270
[   37.338773] 
[   37.340271] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   37.340280] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   37.340283] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   37.340287] Call Trace:
[   37.340288]  <TASK>
[   37.340290]  dump_stack_lvl+0x73/0xb0
[   37.340295]  print_report+0xd1/0x650
[   37.340299]  ? __virt_addr_valid+0x1db/0x2d0
[   37.340303]  ? mempool_uaf_helper+0x392/0x400
[   37.340307]  ? kasan_addr_to_slab+0x11/0xa0
[   37.340311]  ? mempool_uaf_helper+0x392/0x400
[   37.340315]  kasan_report+0x141/0x180
[   37.340319]  ? mempool_uaf_helper+0x392/0x400
[   37.340324]  __asan_report_load1_noabort+0x18/0x20
[   37.340329]  mempool_uaf_helper+0x392/0x400
[   37.340350]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   37.340355]  ? __kasan_check_write+0x18/0x20
[   37.340358]  ? __pfx_sched_clock_cpu+0x10/0x10
[   37.340362]  ? finish_task_switch.isra.0+0x153/0x700
[   37.340367]  mempool_kmalloc_large_uaf+0xef/0x140
[   37.340371]  ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10
[   37.340389]  ? __pfx_mempool_kmalloc+0x10/0x10
[   37.340393]  ? __pfx_mempool_kfree+0x10/0x10
[   37.340398]  ? ktime_get_ts64+0x83/0x230
[   37.340402]  kunit_try_run_case+0x1a2/0x480
[   37.340407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.340411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   37.340415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   37.340420]  ? __kthread_parkme+0x82/0x180
[   37.340423]  ? preempt_count_sub+0x50/0x80
[   37.340427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.340432]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.340436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   37.340441]  kthread+0x334/0x6f0
[   37.340444]  ? trace_preempt_on+0x20/0xc0
[   37.340448]  ? __pfx_kthread+0x10/0x10
[   37.340452]  ? _raw_spin_unlock_irq+0x47/0x80
[   37.340456]  ? calculate_sigpending+0x7b/0xa0
[   37.340460]  ? __pfx_kthread+0x10/0x10
[   37.340464]  ret_from_fork+0x113/0x1d0
[   37.340467]  ? __pfx_kthread+0x10/0x10
[   37.340471]  ret_from_fork_asm+0x1a/0x30
[   37.340477]  </TASK>
[   37.340479] 
[   37.533130] The buggy address belongs to the physical page:
[   37.538703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081f8
[   37.546711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   37.554371] flags: 0x200000000000040(head|node=0|zone=2)
[   37.559709] page_type: f8(unknown)
[   37.563118] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   37.570864] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.578605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   37.586438] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   37.594264] head: 0200000000000002 ffffea0004207e01 00000000ffffffff 00000000ffffffff
[   37.602089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   37.609916] page dumped because: kasan: bad access detected
[   37.615488] 
[   37.616989] Memory state around the buggy address:
[   37.621781]  ffff8881081f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.629001]  ffff8881081f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.636228] >ffff8881081f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.643456]                    ^
[   37.646690]  ffff8881081f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.653915]  ffff8881081f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.661134] ==================================================================
[   38.125030] ==================================================================
[   38.136008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400
[   38.142714] Read of size 1 at addr ffff888104eb8000 by task kunit_try_catch/274
[   38.150028] 
[   38.151531] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   38.151540] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   38.151543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   38.151546] Call Trace:
[   38.151548]  <TASK>
[   38.151550]  dump_stack_lvl+0x73/0xb0
[   38.151555]  print_report+0xd1/0x650
[   38.151559]  ? __virt_addr_valid+0x1db/0x2d0
[   38.151563]  ? mempool_uaf_helper+0x392/0x400
[   38.151567]  ? kasan_addr_to_slab+0x11/0xa0
[   38.151571]  ? mempool_uaf_helper+0x392/0x400
[   38.151575]  kasan_report+0x141/0x180
[   38.151579]  ? mempool_uaf_helper+0x392/0x400
[   38.151584]  __asan_report_load1_noabort+0x18/0x20
[   38.151589]  mempool_uaf_helper+0x392/0x400
[   38.151593]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   38.151598]  ? __pfx_sched_clock_cpu+0x10/0x10
[   38.151602]  ? finish_task_switch.isra.0+0x153/0x700
[   38.151607]  mempool_page_alloc_uaf+0xed/0x140
[   38.151611]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   38.151617]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   38.151621]  ? __pfx_mempool_free_pages+0x10/0x10
[   38.151627]  ? ktime_get_ts64+0x83/0x230
[   38.151631]  kunit_try_run_case+0x1a2/0x480
[   38.151636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.151640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   38.151644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   38.151648]  ? __kthread_parkme+0x82/0x180
[   38.151652]  ? preempt_count_sub+0x50/0x80
[   38.151656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   38.151661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   38.151665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   38.151670]  kthread+0x334/0x6f0
[   38.151673]  ? trace_preempt_on+0x20/0xc0
[   38.151677]  ? __pfx_kthread+0x10/0x10
[   38.151681]  ? _raw_spin_unlock_irq+0x47/0x80
[   38.151685]  ? calculate_sigpending+0x7b/0xa0
[   38.151690]  ? __pfx_kthread+0x10/0x10
[   38.151694]  ret_from_fork+0x113/0x1d0
[   38.151697]  ? __pfx_kthread+0x10/0x10
[   38.151701]  ret_from_fork_asm+0x1a/0x30
[   38.151707]  </TASK>
[   38.151708] 
[   38.340277] The buggy address belongs to the physical page:
[   38.345849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8
[   38.353852] flags: 0x200000000000000(node=0|zone=2)
[   38.358739] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   38.366487] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.374227] page dumped because: kasan: bad access detected
[   38.379798] 
[   38.381296] Memory state around the buggy address:
[   38.386091]  ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.393311]  ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.400537] >ffff888104eb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.407757]                    ^
[   38.410991]  ffff888104eb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.418210]  ffff888104eb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.425437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   36.861626] ==================================================================
[   36.873131] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   36.880272] Read of size 1 at addr ffff888105ba0f00 by task kunit_try_catch/268
[   36.887586] 
[   36.889089] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   36.889098] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   36.889101] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.889105] Call Trace:
[   36.889107]  <TASK>
[   36.889108]  dump_stack_lvl+0x73/0xb0
[   36.889113]  print_report+0xd1/0x650
[   36.889117]  ? __virt_addr_valid+0x1db/0x2d0
[   36.889122]  ? mempool_uaf_helper+0x392/0x400
[   36.889126]  ? kasan_complete_mode_report_info+0x64/0x200
[   36.889131]  ? mempool_uaf_helper+0x392/0x400
[   36.889135]  kasan_report+0x141/0x180
[   36.889139]  ? mempool_uaf_helper+0x392/0x400
[   36.889144]  __asan_report_load1_noabort+0x18/0x20
[   36.889149]  mempool_uaf_helper+0x392/0x400
[   36.889153]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   36.889158]  ? __pfx_sched_clock_cpu+0x10/0x10
[   36.889162]  ? finish_task_switch.isra.0+0x153/0x700
[   36.889166]  mempool_kmalloc_uaf+0xef/0x140
[   36.889170]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   36.889175]  ? __pfx_mempool_kmalloc+0x10/0x10
[   36.889180]  ? __pfx_mempool_kfree+0x10/0x10
[   36.889185]  ? ktime_get_ts64+0x83/0x230
[   36.889189]  kunit_try_run_case+0x1a2/0x480
[   36.889194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.889198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.889203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.889207]  ? __kthread_parkme+0x82/0x180
[   36.889210]  ? preempt_count_sub+0x50/0x80
[   36.889215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.889219]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.889223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.889228]  kthread+0x334/0x6f0
[   36.889231]  ? trace_preempt_on+0x20/0xc0
[   36.889235]  ? __pfx_kthread+0x10/0x10
[   36.889239]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.889243]  ? calculate_sigpending+0x7b/0xa0
[   36.889247]  ? __pfx_kthread+0x10/0x10
[   36.889251]  ret_from_fork+0x113/0x1d0
[   36.889255]  ? __pfx_kthread+0x10/0x10
[   36.889258]  ret_from_fork_asm+0x1a/0x30
[   36.889264]  </TASK>
[   36.889266] 
[   37.077760] Allocated by task 268:
[   37.081165]  kasan_save_stack+0x45/0x70
[   37.085005]  kasan_save_track+0x18/0x40
[   37.088844]  kasan_save_alloc_info+0x3b/0x50
[   37.093115]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   37.098430]  remove_element+0x11e/0x190
[   37.102276]  mempool_alloc_preallocated+0x4d/0x90
[   37.106984]  mempool_uaf_helper+0x96/0x400
[   37.111090]  mempool_kmalloc_uaf+0xef/0x140
[   37.115277]  kunit_try_run_case+0x1a2/0x480
[   37.119462]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.124860]  kthread+0x334/0x6f0
[   37.128093]  ret_from_fork+0x113/0x1d0
[   37.131847]  ret_from_fork_asm+0x1a/0x30
[   37.135774] 
[   37.137274] Freed by task 268:
[   37.140350]  kasan_save_stack+0x45/0x70
[   37.144197]  kasan_save_track+0x18/0x40
[   37.148035]  kasan_save_free_info+0x3f/0x60
[   37.152223]  __kasan_mempool_poison_object+0x131/0x1d0
[   37.157394]  mempool_free+0x2ec/0x380
[   37.161062]  mempool_uaf_helper+0x11a/0x400
[   37.165247]  mempool_kmalloc_uaf+0xef/0x140
[   37.169433]  kunit_try_run_case+0x1a2/0x480
[   37.173621]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.179019]  kthread+0x334/0x6f0
[   37.182251]  ret_from_fork+0x113/0x1d0
[   37.186006]  ret_from_fork_asm+0x1a/0x30
[   37.189930] 
[   37.191430] The buggy address belongs to the object at ffff888105ba0f00
[   37.191430]  which belongs to the cache kmalloc-128 of size 128
[   37.203943] The buggy address is located 0 bytes inside of
[   37.203943]  freed 128-byte region [ffff888105ba0f00, ffff888105ba0f80)
[   37.216026] 
[   37.217526] The buggy address belongs to the physical page:
[   37.223098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ba0
[   37.231105] flags: 0x200000000000000(node=0|zone=2)
[   37.235984] page_type: f5(slab)
[   37.239132] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   37.246881] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   37.254628] page dumped because: kasan: bad access detected
[   37.260200] 
[   37.261700] Memory state around the buggy address:
[   37.266492]  ffff888105ba0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.273712]  ffff888105ba0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.280931] >ffff888105ba0f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.288149]                    ^
[   37.291407]  ffff888105ba0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.298629]  ffff888105ba1000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   37.305847] ==================================================================
[   37.668902] ==================================================================
[   37.680663] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   37.687801] Read of size 1 at addr ffff8881066ea240 by task kunit_try_catch/272
[   37.695110] 
[   37.696609] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   37.696618] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   37.696620] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   37.696624] Call Trace:
[   37.696626]  <TASK>
[   37.696628]  dump_stack_lvl+0x73/0xb0
[   37.696632]  print_report+0xd1/0x650
[   37.696636]  ? __virt_addr_valid+0x1db/0x2d0
[   37.696641]  ? mempool_uaf_helper+0x392/0x400
[   37.696645]  ? kasan_complete_mode_report_info+0x64/0x200
[   37.696650]  ? mempool_uaf_helper+0x392/0x400
[   37.696654]  kasan_report+0x141/0x180
[   37.696658]  ? mempool_uaf_helper+0x392/0x400
[   37.696663]  __asan_report_load1_noabort+0x18/0x20
[   37.696668]  mempool_uaf_helper+0x392/0x400
[   37.696672]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   37.696677]  ? __pfx_sched_clock_cpu+0x10/0x10
[   37.696680]  ? finish_task_switch.isra.0+0x153/0x700
[   37.696685]  mempool_slab_uaf+0xea/0x140
[   37.696689]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   37.696694]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   37.696699]  ? __pfx_mempool_free_slab+0x10/0x10
[   37.696704]  ? ktime_get_ts64+0x83/0x230
[   37.696708]  kunit_try_run_case+0x1a2/0x480
[   37.696713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.696717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   37.696722]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   37.696726]  ? __kthread_parkme+0x82/0x180
[   37.696729]  ? preempt_count_sub+0x50/0x80
[   37.696733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   37.696738]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.696742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   37.696747]  kthread+0x334/0x6f0
[   37.696750]  ? trace_preempt_on+0x20/0xc0
[   37.696754]  ? __pfx_kthread+0x10/0x10
[   37.696758]  ? _raw_spin_unlock_irq+0x47/0x80
[   37.696762]  ? calculate_sigpending+0x7b/0xa0
[   37.696766]  ? __pfx_kthread+0x10/0x10
[   37.696770]  ret_from_fork+0x113/0x1d0
[   37.696773]  ? __pfx_kthread+0x10/0x10
[   37.696777]  ret_from_fork_asm+0x1a/0x30
[   37.696783]  </TASK>
[   37.696784] 
[   37.885308] Allocated by task 272:
[   37.888712]  kasan_save_stack+0x45/0x70
[   37.892553]  kasan_save_track+0x18/0x40
[   37.896404]  kasan_save_alloc_info+0x3b/0x50
[   37.900680]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   37.905992]  remove_element+0x11e/0x190
[   37.909833]  mempool_alloc_preallocated+0x4d/0x90
[   37.914538]  mempool_uaf_helper+0x96/0x400
[   37.918638]  mempool_slab_uaf+0xea/0x140
[   37.922562]  kunit_try_run_case+0x1a2/0x480
[   37.926749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.932151]  kthread+0x334/0x6f0
[   37.935404]  ret_from_fork+0x113/0x1d0
[   37.939161]  ret_from_fork_asm+0x1a/0x30
[   37.943087] 
[   37.944587] Freed by task 272:
[   37.947646]  kasan_save_stack+0x45/0x70
[   37.951486]  kasan_save_track+0x18/0x40
[   37.955323]  kasan_save_free_info+0x3f/0x60
[   37.959536]  __kasan_mempool_poison_object+0x131/0x1d0
[   37.964676]  mempool_free+0x2ec/0x380
[   37.968359]  mempool_uaf_helper+0x11a/0x400
[   37.972562]  mempool_slab_uaf+0xea/0x140
[   37.976488]  kunit_try_run_case+0x1a2/0x480
[   37.980674]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   37.986073]  kthread+0x334/0x6f0
[   37.989304]  ret_from_fork+0x113/0x1d0
[   37.993058]  ret_from_fork_asm+0x1a/0x30
[   37.996986] 
[   37.998483] The buggy address belongs to the object at ffff8881066ea240
[   37.998483]  which belongs to the cache test_cache of size 123
[   38.010911] The buggy address is located 0 bytes inside of
[   38.010911]  freed 123-byte region [ffff8881066ea240, ffff8881066ea2bb)
[   38.022994] 
[   38.024492] The buggy address belongs to the physical page:
[   38.030066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   38.038072] flags: 0x200000000000000(node=0|zone=2)
[   38.042952] page_type: f5(slab)
[   38.046099] raw: 0200000000000000 ffff888103805400 dead000000000122 0000000000000000
[   38.053847] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   38.061587] page dumped because: kasan: bad access detected
[   38.067158] 
[   38.068658] Memory state around the buggy address:
[   38.073452]  ffff8881066ea100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.080678]  ffff8881066ea180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.087899] >ffff8881066ea200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   38.095118]                                            ^
[   38.100429]  ffff8881066ea280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.107650]  ffff8881066ea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.114867] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   35.685931] ==================================================================
[   35.696828] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   35.704410] Read of size 1 at addr ffff8881066f8773 by task kunit_try_catch/262
[   35.711723] 
[   35.713228] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   35.713238] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   35.713241] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   35.713245] Call Trace:
[   35.713246]  <TASK>
[   35.713249]  dump_stack_lvl+0x73/0xb0
[   35.713254]  print_report+0xd1/0x650
[   35.713259]  ? __virt_addr_valid+0x1db/0x2d0
[   35.713263]  ? mempool_oob_right_helper+0x318/0x380
[   35.713268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.713273]  ? mempool_oob_right_helper+0x318/0x380
[   35.713278]  kasan_report+0x141/0x180
[   35.713282]  ? mempool_oob_right_helper+0x318/0x380
[   35.713287]  __asan_report_load1_noabort+0x18/0x20
[   35.713292]  mempool_oob_right_helper+0x318/0x380
[   35.713296]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   35.713301]  ? __pfx_sched_clock_cpu+0x10/0x10
[   35.713305]  ? finish_task_switch.isra.0+0x153/0x700
[   35.713310]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.713315]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   35.713320]  ? __pfx_mempool_kmalloc+0x10/0x10
[   35.713325]  ? __pfx_mempool_kfree+0x10/0x10
[   35.713347]  ? ktime_get_ts64+0x83/0x230
[   35.713352]  kunit_try_run_case+0x1a2/0x480
[   35.713357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.713361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   35.713366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   35.713371]  ? __kthread_parkme+0x82/0x180
[   35.713387]  ? preempt_count_sub+0x50/0x80
[   35.713391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.713396]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.713400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.713404]  kthread+0x334/0x6f0
[   35.713408]  ? trace_preempt_on+0x20/0xc0
[   35.713412]  ? __pfx_kthread+0x10/0x10
[   35.713416]  ? _raw_spin_unlock_irq+0x47/0x80
[   35.713420]  ? calculate_sigpending+0x7b/0xa0
[   35.713425]  ? __pfx_kthread+0x10/0x10
[   35.713429]  ret_from_fork+0x113/0x1d0
[   35.713433]  ? __pfx_kthread+0x10/0x10
[   35.713436]  ret_from_fork_asm+0x1a/0x30
[   35.713443]  </TASK>
[   35.713444] 
[   35.905512] Allocated by task 262:
[   35.908918]  kasan_save_stack+0x45/0x70
[   35.912763]  kasan_save_track+0x18/0x40
[   35.916603]  kasan_save_alloc_info+0x3b/0x50
[   35.920877]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   35.926190]  remove_element+0x11e/0x190
[   35.930038]  mempool_alloc_preallocated+0x4d/0x90
[   35.934751]  mempool_oob_right_helper+0x8a/0x380
[   35.939370]  mempool_kmalloc_oob_right+0xf2/0x150
[   35.944104]  kunit_try_run_case+0x1a2/0x480
[   35.948297]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   35.953698]  kthread+0x334/0x6f0
[   35.956930]  ret_from_fork+0x113/0x1d0
[   35.960682]  ret_from_fork_asm+0x1a/0x30
[   35.964610] 
[   35.966107] The buggy address belongs to the object at ffff8881066f8700
[   35.966107]  which belongs to the cache kmalloc-128 of size 128
[   35.978622] The buggy address is located 0 bytes to the right of
[   35.978622]  allocated 115-byte region [ffff8881066f8700, ffff8881066f8773)
[   35.991578] 
[   35.993079] The buggy address belongs to the physical page:
[   35.998652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   36.006658] flags: 0x200000000000000(node=0|zone=2)
[   36.011537] page_type: f5(slab)
[   36.014685] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   36.022425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   36.030173] page dumped because: kasan: bad access detected
[   36.035743] 
[   36.037242] Memory state around the buggy address:
[   36.042037]  ffff8881066f8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.049255]  ffff8881066f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.056474] >ffff8881066f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.063693]                                                              ^
[   36.070566]  ffff8881066f8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.077787]  ffff8881066f8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   36.085005] ==================================================================
[   36.092766] ==================================================================
[   36.104576] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   36.112156] Read of size 1 at addr ffff8881081fa001 by task kunit_try_catch/264
[   36.119465] 
[   36.120964] CPU: 3 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   36.120973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   36.120976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.120980] Call Trace:
[   36.120981]  <TASK>
[   36.120983]  dump_stack_lvl+0x73/0xb0
[   36.120989]  print_report+0xd1/0x650
[   36.120993]  ? __virt_addr_valid+0x1db/0x2d0
[   36.120997]  ? mempool_oob_right_helper+0x318/0x380
[   36.121001]  ? kasan_addr_to_slab+0x11/0xa0
[   36.121005]  ? mempool_oob_right_helper+0x318/0x380
[   36.121009]  kasan_report+0x141/0x180
[   36.121013]  ? mempool_oob_right_helper+0x318/0x380
[   36.121019]  __asan_report_load1_noabort+0x18/0x20
[   36.121023]  mempool_oob_right_helper+0x318/0x380
[   36.121028]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   36.121033]  ? __kasan_check_write+0x18/0x20
[   36.121036]  ? __pfx_sched_clock_cpu+0x10/0x10
[   36.121040]  ? finish_task_switch.isra.0+0x153/0x700
[   36.121045]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   36.121049]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   36.121055]  ? __pfx_mempool_kmalloc+0x10/0x10
[   36.121059]  ? __pfx_mempool_kfree+0x10/0x10
[   36.121064]  ? ktime_get_ts64+0x83/0x230
[   36.121068]  kunit_try_run_case+0x1a2/0x480
[   36.121073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.121077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.121082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.121086]  ? __kthread_parkme+0x82/0x180
[   36.121090]  ? preempt_count_sub+0x50/0x80
[   36.121094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.121099]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.121103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.121107]  kthread+0x334/0x6f0
[   36.121111]  ? trace_preempt_on+0x20/0xc0
[   36.121115]  ? __pfx_kthread+0x10/0x10
[   36.121119]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.121123]  ? calculate_sigpending+0x7b/0xa0
[   36.121127]  ? __pfx_kthread+0x10/0x10
[   36.121131]  ret_from_fork+0x113/0x1d0
[   36.121135]  ? __pfx_kthread+0x10/0x10
[   36.121138]  ret_from_fork_asm+0x1a/0x30
[   36.121144]  </TASK>
[   36.121146] 
[   36.317412] The buggy address belongs to the physical page:
[   36.322991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081f8
[   36.330998] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.338651] flags: 0x200000000000040(head|node=0|zone=2)
[   36.343965] page_type: f8(unknown)
[   36.347372] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.355137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.362883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   36.370709] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.378537] head: 0200000000000002 ffffea0004207e01 00000000ffffffff 00000000ffffffff
[   36.386369] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.394222] page dumped because: kasan: bad access detected
[   36.399795] 
[   36.401293] Memory state around the buggy address:
[   36.406085]  ffff8881081f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.413307]  ffff8881081f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.420525] >ffff8881081fa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.427745]                    ^
[   36.430977]  ffff8881081fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.438197]  ffff8881081fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.445416] ==================================================================
[   36.453058] ==================================================================
[   36.465360] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   36.472932] Read of size 1 at addr ffff8881066eb2bb by task kunit_try_catch/266
[   36.480247] 
[   36.481748] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   36.481757] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   36.481760] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   36.481763] Call Trace:
[   36.481765]  <TASK>
[   36.481767]  dump_stack_lvl+0x73/0xb0
[   36.481771]  print_report+0xd1/0x650
[   36.481775]  ? __virt_addr_valid+0x1db/0x2d0
[   36.481779]  ? mempool_oob_right_helper+0x318/0x380
[   36.481784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   36.481789]  ? mempool_oob_right_helper+0x318/0x380
[   36.481793]  kasan_report+0x141/0x180
[   36.481797]  ? mempool_oob_right_helper+0x318/0x380
[   36.481803]  __asan_report_load1_noabort+0x18/0x20
[   36.481807]  mempool_oob_right_helper+0x318/0x380
[   36.481812]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   36.481817]  ? __pfx_sched_clock_cpu+0x10/0x10
[   36.481820]  ? finish_task_switch.isra.0+0x153/0x700
[   36.481825]  mempool_slab_oob_right+0xed/0x140
[   36.481830]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   36.481835]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   36.481840]  ? __pfx_mempool_free_slab+0x10/0x10
[   36.481845]  ? ktime_get_ts64+0x83/0x230
[   36.481849]  kunit_try_run_case+0x1a2/0x480
[   36.481853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.481858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   36.481862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   36.481866]  ? __kthread_parkme+0x82/0x180
[   36.481870]  ? preempt_count_sub+0x50/0x80
[   36.481874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   36.481878]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.481882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   36.481887]  kthread+0x334/0x6f0
[   36.481890]  ? trace_preempt_on+0x20/0xc0
[   36.481894]  ? __pfx_kthread+0x10/0x10
[   36.481898]  ? _raw_spin_unlock_irq+0x47/0x80
[   36.481902]  ? calculate_sigpending+0x7b/0xa0
[   36.481907]  ? __pfx_kthread+0x10/0x10
[   36.481910]  ret_from_fork+0x113/0x1d0
[   36.481914]  ? __pfx_kthread+0x10/0x10
[   36.481917]  ret_from_fork_asm+0x1a/0x30
[   36.481923]  </TASK>
[   36.481925] 
[   36.674137] Allocated by task 266:
[   36.677544]  kasan_save_stack+0x45/0x70
[   36.681403]  kasan_save_track+0x18/0x40
[   36.685248]  kasan_save_alloc_info+0x3b/0x50
[   36.689528]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   36.694840]  remove_element+0x11e/0x190
[   36.698679]  mempool_alloc_preallocated+0x4d/0x90
[   36.703406]  mempool_oob_right_helper+0x8a/0x380
[   36.708030]  mempool_slab_oob_right+0xed/0x140
[   36.712478]  kunit_try_run_case+0x1a2/0x480
[   36.716664]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   36.722061]  kthread+0x334/0x6f0
[   36.725295]  ret_from_fork+0x113/0x1d0
[   36.729047]  ret_from_fork_asm+0x1a/0x30
[   36.732974] 
[   36.734473] The buggy address belongs to the object at ffff8881066eb240
[   36.734473]  which belongs to the cache test_cache of size 123
[   36.746902] The buggy address is located 0 bytes to the right of
[   36.746902]  allocated 123-byte region [ffff8881066eb240, ffff8881066eb2bb)
[   36.759849] 
[   36.761364] The buggy address belongs to the physical page:
[   36.766937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066eb
[   36.774937] flags: 0x200000000000000(node=0|zone=2)
[   36.779818] page_type: f5(slab)
[   36.782964] raw: 0200000000000000 ffff8881038052c0 dead000000000122 0000000000000000
[   36.790712] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   36.798450] page dumped because: kasan: bad access detected
[   36.804024] 
[   36.805523] Memory state around the buggy address:
[   36.810316]  ffff8881066eb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.817561]  ffff8881066eb200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   36.824781] >ffff8881066eb280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   36.831999]                                         ^
[   36.837051]  ffff8881066eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.844270]  ffff8881066eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.851492] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   34.640306] ==================================================================
[   34.651468] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380
[   34.659224] Read of size 1 at addr ffff888103805040 by task kunit_try_catch/256
[   34.666539] 
[   34.668039] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   34.668048] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   34.668052] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   34.668055] Call Trace:
[   34.668057]  <TASK>
[   34.668059]  dump_stack_lvl+0x73/0xb0
[   34.668065]  print_report+0xd1/0x650
[   34.668069]  ? __virt_addr_valid+0x1db/0x2d0
[   34.668074]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.668079]  ? kasan_complete_mode_report_info+0x64/0x200
[   34.668084]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.668089]  kasan_report+0x141/0x180
[   34.668093]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.668098]  ? kmem_cache_double_destroy+0x1bf/0x380
[   34.668103]  __kasan_check_byte+0x3d/0x50
[   34.668107]  kmem_cache_destroy+0x25/0x1d0
[   34.668111]  kmem_cache_double_destroy+0x1bf/0x380
[   34.668116]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   34.668121]  ? finish_task_switch.isra.0+0x153/0x700
[   34.668125]  ? __switch_to+0x544/0xf50
[   34.668131]  ? ktime_get_ts64+0x83/0x230
[   34.668136]  kunit_try_run_case+0x1a2/0x480
[   34.668141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.668145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.668150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.668154]  ? __kthread_parkme+0x82/0x180
[   34.668158]  ? preempt_count_sub+0x50/0x80
[   34.668162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.668167]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.668171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.668175]  kthread+0x334/0x6f0
[   34.668179]  ? trace_preempt_on+0x20/0xc0
[   34.668184]  ? __pfx_kthread+0x10/0x10
[   34.668187]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.668191]  ? calculate_sigpending+0x7b/0xa0
[   34.668196]  ? __pfx_kthread+0x10/0x10
[   34.668200]  ret_from_fork+0x113/0x1d0
[   34.668204]  ? __pfx_kthread+0x10/0x10
[   34.668208]  ret_from_fork_asm+0x1a/0x30
[   34.668214]  </TASK>
[   34.668216] 
[   34.849648] Allocated by task 256:
[   34.853054]  kasan_save_stack+0x45/0x70
[   34.856891]  kasan_save_track+0x18/0x40
[   34.860730]  kasan_save_alloc_info+0x3b/0x50
[   34.865004]  __kasan_slab_alloc+0x91/0xa0
[   34.869016]  kmem_cache_alloc_noprof+0x123/0x3f0
[   34.873636]  __kmem_cache_create_args+0x169/0x240
[   34.878367]  kmem_cache_double_destroy+0xd5/0x380
[   34.883100]  kunit_try_run_case+0x1a2/0x480
[   34.887286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.892685]  kthread+0x334/0x6f0
[   34.895918]  ret_from_fork+0x113/0x1d0
[   34.899671]  ret_from_fork_asm+0x1a/0x30
[   34.903598] 
[   34.905097] Freed by task 256:
[   34.908155]  kasan_save_stack+0x45/0x70
[   34.911995]  kasan_save_track+0x18/0x40
[   34.915834]  kasan_save_free_info+0x3f/0x60
[   34.920028]  __kasan_slab_free+0x56/0x70
[   34.923955]  kmem_cache_free+0x249/0x420
[   34.927879]  slab_kmem_cache_release+0x2e/0x40
[   34.932327]  kmem_cache_release+0x16/0x20
[   34.936404]  kobject_put+0x17e/0x450
[   34.939986]  sysfs_slab_release+0x16/0x20
[   34.944001]  kmem_cache_destroy+0xf0/0x1d0
[   34.948099]  kmem_cache_double_destroy+0x14e/0x380
[   34.952893]  kunit_try_run_case+0x1a2/0x480
[   34.957077]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.962477]  kthread+0x334/0x6f0
[   34.965711]  ret_from_fork+0x113/0x1d0
[   34.969461]  ret_from_fork_asm+0x1a/0x30
[   34.973394] 
[   34.974889] The buggy address belongs to the object at ffff888103805040
[   34.974889]  which belongs to the cache kmem_cache of size 208
[   34.987316] The buggy address is located 0 bytes inside of
[   34.987316]  freed 208-byte region [ffff888103805040, ffff888103805110)
[   34.999422] 
[   35.000922] The buggy address belongs to the physical page:
[   35.006496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103804
[   35.014505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.022163] flags: 0x200000000000040(head|node=0|zone=2)
[   35.027476] page_type: f5(slab)
[   35.030625] raw: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000
[   35.038372] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.046137] head: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000
[   35.053963] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000
[   35.061789] head: 0200000000000001 ffffea00040e0101 00000000ffffffff 00000000ffffffff
[   35.069615] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   35.077440] page dumped because: kasan: bad access detected
[   35.083012] 
[   35.084511] Memory state around the buggy address:
[   35.089305]  ffff888103804f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.096524]  ffff888103804f80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   35.103742] >ffff888103805000: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   35.110963]                                            ^
[   35.116277]  ffff888103805080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.123504]  ffff888103805100: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.130722] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   34.116572] ==================================================================
[   34.128168] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   34.135318] Read of size 1 at addr ffff888103816000 by task kunit_try_catch/254
[   34.142657] 
[   34.144160] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   34.144170] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   34.144173] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   34.144176] Call Trace:
[   34.144178]  <TASK>
[   34.144181]  dump_stack_lvl+0x73/0xb0
[   34.144186]  print_report+0xd1/0x650
[   34.144191]  ? __virt_addr_valid+0x1db/0x2d0
[   34.144196]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   34.144200]  ? kasan_complete_mode_report_info+0x64/0x200
[   34.144205]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   34.144210]  kasan_report+0x141/0x180
[   34.144214]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   34.144219]  __asan_report_load1_noabort+0x18/0x20
[   34.144224]  kmem_cache_rcu_uaf+0x3e3/0x510
[   34.144228]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   34.144233]  ? finish_task_switch.isra.0+0x153/0x700
[   34.144237]  ? __switch_to+0x544/0xf50
[   34.144243]  ? ktime_get_ts64+0x83/0x230
[   34.144248]  kunit_try_run_case+0x1a2/0x480
[   34.144253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.144257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.144262]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.144266]  ? __kthread_parkme+0x82/0x180
[   34.144270]  ? preempt_count_sub+0x50/0x80
[   34.144274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.144279]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.144283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.144287]  kthread+0x334/0x6f0
[   34.144291]  ? trace_preempt_on+0x20/0xc0
[   34.144295]  ? __pfx_kthread+0x10/0x10
[   34.144299]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.144303]  ? calculate_sigpending+0x7b/0xa0
[   34.144308]  ? __pfx_kthread+0x10/0x10
[   34.144312]  ret_from_fork+0x113/0x1d0
[   34.144315]  ? __pfx_kthread+0x10/0x10
[   34.144319]  ret_from_fork_asm+0x1a/0x30
[   34.144325]  </TASK>
[   34.144327] 
[   34.314466] Allocated by task 254:
[   34.317873]  kasan_save_stack+0x45/0x70
[   34.321721]  kasan_save_track+0x18/0x40
[   34.325559]  kasan_save_alloc_info+0x3b/0x50
[   34.329841]  __kasan_slab_alloc+0x91/0xa0
[   34.333853]  kmem_cache_alloc_noprof+0x123/0x3f0
[   34.338473]  kmem_cache_rcu_uaf+0x155/0x510
[   34.342668]  kunit_try_run_case+0x1a2/0x480
[   34.346860]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.352260]  kthread+0x334/0x6f0
[   34.355491]  ret_from_fork+0x113/0x1d0
[   34.359245]  ret_from_fork_asm+0x1a/0x30
[   34.363173] 
[   34.364672] Freed by task 0:
[   34.367557]  kasan_save_stack+0x45/0x70
[   34.371405]  kasan_save_track+0x18/0x40
[   34.375243]  kasan_save_free_info+0x3f/0x60
[   34.379431]  __kasan_slab_free+0x56/0x70
[   34.383362]  slab_free_after_rcu_debug+0xe4/0x310
[   34.388096]  rcu_core+0x66c/0x1c40
[   34.391503]  rcu_core_si+0x12/0x20
[   34.394909]  handle_softirqs+0x206/0x730
[   34.398835]  __irq_exit_rcu+0xc9/0x110
[   34.402586]  irq_exit_rcu+0x12/0x20
[   34.406081]  sysvec_apic_timer_interrupt+0x81/0x90
[   34.410882]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   34.416019] 
[   34.417520] Last potentially related work creation:
[   34.422403]  kasan_save_stack+0x45/0x70
[   34.426247]  kasan_record_aux_stack+0xb2/0xc0
[   34.430607]  kmem_cache_free+0x131/0x420
[   34.434533]  kmem_cache_rcu_uaf+0x194/0x510
[   34.438726]  kunit_try_run_case+0x1a2/0x480
[   34.442914]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   34.448311]  kthread+0x334/0x6f0
[   34.451546]  ret_from_fork+0x113/0x1d0
[   34.455296]  ret_from_fork_asm+0x1a/0x30
[   34.459224] 
[   34.460723] The buggy address belongs to the object at ffff888103816000
[   34.460723]  which belongs to the cache test_cache of size 200
[   34.473151] The buggy address is located 0 bytes inside of
[   34.473151]  freed 200-byte region [ffff888103816000, ffff8881038160c8)
[   34.485233] 
[   34.486731] The buggy address belongs to the physical page:
[   34.492305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103816
[   34.500312] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.507965] flags: 0x200000000000040(head|node=0|zone=2)
[   34.513278] page_type: f5(slab)
[   34.516426] raw: 0200000000000040 ffff888103804f00 dead000000000122 0000000000000000
[   34.524172] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.531913] head: 0200000000000040 ffff888103804f00 dead000000000122 0000000000000000
[   34.539746] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.547573] head: 0200000000000001 ffffea00040e0581 00000000ffffffff 00000000ffffffff
[   34.555407] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.563233] page dumped because: kasan: bad access detected
[   34.568804] 
[   34.570304] Memory state around the buggy address:
[   34.575096]  ffff888103815f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.582316]  ffff888103815f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.589535] >ffff888103816000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.596755]                    ^
[   34.599987]  ffff888103816080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.607206]  ffff888103816100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.614425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.652307] ==================================================================
[   33.663800] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   33.670768] Free of addr ffff888100ac2001 by task kunit_try_catch/252
[   33.677209] 
[   33.678710] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   33.678719] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   33.678722] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   33.678726] Call Trace:
[   33.678727]  <TASK>
[   33.678729]  dump_stack_lvl+0x73/0xb0
[   33.678735]  print_report+0xd1/0x650
[   33.678739]  ? __virt_addr_valid+0x1db/0x2d0
[   33.678744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.678749]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678754]  kasan_report_invalid_free+0x10a/0x130
[   33.678758]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678764]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678768]  check_slab_allocation+0x11f/0x130
[   33.678772]  __kasan_slab_pre_free+0x28/0x40
[   33.678776]  kmem_cache_free+0xed/0x420
[   33.678779]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   33.678783]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678788]  kmem_cache_invalid_free+0x1d8/0x460
[   33.678793]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   33.678798]  ? finish_task_switch.isra.0+0x153/0x700
[   33.678802]  ? __switch_to+0x544/0xf50
[   33.678808]  ? ktime_get_ts64+0x83/0x230
[   33.678812]  kunit_try_run_case+0x1a2/0x480
[   33.678818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.678822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.678827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.678831]  ? __kthread_parkme+0x82/0x180
[   33.678835]  ? preempt_count_sub+0x50/0x80
[   33.678839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.678843]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.678847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.678852]  kthread+0x334/0x6f0
[   33.678856]  ? trace_preempt_on+0x20/0xc0
[   33.678860]  ? __pfx_kthread+0x10/0x10
[   33.678864]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.678868]  ? calculate_sigpending+0x7b/0xa0
[   33.678873]  ? __pfx_kthread+0x10/0x10
[   33.678877]  ret_from_fork+0x113/0x1d0
[   33.678880]  ? __pfx_kthread+0x10/0x10
[   33.678884]  ret_from_fork_asm+0x1a/0x30
[   33.678890]  </TASK>
[   33.678892] 
[   33.869649] Allocated by task 252:
[   33.873056]  kasan_save_stack+0x45/0x70
[   33.876894]  kasan_save_track+0x18/0x40
[   33.880735]  kasan_save_alloc_info+0x3b/0x50
[   33.885008]  __kasan_slab_alloc+0x91/0xa0
[   33.889020]  kmem_cache_alloc_noprof+0x123/0x3f0
[   33.893639]  kmem_cache_invalid_free+0x157/0x460
[   33.898260]  kunit_try_run_case+0x1a2/0x480
[   33.902454]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.907854]  kthread+0x334/0x6f0
[   33.911084]  ret_from_fork+0x113/0x1d0
[   33.914839]  ret_from_fork_asm+0x1a/0x30
[   33.918772] 
[   33.920273] The buggy address belongs to the object at ffff888100ac2000
[   33.920273]  which belongs to the cache test_cache of size 200
[   33.932700] The buggy address is located 1 bytes inside of
[   33.932700]  200-byte region [ffff888100ac2000, ffff888100ac20c8)
[   33.944262] 
[   33.945762] The buggy address belongs to the physical page:
[   33.951362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac2
[   33.959401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.967056] flags: 0x200000000000040(head|node=0|zone=2)
[   33.972397] page_type: f5(slab)
[   33.975549] raw: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000
[   33.983296] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.991035] head: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000
[   33.998861] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.006688] head: 0200000000000001 ffffea000402b081 00000000ffffffff 00000000ffffffff
[   34.014515] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.022365] page dumped because: kasan: bad access detected
[   34.027963] 
[   34.029464] Memory state around the buggy address:
[   34.034257]  ffff888100ac1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.041475]  ffff888100ac1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.048694] >ffff888100ac2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.055914]                    ^
[   34.059148]  ffff888100ac2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.066365]  ffff888100ac2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.073611] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.173001] ==================================================================
[   33.183810] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   33.190613] Free of addr ffff888103816000 by task kunit_try_catch/250
[   33.197059] 
[   33.198562] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   33.198572] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   33.198575] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   33.198579] Call Trace:
[   33.198580]  <TASK>
[   33.198583]  dump_stack_lvl+0x73/0xb0
[   33.198589]  print_report+0xd1/0x650
[   33.198593]  ? __virt_addr_valid+0x1db/0x2d0
[   33.198598]  ? kasan_complete_mode_report_info+0x64/0x200
[   33.198603]  ? kmem_cache_double_free+0x1e5/0x480
[   33.198608]  kasan_report_invalid_free+0x10a/0x130
[   33.198613]  ? kmem_cache_double_free+0x1e5/0x480
[   33.198618]  ? kmem_cache_double_free+0x1e5/0x480
[   33.198622]  check_slab_allocation+0x101/0x130
[   33.198626]  __kasan_slab_pre_free+0x28/0x40
[   33.198630]  kmem_cache_free+0xed/0x420
[   33.198634]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   33.198638]  ? kmem_cache_double_free+0x1e5/0x480
[   33.198643]  kmem_cache_double_free+0x1e5/0x480
[   33.198648]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   33.198652]  ? finish_task_switch.isra.0+0x153/0x700
[   33.198657]  ? __switch_to+0x544/0xf50
[   33.198663]  ? ktime_get_ts64+0x83/0x230
[   33.198668]  kunit_try_run_case+0x1a2/0x480
[   33.198673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.198677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.198682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.198687]  ? __kthread_parkme+0x82/0x180
[   33.198690]  ? preempt_count_sub+0x50/0x80
[   33.198695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.198699]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.198703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.198708]  kthread+0x334/0x6f0
[   33.198711]  ? trace_preempt_on+0x20/0xc0
[   33.198716]  ? __pfx_kthread+0x10/0x10
[   33.198720]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.198723]  ? calculate_sigpending+0x7b/0xa0
[   33.198729]  ? __pfx_kthread+0x10/0x10
[   33.198732]  ret_from_fork+0x113/0x1d0
[   33.198736]  ? __pfx_kthread+0x10/0x10
[   33.198740]  ret_from_fork_asm+0x1a/0x30
[   33.198746]  </TASK>
[   33.198748] 
[   33.388989] Allocated by task 250:
[   33.392410]  kasan_save_stack+0x45/0x70
[   33.396255]  kasan_save_track+0x18/0x40
[   33.400101]  kasan_save_alloc_info+0x3b/0x50
[   33.404375]  __kasan_slab_alloc+0x91/0xa0
[   33.408414]  kmem_cache_alloc_noprof+0x123/0x3f0
[   33.413031]  kmem_cache_double_free+0x14f/0x480
[   33.417565]  kunit_try_run_case+0x1a2/0x480
[   33.421751]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.427149]  kthread+0x334/0x6f0
[   33.430406]  ret_from_fork+0x113/0x1d0
[   33.434161]  ret_from_fork_asm+0x1a/0x30
[   33.438086] 
[   33.439585] Freed by task 250:
[   33.442644]  kasan_save_stack+0x45/0x70
[   33.446485]  kasan_save_track+0x18/0x40
[   33.450324]  kasan_save_free_info+0x3f/0x60
[   33.454537]  __kasan_slab_free+0x56/0x70
[   33.458461]  kmem_cache_free+0x249/0x420
[   33.462405]  kmem_cache_double_free+0x16a/0x480
[   33.466938]  kunit_try_run_case+0x1a2/0x480
[   33.471124]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.476523]  kthread+0x334/0x6f0
[   33.479755]  ret_from_fork+0x113/0x1d0
[   33.483509]  ret_from_fork_asm+0x1a/0x30
[   33.487436] 
[   33.488933] The buggy address belongs to the object at ffff888103816000
[   33.488933]  which belongs to the cache test_cache of size 200
[   33.501368] The buggy address is located 0 bytes inside of
[   33.501368]  200-byte region [ffff888103816000, ffff8881038160c8)
[   33.512951] 
[   33.514465] The buggy address belongs to the physical page:
[   33.520041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103816
[   33.528048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.535708] flags: 0x200000000000040(head|node=0|zone=2)
[   33.541030] page_type: f5(slab)
[   33.544176] raw: 0200000000000040 ffff888103804dc0 dead000000000122 0000000000000000
[   33.551923] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.559662] head: 0200000000000040 ffff888103804dc0 dead000000000122 0000000000000000
[   33.567489] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.575315] head: 0200000000000001 ffffea00040e0581 00000000ffffffff 00000000ffffffff
[   33.583140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.590966] page dumped because: kasan: bad access detected
[   33.596539] 
[   33.598038] Memory state around the buggy address:
[   33.602830]  ffff888103815f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.610050]  ffff888103815f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.617270] >ffff888103816000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.624488]                    ^
[   33.627723]  ffff888103816080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.634949]  ffff888103816100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.642169] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   32.745574] ==================================================================
[   32.756420] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   32.763121] Read of size 1 at addr ffff88810561e0c8 by task kunit_try_catch/248
[   32.770426] 
[   32.771928] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   32.771936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   32.771939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   32.771943] Call Trace:
[   32.771944]  <TASK>
[   32.771946]  dump_stack_lvl+0x73/0xb0
[   32.771951]  print_report+0xd1/0x650
[   32.771955]  ? __virt_addr_valid+0x1db/0x2d0
[   32.771959]  ? kmem_cache_oob+0x402/0x530
[   32.771963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.771968]  ? kmem_cache_oob+0x402/0x530
[   32.771973]  kasan_report+0x141/0x180
[   32.771977]  ? kmem_cache_oob+0x402/0x530
[   32.771982]  __asan_report_load1_noabort+0x18/0x20
[   32.771986]  kmem_cache_oob+0x402/0x530
[   32.771990]  ? trace_hardirqs_on+0x37/0xe0
[   32.771994]  ? __pfx_kmem_cache_oob+0x10/0x10
[   32.771998]  ? finish_task_switch.isra.0+0x153/0x700
[   32.772002]  ? __switch_to+0x544/0xf50
[   32.772009]  ? ktime_get_ts64+0x83/0x230
[   32.772013]  kunit_try_run_case+0x1a2/0x480
[   32.772017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.772021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.772026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.772030]  ? __kthread_parkme+0x82/0x180
[   32.772033]  ? preempt_count_sub+0x50/0x80
[   32.772037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.772042]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.772046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.772050]  kthread+0x334/0x6f0
[   32.772053]  ? trace_preempt_on+0x20/0xc0
[   32.772057]  ? __pfx_kthread+0x10/0x10
[   32.772061]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.772065]  ? calculate_sigpending+0x7b/0xa0
[   32.772069]  ? __pfx_kthread+0x10/0x10
[   32.772073]  ret_from_fork+0x113/0x1d0
[   32.772076]  ? __pfx_kthread+0x10/0x10
[   32.772080]  ret_from_fork_asm+0x1a/0x30
[   32.772086]  </TASK>
[   32.772087] 
[   32.944558] Allocated by task 248:
[   32.947964]  kasan_save_stack+0x45/0x70
[   32.951802]  kasan_save_track+0x18/0x40
[   32.955641]  kasan_save_alloc_info+0x3b/0x50
[   32.959916]  __kasan_slab_alloc+0x91/0xa0
[   32.963928]  kmem_cache_alloc_noprof+0x123/0x3f0
[   32.968547]  kmem_cache_oob+0x157/0x530
[   32.972414]  kunit_try_run_case+0x1a2/0x480
[   32.976605]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.982006]  kthread+0x334/0x6f0
[   32.985237]  ret_from_fork+0x113/0x1d0
[   32.988991]  ret_from_fork_asm+0x1a/0x30
[   32.992915] 
[   32.994429] The buggy address belongs to the object at ffff88810561e000
[   32.994429]  which belongs to the cache test_cache of size 200
[   33.006853] The buggy address is located 0 bytes to the right of
[   33.006853]  allocated 200-byte region [ffff88810561e000, ffff88810561e0c8)
[   33.019800] 
[   33.021301] The buggy address belongs to the physical page:
[   33.026875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561e
[   33.034880] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.042533] flags: 0x200000000000040(head|node=0|zone=2)
[   33.047847] page_type: f5(slab)
[   33.050993] raw: 0200000000000040 ffff888105612500 dead000000000122 0000000000000000
[   33.058741] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.066489] head: 0200000000000040 ffff888105612500 dead000000000122 0000000000000000
[   33.074314] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.082176] head: 0200000000000001 ffffea0004158781 00000000ffffffff 00000000ffffffff
[   33.090010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.097834] page dumped because: kasan: bad access detected
[   33.103422] 
[   33.104917] Memory state around the buggy address:
[   33.109708]  ffff88810561df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.116928]  ffff88810561e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.124147] >ffff88810561e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.131378]                                               ^
[   33.136983]  ffff88810561e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.144202]  ffff88810561e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.283182] ==================================================================
[   32.293406] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560
[   32.300117] Read of size 8 at addr ffff88810134bfc0 by task kunit_try_catch/241
[   32.307431] 
[   32.308932] CPU: 2 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   32.308941] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   32.308944] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   32.308947] Call Trace:
[   32.308949]  <TASK>
[   32.308951]  dump_stack_lvl+0x73/0xb0
[   32.308957]  print_report+0xd1/0x650
[   32.308961]  ? __virt_addr_valid+0x1db/0x2d0
[   32.308966]  ? workqueue_uaf+0x4d6/0x560
[   32.308970]  ? kasan_complete_mode_report_info+0x64/0x200
[   32.308975]  ? workqueue_uaf+0x4d6/0x560
[   32.308979]  kasan_report+0x141/0x180
[   32.308983]  ? workqueue_uaf+0x4d6/0x560
[   32.308988]  __asan_report_load8_noabort+0x18/0x20
[   32.308993]  workqueue_uaf+0x4d6/0x560
[   32.308997]  ? __pfx_workqueue_uaf+0x10/0x10
[   32.309001]  ? __schedule+0x10cc/0x2b60
[   32.309005]  ? ktime_get_ts64+0x83/0x230
[   32.309010]  kunit_try_run_case+0x1a2/0x480
[   32.309015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.309019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.309024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.309028]  ? __kthread_parkme+0x82/0x180
[   32.309032]  ? preempt_count_sub+0x50/0x80
[   32.309037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.309041]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.309045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.309049]  kthread+0x334/0x6f0
[   32.309053]  ? trace_preempt_on+0x20/0xc0
[   32.309058]  ? __pfx_kthread+0x10/0x10
[   32.309061]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.309065]  ? calculate_sigpending+0x7b/0xa0
[   32.309070]  ? __pfx_kthread+0x10/0x10
[   32.309074]  ret_from_fork+0x113/0x1d0
[   32.309078]  ? __pfx_kthread+0x10/0x10
[   32.309081]  ret_from_fork_asm+0x1a/0x30
[   32.309087]  </TASK>
[   32.309089] 
[   32.472216] Allocated by task 241:
[   32.475623]  kasan_save_stack+0x45/0x70
[   32.479463]  kasan_save_track+0x18/0x40
[   32.483301]  kasan_save_alloc_info+0x3b/0x50
[   32.487574]  __kasan_kmalloc+0xb7/0xc0
[   32.491328]  __kmalloc_cache_noprof+0x189/0x420
[   32.495886]  workqueue_uaf+0x152/0x560
[   32.499639]  kunit_try_run_case+0x1a2/0x480
[   32.503823]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.509223]  kthread+0x334/0x6f0
[   32.512458]  ret_from_fork+0x113/0x1d0
[   32.516210]  ret_from_fork_asm+0x1a/0x30
[   32.520134] 
[   32.521636] Freed by task 49:
[   32.524606]  kasan_save_stack+0x45/0x70
[   32.528445]  kasan_save_track+0x18/0x40
[   32.532286]  kasan_save_free_info+0x3f/0x60
[   32.536470]  __kasan_slab_free+0x56/0x70
[   32.540404]  kfree+0x222/0x3f0
[   32.543466]  workqueue_uaf_work+0x12/0x20
[   32.547478]  process_one_work+0x5eb/0xf60
[   32.551492]  worker_thread+0x758/0x1220
[   32.555348]  kthread+0x334/0x6f0
[   32.558590]  ret_from_fork+0x113/0x1d0
[   32.562361]  ret_from_fork_asm+0x1a/0x30
[   32.566312] 
[   32.567812] Last potentially related work creation:
[   32.572689]  kasan_save_stack+0x45/0x70
[   32.576529]  kasan_record_aux_stack+0xb2/0xc0
[   32.580895]  __queue_work+0x626/0xeb0
[   32.584564]  queue_work_on+0xb6/0xc0
[   32.588141]  workqueue_uaf+0x26d/0x560
[   32.591895]  kunit_try_run_case+0x1a2/0x480
[   32.596081]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.601479]  kthread+0x334/0x6f0
[   32.604712]  ret_from_fork+0x113/0x1d0
[   32.608465]  ret_from_fork_asm+0x1a/0x30
[   32.612407] 
[   32.613901] The buggy address belongs to the object at ffff88810134bfc0
[   32.613901]  which belongs to the cache kmalloc-32 of size 32
[   32.626242] The buggy address is located 0 bytes inside of
[   32.626242]  freed 32-byte region [ffff88810134bfc0, ffff88810134bfe0)
[   32.638236] 
[   32.639736] The buggy address belongs to the physical page:
[   32.645307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10134b
[   32.653315] flags: 0x200000000000000(node=0|zone=2)
[   32.658230] page_type: f5(slab)
[   32.661378] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   32.669143] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.676887] page dumped because: kasan: bad access detected
[   32.682461] 
[   32.683961] Memory state around the buggy address:
[   32.688754]  ffff88810134be80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.695973]  ffff88810134bf00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.703191] >ffff88810134bf80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   32.710410]                                            ^
[   32.715723]  ffff88810134c000: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc
[   32.722944]  ffff88810134c080: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc
[   32.730163] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.741541] ==================================================================
[   31.751924] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   31.758634] Read of size 4 at addr ffff8881066f7d00 by task swapper/3/0
[   31.765253] 
[   31.766756] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   31.766765] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   31.766767] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   31.766771] Call Trace:
[   31.766773]  <IRQ>
[   31.766775]  dump_stack_lvl+0x73/0xb0
[   31.766781]  print_report+0xd1/0x650
[   31.766785]  ? __virt_addr_valid+0x1db/0x2d0
[   31.766790]  ? rcu_uaf_reclaim+0x50/0x60
[   31.766794]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.766799]  ? rcu_uaf_reclaim+0x50/0x60
[   31.766803]  kasan_report+0x141/0x180
[   31.766807]  ? rcu_uaf_reclaim+0x50/0x60
[   31.766811]  __asan_report_load4_noabort+0x18/0x20
[   31.766816]  rcu_uaf_reclaim+0x50/0x60
[   31.766819]  rcu_core+0x66c/0x1c40
[   31.766825]  ? __pfx_rcu_core+0x10/0x10
[   31.766829]  ? ktime_get+0x68/0x150
[   31.766833]  ? handle_softirqs+0x18e/0x730
[   31.766838]  rcu_core_si+0x12/0x20
[   31.766841]  handle_softirqs+0x206/0x730
[   31.766845]  ? hrtimer_interrupt+0x2fe/0x780
[   31.766850]  ? __pfx_handle_softirqs+0x10/0x10
[   31.766855]  __irq_exit_rcu+0xc9/0x110
[   31.766859]  irq_exit_rcu+0x12/0x20
[   31.766862]  sysvec_apic_timer_interrupt+0x81/0x90
[   31.766867]  </IRQ>
[   31.766868]  <TASK>
[   31.766870]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   31.766874] RIP: 0010:cpuidle_enter_state+0xe5/0x2e0
[   31.766880] Code: ff ff ff 48 89 45 c0 e8 09 ab ff fe 31 ff e8 12 c0 70 fc 80 7d d0 00 0f 85 27 01 00 00 e8 a3 b6 ff fe 84 c0 0f 84 0f 01 00 00 <45> 85 ed 0f 88 ef 00 00 00 4d 63 fd 48 8b 7d c0 4b 8d 04 7f 49 8d
[   31.766888] RSP: 0000:ffff888100907d70 EFLAGS: 00000246
[   31.766892] RAX: 0000000000000000 RBX: ffff888103847000 RCX: 000000000000001f
[   31.766896] RDX: 1ffff11083ef6c8f RSI: 0000000000000003 RDI: ffff88841f7b6478
[   31.766900] RBP: ffff888100907db8 R08: 0000000000000004 R09: ffffed1083ef618a
[   31.766903] R10: ffff88841f7b0c53 R11: 0000000000000006 R12: ffffffffa9bb10c0
[   31.766906] R13: 0000000000000003 R14: 0000000000000003 R15: ffffffffa9bb1210
[   31.766911]  ? tick_nohz_idle_enter+0x13f/0x1b0
[   31.766916]  ? mark_tsc_async_resets+0x10/0x40
[   31.766921]  cpuidle_enter+0x53/0xb0
[   31.766925]  ? cpuidle_select+0x5f/0xb0
[   31.766930]  do_idle+0x360/0x4f0
[   31.766935]  ? __pfx_do_idle+0x10/0x10
[   31.766939]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   31.766944]  ? complete+0x15b/0x1d0
[   31.766948]  cpu_startup_entry+0x5c/0x70
[   31.766952]  start_secondary+0x211/0x290
[   31.766956]  ? __pfx_start_secondary+0x10/0x10
[   31.766960]  common_startup_64+0x13e/0x148
[   31.766967]  </TASK>
[   31.766968] 
[   32.004514] Allocated by task 239:
[   32.007920]  kasan_save_stack+0x45/0x70
[   32.011760]  kasan_save_track+0x18/0x40
[   32.015597]  kasan_save_alloc_info+0x3b/0x50
[   32.019872]  __kasan_kmalloc+0xb7/0xc0
[   32.023624]  __kmalloc_cache_noprof+0x189/0x420
[   32.028165]  rcu_uaf+0xb0/0x330
[   32.031313]  kunit_try_run_case+0x1a2/0x480
[   32.035532]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.040933]  kthread+0x334/0x6f0
[   32.044174]  ret_from_fork+0x113/0x1d0
[   32.047926]  ret_from_fork_asm+0x1a/0x30
[   32.051851] 
[   32.053364] Freed by task 0:
[   32.056270]  kasan_save_stack+0x45/0x70
[   32.060111]  kasan_save_track+0x18/0x40
[   32.063949]  kasan_save_free_info+0x3f/0x60
[   32.068135]  __kasan_slab_free+0x56/0x70
[   32.072061]  kfree+0x222/0x3f0
[   32.075122]  rcu_uaf_reclaim+0x1f/0x60
[   32.078873]  rcu_core+0x66c/0x1c40
[   32.082280]  rcu_core_si+0x12/0x20
[   32.085684]  handle_softirqs+0x206/0x730
[   32.089612]  __irq_exit_rcu+0xc9/0x110
[   32.093366]  irq_exit_rcu+0x12/0x20
[   32.096883]  sysvec_apic_timer_interrupt+0x81/0x90
[   32.101674]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   32.106814] 
[   32.108315] Last potentially related work creation:
[   32.113219]  kasan_save_stack+0x45/0x70
[   32.117059]  kasan_record_aux_stack+0xb2/0xc0
[   32.121418]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   32.126470]  call_rcu+0x12/0x20
[   32.129618]  rcu_uaf+0x168/0x330
[   32.132850]  kunit_try_run_case+0x1a2/0x480
[   32.137043]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.142444]  kthread+0x334/0x6f0
[   32.145675]  ret_from_fork+0x113/0x1d0
[   32.149430]  ret_from_fork_asm+0x1a/0x30
[   32.153362] 
[   32.154881] The buggy address belongs to the object at ffff8881066f7d00
[   32.154881]  which belongs to the cache kmalloc-32 of size 32
[   32.167222] The buggy address is located 0 bytes inside of
[   32.167222]  freed 32-byte region [ffff8881066f7d00, ffff8881066f7d20)
[   32.179217] 
[   32.180716] The buggy address belongs to the physical page:
[   32.186287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   32.194286] flags: 0x200000000000000(node=0|zone=2)
[   32.199167] page_type: f5(slab)
[   32.202314] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   32.210086] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.217827] page dumped because: kasan: bad access detected
[   32.223403] 
[   32.224896] Memory state around the buggy address:
[   32.229690]  ffff8881066f7c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.236909]  ffff8881066f7c80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.244128] >ffff8881066f7d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251367]                    ^
[   32.254617]  ffff8881066f7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.261835]  ffff8881066f7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.269055] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   30.928057] ==================================================================
[   30.935313] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   30.941698] Read of size 1 at addr ffff888105bb0200 by task kunit_try_catch/237
[   30.949005] 
[   30.950508] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   30.950516] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   30.950518] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   30.950522] Call Trace:
[   30.950523]  <TASK>
[   30.950525]  dump_stack_lvl+0x73/0xb0
[   30.950529]  print_report+0xd1/0x650
[   30.950533]  ? __virt_addr_valid+0x1db/0x2d0
[   30.950537]  ? ksize_uaf+0x5fe/0x6c0
[   30.950541]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.950546]  ? ksize_uaf+0x5fe/0x6c0
[   30.950550]  kasan_report+0x141/0x180
[   30.950554]  ? ksize_uaf+0x5fe/0x6c0
[   30.950558]  __asan_report_load1_noabort+0x18/0x20
[   30.950563]  ksize_uaf+0x5fe/0x6c0
[   30.950566]  ? __pfx_ksize_uaf+0x10/0x10
[   30.950570]  ? __schedule+0x10cc/0x2b60
[   30.950574]  ? ktime_get_ts64+0x83/0x230
[   30.950579]  kunit_try_run_case+0x1a2/0x480
[   30.950583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.950587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.950591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.950595]  ? __kthread_parkme+0x82/0x180
[   30.950599]  ? preempt_count_sub+0x50/0x80
[   30.950603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.950607]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.950611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.950615]  kthread+0x334/0x6f0
[   30.950619]  ? trace_preempt_on+0x20/0xc0
[   30.950623]  ? __pfx_kthread+0x10/0x10
[   30.950626]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.950630]  ? calculate_sigpending+0x7b/0xa0
[   30.950634]  ? __pfx_kthread+0x10/0x10
[   30.950638]  ret_from_fork+0x113/0x1d0
[   30.950641]  ? __pfx_kthread+0x10/0x10
[   30.950645]  ret_from_fork_asm+0x1a/0x30
[   30.950651]  </TASK>
[   30.950652] 
[   31.112032] Allocated by task 237:
[   31.115440]  kasan_save_stack+0x45/0x70
[   31.119278]  kasan_save_track+0x18/0x40
[   31.123119]  kasan_save_alloc_info+0x3b/0x50
[   31.127406]  __kasan_kmalloc+0xb7/0xc0
[   31.131160]  __kmalloc_cache_noprof+0x189/0x420
[   31.135693]  ksize_uaf+0xaa/0x6c0
[   31.139012]  kunit_try_run_case+0x1a2/0x480
[   31.143199]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.148599]  kthread+0x334/0x6f0
[   31.151830]  ret_from_fork+0x113/0x1d0
[   31.155584]  ret_from_fork_asm+0x1a/0x30
[   31.159510] 
[   31.161008] Freed by task 237:
[   31.164067]  kasan_save_stack+0x45/0x70
[   31.167907]  kasan_save_track+0x18/0x40
[   31.171747]  kasan_save_free_info+0x3f/0x60
[   31.175942]  __kasan_slab_free+0x56/0x70
[   31.179867]  kfree+0x222/0x3f0
[   31.182928]  ksize_uaf+0x12c/0x6c0
[   31.186361]  kunit_try_run_case+0x1a2/0x480
[   31.190571]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.195969]  kthread+0x334/0x6f0
[   31.199203]  ret_from_fork+0x113/0x1d0
[   31.202956]  ret_from_fork_asm+0x1a/0x30
[   31.206881] 
[   31.208379] The buggy address belongs to the object at ffff888105bb0200
[   31.208379]  which belongs to the cache kmalloc-128 of size 128
[   31.220914] The buggy address is located 0 bytes inside of
[   31.220914]  freed 128-byte region [ffff888105bb0200, ffff888105bb0280)
[   31.232994] 
[   31.234494] The buggy address belongs to the physical page:
[   31.240065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0
[   31.248065] flags: 0x200000000000000(node=0|zone=2)
[   31.252944] page_type: f5(slab)
[   31.256093] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   31.263838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.271578] page dumped because: kasan: bad access detected
[   31.277150] 
[   31.278648] Memory state around the buggy address:
[   31.283444]  ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.290670]  ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.297891] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.305110]                    ^
[   31.308364]  ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.315586]  ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.322806] ==================================================================
[   30.516166] ==================================================================
[   30.527669] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   30.534031] Read of size 1 at addr ffff888105bb0200 by task kunit_try_catch/237
[   30.541364] 
[   30.542881] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   30.542890] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   30.542893] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   30.542897] Call Trace:
[   30.542898]  <TASK>
[   30.542900]  dump_stack_lvl+0x73/0xb0
[   30.542905]  print_report+0xd1/0x650
[   30.542909]  ? __virt_addr_valid+0x1db/0x2d0
[   30.542913]  ? ksize_uaf+0x19d/0x6c0
[   30.542916]  ? kasan_complete_mode_report_info+0x64/0x200
[   30.542922]  ? ksize_uaf+0x19d/0x6c0
[   30.542925]  kasan_report+0x141/0x180
[   30.542929]  ? ksize_uaf+0x19d/0x6c0
[   30.542934]  ? ksize_uaf+0x19d/0x6c0
[   30.542937]  __kasan_check_byte+0x3d/0x50
[   30.542941]  ksize+0x20/0x60
[   30.542944]  ksize_uaf+0x19d/0x6c0
[   30.542948]  ? __pfx_ksize_uaf+0x10/0x10
[   30.542952]  ? __schedule+0x10cc/0x2b60
[   30.542956]  ? ktime_get_ts64+0x83/0x230
[   30.542960]  kunit_try_run_case+0x1a2/0x480
[   30.542965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.542969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.542973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.542977]  ? __kthread_parkme+0x82/0x180
[   30.542981]  ? preempt_count_sub+0x50/0x80
[   30.542985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.542989]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.542993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.542997]  kthread+0x334/0x6f0
[   30.543001]  ? trace_preempt_on+0x20/0xc0
[   30.543005]  ? __pfx_kthread+0x10/0x10
[   30.543009]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.543012]  ? calculate_sigpending+0x7b/0xa0
[   30.543017]  ? __pfx_kthread+0x10/0x10
[   30.543021]  ret_from_fork+0x113/0x1d0
[   30.543024]  ? __pfx_kthread+0x10/0x10
[   30.543027]  ret_from_fork_asm+0x1a/0x30
[   30.543033]  </TASK>
[   30.543035] 
[   30.709997] Allocated by task 237:
[   30.713403]  kasan_save_stack+0x45/0x70
[   30.717243]  kasan_save_track+0x18/0x40
[   30.721081]  kasan_save_alloc_info+0x3b/0x50
[   30.725367]  __kasan_kmalloc+0xb7/0xc0
[   30.729140]  __kmalloc_cache_noprof+0x189/0x420
[   30.733674]  ksize_uaf+0xaa/0x6c0
[   30.736994]  kunit_try_run_case+0x1a2/0x480
[   30.741180]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.746580]  kthread+0x334/0x6f0
[   30.749811]  ret_from_fork+0x113/0x1d0
[   30.753565]  ret_from_fork_asm+0x1a/0x30
[   30.757499] 
[   30.758997] Freed by task 237:
[   30.762058]  kasan_save_stack+0x45/0x70
[   30.765897]  kasan_save_track+0x18/0x40
[   30.769737]  kasan_save_free_info+0x3f/0x60
[   30.773922]  __kasan_slab_free+0x56/0x70
[   30.777850]  kfree+0x222/0x3f0
[   30.780918]  ksize_uaf+0x12c/0x6c0
[   30.784323]  kunit_try_run_case+0x1a2/0x480
[   30.788542]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.793943]  kthread+0x334/0x6f0
[   30.797176]  ret_from_fork+0x113/0x1d0
[   30.800927]  ret_from_fork_asm+0x1a/0x30
[   30.804853] 
[   30.806363] The buggy address belongs to the object at ffff888105bb0200
[   30.806363]  which belongs to the cache kmalloc-128 of size 128
[   30.818895] The buggy address is located 0 bytes inside of
[   30.818895]  freed 128-byte region [ffff888105bb0200, ffff888105bb0280)
[   30.830975] 
[   30.832475] The buggy address belongs to the physical page:
[   30.838046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0
[   30.846045] flags: 0x200000000000000(node=0|zone=2)
[   30.850925] page_type: f5(slab)
[   30.854074] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.861819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.869560] page dumped because: kasan: bad access detected
[   30.875130] 
[   30.876631] Memory state around the buggy address:
[   30.881425]  ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.888653]  ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.895870] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.903088]                    ^
[   30.906322]  ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.913567]  ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.920788] ==================================================================
[   31.330048] ==================================================================
[   31.337279] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   31.343631] Read of size 1 at addr ffff888105bb0278 by task kunit_try_catch/237
[   31.350937] 
[   31.352437] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   31.352445] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   31.352448] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   31.352451] Call Trace:
[   31.352452]  <TASK>
[   31.352454]  dump_stack_lvl+0x73/0xb0
[   31.352458]  print_report+0xd1/0x650
[   31.352462]  ? __virt_addr_valid+0x1db/0x2d0
[   31.352466]  ? ksize_uaf+0x5e4/0x6c0
[   31.352470]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.352475]  ? ksize_uaf+0x5e4/0x6c0
[   31.352478]  kasan_report+0x141/0x180
[   31.352482]  ? ksize_uaf+0x5e4/0x6c0
[   31.352487]  __asan_report_load1_noabort+0x18/0x20
[   31.352492]  ksize_uaf+0x5e4/0x6c0
[   31.352495]  ? __pfx_ksize_uaf+0x10/0x10
[   31.352499]  ? __schedule+0x10cc/0x2b60
[   31.352503]  ? ktime_get_ts64+0x83/0x230
[   31.352507]  kunit_try_run_case+0x1a2/0x480
[   31.352512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.352516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.352520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.352524]  ? __kthread_parkme+0x82/0x180
[   31.352527]  ? preempt_count_sub+0x50/0x80
[   31.352531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.352536]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.352540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.352544]  kthread+0x334/0x6f0
[   31.352547]  ? trace_preempt_on+0x20/0xc0
[   31.352551]  ? __pfx_kthread+0x10/0x10
[   31.352555]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.352559]  ? calculate_sigpending+0x7b/0xa0
[   31.352563]  ? __pfx_kthread+0x10/0x10
[   31.352567]  ret_from_fork+0x113/0x1d0
[   31.352570]  ? __pfx_kthread+0x10/0x10
[   31.352574]  ret_from_fork_asm+0x1a/0x30
[   31.352579]  </TASK>
[   31.352581] 
[   31.513906] Allocated by task 237:
[   31.517311]  kasan_save_stack+0x45/0x70
[   31.521150]  kasan_save_track+0x18/0x40
[   31.524988]  kasan_save_alloc_info+0x3b/0x50
[   31.529263]  __kasan_kmalloc+0xb7/0xc0
[   31.533016]  __kmalloc_cache_noprof+0x189/0x420
[   31.537555]  ksize_uaf+0xaa/0x6c0
[   31.540876]  kunit_try_run_case+0x1a2/0x480
[   31.545061]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.550460]  kthread+0x334/0x6f0
[   31.553692]  ret_from_fork+0x113/0x1d0
[   31.557445]  ret_from_fork_asm+0x1a/0x30
[   31.561372] 
[   31.562897] Freed by task 237:
[   31.565956]  kasan_save_stack+0x45/0x70
[   31.569796]  kasan_save_track+0x18/0x40
[   31.573635]  kasan_save_free_info+0x3f/0x60
[   31.577821]  __kasan_slab_free+0x56/0x70
[   31.581747]  kfree+0x222/0x3f0
[   31.584808]  ksize_uaf+0x12c/0x6c0
[   31.588214]  kunit_try_run_case+0x1a2/0x480
[   31.592409]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   31.597817]  kthread+0x334/0x6f0
[   31.601047]  ret_from_fork+0x113/0x1d0
[   31.604802]  ret_from_fork_asm+0x1a/0x30
[   31.608726] 
[   31.610226] The buggy address belongs to the object at ffff888105bb0200
[   31.610226]  which belongs to the cache kmalloc-128 of size 128
[   31.622742] The buggy address is located 120 bytes inside of
[   31.622742]  freed 128-byte region [ffff888105bb0200, ffff888105bb0280)
[   31.634995] 
[   31.636494] The buggy address belongs to the physical page:
[   31.642066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0
[   31.650065] flags: 0x200000000000000(node=0|zone=2)
[   31.654946] page_type: f5(slab)
[   31.658093] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   31.665833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.673580] page dumped because: kasan: bad access detected
[   31.679151] 
[   31.680649] Memory state around the buggy address:
[   31.685445]  ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.692671]  ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.699890] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.707112]                                                                 ^
[   31.714243]  ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.721461]  ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.728680] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   29.764179] ==================================================================
[   29.771411] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   29.778812] Read of size 1 at addr ffff88810133d578 by task kunit_try_catch/235
[   29.786118] 
[   29.787617] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   29.787625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   29.787628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.787631] Call Trace:
[   29.787632]  <TASK>
[   29.787634]  dump_stack_lvl+0x73/0xb0
[   29.787638]  print_report+0xd1/0x650
[   29.787642]  ? __virt_addr_valid+0x1db/0x2d0
[   29.787646]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.787655]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787660]  kasan_report+0x141/0x180
[   29.787664]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787669]  __asan_report_load1_noabort+0x18/0x20
[   29.787673]  ksize_unpoisons_memory+0x7e9/0x9b0
[   29.787678]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.787682]  ? finish_task_switch.isra.0+0x153/0x700
[   29.787686]  ? __switch_to+0x544/0xf50
[   29.787691]  ? __schedule+0x10cc/0x2b60
[   29.787694]  ? ktime_get_ts64+0x83/0x230
[   29.787699]  kunit_try_run_case+0x1a2/0x480
[   29.787703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.787707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.787711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.787715]  ? __kthread_parkme+0x82/0x180
[   29.787719]  ? preempt_count_sub+0x50/0x80
[   29.787723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.787727]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.787731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.787735]  kthread+0x334/0x6f0
[   29.787739]  ? trace_preempt_on+0x20/0xc0
[   29.787743]  ? __pfx_kthread+0x10/0x10
[   29.787746]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.787750]  ? calculate_sigpending+0x7b/0xa0
[   29.787754]  ? __pfx_kthread+0x10/0x10
[   29.787758]  ret_from_fork+0x113/0x1d0
[   29.787761]  ? __pfx_kthread+0x10/0x10
[   29.787765]  ret_from_fork_asm+0x1a/0x30
[   29.787771]  </TASK>
[   29.787772] 
[   29.963399] Allocated by task 235:
[   29.966808]  kasan_save_stack+0x45/0x70
[   29.970646]  kasan_save_track+0x18/0x40
[   29.974486]  kasan_save_alloc_info+0x3b/0x50
[   29.978760]  __kasan_kmalloc+0xb7/0xc0
[   29.982511]  __kmalloc_cache_noprof+0x189/0x420
[   29.987046]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.991498]  kunit_try_run_case+0x1a2/0x480
[   29.995687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.001093]  kthread+0x334/0x6f0
[   30.004326]  ret_from_fork+0x113/0x1d0
[   30.008105]  ret_from_fork_asm+0x1a/0x30
[   30.012030] 
[   30.013530] The buggy address belongs to the object at ffff88810133d500
[   30.013530]  which belongs to the cache kmalloc-128 of size 128
[   30.026046] The buggy address is located 5 bytes to the right of
[   30.026046]  allocated 115-byte region [ffff88810133d500, ffff88810133d573)
[   30.038992] 
[   30.040490] The buggy address belongs to the physical page:
[   30.046066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   30.054072] flags: 0x200000000000000(node=0|zone=2)
[   30.058952] page_type: f5(slab)
[   30.062099] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.069848] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.077593] page dumped because: kasan: bad access detected
[   30.083167] 
[   30.084665] Memory state around the buggy address:
[   30.089459]  ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.096676]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.103896] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.111117]                                                                 ^
[   30.118248]  ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.125467]  ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.132689] ==================================================================
[   29.384125] ==================================================================
[   29.395582] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   29.402984] Read of size 1 at addr ffff88810133d573 by task kunit_try_catch/235
[   29.410297] 
[   29.411800] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   29.411809] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   29.411812] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.411815] Call Trace:
[   29.411817]  <TASK>
[   29.411819]  dump_stack_lvl+0x73/0xb0
[   29.411823]  print_report+0xd1/0x650
[   29.411827]  ? __virt_addr_valid+0x1db/0x2d0
[   29.411831]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.411836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.411841]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.411845]  kasan_report+0x141/0x180
[   29.411849]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   29.411854]  __asan_report_load1_noabort+0x18/0x20
[   29.411859]  ksize_unpoisons_memory+0x81c/0x9b0
[   29.411863]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   29.411867]  ? finish_task_switch.isra.0+0x153/0x700
[   29.411871]  ? __switch_to+0x544/0xf50
[   29.411876]  ? __schedule+0x10cc/0x2b60
[   29.411880]  ? ktime_get_ts64+0x83/0x230
[   29.411884]  kunit_try_run_case+0x1a2/0x480
[   29.411888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.411893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.411897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.411901]  ? __kthread_parkme+0x82/0x180
[   29.411904]  ? preempt_count_sub+0x50/0x80
[   29.411908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.411913]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.411917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.411921]  kthread+0x334/0x6f0
[   29.411925]  ? trace_preempt_on+0x20/0xc0
[   29.411929]  ? __pfx_kthread+0x10/0x10
[   29.411932]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.411936]  ? calculate_sigpending+0x7b/0xa0
[   29.411941]  ? __pfx_kthread+0x10/0x10
[   29.411944]  ret_from_fork+0x113/0x1d0
[   29.411948]  ? __pfx_kthread+0x10/0x10
[   29.411951]  ret_from_fork_asm+0x1a/0x30
[   29.411957]  </TASK>
[   29.411959] 
[   29.587721] Allocated by task 235:
[   29.591127]  kasan_save_stack+0x45/0x70
[   29.594965]  kasan_save_track+0x18/0x40
[   29.598805]  kasan_save_alloc_info+0x3b/0x50
[   29.603078]  __kasan_kmalloc+0xb7/0xc0
[   29.606832]  __kmalloc_cache_noprof+0x189/0x420
[   29.611372]  ksize_unpoisons_memory+0xc7/0x9b0
[   29.615843]  kunit_try_run_case+0x1a2/0x480
[   29.620030]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.625429]  kthread+0x334/0x6f0
[   29.628661]  ret_from_fork+0x113/0x1d0
[   29.632413]  ret_from_fork_asm+0x1a/0x30
[   29.636363] 
[   29.637882] The buggy address belongs to the object at ffff88810133d500
[   29.637882]  which belongs to the cache kmalloc-128 of size 128
[   29.650404] The buggy address is located 0 bytes to the right of
[   29.650404]  allocated 115-byte region [ffff88810133d500, ffff88810133d573)
[   29.663366] 
[   29.664880] The buggy address belongs to the physical page:
[   29.670454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   29.678462] flags: 0x200000000000000(node=0|zone=2)
[   29.683362] page_type: f5(slab)
[   29.686531] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.694279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.702017] page dumped because: kasan: bad access detected
[   29.707590] 
[   29.709089] Memory state around the buggy address:
[   29.713882]  ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.721102]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.728328] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.735574]                                                              ^
[   29.742447]  ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.749665]  ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.756885] ==================================================================
[   30.139944] ==================================================================
[   30.147195] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   30.154588] Read of size 1 at addr ffff88810133d57f by task kunit_try_catch/235
[   30.161901] 
[   30.163405] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   30.163413] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   30.163416] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   30.163419] Call Trace:
[   30.163420]  <TASK>
[   30.163422]  dump_stack_lvl+0x73/0xb0
[   30.163426]  print_report+0xd1/0x650
[   30.163430]  ? __virt_addr_valid+0x1db/0x2d0
[   30.163434]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.163443]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163448]  kasan_report+0x141/0x180
[   30.163451]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163457]  __asan_report_load1_noabort+0x18/0x20
[   30.163461]  ksize_unpoisons_memory+0x7b6/0x9b0
[   30.163466]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   30.163470]  ? finish_task_switch.isra.0+0x153/0x700
[   30.163474]  ? __switch_to+0x544/0xf50
[   30.163478]  ? __schedule+0x10cc/0x2b60
[   30.163482]  ? ktime_get_ts64+0x83/0x230
[   30.163486]  kunit_try_run_case+0x1a2/0x480
[   30.163491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.163495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.163499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.163503]  ? __kthread_parkme+0x82/0x180
[   30.163507]  ? preempt_count_sub+0x50/0x80
[   30.163511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.163515]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.163519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.163523]  kthread+0x334/0x6f0
[   30.163527]  ? trace_preempt_on+0x20/0xc0
[   30.163531]  ? __pfx_kthread+0x10/0x10
[   30.163534]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.163538]  ? calculate_sigpending+0x7b/0xa0
[   30.163542]  ? __pfx_kthread+0x10/0x10
[   30.163546]  ret_from_fork+0x113/0x1d0
[   30.163549]  ? __pfx_kthread+0x10/0x10
[   30.163553]  ret_from_fork_asm+0x1a/0x30
[   30.163559]  </TASK>
[   30.163560] 
[   30.339229] Allocated by task 235:
[   30.342638]  kasan_save_stack+0x45/0x70
[   30.346477]  kasan_save_track+0x18/0x40
[   30.350316]  kasan_save_alloc_info+0x3b/0x50
[   30.354587]  __kasan_kmalloc+0xb7/0xc0
[   30.358363]  __kmalloc_cache_noprof+0x189/0x420
[   30.362900]  ksize_unpoisons_memory+0xc7/0x9b0
[   30.367362]  kunit_try_run_case+0x1a2/0x480
[   30.371574]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   30.376975]  kthread+0x334/0x6f0
[   30.380216]  ret_from_fork+0x113/0x1d0
[   30.383968]  ret_from_fork_asm+0x1a/0x30
[   30.387895] 
[   30.389401] The buggy address belongs to the object at ffff88810133d500
[   30.389401]  which belongs to the cache kmalloc-128 of size 128
[   30.401917] The buggy address is located 12 bytes to the right of
[   30.401917]  allocated 115-byte region [ffff88810133d500, ffff88810133d573)
[   30.414960] 
[   30.416457] The buggy address belongs to the physical page:
[   30.422032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   30.430040] flags: 0x200000000000000(node=0|zone=2)
[   30.434919] page_type: f5(slab)
[   30.438065] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   30.445805] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.453544] page dumped because: kasan: bad access detected
[   30.459117] 
[   30.460616] Memory state around the buggy address:
[   30.465409]  ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.472628]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.479847] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.487067]                                                                 ^
[   30.494198]  ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.501418]  ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.508636] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   28.959089] ==================================================================
[   28.966363] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   28.972399] Free of addr ffff888105602c00 by task kunit_try_catch/233
[   28.978837] 
[   28.980363] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   28.980371] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   28.980374] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.980390] Call Trace:
[   28.980391]  <TASK>
[   28.980393]  dump_stack_lvl+0x73/0xb0
[   28.980397]  print_report+0xd1/0x650
[   28.980401]  ? __virt_addr_valid+0x1db/0x2d0
[   28.980405]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.980410]  ? kfree_sensitive+0x2e/0x90
[   28.980414]  kasan_report_invalid_free+0x10a/0x130
[   28.980418]  ? kfree_sensitive+0x2e/0x90
[   28.980422]  ? kfree_sensitive+0x2e/0x90
[   28.980425]  check_slab_allocation+0x101/0x130
[   28.980429]  __kasan_slab_pre_free+0x28/0x40
[   28.980433]  kfree+0xf0/0x3f0
[   28.980437]  ? kfree_sensitive+0x2e/0x90
[   28.980441]  kfree_sensitive+0x2e/0x90
[   28.980444]  kmalloc_double_kzfree+0x19c/0x350
[   28.980448]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   28.980453]  ? __schedule+0x10cc/0x2b60
[   28.980456]  ? ktime_get_ts64+0x83/0x230
[   28.980461]  kunit_try_run_case+0x1a2/0x480
[   28.980465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.980473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.980477]  ? __kthread_parkme+0x82/0x180
[   28.980481]  ? preempt_count_sub+0x50/0x80
[   28.980485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980489]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.980493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.980497]  kthread+0x334/0x6f0
[   28.980501]  ? trace_preempt_on+0x20/0xc0
[   28.980505]  ? __pfx_kthread+0x10/0x10
[   28.980509]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.980512]  ? calculate_sigpending+0x7b/0xa0
[   28.980517]  ? __pfx_kthread+0x10/0x10
[   28.980520]  ret_from_fork+0x113/0x1d0
[   28.980524]  ? __pfx_kthread+0x10/0x10
[   28.980527]  ret_from_fork_asm+0x1a/0x30
[   28.980533]  </TASK>
[   28.980534] 
[   29.160709] Allocated by task 233:
[   29.164113]  kasan_save_stack+0x45/0x70
[   29.167952]  kasan_save_track+0x18/0x40
[   29.171791]  kasan_save_alloc_info+0x3b/0x50
[   29.176064]  __kasan_kmalloc+0xb7/0xc0
[   29.179818]  __kmalloc_cache_noprof+0x189/0x420
[   29.184365]  kmalloc_double_kzfree+0xa9/0x350
[   29.188753]  kunit_try_run_case+0x1a2/0x480
[   29.192939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.198365]  kthread+0x334/0x6f0
[   29.201622]  ret_from_fork+0x113/0x1d0
[   29.205388]  ret_from_fork_asm+0x1a/0x30
[   29.209326] 
[   29.210853] Freed by task 233:
[   29.213911]  kasan_save_stack+0x45/0x70
[   29.217752]  kasan_save_track+0x18/0x40
[   29.221589]  kasan_save_free_info+0x3f/0x60
[   29.225778]  __kasan_slab_free+0x56/0x70
[   29.229702]  kfree+0x222/0x3f0
[   29.232761]  kfree_sensitive+0x67/0x90
[   29.236514]  kmalloc_double_kzfree+0x12b/0x350
[   29.240960]  kunit_try_run_case+0x1a2/0x480
[   29.245147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.250546]  kthread+0x334/0x6f0
[   29.253778]  ret_from_fork+0x113/0x1d0
[   29.257530]  ret_from_fork_asm+0x1a/0x30
[   29.261456] 
[   29.262957] The buggy address belongs to the object at ffff888105602c00
[   29.262957]  which belongs to the cache kmalloc-16 of size 16
[   29.275298] The buggy address is located 0 bytes inside of
[   29.275298]  16-byte region [ffff888105602c00, ffff888105602c10)
[   29.286771] 
[   29.288272] The buggy address belongs to the physical page:
[   29.293844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105602
[   29.301843] flags: 0x200000000000000(node=0|zone=2)
[   29.306723] page_type: f5(slab)
[   29.309871] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   29.317619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.325364] page dumped because: kasan: bad access detected
[   29.330939] 
[   29.332437] Memory state around the buggy address:
[   29.337230]  ffff888105602b00: 00 03 fc fc 00 03 fc fc fa fb fc fc 00 04 fc fc
[   29.344450]  ffff888105602b80: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   29.351670] >ffff888105602c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.358898]                    ^
[   29.362129]  ffff888105602c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.369364]  ffff888105602d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376585] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   28.530583] ==================================================================
[   28.545022] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350
[   28.552422] Read of size 1 at addr ffff888105602c00 by task kunit_try_catch/233
[   28.559728] 
[   28.561229] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   28.561238] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   28.561240] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.561244] Call Trace:
[   28.561245]  <TASK>
[   28.561247]  dump_stack_lvl+0x73/0xb0
[   28.561252]  print_report+0xd1/0x650
[   28.561256]  ? __virt_addr_valid+0x1db/0x2d0
[   28.561260]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.561264]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.561269]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.561273]  kasan_report+0x141/0x180
[   28.561277]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.561282]  ? kmalloc_double_kzfree+0x19c/0x350
[   28.561286]  __kasan_check_byte+0x3d/0x50
[   28.561290]  kfree_sensitive+0x22/0x90
[   28.561294]  kmalloc_double_kzfree+0x19c/0x350
[   28.561298]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   28.561302]  ? __schedule+0x10cc/0x2b60
[   28.561306]  ? ktime_get_ts64+0x83/0x230
[   28.561310]  kunit_try_run_case+0x1a2/0x480
[   28.561315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.561319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.561323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.561327]  ? __kthread_parkme+0x82/0x180
[   28.561347]  ? preempt_count_sub+0x50/0x80
[   28.561352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.561356]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.561360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.561365]  kthread+0x334/0x6f0
[   28.561368]  ? trace_preempt_on+0x20/0xc0
[   28.561372]  ? __pfx_kthread+0x10/0x10
[   28.561388]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.561392]  ? calculate_sigpending+0x7b/0xa0
[   28.561397]  ? __pfx_kthread+0x10/0x10
[   28.561400]  ret_from_fork+0x113/0x1d0
[   28.561404]  ? __pfx_kthread+0x10/0x10
[   28.561407]  ret_from_fork_asm+0x1a/0x30
[   28.561413]  </TASK>
[   28.561415] 
[   28.735549] Allocated by task 233:
[   28.738954]  kasan_save_stack+0x45/0x70
[   28.742795]  kasan_save_track+0x18/0x40
[   28.746634]  kasan_save_alloc_info+0x3b/0x50
[   28.750906]  __kasan_kmalloc+0xb7/0xc0
[   28.754658]  __kmalloc_cache_noprof+0x189/0x420
[   28.759191]  kmalloc_double_kzfree+0xa9/0x350
[   28.763549]  kunit_try_run_case+0x1a2/0x480
[   28.767737]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.773135]  kthread+0x334/0x6f0
[   28.776370]  ret_from_fork+0x113/0x1d0
[   28.780148]  ret_from_fork_asm+0x1a/0x30
[   28.784074] 
[   28.785574] Freed by task 233:
[   28.788633]  kasan_save_stack+0x45/0x70
[   28.792472]  kasan_save_track+0x18/0x40
[   28.796310]  kasan_save_free_info+0x3f/0x60
[   28.800497]  __kasan_slab_free+0x56/0x70
[   28.804422]  kfree+0x222/0x3f0
[   28.807483]  kfree_sensitive+0x67/0x90
[   28.811235]  kmalloc_double_kzfree+0x12b/0x350
[   28.815690]  kunit_try_run_case+0x1a2/0x480
[   28.819883]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.825283]  kthread+0x334/0x6f0
[   28.828517]  ret_from_fork+0x113/0x1d0
[   28.832267]  ret_from_fork_asm+0x1a/0x30
[   28.836195] 
[   28.837695] The buggy address belongs to the object at ffff888105602c00
[   28.837695]  which belongs to the cache kmalloc-16 of size 16
[   28.850036] The buggy address is located 0 bytes inside of
[   28.850036]  freed 16-byte region [ffff888105602c00, ffff888105602c10)
[   28.862037] 
[   28.863539] The buggy address belongs to the physical page:
[   28.869109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105602
[   28.877110] flags: 0x200000000000000(node=0|zone=2)
[   28.881988] page_type: f5(slab)
[   28.885136] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   28.892883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.900621] page dumped because: kasan: bad access detected
[   28.906196] 
[   28.907693] Memory state around the buggy address:
[   28.912486]  ffff888105602b00: 00 03 fc fc 00 03 fc fc fa fb fc fc 00 04 fc fc
[   28.919707]  ffff888105602b80: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   28.926926] >ffff888105602c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.934143]                    ^
[   28.937389]  ffff888105602c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.944615]  ffff888105602d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.951832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   28.108890] ==================================================================
[   28.120046] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   28.126666] Read of size 1 at addr ffff8881066f50a8 by task kunit_try_catch/229
[   28.133972] 
[   28.135474] CPU: 3 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   28.135482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   28.135485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.135488] Call Trace:
[   28.135490]  <TASK>
[   28.135491]  dump_stack_lvl+0x73/0xb0
[   28.135496]  print_report+0xd1/0x650
[   28.135500]  ? __virt_addr_valid+0x1db/0x2d0
[   28.135504]  ? kmalloc_uaf2+0x4a8/0x520
[   28.135507]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.135512]  ? kmalloc_uaf2+0x4a8/0x520
[   28.135516]  kasan_report+0x141/0x180
[   28.135520]  ? kmalloc_uaf2+0x4a8/0x520
[   28.135524]  __asan_report_load1_noabort+0x18/0x20
[   28.135529]  kmalloc_uaf2+0x4a8/0x520
[   28.135532]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   28.135536]  ? finish_task_switch.isra.0+0x153/0x700
[   28.135540]  ? __switch_to+0x544/0xf50
[   28.135545]  ? __schedule+0x10cc/0x2b60
[   28.135548]  ? ktime_get_ts64+0x83/0x230
[   28.135553]  kunit_try_run_case+0x1a2/0x480
[   28.135557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.135561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.135565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.135570]  ? __kthread_parkme+0x82/0x180
[   28.135573]  ? preempt_count_sub+0x50/0x80
[   28.135577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.135581]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.135585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.135590]  kthread+0x334/0x6f0
[   28.135593]  ? trace_preempt_on+0x20/0xc0
[   28.135597]  ? __pfx_kthread+0x10/0x10
[   28.135601]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.135605]  ? calculate_sigpending+0x7b/0xa0
[   28.135609]  ? __pfx_kthread+0x10/0x10
[   28.135613]  ret_from_fork+0x113/0x1d0
[   28.135616]  ? __pfx_kthread+0x10/0x10
[   28.135620]  ret_from_fork_asm+0x1a/0x30
[   28.135625]  </TASK>
[   28.135627] 
[   28.306915] Allocated by task 229:
[   28.310319]  kasan_save_stack+0x45/0x70
[   28.314187]  kasan_save_track+0x18/0x40
[   28.318025]  kasan_save_alloc_info+0x3b/0x50
[   28.322298]  __kasan_kmalloc+0xb7/0xc0
[   28.326049]  __kmalloc_cache_noprof+0x189/0x420
[   28.330584]  kmalloc_uaf2+0xc6/0x520
[   28.334163]  kunit_try_run_case+0x1a2/0x480
[   28.338367]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.343792]  kthread+0x334/0x6f0
[   28.347023]  ret_from_fork+0x113/0x1d0
[   28.350777]  ret_from_fork_asm+0x1a/0x30
[   28.354702] 
[   28.356202] Freed by task 229:
[   28.359260]  kasan_save_stack+0x45/0x70
[   28.363100]  kasan_save_track+0x18/0x40
[   28.366940]  kasan_save_free_info+0x3f/0x60
[   28.371124]  __kasan_slab_free+0x56/0x70
[   28.375051]  kfree+0x222/0x3f0
[   28.378110]  kmalloc_uaf2+0x14c/0x520
[   28.381776]  kunit_try_run_case+0x1a2/0x480
[   28.385962]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.391363]  kthread+0x334/0x6f0
[   28.394621]  ret_from_fork+0x113/0x1d0
[   28.398373]  ret_from_fork_asm+0x1a/0x30
[   28.402316] 
[   28.403817] The buggy address belongs to the object at ffff8881066f5080
[   28.403817]  which belongs to the cache kmalloc-64 of size 64
[   28.416158] The buggy address is located 40 bytes inside of
[   28.416158]  freed 64-byte region [ffff8881066f5080, ffff8881066f50c0)
[   28.428241] 
[   28.429737] The buggy address belongs to the physical page:
[   28.435312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f5
[   28.443318] flags: 0x200000000000000(node=0|zone=2)
[   28.448225] page_type: f5(slab)
[   28.451395] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   28.459137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.466882] page dumped because: kasan: bad access detected
[   28.472456] 
[   28.473955] Memory state around the buggy address:
[   28.478748]  ffff8881066f4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.485967]  ffff8881066f5000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.493188] >ffff8881066f5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.500406]                                   ^
[   28.504939]  ffff8881066f5100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   28.512159]  ffff8881066f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.519378] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   27.694410] ==================================================================
[   27.704975] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360
[   27.712115] Write of size 33 at addr ffff88810629ff80 by task kunit_try_catch/227
[   27.719594] 
[   27.721095] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   27.721104] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   27.721107] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.721110] Call Trace:
[   27.721111]  <TASK>
[   27.721113]  dump_stack_lvl+0x73/0xb0
[   27.721118]  print_report+0xd1/0x650
[   27.721122]  ? __virt_addr_valid+0x1db/0x2d0
[   27.721125]  ? kmalloc_uaf_memset+0x1a3/0x360
[   27.721129]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.721134]  ? kmalloc_uaf_memset+0x1a3/0x360
[   27.721138]  kasan_report+0x141/0x180
[   27.721142]  ? kmalloc_uaf_memset+0x1a3/0x360
[   27.721147]  kasan_check_range+0x10c/0x1c0
[   27.721151]  __asan_memset+0x27/0x50
[   27.721154]  kmalloc_uaf_memset+0x1a3/0x360
[   27.721158]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   27.721162]  ? __schedule+0x10cc/0x2b60
[   27.721166]  ? ktime_get_ts64+0x83/0x230
[   27.721170]  kunit_try_run_case+0x1a2/0x480
[   27.721175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.721179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.721183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.721187]  ? __kthread_parkme+0x82/0x180
[   27.721190]  ? preempt_count_sub+0x50/0x80
[   27.721195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.721199]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.721203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.721207]  kthread+0x334/0x6f0
[   27.721210]  ? trace_preempt_on+0x20/0xc0
[   27.721214]  ? __pfx_kthread+0x10/0x10
[   27.721218]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.721222]  ? calculate_sigpending+0x7b/0xa0
[   27.721226]  ? __pfx_kthread+0x10/0x10
[   27.721230]  ret_from_fork+0x113/0x1d0
[   27.721233]  ? __pfx_kthread+0x10/0x10
[   27.721237]  ret_from_fork_asm+0x1a/0x30
[   27.721243]  </TASK>
[   27.721244] 
[   27.889365] Allocated by task 227:
[   27.892771]  kasan_save_stack+0x45/0x70
[   27.896611]  kasan_save_track+0x18/0x40
[   27.900451]  kasan_save_alloc_info+0x3b/0x50
[   27.904730]  __kasan_kmalloc+0xb7/0xc0
[   27.908484]  __kmalloc_cache_noprof+0x189/0x420
[   27.913017]  kmalloc_uaf_memset+0xa9/0x360
[   27.917116]  kunit_try_run_case+0x1a2/0x480
[   27.921303]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.926703]  kthread+0x334/0x6f0
[   27.929935]  ret_from_fork+0x113/0x1d0
[   27.933686]  ret_from_fork_asm+0x1a/0x30
[   27.937614] 
[   27.939112] Freed by task 227:
[   27.942170]  kasan_save_stack+0x45/0x70
[   27.946010]  kasan_save_track+0x18/0x40
[   27.949849]  kasan_save_free_info+0x3f/0x60
[   27.954036]  __kasan_slab_free+0x56/0x70
[   27.957962]  kfree+0x222/0x3f0
[   27.961020]  kmalloc_uaf_memset+0x12b/0x360
[   27.965206]  kunit_try_run_case+0x1a2/0x480
[   27.969414]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.974819]  kthread+0x334/0x6f0
[   27.978050]  ret_from_fork+0x113/0x1d0
[   27.981804]  ret_from_fork_asm+0x1a/0x30
[   27.985731] 
[   27.987229] The buggy address belongs to the object at ffff88810629ff80
[   27.987229]  which belongs to the cache kmalloc-64 of size 64
[   27.999570] The buggy address is located 0 bytes inside of
[   27.999570]  freed 64-byte region [ffff88810629ff80, ffff88810629ffc0)
[   28.011565] 
[   28.013063] The buggy address belongs to the physical page:
[   28.018636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10629f
[   28.026636] flags: 0x200000000000000(node=0|zone=2)
[   28.031515] page_type: f5(slab)
[   28.034662] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   28.042409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.050149] page dumped because: kasan: bad access detected
[   28.055721] 
[   28.057219] Memory state around the buggy address:
[   28.062013]  ffff88810629fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.069234]  ffff88810629ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.076454] >ffff88810629ff80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.083681]                    ^
[   28.086912]  ffff8881062a0000: fa fc fc fc 04 fc fc fc fa fc fc fc fa fc fc fc
[   28.094131]  ffff8881062a0080: 02 fc fc fc fa fc fc fc 04 fc fc fc fa fc fc fc
[   28.101365] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   27.285938] ==================================================================
[   27.297973] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380
[   27.304506] Read of size 1 at addr ffff888106713188 by task kunit_try_catch/225
[   27.311812] 
[   27.313314] CPU: 3 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   27.313323] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   27.313326] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.313329] Call Trace:
[   27.313331]  <TASK>
[   27.313350]  dump_stack_lvl+0x73/0xb0
[   27.313355]  print_report+0xd1/0x650
[   27.313359]  ? __virt_addr_valid+0x1db/0x2d0
[   27.313363]  ? kmalloc_uaf+0x320/0x380
[   27.313379]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.313384]  ? kmalloc_uaf+0x320/0x380
[   27.313388]  kasan_report+0x141/0x180
[   27.313392]  ? kmalloc_uaf+0x320/0x380
[   27.313396]  __asan_report_load1_noabort+0x18/0x20
[   27.313401]  kmalloc_uaf+0x320/0x380
[   27.313404]  ? __pfx_kmalloc_uaf+0x10/0x10
[   27.313408]  ? __schedule+0x10cc/0x2b60
[   27.313412]  ? ktime_get_ts64+0x83/0x230
[   27.313416]  kunit_try_run_case+0x1a2/0x480
[   27.313421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.313425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.313429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.313433]  ? __kthread_parkme+0x82/0x180
[   27.313437]  ? preempt_count_sub+0x50/0x80
[   27.313441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.313445]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.313449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.313453]  kthread+0x334/0x6f0
[   27.313457]  ? trace_preempt_on+0x20/0xc0
[   27.313461]  ? __pfx_kthread+0x10/0x10
[   27.313464]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.313468]  ? calculate_sigpending+0x7b/0xa0
[   27.313473]  ? __pfx_kthread+0x10/0x10
[   27.313476]  ret_from_fork+0x113/0x1d0
[   27.313480]  ? __pfx_kthread+0x10/0x10
[   27.313483]  ret_from_fork_asm+0x1a/0x30
[   27.313489]  </TASK>
[   27.313491] 
[   27.475724] Allocated by task 225:
[   27.479129]  kasan_save_stack+0x45/0x70
[   27.482969]  kasan_save_track+0x18/0x40
[   27.486808]  kasan_save_alloc_info+0x3b/0x50
[   27.491080]  __kasan_kmalloc+0xb7/0xc0
[   27.494833]  __kmalloc_cache_noprof+0x189/0x420
[   27.499379]  kmalloc_uaf+0xaa/0x380
[   27.502879]  kunit_try_run_case+0x1a2/0x480
[   27.507072]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.512471]  kthread+0x334/0x6f0
[   27.515703]  ret_from_fork+0x113/0x1d0
[   27.519455]  ret_from_fork_asm+0x1a/0x30
[   27.523402] 
[   27.524899] Freed by task 225:
[   27.527959]  kasan_save_stack+0x45/0x70
[   27.531798]  kasan_save_track+0x18/0x40
[   27.535637]  kasan_save_free_info+0x3f/0x60
[   27.539824]  __kasan_slab_free+0x56/0x70
[   27.543748]  kfree+0x222/0x3f0
[   27.546807]  kmalloc_uaf+0x12c/0x380
[   27.550404]  kunit_try_run_case+0x1a2/0x480
[   27.554592]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.559998]  kthread+0x334/0x6f0
[   27.563231]  ret_from_fork+0x113/0x1d0
[   27.566984]  ret_from_fork_asm+0x1a/0x30
[   27.570911] 
[   27.572419] The buggy address belongs to the object at ffff888106713180
[   27.572419]  which belongs to the cache kmalloc-16 of size 16
[   27.584761] The buggy address is located 8 bytes inside of
[   27.584761]  freed 16-byte region [ffff888106713180, ffff888106713190)
[   27.596762] 
[   27.598262] The buggy address belongs to the physical page:
[   27.603836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   27.611842] flags: 0x200000000000000(node=0|zone=2)
[   27.616723] page_type: f5(slab)
[   27.619868] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   27.627607] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.635361] page dumped because: kasan: bad access detected
[   27.640962] 
[   27.642461] Memory state around the buggy address:
[   27.647256]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.654475]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.661695] >ffff888106713180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.668912]                       ^
[   27.672420]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.679643]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.686862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   26.909450] ==================================================================
[   26.921582] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   26.929501] Read of size 64 at addr ffff888101438f84 by task kunit_try_catch/223
[   26.936894] 
[   26.938411] CPU: 2 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   26.938420] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   26.938423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.938426] Call Trace:
[   26.938428]  <TASK>
[   26.938429]  dump_stack_lvl+0x73/0xb0
[   26.938434]  print_report+0xd1/0x650
[   26.938438]  ? __virt_addr_valid+0x1db/0x2d0
[   26.938442]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.938446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.938451]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.938456]  kasan_report+0x141/0x180
[   26.938459]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   26.938465]  kasan_check_range+0x10c/0x1c0
[   26.938469]  __asan_memmove+0x27/0x70
[   26.938472]  kmalloc_memmove_invalid_size+0x16f/0x330
[   26.938477]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   26.938481]  ? __schedule+0x10cc/0x2b60
[   26.938485]  ? ktime_get_ts64+0x83/0x230
[   26.938490]  kunit_try_run_case+0x1a2/0x480
[   26.938494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.938498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.938502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.938506]  ? __kthread_parkme+0x82/0x180
[   26.938510]  ? preempt_count_sub+0x50/0x80
[   26.938514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.938518]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.938522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.938526]  kthread+0x334/0x6f0
[   26.938530]  ? trace_preempt_on+0x20/0xc0
[   26.938534]  ? __pfx_kthread+0x10/0x10
[   26.938537]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.938541]  ? calculate_sigpending+0x7b/0xa0
[   26.938545]  ? __pfx_kthread+0x10/0x10
[   26.938549]  ret_from_fork+0x113/0x1d0
[   26.938552]  ? __pfx_kthread+0x10/0x10
[   26.938556]  ret_from_fork_asm+0x1a/0x30
[   26.938562]  </TASK>
[   26.938563] 
[   27.111094] Allocated by task 223:
[   27.114500]  kasan_save_stack+0x45/0x70
[   27.118361]  kasan_save_track+0x18/0x40
[   27.122232]  kasan_save_alloc_info+0x3b/0x50
[   27.126511]  __kasan_kmalloc+0xb7/0xc0
[   27.130264]  __kmalloc_cache_noprof+0x189/0x420
[   27.134797]  kmalloc_memmove_invalid_size+0xac/0x330
[   27.139772]  kunit_try_run_case+0x1a2/0x480
[   27.143959]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.149364]  kthread+0x334/0x6f0
[   27.152614]  ret_from_fork+0x113/0x1d0
[   27.156368]  ret_from_fork_asm+0x1a/0x30
[   27.160312] 
[   27.161810] The buggy address belongs to the object at ffff888101438f80
[   27.161810]  which belongs to the cache kmalloc-64 of size 64
[   27.174151] The buggy address is located 4 bytes inside of
[   27.174151]  allocated 64-byte region [ffff888101438f80, ffff888101438fc0)
[   27.186495] 
[   27.187992] The buggy address belongs to the physical page:
[   27.193566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101438
[   27.201573] flags: 0x200000000000000(node=0|zone=2)
[   27.206454] page_type: f5(slab)
[   27.209601] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   27.217363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.225103] page dumped because: kasan: bad access detected
[   27.230675] 
[   27.232174] Memory state around the buggy address:
[   27.236968]  ffff888101438e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.244187]  ffff888101438f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.251408] >ffff888101438f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   27.258633]                                            ^
[   27.263946]  ffff888101439000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   27.271166]  ffff888101439080: fb fb fc fc fc fc fa fb fb fb fb fb fb fc fc fc
[   27.278408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   26.534895] ==================================================================
[   26.546306] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   26.553882] Read of size 18446744073709551614 at addr ffff888101438f04 by task kunit_try_catch/221
[   26.562843] 
[   26.564363] CPU: 2 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   26.564372] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   26.564387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.564390] Call Trace:
[   26.564392]  <TASK>
[   26.564394]  dump_stack_lvl+0x73/0xb0
[   26.564399]  print_report+0xd1/0x650
[   26.564403]  ? __virt_addr_valid+0x1db/0x2d0
[   26.564407]  ? kmalloc_memmove_negative_size+0x171/0x330
[   26.564411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.564416]  ? kmalloc_memmove_negative_size+0x171/0x330
[   26.564421]  kasan_report+0x141/0x180
[   26.564425]  ? kmalloc_memmove_negative_size+0x171/0x330
[   26.564430]  kasan_check_range+0x10c/0x1c0
[   26.564434]  __asan_memmove+0x27/0x70
[   26.564438]  kmalloc_memmove_negative_size+0x171/0x330
[   26.564442]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   26.564447]  ? __schedule+0x10cc/0x2b60
[   26.564451]  ? ktime_get_ts64+0x83/0x230
[   26.564455]  kunit_try_run_case+0x1a2/0x480
[   26.564460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.564464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.564468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.564472]  ? __kthread_parkme+0x82/0x180
[   26.564476]  ? preempt_count_sub+0x50/0x80
[   26.564480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.564484]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.564488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.564492]  kthread+0x334/0x6f0
[   26.564496]  ? trace_preempt_on+0x20/0xc0
[   26.564500]  ? __pfx_kthread+0x10/0x10
[   26.564503]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.564507]  ? calculate_sigpending+0x7b/0xa0
[   26.564511]  ? __pfx_kthread+0x10/0x10
[   26.564515]  ret_from_fork+0x113/0x1d0
[   26.564518]  ? __pfx_kthread+0x10/0x10
[   26.564522]  ret_from_fork_asm+0x1a/0x30
[   26.564528]  </TASK>
[   26.564529] 
[   26.737544] Allocated by task 221:
[   26.740952]  kasan_save_stack+0x45/0x70
[   26.744799]  kasan_save_track+0x18/0x40
[   26.748637]  kasan_save_alloc_info+0x3b/0x50
[   26.752910]  __kasan_kmalloc+0xb7/0xc0
[   26.756662]  __kmalloc_cache_noprof+0x189/0x420
[   26.761195]  kmalloc_memmove_negative_size+0xac/0x330
[   26.766250]  kunit_try_run_case+0x1a2/0x480
[   26.770443]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.775844]  kthread+0x334/0x6f0
[   26.779074]  ret_from_fork+0x113/0x1d0
[   26.782827]  ret_from_fork_asm+0x1a/0x30
[   26.786752] 
[   26.788253] The buggy address belongs to the object at ffff888101438f00
[   26.788253]  which belongs to the cache kmalloc-64 of size 64
[   26.800594] The buggy address is located 4 bytes inside of
[   26.800594]  64-byte region [ffff888101438f00, ffff888101438f40)
[   26.812070] 
[   26.813569] The buggy address belongs to the physical page:
[   26.819140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101438
[   26.827139] flags: 0x200000000000000(node=0|zone=2)
[   26.832020] page_type: f5(slab)
[   26.835166] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   26.842907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.850654] page dumped because: kasan: bad access detected
[   26.856226] 
[   26.857725] Memory state around the buggy address:
[   26.862518]  ffff888101438e00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   26.869737]  ffff888101438e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.876956] >ffff888101438f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.884175]                    ^
[   26.887414]  ffff888101438f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.894638]  ffff888101439000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb
[   26.901863] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   26.161061] ==================================================================
[   26.172413] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330
[   26.179727] Write of size 16 at addr ffff8881066f8469 by task kunit_try_catch/219
[   26.187213] 
[   26.188715] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   26.188724] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   26.188727] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.188730] Call Trace:
[   26.188732]  <TASK>
[   26.188734]  dump_stack_lvl+0x73/0xb0
[   26.188738]  print_report+0xd1/0x650
[   26.188742]  ? __virt_addr_valid+0x1db/0x2d0
[   26.188746]  ? kmalloc_oob_memset_16+0x166/0x330
[   26.188750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.188755]  ? kmalloc_oob_memset_16+0x166/0x330
[   26.188759]  kasan_report+0x141/0x180
[   26.188763]  ? kmalloc_oob_memset_16+0x166/0x330
[   26.188768]  kasan_check_range+0x10c/0x1c0
[   26.188772]  __asan_memset+0x27/0x50
[   26.188775]  kmalloc_oob_memset_16+0x166/0x330
[   26.188779]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   26.188783]  ? __schedule+0x10cc/0x2b60
[   26.188787]  ? ktime_get_ts64+0x83/0x230
[   26.188792]  kunit_try_run_case+0x1a2/0x480
[   26.188796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.188800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.188804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.188808]  ? __kthread_parkme+0x82/0x180
[   26.188812]  ? preempt_count_sub+0x50/0x80
[   26.188816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.188820]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.188824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.188829]  kthread+0x334/0x6f0
[   26.188832]  ? trace_preempt_on+0x20/0xc0
[   26.188836]  ? __pfx_kthread+0x10/0x10
[   26.188840]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.188843]  ? calculate_sigpending+0x7b/0xa0
[   26.188848]  ? __pfx_kthread+0x10/0x10
[   26.188852]  ret_from_fork+0x113/0x1d0
[   26.188855]  ? __pfx_kthread+0x10/0x10
[   26.188859]  ret_from_fork_asm+0x1a/0x30
[   26.188864]  </TASK>
[   26.188866] 
[   26.358303] Allocated by task 219:
[   26.361706]  kasan_save_stack+0x45/0x70
[   26.365548]  kasan_save_track+0x18/0x40
[   26.369417]  kasan_save_alloc_info+0x3b/0x50
[   26.373695]  __kasan_kmalloc+0xb7/0xc0
[   26.377445]  __kmalloc_cache_noprof+0x189/0x420
[   26.381977]  kmalloc_oob_memset_16+0xac/0x330
[   26.386360]  kunit_try_run_case+0x1a2/0x480
[   26.390595]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.395993]  kthread+0x334/0x6f0
[   26.399224]  ret_from_fork+0x113/0x1d0
[   26.402977]  ret_from_fork_asm+0x1a/0x30
[   26.406903] 
[   26.408421] The buggy address belongs to the object at ffff8881066f8400
[   26.408421]  which belongs to the cache kmalloc-128 of size 128
[   26.420937] The buggy address is located 105 bytes inside of
[   26.420937]  allocated 120-byte region [ffff8881066f8400, ffff8881066f8478)
[   26.433546] 
[   26.435044] The buggy address belongs to the physical page:
[   26.440618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   26.448624] flags: 0x200000000000000(node=0|zone=2)
[   26.453506] page_type: f5(slab)
[   26.456651] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   26.464416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.472154] page dumped because: kasan: bad access detected
[   26.477727] 
[   26.479227] Memory state around the buggy address:
[   26.484019]  ffff8881066f8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.491239]  ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.498458] >ffff8881066f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.505677]                                                                 ^
[   26.512810]  ffff8881066f8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.520029]  ffff8881066f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.527248] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   25.787909] ==================================================================
[   25.799236] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   25.806464] Write of size 8 at addr ffff88810133d471 by task kunit_try_catch/217
[   25.813864] 
[   25.815377] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   25.815386] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   25.815389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.815392] Call Trace:
[   25.815394]  <TASK>
[   25.815396]  dump_stack_lvl+0x73/0xb0
[   25.815400]  print_report+0xd1/0x650
[   25.815404]  ? __virt_addr_valid+0x1db/0x2d0
[   25.815408]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.815412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.815417]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.815421]  kasan_report+0x141/0x180
[   25.815425]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.815430]  kasan_check_range+0x10c/0x1c0
[   25.815434]  __asan_memset+0x27/0x50
[   25.815437]  kmalloc_oob_memset_8+0x166/0x330
[   25.815441]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   25.815445]  ? __schedule+0x10cc/0x2b60
[   25.815449]  ? ktime_get_ts64+0x83/0x230
[   25.815454]  kunit_try_run_case+0x1a2/0x480
[   25.815458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.815462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.815466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.815471]  ? __kthread_parkme+0x82/0x180
[   25.815474]  ? preempt_count_sub+0x50/0x80
[   25.815478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.815483]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.815487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.815491]  kthread+0x334/0x6f0
[   25.815494]  ? trace_preempt_on+0x20/0xc0
[   25.815498]  ? __pfx_kthread+0x10/0x10
[   25.815502]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.815505]  ? calculate_sigpending+0x7b/0xa0
[   25.815510]  ? __pfx_kthread+0x10/0x10
[   25.815514]  ret_from_fork+0x113/0x1d0
[   25.815517]  ? __pfx_kthread+0x10/0x10
[   25.815520]  ret_from_fork_asm+0x1a/0x30
[   25.815526]  </TASK>
[   25.815528] 
[   25.984751] Allocated by task 217:
[   25.988159]  kasan_save_stack+0x45/0x70
[   25.991997]  kasan_save_track+0x18/0x40
[   25.995837]  kasan_save_alloc_info+0x3b/0x50
[   26.000110]  __kasan_kmalloc+0xb7/0xc0
[   26.003863]  __kmalloc_cache_noprof+0x189/0x420
[   26.008416]  kmalloc_oob_memset_8+0xac/0x330
[   26.012695]  kunit_try_run_case+0x1a2/0x480
[   26.016887]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.022288]  kthread+0x334/0x6f0
[   26.025519]  ret_from_fork+0x113/0x1d0
[   26.029272]  ret_from_fork_asm+0x1a/0x30
[   26.033198] 
[   26.034698] The buggy address belongs to the object at ffff88810133d400
[   26.034698]  which belongs to the cache kmalloc-128 of size 128
[   26.047212] The buggy address is located 113 bytes inside of
[   26.047212]  allocated 120-byte region [ffff88810133d400, ffff88810133d478)
[   26.059815] 
[   26.061313] The buggy address belongs to the physical page:
[   26.066921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   26.074921] flags: 0x200000000000000(node=0|zone=2)
[   26.079800] page_type: f5(slab)
[   26.082947] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   26.090684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.098423] page dumped because: kasan: bad access detected
[   26.103996] 
[   26.105495] Memory state around the buggy address:
[   26.110289]  ffff88810133d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.117510]  ffff88810133d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.124738] >ffff88810133d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.131965]                                                                 ^
[   26.139097]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.146317]  ffff88810133d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.153568] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   25.414888] ==================================================================
[   25.426215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   25.433441] Write of size 4 at addr ffff8881066f8375 by task kunit_try_catch/215
[   25.440834] 
[   25.442363] CPU: 3 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   25.442372] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   25.442387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.442390] Call Trace:
[   25.442392]  <TASK>
[   25.442393]  dump_stack_lvl+0x73/0xb0
[   25.442398]  print_report+0xd1/0x650
[   25.442402]  ? __virt_addr_valid+0x1db/0x2d0
[   25.442406]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.442410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.442415]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.442419]  kasan_report+0x141/0x180
[   25.442422]  ? kmalloc_oob_memset_4+0x166/0x330
[   25.442427]  kasan_check_range+0x10c/0x1c0
[   25.442432]  __asan_memset+0x27/0x50
[   25.442435]  kmalloc_oob_memset_4+0x166/0x330
[   25.442439]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   25.442443]  ? __schedule+0x10cc/0x2b60
[   25.442447]  ? ktime_get_ts64+0x83/0x230
[   25.442451]  kunit_try_run_case+0x1a2/0x480
[   25.442456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.442460]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.442464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.442468]  ? __kthread_parkme+0x82/0x180
[   25.442471]  ? preempt_count_sub+0x50/0x80
[   25.442475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.442480]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.442484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.442488]  kthread+0x334/0x6f0
[   25.442491]  ? trace_preempt_on+0x20/0xc0
[   25.442495]  ? __pfx_kthread+0x10/0x10
[   25.442499]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.442503]  ? calculate_sigpending+0x7b/0xa0
[   25.442507]  ? __pfx_kthread+0x10/0x10
[   25.442511]  ret_from_fork+0x113/0x1d0
[   25.442514]  ? __pfx_kthread+0x10/0x10
[   25.442518]  ret_from_fork_asm+0x1a/0x30
[   25.442523]  </TASK>
[   25.442525] 
[   25.611567] Allocated by task 215:
[   25.614973]  kasan_save_stack+0x45/0x70
[   25.618813]  kasan_save_track+0x18/0x40
[   25.622654]  kasan_save_alloc_info+0x3b/0x50
[   25.626932]  __kasan_kmalloc+0xb7/0xc0
[   25.630686]  __kmalloc_cache_noprof+0x189/0x420
[   25.635218]  kmalloc_oob_memset_4+0xac/0x330
[   25.639493]  kunit_try_run_case+0x1a2/0x480
[   25.643686]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.649084]  kthread+0x334/0x6f0
[   25.652318]  ret_from_fork+0x113/0x1d0
[   25.656096]  ret_from_fork_asm+0x1a/0x30
[   25.660022] 
[   25.661521] The buggy address belongs to the object at ffff8881066f8300
[   25.661521]  which belongs to the cache kmalloc-128 of size 128
[   25.674028] The buggy address is located 117 bytes inside of
[   25.674028]  allocated 120-byte region [ffff8881066f8300, ffff8881066f8378)
[   25.686629] 
[   25.688130] The buggy address belongs to the physical page:
[   25.693700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8
[   25.701701] flags: 0x200000000000000(node=0|zone=2)
[   25.706581] page_type: f5(slab)
[   25.709727] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   25.717476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.725222] page dumped because: kasan: bad access detected
[   25.730795] 
[   25.732295] Memory state around the buggy address:
[   25.737087]  ffff8881066f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.744307]  ffff8881066f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.751533] >ffff8881066f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.758754]                                                                 ^
[   25.765886]  ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.773106]  ffff8881066f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.780324] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   17.342177] ==================================================================
[   17.357229] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   17.363592] Read of size 1 at addr ffff8881082d0000 by task kunit_try_catch/195
[   17.370905] 
[   17.372407] CPU: 3 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.372415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   17.372418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.372421] Call Trace:
[   17.372423]  <TASK>
[   17.372425]  dump_stack_lvl+0x73/0xb0
[   17.372430]  print_report+0xd1/0x650
[   17.372434]  ? __virt_addr_valid+0x1db/0x2d0
[   17.372438]  ? page_alloc_uaf+0x356/0x3d0
[   17.372442]  ? kasan_addr_to_slab+0x11/0xa0
[   17.372445]  ? page_alloc_uaf+0x356/0x3d0
[   17.372449]  kasan_report+0x141/0x180
[   17.372453]  ? page_alloc_uaf+0x356/0x3d0
[   17.372458]  __asan_report_load1_noabort+0x18/0x20
[   17.372463]  page_alloc_uaf+0x356/0x3d0
[   17.372467]  ? __pfx_page_alloc_uaf+0x10/0x10
[   17.372471]  ? __schedule+0x10cc/0x2b60
[   17.372475]  ? ktime_get_ts64+0x83/0x230
[   17.372479]  kunit_try_run_case+0x1a2/0x480
[   17.372484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.372488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.372492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.372496]  ? __kthread_parkme+0x82/0x180
[   17.372500]  ? preempt_count_sub+0x50/0x80
[   17.372504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.372508]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.372512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.372516]  kthread+0x334/0x6f0
[   17.372520]  ? trace_preempt_on+0x20/0xc0
[   17.372524]  ? __pfx_kthread+0x10/0x10
[   17.372528]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.372531]  ? calculate_sigpending+0x7b/0xa0
[   17.372536]  ? __pfx_kthread+0x10/0x10
[   17.372540]  ret_from_fork+0x113/0x1d0
[   17.372543]  ? __pfx_kthread+0x10/0x10
[   17.372547]  ret_from_fork_asm+0x1a/0x30
[   17.372552]  </TASK>
[   17.372554] 
[   17.534981] The buggy address belongs to the physical page:
[   17.540555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1082d0
[   17.548561] flags: 0x200000000000000(node=0|zone=2)
[   17.553442] page_type: f0(buddy)
[   17.556677] raw: 0200000000000000 ffff88846fffd460 ffff88846fffd460 0000000000000000
[   17.564423] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.572160] page dumped because: kasan: bad access detected
[   17.577734] 
[   17.579233] Memory state around the buggy address:
[   17.584027]  ffff8881082cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.591245]  ffff8881082cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.598464] >ffff8881082d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.605682]                    ^
[   17.608917]  ffff8881082d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.616137]  ffff8881082d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.623361] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   17.007653] ==================================================================
[   17.018650] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   17.024058] Free of addr ffff888106e9c001 by task kunit_try_catch/191
[   17.030498] 
[   17.031999] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.032007] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   17.032010] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.032013] Call Trace:
[   17.032015]  <TASK>
[   17.032017]  dump_stack_lvl+0x73/0xb0
[   17.032022]  print_report+0xd1/0x650
[   17.032026]  ? __virt_addr_valid+0x1db/0x2d0
[   17.032030]  ? kasan_addr_to_slab+0x11/0xa0
[   17.032033]  ? kfree+0x274/0x3f0
[   17.032037]  kasan_report_invalid_free+0x10a/0x130
[   17.032042]  ? kfree+0x274/0x3f0
[   17.032046]  ? kfree+0x274/0x3f0
[   17.032050]  __kasan_kfree_large+0x86/0xd0
[   17.032054]  free_large_kmalloc+0x4b/0x110
[   17.032058]  kfree+0x274/0x3f0
[   17.032063]  kmalloc_large_invalid_free+0x120/0x2b0
[   17.032067]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   17.032071]  ? __schedule+0x10cc/0x2b60
[   17.032075]  ? ktime_get_ts64+0x83/0x230
[   17.032079]  kunit_try_run_case+0x1a2/0x480
[   17.032084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.032088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.032092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.032096]  ? __kthread_parkme+0x82/0x180
[   17.032100]  ? preempt_count_sub+0x50/0x80
[   17.032104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.032108]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.032112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.032116]  kthread+0x334/0x6f0
[   17.032120]  ? trace_preempt_on+0x20/0xc0
[   17.032124]  ? __pfx_kthread+0x10/0x10
[   17.032127]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.032131]  ? calculate_sigpending+0x7b/0xa0
[   17.032136]  ? __pfx_kthread+0x10/0x10
[   17.032139]  ret_from_fork+0x113/0x1d0
[   17.032143]  ? __pfx_kthread+0x10/0x10
[   17.032146]  ret_from_fork_asm+0x1a/0x30
[   17.032152]  </TASK>
[   17.032154] 
[   17.201983] The buggy address belongs to the physical page:
[   17.207556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e9c
[   17.215557] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.223216] flags: 0x200000000000040(head|node=0|zone=2)
[   17.228530] page_type: f8(unknown)
[   17.231936] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.239676] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.247424] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.255257] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.263084] head: 0200000000000002 ffffea00041ba701 00000000ffffffff 00000000ffffffff
[   17.270909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.278734] page dumped because: kasan: bad access detected
[   17.284309] 
[   17.285809] Memory state around the buggy address:
[   17.290602]  ffff888106e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.297828]  ffff888106e9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.305047] >ffff888106e9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.312267]                    ^
[   17.315499]  ffff888106e9c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.322718]  ffff888106e9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.329938] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   16.723970] ==================================================================
[   16.735467] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   16.742080] Read of size 1 at addr ffff888106e9c000 by task kunit_try_catch/189
[   16.749418] 
[   16.750912] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.750921] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   16.750924] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.750927] Call Trace:
[   16.750929]  <TASK>
[   16.750930]  dump_stack_lvl+0x73/0xb0
[   16.750935]  print_report+0xd1/0x650
[   16.750939]  ? __virt_addr_valid+0x1db/0x2d0
[   16.750943]  ? kmalloc_large_uaf+0x2f1/0x340
[   16.750947]  ? kasan_addr_to_slab+0x11/0xa0
[   16.750950]  ? kmalloc_large_uaf+0x2f1/0x340
[   16.750954]  kasan_report+0x141/0x180
[   16.750958]  ? kmalloc_large_uaf+0x2f1/0x340
[   16.750963]  __asan_report_load1_noabort+0x18/0x20
[   16.750967]  kmalloc_large_uaf+0x2f1/0x340
[   16.750971]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   16.750975]  ? __schedule+0x10cc/0x2b60
[   16.750979]  ? ktime_get_ts64+0x83/0x230
[   16.750983]  kunit_try_run_case+0x1a2/0x480
[   16.750987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.750991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.750996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.751000]  ? __kthread_parkme+0x82/0x180
[   16.751003]  ? preempt_count_sub+0x50/0x80
[   16.751007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.751011]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.751016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.751020]  kthread+0x334/0x6f0
[   16.751023]  ? trace_preempt_on+0x20/0xc0
[   16.751027]  ? __pfx_kthread+0x10/0x10
[   16.751031]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.751034]  ? calculate_sigpending+0x7b/0xa0
[   16.751039]  ? __pfx_kthread+0x10/0x10
[   16.751043]  ret_from_fork+0x113/0x1d0
[   16.751046]  ? __pfx_kthread+0x10/0x10
[   16.751049]  ret_from_fork_asm+0x1a/0x30
[   16.751055]  </TASK>
[   16.751057] 
[   16.914773] The buggy address belongs to the physical page:
[   16.920374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e9c
[   16.928423] flags: 0x200000000000000(node=0|zone=2)
[   16.933310] raw: 0200000000000000 ffffea00041ba908 ffff88841f6b9f80 0000000000000000
[   16.941051] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.948795] page dumped because: kasan: bad access detected
[   16.954414] 
[   16.955911] Memory state around the buggy address:
[   16.960704]  ffff888106e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.967924]  ffff888106e9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.975142] >ffff888106e9c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.982362]                    ^
[   16.985614]  ffff888106e9c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.992841]  ffff888106e9c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.000059] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   16.393939] ==================================================================
[   16.405271] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   16.412758] Write of size 1 at addr ffff888104ffa00a by task kunit_try_catch/187
[   16.420159] 
[   16.421659] CPU: 3 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.421668] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   16.421670] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.421674] Call Trace:
[   16.421676]  <TASK>
[   16.421678]  dump_stack_lvl+0x73/0xb0
[   16.421682]  print_report+0xd1/0x650
[   16.421686]  ? __virt_addr_valid+0x1db/0x2d0
[   16.421690]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.421694]  ? kasan_addr_to_slab+0x11/0xa0
[   16.421698]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.421702]  kasan_report+0x141/0x180
[   16.421706]  ? kmalloc_large_oob_right+0x2e9/0x330
[   16.421710]  __asan_report_store1_noabort+0x1b/0x30
[   16.421715]  kmalloc_large_oob_right+0x2e9/0x330
[   16.421719]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   16.421723]  ? __schedule+0x10cc/0x2b60
[   16.421727]  ? ktime_get_ts64+0x83/0x230
[   16.421731]  kunit_try_run_case+0x1a2/0x480
[   16.421736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.421740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.421744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.421748]  ? __kthread_parkme+0x82/0x180
[   16.421752]  ? preempt_count_sub+0x50/0x80
[   16.421756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.421760]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.421764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.421768]  kthread+0x334/0x6f0
[   16.421772]  ? trace_preempt_on+0x20/0xc0
[   16.421776]  ? __pfx_kthread+0x10/0x10
[   16.421780]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.421783]  ? calculate_sigpending+0x7b/0xa0
[   16.421788]  ? __pfx_kthread+0x10/0x10
[   16.421792]  ret_from_fork+0x113/0x1d0
[   16.421795]  ? __pfx_kthread+0x10/0x10
[   16.421799]  ret_from_fork_asm+0x1a/0x30
[   16.421804]  </TASK>
[   16.421806] 
[   16.588102] The buggy address belongs to the physical page:
[   16.593674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8
[   16.601683] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.609361] flags: 0x200000000000040(head|node=0|zone=2)
[   16.614723] page_type: f8(unknown)
[   16.618133] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.625878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.633618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.641446] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.649280] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff
[   16.657114] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.664937] page dumped because: kasan: bad access detected
[   16.670510] 
[   16.672004] Memory state around the buggy address:
[   16.676794]  ffff888104ff9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.684013]  ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.691235] >ffff888104ffa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.698453]                       ^
[   16.701945]  ffff888104ffa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.709164]  ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.716412] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   15.986019] ==================================================================
[   15.998477] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   16.005790] Write of size 1 at addr ffff888106f25f00 by task kunit_try_catch/185
[   16.013192] 
[   16.014693] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.014702] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   16.014705] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   16.014708] Call Trace:
[   16.014710]  <TASK>
[   16.014712]  dump_stack_lvl+0x73/0xb0
[   16.014717]  print_report+0xd1/0x650
[   16.014721]  ? __virt_addr_valid+0x1db/0x2d0
[   16.014725]  ? kmalloc_big_oob_right+0x316/0x370
[   16.014729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.014734]  ? kmalloc_big_oob_right+0x316/0x370
[   16.014738]  kasan_report+0x141/0x180
[   16.014742]  ? kmalloc_big_oob_right+0x316/0x370
[   16.014747]  __asan_report_store1_noabort+0x1b/0x30
[   16.014751]  kmalloc_big_oob_right+0x316/0x370
[   16.014755]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   16.014760]  ? __schedule+0x10cc/0x2b60
[   16.014764]  ? ktime_get_ts64+0x83/0x230
[   16.014768]  kunit_try_run_case+0x1a2/0x480
[   16.014772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.014781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.014785]  ? __kthread_parkme+0x82/0x180
[   16.014788]  ? preempt_count_sub+0x50/0x80
[   16.014792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014797]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.014801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.014805]  kthread+0x334/0x6f0
[   16.014808]  ? trace_preempt_on+0x20/0xc0
[   16.014812]  ? __pfx_kthread+0x10/0x10
[   16.014816]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.014820]  ? calculate_sigpending+0x7b/0xa0
[   16.014824]  ? __pfx_kthread+0x10/0x10
[   16.014828]  ret_from_fork+0x113/0x1d0
[   16.014831]  ? __pfx_kthread+0x10/0x10
[   16.014835]  ret_from_fork_asm+0x1a/0x30
[   16.014841]  </TASK>
[   16.014842] 
[   16.181487] Allocated by task 185:
[   16.184894]  kasan_save_stack+0x45/0x70
[   16.188735]  kasan_save_track+0x18/0x40
[   16.192573]  kasan_save_alloc_info+0x3b/0x50
[   16.196846]  __kasan_kmalloc+0xb7/0xc0
[   16.200597]  __kmalloc_cache_noprof+0x189/0x420
[   16.205132]  kmalloc_big_oob_right+0xa9/0x370
[   16.209490]  kunit_try_run_case+0x1a2/0x480
[   16.213677]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   16.219083]  kthread+0x334/0x6f0
[   16.222318]  ret_from_fork+0x113/0x1d0
[   16.226104]  ret_from_fork_asm+0x1a/0x30
[   16.230032] 
[   16.231531] The buggy address belongs to the object at ffff888106f24000
[   16.231531]  which belongs to the cache kmalloc-8k of size 8192
[   16.244045] The buggy address is located 0 bytes to the right of
[   16.244045]  allocated 7936-byte region [ffff888106f24000, ffff888106f25f00)
[   16.257087] 
[   16.258588] The buggy address belongs to the physical page:
[   16.264158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f20
[   16.272159] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.279819] flags: 0x200000000000040(head|node=0|zone=2)
[   16.285132] page_type: f5(slab)
[   16.288280] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   16.296029] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.303775] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   16.311602] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.319427] head: 0200000000000003 ffffea00041bc801 00000000ffffffff 00000000ffffffff
[   16.327253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.335080] page dumped because: kasan: bad access detected
[   16.340651] 
[   16.342151] Memory state around the buggy address:
[   16.346944]  ffff888106f25e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.354163]  ffff888106f25e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.361391] >ffff888106f25f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.368609]                    ^
[   16.371843]  ffff888106f25f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.379061]  ffff888106f26000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.386282] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   15.429146] ==================================================================
[   15.440597] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.448690] Write of size 1 at addr ffff888105bb0078 by task kunit_try_catch/183
[   15.456090] 
[   15.457593] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.457602] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   15.457604] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.457608] Call Trace:
[   15.457609]  <TASK>
[   15.457611]  dump_stack_lvl+0x73/0xb0
[   15.457616]  print_report+0xd1/0x650
[   15.457620]  ? __virt_addr_valid+0x1db/0x2d0
[   15.457624]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.457629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.457634]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.457638]  kasan_report+0x141/0x180
[   15.457642]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.457648]  __asan_report_store1_noabort+0x1b/0x30
[   15.457653]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   15.457657]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   15.457662]  ? __schedule+0x10cc/0x2b60
[   15.457666]  ? ktime_get_ts64+0x83/0x230
[   15.457670]  kunit_try_run_case+0x1a2/0x480
[   15.457675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.457679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.457683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.457687]  ? __kthread_parkme+0x82/0x180
[   15.457691]  ? preempt_count_sub+0x50/0x80
[   15.457695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.457699]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.457703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.457708]  kthread+0x334/0x6f0
[   15.457711]  ? trace_preempt_on+0x20/0xc0
[   15.457715]  ? __pfx_kthread+0x10/0x10
[   15.457719]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.457722]  ? calculate_sigpending+0x7b/0xa0
[   15.457727]  ? __pfx_kthread+0x10/0x10
[   15.457731]  ret_from_fork+0x113/0x1d0
[   15.457734]  ? __pfx_kthread+0x10/0x10
[   15.457738]  ret_from_fork_asm+0x1a/0x30
[   15.457743]  </TASK>
[   15.457745] 
[   15.628362] Allocated by task 183:
[   15.631815]  kasan_save_stack+0x45/0x70
[   15.635654]  kasan_save_track+0x18/0x40
[   15.639495]  kasan_save_alloc_info+0x3b/0x50
[   15.643766]  __kasan_kmalloc+0xb7/0xc0
[   15.647519]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   15.653092]  kmalloc_track_caller_oob_right+0x99/0x520
[   15.658232]  kunit_try_run_case+0x1a2/0x480
[   15.662423]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.667824]  kthread+0x334/0x6f0
[   15.671057]  ret_from_fork+0x113/0x1d0
[   15.674810]  ret_from_fork_asm+0x1a/0x30
[   15.678737] 
[   15.680237] The buggy address belongs to the object at ffff888105bb0000
[   15.680237]  which belongs to the cache kmalloc-128 of size 128
[   15.692750] The buggy address is located 0 bytes to the right of
[   15.692750]  allocated 120-byte region [ffff888105bb0000, ffff888105bb0078)
[   15.705700] 
[   15.707199] The buggy address belongs to the physical page:
[   15.712771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0
[   15.720778] flags: 0x200000000000000(node=0|zone=2)
[   15.725658] page_type: f5(slab)
[   15.728804] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   15.736545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.744282] page dumped because: kasan: bad access detected
[   15.749855] 
[   15.751361] Memory state around the buggy address:
[   15.756200]  ffff888105baff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.763418]  ffff888105baff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.770639] >ffff888105bb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.777858]                                                                 ^
[   15.784991]  ffff888105bb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.792211]  ffff888105bb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.799427] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   15.021636] ==================================================================
[   15.032874] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   15.040274] Read of size 1 at addr ffff888106e8f000 by task kunit_try_catch/181
[   15.047582] 
[   15.049082] CPU: 2 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.049090] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   15.049093] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   15.049096] Call Trace:
[   15.049098]  <TASK>
[   15.049100]  dump_stack_lvl+0x73/0xb0
[   15.049105]  print_report+0xd1/0x650
[   15.049109]  ? __virt_addr_valid+0x1db/0x2d0
[   15.049113]  ? kmalloc_node_oob_right+0x369/0x3c0
[   15.049117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.049122]  ? kmalloc_node_oob_right+0x369/0x3c0
[   15.049126]  kasan_report+0x141/0x180
[   15.049130]  ? kmalloc_node_oob_right+0x369/0x3c0
[   15.049136]  __asan_report_load1_noabort+0x18/0x20
[   15.049140]  kmalloc_node_oob_right+0x369/0x3c0
[   15.049145]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   15.049149]  ? __schedule+0x10cc/0x2b60
[   15.049153]  ? ktime_get_ts64+0x83/0x230
[   15.049158]  kunit_try_run_case+0x1a2/0x480
[   15.049162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.049170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.049174]  ? __kthread_parkme+0x82/0x180
[   15.049178]  ? preempt_count_sub+0x50/0x80
[   15.049182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049186]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.049190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.049195]  kthread+0x334/0x6f0
[   15.049198]  ? trace_preempt_on+0x20/0xc0
[   15.049202]  ? __pfx_kthread+0x10/0x10
[   15.049206]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.049210]  ? calculate_sigpending+0x7b/0xa0
[   15.049214]  ? __pfx_kthread+0x10/0x10
[   15.049218]  ret_from_fork+0x113/0x1d0
[   15.049221]  ? __pfx_kthread+0x10/0x10
[   15.049225]  ret_from_fork_asm+0x1a/0x30
[   15.049230]  </TASK>
[   15.049232] 
[   15.216303] Allocated by task 181:
[   15.219710]  kasan_save_stack+0x45/0x70
[   15.223556]  kasan_save_track+0x18/0x40
[   15.227417]  kasan_save_alloc_info+0x3b/0x50
[   15.231695]  __kasan_kmalloc+0xb7/0xc0
[   15.235447]  __kmalloc_cache_node_noprof+0x188/0x420
[   15.240416]  kmalloc_node_oob_right+0xab/0x3c0
[   15.244869]  kunit_try_run_case+0x1a2/0x480
[   15.249064]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   15.254463]  kthread+0x334/0x6f0
[   15.257695]  ret_from_fork+0x113/0x1d0
[   15.261448]  ret_from_fork_asm+0x1a/0x30
[   15.265392] 
[   15.266915] The buggy address belongs to the object at ffff888106e8e000
[   15.266915]  which belongs to the cache kmalloc-4k of size 4096
[   15.279422] The buggy address is located 0 bytes to the right of
[   15.279422]  allocated 4096-byte region [ffff888106e8e000, ffff888106e8f000)
[   15.292457] 
[   15.293955] The buggy address belongs to the physical page:
[   15.299530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e88
[   15.307538] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.315191] flags: 0x200000000000040(head|node=0|zone=2)
[   15.320510] page_type: f5(slab)
[   15.323657] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000
[   15.331421] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   15.339162] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000
[   15.346988] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   15.354815] head: 0200000000000003 ffffea00041ba201 00000000ffffffff 00000000ffffffff
[   15.362648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   15.370473] page dumped because: kasan: bad access detected
[   15.376046] 
[   15.377545] Memory state around the buggy address:
[   15.382375]  ffff888106e8ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.389628]  ffff888106e8ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.396847] >ffff888106e8f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.404065]                    ^
[   15.407298]  ffff888106e8f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.414518]  ffff888106e8f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.421738] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  120.707904] WARNING: CPU: 1 PID: 697 at lib/math/int_log.c:120 intlog10+0x2a/0x40
[  120.715402] Modules linked in:
[  120.718479] CPU: 1 UID: 0 PID: 697 Comm: kunit_try_catch Tainted: G S  B D W        N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[  120.729357] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  120.737023] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  120.744417] RIP: 0010:intlog10+0x2a/0x40
[  120.748384] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90
[  120.767158] RSP: 0000:ffff88810c87fcb0 EFLAGS: 00010246
[  120.772410] RAX: 0000000000000000 RBX: ffff8881003afae8 RCX: 1ffff1102190ffb4
[  120.779551] RDX: 1ffffffff5112c9c RSI: 1ffff1102190ffb3 RDI: 0000000000000000
[  120.786710] RBP: ffff88810c87fd60 R08: 0000000000000000 R09: ffffed1020194d80
[  120.793852] R10: ffff888100ca6c07 R11: 0000000000000000 R12: 1ffff1102190ff97
[  120.801008] R13: ffffffffa88964e0 R14: 0000000000000000 R15: ffff88810c87fd38
[  120.808144] FS:  0000000000000000(0000) GS:ffff888474cf4000(0000) knlGS:0000000000000000
[  120.816253] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  120.822028] CR2: ffff88841dc1cfe0 CR3: 00000003a84bc002 CR4: 00000000003726f0
[  120.829169] DR0: ffffffffaaa50444 DR1: ffffffffaaa50449 DR2: ffffffffaaa5044a
[  120.836340] DR3: ffffffffaaa5044b DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  120.843485] Call Trace:
[  120.845964]  <TASK>
[  120.848069]  ? intlog10_test+0xf2/0x220
[  120.851935]  ? __pfx_intlog10_test+0x10/0x10
[  120.856217]  ? __schedule+0x10cc/0x2b60
[  120.860082]  ? ktime_get_ts64+0x83/0x230
[  120.864016]  kunit_try_run_case+0x1a2/0x480
[  120.868228]  ? __pfx_kunit_try_run_case+0x10/0x10
[  120.872942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  120.877587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  120.882564]  ? __kthread_parkme+0x82/0x180
[  120.886687]  ? preempt_count_sub+0x50/0x80
[  120.890789]  ? __pfx_kunit_try_run_case+0x10/0x10
[  120.895518]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  120.900919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  120.907036]  kthread+0x334/0x6f0
[  120.910272]  ? trace_preempt_on+0x20/0xc0
[  120.914308]  ? __pfx_kthread+0x10/0x10
[  120.918089]  ? _raw_spin_unlock_irq+0x47/0x80
[  120.922472]  ? calculate_sigpending+0x7b/0xa0
[  120.926840]  ? __pfx_kthread+0x10/0x10
[  120.930620]  ret_from_fork+0x113/0x1d0
[  120.934398]  ? __pfx_kthread+0x10/0x10
[  120.938175]  ret_from_fork_asm+0x1a/0x30
[  120.942112]  </TASK>
[  120.944311] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  120.408024] WARNING: CPU: 2 PID: 679 at lib/math/int_log.c:63 intlog2+0xdf/0x110
[  120.415432] Modules linked in:
[  120.418520] CPU: 2 UID: 0 PID: 679 Comm: kunit_try_catch Tainted: G S  B D          N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[  120.429426] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[  120.436222] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[  120.443641] RIP: 0010:intlog2+0xdf/0x110
[  120.447594] Code: 89 a8 c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 89 45 e4 e8 cf 0f 56 ff 8b 45 e4 eb
[  120.466360] RSP: 0000:ffff8881247f7cb0 EFLAGS: 00010246
[  120.471634] RAX: 0000000000000000 RBX: ffff8881003afae8 RCX: 1ffff110248fefb4
[  120.478766] RDX: 1ffffffff5112cf0 RSI: 1ffff110248fefb3 RDI: 0000000000000000
[  120.485925] RBP: ffff8881247f7d60 R08: 0000000000000000 R09: ffffed1020b75de0
[  120.493058] R10: ffff888105baef07 R11: 0000000000000000 R12: 1ffff110248fef97
[  120.500223] R13: ffffffffa8896780 R14: 0000000000000000 R15: ffff8881247f7d38
[  120.507391] FS:  0000000000000000(0000) GS:ffff888474d74000(0000) knlGS:0000000000000000
[  120.515507] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  120.521277] CR2: ffff88841dd66000 CR3: 00000003a84bc001 CR4: 00000000003726f0
[  120.528452] DR0: ffffffffaaa50448 DR1: ffffffffaaa50449 DR2: ffffffffaaa5044a
[  120.535613] DR3: ffffffffaaa5044b DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  120.542753] Call Trace:
[  120.545231]  <TASK>
[  120.547358]  ? intlog2_test+0xf2/0x220
[  120.551161]  ? __pfx_intlog2_test+0x10/0x10
[  120.555376]  ? __schedule+0x10cc/0x2b60
[  120.559248]  ? ktime_get_ts64+0x83/0x230
[  120.563190]  kunit_try_run_case+0x1a2/0x480
[  120.567400]  ? __pfx_kunit_try_run_case+0x10/0x10
[  120.572135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  120.576780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  120.581772]  ? __kthread_parkme+0x82/0x180
[  120.585897]  ? preempt_count_sub+0x50/0x80
[  120.590021]  ? __pfx_kunit_try_run_case+0x10/0x10
[  120.594754]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[  120.600177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  120.606297]  kthread+0x334/0x6f0
[  120.609555]  ? trace_preempt_on+0x20/0xc0
[  120.613602]  ? __pfx_kthread+0x10/0x10
[  120.617390]  ? _raw_spin_unlock_irq+0x47/0x80
[  120.621776]  ? calculate_sigpending+0x7b/0xa0
[  120.626162]  ? __pfx_kthread+0x10/0x10
[  120.629939]  ret_from_fork+0x113/0x1d0
[  120.633718]  ? __pfx_kthread+0x10/0x10
[  120.637497]  ret_from_fork_asm+0x1a/0x30
[  120.641465]  </TASK>
[  120.643668] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/bootloader-action
(no logs available)
Failure - lava/bootloader-retry
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti KNOWN ISSUE - qemu-x86_64: Oops: general protection fault, probably for non-canonical address - KASAN: null-ptr-deref - kunit_test_null_dereference
[  119.070273] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI