Hay
Date
May 12, 2025, 6:12 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   20.401893] ==================================================================
[   20.402673] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.403201] Read of size 1 at addr fff00000c59c2d00 by task kunit_try_catch/216
[   20.403708] 
[   20.403895] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.403998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.404032] Hardware name: linux,dummy-virt (DT)
[   20.404069] Call trace:
[   20.404100]  show_stack+0x20/0x38 (C)
[   20.404158]  dump_stack_lvl+0x8c/0xd0
[   20.404216]  print_report+0x118/0x608
[   20.404269]  kasan_report+0xdc/0x128
[   20.404321]  __asan_report_load1_noabort+0x20/0x30
[   20.404373]  mempool_uaf_helper+0x314/0x340
[   20.404425]  mempool_kmalloc_uaf+0xc4/0x120
[   20.404477]  kunit_try_run_case+0x170/0x3f0
[   20.404530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.404588]  kthread+0x318/0x620
[   20.404638]  ret_from_fork+0x10/0x20
[   20.404694] 
[   20.409868] Allocated by task 216:
[   20.410410]  kasan_save_stack+0x3c/0x68
[   20.410962]  kasan_save_track+0x20/0x40
[   20.411334]  kasan_save_alloc_info+0x40/0x58
[   20.411678]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.412085]  remove_element+0x130/0x1f8
[   20.412485]  mempool_alloc_preallocated+0x58/0xc0
[   20.412868]  mempool_uaf_helper+0xa4/0x340
[   20.413125]  mempool_kmalloc_uaf+0xc4/0x120
[   20.413371]  kunit_try_run_case+0x170/0x3f0
[   20.413618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.413898]  kthread+0x318/0x620
[   20.414131]  ret_from_fork+0x10/0x20
[   20.414365] 
[   20.414511] Freed by task 216:
[   20.414712]  kasan_save_stack+0x3c/0x68
[   20.415439]  kasan_save_track+0x20/0x40
[   20.415753]  kasan_save_free_info+0x4c/0x78
[   20.416020]  __kasan_mempool_poison_object+0xc0/0x150
[   20.416256]  mempool_free+0x28c/0x328
[   20.416616]  mempool_uaf_helper+0x104/0x340
[   20.416980]  mempool_kmalloc_uaf+0xc4/0x120
[   20.417308]  kunit_try_run_case+0x170/0x3f0
[   20.417658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.418087]  kthread+0x318/0x620
[   20.418391]  ret_from_fork+0x10/0x20
[   20.418705] 
[   20.418929] The buggy address belongs to the object at fff00000c59c2d00
[   20.418929]  which belongs to the cache kmalloc-128 of size 128
[   20.419704] The buggy address is located 0 bytes inside of
[   20.419704]  freed 128-byte region [fff00000c59c2d00, fff00000c59c2d80)
[   20.420451] 
[   20.420645] The buggy address belongs to the physical page:
[   20.421045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   20.421589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.422088] page_type: f5(slab)
[   20.422377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.422809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.423242] page dumped because: kasan: bad access detected
[   20.423496] 
[   20.423681] Memory state around the buggy address:
[   20.424247]  fff00000c59c2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.424754]  fff00000c59c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.425226] >fff00000c59c2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.425688]                    ^
[   20.425952]  fff00000c59c2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.426412]  fff00000c59c2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.426907] ==================================================================
[   20.459123] ==================================================================
[   20.459623] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.460333] Read of size 1 at addr fff00000c6589240 by task kunit_try_catch/220
[   20.460851] 
[   20.461065] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.461168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.461202] Hardware name: linux,dummy-virt (DT)
[   20.461239] Call trace:
[   20.461268]  show_stack+0x20/0x38 (C)
[   20.461334]  dump_stack_lvl+0x8c/0xd0
[   20.461392]  print_report+0x118/0x608
[   20.461448]  kasan_report+0xdc/0x128
[   20.461498]  __asan_report_load1_noabort+0x20/0x30
[   20.461548]  mempool_uaf_helper+0x314/0x340
[   20.461599]  mempool_slab_uaf+0xc0/0x118
[   20.461648]  kunit_try_run_case+0x170/0x3f0
[   20.461704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.461844]  kthread+0x318/0x620
[   20.461916]  ret_from_fork+0x10/0x20
[   20.461979] 
[   20.465829] Allocated by task 220:
[   20.466125]  kasan_save_stack+0x3c/0x68
[   20.466478]  kasan_save_track+0x20/0x40
[   20.466830]  kasan_save_alloc_info+0x40/0x58
[   20.467018]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.467207]  remove_element+0x16c/0x1f8
[   20.467543]  mempool_alloc_preallocated+0x58/0xc0
[   20.468116]  mempool_uaf_helper+0xa4/0x340
[   20.468488]  mempool_slab_uaf+0xc0/0x118
[   20.468721]  kunit_try_run_case+0x170/0x3f0
[   20.469070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.469437]  kthread+0x318/0x620
[   20.469675]  ret_from_fork+0x10/0x20
[   20.469938] 
[   20.470106] Freed by task 220:
[   20.470393]  kasan_save_stack+0x3c/0x68
[   20.470849]  kasan_save_track+0x20/0x40
[   20.471134]  kasan_save_free_info+0x4c/0x78
[   20.471311]  __kasan_mempool_poison_object+0xc0/0x150
[   20.471701]  mempool_free+0x28c/0x328
[   20.471936]  mempool_uaf_helper+0x104/0x340
[   20.472315]  mempool_slab_uaf+0xc0/0x118
[   20.472541]  kunit_try_run_case+0x170/0x3f0
[   20.472872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.473182]  kthread+0x318/0x620
[   20.473496]  ret_from_fork+0x10/0x20
[   20.473676] 
[   20.473883] The buggy address belongs to the object at fff00000c6589240
[   20.473883]  which belongs to the cache test_cache of size 123
[   20.474868] The buggy address is located 0 bytes inside of
[   20.474868]  freed 123-byte region [fff00000c6589240, fff00000c65892bb)
[   20.475275] 
[   20.475384] The buggy address belongs to the physical page:
[   20.475566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106589
[   20.476021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.476424] page_type: f5(slab)
[   20.476701] raw: 0bfffe0000000000 fff00000c596f8c0 dead000000000122 0000000000000000
[   20.477032] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.477498] page dumped because: kasan: bad access detected
[   20.477888] 
[   20.478111] Memory state around the buggy address:
[   20.478373]  fff00000c6589100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.478971]  fff00000c6589180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.479637] >fff00000c6589200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.480644]                                            ^
[   20.480953]  fff00000c6589280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.481369]  fff00000c6589300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.481793] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   20.347277] ==================================================================
[   20.347778] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.348229] Read of size 1 at addr fff00000c65fa001 by task kunit_try_catch/212
[   20.348733] 
[   20.348953] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.349062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.349096] Hardware name: linux,dummy-virt (DT)
[   20.349136] Call trace:
[   20.349165]  show_stack+0x20/0x38 (C)
[   20.349231]  dump_stack_lvl+0x8c/0xd0
[   20.349291]  print_report+0x118/0x608
[   20.349348]  kasan_report+0xdc/0x128
[   20.349400]  __asan_report_load1_noabort+0x20/0x30
[   20.349453]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.349507]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.349564]  kunit_try_run_case+0x170/0x3f0
[   20.349618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.349676]  kthread+0x318/0x620
[   20.349727]  ret_from_fork+0x10/0x20
[   20.349803] 
[   20.352733] The buggy address belongs to the physical page:
[   20.353081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8
[   20.353549] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.353812] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.354291] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.354638] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.355853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.356183] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.356500] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000
[   20.357008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.357326] page dumped because: kasan: bad access detected
[   20.357661] 
[   20.357839] Memory state around the buggy address:
[   20.358061]  fff00000c65f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.358434]  fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.359106] >fff00000c65fa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.359434]                    ^
[   20.359634]  fff00000c65fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.359950]  fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.360263] ==================================================================
[   20.368710] ==================================================================
[   20.369299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.369666] Read of size 1 at addr fff00000c1f122bb by task kunit_try_catch/214
[   20.370056] 
[   20.370207] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.370307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.370341] Hardware name: linux,dummy-virt (DT)
[   20.370379] Call trace:
[   20.370407]  show_stack+0x20/0x38 (C)
[   20.370465]  dump_stack_lvl+0x8c/0xd0
[   20.370910]  print_report+0x118/0x608
[   20.370971]  kasan_report+0xdc/0x128
[   20.371027]  __asan_report_load1_noabort+0x20/0x30
[   20.371080]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.371135]  mempool_slab_oob_right+0xc0/0x118
[   20.371189]  kunit_try_run_case+0x170/0x3f0
[   20.371243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.371298]  kthread+0x318/0x620
[   20.371347]  ret_from_fork+0x10/0x20
[   20.371401] 
[   20.375724] Allocated by task 214:
[   20.375904]  kasan_save_stack+0x3c/0x68
[   20.376199]  kasan_save_track+0x20/0x40
[   20.376426]  kasan_save_alloc_info+0x40/0x58
[   20.376774]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.377138]  remove_element+0x16c/0x1f8
[   20.377301]  mempool_alloc_preallocated+0x58/0xc0
[   20.377658]  mempool_oob_right_helper+0x98/0x2f0
[   20.377939]  mempool_slab_oob_right+0xc0/0x118
[   20.378170]  kunit_try_run_case+0x170/0x3f0
[   20.378397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.378679]  kthread+0x318/0x620
[   20.379033]  ret_from_fork+0x10/0x20
[   20.379454] 
[   20.379802] The buggy address belongs to the object at fff00000c1f12240
[   20.379802]  which belongs to the cache test_cache of size 123
[   20.380200] The buggy address is located 0 bytes to the right of
[   20.380200]  allocated 123-byte region [fff00000c1f12240, fff00000c1f122bb)
[   20.380612] 
[   20.380732] The buggy address belongs to the physical page:
[   20.380994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f12
[   20.381308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.381586] page_type: f5(slab)
[   20.382378] raw: 0bfffe0000000000 fff00000c596f780 dead000000000122 0000000000000000
[   20.382756] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.383597] page dumped because: kasan: bad access detected
[   20.383925] 
[   20.384048] Memory state around the buggy address:
[   20.384420]  fff00000c1f12180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.384851]  fff00000c1f12200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.385153] >fff00000c1f12280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.385657]                                         ^
[   20.385937]  fff00000c1f12300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.386421]  fff00000c1f12380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.387108] ==================================================================
[   20.315821] ==================================================================
[   20.316436] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.317139] Read of size 1 at addr fff00000c5a05673 by task kunit_try_catch/210
[   20.317562] 
[   20.317710] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.318003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.318040] Hardware name: linux,dummy-virt (DT)
[   20.318103] Call trace:
[   20.318140]  show_stack+0x20/0x38 (C)
[   20.318207]  dump_stack_lvl+0x8c/0xd0
[   20.318266]  print_report+0x118/0x608
[   20.318319]  kasan_report+0xdc/0x128
[   20.318372]  __asan_report_load1_noabort+0x20/0x30
[   20.318425]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.318495]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.318555]  kunit_try_run_case+0x170/0x3f0
[   20.318611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.318670]  kthread+0x318/0x620
[   20.318798]  ret_from_fork+0x10/0x20
[   20.318909] 
[   20.323722] Allocated by task 210:
[   20.323997]  kasan_save_stack+0x3c/0x68
[   20.324480]  kasan_save_track+0x20/0x40
[   20.324678]  kasan_save_alloc_info+0x40/0x58
[   20.324869]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.325526]  remove_element+0x130/0x1f8
[   20.325900]  mempool_alloc_preallocated+0x58/0xc0
[   20.326341]  mempool_oob_right_helper+0x98/0x2f0
[   20.326686]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.327122]  kunit_try_run_case+0x170/0x3f0
[   20.327484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.327826]  kthread+0x318/0x620
[   20.328054]  ret_from_fork+0x10/0x20
[   20.328294] 
[   20.328441] The buggy address belongs to the object at fff00000c5a05600
[   20.328441]  which belongs to the cache kmalloc-128 of size 128
[   20.329319] The buggy address is located 0 bytes to the right of
[   20.329319]  allocated 115-byte region [fff00000c5a05600, fff00000c5a05673)
[   20.330055] 
[   20.330278] The buggy address belongs to the physical page:
[   20.330612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   20.331156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.331580] page_type: f5(slab)
[   20.332010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.332523] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.333061] page dumped because: kasan: bad access detected
[   20.333428] 
[   20.333545] Memory state around the buggy address:
[   20.333735]  fff00000c5a05500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.334427]  fff00000c5a05580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.335206] >fff00000c5a05600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.335576]                                                              ^
[   20.335922]  fff00000c5a05680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.336322]  fff00000c5a05700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.336566] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   51.291949] ==================================================================
[   51.292348] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.292348] 
[   51.292672] Use-after-free read at 0x00000000cd07583c (in kfence-#158):
[   51.293129]  test_krealloc+0x51c/0x830
[   51.293421]  kunit_try_run_case+0x170/0x3f0
[   51.293710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.294039]  kthread+0x318/0x620
[   51.294375]  ret_from_fork+0x10/0x20
[   51.294636] 
[   51.294894] kfence-#158: 0x00000000cd07583c-0x000000007a76b377, size=32, cache=kmalloc-32
[   51.294894] 
[   51.295868] allocated by task 326 on cpu 1 at 51.291146s (0.004715s ago):
[   51.296162]  test_alloc+0x29c/0x628
[   51.296596]  test_krealloc+0xc0/0x830
[   51.296818]  kunit_try_run_case+0x170/0x3f0
[   51.297049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.297304]  kthread+0x318/0x620
[   51.297493]  ret_from_fork+0x10/0x20
[   51.297702] 
[   51.297945] freed by task 326 on cpu 1 at 51.291423s (0.006511s ago):
[   51.298274]  krealloc_noprof+0x148/0x360
[   51.298463]  test_krealloc+0x1dc/0x830
[   51.299863]  kunit_try_run_case+0x170/0x3f0
[   51.300281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.301293]  kthread+0x318/0x620
[   51.301684]  ret_from_fork+0x10/0x20
[   51.302064] 
[   51.302296] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   51.303189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.303625] Hardware name: linux,dummy-virt (DT)
[   51.304047] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   51.227411] ==================================================================
[   51.228006] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.228006] 
[   51.228363] Use-after-free read at 0x00000000ea012d05 (in kfence-#157):
[   51.228883]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.229136]  kunit_try_run_case+0x170/0x3f0
[   51.229453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.229886]  kthread+0x318/0x620
[   51.230088]  ret_from_fork+0x10/0x20
[   51.230428] 
[   51.230621] kfence-#157: 0x00000000ea012d05-0x0000000021942ff1, size=32, cache=test
[   51.230621] 
[   51.231080] allocated by task 324 on cpu 0 at 51.186320s (0.044754s ago):
[   51.231518]  test_alloc+0x230/0x628
[   51.231833]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.232159]  kunit_try_run_case+0x170/0x3f0
[   51.232413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.232767]  kthread+0x318/0x620
[   51.232981]  ret_from_fork+0x10/0x20
[   51.233229] 
[   51.233407] freed by task 324 on cpu 0 at 51.186459s (0.046942s ago):
[   51.233787]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.234111]  kunit_try_run_case+0x170/0x3f0
[   51.234401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.234697]  kthread+0x318/0x620
[   51.234930]  ret_from_fork+0x10/0x20
[   51.235121] 
[   51.235328] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   51.235846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.236103] Hardware name: linux,dummy-virt (DT)
[   51.236367] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   29.265172] ==================================================================
[   29.265998] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   29.265998] 
[   29.266792] Invalid read at 0x000000000f3b9611:
[   29.267678]  test_invalid_access+0xdc/0x1f0
[   29.268154]  kunit_try_run_case+0x170/0x3f0
[   29.268480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.268876]  kthread+0x318/0x620
[   29.269144]  ret_from_fork+0x10/0x20
[   29.269431] 
[   29.269659] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   29.270234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.270626] Hardware name: linux,dummy-virt (DT)
[   29.271490] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   29.031643] ==================================================================
[   29.032089] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   29.032089] 
[   29.032386] Corrupted memory at 0x0000000041ea2170 [ ! . . . . . . . . . . . . . . . ] (in kfence-#152):
[   29.033595]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   29.034038]  kunit_try_run_case+0x170/0x3f0
[   29.034407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.034974]  kthread+0x318/0x620
[   29.035189]  ret_from_fork+0x10/0x20
[   29.035499] 
[   29.035637] kfence-#152: 0x0000000010a8010e-0x0000000014d365e5, size=73, cache=kmalloc-96
[   29.035637] 
[   29.036057] allocated by task 314 on cpu 1 at 29.031313s (0.004739s ago):
[   29.036485]  test_alloc+0x29c/0x628
[   29.036780]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   29.037057]  kunit_try_run_case+0x170/0x3f0
[   29.037311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.037609]  kthread+0x318/0x620
[   29.037799]  ret_from_fork+0x10/0x20
[   29.038059] 
[   29.038250] freed by task 314 on cpu 1 at 29.031488s (0.006756s ago):
[   29.038580]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   29.038877]  kunit_try_run_case+0x170/0x3f0
[   29.039131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.039390]  kthread+0x318/0x620
[   29.039587]  ret_from_fork+0x10/0x20
[   29.039831] 
[   29.040027] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   29.040575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.040802] Hardware name: linux,dummy-virt (DT)
[   29.041058] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   28.927755] ==================================================================
[   28.928117] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.928117] 
[   28.928436] Out-of-bounds read at 0x00000000623ad710 (105B right of kfence-#151):
[   28.929016]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.929570]  kunit_try_run_case+0x170/0x3f0
[   28.929880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.930301]  kthread+0x318/0x620
[   28.930479]  ret_from_fork+0x10/0x20
[   28.931018] 
[   28.931150] kfence-#151: 0x00000000f1b1de98-0x000000006f6ebf09, size=73, cache=kmalloc-96
[   28.931150] 
[   28.931494] allocated by task 312 on cpu 0 at 28.927433s (0.004056s ago):
[   28.931874]  test_alloc+0x29c/0x628
[   28.932078]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.932374]  kunit_try_run_case+0x170/0x3f0
[   28.932617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.932953]  kthread+0x318/0x620
[   28.933171]  ret_from_fork+0x10/0x20
[   28.933498] 
[   28.933662] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   28.934255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.934557] Hardware name: linux,dummy-virt (DT)
[   28.934793] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   24.871666] ==================================================================
[   24.872323] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   24.872323] 
[   24.872929] Corrupted memory at 0x00000000380f2867 [ ! . . . . . . . . . . . . . . . ] (in kfence-#112):
[   24.875901]  test_corruption+0x278/0x378
[   24.876323]  kunit_try_run_case+0x170/0x3f0
[   24.876722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.877192]  kthread+0x318/0x620
[   24.877578]  ret_from_fork+0x10/0x20
[   24.877988] 
[   24.878225] kfence-#112: 0x0000000067594dd7-0x00000000ae319080, size=32, cache=kmalloc-32
[   24.878225] 
[   24.878970] allocated by task 300 on cpu 1 at 24.871243s (0.007715s ago):
[   24.879644]  test_alloc+0x29c/0x628
[   24.880035]  test_corruption+0xdc/0x378
[   24.880457]  kunit_try_run_case+0x170/0x3f0
[   24.880969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.881460]  kthread+0x318/0x620
[   24.881901]  ret_from_fork+0x10/0x20
[   24.882356] 
[   24.882625] freed by task 300 on cpu 1 at 24.871414s (0.011199s ago):
[   24.883316]  test_corruption+0x278/0x378
[   24.883767]  kunit_try_run_case+0x170/0x3f0
[   24.884181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.884618]  kthread+0x318/0x620
[   24.885047]  ret_from_fork+0x10/0x20
[   24.885394] 
[   24.885728] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.886475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.886805] Hardware name: linux,dummy-virt (DT)
[   24.887321] ==================================================================
[   24.975934] ==================================================================
[   24.976482] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   24.976482] 
[   24.977185] Corrupted memory at 0x000000008753d1d2 [ ! ] (in kfence-#113):
[   24.978247]  test_corruption+0x284/0x378
[   24.978758]  kunit_try_run_case+0x170/0x3f0
[   24.979266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.979877]  kthread+0x318/0x620
[   24.980364]  ret_from_fork+0x10/0x20
[   24.980792] 
[   24.981114] kfence-#113: 0x00000000f54054f5-0x000000005edd7b85, size=32, cache=kmalloc-32
[   24.981114] 
[   24.981934] allocated by task 300 on cpu 1 at 24.975487s (0.006435s ago):
[   24.982624]  test_alloc+0x29c/0x628
[   24.983155]  test_corruption+0x198/0x378
[   24.983585]  kunit_try_run_case+0x170/0x3f0
[   24.984065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.984607]  kthread+0x318/0x620
[   24.985037]  ret_from_fork+0x10/0x20
[   24.985436] 
[   24.985732] freed by task 300 on cpu 1 at 24.975664s (0.010057s ago):
[   24.986392]  test_corruption+0x284/0x378
[   24.986853]  kunit_try_run_case+0x170/0x3f0
[   24.987245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.987819]  kthread+0x318/0x620
[   24.988199]  ret_from_fork+0x10/0x20
[   24.988660] 
[   24.988929] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.989810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.990221] Hardware name: linux,dummy-virt (DT)
[   24.990622] ==================================================================
[   25.079514] ==================================================================
[   25.080076] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   25.080076] 
[   25.081147] Corrupted memory at 0x00000000444958e2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#114):
[   25.082845]  test_corruption+0x120/0x378
[   25.083296]  kunit_try_run_case+0x170/0x3f0
[   25.083979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.084625]  kthread+0x318/0x620
[   25.085023]  ret_from_fork+0x10/0x20
[   25.085520] 
[   25.085837] kfence-#114: 0x0000000055794dbf-0x000000004d02accd, size=32, cache=test
[   25.085837] 
[   25.086547] allocated by task 302 on cpu 1 at 25.079253s (0.007282s ago):
[   25.087250]  test_alloc+0x230/0x628
[   25.087730]  test_corruption+0xdc/0x378
[   25.088186]  kunit_try_run_case+0x170/0x3f0
[   25.088659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.089130]  kthread+0x318/0x620
[   25.089536]  ret_from_fork+0x10/0x20
[   25.089962] 
[   25.090250] freed by task 302 on cpu 1 at 25.079353s (0.010884s ago):
[   25.090828]  test_corruption+0x120/0x378
[   25.091377]  kunit_try_run_case+0x170/0x3f0
[   25.091854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.092390]  kthread+0x318/0x620
[   25.092796]  ret_from_fork+0x10/0x20
[   25.093170] 
[   25.093440] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   25.094097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.094603] Hardware name: linux,dummy-virt (DT)
[   25.095133] ==================================================================
[   25.183853] ==================================================================
[   25.184503] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   25.184503] 
[   25.185260] Corrupted memory at 0x000000005e089b09 [ ! ] (in kfence-#115):
[   25.186238]  test_corruption+0x1d8/0x378
[   25.186696]  kunit_try_run_case+0x170/0x3f0
[   25.187278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.187767]  kthread+0x318/0x620
[   25.188219]  ret_from_fork+0x10/0x20
[   25.188712] 
[   25.189035] kfence-#115: 0x00000000ecaabb0e-0x00000000c7599280, size=32, cache=test
[   25.189035] 
[   25.189720] allocated by task 302 on cpu 1 at 25.183556s (0.006151s ago):
[   25.190499]  test_alloc+0x230/0x628
[   25.190961]  test_corruption+0x198/0x378
[   25.191409]  kunit_try_run_case+0x170/0x3f0
[   25.191815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.192344]  kthread+0x318/0x620
[   25.192669]  ret_from_fork+0x10/0x20
[   25.193130] 
[   25.193421] freed by task 302 on cpu 1 at 25.183665s (0.009744s ago):
[   25.194074]  test_corruption+0x1d8/0x378
[   25.194423]  kunit_try_run_case+0x170/0x3f0
[   25.194929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.195392]  kthread+0x318/0x620
[   25.195730]  ret_from_fork+0x10/0x20
[   25.196161] 
[   25.196466] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   25.197175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.197498] Hardware name: linux,dummy-virt (DT)
[   25.197999] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   24.767534] ==================================================================
[   24.768121] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   24.768121] 
[   24.768678] Invalid free of 0x0000000055685f81 (in kfence-#111):
[   24.769069]  test_invalid_addr_free+0xec/0x238
[   24.769575]  kunit_try_run_case+0x170/0x3f0
[   24.770093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.770548]  kthread+0x318/0x620
[   24.771052]  ret_from_fork+0x10/0x20
[   24.771494] 
[   24.771780] kfence-#111: 0x0000000054e49d17-0x000000006eb9935d, size=32, cache=test
[   24.771780] 
[   24.772460] allocated by task 298 on cpu 1 at 24.767309s (0.005140s ago):
[   24.773229]  test_alloc+0x230/0x628
[   24.773678]  test_invalid_addr_free+0xd4/0x238
[   24.774212]  kunit_try_run_case+0x170/0x3f0
[   24.774570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.775185]  kthread+0x318/0x620
[   24.775553]  ret_from_fork+0x10/0x20
[   24.776009] 
[   24.776330] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.776961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.777381] Hardware name: linux,dummy-virt (DT)
[   24.777850] ==================================================================
[   24.663600] ==================================================================
[   24.664246] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   24.664246] 
[   24.664940] Invalid free of 0x0000000041001053 (in kfence-#110):
[   24.665508]  test_invalid_addr_free+0x1ac/0x238
[   24.665889]  kunit_try_run_case+0x170/0x3f0
[   24.666402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.667027]  kthread+0x318/0x620
[   24.667502]  ret_from_fork+0x10/0x20
[   24.667873] 
[   24.668106] kfence-#110: 0x000000000cee93e1-0x000000007aec184b, size=32, cache=kmalloc-32
[   24.668106] 
[   24.669062] allocated by task 296 on cpu 1 at 24.663335s (0.005714s ago):
[   24.669639]  test_alloc+0x29c/0x628
[   24.670155]  test_invalid_addr_free+0xd4/0x238
[   24.670717]  kunit_try_run_case+0x170/0x3f0
[   24.671283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.671811]  kthread+0x318/0x620
[   24.672218]  ret_from_fork+0x10/0x20
[   24.672649] 
[   24.673005] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.673815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.674239] Hardware name: linux,dummy-virt (DT)
[   24.674721] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   24.559642] ==================================================================
[   24.560199] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   24.560199] 
[   24.560828] Invalid free of 0x000000009c98e922 (in kfence-#109):
[   24.561250]  test_double_free+0x100/0x238
[   24.561714]  kunit_try_run_case+0x170/0x3f0
[   24.562227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.562761]  kthread+0x318/0x620
[   24.563241]  ret_from_fork+0x10/0x20
[   24.563761] 
[   24.564053] kfence-#109: 0x000000009c98e922-0x00000000b73b636d, size=32, cache=test
[   24.564053] 
[   24.564767] allocated by task 294 on cpu 0 at 24.559285s (0.005470s ago):
[   24.565408]  test_alloc+0x230/0x628
[   24.565807]  test_double_free+0xd4/0x238
[   24.566313]  kunit_try_run_case+0x170/0x3f0
[   24.566680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.567297]  kthread+0x318/0x620
[   24.567623]  ret_from_fork+0x10/0x20
[   24.568094] 
[   24.568369] freed by task 294 on cpu 0 at 24.559379s (0.008980s ago):
[   24.568946]  test_double_free+0xf0/0x238
[   24.569400]  kunit_try_run_case+0x170/0x3f0
[   24.569852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.570373]  kthread+0x318/0x620
[   24.570779]  ret_from_fork+0x10/0x20
[   24.571192] 
[   24.571533] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.572256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.572726] Hardware name: linux,dummy-virt (DT)
[   24.573206] ==================================================================
[   24.455883] ==================================================================
[   24.456468] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   24.456468] 
[   24.457105] Invalid free of 0x00000000f5ee14be (in kfence-#108):
[   24.457639]  test_double_free+0x1bc/0x238
[   24.458102]  kunit_try_run_case+0x170/0x3f0
[   24.458642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.459170]  kthread+0x318/0x620
[   24.459634]  ret_from_fork+0x10/0x20
[   24.460082] 
[   24.460363] kfence-#108: 0x00000000f5ee14be-0x000000001d4ad8a4, size=32, cache=kmalloc-32
[   24.460363] 
[   24.461200] allocated by task 292 on cpu 0 at 24.455335s (0.005853s ago):
[   24.461804]  test_alloc+0x29c/0x628
[   24.462279]  test_double_free+0xd4/0x238
[   24.462728]  kunit_try_run_case+0x170/0x3f0
[   24.463248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.463658]  kthread+0x318/0x620
[   24.464124]  ret_from_fork+0x10/0x20
[   24.464571] 
[   24.464841] freed by task 292 on cpu 0 at 24.455478s (0.009350s ago):
[   24.465478]  test_double_free+0x1ac/0x238
[   24.465963]  kunit_try_run_case+0x170/0x3f0
[   24.466389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.466881]  kthread+0x318/0x620
[   24.467275]  ret_from_fork+0x10/0x20
[   24.467633] 
[   24.467969] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.468634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.469125] Hardware name: linux,dummy-virt (DT)
[   24.469535] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   24.143748] ==================================================================
[   24.144344] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   24.144344] 
[   24.145165] Use-after-free read at 0x00000000a2e815c7 (in kfence-#105):
[   24.146214]  test_use_after_free_read+0x114/0x248
[   24.147053]  kunit_try_run_case+0x170/0x3f0
[   24.147727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.148202]  kthread+0x318/0x620
[   24.148571]  ret_from_fork+0x10/0x20
[   24.149143] 
[   24.149502] kfence-#105: 0x00000000a2e815c7-0x0000000091cb25bc, size=32, cache=test
[   24.149502] 
[   24.150238] allocated by task 286 on cpu 0 at 24.143367s (0.006859s ago):
[   24.151058]  test_alloc+0x230/0x628
[   24.151571]  test_use_after_free_read+0xd0/0x248
[   24.152188]  kunit_try_run_case+0x170/0x3f0
[   24.152617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.153298]  kthread+0x318/0x620
[   24.153760]  ret_from_fork+0x10/0x20
[   24.154300] 
[   24.154667] freed by task 286 on cpu 0 at 24.143483s (0.011172s ago):
[   24.155505]  test_use_after_free_read+0xf0/0x248
[   24.155875]  kunit_try_run_case+0x170/0x3f0
[   24.156392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.156896]  kthread+0x318/0x620
[   24.157345]  ret_from_fork+0x10/0x20
[   24.157788] 
[   24.158104] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.158789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.159294] Hardware name: linux,dummy-virt (DT)
[   24.159695] ==================================================================
[   24.039708] ==================================================================
[   24.040284] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   24.040284] 
[   24.041570] Use-after-free read at 0x00000000534d1225 (in kfence-#104):
[   24.042189]  test_use_after_free_read+0x114/0x248
[   24.042971]  kunit_try_run_case+0x170/0x3f0
[   24.043289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.043492]  kthread+0x318/0x620
[   24.043646]  ret_from_fork+0x10/0x20
[   24.043824] 
[   24.043933] kfence-#104: 0x00000000534d1225-0x00000000dfb58895, size=32, cache=kmalloc-32
[   24.043933] 
[   24.044202] allocated by task 284 on cpu 1 at 24.039240s (0.004956s ago):
[   24.044439]  test_alloc+0x29c/0x628
[   24.044596]  test_use_after_free_read+0xd0/0x248
[   24.044837]  kunit_try_run_case+0x170/0x3f0
[   24.045339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.046041]  kthread+0x318/0x620
[   24.046571]  ret_from_fork+0x10/0x20
[   24.047120] 
[   24.047632] freed by task 284 on cpu 1 at 24.039364s (0.008107s ago):
[   24.048490]  test_use_after_free_read+0x1c0/0x248
[   24.048950]  kunit_try_run_case+0x170/0x3f0
[   24.049402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.049932]  kthread+0x318/0x620
[   24.050336]  ret_from_fork+0x10/0x20
[   24.050787] 
[   24.051103] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   24.051842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.052164] Hardware name: linux,dummy-virt (DT)
[   24.052678] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   23.935411] ==================================================================
[   23.936107] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   23.936107] 
[   23.936705] Out-of-bounds write at 0x00000000f6f9f8e4 (1B left of kfence-#103):
[   23.937350]  test_out_of_bounds_write+0x100/0x240
[   23.937895]  kunit_try_run_case+0x170/0x3f0
[   23.938326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.938994]  kthread+0x318/0x620
[   23.939369]  ret_from_fork+0x10/0x20
[   23.939718] 
[   23.939958] kfence-#103: 0x00000000b86db979-0x0000000012d0829c, size=32, cache=test
[   23.939958] 
[   23.940759] allocated by task 282 on cpu 0 at 23.935267s (0.005480s ago):
[   23.941372]  test_alloc+0x230/0x628
[   23.941771]  test_out_of_bounds_write+0xc8/0x240
[   23.942299]  kunit_try_run_case+0x170/0x3f0
[   23.942729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.943175]  kthread+0x318/0x620
[   23.943600]  ret_from_fork+0x10/0x20
[   23.944068] 
[   23.944325] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   23.945110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.945548] Hardware name: linux,dummy-virt (DT)
[   23.945928] ==================================================================
[   23.519607] ==================================================================
[   23.520066] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   23.520066] 
[   23.520421] Out-of-bounds write at 0x00000000b25b398e (1B left of kfence-#99):
[   23.520652]  test_out_of_bounds_write+0x100/0x240
[   23.520859]  kunit_try_run_case+0x170/0x3f0
[   23.521032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.521219]  kthread+0x318/0x620
[   23.521367]  ret_from_fork+0x10/0x20
[   23.521517] 
[   23.521619] kfence-#99: 0x00000000ef187485-0x000000002a39b55f, size=32, cache=kmalloc-32
[   23.521619] 
[   23.522012] allocated by task 280 on cpu 0 at 23.519327s (0.002675s ago):
[   23.522584]  test_alloc+0x29c/0x628
[   23.523490]  test_out_of_bounds_write+0xc8/0x240
[   23.524093]  kunit_try_run_case+0x170/0x3f0
[   23.524649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.525126]  kthread+0x318/0x620
[   23.525607]  ret_from_fork+0x10/0x20
[   23.526134] 
[   23.526446] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   23.527041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.527358] Hardware name: linux,dummy-virt (DT)
[   23.527927] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   23.415470] ==================================================================
[   23.416319] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   23.416319] 
[   23.417042] Out-of-bounds read at 0x0000000068f4646b (32B right of kfence-#98):
[   23.417709]  test_out_of_bounds_read+0x1c8/0x3e0
[   23.418291]  kunit_try_run_case+0x170/0x3f0
[   23.418747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.419394]  kthread+0x318/0x620
[   23.419846]  ret_from_fork+0x10/0x20
[   23.420279] 
[   23.420570] kfence-#98: 0x00000000426b8b73-0x00000000257a7f50, size=32, cache=test
[   23.420570] 
[   23.421320] allocated by task 278 on cpu 1 at 23.415315s (0.005994s ago):
[   23.421955]  test_alloc+0x230/0x628
[   23.422482]  test_out_of_bounds_read+0x198/0x3e0
[   23.422960]  kunit_try_run_case+0x170/0x3f0
[   23.423471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.423927]  kthread+0x318/0x620
[   23.424365]  ret_from_fork+0x10/0x20
[   23.424847] 
[   23.425182] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   23.425972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.426457] Hardware name: linux,dummy-virt (DT)
[   23.426904] ==================================================================
[   23.103449] ==================================================================
[   23.104004] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   23.104004] 
[   23.104498] Out-of-bounds read at 0x00000000bfd868f5 (1B left of kfence-#95):
[   23.104957]  test_out_of_bounds_read+0x114/0x3e0
[   23.105319]  kunit_try_run_case+0x170/0x3f0
[   23.105608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.105900]  kthread+0x318/0x620
[   23.106108]  ret_from_fork+0x10/0x20
[   23.106447] 
[   23.106653] kfence-#95: 0x00000000e299e969-0x000000003ec3df6d, size=32, cache=test
[   23.106653] 
[   23.107069] allocated by task 278 on cpu 1 at 23.103344s (0.003719s ago):
[   23.107518]  test_alloc+0x230/0x628
[   23.107790]  test_out_of_bounds_read+0xdc/0x3e0
[   23.108062]  kunit_try_run_case+0x170/0x3f0
[   23.108352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.108637]  kthread+0x318/0x620
[   23.108907]  ret_from_fork+0x10/0x20
[   23.109155] 
[   23.109356] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   23.109810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.110121] Hardware name: linux,dummy-virt (DT)
[   23.110392] ==================================================================
[   22.792399] ==================================================================
[   22.792857] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   22.792857] 
[   22.793284] Out-of-bounds read at 0x00000000e7ba967f (1B left of kfence-#92):
[   22.794014]  test_out_of_bounds_read+0x114/0x3e0
[   22.794328]  kunit_try_run_case+0x170/0x3f0
[   22.794723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.795078]  kthread+0x318/0x620
[   22.795236]  ret_from_fork+0x10/0x20
[   22.795435] 
[   22.795857] kfence-#92: 0x000000001cf77dd6-0x00000000e8411fb2, size=32, cache=kmalloc-32
[   22.795857] 
[   22.796690] allocated by task 276 on cpu 1 at 22.791255s (0.005357s ago):
[   22.797606]  test_alloc+0x29c/0x628
[   22.797839]  test_out_of_bounds_read+0xdc/0x3e0
[   22.798029]  kunit_try_run_case+0x170/0x3f0
[   22.798285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.798700]  kthread+0x318/0x620
[   22.799023]  ret_from_fork+0x10/0x20
[   22.799248] 
[   22.799495] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.799953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.800240] Hardware name: linux,dummy-virt (DT)
[   22.800517] ==================================================================
[   22.895589] ==================================================================
[   22.895952] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   22.895952] 
[   22.896260] Out-of-bounds read at 0x00000000754275c6 (32B right of kfence-#93):
[   22.896685]  test_out_of_bounds_read+0x1c8/0x3e0
[   22.897089]  kunit_try_run_case+0x170/0x3f0
[   22.897321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.897685]  kthread+0x318/0x620
[   22.897944]  ret_from_fork+0x10/0x20
[   22.898193] 
[   22.898316] kfence-#93: 0x000000003f350ab3-0x00000000a4499652, size=32, cache=kmalloc-32
[   22.898316] 
[   22.898887] allocated by task 276 on cpu 1 at 22.895292s (0.003590s ago):
[   22.899172]  test_alloc+0x29c/0x628
[   22.899442]  test_out_of_bounds_read+0x198/0x3e0
[   22.899752]  kunit_try_run_case+0x170/0x3f0
[   22.899961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.900218]  kthread+0x318/0x620
[   22.900448]  ret_from_fork+0x10/0x20
[   22.900700] 
[   22.900886] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.901346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.901548] Hardware name: linux,dummy-virt (DT)
[   22.901814] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   22.672938] ==================================================================
[   22.673254] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   22.673847] Write of size 1 at addr fff00000c6649478 by task kunit_try_catch/274
[   22.674152] 
[   22.674280] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.674385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.674424] Hardware name: linux,dummy-virt (DT)
[   22.674498] Call trace:
[   22.674533]  show_stack+0x20/0x38 (C)
[   22.674595]  dump_stack_lvl+0x8c/0xd0
[   22.674684]  print_report+0x118/0x608
[   22.674768]  kasan_report+0xdc/0x128
[   22.674824]  __asan_report_store1_noabort+0x20/0x30
[   22.674909]  strncpy_from_user+0x270/0x2a0
[   22.674995]  copy_user_test_oob+0x5c0/0xec0
[   22.675054]  kunit_try_run_case+0x170/0x3f0
[   22.675110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.675177]  kthread+0x318/0x620
[   22.675230]  ret_from_fork+0x10/0x20
[   22.675290] 
[   22.678233] Allocated by task 274:
[   22.678387]  kasan_save_stack+0x3c/0x68
[   22.678787]  kasan_save_track+0x20/0x40
[   22.679135]  kasan_save_alloc_info+0x40/0x58
[   22.679307]  __kasan_kmalloc+0xd4/0xd8
[   22.679688]  __kmalloc_noprof+0x190/0x4d0
[   22.679972]  kunit_kmalloc_array+0x34/0x88
[   22.680255]  copy_user_test_oob+0xac/0xec0
[   22.680482]  kunit_try_run_case+0x170/0x3f0
[   22.680702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.681024]  kthread+0x318/0x620
[   22.681231]  ret_from_fork+0x10/0x20
[   22.681458] 
[   22.681585] The buggy address belongs to the object at fff00000c6649400
[   22.681585]  which belongs to the cache kmalloc-128 of size 128
[   22.681976] The buggy address is located 0 bytes to the right of
[   22.681976]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.682314] 
[   22.682419] The buggy address belongs to the physical page:
[   22.682873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.683563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.683987] page_type: f5(slab)
[   22.684148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.684774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.685309] page dumped because: kasan: bad access detected
[   22.685607] 
[   22.685721] Memory state around the buggy address:
[   22.686171]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.686530]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.686810] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.687143]                                                                 ^
[   22.687467]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.687819]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.688086] ==================================================================
[   22.654983] ==================================================================
[   22.655661] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   22.656149] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.656748] 
[   22.656930] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.657030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.657082] Hardware name: linux,dummy-virt (DT)
[   22.657131] Call trace:
[   22.657166]  show_stack+0x20/0x38 (C)
[   22.657227]  dump_stack_lvl+0x8c/0xd0
[   22.657283]  print_report+0x118/0x608
[   22.657336]  kasan_report+0xdc/0x128
[   22.657416]  kasan_check_range+0x100/0x1a8
[   22.657507]  __kasan_check_write+0x20/0x30
[   22.657572]  strncpy_from_user+0x3c/0x2a0
[   22.657631]  copy_user_test_oob+0x5c0/0xec0
[   22.657685]  kunit_try_run_case+0x170/0x3f0
[   22.657753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.657821]  kthread+0x318/0x620
[   22.657874]  ret_from_fork+0x10/0x20
[   22.657934] 
[   22.661320] Allocated by task 274:
[   22.661576]  kasan_save_stack+0x3c/0x68
[   22.661758]  kasan_save_track+0x20/0x40
[   22.662140]  kasan_save_alloc_info+0x40/0x58
[   22.662556]  __kasan_kmalloc+0xd4/0xd8
[   22.662805]  __kmalloc_noprof+0x190/0x4d0
[   22.663059]  kunit_kmalloc_array+0x34/0x88
[   22.663308]  copy_user_test_oob+0xac/0xec0
[   22.663558]  kunit_try_run_case+0x170/0x3f0
[   22.663772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.664036]  kthread+0x318/0x620
[   22.664267]  ret_from_fork+0x10/0x20
[   22.664487] 
[   22.664593] The buggy address belongs to the object at fff00000c6649400
[   22.664593]  which belongs to the cache kmalloc-128 of size 128
[   22.665178] The buggy address is located 0 bytes inside of
[   22.665178]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.665580] 
[   22.665790] The buggy address belongs to the physical page:
[   22.666271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.666666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.667071] page_type: f5(slab)
[   22.667238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.667478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.668050] page dumped because: kasan: bad access detected
[   22.668518] 
[   22.668733] Memory state around the buggy address:
[   22.669085]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.669514]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.669752] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.670424]                                                                 ^
[   22.670795]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671266]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671701] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   22.559775] ==================================================================
[   22.560284] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   22.560775] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.561205] 
[   22.561432] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.561535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.561570] Hardware name: linux,dummy-virt (DT)
[   22.561611] Call trace:
[   22.561658]  show_stack+0x20/0x38 (C)
[   22.561721]  dump_stack_lvl+0x8c/0xd0
[   22.561807]  print_report+0x118/0x608
[   22.561867]  kasan_report+0xdc/0x128
[   22.561918]  kasan_check_range+0x100/0x1a8
[   22.561975]  __kasan_check_read+0x20/0x30
[   22.562028]  copy_user_test_oob+0x728/0xec0
[   22.562092]  kunit_try_run_case+0x170/0x3f0
[   22.562151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.562213]  kthread+0x318/0x620
[   22.562263]  ret_from_fork+0x10/0x20
[   22.562318] 
[   22.566589] Allocated by task 274:
[   22.566908]  kasan_save_stack+0x3c/0x68
[   22.567240]  kasan_save_track+0x20/0x40
[   22.567541]  kasan_save_alloc_info+0x40/0x58
[   22.567829]  __kasan_kmalloc+0xd4/0xd8
[   22.568140]  __kmalloc_noprof+0x190/0x4d0
[   22.568428]  kunit_kmalloc_array+0x34/0x88
[   22.568731]  copy_user_test_oob+0xac/0xec0
[   22.569060]  kunit_try_run_case+0x170/0x3f0
[   22.569322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.569772]  kthread+0x318/0x620
[   22.570083]  ret_from_fork+0x10/0x20
[   22.570328] 
[   22.570523] The buggy address belongs to the object at fff00000c6649400
[   22.570523]  which belongs to the cache kmalloc-128 of size 128
[   22.571191] The buggy address is located 0 bytes inside of
[   22.571191]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.571906] 
[   22.572086] The buggy address belongs to the physical page:
[   22.572378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.572816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.573247] page_type: f5(slab)
[   22.573554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.573945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.574312] page dumped because: kasan: bad access detected
[   22.574780] 
[   22.574933] Memory state around the buggy address:
[   22.575195]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.575720]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.576072] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.576503]                                                                 ^
[   22.576979]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.577375]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.577800] ==================================================================
[   22.532360] ==================================================================
[   22.533170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   22.533641] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.534004] 
[   22.534237] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.534352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.534391] Hardware name: linux,dummy-virt (DT)
[   22.534435] Call trace:
[   22.534484]  show_stack+0x20/0x38 (C)
[   22.535554]  dump_stack_lvl+0x8c/0xd0
[   22.535621]  print_report+0x118/0x608
[   22.535678]  kasan_report+0xdc/0x128
[   22.535731]  kasan_check_range+0x100/0x1a8
[   22.535806]  __kasan_check_write+0x20/0x30
[   22.535859]  copy_user_test_oob+0x234/0xec0
[   22.535915]  kunit_try_run_case+0x170/0x3f0
[   22.535970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.536029]  kthread+0x318/0x620
[   22.536081]  ret_from_fork+0x10/0x20
[   22.536137] 
[   22.540033] Allocated by task 274:
[   22.540248]  kasan_save_stack+0x3c/0x68
[   22.540474]  kasan_save_track+0x20/0x40
[   22.540643]  kasan_save_alloc_info+0x40/0x58
[   22.541921]  __kasan_kmalloc+0xd4/0xd8
[   22.542242]  __kmalloc_noprof+0x190/0x4d0
[   22.542435]  kunit_kmalloc_array+0x34/0x88
[   22.542610]  copy_user_test_oob+0xac/0xec0
[   22.542876]  kunit_try_run_case+0x170/0x3f0
[   22.543170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.544068]  kthread+0x318/0x620
[   22.544367]  ret_from_fork+0x10/0x20
[   22.544601] 
[   22.544846] The buggy address belongs to the object at fff00000c6649400
[   22.544846]  which belongs to the cache kmalloc-128 of size 128
[   22.545292] The buggy address is located 0 bytes inside of
[   22.545292]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.545879] 
[   22.546028] The buggy address belongs to the physical page:
[   22.546695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.547265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.547510] page_type: f5(slab)
[   22.547686] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.548050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.548675] page dumped because: kasan: bad access detected
[   22.548964] 
[   22.549074] Memory state around the buggy address:
[   22.549893]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.550319]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.550891] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.551343]                                                                 ^
[   22.551687]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.552034]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.552359] ==================================================================
[   22.635929] ==================================================================
[   22.636319] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   22.637165] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.637474] 
[   22.637619] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.637714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.637768] Hardware name: linux,dummy-virt (DT)
[   22.637809] Call trace:
[   22.637839]  show_stack+0x20/0x38 (C)
[   22.637897]  dump_stack_lvl+0x8c/0xd0
[   22.637952]  print_report+0x118/0x608
[   22.638001]  kasan_report+0xdc/0x128
[   22.638049]  kasan_check_range+0x100/0x1a8
[   22.638127]  __kasan_check_read+0x20/0x30
[   22.638181]  copy_user_test_oob+0x4a0/0xec0
[   22.638234]  kunit_try_run_case+0x170/0x3f0
[   22.638291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.638347]  kthread+0x318/0x620
[   22.638394]  ret_from_fork+0x10/0x20
[   22.638446] 
[   22.642664] Allocated by task 274:
[   22.643090]  kasan_save_stack+0x3c/0x68
[   22.643421]  kasan_save_track+0x20/0x40
[   22.643773]  kasan_save_alloc_info+0x40/0x58
[   22.644000]  __kasan_kmalloc+0xd4/0xd8
[   22.644376]  __kmalloc_noprof+0x190/0x4d0
[   22.644616]  kunit_kmalloc_array+0x34/0x88
[   22.644950]  copy_user_test_oob+0xac/0xec0
[   22.645229]  kunit_try_run_case+0x170/0x3f0
[   22.645453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.645836]  kthread+0x318/0x620
[   22.646063]  ret_from_fork+0x10/0x20
[   22.646321] 
[   22.646474] The buggy address belongs to the object at fff00000c6649400
[   22.646474]  which belongs to the cache kmalloc-128 of size 128
[   22.646963] The buggy address is located 0 bytes inside of
[   22.646963]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.647685] 
[   22.647930] The buggy address belongs to the physical page:
[   22.648237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.648532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.649061] page_type: f5(slab)
[   22.649318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.649734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.650182] page dumped because: kasan: bad access detected
[   22.650452] 
[   22.650643] Memory state around the buggy address:
[   22.650855]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.651252]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.651678] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.652098]                                                                 ^
[   22.652494]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.652896]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.653272] ==================================================================
[   22.619314] ==================================================================
[   22.619712] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   22.620757] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.621114] 
[   22.621262] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.621362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.621397] Hardware name: linux,dummy-virt (DT)
[   22.621436] Call trace:
[   22.621466]  show_stack+0x20/0x38 (C)
[   22.621549]  dump_stack_lvl+0x8c/0xd0
[   22.621605]  print_report+0x118/0x608
[   22.621658]  kasan_report+0xdc/0x128
[   22.621711]  kasan_check_range+0x100/0x1a8
[   22.621785]  __kasan_check_write+0x20/0x30
[   22.621838]  copy_user_test_oob+0x434/0xec0
[   22.621892]  kunit_try_run_case+0x170/0x3f0
[   22.621943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.622001]  kthread+0x318/0x620
[   22.622051]  ret_from_fork+0x10/0x20
[   22.622119] 
[   22.624887] Allocated by task 274:
[   22.625076]  kasan_save_stack+0x3c/0x68
[   22.625352]  kasan_save_track+0x20/0x40
[   22.625629]  kasan_save_alloc_info+0x40/0x58
[   22.625885]  __kasan_kmalloc+0xd4/0xd8
[   22.626139]  __kmalloc_noprof+0x190/0x4d0
[   22.626416]  kunit_kmalloc_array+0x34/0x88
[   22.626690]  copy_user_test_oob+0xac/0xec0
[   22.626906]  kunit_try_run_case+0x170/0x3f0
[   22.627121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.627566]  kthread+0x318/0x620
[   22.627862]  ret_from_fork+0x10/0x20
[   22.628093] 
[   22.628280] The buggy address belongs to the object at fff00000c6649400
[   22.628280]  which belongs to the cache kmalloc-128 of size 128
[   22.628767] The buggy address is located 0 bytes inside of
[   22.628767]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.629187] 
[   22.629375] The buggy address belongs to the physical page:
[   22.629780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.630202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.630615] page_type: f5(slab)
[   22.630847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.631226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.631693] page dumped because: kasan: bad access detected
[   22.631992] 
[   22.632143] Memory state around the buggy address:
[   22.632359]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.632580]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.633122] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.633482]                                                                 ^
[   22.634032]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.634422]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.634778] ==================================================================
[   22.583829] ==================================================================
[   22.584294] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   22.584762] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.585086] 
[   22.585283] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.585421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.585458] Hardware name: linux,dummy-virt (DT)
[   22.585498] Call trace:
[   22.585530]  show_stack+0x20/0x38 (C)
[   22.585591]  dump_stack_lvl+0x8c/0xd0
[   22.585665]  print_report+0x118/0x608
[   22.585728]  kasan_report+0xdc/0x128
[   22.585815]  kasan_check_range+0x100/0x1a8
[   22.585877]  __kasan_check_write+0x20/0x30
[   22.585934]  copy_user_test_oob+0x35c/0xec0
[   22.585989]  kunit_try_run_case+0x170/0x3f0
[   22.586042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.586119]  kthread+0x318/0x620
[   22.586175]  ret_from_fork+0x10/0x20
[   22.586235] 
[   22.590308] Allocated by task 274:
[   22.590667]  kasan_save_stack+0x3c/0x68
[   22.591090]  kasan_save_track+0x20/0x40
[   22.591344]  kasan_save_alloc_info+0x40/0x58
[   22.591699]  __kasan_kmalloc+0xd4/0xd8
[   22.591976]  __kmalloc_noprof+0x190/0x4d0
[   22.592194]  kunit_kmalloc_array+0x34/0x88
[   22.592555]  copy_user_test_oob+0xac/0xec0
[   22.592861]  kunit_try_run_case+0x170/0x3f0
[   22.593140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.593493]  kthread+0x318/0x620
[   22.593802]  ret_from_fork+0x10/0x20
[   22.594021] 
[   22.594232] The buggy address belongs to the object at fff00000c6649400
[   22.594232]  which belongs to the cache kmalloc-128 of size 128
[   22.594865] The buggy address is located 0 bytes inside of
[   22.594865]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.595526] 
[   22.595687] The buggy address belongs to the physical page:
[   22.596047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.596502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.596896] page_type: f5(slab)
[   22.597123] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.597479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.597952] page dumped because: kasan: bad access detected
[   22.598265] 
[   22.598461] Memory state around the buggy address:
[   22.598804]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.599209]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.599590] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.600105]                                                                 ^
[   22.600455]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.600828]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601205] ==================================================================
[   22.602360] ==================================================================
[   22.602695] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   22.603495] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274
[   22.604350] 
[   22.604553] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.604669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.604705] Hardware name: linux,dummy-virt (DT)
[   22.604758] Call trace:
[   22.604791]  show_stack+0x20/0x38 (C)
[   22.604856]  dump_stack_lvl+0x8c/0xd0
[   22.604912]  print_report+0x118/0x608
[   22.604963]  kasan_report+0xdc/0x128
[   22.605012]  kasan_check_range+0x100/0x1a8
[   22.605063]  __kasan_check_read+0x20/0x30
[   22.605110]  copy_user_test_oob+0x3c8/0xec0
[   22.605160]  kunit_try_run_case+0x170/0x3f0
[   22.605208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.605260]  kthread+0x318/0x620
[   22.605310]  ret_from_fork+0x10/0x20
[   22.605361] 
[   22.608397] Allocated by task 274:
[   22.608600]  kasan_save_stack+0x3c/0x68
[   22.608851]  kasan_save_track+0x20/0x40
[   22.609188]  kasan_save_alloc_info+0x40/0x58
[   22.609490]  __kasan_kmalloc+0xd4/0xd8
[   22.609802]  __kmalloc_noprof+0x190/0x4d0
[   22.610090]  kunit_kmalloc_array+0x34/0x88
[   22.610379]  copy_user_test_oob+0xac/0xec0
[   22.610747]  kunit_try_run_case+0x170/0x3f0
[   22.611056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.611345]  kthread+0x318/0x620
[   22.611637]  ret_from_fork+0x10/0x20
[   22.611893] 
[   22.612051] The buggy address belongs to the object at fff00000c6649400
[   22.612051]  which belongs to the cache kmalloc-128 of size 128
[   22.612648] The buggy address is located 0 bytes inside of
[   22.612648]  allocated 120-byte region [fff00000c6649400, fff00000c6649478)
[   22.613151] 
[   22.613340] The buggy address belongs to the physical page:
[   22.613668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   22.614202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.614555] page_type: f5(slab)
[   22.614874] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.615178] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.615483] page dumped because: kasan: bad access detected
[   22.615757] 
[   22.615942] Memory state around the buggy address:
[   22.616204]  fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.616604]  fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.616956] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.617245]                                                                 ^
[   22.617604]  fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.617967]  fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.618291] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   22.474291] ==================================================================
[   22.475511] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   22.476172] Read of size 8 at addr fff00000c5a05c78 by task kunit_try_catch/270
[   22.476423] 
[   22.476553] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.476659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.476697] Hardware name: linux,dummy-virt (DT)
[   22.476810] Call trace:
[   22.476892]  show_stack+0x20/0x38 (C)
[   22.476979]  dump_stack_lvl+0x8c/0xd0
[   22.477041]  print_report+0x118/0x608
[   22.477101]  kasan_report+0xdc/0x128
[   22.477158]  __asan_report_load8_noabort+0x20/0x30
[   22.477215]  copy_to_kernel_nofault+0x204/0x250
[   22.477276]  copy_to_kernel_nofault_oob+0x158/0x418
[   22.477335]  kunit_try_run_case+0x170/0x3f0
[   22.477395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.477455]  kthread+0x318/0x620
[   22.477510]  ret_from_fork+0x10/0x20
[   22.477566] 
[   22.480834] Allocated by task 270:
[   22.481142]  kasan_save_stack+0x3c/0x68
[   22.481462]  kasan_save_track+0x20/0x40
[   22.481825]  kasan_save_alloc_info+0x40/0x58
[   22.482094]  __kasan_kmalloc+0xd4/0xd8
[   22.482320]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.482664]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.482970]  kunit_try_run_case+0x170/0x3f0
[   22.483348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.483652]  kthread+0x318/0x620
[   22.483905]  ret_from_fork+0x10/0x20
[   22.484144] 
[   22.484333] The buggy address belongs to the object at fff00000c5a05c00
[   22.484333]  which belongs to the cache kmalloc-128 of size 128
[   22.484974] The buggy address is located 0 bytes to the right of
[   22.484974]  allocated 120-byte region [fff00000c5a05c00, fff00000c5a05c78)
[   22.485556] 
[   22.485757] The buggy address belongs to the physical page:
[   22.486092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   22.486495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.487051] page_type: f5(slab)
[   22.487296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.487838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.488332] page dumped because: kasan: bad access detected
[   22.488646] 
[   22.488854] Memory state around the buggy address:
[   22.489145]  fff00000c5a05b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.489571]  fff00000c5a05b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.489953] >fff00000c5a05c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.490346]                                                                 ^
[   22.490759]  fff00000c5a05c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.491300]  fff00000c5a05d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.491622] ==================================================================
[   22.492953] ==================================================================
[   22.493390] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   22.493794] Write of size 8 at addr fff00000c5a05c78 by task kunit_try_catch/270
[   22.494263] 
[   22.494423] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.494560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.494598] Hardware name: linux,dummy-virt (DT)
[   22.494641] Call trace:
[   22.494673]  show_stack+0x20/0x38 (C)
[   22.494748]  dump_stack_lvl+0x8c/0xd0
[   22.494812]  print_report+0x118/0x608
[   22.494869]  kasan_report+0xdc/0x128
[   22.494925]  kasan_check_range+0x100/0x1a8
[   22.494983]  __kasan_check_write+0x20/0x30
[   22.495039]  copy_to_kernel_nofault+0x8c/0x250
[   22.495098]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   22.495157]  kunit_try_run_case+0x170/0x3f0
[   22.495214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.495276]  kthread+0x318/0x620
[   22.495330]  ret_from_fork+0x10/0x20
[   22.495386] 
[   22.498620] Allocated by task 270:
[   22.498816]  kasan_save_stack+0x3c/0x68
[   22.499184]  kasan_save_track+0x20/0x40
[   22.499407]  kasan_save_alloc_info+0x40/0x58
[   22.499681]  __kasan_kmalloc+0xd4/0xd8
[   22.499869]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.500250]  copy_to_kernel_nofault_oob+0xc8/0x418
[   22.500529]  kunit_try_run_case+0x170/0x3f0
[   22.500698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.501248]  kthread+0x318/0x620
[   22.501595]  ret_from_fork+0x10/0x20
[   22.501877] 
[   22.501982] The buggy address belongs to the object at fff00000c5a05c00
[   22.501982]  which belongs to the cache kmalloc-128 of size 128
[   22.502939] The buggy address is located 0 bytes to the right of
[   22.502939]  allocated 120-byte region [fff00000c5a05c00, fff00000c5a05c78)
[   22.503453] 
[   22.503710] The buggy address belongs to the physical page:
[   22.504110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   22.504594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.504988] page_type: f5(slab)
[   22.505216] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.505570] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.506060] page dumped because: kasan: bad access detected
[   22.506269] 
[   22.506429] Memory state around the buggy address:
[   22.506709]  fff00000c5a05b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.507103]  fff00000c5a05b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.507342] >fff00000c5a05c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.508454]                                                                 ^
[   22.509098]  fff00000c5a05c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.509542]  fff00000c5a05d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.509994] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   22.416461] ==================================================================
[   22.416950] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   22.417463] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   22.417967] 
[   22.418129] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.418235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.418271] Hardware name: linux,dummy-virt (DT)
[   22.418311] Call trace:
[   22.418340]  show_stack+0x20/0x38 (C)
[   22.418399]  dump_stack_lvl+0x8c/0xd0
[   22.418457]  print_report+0x310/0x608
[   22.418527]  kasan_report+0xdc/0x128
[   22.418578]  __asan_report_load1_noabort+0x20/0x30
[   22.418633]  vmalloc_oob+0x578/0x5d0
[   22.418683]  kunit_try_run_case+0x170/0x3f0
[   22.418777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.418844]  kthread+0x318/0x620
[   22.418934]  ret_from_fork+0x10/0x20
[   22.418993] 
[   22.422523] The buggy address belongs to the virtual mapping at
[   22.422523]  [ffff80008010b000, ffff80008010d000) created by:
[   22.422523]  vmalloc_oob+0x98/0x5d0
[   22.423262] 
[   22.423464] The buggy address belongs to the physical page:
[   22.423915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106717
[   22.424354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.424725] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.425167] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.425591] page dumped because: kasan: bad access detected
[   22.425881] 
[   22.426094] Memory state around the buggy address:
[   22.426329]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.427417]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.427880] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   22.428261]                                                              ^
[   22.428614]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.428979]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.429345] ==================================================================
[   22.431095] ==================================================================
[   22.431751] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   22.432194] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   22.432566] 
[   22.432696] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.432809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.432861] Hardware name: linux,dummy-virt (DT)
[   22.432915] Call trace:
[   22.432951]  show_stack+0x20/0x38 (C)
[   22.433027]  dump_stack_lvl+0x8c/0xd0
[   22.433099]  print_report+0x310/0x608
[   22.433169]  kasan_report+0xdc/0x128
[   22.433239]  __asan_report_load1_noabort+0x20/0x30
[   22.433311]  vmalloc_oob+0x51c/0x5d0
[   22.433363]  kunit_try_run_case+0x170/0x3f0
[   22.433417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.433477]  kthread+0x318/0x620
[   22.433529]  ret_from_fork+0x10/0x20
[   22.433585] 
[   22.437301] The buggy address belongs to the virtual mapping at
[   22.437301]  [ffff80008010b000, ffff80008010d000) created by:
[   22.437301]  vmalloc_oob+0x98/0x5d0
[   22.437911] 
[   22.438113] The buggy address belongs to the physical page:
[   22.438460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106717
[   22.438975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.439606] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.440039] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.440434] page dumped because: kasan: bad access detected
[   22.440774] 
[   22.440959] Memory state around the buggy address:
[   22.441240]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.441677]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.442083] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   22.442332]                                                                 ^
[   22.442889]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.443250]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   22.443636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   21.714017] ==================================================================
[   21.714339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.714945] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.715407] 
[   21.715621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.715746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.715788] Hardware name: linux,dummy-virt (DT)
[   21.715828] Call trace:
[   21.715857]  show_stack+0x20/0x38 (C)
[   21.715916]  dump_stack_lvl+0x8c/0xd0
[   21.715990]  print_report+0x118/0x608
[   21.716044]  kasan_report+0xdc/0x128
[   21.716098]  kasan_check_range+0x100/0x1a8
[   21.716154]  __kasan_check_write+0x20/0x30
[   21.716220]  kasan_atomics_helper+0xad4/0x4858
[   21.716283]  kasan_atomics+0x198/0x2e8
[   21.716338]  kunit_try_run_case+0x170/0x3f0
[   21.716393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.716455]  kthread+0x318/0x620
[   21.716506]  ret_from_fork+0x10/0x20
[   21.716562] 
[   21.720031] Allocated by task 254:
[   21.720364]  kasan_save_stack+0x3c/0x68
[   21.720713]  kasan_save_track+0x20/0x40
[   21.720993]  kasan_save_alloc_info+0x40/0x58
[   21.721360]  __kasan_kmalloc+0xd4/0xd8
[   21.721664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.721976]  kasan_atomics+0xb8/0x2e8
[   21.722362]  kunit_try_run_case+0x170/0x3f0
[   21.722669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.723031]  kthread+0x318/0x620
[   21.723252]  ret_from_fork+0x10/0x20
[   21.723499] 
[   21.723707] The buggy address belongs to the object at fff00000c66ea700
[   21.723707]  which belongs to the cache kmalloc-64 of size 64
[   21.724321] The buggy address is located 0 bytes to the right of
[   21.724321]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.725038] 
[   21.725176] The buggy address belongs to the physical page:
[   21.725483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.726008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.726412] page_type: f5(slab)
[   21.726773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.727382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.727652] page dumped because: kasan: bad access detected
[   21.728054] 
[   21.728363] Memory state around the buggy address:
[   21.728637]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.729038]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.729455] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.730243]                                      ^
[   21.730580]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.731082]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.731456] ==================================================================
[   21.301652] ==================================================================
[   21.301993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   21.302269] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.302889] 
[   21.303141] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.303248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.303286] Hardware name: linux,dummy-virt (DT)
[   21.303343] Call trace:
[   21.303376]  show_stack+0x20/0x38 (C)
[   21.303438]  dump_stack_lvl+0x8c/0xd0
[   21.303496]  print_report+0x118/0x608
[   21.303551]  kasan_report+0xdc/0x128
[   21.303606]  kasan_check_range+0x100/0x1a8
[   21.303663]  __kasan_check_write+0x20/0x30
[   21.303715]  kasan_atomics_helper+0x24c/0x4858
[   21.303785]  kasan_atomics+0x198/0x2e8
[   21.303839]  kunit_try_run_case+0x170/0x3f0
[   21.303893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.303948]  kthread+0x318/0x620
[   21.303998]  ret_from_fork+0x10/0x20
[   21.304053] 
[   21.307207] Allocated by task 254:
[   21.307505]  kasan_save_stack+0x3c/0x68
[   21.307758]  kasan_save_track+0x20/0x40
[   21.308024]  kasan_save_alloc_info+0x40/0x58
[   21.308233]  __kasan_kmalloc+0xd4/0xd8
[   21.308466]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.308643]  kasan_atomics+0xb8/0x2e8
[   21.308811]  kunit_try_run_case+0x170/0x3f0
[   21.309143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.309543]  kthread+0x318/0x620
[   21.309849]  ret_from_fork+0x10/0x20
[   21.310193] 
[   21.310381] The buggy address belongs to the object at fff00000c66ea700
[   21.310381]  which belongs to the cache kmalloc-64 of size 64
[   21.311141] The buggy address is located 0 bytes to the right of
[   21.311141]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.311679] 
[   21.311870] The buggy address belongs to the physical page:
[   21.312184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.312504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.312722] page_type: f5(slab)
[   21.313019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.313487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.313976] page dumped because: kasan: bad access detected
[   21.314254] 
[   21.314392] Memory state around the buggy address:
[   21.314845]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.315229]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.315568] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.315878]                                      ^
[   21.316198]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.316611]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.316993] ==================================================================
[   22.271916] ==================================================================
[   22.272593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.273083] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.273409] 
[   22.273633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.274392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.274447] Hardware name: linux,dummy-virt (DT)
[   22.274526] Call trace:
[   22.274560]  show_stack+0x20/0x38 (C)
[   22.274629]  dump_stack_lvl+0x8c/0xd0
[   22.274687]  print_report+0x118/0x608
[   22.274764]  kasan_report+0xdc/0x128
[   22.274824]  kasan_check_range+0x100/0x1a8
[   22.274880]  __kasan_check_write+0x20/0x30
[   22.274935]  kasan_atomics_helper+0x1644/0x4858
[   22.274993]  kasan_atomics+0x198/0x2e8
[   22.275040]  kunit_try_run_case+0x170/0x3f0
[   22.275093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.275149]  kthread+0x318/0x620
[   22.275195]  ret_from_fork+0x10/0x20
[   22.275249] 
[   22.279516] Allocated by task 254:
[   22.280008]  kasan_save_stack+0x3c/0x68
[   22.280381]  kasan_save_track+0x20/0x40
[   22.280720]  kasan_save_alloc_info+0x40/0x58
[   22.281009]  __kasan_kmalloc+0xd4/0xd8
[   22.281249]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.281501]  kasan_atomics+0xb8/0x2e8
[   22.281743]  kunit_try_run_case+0x170/0x3f0
[   22.282001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.282366]  kthread+0x318/0x620
[   22.282591]  ret_from_fork+0x10/0x20
[   22.283291] 
[   22.283415] The buggy address belongs to the object at fff00000c66ea700
[   22.283415]  which belongs to the cache kmalloc-64 of size 64
[   22.284184] The buggy address is located 0 bytes to the right of
[   22.284184]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.284997] 
[   22.285112] The buggy address belongs to the physical page:
[   22.285516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.286092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.286479] page_type: f5(slab)
[   22.286651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.287216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.287728] page dumped because: kasan: bad access detected
[   22.288142] 
[   22.288366] Memory state around the buggy address:
[   22.288787]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.289285]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.289776] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.290249]                                      ^
[   22.290701]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.291196]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.291655] ==================================================================
[   21.384783] ==================================================================
[   21.385084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   21.385473] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.386443] 
[   21.386687] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.386865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.386904] Hardware name: linux,dummy-virt (DT)
[   21.386942] Call trace:
[   21.386973]  show_stack+0x20/0x38 (C)
[   21.387036]  dump_stack_lvl+0x8c/0xd0
[   21.387091]  print_report+0x118/0x608
[   21.387145]  kasan_report+0xdc/0x128
[   21.387196]  kasan_check_range+0x100/0x1a8
[   21.387251]  __kasan_check_write+0x20/0x30
[   21.387305]  kasan_atomics_helper+0x3ac/0x4858
[   21.387359]  kasan_atomics+0x198/0x2e8
[   21.387411]  kunit_try_run_case+0x170/0x3f0
[   21.387465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.387523]  kthread+0x318/0x620
[   21.387573]  ret_from_fork+0x10/0x20
[   21.387630] 
[   21.392601] Allocated by task 254:
[   21.392856]  kasan_save_stack+0x3c/0x68
[   21.393179]  kasan_save_track+0x20/0x40
[   21.393584]  kasan_save_alloc_info+0x40/0x58
[   21.393945]  __kasan_kmalloc+0xd4/0xd8
[   21.394193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.394482]  kasan_atomics+0xb8/0x2e8
[   21.394734]  kunit_try_run_case+0x170/0x3f0
[   21.395441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.395855]  kthread+0x318/0x620
[   21.396105]  ret_from_fork+0x10/0x20
[   21.396394] 
[   21.396604] The buggy address belongs to the object at fff00000c66ea700
[   21.396604]  which belongs to the cache kmalloc-64 of size 64
[   21.397133] The buggy address is located 0 bytes to the right of
[   21.397133]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.397662] 
[   21.397845] The buggy address belongs to the physical page:
[   21.398196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.398951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.399301] page_type: f5(slab)
[   21.399572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.399978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.400340] page dumped because: kasan: bad access detected
[   21.400631] 
[   21.400824] Memory state around the buggy address:
[   21.401062]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.401476]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.401873] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.402175]                                      ^
[   21.402455]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.402972]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.403652] ==================================================================
[   22.292766] ==================================================================
[   22.293054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.293304] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.293537] 
[   22.293659] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.293786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.293823] Hardware name: linux,dummy-virt (DT)
[   22.293864] Call trace:
[   22.293895]  show_stack+0x20/0x38 (C)
[   22.293960]  dump_stack_lvl+0x8c/0xd0
[   22.294018]  print_report+0x118/0x608
[   22.294094]  kasan_report+0xdc/0x128
[   22.294157]  __asan_report_load8_noabort+0x20/0x30
[   22.294216]  kasan_atomics_helper+0x3df4/0x4858
[   22.294273]  kasan_atomics+0x198/0x2e8
[   22.294329]  kunit_try_run_case+0x170/0x3f0
[   22.294390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.294456]  kthread+0x318/0x620
[   22.294545]  ret_from_fork+0x10/0x20
[   22.294611] 
[   22.297922] Allocated by task 254:
[   22.298214]  kasan_save_stack+0x3c/0x68
[   22.298462]  kasan_save_track+0x20/0x40
[   22.298687]  kasan_save_alloc_info+0x40/0x58
[   22.300714]  __kasan_kmalloc+0xd4/0xd8
[   22.301075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.301499]  kasan_atomics+0xb8/0x2e8
[   22.301898]  kunit_try_run_case+0x170/0x3f0
[   22.302302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.302883]  kthread+0x318/0x620
[   22.303191]  ret_from_fork+0x10/0x20
[   22.303539] 
[   22.303775] The buggy address belongs to the object at fff00000c66ea700
[   22.303775]  which belongs to the cache kmalloc-64 of size 64
[   22.304561] The buggy address is located 0 bytes to the right of
[   22.304561]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.305106] 
[   22.305280] The buggy address belongs to the physical page:
[   22.305464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.305721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.305980] page_type: f5(slab)
[   22.306157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.306406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.306645] page dumped because: kasan: bad access detected
[   22.307013] 
[   22.307246] Memory state around the buggy address:
[   22.307648]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.308102]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.308597] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.309144]                                      ^
[   22.309373]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.309707]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.309960] ==================================================================
[   21.284090] ==================================================================
[   21.284444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   21.284984] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.285380] 
[   21.285573] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.285680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.285718] Hardware name: linux,dummy-virt (DT)
[   21.285769] Call trace:
[   21.285803]  show_stack+0x20/0x38 (C)
[   21.285865]  dump_stack_lvl+0x8c/0xd0
[   21.285924]  print_report+0x118/0x608
[   21.285980]  kasan_report+0xdc/0x128
[   21.286031]  kasan_check_range+0x100/0x1a8
[   21.286100]  __kasan_check_read+0x20/0x30
[   21.286156]  kasan_atomics_helper+0x1ec/0x4858
[   21.286214]  kasan_atomics+0x198/0x2e8
[   21.286268]  kunit_try_run_case+0x170/0x3f0
[   21.286326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.286387]  kthread+0x318/0x620
[   21.286440]  ret_from_fork+0x10/0x20
[   21.286515] 
[   21.290397] Allocated by task 254:
[   21.290827]  kasan_save_stack+0x3c/0x68
[   21.291019]  kasan_save_track+0x20/0x40
[   21.291313]  kasan_save_alloc_info+0x40/0x58
[   21.291667]  __kasan_kmalloc+0xd4/0xd8
[   21.291898]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.292127]  kasan_atomics+0xb8/0x2e8
[   21.292293]  kunit_try_run_case+0x170/0x3f0
[   21.292460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.292652]  kthread+0x318/0x620
[   21.292947]  ret_from_fork+0x10/0x20
[   21.293256] 
[   21.293431] The buggy address belongs to the object at fff00000c66ea700
[   21.293431]  which belongs to the cache kmalloc-64 of size 64
[   21.294077] The buggy address is located 0 bytes to the right of
[   21.294077]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.294821] 
[   21.295076] The buggy address belongs to the physical page:
[   21.295267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.295581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.296091] page_type: f5(slab)
[   21.296272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.296605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.297030] page dumped because: kasan: bad access detected
[   21.297325] 
[   21.297500] Memory state around the buggy address:
[   21.297755]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.298252]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.298788] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.299209]                                      ^
[   21.299561]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299864]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300343] ==================================================================
[   21.839905] ==================================================================
[   21.840377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.841052] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.841504] 
[   21.841790] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.841893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.841928] Hardware name: linux,dummy-virt (DT)
[   21.841967] Call trace:
[   21.841996]  show_stack+0x20/0x38 (C)
[   21.842078]  dump_stack_lvl+0x8c/0xd0
[   21.842143]  print_report+0x118/0x608
[   21.842197]  kasan_report+0xdc/0x128
[   21.842253]  __asan_report_load4_noabort+0x20/0x30
[   21.842312]  kasan_atomics_helper+0x3dd8/0x4858
[   21.842366]  kasan_atomics+0x198/0x2e8
[   21.842420]  kunit_try_run_case+0x170/0x3f0
[   21.842475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.843145]  kthread+0x318/0x620
[   21.843221]  ret_from_fork+0x10/0x20
[   21.843334] 
[   21.846539] Allocated by task 254:
[   21.846840]  kasan_save_stack+0x3c/0x68
[   21.847105]  kasan_save_track+0x20/0x40
[   21.847339]  kasan_save_alloc_info+0x40/0x58
[   21.847647]  __kasan_kmalloc+0xd4/0xd8
[   21.847965]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.848254]  kasan_atomics+0xb8/0x2e8
[   21.848473]  kunit_try_run_case+0x170/0x3f0
[   21.848798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.849148]  kthread+0x318/0x620
[   21.849409]  ret_from_fork+0x10/0x20
[   21.849619] 
[   21.849814] The buggy address belongs to the object at fff00000c66ea700
[   21.849814]  which belongs to the cache kmalloc-64 of size 64
[   21.850365] The buggy address is located 0 bytes to the right of
[   21.850365]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.851009] 
[   21.851122] The buggy address belongs to the physical page:
[   21.851538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.851937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.852425] page_type: f5(slab)
[   21.852592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.852862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.853101] page dumped because: kasan: bad access detected
[   21.853290] 
[   21.853393] Memory state around the buggy address:
[   21.853567]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.853873]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.854399] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.854865]                                      ^
[   21.855226]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.855638]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.855946] ==================================================================
[   21.335233] ==================================================================
[   21.335557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   21.335931] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.336281] 
[   21.336454] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.336559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.336596] Hardware name: linux,dummy-virt (DT)
[   21.336636] Call trace:
[   21.336664]  show_stack+0x20/0x38 (C)
[   21.336722]  dump_stack_lvl+0x8c/0xd0
[   21.336794]  print_report+0x118/0x608
[   21.336851]  kasan_report+0xdc/0x128
[   21.336904]  __asan_report_load4_noabort+0x20/0x30
[   21.336961]  kasan_atomics_helper+0x40fc/0x4858
[   21.337017]  kasan_atomics+0x198/0x2e8
[   21.337069]  kunit_try_run_case+0x170/0x3f0
[   21.337125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.337185]  kthread+0x318/0x620
[   21.337239]  ret_from_fork+0x10/0x20
[   21.337296] 
[   21.340553] Allocated by task 254:
[   21.340751]  kasan_save_stack+0x3c/0x68
[   21.340921]  kasan_save_track+0x20/0x40
[   21.341239]  kasan_save_alloc_info+0x40/0x58
[   21.341571]  __kasan_kmalloc+0xd4/0xd8
[   21.341769]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.341945]  kasan_atomics+0xb8/0x2e8
[   21.342208]  kunit_try_run_case+0x170/0x3f0
[   21.342698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.343136]  kthread+0x318/0x620
[   21.343300]  ret_from_fork+0x10/0x20
[   21.343601] 
[   21.343783] The buggy address belongs to the object at fff00000c66ea700
[   21.343783]  which belongs to the cache kmalloc-64 of size 64
[   21.344288] The buggy address is located 0 bytes to the right of
[   21.344288]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.344787] 
[   21.344959] The buggy address belongs to the physical page:
[   21.345310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.345831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.346194] page_type: f5(slab)
[   21.346387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.347049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.347379] page dumped because: kasan: bad access detected
[   21.347615] 
[   21.347796] Memory state around the buggy address:
[   21.348009]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.348342]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.348683] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.349056]                                      ^
[   21.349303]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349627]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349996] ==================================================================
[   21.461115] ==================================================================
[   21.461811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   21.462306] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.463118] 
[   21.463982] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.464110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.464148] Hardware name: linux,dummy-virt (DT)
[   21.464189] Call trace:
[   21.464221]  show_stack+0x20/0x38 (C)
[   21.464293]  dump_stack_lvl+0x8c/0xd0
[   21.464351]  print_report+0x118/0x608
[   21.464410]  kasan_report+0xdc/0x128
[   21.464464]  kasan_check_range+0x100/0x1a8
[   21.464521]  __kasan_check_write+0x20/0x30
[   21.464575]  kasan_atomics_helper+0x54c/0x4858
[   21.464632]  kasan_atomics+0x198/0x2e8
[   21.464686]  kunit_try_run_case+0x170/0x3f0
[   21.464766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.464830]  kthread+0x318/0x620
[   21.464883]  ret_from_fork+0x10/0x20
[   21.464939] 
[   21.468648] Allocated by task 254:
[   21.469728]  kasan_save_stack+0x3c/0x68
[   21.470122]  kasan_save_track+0x20/0x40
[   21.470707]  kasan_save_alloc_info+0x40/0x58
[   21.471126]  __kasan_kmalloc+0xd4/0xd8
[   21.471603]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.472112]  kasan_atomics+0xb8/0x2e8
[   21.472475]  kunit_try_run_case+0x170/0x3f0
[   21.472861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.473289]  kthread+0x318/0x620
[   21.473621]  ret_from_fork+0x10/0x20
[   21.474027] 
[   21.474206] The buggy address belongs to the object at fff00000c66ea700
[   21.474206]  which belongs to the cache kmalloc-64 of size 64
[   21.475370] The buggy address is located 0 bytes to the right of
[   21.475370]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.476122] 
[   21.476352] The buggy address belongs to the physical page:
[   21.476621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.476887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.477118] page_type: f5(slab)
[   21.477598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.478104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.478692] page dumped because: kasan: bad access detected
[   21.479243] 
[   21.479516] Memory state around the buggy address:
[   21.479902]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.480247]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.480785] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.481286]                                      ^
[   21.481650]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.482088]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.482723] ==================================================================
[   22.083500] ==================================================================
[   22.083820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.084205] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.084525] 
[   22.084708] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.084815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.084850] Hardware name: linux,dummy-virt (DT)
[   22.084889] Call trace:
[   22.084917]  show_stack+0x20/0x38 (C)
[   22.084975]  dump_stack_lvl+0x8c/0xd0
[   22.085029]  print_report+0x118/0x608
[   22.085084]  kasan_report+0xdc/0x128
[   22.085137]  kasan_check_range+0x100/0x1a8
[   22.085191]  __kasan_check_write+0x20/0x30
[   22.085243]  kasan_atomics_helper+0x11f8/0x4858
[   22.085299]  kasan_atomics+0x198/0x2e8
[   22.085349]  kunit_try_run_case+0x170/0x3f0
[   22.085404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.085463]  kthread+0x318/0x620
[   22.085512]  ret_from_fork+0x10/0x20
[   22.085568] 
[   22.088420] Allocated by task 254:
[   22.088689]  kasan_save_stack+0x3c/0x68
[   22.088873]  kasan_save_track+0x20/0x40
[   22.089171]  kasan_save_alloc_info+0x40/0x58
[   22.089546]  __kasan_kmalloc+0xd4/0xd8
[   22.089844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.090102]  kasan_atomics+0xb8/0x2e8
[   22.090412]  kunit_try_run_case+0x170/0x3f0
[   22.090652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.091051]  kthread+0x318/0x620
[   22.091248]  ret_from_fork+0x10/0x20
[   22.091573] 
[   22.091753] The buggy address belongs to the object at fff00000c66ea700
[   22.091753]  which belongs to the cache kmalloc-64 of size 64
[   22.092287] The buggy address is located 0 bytes to the right of
[   22.092287]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.092830] 
[   22.093000] The buggy address belongs to the physical page:
[   22.093235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.093781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.094120] page_type: f5(slab)
[   22.094417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.094791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.095287] page dumped because: kasan: bad access detected
[   22.095559] 
[   22.095729] Memory state around the buggy address:
[   22.095935]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.096272]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.096644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.096962]                                      ^
[   22.097238]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097623]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097939] ==================================================================
[   21.541450] ==================================================================
[   21.542789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   21.543063] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.543297] 
[   21.543421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.543522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.543558] Hardware name: linux,dummy-virt (DT)
[   21.543596] Call trace:
[   21.543627]  show_stack+0x20/0x38 (C)
[   21.543686]  dump_stack_lvl+0x8c/0xd0
[   21.543761]  print_report+0x118/0x608
[   21.543822]  kasan_report+0xdc/0x128
[   21.543876]  kasan_check_range+0x100/0x1a8
[   21.543933]  __kasan_check_write+0x20/0x30
[   21.543986]  kasan_atomics_helper+0x6ec/0x4858
[   21.544042]  kasan_atomics+0x198/0x2e8
[   21.544096]  kunit_try_run_case+0x170/0x3f0
[   21.544155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.544214]  kthread+0x318/0x620
[   21.544267]  ret_from_fork+0x10/0x20
[   21.544324] 
[   21.548775] Allocated by task 254:
[   21.548983]  kasan_save_stack+0x3c/0x68
[   21.549222]  kasan_save_track+0x20/0x40
[   21.549431]  kasan_save_alloc_info+0x40/0x58
[   21.549648]  __kasan_kmalloc+0xd4/0xd8
[   21.551177]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.551416]  kasan_atomics+0xb8/0x2e8
[   21.551874]  kunit_try_run_case+0x170/0x3f0
[   21.552280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.552573]  kthread+0x318/0x620
[   21.552787]  ret_from_fork+0x10/0x20
[   21.553023] 
[   21.553175] The buggy address belongs to the object at fff00000c66ea700
[   21.553175]  which belongs to the cache kmalloc-64 of size 64
[   21.553709] The buggy address is located 0 bytes to the right of
[   21.553709]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.554908] 
[   21.555080] The buggy address belongs to the physical page:
[   21.555287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.555698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.556193] page_type: f5(slab)
[   21.556513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.556774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.557406] page dumped because: kasan: bad access detected
[   21.557744] 
[   21.557952] Memory state around the buggy address:
[   21.558318]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.558727]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.559325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.559790]                                      ^
[   21.560097]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560466]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560958] ==================================================================
[   22.129603] ==================================================================
[   22.129907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.130420] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.130815] 
[   22.130996] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.131092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.131127] Hardware name: linux,dummy-virt (DT)
[   22.131167] Call trace:
[   22.131195]  show_stack+0x20/0x38 (C)
[   22.131254]  dump_stack_lvl+0x8c/0xd0
[   22.131308]  print_report+0x118/0x608
[   22.131362]  kasan_report+0xdc/0x128
[   22.131414]  kasan_check_range+0x100/0x1a8
[   22.131467]  __kasan_check_write+0x20/0x30
[   22.131519]  kasan_atomics_helper+0x1384/0x4858
[   22.131573]  kasan_atomics+0x198/0x2e8
[   22.131623]  kunit_try_run_case+0x170/0x3f0
[   22.131677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.131735]  kthread+0x318/0x620
[   22.131800]  ret_from_fork+0x10/0x20
[   22.131855] 
[   22.134837] Allocated by task 254:
[   22.135134]  kasan_save_stack+0x3c/0x68
[   22.135323]  kasan_save_track+0x20/0x40
[   22.135574]  kasan_save_alloc_info+0x40/0x58
[   22.135882]  __kasan_kmalloc+0xd4/0xd8
[   22.136116]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.136440]  kasan_atomics+0xb8/0x2e8
[   22.136646]  kunit_try_run_case+0x170/0x3f0
[   22.136866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.137160]  kthread+0x318/0x620
[   22.137316]  ret_from_fork+0x10/0x20
[   22.137644] 
[   22.137827] The buggy address belongs to the object at fff00000c66ea700
[   22.137827]  which belongs to the cache kmalloc-64 of size 64
[   22.138300] The buggy address is located 0 bytes to the right of
[   22.138300]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.138925] 
[   22.139094] The buggy address belongs to the physical page:
[   22.139352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.139707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.140021] page_type: f5(slab)
[   22.140260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.140571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.141064] page dumped because: kasan: bad access detected
[   22.141299] 
[   22.141465] Memory state around the buggy address:
[   22.141668]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.142082]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.142468] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.142791]                                      ^
[   22.143085]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.143393]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.143733] ==================================================================
[   21.957142] ==================================================================
[   21.957599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.957917] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.958322] 
[   21.958543] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.958641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.958695] Hardware name: linux,dummy-virt (DT)
[   21.958734] Call trace:
[   21.958775]  show_stack+0x20/0x38 (C)
[   21.958849]  dump_stack_lvl+0x8c/0xd0
[   21.958902]  print_report+0x118/0x608
[   21.958955]  kasan_report+0xdc/0x128
[   21.959006]  kasan_check_range+0x100/0x1a8
[   21.959060]  __kasan_check_write+0x20/0x30
[   21.959135]  kasan_atomics_helper+0xeb8/0x4858
[   21.959189]  kasan_atomics+0x198/0x2e8
[   21.959254]  kunit_try_run_case+0x170/0x3f0
[   21.959306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.959364]  kthread+0x318/0x620
[   21.959411]  ret_from_fork+0x10/0x20
[   21.959461] 
[   21.962763] Allocated by task 254:
[   21.963087]  kasan_save_stack+0x3c/0x68
[   21.963328]  kasan_save_track+0x20/0x40
[   21.963557]  kasan_save_alloc_info+0x40/0x58
[   21.963938]  __kasan_kmalloc+0xd4/0xd8
[   21.964180]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.964411]  kasan_atomics+0xb8/0x2e8
[   21.964649]  kunit_try_run_case+0x170/0x3f0
[   21.964893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.965183]  kthread+0x318/0x620
[   21.965387]  ret_from_fork+0x10/0x20
[   21.965614] 
[   21.965731] The buggy address belongs to the object at fff00000c66ea700
[   21.965731]  which belongs to the cache kmalloc-64 of size 64
[   21.966851] The buggy address is located 0 bytes to the right of
[   21.966851]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.967279] 
[   21.967453] The buggy address belongs to the physical page:
[   21.967708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.968461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.968790] page_type: f5(slab)
[   21.969191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.969715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.970205] page dumped because: kasan: bad access detected
[   21.970619] 
[   21.970858] Memory state around the buggy address:
[   21.971262]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.971751]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.972240] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.972694]                                      ^
[   21.973084]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.973447]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.973764] ==================================================================
[   21.245549] ==================================================================
[   21.246219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   21.246964] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.247804] 
[   21.247945] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.248049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.248080] Hardware name: linux,dummy-virt (DT)
[   21.248120] Call trace:
[   21.248148]  show_stack+0x20/0x38 (C)
[   21.248216]  dump_stack_lvl+0x8c/0xd0
[   21.248274]  print_report+0x118/0x608
[   21.248329]  kasan_report+0xdc/0x128
[   21.248378]  __asan_report_load4_noabort+0x20/0x30
[   21.248432]  kasan_atomics_helper+0x40a8/0x4858
[   21.248485]  kasan_atomics+0x198/0x2e8
[   21.248533]  kunit_try_run_case+0x170/0x3f0
[   21.248586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.248641]  kthread+0x318/0x620
[   21.248691]  ret_from_fork+0x10/0x20
[   21.248767] 
[   21.253605] Allocated by task 254:
[   21.253822]  kasan_save_stack+0x3c/0x68
[   21.254225]  kasan_save_track+0x20/0x40
[   21.254503]  kasan_save_alloc_info+0x40/0x58
[   21.255052]  __kasan_kmalloc+0xd4/0xd8
[   21.255289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.255559]  kasan_atomics+0xb8/0x2e8
[   21.255865]  kunit_try_run_case+0x170/0x3f0
[   21.256135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.256469]  kthread+0x318/0x620
[   21.256694]  ret_from_fork+0x10/0x20
[   21.256892] 
[   21.257087] The buggy address belongs to the object at fff00000c66ea700
[   21.257087]  which belongs to the cache kmalloc-64 of size 64
[   21.257658] The buggy address is located 0 bytes to the right of
[   21.257658]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.258332] 
[   21.258625] The buggy address belongs to the physical page:
[   21.258874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.259537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.259837] page_type: f5(slab)
[   21.260185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.260711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.261153] page dumped because: kasan: bad access detected
[   21.261486] 
[   21.261698] Memory state around the buggy address:
[   21.262073]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.262767]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.263267] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.263689]                                      ^
[   21.264001]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264475]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264909] ==================================================================
[   21.991890] ==================================================================
[   21.992294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.992825] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.993260] 
[   21.993459] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.993576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.993612] Hardware name: linux,dummy-virt (DT)
[   21.993652] Call trace:
[   21.993680]  show_stack+0x20/0x38 (C)
[   21.993746]  dump_stack_lvl+0x8c/0xd0
[   21.993808]  print_report+0x118/0x608
[   21.993877]  kasan_report+0xdc/0x128
[   21.993939]  kasan_check_range+0x100/0x1a8
[   21.993996]  __kasan_check_write+0x20/0x30
[   21.994047]  kasan_atomics_helper+0xf88/0x4858
[   21.994115]  kasan_atomics+0x198/0x2e8
[   21.994168]  kunit_try_run_case+0x170/0x3f0
[   21.994223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.994280]  kthread+0x318/0x620
[   21.994329]  ret_from_fork+0x10/0x20
[   21.994386] 
[   21.997370] Allocated by task 254:
[   21.997515]  kasan_save_stack+0x3c/0x68
[   21.997700]  kasan_save_track+0x20/0x40
[   21.998072]  kasan_save_alloc_info+0x40/0x58
[   21.998387]  __kasan_kmalloc+0xd4/0xd8
[   21.998550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.998957]  kasan_atomics+0xb8/0x2e8
[   21.999313]  kunit_try_run_case+0x170/0x3f0
[   21.999510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.999876]  kthread+0x318/0x620
[   22.000180]  ret_from_fork+0x10/0x20
[   22.000479] 
[   22.000666] The buggy address belongs to the object at fff00000c66ea700
[   22.000666]  which belongs to the cache kmalloc-64 of size 64
[   22.001120] The buggy address is located 0 bytes to the right of
[   22.001120]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.001763] 
[   22.001892] The buggy address belongs to the physical page:
[   22.002348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.002775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.003083] page_type: f5(slab)
[   22.003317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.003775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.004066] page dumped because: kasan: bad access detected
[   22.004403] 
[   22.004568] Memory state around the buggy address:
[   22.004854]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.005213]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.005638] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.005968]                                      ^
[   22.006335]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.006690]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.007063] ==================================================================
[   22.160588] ==================================================================
[   22.161112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.161547] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.161870] 
[   22.162105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.162208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.162243] Hardware name: linux,dummy-virt (DT)
[   22.162283] Call trace:
[   22.162312]  show_stack+0x20/0x38 (C)
[   22.162372]  dump_stack_lvl+0x8c/0xd0
[   22.162435]  print_report+0x118/0x608
[   22.162491]  kasan_report+0xdc/0x128
[   22.162998]  kasan_check_range+0x100/0x1a8
[   22.163062]  __kasan_check_write+0x20/0x30
[   22.163118]  kasan_atomics_helper+0x1414/0x4858
[   22.163177]  kasan_atomics+0x198/0x2e8
[   22.163230]  kunit_try_run_case+0x170/0x3f0
[   22.163294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.163354]  kthread+0x318/0x620
[   22.163404]  ret_from_fork+0x10/0x20
[   22.163461] 
[   22.167878] Allocated by task 254:
[   22.168268]  kasan_save_stack+0x3c/0x68
[   22.168642]  kasan_save_track+0x20/0x40
[   22.169073]  kasan_save_alloc_info+0x40/0x58
[   22.169310]  __kasan_kmalloc+0xd4/0xd8
[   22.169537]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.169842]  kasan_atomics+0xb8/0x2e8
[   22.170084]  kunit_try_run_case+0x170/0x3f0
[   22.170343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.170617]  kthread+0x318/0x620
[   22.170847]  ret_from_fork+0x10/0x20
[   22.171017] 
[   22.171125] The buggy address belongs to the object at fff00000c66ea700
[   22.171125]  which belongs to the cache kmalloc-64 of size 64
[   22.171982] The buggy address is located 0 bytes to the right of
[   22.171982]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.172540] 
[   22.172752] The buggy address belongs to the physical page:
[   22.173268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.173755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.174171] page_type: f5(slab)
[   22.174445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.174867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.175103] page dumped because: kasan: bad access detected
[   22.175289] 
[   22.175393] Memory state around the buggy address:
[   22.175570]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.175826]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.176054] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.176274]                                      ^
[   22.176458]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.176686]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.177247] ==================================================================
[   21.749570] ==================================================================
[   21.749914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   21.750458] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.750962] 
[   21.751134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.751250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.751287] Hardware name: linux,dummy-virt (DT)
[   21.751325] Call trace:
[   21.751353]  show_stack+0x20/0x38 (C)
[   21.751410]  dump_stack_lvl+0x8c/0xd0
[   21.751465]  print_report+0x118/0x608
[   21.751517]  kasan_report+0xdc/0x128
[   21.751593]  kasan_check_range+0x100/0x1a8
[   21.751649]  __kasan_check_write+0x20/0x30
[   21.751704]  kasan_atomics_helper+0xb70/0x4858
[   21.751788]  kasan_atomics+0x198/0x2e8
[   21.751843]  kunit_try_run_case+0x170/0x3f0
[   21.751899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.751958]  kthread+0x318/0x620
[   21.752011]  ret_from_fork+0x10/0x20
[   21.752067] 
[   21.755262] Allocated by task 254:
[   21.755509]  kasan_save_stack+0x3c/0x68
[   21.755872]  kasan_save_track+0x20/0x40
[   21.756174]  kasan_save_alloc_info+0x40/0x58
[   21.756344]  __kasan_kmalloc+0xd4/0xd8
[   21.756721]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.757158]  kasan_atomics+0xb8/0x2e8
[   21.757434]  kunit_try_run_case+0x170/0x3f0
[   21.757642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.758139]  kthread+0x318/0x620
[   21.758385]  ret_from_fork+0x10/0x20
[   21.758622] 
[   21.758855] The buggy address belongs to the object at fff00000c66ea700
[   21.758855]  which belongs to the cache kmalloc-64 of size 64
[   21.759466] The buggy address is located 0 bytes to the right of
[   21.759466]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.760114] 
[   21.760303] The buggy address belongs to the physical page:
[   21.760589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.761120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.761537] page_type: f5(slab)
[   21.761781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.762243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.762731] page dumped because: kasan: bad access detected
[   21.763061] 
[   21.763211] Memory state around the buggy address:
[   21.763498]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.763897]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.764317] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.764726]                                      ^
[   21.764989]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.765349]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.765774] ==================================================================
[   21.820799] ==================================================================
[   21.821570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   21.822256] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.823023] 
[   21.823557] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.823669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.823708] Hardware name: linux,dummy-virt (DT)
[   21.823787] Call trace:
[   21.823824]  show_stack+0x20/0x38 (C)
[   21.823903]  dump_stack_lvl+0x8c/0xd0
[   21.823960]  print_report+0x118/0x608
[   21.824014]  kasan_report+0xdc/0x128
[   21.824068]  kasan_check_range+0x100/0x1a8
[   21.824123]  __kasan_check_write+0x20/0x30
[   21.824177]  kasan_atomics_helper+0xca0/0x4858
[   21.824232]  kasan_atomics+0x198/0x2e8
[   21.824284]  kunit_try_run_case+0x170/0x3f0
[   21.824340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.824402]  kthread+0x318/0x620
[   21.824454]  ret_from_fork+0x10/0x20
[   21.824509] 
[   21.828105] Allocated by task 254:
[   21.828314]  kasan_save_stack+0x3c/0x68
[   21.828537]  kasan_save_track+0x20/0x40
[   21.829460]  kasan_save_alloc_info+0x40/0x58
[   21.829831]  __kasan_kmalloc+0xd4/0xd8
[   21.830023]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.830371]  kasan_atomics+0xb8/0x2e8
[   21.830619]  kunit_try_run_case+0x170/0x3f0
[   21.830991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.831332]  kthread+0x318/0x620
[   21.831556]  ret_from_fork+0x10/0x20
[   21.831784] 
[   21.831988] The buggy address belongs to the object at fff00000c66ea700
[   21.831988]  which belongs to the cache kmalloc-64 of size 64
[   21.832584] The buggy address is located 0 bytes to the right of
[   21.832584]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.833269] 
[   21.833418] The buggy address belongs to the physical page:
[   21.833684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.834170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.834660] page_type: f5(slab)
[   21.834858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.835362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.835767] page dumped because: kasan: bad access detected
[   21.836074] 
[   21.836232] Memory state around the buggy address:
[   21.836578]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.836968]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.837390] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.837817]                                      ^
[   21.838092]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.838439]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.838895] ==================================================================
[   22.198395] ==================================================================
[   22.198734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.199033] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.199288] 
[   22.199458] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.199567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.199604] Hardware name: linux,dummy-virt (DT)
[   22.199644] Call trace:
[   22.199676]  show_stack+0x20/0x38 (C)
[   22.199822]  dump_stack_lvl+0x8c/0xd0
[   22.200237]  print_report+0x118/0x608
[   22.200301]  kasan_report+0xdc/0x128
[   22.200357]  kasan_check_range+0x100/0x1a8
[   22.200414]  __kasan_check_write+0x20/0x30
[   22.200466]  kasan_atomics_helper+0x14e4/0x4858
[   22.200523]  kasan_atomics+0x198/0x2e8
[   22.200579]  kunit_try_run_case+0x170/0x3f0
[   22.200635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.200695]  kthread+0x318/0x620
[   22.200769]  ret_from_fork+0x10/0x20
[   22.200831] 
[   22.205586] Allocated by task 254:
[   22.205921]  kasan_save_stack+0x3c/0x68
[   22.206403]  kasan_save_track+0x20/0x40
[   22.206603]  kasan_save_alloc_info+0x40/0x58
[   22.207094]  __kasan_kmalloc+0xd4/0xd8
[   22.207612]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.208006]  kasan_atomics+0xb8/0x2e8
[   22.208349]  kunit_try_run_case+0x170/0x3f0
[   22.208599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.209126]  kthread+0x318/0x620
[   22.209449]  ret_from_fork+0x10/0x20
[   22.209692] 
[   22.209963] The buggy address belongs to the object at fff00000c66ea700
[   22.209963]  which belongs to the cache kmalloc-64 of size 64
[   22.210804] The buggy address is located 0 bytes to the right of
[   22.210804]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.211652] 
[   22.211982] The buggy address belongs to the physical page:
[   22.212285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.212765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.213117] page_type: f5(slab)
[   22.213435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.213809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.214319] page dumped because: kasan: bad access detected
[   22.214659] 
[   22.214814] Memory state around the buggy address:
[   22.215086]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.215573]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.216043] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.216384]                                      ^
[   22.216652]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.217050]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.217440] ==================================================================
[   22.329227] ==================================================================
[   22.329606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.330581] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.330947] 
[   22.331088] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.331189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.331226] Hardware name: linux,dummy-virt (DT)
[   22.331266] Call trace:
[   22.331296]  show_stack+0x20/0x38 (C)
[   22.331357]  dump_stack_lvl+0x8c/0xd0
[   22.331414]  print_report+0x118/0x608
[   22.331468]  kasan_report+0xdc/0x128
[   22.331521]  __asan_report_load8_noabort+0x20/0x30
[   22.331577]  kasan_atomics_helper+0x3e10/0x4858
[   22.331633]  kasan_atomics+0x198/0x2e8
[   22.331684]  kunit_try_run_case+0x170/0x3f0
[   22.331752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.331817]  kthread+0x318/0x620
[   22.331871]  ret_from_fork+0x10/0x20
[   22.331929] 
[   22.334935] Allocated by task 254:
[   22.335258]  kasan_save_stack+0x3c/0x68
[   22.335640]  kasan_save_track+0x20/0x40
[   22.335890]  kasan_save_alloc_info+0x40/0x58
[   22.336188]  __kasan_kmalloc+0xd4/0xd8
[   22.336538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.336724]  kasan_atomics+0xb8/0x2e8
[   22.337089]  kunit_try_run_case+0x170/0x3f0
[   22.337470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.337763]  kthread+0x318/0x620
[   22.337997]  ret_from_fork+0x10/0x20
[   22.338274] 
[   22.338462] The buggy address belongs to the object at fff00000c66ea700
[   22.338462]  which belongs to the cache kmalloc-64 of size 64
[   22.339022] The buggy address is located 0 bytes to the right of
[   22.339022]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.339700] 
[   22.339851] The buggy address belongs to the physical page:
[   22.340191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.340619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.340956] page_type: f5(slab)
[   22.341280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.341613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.342124] page dumped because: kasan: bad access detected
[   22.342496] 
[   22.342673] Memory state around the buggy address:
[   22.342982]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.343304]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.343783] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.344175]                                      ^
[   22.344451]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.344850]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.345232] ==================================================================
[   22.068029] ==================================================================
[   22.068412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.068648] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.069284] 
[   22.069405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.069497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.069534] Hardware name: linux,dummy-virt (DT)
[   22.069572] Call trace:
[   22.069600]  show_stack+0x20/0x38 (C)
[   22.069656]  dump_stack_lvl+0x8c/0xd0
[   22.069710]  print_report+0x118/0x608
[   22.069775]  kasan_report+0xdc/0x128
[   22.069831]  kasan_check_range+0x100/0x1a8
[   22.069888]  __kasan_check_write+0x20/0x30
[   22.069941]  kasan_atomics_helper+0x1190/0x4858
[   22.069996]  kasan_atomics+0x198/0x2e8
[   22.070049]  kunit_try_run_case+0x170/0x3f0
[   22.070117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.070180]  kthread+0x318/0x620
[   22.070232]  ret_from_fork+0x10/0x20
[   22.070287] 
[   22.073640] Allocated by task 254:
[   22.073842]  kasan_save_stack+0x3c/0x68
[   22.074017]  kasan_save_track+0x20/0x40
[   22.074196]  kasan_save_alloc_info+0x40/0x58
[   22.074580]  __kasan_kmalloc+0xd4/0xd8
[   22.074909]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.075087]  kasan_atomics+0xb8/0x2e8
[   22.075422]  kunit_try_run_case+0x170/0x3f0
[   22.075808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.076077]  kthread+0x318/0x620
[   22.076294]  ret_from_fork+0x10/0x20
[   22.076514] 
[   22.076681] The buggy address belongs to the object at fff00000c66ea700
[   22.076681]  which belongs to the cache kmalloc-64 of size 64
[   22.077193] The buggy address is located 0 bytes to the right of
[   22.077193]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.077616] 
[   22.077721] The buggy address belongs to the physical page:
[   22.078162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.078584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.078947] page_type: f5(slab)
[   22.079147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.079514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.079778] page dumped because: kasan: bad access detected
[   22.080148] 
[   22.080317] Memory state around the buggy address:
[   22.080623]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.080906]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.081408] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.081728]                                      ^
[   22.081984]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082417]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082719] ==================================================================
[   21.678232] ==================================================================
[   21.678824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.679250] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.679727] 
[   21.679956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.680051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.680091] Hardware name: linux,dummy-virt (DT)
[   21.680130] Call trace:
[   21.680157]  show_stack+0x20/0x38 (C)
[   21.680213]  dump_stack_lvl+0x8c/0xd0
[   21.680264]  print_report+0x118/0x608
[   21.680315]  kasan_report+0xdc/0x128
[   21.680365]  kasan_check_range+0x100/0x1a8
[   21.680416]  __kasan_check_write+0x20/0x30
[   21.680465]  kasan_atomics_helper+0xa04/0x4858
[   21.680516]  kasan_atomics+0x198/0x2e8
[   21.680563]  kunit_try_run_case+0x170/0x3f0
[   21.680613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.680666]  kthread+0x318/0x620
[   21.680748]  ret_from_fork+0x10/0x20
[   21.680806] 
[   21.684079] Allocated by task 254:
[   21.684509]  kasan_save_stack+0x3c/0x68
[   21.684734]  kasan_save_track+0x20/0x40
[   21.684909]  kasan_save_alloc_info+0x40/0x58
[   21.685324]  __kasan_kmalloc+0xd4/0xd8
[   21.685768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.685995]  kasan_atomics+0xb8/0x2e8
[   21.686214]  kunit_try_run_case+0x170/0x3f0
[   21.686611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.686954]  kthread+0x318/0x620
[   21.687224]  ret_from_fork+0x10/0x20
[   21.687561] 
[   21.687802] The buggy address belongs to the object at fff00000c66ea700
[   21.687802]  which belongs to the cache kmalloc-64 of size 64
[   21.688304] The buggy address is located 0 bytes to the right of
[   21.688304]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.689111] 
[   21.689308] The buggy address belongs to the physical page:
[   21.689681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.690297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.690826] page_type: f5(slab)
[   21.691023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.691525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.691911] page dumped because: kasan: bad access detected
[   21.692323] 
[   21.692496] Memory state around the buggy address:
[   21.692791]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.693291]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.693639] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.694024]                                      ^
[   21.694311]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.694712]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.695245] ==================================================================
[   21.483624] ==================================================================
[   21.483940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   21.484267] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.484568] 
[   21.484718] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.484929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.484969] Hardware name: linux,dummy-virt (DT)
[   21.485010] Call trace:
[   21.485042]  show_stack+0x20/0x38 (C)
[   21.485115]  dump_stack_lvl+0x8c/0xd0
[   21.485176]  print_report+0x118/0x608
[   21.485233]  kasan_report+0xdc/0x128
[   21.485286]  kasan_check_range+0x100/0x1a8
[   21.485345]  __kasan_check_write+0x20/0x30
[   21.485397]  kasan_atomics_helper+0x5b4/0x4858
[   21.485453]  kasan_atomics+0x198/0x2e8
[   21.485506]  kunit_try_run_case+0x170/0x3f0
[   21.485560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.485619]  kthread+0x318/0x620
[   21.485672]  ret_from_fork+0x10/0x20
[   21.485729] 
[   21.489535] Allocated by task 254:
[   21.489911]  kasan_save_stack+0x3c/0x68
[   21.490144]  kasan_save_track+0x20/0x40
[   21.490778]  kasan_save_alloc_info+0x40/0x58
[   21.491179]  __kasan_kmalloc+0xd4/0xd8
[   21.491417]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.491676]  kasan_atomics+0xb8/0x2e8
[   21.491908]  kunit_try_run_case+0x170/0x3f0
[   21.492158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.492446]  kthread+0x318/0x620
[   21.492660]  ret_from_fork+0x10/0x20
[   21.492991] 
[   21.493147] The buggy address belongs to the object at fff00000c66ea700
[   21.493147]  which belongs to the cache kmalloc-64 of size 64
[   21.493478] The buggy address is located 0 bytes to the right of
[   21.493478]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.493836] 
[   21.493951] The buggy address belongs to the physical page:
[   21.494159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.494436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.495328] page_type: f5(slab)
[   21.495571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.495945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.496252] page dumped because: kasan: bad access detected
[   21.496510] 
[   21.496641] Memory state around the buggy address:
[   21.497735]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.498167]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.498745] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.499142]                                      ^
[   21.499517]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.500141]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.500449] ==================================================================
[   21.561994] ==================================================================
[   21.562346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   21.564002] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.564542] 
[   21.564713] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.564867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.564905] Hardware name: linux,dummy-virt (DT)
[   21.564946] Call trace:
[   21.564977]  show_stack+0x20/0x38 (C)
[   21.565066]  dump_stack_lvl+0x8c/0xd0
[   21.565126]  print_report+0x118/0x608
[   21.565181]  kasan_report+0xdc/0x128
[   21.565235]  kasan_check_range+0x100/0x1a8
[   21.565291]  __kasan_check_write+0x20/0x30
[   21.565343]  kasan_atomics_helper+0x760/0x4858
[   21.565399]  kasan_atomics+0x198/0x2e8
[   21.565451]  kunit_try_run_case+0x170/0x3f0
[   21.565506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.565566]  kthread+0x318/0x620
[   21.565620]  ret_from_fork+0x10/0x20
[   21.565679] 
[   21.569565] Allocated by task 254:
[   21.569845]  kasan_save_stack+0x3c/0x68
[   21.570281]  kasan_save_track+0x20/0x40
[   21.570557]  kasan_save_alloc_info+0x40/0x58
[   21.570939]  __kasan_kmalloc+0xd4/0xd8
[   21.571284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.571514]  kasan_atomics+0xb8/0x2e8
[   21.572503]  kunit_try_run_case+0x170/0x3f0
[   21.572780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.573215]  kthread+0x318/0x620
[   21.573506]  ret_from_fork+0x10/0x20
[   21.573805] 
[   21.574046] The buggy address belongs to the object at fff00000c66ea700
[   21.574046]  which belongs to the cache kmalloc-64 of size 64
[   21.574966] The buggy address is located 0 bytes to the right of
[   21.574966]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.575409] 
[   21.575754] The buggy address belongs to the physical page:
[   21.576252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.576510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.577015] page_type: f5(slab)
[   21.577227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.577707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.578222] page dumped because: kasan: bad access detected
[   21.578556] 
[   21.578766] Memory state around the buggy address:
[   21.579038]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.579512]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.579905] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.580354]                                      ^
[   21.580744]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581149]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581525] ==================================================================
[   21.659312] ==================================================================
[   21.659993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.660354] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.660823] 
[   21.661065] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.661169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.661225] Hardware name: linux,dummy-virt (DT)
[   21.661270] Call trace:
[   21.661299]  show_stack+0x20/0x38 (C)
[   21.661361]  dump_stack_lvl+0x8c/0xd0
[   21.661418]  print_report+0x118/0x608
[   21.661499]  kasan_report+0xdc/0x128
[   21.661554]  kasan_check_range+0x100/0x1a8
[   21.661633]  __kasan_check_write+0x20/0x30
[   21.661689]  kasan_atomics_helper+0x99c/0x4858
[   21.661755]  kasan_atomics+0x198/0x2e8
[   21.661813]  kunit_try_run_case+0x170/0x3f0
[   21.661866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.661924]  kthread+0x318/0x620
[   21.661976]  ret_from_fork+0x10/0x20
[   21.662034] 
[   21.666853] Allocated by task 254:
[   21.667275]  kasan_save_stack+0x3c/0x68
[   21.667521]  kasan_save_track+0x20/0x40
[   21.667754]  kasan_save_alloc_info+0x40/0x58
[   21.667933]  __kasan_kmalloc+0xd4/0xd8
[   21.668091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.668517]  kasan_atomics+0xb8/0x2e8
[   21.668876]  kunit_try_run_case+0x170/0x3f0
[   21.669278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.669536]  kthread+0x318/0x620
[   21.669786]  ret_from_fork+0x10/0x20
[   21.669941] 
[   21.670106] The buggy address belongs to the object at fff00000c66ea700
[   21.670106]  which belongs to the cache kmalloc-64 of size 64
[   21.670940] The buggy address is located 0 bytes to the right of
[   21.670940]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.671399] 
[   21.671598] The buggy address belongs to the physical page:
[   21.672085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.672639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.672874] page_type: f5(slab)
[   21.673194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.673617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.674080] page dumped because: kasan: bad access detected
[   21.674421] 
[   21.674629] Memory state around the buggy address:
[   21.674923]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.675314]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.675731] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.676149]                                      ^
[   21.676429]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.676869]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.677298] ==================================================================
[   21.404753] ==================================================================
[   21.405137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   21.405491] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.405922] 
[   21.406131] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.406254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.406295] Hardware name: linux,dummy-virt (DT)
[   21.406346] Call trace:
[   21.406380]  show_stack+0x20/0x38 (C)
[   21.406441]  dump_stack_lvl+0x8c/0xd0
[   21.406678]  print_report+0x118/0x608
[   21.407315]  kasan_report+0xdc/0x128
[   21.407381]  kasan_check_range+0x100/0x1a8
[   21.407439]  __kasan_check_write+0x20/0x30
[   21.407489]  kasan_atomics_helper+0x414/0x4858
[   21.407545]  kasan_atomics+0x198/0x2e8
[   21.407597]  kunit_try_run_case+0x170/0x3f0
[   21.407650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.407705]  kthread+0x318/0x620
[   21.407780]  ret_from_fork+0x10/0x20
[   21.407839] 
[   21.410868] Allocated by task 254:
[   21.411192]  kasan_save_stack+0x3c/0x68
[   21.411490]  kasan_save_track+0x20/0x40
[   21.412019]  kasan_save_alloc_info+0x40/0x58
[   21.412309]  __kasan_kmalloc+0xd4/0xd8
[   21.412578]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.412943]  kasan_atomics+0xb8/0x2e8
[   21.413257]  kunit_try_run_case+0x170/0x3f0
[   21.413544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.413813]  kthread+0x318/0x620
[   21.414130]  ret_from_fork+0x10/0x20
[   21.414400] 
[   21.414645] The buggy address belongs to the object at fff00000c66ea700
[   21.414645]  which belongs to the cache kmalloc-64 of size 64
[   21.415371] The buggy address is located 0 bytes to the right of
[   21.415371]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.415940] 
[   21.416117] The buggy address belongs to the physical page:
[   21.416427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.416873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.417237] page_type: f5(slab)
[   21.417413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.417684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.418141] page dumped because: kasan: bad access detected
[   21.418448] 
[   21.418715] Memory state around the buggy address:
[   21.419069]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.419429]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.419843] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.420213]                                      ^
[   21.420503]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.420816]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.421215] ==================================================================
[   22.022421] ==================================================================
[   22.022690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.023236] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.023493] 
[   22.023703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.023822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.023859] Hardware name: linux,dummy-virt (DT)
[   22.023898] Call trace:
[   22.023928]  show_stack+0x20/0x38 (C)
[   22.023984]  dump_stack_lvl+0x8c/0xd0
[   22.024039]  print_report+0x118/0x608
[   22.024090]  kasan_report+0xdc/0x128
[   22.024140]  kasan_check_range+0x100/0x1a8
[   22.024194]  __kasan_check_write+0x20/0x30
[   22.024247]  kasan_atomics_helper+0x1058/0x4858
[   22.024303]  kasan_atomics+0x198/0x2e8
[   22.024354]  kunit_try_run_case+0x170/0x3f0
[   22.024411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.024466]  kthread+0x318/0x620
[   22.024517]  ret_from_fork+0x10/0x20
[   22.024570] 
[   22.027697] Allocated by task 254:
[   22.027982]  kasan_save_stack+0x3c/0x68
[   22.028155]  kasan_save_track+0x20/0x40
[   22.028316]  kasan_save_alloc_info+0x40/0x58
[   22.028679]  __kasan_kmalloc+0xd4/0xd8
[   22.028992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.029159]  kasan_atomics+0xb8/0x2e8
[   22.029473]  kunit_try_run_case+0x170/0x3f0
[   22.029832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030106]  kthread+0x318/0x620
[   22.030312]  ret_from_fork+0x10/0x20
[   22.030621] 
[   22.030771] The buggy address belongs to the object at fff00000c66ea700
[   22.030771]  which belongs to the cache kmalloc-64 of size 64
[   22.031379] The buggy address is located 0 bytes to the right of
[   22.031379]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.031813] 
[   22.031982] The buggy address belongs to the physical page:
[   22.032324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.032564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.033056] page_type: f5(slab)
[   22.033288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.033731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.034136] page dumped because: kasan: bad access detected
[   22.034357] 
[   22.034601] Memory state around the buggy address:
[   22.034895]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.035379]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.035733] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.035986]                                      ^
[   22.036318]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.036611]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.036822] ==================================================================
[   21.601513] ==================================================================
[   21.602098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   21.602864] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.603459] 
[   21.603599] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.603719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.603767] Hardware name: linux,dummy-virt (DT)
[   21.603810] Call trace:
[   21.603841]  show_stack+0x20/0x38 (C)
[   21.603910]  dump_stack_lvl+0x8c/0xd0
[   21.603969]  print_report+0x118/0x608
[   21.604029]  kasan_report+0xdc/0x128
[   21.604084]  kasan_check_range+0x100/0x1a8
[   21.604143]  __kasan_check_write+0x20/0x30
[   21.604219]  kasan_atomics_helper+0x894/0x4858
[   21.604286]  kasan_atomics+0x198/0x2e8
[   21.604340]  kunit_try_run_case+0x170/0x3f0
[   21.604418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.604490]  kthread+0x318/0x620
[   21.604843]  ret_from_fork+0x10/0x20
[   21.604906] 
[   21.608143] Allocated by task 254:
[   21.608354]  kasan_save_stack+0x3c/0x68
[   21.608583]  kasan_save_track+0x20/0x40
[   21.609882]  kasan_save_alloc_info+0x40/0x58
[   21.610143]  __kasan_kmalloc+0xd4/0xd8
[   21.610317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.610516]  kasan_atomics+0xb8/0x2e8
[   21.610680]  kunit_try_run_case+0x170/0x3f0
[   21.610874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.611073]  kthread+0x318/0x620
[   21.611249]  ret_from_fork+0x10/0x20
[   21.611409] 
[   21.611523] The buggy address belongs to the object at fff00000c66ea700
[   21.611523]  which belongs to the cache kmalloc-64 of size 64
[   21.612040] The buggy address is located 0 bytes to the right of
[   21.612040]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.612424] 
[   21.612539] The buggy address belongs to the physical page:
[   21.612728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.613036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.613279] page_type: f5(slab)
[   21.613444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.613707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.615689] page dumped because: kasan: bad access detected
[   21.615940] 
[   21.616142] Memory state around the buggy address:
[   21.616419]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.616818]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.617174] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.617560]                                      ^
[   21.618208]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.618690]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.619279] ==================================================================
[   21.856846] ==================================================================
[   21.857260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.857555] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.857809] 
[   21.858024] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.858174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.858212] Hardware name: linux,dummy-virt (DT)
[   21.858282] Call trace:
[   21.858324]  show_stack+0x20/0x38 (C)
[   21.858386]  dump_stack_lvl+0x8c/0xd0
[   21.858465]  print_report+0x118/0x608
[   21.858555]  kasan_report+0xdc/0x128
[   21.858623]  kasan_check_range+0x100/0x1a8
[   21.858685]  __kasan_check_write+0x20/0x30
[   21.858889]  kasan_atomics_helper+0xd3c/0x4858
[   21.858950]  kasan_atomics+0x198/0x2e8
[   21.859004]  kunit_try_run_case+0x170/0x3f0
[   21.859059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859118]  kthread+0x318/0x620
[   21.859168]  ret_from_fork+0x10/0x20
[   21.859225] 
[   21.861691] Allocated by task 254:
[   21.861888]  kasan_save_stack+0x3c/0x68
[   21.862095]  kasan_save_track+0x20/0x40
[   21.862289]  kasan_save_alloc_info+0x40/0x58
[   21.862630]  __kasan_kmalloc+0xd4/0xd8
[   21.862821]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.863014]  kasan_atomics+0xb8/0x2e8
[   21.863308]  kunit_try_run_case+0x170/0x3f0
[   21.863661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.864174]  kthread+0x318/0x620
[   21.864472]  ret_from_fork+0x10/0x20
[   21.864778] 
[   21.864950] The buggy address belongs to the object at fff00000c66ea700
[   21.864950]  which belongs to the cache kmalloc-64 of size 64
[   21.865624] The buggy address is located 0 bytes to the right of
[   21.865624]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.866370] 
[   21.866499] The buggy address belongs to the physical page:
[   21.866872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.867329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.867732] page_type: f5(slab)
[   21.868065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.868433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.868830] page dumped because: kasan: bad access detected
[   21.869150] 
[   21.869278] Memory state around the buggy address:
[   21.869470]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.869895]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.870325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.870674]                                      ^
[   21.871008]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871402]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871779] ==================================================================
[   21.905765] ==================================================================
[   21.906171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.906692] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.906934] 
[   21.907055] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.907152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.907185] Hardware name: linux,dummy-virt (DT)
[   21.907221] Call trace:
[   21.907248]  show_stack+0x20/0x38 (C)
[   21.907307]  dump_stack_lvl+0x8c/0xd0
[   21.907360]  print_report+0x118/0x608
[   21.907413]  kasan_report+0xdc/0x128
[   21.907464]  __asan_report_load8_noabort+0x20/0x30
[   21.907516]  kasan_atomics_helper+0x3f58/0x4858
[   21.907569]  kasan_atomics+0x198/0x2e8
[   21.907618]  kunit_try_run_case+0x170/0x3f0
[   21.907670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.907726]  kthread+0x318/0x620
[   21.907791]  ret_from_fork+0x10/0x20
[   21.907847] 
[   21.911552] Allocated by task 254:
[   21.911843]  kasan_save_stack+0x3c/0x68
[   21.912195]  kasan_save_track+0x20/0x40
[   21.912529]  kasan_save_alloc_info+0x40/0x58
[   21.912911]  __kasan_kmalloc+0xd4/0xd8
[   21.913217]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.913562]  kasan_atomics+0xb8/0x2e8
[   21.913887]  kunit_try_run_case+0x170/0x3f0
[   21.914162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.914571]  kthread+0x318/0x620
[   21.914869]  ret_from_fork+0x10/0x20
[   21.915174] 
[   21.915378] The buggy address belongs to the object at fff00000c66ea700
[   21.915378]  which belongs to the cache kmalloc-64 of size 64
[   21.915896] The buggy address is located 0 bytes to the right of
[   21.915896]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.916625] 
[   21.916771] The buggy address belongs to the physical page:
[   21.917051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.917408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.918005] page_type: f5(slab)
[   21.918246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.918799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.919438] page dumped because: kasan: bad access detected
[   21.919658] 
[   21.919811] Memory state around the buggy address:
[   21.920238]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.920687]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.921021] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.921587]                                      ^
[   21.922033]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.922400]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.922772] ==================================================================
[   22.144685] ==================================================================
[   22.145119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.145471] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.145777] 
[   22.145941] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.146034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.146082] Hardware name: linux,dummy-virt (DT)
[   22.146123] Call trace:
[   22.146153]  show_stack+0x20/0x38 (C)
[   22.146214]  dump_stack_lvl+0x8c/0xd0
[   22.146270]  print_report+0x118/0x608
[   22.146325]  kasan_report+0xdc/0x128
[   22.146375]  __asan_report_load8_noabort+0x20/0x30
[   22.146427]  kasan_atomics_helper+0x3f04/0x4858
[   22.146482]  kasan_atomics+0x198/0x2e8
[   22.146532]  kunit_try_run_case+0x170/0x3f0
[   22.146588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.146647]  kthread+0x318/0x620
[   22.146697]  ret_from_fork+0x10/0x20
[   22.146763] 
[   22.149578] Allocated by task 254:
[   22.149716]  kasan_save_stack+0x3c/0x68
[   22.149887]  kasan_save_track+0x20/0x40
[   22.150211]  kasan_save_alloc_info+0x40/0x58
[   22.150595]  __kasan_kmalloc+0xd4/0xd8
[   22.150844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.151017]  kasan_atomics+0xb8/0x2e8
[   22.151252]  kunit_try_run_case+0x170/0x3f0
[   22.151563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.151940]  kthread+0x318/0x620
[   22.152231]  ret_from_fork+0x10/0x20
[   22.152418] 
[   22.152517] The buggy address belongs to the object at fff00000c66ea700
[   22.152517]  which belongs to the cache kmalloc-64 of size 64
[   22.153055] The buggy address is located 0 bytes to the right of
[   22.153055]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.153634] 
[   22.153930] The buggy address belongs to the physical page:
[   22.154680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.154957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.155247] page_type: f5(slab)
[   22.155533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.155954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.156321] page dumped because: kasan: bad access detected
[   22.156576] 
[   22.156721] Memory state around the buggy address:
[   22.157090]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.157358]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.157598] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.157859]                                      ^
[   22.158060]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.158343]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.158588] ==================================================================
[   21.421899] ==================================================================
[   21.422264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   21.422749] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.423612] 
[   21.424019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.424334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.424374] Hardware name: linux,dummy-virt (DT)
[   21.424413] Call trace:
[   21.424445]  show_stack+0x20/0x38 (C)
[   21.424511]  dump_stack_lvl+0x8c/0xd0
[   21.424565]  print_report+0x118/0x608
[   21.424619]  kasan_report+0xdc/0x128
[   21.424670]  kasan_check_range+0x100/0x1a8
[   21.424723]  __kasan_check_write+0x20/0x30
[   21.424797]  kasan_atomics_helper+0x47c/0x4858
[   21.424850]  kasan_atomics+0x198/0x2e8
[   21.424898]  kunit_try_run_case+0x170/0x3f0
[   21.424950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.425004]  kthread+0x318/0x620
[   21.425052]  ret_from_fork+0x10/0x20
[   21.425105] 
[   21.428607] Allocated by task 254:
[   21.428800]  kasan_save_stack+0x3c/0x68
[   21.429070]  kasan_save_track+0x20/0x40
[   21.429227]  kasan_save_alloc_info+0x40/0x58
[   21.429598]  __kasan_kmalloc+0xd4/0xd8
[   21.429866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.430205]  kasan_atomics+0xb8/0x2e8
[   21.430454]  kunit_try_run_case+0x170/0x3f0
[   21.430797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.431288]  kthread+0x318/0x620
[   21.431444]  ret_from_fork+0x10/0x20
[   21.431781] 
[   21.431921] The buggy address belongs to the object at fff00000c66ea700
[   21.431921]  which belongs to the cache kmalloc-64 of size 64
[   21.432508] The buggy address is located 0 bytes to the right of
[   21.432508]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.433111] 
[   21.433267] The buggy address belongs to the physical page:
[   21.433579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.433947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.434407] page_type: f5(slab)
[   21.434695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.435056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.435420] page dumped because: kasan: bad access detected
[   21.435635] 
[   21.435743] Memory state around the buggy address:
[   21.435959]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.436346]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.436644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.437285]                                      ^
[   21.437670]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.438125]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.438624] ==================================================================
[   21.941137] ==================================================================
[   21.941590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.942121] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.942467] 
[   21.942653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.942767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.942808] Hardware name: linux,dummy-virt (DT)
[   21.942869] Call trace:
[   21.942917]  show_stack+0x20/0x38 (C)
[   21.942981]  dump_stack_lvl+0x8c/0xd0
[   21.943039]  print_report+0x118/0x608
[   21.943092]  kasan_report+0xdc/0x128
[   21.943158]  __asan_report_store8_noabort+0x20/0x30
[   21.943223]  kasan_atomics_helper+0x3e5c/0x4858
[   21.943279]  kasan_atomics+0x198/0x2e8
[   21.943331]  kunit_try_run_case+0x170/0x3f0
[   21.943385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.943443]  kthread+0x318/0x620
[   21.943493]  ret_from_fork+0x10/0x20
[   21.943549] 
[   21.946664] Allocated by task 254:
[   21.947000]  kasan_save_stack+0x3c/0x68
[   21.947272]  kasan_save_track+0x20/0x40
[   21.947622]  kasan_save_alloc_info+0x40/0x58
[   21.947920]  __kasan_kmalloc+0xd4/0xd8
[   21.948215]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.948467]  kasan_atomics+0xb8/0x2e8
[   21.948716]  kunit_try_run_case+0x170/0x3f0
[   21.948978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.949269]  kthread+0x318/0x620
[   21.949479]  ret_from_fork+0x10/0x20
[   21.949734] 
[   21.949946] The buggy address belongs to the object at fff00000c66ea700
[   21.949946]  which belongs to the cache kmalloc-64 of size 64
[   21.950495] The buggy address is located 0 bytes to the right of
[   21.950495]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.951023] 
[   21.951224] The buggy address belongs to the physical page:
[   21.951481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.951999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.952388] page_type: f5(slab)
[   21.952563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.953029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.953428] page dumped because: kasan: bad access detected
[   21.953713] 
[   21.953900] Memory state around the buggy address:
[   21.954199]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.954489]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.954909] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.955253]                                      ^
[   21.955462]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.955942]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956388] ==================================================================
[   22.385946] ==================================================================
[   22.386732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.387313] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.387891] 
[   22.388062] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.388165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.388199] Hardware name: linux,dummy-virt (DT)
[   22.388254] Call trace:
[   22.388286]  show_stack+0x20/0x38 (C)
[   22.388343]  dump_stack_lvl+0x8c/0xd0
[   22.388396]  print_report+0x118/0x608
[   22.388445]  kasan_report+0xdc/0x128
[   22.388494]  kasan_check_range+0x100/0x1a8
[   22.388544]  __kasan_check_write+0x20/0x30
[   22.388593]  kasan_atomics_helper+0x17ec/0x4858
[   22.388643]  kasan_atomics+0x198/0x2e8
[   22.388691]  kunit_try_run_case+0x170/0x3f0
[   22.388836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.389007]  kthread+0x318/0x620
[   22.389061]  ret_from_fork+0x10/0x20
[   22.389127] 
[   22.393852] Allocated by task 254:
[   22.394234]  kasan_save_stack+0x3c/0x68
[   22.394449]  kasan_save_track+0x20/0x40
[   22.394731]  kasan_save_alloc_info+0x40/0x58
[   22.394962]  __kasan_kmalloc+0xd4/0xd8
[   22.395539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.395807]  kasan_atomics+0xb8/0x2e8
[   22.396298]  kunit_try_run_case+0x170/0x3f0
[   22.396530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.397112]  kthread+0x318/0x620
[   22.397449]  ret_from_fork+0x10/0x20
[   22.397690] 
[   22.398031] The buggy address belongs to the object at fff00000c66ea700
[   22.398031]  which belongs to the cache kmalloc-64 of size 64
[   22.398878] The buggy address is located 0 bytes to the right of
[   22.398878]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.399653] 
[   22.400044] The buggy address belongs to the physical page:
[   22.400425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.401021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.401406] page_type: f5(slab)
[   22.401601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.402080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.402392] page dumped because: kasan: bad access detected
[   22.402601] 
[   22.402713] Memory state around the buggy address:
[   22.402917]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.403162]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.403398] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.403627]                                      ^
[   22.403913]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.404393]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.404913] ==================================================================
[   22.037846] ==================================================================
[   22.038292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.038731] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.038978] 
[   22.039167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.039255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.039290] Hardware name: linux,dummy-virt (DT)
[   22.039327] Call trace:
[   22.039355]  show_stack+0x20/0x38 (C)
[   22.039410]  dump_stack_lvl+0x8c/0xd0
[   22.039459]  print_report+0x118/0x608
[   22.039510]  kasan_report+0xdc/0x128
[   22.039557]  kasan_check_range+0x100/0x1a8
[   22.039608]  __kasan_check_write+0x20/0x30
[   22.039655]  kasan_atomics_helper+0x10c0/0x4858
[   22.039709]  kasan_atomics+0x198/0x2e8
[   22.039770]  kunit_try_run_case+0x170/0x3f0
[   22.039823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.039880]  kthread+0x318/0x620
[   22.039926]  ret_from_fork+0x10/0x20
[   22.039979] 
[   22.043056] Allocated by task 254:
[   22.043226]  kasan_save_stack+0x3c/0x68
[   22.043506]  kasan_save_track+0x20/0x40
[   22.043819]  kasan_save_alloc_info+0x40/0x58
[   22.044151]  __kasan_kmalloc+0xd4/0xd8
[   22.044314]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.044543]  kasan_atomics+0xb8/0x2e8
[   22.044692]  kunit_try_run_case+0x170/0x3f0
[   22.045022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.045365]  kthread+0x318/0x620
[   22.045507]  ret_from_fork+0x10/0x20
[   22.045746] 
[   22.045903] The buggy address belongs to the object at fff00000c66ea700
[   22.045903]  which belongs to the cache kmalloc-64 of size 64
[   22.046634] The buggy address is located 0 bytes to the right of
[   22.046634]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.047145] 
[   22.047324] The buggy address belongs to the physical page:
[   22.047604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.048002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.048338] page_type: f5(slab)
[   22.048527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.048938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.049206] page dumped because: kasan: bad access detected
[   22.049555] 
[   22.049744] Memory state around the buggy address:
[   22.049969]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050409]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.050747] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.051203]                                      ^
[   22.051406]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.051789]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.052028] ==================================================================
[   22.098977] ==================================================================
[   22.099258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.099681] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.099952] 
[   22.100135] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.100234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.100266] Hardware name: linux,dummy-virt (DT)
[   22.100304] Call trace:
[   22.100331]  show_stack+0x20/0x38 (C)
[   22.100388]  dump_stack_lvl+0x8c/0xd0
[   22.100440]  print_report+0x118/0x608
[   22.100493]  kasan_report+0xdc/0x128
[   22.100545]  kasan_check_range+0x100/0x1a8
[   22.100598]  __kasan_check_write+0x20/0x30
[   22.100649]  kasan_atomics_helper+0x126c/0x4858
[   22.100702]  kasan_atomics+0x198/0x2e8
[   22.100764]  kunit_try_run_case+0x170/0x3f0
[   22.100822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.100880]  kthread+0x318/0x620
[   22.100929]  ret_from_fork+0x10/0x20
[   22.100983] 
[   22.104022] Allocated by task 254:
[   22.104220]  kasan_save_stack+0x3c/0x68
[   22.104545]  kasan_save_track+0x20/0x40
[   22.104781]  kasan_save_alloc_info+0x40/0x58
[   22.104966]  __kasan_kmalloc+0xd4/0xd8
[   22.105127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.105506]  kasan_atomics+0xb8/0x2e8
[   22.105854]  kunit_try_run_case+0x170/0x3f0
[   22.106145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.106418]  kthread+0x318/0x620
[   22.106604]  ret_from_fork+0x10/0x20
[   22.106895] 
[   22.107085] The buggy address belongs to the object at fff00000c66ea700
[   22.107085]  which belongs to the cache kmalloc-64 of size 64
[   22.107432] The buggy address is located 0 bytes to the right of
[   22.107432]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.108136] 
[   22.108321] The buggy address belongs to the physical page:
[   22.108612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.109010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.109285] page_type: f5(slab)
[   22.109521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.110024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.110334] page dumped because: kasan: bad access detected
[   22.110705] 
[   22.110907] Memory state around the buggy address:
[   22.111136]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111486]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.111824] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.112171]                                      ^
[   22.112446]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112817]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.113172] ==================================================================
[   21.440353] ==================================================================
[   21.440842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   21.441308] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.441931] 
[   21.442124] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.442293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.442344] Hardware name: linux,dummy-virt (DT)
[   21.442389] Call trace:
[   21.442419]  show_stack+0x20/0x38 (C)
[   21.442491]  dump_stack_lvl+0x8c/0xd0
[   21.443320]  print_report+0x118/0x608
[   21.443379]  kasan_report+0xdc/0x128
[   21.443434]  kasan_check_range+0x100/0x1a8
[   21.443489]  __kasan_check_write+0x20/0x30
[   21.443543]  kasan_atomics_helper+0x4e4/0x4858
[   21.443597]  kasan_atomics+0x198/0x2e8
[   21.443649]  kunit_try_run_case+0x170/0x3f0
[   21.443706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.443782]  kthread+0x318/0x620
[   21.443835]  ret_from_fork+0x10/0x20
[   21.443891] 
[   21.447141] Allocated by task 254:
[   21.447632]  kasan_save_stack+0x3c/0x68
[   21.448047]  kasan_save_track+0x20/0x40
[   21.448316]  kasan_save_alloc_info+0x40/0x58
[   21.448692]  __kasan_kmalloc+0xd4/0xd8
[   21.448866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.449284]  kasan_atomics+0xb8/0x2e8
[   21.449657]  kunit_try_run_case+0x170/0x3f0
[   21.449966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.450386]  kthread+0x318/0x620
[   21.450666]  ret_from_fork+0x10/0x20
[   21.450989] 
[   21.451144] The buggy address belongs to the object at fff00000c66ea700
[   21.451144]  which belongs to the cache kmalloc-64 of size 64
[   21.451779] The buggy address is located 0 bytes to the right of
[   21.451779]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.452349] 
[   21.452516] The buggy address belongs to the physical page:
[   21.453052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.453323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.453614] page_type: f5(slab)
[   21.453847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.454267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.454854] page dumped because: kasan: bad access detected
[   21.455426] 
[   21.456206] Memory state around the buggy address:
[   21.456461]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.456908]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.457614] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.458135]                                      ^
[   21.458854]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.459324]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.460074] ==================================================================
[   21.975760] ==================================================================
[   21.976057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.976522] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.977048] 
[   21.977204] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.977410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.977447] Hardware name: linux,dummy-virt (DT)
[   21.977486] Call trace:
[   21.977517]  show_stack+0x20/0x38 (C)
[   21.977578]  dump_stack_lvl+0x8c/0xd0
[   21.977635]  print_report+0x118/0x608
[   21.977688]  kasan_report+0xdc/0x128
[   21.977761]  kasan_check_range+0x100/0x1a8
[   21.977824]  __kasan_check_write+0x20/0x30
[   21.977876]  kasan_atomics_helper+0xf20/0x4858
[   21.977932]  kasan_atomics+0x198/0x2e8
[   21.977984]  kunit_try_run_case+0x170/0x3f0
[   21.978040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.978114]  kthread+0x318/0x620
[   21.978169]  ret_from_fork+0x10/0x20
[   21.978229] 
[   21.981038] Allocated by task 254:
[   21.981363]  kasan_save_stack+0x3c/0x68
[   21.981717]  kasan_save_track+0x20/0x40
[   21.981985]  kasan_save_alloc_info+0x40/0x58
[   21.982272]  __kasan_kmalloc+0xd4/0xd8
[   21.982520]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.982829]  kasan_atomics+0xb8/0x2e8
[   21.983072]  kunit_try_run_case+0x170/0x3f0
[   21.983368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.983643]  kthread+0x318/0x620
[   21.983848]  ret_from_fork+0x10/0x20
[   21.984086] 
[   21.984192] The buggy address belongs to the object at fff00000c66ea700
[   21.984192]  which belongs to the cache kmalloc-64 of size 64
[   21.984517] The buggy address is located 0 bytes to the right of
[   21.984517]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.985427] 
[   21.985611] The buggy address belongs to the physical page:
[   21.985919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.986256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.986481] page_type: f5(slab)
[   21.986815] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.987435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.987818] page dumped because: kasan: bad access detected
[   21.988271] 
[   21.988401] Memory state around the buggy address:
[   21.988717]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.989117]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.989608] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.989980]                                      ^
[   21.990190]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.990612]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.991062] ==================================================================
[   21.766879] ==================================================================
[   21.767308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   21.767704] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.768006] 
[   21.768128] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.768225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.768261] Hardware name: linux,dummy-virt (DT)
[   21.768321] Call trace:
[   21.768351]  show_stack+0x20/0x38 (C)
[   21.768409]  dump_stack_lvl+0x8c/0xd0
[   21.768464]  print_report+0x118/0x608
[   21.768517]  kasan_report+0xdc/0x128
[   21.768595]  __asan_report_load4_noabort+0x20/0x30
[   21.768650]  kasan_atomics_helper+0x3dbc/0x4858
[   21.768707]  kasan_atomics+0x198/0x2e8
[   21.768770]  kunit_try_run_case+0x170/0x3f0
[   21.768830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.768889]  kthread+0x318/0x620
[   21.768942]  ret_from_fork+0x10/0x20
[   21.768998] 
[   21.772369] Allocated by task 254:
[   21.772574]  kasan_save_stack+0x3c/0x68
[   21.772829]  kasan_save_track+0x20/0x40
[   21.773073]  kasan_save_alloc_info+0x40/0x58
[   21.773377]  __kasan_kmalloc+0xd4/0xd8
[   21.773746]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.773983]  kasan_atomics+0xb8/0x2e8
[   21.774259]  kunit_try_run_case+0x170/0x3f0
[   21.774587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.774934]  kthread+0x318/0x620
[   21.775224]  ret_from_fork+0x10/0x20
[   21.775449] 
[   21.775632] The buggy address belongs to the object at fff00000c66ea700
[   21.775632]  which belongs to the cache kmalloc-64 of size 64
[   21.776190] The buggy address is located 0 bytes to the right of
[   21.776190]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.776836] 
[   21.777009] The buggy address belongs to the physical page:
[   21.777346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.777706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.778130] page_type: f5(slab)
[   21.778318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.778804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.779098] page dumped because: kasan: bad access detected
[   21.779470] 
[   21.779602] Memory state around the buggy address:
[   21.779923]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.780230]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.780681] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.781077]                                      ^
[   21.781331]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.781760]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.782113] ==================================================================
[   21.783206] ==================================================================
[   21.783631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   21.784359] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.784777] 
[   21.785011] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.785113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.785169] Hardware name: linux,dummy-virt (DT)
[   21.785208] Call trace:
[   21.785238]  show_stack+0x20/0x38 (C)
[   21.785296]  dump_stack_lvl+0x8c/0xd0
[   21.785353]  print_report+0x118/0x608
[   21.785408]  kasan_report+0xdc/0x128
[   21.785463]  kasan_check_range+0x100/0x1a8
[   21.785545]  __kasan_check_write+0x20/0x30
[   21.785602]  kasan_atomics_helper+0xc08/0x4858
[   21.785680]  kasan_atomics+0x198/0x2e8
[   21.785751]  kunit_try_run_case+0x170/0x3f0
[   21.785812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.785874]  kthread+0x318/0x620
[   21.785927]  ret_from_fork+0x10/0x20
[   21.785982] 
[   21.789512] Allocated by task 254:
[   21.789716]  kasan_save_stack+0x3c/0x68
[   21.790033]  kasan_save_track+0x20/0x40
[   21.790377]  kasan_save_alloc_info+0x40/0x58
[   21.790669]  __kasan_kmalloc+0xd4/0xd8
[   21.791013]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.791435]  kasan_atomics+0xb8/0x2e8
[   21.791604]  kunit_try_run_case+0x170/0x3f0
[   21.791926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.792398]  kthread+0x318/0x620
[   21.792600]  ret_from_fork+0x10/0x20
[   21.792933] 
[   21.793075] The buggy address belongs to the object at fff00000c66ea700
[   21.793075]  which belongs to the cache kmalloc-64 of size 64
[   21.793635] The buggy address is located 0 bytes to the right of
[   21.793635]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.794436] 
[   21.794665] The buggy address belongs to the physical page:
[   21.795013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.795578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.796023] page_type: f5(slab)
[   21.796318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.796814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.797276] page dumped because: kasan: bad access detected
[   21.797645] 
[   21.797866] Memory state around the buggy address:
[   21.798197]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.798520]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.798921] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.799368]                                      ^
[   21.799583]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.800062]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.800462] ==================================================================
[   22.114354] ==================================================================
[   22.114732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.115256] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.115668] 
[   22.115869] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.115968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.116002] Hardware name: linux,dummy-virt (DT)
[   22.116041] Call trace:
[   22.116068]  show_stack+0x20/0x38 (C)
[   22.116127]  dump_stack_lvl+0x8c/0xd0
[   22.116180]  print_report+0x118/0x608
[   22.116234]  kasan_report+0xdc/0x128
[   22.116288]  kasan_check_range+0x100/0x1a8
[   22.116342]  __kasan_check_write+0x20/0x30
[   22.116394]  kasan_atomics_helper+0x12d8/0x4858
[   22.116449]  kasan_atomics+0x198/0x2e8
[   22.116499]  kunit_try_run_case+0x170/0x3f0
[   22.116553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.116611]  kthread+0x318/0x620
[   22.116660]  ret_from_fork+0x10/0x20
[   22.116715] 
[   22.119672] Allocated by task 254:
[   22.119850]  kasan_save_stack+0x3c/0x68
[   22.120020]  kasan_save_track+0x20/0x40
[   22.120242]  kasan_save_alloc_info+0x40/0x58
[   22.120606]  __kasan_kmalloc+0xd4/0xd8
[   22.120895]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.121193]  kasan_atomics+0xb8/0x2e8
[   22.121483]  kunit_try_run_case+0x170/0x3f0
[   22.121698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.121967]  kthread+0x318/0x620
[   22.122286]  ret_from_fork+0x10/0x20
[   22.122531] 
[   22.122697] The buggy address belongs to the object at fff00000c66ea700
[   22.122697]  which belongs to the cache kmalloc-64 of size 64
[   22.123267] The buggy address is located 0 bytes to the right of
[   22.123267]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.123802] 
[   22.123958] The buggy address belongs to the physical page:
[   22.124142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.124719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.125208] page_type: f5(slab)
[   22.125460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.125788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.126139] page dumped because: kasan: bad access detected
[   22.126329] 
[   22.126499] Memory state around the buggy address:
[   22.126827]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.127254]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.127551] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.127844]                                      ^
[   22.128207]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128526]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128838] ==================================================================
[   22.007856] ==================================================================
[   22.008234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.008487] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.008978] 
[   22.009130] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.009231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.009269] Hardware name: linux,dummy-virt (DT)
[   22.009329] Call trace:
[   22.009360]  show_stack+0x20/0x38 (C)
[   22.009420]  dump_stack_lvl+0x8c/0xd0
[   22.009495]  print_report+0x118/0x608
[   22.009553]  kasan_report+0xdc/0x128
[   22.009607]  kasan_check_range+0x100/0x1a8
[   22.009663]  __kasan_check_write+0x20/0x30
[   22.009715]  kasan_atomics_helper+0xff0/0x4858
[   22.009791]  kasan_atomics+0x198/0x2e8
[   22.009846]  kunit_try_run_case+0x170/0x3f0
[   22.009900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.009957]  kthread+0x318/0x620
[   22.010009]  ret_from_fork+0x10/0x20
[   22.010070] 
[   22.012544] Allocated by task 254:
[   22.012815]  kasan_save_stack+0x3c/0x68
[   22.013142]  kasan_save_track+0x20/0x40
[   22.013400]  kasan_save_alloc_info+0x40/0x58
[   22.013699]  __kasan_kmalloc+0xd4/0xd8
[   22.013951]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.014190]  kasan_atomics+0xb8/0x2e8
[   22.014429]  kunit_try_run_case+0x170/0x3f0
[   22.014605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.015040]  kthread+0x318/0x620
[   22.015309]  ret_from_fork+0x10/0x20
[   22.015514] 
[   22.015681] The buggy address belongs to the object at fff00000c66ea700
[   22.015681]  which belongs to the cache kmalloc-64 of size 64
[   22.016156] The buggy address is located 0 bytes to the right of
[   22.016156]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.016658] 
[   22.016832] The buggy address belongs to the physical page:
[   22.017068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.017521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.017777] page_type: f5(slab)
[   22.018082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.018524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.018924] page dumped because: kasan: bad access detected
[   22.019187] 
[   22.019346] Memory state around the buggy address:
[   22.019585]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.019935]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.020268] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.020566]                                      ^
[   22.020867]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.021214]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.021596] ==================================================================
[   21.620657] ==================================================================
[   21.621090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.621649] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.622101] 
[   21.622272] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.622443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.622908] Hardware name: linux,dummy-virt (DT)
[   21.622966] Call trace:
[   21.622997]  show_stack+0x20/0x38 (C)
[   21.623071]  dump_stack_lvl+0x8c/0xd0
[   21.623129]  print_report+0x118/0x608
[   21.623186]  kasan_report+0xdc/0x128
[   21.623239]  __asan_report_load4_noabort+0x20/0x30
[   21.623297]  kasan_atomics_helper+0x42d8/0x4858
[   21.623356]  kasan_atomics+0x198/0x2e8
[   21.623409]  kunit_try_run_case+0x170/0x3f0
[   21.623468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.623529]  kthread+0x318/0x620
[   21.623582]  ret_from_fork+0x10/0x20
[   21.623642] 
[   21.628502] Allocated by task 254:
[   21.628922]  kasan_save_stack+0x3c/0x68
[   21.629220]  kasan_save_track+0x20/0x40
[   21.629611]  kasan_save_alloc_info+0x40/0x58
[   21.629953]  __kasan_kmalloc+0xd4/0xd8
[   21.630211]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.630932]  kasan_atomics+0xb8/0x2e8
[   21.631350]  kunit_try_run_case+0x170/0x3f0
[   21.631701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.632100]  kthread+0x318/0x620
[   21.632333]  ret_from_fork+0x10/0x20
[   21.632586] 
[   21.632725] The buggy address belongs to the object at fff00000c66ea700
[   21.632725]  which belongs to the cache kmalloc-64 of size 64
[   21.633218] The buggy address is located 0 bytes to the right of
[   21.633218]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.633591] 
[   21.633819] The buggy address belongs to the physical page:
[   21.634201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.634841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.635192] page_type: f5(slab)
[   21.635504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.636010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.636505] page dumped because: kasan: bad access detected
[   21.636827] 
[   21.637003] Memory state around the buggy address:
[   21.637224]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.637712]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.638104] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.638569]                                      ^
[   21.638955]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.639279]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.639810] ==================================================================
[   21.266320] ==================================================================
[   21.267106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   21.267416] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.267664] 
[   21.267818] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.267928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267960] Hardware name: linux,dummy-virt (DT)
[   21.267999] Call trace:
[   21.268027]  show_stack+0x20/0x38 (C)
[   21.268090]  dump_stack_lvl+0x8c/0xd0
[   21.268143]  print_report+0x118/0x608
[   21.268198]  kasan_report+0xdc/0x128
[   21.268255]  __asan_report_store4_noabort+0x20/0x30
[   21.268313]  kasan_atomics_helper+0x3f7c/0x4858
[   21.268369]  kasan_atomics+0x198/0x2e8
[   21.268425]  kunit_try_run_case+0x170/0x3f0
[   21.268482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.268540]  kthread+0x318/0x620
[   21.268594]  ret_from_fork+0x10/0x20
[   21.268651] 
[   21.273157] Allocated by task 254:
[   21.273421]  kasan_save_stack+0x3c/0x68
[   21.273636]  kasan_save_track+0x20/0x40
[   21.273924]  kasan_save_alloc_info+0x40/0x58
[   21.274189]  __kasan_kmalloc+0xd4/0xd8
[   21.274642]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.274884]  kasan_atomics+0xb8/0x2e8
[   21.275195]  kunit_try_run_case+0x170/0x3f0
[   21.275384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.275714]  kthread+0x318/0x620
[   21.275972]  ret_from_fork+0x10/0x20
[   21.276205] 
[   21.276319] The buggy address belongs to the object at fff00000c66ea700
[   21.276319]  which belongs to the cache kmalloc-64 of size 64
[   21.277149] The buggy address is located 0 bytes to the right of
[   21.277149]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.277658] 
[   21.277784] The buggy address belongs to the physical page:
[   21.278228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.278875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.279242] page_type: f5(slab)
[   21.279497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.279898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.280253] page dumped because: kasan: bad access detected
[   21.280609] 
[   21.280789] Memory state around the buggy address:
[   21.281018]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.281474]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.281874] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.282246]                                      ^
[   21.282660]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283006]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283430] ==================================================================
[   21.696546] ==================================================================
[   21.696853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.697413] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.697804] 
[   21.698014] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.698140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.698179] Hardware name: linux,dummy-virt (DT)
[   21.698219] Call trace:
[   21.698249]  show_stack+0x20/0x38 (C)
[   21.698308]  dump_stack_lvl+0x8c/0xd0
[   21.698363]  print_report+0x118/0x608
[   21.698435]  kasan_report+0xdc/0x128
[   21.698520]  kasan_check_range+0x100/0x1a8
[   21.698581]  __kasan_check_write+0x20/0x30
[   21.698633]  kasan_atomics_helper+0xa6c/0x4858
[   21.698690]  kasan_atomics+0x198/0x2e8
[   21.698759]  kunit_try_run_case+0x170/0x3f0
[   21.698820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.698880]  kthread+0x318/0x620
[   21.698932]  ret_from_fork+0x10/0x20
[   21.698990] 
[   21.702289] Allocated by task 254:
[   21.702578]  kasan_save_stack+0x3c/0x68
[   21.702874]  kasan_save_track+0x20/0x40
[   21.703196]  kasan_save_alloc_info+0x40/0x58
[   21.703489]  __kasan_kmalloc+0xd4/0xd8
[   21.703762]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.704056]  kasan_atomics+0xb8/0x2e8
[   21.704408]  kunit_try_run_case+0x170/0x3f0
[   21.704801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.705242]  kthread+0x318/0x620
[   21.705477]  ret_from_fork+0x10/0x20
[   21.705782] 
[   21.705948] The buggy address belongs to the object at fff00000c66ea700
[   21.705948]  which belongs to the cache kmalloc-64 of size 64
[   21.706610] The buggy address is located 0 bytes to the right of
[   21.706610]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.707266] 
[   21.707464] The buggy address belongs to the physical page:
[   21.707760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.708184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.708636] page_type: f5(slab)
[   21.708863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.709302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.709775] page dumped because: kasan: bad access detected
[   21.710075] 
[   21.710281] Memory state around the buggy address:
[   21.710531]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.710974]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.711403] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.711796]                                      ^
[   21.712083]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.712445]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.712879] ==================================================================
[   22.233826] ==================================================================
[   22.234178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.234528] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.234847] 
[   22.234968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.235066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.235102] Hardware name: linux,dummy-virt (DT)
[   22.235138] Call trace:
[   22.235168]  show_stack+0x20/0x38 (C)
[   22.235226]  dump_stack_lvl+0x8c/0xd0
[   22.235281]  print_report+0x118/0x608
[   22.235337]  kasan_report+0xdc/0x128
[   22.235386]  kasan_check_range+0x100/0x1a8
[   22.235438]  __kasan_check_write+0x20/0x30
[   22.235484]  kasan_atomics_helper+0x15b4/0x4858
[   22.235537]  kasan_atomics+0x198/0x2e8
[   22.235587]  kunit_try_run_case+0x170/0x3f0
[   22.235637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.235694]  kthread+0x318/0x620
[   22.235757]  ret_from_fork+0x10/0x20
[   22.235817] 
[   22.238864] Allocated by task 254:
[   22.239171]  kasan_save_stack+0x3c/0x68
[   22.239438]  kasan_save_track+0x20/0x40
[   22.239692]  kasan_save_alloc_info+0x40/0x58
[   22.239938]  __kasan_kmalloc+0xd4/0xd8
[   22.240103]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.240465]  kasan_atomics+0xb8/0x2e8
[   22.240772]  kunit_try_run_case+0x170/0x3f0
[   22.240986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.241273]  kthread+0x318/0x620
[   22.241523]  ret_from_fork+0x10/0x20
[   22.241717] 
[   22.241907] The buggy address belongs to the object at fff00000c66ea700
[   22.241907]  which belongs to the cache kmalloc-64 of size 64
[   22.242368] The buggy address is located 0 bytes to the right of
[   22.242368]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.243411] 
[   22.243589] The buggy address belongs to the physical page:
[   22.243785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.244038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.244259] page_type: f5(slab)
[   22.244418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.244656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.245097] page dumped because: kasan: bad access detected
[   22.245428] 
[   22.245572] Memory state around the buggy address:
[   22.245875]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.246534]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.246945] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.247229]                                      ^
[   22.247462]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.247721]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.248009] ==================================================================
[   22.052848] ==================================================================
[   22.053259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.053657] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.053983] 
[   22.054165] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.054262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.054296] Hardware name: linux,dummy-virt (DT)
[   22.054333] Call trace:
[   22.054360]  show_stack+0x20/0x38 (C)
[   22.054417]  dump_stack_lvl+0x8c/0xd0
[   22.054501]  print_report+0x118/0x608
[   22.054558]  kasan_report+0xdc/0x128
[   22.054611]  kasan_check_range+0x100/0x1a8
[   22.054664]  __kasan_check_write+0x20/0x30
[   22.054715]  kasan_atomics_helper+0x1128/0x4858
[   22.054790]  kasan_atomics+0x198/0x2e8
[   22.054843]  kunit_try_run_case+0x170/0x3f0
[   22.054896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.054954]  kthread+0x318/0x620
[   22.054999]  ret_from_fork+0x10/0x20
[   22.055049] 
[   22.057650] Allocated by task 254:
[   22.057891]  kasan_save_stack+0x3c/0x68
[   22.058112]  kasan_save_track+0x20/0x40
[   22.058365]  kasan_save_alloc_info+0x40/0x58
[   22.058623]  __kasan_kmalloc+0xd4/0xd8
[   22.058856]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.059031]  kasan_atomics+0xb8/0x2e8
[   22.059188]  kunit_try_run_case+0x170/0x3f0
[   22.059534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.059977]  kthread+0x318/0x620
[   22.060145]  ret_from_fork+0x10/0x20
[   22.060309] 
[   22.060413] The buggy address belongs to the object at fff00000c66ea700
[   22.060413]  which belongs to the cache kmalloc-64 of size 64
[   22.061515] The buggy address is located 0 bytes to the right of
[   22.061515]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.061922] 
[   22.062203] The buggy address belongs to the physical page:
[   22.062619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.062950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.063190] page_type: f5(slab)
[   22.063357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.063624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.064226] page dumped because: kasan: bad access detected
[   22.064417] 
[   22.064655] Memory state around the buggy address:
[   22.065053]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.065403]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.065629] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.066124]                                      ^
[   22.066456]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.066827]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.067191] ==================================================================
[   21.872534] ==================================================================
[   21.872964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.873392] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.873751] 
[   21.873920] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.874016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.874049] Hardware name: linux,dummy-virt (DT)
[   21.874096] Call trace:
[   21.874128]  show_stack+0x20/0x38 (C)
[   21.874190]  dump_stack_lvl+0x8c/0xd0
[   21.874250]  print_report+0x118/0x608
[   21.874305]  kasan_report+0xdc/0x128
[   21.874359]  __asan_report_load4_noabort+0x20/0x30
[   21.874413]  kasan_atomics_helper+0x3e04/0x4858
[   21.874471]  kasan_atomics+0x198/0x2e8
[   21.874545]  kunit_try_run_case+0x170/0x3f0
[   21.874606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.874663]  kthread+0x318/0x620
[   21.874711]  ret_from_fork+0x10/0x20
[   21.874776] 
[   21.877316] Allocated by task 254:
[   21.877620]  kasan_save_stack+0x3c/0x68
[   21.877880]  kasan_save_track+0x20/0x40
[   21.878127]  kasan_save_alloc_info+0x40/0x58
[   21.878426]  __kasan_kmalloc+0xd4/0xd8
[   21.878648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.879036]  kasan_atomics+0xb8/0x2e8
[   21.879291]  kunit_try_run_case+0x170/0x3f0
[   21.879547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.879774]  kthread+0x318/0x620
[   21.880039]  ret_from_fork+0x10/0x20
[   21.880285] 
[   21.880385] The buggy address belongs to the object at fff00000c66ea700
[   21.880385]  which belongs to the cache kmalloc-64 of size 64
[   21.881118] The buggy address is located 0 bytes to the right of
[   21.881118]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.881693] 
[   21.881886] The buggy address belongs to the physical page:
[   21.882143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.882560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.882917] page_type: f5(slab)
[   21.883153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.883464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.884015] page dumped because: kasan: bad access detected
[   21.884394] 
[   21.884529] Memory state around the buggy address:
[   21.884711]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.885171]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.885506] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.885900]                                      ^
[   21.886160]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.886475]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.886986] ==================================================================
[   21.801308] ==================================================================
[   21.801702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   21.802299] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.802694] 
[   21.802866] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.802967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.803003] Hardware name: linux,dummy-virt (DT)
[   21.803062] Call trace:
[   21.803095]  show_stack+0x20/0x38 (C)
[   21.803164]  dump_stack_lvl+0x8c/0xd0
[   21.803222]  print_report+0x118/0x608
[   21.803276]  kasan_report+0xdc/0x128
[   21.803331]  __asan_report_load4_noabort+0x20/0x30
[   21.803386]  kasan_atomics_helper+0x3de4/0x4858
[   21.803442]  kasan_atomics+0x198/0x2e8
[   21.803495]  kunit_try_run_case+0x170/0x3f0
[   21.803552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.803611]  kthread+0x318/0x620
[   21.803662]  ret_from_fork+0x10/0x20
[   21.803716] 
[   21.807920] Allocated by task 254:
[   21.808103]  kasan_save_stack+0x3c/0x68
[   21.808702]  kasan_save_track+0x20/0x40
[   21.809116]  kasan_save_alloc_info+0x40/0x58
[   21.809398]  __kasan_kmalloc+0xd4/0xd8
[   21.809751]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.810104]  kasan_atomics+0xb8/0x2e8
[   21.810282]  kunit_try_run_case+0x170/0x3f0
[   21.810461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.810665]  kthread+0x318/0x620
[   21.810935]  ret_from_fork+0x10/0x20
[   21.811481] 
[   21.811596] The buggy address belongs to the object at fff00000c66ea700
[   21.811596]  which belongs to the cache kmalloc-64 of size 64
[   21.812017] The buggy address is located 0 bytes to the right of
[   21.812017]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.812373] 
[   21.812480] The buggy address belongs to the physical page:
[   21.812672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.813873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.814428] page_type: f5(slab)
[   21.814807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.815359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.815870] page dumped because: kasan: bad access detected
[   21.816163] 
[   21.816317] Memory state around the buggy address:
[   21.816592]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.816924]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.817358] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.817776]                                      ^
[   21.818092]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.818585]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.819081] ==================================================================
[   21.582392] ==================================================================
[   21.583587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   21.583893] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.584341] 
[   21.584551] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.584654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.584689] Hardware name: linux,dummy-virt (DT)
[   21.584729] Call trace:
[   21.584772]  show_stack+0x20/0x38 (C)
[   21.584834]  dump_stack_lvl+0x8c/0xd0
[   21.584887]  print_report+0x118/0x608
[   21.584937]  kasan_report+0xdc/0x128
[   21.584986]  kasan_check_range+0x100/0x1a8
[   21.585037]  __kasan_check_write+0x20/0x30
[   21.585086]  kasan_atomics_helper+0x7cc/0x4858
[   21.585137]  kasan_atomics+0x198/0x2e8
[   21.585186]  kunit_try_run_case+0x170/0x3f0
[   21.585237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.585291]  kthread+0x318/0x620
[   21.585338]  ret_from_fork+0x10/0x20
[   21.585389] 
[   21.589276] Allocated by task 254:
[   21.589595]  kasan_save_stack+0x3c/0x68
[   21.589974]  kasan_save_track+0x20/0x40
[   21.590313]  kasan_save_alloc_info+0x40/0x58
[   21.590735]  __kasan_kmalloc+0xd4/0xd8
[   21.591178]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.591528]  kasan_atomics+0xb8/0x2e8
[   21.591794]  kunit_try_run_case+0x170/0x3f0
[   21.591967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.592384]  kthread+0x318/0x620
[   21.592614]  ret_from_fork+0x10/0x20
[   21.592910] 
[   21.593047] The buggy address belongs to the object at fff00000c66ea700
[   21.593047]  which belongs to the cache kmalloc-64 of size 64
[   21.593672] The buggy address is located 0 bytes to the right of
[   21.593672]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.594408] 
[   21.594690] The buggy address belongs to the physical page:
[   21.595147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.595600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.595987] page_type: f5(slab)
[   21.596176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.596528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.596995] page dumped because: kasan: bad access detected
[   21.597252] 
[   21.597360] Memory state around the buggy address:
[   21.597708]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.598052]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.598558] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.599172]                                      ^
[   21.599503]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.599834]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.600616] ==================================================================
[   21.523038] ==================================================================
[   21.523405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   21.523785] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.524363] 
[   21.524550] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.524651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.524685] Hardware name: linux,dummy-virt (DT)
[   21.524726] Call trace:
[   21.524769]  show_stack+0x20/0x38 (C)
[   21.524828]  dump_stack_lvl+0x8c/0xd0
[   21.524885]  print_report+0x118/0x608
[   21.524938]  kasan_report+0xdc/0x128
[   21.524990]  kasan_check_range+0x100/0x1a8
[   21.525044]  __kasan_check_write+0x20/0x30
[   21.525095]  kasan_atomics_helper+0x684/0x4858
[   21.525149]  kasan_atomics+0x198/0x2e8
[   21.525200]  kunit_try_run_case+0x170/0x3f0
[   21.525254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.525310]  kthread+0x318/0x620
[   21.525359]  ret_from_fork+0x10/0x20
[   21.525415] 
[   21.529963] Allocated by task 254:
[   21.530202]  kasan_save_stack+0x3c/0x68
[   21.530846]  kasan_save_track+0x20/0x40
[   21.531100]  kasan_save_alloc_info+0x40/0x58
[   21.531383]  __kasan_kmalloc+0xd4/0xd8
[   21.531734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.532093]  kasan_atomics+0xb8/0x2e8
[   21.532343]  kunit_try_run_case+0x170/0x3f0
[   21.532522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.532785]  kthread+0x318/0x620
[   21.533228]  ret_from_fork+0x10/0x20
[   21.533526] 
[   21.533643] The buggy address belongs to the object at fff00000c66ea700
[   21.533643]  which belongs to the cache kmalloc-64 of size 64
[   21.534286] The buggy address is located 0 bytes to the right of
[   21.534286]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.535049] 
[   21.535328] The buggy address belongs to the physical page:
[   21.535588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.535987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.536343] page_type: f5(slab)
[   21.536575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.537325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.537710] page dumped because: kasan: bad access detected
[   21.538118] 
[   21.538323] Memory state around the buggy address:
[   21.538839]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.539373]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.539669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.539940]                                      ^
[   21.540149]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540417]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540676] ==================================================================
[   21.640672] ==================================================================
[   21.641166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   21.641643] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.642164] 
[   21.642416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.642573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.642612] Hardware name: linux,dummy-virt (DT)
[   21.642671] Call trace:
[   21.642701]  show_stack+0x20/0x38 (C)
[   21.642807]  dump_stack_lvl+0x8c/0xd0
[   21.642881]  print_report+0x118/0x608
[   21.642938]  kasan_report+0xdc/0x128
[   21.642993]  kasan_check_range+0x100/0x1a8
[   21.643051]  __kasan_check_write+0x20/0x30
[   21.643104]  kasan_atomics_helper+0x934/0x4858
[   21.643162]  kasan_atomics+0x198/0x2e8
[   21.643215]  kunit_try_run_case+0x170/0x3f0
[   21.643269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.643327]  kthread+0x318/0x620
[   21.643379]  ret_from_fork+0x10/0x20
[   21.643438] 
[   21.647045] Allocated by task 254:
[   21.647349]  kasan_save_stack+0x3c/0x68
[   21.647722]  kasan_save_track+0x20/0x40
[   21.648340]  kasan_save_alloc_info+0x40/0x58
[   21.648732]  __kasan_kmalloc+0xd4/0xd8
[   21.648977]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.649296]  kasan_atomics+0xb8/0x2e8
[   21.649539]  kunit_try_run_case+0x170/0x3f0
[   21.649818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.650262]  kthread+0x318/0x620
[   21.650620]  ret_from_fork+0x10/0x20
[   21.650888] 
[   21.651075] The buggy address belongs to the object at fff00000c66ea700
[   21.651075]  which belongs to the cache kmalloc-64 of size 64
[   21.651780] The buggy address is located 0 bytes to the right of
[   21.651780]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.652462] 
[   21.652669] The buggy address belongs to the physical page:
[   21.653038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.653505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.654027] page_type: f5(slab)
[   21.654277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.654829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.655282] page dumped because: kasan: bad access detected
[   21.655555] 
[   21.655703] Memory state around the buggy address:
[   21.656087]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.656464]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.656966] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.657378]                                      ^
[   21.657557]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.658030]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.658375] ==================================================================
[   21.501911] ==================================================================
[   21.502247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   21.502561] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.503202] 
[   21.503621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.503926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.503965] Hardware name: linux,dummy-virt (DT)
[   21.504004] Call trace:
[   21.504037]  show_stack+0x20/0x38 (C)
[   21.504101]  dump_stack_lvl+0x8c/0xd0
[   21.504338]  print_report+0x118/0x608
[   21.504406]  kasan_report+0xdc/0x128
[   21.504462]  kasan_check_range+0x100/0x1a8
[   21.504549]  __kasan_check_write+0x20/0x30
[   21.504606]  kasan_atomics_helper+0x61c/0x4858
[   21.504679]  kasan_atomics+0x198/0x2e8
[   21.504734]  kunit_try_run_case+0x170/0x3f0
[   21.504811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.504870]  kthread+0x318/0x620
[   21.504922]  ret_from_fork+0x10/0x20
[   21.504978] 
[   21.509106] Allocated by task 254:
[   21.509587]  kasan_save_stack+0x3c/0x68
[   21.509852]  kasan_save_track+0x20/0x40
[   21.510268]  kasan_save_alloc_info+0x40/0x58
[   21.510667]  __kasan_kmalloc+0xd4/0xd8
[   21.510998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.511264]  kasan_atomics+0xb8/0x2e8
[   21.511628]  kunit_try_run_case+0x170/0x3f0
[   21.512027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.512320]  kthread+0x318/0x620
[   21.512696]  ret_from_fork+0x10/0x20
[   21.513022] 
[   21.513224] The buggy address belongs to the object at fff00000c66ea700
[   21.513224]  which belongs to the cache kmalloc-64 of size 64
[   21.514147] The buggy address is located 0 bytes to the right of
[   21.514147]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.515466] 
[   21.515608] The buggy address belongs to the physical page:
[   21.515841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.516441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.516896] page_type: f5(slab)
[   21.517197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.517782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.518300] page dumped because: kasan: bad access detected
[   21.518640] 
[   21.518803] Memory state around the buggy address:
[   21.519007]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.519348]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.520122] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.520358]                                      ^
[   21.520539]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521119]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521579] ==================================================================
[   22.311616] ==================================================================
[   22.312048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.312666] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.313012] 
[   22.313227] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.313329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.313366] Hardware name: linux,dummy-virt (DT)
[   22.313406] Call trace:
[   22.313435]  show_stack+0x20/0x38 (C)
[   22.313495]  dump_stack_lvl+0x8c/0xd0
[   22.313551]  print_report+0x118/0x608
[   22.313603]  kasan_report+0xdc/0x128
[   22.313655]  kasan_check_range+0x100/0x1a8
[   22.313710]  __kasan_check_write+0x20/0x30
[   22.314081]  kasan_atomics_helper+0x16d0/0x4858
[   22.314146]  kasan_atomics+0x198/0x2e8
[   22.314203]  kunit_try_run_case+0x170/0x3f0
[   22.314259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.314320]  kthread+0x318/0x620
[   22.314375]  ret_from_fork+0x10/0x20
[   22.314434] 
[   22.317917] Allocated by task 254:
[   22.318301]  kasan_save_stack+0x3c/0x68
[   22.318624]  kasan_save_track+0x20/0x40
[   22.318856]  kasan_save_alloc_info+0x40/0x58
[   22.319263]  __kasan_kmalloc+0xd4/0xd8
[   22.319535]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.319933]  kasan_atomics+0xb8/0x2e8
[   22.320267]  kunit_try_run_case+0x170/0x3f0
[   22.320539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.320802]  kthread+0x318/0x620
[   22.321046]  ret_from_fork+0x10/0x20
[   22.321309] 
[   22.321453] The buggy address belongs to the object at fff00000c66ea700
[   22.321453]  which belongs to the cache kmalloc-64 of size 64
[   22.322070] The buggy address is located 0 bytes to the right of
[   22.322070]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.322450] 
[   22.322653] The buggy address belongs to the physical page:
[   22.323159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.323768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.324138] page_type: f5(slab)
[   22.324371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.324827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.325280] page dumped because: kasan: bad access detected
[   22.325597] 
[   22.325772] Memory state around the buggy address:
[   22.326031]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.326468]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.326866] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.327278]                                      ^
[   22.327604]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328042]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328403] ==================================================================
[   22.346099] ==================================================================
[   22.346420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.346998] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.347724] 
[   22.347877] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.347977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.348011] Hardware name: linux,dummy-virt (DT)
[   22.348071] Call trace:
[   22.348110]  show_stack+0x20/0x38 (C)
[   22.348172]  dump_stack_lvl+0x8c/0xd0
[   22.348225]  print_report+0x118/0x608
[   22.348278]  kasan_report+0xdc/0x128
[   22.348328]  kasan_check_range+0x100/0x1a8
[   22.348384]  __kasan_check_write+0x20/0x30
[   22.348433]  kasan_atomics_helper+0x175c/0x4858
[   22.348487]  kasan_atomics+0x198/0x2e8
[   22.348537]  kunit_try_run_case+0x170/0x3f0
[   22.348591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.348648]  kthread+0x318/0x620
[   22.348698]  ret_from_fork+0x10/0x20
[   22.348766] 
[   22.352045] Allocated by task 254:
[   22.352389]  kasan_save_stack+0x3c/0x68
[   22.352761]  kasan_save_track+0x20/0x40
[   22.352969]  kasan_save_alloc_info+0x40/0x58
[   22.353331]  __kasan_kmalloc+0xd4/0xd8
[   22.353622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.353889]  kasan_atomics+0xb8/0x2e8
[   22.354166]  kunit_try_run_case+0x170/0x3f0
[   22.354505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.354911]  kthread+0x318/0x620
[   22.355232]  ret_from_fork+0x10/0x20
[   22.355456] 
[   22.355645] The buggy address belongs to the object at fff00000c66ea700
[   22.355645]  which belongs to the cache kmalloc-64 of size 64
[   22.356086] The buggy address is located 0 bytes to the right of
[   22.356086]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.356811] 
[   22.357012] The buggy address belongs to the physical page:
[   22.357328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.357719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.358158] page_type: f5(slab)
[   22.358379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.358823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.359220] page dumped because: kasan: bad access detected
[   22.359497] 
[   22.359660] Memory state around the buggy address:
[   22.359935]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.360336]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.360712] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.361028]                                      ^
[   22.361212]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.361801]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.362083] ==================================================================
[   22.363643] ==================================================================
[   22.364322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.365138] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.366049] 
[   22.366431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.366668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.366706] Hardware name: linux,dummy-virt (DT)
[   22.366769] Call trace:
[   22.366803]  show_stack+0x20/0x38 (C)
[   22.366869]  dump_stack_lvl+0x8c/0xd0
[   22.366927]  print_report+0x118/0x608
[   22.366985]  kasan_report+0xdc/0x128
[   22.367039]  __asan_report_load8_noabort+0x20/0x30
[   22.367098]  kasan_atomics_helper+0x3e20/0x4858
[   22.367155]  kasan_atomics+0x198/0x2e8
[   22.367211]  kunit_try_run_case+0x170/0x3f0
[   22.367267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.367327]  kthread+0x318/0x620
[   22.367382]  ret_from_fork+0x10/0x20
[   22.367442] 
[   22.372157] Allocated by task 254:
[   22.372541]  kasan_save_stack+0x3c/0x68
[   22.372865]  kasan_save_track+0x20/0x40
[   22.373287]  kasan_save_alloc_info+0x40/0x58
[   22.373563]  __kasan_kmalloc+0xd4/0xd8
[   22.374003]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.374320]  kasan_atomics+0xb8/0x2e8
[   22.374731]  kunit_try_run_case+0x170/0x3f0
[   22.375130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.375466]  kthread+0x318/0x620
[   22.375852]  ret_from_fork+0x10/0x20
[   22.376220] 
[   22.376458] The buggy address belongs to the object at fff00000c66ea700
[   22.376458]  which belongs to the cache kmalloc-64 of size 64
[   22.376920] The buggy address is located 0 bytes to the right of
[   22.376920]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.377911] 
[   22.378115] The buggy address belongs to the physical page:
[   22.378485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.379259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.379648] page_type: f5(slab)
[   22.380053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.380576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.381152] page dumped because: kasan: bad access detected
[   22.381564] 
[   22.381718] Memory state around the buggy address:
[   22.382109]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.382654]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.383204] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.383612]                                      ^
[   22.383876]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384289]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384564] ==================================================================
[   22.251085] ==================================================================
[   22.251822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.252598] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.253464] 
[   22.253734] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.253943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.253981] Hardware name: linux,dummy-virt (DT)
[   22.254020] Call trace:
[   22.254052]  show_stack+0x20/0x38 (C)
[   22.254143]  dump_stack_lvl+0x8c/0xd0
[   22.254206]  print_report+0x118/0x608
[   22.254266]  kasan_report+0xdc/0x128
[   22.254321]  __asan_report_load8_noabort+0x20/0x30
[   22.254384]  kasan_atomics_helper+0x3db0/0x4858
[   22.254450]  kasan_atomics+0x198/0x2e8
[   22.254522]  kunit_try_run_case+0x170/0x3f0
[   22.254594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.254659]  kthread+0x318/0x620
[   22.254716]  ret_from_fork+0x10/0x20
[   22.254801] 
[   22.258161] Allocated by task 254:
[   22.258389]  kasan_save_stack+0x3c/0x68
[   22.258662]  kasan_save_track+0x20/0x40
[   22.259521]  kasan_save_alloc_info+0x40/0x58
[   22.259878]  __kasan_kmalloc+0xd4/0xd8
[   22.260192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.260478]  kasan_atomics+0xb8/0x2e8
[   22.260761]  kunit_try_run_case+0x170/0x3f0
[   22.261051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.261402]  kthread+0x318/0x620
[   22.261775]  ret_from_fork+0x10/0x20
[   22.262055] 
[   22.262260] The buggy address belongs to the object at fff00000c66ea700
[   22.262260]  which belongs to the cache kmalloc-64 of size 64
[   22.262824] The buggy address is located 0 bytes to the right of
[   22.262824]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.263421] 
[   22.263556] The buggy address belongs to the physical page:
[   22.264228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.264618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.265166] page_type: f5(slab)
[   22.265513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.266045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.266593] page dumped because: kasan: bad access detected
[   22.267238] 
[   22.267487] Memory state around the buggy address:
[   22.267689]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.268009]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.268332] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.268670]                                      ^
[   22.269576]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.270176]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.270724] ==================================================================
[   21.350873] ==================================================================
[   21.351207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   21.351617] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.352097] 
[   21.352264] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.352362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.352396] Hardware name: linux,dummy-virt (DT)
[   21.352435] Call trace:
[   21.352463]  show_stack+0x20/0x38 (C)
[   21.352522]  dump_stack_lvl+0x8c/0xd0
[   21.352579]  print_report+0x118/0x608
[   21.352631]  kasan_report+0xdc/0x128
[   21.352686]  kasan_check_range+0x100/0x1a8
[   21.352788]  __kasan_check_write+0x20/0x30
[   21.352846]  kasan_atomics_helper+0x32c/0x4858
[   21.352903]  kasan_atomics+0x198/0x2e8
[   21.352956]  kunit_try_run_case+0x170/0x3f0
[   21.353013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.353072]  kthread+0x318/0x620
[   21.353124]  ret_from_fork+0x10/0x20
[   21.353181] 
[   21.356233] Allocated by task 254:
[   21.356411]  kasan_save_stack+0x3c/0x68
[   21.356703]  kasan_save_track+0x20/0x40
[   21.357943]  kasan_save_alloc_info+0x40/0x58
[   21.358213]  __kasan_kmalloc+0xd4/0xd8
[   21.358436]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.358910]  kasan_atomics+0xb8/0x2e8
[   21.359127]  kunit_try_run_case+0x170/0x3f0
[   21.359368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.359706]  kthread+0x318/0x620
[   21.359981]  ret_from_fork+0x10/0x20
[   21.360204] 
[   21.360337] The buggy address belongs to the object at fff00000c66ea700
[   21.360337]  which belongs to the cache kmalloc-64 of size 64
[   21.360862] The buggy address is located 0 bytes to the right of
[   21.360862]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.361430] 
[   21.361541] The buggy address belongs to the physical page:
[   21.361819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.362196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.362549] page_type: f5(slab)
[   21.363462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.363808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.364143] page dumped because: kasan: bad access detected
[   21.364457] 
[   21.364599] Memory state around the buggy address:
[   21.364974]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.365284]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.365618] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.365941]                                      ^
[   21.366232]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.366599]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.366946] ==================================================================
[   22.218307] ==================================================================
[   22.218929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.219285] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.219646] 
[   22.219836] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.219938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.219974] Hardware name: linux,dummy-virt (DT)
[   22.220012] Call trace:
[   22.220042]  show_stack+0x20/0x38 (C)
[   22.220102]  dump_stack_lvl+0x8c/0xd0
[   22.220160]  print_report+0x118/0x608
[   22.220216]  kasan_report+0xdc/0x128
[   22.220267]  kasan_check_range+0x100/0x1a8
[   22.220321]  __kasan_check_write+0x20/0x30
[   22.220372]  kasan_atomics_helper+0x154c/0x4858
[   22.220426]  kasan_atomics+0x198/0x2e8
[   22.220478]  kunit_try_run_case+0x170/0x3f0
[   22.220532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.220589]  kthread+0x318/0x620
[   22.220640]  ret_from_fork+0x10/0x20
[   22.220694] 
[   22.223638] Allocated by task 254:
[   22.223868]  kasan_save_stack+0x3c/0x68
[   22.224130]  kasan_save_track+0x20/0x40
[   22.224423]  kasan_save_alloc_info+0x40/0x58
[   22.224642]  __kasan_kmalloc+0xd4/0xd8
[   22.224914]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.225177]  kasan_atomics+0xb8/0x2e8
[   22.225415]  kunit_try_run_case+0x170/0x3f0
[   22.225682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.225946]  kthread+0x318/0x620
[   22.226179]  ret_from_fork+0x10/0x20
[   22.226401] 
[   22.226534] The buggy address belongs to the object at fff00000c66ea700
[   22.226534]  which belongs to the cache kmalloc-64 of size 64
[   22.227002] The buggy address is located 0 bytes to the right of
[   22.227002]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.227594] 
[   22.227786] The buggy address belongs to the physical page:
[   22.227997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.228436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.228807] page_type: f5(slab)
[   22.229010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.229359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.229830] page dumped because: kasan: bad access detected
[   22.230111] 
[   22.230304] Memory state around the buggy address:
[   22.230595]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.231052]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.231387] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.231679]                                      ^
[   22.232034]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.232448]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.232784] ==================================================================
[   22.178304] ==================================================================
[   22.178796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.179374] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.179728] 
[   22.179895] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.180000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.180038] Hardware name: linux,dummy-virt (DT)
[   22.180076] Call trace:
[   22.180108]  show_stack+0x20/0x38 (C)
[   22.180172]  dump_stack_lvl+0x8c/0xd0
[   22.180229]  print_report+0x118/0x608
[   22.180284]  kasan_report+0xdc/0x128
[   22.180337]  kasan_check_range+0x100/0x1a8
[   22.180393]  __kasan_check_write+0x20/0x30
[   22.180445]  kasan_atomics_helper+0x147c/0x4858
[   22.180500]  kasan_atomics+0x198/0x2e8
[   22.180553]  kunit_try_run_case+0x170/0x3f0
[   22.180607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.180664]  kthread+0x318/0x620
[   22.180714]  ret_from_fork+0x10/0x20
[   22.180789] 
[   22.185345] Allocated by task 254:
[   22.185677]  kasan_save_stack+0x3c/0x68
[   22.185929]  kasan_save_track+0x20/0x40
[   22.186175]  kasan_save_alloc_info+0x40/0x58
[   22.186463]  __kasan_kmalloc+0xd4/0xd8
[   22.186695]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.186963]  kasan_atomics+0xb8/0x2e8
[   22.187190]  kunit_try_run_case+0x170/0x3f0
[   22.187462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.188327]  kthread+0x318/0x620
[   22.188570]  ret_from_fork+0x10/0x20
[   22.188760] 
[   22.189116] The buggy address belongs to the object at fff00000c66ea700
[   22.189116]  which belongs to the cache kmalloc-64 of size 64
[   22.189946] The buggy address is located 0 bytes to the right of
[   22.189946]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.190669] 
[   22.190864] The buggy address belongs to the physical page:
[   22.191121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.191462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.191781] page_type: f5(slab)
[   22.191994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.192326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.192651] page dumped because: kasan: bad access detected
[   22.193928] 
[   22.194080] Memory state around the buggy address:
[   22.194353]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.194773]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.195093] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.195547]                                      ^
[   22.195904]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.196424]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.196820] ==================================================================
[   21.732385] ==================================================================
[   21.732852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   21.733507] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.733944] 
[   21.734156] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.734258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.734292] Hardware name: linux,dummy-virt (DT)
[   21.734331] Call trace:
[   21.734359]  show_stack+0x20/0x38 (C)
[   21.734444]  dump_stack_lvl+0x8c/0xd0
[   21.734535]  print_report+0x118/0x608
[   21.734592]  kasan_report+0xdc/0x128
[   21.734667]  __asan_report_load4_noabort+0x20/0x30
[   21.734724]  kasan_atomics_helper+0x3dcc/0x4858
[   21.734797]  kasan_atomics+0x198/0x2e8
[   21.734854]  kunit_try_run_case+0x170/0x3f0
[   21.734913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.734976]  kthread+0x318/0x620
[   21.735029]  ret_from_fork+0x10/0x20
[   21.735118] 
[   21.738235] Allocated by task 254:
[   21.738588]  kasan_save_stack+0x3c/0x68
[   21.738907]  kasan_save_track+0x20/0x40
[   21.739278]  kasan_save_alloc_info+0x40/0x58
[   21.739572]  __kasan_kmalloc+0xd4/0xd8
[   21.739816]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.740002]  kasan_atomics+0xb8/0x2e8
[   21.740357]  kunit_try_run_case+0x170/0x3f0
[   21.740743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.741115]  kthread+0x318/0x620
[   21.741320]  ret_from_fork+0x10/0x20
[   21.741610] 
[   21.741818] The buggy address belongs to the object at fff00000c66ea700
[   21.741818]  which belongs to the cache kmalloc-64 of size 64
[   21.742382] The buggy address is located 0 bytes to the right of
[   21.742382]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.743185] 
[   21.743389] The buggy address belongs to the physical page:
[   21.743658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.744135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.744438] page_type: f5(slab)
[   21.744747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.745203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.745514] page dumped because: kasan: bad access detected
[   21.745924] 
[   21.746041] Memory state around the buggy address:
[   21.746381]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.746864]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.747189] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.747681]                                      ^
[   21.748016]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.748356]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.748758] ==================================================================
[   21.924103] ==================================================================
[   21.924531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.924916] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.925218] 
[   21.925431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.925535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.925573] Hardware name: linux,dummy-virt (DT)
[   21.925614] Call trace:
[   21.925644]  show_stack+0x20/0x38 (C)
[   21.925706]  dump_stack_lvl+0x8c/0xd0
[   21.926614]  print_report+0x118/0x608
[   21.926686]  kasan_report+0xdc/0x128
[   21.926750]  kasan_check_range+0x100/0x1a8
[   21.926811]  __kasan_check_write+0x20/0x30
[   21.926862]  kasan_atomics_helper+0xe44/0x4858
[   21.926918]  kasan_atomics+0x198/0x2e8
[   21.926970]  kunit_try_run_case+0x170/0x3f0
[   21.927023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927081]  kthread+0x318/0x620
[   21.927130]  ret_from_fork+0x10/0x20
[   21.927187] 
[   21.930577] Allocated by task 254:
[   21.930789]  kasan_save_stack+0x3c/0x68
[   21.931165]  kasan_save_track+0x20/0x40
[   21.931478]  kasan_save_alloc_info+0x40/0x58
[   21.931784]  __kasan_kmalloc+0xd4/0xd8
[   21.932117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.932392]  kasan_atomics+0xb8/0x2e8
[   21.932624]  kunit_try_run_case+0x170/0x3f0
[   21.933013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.933326]  kthread+0x318/0x620
[   21.933664]  ret_from_fork+0x10/0x20
[   21.933923] 
[   21.934060] The buggy address belongs to the object at fff00000c66ea700
[   21.934060]  which belongs to the cache kmalloc-64 of size 64
[   21.934632] The buggy address is located 0 bytes to the right of
[   21.934632]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.935365] 
[   21.935481] The buggy address belongs to the physical page:
[   21.935833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.936250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.936540] page_type: f5(slab)
[   21.936797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.937228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.937627] page dumped because: kasan: bad access detected
[   21.937892] 
[   21.938087] Memory state around the buggy address:
[   21.938359]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.938712]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.939074] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.939447]                                      ^
[   21.939700]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.939959]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.940173] ==================================================================
[   21.367825] ==================================================================
[   21.368219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   21.368622] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.370027] 
[   21.370209] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.370318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.370352] Hardware name: linux,dummy-virt (DT)
[   21.370393] Call trace:
[   21.370424]  show_stack+0x20/0x38 (C)
[   21.370506]  dump_stack_lvl+0x8c/0xd0
[   21.370565]  print_report+0x118/0x608
[   21.370621]  kasan_report+0xdc/0x128
[   21.370676]  __asan_report_store4_noabort+0x20/0x30
[   21.370734]  kasan_atomics_helper+0x3f94/0x4858
[   21.370824]  kasan_atomics+0x198/0x2e8
[   21.370878]  kunit_try_run_case+0x170/0x3f0
[   21.370935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.370994]  kthread+0x318/0x620
[   21.371046]  ret_from_fork+0x10/0x20
[   21.371103] 
[   21.374026] Allocated by task 254:
[   21.374256]  kasan_save_stack+0x3c/0x68
[   21.374439]  kasan_save_track+0x20/0x40
[   21.374798]  kasan_save_alloc_info+0x40/0x58
[   21.375050]  __kasan_kmalloc+0xd4/0xd8
[   21.375224]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.375611]  kasan_atomics+0xb8/0x2e8
[   21.375890]  kunit_try_run_case+0x170/0x3f0
[   21.376129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.376519]  kthread+0x318/0x620
[   21.376683]  ret_from_fork+0x10/0x20
[   21.376855] 
[   21.377021] The buggy address belongs to the object at fff00000c66ea700
[   21.377021]  which belongs to the cache kmalloc-64 of size 64
[   21.377630] The buggy address is located 0 bytes to the right of
[   21.377630]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.378305] 
[   21.378434] The buggy address belongs to the physical page:
[   21.378859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.379153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.379547] page_type: f5(slab)
[   21.379925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.380172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.380556] page dumped because: kasan: bad access detected
[   21.380958] 
[   21.381128] Memory state around the buggy address:
[   21.381415]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.381801]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.382125] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.382491]                                      ^
[   21.382766]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383523]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383840] ==================================================================
[   21.317668] ==================================================================
[   21.317954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   21.318438] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.318681] 
[   21.318816] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.318935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.318973] Hardware name: linux,dummy-virt (DT)
[   21.319014] Call trace:
[   21.319043]  show_stack+0x20/0x38 (C)
[   21.319103]  dump_stack_lvl+0x8c/0xd0
[   21.319159]  print_report+0x118/0x608
[   21.319214]  kasan_report+0xdc/0x128
[   21.319268]  kasan_check_range+0x100/0x1a8
[   21.319324]  __kasan_check_read+0x20/0x30
[   21.319377]  kasan_atomics_helper+0x2b0/0x4858
[   21.319433]  kasan_atomics+0x198/0x2e8
[   21.319485]  kunit_try_run_case+0x170/0x3f0
[   21.319542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.319600]  kthread+0x318/0x620
[   21.319650]  ret_from_fork+0x10/0x20
[   21.319705] 
[   21.323846] Allocated by task 254:
[   21.324163]  kasan_save_stack+0x3c/0x68
[   21.324423]  kasan_save_track+0x20/0x40
[   21.324680]  kasan_save_alloc_info+0x40/0x58
[   21.324856]  __kasan_kmalloc+0xd4/0xd8
[   21.325059]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.325403]  kasan_atomics+0xb8/0x2e8
[   21.325656]  kunit_try_run_case+0x170/0x3f0
[   21.325914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326235]  kthread+0x318/0x620
[   21.326637]  ret_from_fork+0x10/0x20
[   21.326874] 
[   21.327024] The buggy address belongs to the object at fff00000c66ea700
[   21.327024]  which belongs to the cache kmalloc-64 of size 64
[   21.327497] The buggy address is located 0 bytes to the right of
[   21.327497]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.328130] 
[   21.328302] The buggy address belongs to the physical page:
[   21.328656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.329007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.329401] page_type: f5(slab)
[   21.329668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.330040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.330449] page dumped because: kasan: bad access detected
[   21.330791] 
[   21.330917] Memory state around the buggy address:
[   21.331108]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.331500]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.331897] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.332160]                                      ^
[   21.332380]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.332611]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.333613] ==================================================================
[   21.887666] ==================================================================
[   21.888059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.888545] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.888926] 
[   21.889068] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.889161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.889194] Hardware name: linux,dummy-virt (DT)
[   21.889229] Call trace:
[   21.889256]  show_stack+0x20/0x38 (C)
[   21.889308]  dump_stack_lvl+0x8c/0xd0
[   21.889359]  print_report+0x118/0x608
[   21.889408]  kasan_report+0xdc/0x128
[   21.889457]  kasan_check_range+0x100/0x1a8
[   21.889506]  __kasan_check_read+0x20/0x30
[   21.889554]  kasan_atomics_helper+0xdd4/0x4858
[   21.889603]  kasan_atomics+0x198/0x2e8
[   21.889651]  kunit_try_run_case+0x170/0x3f0
[   21.889701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.889765]  kthread+0x318/0x620
[   21.889817]  ret_from_fork+0x10/0x20
[   21.889867] 
[   21.893897] Allocated by task 254:
[   21.894131]  kasan_save_stack+0x3c/0x68
[   21.894526]  kasan_save_track+0x20/0x40
[   21.894709]  kasan_save_alloc_info+0x40/0x58
[   21.894891]  __kasan_kmalloc+0xd4/0xd8
[   21.895327]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.895605]  kasan_atomics+0xb8/0x2e8
[   21.895791]  kunit_try_run_case+0x170/0x3f0
[   21.895967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.896447]  kthread+0x318/0x620
[   21.896777]  ret_from_fork+0x10/0x20
[   21.897059] 
[   21.897275] The buggy address belongs to the object at fff00000c66ea700
[   21.897275]  which belongs to the cache kmalloc-64 of size 64
[   21.897921] The buggy address is located 0 bytes to the right of
[   21.897921]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.898295] 
[   21.898483] The buggy address belongs to the physical page:
[   21.898925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.899468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.899835] page_type: f5(slab)
[   21.900145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.900700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.901097] page dumped because: kasan: bad access detected
[   21.901415] 
[   21.901532] Memory state around the buggy address:
[   21.901932]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.902311]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.902669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.903044]                                      ^
[   21.903292]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.903642]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   21.112768] ==================================================================
[   21.113188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   21.113663] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.113977] 
[   21.114179] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.114285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.114318] Hardware name: linux,dummy-virt (DT)
[   21.114378] Call trace:
[   21.114424]  show_stack+0x20/0x38 (C)
[   21.114487]  dump_stack_lvl+0x8c/0xd0
[   21.114543]  print_report+0x118/0x608
[   21.114791]  kasan_report+0xdc/0x128
[   21.114917]  kasan_check_range+0x100/0x1a8
[   21.114981]  __kasan_check_write+0x20/0x30
[   21.115035]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   21.115096]  kasan_bitops_generic+0x11c/0x1c8
[   21.115151]  kunit_try_run_case+0x170/0x3f0
[   21.115212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.115271]  kthread+0x318/0x620
[   21.115322]  ret_from_fork+0x10/0x20
[   21.115382] 
[   21.119292] Allocated by task 250:
[   21.119775]  kasan_save_stack+0x3c/0x68
[   21.120049]  kasan_save_track+0x20/0x40
[   21.120280]  kasan_save_alloc_info+0x40/0x58
[   21.120531]  __kasan_kmalloc+0xd4/0xd8
[   21.120761]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.121508]  kasan_bitops_generic+0xa0/0x1c8
[   21.121859]  kunit_try_run_case+0x170/0x3f0
[   21.122113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.122400]  kthread+0x318/0x620
[   21.122858]  ret_from_fork+0x10/0x20
[   21.123231] 
[   21.123437] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.123437]  which belongs to the cache kmalloc-16 of size 16
[   21.124404] The buggy address is located 8 bytes inside of
[   21.124404]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.125180] 
[   21.125382] The buggy address belongs to the physical page:
[   21.125799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.126122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.126708] page_type: f5(slab)
[   21.126892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.127278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.127649] page dumped because: kasan: bad access detected
[   21.127908] 
[   21.128046] Memory state around the buggy address:
[   21.128269]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128630]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.129339] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.129784]                                                           ^
[   21.131634]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.131986]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.132465] ==================================================================
[   21.184530] ==================================================================
[   21.184806] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   21.185416] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.185664] 
[   21.185861] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.185956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.185992] Hardware name: linux,dummy-virt (DT)
[   21.186029] Call trace:
[   21.186058]  show_stack+0x20/0x38 (C)
[   21.186127]  dump_stack_lvl+0x8c/0xd0
[   21.186186]  print_report+0x118/0x608
[   21.186243]  kasan_report+0xdc/0x128
[   21.186298]  kasan_check_range+0x100/0x1a8
[   21.186353]  __kasan_check_write+0x20/0x30
[   21.186404]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   21.186466]  kasan_bitops_generic+0x11c/0x1c8
[   21.186557]  kunit_try_run_case+0x170/0x3f0
[   21.186614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.186673]  kthread+0x318/0x620
[   21.186726]  ret_from_fork+0x10/0x20
[   21.186800] 
[   21.189648] Allocated by task 250:
[   21.189918]  kasan_save_stack+0x3c/0x68
[   21.190148]  kasan_save_track+0x20/0x40
[   21.190318]  kasan_save_alloc_info+0x40/0x58
[   21.190581]  __kasan_kmalloc+0xd4/0xd8
[   21.190911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.191145]  kasan_bitops_generic+0xa0/0x1c8
[   21.191502]  kunit_try_run_case+0x170/0x3f0
[   21.191733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192091]  kthread+0x318/0x620
[   21.192236]  ret_from_fork+0x10/0x20
[   21.192445] 
[   21.192601] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.192601]  which belongs to the cache kmalloc-16 of size 16
[   21.193274] The buggy address is located 8 bytes inside of
[   21.193274]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.193869] 
[   21.194034] The buggy address belongs to the physical page:
[   21.194319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.194695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.195044] page_type: f5(slab)
[   21.195296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.195566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.195950] page dumped because: kasan: bad access detected
[   21.196134] 
[   21.196306] Memory state around the buggy address:
[   21.196580]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.197027]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.197420] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.197734]                                                           ^
[   21.198100]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.198434]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.198723] ==================================================================
[   21.092622] ==================================================================
[   21.093014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   21.093654] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.094204] 
[   21.094425] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.094554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.094591] Hardware name: linux,dummy-virt (DT)
[   21.094631] Call trace:
[   21.094660]  show_stack+0x20/0x38 (C)
[   21.094721]  dump_stack_lvl+0x8c/0xd0
[   21.094794]  print_report+0x118/0x608
[   21.095541]  kasan_report+0xdc/0x128
[   21.095602]  __asan_report_load8_noabort+0x20/0x30
[   21.095661]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   21.095724]  kasan_bitops_generic+0x11c/0x1c8
[   21.095810]  kunit_try_run_case+0x170/0x3f0
[   21.095867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.095927]  kthread+0x318/0x620
[   21.095981]  ret_from_fork+0x10/0x20
[   21.096041] 
[   21.100347] Allocated by task 250:
[   21.100629]  kasan_save_stack+0x3c/0x68
[   21.100956]  kasan_save_track+0x20/0x40
[   21.101237]  kasan_save_alloc_info+0x40/0x58
[   21.101497]  __kasan_kmalloc+0xd4/0xd8
[   21.101771]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.102004]  kasan_bitops_generic+0xa0/0x1c8
[   21.102367]  kunit_try_run_case+0x170/0x3f0
[   21.102788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.103327]  kthread+0x318/0x620
[   21.103563]  ret_from_fork+0x10/0x20
[   21.103837] 
[   21.103989] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.103989]  which belongs to the cache kmalloc-16 of size 16
[   21.104609] The buggy address is located 8 bytes inside of
[   21.104609]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.105138] 
[   21.105242] The buggy address belongs to the physical page:
[   21.105682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.106241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.106710] page_type: f5(slab)
[   21.106942] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.107813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.108289] page dumped because: kasan: bad access detected
[   21.108603] 
[   21.108756] Memory state around the buggy address:
[   21.109000]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.109402]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.109802] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.110176]                                                           ^
[   21.110609]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111027]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111653] ==================================================================
[   21.072641] ==================================================================
[   21.073145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   21.073708] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.074030] 
[   21.074262] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.074367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.074426] Hardware name: linux,dummy-virt (DT)
[   21.074484] Call trace:
[   21.074798]  show_stack+0x20/0x38 (C)
[   21.074868]  dump_stack_lvl+0x8c/0xd0
[   21.074923]  print_report+0x118/0x608
[   21.074978]  kasan_report+0xdc/0x128
[   21.075029]  kasan_check_range+0x100/0x1a8
[   21.075085]  __kasan_check_write+0x20/0x30
[   21.075135]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   21.075195]  kasan_bitops_generic+0x11c/0x1c8
[   21.075249]  kunit_try_run_case+0x170/0x3f0
[   21.075302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.075359]  kthread+0x318/0x620
[   21.075408]  ret_from_fork+0x10/0x20
[   21.075464] 
[   21.079206] Allocated by task 250:
[   21.079488]  kasan_save_stack+0x3c/0x68
[   21.079771]  kasan_save_track+0x20/0x40
[   21.080097]  kasan_save_alloc_info+0x40/0x58
[   21.080515]  __kasan_kmalloc+0xd4/0xd8
[   21.080822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.081204]  kasan_bitops_generic+0xa0/0x1c8
[   21.081484]  kunit_try_run_case+0x170/0x3f0
[   21.081850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.082153]  kthread+0x318/0x620
[   21.082463]  ret_from_fork+0x10/0x20
[   21.082752] 
[   21.082901] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.082901]  which belongs to the cache kmalloc-16 of size 16
[   21.083531] The buggy address is located 8 bytes inside of
[   21.083531]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.084199] 
[   21.084356] The buggy address belongs to the physical page:
[   21.084556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.085761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.086323] page_type: f5(slab)
[   21.086568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.087254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.087928] page dumped because: kasan: bad access detected
[   21.088208] 
[   21.088402] Memory state around the buggy address:
[   21.088689]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.089259]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.089620] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.090029]                                                           ^
[   21.090372]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.090970]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.091359] ==================================================================
[   21.199523] ==================================================================
[   21.199840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   21.200263] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.200478] 
[   21.200666] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.200764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.200798] Hardware name: linux,dummy-virt (DT)
[   21.200833] Call trace:
[   21.200858]  show_stack+0x20/0x38 (C)
[   21.200914]  dump_stack_lvl+0x8c/0xd0
[   21.200965]  print_report+0x118/0x608
[   21.201017]  kasan_report+0xdc/0x128
[   21.201070]  __asan_report_load8_noabort+0x20/0x30
[   21.201121]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   21.201183]  kasan_bitops_generic+0x11c/0x1c8
[   21.201238]  kunit_try_run_case+0x170/0x3f0
[   21.201291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201350]  kthread+0x318/0x620
[   21.201402]  ret_from_fork+0x10/0x20
[   21.201456] 
[   21.205667] Allocated by task 250:
[   21.206063]  kasan_save_stack+0x3c/0x68
[   21.206389]  kasan_save_track+0x20/0x40
[   21.206559]  kasan_save_alloc_info+0x40/0x58
[   21.206728]  __kasan_kmalloc+0xd4/0xd8
[   21.207270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.207812]  kasan_bitops_generic+0xa0/0x1c8
[   21.208008]  kunit_try_run_case+0x170/0x3f0
[   21.208360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.208674]  kthread+0x318/0x620
[   21.208901]  ret_from_fork+0x10/0x20
[   21.209206] 
[   21.209331] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.209331]  which belongs to the cache kmalloc-16 of size 16
[   21.209883] The buggy address is located 8 bytes inside of
[   21.209883]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.210426] 
[   21.210616] The buggy address belongs to the physical page:
[   21.210892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.211362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.211798] page_type: f5(slab)
[   21.211993] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.212327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.212692] page dumped because: kasan: bad access detected
[   21.212975] 
[   21.213150] Memory state around the buggy address:
[   21.213436]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.213895]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.214260] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.214612]                                                           ^
[   21.214882]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215310]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215635] ==================================================================
[   21.133756] ==================================================================
[   21.134134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   21.134818] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.135871] 
[   21.136127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.136243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.136277] Hardware name: linux,dummy-virt (DT)
[   21.136314] Call trace:
[   21.136343]  show_stack+0x20/0x38 (C)
[   21.136405]  dump_stack_lvl+0x8c/0xd0
[   21.136458]  print_report+0x118/0x608
[   21.136511]  kasan_report+0xdc/0x128
[   21.136562]  __asan_report_load8_noabort+0x20/0x30
[   21.136614]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   21.136674]  kasan_bitops_generic+0x11c/0x1c8
[   21.136727]  kunit_try_run_case+0x170/0x3f0
[   21.136803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136859]  kthread+0x318/0x620
[   21.136909]  ret_from_fork+0x10/0x20
[   21.136965] 
[   21.140450] Allocated by task 250:
[   21.140732]  kasan_save_stack+0x3c/0x68
[   21.141036]  kasan_save_track+0x20/0x40
[   21.141333]  kasan_save_alloc_info+0x40/0x58
[   21.141712]  __kasan_kmalloc+0xd4/0xd8
[   21.141954]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.142313]  kasan_bitops_generic+0xa0/0x1c8
[   21.142591]  kunit_try_run_case+0x170/0x3f0
[   21.142934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.143297]  kthread+0x318/0x620
[   21.143590]  ret_from_fork+0x10/0x20
[   21.143854] 
[   21.143966] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.143966]  which belongs to the cache kmalloc-16 of size 16
[   21.144634] The buggy address is located 8 bytes inside of
[   21.144634]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.145330] 
[   21.145526] The buggy address belongs to the physical page:
[   21.145899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.146233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.146479] page_type: f5(slab)
[   21.146643] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.147113] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.147583] page dumped because: kasan: bad access detected
[   21.148006] 
[   21.148181] Memory state around the buggy address:
[   21.148510]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.149006]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.149427] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.149848]                                                           ^
[   21.150222]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.150684]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.151083] ==================================================================
[   21.169406] ==================================================================
[   21.169816] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   21.170238] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.170668] 
[   21.170880] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.170983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.171020] Hardware name: linux,dummy-virt (DT)
[   21.171058] Call trace:
[   21.171086]  show_stack+0x20/0x38 (C)
[   21.171146]  dump_stack_lvl+0x8c/0xd0
[   21.171204]  print_report+0x118/0x608
[   21.171257]  kasan_report+0xdc/0x128
[   21.171309]  __asan_report_load8_noabort+0x20/0x30
[   21.171366]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   21.171427]  kasan_bitops_generic+0x11c/0x1c8
[   21.171481]  kunit_try_run_case+0x170/0x3f0
[   21.171537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.171597]  kthread+0x318/0x620
[   21.171649]  ret_from_fork+0x10/0x20
[   21.171706] 
[   21.174313] Allocated by task 250:
[   21.174628]  kasan_save_stack+0x3c/0x68
[   21.174968]  kasan_save_track+0x20/0x40
[   21.175175]  kasan_save_alloc_info+0x40/0x58
[   21.175499]  __kasan_kmalloc+0xd4/0xd8
[   21.175708]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.175984]  kasan_bitops_generic+0xa0/0x1c8
[   21.176257]  kunit_try_run_case+0x170/0x3f0
[   21.176517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.176842]  kthread+0x318/0x620
[   21.177097]  ret_from_fork+0x10/0x20
[   21.177286] 
[   21.177391] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.177391]  which belongs to the cache kmalloc-16 of size 16
[   21.177720] The buggy address is located 8 bytes inside of
[   21.177720]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.178427] 
[   21.178595] The buggy address belongs to the physical page:
[   21.178884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.179334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.179633] page_type: f5(slab)
[   21.179861] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.180295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.180557] page dumped because: kasan: bad access detected
[   21.180877] 
[   21.181004] Memory state around the buggy address:
[   21.181341]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.181773]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.182147] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.182531]                                                           ^
[   21.182895]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183279]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183624] ==================================================================
[   21.152326] ==================================================================
[   21.152630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   21.153242] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.153777] 
[   21.153941] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.154041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.154085] Hardware name: linux,dummy-virt (DT)
[   21.154127] Call trace:
[   21.154176]  show_stack+0x20/0x38 (C)
[   21.154239]  dump_stack_lvl+0x8c/0xd0
[   21.154295]  print_report+0x118/0x608
[   21.154372]  kasan_report+0xdc/0x128
[   21.154435]  kasan_check_range+0x100/0x1a8
[   21.154493]  __kasan_check_write+0x20/0x30
[   21.154547]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   21.155063]  kasan_bitops_generic+0x11c/0x1c8
[   21.155173]  kunit_try_run_case+0x170/0x3f0
[   21.155237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.155301]  kthread+0x318/0x620
[   21.155357]  ret_from_fork+0x10/0x20
[   21.155416] 
[   21.158097] Allocated by task 250:
[   21.158281]  kasan_save_stack+0x3c/0x68
[   21.158467]  kasan_save_track+0x20/0x40
[   21.158629]  kasan_save_alloc_info+0x40/0x58
[   21.158870]  __kasan_kmalloc+0xd4/0xd8
[   21.159164]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.159487]  kasan_bitops_generic+0xa0/0x1c8
[   21.159871]  kunit_try_run_case+0x170/0x3f0
[   21.160216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.160546]  kthread+0x318/0x620
[   21.160789]  ret_from_fork+0x10/0x20
[   21.161043] 
[   21.161215] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.161215]  which belongs to the cache kmalloc-16 of size 16
[   21.162006] The buggy address is located 8 bytes inside of
[   21.162006]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.162588] 
[   21.162735] The buggy address belongs to the physical page:
[   21.163314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.163774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.164126] page_type: f5(slab)
[   21.164451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.164965] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.165379] page dumped because: kasan: bad access detected
[   21.165762] 
[   21.165903] Memory state around the buggy address:
[   21.166207]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.166627]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.166870] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.167342]                                                           ^
[   21.167922]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.168264]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.168634] ==================================================================
[   21.216459] ==================================================================
[   21.216843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   21.217141] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.217420] 
[   21.217561] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.217661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.217695] Hardware name: linux,dummy-virt (DT)
[   21.217732] Call trace:
[   21.217781]  show_stack+0x20/0x38 (C)
[   21.217839]  dump_stack_lvl+0x8c/0xd0
[   21.217926]  print_report+0x118/0x608
[   21.217981]  kasan_report+0xdc/0x128
[   21.218035]  __asan_report_load8_noabort+0x20/0x30
[   21.218136]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   21.218212]  kasan_bitops_generic+0x11c/0x1c8
[   21.218267]  kunit_try_run_case+0x170/0x3f0
[   21.218324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.218383]  kthread+0x318/0x620
[   21.218433]  ret_from_fork+0x10/0x20
[   21.218510] 
[   21.220634] Allocated by task 250:
[   21.221528]  kasan_save_stack+0x3c/0x68
[   21.221898]  kasan_save_track+0x20/0x40
[   21.222080]  kasan_save_alloc_info+0x40/0x58
[   21.222408]  __kasan_kmalloc+0xd4/0xd8
[   21.222854]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.223175]  kasan_bitops_generic+0xa0/0x1c8
[   21.223359]  kunit_try_run_case+0x170/0x3f0
[   21.223697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.223997]  kthread+0x318/0x620
[   21.224289]  ret_from_fork+0x10/0x20
[   21.224502] 
[   21.224637] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.224637]  which belongs to the cache kmalloc-16 of size 16
[   21.225148] The buggy address is located 8 bytes inside of
[   21.225148]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.225766] 
[   21.225916] The buggy address belongs to the physical page:
[   21.226212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.226568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.226974] page_type: f5(slab)
[   21.227291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.227651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.227963] page dumped because: kasan: bad access detected
[   21.228195] 
[   21.228379] Memory state around the buggy address:
[   21.228671]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.228939]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.229319] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.229689]                                                           ^
[   21.230014]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.230324]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.230657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   21.010715] ==================================================================
[   21.011253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   21.011719] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.012052] 
[   21.012227] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.012320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.012352] Hardware name: linux,dummy-virt (DT)
[   21.012390] Call trace:
[   21.012418]  show_stack+0x20/0x38 (C)
[   21.012474]  dump_stack_lvl+0x8c/0xd0
[   21.012528]  print_report+0x118/0x608
[   21.012580]  kasan_report+0xdc/0x128
[   21.012629]  kasan_check_range+0x100/0x1a8
[   21.012683]  __kasan_check_write+0x20/0x30
[   21.013050]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   21.013120]  kasan_bitops_generic+0x110/0x1c8
[   21.013175]  kunit_try_run_case+0x170/0x3f0
[   21.013230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013285]  kthread+0x318/0x620
[   21.013333]  ret_from_fork+0x10/0x20
[   21.013387] 
[   21.017535] Allocated by task 250:
[   21.017973]  kasan_save_stack+0x3c/0x68
[   21.018375]  kasan_save_track+0x20/0x40
[   21.018885]  kasan_save_alloc_info+0x40/0x58
[   21.019207]  __kasan_kmalloc+0xd4/0xd8
[   21.019919]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.020235]  kasan_bitops_generic+0xa0/0x1c8
[   21.020445]  kunit_try_run_case+0x170/0x3f0
[   21.020653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.020881]  kthread+0x318/0x620
[   21.021066]  ret_from_fork+0x10/0x20
[   21.021241] 
[   21.021365] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.021365]  which belongs to the cache kmalloc-16 of size 16
[   21.021817] The buggy address is located 8 bytes inside of
[   21.021817]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.023151] 
[   21.023326] The buggy address belongs to the physical page:
[   21.023624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.024125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.024545] page_type: f5(slab)
[   21.024826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.025127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.025471] page dumped because: kasan: bad access detected
[   21.026018] 
[   21.026271] Memory state around the buggy address:
[   21.027375]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.027808]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.028320] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.028707]                                                           ^
[   21.029010]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.029474]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.029889] ==================================================================
[   20.883267] ==================================================================
[   20.883679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   20.884216] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.884565] 
[   20.884692] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.884836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.884875] Hardware name: linux,dummy-virt (DT)
[   20.885045] Call trace:
[   20.885219]  show_stack+0x20/0x38 (C)
[   20.885283]  dump_stack_lvl+0x8c/0xd0
[   20.885340]  print_report+0x118/0x608
[   20.885398]  kasan_report+0xdc/0x128
[   20.885452]  __asan_report_load8_noabort+0x20/0x30
[   20.885506]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   20.885567]  kasan_bitops_generic+0x110/0x1c8
[   20.885622]  kunit_try_run_case+0x170/0x3f0
[   20.885676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.885753]  kthread+0x318/0x620
[   20.885813]  ret_from_fork+0x10/0x20
[   20.885875] 
[   20.889791] Allocated by task 250:
[   20.889978]  kasan_save_stack+0x3c/0x68
[   20.890222]  kasan_save_track+0x20/0x40
[   20.890397]  kasan_save_alloc_info+0x40/0x58
[   20.890594]  __kasan_kmalloc+0xd4/0xd8
[   20.891958]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.892269]  kasan_bitops_generic+0xa0/0x1c8
[   20.892810]  kunit_try_run_case+0x170/0x3f0
[   20.893196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.894079]  kthread+0x318/0x620
[   20.894366]  ret_from_fork+0x10/0x20
[   20.894540] 
[   20.894716] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.894716]  which belongs to the cache kmalloc-16 of size 16
[   20.895239] The buggy address is located 8 bytes inside of
[   20.895239]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.895726] 
[   20.896356] The buggy address belongs to the physical page:
[   20.896548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.897334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.897821] page_type: f5(slab)
[   20.898106] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.898704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.899339] page dumped because: kasan: bad access detected
[   20.899802] 
[   20.899946] Memory state around the buggy address:
[   20.900416]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.900846]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.901199] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.901510]                                                           ^
[   20.901808]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.902146]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.902488] ==================================================================
[   20.926036] ==================================================================
[   20.927063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   20.927577] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.928034] 
[   20.928219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.928328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.928364] Hardware name: linux,dummy-virt (DT)
[   20.928408] Call trace:
[   20.928438]  show_stack+0x20/0x38 (C)
[   20.928502]  dump_stack_lvl+0x8c/0xd0
[   20.928566]  print_report+0x118/0x608
[   20.928625]  kasan_report+0xdc/0x128
[   20.928679]  __asan_report_load8_noabort+0x20/0x30
[   20.929649]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   20.929764]  kasan_bitops_generic+0x110/0x1c8
[   20.929828]  kunit_try_run_case+0x170/0x3f0
[   20.929887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.929948]  kthread+0x318/0x620
[   20.930003]  ret_from_fork+0x10/0x20
[   20.930071] 
[   20.933270] Allocated by task 250:
[   20.933444]  kasan_save_stack+0x3c/0x68
[   20.933639]  kasan_save_track+0x20/0x40
[   20.934131]  kasan_save_alloc_info+0x40/0x58
[   20.935077]  __kasan_kmalloc+0xd4/0xd8
[   20.935667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.936132]  kasan_bitops_generic+0xa0/0x1c8
[   20.936517]  kunit_try_run_case+0x170/0x3f0
[   20.936761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.936959]  kthread+0x318/0x620
[   20.937302]  ret_from_fork+0x10/0x20
[   20.937542] 
[   20.937735] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.937735]  which belongs to the cache kmalloc-16 of size 16
[   20.938297] The buggy address is located 8 bytes inside of
[   20.938297]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.939094] 
[   20.939237] The buggy address belongs to the physical page:
[   20.939442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.939720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.939991] page_type: f5(slab)
[   20.940178] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.940454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.940721] page dumped because: kasan: bad access detected
[   20.941661] 
[   20.941791] Memory state around the buggy address:
[   20.941966]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.942865]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.943912] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.944339]                                                           ^
[   20.944818]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945311]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945815] ==================================================================
[   20.969153] ==================================================================
[   20.969801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   20.970243] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.970548] 
[   20.971733] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.971872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.971907] Hardware name: linux,dummy-virt (DT)
[   20.971945] Call trace:
[   20.971976]  show_stack+0x20/0x38 (C)
[   20.972038]  dump_stack_lvl+0x8c/0xd0
[   20.972090]  print_report+0x118/0x608
[   20.972142]  kasan_report+0xdc/0x128
[   20.972191]  kasan_check_range+0x100/0x1a8
[   20.972242]  __kasan_check_write+0x20/0x30
[   20.972292]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   20.972347]  kasan_bitops_generic+0x110/0x1c8
[   20.972397]  kunit_try_run_case+0x170/0x3f0
[   20.972448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.972505]  kthread+0x318/0x620
[   20.972555]  ret_from_fork+0x10/0x20
[   20.972612] 
[   20.976422] Allocated by task 250:
[   20.976608]  kasan_save_stack+0x3c/0x68
[   20.976826]  kasan_save_track+0x20/0x40
[   20.977019]  kasan_save_alloc_info+0x40/0x58
[   20.977220]  __kasan_kmalloc+0xd4/0xd8
[   20.977406]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.977600]  kasan_bitops_generic+0xa0/0x1c8
[   20.978938]  kunit_try_run_case+0x170/0x3f0
[   20.979459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.980024]  kthread+0x318/0x620
[   20.980255]  ret_from_fork+0x10/0x20
[   20.980568] 
[   20.980713] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.980713]  which belongs to the cache kmalloc-16 of size 16
[   20.981265] The buggy address is located 8 bytes inside of
[   20.981265]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.982346] 
[   20.982884] The buggy address belongs to the physical page:
[   20.983191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.983724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.984182] page_type: f5(slab)
[   20.984449] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.984952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.985369] page dumped because: kasan: bad access detected
[   20.985702] 
[   20.985820] Memory state around the buggy address:
[   20.986283]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.987449]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.987909] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.988323]                                                           ^
[   20.988670]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989091]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989522] ==================================================================
[   21.030809] ==================================================================
[   21.031128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   21.032147] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.032655] 
[   21.032905] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.033031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.033070] Hardware name: linux,dummy-virt (DT)
[   21.033126] Call trace:
[   21.033167]  show_stack+0x20/0x38 (C)
[   21.033234]  dump_stack_lvl+0x8c/0xd0
[   21.033291]  print_report+0x118/0x608
[   21.033344]  kasan_report+0xdc/0x128
[   21.033400]  kasan_check_range+0x100/0x1a8
[   21.033456]  __kasan_check_write+0x20/0x30
[   21.033508]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   21.033571]  kasan_bitops_generic+0x110/0x1c8
[   21.033629]  kunit_try_run_case+0x170/0x3f0
[   21.033683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.033762]  kthread+0x318/0x620
[   21.033820]  ret_from_fork+0x10/0x20
[   21.033879] 
[   21.038158] Allocated by task 250:
[   21.038484]  kasan_save_stack+0x3c/0x68
[   21.038883]  kasan_save_track+0x20/0x40
[   21.039472]  kasan_save_alloc_info+0x40/0x58
[   21.039886]  __kasan_kmalloc+0xd4/0xd8
[   21.040162]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.040426]  kasan_bitops_generic+0xa0/0x1c8
[   21.040731]  kunit_try_run_case+0x170/0x3f0
[   21.041113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.041427]  kthread+0x318/0x620
[   21.041679]  ret_from_fork+0x10/0x20
[   21.041922] 
[   21.042107] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.042107]  which belongs to the cache kmalloc-16 of size 16
[   21.043050] The buggy address is located 8 bytes inside of
[   21.043050]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.043908] 
[   21.044093] The buggy address belongs to the physical page:
[   21.044439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.044961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.045331] page_type: f5(slab)
[   21.045529] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.045944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.046317] page dumped because: kasan: bad access detected
[   21.046755] 
[   21.046900] Memory state around the buggy address:
[   21.047502]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.047893]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.048144] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.048715]                                                           ^
[   21.049050]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.049386]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.049710] ==================================================================
[   20.990428] ==================================================================
[   20.991094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   20.991511] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.991806] 
[   20.991976] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.992078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.992112] Hardware name: linux,dummy-virt (DT)
[   20.992149] Call trace:
[   20.992176]  show_stack+0x20/0x38 (C)
[   20.992232]  dump_stack_lvl+0x8c/0xd0
[   20.992285]  print_report+0x118/0x608
[   20.992336]  kasan_report+0xdc/0x128
[   20.992386]  __asan_report_load8_noabort+0x20/0x30
[   20.992439]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   20.992494]  kasan_bitops_generic+0x110/0x1c8
[   20.992546]  kunit_try_run_case+0x170/0x3f0
[   20.992600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.992656]  kthread+0x318/0x620
[   20.992707]  ret_from_fork+0x10/0x20
[   20.993107] 
[   20.996683] Allocated by task 250:
[   20.996893]  kasan_save_stack+0x3c/0x68
[   20.997100]  kasan_save_track+0x20/0x40
[   20.997283]  kasan_save_alloc_info+0x40/0x58
[   20.997475]  __kasan_kmalloc+0xd4/0xd8
[   20.997666]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.997941]  kasan_bitops_generic+0xa0/0x1c8
[   20.998195]  kunit_try_run_case+0x170/0x3f0
[   20.998626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.999102]  kthread+0x318/0x620
[   20.999451]  ret_from_fork+0x10/0x20
[   20.999876] 
[   21.000065] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.000065]  which belongs to the cache kmalloc-16 of size 16
[   21.000949] The buggy address is located 8 bytes inside of
[   21.000949]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.001695] 
[   21.001937] The buggy address belongs to the physical page:
[   21.002240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.003712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.004060] page_type: f5(slab)
[   21.004224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.004833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.005209] page dumped because: kasan: bad access detected
[   21.005467] 
[   21.005615] Memory state around the buggy address:
[   21.006102]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.006632]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.007070] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.007764]                                                           ^
[   21.008284]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.008721]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009153] ==================================================================
[   20.904375] ==================================================================
[   20.904688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   20.905155] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.905892] 
[   20.906139] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.906320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.906360] Hardware name: linux,dummy-virt (DT)
[   20.906402] Call trace:
[   20.906435]  show_stack+0x20/0x38 (C)
[   20.906547]  dump_stack_lvl+0x8c/0xd0
[   20.906612]  print_report+0x118/0x608
[   20.906670]  kasan_report+0xdc/0x128
[   20.906722]  kasan_check_range+0x100/0x1a8
[   20.906803]  __kasan_check_write+0x20/0x30
[   20.906855]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   20.906915]  kasan_bitops_generic+0x110/0x1c8
[   20.906969]  kunit_try_run_case+0x170/0x3f0
[   20.907730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.907815]  kthread+0x318/0x620
[   20.907870]  ret_from_fork+0x10/0x20
[   20.907930] 
[   20.912107] Allocated by task 250:
[   20.912549]  kasan_save_stack+0x3c/0x68
[   20.912903]  kasan_save_track+0x20/0x40
[   20.913236]  kasan_save_alloc_info+0x40/0x58
[   20.913576]  __kasan_kmalloc+0xd4/0xd8
[   20.913926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.914311]  kasan_bitops_generic+0xa0/0x1c8
[   20.914750]  kunit_try_run_case+0x170/0x3f0
[   20.915812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.916279]  kthread+0x318/0x620
[   20.916573]  ret_from_fork+0x10/0x20
[   20.916791] 
[   20.916932] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.916932]  which belongs to the cache kmalloc-16 of size 16
[   20.917433] The buggy address is located 8 bytes inside of
[   20.917433]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.918271] 
[   20.918488] The buggy address belongs to the physical page:
[   20.919162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.919749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.920114] page_type: f5(slab)
[   20.920406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.920969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.921423] page dumped because: kasan: bad access detected
[   20.921830] 
[   20.922045] Memory state around the buggy address:
[   20.922415]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.922781]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.923145] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.923469]                                                           ^
[   20.923735]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.925123]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.925366] ==================================================================
[   21.051278] ==================================================================
[   21.051567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   21.051973] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   21.052533] 
[   21.052690] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.053425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.053472] Hardware name: linux,dummy-virt (DT)
[   21.053511] Call trace:
[   21.053542]  show_stack+0x20/0x38 (C)
[   21.053611]  dump_stack_lvl+0x8c/0xd0
[   21.053668]  print_report+0x118/0x608
[   21.053721]  kasan_report+0xdc/0x128
[   21.053803]  __asan_report_load8_noabort+0x20/0x30
[   21.053859]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   21.053921]  kasan_bitops_generic+0x110/0x1c8
[   21.053978]  kunit_try_run_case+0x170/0x3f0
[   21.054034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.054107]  kthread+0x318/0x620
[   21.054165]  ret_from_fork+0x10/0x20
[   21.054225] 
[   21.058452] Allocated by task 250:
[   21.059453]  kasan_save_stack+0x3c/0x68
[   21.059967]  kasan_save_track+0x20/0x40
[   21.060248]  kasan_save_alloc_info+0x40/0x58
[   21.060509]  __kasan_kmalloc+0xd4/0xd8
[   21.060768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.061055]  kasan_bitops_generic+0xa0/0x1c8
[   21.061325]  kunit_try_run_case+0x170/0x3f0
[   21.061575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.061882]  kthread+0x318/0x620
[   21.062049]  ret_from_fork+0x10/0x20
[   21.062382] 
[   21.062704] The buggy address belongs to the object at fff00000c1e7a0e0
[   21.062704]  which belongs to the cache kmalloc-16 of size 16
[   21.063857] The buggy address is located 8 bytes inside of
[   21.063857]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   21.064626] 
[   21.064851] The buggy address belongs to the physical page:
[   21.065155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   21.065625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.065985] page_type: f5(slab)
[   21.066334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.066959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.067392] page dumped because: kasan: bad access detected
[   21.068243] 
[   21.068563] Memory state around the buggy address:
[   21.068829]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069328]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.069734] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   21.070164]                                                           ^
[   21.070664]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.071041]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.071641] ==================================================================
[   20.947059] ==================================================================
[   20.947357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   20.947616] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.948173] 
[   20.948341] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.948435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.948468] Hardware name: linux,dummy-virt (DT)
[   20.948505] Call trace:
[   20.948531]  show_stack+0x20/0x38 (C)
[   20.948586]  dump_stack_lvl+0x8c/0xd0
[   20.948638]  print_report+0x118/0x608
[   20.948687]  kasan_report+0xdc/0x128
[   20.948735]  kasan_check_range+0x100/0x1a8
[   20.949433]  __kasan_check_write+0x20/0x30
[   20.949489]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   20.949547]  kasan_bitops_generic+0x110/0x1c8
[   20.949598]  kunit_try_run_case+0x170/0x3f0
[   20.949651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949704]  kthread+0x318/0x620
[   20.949765]  ret_from_fork+0x10/0x20
[   20.949821] 
[   20.954421] Allocated by task 250:
[   20.955078]  kasan_save_stack+0x3c/0x68
[   20.955381]  kasan_save_track+0x20/0x40
[   20.955607]  kasan_save_alloc_info+0x40/0x58
[   20.955842]  __kasan_kmalloc+0xd4/0xd8
[   20.956069]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.956323]  kasan_bitops_generic+0xa0/0x1c8
[   20.956570]  kunit_try_run_case+0x170/0x3f0
[   20.957780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958014]  kthread+0x318/0x620
[   20.958373]  ret_from_fork+0x10/0x20
[   20.959015] 
[   20.959136] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.959136]  which belongs to the cache kmalloc-16 of size 16
[   20.959729] The buggy address is located 8 bytes inside of
[   20.959729]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.960704] 
[   20.961030] The buggy address belongs to the physical page:
[   20.961340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.961798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.962316] page_type: f5(slab)
[   20.963811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.964111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.964517] page dumped because: kasan: bad access detected
[   20.964946] 
[   20.965191] Memory state around the buggy address:
[   20.965494]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.965933]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.966405] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.966843]                                                           ^
[   20.967270]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967786]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.968329] ==================================================================
[   20.862278] ==================================================================
[   20.863279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   20.863823] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250
[   20.864047] 
[   20.864238] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.864341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.864377] Hardware name: linux,dummy-virt (DT)
[   20.864418] Call trace:
[   20.864450]  show_stack+0x20/0x38 (C)
[   20.864511]  dump_stack_lvl+0x8c/0xd0
[   20.864568]  print_report+0x118/0x608
[   20.864640]  kasan_report+0xdc/0x128
[   20.864688]  kasan_check_range+0x100/0x1a8
[   20.864753]  __kasan_check_write+0x20/0x30
[   20.864833]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   20.864895]  kasan_bitops_generic+0x110/0x1c8
[   20.864950]  kunit_try_run_case+0x170/0x3f0
[   20.865027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.865091]  kthread+0x318/0x620
[   20.865144]  ret_from_fork+0x10/0x20
[   20.865225] 
[   20.868822] Allocated by task 250:
[   20.869023]  kasan_save_stack+0x3c/0x68
[   20.869249]  kasan_save_track+0x20/0x40
[   20.869439]  kasan_save_alloc_info+0x40/0x58
[   20.869646]  __kasan_kmalloc+0xd4/0xd8
[   20.870755]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.870965]  kasan_bitops_generic+0xa0/0x1c8
[   20.871140]  kunit_try_run_case+0x170/0x3f0
[   20.871307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.871498]  kthread+0x318/0x620
[   20.872210]  ret_from_fork+0x10/0x20
[   20.872417] 
[   20.872556] The buggy address belongs to the object at fff00000c1e7a0e0
[   20.872556]  which belongs to the cache kmalloc-16 of size 16
[   20.873689] The buggy address is located 8 bytes inside of
[   20.873689]  allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9)
[   20.874369] 
[   20.874820] The buggy address belongs to the physical page:
[   20.875236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   20.875724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.876223] page_type: f5(slab)
[   20.876461] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.876872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.877271] page dumped because: kasan: bad access detected
[   20.877537] 
[   20.877692] Memory state around the buggy address:
[   20.878044]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878509]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.878765] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   20.879255]                                                           ^
[   20.880424]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.880980]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.881435] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   20.834207] ==================================================================
[   20.834719] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   20.836304] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248
[   20.836866] 
[   20.837025] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.837124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.837158] Hardware name: linux,dummy-virt (DT)
[   20.837196] Call trace:
[   20.837224]  show_stack+0x20/0x38 (C)
[   20.837289]  dump_stack_lvl+0x8c/0xd0
[   20.837343]  print_report+0x118/0x608
[   20.837400]  kasan_report+0xdc/0x128
[   20.837453]  __asan_report_load1_noabort+0x20/0x30
[   20.837507]  strnlen+0x80/0x88
[   20.837556]  kasan_strings+0x364/0x8d8
[   20.837607]  kunit_try_run_case+0x170/0x3f0
[   20.837661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.837718]  kthread+0x318/0x620
[   20.837795]  ret_from_fork+0x10/0x20
[   20.837852] 
[   20.841698] Allocated by task 248:
[   20.842018]  kasan_save_stack+0x3c/0x68
[   20.842295]  kasan_save_track+0x20/0x40
[   20.842658]  kasan_save_alloc_info+0x40/0x58
[   20.843028]  __kasan_kmalloc+0xd4/0xd8
[   20.843203]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.843573]  kasan_strings+0xb0/0x8d8
[   20.843783]  kunit_try_run_case+0x170/0x3f0
[   20.844044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.844304]  kthread+0x318/0x620
[   20.844534]  ret_from_fork+0x10/0x20
[   20.844723] 
[   20.844998] Freed by task 248:
[   20.845297]  kasan_save_stack+0x3c/0x68
[   20.845516]  kasan_save_track+0x20/0x40
[   20.845782]  kasan_save_free_info+0x4c/0x78
[   20.845955]  __kasan_slab_free+0x6c/0x98
[   20.846135]  kfree+0x214/0x3c8
[   20.846366]  kasan_strings+0x124/0x8d8
[   20.846858]  kunit_try_run_case+0x170/0x3f0
[   20.847332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.847696]  kthread+0x318/0x620
[   20.847869]  ret_from_fork+0x10/0x20
[   20.848232] 
[   20.848427] The buggy address belongs to the object at fff00000c66e72c0
[   20.848427]  which belongs to the cache kmalloc-32 of size 32
[   20.849106] The buggy address is located 16 bytes inside of
[   20.849106]  freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0)
[   20.849596] 
[   20.849811] The buggy address belongs to the physical page:
[   20.850139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7
[   20.850816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.851389] page_type: f5(slab)
[   20.851632] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.852049] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.852458] page dumped because: kasan: bad access detected
[   20.852775] 
[   20.852976] Memory state around the buggy address:
[   20.853204]  fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.853678]  fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.854236] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.854983]                                                  ^
[   20.855268]  fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.855514]  fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.855733] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   20.811335] ==================================================================
[   20.811722] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   20.811991] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248
[   20.812254] 
[   20.812392] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.812500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.812537] Hardware name: linux,dummy-virt (DT)
[   20.812580] Call trace:
[   20.812612]  show_stack+0x20/0x38 (C)
[   20.812680]  dump_stack_lvl+0x8c/0xd0
[   20.813493]  print_report+0x118/0x608
[   20.813775]  kasan_report+0xdc/0x128
[   20.813849]  __asan_report_load1_noabort+0x20/0x30
[   20.813911]  strlen+0xa8/0xb0
[   20.813965]  kasan_strings+0x304/0x8d8
[   20.814022]  kunit_try_run_case+0x170/0x3f0
[   20.814113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.814181]  kthread+0x318/0x620
[   20.814238]  ret_from_fork+0x10/0x20
[   20.814299] 
[   20.817660] Allocated by task 248:
[   20.818029]  kasan_save_stack+0x3c/0x68
[   20.818374]  kasan_save_track+0x20/0x40
[   20.818632]  kasan_save_alloc_info+0x40/0x58
[   20.818972]  __kasan_kmalloc+0xd4/0xd8
[   20.819240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.819535]  kasan_strings+0xb0/0x8d8
[   20.819731]  kunit_try_run_case+0x170/0x3f0
[   20.820126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.820475]  kthread+0x318/0x620
[   20.820647]  ret_from_fork+0x10/0x20
[   20.821213] 
[   20.821430] Freed by task 248:
[   20.821703]  kasan_save_stack+0x3c/0x68
[   20.822084]  kasan_save_track+0x20/0x40
[   20.822401]  kasan_save_free_info+0x4c/0x78
[   20.822887]  __kasan_slab_free+0x6c/0x98
[   20.823200]  kfree+0x214/0x3c8
[   20.823495]  kasan_strings+0x124/0x8d8
[   20.823752]  kunit_try_run_case+0x170/0x3f0
[   20.824048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.824399]  kthread+0x318/0x620
[   20.824620]  ret_from_fork+0x10/0x20
[   20.824938] 
[   20.825135] The buggy address belongs to the object at fff00000c66e72c0
[   20.825135]  which belongs to the cache kmalloc-32 of size 32
[   20.825725] The buggy address is located 16 bytes inside of
[   20.825725]  freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0)
[   20.826363] 
[   20.826705] The buggy address belongs to the physical page:
[   20.827024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7
[   20.827485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.827925] page_type: f5(slab)
[   20.828235] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.828614] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.828973] page dumped because: kasan: bad access detected
[   20.829315] 
[   20.829455] Memory state around the buggy address:
[   20.829756]  fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.830107]  fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.830859] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.831136]                                                  ^
[   20.831358]  fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.831998]  fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.832559] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   20.788628] ==================================================================
[   20.789043] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   20.789604] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248
[   20.789975] 
[   20.790156] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.790280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.790318] Hardware name: linux,dummy-virt (DT)
[   20.790357] Call trace:
[   20.790390]  show_stack+0x20/0x38 (C)
[   20.790472]  dump_stack_lvl+0x8c/0xd0
[   20.790556]  print_report+0x118/0x608
[   20.790621]  kasan_report+0xdc/0x128
[   20.790676]  __asan_report_load1_noabort+0x20/0x30
[   20.790732]  kasan_strings+0x838/0x8d8
[   20.790971]  kunit_try_run_case+0x170/0x3f0
[   20.791034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.791097]  kthread+0x318/0x620
[   20.791149]  ret_from_fork+0x10/0x20
[   20.791209] 
[   20.794289] Allocated by task 248:
[   20.794617]  kasan_save_stack+0x3c/0x68
[   20.795147]  kasan_save_track+0x20/0x40
[   20.795419]  kasan_save_alloc_info+0x40/0x58
[   20.795720]  __kasan_kmalloc+0xd4/0xd8
[   20.796021]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.796260]  kasan_strings+0xb0/0x8d8
[   20.796492]  kunit_try_run_case+0x170/0x3f0
[   20.796791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.797092]  kthread+0x318/0x620
[   20.797326]  ret_from_fork+0x10/0x20
[   20.797678] 
[   20.797803] Freed by task 248:
[   20.798140]  kasan_save_stack+0x3c/0x68
[   20.798551]  kasan_save_track+0x20/0x40
[   20.798825]  kasan_save_free_info+0x4c/0x78
[   20.799080]  __kasan_slab_free+0x6c/0x98
[   20.799332]  kfree+0x214/0x3c8
[   20.799567]  kasan_strings+0x124/0x8d8
[   20.799785]  kunit_try_run_case+0x170/0x3f0
[   20.800036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.800544]  kthread+0x318/0x620
[   20.800864]  ret_from_fork+0x10/0x20
[   20.801037] 
[   20.801268] The buggy address belongs to the object at fff00000c66e72c0
[   20.801268]  which belongs to the cache kmalloc-32 of size 32
[   20.802088] The buggy address is located 16 bytes inside of
[   20.802088]  freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0)
[   20.803092] 
[   20.803340] The buggy address belongs to the physical page:
[   20.803767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7
[   20.804267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.804671] page_type: f5(slab)
[   20.804917] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.805407] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.805917] page dumped because: kasan: bad access detected
[   20.806244] 
[   20.806453] Memory state around the buggy address:
[   20.807640]  fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.808076]  fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.808453] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.808991]                                                  ^
[   20.809322]  fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.809787]  fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.810218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   20.763093] ==================================================================
[   20.764121] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   20.764475] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248
[   20.764806] 
[   20.765021] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.765129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765163] Hardware name: linux,dummy-virt (DT)
[   20.765201] Call trace:
[   20.765233]  show_stack+0x20/0x38 (C)
[   20.765294]  dump_stack_lvl+0x8c/0xd0
[   20.765351]  print_report+0x118/0x608
[   20.765408]  kasan_report+0xdc/0x128
[   20.765462]  __asan_report_load1_noabort+0x20/0x30
[   20.765516]  strcmp+0xc0/0xc8
[   20.765564]  kasan_strings+0x228/0x8d8
[   20.765615]  kunit_try_run_case+0x170/0x3f0
[   20.765672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.765732]  kthread+0x318/0x620
[   20.765803]  ret_from_fork+0x10/0x20
[   20.765864] 
[   20.769824] Allocated by task 248:
[   20.770018]  kasan_save_stack+0x3c/0x68
[   20.770236]  kasan_save_track+0x20/0x40
[   20.770416]  kasan_save_alloc_info+0x40/0x58
[   20.771231]  __kasan_kmalloc+0xd4/0xd8
[   20.771879]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.772235]  kasan_strings+0xb0/0x8d8
[   20.772415]  kunit_try_run_case+0x170/0x3f0
[   20.773018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.773476]  kthread+0x318/0x620
[   20.773855]  ret_from_fork+0x10/0x20
[   20.774152] 
[   20.774394] Freed by task 248:
[   20.774555]  kasan_save_stack+0x3c/0x68
[   20.775049]  kasan_save_track+0x20/0x40
[   20.775309]  kasan_save_free_info+0x4c/0x78
[   20.775585]  __kasan_slab_free+0x6c/0x98
[   20.775841]  kfree+0x214/0x3c8
[   20.776092]  kasan_strings+0x124/0x8d8
[   20.776377]  kunit_try_run_case+0x170/0x3f0
[   20.776657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.777223]  kthread+0x318/0x620
[   20.777711]  ret_from_fork+0x10/0x20
[   20.778033] 
[   20.778170] The buggy address belongs to the object at fff00000c66e72c0
[   20.778170]  which belongs to the cache kmalloc-32 of size 32
[   20.779180] The buggy address is located 16 bytes inside of
[   20.779180]  freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0)
[   20.780023] 
[   20.780186] The buggy address belongs to the physical page:
[   20.780633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7
[   20.781223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.781622] page_type: f5(slab)
[   20.781899] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.782315] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.782991] page dumped because: kasan: bad access detected
[   20.783264] 
[   20.783410] Memory state around the buggy address:
[   20.783647]  fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.783979]  fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.784291] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.784593]                                                  ^
[   20.785721]  fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.786271]  fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.787712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   20.735725] ==================================================================
[   20.736248] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   20.736677] Read of size 1 at addr fff00000c66f5118 by task kunit_try_catch/246
[   20.737093] 
[   20.737280] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.737383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.737416] Hardware name: linux,dummy-virt (DT)
[   20.737456] Call trace:
[   20.737487]  show_stack+0x20/0x38 (C)
[   20.737550]  dump_stack_lvl+0x8c/0xd0
[   20.737609]  print_report+0x118/0x608
[   20.737668]  kasan_report+0xdc/0x128
[   20.737723]  __asan_report_load1_noabort+0x20/0x30
[   20.737798]  memcmp+0x198/0x1d8
[   20.737851]  kasan_memcmp+0x16c/0x300
[   20.737905]  kunit_try_run_case+0x170/0x3f0
[   20.737961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.738022]  kthread+0x318/0x620
[   20.738100]  ret_from_fork+0x10/0x20
[   20.738165] 
[   20.741943] Allocated by task 246:
[   20.742243]  kasan_save_stack+0x3c/0x68
[   20.742816]  kasan_save_track+0x20/0x40
[   20.743180]  kasan_save_alloc_info+0x40/0x58
[   20.743414]  __kasan_kmalloc+0xd4/0xd8
[   20.743696]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.743985]  kasan_memcmp+0xbc/0x300
[   20.744155]  kunit_try_run_case+0x170/0x3f0
[   20.744410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.744693]  kthread+0x318/0x620
[   20.744995]  ret_from_fork+0x10/0x20
[   20.745249] 
[   20.745417] The buggy address belongs to the object at fff00000c66f5100
[   20.745417]  which belongs to the cache kmalloc-32 of size 32
[   20.745940] The buggy address is located 0 bytes to the right of
[   20.745940]  allocated 24-byte region [fff00000c66f5100, fff00000c66f5118)
[   20.746415] 
[   20.746853] The buggy address belongs to the physical page:
[   20.747242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f5
[   20.747718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.748144] page_type: f5(slab)
[   20.748339] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.748767] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.749142] page dumped because: kasan: bad access detected
[   20.749399] 
[   20.749574] Memory state around the buggy address:
[   20.749801]  fff00000c66f5000: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.750191]  fff00000c66f5080: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.750953] >fff00000c66f5100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.751262]                             ^
[   20.751513]  fff00000c66f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.751958]  fff00000c66f5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.752323] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   20.705231] ==================================================================
[   20.705817] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   20.706175] Read of size 1 at addr ffff800080b17b4a by task kunit_try_catch/242
[   20.706437] 
[   20.707531] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.707653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.707691] Hardware name: linux,dummy-virt (DT)
[   20.707732] Call trace:
[   20.707781]  show_stack+0x20/0x38 (C)
[   20.707852]  dump_stack_lvl+0x8c/0xd0
[   20.707913]  print_report+0x310/0x608
[   20.707972]  kasan_report+0xdc/0x128
[   20.708024]  __asan_report_load1_noabort+0x20/0x30
[   20.708079]  kasan_alloca_oob_right+0x2e4/0x348
[   20.708135]  kunit_try_run_case+0x170/0x3f0
[   20.708194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.708254]  kthread+0x318/0x620
[   20.708307]  ret_from_fork+0x10/0x20
[   20.708365] 
[   20.712183] The buggy address belongs to stack of task kunit_try_catch/242
[   20.712689] 
[   20.712984] The buggy address belongs to the virtual mapping at
[   20.712984]  [ffff800080b10000, ffff800080b19000) created by:
[   20.712984]  kernel_clone+0x150/0x7a8
[   20.713964] 
[   20.714211] The buggy address belongs to the physical page:
[   20.714687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653b
[   20.715302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.715664] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.715943] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.716504] page dumped because: kasan: bad access detected
[   20.716779] 
[   20.716973] Memory state around the buggy address:
[   20.717215]  ffff800080b17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.717654]  ffff800080b17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.718042] >ffff800080b17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.718390]                                               ^
[   20.718731]  ffff800080b17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.719465]  ffff800080b17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.719899] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   20.683785] ==================================================================
[   20.684360] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   20.684802] Read of size 1 at addr ffff800080bc7b5f by task kunit_try_catch/240
[   20.685206] 
[   20.685407] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.685510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.685542] Hardware name: linux,dummy-virt (DT)
[   20.685583] Call trace:
[   20.685613]  show_stack+0x20/0x38 (C)
[   20.685674]  dump_stack_lvl+0x8c/0xd0
[   20.685734]  print_report+0x310/0x608
[   20.685806]  kasan_report+0xdc/0x128
[   20.685859]  __asan_report_load1_noabort+0x20/0x30
[   20.685916]  kasan_alloca_oob_left+0x2b8/0x310
[   20.685971]  kunit_try_run_case+0x170/0x3f0
[   20.686026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.686110]  kthread+0x318/0x620
[   20.686169]  ret_from_fork+0x10/0x20
[   20.686230] 
[   20.690733] The buggy address belongs to stack of task kunit_try_catch/240
[   20.691721] 
[   20.691955] The buggy address belongs to the virtual mapping at
[   20.691955]  [ffff800080bc0000, ffff800080bc9000) created by:
[   20.691955]  kernel_clone+0x150/0x7a8
[   20.692606] 
[   20.692789] The buggy address belongs to the physical page:
[   20.693052] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106653
[   20.693453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.693835] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.694194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.695232] page dumped because: kasan: bad access detected
[   20.695565] 
[   20.695676] Memory state around the buggy address:
[   20.695938]  ffff800080bc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.696338]  ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.696678] >ffff800080bc7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   20.697083]                                                     ^
[   20.697437]  ffff800080bc7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.697769]  ffff800080bc7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.698207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   20.662265] ==================================================================
[   20.662788] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.663330] Read of size 1 at addr ffff800080b17c2a by task kunit_try_catch/238
[   20.663574] 
[   20.663732] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.663878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.663911] Hardware name: linux,dummy-virt (DT)
[   20.663950] Call trace:
[   20.663977]  show_stack+0x20/0x38 (C)
[   20.664038]  dump_stack_lvl+0x8c/0xd0
[   20.664096]  print_report+0x310/0x608
[   20.664181]  kasan_report+0xdc/0x128
[   20.664236]  __asan_report_load1_noabort+0x20/0x30
[   20.664289]  kasan_stack_oob+0x238/0x270
[   20.664341]  kunit_try_run_case+0x170/0x3f0
[   20.664398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.664457]  kthread+0x318/0x620
[   20.664510]  ret_from_fork+0x10/0x20
[   20.664566] 
[   20.667311] The buggy address belongs to stack of task kunit_try_catch/238
[   20.667769]  and is located at offset 138 in frame:
[   20.667969]  kasan_stack_oob+0x0/0x270
[   20.668489] 
[   20.668621] This frame has 4 objects:
[   20.668913]  [48, 49) '__assertion'
[   20.668987]  [64, 72) 'array'
[   20.669227]  [96, 112) '__assertion'
[   20.669489]  [128, 138) 'stack_array'
[   20.669688] 
[   20.670130] The buggy address belongs to the virtual mapping at
[   20.670130]  [ffff800080b10000, ffff800080b19000) created by:
[   20.670130]  kernel_clone+0x150/0x7a8
[   20.670939] 
[   20.671117] The buggy address belongs to the physical page:
[   20.671367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653b
[   20.671803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.672193] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.672571] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.672947] page dumped because: kasan: bad access detected
[   20.673265] 
[   20.673536] Memory state around the buggy address:
[   20.673817]  ffff800080b17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.674289]  ffff800080b17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   20.674908] >ffff800080b17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   20.675187]                                   ^
[   20.675527]  ffff800080b17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   20.675910]  ffff800080b17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.676215] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   20.637179] ==================================================================
[   20.637766] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.638366] Read of size 1 at addr ffffac220aa8910d by task kunit_try_catch/234
[   20.639190] 
[   20.639546] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.639669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.639703] Hardware name: linux,dummy-virt (DT)
[   20.639755] Call trace:
[   20.640260]  show_stack+0x20/0x38 (C)
[   20.640350]  dump_stack_lvl+0x8c/0xd0
[   20.640424]  print_report+0x310/0x608
[   20.640484]  kasan_report+0xdc/0x128
[   20.640539]  __asan_report_load1_noabort+0x20/0x30
[   20.640592]  kasan_global_oob_right+0x230/0x270
[   20.640646]  kunit_try_run_case+0x170/0x3f0
[   20.640701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.640777]  kthread+0x318/0x620
[   20.640832]  ret_from_fork+0x10/0x20
[   20.640914] 
[   20.643680] The buggy address belongs to the variable:
[   20.643987]  global_array+0xd/0x40
[   20.644288] 
[   20.644588] The buggy address belongs to the virtual mapping at
[   20.644588]  [ffffac2208d10000, ffffac220ab41000) created by:
[   20.644588]  paging_init+0x66c/0x7d0
[   20.645303] 
[   20.645627] The buggy address belongs to the physical page:
[   20.645860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47a89
[   20.646342] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.646957] raw: 03fffe0000002000 ffffc1ffc01ea248 ffffc1ffc01ea248 0000000000000000
[   20.647375] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.647760] page dumped because: kasan: bad access detected
[   20.648202] 
[   20.648361] Memory state around the buggy address:
[   20.648588]  ffffac220aa89000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.648957]  ffffac220aa89080: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   20.649362] >ffffac220aa89100: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   20.649701]                       ^
[   20.650027]  ffffac220aa89180: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   20.650355]  ffffac220aa89200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.650758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   20.616054] ==================================================================
[   20.616701] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   20.617232] Free of addr fff00000c65fc001 by task kunit_try_catch/232
[   20.617489] 
[   20.617714] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.617827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.617861] Hardware name: linux,dummy-virt (DT)
[   20.617897] Call trace:
[   20.617925]  show_stack+0x20/0x38 (C)
[   20.617985]  dump_stack_lvl+0x8c/0xd0
[   20.618055]  print_report+0x118/0x608
[   20.618154]  kasan_report_invalid_free+0xc0/0xe8
[   20.618227]  __kasan_mempool_poison_object+0xfc/0x150
[   20.618288]  mempool_free+0x28c/0x328
[   20.618355]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   20.618427]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.618499]  kunit_try_run_case+0x170/0x3f0
[   20.618559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.618618]  kthread+0x318/0x620
[   20.618670]  ret_from_fork+0x10/0x20
[   20.618725] 
[   20.623051] The buggy address belongs to the physical page:
[   20.623398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   20.623914] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.624408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.624860] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.625268] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.625680] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.626014] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.626508] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[   20.626950] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.627512] page dumped because: kasan: bad access detected
[   20.627812] 
[   20.627969] Memory state around the buggy address:
[   20.628226]  fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.628658]  fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.629063] >fff00000c65fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.629464]                    ^
[   20.629650]  fff00000c65fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.630002]  fff00000c65fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.630374] ==================================================================
[   20.590434] ==================================================================
[   20.591012] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   20.591332] Free of addr fff00000c6649101 by task kunit_try_catch/230
[   20.591611] 
[   20.591836] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.591940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.591974] Hardware name: linux,dummy-virt (DT)
[   20.592016] Call trace:
[   20.592057]  show_stack+0x20/0x38 (C)
[   20.592136]  dump_stack_lvl+0x8c/0xd0
[   20.592207]  print_report+0x118/0x608
[   20.592280]  kasan_report_invalid_free+0xc0/0xe8
[   20.592339]  check_slab_allocation+0xfc/0x108
[   20.592395]  __kasan_mempool_poison_object+0x78/0x150
[   20.592454]  mempool_free+0x28c/0x328
[   20.592507]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   20.592579]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.592653]  kunit_try_run_case+0x170/0x3f0
[   20.592712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.592802]  kthread+0x318/0x620
[   20.592861]  ret_from_fork+0x10/0x20
[   20.592917] 
[   20.596456] Allocated by task 230:
[   20.596650]  kasan_save_stack+0x3c/0x68
[   20.596949]  kasan_save_track+0x20/0x40
[   20.597200]  kasan_save_alloc_info+0x40/0x58
[   20.597555]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.597969]  remove_element+0x130/0x1f8
[   20.598252]  mempool_alloc_preallocated+0x58/0xc0
[   20.598728]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   20.599009]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.599392]  kunit_try_run_case+0x170/0x3f0
[   20.599712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.600060]  kthread+0x318/0x620
[   20.600270]  ret_from_fork+0x10/0x20
[   20.600470] 
[   20.600689] The buggy address belongs to the object at fff00000c6649100
[   20.600689]  which belongs to the cache kmalloc-128 of size 128
[   20.601359] The buggy address is located 1 bytes inside of
[   20.601359]  128-byte region [fff00000c6649100, fff00000c6649180)
[   20.601938] 
[   20.602117] The buggy address belongs to the physical page:
[   20.602357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649
[   20.603082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.603493] page_type: f5(slab)
[   20.603696] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.604135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.604591] page dumped because: kasan: bad access detected
[   20.604917] 
[   20.605037] Memory state around the buggy address:
[   20.605389]  fff00000c6649000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.605817]  fff00000c6649080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.606260] >fff00000c6649100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.607425]                    ^
[   20.607611]  fff00000c6649180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.608059]  fff00000c6649200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.608463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   20.516697] ==================================================================
[   20.517221] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   20.517724] Free of addr fff00000c5a05a00 by task kunit_try_catch/224
[   20.518100] 
[   20.518319] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.518443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.518480] Hardware name: linux,dummy-virt (DT)
[   20.518592] Call trace:
[   20.518627]  show_stack+0x20/0x38 (C)
[   20.518690]  dump_stack_lvl+0x8c/0xd0
[   20.518755]  print_report+0x118/0x608
[   20.518812]  kasan_report_invalid_free+0xc0/0xe8
[   20.518868]  check_slab_allocation+0xd4/0x108
[   20.518922]  __kasan_mempool_poison_object+0x78/0x150
[   20.518980]  mempool_free+0x28c/0x328
[   20.519032]  mempool_double_free_helper+0x150/0x2e0
[   20.519088]  mempool_kmalloc_double_free+0xc0/0x118
[   20.519142]  kunit_try_run_case+0x170/0x3f0
[   20.519197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.519255]  kthread+0x318/0x620
[   20.519305]  ret_from_fork+0x10/0x20
[   20.519360] 
[   20.523888] Allocated by task 224:
[   20.524064]  kasan_save_stack+0x3c/0x68
[   20.524260]  kasan_save_track+0x20/0x40
[   20.524581]  kasan_save_alloc_info+0x40/0x58
[   20.524847]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.525272]  remove_element+0x130/0x1f8
[   20.525527]  mempool_alloc_preallocated+0x58/0xc0
[   20.525797]  mempool_double_free_helper+0x94/0x2e0
[   20.526124]  mempool_kmalloc_double_free+0xc0/0x118
[   20.526429]  kunit_try_run_case+0x170/0x3f0
[   20.526743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.527059]  kthread+0x318/0x620
[   20.527227]  ret_from_fork+0x10/0x20
[   20.527386] 
[   20.527569] Freed by task 224:
[   20.527728]  kasan_save_stack+0x3c/0x68
[   20.528227]  kasan_save_track+0x20/0x40
[   20.528396]  kasan_save_free_info+0x4c/0x78
[   20.528679]  __kasan_mempool_poison_object+0xc0/0x150
[   20.529016]  mempool_free+0x28c/0x328
[   20.529300]  mempool_double_free_helper+0x100/0x2e0
[   20.529509]  mempool_kmalloc_double_free+0xc0/0x118
[   20.529877]  kunit_try_run_case+0x170/0x3f0
[   20.530056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.531196]  kthread+0x318/0x620
[   20.531395]  ret_from_fork+0x10/0x20
[   20.531670] 
[   20.531858] The buggy address belongs to the object at fff00000c5a05a00
[   20.531858]  which belongs to the cache kmalloc-128 of size 128
[   20.532478] The buggy address is located 0 bytes inside of
[   20.532478]  128-byte region [fff00000c5a05a00, fff00000c5a05a80)
[   20.532966] 
[   20.533119] The buggy address belongs to the physical page:
[   20.533340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   20.533772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.534309] page_type: f5(slab)
[   20.534678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.535225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.535589] page dumped because: kasan: bad access detected
[   20.535863] 
[   20.536001] Memory state around the buggy address:
[   20.536170]  fff00000c5a05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.536530]  fff00000c5a05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.537095] >fff00000c5a05a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.537394]                    ^
[   20.537685]  fff00000c5a05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.538058]  fff00000c5a05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.539158] ==================================================================
[   20.570485] ==================================================================
[   20.571378] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   20.572003] Free of addr fff00000c665c000 by task kunit_try_catch/228
[   20.572663] 
[   20.572843] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.572955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.572990] Hardware name: linux,dummy-virt (DT)
[   20.573030] Call trace:
[   20.573057]  show_stack+0x20/0x38 (C)
[   20.573124]  dump_stack_lvl+0x8c/0xd0
[   20.573180]  print_report+0x118/0x608
[   20.573236]  kasan_report_invalid_free+0xc0/0xe8
[   20.573291]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.573351]  mempool_free+0x24c/0x328
[   20.573403]  mempool_double_free_helper+0x150/0x2e0
[   20.573460]  mempool_page_alloc_double_free+0xbc/0x118
[   20.573518]  kunit_try_run_case+0x170/0x3f0
[   20.573571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.573630]  kthread+0x318/0x620
[   20.573680]  ret_from_fork+0x10/0x20
[   20.573942] 
[   20.578336] The buggy address belongs to the physical page:
[   20.579193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c
[   20.579528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.579844] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.580105] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.580351] page dumped because: kasan: bad access detected
[   20.580581] 
[   20.580706] Memory state around the buggy address:
[   20.581456]  fff00000c665bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.581695]  fff00000c665bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.582101] >fff00000c665c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.582379]                    ^
[   20.583343]  fff00000c665c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.583828]  fff00000c665c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.584419] ==================================================================
[   20.545791] ==================================================================
[   20.546369] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   20.547397] Free of addr fff00000c65fc000 by task kunit_try_catch/226
[   20.547836] 
[   20.548005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.548110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.548145] Hardware name: linux,dummy-virt (DT)
[   20.548185] Call trace:
[   20.548212]  show_stack+0x20/0x38 (C)
[   20.548275]  dump_stack_lvl+0x8c/0xd0
[   20.548335]  print_report+0x118/0x608
[   20.548387]  kasan_report_invalid_free+0xc0/0xe8
[   20.548442]  __kasan_mempool_poison_object+0x14c/0x150
[   20.548500]  mempool_free+0x28c/0x328
[   20.548555]  mempool_double_free_helper+0x150/0x2e0
[   20.548609]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.548667]  kunit_try_run_case+0x170/0x3f0
[   20.548722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548798]  kthread+0x318/0x620
[   20.548854]  ret_from_fork+0x10/0x20
[   20.548908] 
[   20.553774] The buggy address belongs to the physical page:
[   20.554110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   20.554632] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.555072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.555357] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.555645] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.555900] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.556141] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.556408] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000
[   20.556654] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.557421] page dumped because: kasan: bad access detected
[   20.557714] 
[   20.557837] Memory state around the buggy address:
[   20.558231]  fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.558687]  fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559031] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559371]                    ^
[   20.559597]  fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.561198]  fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.561713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   20.435841] ==================================================================
[   20.436296] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.436533] Read of size 1 at addr fff00000c6658000 by task kunit_try_catch/218
[   20.437288] 
[   20.437427] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.437530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.437562] Hardware name: linux,dummy-virt (DT)
[   20.437600] Call trace:
[   20.437627]  show_stack+0x20/0x38 (C)
[   20.437687]  dump_stack_lvl+0x8c/0xd0
[   20.437757]  print_report+0x118/0x608
[   20.437817]  kasan_report+0xdc/0x128
[   20.437866]  __asan_report_load1_noabort+0x20/0x30
[   20.437918]  mempool_uaf_helper+0x314/0x340
[   20.437967]  mempool_kmalloc_large_uaf+0xc4/0x120
[   20.438019]  kunit_try_run_case+0x170/0x3f0
[   20.438114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.438174]  kthread+0x318/0x620
[   20.438226]  ret_from_fork+0x10/0x20
[   20.438282] 
[   20.441700] The buggy address belongs to the physical page:
[   20.441971] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106658
[   20.442264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.443191] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.444442] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.445069] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.445445] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.445861] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.446271] head: 0bfffe0000000002 ffffc1ffc3199601 ffffffffffffffff 0000000000000000
[   20.446733] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.447120] page dumped because: kasan: bad access detected
[   20.447393] 
[   20.447564] Memory state around the buggy address:
[   20.447843]  fff00000c6657f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.448226]  fff00000c6657f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.448580] >fff00000c6658000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.449214]                    ^
[   20.449574]  fff00000c6658080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.450002]  fff00000c6658100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.450279] ==================================================================
[   20.496383] ==================================================================
[   20.497008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.497514] Read of size 1 at addr fff00000c65fc000 by task kunit_try_catch/222
[   20.497883] 
[   20.498142] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   20.498244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.498276] Hardware name: linux,dummy-virt (DT)
[   20.498314] Call trace:
[   20.498343]  show_stack+0x20/0x38 (C)
[   20.498404]  dump_stack_lvl+0x8c/0xd0
[   20.498476]  print_report+0x118/0x608
[   20.498557]  kasan_report+0xdc/0x128
[   20.498612]  __asan_report_load1_noabort+0x20/0x30
[   20.498684]  mempool_uaf_helper+0x314/0x340
[   20.498840]  mempool_page_alloc_uaf+0xc0/0x118
[   20.498929]  kunit_try_run_case+0x170/0x3f0
[   20.499081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.499238]  kthread+0x318/0x620
[   20.499375]  ret_from_fork+0x10/0x20
[   20.499438] 
[   20.503274] The buggy address belongs to the physical page:
[   20.504077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc
[   20.504508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.504876] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.505232] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.505561] page dumped because: kasan: bad access detected
[   20.506191] 
[   20.506756] Memory state around the buggy address:
[   20.506969]  fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.507540]  fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.507834] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.508386]                    ^
[   20.508657]  fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.509051]  fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.509490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   19.733067] ==================================================================
[   19.733744] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   19.734160] Read of size 1 at addr fff00000c656d500 by task kunit_try_catch/204
[   19.734481] 
[   19.734938] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.735348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.735397] Hardware name: linux,dummy-virt (DT)
[   19.735438] Call trace:
[   19.735467]  show_stack+0x20/0x38 (C)
[   19.735547]  dump_stack_lvl+0x8c/0xd0
[   19.735606]  print_report+0x118/0x608
[   19.735661]  kasan_report+0xdc/0x128
[   19.735711]  __kasan_check_byte+0x54/0x70
[   19.735778]  kmem_cache_destroy+0x34/0x218
[   19.735835]  kmem_cache_double_destroy+0x17c/0x2f8
[   19.735890]  kunit_try_run_case+0x170/0x3f0
[   19.735944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.736000]  kthread+0x318/0x620
[   19.736051]  ret_from_fork+0x10/0x20
[   19.736106] 
[   19.738671] Allocated by task 204:
[   19.738995]  kasan_save_stack+0x3c/0x68
[   19.739416]  kasan_save_track+0x20/0x40
[   19.739858]  kasan_save_alloc_info+0x40/0x58
[   19.740465]  __kasan_slab_alloc+0xa8/0xb0
[   19.740821]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.741191]  __kmem_cache_create_args+0x18c/0x2b0
[   19.741435]  kmem_cache_double_destroy+0xc8/0x2f8
[   19.741677]  kunit_try_run_case+0x170/0x3f0
[   19.742058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.742350]  kthread+0x318/0x620
[   19.743087]  ret_from_fork+0x10/0x20
[   19.743397] 
[   19.743601] Freed by task 204:
[   19.743855]  kasan_save_stack+0x3c/0x68
[   19.744062]  kasan_save_track+0x20/0x40
[   19.744293]  kasan_save_free_info+0x4c/0x78
[   19.744544]  __kasan_slab_free+0x6c/0x98
[   19.744813]  kmem_cache_free+0x260/0x470
[   19.745110]  slab_kmem_cache_release+0x38/0x50
[   19.745439]  kmem_cache_release+0x1c/0x30
[   19.745663]  kobject_put+0x17c/0x430
[   19.745866]  sysfs_slab_release+0x1c/0x30
[   19.746147]  kmem_cache_destroy+0x118/0x218
[   19.746405]  kmem_cache_double_destroy+0x130/0x2f8
[   19.746751]  kunit_try_run_case+0x170/0x3f0
[   19.747036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.747336]  kthread+0x318/0x620
[   19.747598]  ret_from_fork+0x10/0x20
[   19.747888] 
[   19.748023] The buggy address belongs to the object at fff00000c656d500
[   19.748023]  which belongs to the cache kmem_cache of size 208
[   19.748665] The buggy address is located 0 bytes inside of
[   19.748665]  freed 208-byte region [fff00000c656d500, fff00000c656d5d0)
[   19.749530] 
[   19.749729] The buggy address belongs to the physical page:
[   19.750017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656d
[   19.750463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.751038] page_type: f5(slab)
[   19.751312] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.751705] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.752072] page dumped because: kasan: bad access detected
[   19.752313] 
[   19.752489] Memory state around the buggy address:
[   19.752727]  fff00000c656d400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.753084]  fff00000c656d480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753457] >fff00000c656d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.753722]                    ^
[   19.753936]  fff00000c656d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.754297]  fff00000c656d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.754946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   19.671599] ==================================================================
[   19.672151] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   19.672419] Read of size 1 at addr fff00000c654f000 by task kunit_try_catch/202
[   19.672654] 
[   19.672810] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.672913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.672943] Hardware name: linux,dummy-virt (DT)
[   19.672982] Call trace:
[   19.673011]  show_stack+0x20/0x38 (C)
[   19.673073]  dump_stack_lvl+0x8c/0xd0
[   19.673134]  print_report+0x118/0x608
[   19.673189]  kasan_report+0xdc/0x128
[   19.673241]  __asan_report_load1_noabort+0x20/0x30
[   19.673292]  kmem_cache_rcu_uaf+0x390/0x468
[   19.673345]  kunit_try_run_case+0x170/0x3f0
[   19.673400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.673458]  kthread+0x318/0x620
[   19.673508]  ret_from_fork+0x10/0x20
[   19.673564] 
[   19.677702] Allocated by task 202:
[   19.677907]  kasan_save_stack+0x3c/0x68
[   19.678188]  kasan_save_track+0x20/0x40
[   19.678447]  kasan_save_alloc_info+0x40/0x58
[   19.678790]  __kasan_slab_alloc+0xa8/0xb0
[   19.679165]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.679833]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.680267]  kunit_try_run_case+0x170/0x3f0
[   19.680524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.681024]  kthread+0x318/0x620
[   19.681351]  ret_from_fork+0x10/0x20
[   19.681574] 
[   19.681782] Freed by task 0:
[   19.681969]  kasan_save_stack+0x3c/0x68
[   19.682245]  kasan_save_track+0x20/0x40
[   19.682477]  kasan_save_free_info+0x4c/0x78
[   19.682830]  __kasan_slab_free+0x6c/0x98
[   19.683172]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.683355]  rcu_core+0x9f4/0x1e20
[   19.683701]  rcu_core_si+0x18/0x30
[   19.683884]  handle_softirqs+0x374/0xb28
[   19.684148]  __do_softirq+0x1c/0x28
[   19.684404] 
[   19.684534] Last potentially related work creation:
[   19.684705]  kasan_save_stack+0x3c/0x68
[   19.684946]  kasan_record_aux_stack+0xb4/0xc8
[   19.685319]  kmem_cache_free+0x120/0x470
[   19.685650]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.685911]  kunit_try_run_case+0x170/0x3f0
[   19.686180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.686451]  kthread+0x318/0x620
[   19.686613]  ret_from_fork+0x10/0x20
[   19.687058] 
[   19.687251] The buggy address belongs to the object at fff00000c654f000
[   19.687251]  which belongs to the cache test_cache of size 200
[   19.687706] The buggy address is located 0 bytes inside of
[   19.687706]  freed 200-byte region [fff00000c654f000, fff00000c654f0c8)
[   19.688888] 
[   19.689029] The buggy address belongs to the physical page:
[   19.689385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10654f
[   19.689777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.690136] page_type: f5(slab)
[   19.690435] raw: 0bfffe0000000000 fff00000c656d3c0 dead000000000122 0000000000000000
[   19.691210] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.691447] page dumped because: kasan: bad access detected
[   19.691627] 
[   19.691728] Memory state around the buggy address:
[   19.691930]  fff00000c654ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.692140]  fff00000c654ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.692650] >fff00000c654f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.692906]                    ^
[   19.693074]  fff00000c654f080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.693582]  fff00000c654f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.693877] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   19.591478] ==================================================================
[   19.592204] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   19.592937] Free of addr fff00000c6573001 by task kunit_try_catch/200
[   19.593444] 
[   19.593638] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.593770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.593812] Hardware name: linux,dummy-virt (DT)
[   19.593869] Call trace:
[   19.593900]  show_stack+0x20/0x38 (C)
[   19.593973]  dump_stack_lvl+0x8c/0xd0
[   19.594037]  print_report+0x118/0x608
[   19.594119]  kasan_report_invalid_free+0xc0/0xe8
[   19.594183]  check_slab_allocation+0xfc/0x108
[   19.594242]  __kasan_slab_pre_free+0x2c/0x48
[   19.594299]  kmem_cache_free+0xf0/0x470
[   19.594378]  kmem_cache_invalid_free+0x184/0x3b8
[   19.594443]  kunit_try_run_case+0x170/0x3f0
[   19.594565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594640]  kthread+0x318/0x620
[   19.594696]  ret_from_fork+0x10/0x20
[   19.594770] 
[   19.598928] Allocated by task 200:
[   19.599234]  kasan_save_stack+0x3c/0x68
[   19.599581]  kasan_save_track+0x20/0x40
[   19.600418]  kasan_save_alloc_info+0x40/0x58
[   19.600731]  __kasan_slab_alloc+0xa8/0xb0
[   19.601124]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.601392]  kmem_cache_invalid_free+0x12c/0x3b8
[   19.601632]  kunit_try_run_case+0x170/0x3f0
[   19.601813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.602211]  kthread+0x318/0x620
[   19.602453]  ret_from_fork+0x10/0x20
[   19.602725] 
[   19.602916] The buggy address belongs to the object at fff00000c6573000
[   19.602916]  which belongs to the cache test_cache of size 200
[   19.603448] The buggy address is located 1 bytes inside of
[   19.603448]  200-byte region [fff00000c6573000, fff00000c65730c8)
[   19.604042] 
[   19.604234] The buggy address belongs to the physical page:
[   19.604513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106573
[   19.605168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.605500] page_type: f5(slab)
[   19.605781] raw: 0bfffe0000000000 fff00000c656d280 dead000000000122 0000000000000000
[   19.606159] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.606873] page dumped because: kasan: bad access detected
[   19.607375] 
[   19.607696] Memory state around the buggy address:
[   19.607918]  fff00000c6572f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.608168]  fff00000c6572f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.609178] >fff00000c6573000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.609569]                    ^
[   19.609769]  fff00000c6573080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.610252]  fff00000c6573100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.610828] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   19.548395] ==================================================================
[   19.549036] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   19.549337] Free of addr fff00000c6572000 by task kunit_try_catch/198
[   19.549583] 
[   19.549723] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.549847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.549880] Hardware name: linux,dummy-virt (DT)
[   19.549917] Call trace:
[   19.549959]  show_stack+0x20/0x38 (C)
[   19.550026]  dump_stack_lvl+0x8c/0xd0
[   19.550105]  print_report+0x118/0x608
[   19.550165]  kasan_report_invalid_free+0xc0/0xe8
[   19.550221]  check_slab_allocation+0xd4/0x108
[   19.550278]  __kasan_slab_pre_free+0x2c/0x48
[   19.550334]  kmem_cache_free+0xf0/0x470
[   19.550389]  kmem_cache_double_free+0x190/0x3c8
[   19.550443]  kunit_try_run_case+0x170/0x3f0
[   19.550498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.550871]  kthread+0x318/0x620
[   19.550951]  ret_from_fork+0x10/0x20
[   19.551010] 
[   19.554580] Allocated by task 198:
[   19.554922]  kasan_save_stack+0x3c/0x68
[   19.555774]  kasan_save_track+0x20/0x40
[   19.556390]  kasan_save_alloc_info+0x40/0x58
[   19.556903]  __kasan_slab_alloc+0xa8/0xb0
[   19.557422]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.557672]  kmem_cache_double_free+0x12c/0x3c8
[   19.557871]  kunit_try_run_case+0x170/0x3f0
[   19.558050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.558276]  kthread+0x318/0x620
[   19.558426]  ret_from_fork+0x10/0x20
[   19.559190] 
[   19.559944] Freed by task 198:
[   19.560265]  kasan_save_stack+0x3c/0x68
[   19.560636]  kasan_save_track+0x20/0x40
[   19.561006]  kasan_save_free_info+0x4c/0x78
[   19.561378]  __kasan_slab_free+0x6c/0x98
[   19.561773]  kmem_cache_free+0x260/0x470
[   19.562172]  kmem_cache_double_free+0x140/0x3c8
[   19.562949]  kunit_try_run_case+0x170/0x3f0
[   19.563774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.564569]  kthread+0x318/0x620
[   19.565209]  ret_from_fork+0x10/0x20
[   19.565794] 
[   19.565966] The buggy address belongs to the object at fff00000c6572000
[   19.565966]  which belongs to the cache test_cache of size 200
[   19.567241] The buggy address is located 0 bytes inside of
[   19.567241]  200-byte region [fff00000c6572000, fff00000c65720c8)
[   19.568284] 
[   19.568474] The buggy address belongs to the physical page:
[   19.569042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106572
[   19.569641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.569898] page_type: f5(slab)
[   19.570083] raw: 0bfffe0000000000 fff00000c656d140 dead000000000122 0000000000000000
[   19.570339] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.570573] page dumped because: kasan: bad access detected
[   19.572429] 
[   19.572567] Memory state around the buggy address:
[   19.572765]  fff00000c6571f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.573189]  fff00000c6571f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.573514] >fff00000c6572000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.573880]                    ^
[   19.574133]  fff00000c6572080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.574448]  fff00000c6572100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.575641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   19.485889] ==================================================================
[   19.486621] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   19.487399] Read of size 1 at addr fff00000c656f0c8 by task kunit_try_catch/196
[   19.487953] 
[   19.488335] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.488528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.488593] Hardware name: linux,dummy-virt (DT)
[   19.488666] Call trace:
[   19.488721]  show_stack+0x20/0x38 (C)
[   19.488860]  dump_stack_lvl+0x8c/0xd0
[   19.488982]  print_report+0x118/0x608
[   19.489064]  kasan_report+0xdc/0x128
[   19.489121]  __asan_report_load1_noabort+0x20/0x30
[   19.489206]  kmem_cache_oob+0x33c/0x428
[   19.489323]  kunit_try_run_case+0x170/0x3f0
[   19.489445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.489520]  kthread+0x318/0x620
[   19.489575]  ret_from_fork+0x10/0x20
[   19.489633] 
[   19.494366] Allocated by task 196:
[   19.495338]  kasan_save_stack+0x3c/0x68
[   19.495992]  kasan_save_track+0x20/0x40
[   19.496556]  kasan_save_alloc_info+0x40/0x58
[   19.497181]  __kasan_slab_alloc+0xa8/0xb0
[   19.497681]  kmem_cache_alloc_noprof+0x10c/0x3a0
[   19.498250]  kmem_cache_oob+0x12c/0x428
[   19.499118]  kunit_try_run_case+0x170/0x3f0
[   19.499400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.500062]  kthread+0x318/0x620
[   19.500350]  ret_from_fork+0x10/0x20
[   19.500656] 
[   19.500926] The buggy address belongs to the object at fff00000c656f000
[   19.500926]  which belongs to the cache test_cache of size 200
[   19.501798] The buggy address is located 0 bytes to the right of
[   19.501798]  allocated 200-byte region [fff00000c656f000, fff00000c656f0c8)
[   19.502197] 
[   19.502304] The buggy address belongs to the physical page:
[   19.502926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656f
[   19.503959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.504494] page_type: f5(slab)
[   19.504839] raw: 0bfffe0000000000 fff00000c656d000 dead000000000122 0000000000000000
[   19.505423] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.506863] page dumped because: kasan: bad access detected
[   19.507212] 
[   19.507672] Memory state around the buggy address:
[   19.507988]  fff00000c656ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.508757]  fff00000c656f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.509501] >fff00000c656f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.510252]                                               ^
[   19.511072]  fff00000c656f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.512051]  fff00000c656f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.512759] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   19.416504] ==================================================================
[   19.417283] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   19.418000] Read of size 8 at addr fff00000c6534e40 by task kunit_try_catch/189
[   19.418763] 
[   19.419099] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.419305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.419365] Hardware name: linux,dummy-virt (DT)
[   19.419466] Call trace:
[   19.419516]  show_stack+0x20/0x38 (C)
[   19.419643]  dump_stack_lvl+0x8c/0xd0
[   19.419783]  print_report+0x118/0x608
[   19.419906]  kasan_report+0xdc/0x128
[   19.420001]  __asan_report_load8_noabort+0x20/0x30
[   19.420104]  workqueue_uaf+0x480/0x4a8
[   19.420199]  kunit_try_run_case+0x170/0x3f0
[   19.420309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.420438]  kthread+0x318/0x620
[   19.420552]  ret_from_fork+0x10/0x20
[   19.420660] 
[   19.425805] Allocated by task 189:
[   19.426311]  kasan_save_stack+0x3c/0x68
[   19.427231]  kasan_save_track+0x20/0x40
[   19.427667]  kasan_save_alloc_info+0x40/0x58
[   19.428252]  __kasan_kmalloc+0xd4/0xd8
[   19.428648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.429229]  workqueue_uaf+0x13c/0x4a8
[   19.429676]  kunit_try_run_case+0x170/0x3f0
[   19.430227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.431239]  kthread+0x318/0x620
[   19.431796]  ret_from_fork+0x10/0x20
[   19.431994] 
[   19.432101] Freed by task 47:
[   19.432238]  kasan_save_stack+0x3c/0x68
[   19.432405]  kasan_save_track+0x20/0x40
[   19.432560]  kasan_save_free_info+0x4c/0x78
[   19.432720]  __kasan_slab_free+0x6c/0x98
[   19.433219]  kfree+0x214/0x3c8
[   19.433661]  workqueue_uaf_work+0x18/0x30
[   19.434198]  process_one_work+0x530/0xf98
[   19.435065]  worker_thread+0x614/0xf28
[   19.435600]  kthread+0x318/0x620
[   19.436051]  ret_from_fork+0x10/0x20
[   19.436547] 
[   19.436822] Last potentially related work creation:
[   19.437319]  kasan_save_stack+0x3c/0x68
[   19.437869]  kasan_record_aux_stack+0xb4/0xc8
[   19.438366]  __queue_work+0x65c/0x1010
[   19.439340]  queue_work_on+0xbc/0xf8
[   19.439761]  workqueue_uaf+0x210/0x4a8
[   19.440233]  kunit_try_run_case+0x170/0x3f0
[   19.440650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.441184]  kthread+0x318/0x620
[   19.441582]  ret_from_fork+0x10/0x20
[   19.442006] 
[   19.442263] The buggy address belongs to the object at fff00000c6534e40
[   19.442263]  which belongs to the cache kmalloc-32 of size 32
[   19.443324] The buggy address is located 0 bytes inside of
[   19.443324]  freed 32-byte region [fff00000c6534e40, fff00000c6534e60)
[   19.444373] 
[   19.444693] The buggy address belongs to the physical page:
[   19.445195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534
[   19.445947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.446746] page_type: f5(slab)
[   19.447158] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.447785] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.448370] page dumped because: kasan: bad access detected
[   19.448865] 
[   19.449138] Memory state around the buggy address:
[   19.449683]  fff00000c6534d00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   19.450302]  fff00000c6534d80: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.451298] >fff00000c6534e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.451726]                                            ^
[   19.452133]  fff00000c6534e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452821]  fff00000c6534f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.453432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   19.355431] ==================================================================
[   19.356296] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   19.356831] Read of size 4 at addr fff00000c6549980 by task swapper/0/0
[   19.357438] 
[   19.357770] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.14.7-rc1 #1
[   19.357964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.358027] Hardware name: linux,dummy-virt (DT)
[   19.358121] Call trace:
[   19.358180]  show_stack+0x20/0x38 (C)
[   19.358309]  dump_stack_lvl+0x8c/0xd0
[   19.358427]  print_report+0x118/0x608
[   19.358806]  kasan_report+0xdc/0x128
[   19.358938]  __asan_report_load4_noabort+0x20/0x30
[   19.359020]  rcu_uaf_reclaim+0x64/0x70
[   19.359072]  rcu_core+0x9f4/0x1e20
[   19.359129]  rcu_core_si+0x18/0x30
[   19.359176]  handle_softirqs+0x374/0xb28
[   19.359229]  __do_softirq+0x1c/0x28
[   19.359276]  ____do_softirq+0x18/0x30
[   19.359325]  call_on_irq_stack+0x24/0x58
[   19.359376]  do_softirq_own_stack+0x24/0x38
[   19.359427]  __irq_exit_rcu+0x1fc/0x318
[   19.359476]  irq_exit_rcu+0x1c/0x80
[   19.359522]  el1_interrupt+0x38/0x58
[   19.359576]  el1h_64_irq_handler+0x18/0x28
[   19.359626]  el1h_64_irq+0x6c/0x70
[   19.359781]  arch_local_irq_enable+0x4/0x8 (P)
[   19.359848]  do_idle+0x384/0x4e8
[   19.359898]  cpu_startup_entry+0x68/0x80
[   19.359947]  rest_init+0x160/0x188
[   19.359996]  start_kernel+0x310/0x3d8
[   19.360053]  __primary_switched+0x8c/0xa0
[   19.360115] 
[   19.369951] Allocated by task 187:
[   19.370439]  kasan_save_stack+0x3c/0x68
[   19.371317]  kasan_save_track+0x20/0x40
[   19.371869]  kasan_save_alloc_info+0x40/0x58
[   19.372414]  __kasan_kmalloc+0xd4/0xd8
[   19.372822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.373346]  rcu_uaf+0xb0/0x2d0
[   19.373776]  kunit_try_run_case+0x170/0x3f0
[   19.374246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.375079]  kthread+0x318/0x620
[   19.375498]  ret_from_fork+0x10/0x20
[   19.376006] 
[   19.376271] Freed by task 0:
[   19.376655]  kasan_save_stack+0x3c/0x68
[   19.377130]  kasan_save_track+0x20/0x40
[   19.377654]  kasan_save_free_info+0x4c/0x78
[   19.378187]  __kasan_slab_free+0x6c/0x98
[   19.378973]  kfree+0x214/0x3c8
[   19.379600]  rcu_uaf_reclaim+0x28/0x70
[   19.380327]  rcu_core+0x9f4/0x1e20
[   19.380768]  rcu_core_si+0x18/0x30
[   19.381272]  handle_softirqs+0x374/0xb28
[   19.381696]  __do_softirq+0x1c/0x28
[   19.382226] 
[   19.382613] Last potentially related work creation:
[   19.383332]  kasan_save_stack+0x3c/0x68
[   19.383856]  kasan_record_aux_stack+0xb4/0xc8
[   19.384345]  __call_rcu_common.constprop.0+0x74/0xa10
[   19.384937]  call_rcu+0x18/0x30
[   19.385353]  rcu_uaf+0x14c/0x2d0
[   19.385791]  kunit_try_run_case+0x170/0x3f0
[   19.386255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.387115]  kthread+0x318/0x620
[   19.387569]  ret_from_fork+0x10/0x20
[   19.388038] 
[   19.388392] The buggy address belongs to the object at fff00000c6549980
[   19.388392]  which belongs to the cache kmalloc-32 of size 32
[   19.389391] The buggy address is located 0 bytes inside of
[   19.389391]  freed 32-byte region [fff00000c6549980, fff00000c65499a0)
[   19.390419] 
[   19.391005] The buggy address belongs to the physical page:
[   19.391313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106549
[   19.392192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.392838] page_type: f5(slab)
[   19.393278] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.394091] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.394894] page dumped because: kasan: bad access detected
[   19.395627] 
[   19.395916] Memory state around the buggy address:
[   19.396480]  fff00000c6549880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.397079]  fff00000c6549900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.397862] >fff00000c6549980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   19.398609]                    ^
[   19.399177]  fff00000c6549a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.399687]  fff00000c6549a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400466] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   19.292292] ==================================================================
[   19.293173] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   19.293931] Read of size 1 at addr fff00000c59c2a78 by task kunit_try_catch/185
[   19.294208] 
[   19.294340] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.294443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.294496] Hardware name: linux,dummy-virt (DT)
[   19.294594] Call trace:
[   19.294647]  show_stack+0x20/0x38 (C)
[   19.294769]  dump_stack_lvl+0x8c/0xd0
[   19.294861]  print_report+0x118/0x608
[   19.294949]  kasan_report+0xdc/0x128
[   19.295052]  __asan_report_load1_noabort+0x20/0x30
[   19.295149]  ksize_uaf+0x548/0x600
[   19.295226]  kunit_try_run_case+0x170/0x3f0
[   19.295334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295442]  kthread+0x318/0x620
[   19.295522]  ret_from_fork+0x10/0x20
[   19.295617] 
[   19.303060] Allocated by task 185:
[   19.303319]  kasan_save_stack+0x3c/0x68
[   19.303719]  kasan_save_track+0x20/0x40
[   19.304112]  kasan_save_alloc_info+0x40/0x58
[   19.304530]  __kasan_kmalloc+0xd4/0xd8
[   19.305896]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.306201]  ksize_uaf+0xb8/0x600
[   19.306359]  kunit_try_run_case+0x170/0x3f0
[   19.307036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.308853]  kthread+0x318/0x620
[   19.309320]  ret_from_fork+0x10/0x20
[   19.309923] 
[   19.310132] Freed by task 185:
[   19.310592]  kasan_save_stack+0x3c/0x68
[   19.311907]  kasan_save_track+0x20/0x40
[   19.312170]  kasan_save_free_info+0x4c/0x78
[   19.312411]  __kasan_slab_free+0x6c/0x98
[   19.312636]  kfree+0x214/0x3c8
[   19.312842]  ksize_uaf+0x11c/0x600
[   19.313050]  kunit_try_run_case+0x170/0x3f0
[   19.313285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.313564]  kthread+0x318/0x620
[   19.315232]  ret_from_fork+0x10/0x20
[   19.315546] 
[   19.315768] The buggy address belongs to the object at fff00000c59c2a00
[   19.315768]  which belongs to the cache kmalloc-128 of size 128
[   19.317095] The buggy address is located 120 bytes inside of
[   19.317095]  freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80)
[   19.318042] 
[   19.318366] The buggy address belongs to the physical page:
[   19.319049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   19.320454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.321204] page_type: f5(slab)
[   19.321764] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.322586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.323189] page dumped because: kasan: bad access detected
[   19.323609] 
[   19.324186] Memory state around the buggy address:
[   19.324905]  fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.325603]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.326353] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.327167]                                                                 ^
[   19.327744]  fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.328270]  fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.329785] ==================================================================
[   19.259123] ==================================================================
[   19.260101] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   19.260673] Read of size 1 at addr fff00000c59c2a00 by task kunit_try_catch/185
[   19.261267] 
[   19.261578] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.261816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.261892] Hardware name: linux,dummy-virt (DT)
[   19.261965] Call trace:
[   19.262023]  show_stack+0x20/0x38 (C)
[   19.262178]  dump_stack_lvl+0x8c/0xd0
[   19.262301]  print_report+0x118/0x608
[   19.262378]  kasan_report+0xdc/0x128
[   19.262430]  __asan_report_load1_noabort+0x20/0x30
[   19.262489]  ksize_uaf+0x59c/0x600
[   19.262859]  kunit_try_run_case+0x170/0x3f0
[   19.262968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.263071]  kthread+0x318/0x620
[   19.263166]  ret_from_fork+0x10/0x20
[   19.263272] 
[   19.265526] Allocated by task 185:
[   19.265683]  kasan_save_stack+0x3c/0x68
[   19.266208]  kasan_save_track+0x20/0x40
[   19.266865]  kasan_save_alloc_info+0x40/0x58
[   19.268570]  __kasan_kmalloc+0xd4/0xd8
[   19.269203]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.269804]  ksize_uaf+0xb8/0x600
[   19.270366]  kunit_try_run_case+0x170/0x3f0
[   19.271111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.271976]  kthread+0x318/0x620
[   19.272345]  ret_from_fork+0x10/0x20
[   19.272675] 
[   19.272859] Freed by task 185:
[   19.273101]  kasan_save_stack+0x3c/0x68
[   19.273342]  kasan_save_track+0x20/0x40
[   19.273573]  kasan_save_free_info+0x4c/0x78
[   19.273864]  __kasan_slab_free+0x6c/0x98
[   19.274209]  kfree+0x214/0x3c8
[   19.275806]  ksize_uaf+0x11c/0x600
[   19.276243]  kunit_try_run_case+0x170/0x3f0
[   19.276852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.277468]  kthread+0x318/0x620
[   19.277985]  ret_from_fork+0x10/0x20
[   19.278503] 
[   19.278885] The buggy address belongs to the object at fff00000c59c2a00
[   19.278885]  which belongs to the cache kmalloc-128 of size 128
[   19.279884] The buggy address is located 0 bytes inside of
[   19.279884]  freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80)
[   19.280484] 
[   19.280625] The buggy address belongs to the physical page:
[   19.280907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   19.281268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.281580] page_type: f5(slab)
[   19.282913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.283483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.284556] page dumped because: kasan: bad access detected
[   19.285122] 
[   19.285418] Memory state around the buggy address:
[   19.285912]  fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.287499]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.288128] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.288807]                    ^
[   19.289289]  fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.289950]  fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.290462] ==================================================================
[   19.223047] ==================================================================
[   19.224264] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   19.224985] Read of size 1 at addr fff00000c59c2a00 by task kunit_try_catch/185
[   19.225556] 
[   19.225823] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.226016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.226098] Hardware name: linux,dummy-virt (DT)
[   19.226181] Call trace:
[   19.226246]  show_stack+0x20/0x38 (C)
[   19.226407]  dump_stack_lvl+0x8c/0xd0
[   19.226543]  print_report+0x118/0x608
[   19.226671]  kasan_report+0xdc/0x128
[   19.226799]  __kasan_check_byte+0x54/0x70
[   19.226898]  ksize+0x30/0x88
[   19.226954]  ksize_uaf+0x168/0x600
[   19.227005]  kunit_try_run_case+0x170/0x3f0
[   19.227061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.227119]  kthread+0x318/0x620
[   19.227167]  ret_from_fork+0x10/0x20
[   19.227223] 
[   19.231449] Allocated by task 185:
[   19.231902]  kasan_save_stack+0x3c/0x68
[   19.232454]  kasan_save_track+0x20/0x40
[   19.233009]  kasan_save_alloc_info+0x40/0x58
[   19.233515]  __kasan_kmalloc+0xd4/0xd8
[   19.233792]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.234079]  ksize_uaf+0xb8/0x600
[   19.234335]  kunit_try_run_case+0x170/0x3f0
[   19.234805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.235447]  kthread+0x318/0x620
[   19.235914]  ret_from_fork+0x10/0x20
[   19.236383] 
[   19.236667] Freed by task 185:
[   19.237081]  kasan_save_stack+0x3c/0x68
[   19.237475]  kasan_save_track+0x20/0x40
[   19.237846]  kasan_save_free_info+0x4c/0x78
[   19.238198]  __kasan_slab_free+0x6c/0x98
[   19.238701]  kfree+0x214/0x3c8
[   19.239165]  ksize_uaf+0x11c/0x600
[   19.239610]  kunit_try_run_case+0x170/0x3f0
[   19.240163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.240791]  kthread+0x318/0x620
[   19.241218]  ret_from_fork+0x10/0x20
[   19.241648] 
[   19.241922] The buggy address belongs to the object at fff00000c59c2a00
[   19.241922]  which belongs to the cache kmalloc-128 of size 128
[   19.242752] The buggy address is located 0 bytes inside of
[   19.242752]  freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80)
[   19.243700] 
[   19.244049] The buggy address belongs to the physical page:
[   19.244627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   19.245134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.245732] page_type: f5(slab)
[   19.246192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.247183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.248001] page dumped because: kasan: bad access detected
[   19.248679] 
[   19.249001] Memory state around the buggy address:
[   19.249463]  fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.252373]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.253115] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.253699]                    ^
[   19.254003]  fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.256297]  fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.257096] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   19.159577] ==================================================================
[   19.160115] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   19.160681] Read of size 1 at addr fff00000c5a05378 by task kunit_try_catch/183
[   19.162331] 
[   19.162694] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.163032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.163106] Hardware name: linux,dummy-virt (DT)
[   19.163163] Call trace:
[   19.163192]  show_stack+0x20/0x38 (C)
[   19.163264]  dump_stack_lvl+0x8c/0xd0
[   19.163320]  print_report+0x118/0x608
[   19.163375]  kasan_report+0xdc/0x128
[   19.163428]  __asan_report_load1_noabort+0x20/0x30
[   19.163481]  ksize_unpoisons_memory+0x628/0x750
[   19.163535]  kunit_try_run_case+0x170/0x3f0
[   19.163590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.163647]  kthread+0x318/0x620
[   19.163698]  ret_from_fork+0x10/0x20
[   19.163782] 
[   19.169137] Allocated by task 183:
[   19.169658]  kasan_save_stack+0x3c/0x68
[   19.170264]  kasan_save_track+0x20/0x40
[   19.171017]  kasan_save_alloc_info+0x40/0x58
[   19.171553]  __kasan_kmalloc+0xd4/0xd8
[   19.172076]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.172586]  ksize_unpoisons_memory+0xc0/0x750
[   19.173084]  kunit_try_run_case+0x170/0x3f0
[   19.173615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.174209]  kthread+0x318/0x620
[   19.174946]  ret_from_fork+0x10/0x20
[   19.175497] 
[   19.175812] The buggy address belongs to the object at fff00000c5a05300
[   19.175812]  which belongs to the cache kmalloc-128 of size 128
[   19.176805] The buggy address is located 5 bytes to the right of
[   19.176805]  allocated 115-byte region [fff00000c5a05300, fff00000c5a05373)
[   19.177889] 
[   19.178242] The buggy address belongs to the physical page:
[   19.178913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   19.179579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.180242] page_type: f5(slab)
[   19.180642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.182190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.182938] page dumped because: kasan: bad access detected
[   19.183181] 
[   19.183284] Memory state around the buggy address:
[   19.183452]  fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.183673]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.183910] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.184123]                                                                 ^
[   19.184341]  fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.184563]  fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.185051] ==================================================================
[   19.186081] ==================================================================
[   19.188626] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   19.189228] Read of size 1 at addr fff00000c5a0537f by task kunit_try_catch/183
[   19.189960] 
[   19.190238] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.190400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.190436] Hardware name: linux,dummy-virt (DT)
[   19.190913] Call trace:
[   19.190971]  show_stack+0x20/0x38 (C)
[   19.191044]  dump_stack_lvl+0x8c/0xd0
[   19.191101]  print_report+0x118/0x608
[   19.191155]  kasan_report+0xdc/0x128
[   19.191207]  __asan_report_load1_noabort+0x20/0x30
[   19.191262]  ksize_unpoisons_memory+0x6a0/0x750
[   19.191316]  kunit_try_run_case+0x170/0x3f0
[   19.191372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.191430]  kthread+0x318/0x620
[   19.191481]  ret_from_fork+0x10/0x20
[   19.191537] 
[   19.196968] Allocated by task 183:
[   19.197277]  kasan_save_stack+0x3c/0x68
[   19.197681]  kasan_save_track+0x20/0x40
[   19.198403]  kasan_save_alloc_info+0x40/0x58
[   19.199187]  __kasan_kmalloc+0xd4/0xd8
[   19.199571]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.199948]  ksize_unpoisons_memory+0xc0/0x750
[   19.200318]  kunit_try_run_case+0x170/0x3f0
[   19.200680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.201519]  kthread+0x318/0x620
[   19.201877]  ret_from_fork+0x10/0x20
[   19.202245] 
[   19.202476] The buggy address belongs to the object at fff00000c5a05300
[   19.202476]  which belongs to the cache kmalloc-128 of size 128
[   19.203769] The buggy address is located 12 bytes to the right of
[   19.203769]  allocated 115-byte region [fff00000c5a05300, fff00000c5a05373)
[   19.204863] 
[   19.205268] The buggy address belongs to the physical page:
[   19.205560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   19.206432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.207205] page_type: f5(slab)
[   19.207456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.207854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.208176] page dumped because: kasan: bad access detected
[   19.208357] 
[   19.208455] Memory state around the buggy address:
[   19.208621]  fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.210228]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.210924] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.211162]                                                                 ^
[   19.211385]  fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211605]  fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211893] ==================================================================
[   19.130358] ==================================================================
[   19.131604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   19.132256] Read of size 1 at addr fff00000c5a05373 by task kunit_try_catch/183
[   19.132922] 
[   19.133725] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.133868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.133903] Hardware name: linux,dummy-virt (DT)
[   19.133941] Call trace:
[   19.133970]  show_stack+0x20/0x38 (C)
[   19.134037]  dump_stack_lvl+0x8c/0xd0
[   19.134107]  print_report+0x118/0x608
[   19.134164]  kasan_report+0xdc/0x128
[   19.134218]  __asan_report_load1_noabort+0x20/0x30
[   19.134273]  ksize_unpoisons_memory+0x638/0x750
[   19.134327]  kunit_try_run_case+0x170/0x3f0
[   19.134382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.134440]  kthread+0x318/0x620
[   19.134560]  ret_from_fork+0x10/0x20
[   19.134669] 
[   19.139732] Allocated by task 183:
[   19.139918]  kasan_save_stack+0x3c/0x68
[   19.140103]  kasan_save_track+0x20/0x40
[   19.140265]  kasan_save_alloc_info+0x40/0x58
[   19.140430]  __kasan_kmalloc+0xd4/0xd8
[   19.140588]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.140821]  ksize_unpoisons_memory+0xc0/0x750
[   19.142066]  kunit_try_run_case+0x170/0x3f0
[   19.142570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.143826]  kthread+0x318/0x620
[   19.144170]  ret_from_fork+0x10/0x20
[   19.144516] 
[   19.144768] The buggy address belongs to the object at fff00000c5a05300
[   19.144768]  which belongs to the cache kmalloc-128 of size 128
[   19.145583] The buggy address is located 0 bytes to the right of
[   19.145583]  allocated 115-byte region [fff00000c5a05300, fff00000c5a05373)
[   19.146406] 
[   19.146687] The buggy address belongs to the physical page:
[   19.147713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   19.149331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.149880] page_type: f5(slab)
[   19.150228] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.150861] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.151689] page dumped because: kasan: bad access detected
[   19.152314] 
[   19.152565] Memory state around the buggy address:
[   19.153089]  fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.153862]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154831] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.155414]                                                              ^
[   19.156038]  fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.156758]  fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.157391] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   19.087241] ==================================================================
[   19.087976] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   19.088689] Free of addr fff00000c59b8560 by task kunit_try_catch/181
[   19.089214] 
[   19.089767] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.089949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.090043] Hardware name: linux,dummy-virt (DT)
[   19.090105] Call trace:
[   19.090154]  show_stack+0x20/0x38 (C)
[   19.090223]  dump_stack_lvl+0x8c/0xd0
[   19.090280]  print_report+0x118/0x608
[   19.090334]  kasan_report_invalid_free+0xc0/0xe8
[   19.090390]  check_slab_allocation+0xd4/0x108
[   19.090444]  __kasan_slab_pre_free+0x2c/0x48
[   19.090682]  kfree+0xe8/0x3c8
[   19.090818]  kfree_sensitive+0x3c/0xb0
[   19.090916]  kmalloc_double_kzfree+0x168/0x308
[   19.091027]  kunit_try_run_case+0x170/0x3f0
[   19.091137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.091257]  kthread+0x318/0x620
[   19.091358]  ret_from_fork+0x10/0x20
[   19.091481] 
[   19.098406] Allocated by task 181:
[   19.099653]  kasan_save_stack+0x3c/0x68
[   19.100306]  kasan_save_track+0x20/0x40
[   19.100888]  kasan_save_alloc_info+0x40/0x58
[   19.101295]  __kasan_kmalloc+0xd4/0xd8
[   19.101475]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.101656]  kmalloc_double_kzfree+0xb8/0x308
[   19.101853]  kunit_try_run_case+0x170/0x3f0
[   19.102022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.102236]  kthread+0x318/0x620
[   19.102387]  ret_from_fork+0x10/0x20
[   19.103667] 
[   19.103891] Freed by task 181:
[   19.104236]  kasan_save_stack+0x3c/0x68
[   19.104607]  kasan_save_track+0x20/0x40
[   19.104961]  kasan_save_free_info+0x4c/0x78
[   19.105325]  __kasan_slab_free+0x6c/0x98
[   19.105668]  kfree+0x214/0x3c8
[   19.106677]  kfree_sensitive+0x80/0xb0
[   19.107284]  kmalloc_double_kzfree+0x11c/0x308
[   19.107653]  kunit_try_run_case+0x170/0x3f0
[   19.107911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.108104]  kthread+0x318/0x620
[   19.108251]  ret_from_fork+0x10/0x20
[   19.108399] 
[   19.108506] The buggy address belongs to the object at fff00000c59b8560
[   19.108506]  which belongs to the cache kmalloc-16 of size 16
[   19.109786] The buggy address is located 0 bytes inside of
[   19.109786]  16-byte region [fff00000c59b8560, fff00000c59b8570)
[   19.111828] 
[   19.112032] The buggy address belongs to the physical page:
[   19.112498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   19.113072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.113570] page_type: f5(slab)
[   19.114327] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.115354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.116186] page dumped because: kasan: bad access detected
[   19.116732] 
[   19.117008] Memory state around the buggy address:
[   19.117539]  fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc
[   19.118078]  fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.119456] >fff00000c59b8500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.119933]                                                        ^
[   19.120612]  fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.121179]  fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.121862] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   19.051847] ==================================================================
[   19.052754] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   19.053536] Read of size 1 at addr fff00000c59b8560 by task kunit_try_catch/181
[   19.054136] 
[   19.054474] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.054699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.054779] Hardware name: linux,dummy-virt (DT)
[   19.055582] Call trace:
[   19.055623]  show_stack+0x20/0x38 (C)
[   19.055698]  dump_stack_lvl+0x8c/0xd0
[   19.055784]  print_report+0x118/0x608
[   19.055837]  kasan_report+0xdc/0x128
[   19.055884]  __kasan_check_byte+0x54/0x70
[   19.055933]  kfree_sensitive+0x30/0xb0
[   19.055983]  kmalloc_double_kzfree+0x168/0x308
[   19.056033]  kunit_try_run_case+0x170/0x3f0
[   19.056082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.056134]  kthread+0x318/0x620
[   19.056180]  ret_from_fork+0x10/0x20
[   19.056230] 
[   19.060230] Allocated by task 181:
[   19.060445]  kasan_save_stack+0x3c/0x68
[   19.060677]  kasan_save_track+0x20/0x40
[   19.061853]  kasan_save_alloc_info+0x40/0x58
[   19.062405]  __kasan_kmalloc+0xd4/0xd8
[   19.062806]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.063060]  kmalloc_double_kzfree+0xb8/0x308
[   19.063303]  kunit_try_run_case+0x170/0x3f0
[   19.063535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.064597]  kthread+0x318/0x620
[   19.065248]  ret_from_fork+0x10/0x20
[   19.066004] 
[   19.066564] Freed by task 181:
[   19.067305]  kasan_save_stack+0x3c/0x68
[   19.067715]  kasan_save_track+0x20/0x40
[   19.067964]  kasan_save_free_info+0x4c/0x78
[   19.068185]  __kasan_slab_free+0x6c/0x98
[   19.068395]  kfree+0x214/0x3c8
[   19.068585]  kfree_sensitive+0x80/0xb0
[   19.068797]  kmalloc_double_kzfree+0x11c/0x308
[   19.069018]  kunit_try_run_case+0x170/0x3f0
[   19.069233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.069493]  kthread+0x318/0x620
[   19.069690]  ret_from_fork+0x10/0x20
[   19.070468] 
[   19.071059] The buggy address belongs to the object at fff00000c59b8560
[   19.071059]  which belongs to the cache kmalloc-16 of size 16
[   19.073051] The buggy address is located 0 bytes inside of
[   19.073051]  freed 16-byte region [fff00000c59b8560, fff00000c59b8570)
[   19.074401] 
[   19.074815] The buggy address belongs to the physical page:
[   19.075126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   19.075684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.076146] page_type: f5(slab)
[   19.077009] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.077716] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.078488] page dumped because: kasan: bad access detected
[   19.079179] 
[   19.079427] Memory state around the buggy address:
[   19.079768]  fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc
[   19.080782]  fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.081427] >fff00000c59b8500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.082339]                                                        ^
[   19.083029]  fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.083910]  fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.084611] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   19.003345] ==================================================================
[   19.003949] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   19.004785] Read of size 1 at addr fff00000c5a02e28 by task kunit_try_catch/177
[   19.005419] 
[   19.005760] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.006015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.006139] Hardware name: linux,dummy-virt (DT)
[   19.006227] Call trace:
[   19.006282]  show_stack+0x20/0x38 (C)
[   19.006404]  dump_stack_lvl+0x8c/0xd0
[   19.006462]  print_report+0x118/0x608
[   19.006587]  kasan_report+0xdc/0x128
[   19.006713]  __asan_report_load1_noabort+0x20/0x30
[   19.006822]  kmalloc_uaf2+0x3f4/0x468
[   19.006932]  kunit_try_run_case+0x170/0x3f0
[   19.007028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.007122]  kthread+0x318/0x620
[   19.007173]  ret_from_fork+0x10/0x20
[   19.007227] 
[   19.012229] Allocated by task 177:
[   19.012776]  kasan_save_stack+0x3c/0x68
[   19.013323]  kasan_save_track+0x20/0x40
[   19.013811]  kasan_save_alloc_info+0x40/0x58
[   19.014258]  __kasan_kmalloc+0xd4/0xd8
[   19.015082]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.015534]  kmalloc_uaf2+0xc4/0x468
[   19.016036]  kunit_try_run_case+0x170/0x3f0
[   19.016573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.016969]  kthread+0x318/0x620
[   19.017411]  ret_from_fork+0x10/0x20
[   19.017860] 
[   19.018161] Freed by task 177:
[   19.018581]  kasan_save_stack+0x3c/0x68
[   19.019391]  kasan_save_track+0x20/0x40
[   19.019660]  kasan_save_free_info+0x4c/0x78
[   19.020173]  __kasan_slab_free+0x6c/0x98
[   19.020659]  kfree+0x214/0x3c8
[   19.021098]  kmalloc_uaf2+0x134/0x468
[   19.021518]  kunit_try_run_case+0x170/0x3f0
[   19.022022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.022482]  kthread+0x318/0x620
[   19.023150]  ret_from_fork+0x10/0x20
[   19.023348] 
[   19.023453] The buggy address belongs to the object at fff00000c5a02e00
[   19.023453]  which belongs to the cache kmalloc-64 of size 64
[   19.023805] The buggy address is located 40 bytes inside of
[   19.023805]  freed 64-byte region [fff00000c5a02e00, fff00000c5a02e40)
[   19.024120] 
[   19.024219] The buggy address belongs to the physical page:
[   19.024393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   19.024632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.025180] page_type: f5(slab)
[   19.025620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.026405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.027698] page dumped because: kasan: bad access detected
[   19.028312] 
[   19.028544] Memory state around the buggy address:
[   19.028951]  fff00000c5a02d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.029474]  fff00000c5a02d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.030797] >fff00000c5a02e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.031336]                                   ^
[   19.032039]  fff00000c5a02e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   19.032860]  fff00000c5a02f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.033513] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   18.960378] ==================================================================
[   18.960973] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   18.961783] Write of size 33 at addr fff00000c5a02d00 by task kunit_try_catch/175
[   18.962522] 
[   18.962963] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.963215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.963289] Hardware name: linux,dummy-virt (DT)
[   18.963390] Call trace:
[   18.963459]  show_stack+0x20/0x38 (C)
[   18.963576]  dump_stack_lvl+0x8c/0xd0
[   18.963686]  print_report+0x118/0x608
[   18.963802]  kasan_report+0xdc/0x128
[   18.963902]  kasan_check_range+0x100/0x1a8
[   18.964018]  __asan_memset+0x34/0x78
[   18.964123]  kmalloc_uaf_memset+0x170/0x310
[   18.964225]  kunit_try_run_case+0x170/0x3f0
[   18.964344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.964501]  kthread+0x318/0x620
[   18.964624]  ret_from_fork+0x10/0x20
[   18.964728] 
[   18.969834] Allocated by task 175:
[   18.970384]  kasan_save_stack+0x3c/0x68
[   18.971012]  kasan_save_track+0x20/0x40
[   18.971455]  kasan_save_alloc_info+0x40/0x58
[   18.971965]  __kasan_kmalloc+0xd4/0xd8
[   18.972525]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.972773]  kmalloc_uaf_memset+0xb8/0x310
[   18.973326]  kunit_try_run_case+0x170/0x3f0
[   18.973877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.974193]  kthread+0x318/0x620
[   18.974530]  ret_from_fork+0x10/0x20
[   18.974977] 
[   18.975307] Freed by task 175:
[   18.975763]  kasan_save_stack+0x3c/0x68
[   18.976227]  kasan_save_track+0x20/0x40
[   18.976682]  kasan_save_free_info+0x4c/0x78
[   18.977224]  __kasan_slab_free+0x6c/0x98
[   18.977680]  kfree+0x214/0x3c8
[   18.978027]  kmalloc_uaf_memset+0x11c/0x310
[   18.978649]  kunit_try_run_case+0x170/0x3f0
[   18.979132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.979465]  kthread+0x318/0x620
[   18.979711]  ret_from_fork+0x10/0x20
[   18.980092] 
[   18.980346] The buggy address belongs to the object at fff00000c5a02d00
[   18.980346]  which belongs to the cache kmalloc-64 of size 64
[   18.981414] The buggy address is located 0 bytes inside of
[   18.981414]  freed 64-byte region [fff00000c5a02d00, fff00000c5a02d40)
[   18.982617] 
[   18.982927] The buggy address belongs to the physical page:
[   18.983325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.984098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.984881] page_type: f5(slab)
[   18.985366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.986022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.986703] page dumped because: kasan: bad access detected
[   18.987326] 
[   18.987599] Memory state around the buggy address:
[   18.988130]  fff00000c5a02c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.988606]  fff00000c5a02c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.989335] >fff00000c5a02d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.989900]                    ^
[   18.990353]  fff00000c5a02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.991110]  fff00000c5a02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.991890] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   18.919162] ==================================================================
[   18.920019] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   18.920683] Read of size 1 at addr fff00000c59b8548 by task kunit_try_catch/173
[   18.921242] 
[   18.921590] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.921861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.921936] Hardware name: linux,dummy-virt (DT)
[   18.922026] Call trace:
[   18.922104]  show_stack+0x20/0x38 (C)
[   18.922230]  dump_stack_lvl+0x8c/0xd0
[   18.922357]  print_report+0x118/0x608
[   18.922456]  kasan_report+0xdc/0x128
[   18.922614]  __asan_report_load1_noabort+0x20/0x30
[   18.922754]  kmalloc_uaf+0x300/0x338
[   18.922858]  kunit_try_run_case+0x170/0x3f0
[   18.922960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.923074]  kthread+0x318/0x620
[   18.923166]  ret_from_fork+0x10/0x20
[   18.923277] 
[   18.928053] Allocated by task 173:
[   18.928498]  kasan_save_stack+0x3c/0x68
[   18.929035]  kasan_save_track+0x20/0x40
[   18.929473]  kasan_save_alloc_info+0x40/0x58
[   18.929949]  __kasan_kmalloc+0xd4/0xd8
[   18.930430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.931026]  kmalloc_uaf+0xb8/0x338
[   18.931328]  kunit_try_run_case+0x170/0x3f0
[   18.931624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.932300]  kthread+0x318/0x620
[   18.932793]  ret_from_fork+0x10/0x20
[   18.933285] 
[   18.933538] Freed by task 173:
[   18.933962]  kasan_save_stack+0x3c/0x68
[   18.934443]  kasan_save_track+0x20/0x40
[   18.935010]  kasan_save_free_info+0x4c/0x78
[   18.935691]  __kasan_slab_free+0x6c/0x98
[   18.936208]  kfree+0x214/0x3c8
[   18.936686]  kmalloc_uaf+0x11c/0x338
[   18.937133]  kunit_try_run_case+0x170/0x3f0
[   18.937629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.938277]  kthread+0x318/0x620
[   18.938948]  ret_from_fork+0x10/0x20
[   18.939392] 
[   18.939757] The buggy address belongs to the object at fff00000c59b8540
[   18.939757]  which belongs to the cache kmalloc-16 of size 16
[   18.940638] The buggy address is located 8 bytes inside of
[   18.940638]  freed 16-byte region [fff00000c59b8540, fff00000c59b8550)
[   18.941456] 
[   18.941809] The buggy address belongs to the physical page:
[   18.942521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   18.943290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.944126] page_type: f5(slab)
[   18.944646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.945188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.946048] page dumped because: kasan: bad access detected
[   18.946547] 
[   18.946712] Memory state around the buggy address:
[   18.947269]  fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc
[   18.947798]  fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.948294] >fff00000c59b8500: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   18.948850]                                               ^
[   18.949338]  fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.949875]  fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.950409] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   18.881487] ==================================================================
[   18.882446] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   18.883843] Read of size 64 at addr fff00000c5a02c04 by task kunit_try_catch/171
[   18.884399] 
[   18.884650] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.884823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.884857] Hardware name: linux,dummy-virt (DT)
[   18.884896] Call trace:
[   18.884927]  show_stack+0x20/0x38 (C)
[   18.885008]  dump_stack_lvl+0x8c/0xd0
[   18.885062]  print_report+0x118/0x608
[   18.885110]  kasan_report+0xdc/0x128
[   18.885157]  kasan_check_range+0x100/0x1a8
[   18.885206]  __asan_memmove+0x3c/0x98
[   18.885251]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   18.885302]  kunit_try_run_case+0x170/0x3f0
[   18.885350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.885402]  kthread+0x318/0x620
[   18.885448]  ret_from_fork+0x10/0x20
[   18.885499] 
[   18.891680] Allocated by task 171:
[   18.892110]  kasan_save_stack+0x3c/0x68
[   18.893212]  kasan_save_track+0x20/0x40
[   18.893678]  kasan_save_alloc_info+0x40/0x58
[   18.894035]  __kasan_kmalloc+0xd4/0xd8
[   18.895000]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.895500]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   18.896205]  kunit_try_run_case+0x170/0x3f0
[   18.896778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.897426]  kthread+0x318/0x620
[   18.897945]  ret_from_fork+0x10/0x20
[   18.898504] 
[   18.899220] The buggy address belongs to the object at fff00000c5a02c00
[   18.899220]  which belongs to the cache kmalloc-64 of size 64
[   18.899963] The buggy address is located 4 bytes inside of
[   18.899963]  allocated 64-byte region [fff00000c5a02c00, fff00000c5a02c40)
[   18.901643] 
[   18.901831] The buggy address belongs to the physical page:
[   18.902196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.903261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.903881] page_type: f5(slab)
[   18.904368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.904932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.905585] page dumped because: kasan: bad access detected
[   18.906091] 
[   18.906378] Memory state around the buggy address:
[   18.906900]  fff00000c5a02b00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.907463]  fff00000c5a02b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.907996] >fff00000c5a02c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.908584]                                            ^
[   18.909199]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.909708]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.910426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   18.842342] ==================================================================
[   18.843188] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   18.843658] Read of size 18446744073709551614 at addr fff00000c1eecc04 by task kunit_try_catch/169
[   18.844315] 
[   18.844663] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.844887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.844943] Hardware name: linux,dummy-virt (DT)
[   18.845017] Call trace:
[   18.845072]  show_stack+0x20/0x38 (C)
[   18.845199]  dump_stack_lvl+0x8c/0xd0
[   18.845312]  print_report+0x118/0x608
[   18.845412]  kasan_report+0xdc/0x128
[   18.845516]  kasan_check_range+0x100/0x1a8
[   18.845664]  __asan_memmove+0x3c/0x98
[   18.845771]  kmalloc_memmove_negative_size+0x154/0x2e0
[   18.845896]  kunit_try_run_case+0x170/0x3f0
[   18.846014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.846089]  kthread+0x318/0x620
[   18.846144]  ret_from_fork+0x10/0x20
[   18.846201] 
[   18.852334] Allocated by task 169:
[   18.852922]  kasan_save_stack+0x3c/0x68
[   18.853482]  kasan_save_track+0x20/0x40
[   18.854041]  kasan_save_alloc_info+0x40/0x58
[   18.854783]  __kasan_kmalloc+0xd4/0xd8
[   18.855383]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.855909]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   18.856467]  kunit_try_run_case+0x170/0x3f0
[   18.856987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.857651]  kthread+0x318/0x620
[   18.858145]  ret_from_fork+0x10/0x20
[   18.858667] 
[   18.858902] The buggy address belongs to the object at fff00000c1eecc00
[   18.858902]  which belongs to the cache kmalloc-64 of size 64
[   18.859706] The buggy address is located 4 bytes inside of
[   18.859706]  64-byte region [fff00000c1eecc00, fff00000c1eecc40)
[   18.860385] 
[   18.860578] The buggy address belongs to the physical page:
[   18.861509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eec
[   18.862448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.862996] page_type: f5(slab)
[   18.863325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.863908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.864415] page dumped because: kasan: bad access detected
[   18.864905] 
[   18.865171] Memory state around the buggy address:
[   18.865753]  fff00000c1eecb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.866555]  fff00000c1eecb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.867263] >fff00000c1eecc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.867958]                    ^
[   18.868696]  fff00000c1eecc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.869307]  fff00000c1eecd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.869958] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   18.808665] ==================================================================
[   18.809289] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   18.809626] Write of size 16 at addr fff00000c59c2969 by task kunit_try_catch/167
[   18.810128] 
[   18.810325] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.810422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.810452] Hardware name: linux,dummy-virt (DT)
[   18.812163] Call trace:
[   18.812214]  show_stack+0x20/0x38 (C)
[   18.812284]  dump_stack_lvl+0x8c/0xd0
[   18.812335]  print_report+0x118/0x608
[   18.812383]  kasan_report+0xdc/0x128
[   18.812429]  kasan_check_range+0x100/0x1a8
[   18.812478]  __asan_memset+0x34/0x78
[   18.812525]  kmalloc_oob_memset_16+0x150/0x2f8
[   18.812571]  kunit_try_run_case+0x170/0x3f0
[   18.812619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.812669]  kthread+0x318/0x620
[   18.812715]  ret_from_fork+0x10/0x20
[   18.812793] 
[   18.817250] Allocated by task 167:
[   18.817465]  kasan_save_stack+0x3c/0x68
[   18.817704]  kasan_save_track+0x20/0x40
[   18.818016]  kasan_save_alloc_info+0x40/0x58
[   18.819048]  __kasan_kmalloc+0xd4/0xd8
[   18.819528]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.819898]  kmalloc_oob_memset_16+0xb0/0x2f8
[   18.820244]  kunit_try_run_case+0x170/0x3f0
[   18.820556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.820954]  kthread+0x318/0x620
[   18.821224]  ret_from_fork+0x10/0x20
[   18.821656] 
[   18.821955] The buggy address belongs to the object at fff00000c59c2900
[   18.821955]  which belongs to the cache kmalloc-128 of size 128
[   18.823973] The buggy address is located 105 bytes inside of
[   18.823973]  allocated 120-byte region [fff00000c59c2900, fff00000c59c2978)
[   18.825109] 
[   18.825317] The buggy address belongs to the physical page:
[   18.825592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   18.826457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.827094] page_type: f5(slab)
[   18.827793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.828624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.829318] page dumped because: kasan: bad access detected
[   18.829719] 
[   18.829937] Memory state around the buggy address:
[   18.830350]  fff00000c59c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.831213]  fff00000c59c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831591] >fff00000c59c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.831984]                                                                 ^
[   18.832845]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.833384]  fff00000c59c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.834074] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   18.770491] ==================================================================
[   18.771321] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   18.771796] Write of size 8 at addr fff00000c59c2871 by task kunit_try_catch/165
[   18.772499] 
[   18.772840] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.773015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.773081] Hardware name: linux,dummy-virt (DT)
[   18.773157] Call trace:
[   18.773212]  show_stack+0x20/0x38 (C)
[   18.773359]  dump_stack_lvl+0x8c/0xd0
[   18.773449]  print_report+0x118/0x608
[   18.773552]  kasan_report+0xdc/0x128
[   18.773662]  kasan_check_range+0x100/0x1a8
[   18.773783]  __asan_memset+0x34/0x78
[   18.773896]  kmalloc_oob_memset_8+0x150/0x2f8
[   18.773982]  kunit_try_run_case+0x170/0x3f0
[   18.774042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.774146]  kthread+0x318/0x620
[   18.774200]  ret_from_fork+0x10/0x20
[   18.774257] 
[   18.781296] Allocated by task 165:
[   18.781703]  kasan_save_stack+0x3c/0x68
[   18.782143]  kasan_save_track+0x20/0x40
[   18.782515]  kasan_save_alloc_info+0x40/0x58
[   18.783758]  __kasan_kmalloc+0xd4/0xd8
[   18.784205]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.784806]  kmalloc_oob_memset_8+0xb0/0x2f8
[   18.785256]  kunit_try_run_case+0x170/0x3f0
[   18.785790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.786386]  kthread+0x318/0x620
[   18.786876]  ret_from_fork+0x10/0x20
[   18.787317] 
[   18.787561] The buggy address belongs to the object at fff00000c59c2800
[   18.787561]  which belongs to the cache kmalloc-128 of size 128
[   18.788233] The buggy address is located 113 bytes inside of
[   18.788233]  allocated 120-byte region [fff00000c59c2800, fff00000c59c2878)
[   18.789652] 
[   18.789970] The buggy address belongs to the physical page:
[   18.790422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   18.791999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.792548] page_type: f5(slab)
[   18.792963] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.793618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.794256] page dumped because: kasan: bad access detected
[   18.795156] 
[   18.795391] Memory state around the buggy address:
[   18.795789]  fff00000c59c2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.796312]  fff00000c59c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.796985] >fff00000c59c2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.797532]                                                                 ^
[   18.798189]  fff00000c59c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.798926]  fff00000c59c2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.799761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   18.735932] ==================================================================
[   18.736647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   18.737669] Write of size 4 at addr fff00000c5a05275 by task kunit_try_catch/163
[   18.738176] 
[   18.738828] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.739041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.739133] Hardware name: linux,dummy-virt (DT)
[   18.739215] Call trace:
[   18.739275]  show_stack+0x20/0x38 (C)
[   18.739372]  dump_stack_lvl+0x8c/0xd0
[   18.739428]  print_report+0x118/0x608
[   18.739480]  kasan_report+0xdc/0x128
[   18.739530]  kasan_check_range+0x100/0x1a8
[   18.739582]  __asan_memset+0x34/0x78
[   18.739630]  kmalloc_oob_memset_4+0x150/0x300
[   18.739680]  kunit_try_run_case+0x170/0x3f0
[   18.739733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.739809]  kthread+0x318/0x620
[   18.739859]  ret_from_fork+0x10/0x20
[   18.739915] 
[   18.744553] Allocated by task 163:
[   18.745031]  kasan_save_stack+0x3c/0x68
[   18.745553]  kasan_save_track+0x20/0x40
[   18.746025]  kasan_save_alloc_info+0x40/0x58
[   18.746450]  __kasan_kmalloc+0xd4/0xd8
[   18.746977]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.747405]  kmalloc_oob_memset_4+0xb0/0x300
[   18.747957]  kunit_try_run_case+0x170/0x3f0
[   18.748410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.749007]  kthread+0x318/0x620
[   18.749366]  ret_from_fork+0x10/0x20
[   18.749712] 
[   18.749961] The buggy address belongs to the object at fff00000c5a05200
[   18.749961]  which belongs to the cache kmalloc-128 of size 128
[   18.751337] The buggy address is located 117 bytes inside of
[   18.751337]  allocated 120-byte region [fff00000c5a05200, fff00000c5a05278)
[   18.752255] 
[   18.752572] The buggy address belongs to the physical page:
[   18.753128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   18.753786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.754405] page_type: f5(slab)
[   18.754771] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.755449] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.756069] page dumped because: kasan: bad access detected
[   18.756530] 
[   18.756794] Memory state around the buggy address:
[   18.757286]  fff00000c5a05100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.757889]  fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.758498] >fff00000c5a05200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.759088]                                                                 ^
[   18.759661]  fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.760249]  fff00000c5a05300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.760812] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   18.697634] ==================================================================
[   18.698363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   18.699474] Write of size 2 at addr fff00000c59c2777 by task kunit_try_catch/161
[   18.700508] 
[   18.700885] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.701040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.701108] Hardware name: linux,dummy-virt (DT)
[   18.701347] Call trace:
[   18.701384]  show_stack+0x20/0x38 (C)
[   18.701454]  dump_stack_lvl+0x8c/0xd0
[   18.701510]  print_report+0x118/0x608
[   18.701562]  kasan_report+0xdc/0x128
[   18.701611]  kasan_check_range+0x100/0x1a8
[   18.701663]  __asan_memset+0x34/0x78
[   18.701710]  kmalloc_oob_memset_2+0x150/0x2f8
[   18.701786]  kunit_try_run_case+0x170/0x3f0
[   18.701844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.701900]  kthread+0x318/0x620
[   18.701949]  ret_from_fork+0x10/0x20
[   18.702004] 
[   18.707775] Allocated by task 161:
[   18.708305]  kasan_save_stack+0x3c/0x68
[   18.708796]  kasan_save_track+0x20/0x40
[   18.709233]  kasan_save_alloc_info+0x40/0x58
[   18.709703]  __kasan_kmalloc+0xd4/0xd8
[   18.710152]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.710924]  kmalloc_oob_memset_2+0xb0/0x2f8
[   18.711325]  kunit_try_run_case+0x170/0x3f0
[   18.711860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.712458]  kthread+0x318/0x620
[   18.712915]  ret_from_fork+0x10/0x20
[   18.713371] 
[   18.713671] The buggy address belongs to the object at fff00000c59c2700
[   18.713671]  which belongs to the cache kmalloc-128 of size 128
[   18.714902] The buggy address is located 119 bytes inside of
[   18.714902]  allocated 120-byte region [fff00000c59c2700, fff00000c59c2778)
[   18.716234] 
[   18.716438] The buggy address belongs to the physical page:
[   18.716629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   18.716906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.717130] page_type: f5(slab)
[   18.717284] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.717518] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.717770] page dumped because: kasan: bad access detected
[   18.718371] 
[   18.718647] Memory state around the buggy address:
[   18.720213]  fff00000c59c2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.721168]  fff00000c59c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.721830] >fff00000c59c2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.722352]                                                                 ^
[   18.723252]  fff00000c59c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.723912]  fff00000c59c2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.724634] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   18.658079] ==================================================================
[   18.658688] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   18.659516] Write of size 128 at addr fff00000c5a05100 by task kunit_try_catch/159
[   18.660361] 
[   18.661083] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.661629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.661667] Hardware name: linux,dummy-virt (DT)
[   18.661704] Call trace:
[   18.661733]  show_stack+0x20/0x38 (C)
[   18.661824]  dump_stack_lvl+0x8c/0xd0
[   18.661878]  print_report+0x118/0x608
[   18.661929]  kasan_report+0xdc/0x128
[   18.661978]  kasan_check_range+0x100/0x1a8
[   18.662029]  __asan_memset+0x34/0x78
[   18.662086]  kmalloc_oob_in_memset+0x144/0x2d0
[   18.662139]  kunit_try_run_case+0x170/0x3f0
[   18.662191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.662246]  kthread+0x318/0x620
[   18.662294]  ret_from_fork+0x10/0x20
[   18.662347] 
[   18.667945] Allocated by task 159:
[   18.668239]  kasan_save_stack+0x3c/0x68
[   18.668605]  kasan_save_track+0x20/0x40
[   18.670069]  kasan_save_alloc_info+0x40/0x58
[   18.670533]  __kasan_kmalloc+0xd4/0xd8
[   18.671326]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.671789]  kmalloc_oob_in_memset+0xb0/0x2d0
[   18.672320]  kunit_try_run_case+0x170/0x3f0
[   18.672790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.673408]  kthread+0x318/0x620
[   18.673761]  ret_from_fork+0x10/0x20
[   18.674236] 
[   18.674504] The buggy address belongs to the object at fff00000c5a05100
[   18.674504]  which belongs to the cache kmalloc-128 of size 128
[   18.676130] The buggy address is located 0 bytes inside of
[   18.676130]  allocated 120-byte region [fff00000c5a05100, fff00000c5a05178)
[   18.677192] 
[   18.677441] The buggy address belongs to the physical page:
[   18.678003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   18.678706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.679500] page_type: f5(slab)
[   18.679786] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.680686] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.681315] page dumped because: kasan: bad access detected
[   18.681876] 
[   18.682128] Memory state around the buggy address:
[   18.683439]  fff00000c5a05000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.684088]  fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.684720] >fff00000c5a05100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.685351]                                                                 ^
[   18.685961]  fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.686573]  fff00000c5a05200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.687170] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   18.618327] ==================================================================
[   18.619445] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   18.619802] Read of size 16 at addr fff00000c1e7a0c0 by task kunit_try_catch/157
[   18.620873] 
[   18.621149] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.621553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.621595] Hardware name: linux,dummy-virt (DT)
[   18.621635] Call trace:
[   18.621662]  show_stack+0x20/0x38 (C)
[   18.621731]  dump_stack_lvl+0x8c/0xd0
[   18.621813]  print_report+0x118/0x608
[   18.621866]  kasan_report+0xdc/0x128
[   18.621917]  __asan_report_load16_noabort+0x20/0x30
[   18.621969]  kmalloc_uaf_16+0x3bc/0x438
[   18.622018]  kunit_try_run_case+0x170/0x3f0
[   18.622086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622146]  kthread+0x318/0x620
[   18.622197]  ret_from_fork+0x10/0x20
[   18.622253] 
[   18.627309] Allocated by task 157:
[   18.627765]  kasan_save_stack+0x3c/0x68
[   18.628284]  kasan_save_track+0x20/0x40
[   18.628781]  kasan_save_alloc_info+0x40/0x58
[   18.629251]  __kasan_kmalloc+0xd4/0xd8
[   18.629721]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.630282]  kmalloc_uaf_16+0x140/0x438
[   18.630850]  kunit_try_run_case+0x170/0x3f0
[   18.631326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.632008]  kthread+0x318/0x620
[   18.632394]  ret_from_fork+0x10/0x20
[   18.632875] 
[   18.633212] Freed by task 157:
[   18.633609]  kasan_save_stack+0x3c/0x68
[   18.634138]  kasan_save_track+0x20/0x40
[   18.634663]  kasan_save_free_info+0x4c/0x78
[   18.635080]  __kasan_slab_free+0x6c/0x98
[   18.635420]  kfree+0x214/0x3c8
[   18.635707]  kmalloc_uaf_16+0x190/0x438
[   18.636247]  kunit_try_run_case+0x170/0x3f0
[   18.636664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.637173]  kthread+0x318/0x620
[   18.637564]  ret_from_fork+0x10/0x20
[   18.638104] 
[   18.638458] The buggy address belongs to the object at fff00000c1e7a0c0
[   18.638458]  which belongs to the cache kmalloc-16 of size 16
[   18.639175] The buggy address is located 0 bytes inside of
[   18.639175]  freed 16-byte region [fff00000c1e7a0c0, fff00000c1e7a0d0)
[   18.640305] 
[   18.640597] The buggy address belongs to the physical page:
[   18.641196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a
[   18.641951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.642622] page_type: f5(slab)
[   18.642951] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.643752] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.644473] page dumped because: kasan: bad access detected
[   18.644988] 
[   18.645257] Memory state around the buggy address:
[   18.645826]  fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.646571]  fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.646987] >fff00000c1e7a080: 00 04 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   18.647477]                                            ^
[   18.648221]  fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.648815]  fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.649592] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   18.583704] ==================================================================
[   18.584416] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   18.585158] Write of size 16 at addr fff00000c59b8500 by task kunit_try_catch/155
[   18.585871] 
[   18.586210] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.586432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.586497] Hardware name: linux,dummy-virt (DT)
[   18.586569] Call trace:
[   18.586623]  show_stack+0x20/0x38 (C)
[   18.586808]  dump_stack_lvl+0x8c/0xd0
[   18.586915]  print_report+0x118/0x608
[   18.587027]  kasan_report+0xdc/0x128
[   18.587129]  __asan_report_store16_noabort+0x20/0x30
[   18.587218]  kmalloc_oob_16+0x3a0/0x3f8
[   18.587305]  kunit_try_run_case+0x170/0x3f0
[   18.587393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.587458]  kthread+0x318/0x620
[   18.587509]  ret_from_fork+0x10/0x20
[   18.587564] 
[   18.592320] Allocated by task 155:
[   18.592717]  kasan_save_stack+0x3c/0x68
[   18.593270]  kasan_save_track+0x20/0x40
[   18.593751]  kasan_save_alloc_info+0x40/0x58
[   18.594260]  __kasan_kmalloc+0xd4/0xd8
[   18.594791]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.595265]  kmalloc_oob_16+0xb4/0x3f8
[   18.595590]  kunit_try_run_case+0x170/0x3f0
[   18.596042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.596599]  kthread+0x318/0x620
[   18.596909]  ret_from_fork+0x10/0x20
[   18.597389] 
[   18.597707] The buggy address belongs to the object at fff00000c59b8500
[   18.597707]  which belongs to the cache kmalloc-16 of size 16
[   18.599224] The buggy address is located 0 bytes inside of
[   18.599224]  allocated 13-byte region [fff00000c59b8500, fff00000c59b850d)
[   18.600207] 
[   18.600498] The buggy address belongs to the physical page:
[   18.601050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   18.601774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.602437] page_type: f5(slab)
[   18.602957] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.603836] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.604504] page dumped because: kasan: bad access detected
[   18.605016] 
[   18.605258] Memory state around the buggy address:
[   18.605688]  fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc
[   18.606223]  fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.607800] >fff00000c59b8500: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.608430]                       ^
[   18.608832]  fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.609446]  fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.610073] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   18.537659] ==================================================================
[   18.538288] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   18.538981] Read of size 1 at addr fff00000c49e1200 by task kunit_try_catch/153
[   18.539716] 
[   18.540063] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.540310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.540378] Hardware name: linux,dummy-virt (DT)
[   18.540438] Call trace:
[   18.540485]  show_stack+0x20/0x38 (C)
[   18.540587]  dump_stack_lvl+0x8c/0xd0
[   18.540667]  print_report+0x118/0x608
[   18.540770]  kasan_report+0xdc/0x128
[   18.540854]  __asan_report_load1_noabort+0x20/0x30
[   18.540955]  krealloc_uaf+0x4c8/0x520
[   18.541045]  kunit_try_run_case+0x170/0x3f0
[   18.541127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.541221]  kthread+0x318/0x620
[   18.541303]  ret_from_fork+0x10/0x20
[   18.541395] 
[   18.547228] Allocated by task 153:
[   18.547675]  kasan_save_stack+0x3c/0x68
[   18.548279]  kasan_save_track+0x20/0x40
[   18.548795]  kasan_save_alloc_info+0x40/0x58
[   18.549273]  __kasan_kmalloc+0xd4/0xd8
[   18.549761]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.550321]  krealloc_uaf+0xc8/0x520
[   18.550943]  kunit_try_run_case+0x170/0x3f0
[   18.551478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.552114]  kthread+0x318/0x620
[   18.552529]  ret_from_fork+0x10/0x20
[   18.553034] 
[   18.553307] Freed by task 153:
[   18.553687]  kasan_save_stack+0x3c/0x68
[   18.554201]  kasan_save_track+0x20/0x40
[   18.554899]  kasan_save_free_info+0x4c/0x78
[   18.555395]  __kasan_slab_free+0x6c/0x98
[   18.555837]  kfree+0x214/0x3c8
[   18.556195]  krealloc_uaf+0x12c/0x520
[   18.556631]  kunit_try_run_case+0x170/0x3f0
[   18.557096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.557659]  kthread+0x318/0x620
[   18.558076]  ret_from_fork+0x10/0x20
[   18.558707] 
[   18.558961] The buggy address belongs to the object at fff00000c49e1200
[   18.558961]  which belongs to the cache kmalloc-256 of size 256
[   18.560677] The buggy address is located 0 bytes inside of
[   18.560677]  freed 256-byte region [fff00000c49e1200, fff00000c49e1300)
[   18.561657] 
[   18.561907] The buggy address belongs to the physical page:
[   18.562501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.563148] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.563727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.564564] page_type: f5(slab)
[   18.564992] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.565684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.566406] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.567237] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.567854] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.568487] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.569113] page dumped because: kasan: bad access detected
[   18.569554] 
[   18.569853] Memory state around the buggy address:
[   18.570296]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.571188]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.571863] >fff00000c49e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.572437]                    ^
[   18.572734]  fff00000c49e1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.573357]  fff00000c49e1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.573956] ==================================================================
[   18.497371] ==================================================================
[   18.498162] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   18.499491] Read of size 1 at addr fff00000c49e1200 by task kunit_try_catch/153
[   18.500480] 
[   18.500715] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.500923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.500983] Hardware name: linux,dummy-virt (DT)
[   18.501052] Call trace:
[   18.501104]  show_stack+0x20/0x38 (C)
[   18.501222]  dump_stack_lvl+0x8c/0xd0
[   18.501325]  print_report+0x118/0x608
[   18.501419]  kasan_report+0xdc/0x128
[   18.501514]  __kasan_check_byte+0x54/0x70
[   18.501607]  krealloc_noprof+0x44/0x360
[   18.501666]  krealloc_uaf+0x180/0x520
[   18.501727]  kunit_try_run_case+0x170/0x3f0
[   18.502147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.502207]  kthread+0x318/0x620
[   18.502258]  ret_from_fork+0x10/0x20
[   18.502314] 
[   18.507393] Allocated by task 153:
[   18.507996]  kasan_save_stack+0x3c/0x68
[   18.508656]  kasan_save_track+0x20/0x40
[   18.509179]  kasan_save_alloc_info+0x40/0x58
[   18.509773]  __kasan_kmalloc+0xd4/0xd8
[   18.510295]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.511103]  krealloc_uaf+0xc8/0x520
[   18.511621]  kunit_try_run_case+0x170/0x3f0
[   18.512178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.512713]  kthread+0x318/0x620
[   18.513141]  ret_from_fork+0x10/0x20
[   18.513628] 
[   18.513921] Freed by task 153:
[   18.514342]  kasan_save_stack+0x3c/0x68
[   18.515049]  kasan_save_track+0x20/0x40
[   18.515404]  kasan_save_free_info+0x4c/0x78
[   18.515899]  __kasan_slab_free+0x6c/0x98
[   18.516394]  kfree+0x214/0x3c8
[   18.516791]  krealloc_uaf+0x12c/0x520
[   18.517024]  kunit_try_run_case+0x170/0x3f0
[   18.517580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.518151]  kthread+0x318/0x620
[   18.519773]  ret_from_fork+0x10/0x20
[   18.520050] 
[   18.520385] The buggy address belongs to the object at fff00000c49e1200
[   18.520385]  which belongs to the cache kmalloc-256 of size 256
[   18.521554] The buggy address is located 0 bytes inside of
[   18.521554]  freed 256-byte region [fff00000c49e1200, fff00000c49e1300)
[   18.522803] 
[   18.523130] The buggy address belongs to the physical page:
[   18.523868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.524595] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.525288] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.525964] page_type: f5(slab)
[   18.526405] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.527042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.527861] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.528491] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.529145] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.529864] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.530825] page dumped because: kasan: bad access detected
[   18.531272] 
[   18.531542] Memory state around the buggy address:
[   18.532038]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.532502]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.533242] >fff00000c49e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.533786]                    ^
[   18.534237]  fff00000c49e1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.535035]  fff00000c49e1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.535551] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   18.402799] ==================================================================
[   18.404419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.404996] Write of size 1 at addr fff00000c609a0d0 by task kunit_try_catch/151
[   18.405559] 
[   18.405832] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.406013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.406085] Hardware name: linux,dummy-virt (DT)
[   18.406161] Call trace:
[   18.406218]  show_stack+0x20/0x38 (C)
[   18.406344]  dump_stack_lvl+0x8c/0xd0
[   18.406457]  print_report+0x118/0x608
[   18.406841]  kasan_report+0xdc/0x128
[   18.406920]  __asan_report_store1_noabort+0x20/0x30
[   18.406974]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.407028]  krealloc_large_less_oob+0x20/0x38
[   18.407080]  kunit_try_run_case+0x170/0x3f0
[   18.407132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.407186]  kthread+0x318/0x620
[   18.407235]  ret_from_fork+0x10/0x20
[   18.407288] 
[   18.411720] The buggy address belongs to the physical page:
[   18.412273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098
[   18.412861] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.413448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.414132] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.414624] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.415349] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.415913] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.416502] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000
[   18.417303] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.417810] page dumped because: kasan: bad access detected
[   18.418285] 
[   18.418786] Memory state around the buggy address:
[   18.419300]  fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.419813]  fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.420371] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.420991]                                                  ^
[   18.421449]  fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.422010]  fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.423520] ==================================================================
[   18.200538] ==================================================================
[   18.201472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   18.202185] Write of size 1 at addr fff00000c49e10d0 by task kunit_try_catch/147
[   18.203225] 
[   18.203730] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.203925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.203980] Hardware name: linux,dummy-virt (DT)
[   18.204045] Call trace:
[   18.204089]  show_stack+0x20/0x38 (C)
[   18.204434]  dump_stack_lvl+0x8c/0xd0
[   18.204800]  print_report+0x118/0x608
[   18.204891]  kasan_report+0xdc/0x128
[   18.204941]  __asan_report_store1_noabort+0x20/0x30
[   18.204991]  krealloc_less_oob_helper+0xb9c/0xc50
[   18.205042]  krealloc_less_oob+0x20/0x38
[   18.205088]  kunit_try_run_case+0x170/0x3f0
[   18.205138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.205189]  kthread+0x318/0x620
[   18.205236]  ret_from_fork+0x10/0x20
[   18.205286] 
[   18.209870] Allocated by task 147:
[   18.210330]  kasan_save_stack+0x3c/0x68
[   18.210944]  kasan_save_track+0x20/0x40
[   18.211299]  kasan_save_alloc_info+0x40/0x58
[   18.211655]  __kasan_krealloc+0x118/0x178
[   18.212145]  krealloc_noprof+0x128/0x360
[   18.212657]  krealloc_less_oob_helper+0x168/0xc50
[   18.213217]  krealloc_less_oob+0x20/0x38
[   18.213708]  kunit_try_run_case+0x170/0x3f0
[   18.214182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.214853]  kthread+0x318/0x620
[   18.215183]  ret_from_fork+0x10/0x20
[   18.215683] 
[   18.215988] The buggy address belongs to the object at fff00000c49e1000
[   18.215988]  which belongs to the cache kmalloc-256 of size 256
[   18.216888] The buggy address is located 7 bytes to the right of
[   18.216888]  allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9)
[   18.217861] 
[   18.218155] The buggy address belongs to the physical page:
[   18.218635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.219341] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.219914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.220386] page_type: f5(slab)
[   18.220861] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.221588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.222242] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.222961] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.223663] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.224344] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.224905] page dumped because: kasan: bad access detected
[   18.225303] 
[   18.225564] Memory state around the buggy address:
[   18.225994]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.226722]  fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.227454] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.228034]                                                  ^
[   18.228449]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.229147]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.229631] ==================================================================
[   18.171003] ==================================================================
[   18.172017] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.172628] Write of size 1 at addr fff00000c49e10c9 by task kunit_try_catch/147
[   18.173366] 
[   18.173692] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.173932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.174001] Hardware name: linux,dummy-virt (DT)
[   18.174085] Call trace:
[   18.174157]  show_stack+0x20/0x38 (C)
[   18.174301]  dump_stack_lvl+0x8c/0xd0
[   18.174417]  print_report+0x118/0x608
[   18.174530]  kasan_report+0xdc/0x128
[   18.174787]  __asan_report_store1_noabort+0x20/0x30
[   18.174939]  krealloc_less_oob_helper+0xa48/0xc50
[   18.175048]  krealloc_less_oob+0x20/0x38
[   18.175122]  kunit_try_run_case+0x170/0x3f0
[   18.175178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.175234]  kthread+0x318/0x620
[   18.175284]  ret_from_fork+0x10/0x20
[   18.175339] 
[   18.180775] Allocated by task 147:
[   18.181230]  kasan_save_stack+0x3c/0x68
[   18.181592]  kasan_save_track+0x20/0x40
[   18.182110]  kasan_save_alloc_info+0x40/0x58
[   18.182808]  __kasan_krealloc+0x118/0x178
[   18.183410]  krealloc_noprof+0x128/0x360
[   18.183879]  krealloc_less_oob_helper+0x168/0xc50
[   18.184313]  krealloc_less_oob+0x20/0x38
[   18.184774]  kunit_try_run_case+0x170/0x3f0
[   18.185208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.185719]  kthread+0x318/0x620
[   18.186119]  ret_from_fork+0x10/0x20
[   18.186460] 
[   18.186887] The buggy address belongs to the object at fff00000c49e1000
[   18.186887]  which belongs to the cache kmalloc-256 of size 256
[   18.187713] The buggy address is located 0 bytes to the right of
[   18.187713]  allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9)
[   18.188650] 
[   18.188958] The buggy address belongs to the physical page:
[   18.189479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.189786] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.190011] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.190263] page_type: f5(slab)
[   18.190414] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.192276] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.192637] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.192897] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.193124] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.193347] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.193560] page dumped because: kasan: bad access detected
[   18.193731] 
[   18.194914] Memory state around the buggy address:
[   18.195776]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.196309]  fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.196795] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.197271]                                               ^
[   18.197647]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.198528]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.199171] ==================================================================
[   18.424275] ==================================================================
[   18.424873] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.425635] Write of size 1 at addr fff00000c609a0da by task kunit_try_catch/151
[   18.426297] 
[   18.426617] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.426827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.426890] Hardware name: linux,dummy-virt (DT)
[   18.426962] Call trace:
[   18.427015]  show_stack+0x20/0x38 (C)
[   18.427135]  dump_stack_lvl+0x8c/0xd0
[   18.427250]  print_report+0x118/0x608
[   18.427354]  kasan_report+0xdc/0x128
[   18.427464]  __asan_report_store1_noabort+0x20/0x30
[   18.427577]  krealloc_less_oob_helper+0xa80/0xc50
[   18.427685]  krealloc_large_less_oob+0x20/0x38
[   18.427814]  kunit_try_run_case+0x170/0x3f0
[   18.427923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.428041]  kthread+0x318/0x620
[   18.428126]  ret_from_fork+0x10/0x20
[   18.428186] 
[   18.433311] The buggy address belongs to the physical page:
[   18.433883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098
[   18.434568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.435060] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.436050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.436647] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.437183] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.437841] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.438304] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000
[   18.439241] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.439841] page dumped because: kasan: bad access detected
[   18.440227] 
[   18.440475] Memory state around the buggy address:
[   18.440914]  fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.441598]  fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.442147] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.442864]                                                     ^
[   18.443393]  fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.444067]  fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.444585] ==================================================================
[   18.381255] ==================================================================
[   18.381925] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   18.382938] Write of size 1 at addr fff00000c609a0c9 by task kunit_try_catch/151
[   18.383829] 
[   18.384136] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.384324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.384377] Hardware name: linux,dummy-virt (DT)
[   18.384448] Call trace:
[   18.384487]  show_stack+0x20/0x38 (C)
[   18.384554]  dump_stack_lvl+0x8c/0xd0
[   18.384609]  print_report+0x118/0x608
[   18.384661]  kasan_report+0xdc/0x128
[   18.384710]  __asan_report_store1_noabort+0x20/0x30
[   18.384797]  krealloc_less_oob_helper+0xa48/0xc50
[   18.384858]  krealloc_large_less_oob+0x20/0x38
[   18.384912]  kunit_try_run_case+0x170/0x3f0
[   18.384962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.385013]  kthread+0x318/0x620
[   18.385059]  ret_from_fork+0x10/0x20
[   18.385109] 
[   18.390162] The buggy address belongs to the physical page:
[   18.391009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098
[   18.391656] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.392228] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.392800] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.393440] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.394150] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.395058] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.395601] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000
[   18.396280] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.396847] page dumped because: kasan: bad access detected
[   18.397220] 
[   18.397456] Memory state around the buggy address:
[   18.397862]  fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.398439]  fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.399065] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.399602]                                               ^
[   18.400033]  fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.400586]  fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.401397] ==================================================================
[   18.446395] ==================================================================
[   18.447204] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.447817] Write of size 1 at addr fff00000c609a0ea by task kunit_try_catch/151
[   18.448381] 
[   18.448687] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.448885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.448951] Hardware name: linux,dummy-virt (DT)
[   18.449023] Call trace:
[   18.449076]  show_stack+0x20/0x38 (C)
[   18.449200]  dump_stack_lvl+0x8c/0xd0
[   18.449312]  print_report+0x118/0x608
[   18.449425]  kasan_report+0xdc/0x128
[   18.449531]  __asan_report_store1_noabort+0x20/0x30
[   18.449638]  krealloc_less_oob_helper+0xae4/0xc50
[   18.449766]  krealloc_large_less_oob+0x20/0x38
[   18.449872]  kunit_try_run_case+0x170/0x3f0
[   18.449932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.449989]  kthread+0x318/0x620
[   18.450039]  ret_from_fork+0x10/0x20
[   18.450116] 
[   18.454778] The buggy address belongs to the physical page:
[   18.455584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098
[   18.456278] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.456895] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.457509] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.458146] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.459115] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.459681] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.460382] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000
[   18.460993] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.461510] page dumped because: kasan: bad access detected
[   18.462009] 
[   18.462286] Memory state around the buggy address:
[   18.463711]  fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.464300]  fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.465003] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.465451]                                                           ^
[   18.466103]  fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.467017]  fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.467524] ==================================================================
[   18.468588] ==================================================================
[   18.469157] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.469755] Write of size 1 at addr fff00000c609a0eb by task kunit_try_catch/151
[   18.470337] 
[   18.470588] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.470799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.470868] Hardware name: linux,dummy-virt (DT)
[   18.471369] Call trace:
[   18.471450]  show_stack+0x20/0x38 (C)
[   18.471538]  dump_stack_lvl+0x8c/0xd0
[   18.471593]  print_report+0x118/0x608
[   18.471645]  kasan_report+0xdc/0x128
[   18.471695]  __asan_report_store1_noabort+0x20/0x30
[   18.471777]  krealloc_less_oob_helper+0xa58/0xc50
[   18.471834]  krealloc_large_less_oob+0x20/0x38
[   18.471885]  kunit_try_run_case+0x170/0x3f0
[   18.471938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.471993]  kthread+0x318/0x620
[   18.472041]  ret_from_fork+0x10/0x20
[   18.472095] 
[   18.476819] The buggy address belongs to the physical page:
[   18.477373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098
[   18.478116] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.478908] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.479553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.480067] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.480830] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.481432] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.482008] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000
[   18.482822] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.483441] page dumped because: kasan: bad access detected
[   18.483917] 
[   18.484194] Memory state around the buggy address:
[   18.484681]  fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.485236]  fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.485664] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   18.486272]                                                           ^
[   18.487073]  fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.487583]  fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.488182] ==================================================================
[   18.261700] ==================================================================
[   18.262330] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   18.263160] Write of size 1 at addr fff00000c49e10ea by task kunit_try_catch/147
[   18.263818] 
[   18.264086] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.264286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.264355] Hardware name: linux,dummy-virt (DT)
[   18.264440] Call trace:
[   18.264503]  show_stack+0x20/0x38 (C)
[   18.264631]  dump_stack_lvl+0x8c/0xd0
[   18.264753]  print_report+0x118/0x608
[   18.264871]  kasan_report+0xdc/0x128
[   18.264986]  __asan_report_store1_noabort+0x20/0x30
[   18.265103]  krealloc_less_oob_helper+0xae4/0xc50
[   18.265212]  krealloc_less_oob+0x20/0x38
[   18.265323]  kunit_try_run_case+0x170/0x3f0
[   18.265430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.265547]  kthread+0x318/0x620
[   18.265665]  ret_from_fork+0x10/0x20
[   18.265760] 
[   18.270149] Allocated by task 147:
[   18.270599]  kasan_save_stack+0x3c/0x68
[   18.271082]  kasan_save_track+0x20/0x40
[   18.271634]  kasan_save_alloc_info+0x40/0x58
[   18.272158]  __kasan_krealloc+0x118/0x178
[   18.272637]  krealloc_noprof+0x128/0x360
[   18.272994]  krealloc_less_oob_helper+0x168/0xc50
[   18.273401]  krealloc_less_oob+0x20/0x38
[   18.273873]  kunit_try_run_case+0x170/0x3f0
[   18.274328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.274997]  kthread+0x318/0x620
[   18.275346]  ret_from_fork+0x10/0x20
[   18.275673] 
[   18.275957] The buggy address belongs to the object at fff00000c49e1000
[   18.275957]  which belongs to the cache kmalloc-256 of size 256
[   18.277018] The buggy address is located 33 bytes to the right of
[   18.277018]  allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9)
[   18.277917] 
[   18.278169] The buggy address belongs to the physical page:
[   18.279959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.280992] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.281877] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.282331] page_type: f5(slab)
[   18.282874] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.283180] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.283409] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.283631] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.283877] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.284101] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.284312] page dumped because: kasan: bad access detected
[   18.284484] 
[   18.284579] Memory state around the buggy address:
[   18.284765]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.285460]  fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.286213] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.286959]                                                           ^
[   18.287549]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.288720]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.289344] ==================================================================
[   18.231083] ==================================================================
[   18.231836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   18.232609] Write of size 1 at addr fff00000c49e10da by task kunit_try_catch/147
[   18.233349] 
[   18.233687] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.233924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.233991] Hardware name: linux,dummy-virt (DT)
[   18.234074] Call trace:
[   18.234140]  show_stack+0x20/0x38 (C)
[   18.234280]  dump_stack_lvl+0x8c/0xd0
[   18.234394]  print_report+0x118/0x608
[   18.234574]  kasan_report+0xdc/0x128
[   18.234703]  __asan_report_store1_noabort+0x20/0x30
[   18.234830]  krealloc_less_oob_helper+0xa80/0xc50
[   18.234967]  krealloc_less_oob+0x20/0x38
[   18.235062]  kunit_try_run_case+0x170/0x3f0
[   18.235196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.235292]  kthread+0x318/0x620
[   18.235368]  ret_from_fork+0x10/0x20
[   18.235465] 
[   18.240700] Allocated by task 147:
[   18.241330]  kasan_save_stack+0x3c/0x68
[   18.241773]  kasan_save_track+0x20/0x40
[   18.242235]  kasan_save_alloc_info+0x40/0x58
[   18.242935]  __kasan_krealloc+0x118/0x178
[   18.243317]  krealloc_noprof+0x128/0x360
[   18.243829]  krealloc_less_oob_helper+0x168/0xc50
[   18.244263]  krealloc_less_oob+0x20/0x38
[   18.244745]  kunit_try_run_case+0x170/0x3f0
[   18.245185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.245685]  kthread+0x318/0x620
[   18.246101]  ret_from_fork+0x10/0x20
[   18.246499] 
[   18.247076] The buggy address belongs to the object at fff00000c49e1000
[   18.247076]  which belongs to the cache kmalloc-256 of size 256
[   18.247940] The buggy address is located 17 bytes to the right of
[   18.247940]  allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9)
[   18.248898] 
[   18.249146] The buggy address belongs to the physical page:
[   18.249667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.250278] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.250927] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.251602] page_type: f5(slab)
[   18.252016] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.252719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.253282] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.253943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.254590] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.255155] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.255591] page dumped because: kasan: bad access detected
[   18.256109] 
[   18.256361] Memory state around the buggy address:
[   18.256814]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.257504]  fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.258048] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.258405]                                                     ^
[   18.259002]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.259680]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.260393] ==================================================================
[   18.290873] ==================================================================
[   18.291929] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   18.293137] Write of size 1 at addr fff00000c49e10eb by task kunit_try_catch/147
[   18.293711] 
[   18.294080] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.294317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.294390] Hardware name: linux,dummy-virt (DT)
[   18.294461] Call trace:
[   18.294653]  show_stack+0x20/0x38 (C)
[   18.294819]  dump_stack_lvl+0x8c/0xd0
[   18.295070]  print_report+0x118/0x608
[   18.295191]  kasan_report+0xdc/0x128
[   18.295247]  __asan_report_store1_noabort+0x20/0x30
[   18.295298]  krealloc_less_oob_helper+0xa58/0xc50
[   18.295348]  krealloc_less_oob+0x20/0x38
[   18.295394]  kunit_try_run_case+0x170/0x3f0
[   18.295446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.295498]  kthread+0x318/0x620
[   18.295544]  ret_from_fork+0x10/0x20
[   18.295595] 
[   18.300486] Allocated by task 147:
[   18.300980]  kasan_save_stack+0x3c/0x68
[   18.301507]  kasan_save_track+0x20/0x40
[   18.302001]  kasan_save_alloc_info+0x40/0x58
[   18.302704]  __kasan_krealloc+0x118/0x178
[   18.303257]  krealloc_noprof+0x128/0x360
[   18.303618]  krealloc_less_oob_helper+0x168/0xc50
[   18.304134]  krealloc_less_oob+0x20/0x38
[   18.304575]  kunit_try_run_case+0x170/0x3f0
[   18.305091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.305586]  kthread+0x318/0x620
[   18.305931]  ret_from_fork+0x10/0x20
[   18.306335] 
[   18.306589] The buggy address belongs to the object at fff00000c49e1000
[   18.306589]  which belongs to the cache kmalloc-256 of size 256
[   18.307636] The buggy address is located 34 bytes to the right of
[   18.307636]  allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9)
[   18.308578] 
[   18.308859] The buggy address belongs to the physical page:
[   18.309287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.309904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.311468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.311928] page_type: f5(slab)
[   18.312284] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.312783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.313493] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.314122] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.314697] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.315324] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.316189] page dumped because: kasan: bad access detected
[   18.316544] 
[   18.316815] Memory state around the buggy address:
[   18.317295]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.317915]  fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.318571] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   18.319370]                                                           ^
[   18.319839]  fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.320447]  fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.320984] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   18.097420] ==================================================================
[   18.098153] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   18.099308] Write of size 1 at addr fff00000c49e0eeb by task kunit_try_catch/145
[   18.100082] 
[   18.100380] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.100587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.100656] Hardware name: linux,dummy-virt (DT)
[   18.100746] Call trace:
[   18.100792]  show_stack+0x20/0x38 (C)
[   18.100865]  dump_stack_lvl+0x8c/0xd0
[   18.100946]  print_report+0x118/0x608
[   18.101048]  kasan_report+0xdc/0x128
[   18.101146]  __asan_report_store1_noabort+0x20/0x30
[   18.101255]  krealloc_more_oob_helper+0x614/0x680
[   18.101374]  krealloc_more_oob+0x20/0x38
[   18.101476]  kunit_try_run_case+0x170/0x3f0
[   18.101593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.101686]  kthread+0x318/0x620
[   18.101765]  ret_from_fork+0x10/0x20
[   18.101830] 
[   18.106605] Allocated by task 145:
[   18.107296]  kasan_save_stack+0x3c/0x68
[   18.107801]  kasan_save_track+0x20/0x40
[   18.108260]  kasan_save_alloc_info+0x40/0x58
[   18.108610]  __kasan_krealloc+0x118/0x178
[   18.109080]  krealloc_noprof+0x128/0x360
[   18.109418]  krealloc_more_oob_helper+0x168/0x680
[   18.109927]  krealloc_more_oob+0x20/0x38
[   18.110287]  kunit_try_run_case+0x170/0x3f0
[   18.111049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.111565]  kthread+0x318/0x620
[   18.111889]  ret_from_fork+0x10/0x20
[   18.112321] 
[   18.112564] The buggy address belongs to the object at fff00000c49e0e00
[   18.112564]  which belongs to the cache kmalloc-256 of size 256
[   18.113504] The buggy address is located 0 bytes to the right of
[   18.113504]  allocated 235-byte region [fff00000c49e0e00, fff00000c49e0eeb)
[   18.114367] 
[   18.115143] The buggy address belongs to the physical page:
[   18.115563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.116137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.116814] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.117402] page_type: f5(slab)
[   18.117780] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.118378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.119275] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.119928] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.120557] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.121202] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.121818] page dumped because: kasan: bad access detected
[   18.122250] 
[   18.122790] Memory state around the buggy address:
[   18.123252]  fff00000c49e0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.123870]  fff00000c49e0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.124487] >fff00000c49e0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.125148]                                                           ^
[   18.125668]  fff00000c49e0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.126298]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.127087] ==================================================================
[   18.330011] ==================================================================
[   18.331120] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   18.332412] Write of size 1 at addr fff00000c64ce0eb by task kunit_try_catch/149
[   18.332860] 
[   18.333098] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.333288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.333355] Hardware name: linux,dummy-virt (DT)
[   18.333426] Call trace:
[   18.333474]  show_stack+0x20/0x38 (C)
[   18.333592]  dump_stack_lvl+0x8c/0xd0
[   18.333690]  print_report+0x118/0x608
[   18.333805]  kasan_report+0xdc/0x128
[   18.333912]  __asan_report_store1_noabort+0x20/0x30
[   18.334026]  krealloc_more_oob_helper+0x614/0x680
[   18.334153]  krealloc_large_more_oob+0x20/0x38
[   18.334255]  kunit_try_run_case+0x170/0x3f0
[   18.334315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.334379]  kthread+0x318/0x620
[   18.334457]  ret_from_fork+0x10/0x20
[   18.334543] 
[   18.339483] The buggy address belongs to the physical page:
[   18.340355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064cc
[   18.341019] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.341610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.342261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.343192] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.343879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.344439] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.345062] head: 0bfffe0000000002 ffffc1ffc3193301 ffffffffffffffff 0000000000000000
[   18.345593] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.346171] page dumped because: kasan: bad access detected
[   18.346923] 
[   18.347119] Memory state around the buggy address:
[   18.347392]  fff00000c64cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.348034]  fff00000c64ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.348544] >fff00000c64ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   18.349178]                                                           ^
[   18.349596]  fff00000c64ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.350282]  fff00000c64ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.351109] ==================================================================
[   18.131443] ==================================================================
[   18.131979] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   18.132484] Write of size 1 at addr fff00000c49e0ef0 by task kunit_try_catch/145
[   18.133063] 
[   18.133381] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.133590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.133654] Hardware name: linux,dummy-virt (DT)
[   18.133724] Call trace:
[   18.133792]  show_stack+0x20/0x38 (C)
[   18.133918]  dump_stack_lvl+0x8c/0xd0
[   18.134036]  print_report+0x118/0x608
[   18.134165]  kasan_report+0xdc/0x128
[   18.134239]  __asan_report_store1_noabort+0x20/0x30
[   18.134293]  krealloc_more_oob_helper+0x5c8/0x680
[   18.134347]  krealloc_more_oob+0x20/0x38
[   18.134398]  kunit_try_run_case+0x170/0x3f0
[   18.134453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.134572]  kthread+0x318/0x620
[   18.134667]  ret_from_fork+0x10/0x20
[   18.134790] 
[   18.139624] Allocated by task 145:
[   18.139950]  kasan_save_stack+0x3c/0x68
[   18.140424]  kasan_save_track+0x20/0x40
[   18.140948]  kasan_save_alloc_info+0x40/0x58
[   18.141461]  __kasan_krealloc+0x118/0x178
[   18.141951]  krealloc_noprof+0x128/0x360
[   18.142365]  krealloc_more_oob_helper+0x168/0x680
[   18.143077]  krealloc_more_oob+0x20/0x38
[   18.143600]  kunit_try_run_case+0x170/0x3f0
[   18.144128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.144640]  kthread+0x318/0x620
[   18.145084]  ret_from_fork+0x10/0x20
[   18.145532] 
[   18.145823] The buggy address belongs to the object at fff00000c49e0e00
[   18.145823]  which belongs to the cache kmalloc-256 of size 256
[   18.146959] The buggy address is located 5 bytes to the right of
[   18.146959]  allocated 235-byte region [fff00000c49e0e00, fff00000c49e0eeb)
[   18.148093] 
[   18.148368] The buggy address belongs to the physical page:
[   18.149103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0
[   18.149979] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.150990] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.151649] page_type: f5(slab)
[   18.152179] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.152836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.153488] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.154165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.154823] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000
[   18.155201] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.155877] page dumped because: kasan: bad access detected
[   18.156477] 
[   18.156767] Memory state around the buggy address:
[   18.157259]  fff00000c49e0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.157916]  fff00000c49e0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.158465] >fff00000c49e0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   18.159154]                                                              ^
[   18.159711]  fff00000c49e0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.160364]  fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.161017] ==================================================================
[   18.352406] ==================================================================
[   18.352831] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   18.353357] Write of size 1 at addr fff00000c64ce0f0 by task kunit_try_catch/149
[   18.354003] 
[   18.354316] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.354534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.354593] Hardware name: linux,dummy-virt (DT)
[   18.354655] Call trace:
[   18.354700]  show_stack+0x20/0x38 (C)
[   18.354823]  dump_stack_lvl+0x8c/0xd0
[   18.354916]  print_report+0x118/0x608
[   18.355016]  kasan_report+0xdc/0x128
[   18.355107]  __asan_report_store1_noabort+0x20/0x30
[   18.355193]  krealloc_more_oob_helper+0x5c8/0x680
[   18.355274]  krealloc_large_more_oob+0x20/0x38
[   18.355363]  kunit_try_run_case+0x170/0x3f0
[   18.355459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.355569]  kthread+0x318/0x620
[   18.355664]  ret_from_fork+0x10/0x20
[   18.355777] 
[   18.360136] The buggy address belongs to the physical page:
[   18.360482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064cc
[   18.362338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.363282] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.363912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.364481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.365079] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.365640] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.366207] head: 0bfffe0000000002 ffffc1ffc3193301 ffffffffffffffff 0000000000000000
[   18.367022] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.367906] page dumped because: kasan: bad access detected
[   18.368611] 
[   18.368862] Memory state around the buggy address:
[   18.369243]  fff00000c64cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.369828]  fff00000c64ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.370363] >fff00000c64ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   18.371277]                                                              ^
[   18.371965]  fff00000c64ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.372496]  fff00000c64ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.372990] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   18.071481] ==================================================================
[   18.072160] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   18.072398] Read of size 1 at addr fff00000c6510000 by task kunit_try_catch/143
[   18.072617] 
[   18.072732] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.072928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.072984] Hardware name: linux,dummy-virt (DT)
[   18.073117] Call trace:
[   18.073179]  show_stack+0x20/0x38 (C)
[   18.073330]  dump_stack_lvl+0x8c/0xd0
[   18.073438]  print_report+0x118/0x608
[   18.073536]  kasan_report+0xdc/0x128
[   18.073639]  __asan_report_load1_noabort+0x20/0x30
[   18.073762]  page_alloc_uaf+0x328/0x350
[   18.073937]  kunit_try_run_case+0x170/0x3f0
[   18.074101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.074277]  kthread+0x318/0x620
[   18.074431]  ret_from_fork+0x10/0x20
[   18.074636] 
[   18.079416] The buggy address belongs to the physical page:
[   18.080138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106510
[   18.080825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.081448] page_type: f0(buddy)
[   18.081900] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000
[   18.082922] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   18.083601] page dumped because: kasan: bad access detected
[   18.083812] 
[   18.083908] Memory state around the buggy address:
[   18.084067]  fff00000c650ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.084270]  fff00000c650ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.084475] >fff00000c6510000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.084663]                    ^
[   18.084945]  fff00000c6510080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.085593]  fff00000c6510100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.086130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   18.034437] ==================================================================
[   18.035245] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   18.035976] Free of addr fff00000c6094001 by task kunit_try_catch/139
[   18.036777] 
[   18.037147] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.037380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.037453] Hardware name: linux,dummy-virt (DT)
[   18.037527] Call trace:
[   18.037565]  show_stack+0x20/0x38 (C)
[   18.037635]  dump_stack_lvl+0x8c/0xd0
[   18.037689]  print_report+0x118/0x608
[   18.037767]  kasan_report_invalid_free+0xc0/0xe8
[   18.037828]  __kasan_kfree_large+0x5c/0xa8
[   18.037880]  free_large_kmalloc+0x58/0x140
[   18.037932]  kfree+0x270/0x3c8
[   18.037978]  kmalloc_large_invalid_free+0x108/0x270
[   18.038031]  kunit_try_run_case+0x170/0x3f0
[   18.038099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.038156]  kthread+0x318/0x620
[   18.038205]  ret_from_fork+0x10/0x20
[   18.038260] 
[   18.043096] The buggy address belongs to the physical page:
[   18.043298] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   18.043551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.043878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.044730] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.045610] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.046326] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.046981] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.047232] head: 0bfffe0000000002 ffffc1ffc3182501 ffffffffffffffff 0000000000000000
[   18.047463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   18.047683] page dumped because: kasan: bad access detected
[   18.048271] 
[   18.048582] Memory state around the buggy address:
[   18.049180]  fff00000c6093f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.049928]  fff00000c6093f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.050521] >fff00000c6094000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.051074]                    ^
[   18.051389]  fff00000c6094080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.051938]  fff00000c6094100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.052594] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   18.009329] ==================================================================
[   18.010131] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   18.010873] Read of size 1 at addr fff00000c6094000 by task kunit_try_catch/137
[   18.012115] 
[   18.012399] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   18.012527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.012560] Hardware name: linux,dummy-virt (DT)
[   18.012623] Call trace:
[   18.012652]  show_stack+0x20/0x38 (C)
[   18.012721]  dump_stack_lvl+0x8c/0xd0
[   18.012865]  print_report+0x118/0x608
[   18.012972]  kasan_report+0xdc/0x128
[   18.013089]  __asan_report_load1_noabort+0x20/0x30
[   18.013214]  kmalloc_large_uaf+0x2cc/0x2f8
[   18.013316]  kunit_try_run_case+0x170/0x3f0
[   18.013375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.013432]  kthread+0x318/0x620
[   18.013483]  ret_from_fork+0x10/0x20
[   18.013537] 
[   18.017603] The buggy address belongs to the physical page:
[   18.018356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   18.019358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.019921] raw: 0bfffe0000000000 ffffc1ffc3182608 fff00000da4d1040 0000000000000000
[   18.020172] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   18.020397] page dumped because: kasan: bad access detected
[   18.020575] 
[   18.020675] Memory state around the buggy address:
[   18.021168]  fff00000c6093f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.021982]  fff00000c6093f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.022932] >fff00000c6094000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.023661]                    ^
[   18.024140]  fff00000c6094080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.024538]  fff00000c6094100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.024781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   17.981965] ==================================================================
[   17.983197] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   17.983584] Write of size 1 at addr fff00000c609600a by task kunit_try_catch/135
[   17.983935] 
[   17.984089] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.984187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.984219] Hardware name: linux,dummy-virt (DT)
[   17.984255] Call trace:
[   17.984282]  show_stack+0x20/0x38 (C)
[   17.984340]  dump_stack_lvl+0x8c/0xd0
[   17.984392]  print_report+0x118/0x608
[   17.984442]  kasan_report+0xdc/0x128
[   17.984490]  __asan_report_store1_noabort+0x20/0x30
[   17.984540]  kmalloc_large_oob_right+0x278/0x2b8
[   17.984590]  kunit_try_run_case+0x170/0x3f0
[   17.984640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.984694]  kthread+0x318/0x620
[   17.985054]  ret_from_fork+0x10/0x20
[   17.985196] 
[   17.991111] The buggy address belongs to the physical page:
[   17.991905] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094
[   17.992629] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.993207] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.993486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.993722] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.993980] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.994226] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.994460] head: 0bfffe0000000002 ffffc1ffc3182501 ffffffffffffffff 0000000000000000
[   17.995524] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   17.996333] page dumped because: kasan: bad access detected
[   17.996848] 
[   17.997133] Memory state around the buggy address:
[   17.997548]  fff00000c6095f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.998081]  fff00000c6095f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.998757] >fff00000c6096000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.999089]                       ^
[   17.999243]  fff00000c6096080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.999456]  fff00000c6096100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.999659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   17.941033] ==================================================================
[   17.942105] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   17.943035] Write of size 1 at addr fff00000c64e9f00 by task kunit_try_catch/133
[   17.943719] 
[   17.944042] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.944405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.944500] Hardware name: linux,dummy-virt (DT)
[   17.944566] Call trace:
[   17.944619]  show_stack+0x20/0x38 (C)
[   17.944727]  dump_stack_lvl+0x8c/0xd0
[   17.944843]  print_report+0x118/0x608
[   17.944947]  kasan_report+0xdc/0x128
[   17.945046]  __asan_report_store1_noabort+0x20/0x30
[   17.945155]  kmalloc_big_oob_right+0x2a4/0x2f0
[   17.945255]  kunit_try_run_case+0x170/0x3f0
[   17.945356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.945497]  kthread+0x318/0x620
[   17.945592]  ret_from_fork+0x10/0x20
[   17.945716] 
[   17.950936] Allocated by task 133:
[   17.951379]  kasan_save_stack+0x3c/0x68
[   17.951952]  kasan_save_track+0x20/0x40
[   17.952351]  kasan_save_alloc_info+0x40/0x58
[   17.952806]  __kasan_kmalloc+0xd4/0xd8
[   17.953208]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.953673]  kmalloc_big_oob_right+0xb8/0x2f0
[   17.954096]  kunit_try_run_case+0x170/0x3f0
[   17.954629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.955147]  kthread+0x318/0x620
[   17.955539]  ret_from_fork+0x10/0x20
[   17.955969] 
[   17.956146] The buggy address belongs to the object at fff00000c64e8000
[   17.956146]  which belongs to the cache kmalloc-8k of size 8192
[   17.957027] The buggy address is located 0 bytes to the right of
[   17.957027]  allocated 7936-byte region [fff00000c64e8000, fff00000c64e9f00)
[   17.957835] 
[   17.958565] The buggy address belongs to the physical page:
[   17.959013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e8
[   17.959672] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.960431] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.961104] page_type: f5(slab)
[   17.961439] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.962250] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.962920] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.963544] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.964360] head: 0bfffe0000000003 ffffc1ffc3193a01 ffffffffffffffff 0000000000000000
[   17.965076] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   17.965779] page dumped because: kasan: bad access detected
[   17.966419] 
[   17.966687] Memory state around the buggy address:
[   17.967455]  fff00000c64e9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.968034]  fff00000c64e9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.968791] >fff00000c64e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.969476]                    ^
[   17.970030]  fff00000c64e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.970625]  fff00000c64ea000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.971365] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   17.873264] ==================================================================
[   17.873880] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   17.874767] Write of size 1 at addr fff00000c59c2578 by task kunit_try_catch/131
[   17.875611] 
[   17.876506] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.876724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.876795] Hardware name: linux,dummy-virt (DT)
[   17.876840] Call trace:
[   17.876868]  show_stack+0x20/0x38 (C)
[   17.876934]  dump_stack_lvl+0x8c/0xd0
[   17.876985]  print_report+0x118/0x608
[   17.877034]  kasan_report+0xdc/0x128
[   17.877081]  __asan_report_store1_noabort+0x20/0x30
[   17.877130]  kmalloc_track_caller_oob_right+0x414/0x490
[   17.877181]  kunit_try_run_case+0x170/0x3f0
[   17.877233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.877283]  kthread+0x318/0x620
[   17.877328]  ret_from_fork+0x10/0x20
[   17.877378] 
[   17.882366] Allocated by task 131:
[   17.883022]  kasan_save_stack+0x3c/0x68
[   17.884447]  kasan_save_track+0x20/0x40
[   17.884762]  kasan_save_alloc_info+0x40/0x58
[   17.885110]  __kasan_kmalloc+0xd4/0xd8
[   17.885553]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.885995]  kmalloc_track_caller_oob_right+0xa8/0x490
[   17.886625]  kunit_try_run_case+0x170/0x3f0
[   17.887424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.887902]  kthread+0x318/0x620
[   17.888339]  ret_from_fork+0x10/0x20
[   17.888695] 
[   17.888980] The buggy address belongs to the object at fff00000c59c2500
[   17.888980]  which belongs to the cache kmalloc-128 of size 128
[   17.889855] The buggy address is located 0 bytes to the right of
[   17.889855]  allocated 120-byte region [fff00000c59c2500, fff00000c59c2578)
[   17.891557] 
[   17.891867] The buggy address belongs to the physical page:
[   17.892321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   17.893006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.893610] page_type: f5(slab)
[   17.893957] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.894957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895484] page dumped because: kasan: bad access detected
[   17.895970] 
[   17.896261] Memory state around the buggy address:
[   17.896775]  fff00000c59c2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.897314]  fff00000c59c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.898020] >fff00000c59c2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.898777]                                                                 ^
[   17.899214]  fff00000c59c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.899542]  fff00000c59c2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.899867] ==================================================================
[   17.902176] ==================================================================
[   17.902633] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   17.903914] Write of size 1 at addr fff00000c59c2678 by task kunit_try_catch/131
[   17.904844] 
[   17.905408] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.905604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.905669] Hardware name: linux,dummy-virt (DT)
[   17.905756] Call trace:
[   17.905797]  show_stack+0x20/0x38 (C)
[   17.905869]  dump_stack_lvl+0x8c/0xd0
[   17.905945]  print_report+0x118/0x608
[   17.906005]  kasan_report+0xdc/0x128
[   17.906064]  __asan_report_store1_noabort+0x20/0x30
[   17.906125]  kmalloc_track_caller_oob_right+0x420/0x490
[   17.906184]  kunit_try_run_case+0x170/0x3f0
[   17.906239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.906294]  kthread+0x318/0x620
[   17.906344]  ret_from_fork+0x10/0x20
[   17.906399] 
[   17.912783] Allocated by task 131:
[   17.913120]  kasan_save_stack+0x3c/0x68
[   17.913713]  kasan_save_track+0x20/0x40
[   17.914289]  kasan_save_alloc_info+0x40/0x58
[   17.914816]  __kasan_kmalloc+0xd4/0xd8
[   17.915351]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.915823]  kmalloc_track_caller_oob_right+0x184/0x490
[   17.916236]  kunit_try_run_case+0x170/0x3f0
[   17.916578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.916979]  kthread+0x318/0x620
[   17.917267]  ret_from_fork+0x10/0x20
[   17.917578] 
[   17.918450] The buggy address belongs to the object at fff00000c59c2600
[   17.918450]  which belongs to the cache kmalloc-128 of size 128
[   17.919252] The buggy address is located 0 bytes to the right of
[   17.919252]  allocated 120-byte region [fff00000c59c2600, fff00000c59c2678)
[   17.920061] 
[   17.920354] The buggy address belongs to the physical page:
[   17.920814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   17.921505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.922141] page_type: f5(slab)
[   17.922680] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.923482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.924229] page dumped because: kasan: bad access detected
[   17.924878] 
[   17.925288] Memory state around the buggy address:
[   17.925720]  fff00000c59c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.926778]  fff00000c59c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927198] >fff00000c59c2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.927559]                                                                 ^
[   17.927938]  fff00000c59c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.928328]  fff00000c59c2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.929277] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   17.832937] ==================================================================
[   17.833635] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   17.834327] Read of size 1 at addr fff00000c617d000 by task kunit_try_catch/129
[   17.835918] 
[   17.836228] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.836378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.836410] Hardware name: linux,dummy-virt (DT)
[   17.836467] Call trace:
[   17.836515]  show_stack+0x20/0x38 (C)
[   17.836626]  dump_stack_lvl+0x8c/0xd0
[   17.836723]  print_report+0x118/0x608
[   17.836838]  kasan_report+0xdc/0x128
[   17.836889]  __asan_report_load1_noabort+0x20/0x30
[   17.836939]  kmalloc_node_oob_right+0x2f4/0x330
[   17.836988]  kunit_try_run_case+0x170/0x3f0
[   17.837038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.837092]  kthread+0x318/0x620
[   17.837141]  ret_from_fork+0x10/0x20
[   17.837194] 
[   17.841978] Allocated by task 129:
[   17.842327]  kasan_save_stack+0x3c/0x68
[   17.843951]  kasan_save_track+0x20/0x40
[   17.844356]  kasan_save_alloc_info+0x40/0x58
[   17.844847]  __kasan_kmalloc+0xd4/0xd8
[   17.845274]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   17.845758]  kmalloc_node_oob_right+0xbc/0x330
[   17.846247]  kunit_try_run_case+0x170/0x3f0
[   17.847095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.847556]  kthread+0x318/0x620
[   17.847917]  ret_from_fork+0x10/0x20
[   17.848269] 
[   17.848532] The buggy address belongs to the object at fff00000c617c000
[   17.848532]  which belongs to the cache kmalloc-4k of size 4096
[   17.849421] The buggy address is located 0 bytes to the right of
[   17.849421]  allocated 4096-byte region [fff00000c617c000, fff00000c617d000)
[   17.850295] 
[   17.851439] The buggy address belongs to the physical page:
[   17.851848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106178
[   17.852832] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.853475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.854134] page_type: f5(slab)
[   17.854960] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.855489] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.856043] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.856666] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.857297] head: 0bfffe0000000003 ffffc1ffc3185e01 ffffffffffffffff 0000000000000000
[   17.857844] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   17.858426] page dumped because: kasan: bad access detected
[   17.859727] 
[   17.860016] Memory state around the buggy address:
[   17.860373]  fff00000c617cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.861097]  fff00000c617cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.861636] >fff00000c617d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.862291]                    ^
[   17.862632]  fff00000c617d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.863243]  fff00000c617d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.864240] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.792458] ==================================================================
[   17.793191] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.793885] Read of size 1 at addr fff00000c59b84df by task kunit_try_catch/127
[   17.794488] 
[   17.794823] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.795018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.795083] Hardware name: linux,dummy-virt (DT)
[   17.795157] Call trace:
[   17.795209]  show_stack+0x20/0x38 (C)
[   17.795342]  dump_stack_lvl+0x8c/0xd0
[   17.795448]  print_report+0x118/0x608
[   17.795546]  kasan_report+0xdc/0x128
[   17.795647]  __asan_report_load1_noabort+0x20/0x30
[   17.795807]  kmalloc_oob_left+0x2ec/0x320
[   17.795934]  kunit_try_run_case+0x170/0x3f0
[   17.796028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.796142]  kthread+0x318/0x620
[   17.796230]  ret_from_fork+0x10/0x20
[   17.796317] 
[   17.801572] Allocated by task 29:
[   17.801971]  kasan_save_stack+0x3c/0x68
[   17.802339]  kasan_save_track+0x20/0x40
[   17.803296]  kasan_save_alloc_info+0x40/0x58
[   17.803786]  __kasan_kmalloc+0xd4/0xd8
[   17.804238]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   17.804807]  kstrdup+0x54/0xc8
[   17.805113]  devtmpfs_work_loop+0x398/0x5b0
[   17.805502]  devtmpfsd+0x50/0x58
[   17.805864]  kthread+0x318/0x620
[   17.806192]  ret_from_fork+0x10/0x20
[   17.807485] 
[   17.807725] Freed by task 29:
[   17.808120]  kasan_save_stack+0x3c/0x68
[   17.808565]  kasan_save_track+0x20/0x40
[   17.808938]  kasan_save_free_info+0x4c/0x78
[   17.809405]  __kasan_slab_free+0x6c/0x98
[   17.809830]  kfree+0x214/0x3c8
[   17.810230]  devtmpfs_work_loop+0x4b8/0x5b0
[   17.811168]  devtmpfsd+0x50/0x58
[   17.811514]  kthread+0x318/0x620
[   17.811929]  ret_from_fork+0x10/0x20
[   17.812335] 
[   17.812583] The buggy address belongs to the object at fff00000c59b84c0
[   17.812583]  which belongs to the cache kmalloc-16 of size 16
[   17.813424] The buggy address is located 15 bytes to the right of
[   17.813424]  allocated 16-byte region [fff00000c59b84c0, fff00000c59b84d0)
[   17.814324] 
[   17.815471] The buggy address belongs to the physical page:
[   17.815777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8
[   17.816501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.816931] page_type: f5(slab)
[   17.817323] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.817997] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.819030] page dumped because: kasan: bad access detected
[   17.819464] 
[   17.819666] Memory state around the buggy address:
[   17.820127]  fff00000c59b8380: 00 02 fc fc 00 02 fc fc fa fb fc fc 00 00 fc fc
[   17.820677]  fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc
[   17.821282] >fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   17.821838]                                                     ^
[   17.822314]  fff00000c59b8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.823684]  fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   17.735243] ==================================================================
[   17.735957] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.736530] Write of size 1 at addr fff00000c5a05078 by task kunit_try_catch/125
[   17.738043] 
[   17.738400] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.738620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.738692] Hardware name: linux,dummy-virt (DT)
[   17.738771] Call trace:
[   17.738824]  show_stack+0x20/0x38 (C)
[   17.738938]  dump_stack_lvl+0x8c/0xd0
[   17.739036]  print_report+0x118/0x608
[   17.739124]  kasan_report+0xdc/0x128
[   17.739217]  __asan_report_store1_noabort+0x20/0x30
[   17.739306]  kmalloc_oob_right+0x538/0x660
[   17.739391]  kunit_try_run_case+0x170/0x3f0
[   17.739490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.739594]  kthread+0x318/0x620
[   17.739682]  ret_from_fork+0x10/0x20
[   17.739757] 
[   17.743947] Allocated by task 125:
[   17.744255]  kasan_save_stack+0x3c/0x68
[   17.744767]  kasan_save_track+0x20/0x40
[   17.745217]  kasan_save_alloc_info+0x40/0x58
[   17.745674]  __kasan_kmalloc+0xd4/0xd8
[   17.746044]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.746543]  kmalloc_oob_right+0xb0/0x660
[   17.747010]  kunit_try_run_case+0x170/0x3f0
[   17.747470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.747952]  kthread+0x318/0x620
[   17.748341]  ret_from_fork+0x10/0x20
[   17.748804] 
[   17.749025] The buggy address belongs to the object at fff00000c5a05000
[   17.749025]  which belongs to the cache kmalloc-128 of size 128
[   17.749885] The buggy address is located 5 bytes to the right of
[   17.749885]  allocated 115-byte region [fff00000c5a05000, fff00000c5a05073)
[   17.750988] 
[   17.751213] The buggy address belongs to the physical page:
[   17.751658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   17.752334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.752931] page_type: f5(slab)
[   17.753277] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.753803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.754480] page dumped because: kasan: bad access detected
[   17.754962] 
[   17.755236] Memory state around the buggy address:
[   17.755570]  fff00000c5a04f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756214]  fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756821] >fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.757354]                                                                 ^
[   17.757941]  fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.758521]  fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.759153] ==================================================================
[   17.699280] ==================================================================
[   17.700291] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.701943] Write of size 1 at addr fff00000c5a05073 by task kunit_try_catch/125
[   17.703029] 
[   17.704607] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.14.7-rc1 #1
[   17.705534] Tainted: [N]=TEST
[   17.705578] Hardware name: linux,dummy-virt (DT)
[   17.705889] Call trace:
[   17.706094]  show_stack+0x20/0x38 (C)
[   17.706277]  dump_stack_lvl+0x8c/0xd0
[   17.706351]  print_report+0x118/0x608
[   17.706407]  kasan_report+0xdc/0x128
[   17.706457]  __asan_report_store1_noabort+0x20/0x30
[   17.706573]  kmalloc_oob_right+0x5a4/0x660
[   17.706662]  kunit_try_run_case+0x170/0x3f0
[   17.706782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.706852]  kthread+0x318/0x620
[   17.706905]  ret_from_fork+0x10/0x20
[   17.707097] 
[   17.711373] Allocated by task 125:
[   17.711924]  kasan_save_stack+0x3c/0x68
[   17.712504]  kasan_save_track+0x20/0x40
[   17.713127]  kasan_save_alloc_info+0x40/0x58
[   17.713667]  __kasan_kmalloc+0xd4/0xd8
[   17.714175]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.714884]  kmalloc_oob_right+0xb0/0x660
[   17.715404]  kunit_try_run_case+0x170/0x3f0
[   17.715947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.716505]  kthread+0x318/0x620
[   17.716913]  ret_from_fork+0x10/0x20
[   17.717325] 
[   17.717760] The buggy address belongs to the object at fff00000c5a05000
[   17.717760]  which belongs to the cache kmalloc-128 of size 128
[   17.719095] The buggy address is located 0 bytes to the right of
[   17.719095]  allocated 115-byte region [fff00000c5a05000, fff00000c5a05073)
[   17.720123] 
[   17.720680] The buggy address belongs to the physical page:
[   17.721678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   17.722675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.723648] page_type: f5(slab)
[   17.724419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.724986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.725967] page dumped because: kasan: bad access detected
[   17.726645] 
[   17.726981] Memory state around the buggy address:
[   17.727953]  fff00000c5a04f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.728699]  fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.729453] >fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.730023]                                                              ^
[   17.730783]  fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.731519]  fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.732324] ==================================================================
[   17.761800] ==================================================================
[   17.762342] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.762982] Read of size 1 at addr fff00000c5a05080 by task kunit_try_catch/125
[   17.763651] 
[   17.763959] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   17.764158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.764223] Hardware name: linux,dummy-virt (DT)
[   17.764299] Call trace:
[   17.764353]  show_stack+0x20/0x38 (C)
[   17.764477]  dump_stack_lvl+0x8c/0xd0
[   17.764581]  print_report+0x118/0x608
[   17.764692]  kasan_report+0xdc/0x128
[   17.764823]  __asan_report_load1_noabort+0x20/0x30
[   17.764930]  kmalloc_oob_right+0x5d0/0x660
[   17.765032]  kunit_try_run_case+0x170/0x3f0
[   17.765097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.765151]  kthread+0x318/0x620
[   17.765197]  ret_from_fork+0x10/0x20
[   17.765249] 
[   17.769334] Allocated by task 125:
[   17.769710]  kasan_save_stack+0x3c/0x68
[   17.770194]  kasan_save_track+0x20/0x40
[   17.770623]  kasan_save_alloc_info+0x40/0x58
[   17.771066]  __kasan_kmalloc+0xd4/0xd8
[   17.771434]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.771928]  kmalloc_oob_right+0xb0/0x660
[   17.772381]  kunit_try_run_case+0x170/0x3f0
[   17.772752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.773348]  kthread+0x318/0x620
[   17.773781]  ret_from_fork+0x10/0x20
[   17.774236] 
[   17.774465] The buggy address belongs to the object at fff00000c5a05000
[   17.774465]  which belongs to the cache kmalloc-128 of size 128
[   17.775364] The buggy address is located 13 bytes to the right of
[   17.775364]  allocated 115-byte region [fff00000c5a05000, fff00000c5a05073)
[   17.776378] 
[   17.776610] The buggy address belongs to the physical page:
[   17.777183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05
[   17.777863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.778369] page_type: f5(slab)
[   17.778821] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.779437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.779979] page dumped because: kasan: bad access detected
[   17.780394] 
[   17.780648] Memory state around the buggy address:
[   17.781009]  fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.781576]  fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.782104] >fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.782721]                    ^
[   17.783061]  fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.783596]  fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.784138] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  101.206353] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  101.207216] Modules linked in:
[  101.208470] CPU: 1 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[  101.209629] Tainted: [B]=BAD_PAGE, [N]=TEST
[  101.210219] Hardware name: linux,dummy-virt (DT)
[  101.210870] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  101.211528] pc : kunit_test_null_dereference+0x70/0x170
[  101.212297] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.212848] sp : ffff8000834e7d30
[  101.213298] x29: ffff8000834e7d90 x28: 0000000000000000 x27: 0000000000000000
[  101.214236] x26: 1ffe000018c69221 x25: 0000000000000000 x24: fff00000c9a49900
[  101.215240] x23: ffffac22043d8288 x22: ffffac22043e0e88 x21: fff00000c9a49908
[  101.215925] x20: 1ffff0001069cfa6 x19: ffff800080087990 x18: ffffc1ffc3012700
[  101.216569] x17: 0000000000000001 x16: fff00000da4ccd20 x15: 00000000dfcfe43c
[  101.217532] x14: 1ffe00001b499988 x13: fff00000da4ccd18 x12: fffd800018c59b3c
[  101.218387] x11: 1ffe000018c59b3b x10: fffd800018c59b3b x9 : ffffac22043d8310
[  101.219387] x8 : ffff8000834e7c28 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  101.220224] x5 : ffff70001069cfa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  101.221041] x2 : dfff800000000000 x1 : fff00000c62cd100 x0 : ffff800080087990
[  101.221916] Call trace:
[  101.222419]  kunit_test_null_dereference+0x70/0x170 (P)
[  101.223224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  101.223970]  kthread+0x318/0x620
[  101.224484]  ret_from_fork+0x10/0x20
[  101.225514] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  101.226569] ---[ end trace 0000000000000000 ]---