Hay
Date
July 4, 2025, 3:11 p.m.
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   20.050708] ==================================================================
[   20.074186] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520
[   20.074186] 
[   20.083755] Corrupted memory at 0x00000000963ab715 [ ! . . . . . . . . . . . . . . . ] (in kfence-#67):
[   20.093182]  kmalloc_track_caller_oob_right+0x288/0x520
[   20.098410]  kunit_try_run_case+0x1a2/0x480
[   20.102603]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.108004]  kthread+0x334/0x6f0
[   20.111236]  ret_from_fork+0x3e/0x80
[   20.114814]  ret_from_fork_asm+0x1a/0x30
[   20.118742] 
[   20.120240] kfence-#67: 0x000000005ac0b4d5-0x000000001558ad24, size=120, cache=kmalloc-128
[   20.120240] 
[   20.129983] allocated by task 185 on cpu 1 at 20.050649s (0.079333s ago):
[   20.136777]  kmalloc_track_caller_oob_right+0x19a/0x520
[   20.142010]  kunit_try_run_case+0x1a2/0x480
[   20.146195]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.151595]  kthread+0x334/0x6f0
[   20.154830]  ret_from_fork+0x3e/0x80
[   20.158410]  ret_from_fork_asm+0x1a/0x30
[   20.162334] 
[   20.163834] freed by task 185 on cpu 1 at 20.050703s (0.113131s ago):
[   20.170283]  kmalloc_track_caller_oob_right+0x288/0x520
[   20.175515]  kunit_try_run_case+0x1a2/0x480
[   20.179704]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.185111]  kthread+0x334/0x6f0
[   20.188341]  ret_from_fork+0x3e/0x80
[   20.191929]  ret_from_fork_asm+0x1a/0x30
[   20.195882] 
[   20.197385] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   20.208261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.212454] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.219848] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   29.671730] ==================================================================
[   29.683061] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330
[   29.690288] Write of size 4 at addr ffff8881049b7275 by task kunit_try_catch/217
[   29.697689] 
[   29.699189] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   29.699197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.699199] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.699202] Call Trace:
[   29.699204]  <TASK>
[   29.699205]  dump_stack_lvl+0x73/0xb0
[   29.699209]  print_report+0xd1/0x650
[   29.699213]  ? __virt_addr_valid+0x1db/0x2d0
[   29.699217]  ? kmalloc_oob_memset_4+0x166/0x330
[   29.699222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.699226]  ? kmalloc_oob_memset_4+0x166/0x330
[   29.699230]  kasan_report+0x141/0x180
[   29.699235]  ? kmalloc_oob_memset_4+0x166/0x330
[   29.699240]  kasan_check_range+0x10c/0x1c0
[   29.699243]  __asan_memset+0x27/0x50
[   29.699247]  kmalloc_oob_memset_4+0x166/0x330
[   29.699252]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   29.699256]  ? __schedule+0x10cc/0x2b60
[   29.699261]  ? ktime_get_ts64+0x83/0x230
[   29.699265]  kunit_try_run_case+0x1a2/0x480
[   29.699270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.699274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.699279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.699283]  ? __kthread_parkme+0x82/0x180
[   29.699287]  ? preempt_count_sub+0x50/0x80
[   29.699292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.699297]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.699301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.699305]  kthread+0x334/0x6f0
[   29.699308]  ? trace_preempt_on+0x20/0xc0
[   29.699312]  ? __pfx_kthread+0x10/0x10
[   29.699315]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.699320]  ? calculate_sigpending+0x7b/0xa0
[   29.699323]  ? __pfx_kthread+0x10/0x10
[   29.699327]  ret_from_fork+0x3e/0x80
[   29.699331]  ? __pfx_kthread+0x10/0x10
[   29.699334]  ret_from_fork_asm+0x1a/0x30
[   29.699339]  </TASK>
[   29.699341] 
[   29.866316] Allocated by task 217:
[   29.869721]  kasan_save_stack+0x45/0x70
[   29.873559]  kasan_save_track+0x18/0x40
[   29.877400]  kasan_save_alloc_info+0x3b/0x50
[   29.881672]  __kasan_kmalloc+0xb7/0xc0
[   29.885425]  __kmalloc_cache_noprof+0x189/0x420
[   29.889956]  kmalloc_oob_memset_4+0xac/0x330
[   29.894229]  kunit_try_run_case+0x1a2/0x480
[   29.898415]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.903815]  kthread+0x334/0x6f0
[   29.907047]  ret_from_fork+0x3e/0x80
[   29.910628]  ret_from_fork_asm+0x1a/0x30
[   29.914553] 
[   29.916052] The buggy address belongs to the object at ffff8881049b7200
[   29.916052]  which belongs to the cache kmalloc-128 of size 128
[   29.928569] The buggy address is located 117 bytes inside of
[   29.928569]  allocated 120-byte region [ffff8881049b7200, ffff8881049b7278)
[   29.941169] 
[   29.942669] The buggy address belongs to the physical page:
[   29.948240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7
[   29.956241] flags: 0x200000000000000(node=0|zone=2)
[   29.961119] page_type: f5(slab)
[   29.964266] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.972007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.979751] page dumped because: kasan: bad access detected
[   29.985327] 
[   29.986824] Memory state around the buggy address:
[   29.991617]  ffff8881049b7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.998837]  ffff8881049b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.006058] >ffff8881049b7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.013275]                                                                 ^
[   30.020407]  ffff8881049b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.027626]  ffff8881049b7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034845] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   29.300910] ==================================================================
[   29.312352] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330
[   29.319571] Write of size 2 at addr ffff8881049b7177 by task kunit_try_catch/215
[   29.326966] 
[   29.328464] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   29.328472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.328474] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   29.328477] Call Trace:
[   29.328478]  <TASK>
[   29.328480]  dump_stack_lvl+0x73/0xb0
[   29.328484]  print_report+0xd1/0x650
[   29.328488]  ? __virt_addr_valid+0x1db/0x2d0
[   29.328492]  ? kmalloc_oob_memset_2+0x166/0x330
[   29.328496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.328500]  ? kmalloc_oob_memset_2+0x166/0x330
[   29.328505]  kasan_report+0x141/0x180
[   29.328509]  ? kmalloc_oob_memset_2+0x166/0x330
[   29.328514]  kasan_check_range+0x10c/0x1c0
[   29.328518]  __asan_memset+0x27/0x50
[   29.328521]  kmalloc_oob_memset_2+0x166/0x330
[   29.328526]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   29.328530]  ? __schedule+0x10cc/0x2b60
[   29.328535]  ? ktime_get_ts64+0x83/0x230
[   29.328539]  kunit_try_run_case+0x1a2/0x480
[   29.328544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.328548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.328553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.328557]  ? __kthread_parkme+0x82/0x180
[   29.328561]  ? preempt_count_sub+0x50/0x80
[   29.328566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.328571]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.328575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.328579]  kthread+0x334/0x6f0
[   29.328582]  ? trace_preempt_on+0x20/0xc0
[   29.328586]  ? __pfx_kthread+0x10/0x10
[   29.328589]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.328594]  ? calculate_sigpending+0x7b/0xa0
[   29.328598]  ? __pfx_kthread+0x10/0x10
[   29.328601]  ret_from_fork+0x3e/0x80
[   29.328605]  ? __pfx_kthread+0x10/0x10
[   29.328608]  ret_from_fork_asm+0x1a/0x30
[   29.328613]  </TASK>
[   29.328615] 
[   29.495582] Allocated by task 215:
[   29.498988]  kasan_save_stack+0x45/0x70
[   29.502826]  kasan_save_track+0x18/0x40
[   29.506667]  kasan_save_alloc_info+0x3b/0x50
[   29.510952]  __kasan_kmalloc+0xb7/0xc0
[   29.514709]  __kmalloc_cache_noprof+0x189/0x420
[   29.519241]  kmalloc_oob_memset_2+0xac/0x330
[   29.523516]  kunit_try_run_case+0x1a2/0x480
[   29.527710]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.533108]  kthread+0x334/0x6f0
[   29.536340]  ret_from_fork+0x3e/0x80
[   29.539922]  ret_from_fork_asm+0x1a/0x30
[   29.543872] 
[   29.545363] The buggy address belongs to the object at ffff8881049b7100
[   29.545363]  which belongs to the cache kmalloc-128 of size 128
[   29.557879] The buggy address is located 119 bytes inside of
[   29.557879]  allocated 120-byte region [ffff8881049b7100, ffff8881049b7178)
[   29.570496] 
[   29.571997] The buggy address belongs to the physical page:
[   29.577570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7
[   29.585578] flags: 0x200000000000000(node=0|zone=2)
[   29.590457] page_type: f5(slab)
[   29.593605] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.601350] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.609089] page dumped because: kasan: bad access detected
[   29.614663] 
[   29.616162] Memory state around the buggy address:
[   29.620955]  ffff8881049b7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.628182]  ffff8881049b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.635402] >ffff8881049b7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.642620]                                                                 ^
[   29.649752]  ffff8881049b7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.656996]  ffff8881049b7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.664219] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   28.930167] ==================================================================
[   28.940987] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320
[   28.948293] Write of size 128 at addr ffff8881049b7000 by task kunit_try_catch/213
[   28.955861] 
[   28.957361] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   28.957369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.957371] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.957374] Call Trace:
[   28.957375]  <TASK>
[   28.957377]  dump_stack_lvl+0x73/0xb0
[   28.957381]  print_report+0xd1/0x650
[   28.957385]  ? __virt_addr_valid+0x1db/0x2d0
[   28.957389]  ? kmalloc_oob_in_memset+0x15f/0x320
[   28.957393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.957398]  ? kmalloc_oob_in_memset+0x15f/0x320
[   28.957402]  kasan_report+0x141/0x180
[   28.957407]  ? kmalloc_oob_in_memset+0x15f/0x320
[   28.957412]  kasan_check_range+0x10c/0x1c0
[   28.957415]  __asan_memset+0x27/0x50
[   28.957419]  kmalloc_oob_in_memset+0x15f/0x320
[   28.957424]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   28.957428]  ? __schedule+0x10cc/0x2b60
[   28.957433]  ? ktime_get_ts64+0x83/0x230
[   28.957437]  kunit_try_run_case+0x1a2/0x480
[   28.957442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.957447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.957451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.957456]  ? __kthread_parkme+0x82/0x180
[   28.957460]  ? preempt_count_sub+0x50/0x80
[   28.957465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.957469]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.957474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.957478]  kthread+0x334/0x6f0
[   28.957481]  ? trace_preempt_on+0x20/0xc0
[   28.957485]  ? __pfx_kthread+0x10/0x10
[   28.957489]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.957493]  ? calculate_sigpending+0x7b/0xa0
[   28.957497]  ? __pfx_kthread+0x10/0x10
[   28.957500]  ret_from_fork+0x3e/0x80
[   28.957504]  ? __pfx_kthread+0x10/0x10
[   28.957507]  ret_from_fork_asm+0x1a/0x30
[   28.957513]  </TASK>
[   28.957514] 
[   29.124950] Allocated by task 213:
[   29.128361]  kasan_save_stack+0x45/0x70
[   29.132199]  kasan_save_track+0x18/0x40
[   29.136038]  kasan_save_alloc_info+0x3b/0x50
[   29.140313]  __kasan_kmalloc+0xb7/0xc0
[   29.144063]  __kmalloc_cache_noprof+0x189/0x420
[   29.148595]  kmalloc_oob_in_memset+0xac/0x320
[   29.152956]  kunit_try_run_case+0x1a2/0x480
[   29.157141]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.162541]  kthread+0x334/0x6f0
[   29.165775]  ret_from_fork+0x3e/0x80
[   29.169353]  ret_from_fork_asm+0x1a/0x30
[   29.173280] 
[   29.174778] The buggy address belongs to the object at ffff8881049b7000
[   29.174778]  which belongs to the cache kmalloc-128 of size 128
[   29.187284] The buggy address is located 0 bytes inside of
[   29.187284]  allocated 120-byte region [ffff8881049b7000, ffff8881049b7078)
[   29.199713] 
[   29.201210] The buggy address belongs to the physical page:
[   29.206784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049b7
[   29.214783] flags: 0x200000000000000(node=0|zone=2)
[   29.219662] page_type: f5(slab)
[   29.222812] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   29.230558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.238297] page dumped because: kasan: bad access detected
[   29.243868] 
[   29.245360] Memory state around the buggy address:
[   29.250153]  ffff8881049b6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257374]  ffff8881049b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.264593] >ffff8881049b7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.271819]                                                                 ^
[   29.278953]  ffff8881049b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286172]  ffff8881049b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.293390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   28.522203] ==================================================================
[   28.533024] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0
[   28.539820] Read of size 16 at addr ffff888104962a20 by task kunit_try_catch/211
[   28.547218] 
[   28.548721] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   28.548729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.548731] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.548735] Call Trace:
[   28.548736]  <TASK>
[   28.548738]  dump_stack_lvl+0x73/0xb0
[   28.548742]  print_report+0xd1/0x650
[   28.548746]  ? __virt_addr_valid+0x1db/0x2d0
[   28.548750]  ? kmalloc_uaf_16+0x47b/0x4c0
[   28.548754]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.548758]  ? kmalloc_uaf_16+0x47b/0x4c0
[   28.548762]  kasan_report+0x141/0x180
[   28.548767]  ? kmalloc_uaf_16+0x47b/0x4c0
[   28.548772]  __asan_report_load16_noabort+0x18/0x20
[   28.548776]  kmalloc_uaf_16+0x47b/0x4c0
[   28.548780]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   28.548784]  ? __schedule+0x10cc/0x2b60
[   28.548789]  ? ktime_get_ts64+0x83/0x230
[   28.548793]  kunit_try_run_case+0x1a2/0x480
[   28.548798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.548802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.548807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.548812]  ? __kthread_parkme+0x82/0x180
[   28.548816]  ? preempt_count_sub+0x50/0x80
[   28.548820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.548825]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.548829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.548834]  kthread+0x334/0x6f0
[   28.548837]  ? trace_preempt_on+0x20/0xc0
[   28.548841]  ? __pfx_kthread+0x10/0x10
[   28.548844]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.548848]  ? calculate_sigpending+0x7b/0xa0
[   28.548852]  ? __pfx_kthread+0x10/0x10
[   28.548855]  ret_from_fork+0x3e/0x80
[   28.548859]  ? __pfx_kthread+0x10/0x10
[   28.548862]  ret_from_fork_asm+0x1a/0x30
[   28.548868]  </TASK>
[   28.548869] 
[   28.710482] Allocated by task 211:
[   28.713902]  kasan_save_stack+0x45/0x70
[   28.717753]  kasan_save_track+0x18/0x40
[   28.721591]  kasan_save_alloc_info+0x3b/0x50
[   28.725864]  __kasan_kmalloc+0xb7/0xc0
[   28.729616]  __kmalloc_cache_noprof+0x189/0x420
[   28.734151]  kmalloc_uaf_16+0x15b/0x4c0
[   28.737998]  kunit_try_run_case+0x1a2/0x480
[   28.742184]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.747583]  kthread+0x334/0x6f0
[   28.750816]  ret_from_fork+0x3e/0x80
[   28.754394]  ret_from_fork_asm+0x1a/0x30
[   28.758320] 
[   28.759820] Freed by task 211:
[   28.762881]  kasan_save_stack+0x45/0x70
[   28.766747]  kasan_save_track+0x18/0x40
[   28.770585]  kasan_save_free_info+0x3f/0x60
[   28.774771]  __kasan_slab_free+0x56/0x70
[   28.778698]  kfree+0x222/0x3f0
[   28.781756]  kmalloc_uaf_16+0x1d6/0x4c0
[   28.785594]  kunit_try_run_case+0x1a2/0x480
[   28.789782]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.795182]  kthread+0x334/0x6f0
[   28.798412]  ret_from_fork+0x3e/0x80
[   28.801991]  ret_from_fork_asm+0x1a/0x30
[   28.805917] 
[   28.807435] The buggy address belongs to the object at ffff888104962a20
[   28.807435]  which belongs to the cache kmalloc-16 of size 16
[   28.819776] The buggy address is located 0 bytes inside of
[   28.819776]  freed 16-byte region [ffff888104962a20, ffff888104962a30)
[   28.831771] 
[   28.833270] The buggy address belongs to the physical page:
[   28.838845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962
[   28.846850] flags: 0x200000000000000(node=0|zone=2)
[   28.851731] page_type: f5(slab)
[   28.854876] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   28.862641] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.870381] page dumped because: kasan: bad access detected
[   28.875953] 
[   28.877452] Memory state around the buggy address:
[   28.882245]  ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.889466]  ffff888104962980: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.896685] >ffff888104962a00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   28.903918]                                ^
[   28.908209]  ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.915430]  ffff888104962b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.922650] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   28.160251] ==================================================================
[   28.170881] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0
[   28.177614] Write of size 16 at addr ffff8881049629c0 by task kunit_try_catch/209
[   28.185103] 
[   28.186604] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   28.186612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.186614] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.186618] Call Trace:
[   28.186619]  <TASK>
[   28.186621]  dump_stack_lvl+0x73/0xb0
[   28.186625]  print_report+0xd1/0x650
[   28.186630]  ? __virt_addr_valid+0x1db/0x2d0
[   28.186634]  ? kmalloc_oob_16+0x452/0x4a0
[   28.186638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.186642]  ? kmalloc_oob_16+0x452/0x4a0
[   28.186646]  kasan_report+0x141/0x180
[   28.186651]  ? kmalloc_oob_16+0x452/0x4a0
[   28.186655]  __asan_report_store16_noabort+0x1b/0x30
[   28.186660]  kmalloc_oob_16+0x452/0x4a0
[   28.186664]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   28.186668]  ? __schedule+0x10cc/0x2b60
[   28.186673]  ? ktime_get_ts64+0x83/0x230
[   28.186677]  kunit_try_run_case+0x1a2/0x480
[   28.186682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.186686]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.186691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.186696]  ? __kthread_parkme+0x82/0x180
[   28.186700]  ? preempt_count_sub+0x50/0x80
[   28.186704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.186709]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.186713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.186718]  kthread+0x334/0x6f0
[   28.186721]  ? trace_preempt_on+0x20/0xc0
[   28.186725]  ? __pfx_kthread+0x10/0x10
[   28.186728]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.186732]  ? calculate_sigpending+0x7b/0xa0
[   28.186736]  ? __pfx_kthread+0x10/0x10
[   28.186739]  ret_from_fork+0x3e/0x80
[   28.186743]  ? __pfx_kthread+0x10/0x10
[   28.186746]  ret_from_fork_asm+0x1a/0x30
[   28.186752]  </TASK>
[   28.186754] 
[   28.348424] Allocated by task 209:
[   28.351831]  kasan_save_stack+0x45/0x70
[   28.355669]  kasan_save_track+0x18/0x40
[   28.359509]  kasan_save_alloc_info+0x3b/0x50
[   28.363782]  __kasan_kmalloc+0xb7/0xc0
[   28.367535]  __kmalloc_cache_noprof+0x189/0x420
[   28.372067]  kmalloc_oob_16+0xa8/0x4a0
[   28.375821]  kunit_try_run_case+0x1a2/0x480
[   28.380013]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.385415]  kthread+0x334/0x6f0
[   28.388648]  ret_from_fork+0x3e/0x80
[   28.392224]  ret_from_fork_asm+0x1a/0x30
[   28.396150] 
[   28.397650] The buggy address belongs to the object at ffff8881049629c0
[   28.397650]  which belongs to the cache kmalloc-16 of size 16
[   28.409984] The buggy address is located 0 bytes inside of
[   28.409984]  allocated 13-byte region [ffff8881049629c0, ffff8881049629cd)
[   28.422325] 
[   28.423824] The buggy address belongs to the physical page:
[   28.429397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962
[   28.437405] flags: 0x200000000000000(node=0|zone=2)
[   28.442284] page_type: f5(slab)
[   28.445431] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   28.453180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   28.460944] page dumped because: kasan: bad access detected
[   28.466549] 
[   28.468048] Memory state around the buggy address:
[   28.472844]  ffff888104962880: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   28.480061]  ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.487281] >ffff888104962980: 00 05 fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   28.494499]                                               ^
[   28.500072]  ffff888104962a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.507292]  ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.514511] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   27.240527] ==================================================================
[   27.252157] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   27.258777] Read of size 1 at addr ffff8881041c0000 by task kunit_try_catch/207
[   27.266084] 
[   27.267585] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   27.267593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.267595] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.267599] Call Trace:
[   27.267601]  <TASK>
[   27.267602]  dump_stack_lvl+0x73/0xb0
[   27.267606]  print_report+0xd1/0x650
[   27.267611]  ? __virt_addr_valid+0x1db/0x2d0
[   27.267615]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267618]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.267622]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267625]  kasan_report+0x141/0x180
[   27.267630]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267633]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267636]  __kasan_check_byte+0x3d/0x50
[   27.267641]  krealloc_noprof+0x3f/0x340
[   27.267645]  krealloc_uaf+0x1b8/0x5e0
[   27.267648]  ? __pfx_krealloc_uaf+0x10/0x10
[   27.267651]  ? finish_task_switch.isra.0+0x153/0x700
[   27.267656]  ? __switch_to+0x5d9/0xf60
[   27.267660]  ? dequeue_task_fair+0x166/0x4e0
[   27.267664]  ? __schedule+0x10cc/0x2b60
[   27.267669]  ? ktime_get_ts64+0x83/0x230
[   27.267673]  kunit_try_run_case+0x1a2/0x480
[   27.267678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.267683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.267687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.267692]  ? __kthread_parkme+0x82/0x180
[   27.267696]  ? preempt_count_sub+0x50/0x80
[   27.267700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.267705]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.267710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.267714]  kthread+0x334/0x6f0
[   27.267717]  ? trace_preempt_on+0x20/0xc0
[   27.267721]  ? __pfx_kthread+0x10/0x10
[   27.267724]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.267729]  ? calculate_sigpending+0x7b/0xa0
[   27.267732]  ? __pfx_kthread+0x10/0x10
[   27.267736]  ret_from_fork+0x3e/0x80
[   27.267740]  ? __pfx_kthread+0x10/0x10
[   27.267743]  ret_from_fork_asm+0x1a/0x30
[   27.267748]  </TASK>
[   27.267750] 
[   27.448327] Allocated by task 207:
[   27.451732]  kasan_save_stack+0x45/0x70
[   27.455571]  kasan_save_track+0x18/0x40
[   27.459409]  kasan_save_alloc_info+0x3b/0x50
[   27.463682]  __kasan_kmalloc+0xb7/0xc0
[   27.467437]  __kmalloc_cache_noprof+0x189/0x420
[   27.471976]  krealloc_uaf+0xbb/0x5e0
[   27.475555]  kunit_try_run_case+0x1a2/0x480
[   27.479743]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.485142]  kthread+0x334/0x6f0
[   27.488373]  ret_from_fork+0x3e/0x80
[   27.491958]  ret_from_fork_asm+0x1a/0x30
[   27.495879] 
[   27.497379] Freed by task 207:
[   27.500437]  kasan_save_stack+0x45/0x70
[   27.504277]  kasan_save_track+0x18/0x40
[   27.508116]  kasan_save_free_info+0x3f/0x60
[   27.512302]  __kasan_slab_free+0x56/0x70
[   27.516227]  kfree+0x222/0x3f0
[   27.519288]  krealloc_uaf+0x13d/0x5e0
[   27.522964]  kunit_try_run_case+0x1a2/0x480
[   27.527157]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.532557]  kthread+0x334/0x6f0
[   27.535791]  ret_from_fork+0x3e/0x80
[   27.539378]  ret_from_fork_asm+0x1a/0x30
[   27.543305] 
[   27.544804] The buggy address belongs to the object at ffff8881041c0000
[   27.544804]  which belongs to the cache kmalloc-256 of size 256
[   27.557316] The buggy address is located 0 bytes inside of
[   27.557316]  freed 256-byte region [ffff8881041c0000, ffff8881041c0100)
[   27.569398] 
[   27.570914] The buggy address belongs to the physical page:
[   27.576515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c0
[   27.584521] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.592174] flags: 0x200000000000040(head|node=0|zone=2)
[   27.597487] page_type: f5(slab)
[   27.600633] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   27.608372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.616113] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   27.623971] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.631799] head: 0200000000000001 ffffea0004107001 00000000ffffffff 00000000ffffffff
[   27.639625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.647450] page dumped because: kasan: bad access detected
[   27.653022] 
[   27.654523] Memory state around the buggy address:
[   27.659315]  ffff8881041bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.666533]  ffff8881041bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.673755] >ffff8881041c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.680982]                    ^
[   27.684213]  ffff8881041c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.691434]  ffff8881041c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.698651] ==================================================================
[   27.705909] ==================================================================
[   27.713161] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   27.719774] Read of size 1 at addr ffff8881041c0000 by task kunit_try_catch/207
[   27.727089] 
[   27.728588] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   27.728596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.728598] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.728601] Call Trace:
[   27.728603]  <TASK>
[   27.728604]  dump_stack_lvl+0x73/0xb0
[   27.728608]  print_report+0xd1/0x650
[   27.728612]  ? __virt_addr_valid+0x1db/0x2d0
[   27.728616]  ? krealloc_uaf+0x53c/0x5e0
[   27.728619]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.728623]  ? krealloc_uaf+0x53c/0x5e0
[   27.728627]  kasan_report+0x141/0x180
[   27.728631]  ? krealloc_uaf+0x53c/0x5e0
[   27.728635]  __asan_report_load1_noabort+0x18/0x20
[   27.728639]  krealloc_uaf+0x53c/0x5e0
[   27.728642]  ? __pfx_krealloc_uaf+0x10/0x10
[   27.728645]  ? finish_task_switch.isra.0+0x153/0x700
[   27.728649]  ? __switch_to+0x5d9/0xf60
[   27.728653]  ? dequeue_task_fair+0x166/0x4e0
[   27.728657]  ? __schedule+0x10cc/0x2b60
[   27.728662]  ? ktime_get_ts64+0x83/0x230
[   27.728667]  kunit_try_run_case+0x1a2/0x480
[   27.728671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.728676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.728680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.728685]  ? __kthread_parkme+0x82/0x180
[   27.728689]  ? preempt_count_sub+0x50/0x80
[   27.728693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.728698]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.728702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.728707]  kthread+0x334/0x6f0
[   27.728710]  ? trace_preempt_on+0x20/0xc0
[   27.728714]  ? __pfx_kthread+0x10/0x10
[   27.728717]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.728721]  ? calculate_sigpending+0x7b/0xa0
[   27.728725]  ? __pfx_kthread+0x10/0x10
[   27.728728]  ret_from_fork+0x3e/0x80
[   27.728732]  ? __pfx_kthread+0x10/0x10
[   27.728735]  ret_from_fork_asm+0x1a/0x30
[   27.728741]  </TASK>
[   27.728742] 
[   27.902334] Allocated by task 207:
[   27.905743]  kasan_save_stack+0x45/0x70
[   27.909589]  kasan_save_track+0x18/0x40
[   27.913430]  kasan_save_alloc_info+0x3b/0x50
[   27.917703]  __kasan_kmalloc+0xb7/0xc0
[   27.921455]  __kmalloc_cache_noprof+0x189/0x420
[   27.925993]  krealloc_uaf+0xbb/0x5e0
[   27.929576]  kunit_try_run_case+0x1a2/0x480
[   27.933768]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.939170]  kthread+0x334/0x6f0
[   27.942401]  ret_from_fork+0x3e/0x80
[   27.945982]  ret_from_fork_asm+0x1a/0x30
[   27.949931] 
[   27.951449] Freed by task 207:
[   27.954509]  kasan_save_stack+0x45/0x70
[   27.958349]  kasan_save_track+0x18/0x40
[   27.962195]  kasan_save_free_info+0x3f/0x60
[   27.966381]  __kasan_slab_free+0x56/0x70
[   27.970309]  kfree+0x222/0x3f0
[   27.973368]  krealloc_uaf+0x13d/0x5e0
[   27.977032]  kunit_try_run_case+0x1a2/0x480
[   27.981219]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.986617]  kthread+0x334/0x6f0
[   27.989852]  ret_from_fork+0x3e/0x80
[   27.993430]  ret_from_fork_asm+0x1a/0x30
[   27.997357] 
[   27.998856] The buggy address belongs to the object at ffff8881041c0000
[   27.998856]  which belongs to the cache kmalloc-256 of size 256
[   28.011369] The buggy address is located 0 bytes inside of
[   28.011369]  freed 256-byte region [ffff8881041c0000, ffff8881041c0100)
[   28.023452] 
[   28.024961] The buggy address belongs to the physical page:
[   28.030533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c0
[   28.038542] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.046203] flags: 0x200000000000040(head|node=0|zone=2)
[   28.051523] page_type: f5(slab)
[   28.054672] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   28.062418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.070167] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   28.078001] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.085834] head: 0200000000000001 ffffea0004107001 00000000ffffffff 00000000ffffffff
[   28.093662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.101495] page dumped because: kasan: bad access detected
[   28.107067] 
[   28.108568] Memory state around the buggy address:
[   28.113358]  ffff8881041bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.120579]  ffff8881041bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.127797] >ffff8881041c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.135018]                    ^
[   28.138249]  ffff8881041c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.145470]  ffff8881041c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.152690] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   22.717557] ==================================================================
[   22.728627] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   22.736280] Write of size 1 at addr ffff88810314fac9 by task kunit_try_catch/201
[   22.743682] 
[   22.745183] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   22.745192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.745194] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.745197] Call Trace:
[   22.745199]  <TASK>
[   22.745201]  dump_stack_lvl+0x73/0xb0
[   22.745205]  print_report+0xd1/0x650
[   22.745209]  ? __virt_addr_valid+0x1db/0x2d0
[   22.745213]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.745217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.745221]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.745225]  kasan_report+0x141/0x180
[   22.745229]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   22.745234]  __asan_report_store1_noabort+0x1b/0x30
[   22.745238]  krealloc_less_oob_helper+0xd70/0x11d0
[   22.745242]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.745245]  ? finish_task_switch.isra.0+0x153/0x700
[   22.745250]  ? __switch_to+0x5d9/0xf60
[   22.745253]  ? dequeue_task_fair+0x166/0x4e0
[   22.745258]  ? __schedule+0x10cc/0x2b60
[   22.745263]  krealloc_less_oob+0x1c/0x30
[   22.745266]  kunit_try_run_case+0x1a2/0x480
[   22.745271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.745275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.745280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.745284]  ? __kthread_parkme+0x82/0x180
[   22.745288]  ? preempt_count_sub+0x50/0x80
[   22.745293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.745298]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.745302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.745306]  kthread+0x334/0x6f0
[   22.745309]  ? trace_preempt_on+0x20/0xc0
[   22.745314]  ? __pfx_kthread+0x10/0x10
[   22.745317]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.745321]  ? calculate_sigpending+0x7b/0xa0
[   22.745325]  ? __pfx_kthread+0x10/0x10
[   22.745328]  ret_from_fork+0x3e/0x80
[   22.745332]  ? __pfx_kthread+0x10/0x10
[   22.745335]  ret_from_fork_asm+0x1a/0x30
[   22.745341]  </TASK>
[   22.745342] 
[   22.924526] Allocated by task 201:
[   22.927933]  kasan_save_stack+0x45/0x70
[   22.931798]  kasan_save_track+0x18/0x40
[   22.935639]  kasan_save_alloc_info+0x3b/0x50
[   22.939945]  __kasan_krealloc+0x190/0x1f0
[   22.943993]  krealloc_noprof+0xf3/0x340
[   22.947831]  krealloc_less_oob_helper+0x1aa/0x11d0
[   22.952626]  krealloc_less_oob+0x1c/0x30
[   22.956549]  kunit_try_run_case+0x1a2/0x480
[   22.960737]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.966134]  kthread+0x334/0x6f0
[   22.969368]  ret_from_fork+0x3e/0x80
[   22.972969]  ret_from_fork_asm+0x1a/0x30
[   22.976926] 
[   22.978452] The buggy address belongs to the object at ffff88810314fa00
[   22.978452]  which belongs to the cache kmalloc-256 of size 256
[   22.990971] The buggy address is located 0 bytes to the right of
[   22.990971]  allocated 201-byte region [ffff88810314fa00, ffff88810314fac9)
[   23.003929] 
[   23.005449] The buggy address belongs to the physical page:
[   23.011021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e
[   23.019027] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.026681] flags: 0x200000000000040(head|node=0|zone=2)
[   23.031994] page_type: f5(slab)
[   23.035142] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.042889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.050662] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.058489] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.066313] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff
[   23.074139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.081982] page dumped because: kasan: bad access detected
[   23.087557] 
[   23.089056] Memory state around the buggy address:
[   23.093847]  ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.101069]  ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.108294] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.115513]                                               ^
[   23.121086]  ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.128306]  ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.135525] ==================================================================
[   23.564314] ==================================================================
[   23.571545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   23.579205] Write of size 1 at addr ffff88810314fada by task kunit_try_catch/201
[   23.586596] 
[   23.588099] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   23.588107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.588109] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.588112] Call Trace:
[   23.588113]  <TASK>
[   23.588115]  dump_stack_lvl+0x73/0xb0
[   23.588119]  print_report+0xd1/0x650
[   23.588123]  ? __virt_addr_valid+0x1db/0x2d0
[   23.588127]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.588131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.588135]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.588139]  kasan_report+0x141/0x180
[   23.588143]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   23.588148]  __asan_report_store1_noabort+0x1b/0x30
[   23.588152]  krealloc_less_oob_helper+0xec6/0x11d0
[   23.588156]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.588159]  ? finish_task_switch.isra.0+0x153/0x700
[   23.588164]  ? __switch_to+0x5d9/0xf60
[   23.588168]  ? dequeue_task_fair+0x166/0x4e0
[   23.588172]  ? __schedule+0x10cc/0x2b60
[   23.588177]  krealloc_less_oob+0x1c/0x30
[   23.588180]  kunit_try_run_case+0x1a2/0x480
[   23.588185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.588189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.588194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.588199]  ? __kthread_parkme+0x82/0x180
[   23.588203]  ? preempt_count_sub+0x50/0x80
[   23.588207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.588212]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.588216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.588221]  kthread+0x334/0x6f0
[   23.588223]  ? trace_preempt_on+0x20/0xc0
[   23.588228]  ? __pfx_kthread+0x10/0x10
[   23.588231]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.588235]  ? calculate_sigpending+0x7b/0xa0
[   23.588239]  ? __pfx_kthread+0x10/0x10
[   23.588242]  ret_from_fork+0x3e/0x80
[   23.588246]  ? __pfx_kthread+0x10/0x10
[   23.588249]  ret_from_fork_asm+0x1a/0x30
[   23.588255]  </TASK>
[   23.588257] 
[   23.767478] Allocated by task 201:
[   23.770884]  kasan_save_stack+0x45/0x70
[   23.774759]  kasan_save_track+0x18/0x40
[   23.778605]  kasan_save_alloc_info+0x3b/0x50
[   23.782880]  __kasan_krealloc+0x190/0x1f0
[   23.786891]  krealloc_noprof+0xf3/0x340
[   23.790756]  krealloc_less_oob_helper+0x1aa/0x11d0
[   23.795549]  krealloc_less_oob+0x1c/0x30
[   23.799475]  kunit_try_run_case+0x1a2/0x480
[   23.803660]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.809060]  kthread+0x334/0x6f0
[   23.812293]  ret_from_fork+0x3e/0x80
[   23.815874]  ret_from_fork_asm+0x1a/0x30
[   23.819799] 
[   23.821298] The buggy address belongs to the object at ffff88810314fa00
[   23.821298]  which belongs to the cache kmalloc-256 of size 256
[   23.833812] The buggy address is located 17 bytes to the right of
[   23.833812]  allocated 201-byte region [ffff88810314fa00, ffff88810314fac9)
[   23.846848] 
[   23.848348] The buggy address belongs to the physical page:
[   23.853929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e
[   23.861935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.869588] flags: 0x200000000000040(head|node=0|zone=2)
[   23.874930] page_type: f5(slab)
[   23.878073] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.885813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.893552] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.901379] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.909206] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff
[   23.917039] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.924863] page dumped because: kasan: bad access detected
[   23.930437] 
[   23.931937] Memory state around the buggy address:
[   23.936748]  ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.943973]  ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.951193] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.958413]                                                     ^
[   23.964507]  ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.971726]  ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.978955] ==================================================================
[   26.558086] ==================================================================
[   26.565317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   26.572970] Write of size 1 at addr ffff888102a320ea by task kunit_try_catch/205
[   26.580363] 
[   26.581862] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   26.581869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.581871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.581874] Call Trace:
[   26.581876]  <TASK>
[   26.581877]  dump_stack_lvl+0x73/0xb0
[   26.581881]  print_report+0xd1/0x650
[   26.581885]  ? __virt_addr_valid+0x1db/0x2d0
[   26.581889]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.581892]  ? kasan_addr_to_slab+0x11/0xa0
[   26.581896]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.581917]  kasan_report+0x141/0x180
[   26.581921]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   26.581926]  __asan_report_store1_noabort+0x1b/0x30
[   26.581930]  krealloc_less_oob_helper+0xe90/0x11d0
[   26.581934]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.581938]  ? finish_task_switch.isra.0+0x153/0x700
[   26.581943]  ? __switch_to+0x5d9/0xf60
[   26.581959]  ? dequeue_task_fair+0x166/0x4e0
[   26.581963]  ? __schedule+0x10cc/0x2b60
[   26.581968]  krealloc_large_less_oob+0x1c/0x30
[   26.581971]  kunit_try_run_case+0x1a2/0x480
[   26.581976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.581980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.581985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.581989]  ? __kthread_parkme+0x82/0x180
[   26.581993]  ? preempt_count_sub+0x50/0x80
[   26.581998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.582003]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.582007]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.582011]  kthread+0x334/0x6f0
[   26.582014]  ? trace_preempt_on+0x20/0xc0
[   26.582018]  ? __pfx_kthread+0x10/0x10
[   26.582022]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.582026]  ? calculate_sigpending+0x7b/0xa0
[   26.582030]  ? __pfx_kthread+0x10/0x10
[   26.582033]  ret_from_fork+0x3e/0x80
[   26.582037]  ? __pfx_kthread+0x10/0x10
[   26.582040]  ret_from_fork_asm+0x1a/0x30
[   26.582045]  </TASK>
[   26.582047] 
[   26.760654] The buggy address belongs to the physical page:
[   26.766229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   26.774235] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.781888] flags: 0x200000000000040(head|node=0|zone=2)
[   26.787227] page_type: f8(unknown)
[   26.790632] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.798372] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.806111] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.813938] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.821790] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   26.829615] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.837440] page dumped because: kasan: bad access detected
[   26.843014] 
[   26.844512] Memory state around the buggy address:
[   26.849305]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.856524]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.863743] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.870973]                                                           ^
[   26.877584]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.884804]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.892024] ==================================================================
[   26.217515] ==================================================================
[   26.224753] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   26.232406] Write of size 1 at addr ffff888102a320da by task kunit_try_catch/205
[   26.239799] 
[   26.241300] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   26.241307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.241309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.241312] Call Trace:
[   26.241314]  <TASK>
[   26.241315]  dump_stack_lvl+0x73/0xb0
[   26.241319]  print_report+0xd1/0x650
[   26.241323]  ? __virt_addr_valid+0x1db/0x2d0
[   26.241327]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.241330]  ? kasan_addr_to_slab+0x11/0xa0
[   26.241334]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.241338]  kasan_report+0x141/0x180
[   26.241342]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   26.241347]  __asan_report_store1_noabort+0x1b/0x30
[   26.241351]  krealloc_less_oob_helper+0xec6/0x11d0
[   26.241355]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.241359]  ? finish_task_switch.isra.0+0x153/0x700
[   26.241363]  ? __switch_to+0x5d9/0xf60
[   26.241367]  ? dequeue_task_fair+0x166/0x4e0
[   26.241371]  ? __schedule+0x10cc/0x2b60
[   26.241376]  krealloc_large_less_oob+0x1c/0x30
[   26.241380]  kunit_try_run_case+0x1a2/0x480
[   26.241384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.241389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.241393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.241398]  ? __kthread_parkme+0x82/0x180
[   26.241402]  ? preempt_count_sub+0x50/0x80
[   26.241406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.241411]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.241415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.241420]  kthread+0x334/0x6f0
[   26.241423]  ? trace_preempt_on+0x20/0xc0
[   26.241427]  ? __pfx_kthread+0x10/0x10
[   26.241430]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.241434]  ? calculate_sigpending+0x7b/0xa0
[   26.241438]  ? __pfx_kthread+0x10/0x10
[   26.241441]  ret_from_fork+0x3e/0x80
[   26.241445]  ? __pfx_kthread+0x10/0x10
[   26.241449]  ret_from_fork_asm+0x1a/0x30
[   26.241454]  </TASK>
[   26.241456] 
[   26.419987] The buggy address belongs to the physical page:
[   26.425560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   26.433568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.441222] flags: 0x200000000000040(head|node=0|zone=2)
[   26.446531] page_type: f8(unknown)
[   26.449939] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.457706] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.465443] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.473269] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.481097] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   26.488931] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.496781] page dumped because: kasan: bad access detected
[   26.502354] 
[   26.503853] Memory state around the buggy address:
[   26.508647]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.515868]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.523093] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.530314]                                                     ^
[   26.536405]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.543626]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.550843] ==================================================================
[   24.408641] ==================================================================
[   24.415872] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   24.423526] Write of size 1 at addr ffff88810314faeb by task kunit_try_catch/201
[   24.430929] 
[   24.432426] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   24.432434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.432436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.432439] Call Trace:
[   24.432440]  <TASK>
[   24.432442]  dump_stack_lvl+0x73/0xb0
[   24.432446]  print_report+0xd1/0x650
[   24.432450]  ? __virt_addr_valid+0x1db/0x2d0
[   24.432454]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.432457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.432461]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.432465]  kasan_report+0x141/0x180
[   24.432469]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   24.432474]  __asan_report_store1_noabort+0x1b/0x30
[   24.432478]  krealloc_less_oob_helper+0xd47/0x11d0
[   24.432482]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.432486]  ? finish_task_switch.isra.0+0x153/0x700
[   24.432490]  ? __switch_to+0x5d9/0xf60
[   24.432494]  ? dequeue_task_fair+0x166/0x4e0
[   24.432498]  ? __schedule+0x10cc/0x2b60
[   24.432503]  krealloc_less_oob+0x1c/0x30
[   24.432506]  kunit_try_run_case+0x1a2/0x480
[   24.432511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.432515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.432520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.432524]  ? __kthread_parkme+0x82/0x180
[   24.432528]  ? preempt_count_sub+0x50/0x80
[   24.432533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.432537]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.432542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.432546]  kthread+0x334/0x6f0
[   24.432549]  ? trace_preempt_on+0x20/0xc0
[   24.432553]  ? __pfx_kthread+0x10/0x10
[   24.432556]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.432560]  ? calculate_sigpending+0x7b/0xa0
[   24.432564]  ? __pfx_kthread+0x10/0x10
[   24.432567]  ret_from_fork+0x3e/0x80
[   24.432571]  ? __pfx_kthread+0x10/0x10
[   24.432574]  ret_from_fork_asm+0x1a/0x30
[   24.432580]  </TASK>
[   24.432581] 
[   24.611782] Allocated by task 201:
[   24.615188]  kasan_save_stack+0x45/0x70
[   24.619036]  kasan_save_track+0x18/0x40
[   24.622874]  kasan_save_alloc_info+0x3b/0x50
[   24.627146]  __kasan_krealloc+0x190/0x1f0
[   24.631160]  krealloc_noprof+0xf3/0x340
[   24.634998]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.639792]  krealloc_less_oob+0x1c/0x30
[   24.643718]  kunit_try_run_case+0x1a2/0x480
[   24.647932]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.653354]  kthread+0x334/0x6f0
[   24.656587]  ret_from_fork+0x3e/0x80
[   24.660168]  ret_from_fork_asm+0x1a/0x30
[   24.664093] 
[   24.665593] The buggy address belongs to the object at ffff88810314fa00
[   24.665593]  which belongs to the cache kmalloc-256 of size 256
[   24.678109] The buggy address is located 34 bytes to the right of
[   24.678109]  allocated 201-byte region [ffff88810314fa00, ffff88810314fac9)
[   24.691143] 
[   24.692640] The buggy address belongs to the physical page:
[   24.698214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e
[   24.706221] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.713875] flags: 0x200000000000040(head|node=0|zone=2)
[   24.719186] page_type: f5(slab)
[   24.722335] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   24.730082] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.737830] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   24.745664] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.753490] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff
[   24.761316] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.769141] page dumped because: kasan: bad access detected
[   24.774713] 
[   24.776214] Memory state around the buggy address:
[   24.781007]  ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.788225]  ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.795446] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.802673]                                                           ^
[   24.809285]  ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.816505]  ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.823724] ==================================================================
[   23.986186] ==================================================================
[   23.993425] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   24.001079] Write of size 1 at addr ffff88810314faea by task kunit_try_catch/201
[   24.008470] 
[   24.009982] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   24.009989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.009991] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.009995] Call Trace:
[   24.009996]  <TASK>
[   24.009998]  dump_stack_lvl+0x73/0xb0
[   24.010001]  print_report+0xd1/0x650
[   24.010005]  ? __virt_addr_valid+0x1db/0x2d0
[   24.010009]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.010013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.010017]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.010021]  kasan_report+0x141/0x180
[   24.010025]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   24.010030]  __asan_report_store1_noabort+0x1b/0x30
[   24.010034]  krealloc_less_oob_helper+0xe90/0x11d0
[   24.010038]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.010041]  ? finish_task_switch.isra.0+0x153/0x700
[   24.010046]  ? __switch_to+0x5d9/0xf60
[   24.010049]  ? dequeue_task_fair+0x166/0x4e0
[   24.010054]  ? __schedule+0x10cc/0x2b60
[   24.010059]  krealloc_less_oob+0x1c/0x30
[   24.010062]  kunit_try_run_case+0x1a2/0x480
[   24.010067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.010071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.010076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.010080]  ? __kthread_parkme+0x82/0x180
[   24.010084]  ? preempt_count_sub+0x50/0x80
[   24.010089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.010093]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.010097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.010102]  kthread+0x334/0x6f0
[   24.010105]  ? trace_preempt_on+0x20/0xc0
[   24.010109]  ? __pfx_kthread+0x10/0x10
[   24.010112]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.010116]  ? calculate_sigpending+0x7b/0xa0
[   24.010120]  ? __pfx_kthread+0x10/0x10
[   24.010123]  ret_from_fork+0x3e/0x80
[   24.010127]  ? __pfx_kthread+0x10/0x10
[   24.010130]  ret_from_fork_asm+0x1a/0x30
[   24.010136]  </TASK>
[   24.010137] 
[   24.189473] Allocated by task 201:
[   24.192879]  kasan_save_stack+0x45/0x70
[   24.196719]  kasan_save_track+0x18/0x40
[   24.200558]  kasan_save_alloc_info+0x3b/0x50
[   24.204830]  __kasan_krealloc+0x190/0x1f0
[   24.208842]  krealloc_noprof+0xf3/0x340
[   24.212683]  krealloc_less_oob_helper+0x1aa/0x11d0
[   24.217476]  krealloc_less_oob+0x1c/0x30
[   24.221401]  kunit_try_run_case+0x1a2/0x480
[   24.225588]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.230987]  kthread+0x334/0x6f0
[   24.234218]  ret_from_fork+0x3e/0x80
[   24.237800]  ret_from_fork_asm+0x1a/0x30
[   24.241724] 
[   24.243225] The buggy address belongs to the object at ffff88810314fa00
[   24.243225]  which belongs to the cache kmalloc-256 of size 256
[   24.255741] The buggy address is located 33 bytes to the right of
[   24.255741]  allocated 201-byte region [ffff88810314fa00, ffff88810314fac9)
[   24.268782] 
[   24.270280] The buggy address belongs to the physical page:
[   24.275856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e
[   24.283863] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.291515] flags: 0x200000000000040(head|node=0|zone=2)
[   24.296829] page_type: f5(slab)
[   24.299975] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   24.307712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.315454] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   24.323288] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.331112] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff
[   24.338940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.346791] page dumped because: kasan: bad access detected
[   24.352362] 
[   24.353864] Memory state around the buggy address:
[   24.358656]  ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.365874]  ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.373094] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.380314]                                                           ^
[   24.386934]  ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.394181]  ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.401398] ==================================================================
[   25.532823] ==================================================================
[   25.544416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   25.552077] Write of size 1 at addr ffff888102a320c9 by task kunit_try_catch/205
[   25.559479] 
[   25.560977] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   25.560984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.560986] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.560990] Call Trace:
[   25.560991]  <TASK>
[   25.560993]  dump_stack_lvl+0x73/0xb0
[   25.560997]  print_report+0xd1/0x650
[   25.561001]  ? __virt_addr_valid+0x1db/0x2d0
[   25.561005]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   25.561008]  ? kasan_addr_to_slab+0x11/0xa0
[   25.561013]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   25.561016]  kasan_report+0x141/0x180
[   25.561021]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   25.561025]  __asan_report_store1_noabort+0x1b/0x30
[   25.561029]  krealloc_less_oob_helper+0xd70/0x11d0
[   25.561033]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.561037]  ? finish_task_switch.isra.0+0x153/0x700
[   25.561041]  ? __switch_to+0x5d9/0xf60
[   25.561045]  ? dequeue_task_fair+0x166/0x4e0
[   25.561049]  ? __schedule+0x10cc/0x2b60
[   25.561054]  krealloc_large_less_oob+0x1c/0x30
[   25.561058]  kunit_try_run_case+0x1a2/0x480
[   25.561062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.561067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.561071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.561076]  ? __kthread_parkme+0x82/0x180
[   25.561080]  ? preempt_count_sub+0x50/0x80
[   25.561085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.561089]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.561094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.561098]  kthread+0x334/0x6f0
[   25.561101]  ? trace_preempt_on+0x20/0xc0
[   25.561105]  ? __pfx_kthread+0x10/0x10
[   25.561108]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.561112]  ? calculate_sigpending+0x7b/0xa0
[   25.561116]  ? __pfx_kthread+0x10/0x10
[   25.561119]  ret_from_fork+0x3e/0x80
[   25.561123]  ? __pfx_kthread+0x10/0x10
[   25.561126]  ret_from_fork_asm+0x1a/0x30
[   25.561132]  </TASK>
[   25.561133] 
[   25.739682] The buggy address belongs to the physical page:
[   25.745256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   25.753262] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.760931] flags: 0x200000000000040(head|node=0|zone=2)
[   25.766271] page_type: f8(unknown)
[   25.769678] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.777416] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.785158] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.792983] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.800809] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   25.808637] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.816470] page dumped because: kasan: bad access detected
[   25.822040] 
[   25.823532] Memory state around the buggy address:
[   25.828324]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.835545]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.842764] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.849984]                                               ^
[   25.855557]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.862774]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.869994] ==================================================================
[   26.899249] ==================================================================
[   26.906489] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   26.914141] Write of size 1 at addr ffff888102a320eb by task kunit_try_catch/205
[   26.921533] 
[   26.923034] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   26.923042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.923044] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   26.923047] Call Trace:
[   26.923048]  <TASK>
[   26.923050]  dump_stack_lvl+0x73/0xb0
[   26.923053]  print_report+0xd1/0x650
[   26.923057]  ? __virt_addr_valid+0x1db/0x2d0
[   26.923061]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.923064]  ? kasan_addr_to_slab+0x11/0xa0
[   26.923068]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.923072]  kasan_report+0x141/0x180
[   26.923076]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   26.923081]  __asan_report_store1_noabort+0x1b/0x30
[   26.923085]  krealloc_less_oob_helper+0xd47/0x11d0
[   26.923089]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   26.923093]  ? finish_task_switch.isra.0+0x153/0x700
[   26.923097]  ? __switch_to+0x5d9/0xf60
[   26.923101]  ? dequeue_task_fair+0x166/0x4e0
[   26.923105]  ? __schedule+0x10cc/0x2b60
[   26.923110]  krealloc_large_less_oob+0x1c/0x30
[   26.923113]  kunit_try_run_case+0x1a2/0x480
[   26.923118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.923122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.923127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.923131]  ? __kthread_parkme+0x82/0x180
[   26.923135]  ? preempt_count_sub+0x50/0x80
[   26.923140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.923145]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.923149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.923153]  kthread+0x334/0x6f0
[   26.923156]  ? trace_preempt_on+0x20/0xc0
[   26.923160]  ? __pfx_kthread+0x10/0x10
[   26.923163]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.923168]  ? calculate_sigpending+0x7b/0xa0
[   26.923171]  ? __pfx_kthread+0x10/0x10
[   26.923175]  ret_from_fork+0x3e/0x80
[   26.923179]  ? __pfx_kthread+0x10/0x10
[   26.923182]  ret_from_fork_asm+0x1a/0x30
[   26.923187]  </TASK>
[   26.923189] 
[   27.101661] The buggy address belongs to the physical page:
[   27.107235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   27.115241] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.122895] flags: 0x200000000000040(head|node=0|zone=2)
[   27.128234] page_type: f8(unknown)
[   27.131640] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.139388] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.147127] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   27.154973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   27.162804] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   27.170630] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   27.178455] page dumped because: kasan: bad access detected
[   27.184029] 
[   27.185529] Memory state around the buggy address:
[   27.190321]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.197541]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.204769] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   27.211997]                                                           ^
[   27.218610]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.225837]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   27.233056] ==================================================================
[   23.142771] ==================================================================
[   23.149998] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   23.157651] Write of size 1 at addr ffff88810314fad0 by task kunit_try_catch/201
[   23.165044] 
[   23.166545] CPU: 2 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   23.166553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.166555] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.166558] Call Trace:
[   23.166560]  <TASK>
[   23.166561]  dump_stack_lvl+0x73/0xb0
[   23.166565]  print_report+0xd1/0x650
[   23.166570]  ? __virt_addr_valid+0x1db/0x2d0
[   23.166573]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   23.166577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.166581]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   23.166585]  kasan_report+0x141/0x180
[   23.166589]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   23.166594]  __asan_report_store1_noabort+0x1b/0x30
[   23.166598]  krealloc_less_oob_helper+0xe23/0x11d0
[   23.166602]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   23.166606]  ? finish_task_switch.isra.0+0x153/0x700
[   23.166610]  ? __switch_to+0x5d9/0xf60
[   23.166614]  ? dequeue_task_fair+0x166/0x4e0
[   23.166618]  ? __schedule+0x10cc/0x2b60
[   23.166623]  krealloc_less_oob+0x1c/0x30
[   23.166626]  kunit_try_run_case+0x1a2/0x480
[   23.166631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.166635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.166640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.166645]  ? __kthread_parkme+0x82/0x180
[   23.166649]  ? preempt_count_sub+0x50/0x80
[   23.166653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.166658]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.166662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.166666]  kthread+0x334/0x6f0
[   23.166669]  ? trace_preempt_on+0x20/0xc0
[   23.166674]  ? __pfx_kthread+0x10/0x10
[   23.166677]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.166681]  ? calculate_sigpending+0x7b/0xa0
[   23.166685]  ? __pfx_kthread+0x10/0x10
[   23.166688]  ret_from_fork+0x3e/0x80
[   23.166692]  ? __pfx_kthread+0x10/0x10
[   23.166695]  ret_from_fork_asm+0x1a/0x30
[   23.166700]  </TASK>
[   23.166702] 
[   23.345950] Allocated by task 201:
[   23.349373]  kasan_save_stack+0x45/0x70
[   23.353214]  kasan_save_track+0x18/0x40
[   23.357052]  kasan_save_alloc_info+0x3b/0x50
[   23.361327]  __kasan_krealloc+0x190/0x1f0
[   23.365346]  krealloc_noprof+0xf3/0x340
[   23.369185]  krealloc_less_oob_helper+0x1aa/0x11d0
[   23.373980]  krealloc_less_oob+0x1c/0x30
[   23.377931]  kunit_try_run_case+0x1a2/0x480
[   23.382116]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.387517]  kthread+0x334/0x6f0
[   23.390748]  ret_from_fork+0x3e/0x80
[   23.394329]  ret_from_fork_asm+0x1a/0x30
[   23.398254] 
[   23.399754] The buggy address belongs to the object at ffff88810314fa00
[   23.399754]  which belongs to the cache kmalloc-256 of size 256
[   23.412267] The buggy address is located 7 bytes to the right of
[   23.412267]  allocated 201-byte region [ffff88810314fa00, ffff88810314fac9)
[   23.425215] 
[   23.426715] The buggy address belongs to the physical page:
[   23.432287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10314e
[   23.440287] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.447961] flags: 0x200000000000040(head|node=0|zone=2)
[   23.453280] page_type: f5(slab)
[   23.456425] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.464164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.471930] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.479782] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.487608] head: 0200000000000001 ffffea00040c5381 00000000ffffffff 00000000ffffffff
[   23.495442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.503269] page dumped because: kasan: bad access detected
[   23.508839] 
[   23.510331] Memory state around the buggy address:
[   23.515123]  ffff88810314f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.522345]  ffff88810314fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.529570] >ffff88810314fa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.536791]                                                  ^
[   23.542625]  ffff88810314fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.549850]  ffff88810314fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.557071] ==================================================================
[   25.877258] ==================================================================
[   25.884504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   25.892163] Write of size 1 at addr ffff888102a320d0 by task kunit_try_catch/205
[   25.899557] 
[   25.901055] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   25.901063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.901065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.901068] Call Trace:
[   25.901069]  <TASK>
[   25.901071]  dump_stack_lvl+0x73/0xb0
[   25.901075]  print_report+0xd1/0x650
[   25.901079]  ? __virt_addr_valid+0x1db/0x2d0
[   25.901083]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   25.901086]  ? kasan_addr_to_slab+0x11/0xa0
[   25.901090]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   25.901094]  kasan_report+0x141/0x180
[   25.901098]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   25.901103]  __asan_report_store1_noabort+0x1b/0x30
[   25.901107]  krealloc_less_oob_helper+0xe23/0x11d0
[   25.901111]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.901115]  ? finish_task_switch.isra.0+0x153/0x700
[   25.901119]  ? __switch_to+0x5d9/0xf60
[   25.901123]  ? dequeue_task_fair+0x166/0x4e0
[   25.901127]  ? __schedule+0x10cc/0x2b60
[   25.901132]  krealloc_large_less_oob+0x1c/0x30
[   25.901135]  kunit_try_run_case+0x1a2/0x480
[   25.901140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.901144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.901149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.901154]  ? __kthread_parkme+0x82/0x180
[   25.901158]  ? preempt_count_sub+0x50/0x80
[   25.901162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.901167]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.901171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.901176]  kthread+0x334/0x6f0
[   25.901178]  ? trace_preempt_on+0x20/0xc0
[   25.901183]  ? __pfx_kthread+0x10/0x10
[   25.901186]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.901190]  ? calculate_sigpending+0x7b/0xa0
[   25.901194]  ? __pfx_kthread+0x10/0x10
[   25.901197]  ret_from_fork+0x3e/0x80
[   25.901201]  ? __pfx_kthread+0x10/0x10
[   25.901204]  ret_from_fork_asm+0x1a/0x30
[   25.901210]  </TASK>
[   25.901211] 
[   26.079708] The buggy address belongs to the physical page:
[   26.085282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   26.093291] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.100972] flags: 0x200000000000040(head|node=0|zone=2)
[   26.106290] page_type: f8(unknown)
[   26.109695] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.117436] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.125175] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.133000] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   26.140829] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   26.148662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.156494] page dumped because: kasan: bad access detected
[   26.162069] 
[   26.163568] Memory state around the buggy address:
[   26.168360]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.175580]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.182800] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   26.190019]                                                  ^
[   26.195851]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.203070]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   26.210288] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   24.839494] ==================================================================
[   24.850565] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   24.858138] Write of size 1 at addr ffff888102a320eb by task kunit_try_catch/203
[   24.865532] 
[   24.867033] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   24.867041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.867044] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   24.867047] Call Trace:
[   24.867049]  <TASK>
[   24.867051]  dump_stack_lvl+0x73/0xb0
[   24.867055]  print_report+0xd1/0x650
[   24.867059]  ? __virt_addr_valid+0x1db/0x2d0
[   24.867063]  ? krealloc_more_oob_helper+0x821/0x930
[   24.867067]  ? kasan_addr_to_slab+0x11/0xa0
[   24.867071]  ? krealloc_more_oob_helper+0x821/0x930
[   24.867074]  kasan_report+0x141/0x180
[   24.867079]  ? krealloc_more_oob_helper+0x821/0x930
[   24.867083]  __asan_report_store1_noabort+0x1b/0x30
[   24.867087]  krealloc_more_oob_helper+0x821/0x930
[   24.867091]  ? __schedule+0x10cc/0x2b60
[   24.867095]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.867099]  ? finish_task_switch.isra.0+0x153/0x700
[   24.867103]  ? __switch_to+0x5d9/0xf60
[   24.867107]  ? dequeue_task_fair+0x166/0x4e0
[   24.867111]  ? __schedule+0x10cc/0x2b60
[   24.867116]  krealloc_large_more_oob+0x1c/0x30
[   24.867120]  kunit_try_run_case+0x1a2/0x480
[   24.867124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.867129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.867133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.867138]  ? __kthread_parkme+0x82/0x180
[   24.867142]  ? preempt_count_sub+0x50/0x80
[   24.867146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.867151]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   24.867155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.867160]  kthread+0x334/0x6f0
[   24.867163]  ? trace_preempt_on+0x20/0xc0
[   24.867167]  ? __pfx_kthread+0x10/0x10
[   24.867170]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.867174]  ? calculate_sigpending+0x7b/0xa0
[   24.867178]  ? __pfx_kthread+0x10/0x10
[   24.867181]  ret_from_fork+0x3e/0x80
[   24.867185]  ? __pfx_kthread+0x10/0x10
[   24.867188]  ret_from_fork_asm+0x1a/0x30
[   24.867194]  </TASK>
[   24.867195] 
[   25.049194] The buggy address belongs to the physical page:
[   25.054767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   25.062766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.070419] flags: 0x200000000000040(head|node=0|zone=2)
[   25.075731] page_type: f8(unknown)
[   25.079141] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.086887] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.094662] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.102496] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.110323] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   25.118157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.125991] page dumped because: kasan: bad access detected
[   25.131561] 
[   25.133061] Memory state around the buggy address:
[   25.137857]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.145083]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.152301] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   25.159521]                                                           ^
[   25.166133]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.173355]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.180581] ==================================================================
[   21.861861] ==================================================================
[   21.872660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   21.880233] Write of size 1 at addr ffff8881041b9eeb by task kunit_try_catch/199
[   21.887627] 
[   21.889127] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   21.889135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.889138] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.889141] Call Trace:
[   21.889143]  <TASK>
[   21.889144]  dump_stack_lvl+0x73/0xb0
[   21.889148]  print_report+0xd1/0x650
[   21.889153]  ? __virt_addr_valid+0x1db/0x2d0
[   21.889157]  ? krealloc_more_oob_helper+0x821/0x930
[   21.889161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.889165]  ? krealloc_more_oob_helper+0x821/0x930
[   21.889169]  kasan_report+0x141/0x180
[   21.889173]  ? krealloc_more_oob_helper+0x821/0x930
[   21.889178]  __asan_report_store1_noabort+0x1b/0x30
[   21.889182]  krealloc_more_oob_helper+0x821/0x930
[   21.889185]  ? __schedule+0x10cc/0x2b60
[   21.889189]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   21.889193]  ? finish_task_switch.isra.0+0x153/0x700
[   21.889198]  ? __switch_to+0x5d9/0xf60
[   21.889202]  ? dequeue_task_fair+0x166/0x4e0
[   21.889207]  ? __schedule+0x10cc/0x2b60
[   21.889212]  krealloc_more_oob+0x1c/0x30
[   21.889215]  kunit_try_run_case+0x1a2/0x480
[   21.889220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.889224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.889229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.889233]  ? __kthread_parkme+0x82/0x180
[   21.889237]  ? preempt_count_sub+0x50/0x80
[   21.889242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.889247]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.889251]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.889255]  kthread+0x334/0x6f0
[   21.889258]  ? trace_preempt_on+0x20/0xc0
[   21.889263]  ? __pfx_kthread+0x10/0x10
[   21.889266]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.889270]  ? calculate_sigpending+0x7b/0xa0
[   21.889274]  ? __pfx_kthread+0x10/0x10
[   21.889277]  ret_from_fork+0x3e/0x80
[   21.889281]  ? __pfx_kthread+0x10/0x10
[   21.889284]  ret_from_fork_asm+0x1a/0x30
[   21.889290]  </TASK>
[   21.889291] 
[   22.072007] Allocated by task 199:
[   22.075415]  kasan_save_stack+0x45/0x70
[   22.079252]  kasan_save_track+0x18/0x40
[   22.083094]  kasan_save_alloc_info+0x3b/0x50
[   22.087366]  __kasan_krealloc+0x190/0x1f0
[   22.091377]  krealloc_noprof+0xf3/0x340
[   22.095217]  krealloc_more_oob_helper+0x1a9/0x930
[   22.099929]  krealloc_more_oob+0x1c/0x30
[   22.103942]  kunit_try_run_case+0x1a2/0x480
[   22.108157]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.113555]  kthread+0x334/0x6f0
[   22.116790]  ret_from_fork+0x3e/0x80
[   22.120369]  ret_from_fork_asm+0x1a/0x30
[   22.124294] 
[   22.125793] The buggy address belongs to the object at ffff8881041b9e00
[   22.125793]  which belongs to the cache kmalloc-256 of size 256
[   22.138299] The buggy address is located 0 bytes to the right of
[   22.138299]  allocated 235-byte region [ffff8881041b9e00, ffff8881041b9eeb)
[   22.151249] 
[   22.152748] The buggy address belongs to the physical page:
[   22.158321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b8
[   22.166327] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.173983] flags: 0x200000000000040(head|node=0|zone=2)
[   22.179303] page_type: f5(slab)
[   22.182449] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   22.190198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.197978] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   22.205803] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.213632] head: 0200000000000001 ffffea0004106e01 00000000ffffffff 00000000ffffffff
[   22.221465] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.229290] page dumped because: kasan: bad access detected
[   22.234862] 
[   22.236362] Memory state around the buggy address:
[   22.241155]  ffff8881041b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.248374]  ffff8881041b9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.255595] >ffff8881041b9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.262821]                                                           ^
[   22.269436]  ffff8881041b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.276664]  ffff8881041b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.283881] ==================================================================
[   22.291197] ==================================================================
[   22.298425] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   22.305999] Write of size 1 at addr ffff8881041b9ef0 by task kunit_try_catch/199
[   22.313393] 
[   22.314914] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   22.314922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.314925] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   22.314928] Call Trace:
[   22.314930]  <TASK>
[   22.314931]  dump_stack_lvl+0x73/0xb0
[   22.314948]  print_report+0xd1/0x650
[   22.314952]  ? __virt_addr_valid+0x1db/0x2d0
[   22.314968]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.314972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.314976]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.314980]  kasan_report+0x141/0x180
[   22.314984]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.314989]  __asan_report_store1_noabort+0x1b/0x30
[   22.314993]  krealloc_more_oob_helper+0x7eb/0x930
[   22.314996]  ? __schedule+0x10cc/0x2b60
[   22.315001]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.315005]  ? finish_task_switch.isra.0+0x153/0x700
[   22.315009]  ? __switch_to+0x5d9/0xf60
[   22.315013]  ? dequeue_task_fair+0x166/0x4e0
[   22.315017]  ? __schedule+0x10cc/0x2b60
[   22.315022]  krealloc_more_oob+0x1c/0x30
[   22.315025]  kunit_try_run_case+0x1a2/0x480
[   22.315030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.315034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.315039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.315043]  ? __kthread_parkme+0x82/0x180
[   22.315048]  ? preempt_count_sub+0x50/0x80
[   22.315052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.315057]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.315061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.315066]  kthread+0x334/0x6f0
[   22.315068]  ? trace_preempt_on+0x20/0xc0
[   22.315073]  ? __pfx_kthread+0x10/0x10
[   22.315076]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.315080]  ? calculate_sigpending+0x7b/0xa0
[   22.315084]  ? __pfx_kthread+0x10/0x10
[   22.315087]  ret_from_fork+0x3e/0x80
[   22.315091]  ? __pfx_kthread+0x10/0x10
[   22.315094]  ret_from_fork_asm+0x1a/0x30
[   22.315100]  </TASK>
[   22.315101] 
[   22.497931] Allocated by task 199:
[   22.501380]  kasan_save_stack+0x45/0x70
[   22.505217]  kasan_save_track+0x18/0x40
[   22.509057]  kasan_save_alloc_info+0x3b/0x50
[   22.513332]  __kasan_krealloc+0x190/0x1f0
[   22.517343]  krealloc_noprof+0xf3/0x340
[   22.521183]  krealloc_more_oob_helper+0x1a9/0x930
[   22.525889]  krealloc_more_oob+0x1c/0x30
[   22.529839]  kunit_try_run_case+0x1a2/0x480
[   22.534027]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   22.539425]  kthread+0x334/0x6f0
[   22.542659]  ret_from_fork+0x3e/0x80
[   22.546238]  ret_from_fork_asm+0x1a/0x30
[   22.550164] 
[   22.551662] The buggy address belongs to the object at ffff8881041b9e00
[   22.551662]  which belongs to the cache kmalloc-256 of size 256
[   22.564170] The buggy address is located 5 bytes to the right of
[   22.564170]  allocated 235-byte region [ffff8881041b9e00, ffff8881041b9eeb)
[   22.577117] 
[   22.578615] The buggy address belongs to the physical page:
[   22.584190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041b8
[   22.592196] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.599848] flags: 0x200000000000040(head|node=0|zone=2)
[   22.605164] page_type: f5(slab)
[   22.608308] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   22.616049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.623796] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   22.631622] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.639449] head: 0200000000000001 ffffea0004106e01 00000000ffffffff 00000000ffffffff
[   22.647275] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.655108] page dumped because: kasan: bad access detected
[   22.660680] 
[   22.662180] Memory state around the buggy address:
[   22.666983]  ffff8881041b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.674202]  ffff8881041b9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.681420] >ffff8881041b9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.688640]                                                              ^
[   22.695513]  ffff8881041b9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.702733]  ffff8881041b9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.709961] ==================================================================
[   25.187825] ==================================================================
[   25.195055] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   25.202630] Write of size 1 at addr ffff888102a320f0 by task kunit_try_catch/203
[   25.210030] 
[   25.211530] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   25.211538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.211540] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.211543] Call Trace:
[   25.211545]  <TASK>
[   25.211546]  dump_stack_lvl+0x73/0xb0
[   25.211550]  print_report+0xd1/0x650
[   25.211554]  ? __virt_addr_valid+0x1db/0x2d0
[   25.211558]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.211562]  ? kasan_addr_to_slab+0x11/0xa0
[   25.211566]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.211570]  kasan_report+0x141/0x180
[   25.211574]  ? krealloc_more_oob_helper+0x7eb/0x930
[   25.211579]  __asan_report_store1_noabort+0x1b/0x30
[   25.211583]  krealloc_more_oob_helper+0x7eb/0x930
[   25.211586]  ? __schedule+0x10cc/0x2b60
[   25.211590]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   25.211594]  ? finish_task_switch.isra.0+0x153/0x700
[   25.211599]  ? __switch_to+0x5d9/0xf60
[   25.211602]  ? dequeue_task_fair+0x166/0x4e0
[   25.211607]  ? __schedule+0x10cc/0x2b60
[   25.211612]  krealloc_large_more_oob+0x1c/0x30
[   25.211615]  kunit_try_run_case+0x1a2/0x480
[   25.211620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.211624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.211629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.211633]  ? __kthread_parkme+0x82/0x180
[   25.211638]  ? preempt_count_sub+0x50/0x80
[   25.211642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.211647]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.211651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.211656]  kthread+0x334/0x6f0
[   25.211659]  ? trace_preempt_on+0x20/0xc0
[   25.211663]  ? __pfx_kthread+0x10/0x10
[   25.211666]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.211670]  ? calculate_sigpending+0x7b/0xa0
[   25.211674]  ? __pfx_kthread+0x10/0x10
[   25.211677]  ret_from_fork+0x3e/0x80
[   25.211681]  ? __pfx_kthread+0x10/0x10
[   25.211685]  ret_from_fork_asm+0x1a/0x30
[   25.211690]  </TASK>
[   25.211692] 
[   25.393720] The buggy address belongs to the physical page:
[   25.399291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   25.407292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.414961] flags: 0x200000000000040(head|node=0|zone=2)
[   25.420274] page_type: f8(unknown)
[   25.423681] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.431420] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.439168] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.447003] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   25.454839] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   25.462671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.470496] page dumped because: kasan: bad access detected
[   25.476069] 
[   25.477569] Memory state around the buggy address:
[   25.482362]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.489582]  ffff888102a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.496800] >ffff888102a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   25.504019]                                                              ^
[   25.510913]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.518190]  ffff888102a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.525407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   21.575208] ==================================================================
[   21.590265] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0
[   21.596619] Read of size 1 at addr ffff888107240000 by task kunit_try_catch/197
[   21.603930] 
[   21.605451] CPU: 3 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   21.605459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.605461] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.605465] Call Trace:
[   21.605466]  <TASK>
[   21.605468]  dump_stack_lvl+0x73/0xb0
[   21.605472]  print_report+0xd1/0x650
[   21.605477]  ? __virt_addr_valid+0x1db/0x2d0
[   21.605481]  ? page_alloc_uaf+0x356/0x3d0
[   21.605484]  ? kasan_addr_to_slab+0x11/0xa0
[   21.605488]  ? page_alloc_uaf+0x356/0x3d0
[   21.605491]  kasan_report+0x141/0x180
[   21.605495]  ? page_alloc_uaf+0x356/0x3d0
[   21.605500]  __asan_report_load1_noabort+0x18/0x20
[   21.605503]  page_alloc_uaf+0x356/0x3d0
[   21.605507]  ? __pfx_page_alloc_uaf+0x10/0x10
[   21.605510]  ? __schedule+0x10cc/0x2b60
[   21.605515]  ? ktime_get_ts64+0x83/0x230
[   21.605519]  kunit_try_run_case+0x1a2/0x480
[   21.605524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.605528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.605533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.605538]  ? __kthread_parkme+0x82/0x180
[   21.605542]  ? preempt_count_sub+0x50/0x80
[   21.605546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.605551]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.605555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.605560]  kthread+0x334/0x6f0
[   21.605563]  ? trace_preempt_on+0x20/0xc0
[   21.605567]  ? __pfx_kthread+0x10/0x10
[   21.605570]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.605574]  ? calculate_sigpending+0x7b/0xa0
[   21.605578]  ? __pfx_kthread+0x10/0x10
[   21.605581]  ret_from_fork+0x3e/0x80
[   21.605585]  ? __pfx_kthread+0x10/0x10
[   21.605588]  ret_from_fork_asm+0x1a/0x30
[   21.605594]  </TASK>
[   21.605596] 
[   21.765990] The buggy address belongs to the physical page:
[   21.771562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107240
[   21.779561] flags: 0x200000000000000(node=0|zone=2)
[   21.784440] page_type: f0(buddy)
[   21.787674] raw: 0200000000000000 ffffea00041c7808 ffff888277bfd3e0 0000000000000000
[   21.795416] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   21.803161] page dumped because: kasan: bad access detected
[   21.808735] 
[   21.810233] Memory state around the buggy address:
[   21.815025]  ffff88810723ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.822246]  ffff88810723ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.829464] >ffff888107240000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.836684]                    ^
[   21.839934]  ffff888107240080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.847181]  ffff888107240100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.854407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   21.242637] ==================================================================
[   21.253618] BUG: KASAN: invalid-free in kfree+0x274/0x3f0
[   21.259019] Free of addr ffff888102a1c001 by task kunit_try_catch/193
[   21.265466] 
[   21.266995] CPU: 3 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   21.267003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267006] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   21.267009] Call Trace:
[   21.267011]  <TASK>
[   21.267013]  dump_stack_lvl+0x73/0xb0
[   21.267017]  print_report+0xd1/0x650
[   21.267021]  ? __virt_addr_valid+0x1db/0x2d0
[   21.267025]  ? kasan_addr_to_slab+0x11/0xa0
[   21.267029]  ? kfree+0x274/0x3f0
[   21.267033]  kasan_report_invalid_free+0x10a/0x130
[   21.267038]  ? kfree+0x274/0x3f0
[   21.267041]  ? kfree+0x274/0x3f0
[   21.267044]  __kasan_kfree_large+0x86/0xd0
[   21.267048]  free_large_kmalloc+0x4b/0x110
[   21.267052]  kfree+0x274/0x3f0
[   21.267056]  kmalloc_large_invalid_free+0x120/0x2b0
[   21.267060]  ? __pfx_kmalloc_large_invalid_free+0x10/0x10
[   21.267065]  ? __schedule+0x10cc/0x2b60
[   21.267070]  ? ktime_get_ts64+0x83/0x230
[   21.267074]  kunit_try_run_case+0x1a2/0x480
[   21.267079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.267084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.267088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.267093]  ? __kthread_parkme+0x82/0x180
[   21.267097]  ? preempt_count_sub+0x50/0x80
[   21.267102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.267106]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   21.267111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.267115]  kthread+0x334/0x6f0
[   21.267118]  ? trace_preempt_on+0x20/0xc0
[   21.267122]  ? __pfx_kthread+0x10/0x10
[   21.267125]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.267129]  ? calculate_sigpending+0x7b/0xa0
[   21.267133]  ? __pfx_kthread+0x10/0x10
[   21.267136]  ret_from_fork+0x3e/0x80
[   21.267140]  ? __pfx_kthread+0x10/0x10
[   21.267143]  ret_from_fork_asm+0x1a/0x30
[   21.267149]  </TASK>
[   21.267151] 
[   21.434779] The buggy address belongs to the physical page:
[   21.440352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   21.448358] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.456011] flags: 0x200000000000040(head|node=0|zone=2)
[   21.461323] page_type: f8(unknown)
[   21.464730] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.472471] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.480218] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.488051] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.495877] head: 0200000000000002 ffffea00040a8701 00000000ffffffff 00000000ffffffff
[   21.503737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.511563] page dumped because: kasan: bad access detected
[   21.517137] 
[   21.518635] Memory state around the buggy address:
[   21.523429]  ffff888102a1bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.530649]  ffff888102a1bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.537877] >ffff888102a1c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.545128]                    ^
[   21.548362]  ffff888102a1c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.555582]  ffff888102a1c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.562801] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   20.961202] ==================================================================
[   20.972715] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340
[   20.979328] Read of size 1 at addr ffff888102a30000 by task kunit_try_catch/191
[   20.986634] 
[   20.988136] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   20.988144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.988146] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.988149] Call Trace:
[   20.988150]  <TASK>
[   20.988152]  dump_stack_lvl+0x73/0xb0
[   20.988156]  print_report+0xd1/0x650
[   20.988160]  ? __virt_addr_valid+0x1db/0x2d0
[   20.988164]  ? kmalloc_large_uaf+0x2f1/0x340
[   20.988168]  ? kasan_addr_to_slab+0x11/0xa0
[   20.988172]  ? kmalloc_large_uaf+0x2f1/0x340
[   20.988176]  kasan_report+0x141/0x180
[   20.988180]  ? kmalloc_large_uaf+0x2f1/0x340
[   20.988185]  __asan_report_load1_noabort+0x18/0x20
[   20.988189]  kmalloc_large_uaf+0x2f1/0x340
[   20.988193]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   20.988197]  ? __schedule+0x10cc/0x2b60
[   20.988202]  ? ktime_get_ts64+0x83/0x230
[   20.988206]  kunit_try_run_case+0x1a2/0x480
[   20.988211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.988216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.988220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.988225]  ? __kthread_parkme+0x82/0x180
[   20.988229]  ? preempt_count_sub+0x50/0x80
[   20.988233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.988238]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.988242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.988247]  kthread+0x334/0x6f0
[   20.988249]  ? trace_preempt_on+0x20/0xc0
[   20.988254]  ? __pfx_kthread+0x10/0x10
[   20.988257]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.988261]  ? calculate_sigpending+0x7b/0xa0
[   20.988265]  ? __pfx_kthread+0x10/0x10
[   20.988268]  ret_from_fork+0x3e/0x80
[   20.988272]  ? __pfx_kthread+0x10/0x10
[   20.988275]  ret_from_fork_asm+0x1a/0x30
[   20.988281]  </TASK>
[   20.988282] 
[   21.149913] The buggy address belongs to the physical page:
[   21.155487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   21.163486] flags: 0x200000000000000(node=0|zone=2)
[   21.168367] raw: 0200000000000000 ffffea0004168608 ffff8882304b9a80 0000000000000000
[   21.176113] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.183853] page dumped because: kasan: bad access detected
[   21.189426] 
[   21.190924] Memory state around the buggy address:
[   21.195735]  ffff888102a2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.202953]  ffff888102a2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.210173] >ffff888102a30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.217393]                    ^
[   21.220624]  ffff888102a30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.227844]  ffff888102a30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.235065] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   20.633119] ==================================================================
[   20.644442] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330
[   20.651929] Write of size 1 at addr ffff888102a3200a by task kunit_try_catch/189
[   20.659347] 
[   20.660847] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   20.660855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.660857] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.660860] Call Trace:
[   20.660862]  <TASK>
[   20.660864]  dump_stack_lvl+0x73/0xb0
[   20.660867]  print_report+0xd1/0x650
[   20.660872]  ? __virt_addr_valid+0x1db/0x2d0
[   20.660875]  ? kmalloc_large_oob_right+0x2e9/0x330
[   20.660880]  ? kasan_addr_to_slab+0x11/0xa0
[   20.660884]  ? kmalloc_large_oob_right+0x2e9/0x330
[   20.660888]  kasan_report+0x141/0x180
[   20.660892]  ? kmalloc_large_oob_right+0x2e9/0x330
[   20.660914]  __asan_report_store1_noabort+0x1b/0x30
[   20.660919]  kmalloc_large_oob_right+0x2e9/0x330
[   20.660923]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   20.660942]  ? __schedule+0x10cc/0x2b60
[   20.660947]  ? ktime_get_ts64+0x83/0x230
[   20.660964]  kunit_try_run_case+0x1a2/0x480
[   20.660969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.660974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.660978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.660995]  ? __kthread_parkme+0x82/0x180
[   20.660999]  ? preempt_count_sub+0x50/0x80
[   20.661004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.661009]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.661013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.661017]  kthread+0x334/0x6f0
[   20.661020]  ? trace_preempt_on+0x20/0xc0
[   20.661025]  ? __pfx_kthread+0x10/0x10
[   20.661028]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.661032]  ? calculate_sigpending+0x7b/0xa0
[   20.661036]  ? __pfx_kthread+0x10/0x10
[   20.661039]  ret_from_fork+0x3e/0x80
[   20.661043]  ? __pfx_kthread+0x10/0x10
[   20.661046]  ret_from_fork_asm+0x1a/0x30
[   20.661051]  </TASK>
[   20.661053] 
[   20.825340] The buggy address belongs to the physical page:
[   20.830929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a30
[   20.838975] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.846633] flags: 0x200000000000040(head|node=0|zone=2)
[   20.851970] page_type: f8(unknown)
[   20.855380] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.863126] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.870868] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.878701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.886527] head: 0200000000000002 ffffea00040a8c01 00000000ffffffff 00000000ffffffff
[   20.894352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.902178] page dumped because: kasan: bad access detected
[   20.907751] 
[   20.909251] Memory state around the buggy address:
[   20.914043]  ffff888102a31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.921264]  ffff888102a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.928492] >ffff888102a32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.935710]                       ^
[   20.939203]  ffff888102a32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.946422]  ffff888102a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.953641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   20.227402] ==================================================================
[   20.239849] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   20.247162] Write of size 1 at addr ffff888107201f00 by task kunit_try_catch/187
[   20.254555] 
[   20.256058] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   20.256065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.256067] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   20.256071] Call Trace:
[   20.256072]  <TASK>
[   20.256074]  dump_stack_lvl+0x73/0xb0
[   20.256078]  print_report+0xd1/0x650
[   20.256082]  ? __virt_addr_valid+0x1db/0x2d0
[   20.256086]  ? kmalloc_big_oob_right+0x316/0x370
[   20.256090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.256095]  ? kmalloc_big_oob_right+0x316/0x370
[   20.256099]  kasan_report+0x141/0x180
[   20.256104]  ? kmalloc_big_oob_right+0x316/0x370
[   20.256109]  __asan_report_store1_noabort+0x1b/0x30
[   20.256113]  kmalloc_big_oob_right+0x316/0x370
[   20.256117]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   20.256122]  ? __schedule+0x10cc/0x2b60
[   20.256126]  ? ktime_get_ts64+0x83/0x230
[   20.256131]  kunit_try_run_case+0x1a2/0x480
[   20.256136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.256140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.256145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.256149]  ? __kthread_parkme+0x82/0x180
[   20.256153]  ? preempt_count_sub+0x50/0x80
[   20.256158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.256163]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.256167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.256172]  kthread+0x334/0x6f0
[   20.256174]  ? trace_preempt_on+0x20/0xc0
[   20.256179]  ? __pfx_kthread+0x10/0x10
[   20.256182]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.256186]  ? calculate_sigpending+0x7b/0xa0
[   20.256190]  ? __pfx_kthread+0x10/0x10
[   20.256193]  ret_from_fork+0x3e/0x80
[   20.256197]  ? __pfx_kthread+0x10/0x10
[   20.256200]  ret_from_fork_asm+0x1a/0x30
[   20.256206]  </TASK>
[   20.256207] 
[   20.420885] Allocated by task 187:
[   20.424291]  kasan_save_stack+0x45/0x70
[   20.428131]  kasan_save_track+0x18/0x40
[   20.431973]  kasan_save_alloc_info+0x3b/0x50
[   20.436251]  __kasan_kmalloc+0xb7/0xc0
[   20.440003]  __kmalloc_cache_noprof+0x189/0x420
[   20.444537]  kmalloc_big_oob_right+0xa9/0x370
[   20.448897]  kunit_try_run_case+0x1a2/0x480
[   20.453108]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   20.458508]  kthread+0x334/0x6f0
[   20.461739]  ret_from_fork+0x3e/0x80
[   20.465321]  ret_from_fork_asm+0x1a/0x30
[   20.469247] 
[   20.470745] The buggy address belongs to the object at ffff888107200000
[   20.470745]  which belongs to the cache kmalloc-8k of size 8192
[   20.483260] The buggy address is located 0 bytes to the right of
[   20.483260]  allocated 7936-byte region [ffff888107200000, ffff888107201f00)
[   20.496293] 
[   20.497792] The buggy address belongs to the physical page:
[   20.503367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107200
[   20.511375] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.519036] flags: 0x200000000000040(head|node=0|zone=2)
[   20.524348] page_type: f5(slab)
[   20.527494] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   20.535235] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   20.542984] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000
[   20.550834] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   20.558669] head: 0200000000000003 ffffea00041c8001 00000000ffffffff 00000000ffffffff
[   20.566494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   20.574319] page dumped because: kasan: bad access detected
[   20.579892] 
[   20.581417] Memory state around the buggy address:
[   20.586212]  ffff888107201e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.593431]  ffff888107201e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.600651] >ffff888107201f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.607878]                    ^
[   20.611109]  ffff888107201f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.618330]  ffff888107202000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.625547] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   19.675394] ==================================================================
[   19.686805] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   19.694890] Write of size 1 at addr ffff8881043d8e78 by task kunit_try_catch/185
[   19.702308] 
[   19.703809] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.703817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.703819] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.703823] Call Trace:
[   19.703824]  <TASK>
[   19.703826]  dump_stack_lvl+0x73/0xb0
[   19.703830]  print_report+0xd1/0x650
[   19.703834]  ? __virt_addr_valid+0x1db/0x2d0
[   19.703838]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   19.703842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.703846]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   19.703850]  kasan_report+0x141/0x180
[   19.703855]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   19.703860]  __asan_report_store1_noabort+0x1b/0x30
[   19.703864]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   19.703868]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   19.703872]  ? __schedule+0x10cc/0x2b60
[   19.703876]  ? ktime_get_ts64+0x83/0x230
[   19.703881]  kunit_try_run_case+0x1a2/0x480
[   19.703886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.703890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.703895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.703916]  ? __kthread_parkme+0x82/0x180
[   19.703920]  ? preempt_count_sub+0x50/0x80
[   19.703925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.703930]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.703934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.703939]  kthread+0x334/0x6f0
[   19.703954]  ? trace_preempt_on+0x20/0xc0
[   19.703959]  ? __pfx_kthread+0x10/0x10
[   19.703962]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.703966]  ? calculate_sigpending+0x7b/0xa0
[   19.703970]  ? __pfx_kthread+0x10/0x10
[   19.703973]  ret_from_fork+0x3e/0x80
[   19.703977]  ? __pfx_kthread+0x10/0x10
[   19.703980]  ret_from_fork_asm+0x1a/0x30
[   19.703986]  </TASK>
[   19.703987] 
[   19.872529] Allocated by task 185:
[   19.875937]  kasan_save_stack+0x45/0x70
[   19.879802]  kasan_save_track+0x18/0x40
[   19.883640]  kasan_save_alloc_info+0x3b/0x50
[   19.887933]  __kasan_kmalloc+0xb7/0xc0
[   19.891683]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   19.897256]  kmalloc_track_caller_oob_right+0x99/0x520
[   19.902397]  kunit_try_run_case+0x1a2/0x480
[   19.906590]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.911989]  kthread+0x334/0x6f0
[   19.915224]  ret_from_fork+0x3e/0x80
[   19.918809]  ret_from_fork_asm+0x1a/0x30
[   19.922737] 
[   19.924236] The buggy address belongs to the object at ffff8881043d8e00
[   19.924236]  which belongs to the cache kmalloc-128 of size 128
[   19.936741] The buggy address is located 0 bytes to the right of
[   19.936741]  allocated 120-byte region [ffff8881043d8e00, ffff8881043d8e78)
[   19.949690] 
[   19.951189] The buggy address belongs to the physical page:
[   19.956762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043d8
[   19.964768] flags: 0x200000000000000(node=0|zone=2)
[   19.969651] page_type: f5(slab)
[   19.972797] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   19.980545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.988292] page dumped because: kasan: bad access detected
[   19.993864] 
[   19.995362] Memory state around the buggy address:
[   20.000156]  ffff8881043d8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.007375]  ffff8881043d8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.014594] >ffff8881043d8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.021812]                                                                 ^
[   20.028958]  ffff8881043d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.036182]  ffff8881043d8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.043403] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   19.270235] ==================================================================
[   19.281190] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0
[   19.288590] Read of size 1 at addr ffff888105f47000 by task kunit_try_catch/183
[   19.295927] 
[   19.297477] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.297485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.297487] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   19.297491] Call Trace:
[   19.297492]  <TASK>
[   19.297494]  dump_stack_lvl+0x73/0xb0
[   19.297498]  print_report+0xd1/0x650
[   19.297503]  ? __virt_addr_valid+0x1db/0x2d0
[   19.297507]  ? kmalloc_node_oob_right+0x369/0x3c0
[   19.297510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.297515]  ? kmalloc_node_oob_right+0x369/0x3c0
[   19.297519]  kasan_report+0x141/0x180
[   19.297523]  ? kmalloc_node_oob_right+0x369/0x3c0
[   19.297528]  __asan_report_load1_noabort+0x18/0x20
[   19.297532]  kmalloc_node_oob_right+0x369/0x3c0
[   19.297535]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   19.297539]  ? __schedule+0x10cc/0x2b60
[   19.297544]  ? ktime_get_ts64+0x83/0x230
[   19.297549]  kunit_try_run_case+0x1a2/0x480
[   19.297553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.297558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.297563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.297567]  ? __kthread_parkme+0x82/0x180
[   19.297571]  ? preempt_count_sub+0x50/0x80
[   19.297576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.297581]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.297585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.297590]  kthread+0x334/0x6f0
[   19.297593]  ? trace_preempt_on+0x20/0xc0
[   19.297597]  ? __pfx_kthread+0x10/0x10
[   19.297600]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.297605]  ? calculate_sigpending+0x7b/0xa0
[   19.297609]  ? __pfx_kthread+0x10/0x10
[   19.297612]  ret_from_fork+0x3e/0x80
[   19.297616]  ? __pfx_kthread+0x10/0x10
[   19.297619]  ret_from_fork_asm+0x1a/0x30
[   19.297625]  </TASK>
[   19.297626] 
[   19.462694] Allocated by task 183:
[   19.466101]  kasan_save_stack+0x45/0x70
[   19.469956]  kasan_save_track+0x18/0x40
[   19.473813]  kasan_save_alloc_info+0x3b/0x50
[   19.478087]  __kasan_kmalloc+0xb7/0xc0
[   19.481838]  __kmalloc_cache_node_noprof+0x188/0x420
[   19.486806]  kmalloc_node_oob_right+0xab/0x3c0
[   19.491251]  kunit_try_run_case+0x1a2/0x480
[   19.495438]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   19.500845]  kthread+0x334/0x6f0
[   19.504077]  ret_from_fork+0x3e/0x80
[   19.507657]  ret_from_fork_asm+0x1a/0x30
[   19.511584] 
[   19.513082] The buggy address belongs to the object at ffff888105f46000
[   19.513082]  which belongs to the cache kmalloc-4k of size 4096
[   19.525597] The buggy address is located 0 bytes to the right of
[   19.525597]  allocated 4096-byte region [ffff888105f46000, ffff888105f47000)
[   19.538631] 
[   19.540130] The buggy address belongs to the physical page:
[   19.545705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f40
[   19.553711] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.561364] flags: 0x200000000000040(head|node=0|zone=2)
[   19.566678] page_type: f5(slab)
[   19.569825] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000
[   19.577573] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   19.585319] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000
[   19.593161] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   19.600995] head: 0200000000000003 ffffea000417d001 00000000ffffffff 00000000ffffffff
[   19.608824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   19.616649] page dumped because: kasan: bad access detected
[   19.622220] 
[   19.623712] Memory state around the buggy address:
[   19.628505]  ffff888105f46f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.635725]  ffff888105f46f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.642977] >ffff888105f47000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650198]                    ^
[   19.653429]  ffff888105f47080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660648]  ffff888105f47100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.667868] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   18.900421] ==================================================================
[   18.911392] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   18.918265] Read of size 1 at addr ffff88810496299f by task kunit_try_catch/181
[   18.925570] 
[   18.927072] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.927080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.927082] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.927085] Call Trace:
[   18.927087]  <TASK>
[   18.927089]  dump_stack_lvl+0x73/0xb0
[   18.927093]  print_report+0xd1/0x650
[   18.927097]  ? __virt_addr_valid+0x1db/0x2d0
[   18.927101]  ? kmalloc_oob_left+0x361/0x3c0
[   18.927105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.927110]  ? kmalloc_oob_left+0x361/0x3c0
[   18.927114]  kasan_report+0x141/0x180
[   18.927118]  ? kmalloc_oob_left+0x361/0x3c0
[   18.927123]  __asan_report_load1_noabort+0x18/0x20
[   18.927127]  kmalloc_oob_left+0x361/0x3c0
[   18.927132]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   18.927136]  ? __schedule+0x10cc/0x2b60
[   18.927140]  ? ktime_get_ts64+0x83/0x230
[   18.927145]  kunit_try_run_case+0x1a2/0x480
[   18.927150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.927154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.927159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.927163]  ? __kthread_parkme+0x82/0x180
[   18.927168]  ? preempt_count_sub+0x50/0x80
[   18.927172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.927177]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.927181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.927186]  kthread+0x334/0x6f0
[   18.927189]  ? trace_preempt_on+0x20/0xc0
[   18.927193]  ? __pfx_kthread+0x10/0x10
[   18.927196]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.927200]  ? calculate_sigpending+0x7b/0xa0
[   18.927204]  ? __pfx_kthread+0x10/0x10
[   18.927207]  ret_from_fork+0x3e/0x80
[   18.927211]  ? __pfx_kthread+0x10/0x10
[   18.927214]  ret_from_fork_asm+0x1a/0x30
[   18.927220]  </TASK>
[   18.927221] 
[   19.089604] Allocated by task 25:
[   19.092926]  kasan_save_stack+0x45/0x70
[   19.096815]  kasan_save_track+0x18/0x40
[   19.100653]  kasan_save_alloc_info+0x3b/0x50
[   19.104927]  __kasan_kmalloc+0xb7/0xc0
[   19.108724]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   19.114303]  kvasprintf+0xc5/0x150
[   19.117712]  __kthread_create_on_node+0x18b/0x3a0
[   19.122416]  kthread_create_on_node+0xab/0xe0
[   19.126777]  create_worker+0x3e5/0x7b0
[   19.130528]  worker_thread+0x992/0x1220
[   19.134369]  kthread+0x334/0x6f0
[   19.137601]  ret_from_fork+0x3e/0x80
[   19.141181]  ret_from_fork_asm+0x1a/0x30
[   19.145105] 
[   19.146605] The buggy address belongs to the object at ffff888104962980
[   19.146605]  which belongs to the cache kmalloc-16 of size 16
[   19.158939] The buggy address is located 18 bytes to the right of
[   19.158939]  allocated 13-byte region [ffff888104962980, ffff88810496298d)
[   19.171927] 
[   19.173471] The buggy address belongs to the physical page:
[   19.179043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104962
[   19.187045] flags: 0x200000000000000(node=0|zone=2)
[   19.191928] page_type: f5(slab)
[   19.195123] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   19.202871] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.210610] page dumped because: kasan: bad access detected
[   19.216181] 
[   19.217682] Memory state around the buggy address:
[   19.222475]  ffff888104962880: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   19.229701]  ffff888104962900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.236930] >ffff888104962980: 00 05 fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   19.244200]                             ^
[   19.248212]  ffff888104962a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.255432]  ffff888104962a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.262651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   18.179975] ==================================================================
[   18.187217] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   18.194176] Write of size 1 at addr ffff888102acc278 by task kunit_try_catch/179
[   18.201570] 
[   18.203071] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.203080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.203082] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.203085] Call Trace:
[   18.203087]  <TASK>
[   18.203088]  dump_stack_lvl+0x73/0xb0
[   18.203092]  print_report+0xd1/0x650
[   18.203096]  ? __virt_addr_valid+0x1db/0x2d0
[   18.203100]  ? kmalloc_oob_right+0x6bd/0x7f0
[   18.203104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.203109]  ? kmalloc_oob_right+0x6bd/0x7f0
[   18.203113]  kasan_report+0x141/0x180
[   18.203117]  ? kmalloc_oob_right+0x6bd/0x7f0
[   18.203123]  __asan_report_store1_noabort+0x1b/0x30
[   18.203127]  kmalloc_oob_right+0x6bd/0x7f0
[   18.203131]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   18.203135]  ? __schedule+0x10cc/0x2b60
[   18.203140]  ? ktime_get_ts64+0x83/0x230
[   18.203145]  kunit_try_run_case+0x1a2/0x480
[   18.203149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.203154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.203158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.203163]  ? __kthread_parkme+0x82/0x180
[   18.203167]  ? preempt_count_sub+0x50/0x80
[   18.203172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.203176]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.203181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.203185]  kthread+0x334/0x6f0
[   18.203188]  ? trace_preempt_on+0x20/0xc0
[   18.203192]  ? __pfx_kthread+0x10/0x10
[   18.203195]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.203199]  ? calculate_sigpending+0x7b/0xa0
[   18.203203]  ? __pfx_kthread+0x10/0x10
[   18.203206]  ret_from_fork+0x3e/0x80
[   18.203210]  ? __pfx_kthread+0x10/0x10
[   18.203213]  ret_from_fork_asm+0x1a/0x30
[   18.203219]  </TASK>
[   18.203220] 
[   18.366168] Allocated by task 179:
[   18.369572]  kasan_save_stack+0x45/0x70
[   18.373412]  kasan_save_track+0x18/0x40
[   18.377253]  kasan_save_alloc_info+0x3b/0x50
[   18.381524]  __kasan_kmalloc+0xb7/0xc0
[   18.385278]  __kmalloc_cache_noprof+0x189/0x420
[   18.389817]  kmalloc_oob_right+0xa9/0x7f0
[   18.393830]  kunit_try_run_case+0x1a2/0x480
[   18.398017]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.403417]  kthread+0x334/0x6f0
[   18.406649]  ret_from_fork+0x3e/0x80
[   18.410229]  ret_from_fork_asm+0x1a/0x30
[   18.414155] 
[   18.415653] The buggy address belongs to the object at ffff888102acc200
[   18.415653]  which belongs to the cache kmalloc-128 of size 128
[   18.428161] The buggy address is located 5 bytes to the right of
[   18.428161]  allocated 115-byte region [ffff888102acc200, ffff888102acc273)
[   18.441107] 
[   18.442606] The buggy address belongs to the physical page:
[   18.448178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   18.456180] flags: 0x200000000000000(node=0|zone=2)
[   18.461056] page_type: f5(slab)
[   18.464205] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   18.471956] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.479709] page dumped because: kasan: bad access detected
[   18.485281] 
[   18.486781] Memory state around the buggy address:
[   18.491572]  ffff888102acc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.498792]  ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.506011] >ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.513231]                                                                 ^
[   18.520364]  ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.527583]  ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.534802] ==================================================================
[   17.813831] ==================================================================
[   17.821062] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   17.828038] Write of size 1 at addr ffff888102acc273 by task kunit_try_catch/179
[   17.835439] 
[   17.836965] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G                 N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.836973] Tainted: [N]=TEST
[   17.836975] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   17.836979] Call Trace:
[   17.836980]  <TASK>
[   17.836983]  dump_stack_lvl+0x73/0xb0
[   17.836988]  print_report+0xd1/0x650
[   17.836993]  ? __virt_addr_valid+0x1db/0x2d0
[   17.836997]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.837001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.837006]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.837010]  kasan_report+0x141/0x180
[   17.837015]  ? kmalloc_oob_right+0x6f0/0x7f0
[   17.837020]  __asan_report_store1_noabort+0x1b/0x30
[   17.837024]  kmalloc_oob_right+0x6f0/0x7f0
[   17.837028]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   17.837033]  ? __schedule+0x10cc/0x2b60
[   17.837038]  ? ktime_get_ts64+0x83/0x230
[   17.837043]  kunit_try_run_case+0x1a2/0x480
[   17.837049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.837054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.837059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.837064]  ? __kthread_parkme+0x82/0x180
[   17.837068]  ? preempt_count_sub+0x50/0x80
[   17.837074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.837078]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   17.837083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.837087]  kthread+0x334/0x6f0
[   17.837090]  ? trace_preempt_on+0x20/0xc0
[   17.837095]  ? __pfx_kthread+0x10/0x10
[   17.837098]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.837102]  ? calculate_sigpending+0x7b/0xa0
[   17.837107]  ? __pfx_kthread+0x10/0x10
[   17.837110]  ret_from_fork+0x3e/0x80
[   17.837115]  ? __pfx_kthread+0x10/0x10
[   17.837118]  ret_from_fork_asm+0x1a/0x30
[   17.837124]  </TASK>
[   17.837126] 
[   17.998806] Allocated by task 179:
[   18.002213]  kasan_save_stack+0x45/0x70
[   18.006061]  kasan_save_track+0x18/0x40
[   18.009918]  kasan_save_alloc_info+0x3b/0x50
[   18.014197]  __kasan_kmalloc+0xb7/0xc0
[   18.017971]  __kmalloc_cache_noprof+0x189/0x420
[   18.022510]  kmalloc_oob_right+0xa9/0x7f0
[   18.026529]  kunit_try_run_case+0x1a2/0x480
[   18.030716]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.036115]  kthread+0x334/0x6f0
[   18.039348]  ret_from_fork+0x3e/0x80
[   18.042929]  ret_from_fork_asm+0x1a/0x30
[   18.046880] 
[   18.048380] The buggy address belongs to the object at ffff888102acc200
[   18.048380]  which belongs to the cache kmalloc-128 of size 128
[   18.060895] The buggy address is located 0 bytes to the right of
[   18.060895]  allocated 115-byte region [ffff888102acc200, ffff888102acc273)
[   18.073867] 
[   18.075367] The buggy address belongs to the physical page:
[   18.080939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   18.088979] flags: 0x200000000000000(node=0|zone=2)
[   18.093862] page_type: f5(slab)
[   18.097011] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   18.104757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.112504] page dumped because: kasan: bad access detected
[   18.118076] 
[   18.119576] Memory state around the buggy address:
[   18.124369]  ffff888102acc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.131587]  ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.138806] >ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.146027]                                                              ^
[   18.152915]  ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.160146]  ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.167372] ==================================================================
[   18.542045] ==================================================================
[   18.549275] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   18.556235] Read of size 1 at addr ffff888102acc280 by task kunit_try_catch/179
[   18.563550] 
[   18.565049] CPU: 3 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.565057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.565059] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   18.565062] Call Trace:
[   18.565064]  <TASK>
[   18.565065]  dump_stack_lvl+0x73/0xb0
[   18.565069]  print_report+0xd1/0x650
[   18.565073]  ? __virt_addr_valid+0x1db/0x2d0
[   18.565077]  ? kmalloc_oob_right+0x68a/0x7f0
[   18.565081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.565085]  ? kmalloc_oob_right+0x68a/0x7f0
[   18.565090]  kasan_report+0x141/0x180
[   18.565094]  ? kmalloc_oob_right+0x68a/0x7f0
[   18.565099]  __asan_report_load1_noabort+0x18/0x20
[   18.565103]  kmalloc_oob_right+0x68a/0x7f0
[   18.565107]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   18.565112]  ? __schedule+0x10cc/0x2b60
[   18.565116]  ? ktime_get_ts64+0x83/0x230
[   18.565121]  kunit_try_run_case+0x1a2/0x480
[   18.565125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.565130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.565134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.565139]  ? __kthread_parkme+0x82/0x180
[   18.565143]  ? preempt_count_sub+0x50/0x80
[   18.565148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.565152]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.565157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.565161]  kthread+0x334/0x6f0
[   18.565164]  ? trace_preempt_on+0x20/0xc0
[   18.565168]  ? __pfx_kthread+0x10/0x10
[   18.565171]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.565175]  ? calculate_sigpending+0x7b/0xa0
[   18.565179]  ? __pfx_kthread+0x10/0x10
[   18.565182]  ret_from_fork+0x3e/0x80
[   18.565186]  ? __pfx_kthread+0x10/0x10
[   18.565189]  ret_from_fork_asm+0x1a/0x30
[   18.565195]  </TASK>
[   18.565196] 
[   18.727971] Allocated by task 179:
[   18.731378]  kasan_save_stack+0x45/0x70
[   18.735219]  kasan_save_track+0x18/0x40
[   18.739057]  kasan_save_alloc_info+0x3b/0x50
[   18.743331]  __kasan_kmalloc+0xb7/0xc0
[   18.747083]  __kmalloc_cache_noprof+0x189/0x420
[   18.751615]  kmalloc_oob_right+0xa9/0x7f0
[   18.755629]  kunit_try_run_case+0x1a2/0x480
[   18.759823]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   18.765231]  kthread+0x334/0x6f0
[   18.768462]  ret_from_fork+0x3e/0x80
[   18.772041]  ret_from_fork_asm+0x1a/0x30
[   18.775970] 
[   18.777468] The buggy address belongs to the object at ffff888102acc200
[   18.777468]  which belongs to the cache kmalloc-128 of size 128
[   18.789982] The buggy address is located 13 bytes to the right of
[   18.789982]  allocated 115-byte region [ffff888102acc200, ffff888102acc273)
[   18.803019] 
[   18.804516] The buggy address belongs to the physical page:
[   18.810088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102acc
[   18.818087] flags: 0x200000000000000(node=0|zone=2)
[   18.822967] page_type: f5(slab)
[   18.826115] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   18.833863] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.841610] page dumped because: kasan: bad access detected
[   18.847183] 
[   18.848681] Memory state around the buggy address:
[   18.853475]  ffff888102acc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.860704]  ffff888102acc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.867932] >ffff888102acc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.875148]                    ^
[   18.878383]  ffff888102acc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.885602]  ffff888102acc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892820] ==================================================================
Failure - lava/job
(no logs available)
Failure - lava/read-feedback
(no logs available)
Failure - lava/bootloader-action
(no logs available)
Failure - lava/bootloader-retry
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)