Hay
Date
June 2, 2025, 2:11 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   19.204282] ==================================================================
[   19.204342] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   19.204752] Read of size 1 at addr fff00000c3f75873 by task kunit_try_catch/197
[   19.204925] 
[   19.204961] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.207434] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.207491] Hardware name: linux,dummy-virt (DT)
[   19.207524] Call trace:
[   19.207549]  show_stack+0x20/0x38 (C)
[   19.207605]  dump_stack_lvl+0x8c/0xd0
[   19.207652]  print_report+0x118/0x608
[   19.207700]  kasan_report+0xdc/0x128
[   19.207746]  __asan_report_load1_noabort+0x20/0x30
[   19.207798]  ksize_unpoisons_memory+0x628/0x740
[   19.207849]  kunit_try_run_case+0x170/0x3f0
[   19.207900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.207959]  kthread+0x328/0x630
[   19.208005]  ret_from_fork+0x10/0x20
[   19.208058] 
[   19.208075] Allocated by task 197:
[   19.208105]  kasan_save_stack+0x3c/0x68
[   19.208143]  kasan_save_track+0x20/0x40
[   19.208180]  kasan_save_alloc_info+0x40/0x58
[   19.208219]  __kasan_kmalloc+0xd4/0xd8
[   19.208258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.208300]  ksize_unpoisons_memory+0xc0/0x740
[   19.208342]  kunit_try_run_case+0x170/0x3f0
[   19.208393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.208439]  kthread+0x328/0x630
[   19.208474]  ret_from_fork+0x10/0x20
[   19.208511] 
[   19.208531] The buggy address belongs to the object at fff00000c3f75800
[   19.208531]  which belongs to the cache kmalloc-128 of size 128
[   19.208588] The buggy address is located 0 bytes to the right of
[   19.208588]  allocated 115-byte region [fff00000c3f75800, fff00000c3f75873)
[   19.208652] 
[   19.208671] The buggy address belongs to the physical page:
[   19.208702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.208755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.208803] page_type: f5(slab)
[   19.208843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.208894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.208936] page dumped because: kasan: bad access detected
[   19.208966] 
[   19.208984] Memory state around the buggy address:
[   19.209016]  fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.209059]  fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209104] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.209142]                                                              ^
[   19.209182]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209225]  fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209265] ==================================================================
[   19.214928] ==================================================================
[   19.214995] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   19.215085] Read of size 1 at addr fff00000c3f7587f by task kunit_try_catch/197
[   19.215180] 
[   19.215208] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.215291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.215320] Hardware name: linux,dummy-virt (DT)
[   19.215364] Call trace:
[   19.215415]  show_stack+0x20/0x38 (C)
[   19.215469]  dump_stack_lvl+0x8c/0xd0
[   19.215518]  print_report+0x118/0x608
[   19.215563]  kasan_report+0xdc/0x128
[   19.215607]  __asan_report_load1_noabort+0x20/0x30
[   19.215681]  ksize_unpoisons_memory+0x690/0x740
[   19.215741]  kunit_try_run_case+0x170/0x3f0
[   19.215800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.215867]  kthread+0x328/0x630
[   19.215912]  ret_from_fork+0x10/0x20
[   19.215985] 
[   19.216005] Allocated by task 197:
[   19.216031]  kasan_save_stack+0x3c/0x68
[   19.216089]  kasan_save_track+0x20/0x40
[   19.216126]  kasan_save_alloc_info+0x40/0x58
[   19.216171]  __kasan_kmalloc+0xd4/0xd8
[   19.216207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.216266]  ksize_unpoisons_memory+0xc0/0x740
[   19.216333]  kunit_try_run_case+0x170/0x3f0
[   19.216387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.216432]  kthread+0x328/0x630
[   19.216468]  ret_from_fork+0x10/0x20
[   19.216535] 
[   19.216574] The buggy address belongs to the object at fff00000c3f75800
[   19.216574]  which belongs to the cache kmalloc-128 of size 128
[   19.216670] The buggy address is located 12 bytes to the right of
[   19.216670]  allocated 115-byte region [fff00000c3f75800, fff00000c3f75873)
[   19.216800] 
[   19.216827] The buggy address belongs to the physical page:
[   19.216858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.216936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.217155] page_type: f5(slab)
[   19.217226] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.217296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.217471] page dumped because: kasan: bad access detected
[   19.217502] 
[   19.217838] Memory state around the buggy address:
[   19.217903]  fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.217960]  fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.218003] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.218041]                                                                 ^
[   19.218083]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.218133]  fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.218181] ==================================================================
[   19.210020] ==================================================================
[   19.210069] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   19.210122] Read of size 1 at addr fff00000c3f75878 by task kunit_try_catch/197
[   19.210172] 
[   19.210201] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.210284] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.210313] Hardware name: linux,dummy-virt (DT)
[   19.210345] Call trace:
[   19.210386]  show_stack+0x20/0x38 (C)
[   19.210434]  dump_stack_lvl+0x8c/0xd0
[   19.210483]  print_report+0x118/0x608
[   19.210714]  kasan_report+0xdc/0x128
[   19.210864]  __asan_report_load1_noabort+0x20/0x30
[   19.211145]  ksize_unpoisons_memory+0x618/0x740
[   19.211270]  kunit_try_run_case+0x170/0x3f0
[   19.211417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.211531]  kthread+0x328/0x630
[   19.211589]  ret_from_fork+0x10/0x20
[   19.211750] 
[   19.211799] Allocated by task 197:
[   19.211828]  kasan_save_stack+0x3c/0x68
[   19.212050]  kasan_save_track+0x20/0x40
[   19.212208]  kasan_save_alloc_info+0x40/0x58
[   19.212308]  __kasan_kmalloc+0xd4/0xd8
[   19.212420]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.212532]  ksize_unpoisons_memory+0xc0/0x740
[   19.212620]  kunit_try_run_case+0x170/0x3f0
[   19.212787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.212895]  kthread+0x328/0x630
[   19.213058]  ret_from_fork+0x10/0x20
[   19.213165] 
[   19.213186] The buggy address belongs to the object at fff00000c3f75800
[   19.213186]  which belongs to the cache kmalloc-128 of size 128
[   19.213502] The buggy address is located 5 bytes to the right of
[   19.213502]  allocated 115-byte region [fff00000c3f75800, fff00000c3f75873)
[   19.213580] 
[   19.213600] The buggy address belongs to the physical page:
[   19.213630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.213682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.213729] page_type: f5(slab)
[   19.213767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.213818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.213861] page dumped because: kasan: bad access detected
[   19.213892] 
[   19.213911] Memory state around the buggy address:
[   19.213943]  fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.213987]  fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.214031] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.214069]                                                                 ^
[   19.214110]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.214153]  fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.214192] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.846512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   20.874458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   20.808880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   20.746616] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.751701] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[   93.564301] Internal error: Oops: 0000000096000005 [#1]  SMP
[   93.566837] Modules linked in:
[   93.567898] CPU: 0 UID: 0 PID: 535 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   93.569002] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   93.569689] Hardware name: linux,dummy-virt (DT)
[   93.570311] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   93.571169] pc : kunit_test_null_dereference+0x70/0x170
[   93.571893] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.572652] sp : ffff800080f47d30
[   93.573143] x29: ffff800080f47d90 x28: 0000000000000000 x27: 0000000000000000
[   93.574096] x26: 1ffe0000191ab7c1 x25: 0000000000000000 x24: 0000000000000004
[   93.575054] x23: fff00000c8d5be0c x22: ffffaf0a381fd6f8 x21: fff00000c1b54988
[   93.576009] x20: 1ffff000101e8fa6 x19: ffff800080087990 x18: 00000000cc33d32c
[   93.576968] x17: 000000006cf43a8a x16: 0000000000000100 x15: 00000000a803bcc5
[   93.577890] x14: 00000000421eb631 x13: 1ffe00001b4943d0 x12: fffd8000194ea8b4
[   93.578646] x11: 1ffe0000194ea8b3 x10: fffd8000194ea8b3 x9 : ffffaf0a381f4b60
[   93.579018] x8 : ffff800080f47c38 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   93.579372] x5 : ffff7000101e8fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   93.579714] x2 : dfff800000000000 x1 : fff00000ca753cc0 x0 : ffff800080087990
[   93.580171] Call trace:
[   93.580321]  kunit_test_null_dereference+0x70/0x170 (P)
[   93.580582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.580826]  kthread+0x328/0x630
[   93.581008]  ret_from_fork+0x10/0x20
[   93.581460] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   93.582048] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   50.874720] ==================================================================
[   50.874793] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   50.874793] 
[   50.874880] Use-after-free read at 0x00000000747a06e1 (in kfence-#148):
[   50.874933]  test_krealloc+0x51c/0x830
[   50.874978]  kunit_try_run_case+0x170/0x3f0
[   50.875029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.875079]  kthread+0x328/0x630
[   50.875121]  ret_from_fork+0x10/0x20
[   50.875162] 
[   50.875187] kfence-#148: 0x00000000747a06e1-0x0000000083fbea9d, size=32, cache=kmalloc-32
[   50.875187] 
[   50.875244] allocated by task 340 on cpu 0 at 50.874072s (0.001169s ago):
[   50.875312]  test_alloc+0x29c/0x628
[   50.875370]  test_krealloc+0xc0/0x830
[   50.875411]  kunit_try_run_case+0x170/0x3f0
[   50.875453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.875501]  kthread+0x328/0x630
[   50.875542]  ret_from_fork+0x10/0x20
[   50.875582] 
[   50.875606] freed by task 340 on cpu 0 at 50.874328s (0.001273s ago):
[   50.875670]  krealloc_noprof+0x148/0x360
[   50.875709]  test_krealloc+0x1dc/0x830
[   50.875748]  kunit_try_run_case+0x170/0x3f0
[   50.875792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.875840]  kthread+0x328/0x630
[   50.875878]  ret_from_fork+0x10/0x20
[   50.875919] 
[   50.875964] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   50.876046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.876079] Hardware name: linux,dummy-virt (DT)
[   50.876114] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   50.810273] ==================================================================
[   50.810395] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   50.810395] 
[   50.810502] Use-after-free read at 0x000000007a8ba17f (in kfence-#147):
[   50.810558]  test_memcache_typesafe_by_rcu+0x280/0x560
[   50.810609]  kunit_try_run_case+0x170/0x3f0
[   50.810657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.810708]  kthread+0x328/0x630
[   50.810754]  ret_from_fork+0x10/0x20
[   50.810795] 
[   50.810820] kfence-#147: 0x000000007a8ba17f-0x000000006e06b1d9, size=32, cache=test
[   50.810820] 
[   50.810874] allocated by task 338 on cpu 0 at 50.769994s (0.040876s ago):
[   50.810942]  test_alloc+0x230/0x628
[   50.810983]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   50.811033]  kunit_try_run_case+0x170/0x3f0
[   50.811076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.811122]  kthread+0x328/0x630
[   50.811162]  ret_from_fork+0x10/0x20
[   50.811201] 
[   50.811226] freed by task 338 on cpu 0 at 50.770110s (0.041112s ago):
[   50.811283]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   50.811328]  kunit_try_run_case+0x170/0x3f0
[   50.811378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.811426]  kthread+0x328/0x630
[   50.811466]  ret_from_fork+0x10/0x20
[   50.811507] 
[   50.811554] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   50.811639] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.811670] Hardware name: linux,dummy-virt (DT)
[   50.811705] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   28.221916] ==================================================================
[   28.222076] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   28.222076] 
[   28.222181] Invalid read at 0x000000003b6bd4ab:
[   28.222340]  test_invalid_access+0xdc/0x1f0
[   28.222416]  kunit_try_run_case+0x170/0x3f0
[   28.222540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.222704]  kthread+0x328/0x630
[   28.222753]  ret_from_fork+0x10/0x20
[   28.222807] 
[   28.222860] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   28.223082] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   28.223135] Hardware name: linux,dummy-virt (DT)
[   28.223176] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   27.994363] ==================================================================
[   27.994473] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.994473] 
[   27.994541] Corrupted memory at 0x00000000e15985a2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143):
[   27.994855]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.994907]  kunit_try_run_case+0x170/0x3f0
[   27.994953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.995002]  kthread+0x328/0x630
[   27.995051]  ret_from_fork+0x10/0x20
[   27.995091] 
[   27.995117] kfence-#143: 0x00000000bc74ad36-0x000000006f48aea1, size=73, cache=kmalloc-96
[   27.995117] 
[   27.995173] allocated by task 328 on cpu 0 at 27.994076s (0.001094s ago):
[   27.995239]  test_alloc+0x29c/0x628
[   27.995279]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   27.995324]  kunit_try_run_case+0x170/0x3f0
[   27.995378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.995426]  kthread+0x328/0x630
[   27.995465]  ret_from_fork+0x10/0x20
[   27.995507] 
[   27.995532] freed by task 328 on cpu 0 at 27.994240s (0.001287s ago):
[   27.995596]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.995640]  kunit_try_run_case+0x170/0x3f0
[   27.995683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.995730]  kthread+0x328/0x630
[   27.995771]  ret_from_fork+0x10/0x20
[   27.995812] 
[   27.995856] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   27.995942] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.995974] Hardware name: linux,dummy-virt (DT)
[   27.996008] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   27.786141] ==================================================================
[   27.786243] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   27.786243] 
[   27.786365] Out-of-bounds read at 0x00000000a7aa7b52 (105B right of kfence-#141):
[   27.786429]  test_kmalloc_aligned_oob_read+0x238/0x468
[   27.786481]  kunit_try_run_case+0x170/0x3f0
[   27.786531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.786580]  kthread+0x328/0x630
[   27.786624]  ret_from_fork+0x10/0x20
[   27.786666] 
[   27.786692] kfence-#141: 0x000000003af2b35f-0x000000007ba8227b, size=73, cache=kmalloc-96
[   27.786692] 
[   27.786747] allocated by task 326 on cpu 0 at 27.785897s (0.000847s ago):
[   27.786819]  test_alloc+0x29c/0x628
[   27.786858]  test_kmalloc_aligned_oob_read+0x100/0x468
[   27.786904]  kunit_try_run_case+0x170/0x3f0
[   27.786949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.786994]  kthread+0x328/0x630
[   27.787038]  ret_from_fork+0x10/0x20
[   27.787079] 
[   27.787127] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   27.787213] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.787245] Hardware name: linux,dummy-virt (DT)
[   27.787281] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   24.562066] ==================================================================
[   24.562163] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   24.562163] 
[   24.562226] Corrupted memory at 0x00000000c917c6ff [ ! ] (in kfence-#110):
[   24.562342]  test_corruption+0x1d8/0x378
[   24.562404]  kunit_try_run_case+0x170/0x3f0
[   24.562450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.562499]  kthread+0x328/0x630
[   24.562540]  ret_from_fork+0x10/0x20
[   24.562584] 
[   24.562607] kfence-#110: 0x00000000fbb31a04-0x000000000e636871, size=32, cache=test
[   24.562607] 
[   24.562662] allocated by task 316 on cpu 1 at 24.561915s (0.000743s ago):
[   24.562722]  test_alloc+0x230/0x628
[   24.562761]  test_corruption+0x198/0x378
[   24.562802]  kunit_try_run_case+0x170/0x3f0
[   24.562845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.562891]  kthread+0x328/0x630
[   24.562930]  ret_from_fork+0x10/0x20
[   24.562971] 
[   24.562996] freed by task 316 on cpu 1 at 24.561975s (0.001016s ago):
[   24.563063]  test_corruption+0x1d8/0x378
[   24.563103]  kunit_try_run_case+0x170/0x3f0
[   24.563147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.563193]  kthread+0x328/0x630
[   24.563236]  ret_from_fork+0x10/0x20
[   24.563280] 
[   24.563323] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   24.563415] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.563447] Hardware name: linux,dummy-virt (DT)
[   24.563481] ==================================================================
[   23.834331] ==================================================================
[   23.834446] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   23.834446] 
[   23.834509] Corrupted memory at 0x00000000e3bab0a0 [ ! ] (in kfence-#103):
[   23.834640]  test_corruption+0x284/0x378
[   23.834686]  kunit_try_run_case+0x170/0x3f0
[   23.834733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.834781]  kthread+0x328/0x630
[   23.834823]  ret_from_fork+0x10/0x20
[   23.834866] 
[   23.834889] kfence-#103: 0x000000005d1e4a7c-0x0000000017862f58, size=32, cache=kmalloc-32
[   23.834889] 
[   23.834945] allocated by task 314 on cpu 1 at 23.834028s (0.000913s ago):
[   23.835006]  test_alloc+0x29c/0x628
[   23.835056]  test_corruption+0x198/0x378
[   23.835095]  kunit_try_run_case+0x170/0x3f0
[   23.835139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.835189]  kthread+0x328/0x630
[   23.835227]  ret_from_fork+0x10/0x20
[   23.835267] 
[   23.835290] freed by task 314 on cpu 1 at 23.834138s (0.001148s ago):
[   23.835364]  test_corruption+0x284/0x378
[   23.835404]  kunit_try_run_case+0x170/0x3f0
[   23.835448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.835495]  kthread+0x328/0x630
[   23.835538]  ret_from_fork+0x10/0x20
[   23.835578] 
[   23.835619] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.835701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.835732] Hardware name: linux,dummy-virt (DT)
[   23.835767] ==================================================================
[   23.937981] ==================================================================
[   23.938073] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   23.938073] 
[   23.938137] Corrupted memory at 0x000000004374d445 [ ! . . . . . . . . . . . . . . . ] (in kfence-#104):
[   23.938465]  test_corruption+0x120/0x378
[   23.938512]  kunit_try_run_case+0x170/0x3f0
[   23.938559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.938607]  kthread+0x328/0x630
[   23.938651]  ret_from_fork+0x10/0x20
[   23.938693] 
[   23.938717] kfence-#104: 0x000000004096955c-0x00000000f9946d54, size=32, cache=test
[   23.938717] 
[   23.938773] allocated by task 316 on cpu 1 at 23.937833s (0.000937s ago):
[   23.938835]  test_alloc+0x230/0x628
[   23.938876]  test_corruption+0xdc/0x378
[   23.938914]  kunit_try_run_case+0x170/0x3f0
[   23.938955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.939002]  kthread+0x328/0x630
[   23.939048]  ret_from_fork+0x10/0x20
[   23.939088] 
[   23.939111] freed by task 316 on cpu 1 at 23.937894s (0.001213s ago):
[   23.939172]  test_corruption+0x120/0x378
[   23.939213]  kunit_try_run_case+0x170/0x3f0
[   23.939254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.939301]  kthread+0x328/0x630
[   23.939339]  ret_from_fork+0x10/0x20
[   23.939389] 
[   23.939431] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.939510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.939542] Hardware name: linux,dummy-virt (DT)
[   23.939575] ==================================================================
[   23.626994] ==================================================================
[   23.627110] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   23.627110] 
[   23.627179] Corrupted memory at 0x00000000206bc285 [ ! . . . . . . . . . . . . . . . ] (in kfence-#101):
[   23.627632]  test_corruption+0x278/0x378
[   23.627683]  kunit_try_run_case+0x170/0x3f0
[   23.627733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.627782]  kthread+0x328/0x630
[   23.627826]  ret_from_fork+0x10/0x20
[   23.627868] 
[   23.627895] kfence-#101: 0x00000000477696e3-0x000000006c5861ac, size=32, cache=kmalloc-32
[   23.627895] 
[   23.627954] allocated by task 314 on cpu 1 at 23.626699s (0.001252s ago):
[   23.628017]  test_alloc+0x29c/0x628
[   23.628057]  test_corruption+0xdc/0x378
[   23.628098]  kunit_try_run_case+0x170/0x3f0
[   23.628140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.628187]  kthread+0x328/0x630
[   23.628227]  ret_from_fork+0x10/0x20
[   23.628267] 
[   23.628291] freed by task 314 on cpu 1 at 23.626809s (0.001478s ago):
[   23.628365]  test_corruption+0x278/0x378
[   23.628406]  kunit_try_run_case+0x170/0x3f0
[   23.628449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.628498]  kthread+0x328/0x630
[   23.628537]  ret_from_fork+0x10/0x20
[   23.628575] 
[   23.628619] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.628702] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.628739] Hardware name: linux,dummy-virt (DT)
[   23.628774] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   23.522059] ==================================================================
[   23.522155] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   23.522155] 
[   23.522219] Invalid free of 0x00000000035fa39e (in kfence-#100):
[   23.522273]  test_invalid_addr_free+0xec/0x238
[   23.522320]  kunit_try_run_case+0x170/0x3f0
[   23.522385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.522433]  kthread+0x328/0x630
[   23.522478]  ret_from_fork+0x10/0x20
[   23.522521] 
[   23.522547] kfence-#100: 0x00000000642f41dc-0x000000001bf7c2ab, size=32, cache=test
[   23.522547] 
[   23.522602] allocated by task 312 on cpu 0 at 23.521925s (0.000673s ago):
[   23.522665]  test_alloc+0x230/0x628
[   23.522705]  test_invalid_addr_free+0xd4/0x238
[   23.522747]  kunit_try_run_case+0x170/0x3f0
[   23.522790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.522837]  kthread+0x328/0x630
[   23.522878]  ret_from_fork+0x10/0x20
[   23.522918] 
[   23.522963] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.523051] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.523083] Hardware name: linux,dummy-virt (DT)
[   23.523115] ==================================================================
[   23.418069] ==================================================================
[   23.418164] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   23.418164] 
[   23.418228] Invalid free of 0x00000000deba894b (in kfence-#99):
[   23.418284]  test_invalid_addr_free+0x1ac/0x238
[   23.418333]  kunit_try_run_case+0x170/0x3f0
[   23.418396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.418444]  kthread+0x328/0x630
[   23.418489]  ret_from_fork+0x10/0x20
[   23.418530] 
[   23.418555] kfence-#99: 0x0000000072609a7b-0x00000000cb1bbd59, size=32, cache=kmalloc-32
[   23.418555] 
[   23.418613] allocated by task 310 on cpu 0 at 23.417908s (0.000701s ago):
[   23.418676]  test_alloc+0x29c/0x628
[   23.418717]  test_invalid_addr_free+0xd4/0x238
[   23.418760]  kunit_try_run_case+0x170/0x3f0
[   23.418803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.418851]  kthread+0x328/0x630
[   23.418890]  ret_from_fork+0x10/0x20
[   23.418932] 
[   23.418980] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.419071] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.419104] Hardware name: linux,dummy-virt (DT)
[   23.419138] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   23.314056] ==================================================================
[   23.314147] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   23.314147] 
[   23.314207] Invalid free of 0x000000008a9850cf (in kfence-#98):
[   23.314258]  test_double_free+0x100/0x238
[   23.314303]  kunit_try_run_case+0x170/0x3f0
[   23.314367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.314414]  kthread+0x328/0x630
[   23.314459]  ret_from_fork+0x10/0x20
[   23.314500] 
[   23.314525] kfence-#98: 0x000000008a9850cf-0x000000004a2bfa56, size=32, cache=test
[   23.314525] 
[   23.314580] allocated by task 308 on cpu 1 at 23.313863s (0.000713s ago):
[   23.314644]  test_alloc+0x230/0x628
[   23.314683]  test_double_free+0xd4/0x238
[   23.314724]  kunit_try_run_case+0x170/0x3f0
[   23.314765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.314812]  kthread+0x328/0x630
[   23.314851]  ret_from_fork+0x10/0x20
[   23.314892] 
[   23.314916] freed by task 308 on cpu 1 at 23.313921s (0.000991s ago):
[   23.314977]  test_double_free+0xf0/0x238
[   23.315022]  kunit_try_run_case+0x170/0x3f0
[   23.315065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.315112]  kthread+0x328/0x630
[   23.315150]  ret_from_fork+0x10/0x20
[   23.315191] 
[   23.315233] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.315315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.315345] Hardware name: linux,dummy-virt (DT)
[   23.315390] ==================================================================
[   23.210221] ==================================================================
[   23.210337] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   23.210337] 
[   23.210426] Invalid free of 0x000000002729b025 (in kfence-#97):
[   23.210492]  test_double_free+0x1bc/0x238
[   23.210539]  kunit_try_run_case+0x170/0x3f0
[   23.210585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.210633]  kthread+0x328/0x630
[   23.210675]  ret_from_fork+0x10/0x20
[   23.210716] 
[   23.210743] kfence-#97: 0x000000002729b025-0x00000000cdf87e45, size=32, cache=kmalloc-32
[   23.210743] 
[   23.210800] allocated by task 306 on cpu 1 at 23.209910s (0.000885s ago):
[   23.210863]  test_alloc+0x29c/0x628
[   23.210904]  test_double_free+0xd4/0x238
[   23.210945]  kunit_try_run_case+0x170/0x3f0
[   23.210987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.211042]  kthread+0x328/0x630
[   23.211083]  ret_from_fork+0x10/0x20
[   23.211122] 
[   23.211145] freed by task 306 on cpu 1 at 23.209981s (0.001161s ago):
[   23.211210]  test_double_free+0x1ac/0x238
[   23.211251]  kunit_try_run_case+0x170/0x3f0
[   23.211294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.211342]  kthread+0x328/0x630
[   23.211393]  ret_from_fork+0x10/0x20
[   23.211434] 
[   23.211482] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   23.211568] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.211600] Hardware name: linux,dummy-virt (DT)
[   23.211635] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   22.795823] ==================================================================
[   22.795940] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.795940] 
[   22.796375] Use-after-free read at 0x000000007dac9cc9 (in kfence-#93):
[   22.796451]  test_use_after_free_read+0x114/0x248
[   22.796663]  kunit_try_run_case+0x170/0x3f0
[   22.796730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.796827]  kthread+0x328/0x630
[   22.796886]  ret_from_fork+0x10/0x20
[   22.796929] 
[   22.797070] kfence-#93: 0x000000007dac9cc9-0x00000000fccb9c80, size=32, cache=kmalloc-32
[   22.797070] 
[   22.797152] allocated by task 298 on cpu 0 at 22.794725s (0.002410s ago):
[   22.797237]  test_alloc+0x29c/0x628
[   22.797280]  test_use_after_free_read+0xd0/0x248
[   22.797334]  kunit_try_run_case+0x170/0x3f0
[   22.797781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.798502]  kthread+0x328/0x630
[   22.798840]  ret_from_fork+0x10/0x20
[   22.798920] 
[   22.799541] freed by task 298 on cpu 0 at 22.795164s (0.004244s ago):
[   22.799689]  test_use_after_free_read+0x1c0/0x248
[   22.799774]  kunit_try_run_case+0x170/0x3f0
[   22.799826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.799885]  kthread+0x328/0x630
[   22.799943]  ret_from_fork+0x10/0x20
[   22.800009] 
[   22.800077] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   22.800170] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.800211] Hardware name: linux,dummy-virt (DT)
[   22.800247] ==================================================================
[   22.900062] ==================================================================
[   22.900141] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.900141] 
[   22.900231] Use-after-free read at 0x00000000f1efe5a8 (in kfence-#94):
[   22.900520]  test_use_after_free_read+0x114/0x248
[   22.900749]  kunit_try_run_case+0x170/0x3f0
[   22.900803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.900859]  kthread+0x328/0x630
[   22.900958]  ret_from_fork+0x10/0x20
[   22.901124] 
[   22.901268] kfence-#94: 0x00000000f1efe5a8-0x000000007c598985, size=32, cache=test
[   22.901268] 
[   22.901409] allocated by task 300 on cpu 0 at 22.899520s (0.001865s ago):
[   22.901716]  test_alloc+0x230/0x628
[   22.901942]  test_use_after_free_read+0xd0/0x248
[   22.902153]  kunit_try_run_case+0x170/0x3f0
[   22.902307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.902815]  kthread+0x328/0x630
[   22.902914]  ret_from_fork+0x10/0x20
[   22.903075] 
[   22.903152] freed by task 300 on cpu 0 at 22.899865s (0.003268s ago):
[   22.903656]  test_use_after_free_read+0xf0/0x248
[   22.903748]  kunit_try_run_case+0x170/0x3f0
[   22.903846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.903897]  kthread+0x328/0x630
[   22.904451]  ret_from_fork+0x10/0x20
[   22.904520] 
[   22.904798] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   22.905117] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.905251] Hardware name: linux,dummy-virt (DT)
[   22.905321] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   22.691559] ==================================================================
[   22.691662] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.691662] 
[   22.692065] Out-of-bounds write at 0x00000000ce04b6bb (1B left of kfence-#92):
[   22.692139]  test_out_of_bounds_write+0x100/0x240
[   22.692191]  kunit_try_run_case+0x170/0x3f0
[   22.692250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.692300]  kthread+0x328/0x630
[   22.692343]  ret_from_fork+0x10/0x20
[   22.692399] 
[   22.692425] kfence-#92: 0x00000000a0452051-0x000000005acc513b, size=32, cache=test
[   22.692425] 
[   22.692847] allocated by task 296 on cpu 0 at 22.691114s (0.001691s ago):
[   22.692936]  test_alloc+0x230/0x628
[   22.692980]  test_out_of_bounds_write+0xc8/0x240
[   22.693032]  kunit_try_run_case+0x170/0x3f0
[   22.693335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.693473]  kthread+0x328/0x630
[   22.693519]  ret_from_fork+0x10/0x20
[   22.693568] 
[   22.693745] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   22.694307] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.694426] Hardware name: linux,dummy-virt (DT)
[   22.694532] ==================================================================
[   22.587199] ==================================================================
[   22.587752] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.587752] 
[   22.587939] Out-of-bounds write at 0x000000001b9cb504 (1B left of kfence-#91):
[   22.588022]  test_out_of_bounds_write+0x100/0x240
[   22.588128]  kunit_try_run_case+0x170/0x3f0
[   22.588410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.588483]  kthread+0x328/0x630
[   22.588868]  ret_from_fork+0x10/0x20
[   22.588938] 
[   22.589045] kfence-#91: 0x00000000e441684f-0x00000000d503a72e, size=32, cache=kmalloc-32
[   22.589045] 
[   22.589421] allocated by task 294 on cpu 0 at 22.587004s (0.002367s ago):
[   22.589625]  test_alloc+0x29c/0x628
[   22.589691]  test_out_of_bounds_write+0xc8/0x240
[   22.589816]  kunit_try_run_case+0x170/0x3f0
[   22.589871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.589926]  kthread+0x328/0x630
[   22.589966]  ret_from_fork+0x10/0x20
[   22.590222] 
[   22.590605] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   22.590897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.590957] Hardware name: linux,dummy-virt (DT)
[   22.591315] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   22.275693] ==================================================================
[   22.275793] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   22.275793] 
[   22.276041] Out-of-bounds read at 0x000000004227ce04 (1B left of kfence-#88):
[   22.276103]  test_out_of_bounds_read+0x114/0x3e0
[   22.276169]  kunit_try_run_case+0x170/0x3f0
[   22.276598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.276667]  kthread+0x328/0x630
[   22.276715]  ret_from_fork+0x10/0x20
[   22.276795] 
[   22.276826] kfence-#88: 0x00000000a912b1f8-0x00000000f79150a5, size=32, cache=test
[   22.276826] 
[   22.276906] allocated by task 292 on cpu 0 at 22.275432s (0.001463s ago):
[   22.277400]  test_alloc+0x230/0x628
[   22.277766]  test_out_of_bounds_read+0xdc/0x3e0
[   22.277835]  kunit_try_run_case+0x170/0x3f0
[   22.278288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.278658]  kthread+0x328/0x630
[   22.278847]  ret_from_fork+0x10/0x20
[   22.278919] 
[   22.279004] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   22.279823] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.279885] Hardware name: linux,dummy-virt (DT)
[   22.280331] ==================================================================
[   21.652091] ==================================================================
[   21.652327] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.652327] 
[   21.652768] Out-of-bounds read at 0x000000008108b6c5 (1B left of kfence-#82):
[   21.653015]  test_out_of_bounds_read+0x114/0x3e0
[   21.653074]  kunit_try_run_case+0x170/0x3f0
[   21.653122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.653170]  kthread+0x328/0x630
[   21.653212]  ret_from_fork+0x10/0x20
[   21.653255] 
[   21.653441] kfence-#82: 0x00000000d0e8dd57-0x00000000f02c3e86, size=32, cache=kmalloc-32
[   21.653441] 
[   21.654044] allocated by task 290 on cpu 0 at 21.650302s (0.003494s ago):
[   21.654885]  test_alloc+0x29c/0x628
[   21.654980]  test_out_of_bounds_read+0xdc/0x3e0
[   21.655037]  kunit_try_run_case+0x170/0x3f0
[   21.655081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.655151]  kthread+0x328/0x630
[   21.655192]  ret_from_fork+0x10/0x20
[   21.655288] 
[   21.655429] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.655657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.655696] Hardware name: linux,dummy-virt (DT)
[   21.655887] ==================================================================
[   22.379063] ==================================================================
[   22.379158] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   22.379158] 
[   22.379252] Out-of-bounds read at 0x00000000ef087641 (32B right of kfence-#89):
[   22.379312]  test_out_of_bounds_read+0x1c8/0x3e0
[   22.379383]  kunit_try_run_case+0x170/0x3f0
[   22.379435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.379698]  kthread+0x328/0x630
[   22.379953]  ret_from_fork+0x10/0x20
[   22.380402] 
[   22.380558] kfence-#89: 0x00000000e7da6a85-0x00000000fc0a8b87, size=32, cache=test
[   22.380558] 
[   22.380623] allocated by task 292 on cpu 0 at 22.378955s (0.001663s ago):
[   22.380696]  test_alloc+0x230/0x628
[   22.380951]  test_out_of_bounds_read+0x198/0x3e0
[   22.381067]  kunit_try_run_case+0x170/0x3f0
[   22.381142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.381646]  kthread+0x328/0x630
[   22.381776]  ret_from_fork+0x10/0x20
[   22.381838] 
[   22.382246] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   22.382369] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   22.382703] Hardware name: linux,dummy-virt (DT)
[   22.382841] ==================================================================
[   21.754841] ==================================================================
[   21.755150] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.755150] 
[   21.755275] Out-of-bounds read at 0x0000000041f0a6ff (32B right of kfence-#83):
[   21.755474]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.755531]  kunit_try_run_case+0x170/0x3f0
[   21.755578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.755784]  kthread+0x328/0x630
[   21.755860]  ret_from_fork+0x10/0x20
[   21.755905] 
[   21.755933] kfence-#83: 0x00000000c0812c2f-0x0000000085b31b41, size=32, cache=kmalloc-32
[   21.755933] 
[   21.756158] allocated by task 290 on cpu 0 at 21.754613s (0.001537s ago):
[   21.756372]  test_alloc+0x29c/0x628
[   21.756429]  test_out_of_bounds_read+0x198/0x3e0
[   21.756481]  kunit_try_run_case+0x170/0x3f0
[   21.756532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.756595]  kthread+0x328/0x630
[   21.756635]  ret_from_fork+0x10/0x20
[   21.757586] 
[   21.757791] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.759437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.759478] Hardware name: linux,dummy-virt (DT)
[   21.759513] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   21.449277] ==================================================================
[   21.449412] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   21.449479] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.449884] 
[   21.450011] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.450185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.450271] Hardware name: linux,dummy-virt (DT)
[   21.450447] Call trace:
[   21.450571]  show_stack+0x20/0x38 (C)
[   21.450627]  dump_stack_lvl+0x8c/0xd0
[   21.450681]  print_report+0x118/0x608
[   21.450732]  kasan_report+0xdc/0x128
[   21.450780]  kasan_check_range+0x100/0x1a8
[   21.451066]  __kasan_check_write+0x20/0x30
[   21.451238]  strncpy_from_user+0x3c/0x2a0
[   21.451366]  copy_user_test_oob+0x5c0/0xec8
[   21.451474]  kunit_try_run_case+0x170/0x3f0
[   21.451644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.451771]  kthread+0x328/0x630
[   21.451920]  ret_from_fork+0x10/0x20
[   21.451972] 
[   21.452006] Allocated by task 288:
[   21.452090]  kasan_save_stack+0x3c/0x68
[   21.452207]  kasan_save_track+0x20/0x40
[   21.452291]  kasan_save_alloc_info+0x40/0x58
[   21.452861]  __kasan_kmalloc+0xd4/0xd8
[   21.452949]  __kmalloc_noprof+0x198/0x4c8
[   21.453006]  kunit_kmalloc_array+0x34/0x88
[   21.453050]  copy_user_test_oob+0xac/0xec8
[   21.453089]  kunit_try_run_case+0x170/0x3f0
[   21.453133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.453578]  kthread+0x328/0x630
[   21.453829]  ret_from_fork+0x10/0x20
[   21.454081] 
[   21.454389] The buggy address belongs to the object at fff00000c3f9e800
[   21.454389]  which belongs to the cache kmalloc-128 of size 128
[   21.454482] The buggy address is located 0 bytes inside of
[   21.454482]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.454730] 
[   21.454779] The buggy address belongs to the physical page:
[   21.454864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.454928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.455147] page_type: f5(slab)
[   21.455227] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.455282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.455902] page dumped because: kasan: bad access detected
[   21.456009] 
[   21.456031] Memory state around the buggy address:
[   21.456144]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.456196]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.456447] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.456494]                                                                 ^
[   21.456590]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.456908]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.456966] ==================================================================
[   21.458405] ==================================================================
[   21.458456] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   21.458509] Write of size 1 at addr fff00000c3f9e878 by task kunit_try_catch/288
[   21.458563] 
[   21.458596] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.458686] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.458727] Hardware name: linux,dummy-virt (DT)
[   21.458896] Call trace:
[   21.459017]  show_stack+0x20/0x38 (C)
[   21.459103]  dump_stack_lvl+0x8c/0xd0
[   21.459343]  print_report+0x118/0x608
[   21.459862]  kasan_report+0xdc/0x128
[   21.460390]  __asan_report_store1_noabort+0x20/0x30
[   21.460641]  strncpy_from_user+0x270/0x2a0
[   21.460722]  copy_user_test_oob+0x5c0/0xec8
[   21.460773]  kunit_try_run_case+0x170/0x3f0
[   21.460827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.460886]  kthread+0x328/0x630
[   21.460934]  ret_from_fork+0x10/0x20
[   21.461265] 
[   21.461506] Allocated by task 288:
[   21.461989]  kasan_save_stack+0x3c/0x68
[   21.462135]  kasan_save_track+0x20/0x40
[   21.462285]  kasan_save_alloc_info+0x40/0x58
[   21.462419]  __kasan_kmalloc+0xd4/0xd8
[   21.462467]  __kmalloc_noprof+0x198/0x4c8
[   21.462507]  kunit_kmalloc_array+0x34/0x88
[   21.462603]  copy_user_test_oob+0xac/0xec8
[   21.462643]  kunit_try_run_case+0x170/0x3f0
[   21.462685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.462968]  kthread+0x328/0x630
[   21.463016]  ret_from_fork+0x10/0x20
[   21.463057] 
[   21.463080] The buggy address belongs to the object at fff00000c3f9e800
[   21.463080]  which belongs to the cache kmalloc-128 of size 128
[   21.463154] The buggy address is located 0 bytes to the right of
[   21.463154]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.463542] 
[   21.463617] The buggy address belongs to the physical page:
[   21.463654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.464159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.464455] page_type: f5(slab)
[   21.464622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.464718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.464788] page dumped because: kasan: bad access detected
[   21.464928] 
[   21.464986] Memory state around the buggy address:
[   21.465022]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.465102]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.465191] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.465333]                                                                 ^
[   21.465384]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.465429]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.465509] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   21.408731] ==================================================================
[   21.408821] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.408882] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.409201] 
[   21.409382] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.409487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.409665] Hardware name: linux,dummy-virt (DT)
[   21.409950] Call trace:
[   21.409989]  show_stack+0x20/0x38 (C)
[   21.410066]  dump_stack_lvl+0x8c/0xd0
[   21.410377]  print_report+0x118/0x608
[   21.410501]  kasan_report+0xdc/0x128
[   21.410659]  kasan_check_range+0x100/0x1a8
[   21.410906]  __kasan_check_read+0x20/0x30
[   21.411083]  copy_user_test_oob+0x728/0xec8
[   21.411251]  kunit_try_run_case+0x170/0x3f0
[   21.411542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.411724]  kthread+0x328/0x630
[   21.412034]  ret_from_fork+0x10/0x20
[   21.412282] 
[   21.412505] Allocated by task 288:
[   21.412653]  kasan_save_stack+0x3c/0x68
[   21.412829]  kasan_save_track+0x20/0x40
[   21.413083]  kasan_save_alloc_info+0x40/0x58
[   21.413318]  __kasan_kmalloc+0xd4/0xd8
[   21.413442]  __kmalloc_noprof+0x198/0x4c8
[   21.413483]  kunit_kmalloc_array+0x34/0x88
[   21.413803]  copy_user_test_oob+0xac/0xec8
[   21.414001]  kunit_try_run_case+0x170/0x3f0
[   21.414167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.414230]  kthread+0x328/0x630
[   21.414277]  ret_from_fork+0x10/0x20
[   21.414641] 
[   21.414865] The buggy address belongs to the object at fff00000c3f9e800
[   21.414865]  which belongs to the cache kmalloc-128 of size 128
[   21.415143] The buggy address is located 0 bytes inside of
[   21.415143]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.415286] 
[   21.415310] The buggy address belongs to the physical page:
[   21.415520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.415666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.415864] page_type: f5(slab)
[   21.415912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.416153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.416300] page dumped because: kasan: bad access detected
[   21.416397] 
[   21.416429] Memory state around the buggy address:
[   21.416467]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.416699]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.416902] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.417067]                                                                 ^
[   21.417216]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.417308]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.417491] ==================================================================
[   21.392854] ==================================================================
[   21.393278] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.393488] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.393691] 
[   21.393831] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.394156] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.394310] Hardware name: linux,dummy-virt (DT)
[   21.394435] Call trace:
[   21.394627]  show_stack+0x20/0x38 (C)
[   21.394836]  dump_stack_lvl+0x8c/0xd0
[   21.395105]  print_report+0x118/0x608
[   21.395365]  kasan_report+0xdc/0x128
[   21.395531]  kasan_check_range+0x100/0x1a8
[   21.395665]  __kasan_check_write+0x20/0x30
[   21.395825]  copy_user_test_oob+0x234/0xec8
[   21.396060]  kunit_try_run_case+0x170/0x3f0
[   21.396251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.396414]  kthread+0x328/0x630
[   21.396552]  ret_from_fork+0x10/0x20
[   21.396806] 
[   21.396906] Allocated by task 288:
[   21.397071]  kasan_save_stack+0x3c/0x68
[   21.397157]  kasan_save_track+0x20/0x40
[   21.397390]  kasan_save_alloc_info+0x40/0x58
[   21.397517]  __kasan_kmalloc+0xd4/0xd8
[   21.397795]  __kmalloc_noprof+0x198/0x4c8
[   21.398015]  kunit_kmalloc_array+0x34/0x88
[   21.398068]  copy_user_test_oob+0xac/0xec8
[   21.398107]  kunit_try_run_case+0x170/0x3f0
[   21.398150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.398686]  kthread+0x328/0x630
[   21.398894]  ret_from_fork+0x10/0x20
[   21.399130] 
[   21.399213] The buggy address belongs to the object at fff00000c3f9e800
[   21.399213]  which belongs to the cache kmalloc-128 of size 128
[   21.399308] The buggy address is located 0 bytes inside of
[   21.399308]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.399498] 
[   21.399602] The buggy address belongs to the physical page:
[   21.399759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.399977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.400125] page_type: f5(slab)
[   21.400323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.400535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.400734] page dumped because: kasan: bad access detected
[   21.400806] 
[   21.400827] Memory state around the buggy address:
[   21.401085]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.401147]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.401451] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.401551]                                                                 ^
[   21.401730]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.401942]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.402052] ==================================================================
[   21.442321] ==================================================================
[   21.442390] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.442473] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.442527] 
[   21.442779] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.442882] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.442915] Hardware name: linux,dummy-virt (DT)
[   21.442947] Call trace:
[   21.443105]  show_stack+0x20/0x38 (C)
[   21.443172]  dump_stack_lvl+0x8c/0xd0
[   21.443227]  print_report+0x118/0x608
[   21.443321]  kasan_report+0xdc/0x128
[   21.443496]  kasan_check_range+0x100/0x1a8
[   21.443683]  __kasan_check_read+0x20/0x30
[   21.443835]  copy_user_test_oob+0x4a0/0xec8
[   21.443888]  kunit_try_run_case+0x170/0x3f0
[   21.443940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.444015]  kthread+0x328/0x630
[   21.444223]  ret_from_fork+0x10/0x20
[   21.444376] 
[   21.444559] Allocated by task 288:
[   21.444840]  kasan_save_stack+0x3c/0x68
[   21.444963]  kasan_save_track+0x20/0x40
[   21.445050]  kasan_save_alloc_info+0x40/0x58
[   21.445095]  __kasan_kmalloc+0xd4/0xd8
[   21.445213]  __kmalloc_noprof+0x198/0x4c8
[   21.445297]  kunit_kmalloc_array+0x34/0x88
[   21.445371]  copy_user_test_oob+0xac/0xec8
[   21.445416]  kunit_try_run_case+0x170/0x3f0
[   21.445458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.445518]  kthread+0x328/0x630
[   21.445556]  ret_from_fork+0x10/0x20
[   21.445595] 
[   21.445617] The buggy address belongs to the object at fff00000c3f9e800
[   21.445617]  which belongs to the cache kmalloc-128 of size 128
[   21.445934] The buggy address is located 0 bytes inside of
[   21.445934]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.446114] 
[   21.446289] The buggy address belongs to the physical page:
[   21.446386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.446464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.446522] page_type: f5(slab)
[   21.446736] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.446909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.447095] page dumped because: kasan: bad access detected
[   21.447182] 
[   21.447466] Memory state around the buggy address:
[   21.447575]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.447723]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.447827] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.447907]                                                                 ^
[   21.447994]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.448039]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.448326] ==================================================================
[   21.430294] ==================================================================
[   21.430363] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.430416] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.430469] 
[   21.430500] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.430587] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.430620] Hardware name: linux,dummy-virt (DT)
[   21.430652] Call trace:
[   21.430677]  show_stack+0x20/0x38 (C)
[   21.430726]  dump_stack_lvl+0x8c/0xd0
[   21.430776]  print_report+0x118/0x608
[   21.430825]  kasan_report+0xdc/0x128
[   21.430873]  kasan_check_range+0x100/0x1a8
[   21.430923]  __kasan_check_read+0x20/0x30
[   21.430973]  copy_user_test_oob+0x3c8/0xec8
[   21.431028]  kunit_try_run_case+0x170/0x3f0
[   21.431078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.431136]  kthread+0x328/0x630
[   21.431184]  ret_from_fork+0x10/0x20
[   21.431235] 
[   21.431256] Allocated by task 288:
[   21.431287]  kasan_save_stack+0x3c/0x68
[   21.431328]  kasan_save_track+0x20/0x40
[   21.433690]  kasan_save_alloc_info+0x40/0x58
[   21.433776]  __kasan_kmalloc+0xd4/0xd8
[   21.433817]  __kmalloc_noprof+0x198/0x4c8
[   21.433856]  kunit_kmalloc_array+0x34/0x88
[   21.433899]  copy_user_test_oob+0xac/0xec8
[   21.433938]  kunit_try_run_case+0x170/0x3f0
[   21.433981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.434030]  kthread+0x328/0x630
[   21.434069]  ret_from_fork+0x10/0x20
[   21.434109] 
[   21.434134] The buggy address belongs to the object at fff00000c3f9e800
[   21.434134]  which belongs to the cache kmalloc-128 of size 128
[   21.434192] The buggy address is located 0 bytes inside of
[   21.434192]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.434257] 
[   21.434281] The buggy address belongs to the physical page:
[   21.434314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.434378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.434628] page_type: f5(slab)
[   21.434916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.435131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.435308] page dumped because: kasan: bad access detected
[   21.435406] 
[   21.435438] Memory state around the buggy address:
[   21.435477]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.435524]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.435571] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.435613]                                                                 ^
[   21.435779]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.435834]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.435976] ==================================================================
[   21.436843] ==================================================================
[   21.436893] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.436946] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.436998] 
[   21.437030] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.437135] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.437178] Hardware name: linux,dummy-virt (DT)
[   21.437212] Call trace:
[   21.437236]  show_stack+0x20/0x38 (C)
[   21.437285]  dump_stack_lvl+0x8c/0xd0
[   21.437359]  print_report+0x118/0x608
[   21.437408]  kasan_report+0xdc/0x128
[   21.437457]  kasan_check_range+0x100/0x1a8
[   21.437508]  __kasan_check_write+0x20/0x30
[   21.437574]  copy_user_test_oob+0x434/0xec8
[   21.437625]  kunit_try_run_case+0x170/0x3f0
[   21.437676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.437734]  kthread+0x328/0x630
[   21.437783]  ret_from_fork+0x10/0x20
[   21.437833] 
[   21.437855] Allocated by task 288:
[   21.437884]  kasan_save_stack+0x3c/0x68
[   21.437935]  kasan_save_track+0x20/0x40
[   21.437975]  kasan_save_alloc_info+0x40/0x58
[   21.438026]  __kasan_kmalloc+0xd4/0xd8
[   21.438065]  __kmalloc_noprof+0x198/0x4c8
[   21.438105]  kunit_kmalloc_array+0x34/0x88
[   21.438146]  copy_user_test_oob+0xac/0xec8
[   21.438187]  kunit_try_run_case+0x170/0x3f0
[   21.438229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.438289]  kthread+0x328/0x630
[   21.438327]  ret_from_fork+0x10/0x20
[   21.439158] 
[   21.439267] The buggy address belongs to the object at fff00000c3f9e800
[   21.439267]  which belongs to the cache kmalloc-128 of size 128
[   21.439398] The buggy address is located 0 bytes inside of
[   21.439398]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.439567] 
[   21.439706] The buggy address belongs to the physical page:
[   21.439794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.439934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.440034] page_type: f5(slab)
[   21.440138] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.440205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.440255] page dumped because: kasan: bad access detected
[   21.440290] 
[   21.440310] Memory state around the buggy address:
[   21.440355]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.440402]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.440448] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.440688]                                                                 ^
[   21.440879]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.440956]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.440995] ==================================================================
[   21.425040] ==================================================================
[   21.425152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.425236] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288
[   21.425294] 
[   21.425536] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.425829] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.425864] Hardware name: linux,dummy-virt (DT)
[   21.425900] Call trace:
[   21.426213]  show_stack+0x20/0x38 (C)
[   21.426370]  dump_stack_lvl+0x8c/0xd0
[   21.427404]  print_report+0x118/0x608
[   21.427468]  kasan_report+0xdc/0x128
[   21.427518]  kasan_check_range+0x100/0x1a8
[   21.427567]  __kasan_check_write+0x20/0x30
[   21.427620]  copy_user_test_oob+0x35c/0xec8
[   21.427670]  kunit_try_run_case+0x170/0x3f0
[   21.427720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.427778]  kthread+0x328/0x630
[   21.427828]  ret_from_fork+0x10/0x20
[   21.427880] 
[   21.427900] Allocated by task 288:
[   21.427933]  kasan_save_stack+0x3c/0x68
[   21.427976]  kasan_save_track+0x20/0x40
[   21.428015]  kasan_save_alloc_info+0x40/0x58
[   21.428058]  __kasan_kmalloc+0xd4/0xd8
[   21.428096]  __kmalloc_noprof+0x198/0x4c8
[   21.428137]  kunit_kmalloc_array+0x34/0x88
[   21.428178]  copy_user_test_oob+0xac/0xec8
[   21.428218]  kunit_try_run_case+0x170/0x3f0
[   21.428264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.428315]  kthread+0x328/0x630
[   21.428363]  ret_from_fork+0x10/0x20
[   21.428403] 
[   21.428426] The buggy address belongs to the object at fff00000c3f9e800
[   21.428426]  which belongs to the cache kmalloc-128 of size 128
[   21.428487] The buggy address is located 0 bytes inside of
[   21.428487]  allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878)
[   21.428551] 
[   21.428575] The buggy address belongs to the physical page:
[   21.428610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.428665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.428717] page_type: f5(slab)
[   21.428760] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.428813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.428856] page dumped because: kasan: bad access detected
[   21.428891] 
[   21.428915] Memory state around the buggy address:
[   21.428953]  fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.429000]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.429045] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.429087]                                                                 ^
[   21.429131]  fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.429176]  fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.429217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   21.307616] ==================================================================
[   21.307686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.307759] Read of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284
[   21.309517] 
[   21.309727] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.309847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.309879] Hardware name: linux,dummy-virt (DT)
[   21.310322] Call trace:
[   21.310475]  show_stack+0x20/0x38 (C)
[   21.310748]  dump_stack_lvl+0x8c/0xd0
[   21.310822]  print_report+0x118/0x608
[   21.311383]  kasan_report+0xdc/0x128
[   21.311470]  __asan_report_load8_noabort+0x20/0x30
[   21.311955]  copy_to_kernel_nofault+0x204/0x250
[   21.312227]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.312590]  kunit_try_run_case+0x170/0x3f0
[   21.313110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.313689]  kthread+0x328/0x630
[   21.314003]  ret_from_fork+0x10/0x20
[   21.314064] 
[   21.314087] Allocated by task 284:
[   21.314445]  kasan_save_stack+0x3c/0x68
[   21.314688]  kasan_save_track+0x20/0x40
[   21.314797]  kasan_save_alloc_info+0x40/0x58
[   21.314842]  __kasan_kmalloc+0xd4/0xd8
[   21.314880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.315506]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.315616]  kunit_try_run_case+0x170/0x3f0
[   21.315833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.316034]  kthread+0x328/0x630
[   21.316077]  ret_from_fork+0x10/0x20
[   21.316117] 
[   21.316576] The buggy address belongs to the object at fff00000c3f9e700
[   21.316576]  which belongs to the cache kmalloc-128 of size 128
[   21.316690] The buggy address is located 0 bytes to the right of
[   21.316690]  allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778)
[   21.316758] 
[   21.317310] The buggy address belongs to the physical page:
[   21.317365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.317810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.317934] page_type: f5(slab)
[   21.318707] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.319075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.319164] page dumped because: kasan: bad access detected
[   21.319277] 
[   21.319311] Memory state around the buggy address:
[   21.319715]  fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.319781]  fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.319830] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.319873]                                                                 ^
[   21.319920]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.319967]  fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320009] ==================================================================
[   21.323411] ==================================================================
[   21.323472] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.323530] Write of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284
[   21.324672] 
[   21.324733] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.324826] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.325430] Hardware name: linux,dummy-virt (DT)
[   21.325898] Call trace:
[   21.326141]  show_stack+0x20/0x38 (C)
[   21.326217]  dump_stack_lvl+0x8c/0xd0
[   21.326362]  print_report+0x118/0x608
[   21.326647]  kasan_report+0xdc/0x128
[   21.327286]  kasan_check_range+0x100/0x1a8
[   21.327396]  __kasan_check_write+0x20/0x30
[   21.327457]  copy_to_kernel_nofault+0x8c/0x250
[   21.327768]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.328443]  kunit_try_run_case+0x170/0x3f0
[   21.328538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.328847]  kthread+0x328/0x630
[   21.328913]  ret_from_fork+0x10/0x20
[   21.329470] 
[   21.329518] Allocated by task 284:
[   21.329555]  kasan_save_stack+0x3c/0x68
[   21.329761]  kasan_save_track+0x20/0x40
[   21.330075]  kasan_save_alloc_info+0x40/0x58
[   21.330447]  __kasan_kmalloc+0xd4/0xd8
[   21.330521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.331013]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.331336]  kunit_try_run_case+0x170/0x3f0
[   21.331399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.331449]  kthread+0x328/0x630
[   21.331488]  ret_from_fork+0x10/0x20
[   21.331528] 
[   21.331550] The buggy address belongs to the object at fff00000c3f9e700
[   21.331550]  which belongs to the cache kmalloc-128 of size 128
[   21.332164] The buggy address is located 0 bytes to the right of
[   21.332164]  allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778)
[   21.332276] 
[   21.332323] The buggy address belongs to the physical page:
[   21.332367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   21.332804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.333047] page_type: f5(slab)
[   21.333097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.333154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.333202] page dumped because: kasan: bad access detected
[   21.333680] 
[   21.333706] Memory state around the buggy address:
[   21.333820]  fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.333872]  fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334063] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.334133]                                                                 ^
[   21.334282]  fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334682]  fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   21.230227] ==================================================================
[   21.230299] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   21.230395] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/272
[   21.230448] 
[   21.230564] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.230760] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.230983] Hardware name: linux,dummy-virt (DT)
[   21.231054] Call trace:
[   21.231549]  show_stack+0x20/0x38 (C)
[   21.231646]  dump_stack_lvl+0x8c/0xd0
[   21.231763]  print_report+0x310/0x608
[   21.231812]  kasan_report+0xdc/0x128
[   21.231965]  __asan_report_load1_noabort+0x20/0x30
[   21.232029]  vmalloc_oob+0x578/0x5d0
[   21.232078]  kunit_try_run_case+0x170/0x3f0
[   21.232133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.232322]  kthread+0x328/0x630
[   21.232390]  ret_from_fork+0x10/0x20
[   21.232666] 
[   21.232700] The buggy address belongs to the virtual mapping at
[   21.232700]  [ffff80008010b000, ffff80008010d000) created by:
[   21.232700]  vmalloc_oob+0x98/0x5d0
[   21.232779] 
[   21.232828] The buggy address belongs to the physical page:
[   21.232870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f87
[   21.233142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.233232] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.233299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.233390] page dumped because: kasan: bad access detected
[   21.233441] 
[   21.233462] Memory state around the buggy address:
[   21.233499]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.233703]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.233890] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.233939]                                                              ^
[   21.234107]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.234160]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.234206] ==================================================================
[   21.234829] ==================================================================
[   21.234878] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   21.235079] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/272
[   21.235229] 
[   21.235264] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.235617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.235659] Hardware name: linux,dummy-virt (DT)
[   21.235803] Call trace:
[   21.235847]  show_stack+0x20/0x38 (C)
[   21.235901]  dump_stack_lvl+0x8c/0xd0
[   21.235956]  print_report+0x310/0x608
[   21.236195]  kasan_report+0xdc/0x128
[   21.236446]  __asan_report_load1_noabort+0x20/0x30
[   21.236582]  vmalloc_oob+0x51c/0x5d0
[   21.236637]  kunit_try_run_case+0x170/0x3f0
[   21.236801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.236981]  kthread+0x328/0x630
[   21.237044]  ret_from_fork+0x10/0x20
[   21.237097] 
[   21.237123] The buggy address belongs to the virtual mapping at
[   21.237123]  [ffff80008010b000, ffff80008010d000) created by:
[   21.237123]  vmalloc_oob+0x98/0x5d0
[   21.237207] 
[   21.237320] The buggy address belongs to the physical page:
[   21.237387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f87
[   21.237440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.237503] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.237555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.237619] page dumped because: kasan: bad access detected
[   21.237652] 
[   21.237672] Memory state around the buggy address:
[   21.238062]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.238187]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.238298] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.238339]                                                                 ^
[   21.238392]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.238438]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.238519] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   21.023168] ==================================================================
[   21.023320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.023408] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.023551] 
[   21.023588] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.023693] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.023785] Hardware name: linux,dummy-virt (DT)
[   21.023818] Call trace:
[   21.023844]  show_stack+0x20/0x38 (C)
[   21.024051]  dump_stack_lvl+0x8c/0xd0
[   21.024119]  print_report+0x118/0x608
[   21.024167]  kasan_report+0xdc/0x128
[   21.024234]  kasan_check_range+0x100/0x1a8
[   21.024288]  __kasan_check_read+0x20/0x30
[   21.024342]  kasan_atomics_helper+0xdd4/0x4858
[   21.024405]  kasan_atomics+0x198/0x2e0
[   21.024510]  kunit_try_run_case+0x170/0x3f0
[   21.024574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.024649]  kthread+0x328/0x630
[   21.024706]  ret_from_fork+0x10/0x20
[   21.024758] 
[   21.024780] Allocated by task 268:
[   21.024812]  kasan_save_stack+0x3c/0x68
[   21.024854]  kasan_save_track+0x20/0x40
[   21.024894]  kasan_save_alloc_info+0x40/0x58
[   21.024936]  __kasan_kmalloc+0xd4/0xd8
[   21.024976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.025022]  kasan_atomics+0xb8/0x2e0
[   21.025069]  kunit_try_run_case+0x170/0x3f0
[   21.025112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.025162]  kthread+0x328/0x630
[   21.025201]  ret_from_fork+0x10/0x20
[   21.025240] 
[   21.025261] The buggy address belongs to the object at fff00000c3f85080
[   21.025261]  which belongs to the cache kmalloc-64 of size 64
[   21.025320] The buggy address is located 0 bytes to the right of
[   21.025320]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.025822] 
[   21.026125] The buggy address belongs to the physical page:
[   21.026421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.026509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.026652] page_type: f5(slab)
[   21.026705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.026866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.026934] page dumped because: kasan: bad access detected
[   21.027004] 
[   21.027205] Memory state around the buggy address:
[   21.027254]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.027312]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.027394] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.027527]                                      ^
[   21.027608]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.027685]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.027829] ==================================================================
[   21.040542] ==================================================================
[   21.040711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.040885] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.040977] 
[   21.041027] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.041116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.041263] Hardware name: linux,dummy-virt (DT)
[   21.041310] Call trace:
[   21.041336]  show_stack+0x20/0x38 (C)
[   21.041497]  dump_stack_lvl+0x8c/0xd0
[   21.041695]  print_report+0x118/0x608
[   21.041754]  kasan_report+0xdc/0x128
[   21.041936]  __asan_report_store8_noabort+0x20/0x30
[   21.042010]  kasan_atomics_helper+0x3e5c/0x4858
[   21.042125]  kasan_atomics+0x198/0x2e0
[   21.042371]  kunit_try_run_case+0x170/0x3f0
[   21.042464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.042635]  kthread+0x328/0x630
[   21.042715]  ret_from_fork+0x10/0x20
[   21.042897] 
[   21.042934] Allocated by task 268:
[   21.042966]  kasan_save_stack+0x3c/0x68
[   21.043044]  kasan_save_track+0x20/0x40
[   21.043085]  kasan_save_alloc_info+0x40/0x58
[   21.043364]  __kasan_kmalloc+0xd4/0xd8
[   21.043414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.043599]  kasan_atomics+0xb8/0x2e0
[   21.043666]  kunit_try_run_case+0x170/0x3f0
[   21.043746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.044003]  kthread+0x328/0x630
[   21.044054]  ret_from_fork+0x10/0x20
[   21.044129] 
[   21.044252] The buggy address belongs to the object at fff00000c3f85080
[   21.044252]  which belongs to the cache kmalloc-64 of size 64
[   21.044340] The buggy address is located 0 bytes to the right of
[   21.044340]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.044502] 
[   21.044524] The buggy address belongs to the physical page:
[   21.044557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.044640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.044875] page_type: f5(slab)
[   21.044924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.045004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.045080] page dumped because: kasan: bad access detected
[   21.045299] 
[   21.045369] Memory state around the buggy address:
[   21.045408]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.045578]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.045630] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.045672]                                      ^
[   21.045962]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.046088]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.046209] ==================================================================
[   21.210735] ==================================================================
[   21.210788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.210985] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.211045] 
[   21.211076] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.211165] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.211255] Hardware name: linux,dummy-virt (DT)
[   21.211359] Call trace:
[   21.211387]  show_stack+0x20/0x38 (C)
[   21.211438]  dump_stack_lvl+0x8c/0xd0
[   21.211491]  print_report+0x118/0x608
[   21.211565]  kasan_report+0xdc/0x128
[   21.211775]  kasan_check_range+0x100/0x1a8
[   21.211900]  __kasan_check_write+0x20/0x30
[   21.211967]  kasan_atomics_helper+0x17ec/0x4858
[   21.212026]  kasan_atomics+0x198/0x2e0
[   21.212246]  kunit_try_run_case+0x170/0x3f0
[   21.212312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.212439]  kthread+0x328/0x630
[   21.212495]  ret_from_fork+0x10/0x20
[   21.212637] 
[   21.212707] Allocated by task 268:
[   21.212774]  kasan_save_stack+0x3c/0x68
[   21.212838]  kasan_save_track+0x20/0x40
[   21.212963]  kasan_save_alloc_info+0x40/0x58
[   21.213006]  __kasan_kmalloc+0xd4/0xd8
[   21.213047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.213093]  kasan_atomics+0xb8/0x2e0
[   21.213130]  kunit_try_run_case+0x170/0x3f0
[   21.213174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.213479]  kthread+0x328/0x630
[   21.213596]  ret_from_fork+0x10/0x20
[   21.213782] 
[   21.213852] The buggy address belongs to the object at fff00000c3f85080
[   21.213852]  which belongs to the cache kmalloc-64 of size 64
[   21.214006] The buggy address is located 0 bytes to the right of
[   21.214006]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.214368] 
[   21.214411] The buggy address belongs to the physical page:
[   21.214446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.214502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.214553] page_type: f5(slab)
[   21.214917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.215252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.215514] page dumped because: kasan: bad access detected
[   21.215592] 
[   21.215724] Memory state around the buggy address:
[   21.215946]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.216084]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.216149] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.216187]                                      ^
[   21.216545]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216716]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216815] ==================================================================
[   21.016144] ==================================================================
[   21.016377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.016453] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.016532] 
[   21.016568] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.016757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.016866] Hardware name: linux,dummy-virt (DT)
[   21.016956] Call trace:
[   21.016998]  show_stack+0x20/0x38 (C)
[   21.017051]  dump_stack_lvl+0x8c/0xd0
[   21.017121]  print_report+0x118/0x608
[   21.017173]  kasan_report+0xdc/0x128
[   21.017388]  __asan_report_load4_noabort+0x20/0x30
[   21.017508]  kasan_atomics_helper+0x3e04/0x4858
[   21.017790]  kasan_atomics+0x198/0x2e0
[   21.017953]  kunit_try_run_case+0x170/0x3f0
[   21.018051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.018246]  kthread+0x328/0x630
[   21.018300]  ret_from_fork+0x10/0x20
[   21.018556] 
[   21.018584] Allocated by task 268:
[   21.018617]  kasan_save_stack+0x3c/0x68
[   21.018691]  kasan_save_track+0x20/0x40
[   21.018766]  kasan_save_alloc_info+0x40/0x58
[   21.018872]  __kasan_kmalloc+0xd4/0xd8
[   21.018938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.019179]  kasan_atomics+0xb8/0x2e0
[   21.019335]  kunit_try_run_case+0x170/0x3f0
[   21.019413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.019551]  kthread+0x328/0x630
[   21.019636]  ret_from_fork+0x10/0x20
[   21.019678] 
[   21.019699] The buggy address belongs to the object at fff00000c3f85080
[   21.019699]  which belongs to the cache kmalloc-64 of size 64
[   21.020028] The buggy address is located 0 bytes to the right of
[   21.020028]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.020146] 
[   21.020363] The buggy address belongs to the physical page:
[   21.020425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.020606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.020701] page_type: f5(slab)
[   21.020799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.020853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.021019] page dumped because: kasan: bad access detected
[   21.021062] 
[   21.021115] Memory state around the buggy address:
[   21.021253]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.021327]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.021657] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.021840]                                      ^
[   21.021921]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.021997]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.022118] ==================================================================
[   21.204497] ==================================================================
[   21.204562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.204639] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.204692] 
[   21.204742] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.204827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.204933] Hardware name: linux,dummy-virt (DT)
[   21.205017] Call trace:
[   21.205075]  show_stack+0x20/0x38 (C)
[   21.205165]  dump_stack_lvl+0x8c/0xd0
[   21.205317]  print_report+0x118/0x608
[   21.205381]  kasan_report+0xdc/0x128
[   21.205428]  __asan_report_load8_noabort+0x20/0x30
[   21.205494]  kasan_atomics_helper+0x3e20/0x4858
[   21.205546]  kasan_atomics+0x198/0x2e0
[   21.205718]  kunit_try_run_case+0x170/0x3f0
[   21.205948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.206145]  kthread+0x328/0x630
[   21.206228]  ret_from_fork+0x10/0x20
[   21.206280] 
[   21.206302] Allocated by task 268:
[   21.206331]  kasan_save_stack+0x3c/0x68
[   21.206384]  kasan_save_track+0x20/0x40
[   21.206425]  kasan_save_alloc_info+0x40/0x58
[   21.206913]  __kasan_kmalloc+0xd4/0xd8
[   21.207027]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.207192]  kasan_atomics+0xb8/0x2e0
[   21.207395]  kunit_try_run_case+0x170/0x3f0
[   21.207439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207550]  kthread+0x328/0x630
[   21.207648]  ret_from_fork+0x10/0x20
[   21.207821] 
[   21.207923] The buggy address belongs to the object at fff00000c3f85080
[   21.207923]  which belongs to the cache kmalloc-64 of size 64
[   21.208019] The buggy address is located 0 bytes to the right of
[   21.208019]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.208087] 
[   21.208108] The buggy address belongs to the physical page:
[   21.208295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.208362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.208457] page_type: f5(slab)
[   21.208623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.208716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.208971] page dumped because: kasan: bad access detected
[   21.209235] 
[   21.209358] Memory state around the buggy address:
[   21.209436]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.209579]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.209652] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.209691]                                      ^
[   21.209726]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209787]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209828] ==================================================================
[   20.968369] ==================================================================
[   20.968434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   20.968502] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.968568] 
[   20.968600] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.968688] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.968747] Hardware name: linux,dummy-virt (DT)
[   20.968782] Call trace:
[   20.968818]  show_stack+0x20/0x38 (C)
[   20.968909]  dump_stack_lvl+0x8c/0xd0
[   20.968966]  print_report+0x118/0x608
[   20.969021]  kasan_report+0xdc/0x128
[   20.969068]  kasan_check_range+0x100/0x1a8
[   20.969119]  __kasan_check_write+0x20/0x30
[   20.969308]  kasan_atomics_helper+0xb70/0x4858
[   20.969414]  kasan_atomics+0x198/0x2e0
[   20.969502]  kunit_try_run_case+0x170/0x3f0
[   20.969630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.969726]  kthread+0x328/0x630
[   20.969833]  ret_from_fork+0x10/0x20
[   20.969976] 
[   20.970016] Allocated by task 268:
[   20.970081]  kasan_save_stack+0x3c/0x68
[   20.970259]  kasan_save_track+0x20/0x40
[   20.970429]  kasan_save_alloc_info+0x40/0x58
[   20.970496]  __kasan_kmalloc+0xd4/0xd8
[   20.970538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.970591]  kasan_atomics+0xb8/0x2e0
[   20.970630]  kunit_try_run_case+0x170/0x3f0
[   20.970673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.970723]  kthread+0x328/0x630
[   20.970978]  ret_from_fork+0x10/0x20
[   20.971040] 
[   20.971158] The buggy address belongs to the object at fff00000c3f85080
[   20.971158]  which belongs to the cache kmalloc-64 of size 64
[   20.971466] The buggy address is located 0 bytes to the right of
[   20.971466]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.971624] 
[   20.971928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.972875] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.974578] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.975818]  kunit_try_run_case+0x170/0x3f0
[   20.976131] 
[   20.976304] page_type: f5(slab)
[   20.977932]                                      ^
[   20.979750] 
[   20.981367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.983448] The buggy address is located 0 bytes to the right of
[   20.983448]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.984542]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.984934] ==================================================================
[   21.028166] ==================================================================
[   21.028308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.028382] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.028435] 
[   21.028470] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.028810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.028925] Hardware name: linux,dummy-virt (DT)
[   21.028961] Call trace:
[   21.029032]  show_stack+0x20/0x38 (C)
[   21.029109]  dump_stack_lvl+0x8c/0xd0
[   21.029175]  print_report+0x118/0x608
[   21.029313]  kasan_report+0xdc/0x128
[   21.029376]  __asan_report_load8_noabort+0x20/0x30
[   21.029432]  kasan_atomics_helper+0x3f58/0x4858
[   21.029490]  kasan_atomics+0x198/0x2e0
[   21.029539]  kunit_try_run_case+0x170/0x3f0
[   21.029864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.030070]  kthread+0x328/0x630
[   21.030313]  ret_from_fork+0x10/0x20
[   21.030549] 
[   21.030573] Allocated by task 268:
[   21.030629]  kasan_save_stack+0x3c/0x68
[   21.030682]  kasan_save_track+0x20/0x40
[   21.030911]  kasan_save_alloc_info+0x40/0x58
[   21.031140]  __kasan_kmalloc+0xd4/0xd8
[   21.031220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.031296]  kasan_atomics+0xb8/0x2e0
[   21.031590]  kunit_try_run_case+0x170/0x3f0
[   21.031766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.031841]  kthread+0x328/0x630
[   21.031905]  ret_from_fork+0x10/0x20
[   21.032139] 
[   21.032167] The buggy address belongs to the object at fff00000c3f85080
[   21.032167]  which belongs to the cache kmalloc-64 of size 64
[   21.032253] The buggy address is located 0 bytes to the right of
[   21.032253]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.032373] 
[   21.032417] The buggy address belongs to the physical page:
[   21.032685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.032880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.032936] page_type: f5(slab)
[   21.032985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.033214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.033290] page dumped because: kasan: bad access detected
[   21.033325] 
[   21.033371] Memory state around the buggy address:
[   21.033444]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.033727]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.033780] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.033961]                                      ^
[   21.034184]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034241]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034331] ==================================================================
[   20.946026] ==================================================================
[   20.946079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.946131] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.946184] 
[   20.946215] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.946646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.946729] Hardware name: linux,dummy-virt (DT)
[   20.946800] Call trace:
[   20.946840]  show_stack+0x20/0x38 (C)
[   20.946926]  dump_stack_lvl+0x8c/0xd0
[   20.947110]  print_report+0x118/0x608
[   20.947162]  kasan_report+0xdc/0x128
[   20.947243]  kasan_check_range+0x100/0x1a8
[   20.947366]  __kasan_check_write+0x20/0x30
[   20.947428]  kasan_atomics_helper+0x99c/0x4858
[   20.947479]  kasan_atomics+0x198/0x2e0
[   20.947534]  kunit_try_run_case+0x170/0x3f0
[   20.947598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.947662]  kthread+0x328/0x630
[   20.947728]  ret_from_fork+0x10/0x20
[   20.947794] 
[   20.947821] Allocated by task 268:
[   20.947860]  kasan_save_stack+0x3c/0x68
[   20.947919]  kasan_save_track+0x20/0x40
[   20.947966]  kasan_save_alloc_info+0x40/0x58
[   20.948010]  __kasan_kmalloc+0xd4/0xd8
[   20.948054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.948109]  kasan_atomics+0xb8/0x2e0
[   20.948156]  kunit_try_run_case+0x170/0x3f0
[   20.948204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.948259]  kthread+0x328/0x630
[   20.948306]  ret_from_fork+0x10/0x20
[   20.948365] 
[   20.948387] The buggy address belongs to the object at fff00000c3f85080
[   20.948387]  which belongs to the cache kmalloc-64 of size 64
[   20.948445] The buggy address is located 0 bytes to the right of
[   20.948445]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.948509] 
[   20.948533] The buggy address belongs to the physical page:
[   20.948566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.948642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.948693] page_type: f5(slab)
[   20.948734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.948787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.948830] page dumped because: kasan: bad access detected
[   20.948863] 
[   20.948885] Memory state around the buggy address:
[   20.948921]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.948990]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.949050] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.949167]                                      ^
[   20.949222]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.949298]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.949371] ==================================================================
[   21.089316] ==================================================================
[   21.091743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.091912] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.092298] 
[   21.092344] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.092448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.092732] Hardware name: linux,dummy-virt (DT)
[   21.093186] Call trace:
[   21.093482]  show_stack+0x20/0x38 (C)
[   21.094201]  dump_stack_lvl+0x8c/0xd0
[   21.095075]  print_report+0x118/0x608
[   21.095215]  kasan_report+0xdc/0x128
[   21.095282]  kasan_check_range+0x100/0x1a8
[   21.095583]  __kasan_check_write+0x20/0x30
[   21.095750]  kasan_atomics_helper+0x1128/0x4858
[   21.095816]  kasan_atomics+0x198/0x2e0
[   21.095974]  kunit_try_run_case+0x170/0x3f0
[   21.096059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.096182]  kthread+0x328/0x630
[   21.096269]  ret_from_fork+0x10/0x20
[   21.096401] 
[   21.096423] Allocated by task 268:
[   21.096464]  kasan_save_stack+0x3c/0x68
[   21.096569]  kasan_save_track+0x20/0x40
[   21.096834]  kasan_save_alloc_info+0x40/0x58
[   21.097055]  __kasan_kmalloc+0xd4/0xd8
[   21.097104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.097283]  kasan_atomics+0xb8/0x2e0
[   21.097369]  kunit_try_run_case+0x170/0x3f0
[   21.097415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.097515]  kthread+0x328/0x630
[   21.097667]  ret_from_fork+0x10/0x20
[   21.097745] 
[   21.097794] The buggy address belongs to the object at fff00000c3f85080
[   21.097794]  which belongs to the cache kmalloc-64 of size 64
[   21.098130] The buggy address is located 0 bytes to the right of
[   21.098130]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.098205] 
[   21.098250] The buggy address belongs to the physical page:
[   21.098292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.098600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.098739] page_type: f5(slab)
[   21.098850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.099064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.099137] page dumped because: kasan: bad access detected
[   21.099272] 
[   21.099325] Memory state around the buggy address:
[   21.099392]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.099439]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.099758] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.099830]                                      ^
[   21.099878]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.099924]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.099964] ==================================================================
[   21.127909] ==================================================================
[   21.127959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.128011] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.128064] 
[   21.128098] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.128183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.128240] Hardware name: linux,dummy-virt (DT)
[   21.128275] Call trace:
[   21.128372]  show_stack+0x20/0x38 (C)
[   21.128446]  dump_stack_lvl+0x8c/0xd0
[   21.128502]  print_report+0x118/0x608
[   21.128568]  kasan_report+0xdc/0x128
[   21.128665]  __asan_report_load8_noabort+0x20/0x30
[   21.128722]  kasan_atomics_helper+0x3f04/0x4858
[   21.128850]  kasan_atomics+0x198/0x2e0
[   21.128903]  kunit_try_run_case+0x170/0x3f0
[   21.128956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.129015]  kthread+0x328/0x630
[   21.129223]  ret_from_fork+0x10/0x20
[   21.129319] 
[   21.129554] Allocated by task 268:
[   21.129797]  kasan_save_stack+0x3c/0x68
[   21.129866]  kasan_save_track+0x20/0x40
[   21.129923]  kasan_save_alloc_info+0x40/0x58
[   21.130076]  __kasan_kmalloc+0xd4/0xd8
[   21.130143]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.130221]  kasan_atomics+0xb8/0x2e0
[   21.130323]  kunit_try_run_case+0x170/0x3f0
[   21.130389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.130631]  kthread+0x328/0x630
[   21.130682]  ret_from_fork+0x10/0x20
[   21.130774] 
[   21.130862] The buggy address belongs to the object at fff00000c3f85080
[   21.130862]  which belongs to the cache kmalloc-64 of size 64
[   21.130973] The buggy address is located 0 bytes to the right of
[   21.130973]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.131106] 
[   21.131257] The buggy address belongs to the physical page:
[   21.131584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.131658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.131712] page_type: f5(slab)
[   21.132174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.132254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.132620] page dumped because: kasan: bad access detected
[   21.132667] 
[   21.132688] Memory state around the buggy address:
[   21.132745]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.133052]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.133136] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.133435]                                      ^
[   21.133672]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133726]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133820] ==================================================================
[   21.195260] ==================================================================
[   21.195307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.195373] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.195426] 
[   21.195460] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.195546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.195777] Hardware name: linux,dummy-virt (DT)
[   21.195839] Call trace:
[   21.195867]  show_stack+0x20/0x38 (C)
[   21.195984]  dump_stack_lvl+0x8c/0xd0
[   21.196089]  print_report+0x118/0x608
[   21.196259]  kasan_report+0xdc/0x128
[   21.196310]  __asan_report_load8_noabort+0x20/0x30
[   21.196386]  kasan_atomics_helper+0x3e10/0x4858
[   21.196528]  kasan_atomics+0x198/0x2e0
[   21.196584]  kunit_try_run_case+0x170/0x3f0
[   21.196658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.196721]  kthread+0x328/0x630
[   21.196770]  ret_from_fork+0x10/0x20
[   21.196857] 
[   21.196916] Allocated by task 268:
[   21.196966]  kasan_save_stack+0x3c/0x68
[   21.197050]  kasan_save_track+0x20/0x40
[   21.197125]  kasan_save_alloc_info+0x40/0x58
[   21.197169]  __kasan_kmalloc+0xd4/0xd8
[   21.197207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.197253]  kasan_atomics+0xb8/0x2e0
[   21.197306]  kunit_try_run_case+0x170/0x3f0
[   21.197359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.197408]  kthread+0x328/0x630
[   21.197694]  ret_from_fork+0x10/0x20
[   21.197798] 
[   21.197864] The buggy address belongs to the object at fff00000c3f85080
[   21.197864]  which belongs to the cache kmalloc-64 of size 64
[   21.198045] The buggy address is located 0 bytes to the right of
[   21.198045]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.198196] 
[   21.198396] The buggy address belongs to the physical page:
[   21.198578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.198677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.198751] page_type: f5(slab)
[   21.198794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.199314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.199379] page dumped because: kasan: bad access detected
[   21.199413] 
[   21.199435] Memory state around the buggy address:
[   21.199472]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.199517]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.199562] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.199601]                                      ^
[   21.199637]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.199683]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.199723] ==================================================================
[   21.200113] ==================================================================
[   21.200167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.200228] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.200281] 
[   21.200363] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.200454] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.200486] Hardware name: linux,dummy-virt (DT)
[   21.200520] Call trace:
[   21.200545]  show_stack+0x20/0x38 (C)
[   21.200610]  dump_stack_lvl+0x8c/0xd0
[   21.200661]  print_report+0x118/0x608
[   21.200709]  kasan_report+0xdc/0x128
[   21.200756]  kasan_check_range+0x100/0x1a8
[   21.200806]  __kasan_check_write+0x20/0x30
[   21.200858]  kasan_atomics_helper+0x175c/0x4858
[   21.200912]  kasan_atomics+0x198/0x2e0
[   21.200960]  kunit_try_run_case+0x170/0x3f0
[   21.201011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201069]  kthread+0x328/0x630
[   21.201118]  ret_from_fork+0x10/0x20
[   21.201169] 
[   21.201190] Allocated by task 268:
[   21.201231]  kasan_save_stack+0x3c/0x68
[   21.201275]  kasan_save_track+0x20/0x40
[   21.201314]  kasan_save_alloc_info+0x40/0x58
[   21.201365]  __kasan_kmalloc+0xd4/0xd8
[   21.201404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.201465]  kasan_atomics+0xb8/0x2e0
[   21.201514]  kunit_try_run_case+0x170/0x3f0
[   21.201557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201612]  kthread+0x328/0x630
[   21.201652]  ret_from_fork+0x10/0x20
[   21.201692] 
[   21.201722] The buggy address belongs to the object at fff00000c3f85080
[   21.201722]  which belongs to the cache kmalloc-64 of size 64
[   21.201782] The buggy address is located 0 bytes to the right of
[   21.201782]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.201849] 
[   21.201871] The buggy address belongs to the physical page:
[   21.201906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.201961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.202028] page_type: f5(slab)
[   21.202070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.202122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.202173] page dumped because: kasan: bad access detected
[   21.202206] 
[   21.202228] Memory state around the buggy address:
[   21.202263]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.202317]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.203300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.203436]                                      ^
[   21.203602]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.204038]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.204135] ==================================================================
[   20.963531] ==================================================================
[   20.963582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   20.963630] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.963682] 
[   20.963872] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.963983] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.964065] Hardware name: linux,dummy-virt (DT)
[   20.964099] Call trace:
[   20.964141]  show_stack+0x20/0x38 (C)
[   20.964205]  dump_stack_lvl+0x8c/0xd0
[   20.964341]  print_report+0x118/0x608
[   20.964427]  kasan_report+0xdc/0x128
[   20.964492]  __asan_report_load4_noabort+0x20/0x30
[   20.964567]  kasan_atomics_helper+0x3dcc/0x4858
[   20.964620]  kasan_atomics+0x198/0x2e0
[   20.964695]  kunit_try_run_case+0x170/0x3f0
[   20.964771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964832]  kthread+0x328/0x630
[   20.964899]  ret_from_fork+0x10/0x20
[   20.964961] 
[   20.965014] Allocated by task 268:
[   20.965052]  kasan_save_stack+0x3c/0x68
[   20.965095]  kasan_save_track+0x20/0x40
[   20.965137]  kasan_save_alloc_info+0x40/0x58
[   20.965179]  __kasan_kmalloc+0xd4/0xd8
[   20.965218]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.965395]  kasan_atomics+0xb8/0x2e0
[   20.965481]  kunit_try_run_case+0x170/0x3f0
[   20.965555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.965623]  kthread+0x328/0x630
[   20.965709]  ret_from_fork+0x10/0x20
[   20.965826] 
[   20.965878] The buggy address belongs to the object at fff00000c3f85080
[   20.965878]  which belongs to the cache kmalloc-64 of size 64
[   20.965972] The buggy address is located 0 bytes to the right of
[   20.965972]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.966161] 
[   20.966302] The buggy address belongs to the physical page:
[   20.966380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.966478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.966551] page_type: f5(slab)
[   20.966659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.966737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.966810] page dumped because: kasan: bad access detected
[   20.966930] 
[   20.966949] Memory state around the buggy address:
[   20.966983]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.967033]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.967099] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.967140]                                      ^
[   20.967422]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967545]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967586] ==================================================================
[   21.035462] ==================================================================
[   21.035532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.035834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.035910] 
[   21.035945] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.036035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.036185] Hardware name: linux,dummy-virt (DT)
[   21.036231] Call trace:
[   21.036256]  show_stack+0x20/0x38 (C)
[   21.036312]  dump_stack_lvl+0x8c/0xd0
[   21.036449]  print_report+0x118/0x608
[   21.036498]  kasan_report+0xdc/0x128
[   21.036556]  kasan_check_range+0x100/0x1a8
[   21.036607]  __kasan_check_write+0x20/0x30
[   21.036665]  kasan_atomics_helper+0xe44/0x4858
[   21.036716]  kasan_atomics+0x198/0x2e0
[   21.036771]  kunit_try_run_case+0x170/0x3f0
[   21.036824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.036883]  kthread+0x328/0x630
[   21.036938]  ret_from_fork+0x10/0x20
[   21.036995] 
[   21.037016] Allocated by task 268:
[   21.037048]  kasan_save_stack+0x3c/0x68
[   21.037090]  kasan_save_track+0x20/0x40
[   21.037130]  kasan_save_alloc_info+0x40/0x58
[   21.037184]  __kasan_kmalloc+0xd4/0xd8
[   21.037230]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.037283]  kasan_atomics+0xb8/0x2e0
[   21.037329]  kunit_try_run_case+0x170/0x3f0
[   21.037385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.037468]  kthread+0x328/0x630
[   21.037953]  ret_from_fork+0x10/0x20
[   21.038009] 
[   21.038034] The buggy address belongs to the object at fff00000c3f85080
[   21.038034]  which belongs to the cache kmalloc-64 of size 64
[   21.038104] The buggy address is located 0 bytes to the right of
[   21.038104]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.038170] 
[   21.038192] The buggy address belongs to the physical page:
[   21.038226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.038280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.038329] page_type: f5(slab)
[   21.038531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.038617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.038835] page dumped because: kasan: bad access detected
[   21.038901] 
[   21.039135] Memory state around the buggy address:
[   21.039209]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.039337]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.039649] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.039727]                                      ^
[   21.039788]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.040049]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.040129] ==================================================================
[   21.010668] ==================================================================
[   21.010726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.011269] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.011371] 
[   21.011483] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.011592] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.011628] Hardware name: linux,dummy-virt (DT)
[   21.011676] Call trace:
[   21.011723]  show_stack+0x20/0x38 (C)
[   21.011839]  dump_stack_lvl+0x8c/0xd0
[   21.011892]  print_report+0x118/0x608
[   21.012122]  kasan_report+0xdc/0x128
[   21.012196]  kasan_check_range+0x100/0x1a8
[   21.012256]  __kasan_check_write+0x20/0x30
[   21.012307]  kasan_atomics_helper+0xd3c/0x4858
[   21.012539]  kasan_atomics+0x198/0x2e0
[   21.012623]  kunit_try_run_case+0x170/0x3f0
[   21.012710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.012773]  kthread+0x328/0x630
[   21.012822]  ret_from_fork+0x10/0x20
[   21.012876] 
[   21.013032] Allocated by task 268:
[   21.013080]  kasan_save_stack+0x3c/0x68
[   21.013127]  kasan_save_track+0x20/0x40
[   21.013261]  kasan_save_alloc_info+0x40/0x58
[   21.013316]  __kasan_kmalloc+0xd4/0xd8
[   21.013368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.013415]  kasan_atomics+0xb8/0x2e0
[   21.013615]  kunit_try_run_case+0x170/0x3f0
[   21.013809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013874]  kthread+0x328/0x630
[   21.013914]  ret_from_fork+0x10/0x20
[   21.014116] 
[   21.014162] The buggy address belongs to the object at fff00000c3f85080
[   21.014162]  which belongs to the cache kmalloc-64 of size 64
[   21.014225] The buggy address is located 0 bytes to the right of
[   21.014225]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.014355] 
[   21.014412] The buggy address belongs to the physical page:
[   21.014470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.014533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.014595] page_type: f5(slab)
[   21.014643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.014713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.014756] page dumped because: kasan: bad access detected
[   21.014788] 
[   21.014810] Memory state around the buggy address:
[   21.014852]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.014919]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.014966] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.015019]                                      ^
[   21.015068]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.015126]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.015195] ==================================================================
[   21.118693] ==================================================================
[   21.118759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.118835] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.118889] 
[   21.118984] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.119110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.119412] Hardware name: linux,dummy-virt (DT)
[   21.119459] Call trace:
[   21.119486]  show_stack+0x20/0x38 (C)
[   21.119551]  dump_stack_lvl+0x8c/0xd0
[   21.119654]  print_report+0x118/0x608
[   21.119708]  kasan_report+0xdc/0x128
[   21.119755]  kasan_check_range+0x100/0x1a8
[   21.119929]  __kasan_check_write+0x20/0x30
[   21.120026]  kasan_atomics_helper+0x12d8/0x4858
[   21.120088]  kasan_atomics+0x198/0x2e0
[   21.120136]  kunit_try_run_case+0x170/0x3f0
[   21.120238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.120301]  kthread+0x328/0x630
[   21.120481]  ret_from_fork+0x10/0x20
[   21.120551] 
[   21.120603] Allocated by task 268:
[   21.120732]  kasan_save_stack+0x3c/0x68
[   21.120798]  kasan_save_track+0x20/0x40
[   21.120844]  kasan_save_alloc_info+0x40/0x58
[   21.120888]  __kasan_kmalloc+0xd4/0xd8
[   21.121196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.121287]  kasan_atomics+0xb8/0x2e0
[   21.121330]  kunit_try_run_case+0x170/0x3f0
[   21.121384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.121491]  kthread+0x328/0x630
[   21.121536]  ret_from_fork+0x10/0x20
[   21.121603] 
[   21.121792] The buggy address belongs to the object at fff00000c3f85080
[   21.121792]  which belongs to the cache kmalloc-64 of size 64
[   21.121901] The buggy address is located 0 bytes to the right of
[   21.121901]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.122057] 
[   21.122117] The buggy address belongs to the physical page:
[   21.122176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.122359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.122449] page_type: f5(slab)
[   21.122492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.122605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.122720] page dumped because: kasan: bad access detected
[   21.122782] 
[   21.122965] Memory state around the buggy address:
[   21.123036]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.123178]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.123233] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.123369]                                      ^
[   21.123409]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.123455]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.123642] ==================================================================
[   21.175334] ==================================================================
[   21.175399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.175451] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.175502] 
[   21.175539] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.175625] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.175657] Hardware name: linux,dummy-virt (DT)
[   21.175692] Call trace:
[   21.175717]  show_stack+0x20/0x38 (C)
[   21.175767]  dump_stack_lvl+0x8c/0xd0
[   21.175820]  print_report+0x118/0x608
[   21.175867]  kasan_report+0xdc/0x128
[   21.175916]  __asan_report_load8_noabort+0x20/0x30
[   21.175971]  kasan_atomics_helper+0x3db0/0x4858
[   21.176020]  kasan_atomics+0x198/0x2e0
[   21.176068]  kunit_try_run_case+0x170/0x3f0
[   21.176119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.176178]  kthread+0x328/0x630
[   21.176225]  ret_from_fork+0x10/0x20
[   21.176279] 
[   21.176298] Allocated by task 268:
[   21.176327]  kasan_save_stack+0x3c/0x68
[   21.179279]  kasan_save_track+0x20/0x40
[   21.179325]  kasan_save_alloc_info+0x40/0x58
[   21.179379]  __kasan_kmalloc+0xd4/0xd8
[   21.179419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.179465]  kasan_atomics+0xb8/0x2e0
[   21.179503]  kunit_try_run_case+0x170/0x3f0
[   21.179546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.179595]  kthread+0x328/0x630
[   21.179634]  ret_from_fork+0x10/0x20
[   21.179674] 
[   21.179695] The buggy address belongs to the object at fff00000c3f85080
[   21.179695]  which belongs to the cache kmalloc-64 of size 64
[   21.179757] The buggy address is located 0 bytes to the right of
[   21.179757]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.179823] 
[   21.179846] The buggy address belongs to the physical page:
[   21.179880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.179935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.179988] page_type: f5(slab)
[   21.180029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.180082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.180125] page dumped because: kasan: bad access detected
[   21.180159] 
[   21.180179] Memory state around the buggy address:
[   21.180211]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.180256]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.180300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.180343]                                      ^
[   21.180388]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.180434]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.180475] ==================================================================
[   21.190118] ==================================================================
[   21.190168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.190385] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.190543] 
[   21.190580] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.190708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.190758] Hardware name: linux,dummy-virt (DT)
[   21.190828] Call trace:
[   21.190875]  show_stack+0x20/0x38 (C)
[   21.190927]  dump_stack_lvl+0x8c/0xd0
[   21.191088]  print_report+0x118/0x608
[   21.191150]  kasan_report+0xdc/0x128
[   21.191266]  kasan_check_range+0x100/0x1a8
[   21.191325]  __kasan_check_write+0x20/0x30
[   21.191388]  kasan_atomics_helper+0x16d0/0x4858
[   21.191506]  kasan_atomics+0x198/0x2e0
[   21.191601]  kunit_try_run_case+0x170/0x3f0
[   21.191703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191793]  kthread+0x328/0x630
[   21.191879]  ret_from_fork+0x10/0x20
[   21.191931] 
[   21.191953] Allocated by task 268:
[   21.191984]  kasan_save_stack+0x3c/0x68
[   21.192159]  kasan_save_track+0x20/0x40
[   21.192203]  kasan_save_alloc_info+0x40/0x58
[   21.192317]  __kasan_kmalloc+0xd4/0xd8
[   21.192372]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.192420]  kasan_atomics+0xb8/0x2e0
[   21.192489]  kunit_try_run_case+0x170/0x3f0
[   21.192568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192643]  kthread+0x328/0x630
[   21.192725]  ret_from_fork+0x10/0x20
[   21.192970] 
[   21.193035] The buggy address belongs to the object at fff00000c3f85080
[   21.193035]  which belongs to the cache kmalloc-64 of size 64
[   21.193197] The buggy address is located 0 bytes to the right of
[   21.193197]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.193396] 
[   21.193454] The buggy address belongs to the physical page:
[   21.193530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.193610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.193691] page_type: f5(slab)
[   21.193742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.193802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.194055] page dumped because: kasan: bad access detected
[   21.194327] 
[   21.194411] Memory state around the buggy address:
[   21.194546]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.194826]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.194880] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.194930]                                      ^
[   21.194967]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195016]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195057] ==================================================================
[   21.149487] ==================================================================
[   21.149565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.149727] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.150147] 
[   21.150208] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.150300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.150625] Hardware name: linux,dummy-virt (DT)
[   21.151017] Call trace:
[   21.151083]  show_stack+0x20/0x38 (C)
[   21.151224]  dump_stack_lvl+0x8c/0xd0
[   21.151282]  print_report+0x118/0x608
[   21.151331]  kasan_report+0xdc/0x128
[   21.151428]  kasan_check_range+0x100/0x1a8
[   21.151496]  __kasan_check_write+0x20/0x30
[   21.152165]  kasan_atomics_helper+0x14e4/0x4858
[   21.152251]  kasan_atomics+0x198/0x2e0
[   21.152336]  kunit_try_run_case+0x170/0x3f0
[   21.152504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.152579]  kthread+0x328/0x630
[   21.152968]  ret_from_fork+0x10/0x20
[   21.153631] 
[   21.153678] Allocated by task 268:
[   21.153715]  kasan_save_stack+0x3c/0x68
[   21.153762]  kasan_save_track+0x20/0x40
[   21.153802]  kasan_save_alloc_info+0x40/0x58
[   21.154156]  __kasan_kmalloc+0xd4/0xd8
[   21.154243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.154529]  kasan_atomics+0xb8/0x2e0
[   21.154919]  kunit_try_run_case+0x170/0x3f0
[   21.155034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.155432]  kthread+0x328/0x630
[   21.156007]  ret_from_fork+0x10/0x20
[   21.156192] 
[   21.156273] The buggy address belongs to the object at fff00000c3f85080
[   21.156273]  which belongs to the cache kmalloc-64 of size 64
[   21.156345] The buggy address is located 0 bytes to the right of
[   21.156345]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.156462] 
[   21.156486] The buggy address belongs to the physical page:
[   21.156556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.156919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.157394] page_type: f5(slab)
[   21.157799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.158136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.158259] page dumped because: kasan: bad access detected
[   21.158343] 
[   21.158412] Memory state around the buggy address:
[   21.158533]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.158600]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.158813] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.158985]                                      ^
[   21.159054]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159403]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159519] ==================================================================
[   21.101032] ==================================================================
[   21.101091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.101199] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.101279] 
[   21.101425] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.101556] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.101794] Hardware name: linux,dummy-virt (DT)
[   21.101852] Call trace:
[   21.101957]  show_stack+0x20/0x38 (C)
[   21.102055]  dump_stack_lvl+0x8c/0xd0
[   21.102135]  print_report+0x118/0x608
[   21.102221]  kasan_report+0xdc/0x128
[   21.102468]  kasan_check_range+0x100/0x1a8
[   21.102531]  __kasan_check_write+0x20/0x30
[   21.102593]  kasan_atomics_helper+0x1190/0x4858
[   21.102646]  kasan_atomics+0x198/0x2e0
[   21.102693]  kunit_try_run_case+0x170/0x3f0
[   21.102871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.102958]  kthread+0x328/0x630
[   21.103205]  ret_from_fork+0x10/0x20
[   21.103269] 
[   21.103392] Allocated by task 268:
[   21.103447]  kasan_save_stack+0x3c/0x68
[   21.103517]  kasan_save_track+0x20/0x40
[   21.103653]  kasan_save_alloc_info+0x40/0x58
[   21.103751]  __kasan_kmalloc+0xd4/0xd8
[   21.103830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.104176]  kasan_atomics+0xb8/0x2e0
[   21.104255]  kunit_try_run_case+0x170/0x3f0
[   21.104301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.104371]  kthread+0x328/0x630
[   21.104462]  ret_from_fork+0x10/0x20
[   21.104582] 
[   21.104631] The buggy address belongs to the object at fff00000c3f85080
[   21.104631]  which belongs to the cache kmalloc-64 of size 64
[   21.104748] The buggy address is located 0 bytes to the right of
[   21.104748]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.104976] 
[   21.105026] The buggy address belongs to the physical page:
[   21.105104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.105215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.105382] page_type: f5(slab)
[   21.105571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.105716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.105785] page dumped because: kasan: bad access detected
[   21.105881] 
[   21.105920] Memory state around the buggy address:
[   21.105970]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.106195]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.106251] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.106311]                                      ^
[   21.106406]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106453]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106608] ==================================================================
[   21.068534] ==================================================================
[   21.068596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.068651] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.068850] 
[   21.068892] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.069062] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.069130] Hardware name: linux,dummy-virt (DT)
[   21.069165] Call trace:
[   21.069324]  show_stack+0x20/0x38 (C)
[   21.069412]  dump_stack_lvl+0x8c/0xd0
[   21.069476]  print_report+0x118/0x608
[   21.069527]  kasan_report+0xdc/0x128
[   21.069574]  kasan_check_range+0x100/0x1a8
[   21.069625]  __kasan_check_write+0x20/0x30
[   21.069675]  kasan_atomics_helper+0xff0/0x4858
[   21.069725]  kasan_atomics+0x198/0x2e0
[   21.069771]  kunit_try_run_case+0x170/0x3f0
[   21.069825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.070178]  kthread+0x328/0x630
[   21.070339]  ret_from_fork+0x10/0x20
[   21.070405] 
[   21.070428] Allocated by task 268:
[   21.070623]  kasan_save_stack+0x3c/0x68
[   21.070671]  kasan_save_track+0x20/0x40
[   21.070772]  kasan_save_alloc_info+0x40/0x58
[   21.070872]  __kasan_kmalloc+0xd4/0xd8
[   21.070981]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.071263]  kasan_atomics+0xb8/0x2e0
[   21.071418]  kunit_try_run_case+0x170/0x3f0
[   21.071467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.071546]  kthread+0x328/0x630
[   21.071732]  ret_from_fork+0x10/0x20
[   21.071787] 
[   21.071850] The buggy address belongs to the object at fff00000c3f85080
[   21.071850]  which belongs to the cache kmalloc-64 of size 64
[   21.071957] The buggy address is located 0 bytes to the right of
[   21.071957]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.072053] 
[   21.072282] The buggy address belongs to the physical page:
[   21.072341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.072433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.072577] page_type: f5(slab)
[   21.072622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.072675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.072871] page dumped because: kasan: bad access detected
[   21.072910] 
[   21.072933] Memory state around the buggy address:
[   21.073032]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.073109]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.073192] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.073359]                                      ^
[   21.073404]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073715]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073812] ==================================================================
[   20.999642] ==================================================================
[   20.999696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.000044] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.000132] 
[   21.000167] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.000257] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.000402] Hardware name: linux,dummy-virt (DT)
[   21.000449] Call trace:
[   21.000475]  show_stack+0x20/0x38 (C)
[   21.000531]  dump_stack_lvl+0x8c/0xd0
[   21.000763]  print_report+0x118/0x608
[   21.000899]  kasan_report+0xdc/0x128
[   21.000953]  __asan_report_load4_noabort+0x20/0x30
[   21.001163]  kasan_atomics_helper+0x3dd8/0x4858
[   21.001233]  kasan_atomics+0x198/0x2e0
[   21.001301]  kunit_try_run_case+0x170/0x3f0
[   21.001409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.001636]  kthread+0x328/0x630
[   21.001695]  ret_from_fork+0x10/0x20
[   21.001786] 
[   21.001893] Allocated by task 268:
[   21.001953]  kasan_save_stack+0x3c/0x68
[   21.002127]  kasan_save_track+0x20/0x40
[   21.002193]  kasan_save_alloc_info+0x40/0x58
[   21.002237]  __kasan_kmalloc+0xd4/0xd8
[   21.002277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.002360]  kasan_atomics+0xb8/0x2e0
[   21.002399]  kunit_try_run_case+0x170/0x3f0
[   21.002625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.002854]  kthread+0x328/0x630
[   21.002921]  ret_from_fork+0x10/0x20
[   21.003106] 
[   21.003196] The buggy address belongs to the object at fff00000c3f85080
[   21.003196]  which belongs to the cache kmalloc-64 of size 64
[   21.003323] The buggy address is located 0 bytes to the right of
[   21.003323]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.003468] 
[   21.003533] The buggy address belongs to the physical page:
[   21.005473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.006299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.006517] page_type: f5(slab)
[   21.006567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.008270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.008506] page dumped because: kasan: bad access detected
[   21.008558] 
[   21.008719] Memory state around the buggy address:
[   21.008794]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.008926]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.009002] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.009249]                                      ^
[   21.009440]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009543]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009737] ==================================================================
[   21.053241] ==================================================================
[   21.053300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.053469] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.053564] 
[   21.053609] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.053708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.053860] Hardware name: linux,dummy-virt (DT)
[   21.053918] Call trace:
[   21.053964]  show_stack+0x20/0x38 (C)
[   21.054136]  dump_stack_lvl+0x8c/0xd0
[   21.054195]  print_report+0x118/0x608
[   21.054270]  kasan_report+0xdc/0x128
[   21.054560]  kasan_check_range+0x100/0x1a8
[   21.054738]  __kasan_check_write+0x20/0x30
[   21.054842]  kasan_atomics_helper+0xf20/0x4858
[   21.055006]  kasan_atomics+0x198/0x2e0
[   21.055123]  kunit_try_run_case+0x170/0x3f0
[   21.055302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.055422]  kthread+0x328/0x630
[   21.055498]  ret_from_fork+0x10/0x20
[   21.055674] 
[   21.055723] Allocated by task 268:
[   21.055779]  kasan_save_stack+0x3c/0x68
[   21.055825]  kasan_save_track+0x20/0x40
[   21.056043]  kasan_save_alloc_info+0x40/0x58
[   21.056099]  __kasan_kmalloc+0xd4/0xd8
[   21.056391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.056802]  kasan_atomics+0xb8/0x2e0
[   21.056859]  kunit_try_run_case+0x170/0x3f0
[   21.056956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.057027]  kthread+0x328/0x630
[   21.057249]  ret_from_fork+0x10/0x20
[   21.057328] 
[   21.057405] The buggy address belongs to the object at fff00000c3f85080
[   21.057405]  which belongs to the cache kmalloc-64 of size 64
[   21.057679] The buggy address is located 0 bytes to the right of
[   21.057679]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.057776] 
[   21.057830] The buggy address belongs to the physical page:
[   21.057886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.058096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.058157] page_type: f5(slab)
[   21.058272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.058330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.058515] page dumped because: kasan: bad access detected
[   21.058589] 
[   21.058657] Memory state around the buggy address:
[   21.058953]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.059127]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.059185] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.059458]                                      ^
[   21.059515]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059613]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059692] ==================================================================
[   20.950025] ==================================================================
[   20.950078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.950141] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.950202] 
[   20.950248] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.950338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.950505] Hardware name: linux,dummy-virt (DT)
[   20.950587] Call trace:
[   20.950663]  show_stack+0x20/0x38 (C)
[   20.950736]  dump_stack_lvl+0x8c/0xd0
[   20.950835]  print_report+0x118/0x608
[   20.950890]  kasan_report+0xdc/0x128
[   20.950956]  kasan_check_range+0x100/0x1a8
[   20.951017]  __kasan_check_write+0x20/0x30
[   20.951066]  kasan_atomics_helper+0xa04/0x4858
[   20.951117]  kasan_atomics+0x198/0x2e0
[   20.951165]  kunit_try_run_case+0x170/0x3f0
[   20.951472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.951534]  kthread+0x328/0x630
[   20.951632]  ret_from_fork+0x10/0x20
[   20.951715] 
[   20.951754] Allocated by task 268:
[   20.951803]  kasan_save_stack+0x3c/0x68
[   20.951859]  kasan_save_track+0x20/0x40
[   20.951899]  kasan_save_alloc_info+0x40/0x58
[   20.952023]  __kasan_kmalloc+0xd4/0xd8
[   20.952110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.952187]  kasan_atomics+0xb8/0x2e0
[   20.952247]  kunit_try_run_case+0x170/0x3f0
[   20.952291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.952338]  kthread+0x328/0x630
[   20.952417]  ret_from_fork+0x10/0x20
[   20.952514] 
[   20.952544] The buggy address belongs to the object at fff00000c3f85080
[   20.952544]  which belongs to the cache kmalloc-64 of size 64
[   20.952604] The buggy address is located 0 bytes to the right of
[   20.952604]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.952675] 
[   20.952704] The buggy address belongs to the physical page:
[   20.952739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.952791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.952852] page_type: f5(slab)
[   20.952910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.952963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.953019] page dumped because: kasan: bad access detected
[   20.953062] 
[   20.953091] Memory state around the buggy address:
[   20.953127]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.953173]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.953219] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.953259]                                      ^
[   20.953405]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.953464]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.953506] ==================================================================
[   21.123970] ==================================================================
[   21.124024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.124077] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.124289] 
[   21.124336] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.124643] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.124688] Hardware name: linux,dummy-virt (DT)
[   21.124724] Call trace:
[   21.124750]  show_stack+0x20/0x38 (C)
[   21.124805]  dump_stack_lvl+0x8c/0xd0
[   21.124886]  print_report+0x118/0x608
[   21.125080]  kasan_report+0xdc/0x128
[   21.125144]  kasan_check_range+0x100/0x1a8
[   21.125257]  __kasan_check_write+0x20/0x30
[   21.125323]  kasan_atomics_helper+0x1384/0x4858
[   21.125386]  kasan_atomics+0x198/0x2e0
[   21.125499]  kunit_try_run_case+0x170/0x3f0
[   21.125587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.125648]  kthread+0x328/0x630
[   21.125696]  ret_from_fork+0x10/0x20
[   21.125766] 
[   21.125787] Allocated by task 268:
[   21.125816]  kasan_save_stack+0x3c/0x68
[   21.125876]  kasan_save_track+0x20/0x40
[   21.125939]  kasan_save_alloc_info+0x40/0x58
[   21.125983]  __kasan_kmalloc+0xd4/0xd8
[   21.126023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.126069]  kasan_atomics+0xb8/0x2e0
[   21.126117]  kunit_try_run_case+0x170/0x3f0
[   21.126170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.126219]  kthread+0x328/0x630
[   21.126258]  ret_from_fork+0x10/0x20
[   21.126298] 
[   21.126328] The buggy address belongs to the object at fff00000c3f85080
[   21.126328]  which belongs to the cache kmalloc-64 of size 64
[   21.126408] The buggy address is located 0 bytes to the right of
[   21.126408]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.126486] 
[   21.126523] The buggy address belongs to the physical page:
[   21.126577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.126640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.126691] page_type: f5(slab)
[   21.126738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.126790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.126842] page dumped because: kasan: bad access detected
[   21.126885] 
[   21.126914] Memory state around the buggy address:
[   21.126956]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.127015]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.127072] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.127112]                                      ^
[   21.127149]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.127194]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.127235] ==================================================================
[   20.959740] ==================================================================
[   20.959796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.959849] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.959900] 
[   20.959933] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.960164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.960200] Hardware name: linux,dummy-virt (DT)
[   20.960234] Call trace:
[   20.960261]  show_stack+0x20/0x38 (C)
[   20.960315]  dump_stack_lvl+0x8c/0xd0
[   20.960376]  print_report+0x118/0x608
[   20.960581]  kasan_report+0xdc/0x128
[   20.960767]  kasan_check_range+0x100/0x1a8
[   20.960848]  __kasan_check_write+0x20/0x30
[   20.960900]  kasan_atomics_helper+0xad4/0x4858
[   20.960951]  kasan_atomics+0x198/0x2e0
[   20.960999]  kunit_try_run_case+0x170/0x3f0
[   20.961072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961132]  kthread+0x328/0x630
[   20.961180]  ret_from_fork+0x10/0x20
[   20.961232] 
[   20.961254] Allocated by task 268:
[   20.961486]  kasan_save_stack+0x3c/0x68
[   20.961537]  kasan_save_track+0x20/0x40
[   20.961579]  kasan_save_alloc_info+0x40/0x58
[   20.961622]  __kasan_kmalloc+0xd4/0xd8
[   20.961661]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.961707]  kasan_atomics+0xb8/0x2e0
[   20.961744]  kunit_try_run_case+0x170/0x3f0
[   20.961787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961837]  kthread+0x328/0x630
[   20.961875]  ret_from_fork+0x10/0x20
[   20.961913] 
[   20.961936] The buggy address belongs to the object at fff00000c3f85080
[   20.961936]  which belongs to the cache kmalloc-64 of size 64
[   20.961997] The buggy address is located 0 bytes to the right of
[   20.961997]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.962063] 
[   20.962085] The buggy address belongs to the physical page:
[   20.962118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.962170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.962220] page_type: f5(slab)
[   20.962260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.962314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.962366] page dumped because: kasan: bad access detected
[   20.962453] 
[   20.962503] Memory state around the buggy address:
[   20.962552]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.962667]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.962722] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.962791]                                      ^
[   20.962977]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963135]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963234] ==================================================================
[   21.180703] ==================================================================
[   21.180751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.180799] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.180850] 
[   21.180882] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.180968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.181000] Hardware name: linux,dummy-virt (DT)
[   21.181032] Call trace:
[   21.181056]  show_stack+0x20/0x38 (C)
[   21.181107]  dump_stack_lvl+0x8c/0xd0
[   21.181157]  print_report+0x118/0x608
[   21.181205]  kasan_report+0xdc/0x128
[   21.181252]  kasan_check_range+0x100/0x1a8
[   21.181303]  __kasan_check_write+0x20/0x30
[   21.181381]  kasan_atomics_helper+0x1644/0x4858
[   21.181518]  kasan_atomics+0x198/0x2e0
[   21.181591]  kunit_try_run_case+0x170/0x3f0
[   21.181644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.181702]  kthread+0x328/0x630
[   21.181749]  ret_from_fork+0x10/0x20
[   21.181802] 
[   21.181823] Allocated by task 268:
[   21.182143]  kasan_save_stack+0x3c/0x68
[   21.182189]  kasan_save_track+0x20/0x40
[   21.182267]  kasan_save_alloc_info+0x40/0x58
[   21.182391]  __kasan_kmalloc+0xd4/0xd8
[   21.182532]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.182628]  kasan_atomics+0xb8/0x2e0
[   21.182695]  kunit_try_run_case+0x170/0x3f0
[   21.182989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.183070]  kthread+0x328/0x630
[   21.183171]  ret_from_fork+0x10/0x20
[   21.183213] 
[   21.183243] The buggy address belongs to the object at fff00000c3f85080
[   21.183243]  which belongs to the cache kmalloc-64 of size 64
[   21.183312] The buggy address is located 0 bytes to the right of
[   21.183312]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.183388] 
[   21.183412] The buggy address belongs to the physical page:
[   21.183445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.183520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.183572] page_type: f5(slab)
[   21.183614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.183681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.183724] page dumped because: kasan: bad access detected
[   21.183759] 
[   21.183780] Memory state around the buggy address:
[   21.183812]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.183858]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.183910] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.183950]                                      ^
[   21.183987]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.184031]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.184072] ==================================================================
[   21.107671] ==================================================================
[   21.107737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.107802] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.107854] 
[   21.107887] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.107977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.108010] Hardware name: linux,dummy-virt (DT)
[   21.108075] Call trace:
[   21.108116]  show_stack+0x20/0x38 (C)
[   21.108173]  dump_stack_lvl+0x8c/0xd0
[   21.108226]  print_report+0x118/0x608
[   21.108275]  kasan_report+0xdc/0x128
[   21.108321]  kasan_check_range+0x100/0x1a8
[   21.108392]  __kasan_check_write+0x20/0x30
[   21.108444]  kasan_atomics_helper+0x11f8/0x4858
[   21.108493]  kasan_atomics+0x198/0x2e0
[   21.108540]  kunit_try_run_case+0x170/0x3f0
[   21.108598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.108657]  kthread+0x328/0x630
[   21.108704]  ret_from_fork+0x10/0x20
[   21.108765] 
[   21.108794] Allocated by task 268:
[   21.108846]  kasan_save_stack+0x3c/0x68
[   21.108898]  kasan_save_track+0x20/0x40
[   21.108946]  kasan_save_alloc_info+0x40/0x58
[   21.108998]  __kasan_kmalloc+0xd4/0xd8
[   21.109038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.109084]  kasan_atomics+0xb8/0x2e0
[   21.109122]  kunit_try_run_case+0x170/0x3f0
[   21.109165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.109214]  kthread+0x328/0x630
[   21.109261]  ret_from_fork+0x10/0x20
[   21.109302] 
[   21.109324] The buggy address belongs to the object at fff00000c3f85080
[   21.109324]  which belongs to the cache kmalloc-64 of size 64
[   21.109798] The buggy address is located 0 bytes to the right of
[   21.109798]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.110103] 
[   21.110181] The buggy address belongs to the physical page:
[   21.110233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.110291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.110361] page_type: f5(slab)
[   21.110410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.110465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.110509] page dumped because: kasan: bad access detected
[   21.110546] 
[   21.110566] Memory state around the buggy address:
[   21.110763]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.110847]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.110995] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.111271]                                      ^
[   21.111367]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111459]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111565] ==================================================================
[   21.047423] ==================================================================
[   21.047479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.047752] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.047842] 
[   21.047885] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.048072] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.048127] Hardware name: linux,dummy-virt (DT)
[   21.048184] Call trace:
[   21.048210]  show_stack+0x20/0x38 (C)
[   21.048264]  dump_stack_lvl+0x8c/0xd0
[   21.048401]  print_report+0x118/0x608
[   21.048448]  kasan_report+0xdc/0x128
[   21.048497]  kasan_check_range+0x100/0x1a8
[   21.048556]  __kasan_check_write+0x20/0x30
[   21.048623]  kasan_atomics_helper+0xeb8/0x4858
[   21.048672]  kasan_atomics+0x198/0x2e0
[   21.048718]  kunit_try_run_case+0x170/0x3f0
[   21.048777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.048836]  kthread+0x328/0x630
[   21.048885]  ret_from_fork+0x10/0x20
[   21.048937] 
[   21.048959] Allocated by task 268:
[   21.048991]  kasan_save_stack+0x3c/0x68
[   21.049035]  kasan_save_track+0x20/0x40
[   21.049075]  kasan_save_alloc_info+0x40/0x58
[   21.049118]  __kasan_kmalloc+0xd4/0xd8
[   21.049155]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.049200]  kasan_atomics+0xb8/0x2e0
[   21.049238]  kunit_try_run_case+0x170/0x3f0
[   21.049281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049338]  kthread+0x328/0x630
[   21.049388]  ret_from_fork+0x10/0x20
[   21.049442] 
[   21.050037] The buggy address belongs to the object at fff00000c3f85080
[   21.050037]  which belongs to the cache kmalloc-64 of size 64
[   21.050116] The buggy address is located 0 bytes to the right of
[   21.050116]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.050431] 
[   21.050506] The buggy address belongs to the physical page:
[   21.050565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.050787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.051033] page_type: f5(slab)
[   21.051103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.051206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.051269] page dumped because: kasan: bad access detected
[   21.051384] 
[   21.051445] Memory state around the buggy address:
[   21.051508]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.051727]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.051809] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.052006]                                      ^
[   21.052063]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052129]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052371] ==================================================================
[   20.937073] ==================================================================
[   20.937134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.937204] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.937707]  show_stack+0x20/0x38 (C)
[   20.939485] The buggy address is located 0 bytes to the right of
[   20.939485]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.940247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.940515]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.942598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.942675]  kthread+0x328/0x630
[   20.942724]  ret_from_fork+0x10/0x20
[   20.943054] 
[   20.943112] Allocated by task 268:
[   20.943169]  kasan_save_stack+0x3c/0x68
[   20.943213]  kasan_save_track+0x20/0x40
[   20.943269]  kasan_save_alloc_info+0x40/0x58
[   20.943326]  __kasan_kmalloc+0xd4/0xd8
[   20.943430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.943489]  kasan_atomics+0xb8/0x2e0
[   20.943548]  kunit_try_run_case+0x170/0x3f0
[   20.943702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.943753]  kthread+0x328/0x630
[   20.943801]  ret_from_fork+0x10/0x20
[   20.943874] 
[   20.943971] The buggy address belongs to the object at fff00000c3f85080
[   20.943971]  which belongs to the cache kmalloc-64 of size 64
[   20.944058] The buggy address is located 0 bytes to the right of
[   20.944058]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.944177] 
[   20.944227] The buggy address belongs to the physical page:
[   20.944285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.944385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.944472] page_type: f5(slab)
[   20.944537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.944635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.944706] page dumped because: kasan: bad access detected
[   20.944861] 
[   20.944883] Memory state around the buggy address:
[   20.944928]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.945045]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.945190] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.945283]                                      ^
[   20.945320]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945376]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945417] ==================================================================
[   21.160035] ==================================================================
[   21.160248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.160304] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.160703] 
[   21.160811] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.160977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.161035] Hardware name: linux,dummy-virt (DT)
[   21.161081] Call trace:
[   21.161118]  show_stack+0x20/0x38 (C)
[   21.161181]  dump_stack_lvl+0x8c/0xd0
[   21.161237]  print_report+0x118/0x608
[   21.161403]  kasan_report+0xdc/0x128
[   21.161761]  kasan_check_range+0x100/0x1a8
[   21.161885]  __kasan_check_write+0x20/0x30
[   21.161961]  kasan_atomics_helper+0x154c/0x4858
[   21.162064]  kasan_atomics+0x198/0x2e0
[   21.162179]  kunit_try_run_case+0x170/0x3f0
[   21.162238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.162556]  kthread+0x328/0x630
[   21.162719]  ret_from_fork+0x10/0x20
[   21.163081] 
[   21.163153] Allocated by task 268:
[   21.163222]  kasan_save_stack+0x3c/0x68
[   21.163336]  kasan_save_track+0x20/0x40
[   21.163420]  kasan_save_alloc_info+0x40/0x58
[   21.163546]  __kasan_kmalloc+0xd4/0xd8
[   21.163615]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.163738]  kasan_atomics+0xb8/0x2e0
[   21.163808]  kunit_try_run_case+0x170/0x3f0
[   21.163918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.163983]  kthread+0x328/0x630
[   21.164023]  ret_from_fork+0x10/0x20
[   21.164089] 
[   21.164248] The buggy address belongs to the object at fff00000c3f85080
[   21.164248]  which belongs to the cache kmalloc-64 of size 64
[   21.164483] The buggy address is located 0 bytes to the right of
[   21.164483]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.164814] 
[   21.165207] The buggy address belongs to the physical page:
[   21.165271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.165372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.165597] page_type: f5(slab)
[   21.165650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.165761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.166010] page dumped because: kasan: bad access detected
[   21.166271] 
[   21.166440] Memory state around the buggy address:
[   21.166502]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.166714]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.166924] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.166987]                                      ^
[   21.167166]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.167421]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.167469] ==================================================================
[   21.080551] ==================================================================
[   21.080608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.080660] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.080712] 
[   21.080745] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.080834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.080874] Hardware name: linux,dummy-virt (DT)
[   21.080917] Call trace:
[   21.080942]  show_stack+0x20/0x38 (C)
[   21.080993]  dump_stack_lvl+0x8c/0xd0
[   21.081043]  print_report+0x118/0x608
[   21.081092]  kasan_report+0xdc/0x128
[   21.081138]  kasan_check_range+0x100/0x1a8
[   21.081194]  __kasan_check_write+0x20/0x30
[   21.081247]  kasan_atomics_helper+0x10c0/0x4858
[   21.081297]  kasan_atomics+0x198/0x2e0
[   21.081343]  kunit_try_run_case+0x170/0x3f0
[   21.081418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.081730]  kthread+0x328/0x630
[   21.081794]  ret_from_fork+0x10/0x20
[   21.081847] 
[   21.081877] Allocated by task 268:
[   21.081910]  kasan_save_stack+0x3c/0x68
[   21.081954]  kasan_save_track+0x20/0x40
[   21.081994]  kasan_save_alloc_info+0x40/0x58
[   21.082067]  __kasan_kmalloc+0xd4/0xd8
[   21.082108]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.082321]  kasan_atomics+0xb8/0x2e0
[   21.082690]  kunit_try_run_case+0x170/0x3f0
[   21.082761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.082995]  kthread+0x328/0x630
[   21.083065]  ret_from_fork+0x10/0x20
[   21.083142] 
[   21.083205] The buggy address belongs to the object at fff00000c3f85080
[   21.083205]  which belongs to the cache kmalloc-64 of size 64
[   21.083510] The buggy address is located 0 bytes to the right of
[   21.083510]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.083728] 
[   21.083789] The buggy address belongs to the physical page:
[   21.083940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.084024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.084225] page_type: f5(slab)
[   21.084282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.084368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.084471] page dumped because: kasan: bad access detected
[   21.084529] 
[   21.084549] Memory state around the buggy address:
[   21.084585]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.084783]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.084852] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.084900]                                      ^
[   21.084949]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.085058]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.085133] ==================================================================
[   21.184257] ==================================================================
[   21.184303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.184367] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.184419] 
[   21.184450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.184533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.184566] Hardware name: linux,dummy-virt (DT)
[   21.184628] Call trace:
[   21.184654]  show_stack+0x20/0x38 (C)
[   21.184707]  dump_stack_lvl+0x8c/0xd0
[   21.184757]  print_report+0x118/0x608
[   21.184980]  kasan_report+0xdc/0x128
[   21.185049]  __asan_report_load8_noabort+0x20/0x30
[   21.185104]  kasan_atomics_helper+0x3df4/0x4858
[   21.185156]  kasan_atomics+0x198/0x2e0
[   21.185202]  kunit_try_run_case+0x170/0x3f0
[   21.185276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185336]  kthread+0x328/0x630
[   21.185394]  ret_from_fork+0x10/0x20
[   21.185452] 
[   21.185508] Allocated by task 268:
[   21.185691]  kasan_save_stack+0x3c/0x68
[   21.185984]  kasan_save_track+0x20/0x40
[   21.186151]  kasan_save_alloc_info+0x40/0x58
[   21.186239]  __kasan_kmalloc+0xd4/0xd8
[   21.186439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.186507]  kasan_atomics+0xb8/0x2e0
[   21.186561]  kunit_try_run_case+0x170/0x3f0
[   21.186609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.186659]  kthread+0x328/0x630
[   21.186893]  ret_from_fork+0x10/0x20
[   21.186981] 
[   21.187041] The buggy address belongs to the object at fff00000c3f85080
[   21.187041]  which belongs to the cache kmalloc-64 of size 64
[   21.187284] The buggy address is located 0 bytes to the right of
[   21.187284]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.187428] 
[   21.187658] The buggy address belongs to the physical page:
[   21.187833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.187898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.188090] page_type: f5(slab)
[   21.188177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.188231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.188445] page dumped because: kasan: bad access detected
[   21.188596] 
[   21.188676] Memory state around the buggy address:
[   21.188744]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.188916]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.189046] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.189231]                                      ^
[   21.189295]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189525]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189674] ==================================================================
[   20.953635] ==================================================================
[   20.953710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.953786] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.953865] 
[   20.953920] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.954147] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.954252] Hardware name: linux,dummy-virt (DT)
[   20.954400] Call trace:
[   20.954481]  show_stack+0x20/0x38 (C)
[   20.954565]  dump_stack_lvl+0x8c/0xd0
[   20.954646]  print_report+0x118/0x608
[   20.954695]  kasan_report+0xdc/0x128
[   20.954743]  kasan_check_range+0x100/0x1a8
[   20.954812]  __kasan_check_write+0x20/0x30
[   20.954863]  kasan_atomics_helper+0xa6c/0x4858
[   20.955034]  kasan_atomics+0x198/0x2e0
[   20.955083]  kunit_try_run_case+0x170/0x3f0
[   20.955136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.955210]  kthread+0x328/0x630
[   20.955286]  ret_from_fork+0x10/0x20
[   20.955407] 
[   20.955447] Allocated by task 268:
[   20.955510]  kasan_save_stack+0x3c/0x68
[   20.955570]  kasan_save_track+0x20/0x40
[   20.955712]  kasan_save_alloc_info+0x40/0x58
[   20.955800]  __kasan_kmalloc+0xd4/0xd8
[   20.955973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.956051]  kasan_atomics+0xb8/0x2e0
[   20.956137]  kunit_try_run_case+0x170/0x3f0
[   20.956217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.956313]  kthread+0x328/0x630
[   20.956437]  ret_from_fork+0x10/0x20
[   20.956516] 
[   20.956538] The buggy address belongs to the object at fff00000c3f85080
[   20.956538]  which belongs to the cache kmalloc-64 of size 64
[   20.956597] The buggy address is located 0 bytes to the right of
[   20.956597]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.956897] 
[   20.956968] The buggy address belongs to the physical page:
[   20.957068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.957155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.957229] page_type: f5(slab)
[   20.957271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.957329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.957383] page dumped because: kasan: bad access detected
[   20.957416] 
[   20.957436] Memory state around the buggy address:
[   20.957509]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.957555]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.957601] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.957639]                                      ^
[   20.957958]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.958088]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.958147] ==================================================================
[   21.074771] ==================================================================
[   21.075006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.075120] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.075174] 
[   21.075225] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.075437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.075483] Hardware name: linux,dummy-virt (DT)
[   21.075518] Call trace:
[   21.075545]  show_stack+0x20/0x38 (C)
[   21.075748]  dump_stack_lvl+0x8c/0xd0
[   21.075826]  print_report+0x118/0x608
[   21.075908]  kasan_report+0xdc/0x128
[   21.076007]  kasan_check_range+0x100/0x1a8
[   21.076075]  __kasan_check_write+0x20/0x30
[   21.076127]  kasan_atomics_helper+0x1058/0x4858
[   21.076317]  kasan_atomics+0x198/0x2e0
[   21.076385]  kunit_try_run_case+0x170/0x3f0
[   21.076457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.076519]  kthread+0x328/0x630
[   21.076622]  ret_from_fork+0x10/0x20
[   21.076676] 
[   21.076717] Allocated by task 268:
[   21.076750]  kasan_save_stack+0x3c/0x68
[   21.076854]  kasan_save_track+0x20/0x40
[   21.076912]  kasan_save_alloc_info+0x40/0x58
[   21.077094]  __kasan_kmalloc+0xd4/0xd8
[   21.077153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.077224]  kasan_atomics+0xb8/0x2e0
[   21.077272]  kunit_try_run_case+0x170/0x3f0
[   21.077325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.077491]  kthread+0x328/0x630
[   21.077586]  ret_from_fork+0x10/0x20
[   21.077852] 
[   21.078126] The buggy address belongs to the object at fff00000c3f85080
[   21.078126]  which belongs to the cache kmalloc-64 of size 64
[   21.078245] The buggy address is located 0 bytes to the right of
[   21.078245]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.078335] 
[   21.078373] The buggy address belongs to the physical page:
[   21.078407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.078598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078679] page_type: f5(slab)
[   21.078730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.078783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.078885] page dumped because: kasan: bad access detected
[   21.078957] 
[   21.079055] Memory state around the buggy address:
[   21.079112]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.079188]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.079560] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.079628]                                      ^
[   21.079667]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.079732]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.079827] ==================================================================
[   21.143113] ==================================================================
[   21.143427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.143601] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.143655] 
[   21.143700] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.143790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.143822] Hardware name: linux,dummy-virt (DT)
[   21.143858] Call trace:
[   21.143885]  show_stack+0x20/0x38 (C)
[   21.143936]  dump_stack_lvl+0x8c/0xd0
[   21.143990]  print_report+0x118/0x608
[   21.144038]  kasan_report+0xdc/0x128
[   21.144101]  kasan_check_range+0x100/0x1a8
[   21.144174]  __kasan_check_write+0x20/0x30
[   21.144228]  kasan_atomics_helper+0x147c/0x4858
[   21.144280]  kasan_atomics+0x198/0x2e0
[   21.144327]  kunit_try_run_case+0x170/0x3f0
[   21.144395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.144453]  kthread+0x328/0x630
[   21.144513]  ret_from_fork+0x10/0x20
[   21.144580] 
[   21.144606] Allocated by task 268:
[   21.144639]  kasan_save_stack+0x3c/0x68
[   21.144681]  kasan_save_track+0x20/0x40
[   21.144722]  kasan_save_alloc_info+0x40/0x58
[   21.144774]  __kasan_kmalloc+0xd4/0xd8
[   21.144822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.144869]  kasan_atomics+0xb8/0x2e0
[   21.144907]  kunit_try_run_case+0x170/0x3f0
[   21.144950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.145006]  kthread+0x328/0x630
[   21.145045]  ret_from_fork+0x10/0x20
[   21.145085] 
[   21.145115] The buggy address belongs to the object at fff00000c3f85080
[   21.145115]  which belongs to the cache kmalloc-64 of size 64
[   21.145174] The buggy address is located 0 bytes to the right of
[   21.145174]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.145257] 
[   21.145281] The buggy address belongs to the physical page:
[   21.145315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.146376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.146439] page_type: f5(slab)
[   21.146490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.146657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.146942] page dumped because: kasan: bad access detected
[   21.147303] 
[   21.147370] Memory state around the buggy address:
[   21.147423]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.147470]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.147843] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.147915]                                      ^
[   21.147963]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148020]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148060] ==================================================================
[   21.134715] ==================================================================
[   21.134772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.134834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.134889] 
[   21.135114] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.135384] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.135429] Hardware name: linux,dummy-virt (DT)
[   21.135465] Call trace:
[   21.135695]  show_stack+0x20/0x38 (C)
[   21.135768]  dump_stack_lvl+0x8c/0xd0
[   21.135926]  print_report+0x118/0x608
[   21.135988]  kasan_report+0xdc/0x128
[   21.136035]  kasan_check_range+0x100/0x1a8
[   21.136088]  __kasan_check_write+0x20/0x30
[   21.136141]  kasan_atomics_helper+0x1414/0x4858
[   21.136193]  kasan_atomics+0x198/0x2e0
[   21.136241]  kunit_try_run_case+0x170/0x3f0
[   21.136293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136855]  kthread+0x328/0x630
[   21.136934]  ret_from_fork+0x10/0x20
[   21.137056] 
[   21.137097] Allocated by task 268:
[   21.137134]  kasan_save_stack+0x3c/0x68
[   21.137190]  kasan_save_track+0x20/0x40
[   21.137314]  kasan_save_alloc_info+0x40/0x58
[   21.137401]  __kasan_kmalloc+0xd4/0xd8
[   21.137445]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.137908]  kasan_atomics+0xb8/0x2e0
[   21.137985]  kunit_try_run_case+0x170/0x3f0
[   21.138061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.138385]  kthread+0x328/0x630
[   21.138441]  ret_from_fork+0x10/0x20
[   21.138678] 
[   21.139053] The buggy address belongs to the object at fff00000c3f85080
[   21.139053]  which belongs to the cache kmalloc-64 of size 64
[   21.139164] The buggy address is located 0 bytes to the right of
[   21.139164]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.139444] 
[   21.139490] The buggy address belongs to the physical page:
[   21.139526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.139900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.140320] page_type: f5(slab)
[   21.140471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.140529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.140574] page dumped because: kasan: bad access detected
[   21.140868] 
[   21.141369] Memory state around the buggy address:
[   21.141449]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.141618]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.141686] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.142016]                                      ^
[   21.142147]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.142297]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.142421] ==================================================================
[   21.112582] ==================================================================
[   21.112657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.112721] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.112833] 
[   21.112868] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.113076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.113120] Hardware name: linux,dummy-virt (DT)
[   21.113261] Call trace:
[   21.113301]  show_stack+0x20/0x38 (C)
[   21.113375]  dump_stack_lvl+0x8c/0xd0
[   21.113582]  print_report+0x118/0x608
[   21.113672]  kasan_report+0xdc/0x128
[   21.113755]  kasan_check_range+0x100/0x1a8
[   21.113854]  __kasan_check_write+0x20/0x30
[   21.113944]  kasan_atomics_helper+0x126c/0x4858
[   21.114072]  kasan_atomics+0x198/0x2e0
[   21.114151]  kunit_try_run_case+0x170/0x3f0
[   21.114258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.114345]  kthread+0x328/0x630
[   21.114429]  ret_from_fork+0x10/0x20
[   21.114629] 
[   21.114653] Allocated by task 268:
[   21.114684]  kasan_save_stack+0x3c/0x68
[   21.114755]  kasan_save_track+0x20/0x40
[   21.114854]  kasan_save_alloc_info+0x40/0x58
[   21.114954]  __kasan_kmalloc+0xd4/0xd8
[   21.115075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.115280]  kasan_atomics+0xb8/0x2e0
[   21.115336]  kunit_try_run_case+0x170/0x3f0
[   21.115437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.115530]  kthread+0x328/0x630
[   21.115600]  ret_from_fork+0x10/0x20
[   21.115668] 
[   21.115805] The buggy address belongs to the object at fff00000c3f85080
[   21.115805]  which belongs to the cache kmalloc-64 of size 64
[   21.115869] The buggy address is located 0 bytes to the right of
[   21.115869]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.116078] 
[   21.116107] The buggy address belongs to the physical page:
[   21.116141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.116232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.116364] page_type: f5(slab)
[   21.116428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.116612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.116686] page dumped because: kasan: bad access detected
[   21.116723] 
[   21.116769] Memory state around the buggy address:
[   21.116819]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.116865]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.116909] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.117124]                                      ^
[   21.117224]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.117299]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.117362] ==================================================================
[   21.168232] ==================================================================
[   21.168293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.168361] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.168415] 
[   21.168450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.168539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.168963] Hardware name: linux,dummy-virt (DT)
[   21.169097] Call trace:
[   21.169221]  show_stack+0x20/0x38 (C)
[   21.169282]  dump_stack_lvl+0x8c/0xd0
[   21.169338]  print_report+0x118/0x608
[   21.169487]  kasan_report+0xdc/0x128
[   21.169598]  kasan_check_range+0x100/0x1a8
[   21.169698]  __kasan_check_write+0x20/0x30
[   21.169752]  kasan_atomics_helper+0x15b4/0x4858
[   21.169805]  kasan_atomics+0x198/0x2e0
[   21.169851]  kunit_try_run_case+0x170/0x3f0
[   21.170150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.170578]  kthread+0x328/0x630
[   21.170664]  ret_from_fork+0x10/0x20
[   21.170827] 
[   21.170878] Allocated by task 268:
[   21.170935]  kasan_save_stack+0x3c/0x68
[   21.171068]  kasan_save_track+0x20/0x40
[   21.171139]  kasan_save_alloc_info+0x40/0x58
[   21.171202]  __kasan_kmalloc+0xd4/0xd8
[   21.171243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.171896]  kasan_atomics+0xb8/0x2e0
[   21.171998]  kunit_try_run_case+0x170/0x3f0
[   21.172053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.173608]  kthread+0x328/0x630
[   21.173670]  ret_from_fork+0x10/0x20
[   21.173713] 
[   21.173737] The buggy address belongs to the object at fff00000c3f85080
[   21.173737]  which belongs to the cache kmalloc-64 of size 64
[   21.174391] The buggy address is located 0 bytes to the right of
[   21.174391]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.174473] 
[   21.174499] The buggy address belongs to the physical page:
[   21.174534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.174592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.174646] page_type: f5(slab)
[   21.174690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.174743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.174787] page dumped because: kasan: bad access detected
[   21.174822] 
[   21.174842] Memory state around the buggy address:
[   21.174878]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.174922]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.174969] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.175014]                                      ^
[   21.175050]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.175095]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.175134] ==================================================================
[   21.061162] ==================================================================
[   21.061223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.061280] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.061365] 
[   21.061406] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.061605] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.061970] Hardware name: linux,dummy-virt (DT)
[   21.062040] Call trace:
[   21.062080]  show_stack+0x20/0x38 (C)
[   21.062144]  dump_stack_lvl+0x8c/0xd0
[   21.062221]  print_report+0x118/0x608
[   21.062270]  kasan_report+0xdc/0x128
[   21.062520]  kasan_check_range+0x100/0x1a8
[   21.062592]  __kasan_check_write+0x20/0x30
[   21.062843]  kasan_atomics_helper+0xf88/0x4858
[   21.062960]  kasan_atomics+0x198/0x2e0
[   21.063059]  kunit_try_run_case+0x170/0x3f0
[   21.063277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.063395]  kthread+0x328/0x630
[   21.063748]  ret_from_fork+0x10/0x20
[   21.064007] 
[   21.064076] Allocated by task 268:
[   21.064116]  kasan_save_stack+0x3c/0x68
[   21.064165]  kasan_save_track+0x20/0x40
[   21.064362]  kasan_save_alloc_info+0x40/0x58
[   21.064467]  __kasan_kmalloc+0xd4/0xd8
[   21.064643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.064823]  kasan_atomics+0xb8/0x2e0
[   21.064982]  kunit_try_run_case+0x170/0x3f0
[   21.065079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065193]  kthread+0x328/0x630
[   21.065238]  ret_from_fork+0x10/0x20
[   21.065435] 
[   21.065529] The buggy address belongs to the object at fff00000c3f85080
[   21.065529]  which belongs to the cache kmalloc-64 of size 64
[   21.065700] The buggy address is located 0 bytes to the right of
[   21.065700]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.066019] 
[   21.066091] The buggy address belongs to the physical page:
[   21.066146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.066214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.066277] page_type: f5(slab)
[   21.066484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.066636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.066695] page dumped because: kasan: bad access detected
[   21.066774] 
[   21.066835] Memory state around the buggy address:
[   21.067006]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.067124]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.067178] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.067219]                                      ^
[   21.067257]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067423]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067496] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   20.572968] ==================================================================
[   20.573023] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.573084] Free of addr fff00000c3f9e301 by task kunit_try_catch/244
[   20.573126] 
[   20.573159] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.573318] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.573382] Hardware name: linux,dummy-virt (DT)
[   20.573452] Call trace:
[   20.573507]  show_stack+0x20/0x38 (C)
[   20.573615]  dump_stack_lvl+0x8c/0xd0
[   20.573705]  print_report+0x118/0x608
[   20.573758]  kasan_report_invalid_free+0xc0/0xe8
[   20.573812]  check_slab_allocation+0xfc/0x108
[   20.573877]  __kasan_mempool_poison_object+0x78/0x150
[   20.573944]  mempool_free+0x28c/0x328
[   20.573997]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.574059]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.574118]  kunit_try_run_case+0x170/0x3f0
[   20.574206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574445]  kthread+0x328/0x630
[   20.574527]  ret_from_fork+0x10/0x20
[   20.574592] 
[   20.574643] Allocated by task 244:
[   20.574710]  kasan_save_stack+0x3c/0x68
[   20.574819]  kasan_save_track+0x20/0x40
[   20.574885]  kasan_save_alloc_info+0x40/0x58
[   20.574929]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.574977]  remove_element+0x130/0x1f8
[   20.575024]  mempool_alloc_preallocated+0x58/0xc0
[   20.575080]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   20.575141]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.575188]  kunit_try_run_case+0x170/0x3f0
[   20.575269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.575382]  kthread+0x328/0x630
[   20.575483]  ret_from_fork+0x10/0x20
[   20.575586] 
[   20.575608] The buggy address belongs to the object at fff00000c3f9e300
[   20.575608]  which belongs to the cache kmalloc-128 of size 128
[   20.575679] The buggy address is located 1 bytes inside of
[   20.575679]  128-byte region [fff00000c3f9e300, fff00000c3f9e380)
[   20.575740] 
[   20.575762] The buggy address belongs to the physical page:
[   20.575806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e
[   20.575871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.576014] page_type: f5(slab)
[   20.576109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.576216] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.576293] page dumped because: kasan: bad access detected
[   20.576376] 
[   20.576397] Memory state around the buggy address:
[   20.576431]  fff00000c3f9e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.576702]  fff00000c3f9e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.576779] >fff00000c3f9e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.576878]                    ^
[   20.577019]  fff00000c3f9e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.577156]  fff00000c3f9e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.577218] ==================================================================
[   20.583509] ==================================================================
[   20.583568] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.583632] Free of addr fff00000c65c4001 by task kunit_try_catch/246
[   20.583677] 
[   20.583710] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.583798] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.583829] Hardware name: linux,dummy-virt (DT)
[   20.583864] Call trace:
[   20.583888]  show_stack+0x20/0x38 (C)
[   20.583940]  dump_stack_lvl+0x8c/0xd0
[   20.583992]  print_report+0x118/0x608
[   20.584039]  kasan_report_invalid_free+0xc0/0xe8
[   20.584093]  __kasan_mempool_poison_object+0xfc/0x150
[   20.584148]  mempool_free+0x28c/0x328
[   20.584200]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.584258]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.584318]  kunit_try_run_case+0x170/0x3f0
[   20.584427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.584490]  kthread+0x328/0x630
[   20.584558]  ret_from_fork+0x10/0x20
[   20.584610] 
[   20.584652] The buggy address belongs to the physical page:
[   20.584687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4
[   20.584801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.584889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.584946] page_type: f8(unknown)
[   20.586061] >fff00000c65c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.594749] 
[   20.594844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47bf1
[   20.595209]  ffffaf0a3e9f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.620509] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.620867] Read of size 1 at addr ffff800080a37c2a by task kunit_try_catch/252
[   20.620942] 
[   20.621164] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.622733]  ret_from_fork+0x10/0x20
[   20.626362] 
[   20.626515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.626847]  ffff800080a37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.637117] 
[   20.638255] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.647627] 
[   20.648998] 
[   20.649653] 
[   20.650616] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   20.555708] ==================================================================
[   20.555764] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.555902] Free of addr fff00000c65c4000 by task kunit_try_catch/240
[   20.555961] 
[   20.556039] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.556128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.556187] Hardware name: linux,dummy-virt (DT)
[   20.556225] Call trace:
[   20.556306]  show_stack+0x20/0x38 (C)
[   20.556419]  dump_stack_lvl+0x8c/0xd0
[   20.556492]  print_report+0x118/0x608
[   20.556559]  kasan_report_invalid_free+0xc0/0xe8
[   20.556612]  __kasan_mempool_poison_object+0x14c/0x150
[   20.556664]  mempool_free+0x28c/0x328
[   20.556714]  mempool_double_free_helper+0x150/0x2e8
[   20.556854]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.556912]  kunit_try_run_case+0x170/0x3f0
[   20.556977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.557076]  kthread+0x328/0x630
[   20.557142]  ret_from_fork+0x10/0x20
[   20.557242] 
[   20.557280] The buggy address belongs to the physical page:
[   20.557331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4
[   20.557397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.557446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.557508] page_type: f8(unknown)
[   20.557604] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.557751] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.557804] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.557856] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.557908] head: 0bfffe0000000002 ffffc1ffc3197101 00000000ffffffff 00000000ffffffff
[   20.558093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.558134] page dumped because: kasan: bad access detected
[   20.558168] 
[   20.558243] Memory state around the buggy address:
[   20.558458]  fff00000c65c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.558918]  fff00000c65c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559005] >fff00000c65c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559276]                    ^
[   20.559324]  fff00000c65c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559382]  fff00000c65c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.559426] ==================================================================
[   20.544063] ==================================================================
[   20.544123] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.544184] Free of addr fff00000c3e64f00 by task kunit_try_catch/238
[   20.544226] 
[   20.544256] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.544343] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.544426] Hardware name: linux,dummy-virt (DT)
[   20.544461] Call trace:
[   20.544502]  show_stack+0x20/0x38 (C)
[   20.544589]  dump_stack_lvl+0x8c/0xd0
[   20.544666]  print_report+0x118/0x608
[   20.544769]  kasan_report_invalid_free+0xc0/0xe8
[   20.544822]  check_slab_allocation+0xd4/0x108
[   20.544954]  __kasan_mempool_poison_object+0x78/0x150
[   20.545007]  mempool_free+0x28c/0x328
[   20.545063]  mempool_double_free_helper+0x150/0x2e8
[   20.545252]  mempool_kmalloc_double_free+0xc0/0x118
[   20.545321]  kunit_try_run_case+0x170/0x3f0
[   20.545424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.545499]  kthread+0x328/0x630
[   20.545623]  ret_from_fork+0x10/0x20
[   20.545784] 
[   20.545867] Allocated by task 238:
[   20.545923]  kasan_save_stack+0x3c/0x68
[   20.546023]  kasan_save_track+0x20/0x40
[   20.546152]  kasan_save_alloc_info+0x40/0x58
[   20.546193]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.546415]  remove_element+0x130/0x1f8
[   20.546460]  mempool_alloc_preallocated+0x58/0xc0
[   20.546669]  mempool_double_free_helper+0x94/0x2e8
[   20.546767]  mempool_kmalloc_double_free+0xc0/0x118
[   20.546857]  kunit_try_run_case+0x170/0x3f0
[   20.547041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.547183]  kthread+0x328/0x630
[   20.547389]  ret_from_fork+0x10/0x20
[   20.547545] 
[   20.547657] Freed by task 238:
[   20.547863]  kasan_save_stack+0x3c/0x68
[   20.547918]  kasan_save_track+0x20/0x40
[   20.548174]  kasan_save_free_info+0x4c/0x78
[   20.548268]  __kasan_mempool_poison_object+0xc0/0x150
[   20.548445]  mempool_free+0x28c/0x328
[   20.548515]  mempool_double_free_helper+0x100/0x2e8
[   20.548609]  mempool_kmalloc_double_free+0xc0/0x118
[   20.548733]  kunit_try_run_case+0x170/0x3f0
[   20.548818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548927]  kthread+0x328/0x630
[   20.548966]  ret_from_fork+0x10/0x20
[   20.549210] 
[   20.549233] The buggy address belongs to the object at fff00000c3e64f00
[   20.549233]  which belongs to the cache kmalloc-128 of size 128
[   20.549332] The buggy address is located 0 bytes inside of
[   20.549332]  128-byte region [fff00000c3e64f00, fff00000c3e64f80)
[   20.549492] 
[   20.549521] The buggy address belongs to the physical page:
[   20.549552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64
[   20.549761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.549812] page_type: f5(slab)
[   20.549851] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.549903] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   20.549971] page dumped because: kasan: bad access detected
[   20.550040] 
[   20.550060] Memory state around the buggy address:
[   20.550092]  fff00000c3e64e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.550145]  fff00000c3e64e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.550197] >fff00000c3e64f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.550235]                    ^
[   20.550273]  fff00000c3e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.550315]  fff00000c3e65000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   20.550364] ==================================================================
[   20.565493] ==================================================================
[   20.565556] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.565629] Free of addr fff00000c65c4000 by task kunit_try_catch/242
[   20.565675] 
[   20.565708] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.565796] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.565828] Hardware name: linux,dummy-virt (DT)
[   20.565861] Call trace:
[   20.565886]  show_stack+0x20/0x38 (C)
[   20.565940]  dump_stack_lvl+0x8c/0xd0
[   20.566012]  print_report+0x118/0x608
[   20.566130]  kasan_report_invalid_free+0xc0/0xe8
[   20.566283]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.566373]  mempool_free+0x24c/0x328
[   20.566471]  mempool_double_free_helper+0x150/0x2e8
[   20.566628]  mempool_page_alloc_double_free+0xbc/0x118
[   20.566684]  kunit_try_run_case+0x170/0x3f0
[   20.566738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.567410]  kthread+0x328/0x630
[   20.568161]  ret_from_fork+0x10/0x20
[   20.568234] 
[   20.568263] The buggy address belongs to the physical page:
[   20.568307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4
[   20.568371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.568439] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.568491] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.568534] page dumped because: kasan: bad access detected
[   20.568568] 
[   20.568588] Memory state around the buggy address:
[   20.568623]  fff00000c65c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.568670]  fff00000c65c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.568715] >fff00000c65c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.568756]                    ^
[   20.568786]  fff00000c65c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.568831]  fff00000c65c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.568872] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   20.532863] ==================================================================
[   20.532927] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.533028] Read of size 1 at addr fff00000c65c0000 by task kunit_try_catch/236
[   20.533085] 
[   20.533124] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.533214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.533272] Hardware name: linux,dummy-virt (DT)
[   20.533305] Call trace:
[   20.533329]  show_stack+0x20/0x38 (C)
[   20.533397]  dump_stack_lvl+0x8c/0xd0
[   20.533447]  print_report+0x118/0x608
[   20.533494]  kasan_report+0xdc/0x128
[   20.533547]  __asan_report_load1_noabort+0x20/0x30
[   20.533599]  mempool_uaf_helper+0x314/0x340
[   20.533702]  mempool_page_alloc_uaf+0xc0/0x118
[   20.533827]  kunit_try_run_case+0x170/0x3f0
[   20.533997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.534087]  kthread+0x328/0x630
[   20.534196]  ret_from_fork+0x10/0x20
[   20.534246] 
[   20.534269] The buggy address belongs to the physical page:
[   20.534574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0
[   20.534631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.534696] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.534789] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.534880] page dumped because: kasan: bad access detected
[   20.534945] 
[   20.534964] Memory state around the buggy address:
[   20.535019]  fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.535103]  fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.535241] >fff00000c65c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.535358]                    ^
[   20.535422]  fff00000c65c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.535478]  fff00000c65c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.535829] ==================================================================
[   20.497502] ==================================================================
[   20.497585] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.497648] Read of size 1 at addr fff00000c65c0000 by task kunit_try_catch/232
[   20.497697] 
[   20.497730] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.497866] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.497964] Hardware name: linux,dummy-virt (DT)
[   20.497998] Call trace:
[   20.498070]  show_stack+0x20/0x38 (C)
[   20.498217]  dump_stack_lvl+0x8c/0xd0
[   20.498395]  print_report+0x118/0x608
[   20.498495]  kasan_report+0xdc/0x128
[   20.498641]  __asan_report_load1_noabort+0x20/0x30
[   20.498754]  mempool_uaf_helper+0x314/0x340
[   20.498807]  mempool_kmalloc_large_uaf+0xc4/0x120
[   20.499006]  kunit_try_run_case+0x170/0x3f0
[   20.499065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.499123]  kthread+0x328/0x630
[   20.499255]  ret_from_fork+0x10/0x20
[   20.499425] 
[   20.499505] The buggy address belongs to the physical page:
[   20.499625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0
[   20.499711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.499839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.499957] page_type: f8(unknown)
[   20.500103] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.500221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.500306] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.500386] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.500496] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff
[   20.500690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.500731] page dumped because: kasan: bad access detected
[   20.500778] 
[   20.500893] Memory state around the buggy address:
[   20.500984]  fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.501065]  fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.501196] >fff00000c65c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.501302]                    ^
[   20.501390]  fff00000c65c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.501469]  fff00000c65c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.501569] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   20.485264] ==================================================================
[   20.485412] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.485527] Read of size 1 at addr fff00000c3e64b00 by task kunit_try_catch/230
[   20.485634] 
[   20.485760] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.485991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.486027] Hardware name: linux,dummy-virt (DT)
[   20.486062] Call trace:
[   20.486087]  show_stack+0x20/0x38 (C)
[   20.486141]  dump_stack_lvl+0x8c/0xd0
[   20.486194]  print_report+0x118/0x608
[   20.486240]  kasan_report+0xdc/0x128
[   20.486287]  __asan_report_load1_noabort+0x20/0x30
[   20.486340]  mempool_uaf_helper+0x314/0x340
[   20.486459]  mempool_kmalloc_uaf+0xc4/0x120
[   20.486583]  kunit_try_run_case+0x170/0x3f0
[   20.486759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.486909]  kthread+0x328/0x630
[   20.486978]  ret_from_fork+0x10/0x20
[   20.487161] 
[   20.487205] Allocated by task 230:
[   20.487416]  kasan_save_stack+0x3c/0x68
[   20.487554]  kasan_save_track+0x20/0x40
[   20.487727]  kasan_save_alloc_info+0x40/0x58
[   20.487839]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.487948]  remove_element+0x130/0x1f8
[   20.488012]  mempool_alloc_preallocated+0x58/0xc0
[   20.488057]  mempool_uaf_helper+0xa4/0x340
[   20.488283]  mempool_kmalloc_uaf+0xc4/0x120
[   20.488369]  kunit_try_run_case+0x170/0x3f0
[   20.488441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488511]  kthread+0x328/0x630
[   20.488571]  ret_from_fork+0x10/0x20
[   20.488709] 
[   20.488799] Freed by task 230:
[   20.488827]  kasan_save_stack+0x3c/0x68
[   20.488865]  kasan_save_track+0x20/0x40
[   20.489072]  kasan_save_free_info+0x4c/0x78
[   20.489292]  __kasan_mempool_poison_object+0xc0/0x150
[   20.489436]  mempool_free+0x28c/0x328
[   20.489550]  mempool_uaf_helper+0x104/0x340
[   20.489638]  mempool_kmalloc_uaf+0xc4/0x120
[   20.489736]  kunit_try_run_case+0x170/0x3f0
[   20.489776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.490073]  kthread+0x328/0x630
[   20.490113]  ret_from_fork+0x10/0x20
[   20.490151] 
[   20.490171] The buggy address belongs to the object at fff00000c3e64b00
[   20.490171]  which belongs to the cache kmalloc-128 of size 128
[   20.490262] The buggy address is located 0 bytes inside of
[   20.490262]  freed 128-byte region [fff00000c3e64b00, fff00000c3e64b80)
[   20.490375] 
[   20.490412] The buggy address belongs to the physical page:
[   20.490466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64
[   20.490784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.490922] page_type: f5(slab)
[   20.491025] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.491116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.491184] page dumped because: kasan: bad access detected
[   20.491336] 
[   20.491419] Memory state around the buggy address:
[   20.491637]  fff00000c3e64a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.491684]  fff00000c3e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491728] >fff00000c3e64b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.491767]                    ^
[   20.491796]  fff00000c3e64b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491874]  fff00000c3e64c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.491973] ==================================================================
[   20.511248] ==================================================================
[   20.511317] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.511394] Read of size 1 at addr fff00000c3fa9240 by task kunit_try_catch/234
[   20.511444] 
[   20.511479] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.511582] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.511613] Hardware name: linux,dummy-virt (DT)
[   20.511647] Call trace:
[   20.511670]  show_stack+0x20/0x38 (C)
[   20.511723]  dump_stack_lvl+0x8c/0xd0
[   20.511773]  print_report+0x118/0x608
[   20.511820]  kasan_report+0xdc/0x128
[   20.511865]  __asan_report_load1_noabort+0x20/0x30
[   20.511918]  mempool_uaf_helper+0x314/0x340
[   20.511970]  mempool_slab_uaf+0xc0/0x118
[   20.512015]  kunit_try_run_case+0x170/0x3f0
[   20.512066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.512124]  kthread+0x328/0x630
[   20.512185]  ret_from_fork+0x10/0x20
[   20.512237] 
[   20.512256] Allocated by task 234:
[   20.512293]  kasan_save_stack+0x3c/0x68
[   20.512336]  kasan_save_track+0x20/0x40
[   20.512382]  kasan_save_alloc_info+0x40/0x58
[   20.512424]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.512466]  remove_element+0x16c/0x1f8
[   20.512513]  mempool_alloc_preallocated+0x58/0xc0
[   20.512557]  mempool_uaf_helper+0xa4/0x340
[   20.512596]  mempool_slab_uaf+0xc0/0x118
[   20.512634]  kunit_try_run_case+0x170/0x3f0
[   20.512673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.512720]  kthread+0x328/0x630
[   20.512755]  ret_from_fork+0x10/0x20
[   20.512792] 
[   20.512811] Freed by task 234:
[   20.512837]  kasan_save_stack+0x3c/0x68
[   20.512875]  kasan_save_track+0x20/0x40
[   20.512919]  kasan_save_free_info+0x4c/0x78
[   20.512960]  __kasan_mempool_poison_object+0xc0/0x150
[   20.513013]  mempool_free+0x28c/0x328
[   20.513050]  mempool_uaf_helper+0x104/0x340
[   20.513092]  mempool_slab_uaf+0xc0/0x118
[   20.513149]  kunit_try_run_case+0x170/0x3f0
[   20.513190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.513236]  kthread+0x328/0x630
[   20.513277]  ret_from_fork+0x10/0x20
[   20.513323] 
[   20.513343] The buggy address belongs to the object at fff00000c3fa9240
[   20.513343]  which belongs to the cache test_cache of size 123
[   20.513411] The buggy address is located 0 bytes inside of
[   20.513411]  freed 123-byte region [fff00000c3fa9240, fff00000c3fa92bb)
[   20.513473] 
[   20.513493] The buggy address belongs to the physical page:
[   20.513525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa9
[   20.513577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.513627] page_type: f5(slab)
[   20.513665] raw: 0bfffe0000000000 fff00000c3ef3780 dead000000000122 0000000000000000
[   20.513717] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.513757] page dumped because: kasan: bad access detected
[   20.513789] 
[   20.513806] Memory state around the buggy address:
[   20.513841]  fff00000c3fa9100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.513886]  fff00000c3fa9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.513931] >fff00000c3fa9200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.513969]                                            ^
[   20.514005]  fff00000c3fa9280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.514049]  fff00000c3fa9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.514088] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   20.456783] ==================================================================
[   20.456863] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.457213] Read of size 1 at addr fff00000c3fa42bb by task kunit_try_catch/228
[   20.457363] 
[   20.457455] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.457557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.457611] Hardware name: linux,dummy-virt (DT)
[   20.457819] Call trace:
[   20.457893]  show_stack+0x20/0x38 (C)
[   20.457950]  dump_stack_lvl+0x8c/0xd0
[   20.458000]  print_report+0x118/0x608
[   20.458058]  kasan_report+0xdc/0x128
[   20.458109]  __asan_report_load1_noabort+0x20/0x30
[   20.458182]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.458236]  mempool_slab_oob_right+0xc0/0x118
[   20.458286]  kunit_try_run_case+0x170/0x3f0
[   20.458372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.458720]  kthread+0x328/0x630
[   20.458866]  ret_from_fork+0x10/0x20
[   20.458947] 
[   20.459051] Allocated by task 228:
[   20.459097]  kasan_save_stack+0x3c/0x68
[   20.459167]  kasan_save_track+0x20/0x40
[   20.459207]  kasan_save_alloc_info+0x40/0x58
[   20.459247]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.459325]  remove_element+0x16c/0x1f8
[   20.459424]  mempool_alloc_preallocated+0x58/0xc0
[   20.459469]  mempool_oob_right_helper+0x98/0x2f0
[   20.459531]  mempool_slab_oob_right+0xc0/0x118
[   20.459721]  kunit_try_run_case+0x170/0x3f0
[   20.459760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.459847]  kthread+0x328/0x630
[   20.460042]  ret_from_fork+0x10/0x20
[   20.460080] 
[   20.460104] The buggy address belongs to the object at fff00000c3fa4240
[   20.460104]  which belongs to the cache test_cache of size 123
[   20.460169] The buggy address is located 0 bytes to the right of
[   20.460169]  allocated 123-byte region [fff00000c3fa4240, fff00000c3fa42bb)
[   20.460333] 
[   20.460376] The buggy address belongs to the physical page:
[   20.460409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa4
[   20.460484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.460564] page_type: f5(slab)
[   20.461004] raw: 0bfffe0000000000 fff00000c3ef3640 dead000000000122 0000000000000000
[   20.461208] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.461272] page dumped because: kasan: bad access detected
[   20.461373] 
[   20.461408] Memory state around the buggy address:
[   20.461714]  fff00000c3fa4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.461795]  fff00000c3fa4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.461841] >fff00000c3fa4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.461880]                                         ^
[   20.462112]  fff00000c3fa4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462192]  fff00000c3fa4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462231] ==================================================================
[   20.435057] ==================================================================
[   20.435133] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.435212] Read of size 1 at addr fff00000c3e64773 by task kunit_try_catch/224
[   20.435263] 
[   20.435305] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.435457] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.435503] Hardware name: linux,dummy-virt (DT)
[   20.435537] Call trace:
[   20.435564]  show_stack+0x20/0x38 (C)
[   20.435622]  dump_stack_lvl+0x8c/0xd0
[   20.435676]  print_report+0x118/0x608
[   20.435724]  kasan_report+0xdc/0x128
[   20.435770]  __asan_report_load1_noabort+0x20/0x30
[   20.435823]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.435877]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.435930]  kunit_try_run_case+0x170/0x3f0
[   20.435984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.436042]  kthread+0x328/0x630
[   20.436090]  ret_from_fork+0x10/0x20
[   20.436143] 
[   20.436162] Allocated by task 224:
[   20.436194]  kasan_save_stack+0x3c/0x68
[   20.436238]  kasan_save_track+0x20/0x40
[   20.436277]  kasan_save_alloc_info+0x40/0x58
[   20.436319]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.436375]  remove_element+0x130/0x1f8
[   20.436449]  mempool_alloc_preallocated+0x58/0xc0
[   20.436493]  mempool_oob_right_helper+0x98/0x2f0
[   20.436538]  mempool_kmalloc_oob_right+0xc4/0x120
[   20.436582]  kunit_try_run_case+0x170/0x3f0
[   20.436623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.436671]  kthread+0x328/0x630
[   20.436707]  ret_from_fork+0x10/0x20
[   20.436746] 
[   20.436767] The buggy address belongs to the object at fff00000c3e64700
[   20.436767]  which belongs to the cache kmalloc-128 of size 128
[   20.436826] The buggy address is located 0 bytes to the right of
[   20.436826]  allocated 115-byte region [fff00000c3e64700, fff00000c3e64773)
[   20.436890] 
[   20.436911] The buggy address belongs to the physical page:
[   20.436947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64
[   20.437002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.437056] page_type: f5(slab)
[   20.437100] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.437151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.437193] page dumped because: kasan: bad access detected
[   20.437225] 
[   20.437243] Memory state around the buggy address:
[   20.437277]  fff00000c3e64600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.437321]  fff00000c3e64680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.437373] >fff00000c3e64700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.437412]                                                              ^
[   20.437452]  fff00000c3e64780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.437529]  fff00000c3e64800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.437594] ==================================================================
[   20.445849] ==================================================================
[   20.445985] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   20.446181] Read of size 1 at addr fff00000c65c2001 by task kunit_try_catch/226
[   20.446232] 
[   20.446276] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.446380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.446409] Hardware name: linux,dummy-virt (DT)
[   20.446442] Call trace:
[   20.446466]  show_stack+0x20/0x38 (C)
[   20.446519]  dump_stack_lvl+0x8c/0xd0
[   20.446568]  print_report+0x118/0x608
[   20.446616]  kasan_report+0xdc/0x128
[   20.446660]  __asan_report_load1_noabort+0x20/0x30
[   20.446715]  mempool_oob_right_helper+0x2ac/0x2f0
[   20.446767]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   20.446823]  kunit_try_run_case+0x170/0x3f0
[   20.446876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.446933]  kthread+0x328/0x630
[   20.446980]  ret_from_fork+0x10/0x20
[   20.447038] 
[   20.447058] The buggy address belongs to the physical page:
[   20.447095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0
[   20.447150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.447198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.447254] page_type: f8(unknown)
[   20.447297] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.447359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.448423] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.448724] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.448823] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff
[   20.449180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.449342] page dumped because: kasan: bad access detected
[   20.449389] 
[   20.449544] Memory state around the buggy address:
[   20.449958]  fff00000c65c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.450018]  fff00000c65c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.450063] >fff00000c65c2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.450104]                    ^
[   20.450136]  fff00000c65c2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.450180]  fff00000c65c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.450217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   18.038720] ==================================================================
[   18.040270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   18.040381] Write of size 4 at addr fff00000c3f75575 by task kunit_try_catch/177
[   18.040432] 
[   18.040471] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.040556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.040584] Hardware name: linux,dummy-virt (DT)
[   18.040616] Call trace:
[   18.040640]  show_stack+0x20/0x38 (C)
[   18.040691]  dump_stack_lvl+0x8c/0xd0
[   18.040740]  print_report+0x118/0x608
[   18.040785]  kasan_report+0xdc/0x128
[   18.040828]  kasan_check_range+0x100/0x1a8
[   18.040875]  __asan_memset+0x34/0x78
[   18.040919]  kmalloc_oob_memset_4+0x150/0x300
[   18.040968]  kunit_try_run_case+0x170/0x3f0
[   18.041017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.041071]  kthread+0x328/0x630
[   18.041116]  ret_from_fork+0x10/0x20
[   18.041166] 
[   18.041185] Allocated by task 177:
[   18.041212]  kasan_save_stack+0x3c/0x68
[   18.041252]  kasan_save_track+0x20/0x40
[   18.041288]  kasan_save_alloc_info+0x40/0x58
[   18.041327]  __kasan_kmalloc+0xd4/0xd8
[   18.044885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.045740]  kmalloc_oob_memset_4+0xb0/0x300
[   18.045829]  kunit_try_run_case+0x170/0x3f0
[   18.045872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.046089]  kthread+0x328/0x630
[   18.046134]  ret_from_fork+0x10/0x20
[   18.046275] 
[   18.046297] The buggy address belongs to the object at fff00000c3f75500
[   18.046297]  which belongs to the cache kmalloc-128 of size 128
[   18.046376] The buggy address is located 117 bytes inside of
[   18.046376]  allocated 120-byte region [fff00000c3f75500, fff00000c3f75578)
[   18.046441] 
[   18.046462] The buggy address belongs to the physical page:
[   18.046495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   18.046550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.046601] page_type: f5(slab)
[   18.046644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.046693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.046731] page dumped because: kasan: bad access detected
[   18.046761] 
[   18.046779] Memory state around the buggy address:
[   18.046812]  fff00000c3f75400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.046854]  fff00000c3f75480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.046896] >fff00000c3f75500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.046932]                                                                 ^
[   18.046972]  fff00000c3f75580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047021]  fff00000c3f75600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047057] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   19.869146] ==================================================================
[   19.869235] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.869319] Read of size 1 at addr fff00000c3ef33c0 by task kunit_try_catch/218
[   19.869386] 
[   19.869428] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.869557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.869588] Hardware name: linux,dummy-virt (DT)
[   19.869622] Call trace:
[   19.869648]  show_stack+0x20/0x38 (C)
[   19.869705]  dump_stack_lvl+0x8c/0xd0
[   19.869759]  print_report+0x118/0x608
[   19.869807]  kasan_report+0xdc/0x128
[   19.869851]  __kasan_check_byte+0x54/0x70
[   19.869899]  kmem_cache_destroy+0x34/0x218
[   19.869949]  kmem_cache_double_destroy+0x174/0x300
[   19.870003]  kunit_try_run_case+0x170/0x3f0
[   19.870055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.870114]  kthread+0x328/0x630
[   19.870163]  ret_from_fork+0x10/0x20
[   19.870216] 
[   19.870236] Allocated by task 218:
[   19.870268]  kasan_save_stack+0x3c/0x68
[   19.870310]  kasan_save_track+0x20/0x40
[   19.870386]  kasan_save_alloc_info+0x40/0x58
[   19.870429]  __kasan_slab_alloc+0xa8/0xb0
[   19.870468]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.870510]  __kmem_cache_create_args+0x178/0x280
[   19.870557]  kmem_cache_double_destroy+0xc0/0x300
[   19.870601]  kunit_try_run_case+0x170/0x3f0
[   19.870640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.870688]  kthread+0x328/0x630
[   19.870726]  ret_from_fork+0x10/0x20
[   19.870765] 
[   19.870785] Freed by task 218:
[   19.870830]  kasan_save_stack+0x3c/0x68
[   19.870870]  kasan_save_track+0x20/0x40
[   19.870907]  kasan_save_free_info+0x4c/0x78
[   19.870948]  __kasan_slab_free+0x6c/0x98
[   19.870987]  kmem_cache_free+0x260/0x468
[   19.871029]  slab_kmem_cache_release+0x38/0x50
[   19.871071]  kmem_cache_release+0x1c/0x30
[   19.871114]  kobject_put+0x17c/0x420
[   19.871153]  sysfs_slab_release+0x1c/0x30
[   19.871192]  kmem_cache_destroy+0x118/0x218
[   19.871230]  kmem_cache_double_destroy+0x128/0x300
[   19.871276]  kunit_try_run_case+0x170/0x3f0
[   19.871315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.871463]  kthread+0x328/0x630
[   19.871545]  ret_from_fork+0x10/0x20
[   19.871582] 
[   19.871603] The buggy address belongs to the object at fff00000c3ef33c0
[   19.871603]  which belongs to the cache kmem_cache of size 208
[   19.871663] The buggy address is located 0 bytes inside of
[   19.871663]  freed 208-byte region [fff00000c3ef33c0, fff00000c3ef3490)
[   19.871726] 
[   19.871749] The buggy address belongs to the physical page:
[   19.871785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef3
[   19.871840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.871895] page_type: f5(slab)
[   19.871940] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.871991] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.872032] page dumped because: kasan: bad access detected
[   19.872063] 
[   19.872083] Memory state around the buggy address:
[   19.872119]  fff00000c3ef3280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.872165]  fff00000c3ef3300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.872209] >fff00000c3ef3380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.872249]                                            ^
[   19.872285]  fff00000c3ef3400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.872328]  fff00000c3ef3480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.872378] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   19.813963] ==================================================================
[   19.814100] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   19.814200] Read of size 1 at addr fff00000c3fa1000 by task kunit_try_catch/216
[   19.814255] 
[   19.814304] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.814420] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.814449] Hardware name: linux,dummy-virt (DT)
[   19.814486] Call trace:
[   19.814513]  show_stack+0x20/0x38 (C)
[   19.814571]  dump_stack_lvl+0x8c/0xd0
[   19.814627]  print_report+0x118/0x608
[   19.814674]  kasan_report+0xdc/0x128
[   19.814721]  __asan_report_load1_noabort+0x20/0x30
[   19.814773]  kmem_cache_rcu_uaf+0x388/0x468
[   19.814825]  kunit_try_run_case+0x170/0x3f0
[   19.814879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.814936]  kthread+0x328/0x630
[   19.814986]  ret_from_fork+0x10/0x20
[   19.815044] 
[   19.815063] Allocated by task 216:
[   19.815097]  kasan_save_stack+0x3c/0x68
[   19.815138]  kasan_save_track+0x20/0x40
[   19.815178]  kasan_save_alloc_info+0x40/0x58
[   19.815218]  __kasan_slab_alloc+0xa8/0xb0
[   19.815255]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.815298]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.815339]  kunit_try_run_case+0x170/0x3f0
[   19.815391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815438]  kthread+0x328/0x630
[   19.815475]  ret_from_fork+0x10/0x20
[   19.815513] 
[   19.815531] Freed by task 0:
[   19.815559]  kasan_save_stack+0x3c/0x68
[   19.815597]  kasan_save_track+0x20/0x40
[   19.815632]  kasan_save_free_info+0x4c/0x78
[   19.815672]  __kasan_slab_free+0x6c/0x98
[   19.815710]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.815750]  rcu_core+0x9f4/0x1e20
[   19.815789]  rcu_core_si+0x18/0x30
[   19.815824]  handle_softirqs+0x374/0xb28
[   19.815863]  __do_softirq+0x1c/0x28
[   19.815899] 
[   19.815921] Last potentially related work creation:
[   19.815949]  kasan_save_stack+0x3c/0x68
[   19.815988]  kasan_record_aux_stack+0xb4/0xc8
[   19.816030]  kmem_cache_free+0x120/0x468
[   19.816067]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.816109]  kunit_try_run_case+0x170/0x3f0
[   19.816150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.816197]  kthread+0x328/0x630
[   19.816234]  ret_from_fork+0x10/0x20
[   19.816271] 
[   19.816290] The buggy address belongs to the object at fff00000c3fa1000
[   19.816290]  which belongs to the cache test_cache of size 200
[   19.816358] The buggy address is located 0 bytes inside of
[   19.816358]  freed 200-byte region [fff00000c3fa1000, fff00000c3fa10c8)
[   19.816420] 
[   19.816442] The buggy address belongs to the physical page:
[   19.816477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa1
[   19.816535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.816590] page_type: f5(slab)
[   19.816635] raw: 0bfffe0000000000 fff00000c3ef3280 dead000000000122 0000000000000000
[   19.816687] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.816730] page dumped because: kasan: bad access detected
[   19.816760] 
[   19.816780] Memory state around the buggy address:
[   19.816815]  fff00000c3fa0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.816860]  fff00000c3fa0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.816904] >fff00000c3fa1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.816942]                    ^
[   19.816970]  fff00000c3fa1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.817013]  fff00000c3fa1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817052] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   19.695833] ==================================================================
[   19.696405] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   19.696641] Free of addr fff00000c3f48001 by task kunit_try_catch/214
[   19.696687] 
[   19.696803] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.696905] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.697000] Hardware name: linux,dummy-virt (DT)
[   19.697038] Call trace:
[   19.697063]  show_stack+0x20/0x38 (C)
[   19.697132]  dump_stack_lvl+0x8c/0xd0
[   19.697192]  print_report+0x118/0x608
[   19.697474]  kasan_report_invalid_free+0xc0/0xe8
[   19.697738]  check_slab_allocation+0xfc/0x108
[   19.697822]  __kasan_slab_pre_free+0x2c/0x48
[   19.697903]  kmem_cache_free+0xf0/0x468
[   19.698031]  kmem_cache_invalid_free+0x184/0x3c8
[   19.698130]  kunit_try_run_case+0x170/0x3f0
[   19.698322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.698617]  kthread+0x328/0x630
[   19.698717]  ret_from_fork+0x10/0x20
[   19.698823] 
[   19.698929] Allocated by task 214:
[   19.698976]  kasan_save_stack+0x3c/0x68
[   19.699587]  kasan_save_track+0x20/0x40
[   19.699671]  kasan_save_alloc_info+0x40/0x58
[   19.699859]  __kasan_slab_alloc+0xa8/0xb0
[   19.699952]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.700011]  kmem_cache_invalid_free+0x12c/0x3c8
[   19.700432]  kunit_try_run_case+0x170/0x3f0
[   19.700541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.700695]  kthread+0x328/0x630
[   19.700776]  ret_from_fork+0x10/0x20
[   19.700848] 
[   19.700932] The buggy address belongs to the object at fff00000c3f48000
[   19.700932]  which belongs to the cache test_cache of size 200
[   19.701001] The buggy address is located 1 bytes inside of
[   19.701001]  200-byte region [fff00000c3f48000, fff00000c3f480c8)
[   19.701415] 
[   19.701525] The buggy address belongs to the physical page:
[   19.701603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f48
[   19.701725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.701798] page_type: f5(slab)
[   19.701858] raw: 0bfffe0000000000 fff00000c586f780 dead000000000122 0000000000000000
[   19.702013] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.702373] page dumped because: kasan: bad access detected
[   19.702525] 
[   19.702575] Memory state around the buggy address:
[   19.702630]  fff00000c3f47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.703254]  fff00000c3f47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.703508] >fff00000c3f48000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.703556]                    ^
[   19.706100]  fff00000c3f48080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.706155]  fff00000c3f48100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.706217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   19.655830] ==================================================================
[   19.655909] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   19.656245] Free of addr fff00000c3f3d000 by task kunit_try_catch/212
[   19.656289] 
[   19.656426] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.656546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.656576] Hardware name: linux,dummy-virt (DT)
[   19.656843] Call trace:
[   19.656868]  show_stack+0x20/0x38 (C)
[   19.656923]  dump_stack_lvl+0x8c/0xd0
[   19.656972]  print_report+0x118/0x608
[   19.657031]  kasan_report_invalid_free+0xc0/0xe8
[   19.657081]  check_slab_allocation+0xd4/0x108
[   19.657129]  __kasan_slab_pre_free+0x2c/0x48
[   19.657178]  kmem_cache_free+0xf0/0x468
[   19.657369]  kmem_cache_double_free+0x190/0x3c8
[   19.657442]  kunit_try_run_case+0x170/0x3f0
[   19.657506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659665]  kthread+0x328/0x630
[   19.659747]  ret_from_fork+0x10/0x20
[   19.659815] 
[   19.659836] Allocated by task 212:
[   19.659869]  kasan_save_stack+0x3c/0x68
[   19.659949]  kasan_save_track+0x20/0x40
[   19.660006]  kasan_save_alloc_info+0x40/0x58
[   19.660049]  __kasan_slab_alloc+0xa8/0xb0
[   19.660085]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.660127]  kmem_cache_double_free+0x12c/0x3c8
[   19.660171]  kunit_try_run_case+0x170/0x3f0
[   19.660216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.660263]  kthread+0x328/0x630
[   19.660300]  ret_from_fork+0x10/0x20
[   19.660337] 
[   19.660365] Freed by task 212:
[   19.660393]  kasan_save_stack+0x3c/0x68
[   19.660430]  kasan_save_track+0x20/0x40
[   19.660467]  kasan_save_free_info+0x4c/0x78
[   19.662370]  __kasan_slab_free+0x6c/0x98
[   19.662429]  kmem_cache_free+0x260/0x468
[   19.662484]  kmem_cache_double_free+0x140/0x3c8
[   19.662529]  kunit_try_run_case+0x170/0x3f0
[   19.662765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.662848]  kthread+0x328/0x630
[   19.663334]  ret_from_fork+0x10/0x20
[   19.663423] 
[   19.663447] The buggy address belongs to the object at fff00000c3f3d000
[   19.663447]  which belongs to the cache test_cache of size 200
[   19.663517] The buggy address is located 0 bytes inside of
[   19.663517]  200-byte region [fff00000c3f3d000, fff00000c3f3d0c8)
[   19.663612] 
[   19.663670] The buggy address belongs to the physical page:
[   19.663737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3d
[   19.664079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.664156] page_type: f5(slab)
[   19.664251] raw: 0bfffe0000000000 fff00000c586f640 dead000000000122 0000000000000000
[   19.664324] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.664416] page dumped because: kasan: bad access detected
[   19.664479] 
[   19.664500] Memory state around the buggy address:
[   19.664741]  fff00000c3f3cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.664820]  fff00000c3f3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.664891] >fff00000c3f3d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.664993]                    ^
[   19.665052]  fff00000c3f3d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.665278]  fff00000c3f3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665321] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   19.456019] ==================================================================
[   19.456083] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   19.456151] Read of size 1 at addr fff00000c3f410c8 by task kunit_try_catch/210
[   19.456202] 
[   19.456450] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.457063] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.457405] Hardware name: linux,dummy-virt (DT)
[   19.457443] Call trace:
[   19.457894]  show_stack+0x20/0x38 (C)
[   19.458288]  dump_stack_lvl+0x8c/0xd0
[   19.458341]  print_report+0x118/0x608
[   19.458400]  kasan_report+0xdc/0x128
[   19.459335]  __asan_report_load1_noabort+0x20/0x30
[   19.460079]  kmem_cache_oob+0x344/0x430
[   19.460154]  kunit_try_run_case+0x170/0x3f0
[   19.460404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.460781]  kthread+0x328/0x630
[   19.461012]  ret_from_fork+0x10/0x20
[   19.461273] 
[   19.461306] Allocated by task 210:
[   19.461358]  kasan_save_stack+0x3c/0x68
[   19.461561]  kasan_save_track+0x20/0x40
[   19.461694]  kasan_save_alloc_info+0x40/0x58
[   19.461977]  __kasan_slab_alloc+0xa8/0xb0
[   19.462067]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.462234]  kmem_cache_oob+0x12c/0x430
[   19.462498]  kunit_try_run_case+0x170/0x3f0
[   19.462725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.462800]  kthread+0x328/0x630
[   19.462845]  ret_from_fork+0x10/0x20
[   19.463061] 
[   19.463499] The buggy address belongs to the object at fff00000c3f41000
[   19.463499]  which belongs to the cache test_cache of size 200
[   19.464034] The buggy address is located 0 bytes to the right of
[   19.464034]  allocated 200-byte region [fff00000c3f41000, fff00000c3f410c8)
[   19.464442] 
[   19.464782] The buggy address belongs to the physical page:
[   19.464976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f41
[   19.465039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.465447] page_type: f5(slab)
[   19.465901] raw: 0bfffe0000000000 fff00000c586f500 dead000000000122 0000000000000000
[   19.465954] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.466138] page dumped because: kasan: bad access detected
[   19.466512] 
[   19.466539] Memory state around the buggy address:
[   19.466799]  fff00000c3f40f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.467060]  fff00000c3f41000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.467413] >fff00000c3f41080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.467482]                                               ^
[   19.467682]  fff00000c3f41100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.467730]  fff00000c3f41180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.467769] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   19.398933] ==================================================================
[   19.399373] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   19.399447] Read of size 8 at addr fff00000c3faa940 by task kunit_try_catch/203
[   19.399730] 
[   19.399777] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.400860] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.401000] Hardware name: linux,dummy-virt (DT)
[   19.401255] Call trace:
[   19.401723]  show_stack+0x20/0x38 (C)
[   19.401812]  dump_stack_lvl+0x8c/0xd0
[   19.401864]  print_report+0x118/0x608
[   19.401909]  kasan_report+0xdc/0x128
[   19.401955]  __asan_report_load8_noabort+0x20/0x30
[   19.402005]  workqueue_uaf+0x480/0x4a8
[   19.402232]  kunit_try_run_case+0x170/0x3f0
[   19.402582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402709]  kthread+0x328/0x630
[   19.402962]  ret_from_fork+0x10/0x20
[   19.403189] 
[   19.403213] Allocated by task 203:
[   19.403278]  kasan_save_stack+0x3c/0x68
[   19.403461]  kasan_save_track+0x20/0x40
[   19.403822]  kasan_save_alloc_info+0x40/0x58
[   19.403880]  __kasan_kmalloc+0xd4/0xd8
[   19.403924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.403969]  workqueue_uaf+0x13c/0x4a8
[   19.404547]  kunit_try_run_case+0x170/0x3f0
[   19.404664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.404844]  kthread+0x328/0x630
[   19.405076]  ret_from_fork+0x10/0x20
[   19.405164] 
[   19.405512] Freed by task 24:
[   19.405550]  kasan_save_stack+0x3c/0x68
[   19.405782]  kasan_save_track+0x20/0x40
[   19.405835]  kasan_save_free_info+0x4c/0x78
[   19.405877]  __kasan_slab_free+0x6c/0x98
[   19.405913]  kfree+0x214/0x3c8
[   19.405958]  workqueue_uaf_work+0x18/0x30
[   19.405998]  process_one_work+0x530/0xf98
[   19.406036]  worker_thread+0x618/0xf38
[   19.406072]  kthread+0x328/0x630
[   19.406109]  ret_from_fork+0x10/0x20
[   19.406146] 
[   19.406286] Last potentially related work creation:
[   19.406376]  kasan_save_stack+0x3c/0x68
[   19.406715]  kasan_record_aux_stack+0xb4/0xc8
[   19.406758]  __queue_work+0x65c/0x1008
[   19.406796]  queue_work_on+0xbc/0xf8
[   19.406833]  workqueue_uaf+0x210/0x4a8
[   19.406873]  kunit_try_run_case+0x170/0x3f0
[   19.406915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.406962]  kthread+0x328/0x630
[   19.406998]  ret_from_fork+0x10/0x20
[   19.407434] 
[   19.407461] The buggy address belongs to the object at fff00000c3faa940
[   19.407461]  which belongs to the cache kmalloc-32 of size 32
[   19.408142] The buggy address is located 0 bytes inside of
[   19.408142]  freed 32-byte region [fff00000c3faa940, fff00000c3faa960)
[   19.408515] 
[   19.408544] The buggy address belongs to the physical page:
[   19.408661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103faa
[   19.408766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.409061] page_type: f5(slab)
[   19.409299] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.409825] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.409873] page dumped because: kasan: bad access detected
[   19.410012] 
[   19.410031] Memory state around the buggy address:
[   19.410065]  fff00000c3faa800: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   19.410110]  fff00000c3faa880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.410154] >fff00000c3faa900: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   19.410415]                                            ^
[   19.410835]  fff00000c3faa980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.410909]  fff00000c3faaa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.410948] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   19.370979] ==================================================================
[   19.371127] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   19.371204] Read of size 4 at addr fff00000c3faa740 by task swapper/1/0
[   19.371251] 
[   19.371291] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.371393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.371423] Hardware name: linux,dummy-virt (DT)
[   19.371456] Call trace:
[   19.371482]  show_stack+0x20/0x38 (C)
[   19.371533]  dump_stack_lvl+0x8c/0xd0
[   19.371584]  print_report+0x118/0x608
[   19.371629]  kasan_report+0xdc/0x128
[   19.371675]  __asan_report_load4_noabort+0x20/0x30
[   19.371727]  rcu_uaf_reclaim+0x64/0x70
[   19.371773]  rcu_core+0x9f4/0x1e20
[   19.371820]  rcu_core_si+0x18/0x30
[   19.371864]  handle_softirqs+0x374/0xb28
[   19.371911]  __do_softirq+0x1c/0x28
[   19.371956]  ____do_softirq+0x18/0x30
[   19.372000]  call_on_irq_stack+0x24/0x58
[   19.372047]  do_softirq_own_stack+0x24/0x38
[   19.372094]  __irq_exit_rcu+0x1fc/0x318
[   19.372140]  irq_exit_rcu+0x1c/0x80
[   19.372185]  el1_interrupt+0x38/0x58
[   19.372232]  el1h_64_irq_handler+0x18/0x28
[   19.372282]  el1h_64_irq+0x6c/0x70
[   19.374047]  arch_local_irq_enable+0x4/0x8 (P)
[   19.374621]  do_idle+0x384/0x4e8
[   19.374683]  cpu_startup_entry+0x64/0x80
[   19.374734]  secondary_start_kernel+0x288/0x340
[   19.374788]  __secondary_switched+0xc0/0xc8
[   19.374844] 
[   19.374864] Allocated by task 201:
[   19.374896]  kasan_save_stack+0x3c/0x68
[   19.374938]  kasan_save_track+0x20/0x40
[   19.374977]  kasan_save_alloc_info+0x40/0x58
[   19.375023]  __kasan_kmalloc+0xd4/0xd8
[   19.375061]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.375105]  rcu_uaf+0xb0/0x2d8
[   19.375142]  kunit_try_run_case+0x170/0x3f0
[   19.375185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.375235]  kthread+0x328/0x630
[   19.375274]  ret_from_fork+0x10/0x20
[   19.375310] 
[   19.375328] Freed by task 0:
[   19.375366]  kasan_save_stack+0x3c/0x68
[   19.375405]  kasan_save_track+0x20/0x40
[   19.375443]  kasan_save_free_info+0x4c/0x78
[   19.375484]  __kasan_slab_free+0x6c/0x98
[   19.375521]  kfree+0x214/0x3c8
[   19.375556]  rcu_uaf_reclaim+0x28/0x70
[   19.375596]  rcu_core+0x9f4/0x1e20
[   19.375630]  rcu_core_si+0x18/0x30
[   19.375665]  handle_softirqs+0x374/0xb28
[   19.375702]  __do_softirq+0x1c/0x28
[   19.375738] 
[   19.375757] Last potentially related work creation:
[   19.375783]  kasan_save_stack+0x3c/0x68
[   19.375821]  kasan_record_aux_stack+0xb4/0xc8
[   19.375863]  __call_rcu_common.constprop.0+0x70/0x8b0
[   19.375906]  call_rcu+0x18/0x30
[   19.375939]  rcu_uaf+0x14c/0x2d8
[   19.375974]  kunit_try_run_case+0x170/0x3f0
[   19.376015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.376063]  kthread+0x328/0x630
[   19.376098]  ret_from_fork+0x10/0x20
[   19.376135] 
[   19.376155] The buggy address belongs to the object at fff00000c3faa740
[   19.376155]  which belongs to the cache kmalloc-32 of size 32
[   19.376213] The buggy address is located 0 bytes inside of
[   19.376213]  freed 32-byte region [fff00000c3faa740, fff00000c3faa760)
[   19.376273] 
[   19.376295] The buggy address belongs to the physical page:
[   19.376329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103faa
[   19.378632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.378691] page_type: f5(slab)
[   19.378735] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.378787] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.378829] page dumped because: kasan: bad access detected
[   19.378862] 
[   19.378880] Memory state around the buggy address:
[   19.378916]  fff00000c3faa600: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   19.378961]  fff00000c3faa680: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.379005] >fff00000c3faa700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.379051]                                            ^
[   19.379087]  fff00000c3faa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379129]  fff00000c3faa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   19.230386] ==================================================================
[   19.230466] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.230522] Read of size 1 at addr fff00000c3f75900 by task kunit_try_catch/199
[   19.230598] 
[   19.230630] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.230715] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.230762] Hardware name: linux,dummy-virt (DT)
[   19.230794] Call trace:
[   19.230816]  show_stack+0x20/0x38 (C)
[   19.230862]  dump_stack_lvl+0x8c/0xd0
[   19.230921]  print_report+0x118/0x608
[   19.230967]  kasan_report+0xdc/0x128
[   19.231029]  __asan_report_load1_noabort+0x20/0x30
[   19.231085]  ksize_uaf+0x598/0x5f8
[   19.231198]  kunit_try_run_case+0x170/0x3f0
[   19.231253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.231314]  kthread+0x328/0x630
[   19.231378]  ret_from_fork+0x10/0x20
[   19.231455] 
[   19.231523] Allocated by task 199:
[   19.231560]  kasan_save_stack+0x3c/0x68
[   19.231618]  kasan_save_track+0x20/0x40
[   19.231655]  kasan_save_alloc_info+0x40/0x58
[   19.231696]  __kasan_kmalloc+0xd4/0xd8
[   19.231733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.231774]  ksize_uaf+0xb8/0x5f8
[   19.231821]  kunit_try_run_case+0x170/0x3f0
[   19.231860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.231931]  kthread+0x328/0x630
[   19.231978]  ret_from_fork+0x10/0x20
[   19.232097] 
[   19.232156] Freed by task 199:
[   19.232191]  kasan_save_stack+0x3c/0x68
[   19.232299]  kasan_save_track+0x20/0x40
[   19.232394]  kasan_save_free_info+0x4c/0x78
[   19.232442]  __kasan_slab_free+0x6c/0x98
[   19.232498]  kfree+0x214/0x3c8
[   19.232534]  ksize_uaf+0x11c/0x5f8
[   19.232570]  kunit_try_run_case+0x170/0x3f0
[   19.232792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.232895]  kthread+0x328/0x630
[   19.232931]  ret_from_fork+0x10/0x20
[   19.232997] 
[   19.233037] The buggy address belongs to the object at fff00000c3f75900
[   19.233037]  which belongs to the cache kmalloc-128 of size 128
[   19.233116] The buggy address is located 0 bytes inside of
[   19.233116]  freed 128-byte region [fff00000c3f75900, fff00000c3f75980)
[   19.233234] 
[   19.233289] The buggy address belongs to the physical page:
[   19.233399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.233557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.233607] page_type: f5(slab)
[   19.233659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.233986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.234153] page dumped because: kasan: bad access detected
[   19.234263] 
[   19.234466] Memory state around the buggy address:
[   19.234501]  fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.234792]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.234984] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.235121]                    ^
[   19.235214]  fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.235274]  fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.235312] ==================================================================
[   19.236052] ==================================================================
[   19.236214] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.236323] Read of size 1 at addr fff00000c3f75978 by task kunit_try_catch/199
[   19.236421] 
[   19.236470] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.236555] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.236623] Hardware name: linux,dummy-virt (DT)
[   19.236654] Call trace:
[   19.236676]  show_stack+0x20/0x38 (C)
[   19.236833]  dump_stack_lvl+0x8c/0xd0
[   19.236992]  print_report+0x118/0x608
[   19.237041]  kasan_report+0xdc/0x128
[   19.237106]  __asan_report_load1_noabort+0x20/0x30
[   19.237159]  ksize_uaf+0x544/0x5f8
[   19.237206]  kunit_try_run_case+0x170/0x3f0
[   19.237262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237384]  kthread+0x328/0x630
[   19.237451]  ret_from_fork+0x10/0x20
[   19.237499] 
[   19.237519] Allocated by task 199:
[   19.237782]  kasan_save_stack+0x3c/0x68
[   19.237832]  kasan_save_track+0x20/0x40
[   19.237917]  kasan_save_alloc_info+0x40/0x58
[   19.238044]  __kasan_kmalloc+0xd4/0xd8
[   19.238160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.238272]  ksize_uaf+0xb8/0x5f8
[   19.238374]  kunit_try_run_case+0x170/0x3f0
[   19.238415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.238565]  kthread+0x328/0x630
[   19.238602]  ret_from_fork+0x10/0x20
[   19.238816] 
[   19.238898] Freed by task 199:
[   19.238959]  kasan_save_stack+0x3c/0x68
[   19.239003]  kasan_save_track+0x20/0x40
[   19.239045]  kasan_save_free_info+0x4c/0x78
[   19.239095]  __kasan_slab_free+0x6c/0x98
[   19.239132]  kfree+0x214/0x3c8
[   19.239170]  ksize_uaf+0x11c/0x5f8
[   19.239207]  kunit_try_run_case+0x170/0x3f0
[   19.239257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.239304]  kthread+0x328/0x630
[   19.239340]  ret_from_fork+0x10/0x20
[   19.239386] 
[   19.239405] The buggy address belongs to the object at fff00000c3f75900
[   19.239405]  which belongs to the cache kmalloc-128 of size 128
[   19.239463] The buggy address is located 120 bytes inside of
[   19.239463]  freed 128-byte region [fff00000c3f75900, fff00000c3f75980)
[   19.239524] 
[   19.239543] The buggy address belongs to the physical page:
[   19.239571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.239748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.239798] page_type: f5(slab)
[   19.239836] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.239887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.239927] page dumped because: kasan: bad access detected
[   19.239958] 
[   19.239977] Memory state around the buggy address:
[   19.240009]  fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.240126]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240293] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.240489]                                                                 ^
[   19.240576]  fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240687]  fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240728] ==================================================================
[   19.224771] ==================================================================
[   19.224913] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.224982] Read of size 1 at addr fff00000c3f75900 by task kunit_try_catch/199
[   19.225039] 
[   19.225087] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.225195] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.225263] Hardware name: linux,dummy-virt (DT)
[   19.225311] Call trace:
[   19.225362]  show_stack+0x20/0x38 (C)
[   19.225420]  dump_stack_lvl+0x8c/0xd0
[   19.225497]  print_report+0x118/0x608
[   19.225546]  kasan_report+0xdc/0x128
[   19.225591]  __kasan_check_byte+0x54/0x70
[   19.225748]  ksize+0x30/0x88
[   19.225830]  ksize_uaf+0x168/0x5f8
[   19.225947]  kunit_try_run_case+0x170/0x3f0
[   19.226090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226217]  kthread+0x328/0x630
[   19.226333]  ret_from_fork+0x10/0x20
[   19.226407] 
[   19.226426] Allocated by task 199:
[   19.226455]  kasan_save_stack+0x3c/0x68
[   19.226515]  kasan_save_track+0x20/0x40
[   19.226553]  kasan_save_alloc_info+0x40/0x58
[   19.226593]  __kasan_kmalloc+0xd4/0xd8
[   19.226630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.226674]  ksize_uaf+0xb8/0x5f8
[   19.226711]  kunit_try_run_case+0x170/0x3f0
[   19.226752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226951]  kthread+0x328/0x630
[   19.227084]  ret_from_fork+0x10/0x20
[   19.227164] 
[   19.227198] Freed by task 199:
[   19.227225]  kasan_save_stack+0x3c/0x68
[   19.227263]  kasan_save_track+0x20/0x40
[   19.227299]  kasan_save_free_info+0x4c/0x78
[   19.227339]  __kasan_slab_free+0x6c/0x98
[   19.227527]  kfree+0x214/0x3c8
[   19.227610]  ksize_uaf+0x11c/0x5f8
[   19.227735]  kunit_try_run_case+0x170/0x3f0
[   19.227848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.228003]  kthread+0x328/0x630
[   19.228052]  ret_from_fork+0x10/0x20
[   19.228087] 
[   19.228150] The buggy address belongs to the object at fff00000c3f75900
[   19.228150]  which belongs to the cache kmalloc-128 of size 128
[   19.228231] The buggy address is located 0 bytes inside of
[   19.228231]  freed 128-byte region [fff00000c3f75900, fff00000c3f75980)
[   19.228301] 
[   19.228331] The buggy address belongs to the physical page:
[   19.228383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.228450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.228505] page_type: f5(slab)
[   19.228559] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.228611] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.228653] page dumped because: kasan: bad access detected
[   19.228685] 
[   19.228704] Memory state around the buggy address:
[   19.228761]  fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.228814]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.228867] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.228905]                    ^
[   19.228932]  fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.228986]  fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.229039] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   19.191539] ==================================================================
[   19.191709] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   19.191774] Free of addr fff00000c5915980 by task kunit_try_catch/195
[   19.191819] 
[   19.191852] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.191985] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.192016] Hardware name: linux,dummy-virt (DT)
[   19.192048] Call trace:
[   19.192082]  show_stack+0x20/0x38 (C)
[   19.192133]  dump_stack_lvl+0x8c/0xd0
[   19.192183]  print_report+0x118/0x608
[   19.192230]  kasan_report_invalid_free+0xc0/0xe8
[   19.192280]  check_slab_allocation+0xd4/0x108
[   19.192329]  __kasan_slab_pre_free+0x2c/0x48
[   19.192643]  kfree+0xe8/0x3c8
[   19.192713]  kfree_sensitive+0x3c/0xb0
[   19.192770]  kmalloc_double_kzfree+0x168/0x308
[   19.192853]  kunit_try_run_case+0x170/0x3f0
[   19.192971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.193030]  kthread+0x328/0x630
[   19.193093]  ret_from_fork+0x10/0x20
[   19.193367] 
[   19.193411] Allocated by task 195:
[   19.193490]  kasan_save_stack+0x3c/0x68
[   19.193558]  kasan_save_track+0x20/0x40
[   19.193692]  kasan_save_alloc_info+0x40/0x58
[   19.193770]  __kasan_kmalloc+0xd4/0xd8
[   19.193968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.194024]  kmalloc_double_kzfree+0xb8/0x308
[   19.194067]  kunit_try_run_case+0x170/0x3f0
[   19.194235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.194321]  kthread+0x328/0x630
[   19.194449]  ret_from_fork+0x10/0x20
[   19.194537] 
[   19.194559] Freed by task 195:
[   19.194586]  kasan_save_stack+0x3c/0x68
[   19.194858]  kasan_save_track+0x20/0x40
[   19.194931]  kasan_save_free_info+0x4c/0x78
[   19.195049]  __kasan_slab_free+0x6c/0x98
[   19.195116]  kfree+0x214/0x3c8
[   19.195172]  kfree_sensitive+0x80/0xb0
[   19.195425]  kmalloc_double_kzfree+0x11c/0x308
[   19.195554]  kunit_try_run_case+0x170/0x3f0
[   19.195715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.195870]  kthread+0x328/0x630
[   19.195940]  ret_from_fork+0x10/0x20
[   19.196026] 
[   19.196056] The buggy address belongs to the object at fff00000c5915980
[   19.196056]  which belongs to the cache kmalloc-16 of size 16
[   19.196173] The buggy address is located 0 bytes inside of
[   19.196173]  16-byte region [fff00000c5915980, fff00000c5915990)
[   19.196268] 
[   19.196372] The buggy address belongs to the physical page:
[   19.196411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   19.196483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.196690] page_type: f5(slab)
[   19.196755] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.196823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.196923] page dumped because: kasan: bad access detected
[   19.196972] 
[   19.197023] Memory state around the buggy address:
[   19.197094]  fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   19.197213]  fff00000c5915900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.197258] >fff00000c5915980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197324]                    ^
[   19.197542]  fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197608]  fff00000c5915a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   19.181013] ==================================================================
[   19.181076] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   19.181178] Read of size 1 at addr fff00000c5915980 by task kunit_try_catch/195
[   19.181247] 
[   19.181283] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.181739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.181873] Hardware name: linux,dummy-virt (DT)
[   19.182030] Call trace:
[   19.182080]  show_stack+0x20/0x38 (C)
[   19.182216]  dump_stack_lvl+0x8c/0xd0
[   19.182291]  print_report+0x118/0x608
[   19.182336]  kasan_report+0xdc/0x128
[   19.182508]  __kasan_check_byte+0x54/0x70
[   19.182559]  kfree_sensitive+0x30/0xb0
[   19.182746]  kmalloc_double_kzfree+0x168/0x308
[   19.182854]  kunit_try_run_case+0x170/0x3f0
[   19.182963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.183053]  kthread+0x328/0x630
[   19.183101]  ret_from_fork+0x10/0x20
[   19.183426] 
[   19.183465] Allocated by task 195:
[   19.183531]  kasan_save_stack+0x3c/0x68
[   19.183655]  kasan_save_track+0x20/0x40
[   19.183722]  kasan_save_alloc_info+0x40/0x58
[   19.183782]  __kasan_kmalloc+0xd4/0xd8
[   19.183826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.184081]  kmalloc_double_kzfree+0xb8/0x308
[   19.184150]  kunit_try_run_case+0x170/0x3f0
[   19.184311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.184509]  kthread+0x328/0x630
[   19.184636]  ret_from_fork+0x10/0x20
[   19.184744] 
[   19.184805] Freed by task 195:
[   19.184913]  kasan_save_stack+0x3c/0x68
[   19.185053]  kasan_save_track+0x20/0x40
[   19.185440]  kasan_save_free_info+0x4c/0x78
[   19.185573]  __kasan_slab_free+0x6c/0x98
[   19.185688]  kfree+0x214/0x3c8
[   19.185785]  kfree_sensitive+0x80/0xb0
[   19.185938]  kmalloc_double_kzfree+0x11c/0x308
[   19.186150]  kunit_try_run_case+0x170/0x3f0
[   19.186239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.186407]  kthread+0x328/0x630
[   19.186477]  ret_from_fork+0x10/0x20
[   19.186599] 
[   19.186624] The buggy address belongs to the object at fff00000c5915980
[   19.186624]  which belongs to the cache kmalloc-16 of size 16
[   19.186692] The buggy address is located 0 bytes inside of
[   19.186692]  freed 16-byte region [fff00000c5915980, fff00000c5915990)
[   19.186969] 
[   19.187036] The buggy address belongs to the physical page:
[   19.187103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   19.187234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.187335] page_type: f5(slab)
[   19.187443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.187505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.187691] page dumped because: kasan: bad access detected
[   19.187812] 
[   19.187857] Memory state around the buggy address:
[   19.187923]  fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   19.188023]  fff00000c5915900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.188082] >fff00000c5915980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.188256]                    ^
[   19.188378]  fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.188448]  fff00000c5915a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.188550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   19.158560] ==================================================================
[   19.158617] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   19.158673] Read of size 1 at addr fff00000c3fb2d28 by task kunit_try_catch/191
[   19.158724] 
[   19.158756] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.158841] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.159185] Hardware name: linux,dummy-virt (DT)
[   19.159374] Call trace:
[   19.159580]  show_stack+0x20/0x38 (C)
[   19.161659]  dump_stack_lvl+0x8c/0xd0
[   19.161777]  print_report+0x118/0x608
[   19.162017]  kasan_report+0xdc/0x128
[   19.162331]  __asan_report_load1_noabort+0x20/0x30
[   19.162637]  kmalloc_uaf2+0x3f4/0x468
[   19.164224]  kunit_try_run_case+0x170/0x3f0
[   19.164323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.164519]  kthread+0x328/0x630
[   19.164616]  ret_from_fork+0x10/0x20
[   19.164675] 
[   19.165030] Allocated by task 191:
[   19.165089]  kasan_save_stack+0x3c/0x68
[   19.165148]  kasan_save_track+0x20/0x40
[   19.165233]  kasan_save_alloc_info+0x40/0x58
[   19.165345]  __kasan_kmalloc+0xd4/0xd8
[   19.165434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.165605]  kmalloc_uaf2+0xc4/0x468
[   19.165661]  kunit_try_run_case+0x170/0x3f0
[   19.165977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.166060]  kthread+0x328/0x630
[   19.166186]  ret_from_fork+0x10/0x20
[   19.166253] 
[   19.166310] Freed by task 191:
[   19.166422]  kasan_save_stack+0x3c/0x68
[   19.166501]  kasan_save_track+0x20/0x40
[   19.166634]  kasan_save_free_info+0x4c/0x78
[   19.166724]  __kasan_slab_free+0x6c/0x98
[   19.166788]  kfree+0x214/0x3c8
[   19.167100]  kmalloc_uaf2+0x134/0x468
[   19.167175]  kunit_try_run_case+0x170/0x3f0
[   19.167326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.167403]  kthread+0x328/0x630
[   19.167562]  ret_from_fork+0x10/0x20
[   19.167609] 
[   19.167647] The buggy address belongs to the object at fff00000c3fb2d00
[   19.167647]  which belongs to the cache kmalloc-64 of size 64
[   19.167760] The buggy address is located 40 bytes inside of
[   19.167760]  freed 64-byte region [fff00000c3fb2d00, fff00000c3fb2d40)
[   19.167824] 
[   19.167844] The buggy address belongs to the physical page:
[   19.167887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb2
[   19.167963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.168029] page_type: f5(slab)
[   19.168070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.168135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.168190] page dumped because: kasan: bad access detected
[   19.168221] 
[   19.168238] Memory state around the buggy address:
[   19.168288]  fff00000c3fb2c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.168331]  fff00000c3fb2c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.168401] >fff00000c3fb2d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.168449]                                   ^
[   19.168481]  fff00000c3fb2d80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   19.168525]  fff00000c3fb2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.168575] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   19.147536] ==================================================================
[   19.147664] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   19.147757] Write of size 33 at addr fff00000c3fb2b80 by task kunit_try_catch/189
[   19.147910] 
[   19.147949] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.148038] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.148202] Hardware name: linux,dummy-virt (DT)
[   19.148286] Call trace:
[   19.148312]  show_stack+0x20/0x38 (C)
[   19.148394]  dump_stack_lvl+0x8c/0xd0
[   19.148453]  print_report+0x118/0x608
[   19.148502]  kasan_report+0xdc/0x128
[   19.148556]  kasan_check_range+0x100/0x1a8
[   19.148606]  __asan_memset+0x34/0x78
[   19.148653]  kmalloc_uaf_memset+0x170/0x310
[   19.148705]  kunit_try_run_case+0x170/0x3f0
[   19.148787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.148856]  kthread+0x328/0x630
[   19.148902]  ret_from_fork+0x10/0x20
[   19.148952] 
[   19.148970] Allocated by task 189:
[   19.148999]  kasan_save_stack+0x3c/0x68
[   19.149040]  kasan_save_track+0x20/0x40
[   19.149078]  kasan_save_alloc_info+0x40/0x58
[   19.149129]  __kasan_kmalloc+0xd4/0xd8
[   19.149165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.149216]  kmalloc_uaf_memset+0xb8/0x310
[   19.149264]  kunit_try_run_case+0x170/0x3f0
[   19.149313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.149615]  kthread+0x328/0x630
[   19.149863]  ret_from_fork+0x10/0x20
[   19.149914] 
[   19.150057] Freed by task 189:
[   19.150184]  kasan_save_stack+0x3c/0x68
[   19.150229]  kasan_save_track+0x20/0x40
[   19.150276]  kasan_save_free_info+0x4c/0x78
[   19.150565]  __kasan_slab_free+0x6c/0x98
[   19.150644]  kfree+0x214/0x3c8
[   19.150707]  kmalloc_uaf_memset+0x11c/0x310
[   19.150836]  kunit_try_run_case+0x170/0x3f0
[   19.150905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.151059]  kthread+0x328/0x630
[   19.151125]  ret_from_fork+0x10/0x20
[   19.151189] 
[   19.151425] The buggy address belongs to the object at fff00000c3fb2b80
[   19.151425]  which belongs to the cache kmalloc-64 of size 64
[   19.151517] The buggy address is located 0 bytes inside of
[   19.151517]  freed 64-byte region [fff00000c3fb2b80, fff00000c3fb2bc0)
[   19.151655] 
[   19.151724] The buggy address belongs to the physical page:
[   19.151793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb2
[   19.151964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.152018] page_type: f5(slab)
[   19.152312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.152412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.152474] page dumped because: kasan: bad access detected
[   19.152603] 
[   19.152642] Memory state around the buggy address:
[   19.152711]  fff00000c3fb2a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.152811]  fff00000c3fb2b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.152864] >fff00000c3fb2b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.153141]                    ^
[   19.153211]  fff00000c3fb2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.153266]  fff00000c3fb2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.153418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   19.134850] ==================================================================
[   19.134942] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   19.135019] Read of size 1 at addr fff00000c5915968 by task kunit_try_catch/187
[   19.135070] 
[   19.135283] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.135409] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.135450] Hardware name: linux,dummy-virt (DT)
[   19.135488] Call trace:
[   19.135512]  show_stack+0x20/0x38 (C)
[   19.135566]  dump_stack_lvl+0x8c/0xd0
[   19.135613]  print_report+0x118/0x608
[   19.135659]  kasan_report+0xdc/0x128
[   19.135706]  __asan_report_load1_noabort+0x20/0x30
[   19.135758]  kmalloc_uaf+0x300/0x338
[   19.135802]  kunit_try_run_case+0x170/0x3f0
[   19.135852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.135915]  kthread+0x328/0x630
[   19.135962]  ret_from_fork+0x10/0x20
[   19.136010] 
[   19.136029] Allocated by task 187:
[   19.136056]  kasan_save_stack+0x3c/0x68
[   19.136097]  kasan_save_track+0x20/0x40
[   19.136134]  kasan_save_alloc_info+0x40/0x58
[   19.136173]  __kasan_kmalloc+0xd4/0xd8
[   19.136210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.136252]  kmalloc_uaf+0xb8/0x338
[   19.136289]  kunit_try_run_case+0x170/0x3f0
[   19.136329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.136769]  kthread+0x328/0x630
[   19.136825]  ret_from_fork+0x10/0x20
[   19.136883] 
[   19.136948] Freed by task 187:
[   19.136996]  kasan_save_stack+0x3c/0x68
[   19.137037]  kasan_save_track+0x20/0x40
[   19.137097]  kasan_save_free_info+0x4c/0x78
[   19.137266]  __kasan_slab_free+0x6c/0x98
[   19.137398]  kfree+0x214/0x3c8
[   19.137447]  kmalloc_uaf+0x11c/0x338
[   19.137574]  kunit_try_run_case+0x170/0x3f0
[   19.137629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.137674]  kthread+0x328/0x630
[   19.137735]  ret_from_fork+0x10/0x20
[   19.137990] 
[   19.138048] The buggy address belongs to the object at fff00000c5915960
[   19.138048]  which belongs to the cache kmalloc-16 of size 16
[   19.138163] The buggy address is located 8 bytes inside of
[   19.138163]  freed 16-byte region [fff00000c5915960, fff00000c5915970)
[   19.138251] 
[   19.138499] The buggy address belongs to the physical page:
[   19.138562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   19.138641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.138751] page_type: f5(slab)
[   19.138814] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.138930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.138975] page dumped because: kasan: bad access detected
[   19.139013] 
[   19.139064] Memory state around the buggy address:
[   19.139310]  fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.139426]  fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   19.139505] >fff00000c5915900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.139779]                                                           ^
[   19.139885]  fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139951]  fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.140065] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   19.116792] ==================================================================
[   19.116856] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.117131] Read of size 64 at addr fff00000c3fb2884 by task kunit_try_catch/185
[   19.117197] 
[   19.117247] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.117568] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.117599] Hardware name: linux,dummy-virt (DT)
[   19.117892] Call trace:
[   19.118715]  show_stack+0x20/0x38 (C)
[   19.119223]  dump_stack_lvl+0x8c/0xd0
[   19.119295]  print_report+0x118/0x608
[   19.119395]  kasan_report+0xdc/0x128
[   19.119620]  kasan_check_range+0x100/0x1a8
[   19.119742]  __asan_memmove+0x3c/0x98
[   19.119790]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   19.119876]  kunit_try_run_case+0x170/0x3f0
[   19.120313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.120423]  kthread+0x328/0x630
[   19.120494]  ret_from_fork+0x10/0x20
[   19.120909] 
[   19.120950] Allocated by task 185:
[   19.120980]  kasan_save_stack+0x3c/0x68
[   19.121051]  kasan_save_track+0x20/0x40
[   19.121130]  kasan_save_alloc_info+0x40/0x58
[   19.121911]  __kasan_kmalloc+0xd4/0xd8
[   19.122171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.122239]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   19.122319]  kunit_try_run_case+0x170/0x3f0
[   19.122404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.122479]  kthread+0x328/0x630
[   19.122709]  ret_from_fork+0x10/0x20
[   19.122749] 
[   19.122770] The buggy address belongs to the object at fff00000c3fb2880
[   19.122770]  which belongs to the cache kmalloc-64 of size 64
[   19.122829] The buggy address is located 4 bytes inside of
[   19.122829]  allocated 64-byte region [fff00000c3fb2880, fff00000c3fb28c0)
[   19.123306] 
[   19.123389] The buggy address belongs to the physical page:
[   19.123452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb2
[   19.123518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.123771] page_type: f5(slab)
[   19.123826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.123876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.123948] page dumped because: kasan: bad access detected
[   19.124017] 
[   19.124064] Memory state around the buggy address:
[   19.124655]  fff00000c3fb2780: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.124733]  fff00000c3fb2800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.125041] >fff00000c3fb2880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.125285]                                            ^
[   19.125486]  fff00000c3fb2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.125583]  fff00000c3fb2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.125659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   18.268860] ==================================================================
[   18.268957] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   18.269034] Read of size 18446744073709551614 at addr fff00000ffe7afc4 by task kunit_try_catch/183
[   18.269116] 
[   18.269155] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.281479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.281586] Hardware name: linux,dummy-virt (DT)
[   18.281631] Call trace:
[   18.281678]  show_stack+0x20/0x38 (C)
[   18.281740]  dump_stack_lvl+0x8c/0xd0
[   18.281791]  print_report+0x118/0x608
[   18.281837]  kasan_report+0xdc/0x128
[   18.281989]  kasan_check_range+0x100/0x1a8
[   18.285444]  __asan_memmove+0x3c/0x98
[   18.287504]  kmalloc_memmove_negative_size+0x154/0x2e0
[   18.287582]  kunit_try_run_case+0x170/0x3f0
[   18.288574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.290855]  kthread+0x328/0x630
[   18.290960]  ret_from_fork+0x10/0x20
[   18.293403] 
[   18.293447] Allocated by task 2846403498:
[   18.298216] ------------[ cut here ]------------
[   18.298291] pool index 44973 out of bounds (211) for stack id adacafae
[   18.301263] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90
[   19.010058] Modules linked in:
[   19.011688] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   19.013148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.013871] Hardware name: linux,dummy-virt (DT)
[   19.014688] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   19.015906] pc : depot_fetch_stack+0x6c/0x90
[   19.016559] lr : depot_fetch_stack+0x6c/0x90
[   19.017307] sp : ffff800080977a20
[   19.017951] x29: ffff800080977a20 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60
[   19.019065] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884
[   19.019880] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498
[   19.020857] x20: fff00000ffe7afc4 x19: ffff800080977b30 x18: 00000000fc2f539e
[   19.021864] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   19.022643] x14: 0000000000000000 x13: 0000000000000007 x12: ffff70001012eea1
[   19.023018] x11: 1ffff0001012eea0 x10: ffff70001012eea0 x9 : ffffaf0a372e4724
[   19.023436] x8 : ffff800080977507 x7 : 0000000000000001 x6 : ffff70001012eea0
[   19.023786] x5 : ffff800080977500 x4 : 1ffe000018ef9799 x3 : dfff800000000000
[   19.024142] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0
[   19.024783] Call trace:
[   19.025084]  depot_fetch_stack+0x6c/0x90 (P)
[   19.025547]  stack_depot_print+0x24/0x60
[   19.025958]  print_report+0x5e4/0x608
[   19.026344]  kasan_report+0xdc/0x128
[   19.026735]  kasan_check_range+0x100/0x1a8
[   19.027194]  __asan_memmove+0x3c/0x98
[   19.027592]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.028097]  kunit_try_run_case+0x170/0x3f0
[   19.028543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.029474]  kthread+0x328/0x630
[   19.029992]  ret_from_fork+0x10/0x20
[   19.030678] ---[ end trace 0000000000000000 ]---
[   19.031668] ------------[ cut here ]------------
[   19.031719] corrupt handle or use after stack_depot_put()
[   19.031810] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60
[   19.034074] Modules linked in:
[   19.034562] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.035612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.036227] Hardware name: linux,dummy-virt (DT)
[   19.036828] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   19.037422] pc : stack_depot_print+0x54/0x60
[   19.037641] lr : stack_depot_print+0x54/0x60
[   19.037840] sp : ffff800080977a30
[   19.037997] x29: ffff800080977a30 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60
[   19.038368] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884
[   19.039406] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498
[   19.040170] x20: fff00000ffe7afc4 x19: ffff800080977b30 x18: 00000000fc2f539e
[   19.040935] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   19.041710] x14: ffff70001012ef26 x13: 1ffe000018ef9799 x12: ffff75e147c20809
[   19.042464] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724
[   19.043216] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808
[   19.043971] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000
[   19.044724] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0
[   19.045482] Call trace:
[   19.045787]  stack_depot_print+0x54/0x60 (P)
[   19.046158]  print_report+0x5e4/0x608
[   19.046552]  kasan_report+0xdc/0x128
[   19.046863]  kasan_check_range+0x100/0x1a8
[   19.047078]  __asan_memmove+0x3c/0x98
[   19.047267]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.047854]  kunit_try_run_case+0x170/0x3f0
[   19.048320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.048895]  kthread+0x328/0x630
[   19.049277]  ret_from_fork+0x10/0x20
[   19.049707] ---[ end trace 0000000000000000 ]---
[   19.050211] 
[   19.050245] Last potentially related work creation:
[   19.050283] ------------[ cut here ]------------
[   19.050310] pool index 43945 out of bounds (211) for stack id a9a8abaa
[   19.050431] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90
[   19.052151] Modules linked in:
[   19.052343] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.053323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.053849] Hardware name: linux,dummy-virt (DT)
[   19.054329] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   19.055012] pc : depot_fetch_stack+0x6c/0x90
[   19.055489] lr : depot_fetch_stack+0x6c/0x90
[   19.055922] sp : ffff800080977a00
[   19.056083] x29: ffff800080977a00 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60
[   19.056443] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884
[   19.056791] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498
[   19.057135] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e
[   19.057759] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   19.058515] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75e147c20809
[   19.059288] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724
[   19.060042] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808
[   19.060790] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000
[   19.061670] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0
[   19.062454] Call trace:
[   19.062734]  depot_fetch_stack+0x6c/0x90 (P)
[   19.063227]  stack_depot_print+0x24/0x60
[   19.063490]  kasan_print_aux_stacks+0x50/0x98
[   19.063713]  print_report+0x348/0x608
[   19.063902]  kasan_report+0xdc/0x128
[   19.064082]  kasan_check_range+0x100/0x1a8
[   19.064280]  __asan_memmove+0x3c/0x98
[   19.064710]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.065264]  kunit_try_run_case+0x170/0x3f0
[   19.065738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.066306]  kthread+0x328/0x630
[   19.066701]  ret_from_fork+0x10/0x20
[   19.067115] ---[ end trace 0000000000000000 ]---
[   19.067621] ------------[ cut here ]------------
[   19.067649] corrupt handle or use after stack_depot_put()
[   19.067731] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60
[   19.069458] Modules linked in:
[   19.069820] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.070658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.070866] Hardware name: linux,dummy-virt (DT)
[   19.071071] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   19.071365] pc : stack_depot_print+0x54/0x60
[   19.071820] lr : stack_depot_print+0x54/0x60
[   19.072286] sp : ffff800080977a10
[   19.072635] x29: ffff800080977a10 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60
[   19.073387] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884
[   19.074156] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498
[   19.074906] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e
[   19.075671] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   19.076406] x14: ffff70001012ef22 x13: 1ffe000018ef9799 x12: ffff75e147c20809
[   19.076761] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724
[   19.077109] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808
[   19.077476] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000
[   19.077917] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0
[   19.078309] Call trace:
[   19.078499]  stack_depot_print+0x54/0x60 (P)
[   19.078766]  kasan_print_aux_stacks+0x50/0x98
[   19.079053]  print_report+0x348/0x608
[   19.079296]  kasan_report+0xdc/0x128
[   19.079536]  kasan_check_range+0x100/0x1a8
[   19.079782]  __asan_memmove+0x3c/0x98
[   19.080052]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.080382]  kunit_try_run_case+0x170/0x3f0
[   19.080669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.081023]  kthread+0x328/0x630
[   19.081235]  ret_from_fork+0x10/0x20
[   19.081521] ---[ end trace 0000000000000000 ]---
[   19.081790] 
[   19.081827] Second to last potentially related work creation:
[   19.081879] ------------[ cut here ]------------
[   19.081906] pool index 44973 out of bounds (211) for stack id adacafae
[   19.082025] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90
[   19.083329] Modules linked in:
[   19.083572] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.084123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.084463] Hardware name: linux,dummy-virt (DT)
[   19.084739] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   19.085109] pc : depot_fetch_stack+0x6c/0x90
[   19.085391] lr : depot_fetch_stack+0x6c/0x90
[   19.085649] sp : ffff800080977a00
[   19.085860] x29: ffff800080977a00 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60
[   19.086285] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884
[   19.086745] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498
[   19.087227] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e
[   19.087677] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   19.088077] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75e147c20809
[   19.088562] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724
[   19.088983] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808
[   19.089445] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000
[   19.089914] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0
[   19.090329] Call trace:
[   19.090511]  depot_fetch_stack+0x6c/0x90 (P)
[   19.090803]  stack_depot_print+0x24/0x60
[   19.091076]  kasan_print_aux_stacks+0x78/0x98
[   19.091345]  print_report+0x348/0x608
[   19.091610]  kasan_report+0xdc/0x128
[   19.091871]  kasan_check_range+0x100/0x1a8
[   19.092132]  __asan_memmove+0x3c/0x98
[   19.092375]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.092695]  kunit_try_run_case+0x170/0x3f0
[   19.092985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.093294]  kthread+0x328/0x630
[   19.093496]  ret_from_fork+0x10/0x20
[   19.093773] ---[ end trace 0000000000000000 ]---
[   19.093991] ------------[ cut here ]------------
[   19.094020] corrupt handle or use after stack_depot_put()
[   19.094097] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60
[   19.095030] Modules linked in:
[   19.095266] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.095717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.096002] Hardware name: linux,dummy-virt (DT)
[   19.096229] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   19.096650] pc : stack_depot_print+0x54/0x60
[   19.096935] lr : stack_depot_print+0x54/0x60
[   19.097185] sp : ffff800080977a10
[   19.097403] x29: ffff800080977a10 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60
[   19.097851] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884
[   19.098270] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498
[   19.098728] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e
[   19.099163] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   19.099638] x14: ffff70001012ef22 x13: 1ffe000018ef9799 x12: ffff75e147c20809
[   19.100133] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724
[   19.100622] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808
[   19.101093] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000
[   19.101572] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0
[   19.101980] Call trace:
[   19.102156]  stack_depot_print+0x54/0x60 (P)
[   19.102469]  kasan_print_aux_stacks+0x78/0x98
[   19.102744]  print_report+0x348/0x608
[   19.103016]  kasan_report+0xdc/0x128
[   19.103257]  kasan_check_range+0x100/0x1a8
[   19.103540]  __asan_memmove+0x3c/0x98
[   19.103804]  kmalloc_memmove_negative_size+0x154/0x2e0
[   19.104123]  kunit_try_run_case+0x170/0x3f0
[   19.104403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.104733]  kthread+0x328/0x630
[   19.104979]  ret_from_fork+0x10/0x20
[   19.105229] ---[ end trace 0000000000000000 ]---
[   19.105539] 
[   19.105580] The buggy address belongs to the object at fff00000ffe7a000
[   19.105580]  which belongs to the cache kmalloc-64 of size 64
[   19.105654] The buggy address is located 3972 bytes to the right of
[   19.105654]  64-byte region [fff00000ffe7a000, fff00000ffe7a040)
[   19.105730] 
[   19.105754] The buggy address belongs to the physical page:
[   19.105789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe7a
[   19.105850] memcg:fff00000d9d6f461
[   19.105881] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff)
[   19.105941] page_type: f5(slab)
[   19.105983] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ff9e88 0000000000000000
[   19.106035] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d6f461
[   19.106076] page dumped because: kasan: bad access detected
[   19.106108] 
[   19.106128] Memory state around the buggy address:
[   19.106163]  fff00000ffe7ae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.106207]  fff00000ffe7af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.106251] >fff00000ffe7af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.106289]                                            ^
[   19.106326]  fff00000ffe7b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.106380]  fff00000ffe7b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.106419] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   18.133148] ==================================================================
[   18.133227] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   18.133296] Write of size 16 at addr fff00000c3f75769 by task kunit_try_catch/181
[   18.133345] 
[   18.133842] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.139646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.140604] Hardware name: linux,dummy-virt (DT)
[   18.141566] Call trace:
[   18.146453]  show_stack+0x20/0x38 (C)
[   18.146554]  dump_stack_lvl+0x8c/0xd0
[   18.149413]  print_report+0x118/0x608
[   18.149700]  kasan_report+0xdc/0x128
[   18.149898]  kasan_check_range+0x100/0x1a8
[   18.149972]  __asan_memset+0x34/0x78
[   18.150025]  kmalloc_oob_memset_16+0x150/0x2f8
[   18.150078]  kunit_try_run_case+0x170/0x3f0
[   18.150132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.150187]  kthread+0x328/0x630
[   18.150235]  ret_from_fork+0x10/0x20
[   18.150287] 
[   18.150305] Allocated by task 181:
[   18.150334]  kasan_save_stack+0x3c/0x68
[   18.150384]  kasan_save_track+0x20/0x40
[   18.150420]  kasan_save_alloc_info+0x40/0x58
[   18.150459]  __kasan_kmalloc+0xd4/0xd8
[   18.150495]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.150538]  kmalloc_oob_memset_16+0xb0/0x2f8
[   18.150578]  kunit_try_run_case+0x170/0x3f0
[   18.150616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.150661]  kthread+0x328/0x630
[   18.150696]  ret_from_fork+0x10/0x20
[   18.150732] 
[   18.150753] The buggy address belongs to the object at fff00000c3f75700
[   18.150753]  which belongs to the cache kmalloc-128 of size 128
[   18.150809] The buggy address is located 105 bytes inside of
[   18.150809]  allocated 120-byte region [fff00000c3f75700, fff00000c3f75778)
[   18.150868] 
[   18.150889] The buggy address belongs to the physical page:
[   18.150921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   18.150976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.151033] page_type: f5(slab)
[   18.151075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.151123] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.151162] page dumped because: kasan: bad access detected
[   18.151193] 
[   18.151210] Memory state around the buggy address:
[   18.151245]  fff00000c3f75600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.151288]  fff00000c3f75680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151330] >fff00000c3f75700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.151374]                                                                 ^
[   18.151413]  fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151453]  fff00000c3f75800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151489] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   18.069430] ==================================================================
[   18.069557] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   18.069630] Write of size 8 at addr fff00000c3f75671 by task kunit_try_catch/179
[   18.069679] 
[   18.069719] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.069804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.069830] Hardware name: linux,dummy-virt (DT)
[   18.069862] Call trace:
[   18.069887]  show_stack+0x20/0x38 (C)
[   18.069938]  dump_stack_lvl+0x8c/0xd0
[   18.069987]  print_report+0x118/0x608
[   18.070033]  kasan_report+0xdc/0x128
[   18.070076]  kasan_check_range+0x100/0x1a8
[   18.070123]  __asan_memset+0x34/0x78
[   18.070167]  kmalloc_oob_memset_8+0x150/0x2f8
[   18.070216]  kunit_try_run_case+0x170/0x3f0
[   18.070266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.070320]  kthread+0x328/0x630
[   18.070378]  ret_from_fork+0x10/0x20
[   18.070429] 
[   18.070448] Allocated by task 179:
[   18.070476]  kasan_save_stack+0x3c/0x68
[   18.070516]  kasan_save_track+0x20/0x40
[   18.070554]  kasan_save_alloc_info+0x40/0x58
[   18.070594]  __kasan_kmalloc+0xd4/0xd8
[   18.070633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.070678]  kmalloc_oob_memset_8+0xb0/0x2f8
[   18.076505]  kunit_try_run_case+0x170/0x3f0
[   18.076577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.076632]  kthread+0x328/0x630
[   18.076670]  ret_from_fork+0x10/0x20
[   18.076709] 
[   18.076731] The buggy address belongs to the object at fff00000c3f75600
[   18.076731]  which belongs to the cache kmalloc-128 of size 128
[   18.076789] The buggy address is located 113 bytes inside of
[   18.076789]  allocated 120-byte region [fff00000c3f75600, fff00000c3f75678)
[   18.076850] 
[   18.076871] The buggy address belongs to the physical page:
[   18.076904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   18.077099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.077171] page_type: f5(slab)
[   18.077408] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.077647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.077897] page dumped because: kasan: bad access detected
[   18.078027] 
[   18.078046] Memory state around the buggy address:
[   18.078082]  fff00000c3f75500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.078429]  fff00000c3f75580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.078828] >fff00000c3f75600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.078872]                                                                 ^
[   18.078913]  fff00000c3f75680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.078955]  fff00000c3f75700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.078991] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   18.010531] ==================================================================
[   18.010620] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   18.010696] Write of size 2 at addr fff00000c3f75477 by task kunit_try_catch/175
[   18.010745] 
[   18.010785] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   18.010870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.010896] Hardware name: linux,dummy-virt (DT)
[   18.010928] Call trace:
[   18.010953]  show_stack+0x20/0x38 (C)
[   18.011004]  dump_stack_lvl+0x8c/0xd0
[   18.011060]  print_report+0x118/0x608
[   18.011104]  kasan_report+0xdc/0x128
[   18.011151]  kasan_check_range+0x100/0x1a8
[   18.011199]  __asan_memset+0x34/0x78
[   18.011243]  kmalloc_oob_memset_2+0x150/0x2f8
[   18.011292]  kunit_try_run_case+0x170/0x3f0
[   18.011342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.011692]  kthread+0x328/0x630
[   18.011741]  ret_from_fork+0x10/0x20
[   18.011793] 
[   18.011812] Allocated by task 175:
[   18.013893]  kasan_save_stack+0x3c/0x68
[   18.013959]  kasan_save_track+0x20/0x40
[   18.013996]  kasan_save_alloc_info+0x40/0x58
[   18.014037]  __kasan_kmalloc+0xd4/0xd8
[   18.014122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.014217]  kmalloc_oob_memset_2+0xb0/0x2f8
[   18.014286]  kunit_try_run_case+0x170/0x3f0
[   18.015100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.015190]  kthread+0x328/0x630
[   18.015264]  ret_from_fork+0x10/0x20
[   18.015389] 
[   18.015446] The buggy address belongs to the object at fff00000c3f75400
[   18.015446]  which belongs to the cache kmalloc-128 of size 128
[   18.015538] The buggy address is located 119 bytes inside of
[   18.015538]  allocated 120-byte region [fff00000c3f75400, fff00000c3f75478)
[   18.017401] 
[   18.018257] The buggy address belongs to the physical page:
[   18.018987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   18.022685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.022811] page_type: f5(slab)
[   18.023327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.023404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.024379] page dumped because: kasan: bad access detected
[   18.024434] 
[   18.024453] Memory state around the buggy address:
[   18.025866]  fff00000c3f75300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.026065]  fff00000c3f75380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.026114] >fff00000c3f75400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.026151]                                                                 ^
[   18.027461]  fff00000c3f75480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.027530]  fff00000c3f75500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.027568] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   17.909983] ==================================================================
[   17.910065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   17.910135] Write of size 128 at addr fff00000c3f75300 by task kunit_try_catch/173
[   17.910185] 
[   17.910223] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.910308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.910334] Hardware name: linux,dummy-virt (DT)
[   17.912446] Call trace:
[   17.912487]  show_stack+0x20/0x38 (C)
[   17.912550]  dump_stack_lvl+0x8c/0xd0
[   17.912601]  print_report+0x118/0x608
[   17.913645]  kasan_report+0xdc/0x128
[   17.915309]  kasan_check_range+0x100/0x1a8
[   17.915678]  __asan_memset+0x34/0x78
[   17.915735]  kmalloc_oob_in_memset+0x144/0x2d0
[   17.915787]  kunit_try_run_case+0x170/0x3f0
[   17.918762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.919533]  kthread+0x328/0x630
[   17.920153]  ret_from_fork+0x10/0x20
[   17.923644] 
[   17.925472] Allocated by task 173:
[   17.925518]  kasan_save_stack+0x3c/0x68
[   17.926369]  kasan_save_track+0x20/0x40
[   17.926430]  kasan_save_alloc_info+0x40/0x58
[   17.926471]  __kasan_kmalloc+0xd4/0xd8
[   17.926508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.926551]  kmalloc_oob_in_memset+0xb0/0x2d0
[   17.926592]  kunit_try_run_case+0x170/0x3f0
[   17.926632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926678]  kthread+0x328/0x630
[   17.926714]  ret_from_fork+0x10/0x20
[   17.928451] 
[   17.928477] The buggy address belongs to the object at fff00000c3f75300
[   17.928477]  which belongs to the cache kmalloc-128 of size 128
[   17.928539] The buggy address is located 0 bytes inside of
[   17.928539]  allocated 120-byte region [fff00000c3f75300, fff00000c3f75378)
[   17.928600] 
[   17.928621] The buggy address belongs to the physical page:
[   17.928656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   17.928713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.928765] page_type: f5(slab)
[   17.928808] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.928857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.928896] page dumped because: kasan: bad access detected
[   17.928927] 
[   17.928945] Memory state around the buggy address:
[   17.928980]  fff00000c3f75200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.929025]  fff00000c3f75280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.929068] >fff00000c3f75300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.929104]                                                                 ^
[   17.929143]  fff00000c3f75380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.929183]  fff00000c3f75400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   17.858127] ==================================================================
[   17.858218] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   17.858292] Read of size 16 at addr fff00000c5915940 by task kunit_try_catch/171
[   17.858343] 
[   17.859650] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.859740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.861466] Hardware name: linux,dummy-virt (DT)
[   17.861540] Call trace:
[   17.861565]  show_stack+0x20/0x38 (C)
[   17.862836]  dump_stack_lvl+0x8c/0xd0
[   17.862935]  print_report+0x118/0x608
[   17.862988]  kasan_report+0xdc/0x128
[   17.863042]  __asan_report_load16_noabort+0x20/0x30
[   17.863125]  kmalloc_uaf_16+0x3bc/0x438
[   17.864483]  kunit_try_run_case+0x170/0x3f0
[   17.865970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.866726]  kthread+0x328/0x630
[   17.866792]  ret_from_fork+0x10/0x20
[   17.866846] 
[   17.866865] Allocated by task 171:
[   17.866895]  kasan_save_stack+0x3c/0x68
[   17.868442]  kasan_save_track+0x20/0x40
[   17.869456]  kasan_save_alloc_info+0x40/0x58
[   17.869739]  __kasan_kmalloc+0xd4/0xd8
[   17.869782]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.869825]  kmalloc_uaf_16+0x140/0x438
[   17.869863]  kunit_try_run_case+0x170/0x3f0
[   17.869904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.869950]  kthread+0x328/0x630
[   17.869988]  ret_from_fork+0x10/0x20
[   17.870024] 
[   17.870043] Freed by task 171:
[   17.870071]  kasan_save_stack+0x3c/0x68
[   17.870107]  kasan_save_track+0x20/0x40
[   17.872434]  kasan_save_free_info+0x4c/0x78
[   17.872511]  __kasan_slab_free+0x6c/0x98
[   17.872549]  kfree+0x214/0x3c8
[   17.872585]  kmalloc_uaf_16+0x190/0x438
[   17.872623]  kunit_try_run_case+0x170/0x3f0
[   17.872677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.872865]  kthread+0x328/0x630
[   17.872902]  ret_from_fork+0x10/0x20
[   17.872939] 
[   17.872961] The buggy address belongs to the object at fff00000c5915940
[   17.872961]  which belongs to the cache kmalloc-16 of size 16
[   17.873075] The buggy address is located 0 bytes inside of
[   17.873075]  freed 16-byte region [fff00000c5915940, fff00000c5915950)
[   17.873489] 
[   17.873515] The buggy address belongs to the physical page:
[   17.873548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   17.873607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.873660] page_type: f5(slab)
[   17.873704] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.873754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.873793] page dumped because: kasan: bad access detected
[   17.873825] 
[   17.873843] Memory state around the buggy address:
[   17.873877]  fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.873919]  fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   17.873961] >fff00000c5915900: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   17.873998]                                            ^
[   17.874032]  fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.874072]  fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.874108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   17.800828] ==================================================================
[   17.800927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   17.801001] Write of size 16 at addr fff00000c59158e0 by task kunit_try_catch/169
[   17.801051] 
[   17.801091] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.801174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.801200] Hardware name: linux,dummy-virt (DT)
[   17.801232] Call trace:
[   17.801256]  show_stack+0x20/0x38 (C)
[   17.801308]  dump_stack_lvl+0x8c/0xd0
[   17.805469]  print_report+0x118/0x608
[   17.806594]  kasan_report+0xdc/0x128
[   17.807431]  __asan_report_store16_noabort+0x20/0x30
[   17.808545]  kmalloc_oob_16+0x3a0/0x3f8
[   17.811018]  kunit_try_run_case+0x170/0x3f0
[   17.811115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.811174]  kthread+0x328/0x630
[   17.811223]  ret_from_fork+0x10/0x20
[   17.811278] 
[   17.814522] Allocated by task 169:
[   17.814582]  kasan_save_stack+0x3c/0x68
[   17.814635]  kasan_save_track+0x20/0x40
[   17.814706]  kasan_save_alloc_info+0x40/0x58
[   17.814745]  __kasan_kmalloc+0xd4/0xd8
[   17.814781]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.814828]  kmalloc_oob_16+0xb4/0x3f8
[   17.815067]  kunit_try_run_case+0x170/0x3f0
[   17.815115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.815443]  kthread+0x328/0x630
[   17.815487]  ret_from_fork+0x10/0x20
[   17.815527] 
[   17.815549] The buggy address belongs to the object at fff00000c59158e0
[   17.815549]  which belongs to the cache kmalloc-16 of size 16
[   17.815607] The buggy address is located 0 bytes inside of
[   17.815607]  allocated 13-byte region [fff00000c59158e0, fff00000c59158ed)
[   17.815667] 
[   17.815688] The buggy address belongs to the physical page:
[   17.815721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   17.815777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.815830] page_type: f5(slab)
[   17.815875] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.815924] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.815963] page dumped because: kasan: bad access detected
[   17.815993] 
[   17.816011] Memory state around the buggy address:
[   17.816044]  fff00000c5915780: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   17.816086]  fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.816128] >fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   17.816164]                                                           ^
[   17.816201]  fff00000c5915900: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816241]  fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816277] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   17.731672] ==================================================================
[   17.732466] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.732570] Read of size 1 at addr fff00000c5adea00 by task kunit_try_catch/167
[   17.732623] 
[   17.733486] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.734392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.734423] Hardware name: linux,dummy-virt (DT)
[   17.734456] Call trace:
[   17.734501]  show_stack+0x20/0x38 (C)
[   17.734565]  dump_stack_lvl+0x8c/0xd0
[   17.734614]  print_report+0x118/0x608
[   17.737370]  kasan_report+0xdc/0x128
[   17.737436]  __kasan_check_byte+0x54/0x70
[   17.737507]  krealloc_noprof+0x44/0x360
[   17.737553]  krealloc_uaf+0x180/0x520
[   17.738411]  kunit_try_run_case+0x170/0x3f0
[   17.738478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.738538]  kthread+0x328/0x630
[   17.738585]  ret_from_fork+0x10/0x20
[   17.738639] 
[   17.738657] Allocated by task 167:
[   17.738687]  kasan_save_stack+0x3c/0x68
[   17.739503]  kasan_save_track+0x20/0x40
[   17.740635]  kasan_save_alloc_info+0x40/0x58
[   17.742355]  __kasan_kmalloc+0xd4/0xd8
[   17.742513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.742561]  krealloc_uaf+0xc8/0x520
[   17.742599]  kunit_try_run_case+0x170/0x3f0
[   17.742640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.744751]  kthread+0x328/0x630
[   17.744801]  ret_from_fork+0x10/0x20
[   17.744860] 
[   17.744950] Freed by task 167:
[   17.744992]  kasan_save_stack+0x3c/0x68
[   17.745264]  kasan_save_track+0x20/0x40
[   17.745652]  kasan_save_free_info+0x4c/0x78
[   17.745703]  __kasan_slab_free+0x6c/0x98
[   17.748100]  kfree+0x214/0x3c8
[   17.748238]  krealloc_uaf+0x12c/0x520
[   17.750776]  kunit_try_run_case+0x170/0x3f0
[   17.750841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.750888]  kthread+0x328/0x630
[   17.750927]  ret_from_fork+0x10/0x20
[   17.750985] 
[   17.751496] The buggy address belongs to the object at fff00000c5adea00
[   17.751496]  which belongs to the cache kmalloc-256 of size 256
[   17.754650] The buggy address is located 0 bytes inside of
[   17.754650]  freed 256-byte region [fff00000c5adea00, fff00000c5adeb00)
[   17.754987] 
[   17.755024] The buggy address belongs to the physical page:
[   17.755059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.755145] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.755197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.755255] page_type: f5(slab)
[   17.755300] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.755360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.755409] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.755456] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.755503] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.755550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.755587] page dumped because: kasan: bad access detected
[   17.755618] 
[   17.757495] Memory state around the buggy address:
[   17.758457]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.758522]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.758565] >fff00000c5adea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.758627]                    ^
[   17.758671]  fff00000c5adea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.758712]  fff00000c5adeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.758749] ==================================================================
[   17.764093] ==================================================================
[   17.764158] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.764224] Read of size 1 at addr fff00000c5adea00 by task kunit_try_catch/167
[   17.764273] 
[   17.764312] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.770692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.770732] Hardware name: linux,dummy-virt (DT)
[   17.770766] Call trace:
[   17.770791]  show_stack+0x20/0x38 (C)
[   17.770856]  dump_stack_lvl+0x8c/0xd0
[   17.770959]  print_report+0x118/0x608
[   17.771017]  kasan_report+0xdc/0x128
[   17.771062]  __asan_report_load1_noabort+0x20/0x30
[   17.771430]  krealloc_uaf+0x4c8/0x520
[   17.771491]  kunit_try_run_case+0x170/0x3f0
[   17.771543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.771599]  kthread+0x328/0x630
[   17.771647]  ret_from_fork+0x10/0x20
[   17.772720] 
[   17.772975] Allocated by task 167:
[   17.773011]  kasan_save_stack+0x3c/0x68
[   17.773072]  kasan_save_track+0x20/0x40
[   17.773116]  kasan_save_alloc_info+0x40/0x58
[   17.773155]  __kasan_kmalloc+0xd4/0xd8
[   17.773192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.773252]  krealloc_uaf+0xc8/0x520
[   17.773301]  kunit_try_run_case+0x170/0x3f0
[   17.773341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.773599]  kthread+0x328/0x630
[   17.773637]  ret_from_fork+0x10/0x20
[   17.773673] 
[   17.773692] Freed by task 167:
[   17.773719]  kasan_save_stack+0x3c/0x68
[   17.773755]  kasan_save_track+0x20/0x40
[   17.773790]  kasan_save_free_info+0x4c/0x78
[   17.773828]  __kasan_slab_free+0x6c/0x98
[   17.773864]  kfree+0x214/0x3c8
[   17.773901]  krealloc_uaf+0x12c/0x520
[   17.773939]  kunit_try_run_case+0x170/0x3f0
[   17.773977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.774157]  kthread+0x328/0x630
[   17.774193]  ret_from_fork+0x10/0x20
[   17.774229] 
[   17.774249] The buggy address belongs to the object at fff00000c5adea00
[   17.774249]  which belongs to the cache kmalloc-256 of size 256
[   17.774306] The buggy address is located 0 bytes inside of
[   17.774306]  freed 256-byte region [fff00000c5adea00, fff00000c5adeb00)
[   17.774395] 
[   17.774416] The buggy address belongs to the physical page:
[   17.774449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.774504] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.774788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.774851] page_type: f5(slab)
[   17.774896] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.774946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.774997] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.775051] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.775098] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.775145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.775182] page dumped because: kasan: bad access detected
[   17.775212] 
[   17.775231] Memory state around the buggy address:
[   17.775268]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.775311]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.775371] >fff00000c5adea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.775407]                    ^
[   17.775435]  fff00000c5adea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.775475]  fff00000c5adeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.775511] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   17.600032] ==================================================================
[   17.600083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.600139] Write of size 1 at addr fff00000c5ade8ea by task kunit_try_catch/161
[   17.600188] 
[   17.600220] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.600299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.600325] Hardware name: linux,dummy-virt (DT)
[   17.602081] Call trace:
[   17.602113]  show_stack+0x20/0x38 (C)
[   17.602168]  dump_stack_lvl+0x8c/0xd0
[   17.602523]  print_report+0x118/0x608
[   17.602574]  kasan_report+0xdc/0x128
[   17.602876]  __asan_report_store1_noabort+0x20/0x30
[   17.602933]  krealloc_less_oob_helper+0xae4/0xc50
[   17.603282]  krealloc_less_oob+0x20/0x38
[   17.603768]  kunit_try_run_case+0x170/0x3f0
[   17.603999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.604242]  kthread+0x328/0x630
[   17.604293]  ret_from_fork+0x10/0x20
[   17.604344] 
[   17.605016] Allocated by task 161:
[   17.605054]  kasan_save_stack+0x3c/0x68
[   17.605101]  kasan_save_track+0x20/0x40
[   17.605138]  kasan_save_alloc_info+0x40/0x58
[   17.605177]  __kasan_krealloc+0x118/0x178
[   17.605213]  krealloc_noprof+0x128/0x360
[   17.605249]  krealloc_less_oob_helper+0x168/0xc50
[   17.605291]  krealloc_less_oob+0x20/0x38
[   17.605331]  kunit_try_run_case+0x170/0x3f0
[   17.605382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.605428]  kthread+0x328/0x630
[   17.606214]  ret_from_fork+0x10/0x20
[   17.606744] 
[   17.606771] The buggy address belongs to the object at fff00000c5ade800
[   17.606771]  which belongs to the cache kmalloc-256 of size 256
[   17.606830] The buggy address is located 33 bytes to the right of
[   17.606830]  allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9)
[   17.607619] 
[   17.607642] The buggy address belongs to the physical page:
[   17.607675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.607731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.607777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.607831] page_type: f5(slab)
[   17.607870] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.607920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.607969] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.608016] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.608065] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.608113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.608152] page dumped because: kasan: bad access detected
[   17.608183] 
[   17.608202] Memory state around the buggy address:
[   17.608233]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.608276]  fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.608317] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.609382]                                                           ^
[   17.609425]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.609492]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.609528] ==================================================================
[   17.575613] ==================================================================
[   17.575663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.575716] Write of size 1 at addr fff00000c5ade8d0 by task kunit_try_catch/161
[   17.575764] 
[   17.575795] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.575874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.575900] Hardware name: linux,dummy-virt (DT)
[   17.575930] Call trace:
[   17.575952]  show_stack+0x20/0x38 (C)
[   17.576001]  dump_stack_lvl+0x8c/0xd0
[   17.576049]  print_report+0x118/0x608
[   17.576095]  kasan_report+0xdc/0x128
[   17.576139]  __asan_report_store1_noabort+0x20/0x30
[   17.576190]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.576241]  krealloc_less_oob+0x20/0x38
[   17.576289]  kunit_try_run_case+0x170/0x3f0
[   17.576338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.578884]  kthread+0x328/0x630
[   17.578976]  ret_from_fork+0x10/0x20
[   17.579549] 
[   17.579584] Allocated by task 161:
[   17.579615]  kasan_save_stack+0x3c/0x68
[   17.580481]  kasan_save_track+0x20/0x40
[   17.580535]  kasan_save_alloc_info+0x40/0x58
[   17.580575]  __kasan_krealloc+0x118/0x178
[   17.580612]  krealloc_noprof+0x128/0x360
[   17.580650]  krealloc_less_oob_helper+0x168/0xc50
[   17.580691]  krealloc_less_oob+0x20/0x38
[   17.580729]  kunit_try_run_case+0x170/0x3f0
[   17.580769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.580814]  kthread+0x328/0x630
[   17.580851]  ret_from_fork+0x10/0x20
[   17.580887] 
[   17.580908] The buggy address belongs to the object at fff00000c5ade800
[   17.580908]  which belongs to the cache kmalloc-256 of size 256
[   17.580964] The buggy address is located 7 bytes to the right of
[   17.580964]  allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9)
[   17.581026] 
[   17.581046] The buggy address belongs to the physical page:
[   17.581077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.581129] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.581175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.581228] page_type: f5(slab)
[   17.581269] raw: 0
[   17.581269] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.581318] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.581383] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.581431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.581486] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.581532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.581571] page dumped because: kasan: bad access detected
[   17.581601] 
[   17.581619] Memory state around the buggy address:
[   17.581649]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.581691]  fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.581732] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.581768]                                                  ^
[   17.581802]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.581842]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.581878] ==================================================================
[   17.688197] ==================================================================
[   17.688249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.688301] Write of size 1 at addr fff00000c65aa0d0 by task kunit_try_catch/165
[   17.688386] 
[   17.688417] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.688497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.688532] Hardware name: linux,dummy-virt (DT)
[   17.688571] Call trace:
[   17.688593]  show_stack+0x20/0x38 (C)
[   17.688643]  dump_stack_lvl+0x8c/0xd0
[   17.688692]  print_report+0x118/0x608
[   17.688737]  kasan_report+0xdc/0x128
[   17.688792]  __asan_report_store1_noabort+0x20/0x30
[   17.688846]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.688907]  krealloc_large_less_oob+0x20/0x38
[   17.688959]  kunit_try_run_case+0x170/0x3f0
[   17.689009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.689064]  kthread+0x328/0x630
[   17.689109]  ret_from_fork+0x10/0x20
[   17.689158] 
[   17.689177] The buggy address belongs to the physical page:
[   17.689215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.689276] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.689322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.689383] page_type: f8(unknown)
[   17.689421] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.689495] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.689551] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.689598] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.689645] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.689691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.689844] page dumped because: kasan: bad access detected
[   17.689910] 
[   17.690032] Memory state around the buggy address:
[   17.690066]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.690109]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.690150] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.690188]                                                  ^
[   17.690223]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.690263]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.690410] ==================================================================
[   17.587486] ==================================================================
[   17.587543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.587600] Write of size 1 at addr fff00000c5ade8da by task kunit_try_catch/161
[   17.587649] 
[   17.587681] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.587764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.587790] Hardware name: linux,dummy-virt (DT)
[   17.587821] Call trace:
[   17.587843]  show_stack+0x20/0x38 (C)
[   17.587892]  dump_stack_lvl+0x8c/0xd0
[   17.587941]  print_report+0x118/0x608
[   17.587986]  kasan_report+0xdc/0x128
[   17.588030]  __asan_report_store1_noabort+0x20/0x30
[   17.588081]  krealloc_less_oob_helper+0xa80/0xc50
[   17.588132]  krealloc_less_oob+0x20/0x38
[   17.588180]  kunit_try_run_case+0x170/0x3f0
[   17.588229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.588287]  kthread+0x328/0x630
[   17.588334]  ret_from_fork+0x10/0x20
[   17.588401] 
[   17.588419] Allocated by task 161:
[   17.588447]  kasan_save_stack+0x3c/0x68
[   17.588486]  kasan_save_track+0x20/0x40
[   17.588521]  kasan_save_alloc_info+0x40/0x58
[   17.588559]  __kasan_krealloc+0x118/0x178
[   17.588595]  krealloc_noprof+0x128/0x360
[   17.588631]  krealloc_less_oob_helper+0x168/0xc50
[   17.588672]  krealloc_less_oob+0x20/0x38
[   17.588710]  kunit_try_run_case+0x170/0x3f0
[   17.588748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.588794]  kthread+0x328/0x630
[   17.588829]  ret_from_fork+0x10/0x20
[   17.588865] 
[   17.588886] The buggy address belongs to the object at fff00000c5ade800
[   17.588886]  which belongs to the cache kmalloc-256 of size 256
[   17.588942] The buggy address is located 17 bytes to the right of
[   17.588942]  allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9)
[   17.589005] 
[   17.589024] The buggy address belongs to the physical page:
[   17.589055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.589107] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.589152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.589202] page_type: f5(slab)
[   17.589240] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.589290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.589338] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.593859] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.593913] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.599050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.599101] page dumped because: kasan: bad access detected
[   17.599133] 
[   17.599160] Memory state around the buggy address:
[   17.599195]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.599238]  fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.599280] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.599317]                                                     ^
[   17.599364]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.599406]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.599443] ==================================================================
[   17.682971] ==================================================================
[   17.683051] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.683122] Write of size 1 at addr fff00000c65aa0c9 by task kunit_try_catch/165
[   17.683952] 
[   17.684011] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.684247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.684321] Hardware name: linux,dummy-virt (DT)
[   17.684478] Call trace:
[   17.684555]  show_stack+0x20/0x38 (C)
[   17.684661]  dump_stack_lvl+0x8c/0xd0
[   17.684712]  print_report+0x118/0x608
[   17.684759]  kasan_report+0xdc/0x128
[   17.684803]  __asan_report_store1_noabort+0x20/0x30
[   17.684878]  krealloc_less_oob_helper+0xa48/0xc50
[   17.685020]  krealloc_large_less_oob+0x20/0x38
[   17.685166]  kunit_try_run_case+0x170/0x3f0
[   17.685308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.685411]  kthread+0x328/0x630
[   17.685496]  ret_from_fork+0x10/0x20
[   17.685651] 
[   17.685673] The buggy address belongs to the physical page:
[   17.685707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.685762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.685816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.685874] page_type: f8(unknown)
[   17.685935] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.685986] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.686034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.686081] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.686128] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.686175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.686213] page dumped because: kasan: bad access detected
[   17.686243] 
[   17.686261] Memory state around the buggy address:
[   17.686293]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.686335]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.686396] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.686433]                                               ^
[   17.686467]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.686671]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.686965] ==================================================================
[   17.614619] ==================================================================
[   17.614670] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.614724] Write of size 1 at addr fff00000c5ade8eb by task kunit_try_catch/161
[   17.614772] 
[   17.614805] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.614884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.614910] Hardware name: linux,dummy-virt (DT)
[   17.614941] Call trace:
[   17.614963]  show_stack+0x20/0x38 (C)
[   17.615021]  dump_stack_lvl+0x8c/0xd0
[   17.615070]  print_report+0x118/0x608
[   17.615115]  kasan_report+0xdc/0x128
[   17.615161]  __asan_report_store1_noabort+0x20/0x30
[   17.615214]  krealloc_less_oob_helper+0xa58/0xc50
[   17.615266]  krealloc_less_oob+0x20/0x38
[   17.615314]  kunit_try_run_case+0x170/0x3f0
[   17.619408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.619477]  kthread+0x328/0x630
[   17.619525]  ret_from_fork+0x10/0x20
[   17.619575] 
[   17.619593] Allocated by task 161:
[   17.619622]  kasan_save_stack+0x3c/0x68
[   17.619661]  kasan_save_track+0x20/0x40
[   17.619699]  kasan_save_alloc_info+0x40/0x58
[   17.619738]  __kasan_krealloc+0x118/0x178
[   17.619775]  krealloc_noprof+0x128/0x360
[   17.619812]  krealloc_less_oob_helper+0x168/0xc50
[   17.619853]  krealloc_less_oob+0x20/0x38
[   17.619891]  kunit_try_run_case+0x170/0x3f0
[   17.619930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.620024]  kthread+0x328/0x630
[   17.620307]  ret_from_fork+0x10/0x20
[   17.620932] 
[   17.620958] The buggy address belongs to the object at fff00000c5ade800
[   17.620958]  which belongs to the cache kmalloc-256 of size 256
[   17.621187] The buggy address is located 34 bytes to the right of
[   17.621187]  allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9)
[   17.621334] 
[   17.621411] The buggy address belongs to the physical page:
[   17.621534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.621780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.621879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.621945] page_type: f5(slab)
[   17.621986] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.622035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.622441] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.622535] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.622624] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.622691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.622819] page dumped because: kasan: bad access detected
[   17.624201] 
[   17.624315] Memory state around the buggy address:
[   17.624490]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.624581]  fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.624635] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.624964]                                                           ^
[   17.625033]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.625106]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.625764] ==================================================================
[   17.563146] ==================================================================
[   17.563206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.563266] Write of size 1 at addr fff00000c5ade8c9 by task kunit_try_catch/161
[   17.563315] 
[   17.566610] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.566710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.566737] Hardware name: linux,dummy-virt (DT)
[   17.566769] Call trace:
[   17.566794]  show_stack+0x20/0x38 (C)
[   17.566854]  dump_stack_lvl+0x8c/0xd0
[   17.566903]  print_report+0x118/0x608
[   17.566950]  kasan_report+0xdc/0x128
[   17.566995]  __asan_report_store1_noabort+0x20/0x30
[   17.567052]  krealloc_less_oob_helper+0xa48/0xc50
[   17.567105]  krealloc_less_oob+0x20/0x38
[   17.567153]  kunit_try_run_case+0x170/0x3f0
[   17.567206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.567262]  kthread+0x328/0x630
[   17.567310]  ret_from_fork+0x10/0x20
[   17.567375] 
[   17.567393] Allocated by task 161:
[   17.567421]  kasan_save_stack+0x3c/0x68
[   17.567461]  kasan_save_track+0x20/0x40
[   17.567498]  kasan_save_alloc_info+0x40/0x58
[   17.567536]  __kasan_krealloc+0x118/0x178
[   17.567573]  krealloc_noprof+0x128/0x360
[   17.567609]  krealloc_less_oob_helper+0x168/0xc50
[   17.567650]  krealloc_less_oob+0x20/0x38
[   17.567688]  kunit_try_run_case+0x170/0x3f0
[   17.567726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.567771]  kthread+0x328/0x630
[   17.567806]  ret_from_fork+0x10/0x20
[   17.567841] 
[   17.567861] The buggy address belongs to the object at fff00000c5ade800
[   17.567861]  which belongs to the cache kmalloc-256 of size 256
[   17.567918] The buggy address is located 0 bytes to the right of
[   17.567918]  allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9)
[   17.567979] 
[   17.567999] The buggy address belongs to the physical page:
[   17.568030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.568083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.568130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.568185] page_type: f5(slab)
[   17.568226] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.568275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.568324] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.571659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.571974] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.572027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.572067] page dumped because: kasan: bad access detected
[   17.572098] 
[   17.572484] Memory state around the buggy address:
[   17.572968]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.573089]  fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.573443] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.573564]                                               ^
[   17.573913]  fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.573960]  fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.573998] ==================================================================
[   17.691492] ==================================================================
[   17.691740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.691956] Write of size 1 at addr fff00000c65aa0da by task kunit_try_catch/165
[   17.692014] 
[   17.692051] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.692131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.692157] Hardware name: linux,dummy-virt (DT)
[   17.692186] Call trace:
[   17.692208]  show_stack+0x20/0x38 (C)
[   17.692259]  dump_stack_lvl+0x8c/0xd0
[   17.692308]  print_report+0x118/0x608
[   17.692370]  kasan_report+0xdc/0x128
[   17.692415]  __asan_report_store1_noabort+0x20/0x30
[   17.692467]  krealloc_less_oob_helper+0xa80/0xc50
[   17.692519]  krealloc_large_less_oob+0x20/0x38
[   17.692569]  kunit_try_run_case+0x170/0x3f0
[   17.692618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.692674]  kthread+0x328/0x630
[   17.692721]  ret_from_fork+0x10/0x20
[   17.692772] 
[   17.692791] The buggy address belongs to the physical page:
[   17.692822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.692873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.692919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.692970] page_type: f8(unknown)
[   17.693023] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.693072] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.693120] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.693167] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.693214] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.693260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.693298] page dumped because: kasan: bad access detected
[   17.693328] 
[   17.693345] Memory state around the buggy address:
[   17.694512]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.694584]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.694628] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.694666]                                                     ^
[   17.694704]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.694746]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.694783] ==================================================================
[   17.704749] ==================================================================
[   17.704797] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.704853] Write of size 1 at addr fff00000c65aa0eb by task kunit_try_catch/165
[   17.704901] 
[   17.704936] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.705015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.705040] Hardware name: linux,dummy-virt (DT)
[   17.705071] Call trace:
[   17.705094]  show_stack+0x20/0x38 (C)
[   17.705143]  dump_stack_lvl+0x8c/0xd0
[   17.705191]  print_report+0x118/0x608
[   17.705236]  kasan_report+0xdc/0x128
[   17.705280]  __asan_report_store1_noabort+0x20/0x30
[   17.705332]  krealloc_less_oob_helper+0xa58/0xc50
[   17.705402]  krealloc_large_less_oob+0x20/0x38
[   17.705453]  kunit_try_run_case+0x170/0x3f0
[   17.705507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.705562]  kthread+0x328/0x630
[   17.705608]  ret_from_fork+0x10/0x20
[   17.705658] 
[   17.705677] The buggy address belongs to the physical page:
[   17.705708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.706149] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.706237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.706292] page_type: f8(unknown)
[   17.706489] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.706545] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.706596] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.706644] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.706693] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.706803] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.707634] page dumped because: kasan: bad access detected
[   17.708413] 
[   17.708448] Memory state around the buggy address:
[   17.708497]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.709092]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.709141] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.709178]                                                           ^
[   17.709217]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.711091]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.711140] ==================================================================
[   17.695225] ==================================================================
[   17.695273] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.695555] Write of size 1 at addr fff00000c65aa0ea by task kunit_try_catch/165
[   17.695618] 
[   17.695649] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.696015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.696145] Hardware name: linux,dummy-virt (DT)
[   17.696882] Call trace:
[   17.697167]  show_stack+0x20/0x38 (C)
[   17.697342]  dump_stack_lvl+0x8c/0xd0
[   17.697501]  print_report+0x118/0x608
[   17.698782]  kasan_report+0xdc/0x128
[   17.698846]  __asan_report_store1_noabort+0x20/0x30
[   17.698899]  krealloc_less_oob_helper+0xae4/0xc50
[   17.698952]  krealloc_large_less_oob+0x20/0x38
[   17.699003]  kunit_try_run_case+0x170/0x3f0
[   17.699063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.699119]  kthread+0x328/0x630
[   17.699166]  ret_from_fork+0x10/0x20
[   17.699217] 
[   17.699238] The buggy address belongs to the physical page:
[   17.699271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.699325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.699760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.699970] page_type: f8(unknown)
[   17.700071] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.700164] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.700213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.701203] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.701276] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.701329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.701384] page dumped because: kasan: bad access detected
[   17.702289] 
[   17.702317] Memory state around the buggy address:
[   17.702444]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.702490]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.702534] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.702570]                                                           ^
[   17.702609]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.703119]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.704203] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   17.544296] ==================================================================
[   17.544344] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.544419] Write of size 1 at addr fff00000c5ade6f0 by task kunit_try_catch/159
[   17.544467] 
[   17.544498] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.544577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.544603] Hardware name: linux,dummy-virt (DT)
[   17.544633] Call trace:
[   17.544655]  show_stack+0x20/0x38 (C)
[   17.544704]  dump_stack_lvl+0x8c/0xd0
[   17.544753]  print_report+0x118/0x608
[   17.544798]  kasan_report+0xdc/0x128
[   17.544842]  __asan_report_store1_noabort+0x20/0x30
[   17.544894]  krealloc_more_oob_helper+0x5c0/0x678
[   17.544945]  krealloc_more_oob+0x20/0x38
[   17.544993]  kunit_try_run_case+0x170/0x3f0
[   17.545047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.545104]  kthread+0x328/0x630
[   17.545151]  ret_from_fork+0x10/0x20
[   17.545199] 
[   17.545217] Allocated by task 159:
[   17.545246]  kasan_save_stack+0x3c/0x68
[   17.545285]  kasan_save_track+0x20/0x40
[   17.545320]  kasan_save_alloc_info+0x40/0x58
[   17.549622]  __kasan_krealloc+0x118/0x178
[   17.549679]  krealloc_noprof+0x128/0x360
[   17.550239]  krealloc_more_oob_helper+0x168/0x678
[   17.550622]  krealloc_more_oob+0x20/0x38
[   17.550665]  kunit_try_run_case+0x170/0x3f0
[   17.550706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.551036]  kthread+0x328/0x630
[   17.551076]  ret_from_fork+0x10/0x20
[   17.551113] 
[   17.551133] The buggy address belongs to the object at fff00000c5ade600
[   17.551133]  which belongs to the cache kmalloc-256 of size 256
[   17.551862] The buggy address is located 5 bytes to the right of
[   17.551862]  allocated 235-byte region [fff00000c5ade600, fff00000c5ade6eb)
[   17.551929] 
[   17.551950] The buggy address belongs to the physical page:
[   17.551988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.552041] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.552087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.552139] page_type: f5(slab)
[   17.552177] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.552227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.552276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.552327] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.552388] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.552435] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.552474] page dumped because: kasan: bad access detected
[   17.552504] 
[   17.552522] Memory state around the buggy address:
[   17.552553]  fff00000c5ade580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.552596]  fff00000c5ade600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.552638] >fff00000c5ade680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.552675]                                                              ^
[   17.552713]  fff00000c5ade700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.552753]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.552790] ==================================================================
[   17.534661] ==================================================================
[   17.534726] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.534793] Write of size 1 at addr fff00000c5ade6eb by task kunit_try_catch/159
[   17.534842] 
[   17.534878] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.534961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.534986] Hardware name: linux,dummy-virt (DT)
[   17.535025] Call trace:
[   17.535048]  show_stack+0x20/0x38 (C)
[   17.535101]  dump_stack_lvl+0x8c/0xd0
[   17.535152]  print_report+0x118/0x608
[   17.535197]  kasan_report+0xdc/0x128
[   17.535242]  __asan_report_store1_noabort+0x20/0x30
[   17.535293]  krealloc_more_oob_helper+0x60c/0x678
[   17.535345]  krealloc_more_oob+0x20/0x38
[   17.535407]  kunit_try_run_case+0x170/0x3f0
[   17.535458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.535513]  kthread+0x328/0x630
[   17.535559]  ret_from_fork+0x10/0x20
[   17.535609] 
[   17.535627] Allocated by task 159:
[   17.535655]  kasan_save_stack+0x3c/0x68
[   17.535694]  kasan_save_track+0x20/0x40
[   17.535730]  kasan_save_alloc_info+0x40/0x58
[   17.535768]  __kasan_krealloc+0x118/0x178
[   17.535803]  krealloc_noprof+0x128/0x360
[   17.535841]  krealloc_more_oob_helper+0x168/0x678
[   17.535882]  krealloc_more_oob+0x20/0x38
[   17.535920]  kunit_try_run_case+0x170/0x3f0
[   17.535958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.536003]  kthread+0x328/0x630
[   17.536037]  ret_from_fork+0x10/0x20
[   17.536073] 
[   17.536092] The buggy address belongs to the object at fff00000c5ade600
[   17.536092]  which belongs to the cache kmalloc-256 of size 256
[   17.536150] The buggy address is located 0 bytes to the right of
[   17.536150]  allocated 235-byte region [fff00000c5ade600, fff00000c5ade6eb)
[   17.536211] 
[   17.536231] The buggy address belongs to the physical page:
[   17.536264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade
[   17.536317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.541361] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.541438] page_type: f5(slab)
[   17.541727] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.541779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.541828] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.542573] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.542627] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff
[   17.542873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.543148] page dumped because: kasan: bad access detected
[   17.543182] 
[   17.543200] Memory state around the buggy address:
[   17.543236]  fff00000c5ade580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543570]  fff00000c5ade600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.543620] >fff00000c5ade680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.543657]                                                           ^
[   17.543697]  fff00000c5ade700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543738]  fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543775] ==================================================================
[   17.665742] ==================================================================
[   17.665792] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.665851] Write of size 1 at addr fff00000c65aa0f0 by task kunit_try_catch/163
[   17.665902] 
[   17.665938] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.666018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.666044] Hardware name: linux,dummy-virt (DT)
[   17.666075] Call trace:
[   17.666098]  show_stack+0x20/0x38 (C)
[   17.666146]  dump_stack_lvl+0x8c/0xd0
[   17.666196]  print_report+0x118/0x608
[   17.666241]  kasan_report+0xdc/0x128
[   17.666285]  __asan_report_store1_noabort+0x20/0x30
[   17.666338]  krealloc_more_oob_helper+0x5c0/0x678
[   17.666403]  krealloc_large_more_oob+0x20/0x38
[   17.666454]  kunit_try_run_case+0x170/0x3f0
[   17.666504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.666559]  kthread+0x328/0x630
[   17.666605]  ret_from_fork+0x10/0x20
[   17.666654] 
[   17.666673] The buggy address belongs to the physical page:
[   17.666704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.666757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.666804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.666855] page_type: f8(unknown)
[   17.666893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.666943] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.666993] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.667047] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.668782] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.669028] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.669296] page dumped because: kasan: bad access detected
[   17.669606] 
[   17.669628] Memory state around the buggy address:
[   17.669664]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.669709]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.669752] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.669789]                                                              ^
[   17.669853]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.669897]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.669934] ==================================================================
[   17.652331] ==================================================================
[   17.652422] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.652496] Write of size 1 at addr fff00000c65aa0eb by task kunit_try_catch/163
[   17.652546] 
[   17.652585] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.652669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.652696] Hardware name: linux,dummy-virt (DT)
[   17.652729] Call trace:
[   17.652752]  show_stack+0x20/0x38 (C)
[   17.652803]  dump_stack_lvl+0x8c/0xd0
[   17.652853]  print_report+0x118/0x608
[   17.652898]  kasan_report+0xdc/0x128
[   17.652942]  __asan_report_store1_noabort+0x20/0x30
[   17.652993]  krealloc_more_oob_helper+0x60c/0x678
[   17.653045]  krealloc_large_more_oob+0x20/0x38
[   17.653095]  kunit_try_run_case+0x170/0x3f0
[   17.653146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.656740]  kthread+0x328/0x630
[   17.656869]  ret_from_fork+0x10/0x20
[   17.657338] 
[   17.658718] The buggy address belongs to the physical page:
[   17.660077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8
[   17.661455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.661551] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.661612] page_type: f8(unknown)
[   17.662438] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.662511] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.662696] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.662843] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.663052] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff
[   17.663144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.663290] page dumped because: kasan: bad access detected
[   17.663342] 
[   17.663373] Memory state around the buggy address:
[   17.663409]  fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.663794]  fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.663992] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.664084]                                                           ^
[   17.664152]  fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.664254]  fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.665145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   17.502805] ==================================================================
[   17.502872] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   17.502940] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/157
[   17.502990] 
[   17.503036] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.503119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.503144] Hardware name: linux,dummy-virt (DT)
[   17.503176] Call trace:
[   17.503200]  show_stack+0x20/0x38 (C)
[   17.503258]  dump_stack_lvl+0x8c/0xd0
[   17.503312]  print_report+0x118/0x608
[   17.504200]  kasan_report+0xdc/0x128
[   17.504263]  __asan_report_load1_noabort+0x20/0x30
[   17.504471]  page_alloc_uaf+0x328/0x350
[   17.504528]  kunit_try_run_case+0x170/0x3f0
[   17.505067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.505128]  kthread+0x328/0x630
[   17.505176]  ret_from_fork+0x10/0x20
[   17.505228] 
[   17.505250] The buggy address belongs to the physical page:
[   17.505283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0
[   17.505337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.505403] page_type: f0(buddy)
[   17.505446] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000
[   17.505523] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.505563] page dumped because: kasan: bad access detected
[   17.505594] 
[   17.505617] Memory state around the buggy address:
[   17.505653]  fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.505697]  fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.505739] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.505776]                    ^
[   17.505806]  fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.505848]  fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.505885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   17.462044] ==================================================================
[   17.462130] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   17.462199] Free of addr fff00000c65a4001 by task kunit_try_catch/153
[   17.462242] 
[   17.462276] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.466248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.466285] Hardware name: linux,dummy-virt (DT)
[   17.466317] Call trace:
[   17.466342]  show_stack+0x20/0x38 (C)
[   17.466672]  dump_stack_lvl+0x8c/0xd0
[   17.466727]  print_report+0x118/0x608
[   17.467284]  kasan_report_invalid_free+0xc0/0xe8
[   17.467369]  __kasan_kfree_large+0x5c/0xa8
[   17.467422]  free_large_kmalloc+0x64/0x190
[   17.467474]  kfree+0x270/0x3c8
[   17.467520]  kmalloc_large_invalid_free+0x108/0x270
[   17.467572]  kunit_try_run_case+0x170/0x3f0
[   17.467623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.467679]  kthread+0x328/0x630
[   17.467725]  ret_from_fork+0x10/0x20
[   17.467774] 
[   17.467795] The buggy address belongs to the physical page:
[   17.467828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4
[   17.467881] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.467927] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.467981] page_type: f8(unknown)
[   17.468021] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.468069] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.468117] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.468163] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.468210] head: 0bfffe0000000002 ffffc1ffc3196901 00000000ffffffff 00000000ffffffff
[   17.468257] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.468295] page dumped because: kasan: bad access detected
[   17.468324] 
[   17.468342] Memory state around the buggy address:
[   17.468385]  fff00000c65a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.468427]  fff00000c65a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.468468] >fff00000c65a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.468505]                    ^
[   17.468533]  fff00000c65a4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.468574]  fff00000c65a4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.468624] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   17.447022] ==================================================================
[   17.447101] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   17.447496] Read of size 1 at addr fff00000c65a4000 by task kunit_try_catch/151
[   17.447854] 
[   17.447935] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.448020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.448053] Hardware name: linux,dummy-virt (DT)
[   17.448209] Call trace:
[   17.448311]  show_stack+0x20/0x38 (C)
[   17.448452]  dump_stack_lvl+0x8c/0xd0
[   17.448552]  print_report+0x118/0x608
[   17.448681]  kasan_report+0xdc/0x128
[   17.448725]  __asan_report_load1_noabort+0x20/0x30
[   17.448780]  kmalloc_large_uaf+0x2cc/0x2f8
[   17.449019]  kunit_try_run_case+0x170/0x3f0
[   17.449140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.449194]  kthread+0x328/0x630
[   17.449246]  ret_from_fork+0x10/0x20
[   17.451762] 
[   17.451807] The buggy address belongs to the physical page:
[   17.451933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4
[   17.452087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.452161] raw: 0bfffe0000000000 ffffc1ffc3196a08 fff00000da4a5d80 0000000000000000
[   17.452211] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   17.452250] page dumped because: kasan: bad access detected
[   17.452445] 
[   17.452740] Memory state around the buggy address:
[   17.452787]  fff00000c65a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.452903]  fff00000c65a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.452948] >fff00000c65a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.453184]                    ^
[   17.453329]  fff00000c65a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.453436]  fff00000c65a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.453536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   17.416223] ==================================================================
[   17.416296] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   17.416401] Write of size 1 at addr fff00000c65a200a by task kunit_try_catch/149
[   17.416450] 
[   17.416485] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.416567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.416592] Hardware name: linux,dummy-virt (DT)
[   17.416623] Call trace:
[   17.416647]  show_stack+0x20/0x38 (C)
[   17.416698]  dump_stack_lvl+0x8c/0xd0
[   17.416746]  print_report+0x118/0x608
[   17.416791]  kasan_report+0xdc/0x128
[   17.416834]  __asan_report_store1_noabort+0x20/0x30
[   17.416884]  kmalloc_large_oob_right+0x278/0x2b8
[   17.416935]  kunit_try_run_case+0x170/0x3f0
[   17.416983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.417037]  kthread+0x328/0x630
[   17.417083]  ret_from_fork+0x10/0x20
[   17.417132] 
[   17.417164] The buggy address belongs to the physical page:
[   17.420861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0
[   17.420933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.420983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.421053] page_type: f8(unknown)
[   17.421097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.421151] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.421199] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.421246] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.421294] head: 0bfffe0000000002 ffffc1ffc3196801 00000000ffffffff 00000000ffffffff
[   17.421340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.421389] page dumped because: kasan: bad access detected
[   17.421420] 
[   17.421438] Memory state around the buggy address:
[   17.422535]  fff00000c65a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.422584]  fff00000c65a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.422626] >fff00000c65a2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.422662]                       ^
[   17.422693]  fff00000c65a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.422733]  fff00000c65a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.422770] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   17.395541] ==================================================================
[   17.395629] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   17.395691] Write of size 1 at addr fff00000c7789f00 by task kunit_try_catch/147
[   17.395747] 
[   17.395780] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.395862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.395888] Hardware name: linux,dummy-virt (DT)
[   17.395927] Call trace:
[   17.395951]  show_stack+0x20/0x38 (C)
[   17.396008]  dump_stack_lvl+0x8c/0xd0
[   17.396158]  print_report+0x118/0x608
[   17.396282]  kasan_report+0xdc/0x128
[   17.396334]  __asan_report_store1_noabort+0x20/0x30
[   17.396452]  kmalloc_big_oob_right+0x2a4/0x2f0
[   17.396520]  kunit_try_run_case+0x170/0x3f0
[   17.396605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.396679]  kthread+0x328/0x630
[   17.396726]  ret_from_fork+0x10/0x20
[   17.396784] 
[   17.396803] Allocated by task 147:
[   17.396837]  kasan_save_stack+0x3c/0x68
[   17.397051]  kasan_save_track+0x20/0x40
[   17.397100]  kasan_save_alloc_info+0x40/0x58
[   17.397182]  __kasan_kmalloc+0xd4/0xd8
[   17.397231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.397282]  kmalloc_big_oob_right+0xb8/0x2f0
[   17.397340]  kunit_try_run_case+0x170/0x3f0
[   17.397391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.397436]  kthread+0x328/0x630
[   17.397499]  ret_from_fork+0x10/0x20
[   17.397536] 
[   17.397556] The buggy address belongs to the object at fff00000c7788000
[   17.397556]  which belongs to the cache kmalloc-8k of size 8192
[   17.397751] The buggy address is located 0 bytes to the right of
[   17.397751]  allocated 7936-byte region [fff00000c7788000, fff00000c7789f00)
[   17.397880] 
[   17.397919] The buggy address belongs to the physical page:
[   17.397983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107788
[   17.398085] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.398168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.398223] page_type: f5(slab)
[   17.398285] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.398334] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.398522] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.398625] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.398743] head: 0bfffe0000000003 ffffc1ffc31de201 00000000ffffffff 00000000ffffffff
[   17.398824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.398901] page dumped because: kasan: bad access detected
[   17.398991] 
[   17.399035] Memory state around the buggy address:
[   17.399093]  fff00000c7789e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.399205]  fff00000c7789e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.399294] >fff00000c7789f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399361]                    ^
[   17.399517]  fff00000c7789f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399684]  fff00000c778a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399811] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   17.378595] ==================================================================
[   17.378665] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.379069] Write of size 1 at addr fff00000c3f75178 by task kunit_try_catch/145
[   17.379169] 
[   17.379205] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.379288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.379327] Hardware name: linux,dummy-virt (DT)
[   17.379373] Call trace:
[   17.379415]  show_stack+0x20/0x38 (C)
[   17.379471]  dump_stack_lvl+0x8c/0xd0
[   17.379521]  print_report+0x118/0x608
[   17.379700]  kasan_report+0xdc/0x128
[   17.379782]  __asan_report_store1_noabort+0x20/0x30
[   17.379836]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.379908]  kunit_try_run_case+0x170/0x3f0
[   17.379976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.380044]  kthread+0x328/0x630
[   17.380100]  ret_from_fork+0x10/0x20
[   17.380167] 
[   17.380215] Allocated by task 145:
[   17.380253]  kasan_save_stack+0x3c/0x68
[   17.380300]  kasan_save_track+0x20/0x40
[   17.380336]  kasan_save_alloc_info+0x40/0x58
[   17.380387]  __kasan_kmalloc+0xd4/0xd8
[   17.380437]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.380482]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.380528]  kunit_try_run_case+0x170/0x3f0
[   17.380572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.380626]  kthread+0x328/0x630
[   17.380661]  ret_from_fork+0x10/0x20
[   17.380704] 
[   17.380906] The buggy address belongs to the object at fff00000c3f75100
[   17.380906]  which belongs to the cache kmalloc-128 of size 128
[   17.381014] The buggy address is located 0 bytes to the right of
[   17.381014]  allocated 120-byte region [fff00000c3f75100, fff00000c3f75178)
[   17.381079] 
[   17.381099] The buggy address belongs to the physical page:
[   17.381138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   17.381203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.381546] page_type: f5(slab)
[   17.381645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.381710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.381782] page dumped because: kasan: bad access detected
[   17.381852] 
[   17.381882] Memory state around the buggy address:
[   17.381964]  fff00000c3f75000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.382016]  fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.382057] >fff00000c3f75100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.382094]                                                                 ^
[   17.382345]  fff00000c3f75180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.382722]  fff00000c3f75200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383022] ==================================================================
[   17.383756] ==================================================================
[   17.383810] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   17.383864] Write of size 1 at addr fff00000c3f75278 by task kunit_try_catch/145
[   17.383911] 
[   17.383949] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.384030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.384055] Hardware name: linux,dummy-virt (DT)
[   17.384085] Call trace:
[   17.384107]  show_stack+0x20/0x38 (C)
[   17.384154]  dump_stack_lvl+0x8c/0xd0
[   17.384203]  print_report+0x118/0x608
[   17.384248]  kasan_report+0xdc/0x128
[   17.384293]  __asan_report_store1_noabort+0x20/0x30
[   17.384344]  kmalloc_track_caller_oob_right+0x418/0x488
[   17.384412]  kunit_try_run_case+0x170/0x3f0
[   17.384473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.384537]  kthread+0x328/0x630
[   17.384584]  ret_from_fork+0x10/0x20
[   17.384632] 
[   17.384650] Allocated by task 145:
[   17.384677]  kasan_save_stack+0x3c/0x68
[   17.384715]  kasan_save_track+0x20/0x40
[   17.384757]  kasan_save_alloc_info+0x40/0x58
[   17.384805]  __kasan_kmalloc+0xd4/0xd8
[   17.384840]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.384893]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.384943]  kunit_try_run_case+0x170/0x3f0
[   17.384983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.385028]  kthread+0x328/0x630
[   17.385062]  ret_from_fork+0x10/0x20
[   17.385105] 
[   17.385124] The buggy address belongs to the object at fff00000c3f75200
[   17.385124]  which belongs to the cache kmalloc-128 of size 128
[   17.385187] The buggy address is located 0 bytes to the right of
[   17.385187]  allocated 120-byte region [fff00000c3f75200, fff00000c3f75278)
[   17.385248] 
[   17.385266] The buggy address belongs to the physical page:
[   17.385295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   17.385787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.386318] page_type: f5(slab)
[   17.386386] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.386437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.386494] page dumped because: kasan: bad access detected
[   17.386978] 
[   17.387030] Memory state around the buggy address:
[   17.387065]  fff00000c3f75100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.387126]  fff00000c3f75180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.387443] >fff00000c3f75200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.387562]                                                                 ^
[   17.387641]  fff00000c3f75280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.387699]  fff00000c3f75300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.387992] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   17.362990] ==================================================================
[   17.363081] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   17.363139] Read of size 1 at addr fff00000c6525000 by task kunit_try_catch/143
[   17.363187] 
[   17.363457] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.363593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.363632] Hardware name: linux,dummy-virt (DT)
[   17.363683] Call trace:
[   17.363735]  show_stack+0x20/0x38 (C)
[   17.363789]  dump_stack_lvl+0x8c/0xd0
[   17.363838]  print_report+0x118/0x608
[   17.363884]  kasan_report+0xdc/0x128
[   17.364130]  __asan_report_load1_noabort+0x20/0x30
[   17.364229]  kmalloc_node_oob_right+0x2f4/0x330
[   17.364283]  kunit_try_run_case+0x170/0x3f0
[   17.364344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.364418]  kthread+0x328/0x630
[   17.364465]  ret_from_fork+0x10/0x20
[   17.364523] 
[   17.364542] Allocated by task 143:
[   17.364569]  kasan_save_stack+0x3c/0x68
[   17.364616]  kasan_save_track+0x20/0x40
[   17.364684]  kasan_save_alloc_info+0x40/0x58
[   17.364730]  __kasan_kmalloc+0xd4/0xd8
[   17.364766]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   17.364815]  kmalloc_node_oob_right+0xbc/0x330
[   17.364872]  kunit_try_run_case+0x170/0x3f0
[   17.364919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.364974]  kthread+0x328/0x630
[   17.365010]  ret_from_fork+0x10/0x20
[   17.365060] 
[   17.365088] The buggy address belongs to the object at fff00000c6524000
[   17.365088]  which belongs to the cache kmalloc-4k of size 4096
[   17.365144] The buggy address is located 0 bytes to the right of
[   17.365144]  allocated 4096-byte region [fff00000c6524000, fff00000c6525000)
[   17.365206] 
[   17.365225] The buggy address belongs to the physical page:
[   17.365298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   17.365638] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.365689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.365754] page_type: f5(slab)
[   17.365859] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.365945] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.366085] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.366209] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.366276] head: 0bfffe0000000003 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff
[   17.366398] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.366484] page dumped because: kasan: bad access detected
[   17.366516] 
[   17.366539] Memory state around the buggy address:
[   17.366571]  fff00000c6524f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.366613]  fff00000c6524f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.366781] >fff00000c6525000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.366827]                    ^
[   17.366877]  fff00000c6525080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.366998]  fff00000c6525100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.367116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.353221] ==================================================================
[   17.353279] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.353368] Read of size 1 at addr fff00000c59158bf by task kunit_try_catch/141
[   17.353884] 
[   17.353967] CPU: 1 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.354058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.354111] Hardware name: linux,dummy-virt (DT)
[   17.354142] Call trace:
[   17.354198]  show_stack+0x20/0x38 (C)
[   17.354277]  dump_stack_lvl+0x8c/0xd0
[   17.354329]  print_report+0x118/0x608
[   17.354387]  kasan_report+0xdc/0x128
[   17.354627]  __asan_report_load1_noabort+0x20/0x30
[   17.354695]  kmalloc_oob_left+0x2ec/0x320
[   17.354830]  kunit_try_run_case+0x170/0x3f0
[   17.355038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.355147]  kthread+0x328/0x630
[   17.355211]  ret_from_fork+0x10/0x20
[   17.355280] 
[   17.355298] Allocated by task 52:
[   17.355328]  kasan_save_stack+0x3c/0x68
[   17.355384]  kasan_save_track+0x20/0x40
[   17.355609]  kasan_save_alloc_info+0x40/0x58
[   17.355680]  __kasan_kmalloc+0xd4/0xd8
[   17.355792]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.355880]  kvasprintf+0xe0/0x180
[   17.355970]  __kthread_create_on_node+0x16c/0x350
[   17.356051]  kthread_create_on_node+0xe4/0x130
[   17.356127]  create_worker+0x380/0x6b8
[   17.356200]  worker_thread+0x808/0xf38
[   17.356234]  kthread+0x328/0x630
[   17.356283]  ret_from_fork+0x10/0x20
[   17.356339] 
[   17.356810] The buggy address belongs to the object at fff00000c59158a0
[   17.356810]  which belongs to the cache kmalloc-16 of size 16
[   17.356871] The buggy address is located 19 bytes to the right of
[   17.356871]  allocated 12-byte region [fff00000c59158a0, fff00000c59158ac)
[   17.356954] 
[   17.357177] The buggy address belongs to the physical page:
[   17.357279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   17.357407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.357497] page_type: f5(slab)
[   17.357538] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.357766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.357872] page dumped because: kasan: bad access detected
[   17.357917] 
[   17.357944] Memory state around the buggy address:
[   17.357977]  fff00000c5915780: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   17.358035]  fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.358076] >fff00000c5915880: fa fb fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc
[   17.358112]                                         ^
[   17.358145]  fff00000c5915900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.358186]  fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.358222] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   17.326034] ==================================================================
[   17.326397] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.327235] Write of size 1 at addr fff00000c3f75073 by task kunit_try_catch/139
[   17.327343] 
[   17.328960] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G                 N  6.15.1-rc1 #1 PREEMPT 
[   17.329111] Tainted: [N]=TEST
[   17.329143] Hardware name: linux,dummy-virt (DT)
[   17.329387] Call trace:
[   17.329785]  show_stack+0x20/0x38 (C)
[   17.329991]  dump_stack_lvl+0x8c/0xd0
[   17.330063]  print_report+0x118/0x608
[   17.330112]  kasan_report+0xdc/0x128
[   17.330157]  __asan_report_store1_noabort+0x20/0x30
[   17.330209]  kmalloc_oob_right+0x5a4/0x660
[   17.330259]  kunit_try_run_case+0x170/0x3f0
[   17.330312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.330389]  kthread+0x328/0x630
[   17.330437]  ret_from_fork+0x10/0x20
[   17.330606] 
[   17.330643] Allocated by task 139:
[   17.330756]  kasan_save_stack+0x3c/0x68
[   17.330822]  kasan_save_track+0x20/0x40
[   17.330859]  kasan_save_alloc_info+0x40/0x58
[   17.330897]  __kasan_kmalloc+0xd4/0xd8
[   17.330933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.330976]  kmalloc_oob_right+0xb0/0x660
[   17.331021]  kunit_try_run_case+0x170/0x3f0
[   17.331060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.331105]  kthread+0x328/0x630
[   17.331141]  ret_from_fork+0x10/0x20
[   17.331194] 
[   17.331253] The buggy address belongs to the object at fff00000c3f75000
[   17.331253]  which belongs to the cache kmalloc-128 of size 128
[   17.331345] The buggy address is located 0 bytes to the right of
[   17.331345]  allocated 115-byte region [fff00000c3f75000, fff00000c3f75073)
[   17.331422] 
[   17.331509] The buggy address belongs to the physical page:
[   17.331719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   17.332002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.332295] page_type: f5(slab)
[   17.332616] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.332680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.332784] page dumped because: kasan: bad access detected
[   17.332824] 
[   17.332849] Memory state around the buggy address:
[   17.333079]  fff00000c3f74f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.333145]  fff00000c3f74f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.333200] >fff00000c3f75000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.333254]                                                              ^
[   17.333336]  fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.333392]  fff00000c3f75100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.333453] ==================================================================
[   17.342052] ==================================================================
[   17.342118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.342186] Read of size 1 at addr fff00000c3f75080 by task kunit_try_catch/139
[   17.342236] 
[   17.342268] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.342364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.342390] Hardware name: linux,dummy-virt (DT)
[   17.342420] Call trace:
[   17.342441]  show_stack+0x20/0x38 (C)
[   17.342493]  dump_stack_lvl+0x8c/0xd0
[   17.342541]  print_report+0x118/0x608
[   17.342710]  kasan_report+0xdc/0x128
[   17.342845]  __asan_report_load1_noabort+0x20/0x30
[   17.342984]  kmalloc_oob_right+0x5d0/0x660
[   17.343066]  kunit_try_run_case+0x170/0x3f0
[   17.343118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.343182]  kthread+0x328/0x630
[   17.343560]  ret_from_fork+0x10/0x20
[   17.343656] 
[   17.343676] Allocated by task 139:
[   17.343703]  kasan_save_stack+0x3c/0x68
[   17.343743]  kasan_save_track+0x20/0x40
[   17.343779]  kasan_save_alloc_info+0x40/0x58
[   17.343963]  __kasan_kmalloc+0xd4/0xd8
[   17.344009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.344053]  kmalloc_oob_right+0xb0/0x660
[   17.344200]  kunit_try_run_case+0x170/0x3f0
[   17.344249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.344315]  kthread+0x328/0x630
[   17.344367]  ret_from_fork+0x10/0x20
[   17.344403] 
[   17.344423] The buggy address belongs to the object at fff00000c3f75000
[   17.344423]  which belongs to the cache kmalloc-128 of size 128
[   17.344496] The buggy address is located 13 bytes to the right of
[   17.344496]  allocated 115-byte region [fff00000c3f75000, fff00000c3f75073)
[   17.344568] 
[   17.344754] The buggy address belongs to the physical page:
[   17.344808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   17.344861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.344929] page_type: f5(slab)
[   17.344969] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.345023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.345063] page dumped because: kasan: bad access detected
[   17.345093] 
[   17.345120] Memory state around the buggy address:
[   17.345152]  fff00000c3f74f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.345193]  fff00000c3f75000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.345235] >fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345280]                    ^
[   17.345308]  fff00000c3f75100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345370]  fff00000c3f75180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345405] ==================================================================
[   17.335332] ==================================================================
[   17.335419] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.335546] Write of size 1 at addr fff00000c3f75078 by task kunit_try_catch/139
[   17.335600] 
[   17.335634] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   17.335783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.335894] Hardware name: linux,dummy-virt (DT)
[   17.335927] Call trace:
[   17.335950]  show_stack+0x20/0x38 (C)
[   17.336005]  dump_stack_lvl+0x8c/0xd0
[   17.336054]  print_report+0x118/0x608
[   17.336100]  kasan_report+0xdc/0x128
[   17.336162]  __asan_report_store1_noabort+0x20/0x30
[   17.336215]  kmalloc_oob_right+0x538/0x660
[   17.336494]  kunit_try_run_case+0x170/0x3f0
[   17.336564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.336650]  kthread+0x328/0x630
[   17.336785]  ret_from_fork+0x10/0x20
[   17.336863] 
[   17.336882] Allocated by task 139:
[   17.336920]  kasan_save_stack+0x3c/0x68
[   17.337403]  kasan_save_track+0x20/0x40
[   17.337664]  kasan_save_alloc_info+0x40/0x58
[   17.337925]  __kasan_kmalloc+0xd4/0xd8
[   17.338297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.338374]  kmalloc_oob_right+0xb0/0x660
[   17.338445]  kunit_try_run_case+0x170/0x3f0
[   17.338530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.338599]  kthread+0x328/0x630
[   17.338654]  ret_from_fork+0x10/0x20
[   17.338722] 
[   17.338793] The buggy address belongs to the object at fff00000c3f75000
[   17.338793]  which belongs to the cache kmalloc-128 of size 128
[   17.338894] The buggy address is located 5 bytes to the right of
[   17.338894]  allocated 115-byte region [fff00000c3f75000, fff00000c3f75073)
[   17.338957] 
[   17.338976] The buggy address belongs to the physical page:
[   17.339007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   17.339112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.339204] page_type: f5(slab)
[   17.339244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.339294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.339333] page dumped because: kasan: bad access detected
[   17.339375] 
[   17.339514] Memory state around the buggy address:
[   17.339564]  fff00000c3f74f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.339645]  fff00000c3f74f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.339687] >fff00000c3f75000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.340757]                                                                 ^
[   17.340810]  fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.341003]  fff00000c3f75100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.341078] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   94.464294] WARNING: CPU: 1 PID: 659 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   94.466919] Modules linked in:
[   94.467344] CPU: 1 UID: 0 PID: 659 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.1-rc1 #1 PREEMPT 
[   94.468475] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   94.469016] Hardware name: linux,dummy-virt (DT)
[   94.469398] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.469681] pc : intlog10+0x38/0x48
[   94.469869] lr : intlog10_test+0xe4/0x200
[   94.470058] sp : ffff800082237c10
[   94.470424] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000
[   94.471219] x26: 1ffe000019553581 x25: 0000000000000000 x24: ffff800082237ce0
[   94.471976] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82
[   94.472783] x20: ffffaf0a3ac24e80 x19: ffff800080087990 x18: 000000006cf4f7d4
[   94.473573] x17: 00000000a5a15f74 x16: fff00000c096e03c x15: 000000007f201a4e
[   94.474443] x14: 00000000c16f9dd7 x13: 1ffe00001b49000d x12: ffff75e147d37769
[   94.475183] x11: 1ffff5e147d37768 x10: ffff75e147d37768 x9 : ffffaf0a3821011c
[   94.475963] x8 : ffffaf0a3e9bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.476579] x5 : ffff700010446f82 x4 : 1ffff00010010f3a x3 : 1ffff5e1475849d0
[   94.477344] x2 : 1ffff5e1475849d0 x1 : 0000000000000003 x0 : 0000000000000000
[   94.478062] Call trace:
[   94.478410]  intlog10+0x38/0x48 (P)
[   94.478658]  kunit_try_run_case+0x170/0x3f0
[   94.478876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.479507]  kthread+0x328/0x630
[   94.479885]  ret_from_fork+0x10/0x20
[   94.480279] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   94.425594] WARNING: CPU: 1 PID: 641 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   94.428421] Modules linked in:
[   94.428850] CPU: 1 UID: 0 PID: 641 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.1-rc1 #1 PREEMPT 
[   94.429862] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   94.430596] Hardware name: linux,dummy-virt (DT)
[   94.431119] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.431610] pc : intlog2+0xd8/0xf8
[   94.431813] lr : intlog2_test+0xe4/0x200
[   94.432002] sp : ffff800082197c10
[   94.432159] x29: ffff800082197c90 x28: 0000000000000000 x27: 0000000000000000
[   94.432533] x26: 1ffe000019500941 x25: 0000000000000000 x24: ffff800082197ce0
[   94.432986] x23: ffff800082197d00 x22: 0000000000000000 x21: 1ffff00010432f82
[   94.433428] x20: ffffaf0a3ac24d80 x19: ffff800080087990 x18: 00000000db9f298a
[   94.433870] x17: 00000000ccbbed2b x16: fff00000c096e03c x15: fff00000ff616b08
[   94.434294] x14: 00000000f1f1f1f1 x13: 1ffe00001b49000d x12: ffff75e147d37769
[   94.434695] x11: 1ffff5e147d37768 x10: ffff75e147d37768 x9 : ffffaf0a3821031c
[   94.435138] x8 : ffffaf0a3e9bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.435608] x5 : ffff700010432f82 x4 : 1ffff00010010f3a x3 : 1ffff5e1475849b0
[   94.436057] x2 : 1ffff5e1475849b0 x1 : 0000000000000003 x0 : 0000000000000000
[   94.436454] Call trace:
[   94.436643]  intlog2+0xd8/0xf8 (P)
[   94.436863]  kunit_try_run_case+0x170/0x3f0
[   94.437104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.437435]  kthread+0x328/0x630
[   94.437693]  ret_from_fork+0x10/0x20
[   94.437897] ---[ end trace 0000000000000000 ]---