Hay
Date
July 3, 2025, 3:13 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   17.954889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   17.945632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   18.005909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   17.932763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   17.961289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   18.009292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   17.971391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   17.871285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   17.853514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   17.825635] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   49.275603] ==================================================================
[   49.275692] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   49.275692] 
[   49.275780] Use-after-free read at 0x00000000a20e83cf (in kfence-#154):
[   49.275832]  test_krealloc+0x51c/0x830
[   49.275874]  kunit_try_run_case+0x170/0x3f0
[   49.275922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.275982]  kthread+0x328/0x630
[   49.276027]  ret_from_fork+0x10/0x20
[   49.276067] 
[   49.276090] kfence-#154: 0x00000000a20e83cf-0x000000002ade0885, size=32, cache=kmalloc-32
[   49.276090] 
[   49.276142] allocated by task 340 on cpu 0 at 49.274750s (0.001388s ago):
[   49.276212]  test_alloc+0x29c/0x628
[   49.276252]  test_krealloc+0xc0/0x830
[   49.276289]  kunit_try_run_case+0x170/0x3f0
[   49.276330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.276376]  kthread+0x328/0x630
[   49.276413]  ret_from_fork+0x10/0x20
[   49.276451] 
[   49.276475] freed by task 340 on cpu 0 at 49.275201s (0.001270s ago):
[   49.276533]  krealloc_noprof+0x148/0x360
[   49.276571]  test_krealloc+0x1dc/0x830
[   49.276607]  kunit_try_run_case+0x170/0x3f0
[   49.276649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.276695]  kthread+0x328/0x630
[   49.276733]  ret_from_fork+0x10/0x20
[   49.276772] 
[   49.276817] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   49.276895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.276924] Hardware name: linux,dummy-virt (DT)
[   49.276970] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   49.193774] ==================================================================
[   49.193875] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   49.193875] 
[   49.193983] Use-after-free read at 0x00000000647cd250 (in kfence-#153):
[   49.194039]  test_memcache_typesafe_by_rcu+0x280/0x560
[   49.194089]  kunit_try_run_case+0x170/0x3f0
[   49.194134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.194182]  kthread+0x328/0x630
[   49.194227]  ret_from_fork+0x10/0x20
[   49.194269] 
[   49.194292] kfence-#153: 0x00000000647cd250-0x000000001b5f20b0, size=32, cache=test
[   49.194292] 
[   49.194341] allocated by task 338 on cpu 1 at 49.174476s (0.019861s ago):
[   49.194412]  test_alloc+0x230/0x628
[   49.194453]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   49.194496]  kunit_try_run_case+0x170/0x3f0
[   49.194536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.194580]  kthread+0x328/0x630
[   49.194617]  ret_from_fork+0x10/0x20
[   49.194657] 
[   49.194680] freed by task 338 on cpu 1 at 49.174563s (0.020113s ago):
[   49.194735]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   49.194775]  kunit_try_run_case+0x170/0x3f0
[   49.194815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.194859]  kthread+0x328/0x630
[   49.194896]  ret_from_fork+0x10/0x20
[   49.194936] 
[   49.194989] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   49.195067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.195100] Hardware name: linux,dummy-virt (DT)
[   49.195135] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   26.206516] ==================================================================
[   26.208234] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   26.208234] 
[   26.208402] Invalid read at 0x0000000021070b09:
[   26.208500]  test_invalid_access+0xdc/0x1f0
[   26.208556]  kunit_try_run_case+0x170/0x3f0
[   26.208610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.208660]  kthread+0x328/0x630
[   26.208708]  ret_from_fork+0x10/0x20
[   26.208761] 
[   26.208812] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   26.208942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.209012] Hardware name: linux,dummy-virt (DT)
[   26.209062] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   25.978828] ==================================================================
[   25.978919] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   25.978919] 
[   25.978996] Corrupted memory at 0x00000000c78a63be [ ! . . . . . . . . . . . . . . . ] (in kfence-#149):
[   25.979304]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   25.979352]  kunit_try_run_case+0x170/0x3f0
[   25.979398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.979443]  kthread+0x328/0x630
[   25.979484]  ret_from_fork+0x10/0x20
[   25.979523] 
[   25.979548] kfence-#149: 0x000000003ca5e7e8-0x000000006adecb7a, size=73, cache=kmalloc-96
[   25.979548] 
[   25.979602] allocated by task 328 on cpu 1 at 25.978576s (0.001023s ago):
[   25.979664]  test_alloc+0x29c/0x628
[   25.979703]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   25.979744]  kunit_try_run_case+0x170/0x3f0
[   25.979785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.979829]  kthread+0x328/0x630
[   25.979868]  ret_from_fork+0x10/0x20
[   25.979907] 
[   25.979931] freed by task 328 on cpu 1 at 25.978729s (0.001198s ago):
[   25.980000]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   25.980041]  kunit_try_run_case+0x170/0x3f0
[   25.980082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.980127]  kthread+0x328/0x630
[   25.980165]  ret_from_fork+0x10/0x20
[   25.980204] 
[   25.980251] CPU: 1 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   25.980328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.980359] Hardware name: linux,dummy-virt (DT)
[   25.980394] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   25.874843] ==================================================================
[   25.874964] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   25.874964] 
[   25.875064] Out-of-bounds read at 0x000000009266244c (105B right of kfence-#148):
[   25.875126]  test_kmalloc_aligned_oob_read+0x238/0x468
[   25.875174]  kunit_try_run_case+0x170/0x3f0
[   25.875221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.875268]  kthread+0x328/0x630
[   25.875312]  ret_from_fork+0x10/0x20
[   25.875351] 
[   25.875376] kfence-#148: 0x000000003c921865-0x00000000c8e94798, size=73, cache=kmalloc-96
[   25.875376] 
[   25.875429] allocated by task 326 on cpu 0 at 25.874594s (0.000831s ago):
[   25.875500]  test_alloc+0x29c/0x628
[   25.875540]  test_kmalloc_aligned_oob_read+0x100/0x468
[   25.875583]  kunit_try_run_case+0x170/0x3f0
[   25.875625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.875670]  kthread+0x328/0x630
[   25.875709]  ret_from_fork+0x10/0x20
[   25.875748] 
[   25.875796] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   25.875874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.875904] Hardware name: linux,dummy-virt (DT)
[   25.875940] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   21.714924] ==================================================================
[   21.715035] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   21.715035] 
[   21.715093] Corrupted memory at 0x00000000b42734e6 [ ! ] (in kfence-#108):
[   21.715225]  test_corruption+0x284/0x378
[   21.715270]  kunit_try_run_case+0x170/0x3f0
[   21.715313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.715358]  kthread+0x328/0x630
[   21.715398]  ret_from_fork+0x10/0x20
[   21.715439] 
[   21.715464] kfence-#108: 0x00000000a5a09d4c-0x00000000f54258a2, size=32, cache=kmalloc-32
[   21.715464] 
[   21.715518] allocated by task 314 on cpu 1 at 21.714648s (0.000866s ago):
[   21.715576]  test_alloc+0x29c/0x628
[   21.715615]  test_corruption+0x198/0x378
[   21.715657]  kunit_try_run_case+0x170/0x3f0
[   21.715701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.715746]  kthread+0x328/0x630
[   21.715783]  ret_from_fork+0x10/0x20
[   21.715823] 
[   21.715847] freed by task 314 on cpu 1 at 21.714752s (0.001091s ago):
[   21.715904]  test_corruption+0x284/0x378
[   21.715941]  kunit_try_run_case+0x170/0x3f0
[   21.715996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.716040]  kthread+0x328/0x630
[   21.716079]  ret_from_fork+0x10/0x20
[   21.716118] 
[   21.716162] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   21.716238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.716266] Hardware name: linux,dummy-virt (DT)
[   21.716300] ==================================================================
[   21.402894] ==================================================================
[   21.403030] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   21.403030] 
[   21.403097] Corrupted memory at 0x00000000be369ef3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#105):
[   21.404226]  test_corruption+0x278/0x378
[   21.404276]  kunit_try_run_case+0x170/0x3f0
[   21.404324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.404368]  kthread+0x328/0x630
[   21.404412]  ret_from_fork+0x10/0x20
[   21.404451] 
[   21.404476] kfence-#105: 0x0000000019246626-0x000000007a290049, size=32, cache=kmalloc-32
[   21.404476] 
[   21.404532] allocated by task 314 on cpu 1 at 21.402612s (0.001917s ago):
[   21.404594]  test_alloc+0x29c/0x628
[   21.404633]  test_corruption+0xdc/0x378
[   21.404672]  kunit_try_run_case+0x170/0x3f0
[   21.404712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.404757]  kthread+0x328/0x630
[   21.404796]  ret_from_fork+0x10/0x20
[   21.404836] 
[   21.404859] freed by task 314 on cpu 1 at 21.402712s (0.002143s ago):
[   21.404916]  test_corruption+0x278/0x378
[   21.404965]  kunit_try_run_case+0x170/0x3f0
[   21.405007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.405052]  kthread+0x328/0x630
[   21.405089]  ret_from_fork+0x10/0x20
[   21.405129] 
[   21.405175] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   21.405252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.405282] Hardware name: linux,dummy-virt (DT)
[   21.405318] ==================================================================
[   22.026804] ==================================================================
[   22.026902] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   22.026902] 
[   22.026981] Corrupted memory at 0x0000000018e0be04 [ ! . . . . . . . . . . . . . . . ] (in kfence-#111):
[   22.027291]  test_corruption+0x120/0x378
[   22.027336]  kunit_try_run_case+0x170/0x3f0
[   22.027381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.027427]  kthread+0x328/0x630
[   22.027469]  ret_from_fork+0x10/0x20
[   22.027508] 
[   22.027533] kfence-#111: 0x000000009aeebe34-0x0000000059903a46, size=32, cache=test
[   22.027533] 
[   22.027587] allocated by task 316 on cpu 1 at 22.026649s (0.000934s ago):
[   22.027648]  test_alloc+0x230/0x628
[   22.027687]  test_corruption+0xdc/0x378
[   22.027726]  kunit_try_run_case+0x170/0x3f0
[   22.027767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.027811]  kthread+0x328/0x630
[   22.027852]  ret_from_fork+0x10/0x20
[   22.027893] 
[   22.027916] freed by task 316 on cpu 1 at 22.026712s (0.001200s ago):
[   22.027987]  test_corruption+0x120/0x378
[   22.028026]  kunit_try_run_case+0x170/0x3f0
[   22.028067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028116]  kthread+0x328/0x630
[   22.028156]  ret_from_fork+0x10/0x20
[   22.028194] 
[   22.028239] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   22.028315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.028346] Hardware name: linux,dummy-virt (DT)
[   22.028380] ==================================================================
[   22.546808] ==================================================================
[   22.546903] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   22.546903] 
[   22.546979] Corrupted memory at 0x000000001e14f36e [ ! ] (in kfence-#116):
[   22.547095]  test_corruption+0x1d8/0x378
[   22.547141]  kunit_try_run_case+0x170/0x3f0
[   22.547185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.547230]  kthread+0x328/0x630
[   22.547270]  ret_from_fork+0x10/0x20
[   22.547311] 
[   22.547334] kfence-#116: 0x000000008b7c2781-0x00000000013c9571, size=32, cache=test
[   22.547334] 
[   22.547387] allocated by task 316 on cpu 1 at 22.546644s (0.000739s ago):
[   22.547447]  test_alloc+0x230/0x628
[   22.547487]  test_corruption+0x198/0x378
[   22.547525]  kunit_try_run_case+0x170/0x3f0
[   22.547565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.547609]  kthread+0x328/0x630
[   22.547648]  ret_from_fork+0x10/0x20
[   22.547687] 
[   22.547710] freed by task 316 on cpu 1 at 22.546704s (0.001002s ago):
[   22.547768]  test_corruption+0x1d8/0x378
[   22.547804]  kunit_try_run_case+0x170/0x3f0
[   22.547845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.547888]  kthread+0x328/0x630
[   22.547928]  ret_from_fork+0x10/0x20
[   22.547975] 
[   22.548017] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   22.548093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.548126] Hardware name: linux,dummy-virt (DT)
[   22.548161] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   21.090792] ==================================================================
[   21.090893] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   21.090893] 
[   21.090969] Invalid free of 0x000000009d830e95 (in kfence-#102):
[   21.091021]  test_invalid_addr_free+0xec/0x238
[   21.091064]  kunit_try_run_case+0x170/0x3f0
[   21.091111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.091156]  kthread+0x328/0x630
[   21.091197]  ret_from_fork+0x10/0x20
[   21.091236] 
[   21.091261] kfence-#102: 0x00000000d9121877-0x0000000069c70bdd, size=32, cache=test
[   21.091261] 
[   21.091313] allocated by task 312 on cpu 0 at 21.090659s (0.000650s ago):
[   21.091374]  test_alloc+0x230/0x628
[   21.091413]  test_invalid_addr_free+0xd4/0x238
[   21.091453]  kunit_try_run_case+0x170/0x3f0
[   21.091495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.091543]  kthread+0x328/0x630
[   21.091580]  ret_from_fork+0x10/0x20
[   21.091620] 
[   21.091662] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   21.091739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.091770] Hardware name: linux,dummy-virt (DT)
[   21.091805] ==================================================================
[   20.986749] ==================================================================
[   20.986847] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   20.986847] 
[   20.986906] Invalid free of 0x00000000f2d0c380 (in kfence-#101):
[   20.986977]  test_invalid_addr_free+0x1ac/0x238
[   20.987021]  kunit_try_run_case+0x170/0x3f0
[   20.987067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.987112]  kthread+0x328/0x630
[   20.987154]  ret_from_fork+0x10/0x20
[   20.987194] 
[   20.987218] kfence-#101: 0x000000004a15e42d-0x00000000bbc34f21, size=32, cache=kmalloc-32
[   20.987218] 
[   20.987274] allocated by task 310 on cpu 0 at 20.986591s (0.000679s ago):
[   20.987334]  test_alloc+0x29c/0x628
[   20.987373]  test_invalid_addr_free+0xd4/0x238
[   20.987414]  kunit_try_run_case+0x170/0x3f0
[   20.987455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.987499]  kthread+0x328/0x630
[   20.987539]  ret_from_fork+0x10/0x20
[   20.987578] 
[   20.987623] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.987702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.987732] Hardware name: linux,dummy-virt (DT)
[   20.987766] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   20.882750] ==================================================================
[   20.882846] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   20.882846] 
[   20.882905] Invalid free of 0x0000000021d37ea3 (in kfence-#100):
[   20.882974]  test_double_free+0x100/0x238
[   20.883017]  kunit_try_run_case+0x170/0x3f0
[   20.883060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.883105]  kthread+0x328/0x630
[   20.883145]  ret_from_fork+0x10/0x20
[   20.883185] 
[   20.883210] kfence-#100: 0x0000000021d37ea3-0x00000000cab75418, size=32, cache=test
[   20.883210] 
[   20.883262] allocated by task 308 on cpu 1 at 20.882536s (0.000722s ago):
[   20.883323]  test_alloc+0x230/0x628
[   20.883361]  test_double_free+0xd4/0x238
[   20.883400]  kunit_try_run_case+0x170/0x3f0
[   20.883442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.883485]  kthread+0x328/0x630
[   20.883524]  ret_from_fork+0x10/0x20
[   20.883562] 
[   20.883586] freed by task 308 on cpu 1 at 20.882597s (0.000985s ago):
[   20.883646]  test_double_free+0xf0/0x238
[   20.883685]  kunit_try_run_case+0x170/0x3f0
[   20.883726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.883769]  kthread+0x328/0x630
[   20.883809]  ret_from_fork+0x10/0x20
[   20.883846] 
[   20.883890] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.883978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.884008] Hardware name: linux,dummy-virt (DT)
[   20.884041] ==================================================================
[   20.779213] ==================================================================
[   20.779335] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   20.779335] 
[   20.779403] Invalid free of 0x000000009a1a9171 (in kfence-#99):
[   20.779465]  test_double_free+0x1bc/0x238
[   20.779510]  kunit_try_run_case+0x170/0x3f0
[   20.779555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.779600]  kthread+0x328/0x630
[   20.779642]  ret_from_fork+0x10/0x20
[   20.779681] 
[   20.779705] kfence-#99: 0x000000009a1a9171-0x000000009c0ba914, size=32, cache=kmalloc-32
[   20.779705] 
[   20.779758] allocated by task 306 on cpu 1 at 20.778888s (0.000866s ago):
[   20.779818]  test_alloc+0x29c/0x628
[   20.779859]  test_double_free+0xd4/0x238
[   20.779896]  kunit_try_run_case+0x170/0x3f0
[   20.779936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.779998]  kthread+0x328/0x630
[   20.780040]  ret_from_fork+0x10/0x20
[   20.780080] 
[   20.780105] freed by task 306 on cpu 1 at 20.778980s (0.001122s ago):
[   20.780165]  test_double_free+0x1ac/0x238
[   20.780205]  kunit_try_run_case+0x170/0x3f0
[   20.780247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.780291]  kthread+0x328/0x630
[   20.780329]  ret_from_fork+0x10/0x20
[   20.780369] 
[   20.780416] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.780494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.780525] Hardware name: linux,dummy-virt (DT)
[   20.780560] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   20.466720] ==================================================================
[   20.466818] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   20.466818] 
[   20.466906] Use-after-free read at 0x00000000055fc2f0 (in kfence-#96):
[   20.466973]  test_use_after_free_read+0x114/0x248
[   20.467019]  kunit_try_run_case+0x170/0x3f0
[   20.467064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.467108]  kthread+0x328/0x630
[   20.467149]  ret_from_fork+0x10/0x20
[   20.467189] 
[   20.467215] kfence-#96: 0x00000000055fc2f0-0x000000004776c689, size=32, cache=test
[   20.467215] 
[   20.467265] allocated by task 300 on cpu 1 at 20.466544s (0.000717s ago):
[   20.467336]  test_alloc+0x230/0x628
[   20.467375]  test_use_after_free_read+0xd0/0x248
[   20.467420]  kunit_try_run_case+0x170/0x3f0
[   20.467462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.467507]  kthread+0x328/0x630
[   20.467545]  ret_from_fork+0x10/0x20
[   20.467584] 
[   20.467608] freed by task 300 on cpu 1 at 20.466602s (0.001003s ago):
[   20.467704]  test_use_after_free_read+0xf0/0x248
[   20.467746]  kunit_try_run_case+0x170/0x3f0
[   20.467787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.467832]  kthread+0x328/0x630
[   20.467869]  ret_from_fork+0x10/0x20
[   20.467908] 
[   20.467962] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.468039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.468069] Hardware name: linux,dummy-virt (DT)
[   20.468101] ==================================================================
[   20.362914] ==================================================================
[   20.363049] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   20.363049] 
[   20.363156] Use-after-free read at 0x00000000f15cdb58 (in kfence-#95):
[   20.363210]  test_use_after_free_read+0x114/0x248
[   20.363256]  kunit_try_run_case+0x170/0x3f0
[   20.363303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.363346]  kthread+0x328/0x630
[   20.363389]  ret_from_fork+0x10/0x20
[   20.363429] 
[   20.363454] kfence-#95: 0x00000000f15cdb58-0x00000000a6f5e360, size=32, cache=kmalloc-32
[   20.363454] 
[   20.363506] allocated by task 298 on cpu 1 at 20.362606s (0.000896s ago):
[   20.363578]  test_alloc+0x29c/0x628
[   20.363617]  test_use_after_free_read+0xd0/0x248
[   20.363656]  kunit_try_run_case+0x170/0x3f0
[   20.363699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.363744]  kthread+0x328/0x630
[   20.363782]  ret_from_fork+0x10/0x20
[   20.363826] 
[   20.363976] freed by task 298 on cpu 1 at 20.362682s (0.001204s ago):
[   20.364085]  test_use_after_free_read+0x1c0/0x248
[   20.364126]  kunit_try_run_case+0x170/0x3f0
[   20.364167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.364212]  kthread+0x328/0x630
[   20.364250]  ret_from_fork+0x10/0x20
[   20.364303] 
[   20.364351] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.364429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.364459] Hardware name: linux,dummy-virt (DT)
[   20.364494] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   20.154870] ==================================================================
[   20.154997] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   20.154997] 
[   20.155113] Out-of-bounds write at 0x00000000827248e2 (1B left of kfence-#93):
[   20.155184]  test_out_of_bounds_write+0x100/0x240
[   20.155231]  kunit_try_run_case+0x170/0x3f0
[   20.155290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.155347]  kthread+0x328/0x630
[   20.155388]  ret_from_fork+0x10/0x20
[   20.155429] 
[   20.155454] kfence-#93: 0x0000000027d2fc31-0x00000000f7362a9e, size=32, cache=kmalloc-32
[   20.155454] 
[   20.155505] allocated by task 294 on cpu 0 at 20.154673s (0.000828s ago):
[   20.155575]  test_alloc+0x29c/0x628
[   20.155613]  test_out_of_bounds_write+0xc8/0x240
[   20.155655]  kunit_try_run_case+0x170/0x3f0
[   20.155696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.155739]  kthread+0x328/0x630
[   20.155779]  ret_from_fork+0x10/0x20
[   20.155817] 
[   20.155861] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.155938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.155979] Hardware name: linux,dummy-virt (DT)
[   20.156012] ==================================================================
[   20.258655] ==================================================================
[   20.258756] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   20.258756] 
[   20.258848] Out-of-bounds write at 0x000000005f1650f9 (1B left of kfence-#94):
[   20.258904]  test_out_of_bounds_write+0x100/0x240
[   20.258966]  kunit_try_run_case+0x170/0x3f0
[   20.259011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.259057]  kthread+0x328/0x630
[   20.259099]  ret_from_fork+0x10/0x20
[   20.259140] 
[   20.259164] kfence-#94: 0x000000006d3c89d5-0x000000004d28d8b1, size=32, cache=test
[   20.259164] 
[   20.259215] allocated by task 296 on cpu 0 at 20.258570s (0.000641s ago):
[   20.259285]  test_alloc+0x230/0x628
[   20.259326]  test_out_of_bounds_write+0xc8/0x240
[   20.259368]  kunit_try_run_case+0x170/0x3f0
[   20.259409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.259454]  kthread+0x328/0x630
[   20.259494]  ret_from_fork+0x10/0x20
[   20.259535] 
[   20.259578] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   20.259656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.259685] Hardware name: linux,dummy-virt (DT)
[   20.259720] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   19.294819] ==================================================================
[   19.295009] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   19.295009] 
[   19.295098] Out-of-bounds read at 0x000000001ed46019 (32B right of kfence-#85):
[   19.295173]  test_out_of_bounds_read+0x1c8/0x3e0
[   19.295296]  kunit_try_run_case+0x170/0x3f0
[   19.295342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295406]  kthread+0x328/0x630
[   19.295446]  ret_from_fork+0x10/0x20
[   19.295497] 
[   19.295524] kfence-#85: 0x0000000091bff555-0x000000007a26a38c, size=32, cache=test
[   19.295524] 
[   19.295572] allocated by task 292 on cpu 0 at 19.294742s (0.000827s ago):
[   19.295641]  test_alloc+0x230/0x628
[   19.295793]  test_out_of_bounds_read+0x198/0x3e0
[   19.295934]  kunit_try_run_case+0x170/0x3f0
[   19.297565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.297624]  kthread+0x328/0x630
[   19.297664]  ret_from_fork+0x10/0x20
[   19.297703] 
[   19.297744] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   19.297826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.297859] Hardware name: linux,dummy-virt (DT)
[   19.297892] ==================================================================
[   18.972082] ==================================================================
[   18.972571] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   18.972571] 
[   18.972686] Out-of-bounds read at 0x0000000098996a1e (32B right of kfence-#82):
[   18.972868]  test_out_of_bounds_read+0x1c8/0x3e0
[   18.972921]  kunit_try_run_case+0x170/0x3f0
[   18.973289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.973351]  kthread+0x328/0x630
[   18.973395]  ret_from_fork+0x10/0x20
[   18.973504] 
[   18.973531] kfence-#82: 0x00000000c36e1c2d-0x0000000065c27977, size=32, cache=kmalloc-32
[   18.973531] 
[   18.973646] allocated by task 290 on cpu 0 at 18.971564s (0.002062s ago):
[   18.973819]  test_alloc+0x29c/0x628
[   18.973897]  test_out_of_bounds_read+0x198/0x3e0
[   18.973940]  kunit_try_run_case+0x170/0x3f0
[   18.974328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.974573]  kthread+0x328/0x630
[   18.974700]  ret_from_fork+0x10/0x20
[   18.975088] 
[   18.975148] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.975364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.975758] Hardware name: linux,dummy-virt (DT)
[   18.975867] ==================================================================
[   18.863706] ==================================================================
[   18.864048] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   18.864048] 
[   18.864189] Out-of-bounds read at 0x000000007758fd69 (1B left of kfence-#81):
[   18.864424]  test_out_of_bounds_read+0x114/0x3e0
[   18.864479]  kunit_try_run_case+0x170/0x3f0
[   18.864641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.864938]  kthread+0x328/0x630
[   18.865021]  ret_from_fork+0x10/0x20
[   18.865075] 
[   18.865850] kfence-#81: 0x00000000c6a1af3a-0x000000003eacdaaa, size=32, cache=kmalloc-32
[   18.865850] 
[   18.866506] allocated by task 290 on cpu 0 at 18.862651s (0.003466s ago):
[   18.867415]  test_alloc+0x29c/0x628
[   18.867731]  test_out_of_bounds_read+0xdc/0x3e0
[   18.868086]  kunit_try_run_case+0x170/0x3f0
[   18.868446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.868544]  kthread+0x328/0x630
[   18.868671]  ret_from_fork+0x10/0x20
[   18.869075] 
[   18.869425] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.869723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.869860] Hardware name: linux,dummy-virt (DT)
[   18.870048] ==================================================================
[   19.187037] ==================================================================
[   19.187145] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   19.187145] 
[   19.187239] Out-of-bounds read at 0x00000000470d715f (1B left of kfence-#84):
[   19.187418]  test_out_of_bounds_read+0x114/0x3e0
[   19.187600]  kunit_try_run_case+0x170/0x3f0
[   19.187645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.187691]  kthread+0x328/0x630
[   19.188014]  ret_from_fork+0x10/0x20
[   19.188118] 
[   19.188145] kfence-#84: 0x00000000617633ec-0x000000000f2c4f81, size=32, cache=test
[   19.188145] 
[   19.188290] allocated by task 292 on cpu 0 at 19.186944s (0.001314s ago):
[   19.188711]  test_alloc+0x230/0x628
[   19.188852]  test_out_of_bounds_read+0xdc/0x3e0
[   19.188927]  kunit_try_run_case+0x170/0x3f0
[   19.189028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.189104]  kthread+0x328/0x630
[   19.189233]  ret_from_fork+0x10/0x20
[   19.189546] 
[   19.189609] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   19.189690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.189772] Hardware name: linux,dummy-virt (DT)
[   19.189807] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   18.483374] ==================================================================
[   18.483608] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   18.483809] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.484004] 
[   18.484051] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.484175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.484208] Hardware name: linux,dummy-virt (DT)
[   18.484242] Call trace:
[   18.484268]  show_stack+0x20/0x38 (C)
[   18.484318]  dump_stack_lvl+0x8c/0xd0
[   18.484494]  print_report+0x118/0x608
[   18.484595]  kasan_report+0xdc/0x128
[   18.484786]  kasan_check_range+0x100/0x1a8
[   18.484899]  __kasan_check_write+0x20/0x30
[   18.485008]  strncpy_from_user+0x3c/0x2a0
[   18.485106]  copy_user_test_oob+0x5c0/0xec8
[   18.485181]  kunit_try_run_case+0x170/0x3f0
[   18.485232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.485295]  kthread+0x328/0x630
[   18.485420]  ret_from_fork+0x10/0x20
[   18.485473] 
[   18.485493] Allocated by task 288:
[   18.485527]  kasan_save_stack+0x3c/0x68
[   18.485566]  kasan_save_track+0x20/0x40
[   18.485792]  kasan_save_alloc_info+0x40/0x58
[   18.485841]  __kasan_kmalloc+0xd4/0xd8
[   18.486006]  __kmalloc_noprof+0x198/0x4c8
[   18.486213]  kunit_kmalloc_array+0x34/0x88
[   18.486305]  copy_user_test_oob+0xac/0xec8
[   18.486565]  kunit_try_run_case+0x170/0x3f0
[   18.486697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.486877]  kthread+0x328/0x630
[   18.487071]  ret_from_fork+0x10/0x20
[   18.487118] 
[   18.487233] The buggy address belongs to the object at fff00000c77faa00
[   18.487233]  which belongs to the cache kmalloc-128 of size 128
[   18.487371] The buggy address is located 0 bytes inside of
[   18.487371]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.487731] 
[   18.487910] The buggy address belongs to the physical page:
[   18.488053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.488284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.488404] page_type: f5(slab)
[   18.488512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.488566] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.488758] page dumped because: kasan: bad access detected
[   18.488884] 
[   18.488909] Memory state around the buggy address:
[   18.488965]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.489012]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.489058] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.489118]                                                                 ^
[   18.489170]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.489214]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.489271] ==================================================================
[   18.489972] ==================================================================
[   18.490026] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   18.490205] Write of size 1 at addr fff00000c77faa78 by task kunit_try_catch/288
[   18.490263] 
[   18.490481] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.490778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.490991] Hardware name: linux,dummy-virt (DT)
[   18.491058] Call trace:
[   18.491177]  show_stack+0x20/0x38 (C)
[   18.491469]  dump_stack_lvl+0x8c/0xd0
[   18.491730]  print_report+0x118/0x608
[   18.491828]  kasan_report+0xdc/0x128
[   18.491988]  __asan_report_store1_noabort+0x20/0x30
[   18.492162]  strncpy_from_user+0x270/0x2a0
[   18.492281]  copy_user_test_oob+0x5c0/0xec8
[   18.492390]  kunit_try_run_case+0x170/0x3f0
[   18.492444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.492688]  kthread+0x328/0x630
[   18.492898]  ret_from_fork+0x10/0x20
[   18.493308] 
[   18.493376] Allocated by task 288:
[   18.493415]  kasan_save_stack+0x3c/0x68
[   18.493474]  kasan_save_track+0x20/0x40
[   18.493510]  kasan_save_alloc_info+0x40/0x58
[   18.493551]  __kasan_kmalloc+0xd4/0xd8
[   18.493588]  __kmalloc_noprof+0x198/0x4c8
[   18.493683]  kunit_kmalloc_array+0x34/0x88
[   18.493735]  copy_user_test_oob+0xac/0xec8
[   18.493777]  kunit_try_run_case+0x170/0x3f0
[   18.493818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.493864]  kthread+0x328/0x630
[   18.493900]  ret_from_fork+0x10/0x20
[   18.493937] 
[   18.494606] The buggy address belongs to the object at fff00000c77faa00
[   18.494606]  which belongs to the cache kmalloc-128 of size 128
[   18.494675] The buggy address is located 0 bytes to the right of
[   18.494675]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.494741] 
[   18.494765] The buggy address belongs to the physical page:
[   18.494967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.495201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.495422] page_type: f5(slab)
[   18.495504] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.495833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.495882] page dumped because: kasan: bad access detected
[   18.495937] 
[   18.496255] Memory state around the buggy address:
[   18.496533]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.496756]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.496905] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.496960]                                                                 ^
[   18.497139]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.497192]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.497575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   18.459601] ==================================================================
[   18.459865] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   18.460057] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.460115] 
[   18.460151] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.460401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.460536] Hardware name: linux,dummy-virt (DT)
[   18.460600] Call trace:
[   18.460860]  show_stack+0x20/0x38 (C)
[   18.460996]  dump_stack_lvl+0x8c/0xd0
[   18.461053]  print_report+0x118/0x608
[   18.461100]  kasan_report+0xdc/0x128
[   18.461283]  kasan_check_range+0x100/0x1a8
[   18.461346]  __kasan_check_read+0x20/0x30
[   18.461646]  copy_user_test_oob+0x3c8/0xec8
[   18.461716]  kunit_try_run_case+0x170/0x3f0
[   18.461848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.461909]  kthread+0x328/0x630
[   18.461966]  ret_from_fork+0x10/0x20
[   18.462015] 
[   18.462035] Allocated by task 288:
[   18.462066]  kasan_save_stack+0x3c/0x68
[   18.462124]  kasan_save_track+0x20/0x40
[   18.462193]  kasan_save_alloc_info+0x40/0x58
[   18.462235]  __kasan_kmalloc+0xd4/0xd8
[   18.462295]  __kmalloc_noprof+0x198/0x4c8
[   18.462594]  kunit_kmalloc_array+0x34/0x88
[   18.462784]  copy_user_test_oob+0xac/0xec8
[   18.462851]  kunit_try_run_case+0x170/0x3f0
[   18.463114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.463220]  kthread+0x328/0x630
[   18.463405]  ret_from_fork+0x10/0x20
[   18.463623] 
[   18.463912] The buggy address belongs to the object at fff00000c77faa00
[   18.463912]  which belongs to the cache kmalloc-128 of size 128
[   18.464182] The buggy address is located 0 bytes inside of
[   18.464182]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.464444] 
[   18.464481] The buggy address belongs to the physical page:
[   18.464556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.464726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.464831] page_type: f5(slab)
[   18.464971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.465028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.465072] page dumped because: kasan: bad access detected
[   18.465127] 
[   18.465153] Memory state around the buggy address:
[   18.465203]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.465262]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.465317] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.465358]                                                                 ^
[   18.465399]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.465452]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.465493] ==================================================================
[   18.422881] ==================================================================
[   18.423451] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   18.423555] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.423611] 
[   18.423692] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.423889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.423923] Hardware name: linux,dummy-virt (DT)
[   18.423972] Call trace:
[   18.424165]  show_stack+0x20/0x38 (C)
[   18.424255]  dump_stack_lvl+0x8c/0xd0
[   18.424315]  print_report+0x118/0x608
[   18.424487]  kasan_report+0xdc/0x128
[   18.424548]  kasan_check_range+0x100/0x1a8
[   18.424595]  __kasan_check_write+0x20/0x30
[   18.424767]  copy_user_test_oob+0x234/0xec8
[   18.424959]  kunit_try_run_case+0x170/0x3f0
[   18.425070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.425213]  kthread+0x328/0x630
[   18.425397]  ret_from_fork+0x10/0x20
[   18.425457] 
[   18.425478] Allocated by task 288:
[   18.425547]  kasan_save_stack+0x3c/0x68
[   18.425591]  kasan_save_track+0x20/0x40
[   18.425628]  kasan_save_alloc_info+0x40/0x58
[   18.425807]  __kasan_kmalloc+0xd4/0xd8
[   18.425855]  __kmalloc_noprof+0x198/0x4c8
[   18.425929]  kunit_kmalloc_array+0x34/0x88
[   18.425979]  copy_user_test_oob+0xac/0xec8
[   18.426017]  kunit_try_run_case+0x170/0x3f0
[   18.426057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.426101]  kthread+0x328/0x630
[   18.426152]  ret_from_fork+0x10/0x20
[   18.426189] 
[   18.426212] The buggy address belongs to the object at fff00000c77faa00
[   18.426212]  which belongs to the cache kmalloc-128 of size 128
[   18.426272] The buggy address is located 0 bytes inside of
[   18.426272]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.426334] 
[   18.426358] The buggy address belongs to the physical page:
[   18.426403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.426466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.426529] page_type: f5(slab)
[   18.426572] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.426624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.426681] page dumped because: kasan: bad access detected
[   18.426715] 
[   18.426744] Memory state around the buggy address:
[   18.426788]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.426834]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.426887] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.426927]                                                                 ^
[   18.427300]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.427349]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.427391] ==================================================================
[   18.473990] ==================================================================
[   18.474575] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   18.474643] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.474911] 
[   18.475257] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.475516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.475551] Hardware name: linux,dummy-virt (DT)
[   18.475631] Call trace:
[   18.475750]  show_stack+0x20/0x38 (C)
[   18.476122]  dump_stack_lvl+0x8c/0xd0
[   18.476388]  print_report+0x118/0x608
[   18.476583]  kasan_report+0xdc/0x128
[   18.476796]  kasan_check_range+0x100/0x1a8
[   18.476997]  __kasan_check_read+0x20/0x30
[   18.477071]  copy_user_test_oob+0x4a0/0xec8
[   18.477296]  kunit_try_run_case+0x170/0x3f0
[   18.477382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.477835]  kthread+0x328/0x630
[   18.477917]  ret_from_fork+0x10/0x20
[   18.478145] 
[   18.478239] Allocated by task 288:
[   18.478491]  kasan_save_stack+0x3c/0x68
[   18.478544]  kasan_save_track+0x20/0x40
[   18.478582]  kasan_save_alloc_info+0x40/0x58
[   18.478623]  __kasan_kmalloc+0xd4/0xd8
[   18.478853]  __kmalloc_noprof+0x198/0x4c8
[   18.478926]  kunit_kmalloc_array+0x34/0x88
[   18.479027]  copy_user_test_oob+0xac/0xec8
[   18.479142]  kunit_try_run_case+0x170/0x3f0
[   18.479356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.479560]  kthread+0x328/0x630
[   18.479721]  ret_from_fork+0x10/0x20
[   18.479934] 
[   18.479990] The buggy address belongs to the object at fff00000c77faa00
[   18.479990]  which belongs to the cache kmalloc-128 of size 128
[   18.480052] The buggy address is located 0 bytes inside of
[   18.480052]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.480520] 
[   18.480587] The buggy address belongs to the physical page:
[   18.480802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.480994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.481060] page_type: f5(slab)
[   18.481215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.481348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.481435] page dumped because: kasan: bad access detected
[   18.481469] 
[   18.481501] Memory state around the buggy address:
[   18.481546]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.481592]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.481641] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.481688]                                                                 ^
[   18.481740]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.481785]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.481835] ==================================================================
[   18.449813] ==================================================================
[   18.450111] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   18.450241] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.450323] 
[   18.450539] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.450725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.451027] Hardware name: linux,dummy-virt (DT)
[   18.451125] Call trace:
[   18.451224]  show_stack+0x20/0x38 (C)
[   18.451337]  dump_stack_lvl+0x8c/0xd0
[   18.451589]  print_report+0x118/0x608
[   18.451663]  kasan_report+0xdc/0x128
[   18.451766]  kasan_check_range+0x100/0x1a8
[   18.451926]  __kasan_check_write+0x20/0x30
[   18.452155]  copy_user_test_oob+0x35c/0xec8
[   18.452382]  kunit_try_run_case+0x170/0x3f0
[   18.452488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452722]  kthread+0x328/0x630
[   18.452795]  ret_from_fork+0x10/0x20
[   18.453205] 
[   18.453347] Allocated by task 288:
[   18.453406]  kasan_save_stack+0x3c/0x68
[   18.453581]  kasan_save_track+0x20/0x40
[   18.453718]  kasan_save_alloc_info+0x40/0x58
[   18.454015]  __kasan_kmalloc+0xd4/0xd8
[   18.454156]  __kmalloc_noprof+0x198/0x4c8
[   18.454281]  kunit_kmalloc_array+0x34/0x88
[   18.454518]  copy_user_test_oob+0xac/0xec8
[   18.454573]  kunit_try_run_case+0x170/0x3f0
[   18.454613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.454659]  kthread+0x328/0x630
[   18.455025]  ret_from_fork+0x10/0x20
[   18.455124] 
[   18.455315] The buggy address belongs to the object at fff00000c77faa00
[   18.455315]  which belongs to the cache kmalloc-128 of size 128
[   18.455525] The buggy address is located 0 bytes inside of
[   18.455525]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.455672] 
[   18.455732] The buggy address belongs to the physical page:
[   18.455793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.456196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.456310] page_type: f5(slab)
[   18.456655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.456727] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.456852] page dumped because: kasan: bad access detected
[   18.457043] 
[   18.457115] Memory state around the buggy address:
[   18.457171]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.457221]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.457474] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.457630]                                                                 ^
[   18.457883]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.458056]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.458298] ==================================================================
[   18.433457] ==================================================================
[   18.433688] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   18.433878] Read of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.433939] 
[   18.433983] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.434356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.434402] Hardware name: linux,dummy-virt (DT)
[   18.434641] Call trace:
[   18.434800]  show_stack+0x20/0x38 (C)
[   18.434879]  dump_stack_lvl+0x8c/0xd0
[   18.435094]  print_report+0x118/0x608
[   18.435208]  kasan_report+0xdc/0x128
[   18.435287]  kasan_check_range+0x100/0x1a8
[   18.435430]  __kasan_check_read+0x20/0x30
[   18.435542]  copy_user_test_oob+0x728/0xec8
[   18.435765]  kunit_try_run_case+0x170/0x3f0
[   18.436007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.436179]  kthread+0x328/0x630
[   18.436246]  ret_from_fork+0x10/0x20
[   18.436303] 
[   18.436662] Allocated by task 288:
[   18.436723]  kasan_save_stack+0x3c/0x68
[   18.437033]  kasan_save_track+0x20/0x40
[   18.437086]  kasan_save_alloc_info+0x40/0x58
[   18.437193]  __kasan_kmalloc+0xd4/0xd8
[   18.437342]  __kmalloc_noprof+0x198/0x4c8
[   18.437449]  kunit_kmalloc_array+0x34/0x88
[   18.437601]  copy_user_test_oob+0xac/0xec8
[   18.437708]  kunit_try_run_case+0x170/0x3f0
[   18.437751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.437918]  kthread+0x328/0x630
[   18.438014]  ret_from_fork+0x10/0x20
[   18.438101] 
[   18.438125] The buggy address belongs to the object at fff00000c77faa00
[   18.438125]  which belongs to the cache kmalloc-128 of size 128
[   18.438185] The buggy address is located 0 bytes inside of
[   18.438185]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.438418] 
[   18.438533] The buggy address belongs to the physical page:
[   18.438660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.438764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.439036] page_type: f5(slab)
[   18.439086] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.439159] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.439205] page dumped because: kasan: bad access detected
[   18.439337] 
[   18.439546] Memory state around the buggy address:
[   18.439829]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.439909]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440250] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.440340]                                                                 ^
[   18.440418]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440697]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440745] ==================================================================
[   18.466057] ==================================================================
[   18.466131] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   18.466440] Write of size 121 at addr fff00000c77faa00 by task kunit_try_catch/288
[   18.466592] 
[   18.466629] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.466932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.467103] Hardware name: linux,dummy-virt (DT)
[   18.467500] Call trace:
[   18.467640]  show_stack+0x20/0x38 (C)
[   18.467725]  dump_stack_lvl+0x8c/0xd0
[   18.467832]  print_report+0x118/0x608
[   18.468075]  kasan_report+0xdc/0x128
[   18.468327]  kasan_check_range+0x100/0x1a8
[   18.468509]  __kasan_check_write+0x20/0x30
[   18.468686]  copy_user_test_oob+0x434/0xec8
[   18.468900]  kunit_try_run_case+0x170/0x3f0
[   18.468968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.469275]  kthread+0x328/0x630
[   18.469720]  ret_from_fork+0x10/0x20
[   18.469879] 
[   18.470031] Allocated by task 288:
[   18.470129]  kasan_save_stack+0x3c/0x68
[   18.470239]  kasan_save_track+0x20/0x40
[   18.470412]  kasan_save_alloc_info+0x40/0x58
[   18.470461]  __kasan_kmalloc+0xd4/0xd8
[   18.470503]  __kmalloc_noprof+0x198/0x4c8
[   18.470543]  kunit_kmalloc_array+0x34/0x88
[   18.470803]  copy_user_test_oob+0xac/0xec8
[   18.470935]  kunit_try_run_case+0x170/0x3f0
[   18.471226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.471423]  kthread+0x328/0x630
[   18.471578]  ret_from_fork+0x10/0x20
[   18.471739] 
[   18.471798] The buggy address belongs to the object at fff00000c77faa00
[   18.471798]  which belongs to the cache kmalloc-128 of size 128
[   18.472233] The buggy address is located 0 bytes inside of
[   18.472233]  allocated 120-byte region [fff00000c77faa00, fff00000c77faa78)
[   18.472417] 
[   18.472526] The buggy address belongs to the physical page:
[   18.472717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.472774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.472884] page_type: f5(slab)
[   18.473022] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.473075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.473118] page dumped because: kasan: bad access detected
[   18.473173] 
[   18.473200] Memory state around the buggy address:
[   18.473233]  fff00000c77fa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.473288]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473347] >fff00000c77faa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.473388]                                                                 ^
[   18.473431]  fff00000c77faa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473475]  fff00000c77fab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473515] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   18.380630] ==================================================================
[   18.380984] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   18.381074] Read of size 8 at addr fff00000c77fa978 by task kunit_try_catch/284
[   18.381270] 
[   18.381387] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.381519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.381600] Hardware name: linux,dummy-virt (DT)
[   18.381665] Call trace:
[   18.381720]  show_stack+0x20/0x38 (C)
[   18.381781]  dump_stack_lvl+0x8c/0xd0
[   18.381835]  print_report+0x118/0x608
[   18.382095]  kasan_report+0xdc/0x128
[   18.382188]  __asan_report_load8_noabort+0x20/0x30
[   18.382326]  copy_to_kernel_nofault+0x204/0x250
[   18.382400]  copy_to_kernel_nofault_oob+0x158/0x418
[   18.382878]  kunit_try_run_case+0x170/0x3f0
[   18.383040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.383127]  kthread+0x328/0x630
[   18.383497]  ret_from_fork+0x10/0x20
[   18.383658] 
[   18.383757] Allocated by task 284:
[   18.383793]  kasan_save_stack+0x3c/0x68
[   18.383981]  kasan_save_track+0x20/0x40
[   18.384120]  kasan_save_alloc_info+0x40/0x58
[   18.384336]  __kasan_kmalloc+0xd4/0xd8
[   18.384492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.384537]  copy_to_kernel_nofault_oob+0xc8/0x418
[   18.384578]  kunit_try_run_case+0x170/0x3f0
[   18.384671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.384721]  kthread+0x328/0x630
[   18.384757]  ret_from_fork+0x10/0x20
[   18.384796] 
[   18.384838] The buggy address belongs to the object at fff00000c77fa900
[   18.384838]  which belongs to the cache kmalloc-128 of size 128
[   18.384899] The buggy address is located 0 bytes to the right of
[   18.384899]  allocated 120-byte region [fff00000c77fa900, fff00000c77fa978)
[   18.384981] 
[   18.385015] The buggy address belongs to the physical page:
[   18.385051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.385108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.385159] page_type: f5(slab)
[   18.385207] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.385275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.385316] page dumped because: kasan: bad access detected
[   18.385360] 
[   18.385389] Memory state around the buggy address:
[   18.385432]  fff00000c77fa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.385487]  fff00000c77fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.385532] >fff00000c77fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.385590]                                                                 ^
[   18.385633]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.385692]  fff00000c77faa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.385737] ==================================================================
[   18.386319] ==================================================================
[   18.386741] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   18.386847] Write of size 8 at addr fff00000c77fa978 by task kunit_try_catch/284
[   18.387021] 
[   18.387070] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.387418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.387474] Hardware name: linux,dummy-virt (DT)
[   18.387587] Call trace:
[   18.387691]  show_stack+0x20/0x38 (C)
[   18.387863]  dump_stack_lvl+0x8c/0xd0
[   18.387922]  print_report+0x118/0x608
[   18.387978]  kasan_report+0xdc/0x128
[   18.388024]  kasan_check_range+0x100/0x1a8
[   18.388071]  __kasan_check_write+0x20/0x30
[   18.388300]  copy_to_kernel_nofault+0x8c/0x250
[   18.388519]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   18.388713]  kunit_try_run_case+0x170/0x3f0
[   18.388923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.389095]  kthread+0x328/0x630
[   18.389321]  ret_from_fork+0x10/0x20
[   18.389513] 
[   18.389697] Allocated by task 284:
[   18.389757]  kasan_save_stack+0x3c/0x68
[   18.390134]  kasan_save_track+0x20/0x40
[   18.390376]  kasan_save_alloc_info+0x40/0x58
[   18.390620]  __kasan_kmalloc+0xd4/0xd8
[   18.390788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.390991]  copy_to_kernel_nofault_oob+0xc8/0x418
[   18.391111]  kunit_try_run_case+0x170/0x3f0
[   18.391311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.391587]  kthread+0x328/0x630
[   18.391767]  ret_from_fork+0x10/0x20
[   18.391896] 
[   18.391992] The buggy address belongs to the object at fff00000c77fa900
[   18.391992]  which belongs to the cache kmalloc-128 of size 128
[   18.392162] The buggy address is located 0 bytes to the right of
[   18.392162]  allocated 120-byte region [fff00000c77fa900, fff00000c77fa978)
[   18.392231] 
[   18.392421] The buggy address belongs to the physical page:
[   18.392657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   18.392874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.393037] page_type: f5(slab)
[   18.393136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.393250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.393364] page dumped because: kasan: bad access detected
[   18.393482] 
[   18.393535] Memory state around the buggy address:
[   18.393570]  fff00000c77fa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.393863]  fff00000c77fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.394129] >fff00000c77fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.394389]                                                                 ^
[   18.394584]  fff00000c77fa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.394670]  fff00000c77faa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.394710] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   18.325499] ==================================================================
[   18.325579] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   18.325922] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/272
[   18.326008] 
[   18.326055] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.326141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.326494] Hardware name: linux,dummy-virt (DT)
[   18.326990] Call trace:
[   18.327045]  show_stack+0x20/0x38 (C)
[   18.327159]  dump_stack_lvl+0x8c/0xd0
[   18.327233]  print_report+0x310/0x608
[   18.327345]  kasan_report+0xdc/0x128
[   18.327412]  __asan_report_load1_noabort+0x20/0x30
[   18.327487]  vmalloc_oob+0x578/0x5d0
[   18.327535]  kunit_try_run_case+0x170/0x3f0
[   18.327588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.327644]  kthread+0x328/0x630
[   18.327932]  ret_from_fork+0x10/0x20
[   18.328283] 
[   18.328379] The buggy address belongs to the virtual mapping at
[   18.328379]  [ffff80008010b000, ffff80008010d000) created by:
[   18.328379]  vmalloc_oob+0x98/0x5d0
[   18.328538] 
[   18.328943] The buggy address belongs to the physical page:
[   18.329024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106613
[   18.329135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.329217] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.329424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.329678] page dumped because: kasan: bad access detected
[   18.329745] 
[   18.329824] Memory state around the buggy address:
[   18.329863]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.330162]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.330327] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   18.330395]                                                              ^
[   18.330670]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.330761]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.330915] ==================================================================
[   18.331978] ==================================================================
[   18.332033] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   18.332105] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/272
[   18.332372] 
[   18.332667] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.332764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.332875] Hardware name: linux,dummy-virt (DT)
[   18.332919] Call trace:
[   18.332944]  show_stack+0x20/0x38 (C)
[   18.333230]  dump_stack_lvl+0x8c/0xd0
[   18.333337]  print_report+0x310/0x608
[   18.333387]  kasan_report+0xdc/0x128
[   18.333434]  __asan_report_load1_noabort+0x20/0x30
[   18.333486]  vmalloc_oob+0x51c/0x5d0
[   18.333533]  kunit_try_run_case+0x170/0x3f0
[   18.333582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.333730]  kthread+0x328/0x630
[   18.334079]  ret_from_fork+0x10/0x20
[   18.334174] 
[   18.334243] The buggy address belongs to the virtual mapping at
[   18.334243]  [ffff80008010b000, ffff80008010d000) created by:
[   18.334243]  vmalloc_oob+0x98/0x5d0
[   18.334362] 
[   18.334459] The buggy address belongs to the physical page:
[   18.334528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106613
[   18.334602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.334700] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.334752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.334800] page dumped because: kasan: bad access detected
[   18.335084] 
[   18.335172] Memory state around the buggy address:
[   18.335271]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.335588]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.335680] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   18.335753]                                                                 ^
[   18.335838]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.335964]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.336041] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   18.231733] ==================================================================
[   18.231811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.231872] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.231931] 
[   18.231976] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.232058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.232092] Hardware name: linux,dummy-virt (DT)
[   18.232125] Call trace:
[   18.232154]  show_stack+0x20/0x38 (C)
[   18.232421]  dump_stack_lvl+0x8c/0xd0
[   18.232525]  print_report+0x118/0x608
[   18.232580]  kasan_report+0xdc/0x128
[   18.232634]  kasan_check_range+0x100/0x1a8
[   18.232687]  __kasan_check_write+0x20/0x30
[   18.232801]  kasan_atomics_helper+0x147c/0x4858
[   18.232861]  kasan_atomics+0x198/0x2e0
[   18.232916]  kunit_try_run_case+0x170/0x3f0
[   18.232979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.233041]  kthread+0x328/0x630
[   18.233095]  ret_from_fork+0x10/0x20
[   18.233149] 
[   18.233180] Allocated by task 268:
[   18.233221]  kasan_save_stack+0x3c/0x68
[   18.233263]  kasan_save_track+0x20/0x40
[   18.233300]  kasan_save_alloc_info+0x40/0x58
[   18.233341]  __kasan_kmalloc+0xd4/0xd8
[   18.233492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.233561]  kasan_atomics+0xb8/0x2e0
[   18.233697]  kunit_try_run_case+0x170/0x3f0
[   18.233763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.233827]  kthread+0x328/0x630
[   18.233872]  ret_from_fork+0x10/0x20
[   18.233917] 
[   18.233967] The buggy address belongs to the object at fff00000c77e9a80
[   18.233967]  which belongs to the cache kmalloc-64 of size 64
[   18.234083] The buggy address is located 0 bytes to the right of
[   18.234083]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.234221] 
[   18.234278] The buggy address belongs to the physical page:
[   18.234321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.234385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.234454] page_type: f5(slab)
[   18.234501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.234556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.234599] page dumped because: kasan: bad access detected
[   18.234632] 
[   18.235059] Memory state around the buggy address:
[   18.235170]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235419]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235555] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.235781]                                      ^
[   18.235835]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236191]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236334] ==================================================================
[   18.109560] ==================================================================
[   18.109720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.109774] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.109825] 
[   18.109893] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.109992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.110020] Hardware name: linux,dummy-virt (DT)
[   18.110063] Call trace:
[   18.110093]  show_stack+0x20/0x38 (C)
[   18.110404]  dump_stack_lvl+0x8c/0xd0
[   18.110467]  print_report+0x118/0x608
[   18.110748]  kasan_report+0xdc/0x128
[   18.111025]  kasan_check_range+0x100/0x1a8
[   18.111219]  __kasan_check_read+0x20/0x30
[   18.111307]  kasan_atomics_helper+0xdd4/0x4858
[   18.111356]  kasan_atomics+0x198/0x2e0
[   18.111654]  kunit_try_run_case+0x170/0x3f0
[   18.111786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.112167]  kthread+0x328/0x630
[   18.112264]  ret_from_fork+0x10/0x20
[   18.112340] 
[   18.112407] Allocated by task 268:
[   18.112487]  kasan_save_stack+0x3c/0x68
[   18.112554]  kasan_save_track+0x20/0x40
[   18.112751]  kasan_save_alloc_info+0x40/0x58
[   18.112936]  __kasan_kmalloc+0xd4/0xd8
[   18.113008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.113650]  kasan_atomics+0xb8/0x2e0
[   18.113889]  kunit_try_run_case+0x170/0x3f0
[   18.113974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.114043]  kthread+0x328/0x630
[   18.114092]  ret_from_fork+0x10/0x20
[   18.114440] 
[   18.114674] The buggy address belongs to the object at fff00000c77e9a80
[   18.114674]  which belongs to the cache kmalloc-64 of size 64
[   18.115112] The buggy address is located 0 bytes to the right of
[   18.115112]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.115228] 
[   18.115266] The buggy address belongs to the physical page:
[   18.115301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.115357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.115406] page_type: f5(slab)
[   18.115445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.115498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.115540] page dumped because: kasan: bad access detected
[   18.115574] 
[   18.115931] Memory state around the buggy address:
[   18.116003]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.116284]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.116366] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.116407]                                      ^
[   18.116444]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116489]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116530] ==================================================================
[   18.021372] ==================================================================
[   18.021800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.021925] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.022082] 
[   18.022117] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.022217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.022278] Hardware name: linux,dummy-virt (DT)
[   18.022404] Call trace:
[   18.022433]  show_stack+0x20/0x38 (C)
[   18.022508]  dump_stack_lvl+0x8c/0xd0
[   18.022558]  print_report+0x118/0x608
[   18.022604]  kasan_report+0xdc/0x128
[   18.022649]  kasan_check_range+0x100/0x1a8
[   18.022888]  __kasan_check_write+0x20/0x30
[   18.023062]  kasan_atomics_helper+0x99c/0x4858
[   18.023174]  kasan_atomics+0x198/0x2e0
[   18.023337]  kunit_try_run_case+0x170/0x3f0
[   18.023578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.023660]  kthread+0x328/0x630
[   18.023819]  ret_from_fork+0x10/0x20
[   18.023876] 
[   18.023913] Allocated by task 268:
[   18.024084]  kasan_save_stack+0x3c/0x68
[   18.024303]  kasan_save_track+0x20/0x40
[   18.024349]  kasan_save_alloc_info+0x40/0x58
[   18.024440]  __kasan_kmalloc+0xd4/0xd8
[   18.024541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.024726]  kasan_atomics+0xb8/0x2e0
[   18.024854]  kunit_try_run_case+0x170/0x3f0
[   18.025113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.025273]  kthread+0x328/0x630
[   18.025360]  ret_from_fork+0x10/0x20
[   18.025575] 
[   18.025622] The buggy address belongs to the object at fff00000c77e9a80
[   18.025622]  which belongs to the cache kmalloc-64 of size 64
[   18.025827] The buggy address is located 0 bytes to the right of
[   18.025827]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.025995] 
[   18.026085] The buggy address belongs to the physical page:
[   18.026406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.026763] page dumped because: kasan: bad access detected
[   18.027585]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.028427] Hardware name: linux,dummy-virt (DT)
[   18.029024]  ret_from_fork+0x10/0x20
[   18.029071] 
[   18.029091] Allocated by task 268:
[   18.029121]  kasan_save_stack+0x3c/0x68
[   18.029161]  kasan_save_track+0x20/0x40
[   18.029199]  kasan_save_alloc_info+0x40/0x58
[   18.029240]  __kasan_kmalloc+0xd4/0xd8
[   18.029277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.029341]  kasan_atomics+0xb8/0x2e0
[   18.029380]  kunit_try_run_case+0x170/0x3f0
[   18.029420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.029673]  kthread+0x328/0x630
[   18.030328]  ret_from_fork+0x10/0x20
[   18.030380] 
[   18.030402] The buggy address belongs to the object at fff00000c77e9a80
[   18.030402]  which belongs to the cache kmalloc-64 of size 64
[   18.030467] The buggy address is located 0 bytes to the right of
[   18.030467]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.030532] 
[   18.030553] The buggy address belongs to the physical page:
[   18.030585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.030638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.030685] page_type: f5(slab)
[   18.030722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.030774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.030816] page dumped because: kasan: bad access detected
[   18.030849] 
[   18.030869] Memory state around the buggy address:
[   18.030902]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.030958]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.031003] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.031042]                                      ^
[   18.031074]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.031116]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.031156] ==================================================================
[   18.172601] ==================================================================
[   18.172654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.172796] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.172882] 
[   18.173060] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.173148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.173177] Hardware name: linux,dummy-virt (DT)
[   18.173458] Call trace:
[   18.173494]  show_stack+0x20/0x38 (C)
[   18.174032]  dump_stack_lvl+0x8c/0xd0
[   18.174124]  print_report+0x118/0x608
[   18.174279]  kasan_report+0xdc/0x128
[   18.174344]  kasan_check_range+0x100/0x1a8
[   18.174807]  __kasan_check_write+0x20/0x30
[   18.175073]  kasan_atomics_helper+0x1058/0x4858
[   18.175244]  kasan_atomics+0x198/0x2e0
[   18.175384]  kunit_try_run_case+0x170/0x3f0
[   18.175503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.175587]  kthread+0x328/0x630
[   18.175694]  ret_from_fork+0x10/0x20
[   18.175745] 
[   18.175795] Allocated by task 268:
[   18.175853]  kasan_save_stack+0x3c/0x68
[   18.176208]  kasan_save_track+0x20/0x40
[   18.176565]  kasan_save_alloc_info+0x40/0x58
[   18.176656]  __kasan_kmalloc+0xd4/0xd8
[   18.176748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.176824]  kasan_atomics+0xb8/0x2e0
[   18.176900]  kunit_try_run_case+0x170/0x3f0
[   18.177045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.177098]  kthread+0x328/0x630
[   18.177165]  ret_from_fork+0x10/0x20
[   18.177505] 
[   18.177605] The buggy address belongs to the object at fff00000c77e9a80
[   18.177605]  which belongs to the cache kmalloc-64 of size 64
[   18.178025] The buggy address is located 0 bytes to the right of
[   18.178025]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.178105] 
[   18.178359] The buggy address belongs to the physical page:
[   18.178525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.179063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.179157] page_type: f5(slab)
[   18.179216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.179276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.179429] page dumped because: kasan: bad access detected
[   18.179673] 
[   18.179713] Memory state around the buggy address:
[   18.179978]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.180126]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.180331] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.180689]                                      ^
[   18.180811]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.181102]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.181355] ==================================================================
[   18.102499] ==================================================================
[   18.102553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.102794] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.103064] 
[   18.103116] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.103423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.103481] Hardware name: linux,dummy-virt (DT)
[   18.103517] Call trace:
[   18.103568]  show_stack+0x20/0x38 (C)
[   18.103621]  dump_stack_lvl+0x8c/0xd0
[   18.103752]  print_report+0x118/0x608
[   18.103810]  kasan_report+0xdc/0x128
[   18.103855]  __asan_report_load4_noabort+0x20/0x30
[   18.104071]  kasan_atomics_helper+0x3e04/0x4858
[   18.104232]  kasan_atomics+0x198/0x2e0
[   18.104290]  kunit_try_run_case+0x170/0x3f0
[   18.104586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.104675]  kthread+0x328/0x630
[   18.104766]  ret_from_fork+0x10/0x20
[   18.104820] 
[   18.104858] Allocated by task 268:
[   18.104892]  kasan_save_stack+0x3c/0x68
[   18.104993]  kasan_save_track+0x20/0x40
[   18.105045]  kasan_save_alloc_info+0x40/0x58
[   18.105084]  __kasan_kmalloc+0xd4/0xd8
[   18.105268]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.105326]  kasan_atomics+0xb8/0x2e0
[   18.105467]  kunit_try_run_case+0x170/0x3f0
[   18.105521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.105762]  kthread+0x328/0x630
[   18.105823]  ret_from_fork+0x10/0x20
[   18.106155] 
[   18.106299] The buggy address belongs to the object at fff00000c77e9a80
[   18.106299]  which belongs to the cache kmalloc-64 of size 64
[   18.106416] The buggy address is located 0 bytes to the right of
[   18.106416]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.106536] 
[   18.106585] The buggy address belongs to the physical page:
[   18.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.106960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.107017] page_type: f5(slab)
[   18.107080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.107384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.107540] page dumped because: kasan: bad access detected
[   18.107586] 
[   18.107615] Memory state around the buggy address:
[   18.107665]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.108094]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.108173] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.108456]                                      ^
[   18.108558]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.108662]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.108723] ==================================================================
[   18.125279] ==================================================================
[   18.125340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.125455] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.125529] 
[   18.125572] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.125780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.125988] Hardware name: linux,dummy-virt (DT)
[   18.126109] Call trace:
[   18.126368]  show_stack+0x20/0x38 (C)
[   18.126523]  dump_stack_lvl+0x8c/0xd0
[   18.126578]  print_report+0x118/0x608
[   18.126624]  kasan_report+0xdc/0x128
[   18.126669]  kasan_check_range+0x100/0x1a8
[   18.126750]  __kasan_check_write+0x20/0x30
[   18.127068]  kasan_atomics_helper+0xe44/0x4858
[   18.127373]  kasan_atomics+0x198/0x2e0
[   18.127573]  kunit_try_run_case+0x170/0x3f0
[   18.127686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.127858]  kthread+0x328/0x630
[   18.127971]  ret_from_fork+0x10/0x20
[   18.128071] 
[   18.128386] Allocated by task 268:
[   18.128431]  kasan_save_stack+0x3c/0x68
[   18.128613]  kasan_save_track+0x20/0x40
[   18.128691]  kasan_save_alloc_info+0x40/0x58
[   18.129027]  __kasan_kmalloc+0xd4/0xd8
[   18.129114]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.129282]  kasan_atomics+0xb8/0x2e0
[   18.129353]  kunit_try_run_case+0x170/0x3f0
[   18.129471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.129533]  kthread+0x328/0x630
[   18.129588]  ret_from_fork+0x10/0x20
[   18.129773] 
[   18.129807] The buggy address belongs to the object at fff00000c77e9a80
[   18.129807]  which belongs to the cache kmalloc-64 of size 64
[   18.129869] The buggy address is located 0 bytes to the right of
[   18.129869]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.129943] 
[   18.129977] The buggy address belongs to the physical page:
[   18.130010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.130078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.130174] page_type: f5(slab)
[   18.130487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.130559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.130603] page dumped because: kasan: bad access detected
[   18.131019] 
[   18.131113] Memory state around the buggy address:
[   18.131553]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.131668]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.131831] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.131899]                                      ^
[   18.131934]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132187]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132359] ==================================================================
[   18.133032] ==================================================================
[   18.133295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.133538] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.133740] 
[   18.133795] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.133894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.133924] Hardware name: linux,dummy-virt (DT)
[   18.133967] Call trace:
[   18.133991]  show_stack+0x20/0x38 (C)
[   18.134041]  dump_stack_lvl+0x8c/0xd0
[   18.134090]  print_report+0x118/0x608
[   18.134135]  kasan_report+0xdc/0x128
[   18.134189]  __asan_report_store8_noabort+0x20/0x30
[   18.134240]  kasan_atomics_helper+0x3e5c/0x4858
[   18.134287]  kasan_atomics+0x198/0x2e0
[   18.134332]  kunit_try_run_case+0x170/0x3f0
[   18.134380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.134441]  kthread+0x328/0x630
[   18.134487]  ret_from_fork+0x10/0x20
[   18.134533] 
[   18.134553] Allocated by task 268:
[   18.134584]  kasan_save_stack+0x3c/0x68
[   18.134622]  kasan_save_track+0x20/0x40
[   18.134660]  kasan_save_alloc_info+0x40/0x58
[   18.134699]  __kasan_kmalloc+0xd4/0xd8
[   18.134736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.134775]  kasan_atomics+0xb8/0x2e0
[   18.135131]  kunit_try_run_case+0x170/0x3f0
[   18.135218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.135276]  kthread+0x328/0x630
[   18.135315]  ret_from_fork+0x10/0x20
[   18.135668] 
[   18.135728] The buggy address belongs to the object at fff00000c77e9a80
[   18.135728]  which belongs to the cache kmalloc-64 of size 64
[   18.135812] The buggy address is located 0 bytes to the right of
[   18.135812]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.136137] 
[   18.136291] The buggy address belongs to the physical page:
[   18.136327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.136668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.137007] page_type: f5(slab)
[   18.137088] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.137186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.137264] page dumped because: kasan: bad access detected
[   18.137322] 
[   18.137421] Memory state around the buggy address:
[   18.137458]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.137696]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.137846] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.137914]                                      ^
[   18.138096]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.138303]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.138372] ==================================================================
[   18.204525] ==================================================================
[   18.204579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.204631] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.204684] 
[   18.204720] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.204913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.204985] Hardware name: linux,dummy-virt (DT)
[   18.205019] Call trace:
[   18.205271]  show_stack+0x20/0x38 (C)
[   18.205397]  dump_stack_lvl+0x8c/0xd0
[   18.205450]  print_report+0x118/0x608
[   18.205878]  kasan_report+0xdc/0x128
[   18.205940]  kasan_check_range+0x100/0x1a8
[   18.206140]  __kasan_check_write+0x20/0x30
[   18.206385]  kasan_atomics_helper+0x11f8/0x4858
[   18.206538]  kasan_atomics+0x198/0x2e0
[   18.206613]  kunit_try_run_case+0x170/0x3f0
[   18.206693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.206763]  kthread+0x328/0x630
[   18.206808]  ret_from_fork+0x10/0x20
[   18.207180] 
[   18.207263] Allocated by task 268:
[   18.207321]  kasan_save_stack+0x3c/0x68
[   18.207388]  kasan_save_track+0x20/0x40
[   18.207668]  kasan_save_alloc_info+0x40/0x58
[   18.207844]  __kasan_kmalloc+0xd4/0xd8
[   18.207942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.208027]  kasan_atomics+0xb8/0x2e0
[   18.208148]  kunit_try_run_case+0x170/0x3f0
[   18.208262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.208315]  kthread+0x328/0x630
[   18.208471]  ret_from_fork+0x10/0x20
[   18.209056] 
[   18.209405] The buggy address belongs to the object at fff00000c77e9a80
[   18.209405]  which belongs to the cache kmalloc-64 of size 64
[   18.209501] The buggy address is located 0 bytes to the right of
[   18.209501]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.209621] 
[   18.209666] The buggy address belongs to the physical page:
[   18.209730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.209788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.210277] page_type: f5(slab)
[   18.210341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.210393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.210443] page dumped because: kasan: bad access detected
[   18.210478] 
[   18.210500] Memory state around the buggy address:
[   18.210534]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.210580]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.210625] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.210665]                                      ^
[   18.210701]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.210745]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.210784] ==================================================================
[   18.214318] ==================================================================
[   18.214514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.214570] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.214620] 
[   18.214651] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.214734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.214763] Hardware name: linux,dummy-virt (DT)
[   18.214795] Call trace:
[   18.214827]  show_stack+0x20/0x38 (C)
[   18.214873]  dump_stack_lvl+0x8c/0xd0
[   18.214923]  print_report+0x118/0x608
[   18.215010]  kasan_report+0xdc/0x128
[   18.215055]  kasan_check_range+0x100/0x1a8
[   18.215103]  __kasan_check_write+0x20/0x30
[   18.215150]  kasan_atomics_helper+0x12d8/0x4858
[   18.215244]  kasan_atomics+0x198/0x2e0
[   18.215288]  kunit_try_run_case+0x170/0x3f0
[   18.215352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.215408]  kthread+0x328/0x630
[   18.215452]  ret_from_fork+0x10/0x20
[   18.215607] 
[   18.215631] Allocated by task 268:
[   18.215664]  kasan_save_stack+0x3c/0x68
[   18.215705]  kasan_save_track+0x20/0x40
[   18.215847]  kasan_save_alloc_info+0x40/0x58
[   18.215906]  __kasan_kmalloc+0xd4/0xd8
[   18.215989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.216035]  kasan_atomics+0xb8/0x2e0
[   18.216081]  kunit_try_run_case+0x170/0x3f0
[   18.216126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.216193]  kthread+0x328/0x630
[   18.216237]  ret_from_fork+0x10/0x20
[   18.216284] 
[   18.216323] The buggy address belongs to the object at fff00000c77e9a80
[   18.216323]  which belongs to the cache kmalloc-64 of size 64
[   18.216558] The buggy address is located 0 bytes to the right of
[   18.216558]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.216644] 
[   18.216682] The buggy address belongs to the physical page:
[   18.216716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.216779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.216979] page_type: f5(slab)
[   18.217049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.217107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.217232] page dumped because: kasan: bad access detected
[   18.217289] 
[   18.217318] Memory state around the buggy address:
[   18.217353]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.217406]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.217465] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.217505]                                      ^
[   18.217540]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.217583]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.217814] ==================================================================
[   18.245845] ==================================================================
[   18.245907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.245990] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.246146] 
[   18.246295] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.246404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.246479] Hardware name: linux,dummy-virt (DT)
[   18.246569] Call trace:
[   18.246654]  show_stack+0x20/0x38 (C)
[   18.246723]  dump_stack_lvl+0x8c/0xd0
[   18.246827]  print_report+0x118/0x608
[   18.246913]  kasan_report+0xdc/0x128
[   18.246992]  kasan_check_range+0x100/0x1a8
[   18.247048]  __kasan_check_write+0x20/0x30
[   18.247097]  kasan_atomics_helper+0x15b4/0x4858
[   18.247177]  kasan_atomics+0x198/0x2e0
[   18.247311]  kunit_try_run_case+0x170/0x3f0
[   18.247361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.247417]  kthread+0x328/0x630
[   18.247461]  ret_from_fork+0x10/0x20
[   18.247508] 
[   18.247530] Allocated by task 268:
[   18.247793]  kasan_save_stack+0x3c/0x68
[   18.247896]  kasan_save_track+0x20/0x40
[   18.247972]  kasan_save_alloc_info+0x40/0x58
[   18.248081]  __kasan_kmalloc+0xd4/0xd8
[   18.248161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.248453]  kasan_atomics+0xb8/0x2e0
[   18.248525]  kunit_try_run_case+0x170/0x3f0
[   18.248578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.248625]  kthread+0x328/0x630
[   18.248662]  ret_from_fork+0x10/0x20
[   18.248700] 
[   18.248723] The buggy address belongs to the object at fff00000c77e9a80
[   18.248723]  which belongs to the cache kmalloc-64 of size 64
[   18.248783] The buggy address is located 0 bytes to the right of
[   18.248783]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.248848] 
[   18.248869] The buggy address belongs to the physical page:
[   18.248912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.248988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.249036] page_type: f5(slab)
[   18.249075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.249126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.249175] page dumped because: kasan: bad access detected
[   18.249219] 
[   18.249241] Memory state around the buggy address:
[   18.249274]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.249319]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.249362] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.249418]                                      ^
[   18.249454]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.249514]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.249571] ==================================================================
[   18.167287] ==================================================================
[   18.167349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.167549] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.167615] 
[   18.167789] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.167886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.168000] Hardware name: linux,dummy-virt (DT)
[   18.168038] Call trace:
[   18.168064]  show_stack+0x20/0x38 (C)
[   18.168137]  dump_stack_lvl+0x8c/0xd0
[   18.168444]  print_report+0x118/0x608
[   18.168502]  kasan_report+0xdc/0x128
[   18.168564]  kasan_check_range+0x100/0x1a8
[   18.168614]  __kasan_check_write+0x20/0x30
[   18.168660]  kasan_atomics_helper+0xff0/0x4858
[   18.168750]  kasan_atomics+0x198/0x2e0
[   18.168816]  kunit_try_run_case+0x170/0x3f0
[   18.168864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.168919]  kthread+0x328/0x630
[   18.168977]  ret_from_fork+0x10/0x20
[   18.169023] 
[   18.169055] Allocated by task 268:
[   18.169094]  kasan_save_stack+0x3c/0x68
[   18.169143]  kasan_save_track+0x20/0x40
[   18.169191]  kasan_save_alloc_info+0x40/0x58
[   18.169231]  __kasan_kmalloc+0xd4/0xd8
[   18.169269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.169315]  kasan_atomics+0xb8/0x2e0
[   18.169355]  kunit_try_run_case+0x170/0x3f0
[   18.169395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.169440]  kthread+0x328/0x630
[   18.169478]  ret_from_fork+0x10/0x20
[   18.169516] 
[   18.169537] The buggy address belongs to the object at fff00000c77e9a80
[   18.169537]  which belongs to the cache kmalloc-64 of size 64
[   18.169598] The buggy address is located 0 bytes to the right of
[   18.169598]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.169669] 
[   18.169700] The buggy address belongs to the physical page:
[   18.169732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.169795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.169852] page_type: f5(slab)
[   18.169899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.170684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.170751] page dumped because: kasan: bad access detected
[   18.170804] 
[   18.170847] Memory state around the buggy address:
[   18.170922]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.170981]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.171025] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.171067]                                      ^
[   18.171286]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.171560]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.171643] ==================================================================
[   18.278873] ==================================================================
[   18.278926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.278986] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.279050] 
[   18.279082] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.279184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.279249] Hardware name: linux,dummy-virt (DT)
[   18.279465] Call trace:
[   18.279638]  show_stack+0x20/0x38 (C)
[   18.280077]  dump_stack_lvl+0x8c/0xd0
[   18.280668]  print_report+0x118/0x608
[   18.280782]  kasan_report+0xdc/0x128
[   18.281228]  __asan_report_load8_noabort+0x20/0x30
[   18.281285]  kasan_atomics_helper+0x3e10/0x4858
[   18.281749]  kasan_atomics+0x198/0x2e0
[   18.282074]  kunit_try_run_case+0x170/0x3f0
[   18.282311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.282479]  kthread+0x328/0x630
[   18.282556]  ret_from_fork+0x10/0x20
[   18.282776] 
[   18.282986] Allocated by task 268:
[   18.283048]  kasan_save_stack+0x3c/0x68
[   18.283199]  kasan_save_track+0x20/0x40
[   18.283295]  kasan_save_alloc_info+0x40/0x58
[   18.283598]  __kasan_kmalloc+0xd4/0xd8
[   18.283693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.283760]  kasan_atomics+0xb8/0x2e0
[   18.283895]  kunit_try_run_case+0x170/0x3f0
[   18.284037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.284121]  kthread+0x328/0x630
[   18.284160]  ret_from_fork+0x10/0x20
[   18.284235] 
[   18.284558] The buggy address belongs to the object at fff00000c77e9a80
[   18.284558]  which belongs to the cache kmalloc-64 of size 64
[   18.284665] The buggy address is located 0 bytes to the right of
[   18.284665]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.284996] 
[   18.285099] The buggy address belongs to the physical page:
[   18.285159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.285256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.285390] page_type: f5(slab)
[   18.285468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.285548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.285672] page dumped because: kasan: bad access detected
[   18.285732] 
[   18.285770] Memory state around the buggy address:
[   18.286106]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.286219]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.286323] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.286394]                                      ^
[   18.286456]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286922]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286978] ==================================================================
[   18.288266] ==================================================================
[   18.288320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.288373] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.288425] 
[   18.288505] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.288618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.288909] Hardware name: linux,dummy-virt (DT)
[   18.289191] Call trace:
[   18.289300]  show_stack+0x20/0x38 (C)
[   18.289360]  dump_stack_lvl+0x8c/0xd0
[   18.289487]  print_report+0x118/0x608
[   18.289565]  kasan_report+0xdc/0x128
[   18.289631]  kasan_check_range+0x100/0x1a8
[   18.289698]  __kasan_check_write+0x20/0x30
[   18.289832]  kasan_atomics_helper+0x175c/0x4858
[   18.289885]  kasan_atomics+0x198/0x2e0
[   18.289929]  kunit_try_run_case+0x170/0x3f0
[   18.290016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.290080]  kthread+0x328/0x630
[   18.290125]  ret_from_fork+0x10/0x20
[   18.290748] 
[   18.290797] Allocated by task 268:
[   18.290855]  kasan_save_stack+0x3c/0x68
[   18.290992]  kasan_save_track+0x20/0x40
[   18.291060]  kasan_save_alloc_info+0x40/0x58
[   18.291146]  __kasan_kmalloc+0xd4/0xd8
[   18.291280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.291322]  kasan_atomics+0xb8/0x2e0
[   18.291359]  kunit_try_run_case+0x170/0x3f0
[   18.291399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.291666]  kthread+0x328/0x630
[   18.291830]  ret_from_fork+0x10/0x20
[   18.291895] 
[   18.291934] The buggy address belongs to the object at fff00000c77e9a80
[   18.291934]  which belongs to the cache kmalloc-64 of size 64
[   18.292463] The buggy address is located 0 bytes to the right of
[   18.292463]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.292549] 
[   18.292583] The buggy address belongs to the physical page:
[   18.292634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.292689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.292739] page_type: f5(slab)
[   18.292896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.292977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.293020] page dumped because: kasan: bad access detected
[   18.293055] 
[   18.293104] Memory state around the buggy address:
[   18.293138]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293183]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293227] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.293268]                                      ^
[   18.293329]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.293398]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.293445] ==================================================================
[   18.227859] ==================================================================
[   18.228240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.228346] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.228399] 
[   18.228437] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.228552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.228589] Hardware name: linux,dummy-virt (DT)
[   18.228638] Call trace:
[   18.228663]  show_stack+0x20/0x38 (C)
[   18.228716]  dump_stack_lvl+0x8c/0xd0
[   18.228881]  print_report+0x118/0x608
[   18.228940]  kasan_report+0xdc/0x128
[   18.228998]  kasan_check_range+0x100/0x1a8
[   18.229046]  __kasan_check_write+0x20/0x30
[   18.229169]  kasan_atomics_helper+0x1414/0x4858
[   18.229245]  kasan_atomics+0x198/0x2e0
[   18.229289]  kunit_try_run_case+0x170/0x3f0
[   18.229352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.229415]  kthread+0x328/0x630
[   18.229467]  ret_from_fork+0x10/0x20
[   18.229516] 
[   18.229562] Allocated by task 268:
[   18.229594]  kasan_save_stack+0x3c/0x68
[   18.229639]  kasan_save_track+0x20/0x40
[   18.229678]  kasan_save_alloc_info+0x40/0x58
[   18.229717]  __kasan_kmalloc+0xd4/0xd8
[   18.229762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.229800]  kasan_atomics+0xb8/0x2e0
[   18.229836]  kunit_try_run_case+0x170/0x3f0
[   18.229875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.229923]  kthread+0x328/0x630
[   18.229972]  ret_from_fork+0x10/0x20
[   18.230009] 
[   18.230031] The buggy address belongs to the object at fff00000c77e9a80
[   18.230031]  which belongs to the cache kmalloc-64 of size 64
[   18.230089] The buggy address is located 0 bytes to the right of
[   18.230089]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.230354] 
[   18.230392] The buggy address belongs to the physical page:
[   18.230478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.230552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.230611] page_type: f5(slab)
[   18.230650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.230793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.230883] page dumped because: kasan: bad access detected
[   18.230979] 
[   18.231030] Memory state around the buggy address:
[   18.231100]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.231181]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.231257] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.231299]                                      ^
[   18.231335]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.231377]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.231440] ==================================================================
[   18.273595] ==================================================================
[   18.273668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.273723] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.273775] 
[   18.274075] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.274263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.274334] Hardware name: linux,dummy-virt (DT)
[   18.274406] Call trace:
[   18.274476]  show_stack+0x20/0x38 (C)
[   18.274583]  dump_stack_lvl+0x8c/0xd0
[   18.274630]  print_report+0x118/0x608
[   18.274678]  kasan_report+0xdc/0x128
[   18.274864]  kasan_check_range+0x100/0x1a8
[   18.275357]  __kasan_check_write+0x20/0x30
[   18.275591]  kasan_atomics_helper+0x16d0/0x4858
[   18.275726]  kasan_atomics+0x198/0x2e0
[   18.275794]  kunit_try_run_case+0x170/0x3f0
[   18.275935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276007]  kthread+0x328/0x630
[   18.276218]  ret_from_fork+0x10/0x20
[   18.276297] 
[   18.276325] Allocated by task 268:
[   18.276370]  kasan_save_stack+0x3c/0x68
[   18.276425]  kasan_save_track+0x20/0x40
[   18.276485]  kasan_save_alloc_info+0x40/0x58
[   18.276527]  __kasan_kmalloc+0xd4/0xd8
[   18.276572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.276613]  kasan_atomics+0xb8/0x2e0
[   18.276657]  kunit_try_run_case+0x170/0x3f0
[   18.276698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276758]  kthread+0x328/0x630
[   18.276805]  ret_from_fork+0x10/0x20
[   18.276842] 
[   18.276868] The buggy address belongs to the object at fff00000c77e9a80
[   18.276868]  which belongs to the cache kmalloc-64 of size 64
[   18.276934] The buggy address is located 0 bytes to the right of
[   18.276934]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.277015] 
[   18.277039] The buggy address belongs to the physical page:
[   18.277088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.277152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.277209] page_type: f5(slab)
[   18.277271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.277324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.277386] page dumped because: kasan: bad access detected
[   18.277421] 
[   18.277443] Memory state around the buggy address:
[   18.277477]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.277522]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.277576] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.277625]                                      ^
[   18.277662]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.277707]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.277745] ==================================================================
[   18.015983] ==================================================================
[   18.016032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.016084] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.016135] 
[   18.016166] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.016246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.016428]  print_report+0x118/0x608
[   18.016999]  kasan_save_alloc_info+0x40/0x58
[   18.017075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.017386] The buggy address is located 0 bytes to the right of
[   18.017386]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.018217]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.019025] Call trace:
[   18.019049]  show_stack+0x20/0x38 (C)
[   18.019099]  dump_stack_lvl+0x8c/0xd0
[   18.019145]  print_report+0x118/0x608
[   18.019190]  kasan_report+0xdc/0x128
[   18.019235]  kasan_check_range+0x100/0x1a8
[   18.019281]  __kasan_check_write+0x20/0x30
[   18.019329]  kasan_atomics_helper+0x934/0x4858
[   18.019375]  kasan_atomics+0x198/0x2e0
[   18.019420]  kunit_try_run_case+0x170/0x3f0
[   18.019471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.019536]  kthread+0x328/0x630
[   18.019581]  ret_from_fork+0x10/0x20
[   18.019629] 
[   18.019650] Allocated by task 268:
[   18.019688]  kasan_save_stack+0x3c/0x68
[   18.019730]  kasan_save_track+0x20/0x40
[   18.019766]  kasan_save_alloc_info+0x40/0x58
[   18.019807]  __kasan_kmalloc+0xd4/0xd8
[   18.019845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.019882]  kasan_atomics+0xb8/0x2e0
[   18.019918]  kunit_try_run_case+0x170/0x3f0
[   18.019971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.020018]  kthread+0x328/0x630
[   18.020056]  ret_from_fork+0x10/0x20
[   18.020093] 
[   18.020113] The buggy address belongs to the object at fff00000c77e9a80
[   18.020113]  which belongs to the cache kmalloc-64 of size 64
[   18.020167] The buggy address is located 0 bytes to the right of
[   18.020167]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.020259] 
[   18.020281] The buggy address belongs to the physical page:
[   18.020320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.020372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.020417] page_type: f5(slab)
[   18.020465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.020524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.020566] page dumped because: kasan: bad access detected
[   18.020609] 
[   18.020629] Memory state around the buggy address:
[   18.020660]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.020704]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.020757] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.020805]                                      ^
[   18.020839]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020883]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020924] ==================================================================
[   18.031422] ==================================================================
[   18.031630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.031693] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.031761] 
[   18.031828] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.031985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.032022] Hardware name: linux,dummy-virt (DT)
[   18.032055] Call trace:
[   18.032079]  show_stack+0x20/0x38 (C)
[   18.032127]  dump_stack_lvl+0x8c/0xd0
[   18.032174]  print_report+0x118/0x608
[   18.032220]  kasan_report+0xdc/0x128
[   18.032265]  kasan_check_range+0x100/0x1a8
[   18.032312]  __kasan_check_write+0x20/0x30
[   18.032360]  kasan_atomics_helper+0xa6c/0x4858
[   18.032407]  kasan_atomics+0x198/0x2e0
[   18.032763]  kasan_save_track+0x20/0x40
[   18.032940]  kasan_save_alloc_info+0x40/0x58
[   18.032994]  __kasan_kmalloc+0xd4/0xd8
[   18.033031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.033116]  kasan_atomics+0xb8/0x2e0
[   18.033183]  kunit_try_run_case+0x170/0x3f0
[   18.033226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.033273]  kthread+0x328/0x630
[   18.033310]  ret_from_fork+0x10/0x20
[   18.033349] 
[   18.033376] The buggy address belongs to the object at fff00000c77e9a80
[   18.033376]  which belongs to the cache kmalloc-64 of size 64
[   18.034114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.034426] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.035742] Call trace:
[   18.036057]  kasan_check_range+0x100/0x1a8
[   18.037088]  kasan_save_alloc_info+0x40/0x58
[   18.037138]  __kasan_kmalloc+0xd4/0xd8
[   18.037213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.037315]  kasan_atomics+0xb8/0x2e0
[   18.037382]  kunit_try_run_case+0x170/0x3f0
[   18.037440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.037487]  kthread+0x328/0x630
[   18.037559]  ret_from_fork+0x10/0x20
[   18.037598] 
[   18.037619] The buggy address belongs to the object at fff00000c77e9a80
[   18.037619]  which belongs to the cache kmalloc-64 of size 64
[   18.037679] The buggy address is located 0 bytes to the right of
[   18.037679]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.037746] 
[   18.037768] The buggy address belongs to the physical page:
[   18.037800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.037928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.037997] page_type: f5(slab)
[   18.038034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.038088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.038554] 
[   18.038837]                                      ^
[   18.039345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   18.040260]  kasan_atomics_helper+0x3dcc/0x4858
[   18.041676]  __kasan_kmalloc+0xd4/0xd8
[   18.042147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.042609]  ret_from_fork+0x10/0x20
[   18.043593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.044807]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.045168]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.045964]  dump_stack_lvl+0x8c/0xd0
[   18.049659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.050959] The buggy address is located 0 bytes to the right of
[   18.050959]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.051984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.052774] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.053806] ==================================================================
[   18.249759] ==================================================================
[   18.249804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.249860] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.250425] 
[   18.250606] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.250709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.250737] Hardware name: linux,dummy-virt (DT)
[   18.250770] Call trace:
[   18.250793]  show_stack+0x20/0x38 (C)
[   18.250845]  dump_stack_lvl+0x8c/0xd0
[   18.250995]  print_report+0x118/0x608
[   18.251073]  kasan_report+0xdc/0x128
[   18.251148]  __asan_report_load8_noabort+0x20/0x30
[   18.251255]  kasan_atomics_helper+0x3db0/0x4858
[   18.251535]  kasan_atomics+0x198/0x2e0
[   18.251602]  kunit_try_run_case+0x170/0x3f0
[   18.251653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.252003]  kthread+0x328/0x630
[   18.252121]  ret_from_fork+0x10/0x20
[   18.252194] 
[   18.252604] Allocated by task 268:
[   18.252741]  kasan_save_stack+0x3c/0x68
[   18.252816]  kasan_save_track+0x20/0x40
[   18.252920]  kasan_save_alloc_info+0x40/0x58
[   18.252995]  __kasan_kmalloc+0xd4/0xd8
[   18.253092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.253132]  kasan_atomics+0xb8/0x2e0
[   18.253352]  kunit_try_run_case+0x170/0x3f0
[   18.253764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.253852]  kthread+0x328/0x630
[   18.253964]  ret_from_fork+0x10/0x20
[   18.254078] 
[   18.254175] The buggy address belongs to the object at fff00000c77e9a80
[   18.254175]  which belongs to the cache kmalloc-64 of size 64
[   18.254260] The buggy address is located 0 bytes to the right of
[   18.254260]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.254435] 
[   18.254476] The buggy address belongs to the physical page:
[   18.254510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.254683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.254899] page_type: f5(slab)
[   18.254985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.255088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.255162] page dumped because: kasan: bad access detected
[   18.255489] 
[   18.255534] Memory state around the buggy address:
[   18.255626]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255675]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255742] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.255925]                                      ^
[   18.256132]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.256184]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.256510] ==================================================================
[   18.147110] ==================================================================
[   18.147166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.147238] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.147433] 
[   18.147792] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.147905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.148085] Hardware name: linux,dummy-virt (DT)
[   18.148180] Call trace:
[   18.148228]  show_stack+0x20/0x38 (C)
[   18.148280]  dump_stack_lvl+0x8c/0xd0
[   18.148381]  print_report+0x118/0x608
[   18.148449]  kasan_report+0xdc/0x128
[   18.148513]  kasan_check_range+0x100/0x1a8
[   18.148560]  __kasan_check_write+0x20/0x30
[   18.150003]  kasan_atomics_helper+0xf20/0x4858
[   18.150472]  kasan_atomics+0x198/0x2e0
[   18.150653]  kunit_try_run_case+0x170/0x3f0
[   18.150711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.151099]  kthread+0x328/0x630
[   18.151278]  ret_from_fork+0x10/0x20
[   18.151378] 
[   18.151521] Allocated by task 268:
[   18.151613]  kasan_save_stack+0x3c/0x68
[   18.151680]  kasan_save_track+0x20/0x40
[   18.151735]  kasan_save_alloc_info+0x40/0x58
[   18.152140]  __kasan_kmalloc+0xd4/0xd8
[   18.153076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.153617]  kasan_atomics+0xb8/0x2e0
[   18.153807]  kunit_try_run_case+0x170/0x3f0
[   18.153995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.154061]  kthread+0x328/0x630
[   18.154174]  ret_from_fork+0x10/0x20
[   18.154217] 
[   18.154548] The buggy address belongs to the object at fff00000c77e9a80
[   18.154548]  which belongs to the cache kmalloc-64 of size 64
[   18.154640] The buggy address is located 0 bytes to the right of
[   18.154640]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.155021] 
[   18.155068] The buggy address belongs to the physical page:
[   18.155419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.155515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.155603] page_type: f5(slab)
[   18.155938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.156085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.156130] page dumped because: kasan: bad access detected
[   18.156172] 
[   18.156492] Memory state around the buggy address:
[   18.156540]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.156588]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.156634] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.156676]                                      ^
[   18.156761]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.156817]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.156855] ==================================================================
[   18.197379] ==================================================================
[   18.197429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.197474] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.197525] 
[   18.197556] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.197640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.197668] Hardware name: linux,dummy-virt (DT)
[   18.197704] Call trace:
[   18.197728]  show_stack+0x20/0x38 (C)
[   18.197775]  dump_stack_lvl+0x8c/0xd0
[   18.197822]  print_report+0x118/0x608
[   18.197869]  kasan_report+0xdc/0x128
[   18.198036]  kasan_check_range+0x100/0x1a8
[   18.198093]  __kasan_check_write+0x20/0x30
[   18.198165]  kasan_atomics_helper+0x1190/0x4858
[   18.198213]  kasan_atomics+0x198/0x2e0
[   18.198258]  kunit_try_run_case+0x170/0x3f0
[   18.198926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.199122]  kthread+0x328/0x630
[   18.199258]  ret_from_fork+0x10/0x20
[   18.199344] 
[   18.199412] Allocated by task 268:
[   18.199731]  kasan_save_stack+0x3c/0x68
[   18.199829]  kasan_save_track+0x20/0x40
[   18.199898]  kasan_save_alloc_info+0x40/0x58
[   18.199940]  __kasan_kmalloc+0xd4/0xd8
[   18.200016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.200081]  kasan_atomics+0xb8/0x2e0
[   18.200135]  kunit_try_run_case+0x170/0x3f0
[   18.200196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.200285]  kthread+0x328/0x630
[   18.200371]  ret_from_fork+0x10/0x20
[   18.200614] 
[   18.200675] The buggy address belongs to the object at fff00000c77e9a80
[   18.200675]  which belongs to the cache kmalloc-64 of size 64
[   18.200967] The buggy address is located 0 bytes to the right of
[   18.200967]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.201080] 
[   18.201164] The buggy address belongs to the physical page:
[   18.201509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.201991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.202245] page_type: f5(slab)
[   18.202303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.202499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.202552] page dumped because: kasan: bad access detected
[   18.202617] 
[   18.202653] Memory state around the buggy address:
[   18.202693]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.202740]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.202791] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.202856]                                      ^
[   18.202893]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.202937]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203534] ==================================================================
[   18.117442] ==================================================================
[   18.117495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.117563] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.117664] 
[   18.117698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.117789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.117888] Hardware name: linux,dummy-virt (DT)
[   18.117933] Call trace:
[   18.117967]  show_stack+0x20/0x38 (C)
[   18.118018]  dump_stack_lvl+0x8c/0xd0
[   18.118072]  print_report+0x118/0x608
[   18.118119]  kasan_report+0xdc/0x128
[   18.118505]  __asan_report_load8_noabort+0x20/0x30
[   18.118584]  kasan_atomics_helper+0x3f58/0x4858
[   18.118647]  kasan_atomics+0x198/0x2e0
[   18.118709]  kunit_try_run_case+0x170/0x3f0
[   18.118766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.118828]  kthread+0x328/0x630
[   18.119269]  ret_from_fork+0x10/0x20
[   18.119372] 
[   18.119639] Allocated by task 268:
[   18.119745]  kasan_save_stack+0x3c/0x68
[   18.119895]  kasan_save_track+0x20/0x40
[   18.119971]  kasan_save_alloc_info+0x40/0x58
[   18.120383]  __kasan_kmalloc+0xd4/0xd8
[   18.120480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.120547]  kasan_atomics+0xb8/0x2e0
[   18.120983]  kunit_try_run_case+0x170/0x3f0
[   18.121048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.121381]  kthread+0x328/0x630
[   18.121478]  ret_from_fork+0x10/0x20
[   18.121582] 
[   18.121604] The buggy address belongs to the object at fff00000c77e9a80
[   18.121604]  which belongs to the cache kmalloc-64 of size 64
[   18.121978] The buggy address is located 0 bytes to the right of
[   18.121978]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.122181] 
[   18.122301] The buggy address belongs to the physical page:
[   18.122506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.122703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.122911] page_type: f5(slab)
[   18.123018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.123091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.123317] page dumped because: kasan: bad access detected
[   18.123357] 
[   18.123386] Memory state around the buggy address:
[   18.123523]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.124074]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.124161] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.124204]                                      ^
[   18.124245]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124314]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124354] ==================================================================
[   18.257844] ==================================================================
[   18.257908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.258333] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.258517] 
[   18.258802] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.258994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.259054] Hardware name: linux,dummy-virt (DT)
[   18.259119] Call trace:
[   18.259187]  show_stack+0x20/0x38 (C)
[   18.259460]  dump_stack_lvl+0x8c/0xd0
[   18.259536]  print_report+0x118/0x608
[   18.259624]  kasan_report+0xdc/0x128
[   18.259695]  kasan_check_range+0x100/0x1a8
[   18.259759]  __kasan_check_write+0x20/0x30
[   18.259808]  kasan_atomics_helper+0x1644/0x4858
[   18.259864]  kasan_atomics+0x198/0x2e0
[   18.259908]  kunit_try_run_case+0x170/0x3f0
[   18.259985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260041]  kthread+0x328/0x630
[   18.260087]  ret_from_fork+0x10/0x20
[   18.260143] 
[   18.260170] Allocated by task 268:
[   18.260215]  kasan_save_stack+0x3c/0x68
[   18.260268]  kasan_save_track+0x20/0x40
[   18.260316]  kasan_save_alloc_info+0x40/0x58
[   18.260377]  __kasan_kmalloc+0xd4/0xd8
[   18.260414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.260452]  kasan_atomics+0xb8/0x2e0
[   18.260504]  kunit_try_run_case+0x170/0x3f0
[   18.260544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260600]  kthread+0x328/0x630
[   18.260636]  ret_from_fork+0x10/0x20
[   18.260673] 
[   18.260710] The buggy address belongs to the object at fff00000c77e9a80
[   18.260710]  which belongs to the cache kmalloc-64 of size 64
[   18.260783] The buggy address is located 0 bytes to the right of
[   18.260783]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.260848] 
[   18.260872] The buggy address belongs to the physical page:
[   18.260904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.260970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.261244] page_type: f5(slab)
[   18.261683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.262046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.262352] page dumped because: kasan: bad access detected
[   18.262486] 
[   18.262512] Memory state around the buggy address:
[   18.262835]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.263920]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.264135] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.264214]                                      ^
[   18.264412]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264486]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264535] ==================================================================
[   18.094306] ==================================================================
[   18.094562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.094751] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.095114] 
[   18.095189] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.095392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.095452] Hardware name: linux,dummy-virt (DT)
[   18.095547] Call trace:
[   18.095649]  show_stack+0x20/0x38 (C)
[   18.095705]  dump_stack_lvl+0x8c/0xd0
[   18.095754]  print_report+0x118/0x608
[   18.095826]  kasan_report+0xdc/0x128
[   18.096263]  kasan_check_range+0x100/0x1a8
[   18.096492]  __kasan_check_write+0x20/0x30
[   18.096670]  kasan_atomics_helper+0xd3c/0x4858
[   18.096766]  kasan_atomics+0x198/0x2e0
[   18.096841]  kunit_try_run_case+0x170/0x3f0
[   18.097006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.097076]  kthread+0x328/0x630
[   18.097459]  ret_from_fork+0x10/0x20
[   18.097557] 
[   18.097602] Allocated by task 268:
[   18.097978]  kasan_save_stack+0x3c/0x68
[   18.098063]  kasan_save_track+0x20/0x40
[   18.098205]  kasan_save_alloc_info+0x40/0x58
[   18.098252]  __kasan_kmalloc+0xd4/0xd8
[   18.098535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.098646]  kasan_atomics+0xb8/0x2e0
[   18.098930]  kunit_try_run_case+0x170/0x3f0
[   18.099016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.099292]  kthread+0x328/0x630
[   18.099507]  ret_from_fork+0x10/0x20
[   18.099718] 
[   18.099783] The buggy address belongs to the object at fff00000c77e9a80
[   18.099783]  which belongs to the cache kmalloc-64 of size 64
[   18.099968] The buggy address is located 0 bytes to the right of
[   18.099968]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.100181] 
[   18.100226] The buggy address belongs to the physical page:
[   18.100263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.100347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.100668] page_type: f5(slab)
[   18.100728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.101058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.101135] page dumped because: kasan: bad access detected
[   18.101191] 
[   18.101224] Memory state around the buggy address:
[   18.101308]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.101379]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.101424] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.101467]                                      ^
[   18.101509]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101552]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101591] ==================================================================
[   18.223884] ==================================================================
[   18.223930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.224075] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.224221] 
[   18.224288] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.224400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.224445] Hardware name: linux,dummy-virt (DT)
[   18.224479] Call trace:
[   18.224509]  show_stack+0x20/0x38 (C)
[   18.224570]  dump_stack_lvl+0x8c/0xd0
[   18.224676]  print_report+0x118/0x608
[   18.224745]  kasan_report+0xdc/0x128
[   18.224876]  __asan_report_load8_noabort+0x20/0x30
[   18.224987]  kasan_atomics_helper+0x3f04/0x4858
[   18.225038]  kasan_atomics+0x198/0x2e0
[   18.225082]  kunit_try_run_case+0x170/0x3f0
[   18.225144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.225209]  kthread+0x328/0x630
[   18.225263]  ret_from_fork+0x10/0x20
[   18.225327] 
[   18.225353] Allocated by task 268:
[   18.225394]  kasan_save_stack+0x3c/0x68
[   18.225435]  kasan_save_track+0x20/0x40
[   18.225473]  kasan_save_alloc_info+0x40/0x58
[   18.225520]  __kasan_kmalloc+0xd4/0xd8
[   18.225670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.225819]  kasan_atomics+0xb8/0x2e0
[   18.225864]  kunit_try_run_case+0x170/0x3f0
[   18.225910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.225972]  kthread+0x328/0x630
[   18.226080]  ret_from_fork+0x10/0x20
[   18.226118] 
[   18.226140] The buggy address belongs to the object at fff00000c77e9a80
[   18.226140]  which belongs to the cache kmalloc-64 of size 64
[   18.226310] The buggy address is located 0 bytes to the right of
[   18.226310]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.226433] 
[   18.226481] The buggy address belongs to the physical page:
[   18.226538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.226787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.227021] page_type: f5(slab)
[   18.227076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.227135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.227180] page dumped because: kasan: bad access detected
[   18.227213] 
[   18.227364] Memory state around the buggy address:
[   18.227398]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.227443]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.227489] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.227529]                                      ^
[   18.227565]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.227610]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.227650] ==================================================================
[   18.240967] ==================================================================
[   18.241039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.241093] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.241143] 
[   18.241180] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.241270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.241509] Hardware name: linux,dummy-virt (DT)
[   18.241579] Call trace:
[   18.241605]  show_stack+0x20/0x38 (C)
[   18.241657]  dump_stack_lvl+0x8c/0xd0
[   18.241714]  print_report+0x118/0x608
[   18.241767]  kasan_report+0xdc/0x128
[   18.241812]  kasan_check_range+0x100/0x1a8
[   18.241868]  __kasan_check_write+0x20/0x30
[   18.241926]  kasan_atomics_helper+0x154c/0x4858
[   18.241993]  kasan_atomics+0x198/0x2e0
[   18.242047]  kunit_try_run_case+0x170/0x3f0
[   18.242107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.242169]  kthread+0x328/0x630
[   18.242233]  ret_from_fork+0x10/0x20
[   18.242321] 
[   18.242364] Allocated by task 268:
[   18.242394]  kasan_save_stack+0x3c/0x68
[   18.242659]  kasan_save_track+0x20/0x40
[   18.242705]  kasan_save_alloc_info+0x40/0x58
[   18.242760]  __kasan_kmalloc+0xd4/0xd8
[   18.242864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.242943]  kasan_atomics+0xb8/0x2e0
[   18.243021]  kunit_try_run_case+0x170/0x3f0
[   18.243101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.243188]  kthread+0x328/0x630
[   18.243225]  ret_from_fork+0x10/0x20
[   18.243263] 
[   18.243421] The buggy address belongs to the object at fff00000c77e9a80
[   18.243421]  which belongs to the cache kmalloc-64 of size 64
[   18.243497] The buggy address is located 0 bytes to the right of
[   18.243497]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.243580] 
[   18.243616] The buggy address belongs to the physical page:
[   18.243678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.243740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.243798] page_type: f5(slab)
[   18.243837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.243889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.243931] page dumped because: kasan: bad access detected
[   18.244456] 
[   18.244519] Memory state around the buggy address:
[   18.244607]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.244705]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.245023] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.245085]                                      ^
[   18.245181]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.245248]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.245349] ==================================================================
[   18.191305] ==================================================================
[   18.191361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.191416] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.191467] 
[   18.191500] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.191817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.191862] Hardware name: linux,dummy-virt (DT)
[   18.191898] Call trace:
[   18.192146]  show_stack+0x20/0x38 (C)
[   18.192224]  dump_stack_lvl+0x8c/0xd0
[   18.192414]  print_report+0x118/0x608
[   18.192476]  kasan_report+0xdc/0x128
[   18.192541]  kasan_check_range+0x100/0x1a8
[   18.192880]  __kasan_check_write+0x20/0x30
[   18.192994]  kasan_atomics_helper+0x1128/0x4858
[   18.193044]  kasan_atomics+0x198/0x2e0
[   18.193090]  kunit_try_run_case+0x170/0x3f0
[   18.193303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.193375]  kthread+0x328/0x630
[   18.193420]  ret_from_fork+0x10/0x20
[   18.193694] 
[   18.193738] Allocated by task 268:
[   18.193773]  kasan_save_stack+0x3c/0x68
[   18.193818]  kasan_save_track+0x20/0x40
[   18.194045]  kasan_save_alloc_info+0x40/0x58
[   18.194196]  __kasan_kmalloc+0xd4/0xd8
[   18.194326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.194373]  kasan_atomics+0xb8/0x2e0
[   18.194410]  kunit_try_run_case+0x170/0x3f0
[   18.194457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.194504]  kthread+0x328/0x630
[   18.194678]  ret_from_fork+0x10/0x20
[   18.194908] 
[   18.194937] The buggy address belongs to the object at fff00000c77e9a80
[   18.194937]  which belongs to the cache kmalloc-64 of size 64
[   18.195011] The buggy address is located 0 bytes to the right of
[   18.195011]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.195369] 
[   18.195507] The buggy address belongs to the physical page:
[   18.195554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.195900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.195977] page_type: f5(slab)
[   18.196017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.196350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.196494] page dumped because: kasan: bad access detected
[   18.196836] 
[   18.196867] Memory state around the buggy address:
[   18.196904]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.196961]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.197007] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.197047]                                      ^
[   18.197084]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197128]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197166] ==================================================================
[   18.211091] ==================================================================
[   18.211141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.211187] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.211373] 
[   18.211419] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.211518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.211549] Hardware name: linux,dummy-virt (DT)
[   18.211589] Call trace:
[   18.211623]  show_stack+0x20/0x38 (C)
[   18.211680]  dump_stack_lvl+0x8c/0xd0
[   18.211730]  print_report+0x118/0x608
[   18.211775]  kasan_report+0xdc/0x128
[   18.211819]  kasan_check_range+0x100/0x1a8
[   18.211867]  __kasan_check_write+0x20/0x30
[   18.211913]  kasan_atomics_helper+0x126c/0x4858
[   18.211983]  kasan_atomics+0x198/0x2e0
[   18.212036]  kunit_try_run_case+0x170/0x3f0
[   18.212085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.212140]  kthread+0x328/0x630
[   18.212184]  ret_from_fork+0x10/0x20
[   18.212238] 
[   18.212259] Allocated by task 268:
[   18.212298]  kasan_save_stack+0x3c/0x68
[   18.212353]  kasan_save_track+0x20/0x40
[   18.212392]  kasan_save_alloc_info+0x40/0x58
[   18.212432]  __kasan_kmalloc+0xd4/0xd8
[   18.212469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.212507]  kasan_atomics+0xb8/0x2e0
[   18.212544]  kunit_try_run_case+0x170/0x3f0
[   18.212591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.212639]  kthread+0x328/0x630
[   18.212677]  ret_from_fork+0x10/0x20
[   18.212716] 
[   18.212738] The buggy address belongs to the object at fff00000c77e9a80
[   18.212738]  which belongs to the cache kmalloc-64 of size 64
[   18.212796] The buggy address is located 0 bytes to the right of
[   18.212796]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.212861] 
[   18.212893] The buggy address belongs to the physical page:
[   18.212926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.212988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.213035] page_type: f5(slab)
[   18.213074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.213127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.213170] page dumped because: kasan: bad access detected
[   18.213203] 
[   18.213225] Memory state around the buggy address:
[   18.213723]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.213785]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.213849] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.213896]                                      ^
[   18.213942]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.214005]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.214061] ==================================================================
[   18.218141] ==================================================================
[   18.218339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.218392] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.218561] 
[   18.218854] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.219063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.219111] Hardware name: linux,dummy-virt (DT)
[   18.219174] Call trace:
[   18.219223]  show_stack+0x20/0x38 (C)
[   18.219300]  dump_stack_lvl+0x8c/0xd0
[   18.219378]  print_report+0x118/0x608
[   18.219445]  kasan_report+0xdc/0x128
[   18.219508]  kasan_check_range+0x100/0x1a8
[   18.219801]  __kasan_check_write+0x20/0x30
[   18.219892]  kasan_atomics_helper+0x1384/0x4858
[   18.219969]  kasan_atomics+0x198/0x2e0
[   18.220037]  kunit_try_run_case+0x170/0x3f0
[   18.220147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.220234]  kthread+0x328/0x630
[   18.220297]  ret_from_fork+0x10/0x20
[   18.220381] 
[   18.220441] Allocated by task 268:
[   18.220483]  kasan_save_stack+0x3c/0x68
[   18.220523]  kasan_save_track+0x20/0x40
[   18.220711]  kasan_save_alloc_info+0x40/0x58
[   18.220753]  __kasan_kmalloc+0xd4/0xd8
[   18.221809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.221857]  kasan_atomics+0xb8/0x2e0
[   18.221933]  kunit_try_run_case+0x170/0x3f0
[   18.222011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222082]  kthread+0x328/0x630
[   18.222145]  ret_from_fork+0x10/0x20
[   18.222230] 
[   18.222290] The buggy address belongs to the object at fff00000c77e9a80
[   18.222290]  which belongs to the cache kmalloc-64 of size 64
[   18.222364] The buggy address is located 0 bytes to the right of
[   18.222364]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.222434] 
[   18.222457] The buggy address belongs to the physical page:
[   18.222489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.222541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.222589] page_type: f5(slab)
[   18.222628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.222680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.222841] page dumped because: kasan: bad access detected
[   18.222888] 
[   18.222926] Memory state around the buggy address:
[   18.222990]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.223058]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.223158] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.223248]                                      ^
[   18.223489]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223544]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223597] ==================================================================
[   18.084104] ==================================================================
[   18.084435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.084602] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.084665] 
[   18.084698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.084974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.085005] Hardware name: linux,dummy-virt (DT)
[   18.085150] Call trace:
[   18.085191]  show_stack+0x20/0x38 (C)
[   18.085361]  dump_stack_lvl+0x8c/0xd0
[   18.085417]  print_report+0x118/0x608
[   18.085466]  kasan_report+0xdc/0x128
[   18.085780]  __asan_report_load4_noabort+0x20/0x30
[   18.085971]  kasan_atomics_helper+0x3dd8/0x4858
[   18.086153]  kasan_atomics+0x198/0x2e0
[   18.086269]  kunit_try_run_case+0x170/0x3f0
[   18.086459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.086554]  kthread+0x328/0x630
[   18.086707]  ret_from_fork+0x10/0x20
[   18.086761] 
[   18.086781] Allocated by task 268:
[   18.087028]  kasan_save_stack+0x3c/0x68
[   18.087199]  kasan_save_track+0x20/0x40
[   18.087277]  kasan_save_alloc_info+0x40/0x58
[   18.087472]  __kasan_kmalloc+0xd4/0xd8
[   18.087520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.087561]  kasan_atomics+0xb8/0x2e0
[   18.087744]  kunit_try_run_case+0x170/0x3f0
[   18.088333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.088476]  kthread+0x328/0x630
[   18.090057]  ret_from_fork+0x10/0x20
[   18.090179] 
[   18.090221] The buggy address belongs to the object at fff00000c77e9a80
[   18.090221]  which belongs to the cache kmalloc-64 of size 64
[   18.090783] The buggy address is located 0 bytes to the right of
[   18.090783]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.090915] 
[   18.090957] The buggy address belongs to the physical page:
[   18.091155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.091522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.091747] page_type: f5(slab)
[   18.091794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.091848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.092242] page dumped because: kasan: bad access detected
[   18.092563] 
[   18.092627] Memory state around the buggy address:
[   18.092694]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.092739]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.093210] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.093280]                                      ^
[   18.093328]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093383]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093437] ==================================================================
[   18.294576] ==================================================================
[   18.294665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.294727] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.294780] 
[   18.294813] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.295237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.295442] Hardware name: linux,dummy-virt (DT)
[   18.295485] Call trace:
[   18.295596]  show_stack+0x20/0x38 (C)
[   18.295650]  dump_stack_lvl+0x8c/0xd0
[   18.295753]  print_report+0x118/0x608
[   18.295820]  kasan_report+0xdc/0x128
[   18.295875]  __asan_report_load8_noabort+0x20/0x30
[   18.296111]  kasan_atomics_helper+0x3e20/0x4858
[   18.296256]  kasan_atomics+0x198/0x2e0
[   18.296312]  kunit_try_run_case+0x170/0x3f0
[   18.296609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.296698]  kthread+0x328/0x630
[   18.296768]  ret_from_fork+0x10/0x20
[   18.296827] 
[   18.296931] Allocated by task 268:
[   18.297005]  kasan_save_stack+0x3c/0x68
[   18.297049]  kasan_save_track+0x20/0x40
[   18.297093]  kasan_save_alloc_info+0x40/0x58
[   18.297211]  __kasan_kmalloc+0xd4/0xd8
[   18.297251]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.297291]  kasan_atomics+0xb8/0x2e0
[   18.297344]  kunit_try_run_case+0x170/0x3f0
[   18.297404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.297701]  kthread+0x328/0x630
[   18.297789]  ret_from_fork+0x10/0x20
[   18.297838] 
[   18.298128] The buggy address belongs to the object at fff00000c77e9a80
[   18.298128]  which belongs to the cache kmalloc-64 of size 64
[   18.298241] The buggy address is located 0 bytes to the right of
[   18.298241]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.298717] 
[   18.298757] The buggy address belongs to the physical page:
[   18.298819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.298878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.299264] page_type: f5(slab)
[   18.299361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.299444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.299693] page dumped because: kasan: bad access detected
[   18.299822] 
[   18.299857] Memory state around the buggy address:
[   18.299892]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300174]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300272] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.300553]                                      ^
[   18.300627]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300764]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300839] ==================================================================
[   18.158129] ==================================================================
[   18.158455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.158532] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.158644] 
[   18.158722] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.158923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.159238] Hardware name: linux,dummy-virt (DT)
[   18.159329] Call trace:
[   18.159389]  show_stack+0x20/0x38 (C)
[   18.159465]  dump_stack_lvl+0x8c/0xd0
[   18.159909]  print_report+0x118/0x608
[   18.160010]  kasan_report+0xdc/0x128
[   18.160374]  kasan_check_range+0x100/0x1a8
[   18.160536]  __kasan_check_write+0x20/0x30
[   18.160613]  kasan_atomics_helper+0xf88/0x4858
[   18.160999]  kasan_atomics+0x198/0x2e0
[   18.161130]  kunit_try_run_case+0x170/0x3f0
[   18.161279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.161409]  kthread+0x328/0x630
[   18.161463]  ret_from_fork+0x10/0x20
[   18.161682] 
[   18.161908] Allocated by task 268:
[   18.161972]  kasan_save_stack+0x3c/0x68
[   18.162026]  kasan_save_track+0x20/0x40
[   18.162085]  kasan_save_alloc_info+0x40/0x58
[   18.162124]  __kasan_kmalloc+0xd4/0xd8
[   18.162317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.162460]  kasan_atomics+0xb8/0x2e0
[   18.162507]  kunit_try_run_case+0x170/0x3f0
[   18.162982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.163075]  kthread+0x328/0x630
[   18.163119]  ret_from_fork+0x10/0x20
[   18.163249] 
[   18.163445] The buggy address belongs to the object at fff00000c77e9a80
[   18.163445]  which belongs to the cache kmalloc-64 of size 64
[   18.163670] The buggy address is located 0 bytes to the right of
[   18.163670]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.164003] 
[   18.164129] The buggy address belongs to the physical page:
[   18.164166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.164241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.164448] page_type: f5(slab)
[   18.164600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.164832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.165036] page dumped because: kasan: bad access detected
[   18.165233] 
[   18.165392] Memory state around the buggy address:
[   18.165457]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.165573]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.165647] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.165982]                                      ^
[   18.166173]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.166521]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.166684] ==================================================================
[   18.236718] ==================================================================
[   18.236767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.236922] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.237005] 
[   18.237069] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.237156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.237184] Hardware name: linux,dummy-virt (DT)
[   18.237217] Call trace:
[   18.237256]  show_stack+0x20/0x38 (C)
[   18.237323]  dump_stack_lvl+0x8c/0xd0
[   18.237373]  print_report+0x118/0x608
[   18.237418]  kasan_report+0xdc/0x128
[   18.237513]  kasan_check_range+0x100/0x1a8
[   18.237590]  __kasan_check_write+0x20/0x30
[   18.237749]  kasan_atomics_helper+0x14e4/0x4858
[   18.237826]  kasan_atomics+0x198/0x2e0
[   18.237887]  kunit_try_run_case+0x170/0x3f0
[   18.237938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.238088]  kthread+0x328/0x630
[   18.238157]  ret_from_fork+0x10/0x20
[   18.238363] 
[   18.238412] Allocated by task 268:
[   18.238524]  kasan_save_stack+0x3c/0x68
[   18.238637]  kasan_save_track+0x20/0x40
[   18.238690]  kasan_save_alloc_info+0x40/0x58
[   18.238740]  __kasan_kmalloc+0xd4/0xd8
[   18.238776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.238830]  kasan_atomics+0xb8/0x2e0
[   18.238866]  kunit_try_run_case+0x170/0x3f0
[   18.238909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.238975]  kthread+0x328/0x630
[   18.239012]  ret_from_fork+0x10/0x20
[   18.239050] 
[   18.239072] The buggy address belongs to the object at fff00000c77e9a80
[   18.239072]  which belongs to the cache kmalloc-64 of size 64
[   18.239422] The buggy address is located 0 bytes to the right of
[   18.239422]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.239516] 
[   18.239574] The buggy address belongs to the physical page:
[   18.239633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.239711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.239777] page_type: f5(slab)
[   18.239863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.239928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.239985] page dumped because: kasan: bad access detected
[   18.240018] 
[   18.240039] Memory state around the buggy address:
[   18.240163]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.240284]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.240386] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.240452]                                      ^
[   18.240494]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.240536]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.240576] ==================================================================
[   18.182375] ==================================================================
[   18.182642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.182745] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.182983] 
[   18.183073] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.183354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.183507] Hardware name: linux,dummy-virt (DT)
[   18.183585] Call trace:
[   18.183639]  show_stack+0x20/0x38 (C)
[   18.183935]  dump_stack_lvl+0x8c/0xd0
[   18.184036]  print_report+0x118/0x608
[   18.184186]  kasan_report+0xdc/0x128
[   18.184305]  kasan_check_range+0x100/0x1a8
[   18.184364]  __kasan_check_write+0x20/0x30
[   18.184845]  kasan_atomics_helper+0x10c0/0x4858
[   18.185101]  kasan_atomics+0x198/0x2e0
[   18.185320]  kunit_try_run_case+0x170/0x3f0
[   18.185499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.185576]  kthread+0x328/0x630
[   18.185890]  ret_from_fork+0x10/0x20
[   18.186061] 
[   18.186177] Allocated by task 268:
[   18.186304]  kasan_save_stack+0x3c/0x68
[   18.186369]  kasan_save_track+0x20/0x40
[   18.186427]  kasan_save_alloc_info+0x40/0x58
[   18.186469]  __kasan_kmalloc+0xd4/0xd8
[   18.186505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.186555]  kasan_atomics+0xb8/0x2e0
[   18.186590]  kunit_try_run_case+0x170/0x3f0
[   18.186659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.186706]  kthread+0x328/0x630
[   18.187138]  ret_from_fork+0x10/0x20
[   18.187349] 
[   18.187403] The buggy address belongs to the object at fff00000c77e9a80
[   18.187403]  which belongs to the cache kmalloc-64 of size 64
[   18.187580] The buggy address is located 0 bytes to the right of
[   18.187580]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.187659] 
[   18.187682] The buggy address belongs to the physical page:
[   18.187715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.188075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.188392] page_type: f5(slab)
[   18.188536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.188626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.188671] page dumped because: kasan: bad access detected
[   18.188966] 
[   18.189013] Memory state around the buggy address:
[   18.189210]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189284]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189466] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.189528]                                      ^
[   18.189816]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.189961]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.190336] ==================================================================
[   18.301621] ==================================================================
[   18.301750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.301804] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.301936] 
[   18.301991] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.302209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.302380] Hardware name: linux,dummy-virt (DT)
[   18.302479] Call trace:
[   18.302538]  show_stack+0x20/0x38 (C)
[   18.302683]  dump_stack_lvl+0x8c/0xd0
[   18.302771]  print_report+0x118/0x608
[   18.302818]  kasan_report+0xdc/0x128
[   18.302891]  kasan_check_range+0x100/0x1a8
[   18.302941]  __kasan_check_write+0x20/0x30
[   18.303000]  kasan_atomics_helper+0x17ec/0x4858
[   18.303048]  kasan_atomics+0x198/0x2e0
[   18.303109]  kunit_try_run_case+0x170/0x3f0
[   18.303158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.303228]  kthread+0x328/0x630
[   18.303287]  ret_from_fork+0x10/0x20
[   18.303335] 
[   18.303356] Allocated by task 268:
[   18.303395]  kasan_save_stack+0x3c/0x68
[   18.303437]  kasan_save_track+0x20/0x40
[   18.303474]  kasan_save_alloc_info+0x40/0x58
[   18.303532]  __kasan_kmalloc+0xd4/0xd8
[   18.303568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.303608]  kasan_atomics+0xb8/0x2e0
[   18.303643]  kunit_try_run_case+0x170/0x3f0
[   18.303692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.303739]  kthread+0x328/0x630
[   18.303775]  ret_from_fork+0x10/0x20
[   18.303823] 
[   18.303846] The buggy address belongs to the object at fff00000c77e9a80
[   18.303846]  which belongs to the cache kmalloc-64 of size 64
[   18.303918] The buggy address is located 0 bytes to the right of
[   18.303918]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.305061] 
[   18.305114] The buggy address belongs to the physical page:
[   18.305156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.306112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.306179] page_type: f5(slab)
[   18.306606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.306663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.306706] page dumped because: kasan: bad access detected
[   18.306742] 
[   18.307755] Memory state around the buggy address:
[   18.308140]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308217]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308264] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.308580]                                      ^
[   18.308980]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.309066]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.309230] ==================================================================
[   18.139104] ==================================================================
[   18.139167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.139231] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.139283] 
[   18.139318] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.139412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.139452] Hardware name: linux,dummy-virt (DT)
[   18.139501] Call trace:
[   18.139535]  show_stack+0x20/0x38 (C)
[   18.139583]  dump_stack_lvl+0x8c/0xd0
[   18.139633]  print_report+0x118/0x608
[   18.139680]  kasan_report+0xdc/0x128
[   18.139734]  kasan_check_range+0x100/0x1a8
[   18.139781]  __kasan_check_write+0x20/0x30
[   18.139829]  kasan_atomics_helper+0xeb8/0x4858
[   18.139876]  kasan_atomics+0x198/0x2e0
[   18.139919]  kunit_try_run_case+0x170/0x3f0
[   18.139981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.140036]  kthread+0x328/0x630
[   18.140080]  ret_from_fork+0x10/0x20
[   18.140786] 
[   18.140834] Allocated by task 268:
[   18.140869]  kasan_save_stack+0x3c/0x68
[   18.140914]  kasan_save_track+0x20/0x40
[   18.140972]  kasan_save_alloc_info+0x40/0x58
[   18.141014]  __kasan_kmalloc+0xd4/0xd8
[   18.141049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.141268]  kasan_atomics+0xb8/0x2e0
[   18.141320]  kunit_try_run_case+0x170/0x3f0
[   18.141472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.141582]  kthread+0x328/0x630
[   18.141625]  ret_from_fork+0x10/0x20
[   18.141999] 
[   18.142041] The buggy address belongs to the object at fff00000c77e9a80
[   18.142041]  which belongs to the cache kmalloc-64 of size 64
[   18.142103] The buggy address is located 0 bytes to the right of
[   18.142103]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.142588] 
[   18.142638] The buggy address belongs to the physical page:
[   18.143136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.143204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.143479] page_type: f5(slab)
[   18.143550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.143710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.143767] page dumped because: kasan: bad access detected
[   18.144019] 
[   18.144282] Memory state around the buggy address:
[   18.144351]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.144420]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.144697] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.144945]                                      ^
[   18.145016]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.145070]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.145444] ==================================================================
[   18.265269] ==================================================================
[   18.265649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.265716] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.265769] 
[   18.265884] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.266006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.266241] Hardware name: linux,dummy-virt (DT)
[   18.266414] Call trace:
[   18.266735]  show_stack+0x20/0x38 (C)
[   18.266885]  dump_stack_lvl+0x8c/0xd0
[   18.267054]  print_report+0x118/0x608
[   18.267129]  kasan_report+0xdc/0x128
[   18.267255]  __asan_report_load8_noabort+0x20/0x30
[   18.267328]  kasan_atomics_helper+0x3df4/0x4858
[   18.267376]  kasan_atomics+0x198/0x2e0
[   18.267429]  kunit_try_run_case+0x170/0x3f0
[   18.267478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.267859]  kthread+0x328/0x630
[   18.268241]  ret_from_fork+0x10/0x20
[   18.268398] 
[   18.268456] Allocated by task 268:
[   18.268538]  kasan_save_stack+0x3c/0x68
[   18.268976]  kasan_save_track+0x20/0x40
[   18.269093]  kasan_save_alloc_info+0x40/0x58
[   18.269363]  __kasan_kmalloc+0xd4/0xd8
[   18.269584]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.269668]  kasan_atomics+0xb8/0x2e0
[   18.269740]  kunit_try_run_case+0x170/0x3f0
[   18.269871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269925]  kthread+0x328/0x630
[   18.270148]  ret_from_fork+0x10/0x20
[   18.270207] 
[   18.270352] The buggy address belongs to the object at fff00000c77e9a80
[   18.270352]  which belongs to the cache kmalloc-64 of size 64
[   18.270581] The buggy address is located 0 bytes to the right of
[   18.270581]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.270802] 
[   18.270943] The buggy address belongs to the physical page:
[   18.271009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.271154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.271241] page_type: f5(slab)
[   18.271309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.271447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.271523] page dumped because: kasan: bad access detected
[   18.271558] 
[   18.271586] Memory state around the buggy address:
[   18.271925]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.272002]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.272152] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.272229]                                      ^
[   18.272557]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272618]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   17.736839] ==================================================================
[   17.736919] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   17.737012] Read of size 1 at addr ffff800080a07c2a by task kunit_try_catch/252
[   17.737068] 
[   17.737101] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.737422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.737464] Hardware name: linux,dummy-virt (DT)
[   17.737623] Call trace:
[   17.737649]  show_stack+0x20/0x38 (C)
[   17.737722]  dump_stack_lvl+0x8c/0xd0
[   17.737773]  print_report+0x310/0x608
[   17.737820]  kasan_report+0xdc/0x128
[   17.737865]  __asan_report_load1_noabort+0x20/0x30
[   17.737916]  kasan_stack_oob+0x238/0x270
[   17.738026]  kunit_try_run_case+0x170/0x3f0
[   17.738080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.738134]  kthread+0x328/0x630
[   17.738305]  ret_from_fork+0x10/0x20
[   17.738361] 
[   17.738424] The buggy address belongs to stack of task kunit_try_catch/252
[   17.738531]  and is located at offset 138 in frame:
[   17.738674]  kasan_stack_oob+0x0/0x270
[   17.739070] 
[   17.739106] This frame has 4 objects:
[   17.739235]  [48, 49) '__assertion'
[   17.739458]  [64, 72) 'array'
[   17.740815]  ffff800080a07b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.746100]  dump_stack_lvl+0x8c/0xd0
[   17.747545] 
[   17.748454]  ffff800080a07a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.754455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.755976] 
[   17.756040] The buggy address belongs to the physical page:
[   17.772576] page dumped because: kasan: bad access detected
[   17.773425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   17.721078] ==================================================================
[   17.721139] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   17.721192] Read of size 1 at addr ffffa3b0e8e035ad by task kunit_try_catch/248
[   17.721280] 
[   17.721317] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.721396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.721423] Hardware name: linux,dummy-virt (DT)
[   17.721453] Call trace:
[   17.721473]  show_stack+0x20/0x38 (C)
[   17.721619]  dump_stack_lvl+0x8c/0xd0
[   17.721775]  print_report+0x310/0x608
[   17.721840]  kasan_report+0xdc/0x128
[   17.721893]  __asan_report_load1_noabort+0x20/0x30
[   17.722140]  kasan_global_oob_right+0x230/0x270
[   17.722548]  kunit_try_run_case+0x170/0x3f0
[   17.722607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.722660]  kthread+0x328/0x630
[   17.722705]  ret_from_fork+0x10/0x20
[   17.722763] 
[   17.722816] The buggy address belongs to the variable:
[   17.723201]  global_array+0xd/0x40
[   17.723321] 
[   17.723448] The buggy address belongs to the virtual mapping at
[   17.723448]  [ffffa3b0e7020000, ffffa3b0e8ec1000) created by:
[   17.723448]  paging_init+0x66c/0x7d0
[   17.723555] 
[   17.723723] The buggy address belongs to the physical page:
[   17.723759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03
[   17.723812] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   17.723887] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000
[   17.723966] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.724008] page dumped because: kasan: bad access detected
[   17.724040] 
[   17.724085] Memory state around the buggy address:
[   17.724140]  ffffa3b0e8e03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.724190]  ffffa3b0e8e03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   17.724233] >ffffa3b0e8e03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   17.724270]                                   ^
[   17.724301]  ffffa3b0e8e03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   17.724343]  ffffa3b0e8e03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   17.724382] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   17.702267] ==================================================================
[   17.702348] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.702498] Free of addr fff00000c77fa501 by task kunit_try_catch/244
[   17.702663] 
[   17.702711] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.702793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.702845] Hardware name: linux,dummy-virt (DT)
[   17.702876] Call trace:
[   17.702899]  show_stack+0x20/0x38 (C)
[   17.703116]  dump_stack_lvl+0x8c/0xd0
[   17.703191]  print_report+0x118/0x608
[   17.703296]  kasan_report_invalid_free+0xc0/0xe8
[   17.703384]  check_slab_allocation+0xfc/0x108
[   17.703450]  __kasan_mempool_poison_object+0x78/0x150
[   17.703522]  mempool_free+0x28c/0x328
[   17.703578]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.703775]  mempool_kmalloc_invalid_free+0xc0/0x118
[   17.703979]  kunit_try_run_case+0x170/0x3f0
[   17.704179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.704372]  kthread+0x328/0x630
[   17.704447]  ret_from_fork+0x10/0x20
[   17.704558] 
[   17.704598] Allocated by task 244:
[   17.704655]  kasan_save_stack+0x3c/0x68
[   17.704734]  kasan_save_track+0x20/0x40
[   17.704814]  kasan_save_alloc_info+0x40/0x58
[   17.704890]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.704931]  remove_element+0x130/0x1f8
[   17.705195]  mempool_alloc_preallocated+0x58/0xc0
[   17.705312]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   17.705390]  mempool_kmalloc_invalid_free+0xc0/0x118
[   17.705446]  kunit_try_run_case+0x170/0x3f0
[   17.705523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.705579]  kthread+0x328/0x630
[   17.705627]  ret_from_fork+0x10/0x20
[   17.705735] 
[   17.705783] The buggy address belongs to the object at fff00000c77fa500
[   17.705783]  which belongs to the cache kmalloc-128 of size 128
[   17.705872] The buggy address is located 1 bytes inside of
[   17.705872]  128-byte region [fff00000c77fa500, fff00000c77fa580)
[   17.705977] 
[   17.706004] The buggy address belongs to the physical page:
[   17.706043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   17.706230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.706281] page_type: f5(slab)
[   17.706548] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.706624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.706679] page dumped because: kasan: bad access detected
[   17.706734] 
[   17.706765] Memory state around the buggy address:
[   17.706833]  fff00000c77fa400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.706941]  fff00000c77fa480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.707038] >fff00000c77fa500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.707093]                    ^
[   17.707164]  fff00000c77fa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.707673]  fff00000c77fa600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.707715] ==================================================================
[   17.712819] ==================================================================
[   17.712873] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.712928] Free of addr fff00000c7924001 by task kunit_try_catch/246
[   17.712987] 
[   17.713017] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.713111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.713138] Hardware name: linux,dummy-virt (DT)
[   17.713257] Call trace:
[   17.713303]  show_stack+0x20/0x38 (C)
[   17.713355]  dump_stack_lvl+0x8c/0xd0
[   17.713432]  print_report+0x118/0x608
[   17.713485]  kasan_report_invalid_free+0xc0/0xe8
[   17.713542]  __kasan_mempool_poison_object+0xfc/0x150
[   17.713608]  mempool_free+0x28c/0x328
[   17.713663]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.713716]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   17.713914]  kunit_try_run_case+0x170/0x3f0
[   17.713976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.714037]  kthread+0x328/0x630
[   17.714083]  ret_from_fork+0x10/0x20
[   17.714129] 
[   17.714279] The buggy address belongs to the physical page:
[   17.714340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924
[   17.714436] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.714519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.714599] page_type: f8(unknown)
[   17.714655] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.714728] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.714825] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.714874] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.714935] head: 0bfffe0000000002 ffffc1ffc31e4901 00000000ffffffff 00000000ffffffff
[   17.714992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.715032] page dumped because: kasan: bad access detected
[   17.715063] 
[   17.715080] Memory state around the buggy address:
[   17.715111]  fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.715178]  fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.715220] >fff00000c7924000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.715266]                    ^
[   17.715294]  fff00000c7924080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.715335]  fff00000c7924100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.715373] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   17.665013] ==================================================================
[   17.665094] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.665156] Free of addr fff00000c77fa100 by task kunit_try_catch/238
[   17.665198] 
[   17.666270] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.666396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.668486] Hardware name: linux,dummy-virt (DT)
[   17.668538] Call trace:
[   17.668560]  show_stack+0x20/0x38 (C)
[   17.668612]  dump_stack_lvl+0x8c/0xd0
[   17.668661]  print_report+0x118/0x608
[   17.668706]  kasan_report_invalid_free+0xc0/0xe8
[   17.668754]  check_slab_allocation+0xd4/0x108
[   17.668801]  __kasan_mempool_poison_object+0x78/0x150
[   17.668851]  mempool_free+0x28c/0x328
[   17.668897]  mempool_double_free_helper+0x150/0x2e8
[   17.668962]  mempool_kmalloc_double_free+0xc0/0x118
[   17.669013]  kunit_try_run_case+0x170/0x3f0
[   17.669061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669114]  kthread+0x328/0x630
[   17.669158]  ret_from_fork+0x10/0x20
[   17.669206] 
[   17.669223] Allocated by task 238:
[   17.669256]  kasan_save_stack+0x3c/0x68
[   17.669294]  kasan_save_track+0x20/0x40
[   17.669330]  kasan_save_alloc_info+0x40/0x58
[   17.669367]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.669407]  remove_element+0x130/0x1f8
[   17.669443]  mempool_alloc_preallocated+0x58/0xc0
[   17.669483]  mempool_double_free_helper+0x94/0x2e8
[   17.669523]  mempool_kmalloc_double_free+0xc0/0x118
[   17.669564]  kunit_try_run_case+0x170/0x3f0
[   17.669600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669643]  kthread+0x328/0x630
[   17.669678]  ret_from_fork+0x10/0x20
[   17.669996] 
[   17.670052] Freed by task 238:
[   17.670291]  kasan_save_stack+0x3c/0x68
[   17.670387]  kasan_save_track+0x20/0x40
[   17.670465]  kasan_save_free_info+0x4c/0x78
[   17.670504]  __kasan_mempool_poison_object+0xc0/0x150
[   17.670544]  mempool_free+0x28c/0x328
[   17.670579]  mempool_double_free_helper+0x100/0x2e8
[   17.670619]  mempool_kmalloc_double_free+0xc0/0x118
[   17.670661]  kunit_try_run_case+0x170/0x3f0
[   17.670697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.670742]  kthread+0x328/0x630
[   17.670776]  ret_from_fork+0x10/0x20
[   17.670811] 
[   17.670829] The buggy address belongs to the object at fff00000c77fa100
[   17.670829]  which belongs to the cache kmalloc-128 of size 128
[   17.670889] The buggy address is located 0 bytes inside of
[   17.670889]  128-byte region [fff00000c77fa100, fff00000c77fa180)
[   17.670956] 
[   17.670976] The buggy address belongs to the physical page:
[   17.671007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   17.671060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.671106] page_type: f5(slab)
[   17.671145] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.671194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.671234] page dumped because: kasan: bad access detected
[   17.671263] 
[   17.671281] Memory state around the buggy address:
[   17.671312]  fff00000c77fa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.671426]  fff00000c77fa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671489] >fff00000c77fa100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.671527]                    ^
[   17.671558]  fff00000c77fa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671601]  fff00000c77fa200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.671638] ==================================================================
[   17.693081] ==================================================================
[   17.693256] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.693412] Free of addr fff00000c7924000 by task kunit_try_catch/242
[   17.693462] 
[   17.693494] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.693595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.693759] Hardware name: linux,dummy-virt (DT)
[   17.693806] Call trace:
[   17.693834]  show_stack+0x20/0x38 (C)
[   17.693892]  dump_stack_lvl+0x8c/0xd0
[   17.693966]  print_report+0x118/0x608
[   17.694011]  kasan_report_invalid_free+0xc0/0xe8
[   17.694069]  __kasan_mempool_poison_pages+0xe0/0xe8
[   17.694125]  mempool_free+0x24c/0x328
[   17.694282]  mempool_double_free_helper+0x150/0x2e8
[   17.694368]  mempool_page_alloc_double_free+0xbc/0x118
[   17.694457]  kunit_try_run_case+0x170/0x3f0
[   17.694546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.694622]  kthread+0x328/0x630
[   17.694702]  ret_from_fork+0x10/0x20
[   17.694747] 
[   17.694767] The buggy address belongs to the physical page:
[   17.694818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924
[   17.694872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.694931] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.694991] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.695250] page dumped because: kasan: bad access detected
[   17.695329] 
[   17.695393] Memory state around the buggy address:
[   17.695450]  fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695549]  fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695607] >fff00000c7924000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695646]                    ^
[   17.695674]  fff00000c7924080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.695856]  fff00000c7924100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.696027] ==================================================================
[   17.682502] ==================================================================
[   17.682566] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   17.683775] Free of addr fff00000c7924000 by task kunit_try_catch/240
[   17.683841] 
[   17.683877] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.683976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.684004] Hardware name: linux,dummy-virt (DT)
[   17.684038] Call trace:
[   17.684061]  show_stack+0x20/0x38 (C)
[   17.684111]  dump_stack_lvl+0x8c/0xd0
[   17.684158]  print_report+0x118/0x608
[   17.684210]  kasan_report_invalid_free+0xc0/0xe8
[   17.684258]  __kasan_mempool_poison_object+0x14c/0x150
[   17.684309]  mempool_free+0x28c/0x328
[   17.684359]  mempool_double_free_helper+0x150/0x2e8
[   17.684409]  mempool_kmalloc_large_double_free+0xc0/0x118
[   17.684820]  kunit_try_run_case+0x170/0x3f0
[   17.684894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.684988]  kthread+0x328/0x630
[   17.685034]  ret_from_fork+0x10/0x20
[   17.685110] 
[   17.685131] The buggy address belongs to the physical page:
[   17.685164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107924
[   17.685219] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.685594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.685696] page_type: f8(unknown)
[   17.685752] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.685837] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.685988] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.686063] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.686190] head: 0bfffe0000000002 ffffc1ffc31e4901 00000000ffffffff 00000000ffffffff
[   17.686258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.686343] page dumped because: kasan: bad access detected
[   17.686444] 
[   17.686491] Memory state around the buggy address:
[   17.686524]  fff00000c7923f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686589]  fff00000c7923f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686633] >fff00000c7924000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686671]                    ^
[   17.686698]  fff00000c7924080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686739]  fff00000c7924100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.686777] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   17.647701] ==================================================================
[   17.647765] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   17.647829] Read of size 1 at addr fff00000c7920000 by task kunit_try_catch/236
[   17.647877] 
[   17.647914] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.648015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.648040] Hardware name: linux,dummy-virt (DT)
[   17.648072] Call trace:
[   17.648095]  show_stack+0x20/0x38 (C)
[   17.648144]  dump_stack_lvl+0x8c/0xd0
[   17.648193]  print_report+0x118/0x608
[   17.648236]  kasan_report+0xdc/0x128
[   17.648319]  __asan_report_load1_noabort+0x20/0x30
[   17.648368]  mempool_uaf_helper+0x314/0x340
[   17.648416]  mempool_page_alloc_uaf+0xc0/0x118
[   17.648461]  kunit_try_run_case+0x170/0x3f0
[   17.648509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.648561]  kthread+0x328/0x630
[   17.648605]  ret_from_fork+0x10/0x20
[   17.648652] 
[   17.648693] The buggy address belongs to the physical page:
[   17.648752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107920
[   17.648807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.648873] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.648921] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.648972] page dumped because: kasan: bad access detected
[   17.649004] 
[   17.649021] Memory state around the buggy address:
[   17.649054]  fff00000c791ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.649095]  fff00000c791ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.649137] >fff00000c7920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.649174]                    ^
[   17.649201]  fff00000c7920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.649240]  fff00000c7920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.649276] ==================================================================
[   17.584351] ==================================================================
[   17.584439] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   17.584891] Read of size 1 at addr fff00000c791c000 by task kunit_try_catch/232
[   17.585307] 
[   17.585429] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.585516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.585543] Hardware name: linux,dummy-virt (DT)
[   17.586004] Call trace:
[   17.586032]  show_stack+0x20/0x38 (C)
[   17.586086]  dump_stack_lvl+0x8c/0xd0
[   17.586597]  print_report+0x118/0x608
[   17.586665]  kasan_report+0xdc/0x128
[   17.586709]  __asan_report_load1_noabort+0x20/0x30
[   17.586883]  mempool_uaf_helper+0x314/0x340
[   17.586938]  mempool_kmalloc_large_uaf+0xc4/0x120
[   17.586998]  kunit_try_run_case+0x170/0x3f0
[   17.587254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.587353]  kthread+0x328/0x630
[   17.587414]  ret_from_fork+0x10/0x20
[   17.587472] 
[   17.587608] The buggy address belongs to the physical page:
[   17.587672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c
[   17.587764] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.587833] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.588321] page_type: f8(unknown)
[   17.588683] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.589496] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.589651] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.589701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.589749] head: 0bfffe0000000002 ffffc1ffc31e4701 00000000ffffffff 00000000ffffffff
[   17.589796] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.590356] page dumped because: kasan: bad access detected
[   17.590403] 
[   17.590432] Memory state around the buggy address:
[   17.590542]  fff00000c791bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.590935]  fff00000c791bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.591118] >fff00000c791c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.591222]                    ^
[   17.591254]  fff00000c791c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.591318]  fff00000c791c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.591357] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   17.625118] ==================================================================
[   17.625252] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   17.625416] Read of size 1 at addr fff00000c77fa240 by task kunit_try_catch/234
[   17.625477] 
[   17.625552] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.625645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.625672] Hardware name: linux,dummy-virt (DT)
[   17.625709] Call trace:
[   17.625732]  show_stack+0x20/0x38 (C)
[   17.625791]  dump_stack_lvl+0x8c/0xd0
[   17.625841]  print_report+0x118/0x608
[   17.625884]  kasan_report+0xdc/0x128
[   17.625931]  __asan_report_load1_noabort+0x20/0x30
[   17.625998]  mempool_uaf_helper+0x314/0x340
[   17.626059]  mempool_slab_uaf+0xc0/0x118
[   17.626106]  kunit_try_run_case+0x170/0x3f0
[   17.626154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.626206]  kthread+0x328/0x630
[   17.626251]  ret_from_fork+0x10/0x20
[   17.626300] 
[   17.626317] Allocated by task 234:
[   17.626347]  kasan_save_stack+0x3c/0x68
[   17.626386]  kasan_save_track+0x20/0x40
[   17.626430]  kasan_save_alloc_info+0x40/0x58
[   17.626466]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.626507]  remove_element+0x16c/0x1f8
[   17.626546]  mempool_alloc_preallocated+0x58/0xc0
[   17.626587]  mempool_uaf_helper+0xa4/0x340
[   17.626624]  mempool_slab_uaf+0xc0/0x118
[   17.626658]  kunit_try_run_case+0x170/0x3f0
[   17.626700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.626747]  kthread+0x328/0x630
[   17.626782]  ret_from_fork+0x10/0x20
[   17.626815] 
[   17.626834] Freed by task 234:
[   17.626858]  kasan_save_stack+0x3c/0x68
[   17.626892]  kasan_save_track+0x20/0x40
[   17.626927]  kasan_save_free_info+0x4c/0x78
[   17.626980]  __kasan_mempool_poison_object+0xc0/0x150
[   17.627019]  mempool_free+0x28c/0x328
[   17.627056]  mempool_uaf_helper+0x104/0x340
[   17.627094]  mempool_slab_uaf+0xc0/0x118
[   17.627128]  kunit_try_run_case+0x170/0x3f0
[   17.627165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.627212]  kthread+0x328/0x630
[   17.627245]  ret_from_fork+0x10/0x20
[   17.627279] 
[   17.627299] The buggy address belongs to the object at fff00000c77fa240
[   17.627299]  which belongs to the cache test_cache of size 123
[   17.627355] The buggy address is located 0 bytes inside of
[   17.627355]  freed 123-byte region [fff00000c77fa240, fff00000c77fa2bb)
[   17.627416] 
[   17.627436] The buggy address belongs to the physical page:
[   17.627465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa
[   17.627518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.627565] page_type: f5(slab)
[   17.627606] raw: 0bfffe0000000000 fff00000c5d10b40 dead000000000122 0000000000000000
[   17.627653] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.627692] page dumped because: kasan: bad access detected
[   17.627722] 
[   17.627739] Memory state around the buggy address:
[   17.627771]  fff00000c77fa100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.627813]  fff00000c77fa180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.627855] >fff00000c77fa200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   17.627891]                                            ^
[   17.627924]  fff00000c77fa280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.627972]  fff00000c77fa300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.628021] ==================================================================
[   17.539965] ==================================================================
[   17.540047] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   17.540115] Read of size 1 at addr fff00000c638ed00 by task kunit_try_catch/230
[   17.540183] 
[   17.540224] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.540553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.540581] Hardware name: linux,dummy-virt (DT)
[   17.540732] Call trace:
[   17.540872]  show_stack+0x20/0x38 (C)
[   17.540960]  dump_stack_lvl+0x8c/0xd0
[   17.542218]  print_report+0x118/0x608
[   17.542265]  kasan_report+0xdc/0x128
[   17.542325]  __asan_report_load1_noabort+0x20/0x30
[   17.542380]  mempool_uaf_helper+0x314/0x340
[   17.542435]  mempool_kmalloc_uaf+0xc4/0x120
[   17.542482]  kunit_try_run_case+0x170/0x3f0
[   17.542531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.542584]  kthread+0x328/0x630
[   17.542627]  ret_from_fork+0x10/0x20
[   17.542709] 
[   17.542729] Allocated by task 230:
[   17.542770]  kasan_save_stack+0x3c/0x68
[   17.542810]  kasan_save_track+0x20/0x40
[   17.542846]  kasan_save_alloc_info+0x40/0x58
[   17.542908]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.543073]  remove_element+0x130/0x1f8
[   17.543160]  mempool_alloc_preallocated+0x58/0xc0
[   17.543201]  mempool_uaf_helper+0xa4/0x340
[   17.543248]  mempool_kmalloc_uaf+0xc4/0x120
[   17.543288]  kunit_try_run_case+0x170/0x3f0
[   17.543327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.543376]  kthread+0x328/0x630
[   17.543411]  ret_from_fork+0x10/0x20
[   17.543446] 
[   17.543469] Freed by task 230:
[   17.543747]  kasan_save_stack+0x3c/0x68
[   17.543826]  kasan_save_track+0x20/0x40
[   17.544074]  kasan_save_free_info+0x4c/0x78
[   17.544120]  __kasan_mempool_poison_object+0xc0/0x150
[   17.544280]  mempool_free+0x28c/0x328
[   17.544335]  mempool_uaf_helper+0x104/0x340
[   17.544661]  mempool_kmalloc_uaf+0xc4/0x120
[   17.544760]  kunit_try_run_case+0x170/0x3f0
[   17.544877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.544934]  kthread+0x328/0x630
[   17.545029]  ret_from_fork+0x10/0x20
[   17.545065] 
[   17.545084] The buggy address belongs to the object at fff00000c638ed00
[   17.545084]  which belongs to the cache kmalloc-128 of size 128
[   17.545440] The buggy address is located 0 bytes inside of
[   17.545440]  freed 128-byte region [fff00000c638ed00, fff00000c638ed80)
[   17.545682] 
[   17.545707] The buggy address belongs to the physical page:
[   17.545738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.545866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.545920] page_type: f5(slab)
[   17.545979] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.546028] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.546087] page dumped because: kasan: bad access detected
[   17.546117] 
[   17.546137] Memory state around the buggy address:
[   17.546446]  fff00000c638ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.546506]  fff00000c638ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.546745] >fff00000c638ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.546788]                    ^
[   17.547682]  fff00000c638ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.547930]  fff00000c638ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.548000] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   17.511004] ==================================================================
[   17.511086] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.511158] Read of size 1 at addr fff00000c78032bb by task kunit_try_catch/228
[   17.511208] 
[   17.511253] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.511347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.511374] Hardware name: linux,dummy-virt (DT)
[   17.511417] Call trace:
[   17.511439]  show_stack+0x20/0x38 (C)
[   17.511504]  dump_stack_lvl+0x8c/0xd0
[   17.511556]  print_report+0x118/0x608
[   17.511611]  kasan_report+0xdc/0x128
[   17.512052]  __asan_report_load1_noabort+0x20/0x30
[   17.512115]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.512165]  mempool_slab_oob_right+0xc0/0x118
[   17.512211]  kunit_try_run_case+0x170/0x3f0
[   17.512261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.512313]  kthread+0x328/0x630
[   17.512357]  ret_from_fork+0x10/0x20
[   17.512407] 
[   17.512424] Allocated by task 228:
[   17.512454]  kasan_save_stack+0x3c/0x68
[   17.512509]  kasan_save_track+0x20/0x40
[   17.512632]  kasan_save_alloc_info+0x40/0x58
[   17.512671]  __kasan_mempool_unpoison_object+0xbc/0x180
[   17.512719]  remove_element+0x16c/0x1f8
[   17.512870]  mempool_alloc_preallocated+0x58/0xc0
[   17.512938]  mempool_oob_right_helper+0x98/0x2f0
[   17.512998]  mempool_slab_oob_right+0xc0/0x118
[   17.513033]  kunit_try_run_case+0x170/0x3f0
[   17.513078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.513121]  kthread+0x328/0x630
[   17.513155]  ret_from_fork+0x10/0x20
[   17.513496] 
[   17.513521] The buggy address belongs to the object at fff00000c7803240
[   17.513521]  which belongs to the cache test_cache of size 123
[   17.513580] The buggy address is located 0 bytes to the right of
[   17.513580]  allocated 123-byte region [fff00000c7803240, fff00000c78032bb)
[   17.513642] 
[   17.513663] The buggy address belongs to the physical page:
[   17.513694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107803
[   17.513746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.513795] page_type: f5(slab)
[   17.514175] raw: 0bfffe0000000000 fff00000c5d10a00 dead000000000122 0000000000000000
[   17.514234] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   17.514278] page dumped because: kasan: bad access detected
[   17.514309] 
[   17.514326] Memory state around the buggy address:
[   17.514359]  fff00000c7803180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.514556]  fff00000c7803200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   17.514602] >fff00000c7803280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   17.514650]                                         ^
[   17.514804]  fff00000c7803300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.514879]  fff00000c7803380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.514927] ==================================================================
[   17.473773] ==================================================================
[   17.473847] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.473924] Read of size 1 at addr fff00000c638e973 by task kunit_try_catch/224
[   17.473992] 
[   17.474036] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.474124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.474159] Hardware name: linux,dummy-virt (DT)
[   17.474583] Call trace:
[   17.474610]  show_stack+0x20/0x38 (C)
[   17.474668]  dump_stack_lvl+0x8c/0xd0
[   17.474719]  print_report+0x118/0x608
[   17.474765]  kasan_report+0xdc/0x128
[   17.474808]  __asan_report_load1_noabort+0x20/0x30
[   17.474857]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.474907]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.474973]  kunit_try_run_case+0x170/0x3f0
[   17.475026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.475077]  kthread+0x328/0x630
[   17.475124]  ret_from_fork+0x10/0x20
[   17.475172] 
[   17.475191] Allocated by task 224:
[   17.475222]  kasan_save_stack+0x3c/0x68
[   17.475261]  kasan_save_track+0x20/0x40
[   17.475298]  kasan_save_alloc_info+0x40/0x58
[   17.475336]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.475378]  remove_element+0x130/0x1f8
[   17.475418]  mempool_alloc_preallocated+0x58/0xc0
[   17.475459]  mempool_oob_right_helper+0x98/0x2f0
[   17.475499]  mempool_kmalloc_oob_right+0xc4/0x120
[   17.475540]  kunit_try_run_case+0x170/0x3f0
[   17.475580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.475625]  kthread+0x328/0x630
[   17.475659]  ret_from_fork+0x10/0x20
[   17.475694] 
[   17.475715] The buggy address belongs to the object at fff00000c638e900
[   17.475715]  which belongs to the cache kmalloc-128 of size 128
[   17.475772] The buggy address is located 0 bytes to the right of
[   17.475772]  allocated 115-byte region [fff00000c638e900, fff00000c638e973)
[   17.475835] 
[   17.475857] The buggy address belongs to the physical page:
[   17.475890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   17.475955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.476008] page_type: f5(slab)
[   17.476050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.476100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.476140] page dumped because: kasan: bad access detected
[   17.476172] 
[   17.476191] Memory state around the buggy address:
[   17.476223]  fff00000c638e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.476266]  fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.476310] >fff00000c638e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.476348]                                                              ^
[   17.476388]  fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.476431]  fff00000c638ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.476470] ==================================================================
[   17.484139] ==================================================================
[   17.484221] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   17.484279] Read of size 1 at addr fff00000c791e001 by task kunit_try_catch/226
[   17.484339] 
[   17.484372] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   17.484465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.484492] Hardware name: linux,dummy-virt (DT)
[   17.484523] Call trace:
[   17.484550]  show_stack+0x20/0x38 (C)
[   17.484599]  dump_stack_lvl+0x8c/0xd0
[   17.484650]  print_report+0x118/0x608
[   17.484697]  kasan_report+0xdc/0x128
[   17.484738]  __asan_report_load1_noabort+0x20/0x30
[   17.484797]  mempool_oob_right_helper+0x2ac/0x2f0
[   17.484851]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   17.484909]  kunit_try_run_case+0x170/0x3f0
[   17.485396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.485661]  kthread+0x328/0x630
[   17.485731]  ret_from_fork+0x10/0x20
[   17.485922] 
[   17.485992] The buggy address belongs to the physical page:
[   17.486063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791c
[   17.486137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.486229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.486291] page_type: f8(unknown)
[   17.486339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.486395] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.486451] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.486748] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.486907] head: 0bfffe0000000002 ffffc1ffc31e4701 00000000ffffffff 00000000ffffffff
[   17.487204] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.487535] page dumped because: kasan: bad access detected
[   17.487573] 
[   17.487767] Memory state around the buggy address:
[   17.487803]  fff00000c791df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.488125]  fff00000c791df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.488183] >fff00000c791e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.488419]                    ^
[   17.488453]  fff00000c791e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.488512]  fff00000c791e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.488550] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   16.921264] ==================================================================
[   16.921354] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   16.921432] Read of size 1 at addr fff00000c78a73c0 by task kunit_try_catch/218
[   16.921484] 
[   16.921527] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   16.921614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.921642] Hardware name: linux,dummy-virt (DT)
[   16.921676] Call trace:
[   16.921702]  show_stack+0x20/0x38 (C)
[   16.921755]  dump_stack_lvl+0x8c/0xd0
[   16.921807]  print_report+0x118/0x608
[   16.921852]  kasan_report+0xdc/0x128
[   16.921896]  __kasan_check_byte+0x54/0x70
[   16.921941]  kmem_cache_destroy+0x34/0x218
[   16.922001]  kmem_cache_double_destroy+0x174/0x300
[   16.922051]  kunit_try_run_case+0x170/0x3f0
[   16.922101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.922183]  kthread+0x328/0x630
[   16.922229]  ret_from_fork+0x10/0x20
[   16.922279] 
[   16.922298] Allocated by task 218:
[   16.922329]  kasan_save_stack+0x3c/0x68
[   16.922368]  kasan_save_track+0x20/0x40
[   16.922403]  kasan_save_alloc_info+0x40/0x58
[   16.922445]  __kasan_slab_alloc+0xa8/0xb0
[   16.922482]  kmem_cache_alloc_noprof+0x10c/0x398
[   16.922522]  __kmem_cache_create_args+0x178/0x280
[   16.922558]  kmem_cache_double_destroy+0xc0/0x300
[   16.922599]  kunit_try_run_case+0x170/0x3f0
[   16.922638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.922682]  kthread+0x328/0x630
[   16.922716]  ret_from_fork+0x10/0x20
[   16.922753] 
[   16.922771] Freed by task 218:
[   16.922796]  kasan_save_stack+0x3c/0x68
[   16.922831]  kasan_save_track+0x20/0x40
[   16.922865]  kasan_save_free_info+0x4c/0x78
[   16.922903]  __kasan_slab_free+0x6c/0x98
[   16.922937]  kmem_cache_free+0x260/0x468
[   16.922982]  slab_kmem_cache_release+0x38/0x50
[   16.923019]  kmem_cache_release+0x1c/0x30
[   16.923058]  kobject_put+0x17c/0x420
[   16.923095]  sysfs_slab_release+0x1c/0x30
[   16.923129]  kmem_cache_destroy+0x118/0x218
[   16.923165]  kmem_cache_double_destroy+0x128/0x300
[   16.923205]  kunit_try_run_case+0x170/0x3f0
[   16.923244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.923288]  kthread+0x328/0x630
[   16.923322]  ret_from_fork+0x10/0x20
[   16.923357] 
[   16.923376] The buggy address belongs to the object at fff00000c78a73c0
[   16.923376]  which belongs to the cache kmem_cache of size 208
[   16.923432] The buggy address is located 0 bytes inside of
[   16.923432]  freed 208-byte region [fff00000c78a73c0, fff00000c78a7490)
[   16.923492] 
[   16.923513] The buggy address belongs to the physical page:
[   16.923546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a7
[   16.923597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.923650] page_type: f5(slab)
[   16.923691] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   16.923740] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   16.923782] page dumped because: kasan: bad access detected
[   16.923814] 
[   16.923831] Memory state around the buggy address:
[   16.923866]  fff00000c78a7280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.923909]  fff00000c78a7300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   16.923963] >fff00000c78a7380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   16.924001]                                            ^
[   16.924035]  fff00000c78a7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.924078]  fff00000c78a7480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.924116] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   16.826736] ==================================================================
[   16.826863] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   16.826978] Read of size 1 at addr fff00000c78ae000 by task kunit_try_catch/216
[   16.827031] 
[   16.827074] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   16.827175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.827203] Hardware name: linux,dummy-virt (DT)
[   16.827236] Call trace:
[   16.827262]  show_stack+0x20/0x38 (C)
[   16.827315]  dump_stack_lvl+0x8c/0xd0
[   16.827368]  print_report+0x118/0x608
[   16.827413]  kasan_report+0xdc/0x128
[   16.827456]  __asan_report_load1_noabort+0x20/0x30
[   16.827506]  kmem_cache_rcu_uaf+0x388/0x468
[   16.827553]  kunit_try_run_case+0x170/0x3f0
[   16.827605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.827659]  kthread+0x328/0x630
[   16.827704]  ret_from_fork+0x10/0x20
[   16.827754] 
[   16.827773] Allocated by task 216:
[   16.827802]  kasan_save_stack+0x3c/0x68
[   16.827842]  kasan_save_track+0x20/0x40
[   16.827878]  kasan_save_alloc_info+0x40/0x58
[   16.827916]  __kasan_slab_alloc+0xa8/0xb0
[   16.827963]  kmem_cache_alloc_noprof+0x10c/0x398
[   16.828004]  kmem_cache_rcu_uaf+0x12c/0x468
[   16.828044]  kunit_try_run_case+0x170/0x3f0
[   16.828082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.828126]  kthread+0x328/0x630
[   16.828163]  ret_from_fork+0x10/0x20
[   16.828201] 
[   16.828219] Freed by task 0:
[   16.828248]  kasan_save_stack+0x3c/0x68
[   16.828283]  kasan_save_track+0x20/0x40
[   16.828319]  kasan_save_free_info+0x4c/0x78
[   16.828356]  __kasan_slab_free+0x6c/0x98
[   16.828393]  slab_free_after_rcu_debug+0xd4/0x2f8
[   16.828431]  rcu_core+0x9f4/0x1e20
[   16.828467]  rcu_core_si+0x18/0x30
[   16.828499]  handle_softirqs+0x374/0xb28
[   16.828536]  __do_softirq+0x1c/0x28
[   16.828568] 
[   16.828588] Last potentially related work creation:
[   16.828615]  kasan_save_stack+0x3c/0x68
[   16.828651]  kasan_record_aux_stack+0xb4/0xc8
[   16.828690]  kmem_cache_free+0x120/0x468
[   16.828724]  kmem_cache_rcu_uaf+0x16c/0x468
[   16.828763]  kunit_try_run_case+0x170/0x3f0
[   16.828801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.828846]  kthread+0x328/0x630
[   16.828883]  ret_from_fork+0x10/0x20
[   16.828918] 
[   16.828938] The buggy address belongs to the object at fff00000c78ae000
[   16.828938]  which belongs to the cache test_cache of size 200
[   16.829004] The buggy address is located 0 bytes inside of
[   16.829004]  freed 200-byte region [fff00000c78ae000, fff00000c78ae0c8)
[   16.829065] 
[   16.829086] The buggy address belongs to the physical page:
[   16.829119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ae
[   16.829174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.829227] page_type: f5(slab)
[   16.829268] raw: 0bfffe0000000000 fff00000c78a7280 dead000000000122 0000000000000000
[   16.829318] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   16.829358] page dumped because: kasan: bad access detected
[   16.829390] 
[   16.829407] Memory state around the buggy address:
[   16.829440]  fff00000c78adf00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   16.829485]  fff00000c78adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.829528] >fff00000c78ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.829568]                    ^
[   16.829595]  fff00000c78ae080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   16.829637]  fff00000c78ae100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.829677] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   16.332567] ==================================================================
[   16.332695] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   16.332757] Free of addr fff00000c78ad001 by task kunit_try_catch/214
[   16.332798] 
[   16.332830] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   16.333149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.333228] Hardware name: linux,dummy-virt (DT)
[   16.333264] Call trace:
[   16.333300]  show_stack+0x20/0x38 (C)
[   16.333352]  dump_stack_lvl+0x8c/0xd0
[   16.333403]  print_report+0x118/0x608
[   16.333446]  kasan_report_invalid_free+0xc0/0xe8
[   16.333513]  check_slab_allocation+0xfc/0x108
[   16.333559]  __kasan_slab_pre_free+0x2c/0x48
[   16.333605]  kmem_cache_free+0xf0/0x468
[   16.333770]  kmem_cache_invalid_free+0x184/0x3c8
[   16.333842]  kunit_try_run_case+0x170/0x3f0
[   16.333894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.333958]  kthread+0x328/0x630
[   16.334033]  ret_from_fork+0x10/0x20
[   16.334120] 
[   16.334207] Allocated by task 214:
[   16.334363]  kasan_save_stack+0x3c/0x68
[   16.334550]  kasan_save_track+0x20/0x40
[   16.334742]  kasan_save_alloc_info+0x40/0x58
[   16.334778]  __kasan_slab_alloc+0xa8/0xb0
[   16.334829]  kmem_cache_alloc_noprof+0x10c/0x398
[   16.334868]  kmem_cache_invalid_free+0x12c/0x3c8
[   16.335077]  kunit_try_run_case+0x170/0x3f0
[   16.335166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.335211]  kthread+0x328/0x630
[   16.335499]  ret_from_fork+0x10/0x20
[   16.335585] 
[   16.335643] The buggy address belongs to the object at fff00000c78ad000
[   16.335643]  which belongs to the cache test_cache of size 200
[   16.335701] The buggy address is located 1 bytes inside of
[   16.335701]  200-byte region [fff00000c78ad000, fff00000c78ad0c8)
[   16.335844] 
[   16.335982] The buggy address belongs to the physical page:
[   16.336070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ad
[   16.336125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.336394] page_type: f5(slab)
[   16.336438] raw: 0bfffe0000000000 fff00000c78a7140 dead000000000122 0000000000000000
[   16.336554] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   16.336665] page dumped because: kasan: bad access detected
[   16.336696] 
[   16.336714] Memory state around the buggy address:
[   16.336756]  fff00000c78acf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.336820]  fff00000c78acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.336863] >fff00000c78ad000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.336910]                    ^
[   16.336943]  fff00000c78ad080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   16.337024]  fff00000c78ad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.337082] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   16.308522] ==================================================================
[   16.308586] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   16.308708] Free of addr fff00000c78a9000 by task kunit_try_catch/212
[   16.308799] 
[   16.308847] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   16.308931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.308973] Hardware name: linux,dummy-virt (DT)
[   16.309093] Call trace:
[   16.309255]  show_stack+0x20/0x38 (C)
[   16.309328]  dump_stack_lvl+0x8c/0xd0
[   16.309381]  print_report+0x118/0x608
[   16.309436]  kasan_report_invalid_free+0xc0/0xe8
[   16.309580]  check_slab_allocation+0xd4/0x108
[   16.309647]  __kasan_slab_pre_free+0x2c/0x48
[   16.309691]  kmem_cache_free+0xf0/0x468
[   16.309736]  kmem_cache_double_free+0x190/0x3c8
[   16.309829]  kunit_try_run_case+0x170/0x3f0
[   16.309882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.309936]  kthread+0x328/0x630
[   16.310007]  ret_from_fork+0x10/0x20
[   16.310056] 
[   16.310073] Allocated by task 212:
[   16.310130]  kasan_save_stack+0x3c/0x68
[   16.310482]  kasan_save_track+0x20/0x40
[   16.310625]  kasan_save_alloc_info+0x40/0x58
[   16.310712]  __kasan_slab_alloc+0xa8/0xb0
[   16.310819]  kmem_cache_alloc_noprof+0x10c/0x398
[   16.310882]  kmem_cache_double_free+0x12c/0x3c8
[   16.310922]  kunit_try_run_case+0x170/0x3f0
[   16.310969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.311032]  kthread+0x328/0x630
[   16.311066]  ret_from_fork+0x10/0x20
[   16.311103] 
[   16.311121] Freed by task 212:
[   16.311146]  kasan_save_stack+0x3c/0x68
[   16.311182]  kasan_save_track+0x20/0x40
[   16.311217]  kasan_save_free_info+0x4c/0x78
[   16.311254]  __kasan_slab_free+0x6c/0x98
[   16.311288]  kmem_cache_free+0x260/0x468
[   16.311321]  kmem_cache_double_free+0x140/0x3c8
[   16.311362]  kunit_try_run_case+0x170/0x3f0
[   16.311400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.311527]  kthread+0x328/0x630
[   16.311657]  ret_from_fork+0x10/0x20
[   16.311817] 
[   16.312046] The buggy address belongs to the object at fff00000c78a9000
[   16.312046]  which belongs to the cache test_cache of size 200
[   16.312106] The buggy address is located 0 bytes inside of
[   16.312106]  200-byte region [fff00000c78a9000, fff00000c78a90c8)
[   16.312230] 
[   16.312405] The buggy address belongs to the physical page:
[   16.312502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a9
[   16.312557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.312764] page_type: f5(slab)
[   16.313044] raw: 0bfffe0000000000 fff00000c78a7000 dead000000000122 0000000000000000
[   16.313265] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   16.313332] page dumped because: kasan: bad access detected
[   16.313364] 
[   16.313380] Memory state around the buggy address:
[   16.313413]  fff00000c78a8f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   16.313712]  fff00000c78a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.313936] >fff00000c78a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.314082]                    ^
[   16.314262]  fff00000c78a9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   16.314304]  fff00000c78a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314542] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   16.057789] ==================================================================
[   16.058339] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   16.058408] Read of size 1 at addr fff00000c78a70c8 by task kunit_try_catch/210
[   16.058489] 
[   16.058538] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   16.058623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.058650] Hardware name: linux,dummy-virt (DT)
[   16.058684] Call trace:
[   16.058710]  show_stack+0x20/0x38 (C)
[   16.058763]  dump_stack_lvl+0x8c/0xd0
[   16.058860]  print_report+0x118/0x608
[   16.058906]  kasan_report+0xdc/0x128
[   16.059020]  __asan_report_load1_noabort+0x20/0x30
[   16.059070]  kmem_cache_oob+0x344/0x430
[   16.059118]  kunit_try_run_case+0x170/0x3f0
[   16.059167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.059220]  kthread+0x328/0x630
[   16.059290]  ret_from_fork+0x10/0x20
[   16.059336] 
[   16.059354] Allocated by task 210:
[   16.059383]  kasan_save_stack+0x3c/0x68
[   16.059423]  kasan_save_track+0x20/0x40
[   16.059458]  kasan_save_alloc_info+0x40/0x58
[   16.059495]  __kasan_slab_alloc+0xa8/0xb0
[   16.059529]  kmem_cache_alloc_noprof+0x10c/0x398
[   16.059570]  kmem_cache_oob+0x12c/0x430
[   16.059606]  kunit_try_run_case+0x170/0x3f0
[   16.059644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.059814]  kthread+0x328/0x630
[   16.059868]  ret_from_fork+0x10/0x20
[   16.059966] 
[   16.060028] The buggy address belongs to the object at fff00000c78a7000
[   16.060028]  which belongs to the cache test_cache of size 200
[   16.060095] The buggy address is located 0 bytes to the right of
[   16.060095]  allocated 200-byte region [fff00000c78a7000, fff00000c78a70c8)
[   16.060163] 
[   16.060518] The buggy address belongs to the physical page:
[   16.060658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a7
[   16.060768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.060842] page_type: f5(slab)
[   16.060883] raw: 0bfffe0000000000 fff00000c114bdc0 dead000000000122 0000000000000000
[   16.060933] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   16.060981] page dumped because: kasan: bad access detected
[   16.061012] 
[   16.061029] Memory state around the buggy address:
[   16.061061]  fff00000c78a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.061105]  fff00000c78a7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.061165] >fff00000c78a7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   16.061204]                                               ^
[   16.061239]  fff00000c78a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.061281]  fff00000c78a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.061319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   16.017251] ==================================================================
[   16.017388] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   16.017516] Read of size 8 at addr fff00000c65c5580 by task kunit_try_catch/203
[   16.017902] 
[   16.018026] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   16.018113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.018140] Hardware name: linux,dummy-virt (DT)
[   16.018370] Call trace:
[   16.018411]  show_stack+0x20/0x38 (C)
[   16.018470]  dump_stack_lvl+0x8c/0xd0
[   16.018752]  print_report+0x118/0x608
[   16.018811]  kasan_report+0xdc/0x128
[   16.018854]  __asan_report_load8_noabort+0x20/0x30
[   16.018903]  workqueue_uaf+0x480/0x4a8
[   16.019622]  kunit_try_run_case+0x170/0x3f0
[   16.019710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.019788]  kthread+0x328/0x630
[   16.019835]  ret_from_fork+0x10/0x20
[   16.019882] 
[   16.019902] Allocated by task 203:
[   16.019930]  kasan_save_stack+0x3c/0x68
[   16.019979]  kasan_save_track+0x20/0x40
[   16.020014]  kasan_save_alloc_info+0x40/0x58
[   16.020053]  __kasan_kmalloc+0xd4/0xd8
[   16.020090]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.020129]  workqueue_uaf+0x13c/0x4a8
[   16.020166]  kunit_try_run_case+0x170/0x3f0
[   16.021494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.021728]  kthread+0x328/0x630
[   16.021770]  ret_from_fork+0x10/0x20
[   16.021807] 
[   16.021826] Freed by task 51:
[   16.021854]  kasan_save_stack+0x3c/0x68
[   16.022504]  kasan_save_track+0x20/0x40
[   16.022592]  kasan_save_free_info+0x4c/0x78
[   16.022787]  __kasan_slab_free+0x6c/0x98
[   16.022838]  kfree+0x214/0x3c8
[   16.022869]  workqueue_uaf_work+0x18/0x30
[   16.022906]  process_one_work+0x530/0xf98
[   16.023538]  worker_thread+0x618/0xf38
[   16.023621]  kthread+0x328/0x630
[   16.023659]  ret_from_fork+0x10/0x20
[   16.023834] 
[   16.024031] Last potentially related work creation:
[   16.024065]  kasan_save_stack+0x3c/0x68
[   16.024191]  kasan_record_aux_stack+0xb4/0xc8
[   16.024594]  __queue_work+0x65c/0x1008
[   16.024856]  queue_work_on+0xbc/0xf8
[   16.025170]  workqueue_uaf+0x210/0x4a8
[   16.025335]  kunit_try_run_case+0x170/0x3f0
[   16.025812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.025906]  kthread+0x328/0x630
[   16.025941]  ret_from_fork+0x10/0x20
[   16.025986] 
[   16.026006] The buggy address belongs to the object at fff00000c65c5580
[   16.026006]  which belongs to the cache kmalloc-32 of size 32
[   16.026066] The buggy address is located 0 bytes inside of
[   16.026066]  freed 32-byte region [fff00000c65c5580, fff00000c65c55a0)
[   16.026125] 
[   16.026148] The buggy address belongs to the physical page:
[   16.026688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   16.026821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.026875] page_type: f5(slab)
[   16.027107] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   16.027666] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.027880] page dumped because: kasan: bad access detected
[   16.027944] 
[   16.027972] Memory state around the buggy address:
[   16.028007]  fff00000c65c5480: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   16.028529]  fff00000c65c5500: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   16.028581] >fff00000c65c5580: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.028743]                    ^
[   16.028801]  fff00000c65c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.029227]  fff00000c65c5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.029270] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   15.958504] ==================================================================
[   15.959877] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   15.960598] Read of size 4 at addr fff00000c65c5380 by task swapper/1/0
[   15.961553] 
[   15.961669] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.961755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.961782] Hardware name: linux,dummy-virt (DT)
[   15.961814] Call trace:
[   15.962729]  show_stack+0x20/0x38 (C)
[   15.963434]  dump_stack_lvl+0x8c/0xd0
[   15.963861]  print_report+0x118/0x608
[   15.964342]  kasan_report+0xdc/0x128
[   15.964812]  __asan_report_load4_noabort+0x20/0x30
[   15.965355]  rcu_uaf_reclaim+0x64/0x70
[   15.966165]  rcu_core+0x9f4/0x1e20
[   15.966580]  rcu_core_si+0x18/0x30
[   15.966653]  handle_softirqs+0x374/0xb28
[   15.966700]  __do_softirq+0x1c/0x28
[   15.966742]  ____do_softirq+0x18/0x30
[   15.966784]  call_on_irq_stack+0x24/0x30
[   15.966829]  do_softirq_own_stack+0x24/0x38
[   15.968226]  __irq_exit_rcu+0x1fc/0x318
[   15.969023]  irq_exit_rcu+0x1c/0x80
[   15.969316]  el1_interrupt+0x38/0x58
[   15.969701]  el1h_64_irq_handler+0x18/0x28
[   15.969752]  el1h_64_irq+0x6c/0x70
[   15.971315]  arch_local_irq_enable+0x4/0x8 (P)
[   15.971580]  do_idle+0x384/0x4e8
[   15.972093]  cpu_startup_entry+0x68/0x80
[   15.972151]  secondary_start_kernel+0x288/0x340
[   15.972541]  __secondary_switched+0xc0/0xc8
[   15.973211] 
[   15.973237] Allocated by task 201:
[   15.973892]  kasan_save_stack+0x3c/0x68
[   15.974193]  kasan_save_track+0x20/0x40
[   15.974228]  kasan_save_alloc_info+0x40/0x58
[   15.974267]  __kasan_kmalloc+0xd4/0xd8
[   15.974301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.974855]  rcu_uaf+0xb0/0x2d8
[   15.975460]  kunit_try_run_case+0x170/0x3f0
[   15.975562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.975608]  kthread+0x328/0x630
[   15.975644]  ret_from_fork+0x10/0x20
[   15.975682] 
[   15.975702] Freed by task 0:
[   15.975728]  kasan_save_stack+0x3c/0x68
[   15.975765]  kasan_save_track+0x20/0x40
[   15.977126]  kasan_save_free_info+0x4c/0x78
[   15.977619]  __kasan_slab_free+0x6c/0x98
[   15.978210]  kfree+0x214/0x3c8
[   15.978255]  rcu_uaf_reclaim+0x28/0x70
[   15.978431]  rcu_core+0x9f4/0x1e20
[   15.978759]  rcu_core_si+0x18/0x30
[   15.979339]  handle_softirqs+0x374/0xb28
[   15.979391]  __do_softirq+0x1c/0x28
[   15.980011] 
[   15.980322] Last potentially related work creation:
[   15.980367]  kasan_save_stack+0x3c/0x68
[   15.980417]  kasan_record_aux_stack+0xb4/0xc8
[   15.981775]  __call_rcu_common.constprop.0+0x70/0x8b0
[   15.981905]  call_rcu+0x18/0x30
[   15.981960]  rcu_uaf+0x14c/0x2d8
[   15.981996]  kunit_try_run_case+0x170/0x3f0
[   15.982035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.983085]  kthread+0x328/0x630
[   15.983195]  ret_from_fork+0x10/0x20
[   15.983576] 
[   15.983619] The buggy address belongs to the object at fff00000c65c5380
[   15.983619]  which belongs to the cache kmalloc-32 of size 32
[   15.984355] The buggy address is located 0 bytes inside of
[   15.984355]  freed 32-byte region [fff00000c65c5380, fff00000c65c53a0)
[   15.985071] 
[   15.985251] The buggy address belongs to the physical page:
[   15.985370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5
[   15.985557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.986198] page_type: f5(slab)
[   15.986493] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   15.987649] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   15.987884] page dumped because: kasan: bad access detected
[   15.988585] 
[   15.988718] Memory state around the buggy address:
[   15.988769]  fff00000c65c5280: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   15.988999]  fff00000c65c5300: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   15.989202] >fff00000c65c5380: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   15.989284]                    ^
[   15.989379]  fff00000c65c5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.989823]  fff00000c65c5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.989865] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   15.844758] ==================================================================
[   15.844812] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   15.845068] Read of size 1 at addr fff00000c7811700 by task kunit_try_catch/199
[   15.845161] 
[   15.845206] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.845635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.845666] Hardware name: linux,dummy-virt (DT)
[   15.845963] Call trace:
[   15.846000]  show_stack+0x20/0x38 (C)
[   15.846052]  dump_stack_lvl+0x8c/0xd0
[   15.846097]  print_report+0x118/0x608
[   15.846550]  kasan_report+0xdc/0x128
[   15.846630]  __asan_report_load1_noabort+0x20/0x30
[   15.847100]  ksize_uaf+0x598/0x5f8
[   15.847178]  kunit_try_run_case+0x170/0x3f0
[   15.847387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.847612]  kthread+0x328/0x630
[   15.847695]  ret_from_fork+0x10/0x20
[   15.847848] 
[   15.847917] Allocated by task 199:
[   15.848143]  kasan_save_stack+0x3c/0x68
[   15.848183]  kasan_save_track+0x20/0x40
[   15.848420]  kasan_save_alloc_info+0x40/0x58
[   15.848594]  __kasan_kmalloc+0xd4/0xd8
[   15.848695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.848811]  ksize_uaf+0xb8/0x5f8
[   15.848997]  kunit_try_run_case+0x170/0x3f0
[   15.849099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.849288]  kthread+0x328/0x630
[   15.849560]  ret_from_fork+0x10/0x20
[   15.849723] 
[   15.849775] Freed by task 199:
[   15.849902]  kasan_save_stack+0x3c/0x68
[   15.850004]  kasan_save_track+0x20/0x40
[   15.850040]  kasan_save_free_info+0x4c/0x78
[   15.850314]  __kasan_slab_free+0x6c/0x98
[   15.850602]  kfree+0x214/0x3c8
[   15.850842]  ksize_uaf+0x11c/0x5f8
[   15.851019]  kunit_try_run_case+0x170/0x3f0
[   15.851143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.851250]  kthread+0x328/0x630
[   15.851322]  ret_from_fork+0x10/0x20
[   15.851477] 
[   15.851546] The buggy address belongs to the object at fff00000c7811700
[   15.851546]  which belongs to the cache kmalloc-128 of size 128
[   15.851840] The buggy address is located 0 bytes inside of
[   15.851840]  freed 128-byte region [fff00000c7811700, fff00000c7811780)
[   15.852065] 
[   15.852114] The buggy address belongs to the physical page:
[   15.852174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.852318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.852425] page_type: f5(slab)
[   15.852585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.852647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.852818] page dumped because: kasan: bad access detected
[   15.853031] 
[   15.853084] Memory state around the buggy address:
[   15.853190]  fff00000c7811600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.853237]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.853280] >fff00000c7811700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.853318]                    ^
[   15.853357]  fff00000c7811780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.853400]  fff00000c7811800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.853438] ==================================================================
[   15.853939] ==================================================================
[   15.854003] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   15.854050] Read of size 1 at addr fff00000c7811778 by task kunit_try_catch/199
[   15.854294] 
[   15.854688] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.854785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.854876] Hardware name: linux,dummy-virt (DT)
[   15.854965] Call trace:
[   15.854998]  show_stack+0x20/0x38 (C)
[   15.855217]  dump_stack_lvl+0x8c/0xd0
[   15.855326]  print_report+0x118/0x608
[   15.855457]  kasan_report+0xdc/0x128
[   15.855525]  __asan_report_load1_noabort+0x20/0x30
[   15.855677]  ksize_uaf+0x544/0x5f8
[   15.855745]  kunit_try_run_case+0x170/0x3f0
[   15.856029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.856231]  kthread+0x328/0x630
[   15.856360]  ret_from_fork+0x10/0x20
[   15.856487] 
[   15.856505] Allocated by task 199:
[   15.856740]  kasan_save_stack+0x3c/0x68
[   15.856920]  kasan_save_track+0x20/0x40
[   15.857517]  kasan_save_alloc_info+0x40/0x58
[   15.857714]  __kasan_kmalloc+0xd4/0xd8
[   15.857904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.858079]  ksize_uaf+0xb8/0x5f8
[   15.858145]  kunit_try_run_case+0x170/0x3f0
[   15.858241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.858309]  kthread+0x328/0x630
[   15.858346]  ret_from_fork+0x10/0x20
[   15.858382] 
[   15.858402] Freed by task 199:
[   15.858434]  kasan_save_stack+0x3c/0x68
[   15.858655]  kasan_save_track+0x20/0x40
[   15.858830]  kasan_save_free_info+0x4c/0x78
[   15.858997]  __kasan_slab_free+0x6c/0x98
[   15.859127]  kfree+0x214/0x3c8
[   15.859187]  ksize_uaf+0x11c/0x5f8
[   15.859332]  kunit_try_run_case+0x170/0x3f0
[   15.859372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.859582]  kthread+0x328/0x630
[   15.859843]  ret_from_fork+0x10/0x20
[   15.859905] 
[   15.860034] The buggy address belongs to the object at fff00000c7811700
[   15.860034]  which belongs to the cache kmalloc-128 of size 128
[   15.860152] The buggy address is located 120 bytes inside of
[   15.860152]  freed 128-byte region [fff00000c7811700, fff00000c7811780)
[   15.860465] 
[   15.860527] The buggy address belongs to the physical page:
[   15.860794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.860933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.861039] page_type: f5(slab)
[   15.861166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.861687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.861775] page dumped because: kasan: bad access detected
[   15.861919] 
[   15.862009] Memory state around the buggy address:
[   15.862069]  fff00000c7811600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.862457]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.862621] >fff00000c7811700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.862787]                                                                 ^
[   15.862871]  fff00000c7811780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.862926]  fff00000c7811800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863102] ==================================================================
[   15.835178] ==================================================================
[   15.835240] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   15.836202] Read of size 1 at addr fff00000c7811700 by task kunit_try_catch/199
[   15.836300] 
[   15.836360] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.836448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.836475] Hardware name: linux,dummy-virt (DT)
[   15.836504] Call trace:
[   15.836528]  show_stack+0x20/0x38 (C)
[   15.836933]  dump_stack_lvl+0x8c/0xd0
[   15.837214]  print_report+0x118/0x608
[   15.837259]  kasan_report+0xdc/0x128
[   15.837305]  __kasan_check_byte+0x54/0x70
[   15.837349]  ksize+0x30/0x88
[   15.837785]  ksize_uaf+0x168/0x5f8
[   15.837882]  kunit_try_run_case+0x170/0x3f0
[   15.837933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.838692]  kthread+0x328/0x630
[   15.838811]  ret_from_fork+0x10/0x20
[   15.838911] 
[   15.838974] Allocated by task 199:
[   15.839097]  kasan_save_stack+0x3c/0x68
[   15.839256]  kasan_save_track+0x20/0x40
[   15.839640]  kasan_save_alloc_info+0x40/0x58
[   15.839824]  __kasan_kmalloc+0xd4/0xd8
[   15.839882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.839930]  ksize_uaf+0xb8/0x5f8
[   15.840014]  kunit_try_run_case+0x170/0x3f0
[   15.840056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.840103]  kthread+0x328/0x630
[   15.840137]  ret_from_fork+0x10/0x20
[   15.840182] 
[   15.840223] Freed by task 199:
[   15.840259]  kasan_save_stack+0x3c/0x68
[   15.840296]  kasan_save_track+0x20/0x40
[   15.840336]  kasan_save_free_info+0x4c/0x78
[   15.840384]  __kasan_slab_free+0x6c/0x98
[   15.840418]  kfree+0x214/0x3c8
[   15.840459]  ksize_uaf+0x11c/0x5f8
[   15.840493]  kunit_try_run_case+0x170/0x3f0
[   15.840532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.840573]  kthread+0x328/0x630
[   15.840618]  ret_from_fork+0x10/0x20
[   15.840652] 
[   15.840670] The buggy address belongs to the object at fff00000c7811700
[   15.840670]  which belongs to the cache kmalloc-128 of size 128
[   15.840727] The buggy address is located 0 bytes inside of
[   15.840727]  freed 128-byte region [fff00000c7811700, fff00000c7811780)
[   15.840785] 
[   15.840805] The buggy address belongs to the physical page:
[   15.840849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.840908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.841626] page_type: f5(slab)
[   15.841705] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.841778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.842125] page dumped because: kasan: bad access detected
[   15.842190] 
[   15.842406] Memory state around the buggy address:
[   15.842574]  fff00000c7811600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.842663]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842707] >fff00000c7811700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.842746]                    ^
[   15.842937]  fff00000c7811780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.843258]  fff00000c7811800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.843472] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   15.821545] ==================================================================
[   15.821595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   15.821685] Read of size 1 at addr fff00000c781167f by task kunit_try_catch/197
[   15.821737] 
[   15.821766] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.821848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.821913] Hardware name: linux,dummy-virt (DT)
[   15.821943] Call trace:
[   15.821978]  show_stack+0x20/0x38 (C)
[   15.822024]  dump_stack_lvl+0x8c/0xd0
[   15.822075]  print_report+0x118/0x608
[   15.822119]  kasan_report+0xdc/0x128
[   15.822164]  __asan_report_load1_noabort+0x20/0x30
[   15.822212]  ksize_unpoisons_memory+0x690/0x740
[   15.822265]  kunit_try_run_case+0x170/0x3f0
[   15.822322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.822385]  kthread+0x328/0x630
[   15.822441]  ret_from_fork+0x10/0x20
[   15.822486] 
[   15.822512] Allocated by task 197:
[   15.822541]  kasan_save_stack+0x3c/0x68
[   15.822577]  kasan_save_track+0x20/0x40
[   15.822621]  kasan_save_alloc_info+0x40/0x58
[   15.822666]  __kasan_kmalloc+0xd4/0xd8
[   15.822710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.822747]  ksize_unpoisons_memory+0xc0/0x740
[   15.822786]  kunit_try_run_case+0x170/0x3f0
[   15.822824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.822867]  kthread+0x328/0x630
[   15.822900]  ret_from_fork+0x10/0x20
[   15.822933] 
[   15.823387] The buggy address belongs to the object at fff00000c7811600
[   15.823387]  which belongs to the cache kmalloc-128 of size 128
[   15.823763] The buggy address is located 12 bytes to the right of
[   15.823763]  allocated 115-byte region [fff00000c7811600, fff00000c7811673)
[   15.823879] 
[   15.824037] The buggy address belongs to the physical page:
[   15.824357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.824445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.824700] page_type: f5(slab)
[   15.824808] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.824942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.825057] page dumped because: kasan: bad access detected
[   15.825125] 
[   15.825144] Memory state around the buggy address:
[   15.825428]  fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.825673]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.825767] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.825920]                                                                 ^
[   15.826006]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826341]  fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.826497] ==================================================================
[   15.803291] ==================================================================
[   15.803354] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   15.803534] Read of size 1 at addr fff00000c7811673 by task kunit_try_catch/197
[   15.803585] 
[   15.803663] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.803784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.803989] Hardware name: linux,dummy-virt (DT)
[   15.804137] Call trace:
[   15.804250]  show_stack+0x20/0x38 (C)
[   15.804321]  dump_stack_lvl+0x8c/0xd0
[   15.804440]  print_report+0x118/0x608
[   15.804535]  kasan_report+0xdc/0x128
[   15.804582]  __asan_report_load1_noabort+0x20/0x30
[   15.804836]  ksize_unpoisons_memory+0x628/0x740
[   15.804908]  kunit_try_run_case+0x170/0x3f0
[   15.804968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.805022]  kthread+0x328/0x630
[   15.805217]  ret_from_fork+0x10/0x20
[   15.805280] 
[   15.805297] Allocated by task 197:
[   15.805355]  kasan_save_stack+0x3c/0x68
[   15.805732]  kasan_save_track+0x20/0x40
[   15.805896]  kasan_save_alloc_info+0x40/0x58
[   15.805940]  __kasan_kmalloc+0xd4/0xd8
[   15.806006]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.806140]  ksize_unpoisons_memory+0xc0/0x740
[   15.806271]  kunit_try_run_case+0x170/0x3f0
[   15.806482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.806752]  kthread+0x328/0x630
[   15.806814]  ret_from_fork+0x10/0x20
[   15.807549] 
[   15.807620] The buggy address belongs to the object at fff00000c7811600
[   15.807620]  which belongs to the cache kmalloc-128 of size 128
[   15.807726] The buggy address is located 0 bytes to the right of
[   15.807726]  allocated 115-byte region [fff00000c7811600, fff00000c7811673)
[   15.807866] 
[   15.807887] The buggy address belongs to the physical page:
[   15.808133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.808254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.808514] page_type: f5(slab)
[   15.808564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.808729] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.809447] page dumped because: kasan: bad access detected
[   15.809534] 
[   15.809636] Memory state around the buggy address:
[   15.809734]  fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.810059]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810351] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.810591]                                                              ^
[   15.810667]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810722]  fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810759] ==================================================================
[   15.812357] ==================================================================
[   15.812657] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   15.812726] Read of size 1 at addr fff00000c7811678 by task kunit_try_catch/197
[   15.812934] 
[   15.813098] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.813191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.813415] Hardware name: linux,dummy-virt (DT)
[   15.813616] Call trace:
[   15.813652]  show_stack+0x20/0x38 (C)
[   15.813728]  dump_stack_lvl+0x8c/0xd0
[   15.813778]  print_report+0x118/0x608
[   15.813822]  kasan_report+0xdc/0x128
[   15.813864]  __asan_report_load1_noabort+0x20/0x30
[   15.813913]  ksize_unpoisons_memory+0x618/0x740
[   15.813987]  kunit_try_run_case+0x170/0x3f0
[   15.814035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.814088]  kthread+0x328/0x630
[   15.814132]  ret_from_fork+0x10/0x20
[   15.814384] 
[   15.814583] Allocated by task 197:
[   15.815267]  kasan_save_stack+0x3c/0x68
[   15.815448]  kasan_save_track+0x20/0x40
[   15.815487]  kasan_save_alloc_info+0x40/0x58
[   15.815559]  __kasan_kmalloc+0xd4/0xd8
[   15.815983]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.816083]  ksize_unpoisons_memory+0xc0/0x740
[   15.816185]  kunit_try_run_case+0x170/0x3f0
[   15.816471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.816641]  kthread+0x328/0x630
[   15.816970]  ret_from_fork+0x10/0x20
[   15.817108] 
[   15.817198] The buggy address belongs to the object at fff00000c7811600
[   15.817198]  which belongs to the cache kmalloc-128 of size 128
[   15.817328] The buggy address is located 5 bytes to the right of
[   15.817328]  allocated 115-byte region [fff00000c7811600, fff00000c7811673)
[   15.817682] 
[   15.817821] The buggy address belongs to the physical page:
[   15.818049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.818298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.818677] page_type: f5(slab)
[   15.818879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.819204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.819279] page dumped because: kasan: bad access detected
[   15.819422] 
[   15.819442] Memory state around the buggy address:
[   15.819661]  fff00000c7811500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.819756]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820092] >fff00000c7811600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.820177]                                                                 ^
[   15.820325]  fff00000c7811680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820416]  fff00000c7811700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820573] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   15.779594] ==================================================================
[   15.779668] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   15.779717] Free of addr fff00000c55f0940 by task kunit_try_catch/195
[   15.780089] 
[   15.780141] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.780572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.780618] Hardware name: linux,dummy-virt (DT)
[   15.780954] Call trace:
[   15.781082]  show_stack+0x20/0x38 (C)
[   15.781139]  dump_stack_lvl+0x8c/0xd0
[   15.781205]  print_report+0x118/0x608
[   15.781259]  kasan_report_invalid_free+0xc0/0xe8
[   15.781610]  check_slab_allocation+0xd4/0x108
[   15.781732]  __kasan_slab_pre_free+0x2c/0x48
[   15.781984]  kfree+0xe8/0x3c8
[   15.782331]  kfree_sensitive+0x3c/0xb0
[   15.782541]  kmalloc_double_kzfree+0x168/0x308
[   15.782668]  kunit_try_run_case+0x170/0x3f0
[   15.782831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.782888]  kthread+0x328/0x630
[   15.783072]  ret_from_fork+0x10/0x20
[   15.783260] 
[   15.783387] Allocated by task 195:
[   15.783779]  kasan_save_stack+0x3c/0x68
[   15.783965]  kasan_save_track+0x20/0x40
[   15.784365]  kasan_save_alloc_info+0x40/0x58
[   15.784627]  __kasan_kmalloc+0xd4/0xd8
[   15.784669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.784957]  kmalloc_double_kzfree+0xb8/0x308
[   15.785202]  kunit_try_run_case+0x170/0x3f0
[   15.785313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.785361]  kthread+0x328/0x630
[   15.785572]  ret_from_fork+0x10/0x20
[   15.785895] 
[   15.785930] Freed by task 195:
[   15.786198]  kasan_save_stack+0x3c/0x68
[   15.786297]  kasan_save_track+0x20/0x40
[   15.786334]  kasan_save_free_info+0x4c/0x78
[   15.786382]  __kasan_slab_free+0x6c/0x98
[   15.786418]  kfree+0x214/0x3c8
[   15.786454]  kfree_sensitive+0x80/0xb0
[   15.786490]  kmalloc_double_kzfree+0x11c/0x308
[   15.787140]  kunit_try_run_case+0x170/0x3f0
[   15.787280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.787435]  kthread+0x328/0x630
[   15.787518]  ret_from_fork+0x10/0x20
[   15.787591] 
[   15.787741] The buggy address belongs to the object at fff00000c55f0940
[   15.787741]  which belongs to the cache kmalloc-16 of size 16
[   15.787983] The buggy address is located 0 bytes inside of
[   15.787983]  16-byte region [fff00000c55f0940, fff00000c55f0950)
[   15.788134] 
[   15.788223] The buggy address belongs to the physical page:
[   15.788263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0
[   15.788315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.788398] page_type: f5(slab)
[   15.788446] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.788505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.788554] page dumped because: kasan: bad access detected
[   15.788600] 
[   15.788620] Memory state around the buggy address:
[   15.788652]  fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.788694]  fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.788736] >fff00000c55f0900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   15.788773]                                            ^
[   15.788818]  fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.788860]  fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.788899] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   15.768806] ==================================================================
[   15.769261] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   15.769477] Read of size 1 at addr fff00000c55f0940 by task kunit_try_catch/195
[   15.769588] 
[   15.769633] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.769716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.770159] Hardware name: linux,dummy-virt (DT)
[   15.770217] Call trace:
[   15.770502]  show_stack+0x20/0x38 (C)
[   15.770566]  dump_stack_lvl+0x8c/0xd0
[   15.770615]  print_report+0x118/0x608
[   15.770658]  kasan_report+0xdc/0x128
[   15.770701]  __kasan_check_byte+0x54/0x70
[   15.770983]  kfree_sensitive+0x30/0xb0
[   15.771345]  kmalloc_double_kzfree+0x168/0x308
[   15.771462]  kunit_try_run_case+0x170/0x3f0
[   15.771579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.771729]  kthread+0x328/0x630
[   15.771817]  ret_from_fork+0x10/0x20
[   15.772068] 
[   15.772130] Allocated by task 195:
[   15.772162]  kasan_save_stack+0x3c/0x68
[   15.772570]  kasan_save_track+0x20/0x40
[   15.772704]  kasan_save_alloc_info+0x40/0x58
[   15.772884]  __kasan_kmalloc+0xd4/0xd8
[   15.773051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.773271]  kmalloc_double_kzfree+0xb8/0x308
[   15.773318]  kunit_try_run_case+0x170/0x3f0
[   15.773490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.773973]  kthread+0x328/0x630
[   15.774058]  ret_from_fork+0x10/0x20
[   15.774224] 
[   15.774301] Freed by task 195:
[   15.774332]  kasan_save_stack+0x3c/0x68
[   15.774569]  kasan_save_track+0x20/0x40
[   15.774699]  kasan_save_free_info+0x4c/0x78
[   15.774778]  __kasan_slab_free+0x6c/0x98
[   15.774855]  kfree+0x214/0x3c8
[   15.774887]  kfree_sensitive+0x80/0xb0
[   15.775101]  kmalloc_double_kzfree+0x11c/0x308
[   15.775292]  kunit_try_run_case+0x170/0x3f0
[   15.775339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.775427]  kthread+0x328/0x630
[   15.775839]  ret_from_fork+0x10/0x20
[   15.776026] 
[   15.776375] The buggy address belongs to the object at fff00000c55f0940
[   15.776375]  which belongs to the cache kmalloc-16 of size 16
[   15.776612] The buggy address is located 0 bytes inside of
[   15.776612]  freed 16-byte region [fff00000c55f0940, fff00000c55f0950)
[   15.776857] 
[   15.776891] The buggy address belongs to the physical page:
[   15.776942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0
[   15.777008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.777057] page_type: f5(slab)
[   15.777121] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.777189] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.777229] page dumped because: kasan: bad access detected
[   15.777261] 
[   15.777279] Memory state around the buggy address:
[   15.777327]  fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.777390]  fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.777433] >fff00000c55f0900: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   15.777472]                                            ^
[   15.777506]  fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.777549]  fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.777613] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   15.741469] ==================================================================
[   15.742146] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   15.742425] Read of size 1 at addr fff00000c63d0428 by task kunit_try_catch/191
[   15.742484] 
[   15.742700] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.742911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.743079] Hardware name: linux,dummy-virt (DT)
[   15.743115] Call trace:
[   15.743168]  show_stack+0x20/0x38 (C)
[   15.743541]  dump_stack_lvl+0x8c/0xd0
[   15.743770]  print_report+0x118/0x608
[   15.743944]  kasan_report+0xdc/0x128
[   15.744125]  __asan_report_load1_noabort+0x20/0x30
[   15.744371]  kmalloc_uaf2+0x3f4/0x468
[   15.744602]  kunit_try_run_case+0x170/0x3f0
[   15.744686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.744795]  kthread+0x328/0x630
[   15.744991]  ret_from_fork+0x10/0x20
[   15.745224] 
[   15.745284] Allocated by task 191:
[   15.745577]  kasan_save_stack+0x3c/0x68
[   15.745646]  kasan_save_track+0x20/0x40
[   15.745755]  kasan_save_alloc_info+0x40/0x58
[   15.745836]  __kasan_kmalloc+0xd4/0xd8
[   15.746109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.746326]  kmalloc_uaf2+0xc4/0x468
[   15.746526]  kunit_try_run_case+0x170/0x3f0
[   15.746567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.746849]  kthread+0x328/0x630
[   15.746908]  ret_from_fork+0x10/0x20
[   15.746958] 
[   15.746977] Freed by task 191:
[   15.747003]  kasan_save_stack+0x3c/0x68
[   15.747040]  kasan_save_track+0x20/0x40
[   15.747084]  kasan_save_free_info+0x4c/0x78
[   15.747122]  __kasan_slab_free+0x6c/0x98
[   15.747167]  kfree+0x214/0x3c8
[   15.747206]  kmalloc_uaf2+0x134/0x468
[   15.747242]  kunit_try_run_case+0x170/0x3f0
[   15.747282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.747335]  kthread+0x328/0x630
[   15.747368]  ret_from_fork+0x10/0x20
[   15.747425] 
[   15.747444] The buggy address belongs to the object at fff00000c63d0400
[   15.747444]  which belongs to the cache kmalloc-64 of size 64
[   15.747502] The buggy address is located 40 bytes inside of
[   15.747502]  freed 64-byte region [fff00000c63d0400, fff00000c63d0440)
[   15.747573] 
[   15.747603] The buggy address belongs to the physical page:
[   15.747644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d0
[   15.747700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.747748] page_type: f5(slab)
[   15.747789] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   15.747848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.747897] page dumped because: kasan: bad access detected
[   15.747928] 
[   15.747998] Memory state around the buggy address:
[   15.748161]  fff00000c63d0300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.748458]  fff00000c63d0380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.748855] >fff00000c63d0400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.749143]                                   ^
[   15.749438]  fff00000c63d0480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   15.749625]  fff00000c63d0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749913] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   15.720187] ==================================================================
[   15.720246] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   15.720305] Write of size 33 at addr fff00000c63d0280 by task kunit_try_catch/189
[   15.720357] 
[   15.720389] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.720468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.720493] Hardware name: linux,dummy-virt (DT)
[   15.720524] Call trace:
[   15.720546]  show_stack+0x20/0x38 (C)
[   15.720645]  dump_stack_lvl+0x8c/0xd0
[   15.720716]  print_report+0x118/0x608
[   15.720762]  kasan_report+0xdc/0x128
[   15.720804]  kasan_check_range+0x100/0x1a8
[   15.720850]  __asan_memset+0x34/0x78
[   15.720894]  kmalloc_uaf_memset+0x170/0x310
[   15.720940]  kunit_try_run_case+0x170/0x3f0
[   15.721909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.721995]  kthread+0x328/0x630
[   15.722314]  ret_from_fork+0x10/0x20
[   15.722542] 
[   15.722687] Allocated by task 189:
[   15.722835]  kasan_save_stack+0x3c/0x68
[   15.722879]  kasan_save_track+0x20/0x40
[   15.723218]  kasan_save_alloc_info+0x40/0x58
[   15.723293]  __kasan_kmalloc+0xd4/0xd8
[   15.723511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.723754]  kmalloc_uaf_memset+0xb8/0x310
[   15.723820]  kunit_try_run_case+0x170/0x3f0
[   15.723860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.724133]  kthread+0x328/0x630
[   15.724426]  ret_from_fork+0x10/0x20
[   15.724522] 
[   15.724709] Freed by task 189:
[   15.724738]  kasan_save_stack+0x3c/0x68
[   15.724881]  kasan_save_track+0x20/0x40
[   15.725001]  kasan_save_free_info+0x4c/0x78
[   15.725189]  __kasan_slab_free+0x6c/0x98
[   15.725350]  kfree+0x214/0x3c8
[   15.725565]  kmalloc_uaf_memset+0x11c/0x310
[   15.725611]  kunit_try_run_case+0x170/0x3f0
[   15.726045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.726177]  kthread+0x328/0x630
[   15.726290]  ret_from_fork+0x10/0x20
[   15.726510] 
[   15.726681] The buggy address belongs to the object at fff00000c63d0280
[   15.726681]  which belongs to the cache kmalloc-64 of size 64
[   15.726914] The buggy address is located 0 bytes inside of
[   15.726914]  freed 64-byte region [fff00000c63d0280, fff00000c63d02c0)
[   15.727122] 
[   15.727201] The buggy address belongs to the physical page:
[   15.727336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d0
[   15.727726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.727969] page_type: f5(slab)
[   15.728106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   15.728247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.728358] page dumped because: kasan: bad access detected
[   15.728395] 
[   15.728551] Memory state around the buggy address:
[   15.728696]  fff00000c63d0180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.728918]  fff00000c63d0200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.729053] >fff00000c63d0280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.729250]                    ^
[   15.729279]  fff00000c63d0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.729349]  fff00000c63d0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.729587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   15.699220] ==================================================================
[   15.699279] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   15.699334] Read of size 1 at addr fff00000c55f0928 by task kunit_try_catch/187
[   15.699382] 
[   15.699413] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.699493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.699520] Hardware name: linux,dummy-virt (DT)
[   15.699548] Call trace:
[   15.699571]  show_stack+0x20/0x38 (C)
[   15.699616]  dump_stack_lvl+0x8c/0xd0
[   15.699667]  print_report+0x118/0x608
[   15.699747]  kasan_report+0xdc/0x128
[   15.699792]  __asan_report_load1_noabort+0x20/0x30
[   15.699839]  kmalloc_uaf+0x300/0x338
[   15.699883]  kunit_try_run_case+0x170/0x3f0
[   15.699931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.701031]  kthread+0x328/0x630
[   15.701492]  ret_from_fork+0x10/0x20
[   15.701875] 
[   15.702059] Allocated by task 187:
[   15.702144]  kasan_save_stack+0x3c/0x68
[   15.702214]  kasan_save_track+0x20/0x40
[   15.702249]  kasan_save_alloc_info+0x40/0x58
[   15.702540]  __kasan_kmalloc+0xd4/0xd8
[   15.702734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.702812]  kmalloc_uaf+0xb8/0x338
[   15.703010]  kunit_try_run_case+0x170/0x3f0
[   15.703060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.703206]  kthread+0x328/0x630
[   15.703532]  ret_from_fork+0x10/0x20
[   15.703681] 
[   15.703840] Freed by task 187:
[   15.704030]  kasan_save_stack+0x3c/0x68
[   15.704256]  kasan_save_track+0x20/0x40
[   15.704440]  kasan_save_free_info+0x4c/0x78
[   15.704917]  __kasan_slab_free+0x6c/0x98
[   15.705054]  kfree+0x214/0x3c8
[   15.705092]  kmalloc_uaf+0x11c/0x338
[   15.705185]  kunit_try_run_case+0x170/0x3f0
[   15.705633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.705968]  kthread+0x328/0x630
[   15.706182]  ret_from_fork+0x10/0x20
[   15.706226] 
[   15.706410] The buggy address belongs to the object at fff00000c55f0920
[   15.706410]  which belongs to the cache kmalloc-16 of size 16
[   15.706628] The buggy address is located 8 bytes inside of
[   15.706628]  freed 16-byte region [fff00000c55f0920, fff00000c55f0930)
[   15.706743] 
[   15.706874] The buggy address belongs to the physical page:
[   15.706909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0
[   15.707099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.707339] page_type: f5(slab)
[   15.707397] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.707447] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.707876] page dumped because: kasan: bad access detected
[   15.708054] 
[   15.708258] Memory state around the buggy address:
[   15.708320]  fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.708479]  fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.708631] >fff00000c55f0900: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   15.708715]                                   ^
[   15.708902]  fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.709138]  fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.709209] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   15.684214] ==================================================================
[   15.684277] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   15.684606] Read of size 64 at addr fff00000c7816f84 by task kunit_try_catch/185
[   15.684768] 
[   15.684811] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.684921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.684959] Hardware name: linux,dummy-virt (DT)
[   15.684991] Call trace:
[   15.685013]  show_stack+0x20/0x38 (C)
[   15.685063]  dump_stack_lvl+0x8c/0xd0
[   15.685158]  print_report+0x118/0x608
[   15.685205]  kasan_report+0xdc/0x128
[   15.685269]  kasan_check_range+0x100/0x1a8
[   15.685321]  __asan_memmove+0x3c/0x98
[   15.685366]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   15.685417]  kunit_try_run_case+0x170/0x3f0
[   15.685474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.685525]  kthread+0x328/0x630
[   15.685569]  ret_from_fork+0x10/0x20
[   15.685615] 
[   15.685640] Allocated by task 185:
[   15.685669]  kasan_save_stack+0x3c/0x68
[   15.685722]  kasan_save_track+0x20/0x40
[   15.685758]  kasan_save_alloc_info+0x40/0x58
[   15.685797]  __kasan_kmalloc+0xd4/0xd8
[   15.685831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.685871]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   15.685915]  kunit_try_run_case+0x170/0x3f0
[   15.686394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.686690]  kthread+0x328/0x630
[   15.686733]  ret_from_fork+0x10/0x20
[   15.686770] 
[   15.686790] The buggy address belongs to the object at fff00000c7816f80
[   15.686790]  which belongs to the cache kmalloc-64 of size 64
[   15.686855] The buggy address is located 4 bytes inside of
[   15.686855]  allocated 64-byte region [fff00000c7816f80, fff00000c7816fc0)
[   15.686915] 
[   15.686935] The buggy address belongs to the physical page:
[   15.687401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107816
[   15.687542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.687753] page_type: f5(slab)
[   15.687841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   15.688330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.688559] page dumped because: kasan: bad access detected
[   15.688643] 
[   15.688747] Memory state around the buggy address:
[   15.688780]  fff00000c7816e80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.689121]  fff00000c7816f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.689249] >fff00000c7816f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.689426]                                            ^
[   15.689480]  fff00000c7817000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.689768]  fff00000c7817080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.690068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   15.662250] ==================================================================
[   15.662617] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   15.662852] Read of size 18446744073709551614 at addr fff00000c7816e04 by task kunit_try_catch/183
[   15.663394] 
[   15.663510] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.663609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.663828] Hardware name: linux,dummy-virt (DT)
[   15.663990] Call trace:
[   15.664109]  show_stack+0x20/0x38 (C)
[   15.664214]  dump_stack_lvl+0x8c/0xd0
[   15.664322]  print_report+0x118/0x608
[   15.664406]  kasan_report+0xdc/0x128
[   15.664630]  kasan_check_range+0x100/0x1a8
[   15.665152]  __asan_memmove+0x3c/0x98
[   15.665399]  kmalloc_memmove_negative_size+0x154/0x2e0
[   15.665585]  kunit_try_run_case+0x170/0x3f0
[   15.665844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.666219]  kthread+0x328/0x630
[   15.666414]  ret_from_fork+0x10/0x20
[   15.666468] 
[   15.666487] Allocated by task 183:
[   15.667803]  kasan_save_stack+0x3c/0x68
[   15.668001]  kasan_save_track+0x20/0x40
[   15.668235]  kasan_save_alloc_info+0x40/0x58
[   15.668306]  __kasan_kmalloc+0xd4/0xd8
[   15.668682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.668748]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   15.668987]  kunit_try_run_case+0x170/0x3f0
[   15.669132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.669441]  kthread+0x328/0x630
[   15.669486]  ret_from_fork+0x10/0x20
[   15.669523] 
[   15.669665] The buggy address belongs to the object at fff00000c7816e00
[   15.669665]  which belongs to the cache kmalloc-64 of size 64
[   15.669887] The buggy address is located 4 bytes inside of
[   15.669887]  64-byte region [fff00000c7816e00, fff00000c7816e40)
[   15.670188] 
[   15.670310] The buggy address belongs to the physical page:
[   15.670402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107816
[   15.670467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.670627] page_type: f5(slab)
[   15.670674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   15.670724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.671130] page dumped because: kasan: bad access detected
[   15.671300] 
[   15.671823] Memory state around the buggy address:
[   15.671885]  fff00000c7816d00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   15.671966]  fff00000c7816d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.672164] >fff00000c7816e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   15.672373]                    ^
[   15.672410]  fff00000c7816e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.672650]  fff00000c7816f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.672910] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   15.644811] ==================================================================
[   15.644877] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   15.644933] Write of size 16 at addr fff00000c7811569 by task kunit_try_catch/181
[   15.645158] 
[   15.645368] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.645499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.645664] Hardware name: linux,dummy-virt (DT)
[   15.645699] Call trace:
[   15.645729]  show_stack+0x20/0x38 (C)
[   15.645781]  dump_stack_lvl+0x8c/0xd0
[   15.645837]  print_report+0x118/0x608
[   15.646055]  kasan_report+0xdc/0x128
[   15.646177]  kasan_check_range+0x100/0x1a8
[   15.646433]  __asan_memset+0x34/0x78
[   15.646552]  kmalloc_oob_memset_16+0x150/0x2f8
[   15.646719]  kunit_try_run_case+0x170/0x3f0
[   15.646790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.646842]  kthread+0x328/0x630
[   15.646893]  ret_from_fork+0x10/0x20
[   15.646940] 
[   15.646968] Allocated by task 181:
[   15.646997]  kasan_save_stack+0x3c/0x68
[   15.647035]  kasan_save_track+0x20/0x40
[   15.647539]  kasan_save_alloc_info+0x40/0x58
[   15.647615]  __kasan_kmalloc+0xd4/0xd8
[   15.647877]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.648097]  kmalloc_oob_memset_16+0xb0/0x2f8
[   15.648324]  kunit_try_run_case+0x170/0x3f0
[   15.648430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.648613]  kthread+0x328/0x630
[   15.648871]  ret_from_fork+0x10/0x20
[   15.649082] 
[   15.649199] The buggy address belongs to the object at fff00000c7811500
[   15.649199]  which belongs to the cache kmalloc-128 of size 128
[   15.649409] The buggy address is located 105 bytes inside of
[   15.649409]  allocated 120-byte region [fff00000c7811500, fff00000c7811578)
[   15.649494] 
[   15.649519] The buggy address belongs to the physical page:
[   15.649774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.649930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.650115] page_type: f5(slab)
[   15.650283] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.650382] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.650448] page dumped because: kasan: bad access detected
[   15.650627] 
[   15.650784] Memory state around the buggy address:
[   15.650820]  fff00000c7811400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.650864]  fff00000c7811480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.650905] >fff00000c7811500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.651098]                                                                 ^
[   15.651142]  fff00000c7811580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.651208]  fff00000c7811600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.651245] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   15.628174] ==================================================================
[   15.628347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   15.628414] Write of size 8 at addr fff00000c7811471 by task kunit_try_catch/179
[   15.628462] 
[   15.628493] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.628573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.628598] Hardware name: linux,dummy-virt (DT)
[   15.628629] Call trace:
[   15.628651]  show_stack+0x20/0x38 (C)
[   15.628719]  dump_stack_lvl+0x8c/0xd0
[   15.628769]  print_report+0x118/0x608
[   15.628813]  kasan_report+0xdc/0x128
[   15.628866]  kasan_check_range+0x100/0x1a8
[   15.628911]  __asan_memset+0x34/0x78
[   15.629133]  kmalloc_oob_memset_8+0x150/0x2f8
[   15.629190]  kunit_try_run_case+0x170/0x3f0
[   15.629250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.629317]  kthread+0x328/0x630
[   15.629374]  ret_from_fork+0x10/0x20
[   15.629420] 
[   15.629439] Allocated by task 179:
[   15.629467]  kasan_save_stack+0x3c/0x68
[   15.629510]  kasan_save_track+0x20/0x40
[   15.629545]  kasan_save_alloc_info+0x40/0x58
[   15.629582]  __kasan_kmalloc+0xd4/0xd8
[   15.629626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.629664]  kmalloc_oob_memset_8+0xb0/0x2f8
[   15.629701]  kunit_try_run_case+0x170/0x3f0
[   15.629738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.629781]  kthread+0x328/0x630
[   15.629821]  ret_from_fork+0x10/0x20
[   15.629856] 
[   15.629875] The buggy address belongs to the object at fff00000c7811400
[   15.629875]  which belongs to the cache kmalloc-128 of size 128
[   15.629937] The buggy address is located 113 bytes inside of
[   15.629937]  allocated 120-byte region [fff00000c7811400, fff00000c7811478)
[   15.630659] 
[   15.631153] The buggy address belongs to the physical page:
[   15.631463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.631822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.632447] page_type: f5(slab)
[   15.632541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.632637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.632893] page dumped because: kasan: bad access detected
[   15.632936] 
[   15.632964] Memory state around the buggy address:
[   15.633412]  fff00000c7811300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.633661]  fff00000c7811380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.633861] >fff00000c7811400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.634093]                                                                 ^
[   15.634313]  fff00000c7811480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634393]  fff00000c7811500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634552] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   15.610307] ==================================================================
[   15.610445] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   15.610607] Write of size 4 at addr fff00000c7811375 by task kunit_try_catch/177
[   15.610679] 
[   15.610719] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.610799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.610825] Hardware name: linux,dummy-virt (DT)
[   15.610855] Call trace:
[   15.611051]  show_stack+0x20/0x38 (C)
[   15.611444]  dump_stack_lvl+0x8c/0xd0
[   15.611586]  print_report+0x118/0x608
[   15.611710]  kasan_report+0xdc/0x128
[   15.611874]  kasan_check_range+0x100/0x1a8
[   15.612185]  __asan_memset+0x34/0x78
[   15.612287]  kmalloc_oob_memset_4+0x150/0x300
[   15.612408]  kunit_try_run_case+0x170/0x3f0
[   15.612579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.612634]  kthread+0x328/0x630
[   15.613019]  ret_from_fork+0x10/0x20
[   15.613135] 
[   15.613232] Allocated by task 177:
[   15.613320]  kasan_save_stack+0x3c/0x68
[   15.613503]  kasan_save_track+0x20/0x40
[   15.613581]  kasan_save_alloc_info+0x40/0x58
[   15.613639]  __kasan_kmalloc+0xd4/0xd8
[   15.613860]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.614068]  kmalloc_oob_memset_4+0xb0/0x300
[   15.614131]  kunit_try_run_case+0x170/0x3f0
[   15.614233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.614416]  kthread+0x328/0x630
[   15.614514]  ret_from_fork+0x10/0x20
[   15.614550] 
[   15.614569] The buggy address belongs to the object at fff00000c7811300
[   15.614569]  which belongs to the cache kmalloc-128 of size 128
[   15.614623] The buggy address is located 117 bytes inside of
[   15.614623]  allocated 120-byte region [fff00000c7811300, fff00000c7811378)
[   15.615129] 
[   15.615195] The buggy address belongs to the physical page:
[   15.615229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.615605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.615701] page_type: f5(slab)
[   15.615800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.615901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.615990] page dumped because: kasan: bad access detected
[   15.616240] 
[   15.616433] Memory state around the buggy address:
[   15.616689]  fff00000c7811200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.617124]  fff00000c7811280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.617180] >fff00000c7811300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.617565]                                                                 ^
[   15.617836]  fff00000c7811380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.617911]  fff00000c7811400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618016] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   15.336502] ==================================================================
[   15.336572] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   15.336961] Read of size 1 at addr fff00000c7850000 by task kunit_try_catch/157
[   15.337058] 
[   15.337165] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.337289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.337315] Hardware name: linux,dummy-virt (DT)
[   15.337778] Call trace:
[   15.337854]  show_stack+0x20/0x38 (C)
[   15.338078]  dump_stack_lvl+0x8c/0xd0
[   15.338153]  print_report+0x118/0x608
[   15.338473]  kasan_report+0xdc/0x128
[   15.338602]  __asan_report_load1_noabort+0x20/0x30
[   15.338653]  page_alloc_uaf+0x328/0x350
[   15.338698]  kunit_try_run_case+0x170/0x3f0
[   15.339092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.339287]  kthread+0x328/0x630
[   15.339508]  ret_from_fork+0x10/0x20
[   15.339699] 
[   15.339722] The buggy address belongs to the physical page:
[   15.339963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   15.340189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.340422] page_type: f0(buddy)
[   15.340725] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000
[   15.341133] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   15.341329] page dumped because: kasan: bad access detected
[   15.341585] 
[   15.341624] Memory state around the buggy address:
[   15.341814]  fff00000c784ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.341893]  fff00000c784ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.342102] >fff00000c7850000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.342258]                    ^
[   15.342307]  fff00000c7850080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.342436]  fff00000c7850100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.342701] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   15.593855] ==================================================================
[   15.593916] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   15.593991] Write of size 2 at addr fff00000c7811277 by task kunit_try_catch/175
[   15.594038] 
[   15.594072] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.594152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.594530] Hardware name: linux,dummy-virt (DT)
[   15.594868] Call trace:
[   15.594925]  show_stack+0x20/0x38 (C)
[   15.595148]  dump_stack_lvl+0x8c/0xd0
[   15.595477]  print_report+0x118/0x608
[   15.595625]  kasan_report+0xdc/0x128
[   15.595699]  kasan_check_range+0x100/0x1a8
[   15.595886]  __asan_memset+0x34/0x78
[   15.596205]  kmalloc_oob_memset_2+0x150/0x2f8
[   15.596365]  kunit_try_run_case+0x170/0x3f0
[   15.596544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.596678]  kthread+0x328/0x630
[   15.596966]  ret_from_fork+0x10/0x20
[   15.597194] 
[   15.597310] Allocated by task 175:
[   15.597582]  kasan_save_stack+0x3c/0x68
[   15.597892]  kasan_save_track+0x20/0x40
[   15.598124]  kasan_save_alloc_info+0x40/0x58
[   15.598301]  __kasan_kmalloc+0xd4/0xd8
[   15.598462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.598504]  kmalloc_oob_memset_2+0xb0/0x2f8
[   15.598549]  kunit_try_run_case+0x170/0x3f0
[   15.598587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.598791]  kthread+0x328/0x630
[   15.599006]  ret_from_fork+0x10/0x20
[   15.599153] 
[   15.599196] The buggy address belongs to the object at fff00000c7811200
[   15.599196]  which belongs to the cache kmalloc-128 of size 128
[   15.599310] The buggy address is located 119 bytes inside of
[   15.599310]  allocated 120-byte region [fff00000c7811200, fff00000c7811278)
[   15.599511] 
[   15.599578] The buggy address belongs to the physical page:
[   15.599778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.600072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.600184] page_type: f5(slab)
[   15.600253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.600420] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.600525] page dumped because: kasan: bad access detected
[   15.600712] 
[   15.600845] Memory state around the buggy address:
[   15.601078]  fff00000c7811100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.601196]  fff00000c7811180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.601382] >fff00000c7811200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.601469]                                                                 ^
[   15.601681]  fff00000c7811280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.601931]  fff00000c7811300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.602156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   15.573247] ==================================================================
[   15.573317] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   15.573464] Write of size 128 at addr fff00000c7811100 by task kunit_try_catch/173
[   15.573557] 
[   15.573908] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.574174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.574235] Hardware name: linux,dummy-virt (DT)
[   15.574353] Call trace:
[   15.574403]  show_stack+0x20/0x38 (C)
[   15.574705]  dump_stack_lvl+0x8c/0xd0
[   15.574775]  print_report+0x118/0x608
[   15.575055]  kasan_report+0xdc/0x128
[   15.575163]  kasan_check_range+0x100/0x1a8
[   15.575464]  __asan_memset+0x34/0x78
[   15.575603]  kmalloc_oob_in_memset+0x144/0x2d0
[   15.575656]  kunit_try_run_case+0x170/0x3f0
[   15.576054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.576215]  kthread+0x328/0x630
[   15.576440]  ret_from_fork+0x10/0x20
[   15.576562] 
[   15.576581] Allocated by task 173:
[   15.576792]  kasan_save_stack+0x3c/0x68
[   15.577131]  kasan_save_track+0x20/0x40
[   15.577340]  kasan_save_alloc_info+0x40/0x58
[   15.577895]  __kasan_kmalloc+0xd4/0xd8
[   15.578144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.578500]  kmalloc_oob_in_memset+0xb0/0x2d0
[   15.578583]  kunit_try_run_case+0x170/0x3f0
[   15.578623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.578692]  kthread+0x328/0x630
[   15.579080]  ret_from_fork+0x10/0x20
[   15.579442] 
[   15.579539] The buggy address belongs to the object at fff00000c7811100
[   15.579539]  which belongs to the cache kmalloc-128 of size 128
[   15.579645] The buggy address is located 0 bytes inside of
[   15.579645]  allocated 120-byte region [fff00000c7811100, fff00000c7811178)
[   15.579767] 
[   15.579914] The buggy address belongs to the physical page:
[   15.580028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.580163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.580260] page_type: f5(slab)
[   15.580477] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.580547] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.580657] page dumped because: kasan: bad access detected
[   15.580814] 
[   15.580863] Memory state around the buggy address:
[   15.580908]  fff00000c7811000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.580996]  fff00000c7811080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.581037] >fff00000c7811100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.581075]                                                                 ^
[   15.581123]  fff00000c7811180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.581171]  fff00000c7811200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.581208] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   15.548924] ==================================================================
[   15.548998] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   15.549495] Read of size 16 at addr fff00000c55f0900 by task kunit_try_catch/171
[   15.549565] 
[   15.549929] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.550086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.550140] Hardware name: linux,dummy-virt (DT)
[   15.550643] Call trace:
[   15.550750]  show_stack+0x20/0x38 (C)
[   15.550821]  dump_stack_lvl+0x8c/0xd0
[   15.550979]  print_report+0x118/0x608
[   15.551400]  kasan_report+0xdc/0x128
[   15.551479]  __asan_report_load16_noabort+0x20/0x30
[   15.551593]  kmalloc_uaf_16+0x3bc/0x438
[   15.551827]  kunit_try_run_case+0x170/0x3f0
[   15.552245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.552339]  kthread+0x328/0x630
[   15.552479]  ret_from_fork+0x10/0x20
[   15.553052] 
[   15.553112] Allocated by task 171:
[   15.553209]  kasan_save_stack+0x3c/0x68
[   15.553326]  kasan_save_track+0x20/0x40
[   15.553448]  kasan_save_alloc_info+0x40/0x58
[   15.553650]  __kasan_kmalloc+0xd4/0xd8
[   15.553873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.554195]  kmalloc_uaf_16+0x140/0x438
[   15.554358]  kunit_try_run_case+0x170/0x3f0
[   15.554415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.554668]  kthread+0x328/0x630
[   15.554729]  ret_from_fork+0x10/0x20
[   15.555108] 
[   15.555224] Freed by task 171:
[   15.555319]  kasan_save_stack+0x3c/0x68
[   15.555417]  kasan_save_track+0x20/0x40
[   15.555717]  kasan_save_free_info+0x4c/0x78
[   15.555965]  __kasan_slab_free+0x6c/0x98
[   15.556117]  kfree+0x214/0x3c8
[   15.556293]  kmalloc_uaf_16+0x190/0x438
[   15.556334]  kunit_try_run_case+0x170/0x3f0
[   15.556659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.556864]  kthread+0x328/0x630
[   15.557437]  ret_from_fork+0x10/0x20
[   15.557697] 
[   15.557887] The buggy address belongs to the object at fff00000c55f0900
[   15.557887]  which belongs to the cache kmalloc-16 of size 16
[   15.557970] The buggy address is located 0 bytes inside of
[   15.557970]  freed 16-byte region [fff00000c55f0900, fff00000c55f0910)
[   15.558231] 
[   15.558263] The buggy address belongs to the physical page:
[   15.558295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0
[   15.558351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.558399] page_type: f5(slab)
[   15.558445] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.558990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.559063] page dumped because: kasan: bad access detected
[   15.559188] 
[   15.559370] Memory state around the buggy address:
[   15.559561]  fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.559762]  fff00000c55f0880: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   15.559840] >fff00000c55f0900: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560053]                    ^
[   15.560223]  fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560274]  fff00000c55f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560354] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   15.529745] ==================================================================
[   15.529849] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   15.530129] Write of size 16 at addr fff00000c55f08a0 by task kunit_try_catch/169
[   15.530215] 
[   15.530335] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.530417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.530718] Hardware name: linux,dummy-virt (DT)
[   15.530777] Call trace:
[   15.531012]  show_stack+0x20/0x38 (C)
[   15.531144]  dump_stack_lvl+0x8c/0xd0
[   15.531276]  print_report+0x118/0x608
[   15.531418]  kasan_report+0xdc/0x128
[   15.531466]  __asan_report_store16_noabort+0x20/0x30
[   15.531913]  kmalloc_oob_16+0x3a0/0x3f8
[   15.531996]  kunit_try_run_case+0x170/0x3f0
[   15.532132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.532238]  kthread+0x328/0x630
[   15.532381]  ret_from_fork+0x10/0x20
[   15.532441] 
[   15.532458] Allocated by task 169:
[   15.532791]  kasan_save_stack+0x3c/0x68
[   15.532914]  kasan_save_track+0x20/0x40
[   15.532964]  kasan_save_alloc_info+0x40/0x58
[   15.533376]  __kasan_kmalloc+0xd4/0xd8
[   15.533605]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.533703]  kmalloc_oob_16+0xb4/0x3f8
[   15.533832]  kunit_try_run_case+0x170/0x3f0
[   15.533882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.534234]  kthread+0x328/0x630
[   15.534488]  ret_from_fork+0x10/0x20
[   15.534610] 
[   15.534663] The buggy address belongs to the object at fff00000c55f08a0
[   15.534663]  which belongs to the cache kmalloc-16 of size 16
[   15.534760] The buggy address is located 0 bytes inside of
[   15.534760]  allocated 13-byte region [fff00000c55f08a0, fff00000c55f08ad)
[   15.535016] 
[   15.535166] The buggy address belongs to the physical page:
[   15.535228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0
[   15.535367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.535559] page_type: f5(slab)
[   15.535647] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.535838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.535906] page dumped because: kasan: bad access detected
[   15.536113] 
[   15.536298] Memory state around the buggy address:
[   15.536808]  fff00000c55f0780: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[   15.537119]  fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.537217] >fff00000c55f0880: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   15.537313]                                   ^
[   15.537361]  fff00000c55f0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.537403]  fff00000c55f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.537618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   15.513103] ==================================================================
[   15.513151] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   15.513195] Read of size 1 at addr fff00000c4601000 by task kunit_try_catch/167
[   15.513242] 
[   15.513271] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.513380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.513408] Hardware name: linux,dummy-virt (DT)
[   15.513438] Call trace:
[   15.513459]  show_stack+0x20/0x38 (C)
[   15.513504]  dump_stack_lvl+0x8c/0xd0
[   15.513551]  print_report+0x118/0x608
[   15.513594]  kasan_report+0xdc/0x128
[   15.513636]  __asan_report_load1_noabort+0x20/0x30
[   15.513698]  krealloc_uaf+0x4c8/0x520
[   15.513740]  kunit_try_run_case+0x170/0x3f0
[   15.513785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.513836]  kthread+0x328/0x630
[   15.513879]  ret_from_fork+0x10/0x20
[   15.513923] 
[   15.513968] Allocated by task 167:
[   15.513997]  kasan_save_stack+0x3c/0x68
[   15.514033]  kasan_save_track+0x20/0x40
[   15.514067]  kasan_save_alloc_info+0x40/0x58
[   15.514102]  __kasan_kmalloc+0xd4/0xd8
[   15.514135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.515031]  krealloc_uaf+0xc8/0x520
[   15.515112]  kunit_try_run_case+0x170/0x3f0
[   15.515425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.515577]  kthread+0x328/0x630
[   15.515647]  ret_from_fork+0x10/0x20
[   15.515724] 
[   15.515860] Freed by task 167:
[   15.516043]  kasan_save_stack+0x3c/0x68
[   15.516148]  kasan_save_track+0x20/0x40
[   15.516190]  kasan_save_free_info+0x4c/0x78
[   15.516479]  __kasan_slab_free+0x6c/0x98
[   15.516574]  kfree+0x214/0x3c8
[   15.516739]  krealloc_uaf+0x12c/0x520
[   15.516775]  kunit_try_run_case+0x170/0x3f0
[   15.517049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.517146]  kthread+0x328/0x630
[   15.517319]  ret_from_fork+0x10/0x20
[   15.517421] 
[   15.517758] The buggy address belongs to the object at fff00000c4601000
[   15.517758]  which belongs to the cache kmalloc-256 of size 256
[   15.517821] The buggy address is located 0 bytes inside of
[   15.517821]  freed 256-byte region [fff00000c4601000, fff00000c4601100)
[   15.518184] 
[   15.518337] The buggy address belongs to the physical page:
[   15.518369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.518427] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.518813] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.518934] page_type: f5(slab)
[   15.519059] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.519350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.519469] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.519585] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.519668] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.520049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.520371] page dumped because: kasan: bad access detected
[   15.520488] 
[   15.520615] Memory state around the buggy address:
[   15.520762]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.521016]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.521138] >fff00000c4601000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.521284]                    ^
[   15.521323]  fff00000c4601080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.521725]  fff00000c4601100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.521810] ==================================================================
[   15.501789] ==================================================================
[   15.502098] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   15.502288] Read of size 1 at addr fff00000c4601000 by task kunit_try_catch/167
[   15.502463] 
[   15.502538] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.502994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.503080] Hardware name: linux,dummy-virt (DT)
[   15.503255] Call trace:
[   15.503421]  show_stack+0x20/0x38 (C)
[   15.503512]  dump_stack_lvl+0x8c/0xd0
[   15.503655]  print_report+0x118/0x608
[   15.503701]  kasan_report+0xdc/0x128
[   15.503767]  __kasan_check_byte+0x54/0x70
[   15.504110]  krealloc_noprof+0x44/0x360
[   15.504224]  krealloc_uaf+0x180/0x520
[   15.504391]  kunit_try_run_case+0x170/0x3f0
[   15.504443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.504715]  kthread+0x328/0x630
[   15.505126]  ret_from_fork+0x10/0x20
[   15.505259] 
[   15.505292] Allocated by task 167:
[   15.505323]  kasan_save_stack+0x3c/0x68
[   15.505416]  kasan_save_track+0x20/0x40
[   15.505462]  kasan_save_alloc_info+0x40/0x58
[   15.505499]  __kasan_kmalloc+0xd4/0xd8
[   15.505541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.505577]  krealloc_uaf+0xc8/0x520
[   15.505609]  kunit_try_run_case+0x170/0x3f0
[   15.505646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.505687]  kthread+0x328/0x630
[   15.505728]  ret_from_fork+0x10/0x20
[   15.505763] 
[   15.505781] Freed by task 167:
[   15.505812]  kasan_save_stack+0x3c/0x68
[   15.505846]  kasan_save_track+0x20/0x40
[   15.505879]  kasan_save_free_info+0x4c/0x78
[   15.505915]  __kasan_slab_free+0x6c/0x98
[   15.506180]  kfree+0x214/0x3c8
[   15.506447]  krealloc_uaf+0x12c/0x520
[   15.506512]  kunit_try_run_case+0x170/0x3f0
[   15.506573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.506716]  kthread+0x328/0x630
[   15.506777]  ret_from_fork+0x10/0x20
[   15.507052] 
[   15.507099] The buggy address belongs to the object at fff00000c4601000
[   15.507099]  which belongs to the cache kmalloc-256 of size 256
[   15.507499] The buggy address is located 0 bytes inside of
[   15.507499]  freed 256-byte region [fff00000c4601000, fff00000c4601100)
[   15.507697] 
[   15.507717] The buggy address belongs to the physical page:
[   15.507966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.508176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.508464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.508653] page_type: f5(slab)
[   15.508752] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.508934] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.509445] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.509588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.509694] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.509915] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.510100] page dumped because: kasan: bad access detected
[   15.510131] 
[   15.510156] Memory state around the buggy address:
[   15.510565]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510741]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510944] >fff00000c4601000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.511310]                    ^
[   15.511376]  fff00000c4601080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.512070]  fff00000c4601100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.512138] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   15.424051] ==================================================================
[   15.424174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.424221] Write of size 1 at addr fff00000c4600eeb by task kunit_try_catch/161
[   15.424509] 
[   15.424590] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.424676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.424703] Hardware name: linux,dummy-virt (DT)
[   15.424778] Call trace:
[   15.424803]  show_stack+0x20/0x38 (C)
[   15.424992]  dump_stack_lvl+0x8c/0xd0
[   15.425047]  print_report+0x118/0x608
[   15.425091]  kasan_report+0xdc/0x128
[   15.425173]  __asan_report_store1_noabort+0x20/0x30
[   15.425224]  krealloc_less_oob_helper+0xa58/0xc50
[   15.425270]  krealloc_less_oob+0x20/0x38
[   15.425312]  kunit_try_run_case+0x170/0x3f0
[   15.425780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.425857]  kthread+0x328/0x630
[   15.425903]  ret_from_fork+0x10/0x20
[   15.426177] 
[   15.426369] Allocated by task 161:
[   15.426415]  kasan_save_stack+0x3c/0x68
[   15.426476]  kasan_save_track+0x20/0x40
[   15.426523]  kasan_save_alloc_info+0x40/0x58
[   15.426580]  __kasan_krealloc+0x118/0x178
[   15.426901]  krealloc_noprof+0x128/0x360
[   15.427147]  krealloc_less_oob_helper+0x168/0xc50
[   15.427308]  krealloc_less_oob+0x20/0x38
[   15.427426]  kunit_try_run_case+0x170/0x3f0
[   15.427472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.427897]  kthread+0x328/0x630
[   15.428177]  ret_from_fork+0x10/0x20
[   15.428312] 
[   15.428352] The buggy address belongs to the object at fff00000c4600e00
[   15.428352]  which belongs to the cache kmalloc-256 of size 256
[   15.428407] The buggy address is located 34 bytes to the right of
[   15.428407]  allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9)
[   15.428479] 
[   15.428499] The buggy address belongs to the physical page:
[   15.428535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.428588] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.428644] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.428694] page_type: f5(slab)
[   15.428731] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.428779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.428836] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.428892] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.428939] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.429006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.429049] page dumped because: kasan: bad access detected
[   15.429089] 
[   15.429106] Memory state around the buggy address:
[   15.429142]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.429193]  fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.429238] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.429280]                                                           ^
[   15.429333]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.429394]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.429439] ==================================================================
[   15.464810] ==================================================================
[   15.464895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.465263] Write of size 1 at addr fff00000c786e0c9 by task kunit_try_catch/165
[   15.465331] 
[   15.465367] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.465447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.465474] Hardware name: linux,dummy-virt (DT)
[   15.465505] Call trace:
[   15.465527]  show_stack+0x20/0x38 (C)
[   15.465601]  dump_stack_lvl+0x8c/0xd0
[   15.465660]  print_report+0x118/0x608
[   15.465705]  kasan_report+0xdc/0x128
[   15.465747]  __asan_report_store1_noabort+0x20/0x30
[   15.465812]  krealloc_less_oob_helper+0xa48/0xc50
[   15.465858]  krealloc_large_less_oob+0x20/0x38
[   15.465903]  kunit_try_run_case+0x170/0x3f0
[   15.465989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.466051]  kthread+0x328/0x630
[   15.466097]  ret_from_fork+0x10/0x20
[   15.466364] 
[   15.466401] The buggy address belongs to the physical page:
[   15.466638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   15.466697] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.466744] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.467228] page_type: f8(unknown)
[   15.467323] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.467574] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.467904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.468065] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.468453] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   15.468552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.468816] page dumped because: kasan: bad access detected
[   15.468880] 
[   15.468980] Memory state around the buggy address:
[   15.469072]  fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.469399]  fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.469487] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.469571]                                               ^
[   15.469894]  fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.470099]  fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.470144] ==================================================================
[   15.472049] ==================================================================
[   15.472114] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.472162] Write of size 1 at addr fff00000c786e0d0 by task kunit_try_catch/165
[   15.472209] 
[   15.472239] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.472583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.472741] Hardware name: linux,dummy-virt (DT)
[   15.472859] Call trace:
[   15.472884]  show_stack+0x20/0x38 (C)
[   15.472961]  dump_stack_lvl+0x8c/0xd0
[   15.473040]  print_report+0x118/0x608
[   15.473112]  kasan_report+0xdc/0x128
[   15.473158]  __asan_report_store1_noabort+0x20/0x30
[   15.473251]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.473441]  krealloc_large_less_oob+0x20/0x38
[   15.473599]  kunit_try_run_case+0x170/0x3f0
[   15.473722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.474001]  kthread+0x328/0x630
[   15.474064]  ret_from_fork+0x10/0x20
[   15.474112] 
[   15.474131] The buggy address belongs to the physical page:
[   15.474173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   15.474516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.474597] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.474697] page_type: f8(unknown)
[   15.474736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.474881] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.475091] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.475460] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.475566] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   15.476016] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.476104] page dumped because: kasan: bad access detected
[   15.476156] 
[   15.476326] Memory state around the buggy address:
[   15.476544]  fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.476694]  fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.476741] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.476778]                                                  ^
[   15.476813]  fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.477233]  fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.477403] ==================================================================
[   15.392742] ==================================================================
[   15.393058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   15.393185] Write of size 1 at addr fff00000c4600ed0 by task kunit_try_catch/161
[   15.393279] 
[   15.393317] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.393433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.393460] Hardware name: linux,dummy-virt (DT)
[   15.393489] Call trace:
[   15.393516]  show_stack+0x20/0x38 (C)
[   15.393661]  dump_stack_lvl+0x8c/0xd0
[   15.393713]  print_report+0x118/0x608
[   15.393782]  kasan_report+0xdc/0x128
[   15.394147]  __asan_report_store1_noabort+0x20/0x30
[   15.394306]  krealloc_less_oob_helper+0xb9c/0xc50
[   15.394412]  krealloc_less_oob+0x20/0x38
[   15.394743]  kunit_try_run_case+0x170/0x3f0
[   15.394895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.395482]  kthread+0x328/0x630
[   15.395554]  ret_from_fork+0x10/0x20
[   15.395856] 
[   15.395956] Allocated by task 161:
[   15.396102]  kasan_save_stack+0x3c/0x68
[   15.396329]  kasan_save_track+0x20/0x40
[   15.396523]  kasan_save_alloc_info+0x40/0x58
[   15.396586]  __kasan_krealloc+0x118/0x178
[   15.396621]  krealloc_noprof+0x128/0x360
[   15.396903]  krealloc_less_oob_helper+0x168/0xc50
[   15.397172]  krealloc_less_oob+0x20/0x38
[   15.397686]  kunit_try_run_case+0x170/0x3f0
[   15.397811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.398019]  kthread+0x328/0x630
[   15.398208]  ret_from_fork+0x10/0x20
[   15.398336] 
[   15.398370] The buggy address belongs to the object at fff00000c4600e00
[   15.398370]  which belongs to the cache kmalloc-256 of size 256
[   15.398433] The buggy address is located 7 bytes to the right of
[   15.398433]  allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9)
[   15.398651] 
[   15.398797] The buggy address belongs to the physical page:
[   15.399070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.399127] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.399229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.399537] page_type: f5(slab)
[   15.399698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.400053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.400363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.400444] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.400909] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.400987] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.401355] page dumped because: kasan: bad access detected
[   15.401441] 
[   15.401459] Memory state around the buggy address:
[   15.401733]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402011]  fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.402162] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.402203]                                                  ^
[   15.402238]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402440]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402686] ==================================================================
[   15.479030] ==================================================================
[   15.479083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.479128] Write of size 1 at addr fff00000c786e0da by task kunit_try_catch/165
[   15.479478] 
[   15.479545] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.479729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.479802] Hardware name: linux,dummy-virt (DT)
[   15.479835] Call trace:
[   15.479861]  show_stack+0x20/0x38 (C)
[   15.479909]  dump_stack_lvl+0x8c/0xd0
[   15.479966]  print_report+0x118/0x608
[   15.480009]  kasan_report+0xdc/0x128
[   15.480052]  __asan_report_store1_noabort+0x20/0x30
[   15.480100]  krealloc_less_oob_helper+0xa80/0xc50
[   15.480145]  krealloc_large_less_oob+0x20/0x38
[   15.480189]  kunit_try_run_case+0x170/0x3f0
[   15.480236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.480296]  kthread+0x328/0x630
[   15.480340]  ret_from_fork+0x10/0x20
[   15.480394] 
[   15.480414] The buggy address belongs to the physical page:
[   15.480448] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   15.480499] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.480546] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.480606] page_type: f8(unknown)
[   15.480648] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.480696] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.480748] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.480796] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.480843] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   15.480889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.480936] page dumped because: kasan: bad access detected
[   15.480984] 
[   15.481002] Memory state around the buggy address:
[   15.481146]  fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.481199]  fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.481854] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.481920]                                                     ^
[   15.482194]  fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.482255]  fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.482293] ==================================================================
[   15.413370] ==================================================================
[   15.413488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.413741] Write of size 1 at addr fff00000c4600eea by task kunit_try_catch/161
[   15.413803] 
[   15.413900] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.414006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.414032] Hardware name: linux,dummy-virt (DT)
[   15.414196] Call trace:
[   15.414375]  show_stack+0x20/0x38 (C)
[   15.414438]  dump_stack_lvl+0x8c/0xd0
[   15.414485]  print_report+0x118/0x608
[   15.415000]  kasan_report+0xdc/0x128
[   15.415482]  __asan_report_store1_noabort+0x20/0x30
[   15.415834]  krealloc_less_oob_helper+0xae4/0xc50
[   15.416012]  krealloc_less_oob+0x20/0x38
[   15.416059]  kunit_try_run_case+0x170/0x3f0
[   15.416443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.416643]  kthread+0x328/0x630
[   15.416931]  ret_from_fork+0x10/0x20
[   15.417041] 
[   15.417060] Allocated by task 161:
[   15.417575]  kasan_save_stack+0x3c/0x68
[   15.417748]  kasan_save_track+0x20/0x40
[   15.417980]  kasan_save_alloc_info+0x40/0x58
[   15.418377]  __kasan_krealloc+0x118/0x178
[   15.418585]  krealloc_noprof+0x128/0x360
[   15.418865]  krealloc_less_oob_helper+0x168/0xc50
[   15.419085]  krealloc_less_oob+0x20/0x38
[   15.419128]  kunit_try_run_case+0x170/0x3f0
[   15.419166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.419208]  kthread+0x328/0x630
[   15.419241]  ret_from_fork+0x10/0x20
[   15.419457] 
[   15.419731] The buggy address belongs to the object at fff00000c4600e00
[   15.419731]  which belongs to the cache kmalloc-256 of size 256
[   15.419893] The buggy address is located 33 bytes to the right of
[   15.419893]  allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9)
[   15.420028] 
[   15.420183] The buggy address belongs to the physical page:
[   15.420215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.420513] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.420701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.421101] page_type: f5(slab)
[   15.421213] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.421684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.421768] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.422078] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.422142] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.422189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.422227] page dumped because: kasan: bad access detected
[   15.422257] 
[   15.422275] Memory state around the buggy address:
[   15.422315]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422358]  fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.422399] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.422440]                                                           ^
[   15.422480]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422522]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422558] ==================================================================
[   15.490717] ==================================================================
[   15.490770] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   15.490981] Write of size 1 at addr fff00000c786e0eb by task kunit_try_catch/165
[   15.491169] 
[   15.491223] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.491353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.491624] Hardware name: linux,dummy-virt (DT)
[   15.491672] Call trace:
[   15.491716]  show_stack+0x20/0x38 (C)
[   15.491928]  dump_stack_lvl+0x8c/0xd0
[   15.492272]  print_report+0x118/0x608
[   15.492360]  kasan_report+0xdc/0x128
[   15.492405]  __asan_report_store1_noabort+0x20/0x30
[   15.492456]  krealloc_less_oob_helper+0xa58/0xc50
[   15.492503]  krealloc_large_less_oob+0x20/0x38
[   15.492547]  kunit_try_run_case+0x170/0x3f0
[   15.492593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.492647]  kthread+0x328/0x630
[   15.492694]  ret_from_fork+0x10/0x20
[   15.492739] 
[   15.492874] The buggy address belongs to the physical page:
[   15.492913] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   15.492976] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.493022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.493070] page_type: f8(unknown)
[   15.493107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.493154] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.493201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.493256] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.493303] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   15.493349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.493387] page dumped because: kasan: bad access detected
[   15.493416] 
[   15.493433] Memory state around the buggy address:
[   15.493462]  fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.493503]  fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.493542] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.493578]                                                           ^
[   15.493615]  fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.493655]  fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.493690] ==================================================================
[   15.404631] ==================================================================
[   15.404686] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   15.404926] Write of size 1 at addr fff00000c4600eda by task kunit_try_catch/161
[   15.404988] 
[   15.405018] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.405219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.405493] Hardware name: linux,dummy-virt (DT)
[   15.405537] Call trace:
[   15.405797]  show_stack+0x20/0x38 (C)
[   15.406004]  dump_stack_lvl+0x8c/0xd0
[   15.406134]  print_report+0x118/0x608
[   15.406197]  kasan_report+0xdc/0x128
[   15.406270]  __asan_report_store1_noabort+0x20/0x30
[   15.406613]  krealloc_less_oob_helper+0xa80/0xc50
[   15.406794]  krealloc_less_oob+0x20/0x38
[   15.407060]  kunit_try_run_case+0x170/0x3f0
[   15.407150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.407323]  kthread+0x328/0x630
[   15.407577]  ret_from_fork+0x10/0x20
[   15.407807] 
[   15.407912] Allocated by task 161:
[   15.408126]  kasan_save_stack+0x3c/0x68
[   15.408312]  kasan_save_track+0x20/0x40
[   15.408379]  kasan_save_alloc_info+0x40/0x58
[   15.408772]  __kasan_krealloc+0x118/0x178
[   15.408854]  krealloc_noprof+0x128/0x360
[   15.409042]  krealloc_less_oob_helper+0x168/0xc50
[   15.409083]  krealloc_less_oob+0x20/0x38
[   15.409188]  kunit_try_run_case+0x170/0x3f0
[   15.409228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.409280]  kthread+0x328/0x630
[   15.409315]  ret_from_fork+0x10/0x20
[   15.409359] 
[   15.409392] The buggy address belongs to the object at fff00000c4600e00
[   15.409392]  which belongs to the cache kmalloc-256 of size 256
[   15.409449] The buggy address is located 17 bytes to the right of
[   15.409449]  allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9)
[   15.409510] 
[   15.409529] The buggy address belongs to the physical page:
[   15.409561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.409632] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.409684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.409734] page_type: f5(slab)
[   15.409777] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.409834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.409881] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.409935] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.410002] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.410057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.410109] page dumped because: kasan: bad access detected
[   15.410423] 
[   15.410465] Memory state around the buggy address:
[   15.410703]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.410766]  fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.410807] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.411162]                                                     ^
[   15.411282]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.411553]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.411911] ==================================================================
[   15.483500] ==================================================================
[   15.483552] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   15.483834] Write of size 1 at addr fff00000c786e0ea by task kunit_try_catch/165
[   15.483909] 
[   15.483940] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.484400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.484443] Hardware name: linux,dummy-virt (DT)
[   15.484672] Call trace:
[   15.484720]  show_stack+0x20/0x38 (C)
[   15.484889]  dump_stack_lvl+0x8c/0xd0
[   15.484941]  print_report+0x118/0x608
[   15.485059]  kasan_report+0xdc/0x128
[   15.485104]  __asan_report_store1_noabort+0x20/0x30
[   15.485191]  krealloc_less_oob_helper+0xae4/0xc50
[   15.485329]  krealloc_large_less_oob+0x20/0x38
[   15.485394]  kunit_try_run_case+0x170/0x3f0
[   15.485650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.485722]  kthread+0x328/0x630
[   15.485804]  ret_from_fork+0x10/0x20
[   15.485919] 
[   15.486162] The buggy address belongs to the physical page:
[   15.486233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786c
[   15.486319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.486413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.486593] page_type: f8(unknown)
[   15.487050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.487282] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.487506] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.487614] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.488032] head: 0bfffe0000000002 ffffc1ffc31e1b01 00000000ffffffff 00000000ffffffff
[   15.488130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.488337] page dumped because: kasan: bad access detected
[   15.488384] 
[   15.488412] Memory state around the buggy address:
[   15.488625]  fff00000c786df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.488757]  fff00000c786e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.488880] >fff00000c786e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   15.489377]                                                           ^
[   15.489470]  fff00000c786e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.489569]  fff00000c786e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.489679] ==================================================================
[   15.384584] ==================================================================
[   15.384644] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   15.384905] Write of size 1 at addr fff00000c4600ec9 by task kunit_try_catch/161
[   15.385203] 
[   15.385258] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.385423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.385500] Hardware name: linux,dummy-virt (DT)
[   15.385532] Call trace:
[   15.385553]  show_stack+0x20/0x38 (C)
[   15.385782]  dump_stack_lvl+0x8c/0xd0
[   15.386101]  print_report+0x118/0x608
[   15.386192]  kasan_report+0xdc/0x128
[   15.386402]  __asan_report_store1_noabort+0x20/0x30
[   15.386645]  krealloc_less_oob_helper+0xa48/0xc50
[   15.386895]  krealloc_less_oob+0x20/0x38
[   15.387124]  kunit_try_run_case+0x170/0x3f0
[   15.387255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.387310]  kthread+0x328/0x630
[   15.387355]  ret_from_fork+0x10/0x20
[   15.387403] 
[   15.387421] Allocated by task 161:
[   15.387450]  kasan_save_stack+0x3c/0x68
[   15.387505]  kasan_save_track+0x20/0x40
[   15.387549]  kasan_save_alloc_info+0x40/0x58
[   15.387592]  __kasan_krealloc+0x118/0x178
[   15.387643]  krealloc_noprof+0x128/0x360
[   15.387680]  krealloc_less_oob_helper+0x168/0xc50
[   15.387716]  krealloc_less_oob+0x20/0x38
[   15.387749]  kunit_try_run_case+0x170/0x3f0
[   15.387797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.387840]  kthread+0x328/0x630
[   15.387874]  ret_from_fork+0x10/0x20
[   15.387918] 
[   15.387937] The buggy address belongs to the object at fff00000c4600e00
[   15.387937]  which belongs to the cache kmalloc-256 of size 256
[   15.388002] The buggy address is located 0 bytes to the right of
[   15.388002]  allocated 201-byte region [fff00000c4600e00, fff00000c4600ec9)
[   15.388072] 
[   15.388092] The buggy address belongs to the physical page:
[   15.388124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.388185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.388242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.388295] page_type: f5(slab)
[   15.388332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.388391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.388454] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.388506] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.388563] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.388609] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.388666] page dumped because: kasan: bad access detected
[   15.388708] 
[   15.388726] Memory state around the buggy address:
[   15.388766]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.388814]  fff00000c4600e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.388854] >fff00000c4600e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   15.388890]                                               ^
[   15.388934]  fff00000c4600f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389239]  fff00000c4600f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   15.349892] ==================================================================
[   15.349977] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.350029] Write of size 1 at addr fff00000c4600ceb by task kunit_try_catch/159
[   15.350251] 
[   15.350358] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.350467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.350494] Hardware name: linux,dummy-virt (DT)
[   15.350524] Call trace:
[   15.350547]  show_stack+0x20/0x38 (C)
[   15.350597]  dump_stack_lvl+0x8c/0xd0
[   15.350644]  print_report+0x118/0x608
[   15.350688]  kasan_report+0xdc/0x128
[   15.351020]  __asan_report_store1_noabort+0x20/0x30
[   15.351246]  krealloc_more_oob_helper+0x60c/0x678
[   15.351546]  krealloc_more_oob+0x20/0x38
[   15.351603]  kunit_try_run_case+0x170/0x3f0
[   15.351879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.352027]  kthread+0x328/0x630
[   15.352236]  ret_from_fork+0x10/0x20
[   15.352371] 
[   15.352483] Allocated by task 159:
[   15.352517]  kasan_save_stack+0x3c/0x68
[   15.352958]  kasan_save_track+0x20/0x40
[   15.353286]  kasan_save_alloc_info+0x40/0x58
[   15.353405]  __kasan_krealloc+0x118/0x178
[   15.353444]  krealloc_noprof+0x128/0x360
[   15.353683]  krealloc_more_oob_helper+0x168/0x678
[   15.353750]  krealloc_more_oob+0x20/0x38
[   15.354115]  kunit_try_run_case+0x170/0x3f0
[   15.354375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.354427]  kthread+0x328/0x630
[   15.354463]  ret_from_fork+0x10/0x20
[   15.354497] 
[   15.354519] The buggy address belongs to the object at fff00000c4600c00
[   15.354519]  which belongs to the cache kmalloc-256 of size 256
[   15.354876] The buggy address is located 0 bytes to the right of
[   15.354876]  allocated 235-byte region [fff00000c4600c00, fff00000c4600ceb)
[   15.355060] 
[   15.355186] The buggy address belongs to the physical page:
[   15.355303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.355620] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.355827] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.356593] page_type: f5(slab)
[   15.356652] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.356722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.357141] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.357268] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.357873] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.358122] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.358293] page dumped because: kasan: bad access detected
[   15.358462] 
[   15.358590] Memory state around the buggy address:
[   15.358625]  fff00000c4600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359038]  fff00000c4600c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.359238] >fff00000c4600c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.359356]                                                           ^
[   15.359445]  fff00000c4600d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359549]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359776] ==================================================================
[   15.444869] ==================================================================
[   15.444913] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.444969] Write of size 1 at addr fff00000c786a0f0 by task kunit_try_catch/163
[   15.445419] 
[   15.445466] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.445672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.445893] Hardware name: linux,dummy-virt (DT)
[   15.445930] Call trace:
[   15.446118]  show_stack+0x20/0x38 (C)
[   15.446230]  dump_stack_lvl+0x8c/0xd0
[   15.446411]  print_report+0x118/0x608
[   15.446730]  kasan_report+0xdc/0x128
[   15.446986]  __asan_report_store1_noabort+0x20/0x30
[   15.447107]  krealloc_more_oob_helper+0x5c0/0x678
[   15.447278]  krealloc_large_more_oob+0x20/0x38
[   15.447545]  kunit_try_run_case+0x170/0x3f0
[   15.447654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.447890]  kthread+0x328/0x630
[   15.448082]  ret_from_fork+0x10/0x20
[   15.448297] 
[   15.448418] The buggy address belongs to the physical page:
[   15.448455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868
[   15.448528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.448909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.449042] page_type: f8(unknown)
[   15.449144] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.449573] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.449909] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.450175] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.450406] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff
[   15.450572] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.450923] page dumped because: kasan: bad access detected
[   15.451247] 
[   15.451374] Memory state around the buggy address:
[   15.451407]  fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.451514]  fff00000c786a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.451836] >fff00000c786a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.452036]                                                              ^
[   15.452190]  fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.452304]  fff00000c786a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.452566] ==================================================================
[   15.440970] ==================================================================
[   15.441029] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.441463] Write of size 1 at addr fff00000c786a0eb by task kunit_try_catch/163
[   15.441587] 
[   15.441688] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.441778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.441864] Hardware name: linux,dummy-virt (DT)
[   15.441897] Call trace:
[   15.441918]  show_stack+0x20/0x38 (C)
[   15.441980]  dump_stack_lvl+0x8c/0xd0
[   15.442029]  print_report+0x118/0x608
[   15.442468]  kasan_report+0xdc/0x128
[   15.442635]  __asan_report_store1_noabort+0x20/0x30
[   15.442816]  krealloc_more_oob_helper+0x60c/0x678
[   15.442867]  krealloc_large_more_oob+0x20/0x38
[   15.442914]  kunit_try_run_case+0x170/0x3f0
[   15.442981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.443149]  kthread+0x328/0x630
[   15.443233]  ret_from_fork+0x10/0x20
[   15.443296] 
[   15.443322] The buggy address belongs to the physical page:
[   15.443359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868
[   15.443431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.443478] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.443530] page_type: f8(unknown)
[   15.443569] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.443642] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.443690] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.443736] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.443798] head: 0bfffe0000000002 ffffc1ffc31e1a01 00000000ffffffff 00000000ffffffff
[   15.443844] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.443882] page dumped because: kasan: bad access detected
[   15.443928] 
[   15.443957] Memory state around the buggy address:
[   15.443996]  fff00000c7869f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.444048]  fff00000c786a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.444088] >fff00000c786a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.444132]                                                           ^
[   15.444169]  fff00000c786a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.444209]  fff00000c786a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.444245] ==================================================================
[   15.361840] ==================================================================
[   15.361899] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.362128] Write of size 1 at addr fff00000c4600cf0 by task kunit_try_catch/159
[   15.362228] 
[   15.362262] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.362349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.362375] Hardware name: linux,dummy-virt (DT)
[   15.362404] Call trace:
[   15.362841]  show_stack+0x20/0x38 (C)
[   15.362909]  dump_stack_lvl+0x8c/0xd0
[   15.363218]  print_report+0x118/0x608
[   15.363354]  kasan_report+0xdc/0x128
[   15.363445]  __asan_report_store1_noabort+0x20/0x30
[   15.363699]  krealloc_more_oob_helper+0x5c0/0x678
[   15.363925]  krealloc_more_oob+0x20/0x38
[   15.364455]  kunit_try_run_case+0x170/0x3f0
[   15.364596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.364822]  kthread+0x328/0x630
[   15.364900]  ret_from_fork+0x10/0x20
[   15.365242] 
[   15.365285] Allocated by task 159:
[   15.365318]  kasan_save_stack+0x3c/0x68
[   15.365514]  kasan_save_track+0x20/0x40
[   15.365651]  kasan_save_alloc_info+0x40/0x58
[   15.365872]  __kasan_krealloc+0x118/0x178
[   15.366131]  krealloc_noprof+0x128/0x360
[   15.366342]  krealloc_more_oob_helper+0x168/0x678
[   15.366713]  krealloc_more_oob+0x20/0x38
[   15.366967]  kunit_try_run_case+0x170/0x3f0
[   15.367051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.367234]  kthread+0x328/0x630
[   15.367273]  ret_from_fork+0x10/0x20
[   15.367487] 
[   15.367663] The buggy address belongs to the object at fff00000c4600c00
[   15.367663]  which belongs to the cache kmalloc-256 of size 256
[   15.367731] The buggy address is located 5 bytes to the right of
[   15.367731]  allocated 235-byte region [fff00000c4600c00, fff00000c4600ceb)
[   15.368001] 
[   15.368027] The buggy address belongs to the physical page:
[   15.368271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104600
[   15.368427] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.368830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.369088] page_type: f5(slab)
[   15.369450] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.369725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.369910] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.369980] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.370028] head: 0bfffe0000000001 ffffc1ffc3118001 00000000ffffffff 00000000ffffffff
[   15.370092] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.370133] page dumped because: kasan: bad access detected
[   15.370324] 
[   15.370357] Memory state around the buggy address:
[   15.370402]  fff00000c4600b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370450]  fff00000c4600c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.370702] >fff00000c4600c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.370972]                                                              ^
[   15.371109]  fff00000c4600d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.371183]  fff00000c4600d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.371247] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   15.312420] ==================================================================
[   15.312511] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   15.312573] Free of addr fff00000c65c0001 by task kunit_try_catch/153
[   15.312630] 
[   15.312662] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.312747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.312773] Hardware name: linux,dummy-virt (DT)
[   15.312808] Call trace:
[   15.312830]  show_stack+0x20/0x38 (C)
[   15.312887]  dump_stack_lvl+0x8c/0xd0
[   15.312935]  print_report+0x118/0x608
[   15.313164]  kasan_report_invalid_free+0xc0/0xe8
[   15.313225]  __kasan_kfree_large+0x5c/0xa8
[   15.313270]  free_large_kmalloc+0x64/0x190
[   15.313459]  kfree+0x270/0x3c8
[   15.313655]  kmalloc_large_invalid_free+0x108/0x270
[   15.313715]  kunit_try_run_case+0x170/0x3f0
[   15.313764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.313833]  kthread+0x328/0x630
[   15.313877]  ret_from_fork+0x10/0x20
[   15.313922] 
[   15.314217] The buggy address belongs to the physical page:
[   15.314459] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0
[   15.314516] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.314888] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.314962] page_type: f8(unknown)
[   15.315178] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.315473] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.315534] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.315590] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.315805] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff
[   15.315970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.316182] page dumped because: kasan: bad access detected
[   15.316345] 
[   15.316477] Memory state around the buggy address:
[   15.316510]  fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316596]  fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316823] >fff00000c65c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.317181]                    ^
[   15.317391]  fff00000c65c0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.317461]  fff00000c65c0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.317794] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   15.292630] ==================================================================
[   15.292693] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   15.292745] Read of size 1 at addr fff00000c65bc000 by task kunit_try_catch/151
[   15.292792] 
[   15.292822] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.292901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.292926] Hardware name: linux,dummy-virt (DT)
[   15.293451] Call trace:
[   15.293745]  show_stack+0x20/0x38 (C)
[   15.293835]  dump_stack_lvl+0x8c/0xd0
[   15.293894]  print_report+0x118/0x608
[   15.293937]  kasan_report+0xdc/0x128
[   15.294201]  __asan_report_load1_noabort+0x20/0x30
[   15.294330]  kmalloc_large_uaf+0x2cc/0x2f8
[   15.294380]  kunit_try_run_case+0x170/0x3f0
[   15.294432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.294483]  kthread+0x328/0x630
[   15.294931]  ret_from_fork+0x10/0x20
[   15.295210] 
[   15.295507] The buggy address belongs to the physical page:
[   15.296051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bc
[   15.296283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.296384] raw: 0bfffe0000000000 ffffc1ffc3197008 fff00000da4a1e00 0000000000000000
[   15.296616] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   15.296709] page dumped because: kasan: bad access detected
[   15.296980] 
[   15.297054] Memory state around the buggy address:
[   15.297224]  fff00000c65bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.297608]  fff00000c65bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.297727] >fff00000c65bc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.297796]                    ^
[   15.297824]  fff00000c65bc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.298081]  fff00000c65bc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   15.298317] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   15.277540] ==================================================================
[   15.277696] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   15.277759] Write of size 1 at addr fff00000c65be00a by task kunit_try_catch/149
[   15.277916] 
[   15.277967] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.278057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.278083] Hardware name: linux,dummy-virt (DT)
[   15.278249] Call trace:
[   15.278343]  show_stack+0x20/0x38 (C)
[   15.278689]  dump_stack_lvl+0x8c/0xd0
[   15.278911]  print_report+0x118/0x608
[   15.278978]  kasan_report+0xdc/0x128
[   15.279365]  __asan_report_store1_noabort+0x20/0x30
[   15.279512]  kmalloc_large_oob_right+0x278/0x2b8
[   15.279663]  kunit_try_run_case+0x170/0x3f0
[   15.279827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.280004]  kthread+0x328/0x630
[   15.280240]  ret_from_fork+0x10/0x20
[   15.280371] 
[   15.280748] The buggy address belongs to the physical page:
[   15.280885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bc
[   15.281153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.281368] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.281500] page_type: f8(unknown)
[   15.281635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.281762] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.281879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.282122] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.282245] head: 0bfffe0000000002 ffffc1ffc3196f01 00000000ffffffff 00000000ffffffff
[   15.282413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.282588] page dumped because: kasan: bad access detected
[   15.282758] 
[   15.282812] Memory state around the buggy address:
[   15.282845]  fff00000c65bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.282912]  fff00000c65bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.282961] >fff00000c65be000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.283311]                       ^
[   15.283407]  fff00000c65be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.283460]  fff00000c65be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.283501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   15.252243] ==================================================================
[   15.252308] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   15.252387] Write of size 1 at addr fff00000c7839f00 by task kunit_try_catch/147
[   15.252441] 
[   15.252475] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.252557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.252582] Hardware name: linux,dummy-virt (DT)
[   15.252628] Call trace:
[   15.252652]  show_stack+0x20/0x38 (C)
[   15.252708]  dump_stack_lvl+0x8c/0xd0
[   15.252757]  print_report+0x118/0x608
[   15.252799]  kasan_report+0xdc/0x128
[   15.252841]  __asan_report_store1_noabort+0x20/0x30
[   15.252889]  kmalloc_big_oob_right+0x2a4/0x2f0
[   15.252957]  kunit_try_run_case+0x170/0x3f0
[   15.253280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.253333]  kthread+0x328/0x630
[   15.254205]  ret_from_fork+0x10/0x20
[   15.254281] 
[   15.254302] Allocated by task 147:
[   15.254331]  kasan_save_stack+0x3c/0x68
[   15.254370]  kasan_save_track+0x20/0x40
[   15.254405]  kasan_save_alloc_info+0x40/0x58
[   15.254611]  __kasan_kmalloc+0xd4/0xd8
[   15.255027]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.255393]  kmalloc_big_oob_right+0xb8/0x2f0
[   15.255477]  kunit_try_run_case+0x170/0x3f0
[   15.255548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.255702]  kthread+0x328/0x630
[   15.255873]  ret_from_fork+0x10/0x20
[   15.256080] 
[   15.256223] The buggy address belongs to the object at fff00000c7838000
[   15.256223]  which belongs to the cache kmalloc-8k of size 8192
[   15.256322] The buggy address is located 0 bytes to the right of
[   15.256322]  allocated 7936-byte region [fff00000c7838000, fff00000c7839f00)
[   15.256573] 
[   15.256856] The buggy address belongs to the physical page:
[   15.257104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107838
[   15.257376] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.257440] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.257492] page_type: f5(slab)
[   15.257743] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   15.258032] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   15.258387] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   15.258530] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   15.258598] head: 0bfffe0000000003 ffffc1ffc31e0e01 00000000ffffffff 00000000ffffffff
[   15.258645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   15.258957] page dumped because: kasan: bad access detected
[   15.259102] 
[   15.259172] Memory state around the buggy address:
[   15.259520]  fff00000c7839e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.259660]  fff00000c7839e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.259813] >fff00000c7839f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259852]                    ^
[   15.259880]  fff00000c7839f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260296]  fff00000c783a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260394] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   15.225895] ==================================================================
[   15.225965] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   15.226379] Write of size 1 at addr fff00000c3ec5f78 by task kunit_try_catch/145
[   15.226455] 
[   15.226577] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.226715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.226748] Hardware name: linux,dummy-virt (DT)
[   15.227104] Call trace:
[   15.227283]  show_stack+0x20/0x38 (C)
[   15.227478]  dump_stack_lvl+0x8c/0xd0
[   15.227714]  print_report+0x118/0x608
[   15.227987]  kasan_report+0xdc/0x128
[   15.228499]  __asan_report_store1_noabort+0x20/0x30
[   15.228644]  kmalloc_track_caller_oob_right+0x40c/0x488
[   15.229167]  kunit_try_run_case+0x170/0x3f0
[   15.229242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.229753]  kthread+0x328/0x630
[   15.230012]  ret_from_fork+0x10/0x20
[   15.230076] 
[   15.230472] Allocated by task 145:
[   15.230807]  kasan_save_stack+0x3c/0x68
[   15.230881]  kasan_save_track+0x20/0x40
[   15.231074]  kasan_save_alloc_info+0x40/0x58
[   15.231199]  __kasan_kmalloc+0xd4/0xd8
[   15.231263]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.231458]  kmalloc_track_caller_oob_right+0xa8/0x488
[   15.231591]  kunit_try_run_case+0x170/0x3f0
[   15.231671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.231856]  kthread+0x328/0x630
[   15.232093]  ret_from_fork+0x10/0x20
[   15.232204] 
[   15.232342] The buggy address belongs to the object at fff00000c3ec5f00
[   15.232342]  which belongs to the cache kmalloc-128 of size 128
[   15.232573] The buggy address is located 0 bytes to the right of
[   15.232573]  allocated 120-byte region [fff00000c3ec5f00, fff00000c3ec5f78)
[   15.232685] 
[   15.232732] The buggy address belongs to the physical page:
[   15.232915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.233111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.233165] page_type: f5(slab)
[   15.233249] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.233300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.233377] page dumped because: kasan: bad access detected
[   15.233408] 
[   15.233425] Memory state around the buggy address:
[   15.233465]  fff00000c3ec5e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.233507]  fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233557] >fff00000c3ec5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.233593]                                                                 ^
[   15.233641]  fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233688]  fff00000c3ec6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.233723] ==================================================================
[   15.235376] ==================================================================
[   15.235433] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   15.235480] Write of size 1 at addr fff00000c7811078 by task kunit_try_catch/145
[   15.235830] 
[   15.235987] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.236284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.236327] Hardware name: linux,dummy-virt (DT)
[   15.236421] Call trace:
[   15.236446]  show_stack+0x20/0x38 (C)
[   15.236533]  dump_stack_lvl+0x8c/0xd0
[   15.236703]  print_report+0x118/0x608
[   15.236764]  kasan_report+0xdc/0x128
[   15.237071]  __asan_report_store1_noabort+0x20/0x30
[   15.237311]  kmalloc_track_caller_oob_right+0x418/0x488
[   15.237383]  kunit_try_run_case+0x170/0x3f0
[   15.237470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.237523]  kthread+0x328/0x630
[   15.237653]  ret_from_fork+0x10/0x20
[   15.237702] 
[   15.237720] Allocated by task 145:
[   15.238046]  kasan_save_stack+0x3c/0x68
[   15.238110]  kasan_save_track+0x20/0x40
[   15.238146]  kasan_save_alloc_info+0x40/0x58
[   15.238311]  __kasan_kmalloc+0xd4/0xd8
[   15.238392]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.238464]  kmalloc_track_caller_oob_right+0x184/0x488
[   15.238519]  kunit_try_run_case+0x170/0x3f0
[   15.238556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.238597]  kthread+0x328/0x630
[   15.238631]  ret_from_fork+0x10/0x20
[   15.238665] 
[   15.238683] The buggy address belongs to the object at fff00000c7811000
[   15.238683]  which belongs to the cache kmalloc-128 of size 128
[   15.238737] The buggy address is located 0 bytes to the right of
[   15.238737]  allocated 120-byte region [fff00000c7811000, fff00000c7811078)
[   15.238797] 
[   15.239304] The buggy address belongs to the physical page:
[   15.239459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107811
[   15.239553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.239679] page_type: f5(slab)
[   15.239718] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.240046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.240182] page dumped because: kasan: bad access detected
[   15.240290] 
[   15.240350] Memory state around the buggy address:
[   15.240483]  fff00000c7810f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240556]  fff00000c7810f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240607] >fff00000c7811000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.240644]                                                                 ^
[   15.240978]  fff00000c7811080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.241134]  fff00000c7811100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.241341] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   15.206739] ==================================================================
[   15.206829] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   15.206882] Read of size 1 at addr fff00000c4767000 by task kunit_try_catch/143
[   15.206930] 
[   15.207137] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.207387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.207514] Hardware name: linux,dummy-virt (DT)
[   15.207612] Call trace:
[   15.207728]  show_stack+0x20/0x38 (C)
[   15.207902]  dump_stack_lvl+0x8c/0xd0
[   15.208298]  print_report+0x118/0x608
[   15.208381]  kasan_report+0xdc/0x128
[   15.208527]  __asan_report_load1_noabort+0x20/0x30
[   15.208753]  kmalloc_node_oob_right+0x2f4/0x330
[   15.208883]  kunit_try_run_case+0x170/0x3f0
[   15.209485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.209797]  kthread+0x328/0x630
[   15.209857]  ret_from_fork+0x10/0x20
[   15.210166] 
[   15.210315] Allocated by task 143:
[   15.210510]  kasan_save_stack+0x3c/0x68
[   15.210723]  kasan_save_track+0x20/0x40
[   15.210973]  kasan_save_alloc_info+0x40/0x58
[   15.211210]  __kasan_kmalloc+0xd4/0xd8
[   15.211332]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   15.211565]  kmalloc_node_oob_right+0xbc/0x330
[   15.211690]  kunit_try_run_case+0x170/0x3f0
[   15.211804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.211876]  kthread+0x328/0x630
[   15.212271]  ret_from_fork+0x10/0x20
[   15.212445] 
[   15.212533] The buggy address belongs to the object at fff00000c4766000
[   15.212533]  which belongs to the cache kmalloc-4k of size 4096
[   15.212749] The buggy address is located 0 bytes to the right of
[   15.212749]  allocated 4096-byte region [fff00000c4766000, fff00000c4767000)
[   15.212822] 
[   15.213035] The buggy address belongs to the physical page:
[   15.213734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104760
[   15.215324] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.215425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.215724] page_type: f5(slab)
[   15.215803] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   15.215853] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   15.216149] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   15.216618] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   15.216729] head: 0bfffe0000000003 ffffc1ffc311d801 00000000ffffffff 00000000ffffffff
[   15.216853] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   15.216934] page dumped because: kasan: bad access detected
[   15.216999] 
[   15.217016] Memory state around the buggy address:
[   15.217054]  fff00000c4766f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.217097]  fff00000c4766f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.217153] >fff00000c4767000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.217189]                    ^
[   15.217216]  fff00000c4767080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.217271]  fff00000c4767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.217308] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   15.185888] ==================================================================
[   15.186382] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   15.186783] Read of size 1 at addr fff00000c55f087f by task kunit_try_catch/141
[   15.186871] 
[   15.186924] CPU: 1 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.187718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.187784] Hardware name: linux,dummy-virt (DT)
[   15.187825] Call trace:
[   15.187904]  show_stack+0x20/0x38 (C)
[   15.188282]  dump_stack_lvl+0x8c/0xd0
[   15.188506]  print_report+0x118/0x608
[   15.188751]  kasan_report+0xdc/0x128
[   15.189061]  __asan_report_load1_noabort+0x20/0x30
[   15.189181]  kmalloc_oob_left+0x2ec/0x320
[   15.189530]  kunit_try_run_case+0x170/0x3f0
[   15.189590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.189642]  kthread+0x328/0x630
[   15.189687]  ret_from_fork+0x10/0x20
[   15.189801] 
[   15.189826] Allocated by task 26:
[   15.189858]  kasan_save_stack+0x3c/0x68
[   15.189896]  kasan_save_track+0x20/0x40
[   15.189958]  kasan_save_alloc_info+0x40/0x58
[   15.189995]  __kasan_kmalloc+0xd4/0xd8
[   15.190028]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   15.190076]  kstrdup+0x54/0xc8
[   15.190111]  devtmpfs_work_loop+0x6f8/0xa58
[   15.190467]  devtmpfsd+0x50/0x58
[   15.190794]  kthread+0x328/0x630
[   15.190850]  ret_from_fork+0x10/0x20
[   15.190911] 
[   15.190998] Freed by task 26:
[   15.191442]  kasan_save_stack+0x3c/0x68
[   15.191623]  kasan_save_track+0x20/0x40
[   15.192040]  kasan_save_free_info+0x4c/0x78
[   15.192090]  __kasan_slab_free+0x6c/0x98
[   15.192163]  kfree+0x214/0x3c8
[   15.192357]  devtmpfs_work_loop+0x804/0xa58
[   15.192659]  devtmpfsd+0x50/0x58
[   15.192713]  kthread+0x328/0x630
[   15.192904]  ret_from_fork+0x10/0x20
[   15.193182] 
[   15.193247] The buggy address belongs to the object at fff00000c55f0860
[   15.193247]  which belongs to the cache kmalloc-16 of size 16
[   15.193657] The buggy address is located 15 bytes to the right of
[   15.193657]  allocated 16-byte region [fff00000c55f0860, fff00000c55f0870)
[   15.193846] 
[   15.194127] The buggy address belongs to the physical page:
[   15.194367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055f0
[   15.194607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.194766] page_type: f5(slab)
[   15.194911] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   15.195069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.195198] page dumped because: kasan: bad access detected
[   15.195537] 
[   15.195697] Memory state around the buggy address:
[   15.195768]  fff00000c55f0700: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   15.195929]  fff00000c55f0780: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc
[   15.196044] >fff00000c55f0800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.196395]                                                                 ^
[   15.196577]  fff00000c55f0880: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.197009]  fff00000c55f0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.197146] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   15.160690] ==================================================================
[   15.160769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   15.161454] Read of size 1 at addr fff00000c3ec5e80 by task kunit_try_catch/139
[   15.161504] 
[   15.161537] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.161616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.161643] Hardware name: linux,dummy-virt (DT)
[   15.162278] Call trace:
[   15.162331]  show_stack+0x20/0x38 (C)
[   15.162382]  dump_stack_lvl+0x8c/0xd0
[   15.162543]  print_report+0x118/0x608
[   15.163340]  kasan_report+0xdc/0x128
[   15.163567]  __asan_report_load1_noabort+0x20/0x30
[   15.163651]  kmalloc_oob_right+0x5d0/0x660
[   15.163698]  kunit_try_run_case+0x170/0x3f0
[   15.163749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.165994]  kthread+0x328/0x630
[   15.166058]  ret_from_fork+0x10/0x20
[   15.166111] 
[   15.166130] Allocated by task 139:
[   15.166167]  kasan_save_stack+0x3c/0x68
[   15.166205]  kasan_save_track+0x20/0x40
[   15.166239]  kasan_save_alloc_info+0x40/0x58
[   15.166278]  __kasan_kmalloc+0xd4/0xd8
[   15.166311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.166347]  kmalloc_oob_right+0xb0/0x660
[   15.166383]  kunit_try_run_case+0x170/0x3f0
[   15.166424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.166466]  kthread+0x328/0x630
[   15.166628]  ret_from_fork+0x10/0x20
[   15.166663] 
[   15.166684] The buggy address belongs to the object at fff00000c3ec5e00
[   15.166684]  which belongs to the cache kmalloc-128 of size 128
[   15.167062] The buggy address is located 13 bytes to the right of
[   15.167062]  allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73)
[   15.167185] 
[   15.167216] The buggy address belongs to the physical page:
[   15.167255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.167308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.167354] page_type: f5(slab)
[   15.167402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.167460] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.167498] page dumped because: kasan: bad access detected
[   15.167536] 
[   15.167553] Memory state around the buggy address:
[   15.167589]  fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167631]  fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.167672] >fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167708]                    ^
[   15.167734]  fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167784]  fff00000c3ec5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.167820] ==================================================================
[   15.148518] ==================================================================
[   15.148554] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   15.148601] Write of size 1 at addr fff00000c3ec5e78 by task kunit_try_catch/139
[   15.148647] 
[   15.148677] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   15.149047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.149085] Hardware name: linux,dummy-virt (DT)
[   15.149357] Call trace:
[   15.149384]  show_stack+0x20/0x38 (C)
[   15.149435]  dump_stack_lvl+0x8c/0xd0
[   15.149962]  print_report+0x118/0x608
[   15.150006]  kasan_report+0xdc/0x128
[   15.150087]  __asan_report_store1_noabort+0x20/0x30
[   15.150418]  kmalloc_oob_right+0x538/0x660
[   15.150480]  kunit_try_run_case+0x170/0x3f0
[   15.150530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.150582]  kthread+0x328/0x630
[   15.150626]  ret_from_fork+0x10/0x20
[   15.150735] 
[   15.150842] Allocated by task 139:
[   15.150878]  kasan_save_stack+0x3c/0x68
[   15.150916]  kasan_save_track+0x20/0x40
[   15.150970]  kasan_save_alloc_info+0x40/0x58
[   15.151036]  __kasan_kmalloc+0xd4/0xd8
[   15.151162]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.151286]  kmalloc_oob_right+0xb0/0x660
[   15.151404]  kunit_try_run_case+0x170/0x3f0
[   15.151542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.151585]  kthread+0x328/0x630
[   15.151878]  ret_from_fork+0x10/0x20
[   15.151921] 
[   15.151939] The buggy address belongs to the object at fff00000c3ec5e00
[   15.151939]  which belongs to the cache kmalloc-128 of size 128
[   15.152005] The buggy address is located 5 bytes to the right of
[   15.152005]  allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73)
[   15.152076] 
[   15.152106] The buggy address belongs to the physical page:
[   15.152144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.152203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.152249] page_type: f5(slab)
[   15.152341] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.152392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.152447] page dumped because: kasan: bad access detected
[   15.152539] 
[   15.152670] Memory state around the buggy address:
[   15.152935]  fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.153322]  fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.153568] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.153904]                                                                 ^
[   15.154739]  fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154789]  fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154826] ==================================================================
[   15.141037] ==================================================================
[   15.141379] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   15.142248] Write of size 1 at addr fff00000c3ec5e73 by task kunit_try_catch/139
[   15.142381] 
[   15.143138] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc1 #1 PREEMPT 
[   15.143283] Tainted: [N]=TEST
[   15.143315] Hardware name: linux,dummy-virt (DT)
[   15.143533] Call trace:
[   15.143702]  show_stack+0x20/0x38 (C)
[   15.143833]  dump_stack_lvl+0x8c/0xd0
[   15.143894]  print_report+0x118/0x608
[   15.143939]  kasan_report+0xdc/0x128
[   15.143995]  __asan_report_store1_noabort+0x20/0x30
[   15.144044]  kmalloc_oob_right+0x5a4/0x660
[   15.144090]  kunit_try_run_case+0x170/0x3f0
[   15.144147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.144199]  kthread+0x328/0x630
[   15.144245]  ret_from_fork+0x10/0x20
[   15.144401] 
[   15.144439] Allocated by task 139:
[   15.144549]  kasan_save_stack+0x3c/0x68
[   15.144611]  kasan_save_track+0x20/0x40
[   15.144646]  kasan_save_alloc_info+0x40/0x58
[   15.144683]  __kasan_kmalloc+0xd4/0xd8
[   15.144717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.144755]  kmalloc_oob_right+0xb0/0x660
[   15.144792]  kunit_try_run_case+0x170/0x3f0
[   15.144830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.144872]  kthread+0x328/0x630
[   15.144906]  ret_from_fork+0x10/0x20
[   15.144970] 
[   15.145028] The buggy address belongs to the object at fff00000c3ec5e00
[   15.145028]  which belongs to the cache kmalloc-128 of size 128
[   15.145118] The buggy address is located 0 bytes to the right of
[   15.145118]  allocated 115-byte region [fff00000c3ec5e00, fff00000c3ec5e73)
[   15.145184] 
[   15.145265] The buggy address belongs to the physical page:
[   15.145434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ec5
[   15.145694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.145991] page_type: f5(slab)
[   15.146492] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.146558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.146667] page dumped because: kasan: bad access detected
[   15.146706] 
[   15.146732] Memory state around the buggy address:
[   15.146974]  fff00000c3ec5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.147043]  fff00000c3ec5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147097] >fff00000c3ec5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   15.147151]                                                              ^
[   15.147233]  fff00000c3ec5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147274]  fff00000c3ec5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147336] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   94.765069] WARNING: CPU: 0 PID: 659 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   94.765840] Modules linked in:
[   94.766065] CPU: 0 UID: 0 PID: 659 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.5-rc1 #1 PREEMPT 
[   94.767759] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   94.768456] Hardware name: linux,dummy-virt (DT)
[   94.768961] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.769624] pc : intlog10+0x38/0x48
[   94.770033] lr : intlog10_test+0xe4/0x200
[   94.770555] sp : ffff8000822a7c10
[   94.771003] x29: ffff8000822a7c90 x28: 0000000000000000 x27: 0000000000000000
[   94.771470] x26: 1ffe000018c7c461 x25: 0000000000000000 x24: ffff8000822a7ce0
[   94.771818] x23: ffff8000822a7d00 x22: 0000000000000000 x21: 1ffff00010454f82
[   94.772221] x20: ffffa3b0e5035180 x19: ffff800080087990 x18: 00000000c1d0a322
[   94.772642] x17: 0000000044a49506 x16: fff00000c096dc3c x15: 00000000a7707cbd
[   94.773073] x14: 00000000998c43b6 x13: 1ffe00001b493c1d x12: ffff74761d1b9b71
[   94.773478] x11: 1ffff4761d1b9b70 x10: ffff74761d1b9b70 x9 : ffffa3b0e2614f04
[   94.773889] x8 : ffffa3b0e8dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.774342] x5 : ffff700010454f82 x4 : 1ffff00010010f3a x3 : 1ffff4761ca06a30
[   94.774802] x2 : 1ffff4761ca06a30 x1 : 0000000000000003 x0 : 0000000000000000
[   94.775289] Call trace:
[   94.775441]  intlog10+0x38/0x48 (P)
[   94.775688]  kunit_try_run_case+0x170/0x3f0
[   94.775926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.776243]  kthread+0x328/0x630
[   94.776441]  ret_from_fork+0x10/0x20
[   94.776686] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   94.718526] WARNING: CPU: 0 PID: 641 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   94.720044] Modules linked in:
[   94.720474] CPU: 0 UID: 0 PID: 641 Comm: kunit_try_catch Tainted: G    B D          N  6.15.5-rc1 #1 PREEMPT 
[   94.721024] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   94.721234] Hardware name: linux,dummy-virt (DT)
[   94.721433] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.721707] pc : intlog2+0xd8/0xf8
[   94.721888] lr : intlog2_test+0xe4/0x200
[   94.722370] sp : ffff8000822c7c10
[   94.722742] x29: ffff8000822c7c90 x28: 0000000000000000 x27: 0000000000000000
[   94.723532] x26: 1ffe000019009441 x25: 0000000000000000 x24: ffff8000822c7ce0
[   94.724275] x23: ffff8000822c7d00 x22: 0000000000000000 x21: 1ffff00010458f82
[   94.725026] x20: ffffa3b0e5035080 x19: ffff800080087990 x18: 000000008c4190de
[   94.725767] x17: 00000000374884cd x16: fff00000c096dc3c x15: 0000000090eb0b09
[   94.726645] x14: 00000000ee3ed594 x13: 1ffe00001b493c1d x12: ffff74761d1b9b71
[   94.727556] x11: 1ffff4761d1b9b70 x10: ffff74761d1b9b70 x9 : ffffa3b0e2615104
[   94.728292] x8 : ffffa3b0e8dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.729014] x5 : ffff700010458f82 x4 : 1ffff00010010f3a x3 : 1ffff4761ca06a10
[   94.729732] x2 : 1ffff4761ca06a10 x1 : 0000000000000003 x0 : 0000000000000000
[   94.730517] Call trace:
[   94.730694]  intlog2+0xd8/0xf8 (P)
[   94.730888]  kunit_try_run_case+0x170/0x3f0
[   94.731107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.731345]  kthread+0x328/0x630
[   94.731525]  ret_from_fork+0x10/0x20
[   94.731734] ---[ end trace 0000000000000000 ]---
[   93.839399] Internal error: Oops: 0000000096000005 [#1]  SMP
[   93.843571] Modules linked in:
[   93.844024] CPU: 0 UID: 0 PID: 535 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   93.844560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   93.844806] Hardware name: linux,dummy-virt (DT)
[   93.845154] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   93.845566] pc : kunit_test_null_dereference+0x70/0x170
[   93.845915] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.846415] sp : ffff800080ab7d30
[   93.846707] x29: ffff800080ab7d90 x28: 0000000000000000 x27: 0000000000000000
[   93.847249] x26: 1ffe000018c09e61 x25: 0000000000000000 x24: 0000000000000004
[   93.847706] x23: fff00000c604f30c x22: ffffa3b0e26024e0 x21: fff00000c1173c88
[   93.848163] x20: 1ffff00010156fa6 x19: ffff800080087990 x18: 00000000da118399
[   93.848617] x17: 0000000000000001 x16: fff00000da47bfe0 x15: 000000005622077f
[   93.849015] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f7e0 x12: fffd80001901462c
[   93.849440] x11: 1ffe00001901462b x10: fffd80001901462b x9 : ffffa3b0e25f9948
[   93.849882] x8 : ffff800080ab7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   93.850539] x5 : ffff700010156fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   93.851001] x2 : dfff800000000000 x1 : fff00000c80a2880 x0 : ffff800080087990
[   93.851475] Call trace:
[   93.851669]  kunit_test_null_dereference+0x70/0x170 (P)
[   93.851966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   93.852277]  kthread+0x328/0x630
[   93.852513]  ret_from_fork+0x10/0x20
[   93.852960] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   93.853494] ---[ end trace 0000000000000000 ]---