Hay
Date
June 26, 2025, 11:12 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.702039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   20.433846] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   20.404849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   20.414103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   94.189183] Internal error: Oops: 0000000096000005 [#1]  SMP
[   94.191098] Modules linked in:
[   94.191770] CPU: 0 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   94.192658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.193187] Hardware name: linux,dummy-virt (DT)
[   94.193706] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.194089] pc : kunit_test_null_dereference+0x70/0x170
[   94.194887] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.195489] sp : ffff800081ff7d30
[   94.195848] x29: ffff800081ff7d90 x28: 0000000000000000 x27: 0000000000000000
[   94.196295] x26: 1ffe0000187dafa1 x25: 0000000000000000 x24: 0000000000000004
[   94.196644] x23: fff00000c3ed7d0c x22: ffffab8499a01da0 x21: fff00000c1af5108
[   94.197310] x20: 1ffff000103fefa6 x19: ffff800080087990 x18: 000000008bf881bc
[   94.198180] x17: 0000000047640c11 x16: fff00000c096dc3c x15: 00000000ec314575
[   94.199038] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f5e0 x12: fffd8000195243a4
[   94.199971] x11: 1ffe0000195243a3 x10: fffd8000195243a3 x9 : ffffab84999f9208
[   94.200923] x8 : ffff800081ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   94.201783] x5 : ffff7000103fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   94.202625] x2 : dfff800000000000 x1 : fff00000ca921440 x0 : ffff800080087990
[   94.203522] Call trace:
[   94.203998]  kunit_test_null_dereference+0x70/0x170 (P)
[   94.204643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.204922]  kthread+0x328/0x630
[   94.205499]  ret_from_fork+0x10/0x20
[   94.206269] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   94.207177] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   50.904907] ==================================================================
[   50.904981] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   50.904981] 
[   50.905066] Use-after-free read at 0x00000000bf568248 (in kfence-#148):
[   50.905117]  test_krealloc+0x51c/0x830
[   50.905162]  kunit_try_run_case+0x170/0x3f0
[   50.905208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.905255]  kthread+0x328/0x630
[   50.905298]  ret_from_fork+0x10/0x20
[   50.905339] 
[   50.905363] kfence-#148: 0x00000000bf568248-0x0000000061505d48, size=32, cache=kmalloc-32
[   50.905363] 
[   50.905417] allocated by task 339 on cpu 1 at 50.904287s (0.001126s ago):
[   50.905487]  test_alloc+0x29c/0x628
[   50.905526]  test_krealloc+0xc0/0x830
[   50.905565]  kunit_try_run_case+0x170/0x3f0
[   50.905607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.905652]  kthread+0x328/0x630
[   50.905691]  ret_from_fork+0x10/0x20
[   50.905731] 
[   50.905755] freed by task 339 on cpu 1 at 50.904500s (0.001251s ago):
[   50.905814]  krealloc_noprof+0x148/0x360
[   50.905864]  test_krealloc+0x1dc/0x830
[   50.905902]  kunit_try_run_case+0x170/0x3f0
[   50.905943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.905988]  kthread+0x328/0x630
[   50.906028]  ret_from_fork+0x10/0x20
[   50.906066] 
[   50.906110] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.906192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.906225] Hardware name: linux,dummy-virt (DT)
[   50.906260] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   50.832301] ==================================================================
[   50.832402] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   50.832402] 
[   50.832501] Use-after-free read at 0x00000000fdb9a994 (in kfence-#147):
[   50.832556]  test_memcache_typesafe_by_rcu+0x280/0x560
[   50.832605]  kunit_try_run_case+0x170/0x3f0
[   50.832652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.832698]  kthread+0x328/0x630
[   50.832742]  ret_from_fork+0x10/0x20
[   50.832783] 
[   50.832806] kfence-#147: 0x00000000fdb9a994-0x000000008678f50d, size=32, cache=test
[   50.832806] 
[   50.832878] allocated by task 337 on cpu 0 at 50.812260s (0.020615s ago):
[   50.832951]  test_alloc+0x230/0x628
[   50.832989]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   50.833030]  kunit_try_run_case+0x170/0x3f0
[   50.833071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.833115]  kthread+0x328/0x630
[   50.833152]  ret_from_fork+0x10/0x20
[   50.833193] 
[   50.833215] freed by task 337 on cpu 0 at 50.812364s (0.020848s ago):
[   50.833271]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   50.833313]  kunit_try_run_case+0x170/0x3f0
[   50.833352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.833398]  kthread+0x328/0x630
[   50.833436]  ret_from_fork+0x10/0x20
[   50.833474] 
[   50.833521] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.833600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.833631] Hardware name: linux,dummy-virt (DT)
[   50.833669] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   28.148233] ==================================================================
[   28.148387] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   28.148387] 
[   28.148492] Invalid read at 0x0000000098fe52e4:
[   28.148558]  test_invalid_access+0xdc/0x1f0
[   28.148614]  kunit_try_run_case+0x170/0x3f0
[   28.148668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.148719]  kthread+0x328/0x630
[   28.148768]  ret_from_fork+0x10/0x20
[   28.148820] 
[   28.148920] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   28.149019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.149055] Hardware name: linux,dummy-virt (DT)
[   28.149096] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   27.921398] ==================================================================
[   27.921491] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.921491] 
[   27.921553] Corrupted memory at 0x00000000b5c89fe9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143):
[   27.921880]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.921929]  kunit_try_run_case+0x170/0x3f0
[   27.921974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.922019]  kthread+0x328/0x630
[   27.922060]  ret_from_fork+0x10/0x20
[   27.922101] 
[   27.922126] kfence-#143: 0x000000008e33ff6b-0x0000000039ecd8f1, size=73, cache=kmalloc-96
[   27.922126] 
[   27.922180] allocated by task 327 on cpu 0 at 27.921171s (0.001005s ago):
[   27.922244]  test_alloc+0x29c/0x628
[   27.922282]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   27.922324]  kunit_try_run_case+0x170/0x3f0
[   27.922365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.922410]  kthread+0x328/0x630
[   27.922449]  ret_from_fork+0x10/0x20
[   27.922489] 
[   27.922511] freed by task 327 on cpu 0 at 27.921312s (0.001196s ago):
[   27.922571]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   27.922612]  kunit_try_run_case+0x170/0x3f0
[   27.922654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.922699]  kthread+0x328/0x630
[   27.922737]  ret_from_fork+0x10/0x20
[   27.922777] 
[   27.922817] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   27.922908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.922937] Hardware name: linux,dummy-virt (DT)
[   27.922972] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   27.816629] ==================================================================
[   27.816732] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   27.816732] 
[   27.816834] Out-of-bounds read at 0x0000000021ccf533 (105B right of kfence-#142):
[   27.816914]  test_kmalloc_aligned_oob_read+0x238/0x468
[   27.816965]  kunit_try_run_case+0x170/0x3f0
[   27.817011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.817058]  kthread+0x328/0x630
[   27.817101]  ret_from_fork+0x10/0x20
[   27.817142] 
[   27.817168] kfence-#142: 0x000000001d093480-0x0000000072463100, size=73, cache=kmalloc-96
[   27.817168] 
[   27.817221] allocated by task 325 on cpu 0 at 27.816375s (0.000842s ago):
[   27.817294]  test_alloc+0x29c/0x628
[   27.817334]  test_kmalloc_aligned_oob_read+0x100/0x468
[   27.817377]  kunit_try_run_case+0x170/0x3f0
[   27.817419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.817465]  kthread+0x328/0x630
[   27.817504]  ret_from_fork+0x10/0x20
[   27.817544] 
[   27.817592] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   27.817675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.817705] Hardware name: linux,dummy-virt (DT)
[   27.817743] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   23.552467] ==================================================================
[   23.552564] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   23.552564] 
[   23.552626] Corrupted memory at 0x00000000016dc870 [ ! . . . . . . . . . . . . . . . ] (in kfence-#101):
[   23.552951]  test_corruption+0x120/0x378
[   23.552995]  kunit_try_run_case+0x170/0x3f0
[   23.553041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.553088]  kthread+0x328/0x630
[   23.553129]  ret_from_fork+0x10/0x20
[   23.553170] 
[   23.553197] kfence-#101: 0x00000000ba1a80d7-0x000000005b6726e9, size=32, cache=test
[   23.553197] 
[   23.553251] allocated by task 315 on cpu 0 at 23.552325s (0.000922s ago):
[   23.553314]  test_alloc+0x230/0x628
[   23.553354]  test_corruption+0xdc/0x378
[   23.553393]  kunit_try_run_case+0x170/0x3f0
[   23.553434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.553478]  kthread+0x328/0x630
[   23.553518]  ret_from_fork+0x10/0x20
[   23.553558] 
[   23.553580] freed by task 315 on cpu 0 at 23.552383s (0.001194s ago):
[   23.553639]  test_corruption+0x120/0x378
[   23.553677]  kunit_try_run_case+0x170/0x3f0
[   23.553719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.553764]  kthread+0x328/0x630
[   23.553802]  ret_from_fork+0x10/0x20
[   23.553840] 
[   23.553893] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.553972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.554003] Hardware name: linux,dummy-virt (DT)
[   23.554037] ==================================================================
[   23.136543] ==================================================================
[   23.136634] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   23.136634] 
[   23.136696] Corrupted memory at 0x0000000072c7002a [ ! . . . . . . . . . . . . . . . ] (in kfence-#97):
[   23.137021]  test_corruption+0x278/0x378
[   23.137066]  kunit_try_run_case+0x170/0x3f0
[   23.137114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.137158]  kthread+0x328/0x630
[   23.137200]  ret_from_fork+0x10/0x20
[   23.137241] 
[   23.137266] kfence-#97: 0x00000000a6ba8850-0x000000003485b675, size=32, cache=kmalloc-32
[   23.137266] 
[   23.137322] allocated by task 313 on cpu 0 at 23.136345s (0.000973s ago):
[   23.137385]  test_alloc+0x29c/0x628
[   23.137424]  test_corruption+0xdc/0x378
[   23.137463]  kunit_try_run_case+0x170/0x3f0
[   23.137504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.137549]  kthread+0x328/0x630
[   23.137589]  ret_from_fork+0x10/0x20
[   23.137626] 
[   23.137650] freed by task 313 on cpu 0 at 23.136451s (0.001196s ago):
[   23.137709]  test_corruption+0x278/0x378
[   23.137748]  kunit_try_run_case+0x170/0x3f0
[   23.137790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.137835]  kthread+0x328/0x630
[   23.137885]  ret_from_fork+0x10/0x20
[   23.137925] 
[   23.137972] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.138053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.138085] Hardware name: linux,dummy-virt (DT)
[   23.138121] ==================================================================
[   23.656520] ==================================================================
[   23.656611] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   23.656611] 
[   23.656672] Corrupted memory at 0x00000000080e8bc7 [ ! ] (in kfence-#102):
[   23.656783]  test_corruption+0x1d8/0x378
[   23.656826]  kunit_try_run_case+0x170/0x3f0
[   23.656886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.656932]  kthread+0x328/0x630
[   23.656973]  ret_from_fork+0x10/0x20
[   23.657014] 
[   23.657038] kfence-#102: 0x0000000036a90aca-0x00000000aadfa99b, size=32, cache=test
[   23.657038] 
[   23.657091] allocated by task 315 on cpu 0 at 23.656360s (0.000728s ago):
[   23.657153]  test_alloc+0x230/0x628
[   23.657192]  test_corruption+0x198/0x378
[   23.657230]  kunit_try_run_case+0x170/0x3f0
[   23.657271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.657316]  kthread+0x328/0x630
[   23.657354]  ret_from_fork+0x10/0x20
[   23.657391] 
[   23.657415] freed by task 315 on cpu 0 at 23.656421s (0.000990s ago):
[   23.657474]  test_corruption+0x1d8/0x378
[   23.657511]  kunit_try_run_case+0x170/0x3f0
[   23.657552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.657595]  kthread+0x328/0x630
[   23.657635]  ret_from_fork+0x10/0x20
[   23.657673] 
[   23.657712] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.657789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.657820] Hardware name: linux,dummy-virt (DT)
[   23.657867] ==================================================================
[   23.240608] ==================================================================
[   23.240699] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   23.240699] 
[   23.240757] Corrupted memory at 0x00000000665c4d2a [ ! ] (in kfence-#98):
[   23.240898]  test_corruption+0x284/0x378
[   23.240942]  kunit_try_run_case+0x170/0x3f0
[   23.240987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.241033]  kthread+0x328/0x630
[   23.241074]  ret_from_fork+0x10/0x20
[   23.241115] 
[   23.241138] kfence-#98: 0x0000000062c33214-0x00000000c618ad1f, size=32, cache=kmalloc-32
[   23.241138] 
[   23.241193] allocated by task 313 on cpu 0 at 23.240341s (0.000847s ago):
[   23.241256]  test_alloc+0x29c/0x628
[   23.241296]  test_corruption+0x198/0x378
[   23.241333]  kunit_try_run_case+0x170/0x3f0
[   23.241376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.241420]  kthread+0x328/0x630
[   23.241458]  ret_from_fork+0x10/0x20
[   23.241498] 
[   23.241520] freed by task 313 on cpu 0 at 23.240444s (0.001072s ago):
[   23.241578]  test_corruption+0x284/0x378
[   23.241615]  kunit_try_run_case+0x170/0x3f0
[   23.241656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.241701]  kthread+0x328/0x630
[   23.241738]  ret_from_fork+0x10/0x20
[   23.241777] 
[   23.241817] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.241905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.241936] Hardware name: linux,dummy-virt (DT)
[   23.241972] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   23.032466] ==================================================================
[   23.032561] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   23.032561] 
[   23.032617] Invalid free of 0x00000000ccc1d97f (in kfence-#96):
[   23.032669]  test_invalid_addr_free+0xec/0x238
[   23.032712]  kunit_try_run_case+0x170/0x3f0
[   23.032759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.032805]  kthread+0x328/0x630
[   23.032847]  ret_from_fork+0x10/0x20
[   23.032904] 
[   23.032930] kfence-#96: 0x00000000bdc96dad-0x000000007180765e, size=32, cache=test
[   23.032930] 
[   23.032982] allocated by task 311 on cpu 1 at 23.032348s (0.000630s ago):
[   23.033044]  test_alloc+0x230/0x628
[   23.033084]  test_invalid_addr_free+0xd4/0x238
[   23.033124]  kunit_try_run_case+0x170/0x3f0
[   23.033165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.033210]  kthread+0x328/0x630
[   23.033250]  ret_from_fork+0x10/0x20
[   23.033290] 
[   23.033333] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   23.033415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.033446] Hardware name: linux,dummy-virt (DT)
[   23.033479] ==================================================================
[   22.928865] ==================================================================
[   22.929060] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   22.929060] 
[   22.929120] Invalid free of 0x00000000dbc1e4e1 (in kfence-#95):
[   22.929206]  test_invalid_addr_free+0x1ac/0x238
[   22.929251]  kunit_try_run_case+0x170/0x3f0
[   22.929327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.929391]  kthread+0x328/0x630
[   22.929451]  ret_from_fork+0x10/0x20
[   22.929494] 
[   22.929573] kfence-#95: 0x00000000720e4533-0x00000000cd701452, size=32, cache=kmalloc-32
[   22.929573] 
[   22.929683] allocated by task 309 on cpu 1 at 22.928684s (0.000979s ago):
[   22.929746]  test_alloc+0x29c/0x628
[   22.929839]  test_invalid_addr_free+0xd4/0x238
[   22.929892]  kunit_try_run_case+0x170/0x3f0
[   22.929933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.930004]  kthread+0x328/0x630
[   22.930050]  ret_from_fork+0x10/0x20
[   22.930210] 
[   22.930258] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.930381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.930418] Hardware name: linux,dummy-virt (DT)
[   22.930453] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   22.825844] ==================================================================
[   22.825932] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   22.825932] 
[   22.826013] Invalid free of 0x000000000e5b64f1 (in kfence-#94):
[   22.826077]  test_double_free+0x100/0x238
[   22.826121]  kunit_try_run_case+0x170/0x3f0
[   22.826165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826210]  kthread+0x328/0x630
[   22.826252]  ret_from_fork+0x10/0x20
[   22.826327] 
[   22.826355] kfence-#94: 0x000000000e5b64f1-0x0000000018ede51f, size=32, cache=test
[   22.826355] 
[   22.826526] allocated by task 307 on cpu 1 at 22.825280s (0.001144s ago):
[   22.826610]  test_alloc+0x230/0x628
[   22.826660]  test_double_free+0xd4/0x238
[   22.826709]  kunit_try_run_case+0x170/0x3f0
[   22.826751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826802]  kthread+0x328/0x630
[   22.826845]  ret_from_fork+0x10/0x20
[   22.826902] 
[   22.826936] freed by task 307 on cpu 1 at 22.825556s (0.001375s ago):
[   22.826997]  test_double_free+0xf0/0x238
[   22.827072]  kunit_try_run_case+0x170/0x3f0
[   22.827129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.827192]  kthread+0x328/0x630
[   22.827234]  ret_from_fork+0x10/0x20
[   22.827479] 
[   22.827555] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.827644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.827686] Hardware name: linux,dummy-virt (DT)
[   22.827720] ==================================================================
[   22.717481] ==================================================================
[   22.717615] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   22.717615] 
[   22.717686] Invalid free of 0x00000000209532d7 (in kfence-#93):
[   22.717829]  test_double_free+0x1bc/0x238
[   22.717895]  kunit_try_run_case+0x170/0x3f0
[   22.718159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.718237]  kthread+0x328/0x630
[   22.718283]  ret_from_fork+0x10/0x20
[   22.718325] 
[   22.718358] kfence-#93: 0x00000000209532d7-0x000000007d26f695, size=32, cache=kmalloc-32
[   22.718358] 
[   22.718424] allocated by task 305 on cpu 1 at 22.717015s (0.001396s ago):
[   22.718499]  test_alloc+0x29c/0x628
[   22.718601]  test_double_free+0xd4/0x238
[   22.718647]  kunit_try_run_case+0x170/0x3f0
[   22.718686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.718925]  kthread+0x328/0x630
[   22.719000]  ret_from_fork+0x10/0x20
[   22.719044] 
[   22.719074] freed by task 305 on cpu 1 at 22.717157s (0.001914s ago):
[   22.719198]  test_double_free+0x1ac/0x238
[   22.719254]  kunit_try_run_case+0x170/0x3f0
[   22.719299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.719454]  kthread+0x328/0x630
[   22.719532]  ret_from_fork+0x10/0x20
[   22.719619] 
[   22.719705] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.719838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.720111] Hardware name: linux,dummy-virt (DT)
[   22.720165] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   22.289710] ==================================================================
[   22.289784] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.289784] 
[   22.289890] Use-after-free read at 0x000000009af35402 (in kfence-#89):
[   22.289941]  test_use_after_free_read+0x114/0x248
[   22.289987]  kunit_try_run_case+0x170/0x3f0
[   22.290034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.290077]  kthread+0x328/0x630
[   22.290119]  ret_from_fork+0x10/0x20
[   22.290158] 
[   22.290183] kfence-#89: 0x000000009af35402-0x0000000006914d05, size=32, cache=kmalloc-32
[   22.290183] 
[   22.290234] allocated by task 297 on cpu 1 at 22.289269s (0.000961s ago):
[   22.290303]  test_alloc+0x29c/0x628
[   22.290340]  test_use_after_free_read+0xd0/0x248
[   22.290380]  kunit_try_run_case+0x170/0x3f0
[   22.290506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.290609]  kthread+0x328/0x630
[   22.290697]  ret_from_fork+0x10/0x20
[   22.290737] 
[   22.290759] freed by task 297 on cpu 1 at 22.289479s (0.001276s ago):
[   22.290818]  test_use_after_free_read+0x1c0/0x248
[   22.290866]  kunit_try_run_case+0x170/0x3f0
[   22.290907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.290953]  kthread+0x328/0x630
[   22.290994]  ret_from_fork+0x10/0x20
[   22.291035] 
[   22.291168] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.291679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.291719] Hardware name: linux,dummy-virt (DT)
[   22.291767] ==================================================================
[   22.396830] ==================================================================
[   22.397042] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.397042] 
[   22.397335] Use-after-free read at 0x00000000f66eab1f (in kfence-#90):
[   22.397487]  test_use_after_free_read+0x114/0x248
[   22.397569]  kunit_try_run_case+0x170/0x3f0
[   22.397616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.397662]  kthread+0x328/0x630
[   22.397703]  ret_from_fork+0x10/0x20
[   22.397750] 
[   22.397868] kfence-#90: 0x00000000f66eab1f-0x000000007e34f679, size=32, cache=test
[   22.397868] 
[   22.397917] allocated by task 299 on cpu 1 at 22.396465s (0.001449s ago):
[   22.397988]  test_alloc+0x230/0x628
[   22.398028]  test_use_after_free_read+0xd0/0x248
[   22.398069]  kunit_try_run_case+0x170/0x3f0
[   22.398110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.398154]  kthread+0x328/0x630
[   22.398193]  ret_from_fork+0x10/0x20
[   22.398232] 
[   22.398254] freed by task 299 on cpu 1 at 22.396531s (0.001719s ago):
[   22.398353]  test_use_after_free_read+0xf0/0x248
[   22.398396]  kunit_try_run_case+0x170/0x3f0
[   22.398437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.398482]  kthread+0x328/0x630
[   22.398586]  ret_from_fork+0x10/0x20
[   22.398626] 
[   22.398675] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.398771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.398802] Hardware name: linux,dummy-virt (DT)
[   22.398834] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   22.188404] ==================================================================
[   22.188546] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.188546] 
[   22.188630] Out-of-bounds write at 0x00000000b9af016b (1B left of kfence-#88):
[   22.188685]  test_out_of_bounds_write+0x100/0x240
[   22.188731]  kunit_try_run_case+0x170/0x3f0
[   22.188954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.189133]  kthread+0x328/0x630
[   22.189263]  ret_from_fork+0x10/0x20
[   22.189305] 
[   22.189330] kfence-#88: 0x000000007bc4ee7b-0x0000000088e5c103, size=32, cache=test
[   22.189330] 
[   22.189405] allocated by task 295 on cpu 1 at 22.188306s (0.001071s ago):
[   22.189489]  test_alloc+0x230/0x628
[   22.189552]  test_out_of_bounds_write+0xc8/0x240
[   22.189618]  kunit_try_run_case+0x170/0x3f0
[   22.189798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.189929]  kthread+0x328/0x630
[   22.190022]  ret_from_fork+0x10/0x20
[   22.190228] 
[   22.190309] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.190679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.190710] Hardware name: linux,dummy-virt (DT)
[   22.190840] ==================================================================
[   22.083088] ==================================================================
[   22.083286] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.083286] 
[   22.083533] Out-of-bounds write at 0x00000000f30a53c8 (1B left of kfence-#87):
[   22.083776]  test_out_of_bounds_write+0x100/0x240
[   22.083827]  kunit_try_run_case+0x170/0x3f0
[   22.083910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.084147]  kthread+0x328/0x630
[   22.084366]  ret_from_fork+0x10/0x20
[   22.084412] 
[   22.084439] kfence-#87: 0x000000008fb00e6c-0x00000000a48b0077, size=32, cache=kmalloc-32
[   22.084439] 
[   22.084492] allocated by task 293 on cpu 1 at 22.082321s (0.002167s ago):
[   22.085053]  test_alloc+0x29c/0x628
[   22.085294]  test_out_of_bounds_write+0xc8/0x240
[   22.085341]  kunit_try_run_case+0x170/0x3f0
[   22.085668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.085900]  kthread+0x328/0x630
[   22.085946]  ret_from_fork+0x10/0x20
[   22.085985] 
[   22.086375] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   22.086754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.086785] Hardware name: linux,dummy-virt (DT)
[   22.087373] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   21.558288] ==================================================================
[   21.558362] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.558362] 
[   21.558510] Out-of-bounds read at 0x00000000ff87c264 (32B right of kfence-#82):
[   21.558640]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.558688]  kunit_try_run_case+0x170/0x3f0
[   21.558732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.558822]  kthread+0x328/0x630
[   21.559013]  ret_from_fork+0x10/0x20
[   21.559055] 
[   21.559079] kfence-#82: 0x00000000536e7e02-0x0000000033aa4f4b, size=32, cache=kmalloc-32
[   21.559079] 
[   21.559132] allocated by task 289 on cpu 1 at 21.557920s (0.001208s ago):
[   21.559214]  test_alloc+0x29c/0x628
[   21.559255]  test_out_of_bounds_read+0x198/0x3e0
[   21.559345]  kunit_try_run_case+0x170/0x3f0
[   21.559389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.559473]  kthread+0x328/0x630
[   21.559654]  ret_from_fork+0x10/0x20
[   21.559842] 
[   21.559966] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.560223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.560255] Hardware name: linux,dummy-virt (DT)
[   21.560289] ==================================================================
[   21.976499] ==================================================================
[   21.976590] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.976590] 
[   21.976816] Out-of-bounds read at 0x00000000b655f1c9 (32B right of kfence-#86):
[   21.976997]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.977046]  kunit_try_run_case+0x170/0x3f0
[   21.977090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.977137]  kthread+0x328/0x630
[   21.977178]  ret_from_fork+0x10/0x20
[   21.977218] 
[   21.977242] kfence-#86: 0x00000000ed38628b-0x00000000a532fb20, size=32, cache=test
[   21.977242] 
[   21.977352] allocated by task 291 on cpu 1 at 21.976418s (0.000928s ago):
[   21.977425]  test_alloc+0x230/0x628
[   21.977493]  test_out_of_bounds_read+0x198/0x3e0
[   21.977670]  kunit_try_run_case+0x170/0x3f0
[   21.977713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.977760]  kthread+0x328/0x630
[   21.977806]  ret_from_fork+0x10/0x20
[   21.977933] 
[   21.977980] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.978121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.978153] Hardware name: linux,dummy-virt (DT)
[   21.978187] ==================================================================
[   21.454109] ==================================================================
[   21.454227] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.454227] 
[   21.454360] Out-of-bounds read at 0x00000000d5bd32b0 (1B left of kfence-#81):
[   21.454440]  test_out_of_bounds_read+0x114/0x3e0
[   21.454494]  kunit_try_run_case+0x170/0x3f0
[   21.454541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.455396]  kthread+0x328/0x630
[   21.455720]  ret_from_fork+0x10/0x20
[   21.455765] 
[   21.455797] kfence-#81: 0x0000000080740742-0x00000000777906ca, size=32, cache=kmalloc-32
[   21.455797] 
[   21.455871] allocated by task 289 on cpu 1 at 21.453789s (0.002078s ago):
[   21.455950]  test_alloc+0x29c/0x628
[   21.455991]  test_out_of_bounds_read+0xdc/0x3e0
[   21.456070]  kunit_try_run_case+0x170/0x3f0
[   21.456110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.456304]  kthread+0x328/0x630
[   21.456347]  ret_from_fork+0x10/0x20
[   21.456465] 
[   21.456655] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.456803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.456833] Hardware name: linux,dummy-virt (DT)
[   21.456882] ==================================================================
[   21.665044] ==================================================================
[   21.665122] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.665122] 
[   21.665202] Out-of-bounds read at 0x0000000076dc50e6 (1B left of kfence-#83):
[   21.665258]  test_out_of_bounds_read+0x114/0x3e0
[   21.665304]  kunit_try_run_case+0x170/0x3f0
[   21.665359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.665405]  kthread+0x328/0x630
[   21.665497]  ret_from_fork+0x10/0x20
[   21.665541] 
[   21.665565] kfence-#83: 0x000000007b5ea106-0x00000000d58a3477, size=32, cache=test
[   21.665565] 
[   21.665616] allocated by task 291 on cpu 1 at 21.664736s (0.000876s ago):
[   21.665994]  test_alloc+0x230/0x628
[   21.666044]  test_out_of_bounds_read+0xdc/0x3e0
[   21.666125]  kunit_try_run_case+0x170/0x3f0
[   21.666169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.666215]  kthread+0x328/0x630
[   21.666255]  ret_from_fork+0x10/0x20
[   21.666295] 
[   21.666420] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.666642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.666705] Hardware name: linux,dummy-virt (DT)
[   21.666786] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-rcu_uaf_reclaim
[   18.518028] ==================================================================
[   18.518173] BUG: KFENCE: use-after-free read in rcu_uaf_reclaim+0x48/0x70
[   18.518173] 
[   18.519451] Use-after-free read at 0x000000001a9dec98 (in kfence-#58):
[   18.519529]  rcu_uaf_reclaim+0x48/0x70
[   18.519575]  rcu_core+0x9f4/0x1e20
[   18.519913]  rcu_core_si+0x18/0x30
[   18.519982]  handle_softirqs+0x374/0xb28
[   18.520181]  __do_softirq+0x1c/0x28
[   18.520412]  ____do_softirq+0x18/0x30
[   18.520640]  call_on_irq_stack+0x24/0x30
[   18.520683]  do_softirq_own_stack+0x24/0x38
[   18.520896]  __irq_exit_rcu+0x1fc/0x318
[   18.521232]  irq_exit_rcu+0x1c/0x80
[   18.521433]  el1_interrupt+0x38/0x58
[   18.521665]  el1h_64_irq_handler+0x18/0x28
[   18.521884]  el1h_64_irq+0x6c/0x70
[   18.522149]  arch_local_irq_enable+0x4/0x8
[   18.522333]  do_idle+0x384/0x4e8
[   18.522401]  cpu_startup_entry+0x64/0x80
[   18.522478]  rest_init+0x160/0x188
[   18.522810]  start_kernel+0x308/0x3d0
[   18.523172]  __primary_switched+0x8c/0xa0
[   18.523435] 
[   18.523524] kfence-#58: 0x000000001a9dec98-0x000000001dcc1adb, size=24, cache=kmalloc-32
[   18.523524] 
[   18.523898] allocated by task 200 on cpu 0 at 18.289606s (0.234271s ago):
[   18.524053]  rcu_uaf+0xb0/0x2d8
[   18.524273]  kunit_try_run_case+0x170/0x3f0
[   18.524350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.524397]  kthread+0x328/0x630
[   18.524771]  ret_from_fork+0x10/0x20
[   18.525128] 
[   18.525367] freed by task 0 on cpu 0 at 18.516959s (0.008379s ago):
[   18.525668]  rcu_uaf_reclaim+0x28/0x70
[   18.525752]  rcu_core+0x9f4/0x1e20
[   18.525978]  rcu_core_si+0x18/0x30
[   18.526282]  handle_softirqs+0x374/0xb28
[   18.526586]  __do_softirq+0x1c/0x28
[   18.526716]  ____do_softirq+0x18/0x30
[   18.527104]  call_on_irq_stack+0x24/0x30
[   18.527175]  do_softirq_own_stack+0x24/0x38
[   18.527402]  __irq_exit_rcu+0x1fc/0x318
[   18.527702]  irq_exit_rcu+0x1c/0x80
[   18.527992]  el1_interrupt+0x38/0x58
[   18.528120]  el1h_64_irq_handler+0x18/0x28
[   18.528173]  el1h_64_irq+0x6c/0x70
[   18.528205]  arch_local_irq_enable+0x4/0x8
[   18.528240]  do_idle+0x384/0x4e8
[   18.528309]  cpu_startup_entry+0x64/0x80
[   18.528348]  rest_init+0x160/0x188
[   18.528402]  start_kernel+0x308/0x3d0
[   18.528446]  __primary_switched+0x8c/0xa0
[   18.528485] 
[   18.528536] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.528623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.528662] Hardware name: linux,dummy-virt (DT)
[   18.528695] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_in_memset
[   17.987502] ==================================================================
[   17.987553] BUG: KFENCE: memory corruption in kmalloc_oob_in_memset+0x160/0x2d0
[   17.987553] 
[   17.987610] Corrupted memory at 0x00000000661a9bfe [ ! ! ! ! ! ! ! ! ] (in kfence-#55):
[   17.990798]  kmalloc_oob_in_memset+0x160/0x2d0
[   17.990850]  kunit_try_run_case+0x170/0x3f0
[   17.990902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.990946]  kthread+0x328/0x630
[   17.990984]  ret_from_fork+0x10/0x20
[   17.991021] 
[   17.991041] kfence-#55: 0x00000000f473c568-0x0000000033a18902, size=120, cache=kmalloc-128
[   17.991041] 
[   17.992909] allocated by task 172 on cpu 0 at 17.979646s (0.011448s ago):
[   17.993002]  kmalloc_oob_in_memset+0xb0/0x2d0
[   17.993045]  kunit_try_run_case+0x170/0x3f0
[   17.994029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.994098]  kthread+0x328/0x630
[   17.994134]  ret_from_fork+0x10/0x20
[   17.994169] 
[   17.994793] freed by task 172 on cpu 0 at 17.987439s (0.007342s ago):
[   17.994882]  kmalloc_oob_in_memset+0x160/0x2d0
[   17.994923]  kunit_try_run_case+0x170/0x3f0
[   17.996050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996396]  kthread+0x328/0x630
[   17.996673]  ret_from_fork+0x10/0x20
[   17.997603] 
[   17.997689] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.997968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.997996] Hardware name: linux,dummy-virt (DT)
[   17.998028] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   17.655511] ==================================================================
[   17.655580] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488
[   17.655580] 
[   17.655639] Corrupted memory at 0x00000000e26f7236 [ ! . . . . . . . . . . . . . . . ] (in kfence-#52):
[   17.660693]  kmalloc_track_caller_oob_right+0x224/0x488
[   17.660974]  kunit_try_run_case+0x170/0x3f0
[   17.661492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.661674]  kthread+0x328/0x630
[   17.661718]  ret_from_fork+0x10/0x20
[   17.661800] 
[   17.663042] kfence-#52: 0x00000000c63ab083-0x000000005f51a22e, size=120, cache=kmalloc-128
[   17.663042] 
[   17.663963] allocated by task 144 on cpu 0 at 17.653975s (0.009814s ago):
[   17.664383]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.664463]  kunit_try_run_case+0x170/0x3f0
[   17.664504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.664687]  kthread+0x328/0x630
[   17.664731]  ret_from_fork+0x10/0x20
[   17.664851] 
[   17.665313] freed by task 144 on cpu 0 at 17.655005s (0.010063s ago):
[   17.665701]  kmalloc_track_caller_oob_right+0x224/0x488
[   17.665808]  kunit_try_run_case+0x170/0x3f0
[   17.665980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.666050]  kthread+0x328/0x630
[   17.666217]  ret_from_fork+0x10/0x20
[   17.666477] 
[   17.666559] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.666685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.666721] Hardware name: linux,dummy-virt (DT)
[   17.666758] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   21.116048] ==================================================================
[   21.116128] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   21.116308] Write of size 1 at addr fff00000c791de78 by task kunit_try_catch/287
[   21.116900] 
[   21.117082] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.117188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.117222] Hardware name: linux,dummy-virt (DT)
[   21.117468] Call trace:
[   21.117599]  show_stack+0x20/0x38 (C)
[   21.117957]  dump_stack_lvl+0x8c/0xd0
[   21.118101]  print_report+0x118/0x608
[   21.118285]  kasan_report+0xdc/0x128
[   21.118746]  __asan_report_store1_noabort+0x20/0x30
[   21.118924]  strncpy_from_user+0x270/0x2a0
[   21.119345]  copy_user_test_oob+0x5c0/0xec8
[   21.119476]  kunit_try_run_case+0x170/0x3f0
[   21.119632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.119701]  kthread+0x328/0x630
[   21.119751]  ret_from_fork+0x10/0x20
[   21.119837] 
[   21.119870] Allocated by task 287:
[   21.120333]  kasan_save_stack+0x3c/0x68
[   21.120472]  kasan_save_track+0x20/0x40
[   21.120647]  kasan_save_alloc_info+0x40/0x58
[   21.120794]  __kasan_kmalloc+0xd4/0xd8
[   21.120958]  __kmalloc_noprof+0x198/0x4c8
[   21.121000]  kunit_kmalloc_array+0x34/0x88
[   21.121055]  copy_user_test_oob+0xac/0xec8
[   21.121099]  kunit_try_run_case+0x170/0x3f0
[   21.121535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.121651]  kthread+0x328/0x630
[   21.122132]  ret_from_fork+0x10/0x20
[   21.122656] 
[   21.122710] The buggy address belongs to the object at fff00000c791de00
[   21.122710]  which belongs to the cache kmalloc-128 of size 128
[   21.123112] The buggy address is located 0 bytes to the right of
[   21.123112]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.123198] 
[   21.123526] The buggy address belongs to the physical page:
[   21.123641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.124455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.124650] page_type: f5(slab)
[   21.124702] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.124758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.125184] page dumped because: kasan: bad access detected
[   21.125389] 
[   21.125418] Memory state around the buggy address:
[   21.125455]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.125505]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.125586] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.125651]                                                                 ^
[   21.125707]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.125760]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.125813] ==================================================================
[   21.106438] ==================================================================
[   21.106491] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   21.106812] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.106903] 
[   21.106935] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.107021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.107069] Hardware name: linux,dummy-virt (DT)
[   21.107104] Call trace:
[   21.107128]  show_stack+0x20/0x38 (C)
[   21.107186]  dump_stack_lvl+0x8c/0xd0
[   21.107236]  print_report+0x118/0x608
[   21.107284]  kasan_report+0xdc/0x128
[   21.107333]  kasan_check_range+0x100/0x1a8
[   21.107383]  __kasan_check_write+0x20/0x30
[   21.107447]  strncpy_from_user+0x3c/0x2a0
[   21.107495]  copy_user_test_oob+0x5c0/0xec8
[   21.107542]  kunit_try_run_case+0x170/0x3f0
[   21.107593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.107649]  kthread+0x328/0x630
[   21.107696]  ret_from_fork+0x10/0x20
[   21.107754] 
[   21.107774] Allocated by task 287:
[   21.107804]  kasan_save_stack+0x3c/0x68
[   21.107862]  kasan_save_track+0x20/0x40
[   21.108438]  kasan_save_alloc_info+0x40/0x58
[   21.108816]  __kasan_kmalloc+0xd4/0xd8
[   21.108883]  __kmalloc_noprof+0x198/0x4c8
[   21.108922]  kunit_kmalloc_array+0x34/0x88
[   21.109561]  copy_user_test_oob+0xac/0xec8
[   21.109769]  kunit_try_run_case+0x170/0x3f0
[   21.109847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.109984]  kthread+0x328/0x630
[   21.110276]  ret_from_fork+0x10/0x20
[   21.110319] 
[   21.110565] The buggy address belongs to the object at fff00000c791de00
[   21.110565]  which belongs to the cache kmalloc-128 of size 128
[   21.110787] The buggy address is located 0 bytes inside of
[   21.110787]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.111019] 
[   21.111204] The buggy address belongs to the physical page:
[   21.111264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.111348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.112332] page_type: f5(slab)
[   21.112443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.112542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.112589] page dumped because: kasan: bad access detected
[   21.112763] 
[   21.112888] Memory state around the buggy address:
[   21.112963]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.113350]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.113518] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.113654]                                                                 ^
[   21.114047]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.114160]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.114319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   21.062909] ==================================================================
[   21.062989] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.063113] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.063230] 
[   21.063319] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.063448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.063871] Hardware name: linux,dummy-virt (DT)
[   21.064244] Call trace:
[   21.064332]  show_stack+0x20/0x38 (C)
[   21.064393]  dump_stack_lvl+0x8c/0xd0
[   21.064560]  print_report+0x118/0x608
[   21.064825]  kasan_report+0xdc/0x128
[   21.064905]  kasan_check_range+0x100/0x1a8
[   21.065426]  __kasan_check_write+0x20/0x30
[   21.065584]  copy_user_test_oob+0x35c/0xec8
[   21.065718]  kunit_try_run_case+0x170/0x3f0
[   21.065877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.066347]  kthread+0x328/0x630
[   21.066440]  ret_from_fork+0x10/0x20
[   21.066554] 
[   21.066585] Allocated by task 287:
[   21.066624]  kasan_save_stack+0x3c/0x68
[   21.066713]  kasan_save_track+0x20/0x40
[   21.066754]  kasan_save_alloc_info+0x40/0x58
[   21.066806]  __kasan_kmalloc+0xd4/0xd8
[   21.066873]  __kmalloc_noprof+0x198/0x4c8
[   21.066912]  kunit_kmalloc_array+0x34/0x88
[   21.066954]  copy_user_test_oob+0xac/0xec8
[   21.066998]  kunit_try_run_case+0x170/0x3f0
[   21.067040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.067095]  kthread+0x328/0x630
[   21.067143]  ret_from_fork+0x10/0x20
[   21.067199] 
[   21.067221] The buggy address belongs to the object at fff00000c791de00
[   21.067221]  which belongs to the cache kmalloc-128 of size 128
[   21.067299] The buggy address is located 0 bytes inside of
[   21.067299]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.067372] 
[   21.067405] The buggy address belongs to the physical page:
[   21.067452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.067507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.067564] page_type: f5(slab)
[   21.067610] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.067664] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.067714] page dumped because: kasan: bad access detected
[   21.067777] 
[   21.067806] Memory state around the buggy address:
[   21.067850]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.068114]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.068176] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.068221]                                                                 ^
[   21.068265]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069417]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069879] ==================================================================
[   21.082621] ==================================================================
[   21.082702] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.082779] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.082835] 
[   21.082881] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.082968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.082998] Hardware name: linux,dummy-virt (DT)
[   21.083031] Call trace:
[   21.083055]  show_stack+0x20/0x38 (C)
[   21.083105]  dump_stack_lvl+0x8c/0xd0
[   21.083161]  print_report+0x118/0x608
[   21.083231]  kasan_report+0xdc/0x128
[   21.083277]  kasan_check_range+0x100/0x1a8
[   21.083326]  __kasan_check_write+0x20/0x30
[   21.083375]  copy_user_test_oob+0x434/0xec8
[   21.083423]  kunit_try_run_case+0x170/0x3f0
[   21.083474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.083529]  kthread+0x328/0x630
[   21.083575]  ret_from_fork+0x10/0x20
[   21.083631] 
[   21.083652] Allocated by task 287:
[   21.083685]  kasan_save_stack+0x3c/0x68
[   21.083738]  kasan_save_track+0x20/0x40
[   21.083778]  kasan_save_alloc_info+0x40/0x58
[   21.083817]  __kasan_kmalloc+0xd4/0xd8
[   21.083865]  __kmalloc_noprof+0x198/0x4c8
[   21.083963]  kunit_kmalloc_array+0x34/0x88
[   21.084326]  copy_user_test_oob+0xac/0xec8
[   21.084817]  kunit_try_run_case+0x170/0x3f0
[   21.085272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.085334]  kthread+0x328/0x630
[   21.085373]  ret_from_fork+0x10/0x20
[   21.085740] 
[   21.086300] The buggy address belongs to the object at fff00000c791de00
[   21.086300]  which belongs to the cache kmalloc-128 of size 128
[   21.086500] The buggy address is located 0 bytes inside of
[   21.086500]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.086671] 
[   21.086695] The buggy address belongs to the physical page:
[   21.087047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.087498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.087653] page_type: f5(slab)
[   21.087921] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.088071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.088122] page dumped because: kasan: bad access detected
[   21.088159] 
[   21.088181] Memory state around the buggy address:
[   21.088673]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.089178]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.089248] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.089294]                                                                 ^
[   21.089916]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.090371]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.090576] ==================================================================
[   21.031606] ==================================================================
[   21.031710] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.032384] Write of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.032464] 
[   21.032749] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.032874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.033007] Hardware name: linux,dummy-virt (DT)
[   21.033076] Call trace:
[   21.033111]  show_stack+0x20/0x38 (C)
[   21.033191]  dump_stack_lvl+0x8c/0xd0
[   21.033288]  print_report+0x118/0x608
[   21.033354]  kasan_report+0xdc/0x128
[   21.033634]  kasan_check_range+0x100/0x1a8
[   21.033726]  __kasan_check_write+0x20/0x30
[   21.033802]  copy_user_test_oob+0x234/0xec8
[   21.034063]  kunit_try_run_case+0x170/0x3f0
[   21.034289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.034581]  kthread+0x328/0x630
[   21.034690]  ret_from_fork+0x10/0x20
[   21.035011] 
[   21.035378] Allocated by task 287:
[   21.035684]  kasan_save_stack+0x3c/0x68
[   21.036147]  kasan_save_track+0x20/0x40
[   21.036244]  kasan_save_alloc_info+0x40/0x58
[   21.036434]  __kasan_kmalloc+0xd4/0xd8
[   21.036677]  __kmalloc_noprof+0x198/0x4c8
[   21.036780]  kunit_kmalloc_array+0x34/0x88
[   21.036980]  copy_user_test_oob+0xac/0xec8
[   21.037164]  kunit_try_run_case+0x170/0x3f0
[   21.037409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.037644]  kthread+0x328/0x630
[   21.037732]  ret_from_fork+0x10/0x20
[   21.038127] 
[   21.038166] The buggy address belongs to the object at fff00000c791de00
[   21.038166]  which belongs to the cache kmalloc-128 of size 128
[   21.038329] The buggy address is located 0 bytes inside of
[   21.038329]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.038397] 
[   21.038424] The buggy address belongs to the physical page:
[   21.038459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.038524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.038580] page_type: f5(slab)
[   21.038636] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.038691] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.038753] page dumped because: kasan: bad access detected
[   21.038790] 
[   21.038818] Memory state around the buggy address:
[   21.038868]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.038916]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.038976] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.039019]                                                                 ^
[   21.039077]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039124]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039174] ==================================================================
[   21.045972] ==================================================================
[   21.046033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.046088] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.046621] 
[   21.046871] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.046974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.047260] Hardware name: linux,dummy-virt (DT)
[   21.047504] Call trace:
[   21.047531]  show_stack+0x20/0x38 (C)
[   21.047645]  dump_stack_lvl+0x8c/0xd0
[   21.047759]  print_report+0x118/0x608
[   21.048031]  kasan_report+0xdc/0x128
[   21.048276]  kasan_check_range+0x100/0x1a8
[   21.048549]  __kasan_check_read+0x20/0x30
[   21.048642]  copy_user_test_oob+0x728/0xec8
[   21.048826]  kunit_try_run_case+0x170/0x3f0
[   21.049317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049643]  kthread+0x328/0x630
[   21.049706]  ret_from_fork+0x10/0x20
[   21.050179] 
[   21.050483] Allocated by task 287:
[   21.050673]  kasan_save_stack+0x3c/0x68
[   21.051045]  kasan_save_track+0x20/0x40
[   21.051177]  kasan_save_alloc_info+0x40/0x58
[   21.051428]  __kasan_kmalloc+0xd4/0xd8
[   21.051626]  __kmalloc_noprof+0x198/0x4c8
[   21.051689]  kunit_kmalloc_array+0x34/0x88
[   21.051922]  copy_user_test_oob+0xac/0xec8
[   21.051976]  kunit_try_run_case+0x170/0x3f0
[   21.052271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.052430]  kthread+0x328/0x630
[   21.052491]  ret_from_fork+0x10/0x20
[   21.052553] 
[   21.052576] The buggy address belongs to the object at fff00000c791de00
[   21.052576]  which belongs to the cache kmalloc-128 of size 128
[   21.052647] The buggy address is located 0 bytes inside of
[   21.052647]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.052713] 
[   21.052744] The buggy address belongs to the physical page:
[   21.052778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.052833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.052906] page_type: f5(slab)
[   21.052952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.053008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.053077] page dumped because: kasan: bad access detected
[   21.053114] 
[   21.053135] Memory state around the buggy address:
[   21.053178]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.053228]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053285] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.053329]                                                                 ^
[   21.053390]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053442]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053503] ==================================================================
[   21.072249] ==================================================================
[   21.072309] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.072362] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.072416] 
[   21.072692] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.072956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.072988] Hardware name: linux,dummy-virt (DT)
[   21.073544] Call trace:
[   21.073586]  show_stack+0x20/0x38 (C)
[   21.073766]  dump_stack_lvl+0x8c/0xd0
[   21.073931]  print_report+0x118/0x608
[   21.073984]  kasan_report+0xdc/0x128
[   21.074047]  kasan_check_range+0x100/0x1a8
[   21.074097]  __kasan_check_read+0x20/0x30
[   21.074184]  copy_user_test_oob+0x3c8/0xec8
[   21.074525]  kunit_try_run_case+0x170/0x3f0
[   21.074793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.074869]  kthread+0x328/0x630
[   21.074918]  ret_from_fork+0x10/0x20
[   21.075090] 
[   21.075152] Allocated by task 287:
[   21.075189]  kasan_save_stack+0x3c/0x68
[   21.075234]  kasan_save_track+0x20/0x40
[   21.075591]  kasan_save_alloc_info+0x40/0x58
[   21.075809]  __kasan_kmalloc+0xd4/0xd8
[   21.075912]  __kmalloc_noprof+0x198/0x4c8
[   21.076003]  kunit_kmalloc_array+0x34/0x88
[   21.076139]  copy_user_test_oob+0xac/0xec8
[   21.076198]  kunit_try_run_case+0x170/0x3f0
[   21.076243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.076452]  kthread+0x328/0x630
[   21.077045]  ret_from_fork+0x10/0x20
[   21.077168] 
[   21.077226] The buggy address belongs to the object at fff00000c791de00
[   21.077226]  which belongs to the cache kmalloc-128 of size 128
[   21.077290] The buggy address is located 0 bytes inside of
[   21.077290]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.077657] 
[   21.077703] The buggy address belongs to the physical page:
[   21.077761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.078307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078451] page_type: f5(slab)
[   21.078565] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.078620] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.078961] page dumped because: kasan: bad access detected
[   21.079243] 
[   21.079327] Memory state around the buggy address:
[   21.079367]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.080340]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.080399] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.080443]                                                                 ^
[   21.080488]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.081007]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.081186] ==================================================================
[   21.094515] ==================================================================
[   21.095060] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.095131] Read of size 121 at addr fff00000c791de00 by task kunit_try_catch/287
[   21.095534] 
[   21.095700] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   21.095796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.096090] Hardware name: linux,dummy-virt (DT)
[   21.096175] Call trace:
[   21.096608]  show_stack+0x20/0x38 (C)
[   21.096784]  dump_stack_lvl+0x8c/0xd0
[   21.096994]  print_report+0x118/0x608
[   21.097104]  kasan_report+0xdc/0x128
[   21.097154]  kasan_check_range+0x100/0x1a8
[   21.097202]  __kasan_check_read+0x20/0x30
[   21.097255]  copy_user_test_oob+0x4a0/0xec8
[   21.097981]  kunit_try_run_case+0x170/0x3f0
[   21.098100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.098371]  kthread+0x328/0x630
[   21.098459]  ret_from_fork+0x10/0x20
[   21.098598] 
[   21.098620] Allocated by task 287:
[   21.098876]  kasan_save_stack+0x3c/0x68
[   21.099023]  kasan_save_track+0x20/0x40
[   21.099401]  kasan_save_alloc_info+0x40/0x58
[   21.099536]  __kasan_kmalloc+0xd4/0xd8
[   21.099581]  __kmalloc_noprof+0x198/0x4c8
[   21.099672]  kunit_kmalloc_array+0x34/0x88
[   21.099715]  copy_user_test_oob+0xac/0xec8
[   21.099777]  kunit_try_run_case+0x170/0x3f0
[   21.099820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.099880]  kthread+0x328/0x630
[   21.100159]  ret_from_fork+0x10/0x20
[   21.100614] 
[   21.100646] The buggy address belongs to the object at fff00000c791de00
[   21.100646]  which belongs to the cache kmalloc-128 of size 128
[   21.100710] The buggy address is located 0 bytes inside of
[   21.100710]  allocated 120-byte region [fff00000c791de00, fff00000c791de78)
[   21.100776] 
[   21.101384] The buggy address belongs to the physical page:
[   21.101682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   21.101962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.102359] page_type: f5(slab)
[   21.102404] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.102648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.103396] page dumped because: kasan: bad access detected
[   21.103603] 
[   21.103912] Memory state around the buggy address:
[   21.103967]  fff00000c791dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.104018]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.104066] >fff00000c791de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.104111]                                                                 ^
[   21.104486]  fff00000c791de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.104743]  fff00000c791df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.104795] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   20.978033] ==================================================================
[   20.978312] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.978486] Read of size 8 at addr fff00000c791dd78 by task kunit_try_catch/283
[   20.978580] 
[   20.978620] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.978831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.978978] Hardware name: linux,dummy-virt (DT)
[   20.979115] Call trace:
[   20.979171]  show_stack+0x20/0x38 (C)
[   20.979231]  dump_stack_lvl+0x8c/0xd0
[   20.979318]  print_report+0x118/0x608
[   20.979368]  kasan_report+0xdc/0x128
[   20.979414]  __asan_report_load8_noabort+0x20/0x30
[   20.979464]  copy_to_kernel_nofault+0x204/0x250
[   20.979514]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.979576]  kunit_try_run_case+0x170/0x3f0
[   20.979631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.979686]  kthread+0x328/0x630
[   20.979733]  ret_from_fork+0x10/0x20
[   20.979781] 
[   20.979808] Allocated by task 283:
[   20.979838]  kasan_save_stack+0x3c/0x68
[   20.980063]  kasan_save_track+0x20/0x40
[   20.980287]  kasan_save_alloc_info+0x40/0x58
[   20.980339]  __kasan_kmalloc+0xd4/0xd8
[   20.980379]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.980673]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.980913]  kunit_try_run_case+0x170/0x3f0
[   20.981097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.981346]  kthread+0x328/0x630
[   20.981631]  ret_from_fork+0x10/0x20
[   20.981748] 
[   20.981772] The buggy address belongs to the object at fff00000c791dd00
[   20.981772]  which belongs to the cache kmalloc-128 of size 128
[   20.981911] The buggy address is located 0 bytes to the right of
[   20.981911]  allocated 120-byte region [fff00000c791dd00, fff00000c791dd78)
[   20.982257] 
[   20.982346] The buggy address belongs to the physical page:
[   20.982411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.982589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.982747] page_type: f5(slab)
[   20.983028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.983088] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.983351] page dumped because: kasan: bad access detected
[   20.983392] 
[   20.983532] Memory state around the buggy address:
[   20.983620]  fff00000c791dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.983751]  fff00000c791dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.983801] >fff00000c791dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.984135]                                                                 ^
[   20.984202]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.984304]  fff00000c791de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.984402] ==================================================================
[   20.985700] ==================================================================
[   20.985997] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.986412] Write of size 8 at addr fff00000c791dd78 by task kunit_try_catch/283
[   20.986481] 
[   20.986541] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.986628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.986819] Hardware name: linux,dummy-virt (DT)
[   20.986964] Call trace:
[   20.987019]  show_stack+0x20/0x38 (C)
[   20.987074]  dump_stack_lvl+0x8c/0xd0
[   20.987366]  print_report+0x118/0x608
[   20.987478]  kasan_report+0xdc/0x128
[   20.987543]  kasan_check_range+0x100/0x1a8
[   20.987597]  __kasan_check_write+0x20/0x30
[   20.987653]  copy_to_kernel_nofault+0x8c/0x250
[   20.987712]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.987768]  kunit_try_run_case+0x170/0x3f0
[   20.987821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.988132]  kthread+0x328/0x630
[   20.988375]  ret_from_fork+0x10/0x20
[   20.989028] 
[   20.989130] Allocated by task 283:
[   20.989174]  kasan_save_stack+0x3c/0x68
[   20.989263]  kasan_save_track+0x20/0x40
[   20.989587]  kasan_save_alloc_info+0x40/0x58
[   20.989644]  __kasan_kmalloc+0xd4/0xd8
[   20.989849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.989953]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.990095]  kunit_try_run_case+0x170/0x3f0
[   20.990593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.990758]  kthread+0x328/0x630
[   20.990800]  ret_from_fork+0x10/0x20
[   20.990977] 
[   20.991169] The buggy address belongs to the object at fff00000c791dd00
[   20.991169]  which belongs to the cache kmalloc-128 of size 128
[   20.991273] The buggy address is located 0 bytes to the right of
[   20.991273]  allocated 120-byte region [fff00000c791dd00, fff00000c791dd78)
[   20.991613] 
[   20.991683] The buggy address belongs to the physical page:
[   20.991947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.992160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.992227] page_type: f5(slab)
[   20.992549] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.992619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.992840] page dumped because: kasan: bad access detected
[   20.992921] 
[   20.992944] Memory state around the buggy address:
[   20.992981]  fff00000c791dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.993045]  fff00000c791dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.993106] >fff00000c791dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.993150]                                                                 ^
[   20.993205]  fff00000c791dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.993262]  fff00000c791de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.993305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   20.935724] ==================================================================
[   20.935891] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   20.936223] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271
[   20.936360] 
[   20.936568] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.937078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.937203] Hardware name: linux,dummy-virt (DT)
[   20.937367] Call trace:
[   20.937490]  show_stack+0x20/0x38 (C)
[   20.937791]  dump_stack_lvl+0x8c/0xd0
[   20.938028]  print_report+0x310/0x608
[   20.938253]  kasan_report+0xdc/0x128
[   20.938397]  __asan_report_load1_noabort+0x20/0x30
[   20.938612]  vmalloc_oob+0x51c/0x5d0
[   20.938704]  kunit_try_run_case+0x170/0x3f0
[   20.938777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.938833]  kthread+0x328/0x630
[   20.938892]  ret_from_fork+0x10/0x20
[   20.938977] 
[   20.939007] The buggy address belongs to the virtual mapping at
[   20.939007]  [ffff80008010b000, ffff80008010d000) created by:
[   20.939007]  vmalloc_oob+0x98/0x5d0
[   20.939085] 
[   20.939106] The buggy address belongs to the physical page:
[   20.939139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791f
[   20.939208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.939281] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.939337] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.939384] page dumped because: kasan: bad access detected
[   20.939418] 
[   20.939447] Memory state around the buggy address:
[   20.939481]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.939539]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.939608] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.939664]                                                                 ^
[   20.939717]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.939763]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.939806] ==================================================================
[   20.931266] ==================================================================
[   20.931335] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   20.931397] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271
[   20.931451] 
[   20.931486] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.931589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.931620] Hardware name: linux,dummy-virt (DT)
[   20.931656] Call trace:
[   20.931679]  show_stack+0x20/0x38 (C)
[   20.931731]  dump_stack_lvl+0x8c/0xd0
[   20.931781]  print_report+0x310/0x608
[   20.931828]  kasan_report+0xdc/0x128
[   20.931886]  __asan_report_load1_noabort+0x20/0x30
[   20.931938]  vmalloc_oob+0x578/0x5d0
[   20.931984]  kunit_try_run_case+0x170/0x3f0
[   20.932035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.932090]  kthread+0x328/0x630
[   20.932166]  ret_from_fork+0x10/0x20
[   20.932589] 
[   20.932677] The buggy address belongs to the virtual mapping at
[   20.932677]  [ffff80008010b000, ffff80008010d000) created by:
[   20.932677]  vmalloc_oob+0x98/0x5d0
[   20.932874] 
[   20.932960] The buggy address belongs to the physical page:
[   20.932995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791f
[   20.933335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.933404] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.933550] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.933737] page dumped because: kasan: bad access detected
[   20.933923] 
[   20.934347] Memory state around the buggy address:
[   20.934403]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.934490]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.934537] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.934749]                                                              ^
[   20.934793]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.934840]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.934892] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.741104] ==================================================================
[   20.741157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.741209] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.741396] 
[   20.741533] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.741824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.741869] Hardware name: linux,dummy-virt (DT)
[   20.741928] Call trace:
[   20.741954]  show_stack+0x20/0x38 (C)
[   20.742350]  dump_stack_lvl+0x8c/0xd0
[   20.742427]  print_report+0x118/0x608
[   20.742476]  kasan_report+0xdc/0x128
[   20.742521]  kasan_check_range+0x100/0x1a8
[   20.742780]  __kasan_check_read+0x20/0x30
[   20.742914]  kasan_atomics_helper+0xdd4/0x4858
[   20.742971]  kasan_atomics+0x198/0x2e0
[   20.743265]  kunit_try_run_case+0x170/0x3f0
[   20.743357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.743426]  kthread+0x328/0x630
[   20.743698]  ret_from_fork+0x10/0x20
[   20.743779] 
[   20.743823] Allocated by task 267:
[   20.743864]  kasan_save_stack+0x3c/0x68
[   20.744032]  kasan_save_track+0x20/0x40
[   20.744108]  kasan_save_alloc_info+0x40/0x58
[   20.744253]  __kasan_kmalloc+0xd4/0xd8
[   20.744296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.744337]  kasan_atomics+0xb8/0x2e0
[   20.744381]  kunit_try_run_case+0x170/0x3f0
[   20.744658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.744757]  kthread+0x328/0x630
[   20.745509]  ret_from_fork+0x10/0x20
[   20.745602] 
[   20.745657] The buggy address belongs to the object at fff00000c7a67680
[   20.745657]  which belongs to the cache kmalloc-64 of size 64
[   20.745745] The buggy address is located 0 bytes to the right of
[   20.745745]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.745974] 
[   20.746179] The buggy address belongs to the physical page:
[   20.746240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.746384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.746485] page_type: f5(slab)
[   20.746765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.746882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.746986] page dumped because: kasan: bad access detected
[   20.747064] 
[   20.747470] Memory state around the buggy address:
[   20.747546]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.747602]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.747925] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.747975]                                      ^
[   20.748013]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748100]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748154] ==================================================================
[   20.777770] ==================================================================
[   20.778088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.778161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.778214] 
[   20.778491] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.778635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.778667] Hardware name: linux,dummy-virt (DT)
[   20.778707] Call trace:
[   20.778732]  show_stack+0x20/0x38 (C)
[   20.779056]  dump_stack_lvl+0x8c/0xd0
[   20.779138]  print_report+0x118/0x608
[   20.779304]  kasan_report+0xdc/0x128
[   20.779371]  kasan_check_range+0x100/0x1a8
[   20.779434]  __kasan_check_write+0x20/0x30
[   20.779485]  kasan_atomics_helper+0xf20/0x4858
[   20.779533]  kasan_atomics+0x198/0x2e0
[   20.779580]  kunit_try_run_case+0x170/0x3f0
[   20.779631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.779688]  kthread+0x328/0x630
[   20.779740]  ret_from_fork+0x10/0x20
[   20.779789] 
[   20.779818] Allocated by task 267:
[   20.779850]  kasan_save_stack+0x3c/0x68
[   20.779904]  kasan_save_track+0x20/0x40
[   20.779952]  kasan_save_alloc_info+0x40/0x58
[   20.779999]  __kasan_kmalloc+0xd4/0xd8
[   20.780038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.780078]  kasan_atomics+0xb8/0x2e0
[   20.780114]  kunit_try_run_case+0x170/0x3f0
[   20.780155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.780202]  kthread+0x328/0x630
[   20.780241]  ret_from_fork+0x10/0x20
[   20.780279] 
[   20.780301] The buggy address belongs to the object at fff00000c7a67680
[   20.780301]  which belongs to the cache kmalloc-64 of size 64
[   20.780362] The buggy address is located 0 bytes to the right of
[   20.780362]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.780428] 
[   20.780459] The buggy address belongs to the physical page:
[   20.780492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.780545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.780595] page_type: f5(slab)
[   20.780636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.780692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.780738] page dumped because: kasan: bad access detected
[   20.780782] 
[   20.780811] Memory state around the buggy address:
[   20.780845]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.781612]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.781681] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.781727]                                      ^
[   20.781763]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.781811]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.782632] ==================================================================
[   20.904915] ==================================================================
[   20.904966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.905015] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.905067] 
[   20.905096] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.905339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.905377] Hardware name: linux,dummy-virt (DT)
[   20.905411] Call trace:
[   20.905435]  show_stack+0x20/0x38 (C)
[   20.905486]  dump_stack_lvl+0x8c/0xd0
[   20.905533]  print_report+0x118/0x608
[   20.905704]  kasan_report+0xdc/0x128
[   20.905760]  kasan_check_range+0x100/0x1a8
[   20.905808]  __kasan_check_write+0x20/0x30
[   20.906038]  kasan_atomics_helper+0x175c/0x4858
[   20.906182]  kasan_atomics+0x198/0x2e0
[   20.906365]  kunit_try_run_case+0x170/0x3f0
[   20.906488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.906546]  kthread+0x328/0x630
[   20.906591]  ret_from_fork+0x10/0x20
[   20.906639] 
[   20.906661] Allocated by task 267:
[   20.906689]  kasan_save_stack+0x3c/0x68
[   20.906920]  kasan_save_track+0x20/0x40
[   20.907070]  kasan_save_alloc_info+0x40/0x58
[   20.907114]  __kasan_kmalloc+0xd4/0xd8
[   20.907160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.907212]  kasan_atomics+0xb8/0x2e0
[   20.907250]  kunit_try_run_case+0x170/0x3f0
[   20.907291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.907338]  kthread+0x328/0x630
[   20.907376]  ret_from_fork+0x10/0x20
[   20.907413] 
[   20.907434] The buggy address belongs to the object at fff00000c7a67680
[   20.907434]  which belongs to the cache kmalloc-64 of size 64
[   20.907495] The buggy address is located 0 bytes to the right of
[   20.907495]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.907564] 
[   20.907586] The buggy address belongs to the physical page:
[   20.907618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.907682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.907733] page_type: f5(slab)
[   20.907784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.907840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.908276] page dumped because: kasan: bad access detected
[   20.908413] 
[   20.908435] Memory state around the buggy address:
[   20.908469]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.908722]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.908795] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.908837]                                      ^
[   20.908883]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.908931]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.908973] ==================================================================
[   20.884633] ==================================================================
[   20.884681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.884728] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.884945] 
[   20.885001] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.885088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.885117] Hardware name: linux,dummy-virt (DT)
[   20.885150] Call trace:
[   20.885173]  show_stack+0x20/0x38 (C)
[   20.885375]  dump_stack_lvl+0x8c/0xd0
[   20.885428]  print_report+0x118/0x608
[   20.885474]  kasan_report+0xdc/0x128
[   20.885629]  kasan_check_range+0x100/0x1a8
[   20.885731]  __kasan_check_write+0x20/0x30
[   20.885782]  kasan_atomics_helper+0x1644/0x4858
[   20.885964]  kasan_atomics+0x198/0x2e0
[   20.886039]  kunit_try_run_case+0x170/0x3f0
[   20.886091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.886153]  kthread+0x328/0x630
[   20.886355]  ret_from_fork+0x10/0x20
[   20.886561] 
[   20.886647] Allocated by task 267:
[   20.886743]  kasan_save_stack+0x3c/0x68
[   20.886818]  kasan_save_track+0x20/0x40
[   20.886886]  kasan_save_alloc_info+0x40/0x58
[   20.886928]  __kasan_kmalloc+0xd4/0xd8
[   20.886965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.887013]  kasan_atomics+0xb8/0x2e0
[   20.887049]  kunit_try_run_case+0x170/0x3f0
[   20.887091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.887137]  kthread+0x328/0x630
[   20.887179]  ret_from_fork+0x10/0x20
[   20.887217] 
[   20.887248] The buggy address belongs to the object at fff00000c7a67680
[   20.887248]  which belongs to the cache kmalloc-64 of size 64
[   20.887317] The buggy address is located 0 bytes to the right of
[   20.887317]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.887393] 
[   20.887423] The buggy address belongs to the physical page:
[   20.887457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.887511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.887560] page_type: f5(slab)
[   20.887599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.887800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.887921] page dumped because: kasan: bad access detected
[   20.888070] 
[   20.888093] Memory state around the buggy address:
[   20.888129]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.888193]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.888240] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.888284]                                      ^
[   20.888319]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.888387]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.888430] ==================================================================
[   20.662827] ==================================================================
[   20.662944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.663108] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.663197] 
[   20.663469] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.663589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.663739]  dump_stack_lvl+0x8c/0xd0
[   20.666233]  __kasan_kmalloc+0xd4/0xd8
[   20.666443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.666519]  kasan_atomics+0xb8/0x2e0
[   20.666884]  kunit_try_run_case+0x170/0x3f0
[   20.666965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.667138]  kthread+0x328/0x630
[   20.667325]  ret_from_fork+0x10/0x20
[   20.667430] 
[   20.667534] The buggy address belongs to the object at fff00000c7a67680
[   20.667534]  which belongs to the cache kmalloc-64 of size 64
[   20.667839] The buggy address is located 0 bytes to the right of
[   20.667839]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.668272] 
[   20.668603] The buggy address belongs to the physical page:
[   20.668653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.668713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.668765] page_type: f5(slab)
[   20.668807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.669128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.669669] 
[   20.670068]                                      ^
[   20.672488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.674708] 
[   20.674885]  kasan_save_stack+0x3c/0x68
[   20.675428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.675469]  kasan_atomics+0xb8/0x2e0
[   20.675506]  kunit_try_run_case+0x170/0x3f0
[   20.675547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.675806] The buggy address is located 0 bytes to the right of
[   20.675806]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.677355] page dumped because: kasan: bad access detected
[   20.678144]                                      ^
[   20.679645] ==================================================================
[   20.717248] ==================================================================
[   20.717332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.717387] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.717539] 
[   20.717590] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.717872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.718261] Hardware name: linux,dummy-virt (DT)
[   20.718419] Call trace:
[   20.718468]  show_stack+0x20/0x38 (C)
[   20.718553]  dump_stack_lvl+0x8c/0xd0
[   20.718607]  print_report+0x118/0x608
[   20.718715]  kasan_report+0xdc/0x128
[   20.718760]  __asan_report_load4_noabort+0x20/0x30
[   20.718814]  kasan_atomics_helper+0x3dd8/0x4858
[   20.719038]  kasan_atomics+0x198/0x2e0
[   20.719099]  kunit_try_run_case+0x170/0x3f0
[   20.719167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.719557]  kthread+0x328/0x630
[   20.719699]  ret_from_fork+0x10/0x20
[   20.719815] 
[   20.719844] Allocated by task 267:
[   20.719890]  kasan_save_stack+0x3c/0x68
[   20.720154]  kasan_save_track+0x20/0x40
[   20.720367]  kasan_save_alloc_info+0x40/0x58
[   20.720417]  __kasan_kmalloc+0xd4/0xd8
[   20.720455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.720494]  kasan_atomics+0xb8/0x2e0
[   20.720531]  kunit_try_run_case+0x170/0x3f0
[   20.720573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720620]  kthread+0x328/0x630
[   20.720914]  ret_from_fork+0x10/0x20
[   20.721036] 
[   20.721202] The buggy address belongs to the object at fff00000c7a67680
[   20.721202]  which belongs to the cache kmalloc-64 of size 64
[   20.721498] The buggy address is located 0 bytes to the right of
[   20.721498]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.721594] 
[   20.722025] The buggy address belongs to the physical page:
[   20.722088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.722354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.722698] page_type: f5(slab)
[   20.722768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.723228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.723301] page dumped because: kasan: bad access detected
[   20.723620] 
[   20.723678] Memory state around the buggy address:
[   20.723765]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.724073]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.724149] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.724370]                                      ^
[   20.724577]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724631]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724830] ==================================================================
[   20.850515] ==================================================================
[   20.850560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.850847] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.850926] 
[   20.851067] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.851177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.851209] Hardware name: linux,dummy-virt (DT)
[   20.851243] Call trace:
[   20.851272]  show_stack+0x20/0x38 (C)
[   20.851324]  dump_stack_lvl+0x8c/0xd0
[   20.851390]  print_report+0x118/0x608
[   20.851488]  kasan_report+0xdc/0x128
[   20.851553]  __asan_report_load8_noabort+0x20/0x30
[   20.851606]  kasan_atomics_helper+0x3f04/0x4858
[   20.851654]  kasan_atomics+0x198/0x2e0
[   20.851701]  kunit_try_run_case+0x170/0x3f0
[   20.851789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.851867]  kthread+0x328/0x630
[   20.852009]  ret_from_fork+0x10/0x20
[   20.852289] 
[   20.852312] Allocated by task 267:
[   20.852438]  kasan_save_stack+0x3c/0x68
[   20.852599]  kasan_save_track+0x20/0x40
[   20.852647]  kasan_save_alloc_info+0x40/0x58
[   20.852688]  __kasan_kmalloc+0xd4/0xd8
[   20.852731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.852776]  kasan_atomics+0xb8/0x2e0
[   20.852812]  kunit_try_run_case+0x170/0x3f0
[   20.852868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853059]  kthread+0x328/0x630
[   20.853099]  ret_from_fork+0x10/0x20
[   20.853137] 
[   20.853159] The buggy address belongs to the object at fff00000c7a67680
[   20.853159]  which belongs to the cache kmalloc-64 of size 64
[   20.853220] The buggy address is located 0 bytes to the right of
[   20.853220]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.853289] 
[   20.853310] The buggy address belongs to the physical page:
[   20.853453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.853609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.853704] page_type: f5(slab)
[   20.853871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.854131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.854374] page dumped because: kasan: bad access detected
[   20.854593] 
[   20.854661] Memory state around the buggy address:
[   20.854696]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.854746]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.854936] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.855138]                                      ^
[   20.855229]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855330]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855463] ==================================================================
[   20.900699] ==================================================================
[   20.900749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.900798] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.900851] 
[   20.900895] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.900980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.901127] Hardware name: linux,dummy-virt (DT)
[   20.901167] Call trace:
[   20.901191]  show_stack+0x20/0x38 (C)
[   20.901497]  dump_stack_lvl+0x8c/0xd0
[   20.901567]  print_report+0x118/0x608
[   20.901617]  kasan_report+0xdc/0x128
[   20.901663]  __asan_report_load8_noabort+0x20/0x30
[   20.901815]  kasan_atomics_helper+0x3e10/0x4858
[   20.902037]  kasan_atomics+0x198/0x2e0
[   20.902100]  kunit_try_run_case+0x170/0x3f0
[   20.902151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902208]  kthread+0x328/0x630
[   20.902305]  ret_from_fork+0x10/0x20
[   20.902438] 
[   20.902486] Allocated by task 267:
[   20.902562]  kasan_save_stack+0x3c/0x68
[   20.902604]  kasan_save_track+0x20/0x40
[   20.902641]  kasan_save_alloc_info+0x40/0x58
[   20.902682]  __kasan_kmalloc+0xd4/0xd8
[   20.902717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.902792]  kasan_atomics+0xb8/0x2e0
[   20.902828]  kunit_try_run_case+0x170/0x3f0
[   20.902881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.903055]  kthread+0x328/0x630
[   20.903257]  ret_from_fork+0x10/0x20
[   20.903314] 
[   20.903336] The buggy address belongs to the object at fff00000c7a67680
[   20.903336]  which belongs to the cache kmalloc-64 of size 64
[   20.903397] The buggy address is located 0 bytes to the right of
[   20.903397]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.903465] 
[   20.903487] The buggy address belongs to the physical page:
[   20.903519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.903694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.903762] page_type: f5(slab)
[   20.903819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.903900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.903949] page dumped because: kasan: bad access detected
[   20.903982] 
[   20.904005] Memory state around the buggy address:
[   20.904060]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.904110]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.904270] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.904452]                                      ^
[   20.904538]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904585]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904641] ==================================================================
[   20.869635] ==================================================================
[   20.869687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.869763] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.869872] 
[   20.869920] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.870008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.870038] Hardware name: linux,dummy-virt (DT)
[   20.870071] Call trace:
[   20.870095]  show_stack+0x20/0x38 (C)
[   20.870182]  dump_stack_lvl+0x8c/0xd0
[   20.870339]  print_report+0x118/0x608
[   20.870413]  kasan_report+0xdc/0x128
[   20.870539]  kasan_check_range+0x100/0x1a8
[   20.870635]  __kasan_check_write+0x20/0x30
[   20.870757]  kasan_atomics_helper+0x154c/0x4858
[   20.870832]  kasan_atomics+0x198/0x2e0
[   20.870931]  kunit_try_run_case+0x170/0x3f0
[   20.870987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.871071]  kthread+0x328/0x630
[   20.871119]  ret_from_fork+0x10/0x20
[   20.871179] 
[   20.871227] Allocated by task 267:
[   20.871264]  kasan_save_stack+0x3c/0x68
[   20.871424]  kasan_save_track+0x20/0x40
[   20.871465]  kasan_save_alloc_info+0x40/0x58
[   20.871504]  __kasan_kmalloc+0xd4/0xd8
[   20.871663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.871710]  kasan_atomics+0xb8/0x2e0
[   20.871804]  kunit_try_run_case+0x170/0x3f0
[   20.871846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.872073]  kthread+0x328/0x630
[   20.872315]  ret_from_fork+0x10/0x20
[   20.872515] 
[   20.872623] The buggy address belongs to the object at fff00000c7a67680
[   20.872623]  which belongs to the cache kmalloc-64 of size 64
[   20.872687] The buggy address is located 0 bytes to the right of
[   20.872687]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.872826] 
[   20.872871] The buggy address belongs to the physical page:
[   20.872905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.873020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.873211] page_type: f5(slab)
[   20.873337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.873446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.873493] page dumped because: kasan: bad access detected
[   20.873703] 
[   20.873725] Memory state around the buggy address:
[   20.873758]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873807]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873863] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.873908]                                      ^
[   20.873942]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.874098]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.874224] ==================================================================
[   20.783333] ==================================================================
[   20.783385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.783790] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.783968] 
[   20.784022] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.784117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.784148] Hardware name: linux,dummy-virt (DT)
[   20.784298] Call trace:
[   20.784522]  show_stack+0x20/0x38 (C)
[   20.784878]  dump_stack_lvl+0x8c/0xd0
[   20.785032]  print_report+0x118/0x608
[   20.785174]  kasan_report+0xdc/0x128
[   20.785227]  kasan_check_range+0x100/0x1a8
[   20.785697]  __kasan_check_write+0x20/0x30
[   20.785764]  kasan_atomics_helper+0xf88/0x4858
[   20.785945]  kasan_atomics+0x198/0x2e0
[   20.786060]  kunit_try_run_case+0x170/0x3f0
[   20.786117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.786443]  kthread+0x328/0x630
[   20.786567]  ret_from_fork+0x10/0x20
[   20.787118] 
[   20.787204] Allocated by task 267:
[   20.787391]  kasan_save_stack+0x3c/0x68
[   20.787492]  kasan_save_track+0x20/0x40
[   20.787538]  kasan_save_alloc_info+0x40/0x58
[   20.787948]  __kasan_kmalloc+0xd4/0xd8
[   20.788049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.788354]  kasan_atomics+0xb8/0x2e0
[   20.788469]  kunit_try_run_case+0x170/0x3f0
[   20.788595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.788759]  kthread+0x328/0x630
[   20.788917]  ret_from_fork+0x10/0x20
[   20.788982] 
[   20.789006] The buggy address belongs to the object at fff00000c7a67680
[   20.789006]  which belongs to the cache kmalloc-64 of size 64
[   20.789076] The buggy address is located 0 bytes to the right of
[   20.789076]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.789450] 
[   20.789507] The buggy address belongs to the physical page:
[   20.789576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.790025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.790120] page_type: f5(slab)
[   20.790163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.790486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.790659] page dumped because: kasan: bad access detected
[   20.790836] 
[   20.790932] Memory state around the buggy address:
[   20.791053]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.791103]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.791405] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.791893]                                      ^
[   20.791961]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792125]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792170] ==================================================================
[   20.889069] ==================================================================
[   20.889120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.889382] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.889437] 
[   20.889587] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.889712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.889814] Hardware name: linux,dummy-virt (DT)
[   20.889848] Call trace:
[   20.889935]  show_stack+0x20/0x38 (C)
[   20.890037]  dump_stack_lvl+0x8c/0xd0
[   20.890121]  print_report+0x118/0x608
[   20.890217]  kasan_report+0xdc/0x128
[   20.890432]  __asan_report_load8_noabort+0x20/0x30
[   20.890484]  kasan_atomics_helper+0x3df4/0x4858
[   20.890533]  kasan_atomics+0x198/0x2e0
[   20.890596]  kunit_try_run_case+0x170/0x3f0
[   20.890673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.890826]  kthread+0x328/0x630
[   20.891086]  ret_from_fork+0x10/0x20
[   20.891290] 
[   20.891312] Allocated by task 267:
[   20.891343]  kasan_save_stack+0x3c/0x68
[   20.891532]  kasan_save_track+0x20/0x40
[   20.891675]  kasan_save_alloc_info+0x40/0x58
[   20.891719]  __kasan_kmalloc+0xd4/0xd8
[   20.891775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.891954]  kasan_atomics+0xb8/0x2e0
[   20.892048]  kunit_try_run_case+0x170/0x3f0
[   20.892150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.892199]  kthread+0x328/0x630
[   20.892236]  ret_from_fork+0x10/0x20
[   20.892506] 
[   20.892532] The buggy address belongs to the object at fff00000c7a67680
[   20.892532]  which belongs to the cache kmalloc-64 of size 64
[   20.892594] The buggy address is located 0 bytes to the right of
[   20.892594]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.892682] 
[   20.892750] The buggy address belongs to the physical page:
[   20.892911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.892973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.893039] page_type: f5(slab)
[   20.893081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.893139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.893190] page dumped because: kasan: bad access detected
[   20.893239] 
[   20.893260] Memory state around the buggy address:
[   20.893293]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.893342]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.893400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.893454]                                      ^
[   20.893489]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.893546]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.893600] ==================================================================
[   20.879413] ==================================================================
[   20.879462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.879510] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.879564] 
[   20.879593] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.879733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.879840] Hardware name: linux,dummy-virt (DT)
[   20.879897] Call trace:
[   20.879922]  show_stack+0x20/0x38 (C)
[   20.879987]  dump_stack_lvl+0x8c/0xd0
[   20.880073]  print_report+0x118/0x608
[   20.880142]  kasan_report+0xdc/0x128
[   20.880238]  __asan_report_load8_noabort+0x20/0x30
[   20.880525]  kasan_atomics_helper+0x3db0/0x4858
[   20.880705]  kasan_atomics+0x198/0x2e0
[   20.880789]  kunit_try_run_case+0x170/0x3f0
[   20.880939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.881033]  kthread+0x328/0x630
[   20.881162]  ret_from_fork+0x10/0x20
[   20.881271] 
[   20.881393] Allocated by task 267:
[   20.881461]  kasan_save_stack+0x3c/0x68
[   20.881564]  kasan_save_track+0x20/0x40
[   20.881763]  kasan_save_alloc_info+0x40/0x58
[   20.881825]  __kasan_kmalloc+0xd4/0xd8
[   20.881870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.882086]  kasan_atomics+0xb8/0x2e0
[   20.882121]  kunit_try_run_case+0x170/0x3f0
[   20.882164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882331]  kthread+0x328/0x630
[   20.882619]  ret_from_fork+0x10/0x20
[   20.882705] 
[   20.882781] The buggy address belongs to the object at fff00000c7a67680
[   20.882781]  which belongs to the cache kmalloc-64 of size 64
[   20.883314] The buggy address is located 0 bytes to the right of
[   20.883314]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.883429] 
[   20.883513] The buggy address belongs to the physical page:
[   20.883693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.883778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.883830] page_type: f5(slab)
[   20.883878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.883935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.883982] page dumped because: kasan: bad access detected
[   20.884016] 
[   20.884037] Memory state around the buggy address:
[   20.884082]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.884182]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.884229] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.884273]                                      ^
[   20.884309]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.884365]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.884408] ==================================================================
[   20.828476] ==================================================================
[   20.828527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.828584] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.828784] 
[   20.828818] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.829224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.829443] Hardware name: linux,dummy-virt (DT)
[   20.829490] Call trace:
[   20.829514]  show_stack+0x20/0x38 (C)
[   20.829566]  dump_stack_lvl+0x8c/0xd0
[   20.829617]  print_report+0x118/0x608
[   20.829662]  kasan_report+0xdc/0x128
[   20.830138]  kasan_check_range+0x100/0x1a8
[   20.830252]  __kasan_check_write+0x20/0x30
[   20.830302]  kasan_atomics_helper+0x11f8/0x4858
[   20.830350]  kasan_atomics+0x198/0x2e0
[   20.830396]  kunit_try_run_case+0x170/0x3f0
[   20.830446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.830502]  kthread+0x328/0x630
[   20.830549]  ret_from_fork+0x10/0x20
[   20.830597] 
[   20.830618] Allocated by task 267:
[   20.830647]  kasan_save_stack+0x3c/0x68
[   20.830688]  kasan_save_track+0x20/0x40
[   20.830725]  kasan_save_alloc_info+0x40/0x58
[   20.830777]  __kasan_kmalloc+0xd4/0xd8
[   20.830814]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.830866]  kasan_atomics+0xb8/0x2e0
[   20.830901]  kunit_try_run_case+0x170/0x3f0
[   20.830983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.831064]  kthread+0x328/0x630
[   20.831290]  ret_from_fork+0x10/0x20
[   20.831392] 
[   20.831417] The buggy address belongs to the object at fff00000c7a67680
[   20.831417]  which belongs to the cache kmalloc-64 of size 64
[   20.831507] The buggy address is located 0 bytes to the right of
[   20.831507]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.831607] 
[   20.831695] The buggy address belongs to the physical page:
[   20.831730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.831833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.831905] page_type: f5(slab)
[   20.832023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.832137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.832325] page dumped because: kasan: bad access detected
[   20.832361] 
[   20.832382] Memory state around the buggy address:
[   20.832673]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.832735]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.832783] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.832827]                                      ^
[   20.832902]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.832989]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.833134] ==================================================================
[   20.909623] ==================================================================
[   20.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.909779] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.909832] 
[   20.909877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.910056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.910184] Hardware name: linux,dummy-virt (DT)
[   20.910219] Call trace:
[   20.910241]  show_stack+0x20/0x38 (C)
[   20.910294]  dump_stack_lvl+0x8c/0xd0
[   20.910342]  print_report+0x118/0x608
[   20.910391]  kasan_report+0xdc/0x128
[   20.910438]  __asan_report_load8_noabort+0x20/0x30
[   20.910488]  kasan_atomics_helper+0x3e20/0x4858
[   20.910651]  kasan_atomics+0x198/0x2e0
[   20.910707]  kunit_try_run_case+0x170/0x3f0
[   20.910759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.910851]  kthread+0x328/0x630
[   20.911038]  ret_from_fork+0x10/0x20
[   20.911127] 
[   20.911254] Allocated by task 267:
[   20.911290]  kasan_save_stack+0x3c/0x68
[   20.911332]  kasan_save_track+0x20/0x40
[   20.911370]  kasan_save_alloc_info+0x40/0x58
[   20.911411]  __kasan_kmalloc+0xd4/0xd8
[   20.911448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.911487]  kasan_atomics+0xb8/0x2e0
[   20.911523]  kunit_try_run_case+0x170/0x3f0
[   20.911582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.911739]  kthread+0x328/0x630
[   20.911951]  ret_from_fork+0x10/0x20
[   20.911998] 
[   20.912019] The buggy address belongs to the object at fff00000c7a67680
[   20.912019]  which belongs to the cache kmalloc-64 of size 64
[   20.912080] The buggy address is located 0 bytes to the right of
[   20.912080]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.912149] 
[   20.912171] The buggy address belongs to the physical page:
[   20.912204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.912258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.912310] page_type: f5(slab)
[   20.912349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.912405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.912451] page dumped because: kasan: bad access detected
[   20.912486] 
[   20.912507] Memory state around the buggy address:
[   20.912540]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.912588]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.912636] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.912679]                                      ^
[   20.912713]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.912761]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.912804] ==================================================================
[   20.893817] ==================================================================
[   20.893880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.893954] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.894251] 
[   20.894291] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.894378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.894431] Hardware name: linux,dummy-virt (DT)
[   20.894463] Call trace:
[   20.894487]  show_stack+0x20/0x38 (C)
[   20.894552]  dump_stack_lvl+0x8c/0xd0
[   20.894604]  print_report+0x118/0x608
[   20.894651]  kasan_report+0xdc/0x128
[   20.894696]  kasan_check_range+0x100/0x1a8
[   20.894943]  __kasan_check_write+0x20/0x30
[   20.895002]  kasan_atomics_helper+0x16d0/0x4858
[   20.895087]  kasan_atomics+0x198/0x2e0
[   20.895165]  kunit_try_run_case+0x170/0x3f0
[   20.895325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.895556]  kthread+0x328/0x630
[   20.895611]  ret_from_fork+0x10/0x20
[   20.895716] 
[   20.895764] Allocated by task 267:
[   20.895954]  kasan_save_stack+0x3c/0x68
[   20.896076]  kasan_save_track+0x20/0x40
[   20.896117]  kasan_save_alloc_info+0x40/0x58
[   20.896157]  __kasan_kmalloc+0xd4/0xd8
[   20.896333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.896373]  kasan_atomics+0xb8/0x2e0
[   20.896410]  kunit_try_run_case+0x170/0x3f0
[   20.896450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.896704]  kthread+0x328/0x630
[   20.896839]  ret_from_fork+0x10/0x20
[   20.896997] 
[   20.897114] The buggy address belongs to the object at fff00000c7a67680
[   20.897114]  which belongs to the cache kmalloc-64 of size 64
[   20.897253] The buggy address is located 0 bytes to the right of
[   20.897253]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.897694] 
[   20.897793] The buggy address belongs to the physical page:
[   20.897944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.898050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.898342] page_type: f5(slab)
[   20.898387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.898540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.898745] page dumped because: kasan: bad access detected
[   20.898897] 
[   20.898918] Memory state around the buggy address:
[   20.898951]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.899006]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.899400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.899536]                                      ^
[   20.899573]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.899721]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.900023] ==================================================================
[   20.732369] ==================================================================
[   20.732422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.732475] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.732537] 
[   20.732567] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.732651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.732690] Hardware name: linux,dummy-virt (DT)
[   20.732724] Call trace:
[   20.732747]  show_stack+0x20/0x38 (C)
[   20.732805]  dump_stack_lvl+0x8c/0xd0
[   20.732867]  print_report+0x118/0x608
[   20.732913]  kasan_report+0xdc/0x128
[   20.732960]  __asan_report_load4_noabort+0x20/0x30
[   20.733011]  kasan_atomics_helper+0x3e04/0x4858
[   20.733059]  kasan_atomics+0x198/0x2e0
[   20.733105]  kunit_try_run_case+0x170/0x3f0
[   20.733904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.734012]  kthread+0x328/0x630
[   20.734064]  ret_from_fork+0x10/0x20
[   20.734325] 
[   20.734361] Allocated by task 267:
[   20.734411]  kasan_save_stack+0x3c/0x68
[   20.734521]  kasan_save_track+0x20/0x40
[   20.734578]  kasan_save_alloc_info+0x40/0x58
[   20.734619]  __kasan_kmalloc+0xd4/0xd8
[   20.734658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.734960]  kasan_atomics+0xb8/0x2e0
[   20.735042]  kunit_try_run_case+0x170/0x3f0
[   20.735087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.735403]  kthread+0x328/0x630
[   20.735531]  ret_from_fork+0x10/0x20
[   20.735575] 
[   20.735597] The buggy address belongs to the object at fff00000c7a67680
[   20.735597]  which belongs to the cache kmalloc-64 of size 64
[   20.735684] The buggy address is located 0 bytes to the right of
[   20.735684]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.735989] 
[   20.736086] The buggy address belongs to the physical page:
[   20.736405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.736594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.736662] page_type: f5(slab)
[   20.736879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.736951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.737148] page dumped because: kasan: bad access detected
[   20.737274] 
[   20.737437] Memory state around the buggy address:
[   20.737684]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.737740]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.737804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.738116]                                      ^
[   20.738185]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.738507]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.738582] ==================================================================
[   20.865579] ==================================================================
[   20.865637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.865688] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.865741] 
[   20.865770] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.865876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.865915] Hardware name: linux,dummy-virt (DT)
[   20.865948] Call trace:
[   20.865983]  show_stack+0x20/0x38 (C)
[   20.866033]  dump_stack_lvl+0x8c/0xd0
[   20.866089]  print_report+0x118/0x608
[   20.866137]  kasan_report+0xdc/0x128
[   20.866181]  kasan_check_range+0x100/0x1a8
[   20.866231]  __kasan_check_write+0x20/0x30
[   20.866278]  kasan_atomics_helper+0x14e4/0x4858
[   20.866326]  kasan_atomics+0x198/0x2e0
[   20.866371]  kunit_try_run_case+0x170/0x3f0
[   20.866419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866483]  kthread+0x328/0x630
[   20.866529]  ret_from_fork+0x10/0x20
[   20.866583] 
[   20.866609] Allocated by task 267:
[   20.866644]  kasan_save_stack+0x3c/0x68
[   20.866684]  kasan_save_track+0x20/0x40
[   20.866724]  kasan_save_alloc_info+0x40/0x58
[   20.866763]  __kasan_kmalloc+0xd4/0xd8
[   20.866800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.866839]  kasan_atomics+0xb8/0x2e0
[   20.866886]  kunit_try_run_case+0x170/0x3f0
[   20.866925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866973]  kthread+0x328/0x630
[   20.867010]  ret_from_fork+0x10/0x20
[   20.867048] 
[   20.867068] The buggy address belongs to the object at fff00000c7a67680
[   20.867068]  which belongs to the cache kmalloc-64 of size 64
[   20.867131] The buggy address is located 0 bytes to the right of
[   20.867131]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.867204] 
[   20.867249] The buggy address belongs to the physical page:
[   20.867592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.867662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.867817] page_type: f5(slab)
[   20.867878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.868019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.868181] page dumped because: kasan: bad access detected
[   20.868347] 
[   20.868436] Memory state around the buggy address:
[   20.868578]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868644]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.868878]                                      ^
[   20.868913]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.868962]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869003] ==================================================================
[   20.834095] ==================================================================
[   20.834210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.834264] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.834316] 
[   20.834437] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.834577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.834623] Hardware name: linux,dummy-virt (DT)
[   20.835018] Call trace:
[   20.835085]  show_stack+0x20/0x38 (C)
[   20.835219]  dump_stack_lvl+0x8c/0xd0
[   20.835370]  print_report+0x118/0x608
[   20.835435]  kasan_report+0xdc/0x128
[   20.835509]  kasan_check_range+0x100/0x1a8
[   20.835628]  __kasan_check_write+0x20/0x30
[   20.835695]  kasan_atomics_helper+0x126c/0x4858
[   20.835750]  kasan_atomics+0x198/0x2e0
[   20.835802]  kunit_try_run_case+0x170/0x3f0
[   20.835864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.835928]  kthread+0x328/0x630
[   20.836005]  ret_from_fork+0x10/0x20
[   20.836065] 
[   20.836087] Allocated by task 267:
[   20.836117]  kasan_save_stack+0x3c/0x68
[   20.836185]  kasan_save_track+0x20/0x40
[   20.836224]  kasan_save_alloc_info+0x40/0x58
[   20.836266]  __kasan_kmalloc+0xd4/0xd8
[   20.836617]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.836731]  kasan_atomics+0xb8/0x2e0
[   20.836847]  kunit_try_run_case+0x170/0x3f0
[   20.836980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.837214]  kthread+0x328/0x630
[   20.837331]  ret_from_fork+0x10/0x20
[   20.837375] 
[   20.837399] The buggy address belongs to the object at fff00000c7a67680
[   20.837399]  which belongs to the cache kmalloc-64 of size 64
[   20.837538] The buggy address is located 0 bytes to the right of
[   20.837538]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.837627] 
[   20.837725] The buggy address belongs to the physical page:
[   20.837800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.837976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.838160] page_type: f5(slab)
[   20.838261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.838317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.838363] page dumped because: kasan: bad access detected
[   20.838704] 
[   20.838770] Memory state around the buggy address:
[   20.838892]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.839037]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.839293] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.839363]                                      ^
[   20.839616]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839778]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839821] ==================================================================
[   20.793650] ==================================================================
[   20.794129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.794209] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.794262] 
[   20.794296] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.794472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.794506] Hardware name: linux,dummy-virt (DT)
[   20.794540] Call trace:
[   20.794565]  show_stack+0x20/0x38 (C)
[   20.794661]  dump_stack_lvl+0x8c/0xd0
[   20.794735]  print_report+0x118/0x608
[   20.794782]  kasan_report+0xdc/0x128
[   20.794838]  kasan_check_range+0x100/0x1a8
[   20.794898]  __kasan_check_write+0x20/0x30
[   20.794948]  kasan_atomics_helper+0xff0/0x4858
[   20.795012]  kasan_atomics+0x198/0x2e0
[   20.795064]  kunit_try_run_case+0x170/0x3f0
[   20.795116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.795179]  kthread+0x328/0x630
[   20.795225]  ret_from_fork+0x10/0x20
[   20.795275] 
[   20.795304] Allocated by task 267:
[   20.795334]  kasan_save_stack+0x3c/0x68
[   20.795375]  kasan_save_track+0x20/0x40
[   20.795412]  kasan_save_alloc_info+0x40/0x58
[   20.795453]  __kasan_kmalloc+0xd4/0xd8
[   20.795489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.795531]  kasan_atomics+0xb8/0x2e0
[   20.795575]  kunit_try_run_case+0x170/0x3f0
[   20.795616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.795663]  kthread+0x328/0x630
[   20.795710]  ret_from_fork+0x10/0x20
[   20.795749] 
[   20.795771] The buggy address belongs to the object at fff00000c7a67680
[   20.795771]  which belongs to the cache kmalloc-64 of size 64
[   20.795831] The buggy address is located 0 bytes to the right of
[   20.795831]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.796555] 
[   20.796601] The buggy address belongs to the physical page:
[   20.796653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.796953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.797026] page_type: f5(slab)
[   20.797069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.797403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.797743] page dumped because: kasan: bad access detected
[   20.797786] 
[   20.797831] Memory state around the buggy address:
[   20.798177]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.798397]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.798592] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.798747]                                      ^
[   20.798792]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.798840]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.799174] ==================================================================
[   20.840435] ==================================================================
[   20.840484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.840532] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.840584] 
[   20.840614] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.840698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.840755] Hardware name: linux,dummy-virt (DT)
[   20.840789] Call trace:
[   20.840839]  show_stack+0x20/0x38 (C)
[   20.840906]  dump_stack_lvl+0x8c/0xd0
[   20.840991]  print_report+0x118/0x608
[   20.841084]  kasan_report+0xdc/0x128
[   20.841159]  kasan_check_range+0x100/0x1a8
[   20.841460]  __kasan_check_write+0x20/0x30
[   20.841531]  kasan_atomics_helper+0x12d8/0x4858
[   20.841831]  kasan_atomics+0x198/0x2e0
[   20.842020]  kunit_try_run_case+0x170/0x3f0
[   20.842072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.842128]  kthread+0x328/0x630
[   20.842199]  ret_from_fork+0x10/0x20
[   20.842605] 
[   20.842632] Allocated by task 267:
[   20.842680]  kasan_save_stack+0x3c/0x68
[   20.842742]  kasan_save_track+0x20/0x40
[   20.842893]  kasan_save_alloc_info+0x40/0x58
[   20.842983]  __kasan_kmalloc+0xd4/0xd8
[   20.843024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.843064]  kasan_atomics+0xb8/0x2e0
[   20.843142]  kunit_try_run_case+0x170/0x3f0
[   20.843306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.843391]  kthread+0x328/0x630
[   20.843525]  ret_from_fork+0x10/0x20
[   20.843592] 
[   20.843670] The buggy address belongs to the object at fff00000c7a67680
[   20.843670]  which belongs to the cache kmalloc-64 of size 64
[   20.843821] The buggy address is located 0 bytes to the right of
[   20.843821]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.843901] 
[   20.843924] The buggy address belongs to the physical page:
[   20.843958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.844077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.844149] page_type: f5(slab)
[   20.844189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.844247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.844293] page dumped because: kasan: bad access detected
[   20.844347] 
[   20.844368] Memory state around the buggy address:
[   20.844402]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.844450]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.844496] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.844539]                                      ^
[   20.844655]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.844700]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.844743] ==================================================================
[   20.874949] ==================================================================
[   20.875010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.875060] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.875257] 
[   20.875345] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.875488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.875646] Hardware name: linux,dummy-virt (DT)
[   20.875682] Call trace:
[   20.875707]  show_stack+0x20/0x38 (C)
[   20.875759]  dump_stack_lvl+0x8c/0xd0
[   20.876517]  print_report+0x118/0x608
[   20.876578]  kasan_report+0xdc/0x128
[   20.876625]  kasan_check_range+0x100/0x1a8
[   20.876674]  __kasan_check_write+0x20/0x30
[   20.876722]  kasan_atomics_helper+0x15b4/0x4858
[   20.876772]  kasan_atomics+0x198/0x2e0
[   20.876817]  kunit_try_run_case+0x170/0x3f0
[   20.876878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.876934]  kthread+0x328/0x630
[   20.876980]  ret_from_fork+0x10/0x20
[   20.877030] 
[   20.877050] Allocated by task 267:
[   20.877081]  kasan_save_stack+0x3c/0x68
[   20.877121]  kasan_save_track+0x20/0x40
[   20.877160]  kasan_save_alloc_info+0x40/0x58
[   20.877199]  __kasan_kmalloc+0xd4/0xd8
[   20.877237]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.877276]  kasan_atomics+0xb8/0x2e0
[   20.877313]  kunit_try_run_case+0x170/0x3f0
[   20.877353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.877400]  kthread+0x328/0x630
[   20.877437]  ret_from_fork+0x10/0x20
[   20.877476] 
[   20.877496] The buggy address belongs to the object at fff00000c7a67680
[   20.877496]  which belongs to the cache kmalloc-64 of size 64
[   20.877558] The buggy address is located 0 bytes to the right of
[   20.877558]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.877626] 
[   20.877647] The buggy address belongs to the physical page:
[   20.877680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.877734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.877784] page_type: f5(slab)
[   20.877824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.877946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.878013] page dumped because: kasan: bad access detected
[   20.878061] 
[   20.878099] Memory state around the buggy address:
[   20.878132]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.878235]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.878322] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.878373]                                      ^
[   20.878579]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878683]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878808] ==================================================================
[   20.861059] ==================================================================
[   20.861113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.861161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.861214] 
[   20.861411] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.861614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.861689] Hardware name: linux,dummy-virt (DT)
[   20.861793] Call trace:
[   20.861818]  show_stack+0x20/0x38 (C)
[   20.861912]  dump_stack_lvl+0x8c/0xd0
[   20.862007]  print_report+0x118/0x608
[   20.862082]  kasan_report+0xdc/0x128
[   20.862163]  kasan_check_range+0x100/0x1a8
[   20.862229]  __kasan_check_write+0x20/0x30
[   20.862301]  kasan_atomics_helper+0x147c/0x4858
[   20.862376]  kasan_atomics+0x198/0x2e0
[   20.862432]  kunit_try_run_case+0x170/0x3f0
[   20.862482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.862537]  kthread+0x328/0x630
[   20.862584]  ret_from_fork+0x10/0x20
[   20.862979] 
[   20.863026] Allocated by task 267:
[   20.863060]  kasan_save_stack+0x3c/0x68
[   20.863172]  kasan_save_track+0x20/0x40
[   20.863248]  kasan_save_alloc_info+0x40/0x58
[   20.863289]  __kasan_kmalloc+0xd4/0xd8
[   20.863327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.863366]  kasan_atomics+0xb8/0x2e0
[   20.863404]  kunit_try_run_case+0x170/0x3f0
[   20.863465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.863554]  kthread+0x328/0x630
[   20.863596]  ret_from_fork+0x10/0x20
[   20.863636] 
[   20.863657] The buggy address belongs to the object at fff00000c7a67680
[   20.863657]  which belongs to the cache kmalloc-64 of size 64
[   20.863775] The buggy address is located 0 bytes to the right of
[   20.863775]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.863924] 
[   20.864003] The buggy address belongs to the physical page:
[   20.864066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.864121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.864236] page_type: f5(slab)
[   20.864372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.864477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.864524] page dumped because: kasan: bad access detected
[   20.864559] 
[   20.864752] Memory state around the buggy address:
[   20.864787]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.864835]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.864895] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.865039]                                      ^
[   20.865169]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.865289]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.865347] ==================================================================
[   20.749598] ==================================================================
[   20.749654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.749803] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.749873] 
[   20.750155] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.750270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.750385] Hardware name: linux,dummy-virt (DT)
[   20.750441] Call trace:
[   20.750467]  show_stack+0x20/0x38 (C)
[   20.750583]  dump_stack_lvl+0x8c/0xd0
[   20.750659]  print_report+0x118/0x608
[   20.750771]  kasan_report+0xdc/0x128
[   20.750822]  __asan_report_load8_noabort+0x20/0x30
[   20.750885]  kasan_atomics_helper+0x3f58/0x4858
[   20.751291]  kasan_atomics+0x198/0x2e0
[   20.751413]  kunit_try_run_case+0x170/0x3f0
[   20.751477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.751652]  kthread+0x328/0x630
[   20.751715]  ret_from_fork+0x10/0x20
[   20.751847] 
[   20.751882] Allocated by task 267:
[   20.751990]  kasan_save_stack+0x3c/0x68
[   20.752160]  kasan_save_track+0x20/0x40
[   20.752340]  kasan_save_alloc_info+0x40/0x58
[   20.752414]  __kasan_kmalloc+0xd4/0xd8
[   20.752452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.752522]  kasan_atomics+0xb8/0x2e0
[   20.752560]  kunit_try_run_case+0x170/0x3f0
[   20.752602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.752649]  kthread+0x328/0x630
[   20.752688]  ret_from_fork+0x10/0x20
[   20.752741] 
[   20.752769] The buggy address belongs to the object at fff00000c7a67680
[   20.752769]  which belongs to the cache kmalloc-64 of size 64
[   20.752838] The buggy address is located 0 bytes to the right of
[   20.752838]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.752930] 
[   20.752969] The buggy address belongs to the physical page:
[   20.753019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.753075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.753126] page_type: f5(slab)
[   20.753180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.753237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.753283] page dumped because: kasan: bad access detected
[   20.753326] 
[   20.753345] Memory state around the buggy address:
[   20.753378]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.753436]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.753482] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.753525]                                      ^
[   20.753561]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.753616]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.753669] ==================================================================
[   20.913252] ==================================================================
[   20.913332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.913387] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.913439] 
[   20.913524] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.913634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.913691] Hardware name: linux,dummy-virt (DT)
[   20.913725] Call trace:
[   20.913776]  show_stack+0x20/0x38 (C)
[   20.913824]  dump_stack_lvl+0x8c/0xd0
[   20.913943]  print_report+0x118/0x608
[   20.913990]  kasan_report+0xdc/0x128
[   20.914038]  kasan_check_range+0x100/0x1a8
[   20.914086]  __kasan_check_write+0x20/0x30
[   20.914134]  kasan_atomics_helper+0x17ec/0x4858
[   20.914182]  kasan_atomics+0x198/0x2e0
[   20.914226]  kunit_try_run_case+0x170/0x3f0
[   20.914415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.914531]  kthread+0x328/0x630
[   20.914617]  ret_from_fork+0x10/0x20
[   20.914731] 
[   20.914760] Allocated by task 267:
[   20.914947]  kasan_save_stack+0x3c/0x68
[   20.914994]  kasan_save_track+0x20/0x40
[   20.915057]  kasan_save_alloc_info+0x40/0x58
[   20.915291]  __kasan_kmalloc+0xd4/0xd8
[   20.915396]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.915578]  kasan_atomics+0xb8/0x2e0
[   20.915616]  kunit_try_run_case+0x170/0x3f0
[   20.915711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.915824]  kthread+0x328/0x630
[   20.915909]  ret_from_fork+0x10/0x20
[   20.916008] 
[   20.916068] The buggy address belongs to the object at fff00000c7a67680
[   20.916068]  which belongs to the cache kmalloc-64 of size 64
[   20.916137] The buggy address is located 0 bytes to the right of
[   20.916137]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.916211] 
[   20.916235] The buggy address belongs to the physical page:
[   20.916267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.916506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.916557] page_type: f5(slab)
[   20.916596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.916937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.917172] page dumped because: kasan: bad access detected
[   20.917437] 
[   20.917483] Memory state around the buggy address:
[   20.917682]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.917747]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.917928] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.918046]                                      ^
[   20.918125]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918172]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918215] ==================================================================
[   20.800436] ==================================================================
[   20.800558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.800651] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.800761] 
[   20.800840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.800951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.801257] Hardware name: linux,dummy-virt (DT)
[   20.801314] Call trace:
[   20.801340]  show_stack+0x20/0x38 (C)
[   20.801394]  dump_stack_lvl+0x8c/0xd0
[   20.801708]  print_report+0x118/0x608
[   20.801788]  kasan_report+0xdc/0x128
[   20.801931]  kasan_check_range+0x100/0x1a8
[   20.802005]  __kasan_check_write+0x20/0x30
[   20.802129]  kasan_atomics_helper+0x1058/0x4858
[   20.802192]  kasan_atomics+0x198/0x2e0
[   20.802240]  kunit_try_run_case+0x170/0x3f0
[   20.802597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.802687]  kthread+0x328/0x630
[   20.803000]  ret_from_fork+0x10/0x20
[   20.803080] 
[   20.803167] Allocated by task 267:
[   20.803228]  kasan_save_stack+0x3c/0x68
[   20.803271]  kasan_save_track+0x20/0x40
[   20.803372]  kasan_save_alloc_info+0x40/0x58
[   20.803416]  __kasan_kmalloc+0xd4/0xd8
[   20.803471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.803518]  kasan_atomics+0xb8/0x2e0
[   20.803557]  kunit_try_run_case+0x170/0x3f0
[   20.803616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.803913]  kthread+0x328/0x630
[   20.803999]  ret_from_fork+0x10/0x20
[   20.804339] 
[   20.804388] The buggy address belongs to the object at fff00000c7a67680
[   20.804388]  which belongs to the cache kmalloc-64 of size 64
[   20.804540] The buggy address is located 0 bytes to the right of
[   20.804540]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.804634] 
[   20.805037] The buggy address belongs to the physical page:
[   20.805115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.805520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.805681] page_type: f5(slab)
[   20.805738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.806197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.806484] page dumped because: kasan: bad access detected
[   20.807104] 
[   20.807236] Memory state around the buggy address:
[   20.807324]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.807401]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.807746] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.808157]                                      ^
[   20.808237]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.808310]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.808465] ==================================================================
[   20.755257] ==================================================================
[   20.755410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.755518] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.755839] 
[   20.755941] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.756032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.756294] Hardware name: linux,dummy-virt (DT)
[   20.756378] Call trace:
[   20.756427]  show_stack+0x20/0x38 (C)
[   20.756707]  dump_stack_lvl+0x8c/0xd0
[   20.756799]  print_report+0x118/0x608
[   20.756990]  kasan_report+0xdc/0x128
[   20.757112]  kasan_check_range+0x100/0x1a8
[   20.757202]  __kasan_check_write+0x20/0x30
[   20.757377]  kasan_atomics_helper+0xe44/0x4858
[   20.757430]  kasan_atomics+0x198/0x2e0
[   20.757713]  kunit_try_run_case+0x170/0x3f0
[   20.757893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.758102]  kthread+0x328/0x630
[   20.758290]  ret_from_fork+0x10/0x20
[   20.758418] 
[   20.758489] Allocated by task 267:
[   20.758569]  kasan_save_stack+0x3c/0x68
[   20.758742]  kasan_save_track+0x20/0x40
[   20.758804]  kasan_save_alloc_info+0x40/0x58
[   20.759102]  __kasan_kmalloc+0xd4/0xd8
[   20.759191]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.759474]  kasan_atomics+0xb8/0x2e0
[   20.759563]  kunit_try_run_case+0x170/0x3f0
[   20.759624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.759792]  kthread+0x328/0x630
[   20.759960]  ret_from_fork+0x10/0x20
[   20.760069] 
[   20.760163] The buggy address belongs to the object at fff00000c7a67680
[   20.760163]  which belongs to the cache kmalloc-64 of size 64
[   20.760276] The buggy address is located 0 bytes to the right of
[   20.760276]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.760438] 
[   20.760474] The buggy address belongs to the physical page:
[   20.760507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.761020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.761118] page_type: f5(slab)
[   20.761447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.761575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.761634] page dumped because: kasan: bad access detected
[   20.761670] 
[   20.761690] Memory state around the buggy address:
[   20.762120]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.762484]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.762550] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.762593]                                      ^
[   20.762657]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.762870]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.763037] ==================================================================
[   20.823129] ==================================================================
[   20.823332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.823439] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.823592] 
[   20.823640] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.823730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.824431] Hardware name: linux,dummy-virt (DT)
[   20.824613] Call trace:
[   20.824670]  show_stack+0x20/0x38 (C)
[   20.824789]  dump_stack_lvl+0x8c/0xd0
[   20.824994]  print_report+0x118/0x608
[   20.825085]  kasan_report+0xdc/0x128
[   20.825144]  kasan_check_range+0x100/0x1a8
[   20.825193]  __kasan_check_write+0x20/0x30
[   20.825243]  kasan_atomics_helper+0x1190/0x4858
[   20.825292]  kasan_atomics+0x198/0x2e0
[   20.825338]  kunit_try_run_case+0x170/0x3f0
[   20.826056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826130]  kthread+0x328/0x630
[   20.826180]  ret_from_fork+0x10/0x20
[   20.826231] 
[   20.826252] Allocated by task 267:
[   20.826283]  kasan_save_stack+0x3c/0x68
[   20.826324]  kasan_save_track+0x20/0x40
[   20.826363]  kasan_save_alloc_info+0x40/0x58
[   20.826402]  __kasan_kmalloc+0xd4/0xd8
[   20.826440]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.826479]  kasan_atomics+0xb8/0x2e0
[   20.826516]  kunit_try_run_case+0x170/0x3f0
[   20.826556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826604]  kthread+0x328/0x630
[   20.826641]  ret_from_fork+0x10/0x20
[   20.826677] 
[   20.826699] The buggy address belongs to the object at fff00000c7a67680
[   20.826699]  which belongs to the cache kmalloc-64 of size 64
[   20.826760] The buggy address is located 0 bytes to the right of
[   20.826760]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.826828] 
[   20.826851] The buggy address belongs to the physical page:
[   20.826896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.826951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.827001] page_type: f5(slab)
[   20.827042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.827099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.827151] page dumped because: kasan: bad access detected
[   20.827186] 
[   20.827262] Memory state around the buggy address:
[   20.827433]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.827494]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.827541] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.827584]                                      ^
[   20.827689]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827736]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827809] ==================================================================
[   20.769952] ==================================================================
[   20.770229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.770305] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.770421] 
[   20.770481] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.770600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.770634] Hardware name: linux,dummy-virt (DT)
[   20.770668] Call trace:
[   20.770691]  show_stack+0x20/0x38 (C)
[   20.770756]  dump_stack_lvl+0x8c/0xd0
[   20.770919]  print_report+0x118/0x608
[   20.770982]  kasan_report+0xdc/0x128
[   20.771156]  kasan_check_range+0x100/0x1a8
[   20.771339]  __kasan_check_write+0x20/0x30
[   20.771506]  kasan_atomics_helper+0xeb8/0x4858
[   20.771617]  kasan_atomics+0x198/0x2e0
[   20.771669]  kunit_try_run_case+0x170/0x3f0
[   20.771768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.771829]  kthread+0x328/0x630
[   20.771946]  ret_from_fork+0x10/0x20
[   20.772147] 
[   20.772178] Allocated by task 267:
[   20.772210]  kasan_save_stack+0x3c/0x68
[   20.772253]  kasan_save_track+0x20/0x40
[   20.772300]  kasan_save_alloc_info+0x40/0x58
[   20.772632]  __kasan_kmalloc+0xd4/0xd8
[   20.772718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.772978]  kasan_atomics+0xb8/0x2e0
[   20.773037]  kunit_try_run_case+0x170/0x3f0
[   20.773392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.773487]  kthread+0x328/0x630
[   20.773909]  ret_from_fork+0x10/0x20
[   20.774253] 
[   20.774353] The buggy address belongs to the object at fff00000c7a67680
[   20.774353]  which belongs to the cache kmalloc-64 of size 64
[   20.774478] The buggy address is located 0 bytes to the right of
[   20.774478]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.774665] 
[   20.774818] The buggy address belongs to the physical page:
[   20.774979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.775039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.775329] page_type: f5(slab)
[   20.775420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.775759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.775863] page dumped because: kasan: bad access detected
[   20.775927] 
[   20.775948] Memory state around the buggy address:
[   20.775983]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776038]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776087] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.776239]                                      ^
[   20.776484]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.776552]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.776597] ==================================================================
[   20.764696] ==================================================================
[   20.764750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.764885] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.764968] 
[   20.765070] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.765176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765206] Hardware name: linux,dummy-virt (DT)
[   20.765240] Call trace:
[   20.765264]  show_stack+0x20/0x38 (C)
[   20.765569]  dump_stack_lvl+0x8c/0xd0
[   20.765648]  print_report+0x118/0x608
[   20.765821]  kasan_report+0xdc/0x128
[   20.765895]  __asan_report_store8_noabort+0x20/0x30
[   20.765948]  kasan_atomics_helper+0x3e5c/0x4858
[   20.765998]  kasan_atomics+0x198/0x2e0
[   20.766045]  kunit_try_run_case+0x170/0x3f0
[   20.766097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766154]  kthread+0x328/0x630
[   20.766204]  ret_from_fork+0x10/0x20
[   20.766255] 
[   20.766293] Allocated by task 267:
[   20.766332]  kasan_save_stack+0x3c/0x68
[   20.766383]  kasan_save_track+0x20/0x40
[   20.766421]  kasan_save_alloc_info+0x40/0x58
[   20.766468]  __kasan_kmalloc+0xd4/0xd8
[   20.766515]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.766554]  kasan_atomics+0xb8/0x2e0
[   20.766591]  kunit_try_run_case+0x170/0x3f0
[   20.766632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766683]  kthread+0x328/0x630
[   20.766729]  ret_from_fork+0x10/0x20
[   20.766768] 
[   20.766790] The buggy address belongs to the object at fff00000c7a67680
[   20.766790]  which belongs to the cache kmalloc-64 of size 64
[   20.766861] The buggy address is located 0 bytes to the right of
[   20.766861]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.766929] 
[   20.766950] The buggy address belongs to the physical page:
[   20.766982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.767038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.767547] page_type: f5(slab)
[   20.767608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.767675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.768031] page dumped because: kasan: bad access detected
[   20.768083] 
[   20.768103] Memory state around the buggy address:
[   20.768358]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.768424]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.768731] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.769039]                                      ^
[   20.769114]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769283]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769375] ==================================================================
[   20.813194] ==================================================================
[   20.813579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.813668] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.813808] 
[   20.813840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.813939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.813970] Hardware name: linux,dummy-virt (DT)
[   20.814003] Call trace:
[   20.814028]  show_stack+0x20/0x38 (C)
[   20.814080]  dump_stack_lvl+0x8c/0xd0
[   20.814372]  print_report+0x118/0x608
[   20.814612]  kasan_report+0xdc/0x128
[   20.814821]  kasan_check_range+0x100/0x1a8
[   20.814953]  __kasan_check_write+0x20/0x30
[   20.815006]  kasan_atomics_helper+0x1128/0x4858
[   20.815057]  kasan_atomics+0x198/0x2e0
[   20.815387]  kunit_try_run_case+0x170/0x3f0
[   20.815485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.815552]  kthread+0x328/0x630
[   20.815895]  ret_from_fork+0x10/0x20
[   20.816127] 
[   20.816198] Allocated by task 267:
[   20.816364]  kasan_save_stack+0x3c/0x68
[   20.816421]  kasan_save_track+0x20/0x40
[   20.816465]  kasan_save_alloc_info+0x40/0x58
[   20.816507]  __kasan_kmalloc+0xd4/0xd8
[   20.816543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.816586]  kasan_atomics+0xb8/0x2e0
[   20.816622]  kunit_try_run_case+0x170/0x3f0
[   20.816993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.817471]  kthread+0x328/0x630
[   20.817602]  ret_from_fork+0x10/0x20
[   20.817801] 
[   20.817981] The buggy address belongs to the object at fff00000c7a67680
[   20.817981]  which belongs to the cache kmalloc-64 of size 64
[   20.818045] The buggy address is located 0 bytes to the right of
[   20.818045]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.818308] 
[   20.818410] The buggy address belongs to the physical page:
[   20.818550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.818903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.818971] page_type: f5(slab)
[   20.819013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.819725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.819805] page dumped because: kasan: bad access detected
[   20.819962] 
[   20.820030] Memory state around the buggy address:
[   20.820232]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.820459]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.820532] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.820698]                                      ^
[   20.820787]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.821106]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.821188] ==================================================================
[   20.655762] ==================================================================
[   20.655816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.655880] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.655935] 
[   20.655987] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.656077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.656108] Hardware name: linux,dummy-virt (DT)
[   20.656142] Call trace:
[   20.656167]  show_stack+0x20/0x38 (C)
[   20.656217]  dump_stack_lvl+0x8c/0xd0
[   20.656265]  print_report+0x118/0x608
[   20.656313]  kasan_report+0xdc/0x128
[   20.656359]  kasan_check_range+0x100/0x1a8
[   20.656408]  __kasan_check_write+0x20/0x30
[   20.656456]  kasan_atomics_helper+0xa6c/0x4858
[   20.656505]  kasan_atomics+0x198/0x2e0
[   20.656551]  kunit_try_run_case+0x170/0x3f0
[   20.656601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.656667]  kthread+0x328/0x630
[   20.656725]  ret_from_fork+0x10/0x20
[   20.656775] 
[   20.656804] Allocated by task 267:
[   20.656835]  kasan_save_stack+0x3c/0x68
[   20.657531]  kasan_save_track+0x20/0x40
[   20.657603]  kasan_save_alloc_info+0x40/0x58
[   20.657692]  __kasan_kmalloc+0xd4/0xd8
[   20.657801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.658014]  kasan_atomics+0xb8/0x2e0
[   20.658057]  kunit_try_run_case+0x170/0x3f0
[   20.658121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.658435]  kthread+0x328/0x630
[   20.658592]  ret_from_fork+0x10/0x20
[   20.658707] 
[   20.658762] The buggy address belongs to the object at fff00000c7a67680
[   20.658762]  which belongs to the cache kmalloc-64 of size 64
[   20.658941] The buggy address is located 0 bytes to the right of
[   20.658941]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.659060] 
[   20.659136] The buggy address belongs to the physical page:
[   20.659182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.659273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.659643] page_type: f5(slab)
[   20.659761] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.659924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.659981] page dumped because: kasan: bad access detected
[   20.660017] 
[   20.660181] Memory state around the buggy address:
[   20.660222]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.660286]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.660425] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.660472]                                      ^
[   20.660918]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.661024]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.661356] ==================================================================
[   20.845786] ==================================================================
[   20.845841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.845910] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.845962] 
[   20.845994] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.846224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.846272] Hardware name: linux,dummy-virt (DT)
[   20.846307] Call trace:
[   20.846330]  show_stack+0x20/0x38 (C)
[   20.846382]  dump_stack_lvl+0x8c/0xd0
[   20.846475]  print_report+0x118/0x608
[   20.846558]  kasan_report+0xdc/0x128
[   20.846606]  kasan_check_range+0x100/0x1a8
[   20.846653]  __kasan_check_write+0x20/0x30
[   20.846702]  kasan_atomics_helper+0x1384/0x4858
[   20.846749]  kasan_atomics+0x198/0x2e0
[   20.846794]  kunit_try_run_case+0x170/0x3f0
[   20.846844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.846912]  kthread+0x328/0x630
[   20.847026]  ret_from_fork+0x10/0x20
[   20.847081] 
[   20.847162] Allocated by task 267:
[   20.847241]  kasan_save_stack+0x3c/0x68
[   20.847325]  kasan_save_track+0x20/0x40
[   20.847383]  kasan_save_alloc_info+0x40/0x58
[   20.847435]  __kasan_kmalloc+0xd4/0xd8
[   20.847541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.847582]  kasan_atomics+0xb8/0x2e0
[   20.847622]  kunit_try_run_case+0x170/0x3f0
[   20.847665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.847710]  kthread+0x328/0x630
[   20.847747]  ret_from_fork+0x10/0x20
[   20.847786] 
[   20.847809] The buggy address belongs to the object at fff00000c7a67680
[   20.847809]  which belongs to the cache kmalloc-64 of size 64
[   20.847973] The buggy address is located 0 bytes to the right of
[   20.847973]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.848065] 
[   20.848086] The buggy address belongs to the physical page:
[   20.848303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.848426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.848481] page_type: f5(slab)
[   20.848522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.849314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.849623] page dumped because: kasan: bad access detected
[   20.849709] 
[   20.849733] Memory state around the buggy address:
[   20.849769]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.850032]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.850173] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.850231]                                      ^
[   20.850265]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850323]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850366] ==================================================================
[   20.809103] ==================================================================
[   20.809155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.809613] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.809753] 
[   20.809785] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.809884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.809914] Hardware name: linux,dummy-virt (DT)
[   20.809947] Call trace:
[   20.809972]  show_stack+0x20/0x38 (C)
[   20.810025]  dump_stack_lvl+0x8c/0xd0
[   20.810092]  print_report+0x118/0x608
[   20.810140]  kasan_report+0xdc/0x128
[   20.810185]  kasan_check_range+0x100/0x1a8
[   20.810243]  __kasan_check_write+0x20/0x30
[   20.810298]  kasan_atomics_helper+0x10c0/0x4858
[   20.810348]  kasan_atomics+0x198/0x2e0
[   20.810395]  kunit_try_run_case+0x170/0x3f0
[   20.810444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.810499]  kthread+0x328/0x630
[   20.810551]  ret_from_fork+0x10/0x20
[   20.810610] 
[   20.810638] Allocated by task 267:
[   20.810674]  kasan_save_stack+0x3c/0x68
[   20.810714]  kasan_save_track+0x20/0x40
[   20.810762]  kasan_save_alloc_info+0x40/0x58
[   20.810803]  __kasan_kmalloc+0xd4/0xd8
[   20.810840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.810888]  kasan_atomics+0xb8/0x2e0
[   20.810926]  kunit_try_run_case+0x170/0x3f0
[   20.810966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.811011]  kthread+0x328/0x630
[   20.811055]  ret_from_fork+0x10/0x20
[   20.811102] 
[   20.811123] The buggy address belongs to the object at fff00000c7a67680
[   20.811123]  which belongs to the cache kmalloc-64 of size 64
[   20.811190] The buggy address is located 0 bytes to the right of
[   20.811190]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.811258] 
[   20.811287] The buggy address belongs to the physical page:
[   20.811319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.811372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.811421] page_type: f5(slab)
[   20.811461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.811517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.811563] page dumped because: kasan: bad access detected
[   20.811598] 
[   20.811619] Memory state around the buggy address:
[   20.811652]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.811698]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.811745] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.811789]                                      ^
[   20.811822]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812340]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812820] ==================================================================
[   20.709381] ==================================================================
[   20.711171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   20.711981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.712720]  kasan_check_range+0x100/0x1a8
[   20.713402]  kthread+0x328/0x630
[   20.714063] 
[   20.714084] The buggy address belongs to the object at fff00000c7a67680
[   20.714084]  which belongs to the cache kmalloc-64 of size 64
[   20.714154] The buggy address is located 0 bytes to the right of
[   20.714154]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.714222] 
[   20.714265] The buggy address belongs to the physical page:
[   20.714299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.714354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.714414] page_type: f5(slab)
[   20.714453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.714509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.714555] page dumped because: kasan: bad access detected
[   20.714599] 
[   20.714641] Memory state around the buggy address:
[   20.714673]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.714729]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.714773] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.714832]                                      ^
[   20.714877]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715443]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715848] ==================================================================
[   20.856211] ==================================================================
[   20.856264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.856315] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.856368] 
[   20.856399] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.856484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.856513] Hardware name: linux,dummy-virt (DT)
[   20.856546] Call trace:
[   20.856590]  show_stack+0x20/0x38 (C)
[   20.856642]  dump_stack_lvl+0x8c/0xd0
[   20.856693]  print_report+0x118/0x608
[   20.856738]  kasan_report+0xdc/0x128
[   20.856785]  kasan_check_range+0x100/0x1a8
[   20.856840]  __kasan_check_write+0x20/0x30
[   20.856909]  kasan_atomics_helper+0x1414/0x4858
[   20.856958]  kasan_atomics+0x198/0x2e0
[   20.857004]  kunit_try_run_case+0x170/0x3f0
[   20.857080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.857303]  kthread+0x328/0x630
[   20.857409]  ret_from_fork+0x10/0x20
[   20.857573] 
[   20.857601] Allocated by task 267:
[   20.857646]  kasan_save_stack+0x3c/0x68
[   20.857689]  kasan_save_track+0x20/0x40
[   20.857726]  kasan_save_alloc_info+0x40/0x58
[   20.857767]  __kasan_kmalloc+0xd4/0xd8
[   20.857826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.857879]  kasan_atomics+0xb8/0x2e0
[   20.858030]  kunit_try_run_case+0x170/0x3f0
[   20.858123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.858198]  kthread+0x328/0x630
[   20.858254]  ret_from_fork+0x10/0x20
[   20.858308] 
[   20.858365] The buggy address belongs to the object at fff00000c7a67680
[   20.858365]  which belongs to the cache kmalloc-64 of size 64
[   20.858521] The buggy address is located 0 bytes to the right of
[   20.858521]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.858591] 
[   20.858786] The buggy address belongs to the physical page:
[   20.858825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.858894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.858945] page_type: f5(slab)
[   20.858985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.859222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.859323] page dumped because: kasan: bad access detected
[   20.859398] 
[   20.859426] Memory state around the buggy address:
[   20.859463]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.859511]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.859716] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.859881]                                      ^
[   20.859993]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860140]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860245] ==================================================================
[   20.726151] ==================================================================
[   20.726211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.726266] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.726593] 
[   20.726664] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.726946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.727176] Hardware name: linux,dummy-virt (DT)
[   20.727305] Call trace:
[   20.727335]  show_stack+0x20/0x38 (C)
[   20.727390]  dump_stack_lvl+0x8c/0xd0
[   20.727444]  print_report+0x118/0x608
[   20.727708]  kasan_report+0xdc/0x128
[   20.727785]  kasan_check_range+0x100/0x1a8
[   20.727964]  __kasan_check_write+0x20/0x30
[   20.728148]  kasan_atomics_helper+0xd3c/0x4858
[   20.728282]  kasan_atomics+0x198/0x2e0
[   20.728413]  kunit_try_run_case+0x170/0x3f0
[   20.728548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.728673]  kthread+0x328/0x630
[   20.728831]  ret_from_fork+0x10/0x20
[   20.729187] 
[   20.729270] Allocated by task 267:
[   20.729825]  kasan_save_stack+0x3c/0x68
[   20.729907]  kasan_save_track+0x20/0x40
[   20.730242]  kasan_save_alloc_info+0x40/0x58
[   20.730397]  __kasan_kmalloc+0xd4/0xd8
[   20.730458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.730758]  kasan_atomics+0xb8/0x2e0
[   20.730885]  kunit_try_run_case+0x170/0x3f0
[   20.731044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.731123]  kthread+0x328/0x630
[   20.731169]  ret_from_fork+0x10/0x20
[   20.731208] 
[   20.731231] The buggy address belongs to the object at fff00000c7a67680
[   20.731231]  which belongs to the cache kmalloc-64 of size 64
[   20.731303] The buggy address is located 0 bytes to the right of
[   20.731303]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.731382] 
[   20.731418] The buggy address belongs to the physical page:
[   20.731458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.731527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.731589] page_type: f5(slab)
[   20.731631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.731696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.731749] page dumped because: kasan: bad access detected
[   20.731794] 
[   20.731814] Memory state around the buggy address:
[   20.731849]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.731906]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.731953] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.731997]                                      ^
[   20.732040]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732105]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732169] ==================================================================
[   20.638755] ==================================================================
[   20.639085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.639181] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.639341] 
[   20.639424] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.639728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.639810] Hardware name: linux,dummy-virt (DT)
[   20.639846] Call trace:
[   20.640214]  show_stack+0x20/0x38 (C)
[   20.640389]  dump_stack_lvl+0x8c/0xd0
[   20.640533]  print_report+0x118/0x608
[   20.640584]  kasan_report+0xdc/0x128
[   20.640632]  kasan_check_range+0x100/0x1a8
[   20.641088]  __kasan_check_write+0x20/0x30
[   20.641229]  kasan_atomics_helper+0x99c/0x4858
[   20.641499]  kasan_atomics+0x198/0x2e0
[   20.642208]  ret_from_fork+0x10/0x20
[   20.642379] 
[   20.642848]  kasan_save_track+0x20/0x40
[   20.644324] 
[   20.644545] The buggy address is located 0 bytes to the right of
[   20.644545]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.645105] page dumped because: kasan: bad access detected
[   20.645275]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.646786] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.648392]  kasan_atomics+0x198/0x2e0
[   20.649407] 
[   20.649474] Allocated by task 267:
[   20.649552]  kasan_save_stack+0x3c/0x68
[   20.649597]  kasan_save_track+0x20/0x40
[   20.649905]  kasan_save_alloc_info+0x40/0x58
[   20.649996]  __kasan_kmalloc+0xd4/0xd8
[   20.650133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.650228]  kasan_atomics+0xb8/0x2e0
[   20.650506]  kunit_try_run_case+0x170/0x3f0
[   20.650594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.650809]  kthread+0x328/0x630
[   20.650851]  ret_from_fork+0x10/0x20
[   20.651179] 
[   20.651231] The buggy address belongs to the object at fff00000c7a67680
[   20.651231]  which belongs to the cache kmalloc-64 of size 64
[   20.651331] The buggy address is located 0 bytes to the right of
[   20.651331]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.651807] 
[   20.651907] The buggy address belongs to the physical page:
[   20.651964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.652102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.652325] page_type: f5(slab)
[   20.652433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.652768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.652937] page dumped because: kasan: bad access detected
[   20.653107] 
[   20.653247] Memory state around the buggy address:
[   20.653586]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.653663]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.653845] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.653988]                                      ^
[   20.654144]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.654237]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.654551] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   20.352156] ==================================================================
[   20.352219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.352277] Write of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263
[   20.352331] 
[   20.352364] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.352451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.352483] Hardware name: linux,dummy-virt (DT)
[   20.352517] Call trace:
[   20.352543]  show_stack+0x20/0x38 (C)
[   20.352595]  dump_stack_lvl+0x8c/0xd0
[   20.352646]  print_report+0x118/0x608
[   20.352693]  kasan_report+0xdc/0x128
[   20.352739]  kasan_check_range+0x100/0x1a8
[   20.352788]  __kasan_check_write+0x20/0x30
[   20.352838]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.352905]  kasan_bitops_generic+0x110/0x1c8
[   20.352954]  kunit_try_run_case+0x170/0x3f0
[   20.353006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.353096]  kthread+0x328/0x630
[   20.354394]  ret_from_fork+0x10/0x20
[   20.354449] 
[   20.354476] Allocated by task 263:
[   20.354508]  kasan_save_stack+0x3c/0x68
[   20.354566]  kasan_save_track+0x20/0x40
[   20.354605]  kasan_save_alloc_info+0x40/0x58
[   20.354648]  __kasan_kmalloc+0xd4/0xd8
[   20.354689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.354731]  kasan_bitops_generic+0xa0/0x1c8
[   20.354772]  kunit_try_run_case+0x170/0x3f0
[   20.354824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.354884]  kthread+0x328/0x630
[   20.354936]  ret_from_fork+0x10/0x20
[   20.354974] 
[   20.354996] The buggy address belongs to the object at fff00000c3ef2e80
[   20.354996]  which belongs to the cache kmalloc-16 of size 16
[   20.355056] The buggy address is located 8 bytes inside of
[   20.355056]  allocated 9-byte region [fff00000c3ef2e80, fff00000c3ef2e89)
[   20.355131] 
[   20.355180] The buggy address belongs to the physical page:
[   20.355222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2
[   20.355279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.355328] page_type: f5(slab)
[   20.355369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.355424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.355469] page dumped because: kasan: bad access detected
[   20.355519] 
[   20.355554] Memory state around the buggy address:
[   20.355598]  fff00000c3ef2d80: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   20.355659]  fff00000c3ef2e00: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   20.355705] >fff00000c3ef2e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.355761]                       ^
[   20.355807]  fff00000c3ef2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.356766]  fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.357026] ==================================================================
[   20.358750] ==================================================================
[   20.359120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.359449] Read of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263
[   20.359521] 
[   20.359692] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.359834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.360158] Hardware name: linux,dummy-virt (DT)
[   20.360283] Call trace:
[   20.360351]  show_stack+0x20/0x38 (C)
[   20.360408]  dump_stack_lvl+0x8c/0xd0
[   20.361503]  print_report+0x118/0x608
[   20.361658]  kasan_report+0xdc/0x128
[   20.361867]  __asan_report_load8_noabort+0x20/0x30
[   20.361930]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.362401]  kasan_bitops_generic+0x110/0x1c8
[   20.362654]  kunit_try_run_case+0x170/0x3f0
[   20.362777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.363361]  kthread+0x328/0x630
[   20.363611]  ret_from_fork+0x10/0x20
[   20.363783] 
[   20.363864] Allocated by task 263:
[   20.364072]  kasan_save_stack+0x3c/0x68
[   20.364134]  kasan_save_track+0x20/0x40
[   20.364346]  kasan_save_alloc_info+0x40/0x58
[   20.364687]  __kasan_kmalloc+0xd4/0xd8
[   20.364891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.365027]  kasan_bitops_generic+0xa0/0x1c8
[   20.365219]  kunit_try_run_case+0x170/0x3f0
[   20.365321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.367892] page_type: f5(slab)
[   20.368477] page dumped because: kasan: bad access detected
[   20.369499]  fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.371212] 
[   20.372040] Hardware name: linux,dummy-virt (DT)
[   20.372383]  __kasan_check_write+0x20/0x30
[   20.372757] Allocated by task 263:
[   20.374656]  ret_from_fork+0x10/0x20
[   20.375283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2
[   20.376088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.377326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   20.333903] ==================================================================
[   20.333987] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   20.334041] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261
[   20.334341] 
[   20.334450] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.334549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.334578] Hardware name: linux,dummy-virt (DT)
[   20.334612] Call trace:
[   20.334636]  show_stack+0x20/0x38 (C)
[   20.334690]  dump_stack_lvl+0x8c/0xd0
[   20.335065]  print_report+0x118/0x608
[   20.335316]  kasan_report+0xdc/0x128
[   20.335384]  __asan_report_load1_noabort+0x20/0x30
[   20.335437]  strnlen+0x80/0x88
[   20.335491]  kasan_strings+0x478/0xb00
[   20.335937]  kunit_try_run_case+0x170/0x3f0
[   20.336035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.336157]  kthread+0x328/0x630
[   20.336211]  ret_from_fork+0x10/0x20
[   20.336609] 
[   20.336654] Allocated by task 261:
[   20.336865]  kasan_save_stack+0x3c/0x68
[   20.337042]  kasan_save_track+0x20/0x40
[   20.337242]  kasan_save_alloc_info+0x40/0x58
[   20.337326]  __kasan_kmalloc+0xd4/0xd8
[   20.337448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.337538]  kasan_strings+0xc8/0xb00
[   20.337728]  kunit_try_run_case+0x170/0x3f0
[   20.337946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.338122]  kthread+0x328/0x630
[   20.338212]  ret_from_fork+0x10/0x20
[   20.338350] 
[   20.338576] Freed by task 261:
[   20.338652]  kasan_save_stack+0x3c/0x68
[   20.338999]  kasan_save_track+0x20/0x40
[   20.339139]  kasan_save_free_info+0x4c/0x78
[   20.339544]  __kasan_slab_free+0x6c/0x98
[   20.339780]  kfree+0x214/0x3c8
[   20.339975]  kasan_strings+0x24c/0xb00
[   20.340022]  kunit_try_run_case+0x170/0x3f0
[   20.340065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.340345]  kthread+0x328/0x630
[   20.340537]  ret_from_fork+0x10/0x20
[   20.340712] 
[   20.340770] The buggy address belongs to the object at fff00000c5be7080
[   20.340770]  which belongs to the cache kmalloc-32 of size 32
[   20.340941] The buggy address is located 16 bytes inside of
[   20.340941]  freed 32-byte region [fff00000c5be7080, fff00000c5be70a0)
[   20.341208] 
[   20.341422] The buggy address belongs to the physical page:
[   20.341539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7
[   20.341796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.342050] page_type: f5(slab)
[   20.342113] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.342185] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.342248] page dumped because: kasan: bad access detected
[   20.342283] 
[   20.342313] Memory state around the buggy address:
[   20.342359]  fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.342417]  fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.342479] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.342531]                          ^
[   20.342562]  fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.342608]  fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.342660] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   20.320047] ==================================================================
[   20.320701] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   20.320810] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261
[   20.320903] 
[   20.321367] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.321560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.321659] Hardware name: linux,dummy-virt (DT)
[   20.321840] Call trace:
[   20.321913]  show_stack+0x20/0x38 (C)
[   20.322498]  dump_stack_lvl+0x8c/0xd0
[   20.322577]  print_report+0x118/0x608
[   20.323008]  kasan_report+0xdc/0x128
[   20.323095]  __asan_report_load1_noabort+0x20/0x30
[   20.323186]  strlen+0xa8/0xb0
[   20.323375]  kasan_strings+0x418/0xb00
[   20.323564]  kunit_try_run_case+0x170/0x3f0
[   20.323998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.324163]  kthread+0x328/0x630
[   20.324292]  ret_from_fork+0x10/0x20
[   20.324576] 
[   20.324604] Allocated by task 261:
[   20.324706]  kasan_save_stack+0x3c/0x68
[   20.324990]  kasan_save_track+0x20/0x40
[   20.325108]  kasan_save_alloc_info+0x40/0x58
[   20.325505]  __kasan_kmalloc+0xd4/0xd8
[   20.325876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.326058]  kasan_strings+0xc8/0xb00
[   20.326157]  kunit_try_run_case+0x170/0x3f0
[   20.326324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.326630]  kthread+0x328/0x630
[   20.326710]  ret_from_fork+0x10/0x20
[   20.326898] 
[   20.327058] Freed by task 261:
[   20.327195]  kasan_save_stack+0x3c/0x68
[   20.327538]  kasan_save_track+0x20/0x40
[   20.327662]  kasan_save_free_info+0x4c/0x78
[   20.327833]  __kasan_slab_free+0x6c/0x98
[   20.327964]  kfree+0x214/0x3c8
[   20.327999]  kasan_strings+0x24c/0xb00
[   20.328352]  kunit_try_run_case+0x170/0x3f0
[   20.328474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.328688]  kthread+0x328/0x630
[   20.328909]  ret_from_fork+0x10/0x20
[   20.329140] 
[   20.329225] The buggy address belongs to the object at fff00000c5be7080
[   20.329225]  which belongs to the cache kmalloc-32 of size 32
[   20.329318] The buggy address is located 16 bytes inside of
[   20.329318]  freed 32-byte region [fff00000c5be7080, fff00000c5be70a0)
[   20.329499] 
[   20.329587] The buggy address belongs to the physical page:
[   20.329743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7
[   20.330072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.330149] page_type: f5(slab)
[   20.330341] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.330532] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.330582] page dumped because: kasan: bad access detected
[   20.330749] 
[   20.330900] Memory state around the buggy address:
[   20.331061]  fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.331305]  fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.331389] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.331890]                          ^
[   20.332019]  fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.332148]  fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.332310] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   20.313145] ==================================================================
[   20.313225] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   20.313537] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261
[   20.313619] 
[   20.313754] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.313889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.313921] Hardware name: linux,dummy-virt (DT)
[   20.313968] Call trace:
[   20.313995]  show_stack+0x20/0x38 (C)
[   20.314060]  dump_stack_lvl+0x8c/0xd0
[   20.314115]  print_report+0x118/0x608
[   20.314170]  kasan_report+0xdc/0x128
[   20.314218]  __asan_report_load1_noabort+0x20/0x30
[   20.314270]  kasan_strings+0x95c/0xb00
[   20.314319]  kunit_try_run_case+0x170/0x3f0
[   20.314381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.314436]  kthread+0x328/0x630
[   20.314484]  ret_from_fork+0x10/0x20
[   20.314534] 
[   20.314564] Allocated by task 261:
[   20.314602]  kasan_save_stack+0x3c/0x68
[   20.314643]  kasan_save_track+0x20/0x40
[   20.314697]  kasan_save_alloc_info+0x40/0x58
[   20.314744]  __kasan_kmalloc+0xd4/0xd8
[   20.314783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.314822]  kasan_strings+0xc8/0xb00
[   20.314871]  kunit_try_run_case+0x170/0x3f0
[   20.314912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.314959]  kthread+0x328/0x630
[   20.314996]  ret_from_fork+0x10/0x20
[   20.315035] 
[   20.315056] Freed by task 261:
[   20.315082]  kasan_save_stack+0x3c/0x68
[   20.315120]  kasan_save_track+0x20/0x40
[   20.315167]  kasan_save_free_info+0x4c/0x78
[   20.315215]  __kasan_slab_free+0x6c/0x98
[   20.315254]  kfree+0x214/0x3c8
[   20.315293]  kasan_strings+0x24c/0xb00
[   20.315333]  kunit_try_run_case+0x170/0x3f0
[   20.315373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.315430]  kthread+0x328/0x630
[   20.315468]  ret_from_fork+0x10/0x20
[   20.315506] 
[   20.315527] The buggy address belongs to the object at fff00000c5be7080
[   20.315527]  which belongs to the cache kmalloc-32 of size 32
[   20.315589] The buggy address is located 16 bytes inside of
[   20.315589]  freed 32-byte region [fff00000c5be7080, fff00000c5be70a0)
[   20.315652] 
[   20.315675] The buggy address belongs to the physical page:
[   20.315708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7
[   20.315759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.315810] page_type: f5(slab)
[   20.315849] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.316260] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.316308] page dumped because: kasan: bad access detected
[   20.316713] 
[   20.316792] Memory state around the buggy address:
[   20.317242]  fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.317592]  fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.317885] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.318062]                          ^
[   20.318169]  fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.318220]  fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.318451] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   20.294801] ==================================================================
[   20.294883] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   20.294991] Read of size 1 at addr fff00000c5be7090 by task kunit_try_catch/261
[   20.295074] 
[   20.295202] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.295310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.295350] Hardware name: linux,dummy-virt (DT)
[   20.295449] Call trace:
[   20.295474]  show_stack+0x20/0x38 (C)
[   20.295562]  dump_stack_lvl+0x8c/0xd0
[   20.295614]  print_report+0x118/0x608
[   20.295793]  kasan_report+0xdc/0x128
[   20.295866]  __asan_report_load1_noabort+0x20/0x30
[   20.296230]  strcmp+0xc0/0xc8
[   20.296296]  kasan_strings+0x340/0xb00
[   20.296549]  kunit_try_run_case+0x170/0x3f0
[   20.296606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.296700]  kthread+0x328/0x630
[   20.296748]  ret_from_fork+0x10/0x20
[   20.297681] 
[   20.297939] Allocated by task 261:
[   20.298180]  kasan_save_stack+0x3c/0x68
[   20.298377]  kasan_save_track+0x20/0x40
[   20.298706]  kasan_save_alloc_info+0x40/0x58
[   20.298873]  __kasan_kmalloc+0xd4/0xd8
[   20.299071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.299768]  kasan_strings+0xc8/0xb00
[   20.299949]  kunit_try_run_case+0x170/0x3f0
[   20.300057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.300348]  kthread+0x328/0x630
[   20.300388]  ret_from_fork+0x10/0x20
[   20.300960] 
[   20.301027] Freed by task 261:
[   20.301334]  kasan_save_stack+0x3c/0x68
[   20.301604]  kasan_save_track+0x20/0x40
[   20.301711]  kasan_save_free_info+0x4c/0x78
[   20.301771]  __kasan_slab_free+0x6c/0x98
[   20.302262]  kfree+0x214/0x3c8
[   20.302446]  kasan_strings+0x24c/0xb00
[   20.302621]  kunit_try_run_case+0x170/0x3f0
[   20.302779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.303041]  kthread+0x328/0x630
[   20.303113]  ret_from_fork+0x10/0x20
[   20.303186] 
[   20.303593] The buggy address belongs to the object at fff00000c5be7080
[   20.303593]  which belongs to the cache kmalloc-32 of size 32
[   20.303687] The buggy address is located 16 bytes inside of
[   20.303687]  freed 32-byte region [fff00000c5be7080, fff00000c5be70a0)
[   20.304068] 
[   20.304162] The buggy address belongs to the physical page:
[   20.304211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be7
[   20.304296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.304474] page_type: f5(slab)
[   20.304883] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.304962] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.305299] page dumped because: kasan: bad access detected
[   20.305382] 
[   20.305525] Memory state around the buggy address:
[   20.305592]  fff00000c5be6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.305973]  fff00000c5be7000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.306167] >fff00000c5be7080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.306214]                          ^
[   20.306529]  fff00000c5be7100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.306813]  fff00000c5be7180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.306928] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   20.279578] ==================================================================
[   20.279645] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   20.279795] Read of size 1 at addr fff00000c791ced8 by task kunit_try_catch/259
[   20.279879] 
[   20.279925] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.280052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.280138] Hardware name: linux,dummy-virt (DT)
[   20.280280] Call trace:
[   20.280330]  show_stack+0x20/0x38 (C)
[   20.280435]  dump_stack_lvl+0x8c/0xd0
[   20.280554]  print_report+0x118/0x608
[   20.280635]  kasan_report+0xdc/0x128
[   20.280713]  __asan_report_load1_noabort+0x20/0x30
[   20.280767]  memcmp+0x198/0x1d8
[   20.280811]  kasan_memcmp+0x16c/0x300
[   20.280869]  kunit_try_run_case+0x170/0x3f0
[   20.281048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.281108]  kthread+0x328/0x630
[   20.281158]  ret_from_fork+0x10/0x20
[   20.281294] 
[   20.281369] Allocated by task 259:
[   20.281399]  kasan_save_stack+0x3c/0x68
[   20.281473]  kasan_save_track+0x20/0x40
[   20.281667]  kasan_save_alloc_info+0x40/0x58
[   20.281745]  __kasan_kmalloc+0xd4/0xd8
[   20.281795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.281966]  kasan_memcmp+0xbc/0x300
[   20.282015]  kunit_try_run_case+0x170/0x3f0
[   20.282056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.282108]  kthread+0x328/0x630
[   20.282167]  ret_from_fork+0x10/0x20
[   20.282223] 
[   20.282252] The buggy address belongs to the object at fff00000c791cec0
[   20.282252]  which belongs to the cache kmalloc-32 of size 32
[   20.282511] The buggy address is located 0 bytes to the right of
[   20.282511]  allocated 24-byte region [fff00000c791cec0, fff00000c791ced8)
[   20.282648] 
[   20.282731] The buggy address belongs to the physical page:
[   20.282800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c
[   20.282884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.283048] page_type: f5(slab)
[   20.283122] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.283216] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.283264] page dumped because: kasan: bad access detected
[   20.283298] 
[   20.283317] Memory state around the buggy address:
[   20.283359]  fff00000c791cd80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.283413]  fff00000c791ce00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.283476] >fff00000c791ce80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.283519]                                                     ^
[   20.283583]  fff00000c791cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.283645]  fff00000c791cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.283688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   20.265744] ==================================================================
[   20.265809] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   20.265974] Read of size 1 at addr ffff800080ac7b4a by task kunit_try_catch/255
[   20.266142] 
[   20.266198] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.266392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.266438] Hardware name: linux,dummy-virt (DT)
[   20.266510] Call trace:
[   20.266535]  show_stack+0x20/0x38 (C)
[   20.266588]  dump_stack_lvl+0x8c/0xd0
[   20.266641]  print_report+0x310/0x608
[   20.266807]  kasan_report+0xdc/0x128
[   20.266913]  __asan_report_load1_noabort+0x20/0x30
[   20.266967]  kasan_alloca_oob_right+0x2dc/0x340
[   20.267019]  kunit_try_run_case+0x170/0x3f0
[   20.267071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.267127]  kthread+0x328/0x630
[   20.267190]  ret_from_fork+0x10/0x20
[   20.267240] 
[   20.267262] The buggy address belongs to stack of task kunit_try_catch/255
[   20.267455] 
[   20.267528] The buggy address belongs to the virtual mapping at
[   20.267528]  [ffff800080ac0000, ffff800080ac9000) created by:
[   20.267528]  kernel_clone+0x150/0x7a8
[   20.267654] 
[   20.267693] The buggy address belongs to the physical page:
[   20.267750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be6
[   20.267884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.267988] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.268081] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.268129] page dumped because: kasan: bad access detected
[   20.268164] 
[   20.268184] Memory state around the buggy address:
[   20.268217]  ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.268265]  ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.268310] >ffff800080ac7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.268354]                                               ^
[   20.268549]  ffff800080ac7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.268656]  ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.268710] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   20.257349] ==================================================================
[   20.257508] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   20.257568] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/253
[   20.257620] 
[   20.257650] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.257734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.257760] Hardware name: linux,dummy-virt (DT)
[   20.257807] Call trace:
[   20.258961]  show_stack+0x20/0x38 (C)
[   20.259031]  dump_stack_lvl+0x8c/0xd0
[   20.259083]  print_report+0x310/0x608
[   20.259129]  kasan_report+0xdc/0x128
[   20.259180]  __asan_report_load1_noabort+0x20/0x30
[   20.259231]  kasan_alloca_oob_left+0x2b8/0x310
[   20.259282]  kunit_try_run_case+0x170/0x3f0
[   20.259331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.259385]  kthread+0x328/0x630
[   20.259432]  ret_from_fork+0x10/0x20
[   20.259479] 
[   20.259498] The buggy address belongs to stack of task kunit_try_catch/253
[   20.259570] 
[   20.259595] The buggy address belongs to the virtual mapping at
[   20.259595]  [ffff800080ac0000, ffff800080ac9000) created by:
[   20.259595]  kernel_clone+0x150/0x7a8
[   20.259674] 
[   20.259696] The buggy address belongs to the physical page:
[   20.259726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be6
[   20.259778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.259842] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.259908] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.259952] page dumped because: kasan: bad access detected
[   20.259985] 
[   20.260004] Memory state around the buggy address:
[   20.260037]  ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.260085]  ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.260131] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   20.260173]                                                     ^
[   20.260211]  ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.260257]  ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.260296] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   20.246023] ==================================================================
[   20.246144] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.246251] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/251
[   20.246303] 
[   20.246397] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.246510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.246586] Hardware name: linux,dummy-virt (DT)
[   20.246639] Call trace:
[   20.246677]  show_stack+0x20/0x38 (C)
[   20.246731]  dump_stack_lvl+0x8c/0xd0
[   20.246797]  print_report+0x310/0x608
[   20.246843]  kasan_report+0xdc/0x128
[   20.247205]  __asan_report_load1_noabort+0x20/0x30
[   20.247317]  kasan_stack_oob+0x238/0x270
[   20.247402]  kunit_try_run_case+0x170/0x3f0
[   20.247456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.247539]  kthread+0x328/0x630
[   20.247612]  ret_from_fork+0x10/0x20
[   20.247668] 
[   20.247751] The buggy address belongs to stack of task kunit_try_catch/251
[   20.248100]  and is located at offset 138 in frame:
[   20.248153]  kasan_stack_oob+0x0/0x270
[   20.248370] 
[   20.248402] This frame has 4 objects:
[   20.248629]  [48, 49) '__assertion'
[   20.248685]  [64, 72) 'array'
[   20.248720]  [96, 112) '__assertion'
[   20.248846]  [128, 138) 'stack_array'
[   20.249128] 
[   20.249216] The buggy address belongs to the virtual mapping at
[   20.249216]  [ffff800080ac0000, ffff800080ac9000) created by:
[   20.249216]  kernel_clone+0x150/0x7a8
[   20.249413] 
[   20.249475] The buggy address belongs to the physical page:
[   20.249505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105be6
[   20.249557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.249986] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.250181] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.250286] page dumped because: kasan: bad access detected
[   20.250407] 
[   20.250495] Memory state around the buggy address:
[   20.250618]  ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.250743]  ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   20.250828] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   20.251204]                                   ^
[   20.251372]  ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   20.251497]  ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.251572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   20.231894] ==================================================================
[   20.231955] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.232426] Read of size 1 at addr ffffab84a02035ad by task kunit_try_catch/247
[   20.232526] 
[   20.232577] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.232670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.232700] Hardware name: linux,dummy-virt (DT)
[   20.232866] Call trace:
[   20.232894]  show_stack+0x20/0x38 (C)
[   20.233011]  dump_stack_lvl+0x8c/0xd0
[   20.233073]  print_report+0x310/0x608
[   20.233167]  kasan_report+0xdc/0x128
[   20.233263]  __asan_report_load1_noabort+0x20/0x30
[   20.233368]  kasan_global_oob_right+0x230/0x270
[   20.233505]  kunit_try_run_case+0x170/0x3f0
[   20.233566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.233621]  kthread+0x328/0x630
[   20.233666]  ret_from_fork+0x10/0x20
[   20.233877] 
[   20.234033] The buggy address belongs to the variable:
[   20.234152]  global_array+0xd/0x40
[   20.234245] 
[   20.234396] The buggy address belongs to the virtual mapping at
[   20.234396]  [ffffab849e420000, ffffab84a02c1000) created by:
[   20.234396]  paging_init+0x66c/0x7d0
[   20.234505] 
[   20.236047] The buggy address belongs to the physical page:
[   20.236093] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03
[   20.236151] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.236219] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000
[   20.236272] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.236315] page dumped because: kasan: bad access detected
[   20.236348] 
[   20.236365] Memory state around the buggy address:
[   20.236397]  ffffab84a0203480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.236443]  ffffab84a0203500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   20.236487] >ffffab84a0203580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   20.236529]                                   ^
[   20.236562]  ffffab84a0203600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   20.236606]  ffffab84a0203680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   20.236646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   20.208949] ==================================================================
[   20.209022] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.209083] Free of addr fff00000c791d901 by task kunit_try_catch/243
[   20.209127] 
[   20.209161] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.209247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.209276] Hardware name: linux,dummy-virt (DT)
[   20.209307] Call trace:
[   20.209331]  show_stack+0x20/0x38 (C)
[   20.209379]  dump_stack_lvl+0x8c/0xd0
[   20.209429]  print_report+0x118/0x608
[   20.209473]  kasan_report_invalid_free+0xc0/0xe8
[   20.209524]  check_slab_allocation+0xfc/0x108
[   20.209570]  __kasan_mempool_poison_object+0x78/0x150
[   20.209620]  mempool_free+0x28c/0x328
[   20.209667]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.209722]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.209776]  kunit_try_run_case+0x170/0x3f0
[   20.209825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.209893]  kthread+0x328/0x630
[   20.209938]  ret_from_fork+0x10/0x20
[   20.209986] 
[   20.210006] Allocated by task 243:
[   20.210034]  kasan_save_stack+0x3c/0x68
[   20.210074]  kasan_save_track+0x20/0x40
[   20.210110]  kasan_save_alloc_info+0x40/0x58
[   20.210149]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.210192]  remove_element+0x130/0x1f8
[   20.210230]  mempool_alloc_preallocated+0x58/0xc0
[   20.210272]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   20.210316]  mempool_kmalloc_invalid_free+0xc0/0x118
[   20.210358]  kunit_try_run_case+0x170/0x3f0
[   20.210398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.210444]  kthread+0x328/0x630
[   20.210480]  ret_from_fork+0x10/0x20
[   20.210517] 
[   20.210536] The buggy address belongs to the object at fff00000c791d900
[   20.210536]  which belongs to the cache kmalloc-128 of size 128
[   20.210593] The buggy address is located 1 bytes inside of
[   20.210593]  128-byte region [fff00000c791d900, fff00000c791d980)
[   20.210654] 
[   20.210673] The buggy address belongs to the physical page:
[   20.210703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.210756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.210807] page_type: f5(slab)
[   20.210845] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.210907] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.210951] page dumped because: kasan: bad access detected
[   20.210983] 
[   20.211000] Memory state around the buggy address:
[   20.211031]  fff00000c791d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.211078]  fff00000c791d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.211123] >fff00000c791d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.211170]                    ^
[   20.211196]  fff00000c791d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.211240]  fff00000c791da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.211282] ==================================================================
[   20.222833] ==================================================================
[   20.222955] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.223016] Free of addr fff00000c7adc001 by task kunit_try_catch/245
[   20.223122] 
[   20.223159] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.223448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.223483] Hardware name: linux,dummy-virt (DT)
[   20.223573] Call trace:
[   20.223600]  show_stack+0x20/0x38 (C)
[   20.223652]  dump_stack_lvl+0x8c/0xd0
[   20.223702]  print_report+0x118/0x608
[   20.223747]  kasan_report_invalid_free+0xc0/0xe8
[   20.223823]  __kasan_mempool_poison_object+0xfc/0x150
[   20.223888]  mempool_free+0x28c/0x328
[   20.223936]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.224105]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.224279]  kunit_try_run_case+0x170/0x3f0
[   20.224411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.224498]  kthread+0x328/0x630
[   20.224545]  ret_from_fork+0x10/0x20
[   20.224601] 
[   20.224622] The buggy address belongs to the physical page:
[   20.224654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107adc
[   20.224745] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.224794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.224849] page_type: f8(unknown)
[   20.224901] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.224957] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.225010] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.225190] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.225296] head: 0bfffe0000000002 ffffc1ffc31eb701 00000000ffffffff 00000000ffffffff
[   20.225410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.225521] page dumped because: kasan: bad access detected
[   20.225576] 
[   20.225610] Memory state around the buggy address:
[   20.225707]  fff00000c7adbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.225752]  fff00000c7adbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.226107] >fff00000c7adc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.226170]                    ^
[   20.226208]  fff00000c7adc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.226267]  fff00000c7adc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.226308] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   20.125112] ==================================================================
[   20.125181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.125241] Free of addr fff00000c791d500 by task kunit_try_catch/237
[   20.125284] 
[   20.125317] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.125403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.125432] Hardware name: linux,dummy-virt (DT)
[   20.125464] Call trace:
[   20.125487]  show_stack+0x20/0x38 (C)
[   20.125535]  dump_stack_lvl+0x8c/0xd0
[   20.125584]  print_report+0x118/0x608
[   20.125631]  kasan_report_invalid_free+0xc0/0xe8
[   20.125682]  check_slab_allocation+0xd4/0x108
[   20.125728]  __kasan_mempool_poison_object+0x78/0x150
[   20.125779]  mempool_free+0x28c/0x328
[   20.125829]  mempool_double_free_helper+0x150/0x2e8
[   20.125895]  mempool_kmalloc_double_free+0xc0/0x118
[   20.125947]  kunit_try_run_case+0x170/0x3f0
[   20.125997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.126052]  kthread+0x328/0x630
[   20.126097]  ret_from_fork+0x10/0x20
[   20.126144] 
[   20.126164] Allocated by task 237:
[   20.126191]  kasan_save_stack+0x3c/0x68
[   20.126231]  kasan_save_track+0x20/0x40
[   20.126266]  kasan_save_alloc_info+0x40/0x58
[   20.126306]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.126348]  remove_element+0x130/0x1f8
[   20.126385]  mempool_alloc_preallocated+0x58/0xc0
[   20.126427]  mempool_double_free_helper+0x94/0x2e8
[   20.126469]  mempool_kmalloc_double_free+0xc0/0x118
[   20.126510]  kunit_try_run_case+0x170/0x3f0
[   20.126553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.126596]  kthread+0x328/0x630
[   20.126632]  ret_from_fork+0x10/0x20
[   20.126668] 
[   20.126685] Freed by task 237:
[   20.126712]  kasan_save_stack+0x3c/0x68
[   20.126747]  kasan_save_track+0x20/0x40
[   20.126783]  kasan_save_free_info+0x4c/0x78
[   20.126823]  __kasan_mempool_poison_object+0xc0/0x150
[   20.126896]  mempool_free+0x28c/0x328
[   20.126935]  mempool_double_free_helper+0x100/0x2e8
[   20.126977]  mempool_kmalloc_double_free+0xc0/0x118
[   20.127019]  kunit_try_run_case+0x170/0x3f0
[   20.127058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.127102]  kthread+0x328/0x630
[   20.127136]  ret_from_fork+0x10/0x20
[   20.127178] 
[   20.127196] The buggy address belongs to the object at fff00000c791d500
[   20.127196]  which belongs to the cache kmalloc-128 of size 128
[   20.127257] The buggy address is located 0 bytes inside of
[   20.127257]  128-byte region [fff00000c791d500, fff00000c791d580)
[   20.127317] 
[   20.127336] The buggy address belongs to the physical page:
[   20.127366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.127421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.127470] page_type: f5(slab)
[   20.127511] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.127564] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.127607] page dumped because: kasan: bad access detected
[   20.127639] 
[   20.127656] Memory state around the buggy address:
[   20.127686]  fff00000c791d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.127731]  fff00000c791d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.127776] >fff00000c791d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.127819]                    ^
[   20.127845]  fff00000c791d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.127926]  fff00000c791d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.127989] ==================================================================
[   20.184788] ==================================================================
[   20.185330] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.185995] Free of addr fff00000c795c000 by task kunit_try_catch/241
[   20.186045] 
[   20.186082] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.186167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.186196] Hardware name: linux,dummy-virt (DT)
[   20.187754] Call trace:
[   20.188049]  show_stack+0x20/0x38 (C)
[   20.188625]  dump_stack_lvl+0x8c/0xd0
[   20.188873]  print_report+0x118/0x608
[   20.188922]  kasan_report_invalid_free+0xc0/0xe8
[   20.188971]  __kasan_mempool_poison_pages+0xe0/0xe8
[   20.189021]  mempool_free+0x24c/0x328
[   20.190339]  mempool_double_free_helper+0x150/0x2e8
[   20.190409]  mempool_page_alloc_double_free+0xbc/0x118
[   20.190460]  kunit_try_run_case+0x170/0x3f0
[   20.191659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.191862]  kthread+0x328/0x630
[   20.192364]  ret_from_fork+0x10/0x20
[   20.192776] 
[   20.193317] The buggy address belongs to the physical page:
[   20.193393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.194021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.194459] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.194762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.195044] page dumped because: kasan: bad access detected
[   20.195081] 
[   20.195099] Memory state around the buggy address:
[   20.195623]  fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.195678]  fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.196240] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.196439]                    ^
[   20.197006]  fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.197076]  fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.197119] ==================================================================
[   20.154959] ==================================================================
[   20.155045] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   20.155141] Free of addr fff00000c795c000 by task kunit_try_catch/239
[   20.155372] 
[   20.155679] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.155944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.156007] Hardware name: linux,dummy-virt (DT)
[   20.156059] Call trace:
[   20.156223]  show_stack+0x20/0x38 (C)
[   20.156374]  dump_stack_lvl+0x8c/0xd0
[   20.156423]  print_report+0x118/0x608
[   20.156469]  kasan_report_invalid_free+0xc0/0xe8
[   20.156520]  __kasan_mempool_poison_object+0x14c/0x150
[   20.156872]  mempool_free+0x28c/0x328
[   20.157267]  mempool_double_free_helper+0x150/0x2e8
[   20.157385]  mempool_kmalloc_large_double_free+0xc0/0x118
[   20.157666]  kunit_try_run_case+0x170/0x3f0
[   20.158240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.158635]  kthread+0x328/0x630
[   20.158741]  ret_from_fork+0x10/0x20
[   20.159306] 
[   20.159430] The buggy address belongs to the physical page:
[   20.159634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.160022] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.160364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.160425] page_type: f8(unknown)
[   20.160665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.160729] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.161057] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.161119] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.161470] head: 0bfffe0000000002 ffffc1ffc31e5701 00000000ffffffff 00000000ffffffff
[   20.162182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.162261] page dumped because: kasan: bad access detected
[   20.162573] 
[   20.162598] Memory state around the buggy address:
[   20.162635]  fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.162688]  fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.162734] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.162776]                    ^
[   20.163412]  fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.163471]  fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.163514] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   20.017196] ==================================================================
[   20.017263] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.017322] Read of size 1 at addr fff00000c7a88000 by task kunit_try_catch/231
[   20.017372] 
[   20.017407] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.018032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.018078] Hardware name: linux,dummy-virt (DT)
[   20.018161] Call trace:
[   20.018188]  show_stack+0x20/0x38 (C)
[   20.018599]  dump_stack_lvl+0x8c/0xd0
[   20.018792]  print_report+0x118/0x608
[   20.018920]  kasan_report+0xdc/0x128
[   20.019187]  __asan_report_load1_noabort+0x20/0x30
[   20.019293]  mempool_uaf_helper+0x314/0x340
[   20.019549]  mempool_kmalloc_large_uaf+0xc4/0x120
[   20.019641]  kunit_try_run_case+0x170/0x3f0
[   20.019745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.019798]  kthread+0x328/0x630
[   20.019843]  ret_from_fork+0x10/0x20
[   20.020139] 
[   20.020167] The buggy address belongs to the physical page:
[   20.020246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a88
[   20.020307] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.020354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.020410] page_type: f8(unknown)
[   20.020451] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.020504] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.020556] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.020607] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.020659] head: 0bfffe0000000002 ffffc1ffc31ea201 00000000ffffffff 00000000ffffffff
[   20.020710] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.020752] page dumped because: kasan: bad access detected
[   20.020784] 
[   20.020802] Memory state around the buggy address:
[   20.020834]  fff00000c7a87f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.020890]  fff00000c7a87f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.021107] >fff00000c7a88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.021148]                    ^
[   20.021241]  fff00000c7a88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.021286]  fff00000c7a88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.021652] ==================================================================
[   20.102701] ==================================================================
[   20.102772] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   20.102838] Read of size 1 at addr fff00000c795c000 by task kunit_try_catch/235
[   20.102910] 
[   20.102946] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.103035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.103064] Hardware name: linux,dummy-virt (DT)
[   20.103099] Call trace:
[   20.103121]  show_stack+0x20/0x38 (C)
[   20.103176]  dump_stack_lvl+0x8c/0xd0
[   20.103227]  print_report+0x118/0x608
[   20.103273]  kasan_report+0xdc/0x128
[   20.103317]  __asan_report_load1_noabort+0x20/0x30
[   20.103367]  mempool_uaf_helper+0x314/0x340
[   20.103416]  mempool_page_alloc_uaf+0xc0/0x118
[   20.103462]  kunit_try_run_case+0x170/0x3f0
[   20.103513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.103567]  kthread+0x328/0x630
[   20.103614]  ret_from_fork+0x10/0x20
[   20.103664] 
[   20.103684] The buggy address belongs to the physical page:
[   20.103718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10795c
[   20.103772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.103840] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.103938] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.103999] page dumped because: kasan: bad access detected
[   20.104033] 
[   20.104051] Memory state around the buggy address:
[   20.104090]  fff00000c795bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104135]  fff00000c795bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104181] >fff00000c795c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104222]                    ^
[   20.104251]  fff00000c795c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104295]  fff00000c795c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.104336] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   20.046182] ==================================================================
[   20.046248] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.046307] Read of size 1 at addr fff00000c7a61240 by task kunit_try_catch/233
[   20.046357] 
[   20.046391] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.046478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.047623] Hardware name: linux,dummy-virt (DT)
[   20.047711] Call trace:
[   20.047744]  show_stack+0x20/0x38 (C)
[   20.047869]  dump_stack_lvl+0x8c/0xd0
[   20.048200]  print_report+0x118/0x608
[   20.048431]  kasan_report+0xdc/0x128
[   20.048508]  __asan_report_load1_noabort+0x20/0x30
[   20.048560]  mempool_uaf_helper+0x314/0x340
[   20.048610]  mempool_slab_uaf+0xc0/0x118
[   20.048710]  kunit_try_run_case+0x170/0x3f0
[   20.049160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.049645]  kthread+0x328/0x630
[   20.050144]  ret_from_fork+0x10/0x20
[   20.050472] 
[   20.050507] Allocated by task 233:
[   20.050539]  kasan_save_stack+0x3c/0x68
[   20.050585]  kasan_save_track+0x20/0x40
[   20.050927]  kasan_save_alloc_info+0x40/0x58
[   20.051227]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.051274]  remove_element+0x16c/0x1f8
[   20.051644]  mempool_alloc_preallocated+0x58/0xc0
[   20.051696]  mempool_uaf_helper+0xa4/0x340
[   20.051738]  mempool_slab_uaf+0xc0/0x118
[   20.051950]  kunit_try_run_case+0x170/0x3f0
[   20.052007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.052363]  kthread+0x328/0x630
[   20.052435]  ret_from_fork+0x10/0x20
[   20.052766] 
[   20.052898] Freed by task 233:
[   20.053093]  kasan_save_stack+0x3c/0x68
[   20.053253]  kasan_save_track+0x20/0x40
[   20.053380]  kasan_save_free_info+0x4c/0x78
[   20.053509]  __kasan_mempool_poison_object+0xc0/0x150
[   20.053770]  mempool_free+0x28c/0x328
[   20.054072]  mempool_uaf_helper+0x104/0x340
[   20.054208]  mempool_slab_uaf+0xc0/0x118
[   20.054460]  kunit_try_run_case+0x170/0x3f0
[   20.054575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.054621]  kthread+0x328/0x630
[   20.055060]  ret_from_fork+0x10/0x20
[   20.055474] 
[   20.055538] The buggy address belongs to the object at fff00000c7a61240
[   20.055538]  which belongs to the cache test_cache of size 123
[   20.055875] The buggy address is located 0 bytes inside of
[   20.055875]  freed 123-byte region [fff00000c7a61240, fff00000c7a612bb)
[   20.055947] 
[   20.055967] The buggy address belongs to the physical page:
[   20.055998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a61
[   20.056236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.056392] page_type: f5(slab)
[   20.056451] raw: 0bfffe0000000000 fff00000c59d6b40 dead000000000122 0000000000000000
[   20.056723] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.056833] page dumped because: kasan: bad access detected
[   20.056876] 
[   20.056894] Memory state around the buggy address:
[   20.057438]  fff00000c7a61100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.057749]  fff00000c7a61180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.057956] >fff00000c7a61200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.058002]                                            ^
[   20.058038]  fff00000c7a61280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.058521]  fff00000c7a61300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.058581] ==================================================================
[   20.000950] ==================================================================
[   20.001027] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.001097] Read of size 1 at addr fff00000c791d100 by task kunit_try_catch/229
[   20.001150] 
[   20.001191] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.001278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.001307] Hardware name: linux,dummy-virt (DT)
[   20.001342] Call trace:
[   20.001365]  show_stack+0x20/0x38 (C)
[   20.001416]  dump_stack_lvl+0x8c/0xd0
[   20.001467]  print_report+0x118/0x608
[   20.001513]  kasan_report+0xdc/0x128
[   20.001557]  __asan_report_load1_noabort+0x20/0x30
[   20.001609]  mempool_uaf_helper+0x314/0x340
[   20.001658]  mempool_kmalloc_uaf+0xc4/0x120
[   20.001706]  kunit_try_run_case+0x170/0x3f0
[   20.001757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.001811]  kthread+0x328/0x630
[   20.001887]  ret_from_fork+0x10/0x20
[   20.001938] 
[   20.001957] Allocated by task 229:
[   20.001985]  kasan_save_stack+0x3c/0x68
[   20.002025]  kasan_save_track+0x20/0x40
[   20.002062]  kasan_save_alloc_info+0x40/0x58
[   20.002100]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.002142]  remove_element+0x130/0x1f8
[   20.002185]  mempool_alloc_preallocated+0x58/0xc0
[   20.002226]  mempool_uaf_helper+0xa4/0x340
[   20.002267]  mempool_kmalloc_uaf+0xc4/0x120
[   20.002305]  kunit_try_run_case+0x170/0x3f0
[   20.002345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.002391]  kthread+0x328/0x630
[   20.002426]  ret_from_fork+0x10/0x20
[   20.002462] 
[   20.002481] Freed by task 229:
[   20.002507]  kasan_save_stack+0x3c/0x68
[   20.002542]  kasan_save_track+0x20/0x40
[   20.002578]  kasan_save_free_info+0x4c/0x78
[   20.002615]  __kasan_mempool_poison_object+0xc0/0x150
[   20.002658]  mempool_free+0x28c/0x328
[   20.002695]  mempool_uaf_helper+0x104/0x340
[   20.002735]  mempool_kmalloc_uaf+0xc4/0x120
[   20.002773]  kunit_try_run_case+0x170/0x3f0
[   20.002812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.002867]  kthread+0x328/0x630
[   20.002902]  ret_from_fork+0x10/0x20
[   20.002937] 
[   20.002958] The buggy address belongs to the object at fff00000c791d100
[   20.002958]  which belongs to the cache kmalloc-128 of size 128
[   20.003018] The buggy address is located 0 bytes inside of
[   20.003018]  freed 128-byte region [fff00000c791d100, fff00000c791d180)
[   20.003080] 
[   20.003101] The buggy address belongs to the physical page:
[   20.003132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.003192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.003244] page_type: f5(slab)
[   20.003286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.003339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.003382] page dumped because: kasan: bad access detected
[   20.003414] 
[   20.003432] Memory state around the buggy address:
[   20.003464]  fff00000c791d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.003510]  fff00000c791d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.003557] >fff00000c791d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.003599]                    ^
[   20.003627]  fff00000c791d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.003672]  fff00000c791d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.003714] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   19.933393] ==================================================================
[   19.933451] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.933510] Read of size 1 at addr fff00000c7a6e001 by task kunit_try_catch/225
[   19.933559] 
[   19.933591] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.933676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.933703] Hardware name: linux,dummy-virt (DT)
[   19.933735] Call trace:
[   19.933757]  show_stack+0x20/0x38 (C)
[   19.935894]  dump_stack_lvl+0x8c/0xd0
[   19.936288]  print_report+0x118/0x608
[   19.936333]  kasan_report+0xdc/0x128
[   19.936378]  __asan_report_load1_noabort+0x20/0x30
[   19.936426]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.936477]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.936530]  kunit_try_run_case+0x170/0x3f0
[   19.936577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.936630]  kthread+0x328/0x630
[   19.936675]  ret_from_fork+0x10/0x20
[   19.936723] 
[   19.936743] The buggy address belongs to the physical page:
[   19.936779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a6c
[   19.936833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.936959] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.937019] page_type: f8(unknown)
[   19.937061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.937121] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.937242] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.937303] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.937357] head: 0bfffe0000000002 ffffc1ffc31e9b01 00000000ffffffff 00000000ffffffff
[   19.937409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.937876] page dumped because: kasan: bad access detected
[   19.938280] 
[   19.938338] Memory state around the buggy address:
[   19.938393]  fff00000c7a6df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.938474]  fff00000c7a6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.938698] >fff00000c7a6e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.939037]                    ^
[   19.939099]  fff00000c7a6e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.939155]  fff00000c7a6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.939244] ==================================================================
[   19.911022] ==================================================================
[   19.911092] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.911170] Read of size 1 at addr fff00000c7a5f173 by task kunit_try_catch/223
[   19.911220] 
[   19.911261] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.911350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.911377] Hardware name: linux,dummy-virt (DT)
[   19.911413] Call trace:
[   19.911437]  show_stack+0x20/0x38 (C)
[   19.911487]  dump_stack_lvl+0x8c/0xd0
[   19.911536]  print_report+0x118/0x608
[   19.911582]  kasan_report+0xdc/0x128
[   19.911625]  __asan_report_load1_noabort+0x20/0x30
[   19.911676]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.911728]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.911779]  kunit_try_run_case+0x170/0x3f0
[   19.911830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.911915]  kthread+0x328/0x630
[   19.911962]  ret_from_fork+0x10/0x20
[   19.912012] 
[   19.912031] Allocated by task 223:
[   19.912059]  kasan_save_stack+0x3c/0x68
[   19.912100]  kasan_save_track+0x20/0x40
[   19.912139]  kasan_save_alloc_info+0x40/0x58
[   19.912177]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.912221]  remove_element+0x130/0x1f8
[   19.912261]  mempool_alloc_preallocated+0x58/0xc0
[   19.912303]  mempool_oob_right_helper+0x98/0x2f0
[   19.912346]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.912386]  kunit_try_run_case+0x170/0x3f0
[   19.912427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.912471]  kthread+0x328/0x630
[   19.912527]  ret_from_fork+0x10/0x20
[   19.912563] 
[   19.912583] The buggy address belongs to the object at fff00000c7a5f100
[   19.912583]  which belongs to the cache kmalloc-128 of size 128
[   19.912642] The buggy address is located 0 bytes to the right of
[   19.912642]  allocated 115-byte region [fff00000c7a5f100, fff00000c7a5f173)
[   19.912710] 
[   19.912731] The buggy address belongs to the physical page:
[   19.912764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5f
[   19.912819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.912882] page_type: f5(slab)
[   19.912927] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.912980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.913023] page dumped because: kasan: bad access detected
[   19.913059] 
[   19.913077] Memory state around the buggy address:
[   19.913111]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.913158]  fff00000c7a5f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913205] >fff00000c7a5f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.913249]                                                              ^
[   19.913293]  fff00000c7a5f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913341]  fff00000c7a5f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.913382] ==================================================================
[   19.952297] ==================================================================
[   19.952418] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.952484] Read of size 1 at addr fff00000c5c432bb by task kunit_try_catch/227
[   19.952538] 
[   19.952571] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.953355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.954038] Hardware name: linux,dummy-virt (DT)
[   19.954738] Call trace:
[   19.954802]  show_stack+0x20/0x38 (C)
[   19.955068]  dump_stack_lvl+0x8c/0xd0
[   19.955325]  print_report+0x118/0x608
[   19.955504]  kasan_report+0xdc/0x128
[   19.955668]  __asan_report_load1_noabort+0x20/0x30
[   19.955727]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.956083]  mempool_slab_oob_right+0xc0/0x118
[   19.956238]  kunit_try_run_case+0x170/0x3f0
[   19.956401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.956532]  kthread+0x328/0x630
[   19.956758]  ret_from_fork+0x10/0x20
[   19.956869] 
[   19.956889] Allocated by task 227:
[   19.956917]  kasan_save_stack+0x3c/0x68
[   19.956957]  kasan_save_track+0x20/0x40
[   19.957049]  kasan_save_alloc_info+0x40/0x58
[   19.957090]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.957299]  remove_element+0x16c/0x1f8
[   19.957562]  mempool_alloc_preallocated+0x58/0xc0
[   19.957697]  mempool_oob_right_helper+0x98/0x2f0
[   19.957902]  mempool_slab_oob_right+0xc0/0x118
[   19.957960]  kunit_try_run_case+0x170/0x3f0
[   19.958086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.958338]  kthread+0x328/0x630
[   19.958377]  ret_from_fork+0x10/0x20
[   19.958614] 
[   19.958661] The buggy address belongs to the object at fff00000c5c43240
[   19.958661]  which belongs to the cache test_cache of size 123
[   19.959103] The buggy address is located 0 bytes to the right of
[   19.959103]  allocated 123-byte region [fff00000c5c43240, fff00000c5c432bb)
[   19.959178] 
[   19.959516] The buggy address belongs to the physical page:
[   19.959750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c43
[   19.959825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.960086] page_type: f5(slab)
[   19.960217] raw: 0bfffe0000000000 fff00000c59d6a00 dead000000000122 0000000000000000
[   19.960415] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.960461] page dumped because: kasan: bad access detected
[   19.960751] 
[   19.960779] Memory state around the buggy address:
[   19.960878]  fff00000c5c43180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.960925]  fff00000c5c43200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.960970] >fff00000c5c43280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.961086]                                         ^
[   19.961123]  fff00000c5c43300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.961352]  fff00000c5c43380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.961396] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   19.350981] ==================================================================
[   19.351069] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.351156] Read of size 1 at addr fff00000c5a3b3c0 by task kunit_try_catch/217
[   19.351210] 
[   19.351254] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.351345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.351374] Hardware name: linux,dummy-virt (DT)
[   19.351410] Call trace:
[   19.351436]  show_stack+0x20/0x38 (C)
[   19.351487]  dump_stack_lvl+0x8c/0xd0
[   19.351540]  print_report+0x118/0x608
[   19.351585]  kasan_report+0xdc/0x128
[   19.351631]  __kasan_check_byte+0x54/0x70
[   19.351678]  kmem_cache_destroy+0x34/0x218
[   19.351723]  kmem_cache_double_destroy+0x174/0x300
[   19.351775]  kunit_try_run_case+0x170/0x3f0
[   19.351825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.351896]  kthread+0x328/0x630
[   19.351942]  ret_from_fork+0x10/0x20
[   19.351993] 
[   19.352011] Allocated by task 217:
[   19.352040]  kasan_save_stack+0x3c/0x68
[   19.352081]  kasan_save_track+0x20/0x40
[   19.352117]  kasan_save_alloc_info+0x40/0x58
[   19.352157]  __kasan_slab_alloc+0xa8/0xb0
[   19.352194]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.352233]  __kmem_cache_create_args+0x178/0x280
[   19.352274]  kmem_cache_double_destroy+0xc0/0x300
[   19.352314]  kunit_try_run_case+0x170/0x3f0
[   19.352354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.352399]  kthread+0x328/0x630
[   19.352438]  ret_from_fork+0x10/0x20
[   19.352474] 
[   19.352493] Freed by task 217:
[   19.352519]  kasan_save_stack+0x3c/0x68
[   19.352554]  kasan_save_track+0x20/0x40
[   19.352590]  kasan_save_free_info+0x4c/0x78
[   19.352628]  __kasan_slab_free+0x6c/0x98
[   19.352665]  kmem_cache_free+0x260/0x468
[   19.352701]  slab_kmem_cache_release+0x38/0x50
[   19.352739]  kmem_cache_release+0x1c/0x30
[   19.352777]  kobject_put+0x17c/0x420
[   19.352813]  sysfs_slab_release+0x1c/0x30
[   19.352850]  kmem_cache_destroy+0x118/0x218
[   19.352898]  kmem_cache_double_destroy+0x128/0x300
[   19.352940]  kunit_try_run_case+0x170/0x3f0
[   19.352978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353022]  kthread+0x328/0x630
[   19.353058]  ret_from_fork+0x10/0x20
[   19.353095] 
[   19.353114] The buggy address belongs to the object at fff00000c5a3b3c0
[   19.353114]  which belongs to the cache kmem_cache of size 208
[   19.353175] The buggy address is located 0 bytes inside of
[   19.353175]  freed 208-byte region [fff00000c5a3b3c0, fff00000c5a3b490)
[   19.353237] 
[   19.353258] The buggy address belongs to the physical page:
[   19.353292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b
[   19.353346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.353402] page_type: f5(slab)
[   19.353447] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.353500] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.353545] page dumped because: kasan: bad access detected
[   19.353579] 
[   19.353597] Memory state around the buggy address:
[   19.353632]  fff00000c5a3b280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.353678]  fff00000c5a3b300: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   19.353725] >fff00000c5a3b380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.353767]                                            ^
[   19.353800]  fff00000c5a3b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.353846]  fff00000c5a3b480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.353896] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   19.268438] ==================================================================
[   19.268550] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   19.268627] Read of size 1 at addr fff00000c7a50000 by task kunit_try_catch/215
[   19.268680] 
[   19.268720] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   19.268811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.268839] Hardware name: linux,dummy-virt (DT)
[   19.268908] Call trace:
[   19.268935]  show_stack+0x20/0x38 (C)
[   19.268985]  dump_stack_lvl+0x8c/0xd0
[   19.269037]  print_report+0x118/0x608
[   19.269081]  kasan_report+0xdc/0x128
[   19.269126]  __asan_report_load1_noabort+0x20/0x30
[   19.269176]  kmem_cache_rcu_uaf+0x388/0x468
[   19.269224]  kunit_try_run_case+0x170/0x3f0
[   19.269275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.269330]  kthread+0x328/0x630
[   19.269380]  ret_from_fork+0x10/0x20
[   19.269432] 
[   19.269450] Allocated by task 215:
[   19.269478]  kasan_save_stack+0x3c/0x68
[   19.269520]  kasan_save_track+0x20/0x40
[   19.269557]  kasan_save_alloc_info+0x40/0x58
[   19.269596]  __kasan_slab_alloc+0xa8/0xb0
[   19.269633]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.269674]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.269715]  kunit_try_run_case+0x170/0x3f0
[   19.269755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.269801]  kthread+0x328/0x630
[   19.269836]  ret_from_fork+0x10/0x20
[   19.269883] 
[   19.269903] Freed by task 0:
[   19.269930]  kasan_save_stack+0x3c/0x68
[   19.269967]  kasan_save_track+0x20/0x40
[   19.270003]  kasan_save_free_info+0x4c/0x78
[   19.270041]  __kasan_slab_free+0x6c/0x98
[   19.270077]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.270116]  rcu_core+0x9f4/0x1e20
[   19.270151]  rcu_core_si+0x18/0x30
[   19.270185]  handle_softirqs+0x374/0xb28
[   19.270222]  __do_softirq+0x1c/0x28
[   19.270255] 
[   19.270275] Last potentially related work creation:
[   19.270300]  kasan_save_stack+0x3c/0x68
[   19.270336]  kasan_record_aux_stack+0xb4/0xc8
[   19.270374]  kmem_cache_free+0x120/0x468
[   19.270410]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.270451]  kunit_try_run_case+0x170/0x3f0
[   19.270488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.270533]  kthread+0x328/0x630
[   19.270567]  ret_from_fork+0x10/0x20
[   19.270603] 
[   19.270621] The buggy address belongs to the object at fff00000c7a50000
[   19.270621]  which belongs to the cache test_cache of size 200
[   19.270681] The buggy address is located 0 bytes inside of
[   19.270681]  freed 200-byte region [fff00000c7a50000, fff00000c7a500c8)
[   19.270743] 
[   19.270763] The buggy address belongs to the physical page:
[   19.270797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a50
[   19.270864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.270918] page_type: f5(slab)
[   19.270964] raw: 0bfffe0000000000 fff00000c59d6780 dead000000000122 0000000000000000
[   19.271020] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.271065] page dumped because: kasan: bad access detected
[   19.271101] 
[   19.271118] Memory state around the buggy address:
[   19.271158]  fff00000c7a4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271204]  fff00000c7a4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271251] >fff00000c7a50000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.271294]                    ^
[   19.271322]  fff00000c7a50080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.271367]  fff00000c7a50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.271409] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   18.758845] ==================================================================
[   18.758958] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   18.759018] Free of addr fff00000c7a36001 by task kunit_try_catch/213
[   18.759059] 
[   18.759098] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.759353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.759411] Hardware name: linux,dummy-virt (DT)
[   18.759446] Call trace:
[   18.759497]  show_stack+0x20/0x38 (C)
[   18.759558]  dump_stack_lvl+0x8c/0xd0
[   18.759644]  print_report+0x118/0x608
[   18.759694]  kasan_report_invalid_free+0xc0/0xe8
[   18.759745]  check_slab_allocation+0xfc/0x108
[   18.760047]  __kasan_slab_pre_free+0x2c/0x48
[   18.760216]  kmem_cache_free+0xf0/0x468
[   18.760390]  kmem_cache_invalid_free+0x184/0x3c8
[   18.760460]  kunit_try_run_case+0x170/0x3f0
[   18.760533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.760591]  kthread+0x328/0x630
[   18.760636]  ret_from_fork+0x10/0x20
[   18.760893] 
[   18.760960] Allocated by task 213:
[   18.761051]  kasan_save_stack+0x3c/0x68
[   18.761128]  kasan_save_track+0x20/0x40
[   18.761223]  kasan_save_alloc_info+0x40/0x58
[   18.761261]  __kasan_slab_alloc+0xa8/0xb0
[   18.761500]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.761681]  kmem_cache_invalid_free+0x12c/0x3c8
[   18.761797]  kunit_try_run_case+0x170/0x3f0
[   18.761867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.761912]  kthread+0x328/0x630
[   18.762161]  ret_from_fork+0x10/0x20
[   18.762310] 
[   18.762349] The buggy address belongs to the object at fff00000c7a36000
[   18.762349]  which belongs to the cache test_cache of size 200
[   18.762545] The buggy address is located 1 bytes inside of
[   18.762545]  200-byte region [fff00000c7a36000, fff00000c7a360c8)
[   18.762627] 
[   18.762646] The buggy address belongs to the physical page:
[   18.762880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a36
[   18.763068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.763199] page_type: f5(slab)
[   18.763336] raw: 0bfffe0000000000 fff00000c59d6640 dead000000000122 0000000000000000
[   18.763449] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.763537] page dumped because: kasan: bad access detected
[   18.763569] 
[   18.763587] Memory state around the buggy address:
[   18.763692]  fff00000c7a35f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.763958]  fff00000c7a35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.764016] >fff00000c7a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.764177]                    ^
[   18.764207]  fff00000c7a36080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.764280]  fff00000c7a36100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.764322] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   18.736641] ==================================================================
[   18.736713] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.736789] Free of addr fff00000c7a34000 by task kunit_try_catch/211
[   18.736834] 
[   18.736885] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.737022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.737088] Hardware name: linux,dummy-virt (DT)
[   18.737165] Call trace:
[   18.737215]  show_stack+0x20/0x38 (C)
[   18.737267]  dump_stack_lvl+0x8c/0xd0
[   18.737353]  print_report+0x118/0x608
[   18.737399]  kasan_report_invalid_free+0xc0/0xe8
[   18.737520]  check_slab_allocation+0xd4/0x108
[   18.737623]  __kasan_slab_pre_free+0x2c/0x48
[   18.737783]  kmem_cache_free+0xf0/0x468
[   18.737903]  kmem_cache_double_free+0x190/0x3c8
[   18.737996]  kunit_try_run_case+0x170/0x3f0
[   18.738077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.738257]  kthread+0x328/0x630
[   18.738468]  ret_from_fork+0x10/0x20
[   18.738533] 
[   18.738551] Allocated by task 211:
[   18.738582]  kasan_save_stack+0x3c/0x68
[   18.738707]  kasan_save_track+0x20/0x40
[   18.738867]  kasan_save_alloc_info+0x40/0x58
[   18.738999]  __kasan_slab_alloc+0xa8/0xb0
[   18.739075]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.739121]  kmem_cache_double_free+0x12c/0x3c8
[   18.739167]  kunit_try_run_case+0x170/0x3f0
[   18.739251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.739316]  kthread+0x328/0x630
[   18.739358]  ret_from_fork+0x10/0x20
[   18.739402] 
[   18.739428] Freed by task 211:
[   18.739455]  kasan_save_stack+0x3c/0x68
[   18.739490]  kasan_save_track+0x20/0x40
[   18.739525]  kasan_save_free_info+0x4c/0x78
[   18.739567]  __kasan_slab_free+0x6c/0x98
[   18.739603]  kmem_cache_free+0x260/0x468
[   18.739639]  kmem_cache_double_free+0x140/0x3c8
[   18.739679]  kunit_try_run_case+0x170/0x3f0
[   18.739723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.739768]  kthread+0x328/0x630
[   18.739802]  ret_from_fork+0x10/0x20
[   18.739836] 
[   18.739865] The buggy address belongs to the object at fff00000c7a34000
[   18.739865]  which belongs to the cache test_cache of size 200
[   18.739929] The buggy address is located 0 bytes inside of
[   18.739929]  200-byte region [fff00000c7a34000, fff00000c7a340c8)
[   18.740012] 
[   18.740037] The buggy address belongs to the physical page:
[   18.740070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a34
[   18.740128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.740470] page_type: f5(slab)
[   18.740619] raw: 0bfffe0000000000 fff00000c59d6500 dead000000000122 0000000000000000
[   18.740729] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.740773] page dumped because: kasan: bad access detected
[   18.740825] 
[   18.740844] Memory state around the buggy address:
[   18.740890]  fff00000c7a33f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.740965]  fff00000c7a33f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.741183] >fff00000c7a34000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.741247]                    ^
[   18.741324]  fff00000c7a34080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.741479]  fff00000c7a34100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.741556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   18.584998] ==================================================================
[   18.585062] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   18.585121] Read of size 1 at addr fff00000c79850c8 by task kunit_try_catch/209
[   18.585554] 
[   18.585689] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.586081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.586187] Hardware name: linux,dummy-virt (DT)
[   18.586262] Call trace:
[   18.586407]  show_stack+0x20/0x38 (C)
[   18.586472]  dump_stack_lvl+0x8c/0xd0
[   18.586564]  print_report+0x118/0x608
[   18.586851]  kasan_report+0xdc/0x128
[   18.587102]  __asan_report_load1_noabort+0x20/0x30
[   18.587174]  kmem_cache_oob+0x344/0x430
[   18.587357]  kunit_try_run_case+0x170/0x3f0
[   18.587467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.587528]  kthread+0x328/0x630
[   18.587574]  ret_from_fork+0x10/0x20
[   18.587630] 
[   18.587647] Allocated by task 209:
[   18.587817]  kasan_save_stack+0x3c/0x68
[   18.587992]  kasan_save_track+0x20/0x40
[   18.588093]  kasan_save_alloc_info+0x40/0x58
[   18.588187]  __kasan_slab_alloc+0xa8/0xb0
[   18.588373]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.588467]  kmem_cache_oob+0x12c/0x430
[   18.588692]  kunit_try_run_case+0x170/0x3f0
[   18.588906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.589012]  kthread+0x328/0x630
[   18.589167]  ret_from_fork+0x10/0x20
[   18.589362] 
[   18.589418] The buggy address belongs to the object at fff00000c7985000
[   18.589418]  which belongs to the cache test_cache of size 200
[   18.589602] The buggy address is located 0 bytes to the right of
[   18.589602]  allocated 200-byte region [fff00000c7985000, fff00000c79850c8)
[   18.589674] 
[   18.589987] The buggy address belongs to the physical page:
[   18.590039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107985
[   18.590207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.590301] page_type: f5(slab)
[   18.590481] raw: 0bfffe0000000000 fff00000c59d63c0 dead000000000122 0000000000000000
[   18.590734] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.590888] page dumped because: kasan: bad access detected
[   18.590975] 
[   18.591121] Memory state around the buggy address:
[   18.591195]  fff00000c7984f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.591332]  fff00000c7985000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.591380] >fff00000c7985080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.591423]                                               ^
[   18.591460]  fff00000c7985100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.591547]  fff00000c7985180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.591589] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   18.549580] ==================================================================
[   18.549770] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   18.550083] Read of size 8 at addr fff00000c797f680 by task kunit_try_catch/202
[   18.550220] 
[   18.550327] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.550528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.550606] Hardware name: linux,dummy-virt (DT)
[   18.550671] Call trace:
[   18.550729]  show_stack+0x20/0x38 (C)
[   18.550786]  dump_stack_lvl+0x8c/0xd0
[   18.550841]  print_report+0x118/0x608
[   18.550896]  kasan_report+0xdc/0x128
[   18.550942]  __asan_report_load8_noabort+0x20/0x30
[   18.550992]  workqueue_uaf+0x480/0x4a8
[   18.551038]  kunit_try_run_case+0x170/0x3f0
[   18.551543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.551621]  kthread+0x328/0x630
[   18.551990]  ret_from_fork+0x10/0x20
[   18.552400] 
[   18.552582] Allocated by task 202:
[   18.552682]  kasan_save_stack+0x3c/0x68
[   18.552729]  kasan_save_track+0x20/0x40
[   18.552765]  kasan_save_alloc_info+0x40/0x58
[   18.552836]  __kasan_kmalloc+0xd4/0xd8
[   18.552883]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.552923]  workqueue_uaf+0x13c/0x4a8
[   18.552962]  kunit_try_run_case+0x170/0x3f0
[   18.553000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.553046]  kthread+0x328/0x630
[   18.553081]  ret_from_fork+0x10/0x20
[   18.553117] 
[   18.553135] Freed by task 75:
[   18.553162]  kasan_save_stack+0x3c/0x68
[   18.553527]  kasan_save_track+0x20/0x40
[   18.553603]  kasan_save_free_info+0x4c/0x78
[   18.553747]  __kasan_slab_free+0x6c/0x98
[   18.553785]  kfree+0x214/0x3c8
[   18.554227]  workqueue_uaf_work+0x18/0x30
[   18.554293]  process_one_work+0x530/0xf98
[   18.554351]  worker_thread+0x618/0xf38
[   18.554405]  kthread+0x328/0x630
[   18.554440]  ret_from_fork+0x10/0x20
[   18.554478] 
[   18.554532] Last potentially related work creation:
[   18.554569]  kasan_save_stack+0x3c/0x68
[   18.554621]  kasan_record_aux_stack+0xb4/0xc8
[   18.554661]  __queue_work+0x65c/0x1008
[   18.554711]  queue_work_on+0xbc/0xf8
[   18.554768]  workqueue_uaf+0x210/0x4a8
[   18.554810]  kunit_try_run_case+0x170/0x3f0
[   18.554872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.554921]  kthread+0x328/0x630
[   18.554968]  ret_from_fork+0x10/0x20
[   18.555011] 
[   18.555056] The buggy address belongs to the object at fff00000c797f680
[   18.555056]  which belongs to the cache kmalloc-32 of size 32
[   18.555122] The buggy address is located 0 bytes inside of
[   18.555122]  freed 32-byte region [fff00000c797f680, fff00000c797f6a0)
[   18.555201] 
[   18.555223] The buggy address belongs to the physical page:
[   18.555260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797f
[   18.555333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.555401] page_type: f5(slab)
[   18.555455] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.555508] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.555561] page dumped because: kasan: bad access detected
[   18.555602] 
[   18.555620] Memory state around the buggy address:
[   18.555658]  fff00000c797f580: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.555705]  fff00000c797f600: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   18.555751] >fff00000c797f680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.555794]                    ^
[   18.555821]  fff00000c797f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.556640]  fff00000c797f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.556754] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   18.255060] ==================================================================
[   18.255278] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.255342] Read of size 1 at addr fff00000c5bdcd00 by task kunit_try_catch/198
[   18.255554] 
[   18.255621] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.255713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.255934] Hardware name: linux,dummy-virt (DT)
[   18.256100] Call trace:
[   18.256152]  show_stack+0x20/0x38 (C)
[   18.256294]  dump_stack_lvl+0x8c/0xd0
[   18.256471]  print_report+0x118/0x608
[   18.256601]  kasan_report+0xdc/0x128
[   18.256790]  __kasan_check_byte+0x54/0x70
[   18.256975]  ksize+0x30/0x88
[   18.257047]  ksize_uaf+0x168/0x5f8
[   18.257199]  kunit_try_run_case+0x170/0x3f0
[   18.257356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.257484]  kthread+0x328/0x630
[   18.257722]  ret_from_fork+0x10/0x20
[   18.258128] 
[   18.258174] Allocated by task 198:
[   18.258242]  kasan_save_stack+0x3c/0x68
[   18.258403]  kasan_save_track+0x20/0x40
[   18.258536]  kasan_save_alloc_info+0x40/0x58
[   18.258600]  __kasan_kmalloc+0xd4/0xd8
[   18.258635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.259038]  ksize_uaf+0xb8/0x5f8
[   18.259181]  kunit_try_run_case+0x170/0x3f0
[   18.259312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.259508]  kthread+0x328/0x630
[   18.259557]  ret_from_fork+0x10/0x20
[   18.259592] 
[   18.259668] Freed by task 198:
[   18.260002]  kasan_save_stack+0x3c/0x68
[   18.260072]  kasan_save_track+0x20/0x40
[   18.260227]  kasan_save_free_info+0x4c/0x78
[   18.260419]  __kasan_slab_free+0x6c/0x98
[   18.260554]  kfree+0x214/0x3c8
[   18.260589]  ksize_uaf+0x11c/0x5f8
[   18.260625]  kunit_try_run_case+0x170/0x3f0
[   18.260940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.261099]  kthread+0x328/0x630
[   18.261301]  ret_from_fork+0x10/0x20
[   18.261439] 
[   18.261602] The buggy address belongs to the object at fff00000c5bdcd00
[   18.261602]  which belongs to the cache kmalloc-128 of size 128
[   18.261697] The buggy address is located 0 bytes inside of
[   18.261697]  freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80)
[   18.261897] 
[   18.261943] The buggy address belongs to the physical page:
[   18.261991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.262046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.262097] page_type: f5(slab)
[   18.262137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.262200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.262259] page dumped because: kasan: bad access detected
[   18.262302] 
[   18.262320] Memory state around the buggy address:
[   18.262370]  fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.262416]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262467] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.262519]                    ^
[   18.262556]  fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262601]  fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262642] ==================================================================
[   18.272994] ==================================================================
[   18.273048] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.273341] Read of size 1 at addr fff00000c5bdcd78 by task kunit_try_catch/198
[   18.273529] 
[   18.273564] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.273660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.274046] Hardware name: linux,dummy-virt (DT)
[   18.274168] Call trace:
[   18.274195]  show_stack+0x20/0x38 (C)
[   18.274248]  dump_stack_lvl+0x8c/0xd0
[   18.274357]  print_report+0x118/0x608
[   18.274407]  kasan_report+0xdc/0x128
[   18.274451]  __asan_report_load1_noabort+0x20/0x30
[   18.274500]  ksize_uaf+0x544/0x5f8
[   18.274786]  kunit_try_run_case+0x170/0x3f0
[   18.274881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.274937]  kthread+0x328/0x630
[   18.275064]  ret_from_fork+0x10/0x20
[   18.275153] 
[   18.275201] Allocated by task 198:
[   18.275299]  kasan_save_stack+0x3c/0x68
[   18.275386]  kasan_save_track+0x20/0x40
[   18.275440]  kasan_save_alloc_info+0x40/0x58
[   18.275774]  __kasan_kmalloc+0xd4/0xd8
[   18.275820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.275897]  ksize_uaf+0xb8/0x5f8
[   18.276006]  kunit_try_run_case+0x170/0x3f0
[   18.276170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276305]  kthread+0x328/0x630
[   18.276427]  ret_from_fork+0x10/0x20
[   18.276604] 
[   18.276809] Freed by task 198:
[   18.276872]  kasan_save_stack+0x3c/0x68
[   18.276986]  kasan_save_track+0x20/0x40
[   18.277122]  kasan_save_free_info+0x4c/0x78
[   18.277225]  __kasan_slab_free+0x6c/0x98
[   18.277458]  kfree+0x214/0x3c8
[   18.277523]  ksize_uaf+0x11c/0x5f8
[   18.277806]  kunit_try_run_case+0x170/0x3f0
[   18.277907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.277959]  kthread+0x328/0x630
[   18.277995]  ret_from_fork+0x10/0x20
[   18.278033] 
[   18.278056] The buggy address belongs to the object at fff00000c5bdcd00
[   18.278056]  which belongs to the cache kmalloc-128 of size 128
[   18.278120] The buggy address is located 120 bytes inside of
[   18.278120]  freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80)
[   18.278261] 
[   18.278310] The buggy address belongs to the physical page:
[   18.278369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.278431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.278480] page_type: f5(slab)
[   18.278518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.278571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.278623] page dumped because: kasan: bad access detected
[   18.278655] 
[   18.278674] Memory state around the buggy address:
[   18.278713]  fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.278758]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278804] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.278844]                                                                 ^
[   18.278916]  fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278976]  fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.279017] ==================================================================
[   18.264812] ==================================================================
[   18.265057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.265203] Read of size 1 at addr fff00000c5bdcd00 by task kunit_try_catch/198
[   18.265318] 
[   18.265414] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.265505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.265792] Hardware name: linux,dummy-virt (DT)
[   18.265882] Call trace:
[   18.265909]  show_stack+0x20/0x38 (C)
[   18.266014]  dump_stack_lvl+0x8c/0xd0
[   18.266066]  print_report+0x118/0x608
[   18.266148]  kasan_report+0xdc/0x128
[   18.266202]  __asan_report_load1_noabort+0x20/0x30
[   18.266523]  ksize_uaf+0x598/0x5f8
[   18.266591]  kunit_try_run_case+0x170/0x3f0
[   18.266669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.266725]  kthread+0x328/0x630
[   18.266770]  ret_from_fork+0x10/0x20
[   18.267065] 
[   18.267112] Allocated by task 198:
[   18.267376]  kasan_save_stack+0x3c/0x68
[   18.267447]  kasan_save_track+0x20/0x40
[   18.267483]  kasan_save_alloc_info+0x40/0x58
[   18.267586]  __kasan_kmalloc+0xd4/0xd8
[   18.267632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.267671]  ksize_uaf+0xb8/0x5f8
[   18.267706]  kunit_try_run_case+0x170/0x3f0
[   18.267874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.268051]  kthread+0x328/0x630
[   18.268171]  ret_from_fork+0x10/0x20
[   18.268219] 
[   18.268240] Freed by task 198:
[   18.268268]  kasan_save_stack+0x3c/0x68
[   18.268304]  kasan_save_track+0x20/0x40
[   18.268611]  kasan_save_free_info+0x4c/0x78
[   18.268682]  __kasan_slab_free+0x6c/0x98
[   18.269064]  kfree+0x214/0x3c8
[   18.269306]  ksize_uaf+0x11c/0x5f8
[   18.269398]  kunit_try_run_case+0x170/0x3f0
[   18.269714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269849]  kthread+0x328/0x630
[   18.270062]  ret_from_fork+0x10/0x20
[   18.270401] 
[   18.270450] The buggy address belongs to the object at fff00000c5bdcd00
[   18.270450]  which belongs to the cache kmalloc-128 of size 128
[   18.270591] The buggy address is located 0 bytes inside of
[   18.270591]  freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80)
[   18.270742] 
[   18.270812] The buggy address belongs to the physical page:
[   18.270843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.271326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.271454] page_type: f5(slab)
[   18.271498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.271706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.271769] page dumped because: kasan: bad access detected
[   18.271809] 
[   18.271827] Memory state around the buggy address:
[   18.271894]  fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.271940]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.271984] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.272026]                    ^
[   18.272064]  fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272109]  fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272152] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   18.233760] ==================================================================
[   18.233810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.233878] Read of size 1 at addr fff00000c5bdcc78 by task kunit_try_catch/196
[   18.233929] 
[   18.233959] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.234045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.234074] Hardware name: linux,dummy-virt (DT)
[   18.234106] Call trace:
[   18.234145]  show_stack+0x20/0x38 (C)
[   18.234194]  dump_stack_lvl+0x8c/0xd0
[   18.234252]  print_report+0x118/0x608
[   18.234298]  kasan_report+0xdc/0x128
[   18.234351]  __asan_report_load1_noabort+0x20/0x30
[   18.234403]  ksize_unpoisons_memory+0x618/0x740
[   18.234454]  kunit_try_run_case+0x170/0x3f0
[   18.234508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.234569]  kthread+0x328/0x630
[   18.234615]  ret_from_fork+0x10/0x20
[   18.234662] 
[   18.234681] Allocated by task 196:
[   18.234722]  kasan_save_stack+0x3c/0x68
[   18.234770]  kasan_save_track+0x20/0x40
[   18.234807]  kasan_save_alloc_info+0x40/0x58
[   18.234844]  __kasan_kmalloc+0xd4/0xd8
[   18.235526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.235578]  ksize_unpoisons_memory+0xc0/0x740
[   18.235621]  kunit_try_run_case+0x170/0x3f0
[   18.235818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.235888]  kthread+0x328/0x630
[   18.235954]  ret_from_fork+0x10/0x20
[   18.236203] 
[   18.236332] The buggy address belongs to the object at fff00000c5bdcc00
[   18.236332]  which belongs to the cache kmalloc-128 of size 128
[   18.236397] The buggy address is located 5 bytes to the right of
[   18.236397]  allocated 115-byte region [fff00000c5bdcc00, fff00000c5bdcc73)
[   18.236470] 
[   18.236490] The buggy address belongs to the physical page:
[   18.236815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.236956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.237010] page_type: f5(slab)
[   18.237344] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.237501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.237557] page dumped because: kasan: bad access detected
[   18.237607] 
[   18.237944] Memory state around the buggy address:
[   18.238016]  fff00000c5bdcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.238101]  fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238150] >fff00000c5bdcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.238364]                                                                 ^
[   18.238521]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238647]  fff00000c5bdcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.239001] ==================================================================
[   18.240605] ==================================================================
[   18.240658] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.240810] Read of size 1 at addr fff00000c5bdcc7f by task kunit_try_catch/196
[   18.240925] 
[   18.240957] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.241335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.241409] Hardware name: linux,dummy-virt (DT)
[   18.241445] Call trace:
[   18.241485]  show_stack+0x20/0x38 (C)
[   18.241537]  dump_stack_lvl+0x8c/0xd0
[   18.241820]  print_report+0x118/0x608
[   18.241890]  kasan_report+0xdc/0x128
[   18.241938]  __asan_report_load1_noabort+0x20/0x30
[   18.241990]  ksize_unpoisons_memory+0x690/0x740
[   18.242119]  kunit_try_run_case+0x170/0x3f0
[   18.242172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.242501]  kthread+0x328/0x630
[   18.242581]  ret_from_fork+0x10/0x20
[   18.242748] 
[   18.242787] Allocated by task 196:
[   18.242817]  kasan_save_stack+0x3c/0x68
[   18.243093]  kasan_save_track+0x20/0x40
[   18.243173]  kasan_save_alloc_info+0x40/0x58
[   18.243221]  __kasan_kmalloc+0xd4/0xd8
[   18.243294]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.243349]  ksize_unpoisons_memory+0xc0/0x740
[   18.243392]  kunit_try_run_case+0x170/0x3f0
[   18.243658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.243745]  kthread+0x328/0x630
[   18.243795]  ret_from_fork+0x10/0x20
[   18.243831] 
[   18.244068] The buggy address belongs to the object at fff00000c5bdcc00
[   18.244068]  which belongs to the cache kmalloc-128 of size 128
[   18.244310] The buggy address is located 12 bytes to the right of
[   18.244310]  allocated 115-byte region [fff00000c5bdcc00, fff00000c5bdcc73)
[   18.244516] 
[   18.244539] The buggy address belongs to the physical page:
[   18.244569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.244777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.244911] page_type: f5(slab)
[   18.245009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.245127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.245204] page dumped because: kasan: bad access detected
[   18.245346] 
[   18.245444] Memory state around the buggy address:
[   18.245600]  fff00000c5bdcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.245675]  fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.246078] >fff00000c5bdcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.246263]                                                                 ^
[   18.246366]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.246450]  fff00000c5bdcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.246620] ==================================================================
[   18.226223] ==================================================================
[   18.226324] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.226601] Read of size 1 at addr fff00000c5bdcc73 by task kunit_try_catch/196
[   18.226901] 
[   18.227033] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.227161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.227207] Hardware name: linux,dummy-virt (DT)
[   18.227240] Call trace:
[   18.227299]  show_stack+0x20/0x38 (C)
[   18.227545]  dump_stack_lvl+0x8c/0xd0
[   18.227597]  print_report+0x118/0x608
[   18.227741]  kasan_report+0xdc/0x128
[   18.227795]  __asan_report_load1_noabort+0x20/0x30
[   18.227959]  ksize_unpoisons_memory+0x628/0x740
[   18.228168]  kunit_try_run_case+0x170/0x3f0
[   18.228223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.228278]  kthread+0x328/0x630
[   18.228323]  ret_from_fork+0x10/0x20
[   18.228371] 
[   18.228390] Allocated by task 196:
[   18.228417]  kasan_save_stack+0x3c/0x68
[   18.228457]  kasan_save_track+0x20/0x40
[   18.228493]  kasan_save_alloc_info+0x40/0x58
[   18.228532]  __kasan_kmalloc+0xd4/0xd8
[   18.228567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.228606]  ksize_unpoisons_memory+0xc0/0x740
[   18.228646]  kunit_try_run_case+0x170/0x3f0
[   18.228686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.228730]  kthread+0x328/0x630
[   18.228764]  ret_from_fork+0x10/0x20
[   18.229158] 
[   18.229239] The buggy address belongs to the object at fff00000c5bdcc00
[   18.229239]  which belongs to the cache kmalloc-128 of size 128
[   18.229396] The buggy address is located 0 bytes to the right of
[   18.229396]  allocated 115-byte region [fff00000c5bdcc00, fff00000c5bdcc73)
[   18.229642] 
[   18.229697] The buggy address belongs to the physical page:
[   18.229734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.230265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.230360] page_type: f5(slab)
[   18.230494] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.230600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.231001] page dumped because: kasan: bad access detected
[   18.231066] 
[   18.231124] Memory state around the buggy address:
[   18.231871]  fff00000c5bdcb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.231954]  fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232024] >fff00000c5bdcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.232099]                                                              ^
[   18.232179]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232309]  fff00000c5bdcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232406] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   18.202008] ==================================================================
[   18.202079] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   18.202249] Free of addr fff00000c59e5600 by task kunit_try_catch/194
[   18.202304] 
[   18.202333] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.202419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.202447] Hardware name: linux,dummy-virt (DT)
[   18.202481] Call trace:
[   18.202523]  show_stack+0x20/0x38 (C)
[   18.202575]  dump_stack_lvl+0x8c/0xd0
[   18.202631]  print_report+0x118/0x608
[   18.202676]  kasan_report_invalid_free+0xc0/0xe8
[   18.202730]  check_slab_allocation+0xd4/0x108
[   18.202785]  __kasan_slab_pre_free+0x2c/0x48
[   18.202840]  kfree+0xe8/0x3c8
[   18.202893]  kfree_sensitive+0x3c/0xb0
[   18.202938]  kmalloc_double_kzfree+0x168/0x308
[   18.202986]  kunit_try_run_case+0x170/0x3f0
[   18.203040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.203092]  kthread+0x328/0x630
[   18.203157]  ret_from_fork+0x10/0x20
[   18.203204] 
[   18.203221] Allocated by task 194:
[   18.203249]  kasan_save_stack+0x3c/0x68
[   18.203288]  kasan_save_track+0x20/0x40
[   18.203323]  kasan_save_alloc_info+0x40/0x58
[   18.203363]  __kasan_kmalloc+0xd4/0xd8
[   18.203398]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.203435]  kmalloc_double_kzfree+0xb8/0x308
[   18.203476]  kunit_try_run_case+0x170/0x3f0
[   18.203513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.203567]  kthread+0x328/0x630
[   18.203609]  ret_from_fork+0x10/0x20
[   18.203647] 
[   18.203664] Freed by task 194:
[   18.203696]  kasan_save_stack+0x3c/0x68
[   18.203731]  kasan_save_track+0x20/0x40
[   18.203766]  kasan_save_free_info+0x4c/0x78
[   18.203804]  __kasan_slab_free+0x6c/0x98
[   18.203848]  kfree+0x214/0x3c8
[   18.204676]  kfree_sensitive+0x80/0xb0
[   18.204751]  kmalloc_double_kzfree+0x11c/0x308
[   18.204812]  kunit_try_run_case+0x170/0x3f0
[   18.204912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.205219]  kthread+0x328/0x630
[   18.205288]  ret_from_fork+0x10/0x20
[   18.205325] 
[   18.205590] The buggy address belongs to the object at fff00000c59e5600
[   18.205590]  which belongs to the cache kmalloc-16 of size 16
[   18.205757] The buggy address is located 0 bytes inside of
[   18.205757]  16-byte region [fff00000c59e5600, fff00000c59e5610)
[   18.205866] 
[   18.205886] The buggy address belongs to the physical page:
[   18.206146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5
[   18.206238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.206386] page_type: f5(slab)
[   18.206596] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.206832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.207029] page dumped because: kasan: bad access detected
[   18.207236] 
[   18.207285] Memory state around the buggy address:
[   18.207336]  fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.207769]  fff00000c59e5580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.207819] >fff00000c59e5600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.208155]                    ^
[   18.208228]  fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.208351]  fff00000c59e5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.208395] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   18.190987] ==================================================================
[   18.191288] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   18.191364] Read of size 1 at addr fff00000c59e5600 by task kunit_try_catch/194
[   18.191424] 
[   18.191459] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.191878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.192071] Hardware name: linux,dummy-virt (DT)
[   18.192157] Call trace:
[   18.192279]  show_stack+0x20/0x38 (C)
[   18.192373]  dump_stack_lvl+0x8c/0xd0
[   18.192546]  print_report+0x118/0x608
[   18.192601]  kasan_report+0xdc/0x128
[   18.192791]  __kasan_check_byte+0x54/0x70
[   18.193233]  kfree_sensitive+0x30/0xb0
[   18.193332]  kmalloc_double_kzfree+0x168/0x308
[   18.193477]  kunit_try_run_case+0x170/0x3f0
[   18.193629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.193749]  kthread+0x328/0x630
[   18.193921]  ret_from_fork+0x10/0x20
[   18.194153] 
[   18.194179] Allocated by task 194:
[   18.194435]  kasan_save_stack+0x3c/0x68
[   18.194558]  kasan_save_track+0x20/0x40
[   18.194685]  kasan_save_alloc_info+0x40/0x58
[   18.194754]  __kasan_kmalloc+0xd4/0xd8
[   18.194795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.195107]  kmalloc_double_kzfree+0xb8/0x308
[   18.195204]  kunit_try_run_case+0x170/0x3f0
[   18.195293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.195411]  kthread+0x328/0x630
[   18.195450]  ret_from_fork+0x10/0x20
[   18.195914] 
[   18.196009] Freed by task 194:
[   18.196122]  kasan_save_stack+0x3c/0x68
[   18.196201]  kasan_save_track+0x20/0x40
[   18.196309]  kasan_save_free_info+0x4c/0x78
[   18.196563]  __kasan_slab_free+0x6c/0x98
[   18.196687]  kfree+0x214/0x3c8
[   18.196795]  kfree_sensitive+0x80/0xb0
[   18.196977]  kmalloc_double_kzfree+0x11c/0x308
[   18.197311]  kunit_try_run_case+0x170/0x3f0
[   18.197393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.197576]  kthread+0x328/0x630
[   18.197625]  ret_from_fork+0x10/0x20
[   18.197883] 
[   18.197928] The buggy address belongs to the object at fff00000c59e5600
[   18.197928]  which belongs to the cache kmalloc-16 of size 16
[   18.198102] The buggy address is located 0 bytes inside of
[   18.198102]  freed 16-byte region [fff00000c59e5600, fff00000c59e5610)
[   18.198394] 
[   18.198540] The buggy address belongs to the physical page:
[   18.198623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5
[   18.198728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.198801] page_type: f5(slab)
[   18.199124] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.199202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.199338] page dumped because: kasan: bad access detected
[   18.199417] 
[   18.199729] Memory state around the buggy address:
[   18.199783]  fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.199875]  fff00000c59e5580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.199975] >fff00000c59e5600: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200084]                    ^
[   18.200118]  fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200174]  fff00000c59e5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200216] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   18.167114] ==================================================================
[   18.167178] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   18.167235] Read of size 1 at addr fff00000c797b428 by task kunit_try_catch/190
[   18.167285] 
[   18.167317] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.167402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.167430] Hardware name: linux,dummy-virt (DT)
[   18.167462] Call trace:
[   18.167483]  show_stack+0x20/0x38 (C)
[   18.167531]  dump_stack_lvl+0x8c/0xd0
[   18.167579]  print_report+0x118/0x608
[   18.168367]  kasan_report+0xdc/0x128
[   18.168506]  __asan_report_load1_noabort+0x20/0x30
[   18.168876]  kmalloc_uaf2+0x3f4/0x468
[   18.168952]  kunit_try_run_case+0x170/0x3f0
[   18.169035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.169208]  kthread+0x328/0x630
[   18.169345]  ret_from_fork+0x10/0x20
[   18.169756] 
[   18.169812] Allocated by task 190:
[   18.169896]  kasan_save_stack+0x3c/0x68
[   18.170090]  kasan_save_track+0x20/0x40
[   18.170132]  kasan_save_alloc_info+0x40/0x58
[   18.170406]  __kasan_kmalloc+0xd4/0xd8
[   18.170531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.170644]  kmalloc_uaf2+0xc4/0x468
[   18.170836]  kunit_try_run_case+0x170/0x3f0
[   18.171168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.171261]  kthread+0x328/0x630
[   18.171338]  ret_from_fork+0x10/0x20
[   18.171440] 
[   18.171567] Freed by task 190:
[   18.171792]  kasan_save_stack+0x3c/0x68
[   18.171834]  kasan_save_track+0x20/0x40
[   18.172153]  kasan_save_free_info+0x4c/0x78
[   18.172200]  __kasan_slab_free+0x6c/0x98
[   18.172237]  kfree+0x214/0x3c8
[   18.172298]  kmalloc_uaf2+0x134/0x468
[   18.172689]  kunit_try_run_case+0x170/0x3f0
[   18.172789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.172964]  kthread+0x328/0x630
[   18.173015]  ret_from_fork+0x10/0x20
[   18.173205] 
[   18.173367] The buggy address belongs to the object at fff00000c797b400
[   18.173367]  which belongs to the cache kmalloc-64 of size 64
[   18.173483] The buggy address is located 40 bytes inside of
[   18.173483]  freed 64-byte region [fff00000c797b400, fff00000c797b440)
[   18.173570] 
[   18.173598] The buggy address belongs to the physical page:
[   18.173630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797b
[   18.173683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.173742] page_type: f5(slab)
[   18.173791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.173870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.173919] page dumped because: kasan: bad access detected
[   18.173951] 
[   18.173968] Memory state around the buggy address:
[   18.174009]  fff00000c797b300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.174064]  fff00000c797b380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.174109] >fff00000c797b400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.174149]                                   ^
[   18.174190]  fff00000c797b480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   18.174236]  fff00000c797b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.174295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   18.145364] ==================================================================
[   18.145430] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   18.145491] Write of size 33 at addr fff00000c797b280 by task kunit_try_catch/188
[   18.145544] 
[   18.145797] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.146002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.146032] Hardware name: linux,dummy-virt (DT)
[   18.146414] Call trace:
[   18.146482]  show_stack+0x20/0x38 (C)
[   18.146640]  dump_stack_lvl+0x8c/0xd0
[   18.146725]  print_report+0x118/0x608
[   18.146772]  kasan_report+0xdc/0x128
[   18.146837]  kasan_check_range+0x100/0x1a8
[   18.147168]  __asan_memset+0x34/0x78
[   18.147248]  kmalloc_uaf_memset+0x170/0x310
[   18.147300]  kunit_try_run_case+0x170/0x3f0
[   18.147451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.147511]  kthread+0x328/0x630
[   18.147556]  ret_from_fork+0x10/0x20
[   18.147610] 
[   18.147629] Allocated by task 188:
[   18.147913]  kasan_save_stack+0x3c/0x68
[   18.148069]  kasan_save_track+0x20/0x40
[   18.148172]  kasan_save_alloc_info+0x40/0x58
[   18.148360]  __kasan_kmalloc+0xd4/0xd8
[   18.148465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.148609]  kmalloc_uaf_memset+0xb8/0x310
[   18.148671]  kunit_try_run_case+0x170/0x3f0
[   18.148731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.148777]  kthread+0x328/0x630
[   18.148814]  ret_from_fork+0x10/0x20
[   18.148849] 
[   18.149049] Freed by task 188:
[   18.149123]  kasan_save_stack+0x3c/0x68
[   18.149326]  kasan_save_track+0x20/0x40
[   18.149440]  kasan_save_free_info+0x4c/0x78
[   18.149529]  __kasan_slab_free+0x6c/0x98
[   18.149745]  kfree+0x214/0x3c8
[   18.149787]  kmalloc_uaf_memset+0x11c/0x310
[   18.150026]  kunit_try_run_case+0x170/0x3f0
[   18.150801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.150929]  kthread+0x328/0x630
[   18.150996]  ret_from_fork+0x10/0x20
[   18.151059] 
[   18.151108] The buggy address belongs to the object at fff00000c797b280
[   18.151108]  which belongs to the cache kmalloc-64 of size 64
[   18.151271] The buggy address is located 0 bytes inside of
[   18.151271]  freed 64-byte region [fff00000c797b280, fff00000c797b2c0)
[   18.151493] 
[   18.151537] The buggy address belongs to the physical page:
[   18.151783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10797b
[   18.152002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.152434] page_type: f5(slab)
[   18.152616] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.152778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.152826] page dumped because: kasan: bad access detected
[   18.153265] 
[   18.153453] Memory state around the buggy address:
[   18.153516]  fff00000c797b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.153612]  fff00000c797b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.153668] >fff00000c797b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.153737]                    ^
[   18.153783]  fff00000c797b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.153845]  fff00000c797b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.153901] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   18.115182] ==================================================================
[   18.115242] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   18.115298] Read of size 1 at addr fff00000c59e55e8 by task kunit_try_catch/186
[   18.115349] 
[   18.115380] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.115463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.115491] Hardware name: linux,dummy-virt (DT)
[   18.115529] Call trace:
[   18.115564]  show_stack+0x20/0x38 (C)
[   18.115612]  dump_stack_lvl+0x8c/0xd0
[   18.115660]  print_report+0x118/0x608
[   18.115710]  kasan_report+0xdc/0x128
[   18.115756]  __asan_report_load1_noabort+0x20/0x30
[   18.115804]  kmalloc_uaf+0x300/0x338
[   18.115849]  kunit_try_run_case+0x170/0x3f0
[   18.116511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.116568]  kthread+0x328/0x630
[   18.116616]  ret_from_fork+0x10/0x20
[   18.117087] 
[   18.117143] Allocated by task 186:
[   18.117180]  kasan_save_stack+0x3c/0x68
[   18.117506]  kasan_save_track+0x20/0x40
[   18.117667]  kasan_save_alloc_info+0x40/0x58
[   18.117711]  __kasan_kmalloc+0xd4/0xd8
[   18.117774]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.118157]  kmalloc_uaf+0xb8/0x338
[   18.118260]  kunit_try_run_case+0x170/0x3f0
[   18.118744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.118948]  kthread+0x328/0x630
[   18.119034]  ret_from_fork+0x10/0x20
[   18.119079] 
[   18.119429] Freed by task 186:
[   18.119498]  kasan_save_stack+0x3c/0x68
[   18.119598]  kasan_save_track+0x20/0x40
[   18.119918]  kasan_save_free_info+0x4c/0x78
[   18.119995]  __kasan_slab_free+0x6c/0x98
[   18.120120]  kfree+0x214/0x3c8
[   18.120205]  kmalloc_uaf+0x11c/0x338
[   18.120249]  kunit_try_run_case+0x170/0x3f0
[   18.120565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.120723]  kthread+0x328/0x630
[   18.120930]  ret_from_fork+0x10/0x20
[   18.121086] 
[   18.121109] The buggy address belongs to the object at fff00000c59e55e0
[   18.121109]  which belongs to the cache kmalloc-16 of size 16
[   18.121202] The buggy address is located 8 bytes inside of
[   18.121202]  freed 16-byte region [fff00000c59e55e0, fff00000c59e55f0)
[   18.121556] 
[   18.121582] The buggy address belongs to the physical page:
[   18.121903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5
[   18.122056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.122382] page_type: f5(slab)
[   18.122454] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.122754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.122846] page dumped because: kasan: bad access detected
[   18.123101] 
[   18.123165] Memory state around the buggy address:
[   18.123321]  fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.123406]  fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.123732] >fff00000c59e5580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.123846]                                                           ^
[   18.124002]  fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124165]  fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124391] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   18.093784] ==================================================================
[   18.094137] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   18.094366] Read of size 64 at addr fff00000c6759f84 by task kunit_try_catch/184
[   18.094419] 
[   18.094453] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.094585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.094612] Hardware name: linux,dummy-virt (DT)
[   18.094643] Call trace:
[   18.094907]  show_stack+0x20/0x38 (C)
[   18.095041]  dump_stack_lvl+0x8c/0xd0
[   18.095094]  print_report+0x118/0x608
[   18.095138]  kasan_report+0xdc/0x128
[   18.095274]  kasan_check_range+0x100/0x1a8
[   18.095361]  __asan_memmove+0x3c/0x98
[   18.095422]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   18.095673]  kunit_try_run_case+0x170/0x3f0
[   18.095726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.095840]  kthread+0x328/0x630
[   18.096494]  ret_from_fork+0x10/0x20
[   18.096581] 
[   18.096604] Allocated by task 184:
[   18.096947]  kasan_save_stack+0x3c/0x68
[   18.097024]  kasan_save_track+0x20/0x40
[   18.097090]  kasan_save_alloc_info+0x40/0x58
[   18.097289]  __kasan_kmalloc+0xd4/0xd8
[   18.097538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.097610]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   18.098021]  kunit_try_run_case+0x170/0x3f0
[   18.098102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.098190]  kthread+0x328/0x630
[   18.098409]  ret_from_fork+0x10/0x20
[   18.098492] 
[   18.098628] The buggy address belongs to the object at fff00000c6759f80
[   18.098628]  which belongs to the cache kmalloc-64 of size 64
[   18.098745] The buggy address is located 4 bytes inside of
[   18.098745]  allocated 64-byte region [fff00000c6759f80, fff00000c6759fc0)
[   18.099157] 
[   18.099211] The buggy address belongs to the physical page:
[   18.099395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106759
[   18.099545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.099658] page_type: f5(slab)
[   18.099706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.100092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.100177] page dumped because: kasan: bad access detected
[   18.100342] 
[   18.100384] Memory state around the buggy address:
[   18.100435]  fff00000c6759e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.100536]  fff00000c6759f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.100583] >fff00000c6759f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.100924]                                            ^
[   18.100990]  fff00000c675a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.101108]  fff00000c675a080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   18.070011] ==================================================================
[   18.070081] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   18.070256] Read of size 18446744073709551614 at addr fff00000c6759d84 by task kunit_try_catch/182
[   18.070358] 
[   18.070389] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.070698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.070736] Hardware name: linux,dummy-virt (DT)
[   18.070774] Call trace:
[   18.071011]  show_stack+0x20/0x38 (C)
[   18.071116]  dump_stack_lvl+0x8c/0xd0
[   18.071175]  print_report+0x118/0x608
[   18.071219]  kasan_report+0xdc/0x128
[   18.071262]  kasan_check_range+0x100/0x1a8
[   18.071308]  __asan_memmove+0x3c/0x98
[   18.071352]  kmalloc_memmove_negative_size+0x154/0x2e0
[   18.071461]  kunit_try_run_case+0x170/0x3f0
[   18.071528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.071591]  kthread+0x328/0x630
[   18.071673]  ret_from_fork+0x10/0x20
[   18.071728] 
[   18.071747] Allocated by task 182:
[   18.071773]  kasan_save_stack+0x3c/0x68
[   18.071876]  kasan_save_track+0x20/0x40
[   18.072048]  kasan_save_alloc_info+0x40/0x58
[   18.072099]  __kasan_kmalloc+0xd4/0xd8
[   18.072142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.072282]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   18.072332]  kunit_try_run_case+0x170/0x3f0
[   18.072371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.072422]  kthread+0x328/0x630
[   18.072605]  ret_from_fork+0x10/0x20
[   18.072777] 
[   18.072911] The buggy address belongs to the object at fff00000c6759d80
[   18.072911]  which belongs to the cache kmalloc-64 of size 64
[   18.073291] The buggy address is located 4 bytes inside of
[   18.073291]  64-byte region [fff00000c6759d80, fff00000c6759dc0)
[   18.073443] 
[   18.073559] The buggy address belongs to the physical page:
[   18.073683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106759
[   18.074016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.074210] page_type: f5(slab)
[   18.074303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.074355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.074533] page dumped because: kasan: bad access detected
[   18.074628] 
[   18.074764] Memory state around the buggy address:
[   18.074893]  fff00000c6759c80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   18.074971]  fff00000c6759d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.075213] >fff00000c6759d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.075378]                    ^
[   18.075456]  fff00000c6759e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.075574]  fff00000c6759e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.075616] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   18.057228] ==================================================================
[   18.057621] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   18.057771] Write of size 16 at addr fff00000c5bdcb69 by task kunit_try_catch/180
[   18.057825] 
[   18.057866] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.058166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.058281] Hardware name: linux,dummy-virt (DT)
[   18.058380] Call trace:
[   18.058480]  show_stack+0x20/0x38 (C)
[   18.058534]  dump_stack_lvl+0x8c/0xd0
[   18.058608]  print_report+0x118/0x608
[   18.058659]  kasan_report+0xdc/0x128
[   18.058950]  kasan_check_range+0x100/0x1a8
[   18.059019]  __asan_memset+0x34/0x78
[   18.059064]  kmalloc_oob_memset_16+0x150/0x2f8
[   18.059358]  kunit_try_run_case+0x170/0x3f0
[   18.059430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.059484]  kthread+0x328/0x630
[   18.059528]  ret_from_fork+0x10/0x20
[   18.059658] 
[   18.059725] Allocated by task 180:
[   18.059754]  kasan_save_stack+0x3c/0x68
[   18.059949]  kasan_save_track+0x20/0x40
[   18.060001]  kasan_save_alloc_info+0x40/0x58
[   18.060040]  __kasan_kmalloc+0xd4/0xd8
[   18.060155]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.060274]  kmalloc_oob_memset_16+0xb0/0x2f8
[   18.060354]  kunit_try_run_case+0x170/0x3f0
[   18.060533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.060693]  kthread+0x328/0x630
[   18.060789]  ret_from_fork+0x10/0x20
[   18.060860] 
[   18.060880] The buggy address belongs to the object at fff00000c5bdcb00
[   18.060880]  which belongs to the cache kmalloc-128 of size 128
[   18.060937] The buggy address is located 105 bytes inside of
[   18.060937]  allocated 120-byte region [fff00000c5bdcb00, fff00000c5bdcb78)
[   18.060999] 
[   18.061019] The buggy address belongs to the physical page:
[   18.061049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.061483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.061644] page_type: f5(slab)
[   18.061750] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.061981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.062107] page dumped because: kasan: bad access detected
[   18.062141] 
[   18.062159] Memory state around the buggy address:
[   18.062396]  fff00000c5bdca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.062561]  fff00000c5bdca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.062737] >fff00000c5bdcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.062843]                                                                 ^
[   18.062995]  fff00000c5bdcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063050]  fff00000c5bdcc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   18.042745] ==================================================================
[   18.042801] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   18.042866] Write of size 8 at addr fff00000c5bdca71 by task kunit_try_catch/178
[   18.042916] 
[   18.042944] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.043026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.043053] Hardware name: linux,dummy-virt (DT)
[   18.043082] Call trace:
[   18.043103]  show_stack+0x20/0x38 (C)
[   18.043156]  dump_stack_lvl+0x8c/0xd0
[   18.043202]  print_report+0x118/0x608
[   18.043245]  kasan_report+0xdc/0x128
[   18.043288]  kasan_check_range+0x100/0x1a8
[   18.043333]  __asan_memset+0x34/0x78
[   18.043376]  kmalloc_oob_memset_8+0x150/0x2f8
[   18.043423]  kunit_try_run_case+0x170/0x3f0
[   18.043469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.043521]  kthread+0x328/0x630
[   18.043564]  ret_from_fork+0x10/0x20
[   18.043644] 
[   18.043712] Allocated by task 178:
[   18.043739]  kasan_save_stack+0x3c/0x68
[   18.043813]  kasan_save_track+0x20/0x40
[   18.043848]  kasan_save_alloc_info+0x40/0x58
[   18.043896]  __kasan_kmalloc+0xd4/0xd8
[   18.044095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.044233]  kmalloc_oob_memset_8+0xb0/0x2f8
[   18.044291]  kunit_try_run_case+0x170/0x3f0
[   18.044647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.044690]  kthread+0x328/0x630
[   18.044725]  ret_from_fork+0x10/0x20
[   18.044794] 
[   18.044896] The buggy address belongs to the object at fff00000c5bdca00
[   18.044896]  which belongs to the cache kmalloc-128 of size 128
[   18.044952] The buggy address is located 113 bytes inside of
[   18.044952]  allocated 120-byte region [fff00000c5bdca00, fff00000c5bdca78)
[   18.045065] 
[   18.045130] The buggy address belongs to the physical page:
[   18.045158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.045263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.045319] page_type: f5(slab)
[   18.045357] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.045467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.045531] page dumped because: kasan: bad access detected
[   18.045617] 
[   18.045726] Memory state around the buggy address:
[   18.045815]  fff00000c5bdc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.045888]  fff00000c5bdc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.045961] >fff00000c5bdca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.045999]                                                                 ^
[   18.046053]  fff00000c5bdca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.046096]  fff00000c5bdcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.046135] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   18.033963] ==================================================================
[   18.034057] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   18.034155] Write of size 4 at addr fff00000c5bdc975 by task kunit_try_catch/176
[   18.034210] 
[   18.034257] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.034447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.034487] Hardware name: linux,dummy-virt (DT)
[   18.034517] Call trace:
[   18.034551]  show_stack+0x20/0x38 (C)
[   18.034600]  dump_stack_lvl+0x8c/0xd0
[   18.034698]  print_report+0x118/0x608
[   18.034753]  kasan_report+0xdc/0x128
[   18.034797]  kasan_check_range+0x100/0x1a8
[   18.034842]  __asan_memset+0x34/0x78
[   18.034954]  kmalloc_oob_memset_4+0x150/0x300
[   18.035030]  kunit_try_run_case+0x170/0x3f0
[   18.035100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.035186]  kthread+0x328/0x630
[   18.035231]  ret_from_fork+0x10/0x20
[   18.035296] 
[   18.035342] Allocated by task 176:
[   18.035456]  kasan_save_stack+0x3c/0x68
[   18.035566]  kasan_save_track+0x20/0x40
[   18.035603]  kasan_save_alloc_info+0x40/0x58
[   18.035646]  __kasan_kmalloc+0xd4/0xd8
[   18.035687]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.035776]  kmalloc_oob_memset_4+0xb0/0x300
[   18.035842]  kunit_try_run_case+0x170/0x3f0
[   18.035922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.036000]  kthread+0x328/0x630
[   18.036048]  ret_from_fork+0x10/0x20
[   18.036125] 
[   18.036144] The buggy address belongs to the object at fff00000c5bdc900
[   18.036144]  which belongs to the cache kmalloc-128 of size 128
[   18.036211] The buggy address is located 117 bytes inside of
[   18.036211]  allocated 120-byte region [fff00000c5bdc900, fff00000c5bdc978)
[   18.036274] 
[   18.036293] The buggy address belongs to the physical page:
[   18.036322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.036639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.036687] page_type: f5(slab)
[   18.036778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.036956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.037047] page dumped because: kasan: bad access detected
[   18.037105] 
[   18.037195] Memory state around the buggy address:
[   18.037303]  fff00000c5bdc800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.037347]  fff00000c5bdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037585] >fff00000c5bdc900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.037769]                                                                 ^
[   18.037896]  fff00000c5bdc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037999]  fff00000c5bdca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038106] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   18.026108] ==================================================================
[   18.026172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   18.026230] Write of size 2 at addr fff00000c5bdc877 by task kunit_try_catch/174
[   18.026280] 
[   18.026314] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.026403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.026462] Hardware name: linux,dummy-virt (DT)
[   18.026494] Call trace:
[   18.026518]  show_stack+0x20/0x38 (C)
[   18.026568]  dump_stack_lvl+0x8c/0xd0
[   18.026616]  print_report+0x118/0x608
[   18.026659]  kasan_report+0xdc/0x128
[   18.026701]  kasan_check_range+0x100/0x1a8
[   18.026746]  __asan_memset+0x34/0x78
[   18.026790]  kmalloc_oob_memset_2+0x150/0x2f8
[   18.026836]  kunit_try_run_case+0x170/0x3f0
[   18.026896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.026958]  kthread+0x328/0x630
[   18.027003]  ret_from_fork+0x10/0x20
[   18.027049] 
[   18.027068] Allocated by task 174:
[   18.027094]  kasan_save_stack+0x3c/0x68
[   18.027137]  kasan_save_track+0x20/0x40
[   18.027178]  kasan_save_alloc_info+0x40/0x58
[   18.027215]  __kasan_kmalloc+0xd4/0xd8
[   18.027254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.027302]  kmalloc_oob_memset_2+0xb0/0x2f8
[   18.027341]  kunit_try_run_case+0x170/0x3f0
[   18.027387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.027430]  kthread+0x328/0x630
[   18.027466]  ret_from_fork+0x10/0x20
[   18.027502] 
[   18.027521] The buggy address belongs to the object at fff00000c5bdc800
[   18.027521]  which belongs to the cache kmalloc-128 of size 128
[   18.027577] The buggy address is located 119 bytes inside of
[   18.027577]  allocated 120-byte region [fff00000c5bdc800, fff00000c5bdc878)
[   18.027637] 
[   18.027657] The buggy address belongs to the physical page:
[   18.027688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.027740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.027801] page_type: f5(slab)
[   18.027843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.027904] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.027945] page dumped because: kasan: bad access detected
[   18.027976] 
[   18.027993] Memory state around the buggy address:
[   18.028025]  fff00000c5bdc700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.028068]  fff00000c5bdc780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.028112] >fff00000c5bdc800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.028151]                                                                 ^
[   18.028189]  fff00000c5bdc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.028399]  fff00000c5bdc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.028569] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   17.922800] ==================================================================
[   17.922872] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   17.922930] Read of size 16 at addr fff00000c59e55c0 by task kunit_try_catch/170
[   17.922980] 
[   17.923012] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.923095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.923122] Hardware name: linux,dummy-virt (DT)
[   17.923160] Call trace:
[   17.923182]  show_stack+0x20/0x38 (C)
[   17.923229]  dump_stack_lvl+0x8c/0xd0
[   17.923277]  print_report+0x118/0x608
[   17.923322]  kasan_report+0xdc/0x128
[   17.924711]  __asan_report_load16_noabort+0x20/0x30
[   17.924785]  kmalloc_uaf_16+0x3bc/0x438
[   17.925274]  kunit_try_run_case+0x170/0x3f0
[   17.925328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.925617]  kthread+0x328/0x630
[   17.925670]  ret_from_fork+0x10/0x20
[   17.925718] 
[   17.925737] Allocated by task 170:
[   17.926277]  kasan_save_stack+0x3c/0x68
[   17.926386]  kasan_save_track+0x20/0x40
[   17.926430]  kasan_save_alloc_info+0x40/0x58
[   17.926468]  __kasan_kmalloc+0xd4/0xd8
[   17.926542]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.926610]  kmalloc_uaf_16+0x140/0x438
[   17.926712]  kunit_try_run_case+0x170/0x3f0
[   17.926752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926845]  kthread+0x328/0x630
[   17.927036]  ret_from_fork+0x10/0x20
[   17.927073] 
[   17.927091] Freed by task 170:
[   17.927454]  kasan_save_stack+0x3c/0x68
[   17.927691]  kasan_save_track+0x20/0x40
[   17.927728]  kasan_save_free_info+0x4c/0x78
[   17.927767]  __kasan_slab_free+0x6c/0x98
[   17.927803]  kfree+0x214/0x3c8
[   17.927835]  kmalloc_uaf_16+0x190/0x438
[   17.928187]  kunit_try_run_case+0x170/0x3f0
[   17.928231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.928302]  kthread+0x328/0x630
[   17.928530]  ret_from_fork+0x10/0x20
[   17.928824] 
[   17.928991] The buggy address belongs to the object at fff00000c59e55c0
[   17.928991]  which belongs to the cache kmalloc-16 of size 16
[   17.929178] The buggy address is located 0 bytes inside of
[   17.929178]  freed 16-byte region [fff00000c59e55c0, fff00000c59e55d0)
[   17.929243] 
[   17.929262] The buggy address belongs to the physical page:
[   17.929638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5
[   17.929944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.930000] page_type: f5(slab)
[   17.930048] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.930370] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.930423] page dumped because: kasan: bad access detected
[   17.930464] 
[   17.930483] Memory state around the buggy address:
[   17.930515]  fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.930891]  fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   17.931400] >fff00000c59e5580: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   17.931718]                                            ^
[   17.931760]  fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931847]  fff00000c59e5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.932246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   17.903185] ==================================================================
[   17.903247] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   17.903302] Write of size 16 at addr fff00000c59e5560 by task kunit_try_catch/168
[   17.903353] 
[   17.903384] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.903467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.903494] Hardware name: linux,dummy-virt (DT)
[   17.903524] Call trace:
[   17.903754]  show_stack+0x20/0x38 (C)
[   17.904050]  dump_stack_lvl+0x8c/0xd0
[   17.904539]  print_report+0x118/0x608
[   17.904981]  kasan_report+0xdc/0x128
[   17.905037]  __asan_report_store16_noabort+0x20/0x30
[   17.905131]  kmalloc_oob_16+0x3a0/0x3f8
[   17.905179]  kunit_try_run_case+0x170/0x3f0
[   17.905230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.905750]  kthread+0x328/0x630
[   17.905806]  ret_from_fork+0x10/0x20
[   17.905867] 
[   17.906010] Allocated by task 168:
[   17.906256]  kasan_save_stack+0x3c/0x68
[   17.906520]  kasan_save_track+0x20/0x40
[   17.906562]  kasan_save_alloc_info+0x40/0x58
[   17.906640]  __kasan_kmalloc+0xd4/0xd8
[   17.906682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.906970]  kmalloc_oob_16+0xb4/0x3f8
[   17.907015]  kunit_try_run_case+0x170/0x3f0
[   17.907053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.907321]  kthread+0x328/0x630
[   17.907379]  ret_from_fork+0x10/0x20
[   17.907415] 
[   17.907463] The buggy address belongs to the object at fff00000c59e5560
[   17.907463]  which belongs to the cache kmalloc-16 of size 16
[   17.907629] The buggy address is located 0 bytes inside of
[   17.907629]  allocated 13-byte region [fff00000c59e5560, fff00000c59e556d)
[   17.908065] 
[   17.908088] The buggy address belongs to the physical page:
[   17.908126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5
[   17.908178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.908226] page_type: f5(slab)
[   17.908595] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.908742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.909054] page dumped because: kasan: bad access detected
[   17.909087] 
[   17.909292] Memory state around the buggy address:
[   17.909593]  fff00000c59e5400: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   17.909823]  fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.910080] >fff00000c59e5500: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   17.910414]                                                           ^
[   17.910461]  fff00000c59e5580: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910506]  fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.910546] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   17.882848] ==================================================================
[   17.882977] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.883072] Read of size 1 at addr fff00000c4776000 by task kunit_try_catch/166
[   17.883125] 
[   17.883161] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.883380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.883441] Hardware name: linux,dummy-virt (DT)
[   17.883490] Call trace:
[   17.883512]  show_stack+0x20/0x38 (C)
[   17.883562]  dump_stack_lvl+0x8c/0xd0
[   17.883772]  print_report+0x118/0x608
[   17.883917]  kasan_report+0xdc/0x128
[   17.884011]  __kasan_check_byte+0x54/0x70
[   17.884243]  krealloc_noprof+0x44/0x360
[   17.884467]  krealloc_uaf+0x180/0x520
[   17.884617]  kunit_try_run_case+0x170/0x3f0
[   17.884670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.884969]  kthread+0x328/0x630
[   17.885140]  ret_from_fork+0x10/0x20
[   17.885300] 
[   17.885369] Allocated by task 166:
[   17.885485]  kasan_save_stack+0x3c/0x68
[   17.885618]  kasan_save_track+0x20/0x40
[   17.885707]  kasan_save_alloc_info+0x40/0x58
[   17.885945]  __kasan_kmalloc+0xd4/0xd8
[   17.886165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.886235]  krealloc_uaf+0xc8/0x520
[   17.886271]  kunit_try_run_case+0x170/0x3f0
[   17.886368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.886421]  kthread+0x328/0x630
[   17.886456]  ret_from_fork+0x10/0x20
[   17.886492] 
[   17.886528] Freed by task 166:
[   17.886566]  kasan_save_stack+0x3c/0x68
[   17.886613]  kasan_save_track+0x20/0x40
[   17.886656]  kasan_save_free_info+0x4c/0x78
[   17.886704]  __kasan_slab_free+0x6c/0x98
[   17.886739]  kfree+0x214/0x3c8
[   17.886771]  krealloc_uaf+0x12c/0x520
[   17.886803]  kunit_try_run_case+0x170/0x3f0
[   17.886864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.886910]  kthread+0x328/0x630
[   17.886945]  ret_from_fork+0x10/0x20
[   17.887007] 
[   17.887032] The buggy address belongs to the object at fff00000c4776000
[   17.887032]  which belongs to the cache kmalloc-256 of size 256
[   17.887159] The buggy address is located 0 bytes inside of
[   17.887159]  freed 256-byte region [fff00000c4776000, fff00000c4776100)
[   17.887223] 
[   17.887248] The buggy address belongs to the physical page:
[   17.887279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104776
[   17.887339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.887384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.887444] page_type: f5(slab)
[   17.887489] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.887550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.887601] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.887652] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.887701] head: 0bfffe0000000001 ffffc1ffc311dd81 00000000ffffffff 00000000ffffffff
[   17.887751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.887791] page dumped because: kasan: bad access detected
[   17.887841] 
[   17.887931] Memory state around the buggy address:
[   17.888202]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888291]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888337] >fff00000c4776000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.888385]                    ^
[   17.888416]  fff00000c4776080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.888459]  fff00000c4776100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888499] ==================================================================
[   17.889574] ==================================================================
[   17.889744] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.889827] Read of size 1 at addr fff00000c4776000 by task kunit_try_catch/166
[   17.889957] 
[   17.890006] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.890293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.890419] Hardware name: linux,dummy-virt (DT)
[   17.890472] Call trace:
[   17.890563]  show_stack+0x20/0x38 (C)
[   17.890617]  dump_stack_lvl+0x8c/0xd0
[   17.890664]  print_report+0x118/0x608
[   17.890708]  kasan_report+0xdc/0x128
[   17.890803]  __asan_report_load1_noabort+0x20/0x30
[   17.890866]  krealloc_uaf+0x4c8/0x520
[   17.890909]  kunit_try_run_case+0x170/0x3f0
[   17.890962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.891015]  kthread+0x328/0x630
[   17.891099]  ret_from_fork+0x10/0x20
[   17.891191] 
[   17.891210] Allocated by task 166:
[   17.891237]  kasan_save_stack+0x3c/0x68
[   17.891481]  kasan_save_track+0x20/0x40
[   17.891526]  kasan_save_alloc_info+0x40/0x58
[   17.891575]  __kasan_kmalloc+0xd4/0xd8
[   17.891611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.891713]  krealloc_uaf+0xc8/0x520
[   17.891821]  kunit_try_run_case+0x170/0x3f0
[   17.891875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.892181]  kthread+0x328/0x630
[   17.892270]  ret_from_fork+0x10/0x20
[   17.892436] 
[   17.892462] Freed by task 166:
[   17.892581]  kasan_save_stack+0x3c/0x68
[   17.892651]  kasan_save_track+0x20/0x40
[   17.892687]  kasan_save_free_info+0x4c/0x78
[   17.892732]  __kasan_slab_free+0x6c/0x98
[   17.892870]  kfree+0x214/0x3c8
[   17.892970]  krealloc_uaf+0x12c/0x520
[   17.893134]  kunit_try_run_case+0x170/0x3f0
[   17.893304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.893352]  kthread+0x328/0x630
[   17.893615]  ret_from_fork+0x10/0x20
[   17.893909] 
[   17.894080] The buggy address belongs to the object at fff00000c4776000
[   17.894080]  which belongs to the cache kmalloc-256 of size 256
[   17.894205] The buggy address is located 0 bytes inside of
[   17.894205]  freed 256-byte region [fff00000c4776000, fff00000c4776100)
[   17.894350] 
[   17.894370] The buggy address belongs to the physical page:
[   17.894400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104776
[   17.894693] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.894800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.894956] page_type: f5(slab)
[   17.895105] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.895210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895318] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.895606] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895682] head: 0bfffe0000000001 ffffc1ffc311dd81 00000000ffffffff 00000000ffffffff
[   17.895846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.896057] page dumped because: kasan: bad access detected
[   17.896147] 
[   17.896282] Memory state around the buggy address:
[   17.896421]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896470]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896534] >fff00000c4776000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.896582]                    ^
[   17.896747]  fff00000c4776080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.897036]  fff00000c4776100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.897181] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   17.864446] ==================================================================
[   17.864491] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.864538] Write of size 1 at addr fff00000c79160ea by task kunit_try_catch/164
[   17.864773] 
[   17.864957] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.865047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.865082] Hardware name: linux,dummy-virt (DT)
[   17.865206] Call trace:
[   17.865255]  show_stack+0x20/0x38 (C)
[   17.865373]  dump_stack_lvl+0x8c/0xd0
[   17.865660]  print_report+0x118/0x608
[   17.865795]  kasan_report+0xdc/0x128
[   17.865880]  __asan_report_store1_noabort+0x20/0x30
[   17.865988]  krealloc_less_oob_helper+0xae4/0xc50
[   17.866038]  krealloc_large_less_oob+0x20/0x38
[   17.866084]  kunit_try_run_case+0x170/0x3f0
[   17.866131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.866184]  kthread+0x328/0x630
[   17.866235]  ret_from_fork+0x10/0x20
[   17.866291] 
[   17.866320] The buggy address belongs to the physical page:
[   17.866358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   17.866409] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.866455] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.866504] page_type: f8(unknown)
[   17.866542] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.866603] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.866663] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.866714] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.866764] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff
[   17.866814] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.866866] page dumped because: kasan: bad access detected
[   17.866908] 
[   17.867137] Memory state around the buggy address:
[   17.867327]  fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.867470]  fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.867530] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.867705]                                                           ^
[   17.867748]  fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.867926]  fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.868062] ==================================================================
[   17.847845] ==================================================================
[   17.847984] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.848134] Write of size 1 at addr fff00000c79160c9 by task kunit_try_catch/164
[   17.848397] 
[   17.848560] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.848667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.848815] Hardware name: linux,dummy-virt (DT)
[   17.848944] Call trace:
[   17.849020]  show_stack+0x20/0x38 (C)
[   17.849100]  dump_stack_lvl+0x8c/0xd0
[   17.849229]  print_report+0x118/0x608
[   17.849275]  kasan_report+0xdc/0x128
[   17.849319]  __asan_report_store1_noabort+0x20/0x30
[   17.849547]  krealloc_less_oob_helper+0xa48/0xc50
[   17.849682]  krealloc_large_less_oob+0x20/0x38
[   17.849730]  kunit_try_run_case+0x170/0x3f0
[   17.850126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.850202]  kthread+0x328/0x630
[   17.850279]  ret_from_fork+0x10/0x20
[   17.850441] 
[   17.850519] The buggy address belongs to the physical page:
[   17.850776] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   17.850886] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.850949] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.851075] page_type: f8(unknown)
[   17.851163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.851330] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.851485] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.851603] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.851792] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff
[   17.851910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.851986] page dumped because: kasan: bad access detected
[   17.852032] 
[   17.852088] Memory state around the buggy address:
[   17.852130]  fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.852175]  fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.852221] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.852261]                                               ^
[   17.852304]  fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.852357]  fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.852397] ==================================================================
[   17.853494] ==================================================================
[   17.853543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.853783] Write of size 1 at addr fff00000c79160d0 by task kunit_try_catch/164
[   17.853924] 
[   17.853963] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.854046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.854080] Hardware name: linux,dummy-virt (DT)
[   17.854226] Call trace:
[   17.854277]  show_stack+0x20/0x38 (C)
[   17.854361]  dump_stack_lvl+0x8c/0xd0
[   17.854442]  print_report+0x118/0x608
[   17.854487]  kasan_report+0xdc/0x128
[   17.854531]  __asan_report_store1_noabort+0x20/0x30
[   17.854614]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.854720]  krealloc_large_less_oob+0x20/0x38
[   17.854915]  kunit_try_run_case+0x170/0x3f0
[   17.854968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.855021]  kthread+0x328/0x630
[   17.855072]  ret_from_fork+0x10/0x20
[   17.855119] 
[   17.855140] The buggy address belongs to the physical page:
[   17.855383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   17.855518] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.855615] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.855736] page_type: f8(unknown)
[   17.855849] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.856126] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.856188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.856568] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.856740] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff
[   17.857004] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.857155] page dumped because: kasan: bad access detected
[   17.857309] 
[   17.857366] Memory state around the buggy address:
[   17.857400]  fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.857445]  fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.857495] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.857580]                                                  ^
[   17.857638]  fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.857690]  fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.857744] ==================================================================
[   17.790769] ==================================================================
[   17.790822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.791058] Write of size 1 at addr fff00000c4775ed0 by task kunit_try_catch/160
[   17.791112] 
[   17.791327] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.791545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.791601] Hardware name: linux,dummy-virt (DT)
[   17.791635] Call trace:
[   17.791656]  show_stack+0x20/0x38 (C)
[   17.792023]  dump_stack_lvl+0x8c/0xd0
[   17.792145]  print_report+0x118/0x608
[   17.792548]  kasan_report+0xdc/0x128
[   17.792733]  __asan_report_store1_noabort+0x20/0x30
[   17.792797]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.793022]  krealloc_less_oob+0x20/0x38
[   17.793099]  kunit_try_run_case+0x170/0x3f0
[   17.793275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.793468]  kthread+0x328/0x630
[   17.793610]  ret_from_fork+0x10/0x20
[   17.793765] 
[   17.793959] Allocated by task 160:
[   17.794023]  kasan_save_stack+0x3c/0x68
[   17.794166]  kasan_save_track+0x20/0x40
[   17.794241]  kasan_save_alloc_info+0x40/0x58
[   17.794339]  __kasan_krealloc+0x118/0x178
[   17.794428]  krealloc_noprof+0x128/0x360
[   17.794570]  krealloc_less_oob_helper+0x168/0xc50
[   17.794686]  krealloc_less_oob+0x20/0x38
[   17.794721]  kunit_try_run_case+0x170/0x3f0
[   17.794915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.795104]  kthread+0x328/0x630
[   17.795154]  ret_from_fork+0x10/0x20
[   17.795189] 
[   17.795463] The buggy address belongs to the object at fff00000c4775e00
[   17.795463]  which belongs to the cache kmalloc-256 of size 256
[   17.795695] The buggy address is located 7 bytes to the right of
[   17.795695]  allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9)
[   17.795801] 
[   17.795958] The buggy address belongs to the physical page:
[   17.796138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.796204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.796249] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.796323] page_type: f5(slab)
[   17.796636] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.796723] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.796864] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.796966] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.797118] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.797282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.797631] page dumped because: kasan: bad access detected
[   17.797739] 
[   17.797813] Memory state around the buggy address:
[   17.797970]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.798042]  fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.798124] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.798575]                                                  ^
[   17.798656]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.798712]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.798922] ==================================================================
[   17.782758] ==================================================================
[   17.782815] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.783419] Write of size 1 at addr fff00000c4775ec9 by task kunit_try_catch/160
[   17.783601] 
[   17.783673] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.783761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.783789] Hardware name: linux,dummy-virt (DT)
[   17.783822] Call trace:
[   17.783844]  show_stack+0x20/0x38 (C)
[   17.784070]  dump_stack_lvl+0x8c/0xd0
[   17.784119]  print_report+0x118/0x608
[   17.784164]  kasan_report+0xdc/0x128
[   17.784590]  __asan_report_store1_noabort+0x20/0x30
[   17.784750]  krealloc_less_oob_helper+0xa48/0xc50
[   17.784909]  krealloc_less_oob+0x20/0x38
[   17.785245]  kunit_try_run_case+0x170/0x3f0
[   17.785312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.785697]  kthread+0x328/0x630
[   17.785789]  ret_from_fork+0x10/0x20
[   17.785838] 
[   17.785893] Allocated by task 160:
[   17.785923]  kasan_save_stack+0x3c/0x68
[   17.785983]  kasan_save_track+0x20/0x40
[   17.786032]  kasan_save_alloc_info+0x40/0x58
[   17.786080]  __kasan_krealloc+0x118/0x178
[   17.786127]  krealloc_noprof+0x128/0x360
[   17.786164]  krealloc_less_oob_helper+0x168/0xc50
[   17.786201]  krealloc_less_oob+0x20/0x38
[   17.786235]  kunit_try_run_case+0x170/0x3f0
[   17.786278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.786327]  kthread+0x328/0x630
[   17.786377]  ret_from_fork+0x10/0x20
[   17.786422] 
[   17.786441] The buggy address belongs to the object at fff00000c4775e00
[   17.786441]  which belongs to the cache kmalloc-256 of size 256
[   17.786508] The buggy address is located 0 bytes to the right of
[   17.786508]  allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9)
[   17.786587] 
[   17.786607] The buggy address belongs to the physical page:
[   17.786638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.786690] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.786737] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.786798] page_type: f5(slab)
[   17.786869] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.786922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.786975] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.787583] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.787651] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.787728] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.787935] page dumped because: kasan: bad access detected
[   17.787974] 
[   17.788009] Memory state around the buggy address:
[   17.788042]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.788399]  fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.788452] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.788621]                                               ^
[   17.788790]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.789008]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.789122] ==================================================================
[   17.817228] ==================================================================
[   17.817441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.817513] Write of size 1 at addr fff00000c4775eeb by task kunit_try_catch/160
[   17.817698] 
[   17.817930] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.818029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.818206] Hardware name: linux,dummy-virt (DT)
[   17.818274] Call trace:
[   17.818322]  show_stack+0x20/0x38 (C)
[   17.818545]  dump_stack_lvl+0x8c/0xd0
[   17.818608]  print_report+0x118/0x608
[   17.818653]  kasan_report+0xdc/0x128
[   17.818705]  __asan_report_store1_noabort+0x20/0x30
[   17.818946]  krealloc_less_oob_helper+0xa58/0xc50
[   17.819028]  krealloc_less_oob+0x20/0x38
[   17.819079]  kunit_try_run_case+0x170/0x3f0
[   17.819127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.819185]  kthread+0x328/0x630
[   17.819441]  ret_from_fork+0x10/0x20
[   17.819626] 
[   17.819665] Allocated by task 160:
[   17.819712]  kasan_save_stack+0x3c/0x68
[   17.819907]  kasan_save_track+0x20/0x40
[   17.819953]  kasan_save_alloc_info+0x40/0x58
[   17.820119]  __kasan_krealloc+0x118/0x178
[   17.820210]  krealloc_noprof+0x128/0x360
[   17.820390]  krealloc_less_oob_helper+0x168/0xc50
[   17.820479]  krealloc_less_oob+0x20/0x38
[   17.820515]  kunit_try_run_case+0x170/0x3f0
[   17.820805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.821044]  kthread+0x328/0x630
[   17.821088]  ret_from_fork+0x10/0x20
[   17.821420] 
[   17.821473] The buggy address belongs to the object at fff00000c4775e00
[   17.821473]  which belongs to the cache kmalloc-256 of size 256
[   17.821673] The buggy address is located 34 bytes to the right of
[   17.821673]  allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9)
[   17.821759] 
[   17.822142] The buggy address belongs to the physical page:
[   17.822263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.822387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.822516] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.822677] page_type: f5(slab)
[   17.822786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.822931] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.823006] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.823096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.823426] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.823498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.823655] page dumped because: kasan: bad access detected
[   17.823707] 
[   17.823933] Memory state around the buggy address:
[   17.824180]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824237]  fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.824303] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.824453]                                                           ^
[   17.824659]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824773]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824891] ==================================================================
[   17.868415] ==================================================================
[   17.868460] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.868517] Write of size 1 at addr fff00000c79160eb by task kunit_try_catch/164
[   17.868884] 
[   17.869159] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.869426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.869494] Hardware name: linux,dummy-virt (DT)
[   17.869555] Call trace:
[   17.869732]  show_stack+0x20/0x38 (C)
[   17.869795]  dump_stack_lvl+0x8c/0xd0
[   17.869895]  print_report+0x118/0x608
[   17.870072]  kasan_report+0xdc/0x128
[   17.870248]  __asan_report_store1_noabort+0x20/0x30
[   17.870382]  krealloc_less_oob_helper+0xa58/0xc50
[   17.870487]  krealloc_large_less_oob+0x20/0x38
[   17.870671]  kunit_try_run_case+0x170/0x3f0
[   17.870730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.870816]  kthread+0x328/0x630
[   17.870974]  ret_from_fork+0x10/0x20
[   17.871289] 
[   17.871345] The buggy address belongs to the physical page:
[   17.871377] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   17.871463] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.871610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.871730] page_type: f8(unknown)
[   17.871770] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.872039] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.872562] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.872744] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.872910] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff
[   17.873013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.873056] page dumped because: kasan: bad access detected
[   17.873119] 
[   17.873138] Memory state around the buggy address:
[   17.873170]  fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.873339]  fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.873428] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.873475]                                                           ^
[   17.873745]  fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.873951]  fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.874165] ==================================================================
[   17.859078] ==================================================================
[   17.859179] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.859375] Write of size 1 at addr fff00000c79160da by task kunit_try_catch/164
[   17.859451] 
[   17.859599] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.859719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.859747] Hardware name: linux,dummy-virt (DT)
[   17.859841] Call trace:
[   17.859966]  show_stack+0x20/0x38 (C)
[   17.860124]  dump_stack_lvl+0x8c/0xd0
[   17.860358]  print_report+0x118/0x608
[   17.860409]  kasan_report+0xdc/0x128
[   17.860471]  __asan_report_store1_noabort+0x20/0x30
[   17.860528]  krealloc_less_oob_helper+0xa80/0xc50
[   17.860576]  krealloc_large_less_oob+0x20/0x38
[   17.860801]  kunit_try_run_case+0x170/0x3f0
[   17.861013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.861126]  kthread+0x328/0x630
[   17.861287]  ret_from_fork+0x10/0x20
[   17.861383] 
[   17.861555] The buggy address belongs to the physical page:
[   17.861749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   17.861825] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.862145] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.862226] page_type: f8(unknown)
[   17.862418] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.862480] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.862723] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.862789] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.862850] head: 0bfffe0000000002 ffffc1ffc31e4501 00000000ffffffff 00000000ffffffff
[   17.863020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.863151] page dumped because: kasan: bad access detected
[   17.863250] 
[   17.863344] Memory state around the buggy address:
[   17.863376]  fff00000c7915f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.863588]  fff00000c7916000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.863669] >fff00000c7916080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.863711]                                                     ^
[   17.863779]  fff00000c7916100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.863846]  fff00000c7916180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.863958] ==================================================================
[   17.800653] ==================================================================
[   17.800705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.801133] Write of size 1 at addr fff00000c4775eda by task kunit_try_catch/160
[   17.801203] 
[   17.801261] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.801509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.801728] Hardware name: linux,dummy-virt (DT)
[   17.801801] Call trace:
[   17.801824]  show_stack+0x20/0x38 (C)
[   17.801949]  dump_stack_lvl+0x8c/0xd0
[   17.801998]  print_report+0x118/0x608
[   17.802043]  kasan_report+0xdc/0x128
[   17.802086]  __asan_report_store1_noabort+0x20/0x30
[   17.802136]  krealloc_less_oob_helper+0xa80/0xc50
[   17.802182]  krealloc_less_oob+0x20/0x38
[   17.802235]  kunit_try_run_case+0x170/0x3f0
[   17.802285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.802339]  kthread+0x328/0x630
[   17.802398]  ret_from_fork+0x10/0x20
[   17.802446] 
[   17.802464] Allocated by task 160:
[   17.802491]  kasan_save_stack+0x3c/0x68
[   17.802537]  kasan_save_track+0x20/0x40
[   17.802573]  kasan_save_alloc_info+0x40/0x58
[   17.802610]  __kasan_krealloc+0x118/0x178
[   17.802653]  krealloc_noprof+0x128/0x360
[   17.802695]  krealloc_less_oob_helper+0x168/0xc50
[   17.802740]  krealloc_less_oob+0x20/0x38
[   17.802779]  kunit_try_run_case+0x170/0x3f0
[   17.802826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.802881]  kthread+0x328/0x630
[   17.802915]  ret_from_fork+0x10/0x20
[   17.802961] 
[   17.802980] The buggy address belongs to the object at fff00000c4775e00
[   17.802980]  which belongs to the cache kmalloc-256 of size 256
[   17.803038] The buggy address is located 17 bytes to the right of
[   17.803038]  allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9)
[   17.803112] 
[   17.803131] The buggy address belongs to the physical page:
[   17.803167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.803217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.803263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.803313] page_type: f5(slab)
[   17.803350] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.803401] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.803463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.803513] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.803564] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.803620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.803670] page dumped because: kasan: bad access detected
[   17.803704] 
[   17.803722] Memory state around the buggy address:
[   17.803760]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.803806]  fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.803850] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.804150]                                                     ^
[   17.804469]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.804675]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.805011] ==================================================================
[   17.807576] ==================================================================
[   17.807667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.807838] Write of size 1 at addr fff00000c4775eea by task kunit_try_catch/160
[   17.808058] 
[   17.808167] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.808324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.808468] Hardware name: linux,dummy-virt (DT)
[   17.808523] Call trace:
[   17.808545]  show_stack+0x20/0x38 (C)
[   17.808890]  dump_stack_lvl+0x8c/0xd0
[   17.808962]  print_report+0x118/0x608
[   17.809069]  kasan_report+0xdc/0x128
[   17.809166]  __asan_report_store1_noabort+0x20/0x30
[   17.809282]  krealloc_less_oob_helper+0xae4/0xc50
[   17.809382]  krealloc_less_oob+0x20/0x38
[   17.809744]  kunit_try_run_case+0x170/0x3f0
[   17.809869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.810118]  kthread+0x328/0x630
[   17.810317]  ret_from_fork+0x10/0x20
[   17.810496] 
[   17.810839] Allocated by task 160:
[   17.810910]  kasan_save_stack+0x3c/0x68
[   17.811003]  kasan_save_track+0x20/0x40
[   17.811109]  kasan_save_alloc_info+0x40/0x58
[   17.811155]  __kasan_krealloc+0x118/0x178
[   17.811433]  krealloc_noprof+0x128/0x360
[   17.811580]  krealloc_less_oob_helper+0x168/0xc50
[   17.811661]  krealloc_less_oob+0x20/0x38
[   17.811747]  kunit_try_run_case+0x170/0x3f0
[   17.811982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.812259]  kthread+0x328/0x630
[   17.812440]  ret_from_fork+0x10/0x20
[   17.812496] 
[   17.812557] The buggy address belongs to the object at fff00000c4775e00
[   17.812557]  which belongs to the cache kmalloc-256 of size 256
[   17.812702] The buggy address is located 33 bytes to the right of
[   17.812702]  allocated 201-byte region [fff00000c4775e00, fff00000c4775ec9)
[   17.812932] 
[   17.813137] The buggy address belongs to the physical page:
[   17.813560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.813636] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.813707] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.813823] page_type: f5(slab)
[   17.813921] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.814051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.814119] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.814191] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.814537] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.814724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.814787] page dumped because: kasan: bad access detected
[   17.814903] 
[   17.814922] Memory state around the buggy address:
[   17.814989]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.815201]  fff00000c4775e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.815383] >fff00000c4775e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.815447]                                                           ^
[   17.815662]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816090]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.816190] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   17.835142] ==================================================================
[   17.835407] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.835528] Write of size 1 at addr fff00000c79120f0 by task kunit_try_catch/162
[   17.835581] 
[   17.835609] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.835697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.835724] Hardware name: linux,dummy-virt (DT)
[   17.835863] Call trace:
[   17.835914]  show_stack+0x20/0x38 (C)
[   17.836088]  dump_stack_lvl+0x8c/0xd0
[   17.836137]  print_report+0x118/0x608
[   17.836181]  kasan_report+0xdc/0x128
[   17.836473]  __asan_report_store1_noabort+0x20/0x30
[   17.836624]  krealloc_more_oob_helper+0x5c0/0x678
[   17.836834]  krealloc_large_more_oob+0x20/0x38
[   17.837027]  kunit_try_run_case+0x170/0x3f0
[   17.837145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.837331]  kthread+0x328/0x630
[   17.837384]  ret_from_fork+0x10/0x20
[   17.837862] 
[   17.837963] The buggy address belongs to the physical page:
[   17.838121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910
[   17.838294] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.838342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.838524] page_type: f8(unknown)
[   17.838751] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.838845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.838959] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.839063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.839234] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff
[   17.839350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.839414] page dumped because: kasan: bad access detected
[   17.839446] 
[   17.839463] Memory state around the buggy address:
[   17.839565]  fff00000c7911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.839612]  fff00000c7912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.839974] >fff00000c7912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.840066]                                                              ^
[   17.840155]  fff00000c7912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.840288]  fff00000c7912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.840328] ==================================================================
[   17.762984] ==================================================================
[   17.763218] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.763285] Write of size 1 at addr fff00000c4775cf0 by task kunit_try_catch/158
[   17.763336] 
[   17.763460] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.763604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.763865] Hardware name: linux,dummy-virt (DT)
[   17.764114] Call trace:
[   17.764163]  show_stack+0x20/0x38 (C)
[   17.764245]  dump_stack_lvl+0x8c/0xd0
[   17.764407]  print_report+0x118/0x608
[   17.764466]  kasan_report+0xdc/0x128
[   17.764537]  __asan_report_store1_noabort+0x20/0x30
[   17.764587]  krealloc_more_oob_helper+0x5c0/0x678
[   17.764882]  krealloc_more_oob+0x20/0x38
[   17.765136]  kunit_try_run_case+0x170/0x3f0
[   17.765321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.765459]  kthread+0x328/0x630
[   17.765527]  ret_from_fork+0x10/0x20
[   17.765895] 
[   17.765943] Allocated by task 158:
[   17.766064]  kasan_save_stack+0x3c/0x68
[   17.766152]  kasan_save_track+0x20/0x40
[   17.766322]  kasan_save_alloc_info+0x40/0x58
[   17.766409]  __kasan_krealloc+0x118/0x178
[   17.766782]  krealloc_noprof+0x128/0x360
[   17.766846]  krealloc_more_oob_helper+0x168/0x678
[   17.767044]  krealloc_more_oob+0x20/0x38
[   17.767203]  kunit_try_run_case+0x170/0x3f0
[   17.767303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.767393]  kthread+0x328/0x630
[   17.767442]  ret_from_fork+0x10/0x20
[   17.767736] 
[   17.767806] The buggy address belongs to the object at fff00000c4775c00
[   17.767806]  which belongs to the cache kmalloc-256 of size 256
[   17.768078] The buggy address is located 5 bytes to the right of
[   17.768078]  allocated 235-byte region [fff00000c4775c00, fff00000c4775ceb)
[   17.768248] 
[   17.768293] The buggy address belongs to the physical page:
[   17.768333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.768502] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.768604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.768786] page_type: f5(slab)
[   17.768871] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.769097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.769161] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.769360] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.769541] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.769603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.769689] page dumped because: kasan: bad access detected
[   17.769805] 
[   17.770057] Memory state around the buggy address:
[   17.770243]  fff00000c4775b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.770297]  fff00000c4775c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.770365] >fff00000c4775c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.770559]                                                              ^
[   17.770681]  fff00000c4775d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.770785]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.770824] ==================================================================
[   17.830722] ==================================================================
[   17.830774] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.830825] Write of size 1 at addr fff00000c79120eb by task kunit_try_catch/162
[   17.830924] 
[   17.831103] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.831474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.831541] Hardware name: linux,dummy-virt (DT)
[   17.831575] Call trace:
[   17.832051]  show_stack+0x20/0x38 (C)
[   17.832122]  dump_stack_lvl+0x8c/0xd0
[   17.832169]  print_report+0x118/0x608
[   17.832213]  kasan_report+0xdc/0x128
[   17.832256]  __asan_report_store1_noabort+0x20/0x30
[   17.832306]  krealloc_more_oob_helper+0x60c/0x678
[   17.832352]  krealloc_large_more_oob+0x20/0x38
[   17.832397]  kunit_try_run_case+0x170/0x3f0
[   17.832444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.832497]  kthread+0x328/0x630
[   17.832541]  ret_from_fork+0x10/0x20
[   17.832587] 
[   17.832606] The buggy address belongs to the physical page:
[   17.832636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910
[   17.832688] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.832733] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.832784] page_type: f8(unknown)
[   17.832823] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.832893] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.832944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.832994] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.833045] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff
[   17.833095] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.833138] page dumped because: kasan: bad access detected
[   17.833169] 
[   17.833186] Memory state around the buggy address:
[   17.833216]  fff00000c7911f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.833260]  fff00000c7912000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.833304] >fff00000c7912080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.833342]                                                           ^
[   17.833665]  fff00000c7912100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.833850]  fff00000c7912180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.834010] ==================================================================
[   17.755631] ==================================================================
[   17.755733] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.755841] Write of size 1 at addr fff00000c4775ceb by task kunit_try_catch/158
[   17.756253] 
[   17.756392] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.756610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.756649] Hardware name: linux,dummy-virt (DT)
[   17.756688] Call trace:
[   17.756720]  show_stack+0x20/0x38 (C)
[   17.756823]  dump_stack_lvl+0x8c/0xd0
[   17.756882]  print_report+0x118/0x608
[   17.756936]  kasan_report+0xdc/0x128
[   17.756985]  __asan_report_store1_noabort+0x20/0x30
[   17.757050]  krealloc_more_oob_helper+0x60c/0x678
[   17.757105]  krealloc_more_oob+0x20/0x38
[   17.757148]  kunit_try_run_case+0x170/0x3f0
[   17.757198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.757261]  kthread+0x328/0x630
[   17.757306]  ret_from_fork+0x10/0x20
[   17.757367] 
[   17.757409] Allocated by task 158:
[   17.757436]  kasan_save_stack+0x3c/0x68
[   17.757486]  kasan_save_track+0x20/0x40
[   17.757520]  kasan_save_alloc_info+0x40/0x58
[   17.757564]  __kasan_krealloc+0x118/0x178
[   17.757599]  krealloc_noprof+0x128/0x360
[   17.757635]  krealloc_more_oob_helper+0x168/0x678
[   17.757672]  krealloc_more_oob+0x20/0x38
[   17.757715]  kunit_try_run_case+0x170/0x3f0
[   17.757762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.757815]  kthread+0x328/0x630
[   17.758121]  ret_from_fork+0x10/0x20
[   17.758362] 
[   17.758395] The buggy address belongs to the object at fff00000c4775c00
[   17.758395]  which belongs to the cache kmalloc-256 of size 256
[   17.758586] The buggy address is located 0 bytes to the right of
[   17.758586]  allocated 235-byte region [fff00000c4775c00, fff00000c4775ceb)
[   17.758882] 
[   17.759162] The buggy address belongs to the physical page:
[   17.759241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104774
[   17.759325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.759677] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.759767] page_type: f5(slab)
[   17.759960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.760067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.760143] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.760242] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.760369] head: 0bfffe0000000001 ffffc1ffc311dd01 00000000ffffffff 00000000ffffffff
[   17.760532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.760577] page dumped because: kasan: bad access detected
[   17.760610] 
[   17.760628] Memory state around the buggy address:
[   17.760659]  fff00000c4775b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.760818]  fff00000c4775c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.761116] >fff00000c4775c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.761243]                                                           ^
[   17.761350]  fff00000c4775d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.761404]  fff00000c4775d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.761525] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   17.742000] ==================================================================
[   17.742061] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   17.742116] Read of size 1 at addr fff00000c79d0000 by task kunit_try_catch/156
[   17.742308] 
[   17.742351] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.742550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.742618] Hardware name: linux,dummy-virt (DT)
[   17.742651] Call trace:
[   17.742673]  show_stack+0x20/0x38 (C)
[   17.742727]  dump_stack_lvl+0x8c/0xd0
[   17.742774]  print_report+0x118/0x608
[   17.742818]  kasan_report+0xdc/0x128
[   17.742876]  __asan_report_load1_noabort+0x20/0x30
[   17.742926]  page_alloc_uaf+0x328/0x350
[   17.742969]  kunit_try_run_case+0x170/0x3f0
[   17.743032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.743086]  kthread+0x328/0x630
[   17.743137]  ret_from_fork+0x10/0x20
[   17.743189] 
[   17.743208] The buggy address belongs to the physical page:
[   17.743238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d0
[   17.743289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.743337] page_type: f0(buddy)
[   17.743377] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000
[   17.743427] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.743468] page dumped because: kasan: bad access detected
[   17.743499] 
[   17.743516] Memory state around the buggy address:
[   17.743547]  fff00000c79cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.743591]  fff00000c79cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.743642] >fff00000c79d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.743681]                    ^
[   17.743708]  fff00000c79d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.743751]  fff00000c79d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.743793] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   17.715623] ==================================================================
[   17.715925] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   17.716124] Free of addr fff00000c7910001 by task kunit_try_catch/152
[   17.716530] 
[   17.716678] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.716811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.716986] Hardware name: linux,dummy-virt (DT)
[   17.717141] Call trace:
[   17.717217]  show_stack+0x20/0x38 (C)
[   17.717365]  dump_stack_lvl+0x8c/0xd0
[   17.717513]  print_report+0x118/0x608
[   17.717609]  kasan_report_invalid_free+0xc0/0xe8
[   17.717766]  __kasan_kfree_large+0x5c/0xa8
[   17.718099]  free_large_kmalloc+0x64/0x190
[   17.718178]  kfree+0x270/0x3c8
[   17.718325]  kmalloc_large_invalid_free+0x108/0x270
[   17.718463]  kunit_try_run_case+0x170/0x3f0
[   17.718607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.718928]  kthread+0x328/0x630
[   17.719004]  ret_from_fork+0x10/0x20
[   17.719373] 
[   17.719424] The buggy address belongs to the physical page:
[   17.719465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107910
[   17.719610] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.719668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.719925] page_type: f8(unknown)
[   17.720097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.720196] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.720321] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.720501] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.720785] head: 0bfffe0000000002 ffffc1ffc31e4401 00000000ffffffff 00000000ffffffff
[   17.721002] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.721229] page dumped because: kasan: bad access detected
[   17.721383] 
[   17.721484] Memory state around the buggy address:
[   17.721600]  fff00000c790ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721663]  fff00000c790ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721719] >fff00000c7910000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.722053]                    ^
[   17.722140]  fff00000c7910080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.722188]  fff00000c7910100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.722587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   17.699518] ==================================================================
[   17.699647] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   17.699724] Read of size 1 at addr fff00000c790c000 by task kunit_try_catch/150
[   17.699848] 
[   17.700000] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.700210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.700243] Hardware name: linux,dummy-virt (DT)
[   17.700275] Call trace:
[   17.700297]  show_stack+0x20/0x38 (C)
[   17.700499]  dump_stack_lvl+0x8c/0xd0
[   17.700633]  print_report+0x118/0x608
[   17.700680]  kasan_report+0xdc/0x128
[   17.700940]  __asan_report_load1_noabort+0x20/0x30
[   17.701097]  kmalloc_large_uaf+0x2cc/0x2f8
[   17.701198]  kunit_try_run_case+0x170/0x3f0
[   17.701297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.701460]  kthread+0x328/0x630
[   17.701568]  ret_from_fork+0x10/0x20
[   17.701669] 
[   17.701784] The buggy address belongs to the physical page:
[   17.701872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790c
[   17.702001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.702401] raw: 0bfffe0000000000 ffffc1ffc31e4408 fff00000da47ee00 0000000000000000
[   17.702586] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   17.702655] page dumped because: kasan: bad access detected
[   17.702687] 
[   17.703040] Memory state around the buggy address:
[   17.703317]  fff00000c790bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.703405]  fff00000c790bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.703769] >fff00000c790c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.703969]                    ^
[   17.704163]  fff00000c790c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.704275]  fff00000c790c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.704318] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   17.687296] ==================================================================
[   17.687421] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   17.687742] Write of size 1 at addr fff00000c790e00a by task kunit_try_catch/148
[   17.687941] 
[   17.688024] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.688242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.688330] Hardware name: linux,dummy-virt (DT)
[   17.688499] Call trace:
[   17.688549]  show_stack+0x20/0x38 (C)
[   17.688609]  dump_stack_lvl+0x8c/0xd0
[   17.688829]  print_report+0x118/0x608
[   17.689015]  kasan_report+0xdc/0x128
[   17.689091]  __asan_report_store1_noabort+0x20/0x30
[   17.689284]  kmalloc_large_oob_right+0x278/0x2b8
[   17.689425]  kunit_try_run_case+0x170/0x3f0
[   17.689541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.689907]  kthread+0x328/0x630
[   17.689970]  ret_from_fork+0x10/0x20
[   17.690215] 
[   17.690517] The buggy address belongs to the physical page:
[   17.690646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790c
[   17.690700] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.690778] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.691010] page_type: f8(unknown)
[   17.691067] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.691153] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.691281] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.691411] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.691565] head: 0bfffe0000000002 ffffc1ffc31e4301 00000000ffffffff 00000000ffffffff
[   17.691674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.691737] page dumped because: kasan: bad access detected
[   17.691934] 
[   17.691975] Memory state around the buggy address:
[   17.692008]  fff00000c790df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.692060]  fff00000c790df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.692199] >fff00000c790e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.692341]                       ^
[   17.692380]  fff00000c790e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.692424]  fff00000c790e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.692511] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   17.674242] ==================================================================
[   17.674304] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   17.674516] Write of size 1 at addr fff00000c46ddf00 by task kunit_try_catch/146
[   17.674599] 
[   17.674634] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.674726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.674753] Hardware name: linux,dummy-virt (DT)
[   17.674884] Call trace:
[   17.674912]  show_stack+0x20/0x38 (C)
[   17.674982]  dump_stack_lvl+0x8c/0xd0
[   17.675182]  print_report+0x118/0x608
[   17.675242]  kasan_report+0xdc/0x128
[   17.675330]  __asan_report_store1_noabort+0x20/0x30
[   17.675502]  kmalloc_big_oob_right+0x2a4/0x2f0
[   17.675613]  kunit_try_run_case+0x170/0x3f0
[   17.675902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.676091]  kthread+0x328/0x630
[   17.676207]  ret_from_fork+0x10/0x20
[   17.676305] 
[   17.676325] Allocated by task 146:
[   17.676353]  kasan_save_stack+0x3c/0x68
[   17.676406]  kasan_save_track+0x20/0x40
[   17.676587]  kasan_save_alloc_info+0x40/0x58
[   17.676662]  __kasan_kmalloc+0xd4/0xd8
[   17.676702]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.676748]  kmalloc_big_oob_right+0xb8/0x2f0
[   17.676912]  kunit_try_run_case+0x170/0x3f0
[   17.677045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.677123]  kthread+0x328/0x630
[   17.677159]  ret_from_fork+0x10/0x20
[   17.677352] 
[   17.677381] The buggy address belongs to the object at fff00000c46dc000
[   17.677381]  which belongs to the cache kmalloc-8k of size 8192
[   17.677478] The buggy address is located 0 bytes to the right of
[   17.677478]  allocated 7936-byte region [fff00000c46dc000, fff00000c46ddf00)
[   17.677578] 
[   17.677640] The buggy address belongs to the physical page:
[   17.677927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d8
[   17.678005] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.678188] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.678251] page_type: f5(slab)
[   17.678407] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.678482] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.678664] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.678833] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.678930] head: 0bfffe0000000003 ffffc1ffc311b601 00000000ffffffff 00000000ffffffff
[   17.679089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.679142] page dumped because: kasan: bad access detected
[   17.679347] 
[   17.679367] Memory state around the buggy address:
[   17.679400]  fff00000c46dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.679457]  fff00000c46dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.679502] >fff00000c46ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679718]                    ^
[   17.679759]  fff00000c46ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679912]  fff00000c46de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.679994] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   17.648813] ==================================================================
[   17.648885] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.648938] Write of size 1 at addr fff00000c5bdc678 by task kunit_try_catch/144
[   17.649039] 
[   17.649069] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.649164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.649213] Hardware name: linux,dummy-virt (DT)
[   17.649245] Call trace:
[   17.649266]  show_stack+0x20/0x38 (C)
[   17.649316]  dump_stack_lvl+0x8c/0xd0
[   17.649362]  print_report+0x118/0x608
[   17.649416]  kasan_report+0xdc/0x128
[   17.649460]  __asan_report_store1_noabort+0x20/0x30
[   17.649517]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.649567]  kunit_try_run_case+0x170/0x3f0
[   17.649615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.649668]  kthread+0x328/0x630
[   17.649713]  ret_from_fork+0x10/0x20
[   17.649764] 
[   17.649781] Allocated by task 144:
[   17.649808]  kasan_save_stack+0x3c/0x68
[   17.649846]  kasan_save_track+0x20/0x40
[   17.650107]  kasan_save_alloc_info+0x40/0x58
[   17.650353]  __kasan_kmalloc+0xd4/0xd8
[   17.650430]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.650483]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.650568]  kunit_try_run_case+0x170/0x3f0
[   17.650645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.650690]  kthread+0x328/0x630
[   17.650941]  ret_from_fork+0x10/0x20
[   17.651002] 
[   17.651034] The buggy address belongs to the object at fff00000c5bdc600
[   17.651034]  which belongs to the cache kmalloc-128 of size 128
[   17.651129] The buggy address is located 0 bytes to the right of
[   17.651129]  allocated 120-byte region [fff00000c5bdc600, fff00000c5bdc678)
[   17.651200] 
[   17.651219] The buggy address belongs to the physical page:
[   17.651373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.651461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.651582] page_type: f5(slab)
[   17.651653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.651707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.651793] page dumped because: kasan: bad access detected
[   17.651879] 
[   17.652004] Memory state around the buggy address:
[   17.652039]  fff00000c5bdc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.652085]  fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.652136] >fff00000c5bdc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.652175]                                                                 ^
[   17.652214]  fff00000c5bdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.652257]  fff00000c5bdc700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.652422] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   17.634135] ==================================================================
[   17.634206] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   17.634576] Read of size 1 at addr fff00000c79a1000 by task kunit_try_catch/142
[   17.634876] 
[   17.634947] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.635184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.635268] Hardware name: linux,dummy-virt (DT)
[   17.635349] Call trace:
[   17.635371]  show_stack+0x20/0x38 (C)
[   17.635623]  dump_stack_lvl+0x8c/0xd0
[   17.635724]  print_report+0x118/0x608
[   17.635780]  kasan_report+0xdc/0x128
[   17.635911]  __asan_report_load1_noabort+0x20/0x30
[   17.636000]  kmalloc_node_oob_right+0x2f4/0x330
[   17.636046]  kunit_try_run_case+0x170/0x3f0
[   17.636097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.636293]  kthread+0x328/0x630
[   17.636347]  ret_from_fork+0x10/0x20
[   17.636527] 
[   17.636645] Allocated by task 142:
[   17.636732]  kasan_save_stack+0x3c/0x68
[   17.636791]  kasan_save_track+0x20/0x40
[   17.636967]  kasan_save_alloc_info+0x40/0x58
[   17.637161]  __kasan_kmalloc+0xd4/0xd8
[   17.637229]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   17.637379]  kmalloc_node_oob_right+0xbc/0x330
[   17.637420]  kunit_try_run_case+0x170/0x3f0
[   17.637708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.637917]  kthread+0x328/0x630
[   17.638004]  ret_from_fork+0x10/0x20
[   17.638104] 
[   17.638127] The buggy address belongs to the object at fff00000c79a0000
[   17.638127]  which belongs to the cache kmalloc-4k of size 4096
[   17.638200] The buggy address is located 0 bytes to the right of
[   17.638200]  allocated 4096-byte region [fff00000c79a0000, fff00000c79a1000)
[   17.638516] 
[   17.638560] The buggy address belongs to the physical page:
[   17.638754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079a0
[   17.639651] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.639937] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.640067] page_type: f5(slab)
[   17.640109] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.640162] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.640259] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.640320] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.640372] head: 0bfffe0000000003 ffffc1ffc31e6801 00000000ffffffff 00000000ffffffff
[   17.640423] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.640483] page dumped because: kasan: bad access detected
[   17.640514] 
[   17.640532] Memory state around the buggy address:
[   17.640569]  fff00000c79a0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.640622]  fff00000c79a0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.640674] >fff00000c79a1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640720]                    ^
[   17.640757]  fff00000c79a1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640809]  fff00000c79a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640868] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.622700] ==================================================================
[   17.622761] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.622817] Read of size 1 at addr fff00000c59e553f by task kunit_try_catch/140
[   17.622893] 
[   17.622937] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.623021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.623048] Hardware name: linux,dummy-virt (DT)
[   17.623080] Call trace:
[   17.623111]  show_stack+0x20/0x38 (C)
[   17.623166]  dump_stack_lvl+0x8c/0xd0
[   17.623212]  print_report+0x118/0x608
[   17.623256]  kasan_report+0xdc/0x128
[   17.623307]  __asan_report_load1_noabort+0x20/0x30
[   17.623357]  kmalloc_oob_left+0x2ec/0x320
[   17.623404]  kunit_try_run_case+0x170/0x3f0
[   17.623451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.623503]  kthread+0x328/0x630
[   17.623547]  ret_from_fork+0x10/0x20
[   17.623594] 
[   17.623611] Allocated by task 9:
[   17.623637]  kasan_save_stack+0x3c/0x68
[   17.623675]  kasan_save_track+0x20/0x40
[   17.623709]  kasan_save_alloc_info+0x40/0x58
[   17.623746]  __kasan_kmalloc+0xd4/0xd8
[   17.623781]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.623822]  kvasprintf+0xe0/0x180
[   17.624682]  __kthread_create_on_node+0x16c/0x350
[   17.624948]  kthread_create_on_node+0xe4/0x130
[   17.625059]  create_worker+0x380/0x6b8
[   17.625097]  worker_thread+0x808/0xf38
[   17.625262]  kthread+0x328/0x630
[   17.625305]  ret_from_fork+0x10/0x20
[   17.625340] 
[   17.625367] The buggy address belongs to the object at fff00000c59e5520
[   17.625367]  which belongs to the cache kmalloc-16 of size 16
[   17.625424] The buggy address is located 19 bytes to the right of
[   17.625424]  allocated 12-byte region [fff00000c59e5520, fff00000c59e552c)
[   17.625558] 
[   17.625770] The buggy address belongs to the physical page:
[   17.625933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e5
[   17.625988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.626159] page_type: f5(slab)
[   17.626347] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.626402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.626582] page dumped because: kasan: bad access detected
[   17.626769] 
[   17.626809] Memory state around the buggy address:
[   17.626842]  fff00000c59e5400: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   17.627032]  fff00000c59e5480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.627185] >fff00000c59e5500: fa fb fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc
[   17.627227]                                         ^
[   17.627413]  fff00000c59e5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.627462]  fff00000c59e5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.627557] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   17.598688] ==================================================================
[   17.598741] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.599082] Read of size 1 at addr fff00000c5bdc580 by task kunit_try_catch/138
[   17.599185] 
[   17.599225] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.599316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.599454] Hardware name: linux,dummy-virt (DT)
[   17.599520] Call trace:
[   17.599641]  show_stack+0x20/0x38 (C)
[   17.599719]  dump_stack_lvl+0x8c/0xd0
[   17.599820]  print_report+0x118/0x608
[   17.599882]  kasan_report+0xdc/0x128
[   17.599965]  __asan_report_load1_noabort+0x20/0x30
[   17.600171]  kmalloc_oob_right+0x5d0/0x660
[   17.600229]  kunit_try_run_case+0x170/0x3f0
[   17.600285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.600374]  kthread+0x328/0x630
[   17.600421]  ret_from_fork+0x10/0x20
[   17.600777] 
[   17.600817] Allocated by task 138:
[   17.600936]  kasan_save_stack+0x3c/0x68
[   17.601166]  kasan_save_track+0x20/0x40
[   17.601300]  kasan_save_alloc_info+0x40/0x58
[   17.601481]  __kasan_kmalloc+0xd4/0xd8
[   17.601523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.601606]  kmalloc_oob_right+0xb0/0x660
[   17.601844]  kunit_try_run_case+0x170/0x3f0
[   17.601989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.602096]  kthread+0x328/0x630
[   17.602191]  ret_from_fork+0x10/0x20
[   17.602233] 
[   17.602508] The buggy address belongs to the object at fff00000c5bdc500
[   17.602508]  which belongs to the cache kmalloc-128 of size 128
[   17.602631] The buggy address is located 13 bytes to the right of
[   17.602631]  allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573)
[   17.602762] 
[   17.602791] The buggy address belongs to the physical page:
[   17.602821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.603023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.603084] page_type: f5(slab)
[   17.603122] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.603326] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.603380] page dumped because: kasan: bad access detected
[   17.603418] 
[   17.603435] Memory state around the buggy address:
[   17.603466]  fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603512]  fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.603603] >fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603644]                    ^
[   17.603672]  fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603729]  fff00000c5bdc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603770] ==================================================================
[   17.582202] ==================================================================
[   17.582528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.583369] Write of size 1 at addr fff00000c5bdc573 by task kunit_try_catch/138
[   17.583475] 
[   17.584282] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.4-rc3 #1 PREEMPT 
[   17.584430] Tainted: [N]=TEST
[   17.584465] Hardware name: linux,dummy-virt (DT)
[   17.584687] Call trace:
[   17.584869]  show_stack+0x20/0x38 (C)
[   17.585003]  dump_stack_lvl+0x8c/0xd0
[   17.585066]  print_report+0x118/0x608
[   17.585111]  kasan_report+0xdc/0x128
[   17.585155]  __asan_report_store1_noabort+0x20/0x30
[   17.585205]  kmalloc_oob_right+0x5a4/0x660
[   17.585253]  kunit_try_run_case+0x170/0x3f0
[   17.585310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.585366]  kthread+0x328/0x630
[   17.585412]  ret_from_fork+0x10/0x20
[   17.585567] 
[   17.585605] Allocated by task 138:
[   17.585720]  kasan_save_stack+0x3c/0x68
[   17.585784]  kasan_save_track+0x20/0x40
[   17.585820]  kasan_save_alloc_info+0x40/0x58
[   17.585870]  __kasan_kmalloc+0xd4/0xd8
[   17.585904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.585943]  kmalloc_oob_right+0xb0/0x660
[   17.585980]  kunit_try_run_case+0x170/0x3f0
[   17.586018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.586063]  kthread+0x328/0x630
[   17.586097]  ret_from_fork+0x10/0x20
[   17.586151] 
[   17.586210] The buggy address belongs to the object at fff00000c5bdc500
[   17.586210]  which belongs to the cache kmalloc-128 of size 128
[   17.586302] The buggy address is located 0 bytes to the right of
[   17.586302]  allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573)
[   17.586369] 
[   17.586449] The buggy address belongs to the physical page:
[   17.586646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.586924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.587229] page_type: f5(slab)
[   17.587513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.587577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.587691] page dumped because: kasan: bad access detected
[   17.587730] 
[   17.587755] Memory state around the buggy address:
[   17.588007]  fff00000c5bdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.588080]  fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588137] >fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.588193]                                                              ^
[   17.588273]  fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588317]  fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588382] ==================================================================
[   17.589455] ==================================================================
[   17.589500] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.589971] Write of size 1 at addr fff00000c5bdc578 by task kunit_try_catch/138
[   17.590060] 
[   17.590099] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.590627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.590736] Hardware name: linux,dummy-virt (DT)
[   17.590780] Call trace:
[   17.590987]  show_stack+0x20/0x38 (C)
[   17.591048]  dump_stack_lvl+0x8c/0xd0
[   17.591094]  print_report+0x118/0x608
[   17.591138]  kasan_report+0xdc/0x128
[   17.591189]  __asan_report_store1_noabort+0x20/0x30
[   17.591261]  kmalloc_oob_right+0x538/0x660
[   17.591639]  kunit_try_run_case+0x170/0x3f0
[   17.591761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.592077]  kthread+0x328/0x630
[   17.592170]  ret_from_fork+0x10/0x20
[   17.592270] 
[   17.592427] Allocated by task 138:
[   17.592601]  kasan_save_stack+0x3c/0x68
[   17.592794]  kasan_save_track+0x20/0x40
[   17.592995]  kasan_save_alloc_info+0x40/0x58
[   17.593192]  __kasan_kmalloc+0xd4/0xd8
[   17.593240]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.593278]  kmalloc_oob_right+0xb0/0x660
[   17.593317]  kunit_try_run_case+0x170/0x3f0
[   17.593367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.593411]  kthread+0x328/0x630
[   17.593446]  ret_from_fork+0x10/0x20
[   17.593691] 
[   17.593790] The buggy address belongs to the object at fff00000c5bdc500
[   17.593790]  which belongs to the cache kmalloc-128 of size 128
[   17.594182] The buggy address is located 5 bytes to the right of
[   17.594182]  allocated 115-byte region [fff00000c5bdc500, fff00000c5bdc573)
[   17.594386] 
[   17.594471] The buggy address belongs to the physical page:
[   17.594592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   17.594844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.595007] page_type: f5(slab)
[   17.595101] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.595352] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.595507] page dumped because: kasan: bad access detected
[   17.595564] 
[   17.595624] Memory state around the buggy address:
[   17.595768]  fff00000c5bdc400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.595822]  fff00000c5bdc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596042] >fff00000c5bdc500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.596088]                                                                 ^
[   17.596155]  fff00000c5bdc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596488]  fff00000c5bdc600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596560] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   95.111677] WARNING: CPU: 1 PID: 658 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   95.113071] Modules linked in:
[   95.113772] CPU: 1 UID: 0 PID: 658 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.4-rc3 #1 PREEMPT 
[   95.115057] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   95.115831] Hardware name: linux,dummy-virt (DT)
[   95.116587] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.117256] pc : intlog10+0x38/0x48
[   95.117457] lr : intlog10_test+0xe4/0x200
[   95.117650] sp : ffff8000820c7c10
[   95.117807] x29: ffff8000820c7c90 x28: 0000000000000000 x27: 0000000000000000
[   95.118286] x26: 1ffe000019381d61 x25: 0000000000000000 x24: ffff8000820c7ce0
[   95.118734] x23: ffff8000820c7d00 x22: 0000000000000000 x21: 1ffff00010418f82
[   95.119191] x20: ffffab849c435180 x19: ffff800080087990 x18: 00000000fa957322
[   95.119669] x17: 000000007fd647cf x16: 00000000b73bbe94 x15: 000000008a1b0a78
[   95.120222] x14: 00000000f1f1f1f1 x13: 1ffe00001b4939e0 x12: ffff757094039b71
[   95.120738] x11: 1ffff57094039b70 x10: ffff757094039b70 x9 : ffffab8499a147c4
[   95.121187] x8 : ffffab84a01cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.121627] x5 : ffff700010418f82 x4 : 1ffff00010010f3a x3 : 1ffff57093886a30
[   95.122226] x2 : 1ffff57093886a30 x1 : 0000000000000003 x0 : 0000000000000000
[   95.122997] Call trace:
[   95.123300]  intlog10+0x38/0x48 (P)
[   95.123708]  kunit_try_run_case+0x170/0x3f0
[   95.124118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.124535]  kthread+0x328/0x630
[   95.124730]  ret_from_fork+0x10/0x20
[   95.124944] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   95.062284] WARNING: CPU: 0 PID: 640 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   95.063282] Modules linked in:
[   95.063504] CPU: 0 UID: 0 PID: 640 Comm: kunit_try_catch Tainted: G    B D          N  6.15.4-rc3 #1 PREEMPT 
[   95.064076] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   95.064996] Hardware name: linux,dummy-virt (DT)
[   95.065570] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.066351] pc : intlog2+0xd8/0xf8
[   95.066825] lr : intlog2_test+0xe4/0x200
[   95.067361] sp : ffff800082347c10
[   95.067804] x29: ffff800082347c90 x28: 0000000000000000 x27: 0000000000000000
[   95.068721] x26: 1ffe000019381ce1 x25: 0000000000000000 x24: ffff800082347ce0
[   95.069599] x23: ffff800082347d00 x22: 0000000000000000 x21: 1ffff00010468f82
[   95.070437] x20: ffffab849c435080 x19: ffff800080087990 x18: 00000000b6d9949c
[   95.071283] x17: 000000002ae0dfa8 x16: fff00000c096dc3c x15: fff00000ff616b08
[   95.072184] x14: 00000000f1f1f1f1 x13: 1ffe00001b493a1d x12: ffff757094039b71
[   95.073015] x11: 1ffff57094039b70 x10: ffff757094039b70 x9 : ffffab8499a149c4
[   95.073376] x8 : ffffab84a01cdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.073718] x5 : ffff700010468f82 x4 : 1ffff00010010f3a x3 : 1ffff57093886a10
[   95.074073] x2 : 1ffff57093886a10 x1 : 0000000000000003 x0 : 0000000000000000
[   95.074416] Call trace:
[   95.074551]  intlog2+0xd8/0xf8 (P)
[   95.074742]  kunit_try_run_case+0x170/0x3f0
[   95.075237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.076186]  kthread+0x328/0x630
[   95.076779]  ret_from_fork+0x10/0x20
[   95.077320] ---[ end trace 0000000000000000 ]---