Hay
Date
July 8, 2025, 4:38 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   18.193463] ==================================================================
[   18.193585] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   18.193656] Read of size 4 at addr fff00000c6385340 by task swapper/1/0
[   18.193704] 
[   18.193744] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.193828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.193855] Hardware name: linux,dummy-virt (DT)
[   18.193888] Call trace:
[   18.193911]  show_stack+0x20/0x38 (C)
[   18.193963]  dump_stack_lvl+0x8c/0xd0
[   18.194012]  print_report+0x118/0x608
[   18.194058]  kasan_report+0xdc/0x128
[   18.194100]  __asan_report_load4_noabort+0x20/0x30
[   18.194151]  rcu_uaf_reclaim+0x64/0x70
[   18.194198]  rcu_core+0x9f4/0x1e20
[   18.194246]  rcu_core_si+0x18/0x30
[   18.194289]  handle_softirqs+0x374/0xb28
[   18.194349]  __do_softirq+0x1c/0x28
[   18.194390]  ____do_softirq+0x18/0x30
[   18.194437]  call_on_irq_stack+0x24/0x30
[   18.194482]  do_softirq_own_stack+0x24/0x38
[   18.194528]  __irq_exit_rcu+0x1fc/0x318
[   18.194573]  irq_exit_rcu+0x1c/0x80
[   18.194617]  el1_interrupt+0x38/0x58
[   18.194659]  el1h_64_irq_handler+0x18/0x28
[   18.194705]  el1h_64_irq+0x6c/0x70
[   18.194790]  arch_local_irq_enable+0x4/0x8 (P)
[   18.194845]  do_idle+0x384/0x4e8
[   18.194888]  cpu_startup_entry+0x64/0x80
[   18.194931]  secondary_start_kernel+0x288/0x340
[   18.194982]  __secondary_switched+0xc0/0xc8
[   18.195034] 
[   18.195052] Allocated by task 200:
[   18.195081]  kasan_save_stack+0x3c/0x68
[   18.195121]  kasan_save_track+0x20/0x40
[   18.195158]  kasan_save_alloc_info+0x40/0x58
[   18.195195]  __kasan_kmalloc+0xd4/0xd8
[   18.195233]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.195270]  rcu_uaf+0xb0/0x2d8
[   18.195305]  kunit_try_run_case+0x170/0x3f0
[   18.195509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.195572]  kthread+0x328/0x630
[   18.195681]  ret_from_fork+0x10/0x20
[   18.195957] 
[   18.195977] Freed by task 0:
[   18.196005]  kasan_save_stack+0x3c/0x68
[   18.196042]  kasan_save_track+0x20/0x40
[   18.196079]  kasan_save_free_info+0x4c/0x78
[   18.196116]  __kasan_slab_free+0x6c/0x98
[   18.196154]  kfree+0x214/0x3c8
[   18.197028]  rcu_uaf_reclaim+0x28/0x70
[   18.197081]  rcu_core+0x9f4/0x1e20
[   18.197118]  rcu_core_si+0x18/0x30
[   18.197317]  handle_softirqs+0x374/0xb28
[   18.197368]  __do_softirq+0x1c/0x28
[   18.197403] 
[   18.197434] Last potentially related work creation:
[   18.197469]  kasan_save_stack+0x3c/0x68
[   18.197866]  kasan_record_aux_stack+0xb4/0xc8
[   18.197910]  __call_rcu_common.constprop.0+0x74/0x8c8
[   18.197951]  call_rcu+0x18/0x30
[   18.197983]  rcu_uaf+0x14c/0x2d8
[   18.198020]  kunit_try_run_case+0x170/0x3f0
[   18.199350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.199405]  kthread+0x328/0x630
[   18.199443]  ret_from_fork+0x10/0x20
[   18.199488] 
[   18.199515] The buggy address belongs to the object at fff00000c6385340
[   18.199515]  which belongs to the cache kmalloc-32 of size 32
[   18.199573] The buggy address is located 0 bytes inside of
[   18.199573]  freed 32-byte region [fff00000c6385340, fff00000c6385360)
[   18.199633] 
[   18.199656] The buggy address belongs to the physical page:
[   18.199687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106385
[   18.199741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.199793] page_type: f5(slab)
[   18.199835] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.199884] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.199924] page dumped because: kasan: bad access detected
[   18.199958] 
[   18.199976] Memory state around the buggy address:
[   18.200023]  fff00000c6385200: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   18.200067]  fff00000c6385280: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   18.200121] >fff00000c6385300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.200158]                                            ^
[   18.200192]  fff00000c6385380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200235]  fff00000c6385400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200284] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   18.052688] ==================================================================
[   18.052744] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.052798] Read of size 1 at addr fff00000c63d6800 by task kunit_try_catch/198
[   18.052848] 
[   18.052896] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.052987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.053016] Hardware name: linux,dummy-virt (DT)
[   18.053047] Call trace:
[   18.053068]  show_stack+0x20/0x38 (C)
[   18.053116]  dump_stack_lvl+0x8c/0xd0
[   18.053163]  print_report+0x118/0x608
[   18.053216]  kasan_report+0xdc/0x128
[   18.053260]  __kasan_check_byte+0x54/0x70
[   18.053306]  ksize+0x30/0x88
[   18.053358]  ksize_uaf+0x168/0x5f8
[   18.053448]  kunit_try_run_case+0x170/0x3f0
[   18.053613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.053799]  kthread+0x328/0x630
[   18.054061]  ret_from_fork+0x10/0x20
[   18.054143] 
[   18.054167] Allocated by task 198:
[   18.054197]  kasan_save_stack+0x3c/0x68
[   18.054237]  kasan_save_track+0x20/0x40
[   18.054276]  kasan_save_alloc_info+0x40/0x58
[   18.054364]  __kasan_kmalloc+0xd4/0xd8
[   18.054424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.054463]  ksize_uaf+0xb8/0x5f8
[   18.054500]  kunit_try_run_case+0x170/0x3f0
[   18.054541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.054587]  kthread+0x328/0x630
[   18.054727]  ret_from_fork+0x10/0x20
[   18.054856] 
[   18.054915] Freed by task 198:
[   18.054973]  kasan_save_stack+0x3c/0x68
[   18.055097]  kasan_save_track+0x20/0x40
[   18.055183]  kasan_save_free_info+0x4c/0x78
[   18.055283]  __kasan_slab_free+0x6c/0x98
[   18.055369]  kfree+0x214/0x3c8
[   18.055417]  ksize_uaf+0x11c/0x5f8
[   18.055480]  kunit_try_run_case+0x170/0x3f0
[   18.055557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.055617]  kthread+0x328/0x630
[   18.055695]  ret_from_fork+0x10/0x20
[   18.055760] 
[   18.055780] The buggy address belongs to the object at fff00000c63d6800
[   18.055780]  which belongs to the cache kmalloc-128 of size 128
[   18.055839] The buggy address is located 0 bytes inside of
[   18.055839]  freed 128-byte region [fff00000c63d6800, fff00000c63d6880)
[   18.055897] 
[   18.056062] The buggy address belongs to the physical page:
[   18.056121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.056183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.056237] page_type: f5(slab)
[   18.056293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.056359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.056450] page dumped because: kasan: bad access detected
[   18.056524] 
[   18.056576] Memory state around the buggy address:
[   18.056690]  fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.056786]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.056841] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.056879]                    ^
[   18.056905]  fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057081]  fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057119] ==================================================================
[   18.057908] ==================================================================
[   18.057959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.058027] Read of size 1 at addr fff00000c63d6800 by task kunit_try_catch/198
[   18.058076] 
[   18.058103] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.058185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.058216] Hardware name: linux,dummy-virt (DT)
[   18.058248] Call trace:
[   18.058269]  show_stack+0x20/0x38 (C)
[   18.058314]  dump_stack_lvl+0x8c/0xd0
[   18.058505]  print_report+0x118/0x608
[   18.058552]  kasan_report+0xdc/0x128
[   18.058602]  __asan_report_load1_noabort+0x20/0x30
[   18.058654]  ksize_uaf+0x598/0x5f8
[   18.058845]  kunit_try_run_case+0x170/0x3f0
[   18.058921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.059008]  kthread+0x328/0x630
[   18.059081]  ret_from_fork+0x10/0x20
[   18.059186] 
[   18.059235] Allocated by task 198:
[   18.059283]  kasan_save_stack+0x3c/0x68
[   18.059324]  kasan_save_track+0x20/0x40
[   18.059438]  kasan_save_alloc_info+0x40/0x58
[   18.059481]  __kasan_kmalloc+0xd4/0xd8
[   18.059517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.059575]  ksize_uaf+0xb8/0x5f8
[   18.059630]  kunit_try_run_case+0x170/0x3f0
[   18.059788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.059841]  kthread+0x328/0x630
[   18.059970]  ret_from_fork+0x10/0x20
[   18.060075] 
[   18.060180] Freed by task 198:
[   18.060241]  kasan_save_stack+0x3c/0x68
[   18.060294]  kasan_save_track+0x20/0x40
[   18.060400]  kasan_save_free_info+0x4c/0x78
[   18.060528]  __kasan_slab_free+0x6c/0x98
[   18.060605]  kfree+0x214/0x3c8
[   18.060799]  ksize_uaf+0x11c/0x5f8
[   18.060835]  kunit_try_run_case+0x170/0x3f0
[   18.060874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.060918]  kthread+0x328/0x630
[   18.060953]  ret_from_fork+0x10/0x20
[   18.060988] 
[   18.061694] The buggy address belongs to the object at fff00000c63d6800
[   18.061694]  which belongs to the cache kmalloc-128 of size 128
[   18.061952] The buggy address is located 0 bytes inside of
[   18.061952]  freed 128-byte region [fff00000c63d6800, fff00000c63d6880)
[   18.062067] 
[   18.062143] The buggy address belongs to the physical page:
[   18.062238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.062314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.062396] page_type: f5(slab)
[   18.062435] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.062639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.062777] page dumped because: kasan: bad access detected
[   18.062853] 
[   18.062933] Memory state around the buggy address:
[   18.063011]  fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.063084]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063504] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.063572]                    ^
[   18.063620]  fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063684]  fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063767] ==================================================================
[   18.065495] ==================================================================
[   18.065727] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.065777] Read of size 1 at addr fff00000c63d6878 by task kunit_try_catch/198
[   18.065932] 
[   18.065969] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.066113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.066161] Hardware name: linux,dummy-virt (DT)
[   18.066196] Call trace:
[   18.066218]  show_stack+0x20/0x38 (C)
[   18.066277]  dump_stack_lvl+0x8c/0xd0
[   18.066342]  print_report+0x118/0x608
[   18.066395]  kasan_report+0xdc/0x128
[   18.066448]  __asan_report_load1_noabort+0x20/0x30
[   18.066507]  ksize_uaf+0x544/0x5f8
[   18.066553]  kunit_try_run_case+0x170/0x3f0
[   18.066602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.066656]  kthread+0x328/0x630
[   18.066701]  ret_from_fork+0x10/0x20
[   18.066748] 
[   18.066770] Allocated by task 198:
[   18.066799]  kasan_save_stack+0x3c/0x68
[   18.066843]  kasan_save_track+0x20/0x40
[   18.066881]  kasan_save_alloc_info+0x40/0x58
[   18.066923]  __kasan_kmalloc+0xd4/0xd8
[   18.066960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.067007]  ksize_uaf+0xb8/0x5f8
[   18.067044]  kunit_try_run_case+0x170/0x3f0
[   18.067084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.067129]  kthread+0x328/0x630
[   18.067166]  ret_from_fork+0x10/0x20
[   18.067202] 
[   18.067220] Freed by task 198:
[   18.067254]  kasan_save_stack+0x3c/0x68
[   18.067291]  kasan_save_track+0x20/0x40
[   18.067327]  kasan_save_free_info+0x4c/0x78
[   18.067375]  __kasan_slab_free+0x6c/0x98
[   18.067411]  kfree+0x214/0x3c8
[   18.067443]  ksize_uaf+0x11c/0x5f8
[   18.067479]  kunit_try_run_case+0x170/0x3f0
[   18.067516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.067561]  kthread+0x328/0x630
[   18.067843]  ret_from_fork+0x10/0x20
[   18.067918] 
[   18.067957] The buggy address belongs to the object at fff00000c63d6800
[   18.067957]  which belongs to the cache kmalloc-128 of size 128
[   18.068044] The buggy address is located 120 bytes inside of
[   18.068044]  freed 128-byte region [fff00000c63d6800, fff00000c63d6880)
[   18.068115] 
[   18.068137] The buggy address belongs to the physical page:
[   18.068167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.068345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.068499] page_type: f5(slab)
[   18.068544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.068625] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.068681] page dumped because: kasan: bad access detected
[   18.068769] 
[   18.068819] Memory state around the buggy address:
[   18.068859]  fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.068904]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.068946] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.068991]                                                                 ^
[   18.069034]  fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.069075]  fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.069223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   18.034708] ==================================================================
[   18.034783] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.034889] Read of size 1 at addr fff00000c63d6773 by task kunit_try_catch/196
[   18.034942] 
[   18.034971] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.035072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.035119] Hardware name: linux,dummy-virt (DT)
[   18.035167] Call trace:
[   18.035217]  show_stack+0x20/0x38 (C)
[   18.035266]  dump_stack_lvl+0x8c/0xd0
[   18.035314]  print_report+0x118/0x608
[   18.035371]  kasan_report+0xdc/0x128
[   18.035507]  __asan_report_load1_noabort+0x20/0x30
[   18.035593]  ksize_unpoisons_memory+0x628/0x740
[   18.035680]  kunit_try_run_case+0x170/0x3f0
[   18.035745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.035818]  kthread+0x328/0x630
[   18.035886]  ret_from_fork+0x10/0x20
[   18.035951] 
[   18.035989] Allocated by task 196:
[   18.036055]  kasan_save_stack+0x3c/0x68
[   18.036122]  kasan_save_track+0x20/0x40
[   18.036178]  kasan_save_alloc_info+0x40/0x58
[   18.036243]  __kasan_kmalloc+0xd4/0xd8
[   18.036329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.036431]  ksize_unpoisons_memory+0xc0/0x740
[   18.036471]  kunit_try_run_case+0x170/0x3f0
[   18.036511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.036555]  kthread+0x328/0x630
[   18.036591]  ret_from_fork+0x10/0x20
[   18.036627] 
[   18.036645] The buggy address belongs to the object at fff00000c63d6700
[   18.036645]  which belongs to the cache kmalloc-128 of size 128
[   18.036704] The buggy address is located 0 bytes to the right of
[   18.036704]  allocated 115-byte region [fff00000c63d6700, fff00000c63d6773)
[   18.036896] 
[   18.036958] The buggy address belongs to the physical page:
[   18.037007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.037108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.037156] page_type: f5(slab)
[   18.037454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.037532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.037631] page dumped because: kasan: bad access detected
[   18.037734] 
[   18.037796] Memory state around the buggy address:
[   18.037849]  fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.037910]  fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037970] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.038075]                                                              ^
[   18.038134]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038187]  fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038226] ==================================================================
[   18.038864] ==================================================================
[   18.038914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.038989] Read of size 1 at addr fff00000c63d6778 by task kunit_try_catch/196
[   18.039057] 
[   18.039095] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.039199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.039247] Hardware name: linux,dummy-virt (DT)
[   18.039295] Call trace:
[   18.039353]  show_stack+0x20/0x38 (C)
[   18.039430]  dump_stack_lvl+0x8c/0xd0
[   18.039496]  print_report+0x118/0x608
[   18.039541]  kasan_report+0xdc/0x128
[   18.039626]  __asan_report_load1_noabort+0x20/0x30
[   18.039677]  ksize_unpoisons_memory+0x618/0x740
[   18.039745]  kunit_try_run_case+0x170/0x3f0
[   18.039987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.040051]  kthread+0x328/0x630
[   18.040096]  ret_from_fork+0x10/0x20
[   18.040234] 
[   18.040270] Allocated by task 196:
[   18.040320]  kasan_save_stack+0x3c/0x68
[   18.040405]  kasan_save_track+0x20/0x40
[   18.040481]  kasan_save_alloc_info+0x40/0x58
[   18.040588]  __kasan_kmalloc+0xd4/0xd8
[   18.040646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.040775]  ksize_unpoisons_memory+0xc0/0x740
[   18.040863]  kunit_try_run_case+0x170/0x3f0
[   18.040975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.041028]  kthread+0x328/0x630
[   18.041063]  ret_from_fork+0x10/0x20
[   18.041099] 
[   18.041119] The buggy address belongs to the object at fff00000c63d6700
[   18.041119]  which belongs to the cache kmalloc-128 of size 128
[   18.041175] The buggy address is located 5 bytes to the right of
[   18.041175]  allocated 115-byte region [fff00000c63d6700, fff00000c63d6773)
[   18.041239] 
[   18.041259] The buggy address belongs to the physical page:
[   18.041329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.041392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.041440] page_type: f5(slab)
[   18.041567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.041652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.041711] page dumped because: kasan: bad access detected
[   18.041803] 
[   18.041907] Memory state around the buggy address:
[   18.041975]  fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.042040]  fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042139] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.042225]                                                                 ^
[   18.042308]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042436]  fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042484] ==================================================================
[   18.043653] ==================================================================
[   18.043731] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.043782] Read of size 1 at addr fff00000c63d677f by task kunit_try_catch/196
[   18.043852] 
[   18.043901] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.044008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.044056] Hardware name: linux,dummy-virt (DT)
[   18.044101] Call trace:
[   18.044141]  show_stack+0x20/0x38 (C)
[   18.044207]  dump_stack_lvl+0x8c/0xd0
[   18.044256]  print_report+0x118/0x608
[   18.044364]  kasan_report+0xdc/0x128
[   18.044440]  __asan_report_load1_noabort+0x20/0x30
[   18.044517]  ksize_unpoisons_memory+0x690/0x740
[   18.044567]  kunit_try_run_case+0x170/0x3f0
[   18.044615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.044670]  kthread+0x328/0x630
[   18.044714]  ret_from_fork+0x10/0x20
[   18.044760] 
[   18.044777] Allocated by task 196:
[   18.044805]  kasan_save_stack+0x3c/0x68
[   18.044844]  kasan_save_track+0x20/0x40
[   18.045004]  kasan_save_alloc_info+0x40/0x58
[   18.045075]  __kasan_kmalloc+0xd4/0xd8
[   18.045180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.045248]  ksize_unpoisons_memory+0xc0/0x740
[   18.045331]  kunit_try_run_case+0x170/0x3f0
[   18.045434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.045520]  kthread+0x328/0x630
[   18.045633]  ret_from_fork+0x10/0x20
[   18.045701] 
[   18.045774] The buggy address belongs to the object at fff00000c63d6700
[   18.045774]  which belongs to the cache kmalloc-128 of size 128
[   18.045893] The buggy address is located 12 bytes to the right of
[   18.045893]  allocated 115-byte region [fff00000c63d6700, fff00000c63d6773)
[   18.045997] 
[   18.046016] The buggy address belongs to the physical page:
[   18.046045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.046283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.046417] page_type: f5(slab)
[   18.046496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.046603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.046688] page dumped because: kasan: bad access detected
[   18.046747] 
[   18.046792] Memory state around the buggy address:
[   18.046908]  fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.046972]  fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047014] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.047102]                                                                 ^
[   18.047170]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047254]  fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047370] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.334709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   20.260094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   20.253277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   20.175505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   20.134040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   20.150084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   20.119878] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   20.066521] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.097818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   20.090683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   28.692920] ==================================================================
[   28.693024] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.693024] 
[   28.693125] Out-of-bounds read at 0x00000000aedaf3e6 (105B right of kfence-#152):
[   28.693188]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.693237]  kunit_try_run_case+0x170/0x3f0
[   28.693285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.693346]  kthread+0x328/0x630
[   28.693390]  ret_from_fork+0x10/0x20
[   28.693432] 
[   28.693456] kfence-#152: 0x0000000099bcd66d-0x0000000040f38361, size=73, cache=kmalloc-96
[   28.693456] 
[   28.693509] allocated by task 325 on cpu 0 at 28.692673s (0.000832s ago):
[   28.693580]  test_alloc+0x29c/0x628
[   28.693621]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.693664]  kunit_try_run_case+0x170/0x3f0
[   28.693707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.693752]  kthread+0x328/0x630
[   28.693792]  ret_from_fork+0x10/0x20
[   28.693831] 
[   28.693878] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   28.693958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.693988] Hardware name: linux,dummy-virt (DT)
[   28.694024] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   23.180716] ==================================================================
[   23.180802] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   23.180802] 
[   23.180863] Corrupted memory at 0x000000006488ceb2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#99):
[   23.181172]  test_corruption+0x120/0x378
[   23.181218]  kunit_try_run_case+0x170/0x3f0
[   23.181263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.181308]  kthread+0x328/0x630
[   23.181365]  ret_from_fork+0x10/0x20
[   23.181406] 
[   23.181431] kfence-#99: 0x00000000a554197e-0x00000000fa346432, size=32, cache=test
[   23.181431] 
[   23.181484] allocated by task 315 on cpu 0 at 23.180586s (0.000894s ago):
[   23.181545]  test_alloc+0x230/0x628
[   23.181585]  test_corruption+0xdc/0x378
[   23.181624]  kunit_try_run_case+0x170/0x3f0
[   23.181666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.181711]  kthread+0x328/0x630
[   23.181750]  ret_from_fork+0x10/0x20
[   23.181789] 
[   23.181813] freed by task 315 on cpu 0 at 23.180639s (0.001170s ago):
[   23.181873]  test_corruption+0x120/0x378
[   23.181912]  kunit_try_run_case+0x170/0x3f0
[   23.181953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.181997]  kthread+0x328/0x630
[   23.182038]  ret_from_fork+0x10/0x20
[   23.182077] 
[   23.182117] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   23.182192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.182221] Hardware name: linux,dummy-virt (DT)
[   23.182254] ==================================================================
[   23.284780] ==================================================================
[   23.284861] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   23.284861] 
[   23.284918] Corrupted memory at 0x000000001d323dea [ ! ] (in kfence-#100):
[   23.285030]  test_corruption+0x1d8/0x378
[   23.285076]  kunit_try_run_case+0x170/0x3f0
[   23.285120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.285166]  kthread+0x328/0x630
[   23.285209]  ret_from_fork+0x10/0x20
[   23.285248] 
[   23.285271] kfence-#100: 0x00000000cffc47e5-0x00000000dd1e58a6, size=32, cache=test
[   23.285271] 
[   23.285325] allocated by task 315 on cpu 0 at 23.284655s (0.000666s ago):
[   23.285399]  test_alloc+0x230/0x628
[   23.285439]  test_corruption+0x198/0x378
[   23.285479]  kunit_try_run_case+0x170/0x3f0
[   23.285519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.285564]  kthread+0x328/0x630
[   23.285602]  ret_from_fork+0x10/0x20
[   23.285641] 
[   23.285664] freed by task 315 on cpu 0 at 23.284707s (0.000953s ago):
[   23.285723]  test_corruption+0x1d8/0x378
[   23.285762]  kunit_try_run_case+0x170/0x3f0
[   23.285802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.285846]  kthread+0x328/0x630
[   23.285884]  ret_from_fork+0x10/0x20
[   23.285924] 
[   23.285961] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   23.286035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.286064] Hardware name: linux,dummy-virt (DT)
[   23.286097] ==================================================================
[   22.973085] ==================================================================
[   22.973193] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   22.973193] 
[   22.973258] Corrupted memory at 0x000000009cb05031 [ ! . . . . . . . . . . . . . . . ] (in kfence-#97):
[   22.974392]  test_corruption+0x278/0x378
[   22.974445]  kunit_try_run_case+0x170/0x3f0
[   22.974492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.974539]  kthread+0x328/0x630
[   22.974581]  ret_from_fork+0x10/0x20
[   22.974620] 
[   22.974646] kfence-#97: 0x000000008183efa2-0x0000000097b7f504, size=32, cache=kmalloc-32
[   22.974646] 
[   22.974703] allocated by task 313 on cpu 0 at 22.972793s (0.001906s ago):
[   22.974767]  test_alloc+0x29c/0x628
[   22.974807]  test_corruption+0xdc/0x378
[   22.974853]  kunit_try_run_case+0x170/0x3f0
[   22.974895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.974940]  kthread+0x328/0x630
[   22.974979]  ret_from_fork+0x10/0x20
[   22.975019] 
[   22.975042] freed by task 313 on cpu 0 at 22.972891s (0.002148s ago):
[   22.975100]  test_corruption+0x278/0x378
[   22.975140]  kunit_try_run_case+0x170/0x3f0
[   22.975181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.975226]  kthread+0x328/0x630
[   22.975266]  ret_from_fork+0x10/0x20
[   22.975306] 
[   22.975361] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.975442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.975472] Hardware name: linux,dummy-virt (DT)
[   22.975508] ==================================================================
[   23.076933] ==================================================================
[   23.077014] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   23.077014] 
[   23.077076] Corrupted memory at 0x000000006b3f10f4 [ ! ] (in kfence-#98):
[   23.077199]  test_corruption+0x284/0x378
[   23.077247]  kunit_try_run_case+0x170/0x3f0
[   23.077292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.077352]  kthread+0x328/0x630
[   23.077396]  ret_from_fork+0x10/0x20
[   23.077435] 
[   23.077459] kfence-#98: 0x00000000cc89e796-0x00000000133de5d9, size=32, cache=kmalloc-32
[   23.077459] 
[   23.077515] allocated by task 313 on cpu 0 at 23.076673s (0.000838s ago):
[   23.077576]  test_alloc+0x29c/0x628
[   23.077614]  test_corruption+0x198/0x378
[   23.077654]  kunit_try_run_case+0x170/0x3f0
[   23.077696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.077741]  kthread+0x328/0x630
[   23.077781]  ret_from_fork+0x10/0x20
[   23.077819] 
[   23.077843] freed by task 313 on cpu 0 at 23.076773s (0.001066s ago):
[   23.077901]  test_corruption+0x284/0x378
[   23.077941]  kunit_try_run_case+0x170/0x3f0
[   23.077981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.078026]  kthread+0x328/0x630
[   23.078065]  ret_from_fork+0x10/0x20
[   23.078103] 
[   23.078146] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   23.078221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.078251] Hardware name: linux,dummy-virt (DT)
[   23.078283] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   51.785199] ==================================================================
[   51.785259] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.785259] 
[   51.785355] Use-after-free read at 0x0000000018d671a8 (in kfence-#158):
[   51.785408]  test_krealloc+0x51c/0x830
[   51.785452]  kunit_try_run_case+0x170/0x3f0
[   51.785499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.785546]  kthread+0x328/0x630
[   51.785589]  ret_from_fork+0x10/0x20
[   51.785631] 
[   51.785654] kfence-#158: 0x0000000018d671a8-0x00000000861d2852, size=32, cache=kmalloc-32
[   51.785654] 
[   51.785707] allocated by task 339 on cpu 1 at 51.784579s (0.001125s ago):
[   51.785776]  test_alloc+0x29c/0x628
[   51.785814]  test_krealloc+0xc0/0x830
[   51.785852]  kunit_try_run_case+0x170/0x3f0
[   51.785894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.785939]  kthread+0x328/0x630
[   51.785980]  ret_from_fork+0x10/0x20
[   51.786019] 
[   51.786044] freed by task 339 on cpu 1 at 51.784826s (0.001215s ago):
[   51.786104]  krealloc_noprof+0x148/0x360
[   51.786145]  test_krealloc+0x1dc/0x830
[   51.786184]  kunit_try_run_case+0x170/0x3f0
[   51.786226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.786271]  kthread+0x328/0x630
[   51.786311]  ret_from_fork+0x10/0x20
[   51.786361] 
[   51.786405] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   51.786485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.786516] Hardware name: linux,dummy-virt (DT)
[   51.786552] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   51.704730] ==================================================================
[   51.704829] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.704829] 
[   51.704926] Use-after-free read at 0x0000000007347dfe (in kfence-#157):
[   51.704982]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.705030]  kunit_try_run_case+0x170/0x3f0
[   51.705077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.705125]  kthread+0x328/0x630
[   51.705167]  ret_from_fork+0x10/0x20
[   51.705209] 
[   51.705236] kfence-#157: 0x0000000007347dfe-0x00000000e145badc, size=32, cache=test
[   51.705236] 
[   51.705288] allocated by task 337 on cpu 0 at 51.684740s (0.020544s ago):
[   51.705379]  test_alloc+0x230/0x628
[   51.705426]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.705469]  kunit_try_run_case+0x170/0x3f0
[   51.705511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.705559]  kthread+0x328/0x630
[   51.705597]  ret_from_fork+0x10/0x20
[   51.705635] 
[   51.705660] freed by task 337 on cpu 0 at 51.684858s (0.020798s ago):
[   51.705717]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.705759]  kunit_try_run_case+0x170/0x3f0
[   51.705801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.705844]  kthread+0x328/0x630
[   51.705884]  ret_from_fork+0x10/0x20
[   51.705924] 
[   51.705967] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   51.706044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.706075] Hardware name: linux,dummy-virt (DT)
[   51.706110] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   29.024036] ==================================================================
[   29.024174] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   29.024174] 
[   29.024292] Invalid read at 0x000000000f01d158:
[   29.024370]  test_invalid_access+0xdc/0x1f0
[   29.024426]  kunit_try_run_case+0x170/0x3f0
[   29.024480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.024531]  kthread+0x328/0x630
[   29.024579]  ret_from_fork+0x10/0x20
[   29.024631] 
[   29.024681] CPU: 0 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   29.025061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.027240] Hardware name: linux,dummy-virt (DT)
[   29.027294] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   28.796849] ==================================================================
[   28.796936] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.796936] 
[   28.796998] Corrupted memory at 0x000000000dfe8886 [ ! . . . . . . . . . . . . . . . ] (in kfence-#153):
[   28.797316]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.797383]  kunit_try_run_case+0x170/0x3f0
[   28.797427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.797473]  kthread+0x328/0x630
[   28.797514]  ret_from_fork+0x10/0x20
[   28.797555] 
[   28.797579] kfence-#153: 0x0000000012fdb41a-0x000000004bf1b3dc, size=73, cache=kmalloc-96
[   28.797579] 
[   28.797635] allocated by task 327 on cpu 0 at 28.796629s (0.001002s ago):
[   28.797695]  test_alloc+0x29c/0x628
[   28.797736]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   28.797779]  kunit_try_run_case+0x170/0x3f0
[   28.797820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.797865]  kthread+0x328/0x630
[   28.797906]  ret_from_fork+0x10/0x20
[   28.797945] 
[   28.797968] freed by task 327 on cpu 0 at 28.796762s (0.001202s ago):
[   28.798028]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.798071]  kunit_try_run_case+0x170/0x3f0
[   28.798113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.798157]  kthread+0x328/0x630
[   28.798197]  ret_from_fork+0x10/0x20
[   28.798235] 
[   28.798275] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   28.798364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.798392] Hardware name: linux,dummy-virt (DT)
[   28.798425] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   22.764708] ==================================================================
[   22.764798] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   22.764798] 
[   22.764857] Invalid free of 0x00000000bb6aeeca (in kfence-#95):
[   22.764908]  test_invalid_addr_free+0xec/0x238
[   22.764952]  kunit_try_run_case+0x170/0x3f0
[   22.764995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.765042]  kthread+0x328/0x630
[   22.765083]  ret_from_fork+0x10/0x20
[   22.765124] 
[   22.765147] kfence-#95: 0x00000000c749b1e8-0x000000004ef4c69d, size=32, cache=test
[   22.765147] 
[   22.765199] allocated by task 311 on cpu 0 at 22.764587s (0.000608s ago):
[   22.765261]  test_alloc+0x230/0x628
[   22.765300]  test_invalid_addr_free+0xd4/0x238
[   22.765354]  kunit_try_run_case+0x170/0x3f0
[   22.765395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.765441]  kthread+0x328/0x630
[   22.765481]  ret_from_fork+0x10/0x20
[   22.765523] 
[   22.765563] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.765642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.765670] Hardware name: linux,dummy-virt (DT)
[   22.765704] ==================================================================
[   22.660772] ==================================================================
[   22.660860] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   22.660860] 
[   22.660922] Invalid free of 0x000000001dcd3964 (in kfence-#94):
[   22.660973]  test_invalid_addr_free+0x1ac/0x238
[   22.661020]  kunit_try_run_case+0x170/0x3f0
[   22.661063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.661110]  kthread+0x328/0x630
[   22.661152]  ret_from_fork+0x10/0x20
[   22.661192] 
[   22.661217] kfence-#94: 0x00000000a98f2ae9-0x0000000091a8b0fa, size=32, cache=kmalloc-32
[   22.661217] 
[   22.661273] allocated by task 309 on cpu 0 at 22.660644s (0.000625s ago):
[   22.661350]  test_alloc+0x29c/0x628
[   22.661391]  test_invalid_addr_free+0xd4/0x238
[   22.661433]  kunit_try_run_case+0x170/0x3f0
[   22.661475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.661521]  kthread+0x328/0x630
[   22.661561]  ret_from_fork+0x10/0x20
[   22.661602] 
[   22.661643] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.661723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.661754] Hardware name: linux,dummy-virt (DT)
[   22.661787] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   22.456328] ==================================================================
[   22.456500] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   22.456500] 
[   22.456905] Invalid free of 0x000000006b149176 (in kfence-#92):
[   22.457529]  test_double_free+0x1bc/0x238
[   22.457700]  kunit_try_run_case+0x170/0x3f0
[   22.458297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.458649]  kthread+0x328/0x630
[   22.458806]  ret_from_fork+0x10/0x20
[   22.458859] 
[   22.459095] kfence-#92: 0x000000006b149176-0x0000000021dc2362, size=32, cache=kmalloc-32
[   22.459095] 
[   22.459435] allocated by task 305 on cpu 0 at 22.454769s (0.004532s ago):
[   22.460037]  test_alloc+0x29c/0x628
[   22.460216]  test_double_free+0xd4/0x238
[   22.460328]  kunit_try_run_case+0x170/0x3f0
[   22.460543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.460829]  kthread+0x328/0x630
[   22.460960]  ret_from_fork+0x10/0x20
[   22.461063] 
[   22.461090] freed by task 305 on cpu 0 at 22.454853s (0.006233s ago):
[   22.461355]  test_double_free+0x1ac/0x238
[   22.461544]  kunit_try_run_case+0x170/0x3f0
[   22.461687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.461764]  kthread+0x328/0x630
[   22.461883]  ret_from_fork+0x10/0x20
[   22.462015] 
[   22.462346] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.462448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.462495] Hardware name: linux,dummy-virt (DT)
[   22.462574] ==================================================================
[   22.556792] ==================================================================
[   22.556883] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   22.556883] 
[   22.556942] Invalid free of 0x00000000fb037203 (in kfence-#93):
[   22.556997]  test_double_free+0x100/0x238
[   22.557043]  kunit_try_run_case+0x170/0x3f0
[   22.557088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.557134]  kthread+0x328/0x630
[   22.557175]  ret_from_fork+0x10/0x20
[   22.557215] 
[   22.557238] kfence-#93: 0x00000000fb037203-0x00000000e8abe1c3, size=32, cache=test
[   22.557238] 
[   22.557292] allocated by task 307 on cpu 1 at 22.556586s (0.000702s ago):
[   22.557369]  test_alloc+0x230/0x628
[   22.557408]  test_double_free+0xd4/0x238
[   22.557448]  kunit_try_run_case+0x170/0x3f0
[   22.557490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.557536]  kthread+0x328/0x630
[   22.557575]  ret_from_fork+0x10/0x20
[   22.557615] 
[   22.557638] freed by task 307 on cpu 1 at 22.556638s (0.000996s ago):
[   22.557699]  test_double_free+0xf0/0x238
[   22.557737]  kunit_try_run_case+0x170/0x3f0
[   22.557779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.557824]  kthread+0x328/0x630
[   22.557863]  ret_from_fork+0x10/0x20
[   22.557902] 
[   22.557946] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.558025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.558055] Hardware name: linux,dummy-virt (DT)
[   22.558090] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   22.039604] ==================================================================
[   22.039715] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.039715] 
[   22.039813] Use-after-free read at 0x00000000e61fd231 (in kfence-#88):
[   22.039916]  test_use_after_free_read+0x114/0x248
[   22.039970]  kunit_try_run_case+0x170/0x3f0
[   22.040038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.040445]  kthread+0x328/0x630
[   22.040551]  ret_from_fork+0x10/0x20
[   22.040599] 
[   22.040625] kfence-#88: 0x00000000e61fd231-0x00000000c873faf0, size=32, cache=kmalloc-32
[   22.040625] 
[   22.041025] allocated by task 297 on cpu 0 at 22.038761s (0.002226s ago):
[   22.041134]  test_alloc+0x29c/0x628
[   22.041271]  test_use_after_free_read+0xd0/0x248
[   22.041318]  kunit_try_run_case+0x170/0x3f0
[   22.041898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.041998]  kthread+0x328/0x630
[   22.042110]  ret_from_fork+0x10/0x20
[   22.042151] 
[   22.042186] freed by task 297 on cpu 0 at 22.039239s (0.002941s ago):
[   22.042310]  test_use_after_free_read+0x1c0/0x248
[   22.042398]  kunit_try_run_case+0x170/0x3f0
[   22.042440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.042504]  kthread+0x328/0x630
[   22.042553]  ret_from_fork+0x10/0x20
[   22.042592] 
[   22.042642] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.042723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.042771] Hardware name: linux,dummy-virt (DT)
[   22.042814] ==================================================================
[   22.142913] ==================================================================
[   22.143023] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.143023] 
[   22.143153] Use-after-free read at 0x00000000108af4e4 (in kfence-#89):
[   22.143579]  test_use_after_free_read+0x114/0x248
[   22.143649]  kunit_try_run_case+0x170/0x3f0
[   22.143777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.143828]  kthread+0x328/0x630
[   22.143872]  ret_from_fork+0x10/0x20
[   22.144170] 
[   22.144216] kfence-#89: 0x00000000108af4e4-0x00000000b32968d4, size=32, cache=test
[   22.144216] 
[   22.144360] allocated by task 299 on cpu 0 at 22.142408s (0.001914s ago):
[   22.144652]  test_alloc+0x230/0x628
[   22.144820]  test_use_after_free_read+0xd0/0x248
[   22.144968]  kunit_try_run_case+0x170/0x3f0
[   22.145053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.145295]  kthread+0x328/0x630
[   22.145587]  ret_from_fork+0x10/0x20
[   22.145797] 
[   22.146036] freed by task 299 on cpu 0 at 22.142503s (0.003519s ago):
[   22.146242]  test_use_after_free_read+0xf0/0x248
[   22.146331]  kunit_try_run_case+0x170/0x3f0
[   22.146674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.147112]  kthread+0x328/0x630
[   22.147266]  ret_from_fork+0x10/0x20
[   22.147371] 
[   22.147624] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   22.147869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.147942] Hardware name: linux,dummy-virt (DT)
[   22.147987] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   21.829680] ==================================================================
[   21.829741] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   21.829741] 
[   21.829826] Out-of-bounds write at 0x000000003c5ff46e (1B left of kfence-#86):
[   21.829882]  test_out_of_bounds_write+0x100/0x240
[   21.829982]  kunit_try_run_case+0x170/0x3f0
[   21.830035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.830089]  kthread+0x328/0x630
[   21.830134]  ret_from_fork+0x10/0x20
[   21.830173] 
[   21.830199] kfence-#86: 0x00000000678b480e-0x00000000416a7623, size=32, cache=kmalloc-32
[   21.830199] 
[   21.830261] allocated by task 293 on cpu 0 at 21.829273s (0.000976s ago):
[   21.830346]  test_alloc+0x29c/0x628
[   21.830397]  test_out_of_bounds_write+0xc8/0x240
[   21.830439]  kunit_try_run_case+0x170/0x3f0
[   21.830481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.830526]  kthread+0x328/0x630
[   21.830564]  ret_from_fork+0x10/0x20
[   21.830611] 
[   21.830664] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   21.830744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.830774] Hardware name: linux,dummy-virt (DT)
[   21.830816] ==================================================================
[   21.933077] ==================================================================
[   21.933170] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   21.933170] 
[   21.933269] Out-of-bounds write at 0x00000000c7eaa656 (1B left of kfence-#87):
[   21.933352]  test_out_of_bounds_write+0x100/0x240
[   21.933420]  kunit_try_run_case+0x170/0x3f0
[   21.933466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.933528]  kthread+0x328/0x630
[   21.933582]  ret_from_fork+0x10/0x20
[   21.933623] 
[   21.933649] kfence-#87: 0x000000002694d68b-0x00000000b9c1e956, size=32, cache=test
[   21.933649] 
[   21.933723] allocated by task 295 on cpu 0 at 21.932931s (0.000781s ago):
[   21.934042]  test_alloc+0x230/0x628
[   21.934102]  test_out_of_bounds_write+0xc8/0x240
[   21.934161]  kunit_try_run_case+0x170/0x3f0
[   21.934206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.934264]  kthread+0x328/0x630
[   21.934322]  ret_from_fork+0x10/0x20
[   21.934377] 
[   21.934450] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   21.934551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.934599] Hardware name: linux,dummy-virt (DT)
[   21.934633] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   21.726212] ==================================================================
[   21.726378] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.726378] 
[   21.726462] Out-of-bounds read at 0x00000000bd96c18d (32B right of kfence-#85):
[   21.726892]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.726987]  kunit_try_run_case+0x170/0x3f0
[   21.727103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.727184]  kthread+0x328/0x630
[   21.727260]  ret_from_fork+0x10/0x20
[   21.727304] 
[   21.727399] kfence-#85: 0x000000004217ff4d-0x00000000a25a77bd, size=32, cache=test
[   21.727399] 
[   21.727455] allocated by task 291 on cpu 0 at 21.726026s (0.001425s ago):
[   21.727548]  test_alloc+0x230/0x628
[   21.727859]  test_out_of_bounds_read+0x198/0x3e0
[   21.728011]  kunit_try_run_case+0x170/0x3f0
[   21.728114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.728180]  kthread+0x328/0x630
[   21.728389]  ret_from_fork+0x10/0x20
[   21.728435] 
[   21.728886] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   21.729082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.729131] Hardware name: linux,dummy-virt (DT)
[   21.729165] ==================================================================
[   20.999692] ==================================================================
[   20.999827] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   20.999827] 
[   21.000897] Out-of-bounds read at 0x00000000f19ac7d2 (1B left of kfence-#78):
[   21.001020]  test_out_of_bounds_read+0x114/0x3e0
[   21.001459]  kunit_try_run_case+0x170/0x3f0
[   21.001567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.001765]  kthread+0x328/0x630
[   21.001988]  ret_from_fork+0x10/0x20
[   21.002048] 
[   21.002402] kfence-#78: 0x00000000c638e464-0x00000000c30a8c16, size=32, cache=kmalloc-32
[   21.002402] 
[   21.002591] allocated by task 289 on cpu 0 at 20.998280s (0.004273s ago):
[   21.002836]  test_alloc+0x29c/0x628
[   21.002927]  test_out_of_bounds_read+0xdc/0x3e0
[   21.003191]  kunit_try_run_case+0x170/0x3f0
[   21.003364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.003452]  kthread+0x328/0x630
[   21.003491]  ret_from_fork+0x10/0x20
[   21.003601] 
[   21.003683] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   21.003961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.004297] Hardware name: linux,dummy-virt (DT)
[   21.004385] ==================================================================
[   21.621253] ==================================================================
[   21.621350] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.621350] 
[   21.621452] Out-of-bounds read at 0x00000000bf54791c (1B left of kfence-#84):
[   21.621521]  test_out_of_bounds_read+0x114/0x3e0
[   21.621569]  kunit_try_run_case+0x170/0x3f0
[   21.621860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.621906]  kthread+0x328/0x630
[   21.621972]  ret_from_fork+0x10/0x20
[   21.622020] 
[   21.622046] kfence-#84: 0x000000003a8d88b9-0x00000000018e4988, size=32, cache=test
[   21.622046] 
[   21.622129] allocated by task 291 on cpu 0 at 21.621142s (0.000969s ago):
[   21.622306]  test_alloc+0x230/0x628
[   21.622362]  test_out_of_bounds_read+0xdc/0x3e0
[   21.622423]  kunit_try_run_case+0x170/0x3f0
[   21.622466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.622510]  kthread+0x328/0x630
[   21.622550]  ret_from_fork+0x10/0x20
[   21.622608] 
[   21.622933] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   21.623013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.623061] Hardware name: linux,dummy-virt (DT)
[   21.623111] ==================================================================
[   21.310356] ==================================================================
[   21.310478] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.310478] 
[   21.310644] Out-of-bounds read at 0x00000000564ae55f (32B right of kfence-#81):
[   21.310980]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.311051]  kunit_try_run_case+0x170/0x3f0
[   21.311097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.311167]  kthread+0x328/0x630
[   21.311224]  ret_from_fork+0x10/0x20
[   21.311269] 
[   21.311294] kfence-#81: 0x000000006d9dd898-0x0000000088deea86, size=32, cache=kmalloc-32
[   21.311294] 
[   21.311371] allocated by task 289 on cpu 0 at 21.309754s (0.001601s ago):
[   21.311441]  test_alloc+0x29c/0x628
[   21.311489]  test_out_of_bounds_read+0x198/0x3e0
[   21.311532]  kunit_try_run_case+0x170/0x3f0
[   21.311575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.311633]  kthread+0x328/0x630
[   21.311681]  ret_from_fork+0x10/0x20
[   21.311970] 
[   21.312043] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   21.312125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.312177] Hardware name: linux,dummy-virt (DT)
[   21.312229] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-kmalloc_uaf
[   17.958743] ==================================================================
[   17.958857] BUG: KFENCE: use-after-free read in kmalloc_uaf+0x184/0x338
[   17.958857] 
[   17.958957] Use-after-free read at 0x00000000c4449e63 (in kfence-#57):
[   17.959300]  kmalloc_uaf+0x184/0x338
[   17.959374]  kunit_try_run_case+0x170/0x3f0
[   17.959417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.959461]  kthread+0x328/0x630
[   17.959737]  ret_from_fork+0x10/0x20
[   17.959830] 
[   17.960001] kfence-#57: 0x0000000088461a91-0x0000000084b154c5, size=10, cache=kmalloc-16
[   17.960001] 
[   17.960219] allocated by task 186 on cpu 1 at 17.957289s (0.002844s ago):
[   17.961484]  kmalloc_uaf+0xb8/0x338
[   17.961567]  kunit_try_run_case+0x170/0x3f0
[   17.961608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.961657]  kthread+0x328/0x630
[   17.961693]  ret_from_fork+0x10/0x20
[   17.962004] 
[   17.962386] freed by task 186 on cpu 1 at 17.957367s (0.004864s ago):
[   17.962721]  kmalloc_uaf+0x11c/0x338
[   17.962816]  kunit_try_run_case+0x170/0x3f0
[   17.962866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.963244]  kthread+0x328/0x630
[   17.963319]  ret_from_fork+0x10/0x20
[   17.963531] 
[   17.963682] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.963784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.963840] Hardware name: linux,dummy-virt (DT)
[   17.963971] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   20.711325] ==================================================================
[   20.711389] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   20.711677] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.711783] 
[   20.711833] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.711941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.712026] Hardware name: linux,dummy-virt (DT)
[   20.712086] Call trace:
[   20.712112]  show_stack+0x20/0x38 (C)
[   20.712163]  dump_stack_lvl+0x8c/0xd0
[   20.712221]  print_report+0x118/0x608
[   20.712573]  kasan_report+0xdc/0x128
[   20.712669]  kasan_check_range+0x100/0x1a8
[   20.712746]  __kasan_check_write+0x20/0x30
[   20.712847]  strncpy_from_user+0x3c/0x2a0
[   20.713201]  copy_user_test_oob+0x5c0/0xec8
[   20.713310]  kunit_try_run_case+0x170/0x3f0
[   20.713485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.713598]  kthread+0x328/0x630
[   20.713771]  ret_from_fork+0x10/0x20
[   20.713912] 
[   20.714046] Allocated by task 287:
[   20.714115]  kasan_save_stack+0x3c/0x68
[   20.714158]  kasan_save_track+0x20/0x40
[   20.714222]  kasan_save_alloc_info+0x40/0x58
[   20.714264]  __kasan_kmalloc+0xd4/0xd8
[   20.714301]  __kmalloc_noprof+0x198/0x4c8
[   20.714637]  kunit_kmalloc_array+0x34/0x88
[   20.714755]  copy_user_test_oob+0xac/0xec8
[   20.714814]  kunit_try_run_case+0x170/0x3f0
[   20.714939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.715008]  kthread+0x328/0x630
[   20.715076]  ret_from_fork+0x10/0x20
[   20.715115] 
[   20.715136] The buggy address belongs to the object at fff00000c6e6ca00
[   20.715136]  which belongs to the cache kmalloc-128 of size 128
[   20.715206] The buggy address is located 0 bytes inside of
[   20.715206]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.715271] 
[   20.715293] The buggy address belongs to the physical page:
[   20.715324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.715406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.715466] page_type: f5(slab)
[   20.715507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.715575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.715618] page dumped because: kasan: bad access detected
[   20.715661] 
[   20.715682] Memory state around the buggy address:
[   20.715715]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.715760]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715806] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.715856]                                                                 ^
[   20.715898]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715944]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715985] ==================================================================
[   20.716929] ==================================================================
[   20.716983] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   20.717032] Write of size 1 at addr fff00000c6e6ca78 by task kunit_try_catch/287
[   20.717084] 
[   20.717114] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.717473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.717552] Hardware name: linux,dummy-virt (DT)
[   20.717586] Call trace:
[   20.717610]  show_stack+0x20/0x38 (C)
[   20.717702]  dump_stack_lvl+0x8c/0xd0
[   20.717803]  print_report+0x118/0x608
[   20.718050]  kasan_report+0xdc/0x128
[   20.718151]  __asan_report_store1_noabort+0x20/0x30
[   20.718243]  strncpy_from_user+0x270/0x2a0
[   20.718317]  copy_user_test_oob+0x5c0/0xec8
[   20.718455]  kunit_try_run_case+0x170/0x3f0
[   20.718554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.718648]  kthread+0x328/0x630
[   20.718788]  ret_from_fork+0x10/0x20
[   20.718905] 
[   20.719017] Allocated by task 287:
[   20.719085]  kasan_save_stack+0x3c/0x68
[   20.719177]  kasan_save_track+0x20/0x40
[   20.719219]  kasan_save_alloc_info+0x40/0x58
[   20.719260]  __kasan_kmalloc+0xd4/0xd8
[   20.719553]  __kmalloc_noprof+0x198/0x4c8
[   20.719635]  kunit_kmalloc_array+0x34/0x88
[   20.719725]  copy_user_test_oob+0xac/0xec8
[   20.719858]  kunit_try_run_case+0x170/0x3f0
[   20.719942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720047]  kthread+0x328/0x630
[   20.720215]  ret_from_fork+0x10/0x20
[   20.720421] 
[   20.720492] The buggy address belongs to the object at fff00000c6e6ca00
[   20.720492]  which belongs to the cache kmalloc-128 of size 128
[   20.720684] The buggy address is located 0 bytes to the right of
[   20.720684]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.720769] 
[   20.720791] The buggy address belongs to the physical page:
[   20.720833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.720892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.721065] page_type: f5(slab)
[   20.721215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.721501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.721588] page dumped because: kasan: bad access detected
[   20.721656] 
[   20.721679] Memory state around the buggy address:
[   20.721713]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.721758]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.722005] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.722083]                                                                 ^
[   20.722192]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.722256]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.722326] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   20.670174] ==================================================================
[   20.670267] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   20.670585] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.670729] 
[   20.670810] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.670930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.671005] Hardware name: linux,dummy-virt (DT)
[   20.671061] Call trace:
[   20.671087]  show_stack+0x20/0x38 (C)
[   20.671142]  dump_stack_lvl+0x8c/0xd0
[   20.671194]  print_report+0x118/0x608
[   20.671311]  kasan_report+0xdc/0x128
[   20.671373]  kasan_check_range+0x100/0x1a8
[   20.671440]  __kasan_check_write+0x20/0x30
[   20.671492]  copy_user_test_oob+0x234/0xec8
[   20.671777]  kunit_try_run_case+0x170/0x3f0
[   20.671888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.671985]  kthread+0x328/0x630
[   20.672102]  ret_from_fork+0x10/0x20
[   20.672154] 
[   20.672204] Allocated by task 287:
[   20.672249]  kasan_save_stack+0x3c/0x68
[   20.672311]  kasan_save_track+0x20/0x40
[   20.672397]  kasan_save_alloc_info+0x40/0x58
[   20.672544]  __kasan_kmalloc+0xd4/0xd8
[   20.672612]  __kmalloc_noprof+0x198/0x4c8
[   20.672654]  kunit_kmalloc_array+0x34/0x88
[   20.672694]  copy_user_test_oob+0xac/0xec8
[   20.672733]  kunit_try_run_case+0x170/0x3f0
[   20.672773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.673060]  kthread+0x328/0x630
[   20.673178]  ret_from_fork+0x10/0x20
[   20.673265] 
[   20.673405] The buggy address belongs to the object at fff00000c6e6ca00
[   20.673405]  which belongs to the cache kmalloc-128 of size 128
[   20.673489] The buggy address is located 0 bytes inside of
[   20.673489]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.673555] 
[   20.673600] The buggy address belongs to the physical page:
[   20.673644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.673711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.673771] page_type: f5(slab)
[   20.673822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.673874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.673917] page dumped because: kasan: bad access detected
[   20.673950] 
[   20.673974] Memory state around the buggy address:
[   20.674009]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.674054]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674115] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.674156]                                                                 ^
[   20.674209]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674268]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.674315] ==================================================================
[   20.701634] ==================================================================
[   20.701783] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   20.701836] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.701889] 
[   20.701955] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.702171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.702201] Hardware name: linux,dummy-virt (DT)
[   20.702307] Call trace:
[   20.702374]  show_stack+0x20/0x38 (C)
[   20.702428]  dump_stack_lvl+0x8c/0xd0
[   20.702477]  print_report+0x118/0x608
[   20.702525]  kasan_report+0xdc/0x128
[   20.702862]  kasan_check_range+0x100/0x1a8
[   20.702952]  __kasan_check_write+0x20/0x30
[   20.703005]  copy_user_test_oob+0x434/0xec8
[   20.703076]  kunit_try_run_case+0x170/0x3f0
[   20.703162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703225]  kthread+0x328/0x630
[   20.703280]  ret_from_fork+0x10/0x20
[   20.703374] 
[   20.703542] Allocated by task 287:
[   20.703576]  kasan_save_stack+0x3c/0x68
[   20.703747]  kasan_save_track+0x20/0x40
[   20.703813]  kasan_save_alloc_info+0x40/0x58
[   20.703866]  __kasan_kmalloc+0xd4/0xd8
[   20.703904]  __kmalloc_noprof+0x198/0x4c8
[   20.703950]  kunit_kmalloc_array+0x34/0x88
[   20.703990]  copy_user_test_oob+0xac/0xec8
[   20.704029]  kunit_try_run_case+0x170/0x3f0
[   20.704069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.704116]  kthread+0x328/0x630
[   20.704155]  ret_from_fork+0x10/0x20
[   20.704206] 
[   20.704239] The buggy address belongs to the object at fff00000c6e6ca00
[   20.704239]  which belongs to the cache kmalloc-128 of size 128
[   20.704299] The buggy address is located 0 bytes inside of
[   20.704299]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.704372] 
[   20.704634] The buggy address belongs to the physical page:
[   20.704693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.704782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.704835] page_type: f5(slab)
[   20.704876] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.705035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.705117] page dumped because: kasan: bad access detected
[   20.705232] 
[   20.705310] Memory state around the buggy address:
[   20.705387]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.705514]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705579] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.705684]                                                                 ^
[   20.705821]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705902]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.705980] ==================================================================
[   20.678884] ==================================================================
[   20.679170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   20.679286] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.679405] 
[   20.679446] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.679548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.679580] Hardware name: linux,dummy-virt (DT)
[   20.679612] Call trace:
[   20.679637]  show_stack+0x20/0x38 (C)
[   20.679932]  dump_stack_lvl+0x8c/0xd0
[   20.680017]  print_report+0x118/0x608
[   20.680083]  kasan_report+0xdc/0x128
[   20.680146]  kasan_check_range+0x100/0x1a8
[   20.680219]  __kasan_check_read+0x20/0x30
[   20.680499]  copy_user_test_oob+0x728/0xec8
[   20.680568]  kunit_try_run_case+0x170/0x3f0
[   20.680665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.680797]  kthread+0x328/0x630
[   20.680892]  ret_from_fork+0x10/0x20
[   20.680995] 
[   20.681108] Allocated by task 287:
[   20.681186]  kasan_save_stack+0x3c/0x68
[   20.681275]  kasan_save_track+0x20/0x40
[   20.681626]  kasan_save_alloc_info+0x40/0x58
[   20.681727]  __kasan_kmalloc+0xd4/0xd8
[   20.681830]  __kmalloc_noprof+0x198/0x4c8
[   20.681969]  kunit_kmalloc_array+0x34/0x88
[   20.682055]  copy_user_test_oob+0xac/0xec8
[   20.682118]  kunit_try_run_case+0x170/0x3f0
[   20.682171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.682217]  kthread+0x328/0x630
[   20.682257]  ret_from_fork+0x10/0x20
[   20.682294] 
[   20.682574] The buggy address belongs to the object at fff00000c6e6ca00
[   20.682574]  which belongs to the cache kmalloc-128 of size 128
[   20.682752] The buggy address is located 0 bytes inside of
[   20.682752]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.682870] 
[   20.682913] The buggy address belongs to the physical page:
[   20.683029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.683093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.683170] page_type: f5(slab)
[   20.683243] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.683636] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.683751] page dumped because: kasan: bad access detected
[   20.683899] 
[   20.683959] Memory state around the buggy address:
[   20.684016]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.684090]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.684145] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.684186]                                                                 ^
[   20.684237]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.684283]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.684324] ==================================================================
[   20.706517] ==================================================================
[   20.706599] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   20.706650] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.706734] 
[   20.706794] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.706916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.706963] Hardware name: linux,dummy-virt (DT)
[   20.707001] Call trace:
[   20.707025]  show_stack+0x20/0x38 (C)
[   20.707082]  dump_stack_lvl+0x8c/0xd0
[   20.707446]  print_report+0x118/0x608
[   20.707507]  kasan_report+0xdc/0x128
[   20.707555]  kasan_check_range+0x100/0x1a8
[   20.707613]  __kasan_check_read+0x20/0x30
[   20.707664]  copy_user_test_oob+0x4a0/0xec8
[   20.707713]  kunit_try_run_case+0x170/0x3f0
[   20.707766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.707830]  kthread+0x328/0x630
[   20.707879]  ret_from_fork+0x10/0x20
[   20.707927] 
[   20.707949] Allocated by task 287:
[   20.707979]  kasan_save_stack+0x3c/0x68
[   20.708022]  kasan_save_track+0x20/0x40
[   20.708060]  kasan_save_alloc_info+0x40/0x58
[   20.708102]  __kasan_kmalloc+0xd4/0xd8
[   20.708138]  __kmalloc_noprof+0x198/0x4c8
[   20.708178]  kunit_kmalloc_array+0x34/0x88
[   20.708224]  copy_user_test_oob+0xac/0xec8
[   20.708265]  kunit_try_run_case+0x170/0x3f0
[   20.708307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.708364]  kthread+0x328/0x630
[   20.708403]  ret_from_fork+0x10/0x20
[   20.708440] 
[   20.708461] The buggy address belongs to the object at fff00000c6e6ca00
[   20.708461]  which belongs to the cache kmalloc-128 of size 128
[   20.708758] The buggy address is located 0 bytes inside of
[   20.708758]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.708925] 
[   20.709003] The buggy address belongs to the physical page:
[   20.709135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.709190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.709239] page_type: f5(slab)
[   20.709279] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.709344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.709388] page dumped because: kasan: bad access detected
[   20.709422] 
[   20.709469] Memory state around the buggy address:
[   20.709503]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.709648]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.709746] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.709893]                                                                 ^
[   20.709961]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.710063]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.710368] ==================================================================
[   20.695589] ==================================================================
[   20.695652] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   20.695704] Read of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.695780] 
[   20.695934] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.696094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.696126] Hardware name: linux,dummy-virt (DT)
[   20.696187] Call trace:
[   20.696294]  show_stack+0x20/0x38 (C)
[   20.696404]  dump_stack_lvl+0x8c/0xd0
[   20.696528]  print_report+0x118/0x608
[   20.696613]  kasan_report+0xdc/0x128
[   20.696672]  kasan_check_range+0x100/0x1a8
[   20.696721]  __kasan_check_read+0x20/0x30
[   20.696768]  copy_user_test_oob+0x3c8/0xec8
[   20.696928]  kunit_try_run_case+0x170/0x3f0
[   20.697060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.697161]  kthread+0x328/0x630
[   20.697289]  ret_from_fork+0x10/0x20
[   20.697483] 
[   20.697542] Allocated by task 287:
[   20.697602]  kasan_save_stack+0x3c/0x68
[   20.697645]  kasan_save_track+0x20/0x40
[   20.697696]  kasan_save_alloc_info+0x40/0x58
[   20.697771]  __kasan_kmalloc+0xd4/0xd8
[   20.698099]  __kmalloc_noprof+0x198/0x4c8
[   20.698188]  kunit_kmalloc_array+0x34/0x88
[   20.698260]  copy_user_test_oob+0xac/0xec8
[   20.698432]  kunit_try_run_case+0x170/0x3f0
[   20.698504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.698666]  kthread+0x328/0x630
[   20.698753]  ret_from_fork+0x10/0x20
[   20.698827] 
[   20.698958] The buggy address belongs to the object at fff00000c6e6ca00
[   20.698958]  which belongs to the cache kmalloc-128 of size 128
[   20.699019] The buggy address is located 0 bytes inside of
[   20.699019]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.699082] 
[   20.699104] The buggy address belongs to the physical page:
[   20.699138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.699451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.699562] page_type: f5(slab)
[   20.699641] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.699789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.699866] page dumped because: kasan: bad access detected
[   20.699928] 
[   20.699979] Memory state around the buggy address:
[   20.700223]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.700388]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.700475] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.700619]                                                                 ^
[   20.700688]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.700769]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.700836] ==================================================================
[   20.689760] ==================================================================
[   20.689875] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   20.689929] Write of size 121 at addr fff00000c6e6ca00 by task kunit_try_catch/287
[   20.689999] 
[   20.690032] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.690505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.690549] Hardware name: linux,dummy-virt (DT)
[   20.690688] Call trace:
[   20.690737]  show_stack+0x20/0x38 (C)
[   20.690801]  dump_stack_lvl+0x8c/0xd0
[   20.690891]  print_report+0x118/0x608
[   20.690956]  kasan_report+0xdc/0x128
[   20.691022]  kasan_check_range+0x100/0x1a8
[   20.691073]  __kasan_check_write+0x20/0x30
[   20.691128]  copy_user_test_oob+0x35c/0xec8
[   20.691210]  kunit_try_run_case+0x170/0x3f0
[   20.691267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.691361]  kthread+0x328/0x630
[   20.691412]  ret_from_fork+0x10/0x20
[   20.691660] 
[   20.691711] Allocated by task 287:
[   20.691760]  kasan_save_stack+0x3c/0x68
[   20.691804]  kasan_save_track+0x20/0x40
[   20.691861]  kasan_save_alloc_info+0x40/0x58
[   20.691924]  __kasan_kmalloc+0xd4/0xd8
[   20.692008]  __kmalloc_noprof+0x198/0x4c8
[   20.692065]  kunit_kmalloc_array+0x34/0x88
[   20.692109]  copy_user_test_oob+0xac/0xec8
[   20.692146]  kunit_try_run_case+0x170/0x3f0
[   20.692188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.692360]  kthread+0x328/0x630
[   20.692419]  ret_from_fork+0x10/0x20
[   20.692458] 
[   20.692480] The buggy address belongs to the object at fff00000c6e6ca00
[   20.692480]  which belongs to the cache kmalloc-128 of size 128
[   20.692539] The buggy address is located 0 bytes inside of
[   20.692539]  allocated 120-byte region [fff00000c6e6ca00, fff00000c6e6ca78)
[   20.692602] 
[   20.692967] The buggy address belongs to the physical page:
[   20.693044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.693193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.693287] page_type: f5(slab)
[   20.693645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.693741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.693810] page dumped because: kasan: bad access detected
[   20.693872] 
[   20.693969] Memory state around the buggy address:
[   20.694025]  fff00000c6e6c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.694090]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694157] >fff00000c6e6ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.694276]                                                                 ^
[   20.694349]  fff00000c6e6ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694420]  fff00000c6e6cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694462] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   20.645885] ==================================================================
[   20.645935] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.645988] Write of size 8 at addr fff00000c6e6c978 by task kunit_try_catch/283
[   20.646043] 
[   20.646076] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.646157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.646329] Hardware name: linux,dummy-virt (DT)
[   20.646407] Call trace:
[   20.646432]  show_stack+0x20/0x38 (C)
[   20.646483]  dump_stack_lvl+0x8c/0xd0
[   20.646570]  print_report+0x118/0x608
[   20.646623]  kasan_report+0xdc/0x128
[   20.646689]  kasan_check_range+0x100/0x1a8
[   20.646764]  __kasan_check_write+0x20/0x30
[   20.647036]  copy_to_kernel_nofault+0x8c/0x250
[   20.647151]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.647207]  kunit_try_run_case+0x170/0x3f0
[   20.647258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.647314]  kthread+0x328/0x630
[   20.647571]  ret_from_fork+0x10/0x20
[   20.647629] 
[   20.647671] Allocated by task 283:
[   20.647721]  kasan_save_stack+0x3c/0x68
[   20.647764]  kasan_save_track+0x20/0x40
[   20.647803]  kasan_save_alloc_info+0x40/0x58
[   20.647842]  __kasan_kmalloc+0xd4/0xd8
[   20.647890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.647931]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.647975]  kunit_try_run_case+0x170/0x3f0
[   20.648016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.648070]  kthread+0x328/0x630
[   20.648109]  ret_from_fork+0x10/0x20
[   20.648146] 
[   20.648168] The buggy address belongs to the object at fff00000c6e6c900
[   20.648168]  which belongs to the cache kmalloc-128 of size 128
[   20.648226] The buggy address is located 0 bytes to the right of
[   20.648226]  allocated 120-byte region [fff00000c6e6c900, fff00000c6e6c978)
[   20.648291] 
[   20.648324] The buggy address belongs to the physical page:
[   20.648579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.648842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.648977] page_type: f5(slab)
[   20.649179] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.649356] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.649432] page dumped because: kasan: bad access detected
[   20.649507] 
[   20.649654] Memory state around the buggy address:
[   20.649754]  fff00000c6e6c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.649838]  fff00000c6e6c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.649952] >fff00000c6e6c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.650020]                                                                 ^
[   20.650124]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.650238]  fff00000c6e6ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.650278] ==================================================================
[   20.641068] ==================================================================
[   20.641144] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.641234] Read of size 8 at addr fff00000c6e6c978 by task kunit_try_catch/283
[   20.641287] 
[   20.641361] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.641466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.641504] Hardware name: linux,dummy-virt (DT)
[   20.641538] Call trace:
[   20.641588]  show_stack+0x20/0x38 (C)
[   20.641639]  dump_stack_lvl+0x8c/0xd0
[   20.641732]  print_report+0x118/0x608
[   20.641809]  kasan_report+0xdc/0x128
[   20.641876]  __asan_report_load8_noabort+0x20/0x30
[   20.641927]  copy_to_kernel_nofault+0x204/0x250
[   20.642134]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.642272]  kunit_try_run_case+0x170/0x3f0
[   20.642364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.642425]  kthread+0x328/0x630
[   20.642474]  ret_from_fork+0x10/0x20
[   20.642524] 
[   20.642545] Allocated by task 283:
[   20.642581]  kasan_save_stack+0x3c/0x68
[   20.642780]  kasan_save_track+0x20/0x40
[   20.642826]  kasan_save_alloc_info+0x40/0x58
[   20.642886]  __kasan_kmalloc+0xd4/0xd8
[   20.642924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.642966]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.643009]  kunit_try_run_case+0x170/0x3f0
[   20.643050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.643104]  kthread+0x328/0x630
[   20.643280]  ret_from_fork+0x10/0x20
[   20.643561] 
[   20.643728] The buggy address belongs to the object at fff00000c6e6c900
[   20.643728]  which belongs to the cache kmalloc-128 of size 128
[   20.644033] The buggy address is located 0 bytes to the right of
[   20.644033]  allocated 120-byte region [fff00000c6e6c900, fff00000c6e6c978)
[   20.644109] 
[   20.644133] The buggy address belongs to the physical page:
[   20.644166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   20.644311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.644496] page_type: f5(slab)
[   20.644621] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.644673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.644783] page dumped because: kasan: bad access detected
[   20.645097] 
[   20.645230] Memory state around the buggy address:
[   20.645310]  fff00000c6e6c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.645369]  fff00000c6e6c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.645415] >fff00000c6e6c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.645492]                                                                 ^
[   20.645535]  fff00000c6e6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.645579]  fff00000c6e6ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.645620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   20.609898] ==================================================================
[   20.609965] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   20.610025] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271
[   20.610077] 
[   20.610115] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.610198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.610226] Hardware name: linux,dummy-virt (DT)
[   20.610285] Call trace:
[   20.610311]  show_stack+0x20/0x38 (C)
[   20.610379]  dump_stack_lvl+0x8c/0xd0
[   20.610431]  print_report+0x310/0x608
[   20.610477]  kasan_report+0xdc/0x128
[   20.610523]  __asan_report_load1_noabort+0x20/0x30
[   20.610573]  vmalloc_oob+0x578/0x5d0
[   20.610620]  kunit_try_run_case+0x170/0x3f0
[   20.610669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.610723]  kthread+0x328/0x630
[   20.610771]  ret_from_fork+0x10/0x20
[   20.610819] 
[   20.610852] The buggy address belongs to the virtual mapping at
[   20.610852]  [ffff80008010b000, ffff80008010d000) created by:
[   20.610852]  vmalloc_oob+0x98/0x5d0
[   20.610928] 
[   20.610953] The buggy address belongs to the physical page:
[   20.611013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   20.611067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.611130] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.611181] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.611241] page dumped because: kasan: bad access detected
[   20.611276] 
[   20.611295] Memory state around the buggy address:
[   20.611330]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.611424]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.611469] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.611515]                                                              ^
[   20.611842]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.611917]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.611975] ==================================================================
[   20.612109] ==================================================================
[   20.612166] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   20.612279] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271
[   20.612373] 
[   20.612436] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.612547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.612608] Hardware name: linux,dummy-virt (DT)
[   20.612702] Call trace:
[   20.612762]  show_stack+0x20/0x38 (C)
[   20.612831]  dump_stack_lvl+0x8c/0xd0
[   20.612878]  print_report+0x310/0x608
[   20.612924]  kasan_report+0xdc/0x128
[   20.612970]  __asan_report_load1_noabort+0x20/0x30
[   20.613445]  vmalloc_oob+0x51c/0x5d0
[   20.613533]  kunit_try_run_case+0x170/0x3f0
[   20.613638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.614007]  kthread+0x328/0x630
[   20.614104]  ret_from_fork+0x10/0x20
[   20.614253] 
[   20.614299] The buggy address belongs to the virtual mapping at
[   20.614299]  [ffff80008010b000, ffff80008010d000) created by:
[   20.614299]  vmalloc_oob+0x98/0x5d0
[   20.614450] 
[   20.614498] The buggy address belongs to the physical page:
[   20.614578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   20.614643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.614705] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.615033] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.615160] page dumped because: kasan: bad access detected
[   20.615208] 
[   20.615285] Memory state around the buggy address:
[   20.615364]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.615624]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.615729] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.615803]                                                                 ^
[   20.615926]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.616004]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.616133] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.566452] ==================================================================
[   20.566507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.566747] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.566864] 
[   20.566925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.567011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.567039] Hardware name: linux,dummy-virt (DT)
[   20.567099] Call trace:
[   20.567124]  show_stack+0x20/0x38 (C)
[   20.567181]  dump_stack_lvl+0x8c/0xd0
[   20.567231]  print_report+0x118/0x608
[   20.567280]  kasan_report+0xdc/0x128
[   20.567325]  kasan_check_range+0x100/0x1a8
[   20.567386]  __kasan_check_write+0x20/0x30
[   20.567442]  kasan_atomics_helper+0x16d0/0x4858
[   20.567491]  kasan_atomics+0x198/0x2e0
[   20.567537]  kunit_try_run_case+0x170/0x3f0
[   20.567587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.567643]  kthread+0x328/0x630
[   20.567692]  ret_from_fork+0x10/0x20
[   20.567741] 
[   20.567763] Allocated by task 267:
[   20.567802]  kasan_save_stack+0x3c/0x68
[   20.567854]  kasan_save_track+0x20/0x40
[   20.567893]  kasan_save_alloc_info+0x40/0x58
[   20.567935]  __kasan_kmalloc+0xd4/0xd8
[   20.567972]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.568014]  kasan_atomics+0xb8/0x2e0
[   20.568051]  kunit_try_run_case+0x170/0x3f0
[   20.568093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.568149]  kthread+0x328/0x630
[   20.568198]  ret_from_fork+0x10/0x20
[   20.568643] 
[   20.568745] The buggy address belongs to the object at fff00000c6e72400
[   20.568745]  which belongs to the cache kmalloc-64 of size 64
[   20.569120] The buggy address is located 0 bytes to the right of
[   20.569120]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.569234] 
[   20.569312] The buggy address belongs to the physical page:
[   20.569388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.569535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.569588] page_type: f5(slab)
[   20.569659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.569714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.569758] page dumped because: kasan: bad access detected
[   20.569923] 
[   20.569998] Memory state around the buggy address:
[   20.570065]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.570118]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.570181] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.570256]                                      ^
[   20.570537]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.570621]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.570707] ==================================================================
[   20.456762] ==================================================================
[   20.456813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.456909] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.457088] 
[   20.457144] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.457257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.457305] Hardware name: linux,dummy-virt (DT)
[   20.457350] Call trace:
[   20.457374]  show_stack+0x20/0x38 (C)
[   20.457427]  dump_stack_lvl+0x8c/0xd0
[   20.457496]  print_report+0x118/0x608
[   20.457563]  kasan_report+0xdc/0x128
[   20.457628]  __asan_report_store8_noabort+0x20/0x30
[   20.457719]  kasan_atomics_helper+0x3e5c/0x4858
[   20.457768]  kasan_atomics+0x198/0x2e0
[   20.457814]  kunit_try_run_case+0x170/0x3f0
[   20.457864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.457919]  kthread+0x328/0x630
[   20.458082]  ret_from_fork+0x10/0x20
[   20.458142] 
[   20.458181] Allocated by task 267:
[   20.458229]  kasan_save_stack+0x3c/0x68
[   20.458272]  kasan_save_track+0x20/0x40
[   20.460638]  kasan_save_alloc_info+0x40/0x58
[   20.460702]  __kasan_kmalloc+0xd4/0xd8
[   20.460741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.460785]  kasan_atomics+0xb8/0x2e0
[   20.460821]  kunit_try_run_case+0x170/0x3f0
[   20.460864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.460911]  kthread+0x328/0x630
[   20.460950]  ret_from_fork+0x10/0x20
[   20.460988] 
[   20.461010] The buggy address belongs to the object at fff00000c6e72400
[   20.461010]  which belongs to the cache kmalloc-64 of size 64
[   20.461071] The buggy address is located 0 bytes to the right of
[   20.461071]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.461137] 
[   20.461158] The buggy address belongs to the physical page:
[   20.461191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.461247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.461297] page_type: f5(slab)
[   20.461350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.461431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.461507] page dumped because: kasan: bad access detected
[   20.461617] 
[   20.461685] Memory state around the buggy address:
[   20.461738]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.461804]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.461901] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.461942]                                      ^
[   20.461975]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462019]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462060] ==================================================================
[   20.467414] ==================================================================
[   20.467702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.467768] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.467820] 
[   20.467851] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.467952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.468029] Hardware name: linux,dummy-virt (DT)
[   20.468064] Call trace:
[   20.468104]  show_stack+0x20/0x38 (C)
[   20.468175]  dump_stack_lvl+0x8c/0xd0
[   20.468236]  print_report+0x118/0x608
[   20.468314]  kasan_report+0xdc/0x128
[   20.468424]  kasan_check_range+0x100/0x1a8
[   20.468507]  __kasan_check_write+0x20/0x30
[   20.468581]  kasan_atomics_helper+0xf20/0x4858
[   20.468632]  kasan_atomics+0x198/0x2e0
[   20.468677]  kunit_try_run_case+0x170/0x3f0
[   20.468727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.468783]  kthread+0x328/0x630
[   20.468948]  ret_from_fork+0x10/0x20
[   20.469094] 
[   20.469152] Allocated by task 267:
[   20.469234]  kasan_save_stack+0x3c/0x68
[   20.469540]  kasan_save_track+0x20/0x40
[   20.469645]  kasan_save_alloc_info+0x40/0x58
[   20.469714]  __kasan_kmalloc+0xd4/0xd8
[   20.469818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.469895]  kasan_atomics+0xb8/0x2e0
[   20.469963]  kunit_try_run_case+0x170/0x3f0
[   20.470050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.470134]  kthread+0x328/0x630
[   20.470228]  ret_from_fork+0x10/0x20
[   20.470306] 
[   20.470358] The buggy address belongs to the object at fff00000c6e72400
[   20.470358]  which belongs to the cache kmalloc-64 of size 64
[   20.470420] The buggy address is located 0 bytes to the right of
[   20.470420]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.470698] 
[   20.470933] The buggy address belongs to the physical page:
[   20.471184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.471606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.471679] page_type: f5(slab)
[   20.471794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.471894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.471938] page dumped because: kasan: bad access detected
[   20.471972] 
[   20.471993] Memory state around the buggy address:
[   20.472036]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.472296]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.472362] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.472404]                                      ^
[   20.472464]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472527]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472571] ==================================================================
[   20.487009] ==================================================================
[   20.487063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.487142] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.487223] 
[   20.487255] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.487351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.487380] Hardware name: linux,dummy-virt (DT)
[   20.487413] Call trace:
[   20.487473]  show_stack+0x20/0x38 (C)
[   20.487616]  dump_stack_lvl+0x8c/0xd0
[   20.487692]  print_report+0x118/0x608
[   20.487749]  kasan_report+0xdc/0x128
[   20.487814]  kasan_check_range+0x100/0x1a8
[   20.487866]  __kasan_check_write+0x20/0x30
[   20.487991]  kasan_atomics_helper+0x10c0/0x4858
[   20.488118]  kasan_atomics+0x198/0x2e0
[   20.488194]  kunit_try_run_case+0x170/0x3f0
[   20.488296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488396]  kthread+0x328/0x630
[   20.488474]  ret_from_fork+0x10/0x20
[   20.488581] 
[   20.488677] Allocated by task 267:
[   20.488738]  kasan_save_stack+0x3c/0x68
[   20.488782]  kasan_save_track+0x20/0x40
[   20.488969]  kasan_save_alloc_info+0x40/0x58
[   20.489015]  __kasan_kmalloc+0xd4/0xd8
[   20.489052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.489205]  kasan_atomics+0xb8/0x2e0
[   20.489290]  kunit_try_run_case+0x170/0x3f0
[   20.489378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.489501]  kthread+0x328/0x630
[   20.489587]  ret_from_fork+0x10/0x20
[   20.489863] 
[   20.489947] The buggy address belongs to the object at fff00000c6e72400
[   20.489947]  which belongs to the cache kmalloc-64 of size 64
[   20.490043] The buggy address is located 0 bytes to the right of
[   20.490043]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.490160] 
[   20.490229] The buggy address belongs to the physical page:
[   20.490296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.490369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.490499] page_type: f5(slab)
[   20.490577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.490663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.490707] page dumped because: kasan: bad access detected
[   20.490741] 
[   20.490761] Memory state around the buggy address:
[   20.490796]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.490845]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.490890] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.491092]                                      ^
[   20.491172]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491279]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491352] ==================================================================
[   20.441922] ==================================================================
[   20.442173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.442295] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.442362] 
[   20.442394] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.442487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.442515] Hardware name: linux,dummy-virt (DT)
[   20.442595] Call trace:
[   20.442620]  show_stack+0x20/0x38 (C)
[   20.442688]  dump_stack_lvl+0x8c/0xd0
[   20.442758]  print_report+0x118/0x608
[   20.442824]  kasan_report+0xdc/0x128
[   20.442881]  kasan_check_range+0x100/0x1a8
[   20.442929]  __kasan_check_read+0x20/0x30
[   20.442980]  kasan_atomics_helper+0xdd4/0x4858
[   20.443066]  kasan_atomics+0x198/0x2e0
[   20.443113]  kunit_try_run_case+0x170/0x3f0
[   20.443250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.443314]  kthread+0x328/0x630
[   20.443433]  ret_from_fork+0x10/0x20
[   20.443499] 
[   20.443528] Allocated by task 267:
[   20.443575]  kasan_save_stack+0x3c/0x68
[   20.443847]  kasan_save_track+0x20/0x40
[   20.443919]  kasan_save_alloc_info+0x40/0x58
[   20.443970]  __kasan_kmalloc+0xd4/0xd8
[   20.444008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.444051]  kasan_atomics+0xb8/0x2e0
[   20.444088]  kunit_try_run_case+0x170/0x3f0
[   20.444130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.444177]  kthread+0x328/0x630
[   20.444220]  ret_from_fork+0x10/0x20
[   20.444260] 
[   20.444283] The buggy address belongs to the object at fff00000c6e72400
[   20.444283]  which belongs to the cache kmalloc-64 of size 64
[   20.444354] The buggy address is located 0 bytes to the right of
[   20.444354]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.444420] 
[   20.444442] The buggy address belongs to the physical page:
[   20.444589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.444647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.444729] page_type: f5(slab)
[   20.444771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.444823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.445104] page dumped because: kasan: bad access detected
[   20.445172] 
[   20.445452] Memory state around the buggy address:
[   20.445550]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.445627]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.445719] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.445797]                                      ^
[   20.445845]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.445890]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.446108] ==================================================================
[   20.537552] ==================================================================
[   20.537607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.537695] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.537974] 
[   20.538019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.538104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.538134] Hardware name: linux,dummy-virt (DT)
[   20.538185] Call trace:
[   20.538210]  show_stack+0x20/0x38 (C)
[   20.538303]  dump_stack_lvl+0x8c/0xd0
[   20.538365]  print_report+0x118/0x608
[   20.538432]  kasan_report+0xdc/0x128
[   20.538485]  kasan_check_range+0x100/0x1a8
[   20.538535]  __kasan_check_write+0x20/0x30
[   20.538585]  kasan_atomics_helper+0x14e4/0x4858
[   20.538632]  kasan_atomics+0x198/0x2e0
[   20.538678]  kunit_try_run_case+0x170/0x3f0
[   20.538728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.538846]  kthread+0x328/0x630
[   20.538987]  ret_from_fork+0x10/0x20
[   20.539062] 
[   20.539091] Allocated by task 267:
[   20.539121]  kasan_save_stack+0x3c/0x68
[   20.539354]  kasan_save_track+0x20/0x40
[   20.539411]  kasan_save_alloc_info+0x40/0x58
[   20.539492]  __kasan_kmalloc+0xd4/0xd8
[   20.539566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.539611]  kasan_atomics+0xb8/0x2e0
[   20.539648]  kunit_try_run_case+0x170/0x3f0
[   20.539691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.539736]  kthread+0x328/0x630
[   20.539793]  ret_from_fork+0x10/0x20
[   20.539849] 
[   20.539883] The buggy address belongs to the object at fff00000c6e72400
[   20.539883]  which belongs to the cache kmalloc-64 of size 64
[   20.539945] The buggy address is located 0 bytes to the right of
[   20.539945]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.540052] 
[   20.540074] The buggy address belongs to the physical page:
[   20.540241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.540312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.540442] page_type: f5(slab)
[   20.540509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.540580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.540857] page dumped because: kasan: bad access detected
[   20.540920] 
[   20.540989] Memory state around the buggy address:
[   20.541081]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.541157]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.541220] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.541260]                                      ^
[   20.541678]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.541730]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.541771] ==================================================================
[   20.544451] ==================================================================
[   20.544492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.544550] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.544958] 
[   20.544991] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.545076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.545104] Hardware name: linux,dummy-virt (DT)
[   20.545136] Call trace:
[   20.545159]  show_stack+0x20/0x38 (C)
[   20.545239]  dump_stack_lvl+0x8c/0xd0
[   20.545288]  print_report+0x118/0x608
[   20.545347]  kasan_report+0xdc/0x128
[   20.545498]  kasan_check_range+0x100/0x1a8
[   20.545628]  __kasan_check_write+0x20/0x30
[   20.545726]  kasan_atomics_helper+0x15b4/0x4858
[   20.545847]  kasan_atomics+0x198/0x2e0
[   20.546129]  kunit_try_run_case+0x170/0x3f0
[   20.546283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.546387]  kthread+0x328/0x630
[   20.546471]  ret_from_fork+0x10/0x20
[   20.546585] 
[   20.546609] Allocated by task 267:
[   20.546676]  kasan_save_stack+0x3c/0x68
[   20.546776]  kasan_save_track+0x20/0x40
[   20.546859]  kasan_save_alloc_info+0x40/0x58
[   20.546936]  __kasan_kmalloc+0xd4/0xd8
[   20.547029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.547071]  kasan_atomics+0xb8/0x2e0
[   20.547123]  kunit_try_run_case+0x170/0x3f0
[   20.547452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.547569]  kthread+0x328/0x630
[   20.547689]  ret_from_fork+0x10/0x20
[   20.547775] 
[   20.547843] The buggy address belongs to the object at fff00000c6e72400
[   20.547843]  which belongs to the cache kmalloc-64 of size 64
[   20.548046] The buggy address is located 0 bytes to the right of
[   20.548046]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.548112] 
[   20.548134] The buggy address belongs to the physical page:
[   20.548167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.548395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.548529] page_type: f5(slab)
[   20.548600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.548876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.548964] page dumped because: kasan: bad access detected
[   20.549038] 
[   20.549112] Memory state around the buggy address:
[   20.549189]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549261]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549306] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.549373]                                      ^
[   20.549410]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549452]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549764] ==================================================================
[   20.550646] ==================================================================
[   20.550696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.550764] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.550817] 
[   20.550891] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.550991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.551045] Hardware name: linux,dummy-virt (DT)
[   20.551079] Call trace:
[   20.551120]  show_stack+0x20/0x38 (C)
[   20.551346]  dump_stack_lvl+0x8c/0xd0
[   20.551502]  print_report+0x118/0x608
[   20.551577]  kasan_report+0xdc/0x128
[   20.551680]  __asan_report_load8_noabort+0x20/0x30
[   20.551734]  kasan_atomics_helper+0x3db0/0x4858
[   20.551812]  kasan_atomics+0x198/0x2e0
[   20.551865]  kunit_try_run_case+0x170/0x3f0
[   20.551931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.551995]  kthread+0x328/0x630
[   20.552060]  ret_from_fork+0x10/0x20
[   20.552111] 
[   20.552131] Allocated by task 267:
[   20.552162]  kasan_save_stack+0x3c/0x68
[   20.552351]  kasan_save_track+0x20/0x40
[   20.552497]  kasan_save_alloc_info+0x40/0x58
[   20.552572]  __kasan_kmalloc+0xd4/0xd8
[   20.552697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.552783]  kasan_atomics+0xb8/0x2e0
[   20.553070]  kunit_try_run_case+0x170/0x3f0
[   20.553162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.553248]  kthread+0x328/0x630
[   20.553369]  ret_from_fork+0x10/0x20
[   20.553455] 
[   20.553523] The buggy address belongs to the object at fff00000c6e72400
[   20.553523]  which belongs to the cache kmalloc-64 of size 64
[   20.553670] The buggy address is located 0 bytes to the right of
[   20.553670]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.553760] 
[   20.553883] The buggy address belongs to the physical page:
[   20.553942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.553998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.554170] page_type: f5(slab)
[   20.554211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.554264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.554422] page dumped because: kasan: bad access detected
[   20.554494] 
[   20.554527] Memory state around the buggy address:
[   20.554561]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554608]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554793] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.555120]                                      ^
[   20.555429]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555549]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555703] ==================================================================
[   20.577443] ==================================================================
[   20.577517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.577569] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.577731] 
[   20.577790] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.577877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.577907] Hardware name: linux,dummy-virt (DT)
[   20.577953] Call trace:
[   20.577979]  show_stack+0x20/0x38 (C)
[   20.578046]  dump_stack_lvl+0x8c/0xd0
[   20.578310]  print_report+0x118/0x608
[   20.578383]  kasan_report+0xdc/0x128
[   20.578448]  kasan_check_range+0x100/0x1a8
[   20.578504]  __kasan_check_write+0x20/0x30
[   20.578553]  kasan_atomics_helper+0x175c/0x4858
[   20.578602]  kasan_atomics+0x198/0x2e0
[   20.578655]  kunit_try_run_case+0x170/0x3f0
[   20.578723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.578808]  kthread+0x328/0x630
[   20.578862]  ret_from_fork+0x10/0x20
[   20.578912] 
[   20.578932] Allocated by task 267:
[   20.578962]  kasan_save_stack+0x3c/0x68
[   20.579003]  kasan_save_track+0x20/0x40
[   20.579042]  kasan_save_alloc_info+0x40/0x58
[   20.579174]  __kasan_kmalloc+0xd4/0xd8
[   20.579223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.579289]  kasan_atomics+0xb8/0x2e0
[   20.579374]  kunit_try_run_case+0x170/0x3f0
[   20.579422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.579475]  kthread+0x328/0x630
[   20.579644]  ret_from_fork+0x10/0x20
[   20.579686] 
[   20.579805] The buggy address belongs to the object at fff00000c6e72400
[   20.579805]  which belongs to the cache kmalloc-64 of size 64
[   20.579880] The buggy address is located 0 bytes to the right of
[   20.579880]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.579965] 
[   20.579995] The buggy address belongs to the physical page:
[   20.580031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.580106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.580155] page_type: f5(slab)
[   20.580233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.580326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.580401] page dumped because: kasan: bad access detected
[   20.580436] 
[   20.580458] Memory state around the buggy address:
[   20.580491]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.580537]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.580597] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.580637]                                      ^
[   20.580672]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.580923]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.581113] ==================================================================
[   20.451898] ==================================================================
[   20.451968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.452030] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.452083] 
[   20.452300] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.452412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.452515] Hardware name: linux,dummy-virt (DT)
[   20.452589] Call trace:
[   20.452622]  show_stack+0x20/0x38 (C)
[   20.452845]  dump_stack_lvl+0x8c/0xd0
[   20.452940]  print_report+0x118/0x608
[   20.453028]  kasan_report+0xdc/0x128
[   20.453124]  kasan_check_range+0x100/0x1a8
[   20.453222]  __kasan_check_write+0x20/0x30
[   20.453319]  kasan_atomics_helper+0xe44/0x4858
[   20.453417]  kasan_atomics+0x198/0x2e0
[   20.453462]  kunit_try_run_case+0x170/0x3f0
[   20.453541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.453597]  kthread+0x328/0x630
[   20.453643]  ret_from_fork+0x10/0x20
[   20.453692] 
[   20.453713] Allocated by task 267:
[   20.453876]  kasan_save_stack+0x3c/0x68
[   20.453963]  kasan_save_track+0x20/0x40
[   20.454024]  kasan_save_alloc_info+0x40/0x58
[   20.454089]  __kasan_kmalloc+0xd4/0xd8
[   20.454317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.454414]  kasan_atomics+0xb8/0x2e0
[   20.454538]  kunit_try_run_case+0x170/0x3f0
[   20.454603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.454710]  kthread+0x328/0x630
[   20.454788]  ret_from_fork+0x10/0x20
[   20.454890] 
[   20.454939] The buggy address belongs to the object at fff00000c6e72400
[   20.454939]  which belongs to the cache kmalloc-64 of size 64
[   20.455011] The buggy address is located 0 bytes to the right of
[   20.455011]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.455076] 
[   20.455099] The buggy address belongs to the physical page:
[   20.455133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.455194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.455254] page_type: f5(slab)
[   20.455294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.455365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.455407] page dumped because: kasan: bad access detected
[   20.455442] 
[   20.455472] Memory state around the buggy address:
[   20.455507]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.455553]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.455598] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.455653]                                      ^
[   20.455696]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.455749]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.455791] ==================================================================
[   20.561326] ==================================================================
[   20.561746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.561962] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.562043] 
[   20.562077] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.562173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.562218] Hardware name: linux,dummy-virt (DT)
[   20.562251] Call trace:
[   20.562277]  show_stack+0x20/0x38 (C)
[   20.562328]  dump_stack_lvl+0x8c/0xd0
[   20.562516]  print_report+0x118/0x608
[   20.562585]  kasan_report+0xdc/0x128
[   20.562652]  __asan_report_load8_noabort+0x20/0x30
[   20.562706]  kasan_atomics_helper+0x3df4/0x4858
[   20.562764]  kasan_atomics+0x198/0x2e0
[   20.562821]  kunit_try_run_case+0x170/0x3f0
[   20.562879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.562964]  kthread+0x328/0x630
[   20.563031]  ret_from_fork+0x10/0x20
[   20.563098] 
[   20.563122] Allocated by task 267:
[   20.563165]  kasan_save_stack+0x3c/0x68
[   20.563224]  kasan_save_track+0x20/0x40
[   20.563281]  kasan_save_alloc_info+0x40/0x58
[   20.563375]  __kasan_kmalloc+0xd4/0xd8
[   20.563431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.563475]  kasan_atomics+0xb8/0x2e0
[   20.563511]  kunit_try_run_case+0x170/0x3f0
[   20.563667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.563816]  kthread+0x328/0x630
[   20.563871]  ret_from_fork+0x10/0x20
[   20.563936] 
[   20.563958] The buggy address belongs to the object at fff00000c6e72400
[   20.563958]  which belongs to the cache kmalloc-64 of size 64
[   20.564034] The buggy address is located 0 bytes to the right of
[   20.564034]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.564103] 
[   20.564142] The buggy address belongs to the physical page:
[   20.564187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.564494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.564597] page_type: f5(slab)
[   20.564698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.564774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.564924] page dumped because: kasan: bad access detected
[   20.564992] 
[   20.565049] Memory state around the buggy address:
[   20.565136]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.565206]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.565253] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.565457]                                      ^
[   20.565498]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.565544]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.565584] ==================================================================
[   20.429090] ==================================================================
[   20.429166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.429235] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.429287] 
[   20.429353] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.429591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.429649] Hardware name: linux,dummy-virt (DT)
[   20.429683] Call trace:
[   20.429723]  show_stack+0x20/0x38 (C)
[   20.429777]  dump_stack_lvl+0x8c/0xd0
[   20.429844]  print_report+0x118/0x608
[   20.429947]  kasan_report+0xdc/0x128
[   20.430013]  __asan_report_load4_noabort+0x20/0x30
[   20.430065]  kasan_atomics_helper+0x3dd8/0x4858
[   20.430129]  kasan_atomics+0x198/0x2e0
[   20.430174]  kunit_try_run_case+0x170/0x3f0
[   20.430242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.430312]  kthread+0x328/0x630
[   20.430398]  ret_from_fork+0x10/0x20
[   20.430449] 
[   20.430469] Allocated by task 267:
[   20.430498]  kasan_save_stack+0x3c/0x68
[   20.430540]  kasan_save_track+0x20/0x40
[   20.430612]  kasan_save_alloc_info+0x40/0x58
[   20.430652]  __kasan_kmalloc+0xd4/0xd8
[   20.430775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.430844]  kasan_atomics+0xb8/0x2e0
[   20.430893]  kunit_try_run_case+0x170/0x3f0
[   20.430937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.431004]  kthread+0x328/0x630
[   20.431059]  ret_from_fork+0x10/0x20
[   20.431187] 
[   20.431283] The buggy address belongs to the object at fff00000c6e72400
[   20.431283]  which belongs to the cache kmalloc-64 of size 64
[   20.431389] The buggy address is located 0 bytes to the right of
[   20.431389]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.431474] 
[   20.431547] The buggy address belongs to the physical page:
[   20.431582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.431656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.431728] page_type: f5(slab)
[   20.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.431829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.431872] page dumped because: kasan: bad access detected
[   20.431905] 
[   20.431926] Memory state around the buggy address:
[   20.431959]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.432115]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.432229] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.432307]                                      ^
[   20.432435]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.432520]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.432616] ==================================================================
[   20.491965] ==================================================================
[   20.492018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.492385] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.492480] 
[   20.492531] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.492645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.492726] Hardware name: linux,dummy-virt (DT)
[   20.492902] Call trace:
[   20.493066]  show_stack+0x20/0x38 (C)
[   20.493173]  dump_stack_lvl+0x8c/0xd0
[   20.493258]  print_report+0x118/0x608
[   20.493397]  kasan_report+0xdc/0x128
[   20.493494]  kasan_check_range+0x100/0x1a8
[   20.493613]  __kasan_check_write+0x20/0x30
[   20.493665]  kasan_atomics_helper+0x1128/0x4858
[   20.493729]  kasan_atomics+0x198/0x2e0
[   20.493777]  kunit_try_run_case+0x170/0x3f0
[   20.494100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.494228]  kthread+0x328/0x630
[   20.494354]  ret_from_fork+0x10/0x20
[   20.494616] 
[   20.494681] Allocated by task 267:
[   20.494723]  kasan_save_stack+0x3c/0x68
[   20.494830]  kasan_save_track+0x20/0x40
[   20.494920]  kasan_save_alloc_info+0x40/0x58
[   20.495031]  __kasan_kmalloc+0xd4/0xd8
[   20.495110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.495220]  kasan_atomics+0xb8/0x2e0
[   20.495315]  kunit_try_run_case+0x170/0x3f0
[   20.495419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.495468]  kthread+0x328/0x630
[   20.495505]  ret_from_fork+0x10/0x20
[   20.495587] 
[   20.495777] The buggy address belongs to the object at fff00000c6e72400
[   20.495777]  which belongs to the cache kmalloc-64 of size 64
[   20.495952] The buggy address is located 0 bytes to the right of
[   20.495952]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.496237] 
[   20.496312] The buggy address belongs to the physical page:
[   20.496385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.496577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.496633] page_type: f5(slab)
[   20.496674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.496875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.496971] page dumped because: kasan: bad access detected
[   20.497078] 
[   20.497136] Memory state around the buggy address:
[   20.497202]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.497488]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.497559] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.497636]                                      ^
[   20.497722]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.497812]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.497926] ==================================================================
[   20.477737] ==================================================================
[   20.477793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.477843] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.477992] 
[   20.478080] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.478189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.478243] Hardware name: linux,dummy-virt (DT)
[   20.478436] Call trace:
[   20.478472]  show_stack+0x20/0x38 (C)
[   20.478525]  dump_stack_lvl+0x8c/0xd0
[   20.478637]  print_report+0x118/0x608
[   20.478702]  kasan_report+0xdc/0x128
[   20.478808]  kasan_check_range+0x100/0x1a8
[   20.478865]  __kasan_check_write+0x20/0x30
[   20.478931]  kasan_atomics_helper+0xff0/0x4858
[   20.479000]  kasan_atomics+0x198/0x2e0
[   20.479066]  kunit_try_run_case+0x170/0x3f0
[   20.479121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.479178]  kthread+0x328/0x630
[   20.479243]  ret_from_fork+0x10/0x20
[   20.479293] 
[   20.479313] Allocated by task 267:
[   20.479356]  kasan_save_stack+0x3c/0x68
[   20.479471]  kasan_save_track+0x20/0x40
[   20.479628]  kasan_save_alloc_info+0x40/0x58
[   20.479686]  __kasan_kmalloc+0xd4/0xd8
[   20.479734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.479791]  kasan_atomics+0xb8/0x2e0
[   20.479852]  kunit_try_run_case+0x170/0x3f0
[   20.480051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.480154]  kthread+0x328/0x630
[   20.480218]  ret_from_fork+0x10/0x20
[   20.480297] 
[   20.480379] The buggy address belongs to the object at fff00000c6e72400
[   20.480379]  which belongs to the cache kmalloc-64 of size 64
[   20.480478] The buggy address is located 0 bytes to the right of
[   20.480478]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.480603] 
[   20.480668] The buggy address belongs to the physical page:
[   20.480725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.480807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.480910] page_type: f5(slab)
[   20.480969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.481024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.481249] page dumped because: kasan: bad access detected
[   20.481288] 
[   20.481309] Memory state around the buggy address:
[   20.481844]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.481939]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.482035] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.482112]                                      ^
[   20.482160]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482213]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482262] ==================================================================
[   20.524177] ==================================================================
[   20.524237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.524287] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.524509] 
[   20.524545] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.524630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.524691] Hardware name: linux,dummy-virt (DT)
[   20.524770] Call trace:
[   20.524805]  show_stack+0x20/0x38 (C)
[   20.525028]  dump_stack_lvl+0x8c/0xd0
[   20.525143]  print_report+0x118/0x608
[   20.525221]  kasan_report+0xdc/0x128
[   20.525288]  __asan_report_load8_noabort+0x20/0x30
[   20.525352]  kasan_atomics_helper+0x3f04/0x4858
[   20.525402]  kasan_atomics+0x198/0x2e0
[   20.525447]  kunit_try_run_case+0x170/0x3f0
[   20.525602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.525659]  kthread+0x328/0x630
[   20.525705]  ret_from_fork+0x10/0x20
[   20.525755] 
[   20.525775] Allocated by task 267:
[   20.525931]  kasan_save_stack+0x3c/0x68
[   20.526027]  kasan_save_track+0x20/0x40
[   20.526115]  kasan_save_alloc_info+0x40/0x58
[   20.526165]  __kasan_kmalloc+0xd4/0xd8
[   20.526224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.526292]  kasan_atomics+0xb8/0x2e0
[   20.526555]  kunit_try_run_case+0x170/0x3f0
[   20.526682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.526778]  kthread+0x328/0x630
[   20.526866]  ret_from_fork+0x10/0x20
[   20.526943] 
[   20.526992] The buggy address belongs to the object at fff00000c6e72400
[   20.526992]  which belongs to the cache kmalloc-64 of size 64
[   20.527097] The buggy address is located 0 bytes to the right of
[   20.527097]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.527190] 
[   20.527211] The buggy address belongs to the physical page:
[   20.527244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.527301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.527377] page_type: f5(slab)
[   20.527418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.527471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.527531] page dumped because: kasan: bad access detected
[   20.527575] 
[   20.527598] Memory state around the buggy address:
[   20.527632]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.527678]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.527731] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.527772]                                      ^
[   20.527808]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.527851]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.527901] ==================================================================
[   20.503806] ==================================================================
[   20.503857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.503905] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.503967] 
[   20.503999] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.504082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.504119] Hardware name: linux,dummy-virt (DT)
[   20.504151] Call trace:
[   20.504176]  show_stack+0x20/0x38 (C)
[   20.504224]  dump_stack_lvl+0x8c/0xd0
[   20.504274]  print_report+0x118/0x608
[   20.504319]  kasan_report+0xdc/0x128
[   20.504378]  kasan_check_range+0x100/0x1a8
[   20.504427]  __kasan_check_write+0x20/0x30
[   20.504474]  kasan_atomics_helper+0x11f8/0x4858
[   20.505107]  kasan_atomics+0x198/0x2e0
[   20.505195]  kunit_try_run_case+0x170/0x3f0
[   20.505278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.505394]  kthread+0x328/0x630
[   20.505452]  ret_from_fork+0x10/0x20
[   20.505555] 
[   20.505605] Allocated by task 267:
[   20.505635]  kasan_save_stack+0x3c/0x68
[   20.505701]  kasan_save_track+0x20/0x40
[   20.505788]  kasan_save_alloc_info+0x40/0x58
[   20.505913]  __kasan_kmalloc+0xd4/0xd8
[   20.505956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.505998]  kasan_atomics+0xb8/0x2e0
[   20.506037]  kunit_try_run_case+0x170/0x3f0
[   20.506077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.506250]  kthread+0x328/0x630
[   20.506386]  ret_from_fork+0x10/0x20
[   20.506473] 
[   20.506574] The buggy address belongs to the object at fff00000c6e72400
[   20.506574]  which belongs to the cache kmalloc-64 of size 64
[   20.506686] The buggy address is located 0 bytes to the right of
[   20.506686]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.506791] 
[   20.506847] The buggy address belongs to the physical page:
[   20.506943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.507229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.507352] page_type: f5(slab)
[   20.507477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.507529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.507728] page dumped because: kasan: bad access detected
[   20.507878] 
[   20.507928] Memory state around the buggy address:
[   20.507984]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.508106]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.508219] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.508420]                                      ^
[   20.508556]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.508609]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.508649] ==================================================================
[   20.595012] ==================================================================
[   20.595083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.595136] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.595188] 
[   20.595240] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.595345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.595384] Hardware name: linux,dummy-virt (DT)
[   20.595418] Call trace:
[   20.595468]  show_stack+0x20/0x38 (C)
[   20.595649]  dump_stack_lvl+0x8c/0xd0
[   20.595769]  print_report+0x118/0x608
[   20.595846]  kasan_report+0xdc/0x128
[   20.595911]  kasan_check_range+0x100/0x1a8
[   20.595988]  __kasan_check_write+0x20/0x30
[   20.596054]  kasan_atomics_helper+0x17ec/0x4858
[   20.596128]  kasan_atomics+0x198/0x2e0
[   20.596195]  kunit_try_run_case+0x170/0x3f0
[   20.596273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.596413]  kthread+0x328/0x630
[   20.596524]  ret_from_fork+0x10/0x20
[   20.596901] 
[   20.596937] Allocated by task 267:
[   20.597053]  kasan_save_stack+0x3c/0x68
[   20.597119]  kasan_save_track+0x20/0x40
[   20.597222]  kasan_save_alloc_info+0x40/0x58
[   20.597311]  __kasan_kmalloc+0xd4/0xd8
[   20.597383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.597425]  kasan_atomics+0xb8/0x2e0
[   20.597462]  kunit_try_run_case+0x170/0x3f0
[   20.597504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.597575]  kthread+0x328/0x630
[   20.597613]  ret_from_fork+0x10/0x20
[   20.597651] 
[   20.597674] The buggy address belongs to the object at fff00000c6e72400
[   20.597674]  which belongs to the cache kmalloc-64 of size 64
[   20.597732] The buggy address is located 0 bytes to the right of
[   20.597732]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.597797] 
[   20.597819] The buggy address belongs to the physical page:
[   20.597854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.597907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.597957] page_type: f5(slab)
[   20.597995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.598124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.598205] page dumped because: kasan: bad access detected
[   20.598269] 
[   20.598291] Memory state around the buggy address:
[   20.598355]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.598418]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.598534] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.598621]                                      ^
[   20.599005]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.599091]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.599219] ==================================================================
[   20.514072] ==================================================================
[   20.514307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.514383] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.514434] 
[   20.514553] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.514654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.514708] Hardware name: linux,dummy-virt (DT)
[   20.514756] Call trace:
[   20.514809]  show_stack+0x20/0x38 (C)
[   20.514881]  dump_stack_lvl+0x8c/0xd0
[   20.514933]  print_report+0x118/0x608
[   20.515005]  kasan_report+0xdc/0x128
[   20.515143]  kasan_check_range+0x100/0x1a8
[   20.515282]  __kasan_check_write+0x20/0x30
[   20.515351]  kasan_atomics_helper+0x12d8/0x4858
[   20.515427]  kasan_atomics+0x198/0x2e0
[   20.515486]  kunit_try_run_case+0x170/0x3f0
[   20.515563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.515643]  kthread+0x328/0x630
[   20.515743]  ret_from_fork+0x10/0x20
[   20.515809] 
[   20.515848] Allocated by task 267:
[   20.515886]  kasan_save_stack+0x3c/0x68
[   20.515927]  kasan_save_track+0x20/0x40
[   20.515966]  kasan_save_alloc_info+0x40/0x58
[   20.516006]  __kasan_kmalloc+0xd4/0xd8
[   20.516044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.516247]  kasan_atomics+0xb8/0x2e0
[   20.516393]  kunit_try_run_case+0x170/0x3f0
[   20.516464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.516514]  kthread+0x328/0x630
[   20.516599]  ret_from_fork+0x10/0x20
[   20.516675] 
[   20.516917] The buggy address belongs to the object at fff00000c6e72400
[   20.516917]  which belongs to the cache kmalloc-64 of size 64
[   20.517029] The buggy address is located 0 bytes to the right of
[   20.517029]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.517135] 
[   20.517166] The buggy address belongs to the physical page:
[   20.517209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.517278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.517354] page_type: f5(slab)
[   20.517395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.517614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.517659] page dumped because: kasan: bad access detected
[   20.517695] 
[   20.517717] Memory state around the buggy address:
[   20.517751]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.517796]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.517841] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.517881]                                      ^
[   20.517917]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.518224]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.518299] ==================================================================
[   20.541972] ==================================================================
[   20.542021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.542071] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.542123] 
[   20.542152] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.542236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.542263] Hardware name: linux,dummy-virt (DT)
[   20.542296] Call trace:
[   20.542319]  show_stack+0x20/0x38 (C)
[   20.542429]  dump_stack_lvl+0x8c/0xd0
[   20.542505]  print_report+0x118/0x608
[   20.542582]  kasan_report+0xdc/0x128
[   20.542634]  kasan_check_range+0x100/0x1a8
[   20.542685]  __kasan_check_write+0x20/0x30
[   20.542734]  kasan_atomics_helper+0x154c/0x4858
[   20.542782]  kasan_atomics+0x198/0x2e0
[   20.542828]  kunit_try_run_case+0x170/0x3f0
[   20.542884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.542947]  kthread+0x328/0x630
[   20.542995]  ret_from_fork+0x10/0x20
[   20.543042] 
[   20.543072] Allocated by task 267:
[   20.543101]  kasan_save_stack+0x3c/0x68
[   20.543143]  kasan_save_track+0x20/0x40
[   20.543181]  kasan_save_alloc_info+0x40/0x58
[   20.543222]  __kasan_kmalloc+0xd4/0xd8
[   20.543260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.543307]  kasan_atomics+0xb8/0x2e0
[   20.543363]  kunit_try_run_case+0x170/0x3f0
[   20.543408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.543454]  kthread+0x328/0x630
[   20.543491]  ret_from_fork+0x10/0x20
[   20.543539] 
[   20.543569] The buggy address belongs to the object at fff00000c6e72400
[   20.543569]  which belongs to the cache kmalloc-64 of size 64
[   20.543630] The buggy address is located 0 bytes to the right of
[   20.543630]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.543701] 
[   20.543723] The buggy address belongs to the physical page:
[   20.543756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.543809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.543864] page_type: f5(slab)
[   20.543902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.543955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.543998] page dumped because: kasan: bad access detected
[   20.544031] 
[   20.544052] Memory state around the buggy address:
[   20.544087]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.544133]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.544178] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.544219]                                      ^
[   20.544254]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.544297]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.544347] ==================================================================
[   20.498466] ==================================================================
[   20.498518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.498885] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.498951] 
[   20.499202] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.499315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.499374] Hardware name: linux,dummy-virt (DT)
[   20.499408] Call trace:
[   20.499456]  show_stack+0x20/0x38 (C)
[   20.499684]  dump_stack_lvl+0x8c/0xd0
[   20.499769]  print_report+0x118/0x608
[   20.499846]  kasan_report+0xdc/0x128
[   20.499901]  kasan_check_range+0x100/0x1a8
[   20.499956]  __kasan_check_write+0x20/0x30
[   20.500007]  kasan_atomics_helper+0x1190/0x4858
[   20.500054]  kasan_atomics+0x198/0x2e0
[   20.500272]  kunit_try_run_case+0x170/0x3f0
[   20.500389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.500510]  kthread+0x328/0x630
[   20.500625]  ret_from_fork+0x10/0x20
[   20.500880] 
[   20.500942] Allocated by task 267:
[   20.501002]  kasan_save_stack+0x3c/0x68
[   20.501123]  kasan_save_track+0x20/0x40
[   20.501224]  kasan_save_alloc_info+0x40/0x58
[   20.501365]  __kasan_kmalloc+0xd4/0xd8
[   20.501434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.501517]  kasan_atomics+0xb8/0x2e0
[   20.501627]  kunit_try_run_case+0x170/0x3f0
[   20.501685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.501737]  kthread+0x328/0x630
[   20.501802]  ret_from_fork+0x10/0x20
[   20.501840] 
[   20.501862] The buggy address belongs to the object at fff00000c6e72400
[   20.501862]  which belongs to the cache kmalloc-64 of size 64
[   20.502169] The buggy address is located 0 bytes to the right of
[   20.502169]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.502273] 
[   20.502342] The buggy address belongs to the physical page:
[   20.502414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.502698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.502795] page_type: f5(slab)
[   20.502918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.503021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.503135] page dumped because: kasan: bad access detected
[   20.503171] 
[   20.503193] Memory state around the buggy address:
[   20.503227]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.503284]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.503330] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.503381]                                      ^
[   20.503418]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.503463]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.503514] ==================================================================
[   20.473249] ==================================================================
[   20.473300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.473366] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.473418] 
[   20.473494] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.473597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.473628] Hardware name: linux,dummy-virt (DT)
[   20.473942] Call trace:
[   20.473984]  show_stack+0x20/0x38 (C)
[   20.474055]  dump_stack_lvl+0x8c/0xd0
[   20.474106]  print_report+0x118/0x608
[   20.474152]  kasan_report+0xdc/0x128
[   20.474223]  kasan_check_range+0x100/0x1a8
[   20.474274]  __kasan_check_write+0x20/0x30
[   20.474351]  kasan_atomics_helper+0xf88/0x4858
[   20.474419]  kasan_atomics+0x198/0x2e0
[   20.474493]  kunit_try_run_case+0x170/0x3f0
[   20.474572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.474647]  kthread+0x328/0x630
[   20.474703]  ret_from_fork+0x10/0x20
[   20.474774] 
[   20.474795] Allocated by task 267:
[   20.474827]  kasan_save_stack+0x3c/0x68
[   20.474874]  kasan_save_track+0x20/0x40
[   20.474913]  kasan_save_alloc_info+0x40/0x58
[   20.475055]  __kasan_kmalloc+0xd4/0xd8
[   20.475098]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.475142]  kasan_atomics+0xb8/0x2e0
[   20.475180]  kunit_try_run_case+0x170/0x3f0
[   20.475222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.475380]  kthread+0x328/0x630
[   20.475564]  ret_from_fork+0x10/0x20
[   20.475616] 
[   20.475638] The buggy address belongs to the object at fff00000c6e72400
[   20.475638]  which belongs to the cache kmalloc-64 of size 64
[   20.475699] The buggy address is located 0 bytes to the right of
[   20.475699]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.475764] 
[   20.475798] The buggy address belongs to the physical page:
[   20.475831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.475886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.475938] page_type: f5(slab)
[   20.475977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.476030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.476074] page dumped because: kasan: bad access detected
[   20.476108] 
[   20.476128] Memory state around the buggy address:
[   20.476163]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.476207]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.476252] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.476293]                                      ^
[   20.476698]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.476910]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.477018] ==================================================================
[   20.433151] ==================================================================
[   20.433200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.433369] Write of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.433426] 
[   20.433547] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.433676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.433723] Hardware name: linux,dummy-virt (DT)
[   20.433758] Call trace:
[   20.433809]  show_stack+0x20/0x38 (C)
[   20.433860]  dump_stack_lvl+0x8c/0xd0
[   20.434036]  print_report+0x118/0x608
[   20.434114]  kasan_report+0xdc/0x128
[   20.434190]  kasan_check_range+0x100/0x1a8
[   20.434280]  __kasan_check_write+0x20/0x30
[   20.434353]  kasan_atomics_helper+0xd3c/0x4858
[   20.434421]  kasan_atomics+0x198/0x2e0
[   20.434485]  kunit_try_run_case+0x170/0x3f0
[   20.434536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.434592]  kthread+0x328/0x630
[   20.434638]  ret_from_fork+0x10/0x20
[   20.434686] 
[   20.434706] Allocated by task 267:
[   20.434737]  kasan_save_stack+0x3c/0x68
[   20.434778]  kasan_save_track+0x20/0x40
[   20.434914]  kasan_save_alloc_info+0x40/0x58
[   20.434960]  __kasan_kmalloc+0xd4/0xd8
[   20.435116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.435170]  kasan_atomics+0xb8/0x2e0
[   20.435237]  kunit_try_run_case+0x170/0x3f0
[   20.435403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.435525]  kthread+0x328/0x630
[   20.435571]  ret_from_fork+0x10/0x20
[   20.435649] 
[   20.435710] The buggy address belongs to the object at fff00000c6e72400
[   20.435710]  which belongs to the cache kmalloc-64 of size 64
[   20.435771] The buggy address is located 0 bytes to the right of
[   20.435771]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.435835] 
[   20.435858] The buggy address belongs to the physical page:
[   20.435939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.436013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.436065] page_type: f5(slab)
[   20.436121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.436191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.436240] page dumped because: kasan: bad access detected
[   20.436319] 
[   20.436707] Memory state around the buggy address:
[   20.436774]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.436819]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.436930] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.437005]                                      ^
[   20.437043]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.437227]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.437274] ==================================================================
[   20.482744] ==================================================================
[   20.482797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.482854] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.482905] 
[   20.482936] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.483027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.483055] Hardware name: linux,dummy-virt (DT)
[   20.483088] Call trace:
[   20.483111]  show_stack+0x20/0x38 (C)
[   20.483161]  dump_stack_lvl+0x8c/0xd0
[   20.483209]  print_report+0x118/0x608
[   20.483256]  kasan_report+0xdc/0x128
[   20.483302]  kasan_check_range+0x100/0x1a8
[   20.483364]  __kasan_check_write+0x20/0x30
[   20.483422]  kasan_atomics_helper+0x1058/0x4858
[   20.483470]  kasan_atomics+0x198/0x2e0
[   20.483516]  kunit_try_run_case+0x170/0x3f0
[   20.483567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.483632]  kthread+0x328/0x630
[   20.483680]  ret_from_fork+0x10/0x20
[   20.483738] 
[   20.483759] Allocated by task 267:
[   20.483788]  kasan_save_stack+0x3c/0x68
[   20.483829]  kasan_save_track+0x20/0x40
[   20.483867]  kasan_save_alloc_info+0x40/0x58
[   20.483908]  __kasan_kmalloc+0xd4/0xd8
[   20.483945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.483995]  kasan_atomics+0xb8/0x2e0
[   20.484032]  kunit_try_run_case+0x170/0x3f0
[   20.484075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.484128]  kthread+0x328/0x630
[   20.484166]  ret_from_fork+0x10/0x20
[   20.484803] 
[   20.484875] The buggy address belongs to the object at fff00000c6e72400
[   20.484875]  which belongs to the cache kmalloc-64 of size 64
[   20.485023] The buggy address is located 0 bytes to the right of
[   20.485023]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.485224] 
[   20.485363] The buggy address belongs to the physical page:
[   20.485443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.485518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.485606] page_type: f5(slab)
[   20.485691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.485755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.485817] page dumped because: kasan: bad access detected
[   20.485851] 
[   20.485872] Memory state around the buggy address:
[   20.486017]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.486137]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.486216] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.486326]                                      ^
[   20.486460]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.486547]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.486605] ==================================================================
[   20.582072] ==================================================================
[   20.582120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.582257] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.582420] 
[   20.582476] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.582562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.582608] Hardware name: linux,dummy-virt (DT)
[   20.582658] Call trace:
[   20.582769]  show_stack+0x20/0x38 (C)
[   20.582938]  dump_stack_lvl+0x8c/0xd0
[   20.583001]  print_report+0x118/0x608
[   20.584712]  kasan_report+0xdc/0x128
[   20.584799]  __asan_report_load8_noabort+0x20/0x30
[   20.584854]  kasan_atomics_helper+0x3e20/0x4858
[   20.585372]  kasan_atomics+0x198/0x2e0
[   20.585430]  kunit_try_run_case+0x170/0x3f0
[   20.586167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.587159]  kthread+0x328/0x630
[   20.587231]  ret_from_fork+0x10/0x20
[   20.587283] 
[   20.587326] Allocated by task 267:
[   20.587802]  kasan_save_stack+0x3c/0x68
[   20.587858]  kasan_save_track+0x20/0x40
[   20.589074]  kasan_save_alloc_info+0x40/0x58
[   20.589189]  __kasan_kmalloc+0xd4/0xd8
[   20.589874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.589930]  kasan_atomics+0xb8/0x2e0
[   20.589967]  kunit_try_run_case+0x170/0x3f0
[   20.590008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.590057]  kthread+0x328/0x630
[   20.590096]  ret_from_fork+0x10/0x20
[   20.590133] 
[   20.590157] The buggy address belongs to the object at fff00000c6e72400
[   20.590157]  which belongs to the cache kmalloc-64 of size 64
[   20.590217] The buggy address is located 0 bytes to the right of
[   20.590217]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.591538] 
[   20.591567] The buggy address belongs to the physical page:
[   20.591605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.593027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.593093] page_type: f5(slab)
[   20.593147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.593202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.593564] page dumped because: kasan: bad access detected
[   20.593681] 
[   20.593759] Memory state around the buggy address:
[   20.593898]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.593993]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.594046] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.594099]                                      ^
[   20.594135]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594188]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594231] ==================================================================
[   20.509847] ==================================================================
[   20.509941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.509995] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.510047] 
[   20.510122] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.510224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.510278] Hardware name: linux,dummy-virt (DT)
[   20.510326] Call trace:
[   20.510386]  show_stack+0x20/0x38 (C)
[   20.510442]  dump_stack_lvl+0x8c/0xd0
[   20.510494]  print_report+0x118/0x608
[   20.510540]  kasan_report+0xdc/0x128
[   20.510716]  kasan_check_range+0x100/0x1a8
[   20.510771]  __kasan_check_write+0x20/0x30
[   20.510819]  kasan_atomics_helper+0x126c/0x4858
[   20.510982]  kasan_atomics+0x198/0x2e0
[   20.511047]  kunit_try_run_case+0x170/0x3f0
[   20.511120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.511200]  kthread+0x328/0x630
[   20.511444]  ret_from_fork+0x10/0x20
[   20.511511] 
[   20.511563] Allocated by task 267:
[   20.511600]  kasan_save_stack+0x3c/0x68
[   20.511658]  kasan_save_track+0x20/0x40
[   20.511713]  kasan_save_alloc_info+0x40/0x58
[   20.511781]  __kasan_kmalloc+0xd4/0xd8
[   20.511847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.511910]  kasan_atomics+0xb8/0x2e0
[   20.511962]  kunit_try_run_case+0x170/0x3f0
[   20.512009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.512074]  kthread+0x328/0x630
[   20.512136]  ret_from_fork+0x10/0x20
[   20.512175] 
[   20.512198] The buggy address belongs to the object at fff00000c6e72400
[   20.512198]  which belongs to the cache kmalloc-64 of size 64
[   20.512268] The buggy address is located 0 bytes to the right of
[   20.512268]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.512481] 
[   20.512574] The buggy address belongs to the physical page:
[   20.512642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.512710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.512768] page_type: f5(slab)
[   20.512809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.512862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.512905] page dumped because: kasan: bad access detected
[   20.512939] 
[   20.512982] Memory state around the buggy address:
[   20.513016]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.513062]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.513293] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.513349]                                      ^
[   20.513386]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.513429]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.513468] ==================================================================
[   20.446721] ==================================================================
[   20.446789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.446847] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.446898] 
[   20.447089] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.447200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.447242] Hardware name: linux,dummy-virt (DT)
[   20.447281] Call trace:
[   20.447306]  show_stack+0x20/0x38 (C)
[   20.447394]  dump_stack_lvl+0x8c/0xd0
[   20.447471]  print_report+0x118/0x608
[   20.447521]  kasan_report+0xdc/0x128
[   20.447586]  __asan_report_load8_noabort+0x20/0x30
[   20.447641]  kasan_atomics_helper+0x3f58/0x4858
[   20.447689]  kasan_atomics+0x198/0x2e0
[   20.447756]  kunit_try_run_case+0x170/0x3f0
[   20.447813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.447871]  kthread+0x328/0x630
[   20.447917]  ret_from_fork+0x10/0x20
[   20.448098] 
[   20.448139] Allocated by task 267:
[   20.448187]  kasan_save_stack+0x3c/0x68
[   20.448329]  kasan_save_track+0x20/0x40
[   20.448409]  kasan_save_alloc_info+0x40/0x58
[   20.448452]  __kasan_kmalloc+0xd4/0xd8
[   20.448488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.448661]  kasan_atomics+0xb8/0x2e0
[   20.448734]  kunit_try_run_case+0x170/0x3f0
[   20.448812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.448876]  kthread+0x328/0x630
[   20.448916]  ret_from_fork+0x10/0x20
[   20.448954] 
[   20.448975] The buggy address belongs to the object at fff00000c6e72400
[   20.448975]  which belongs to the cache kmalloc-64 of size 64
[   20.449035] The buggy address is located 0 bytes to the right of
[   20.449035]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.449101] 
[   20.449145] The buggy address belongs to the physical page:
[   20.449193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.449249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.449620] page_type: f5(slab)
[   20.449669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.449723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.449766] page dumped because: kasan: bad access detected
[   20.449800] 
[   20.449820] Memory state around the buggy address:
[   20.449854]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.449900]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.450188] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.450273]                                      ^
[   20.450371]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.450451]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.450727] ==================================================================
[   20.437838] ==================================================================
[   20.437919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.438205] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.438289] 
[   20.438323] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.438456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.438505] Hardware name: linux,dummy-virt (DT)
[   20.438538] Call trace:
[   20.438562]  show_stack+0x20/0x38 (C)
[   20.438629]  dump_stack_lvl+0x8c/0xd0
[   20.438680]  print_report+0x118/0x608
[   20.438748]  kasan_report+0xdc/0x128
[   20.438824]  __asan_report_load4_noabort+0x20/0x30
[   20.438893]  kasan_atomics_helper+0x3e04/0x4858
[   20.438960]  kasan_atomics+0x198/0x2e0
[   20.439007]  kunit_try_run_case+0x170/0x3f0
[   20.439058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.439112]  kthread+0x328/0x630
[   20.439162]  ret_from_fork+0x10/0x20
[   20.439383] 
[   20.439444] Allocated by task 267:
[   20.439479]  kasan_save_stack+0x3c/0x68
[   20.439557]  kasan_save_track+0x20/0x40
[   20.439614]  kasan_save_alloc_info+0x40/0x58
[   20.439655]  __kasan_kmalloc+0xd4/0xd8
[   20.439692]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.439885]  kasan_atomics+0xb8/0x2e0
[   20.439994]  kunit_try_run_case+0x170/0x3f0
[   20.440060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.440125]  kthread+0x328/0x630
[   20.440183]  ret_from_fork+0x10/0x20
[   20.440259] 
[   20.440379] The buggy address belongs to the object at fff00000c6e72400
[   20.440379]  which belongs to the cache kmalloc-64 of size 64
[   20.440485] The buggy address is located 0 bytes to the right of
[   20.440485]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.440574] 
[   20.440643] The buggy address belongs to the physical page:
[   20.440713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.440775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.440864] page_type: f5(slab)
[   20.440969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.441021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.441064] page dumped because: kasan: bad access detected
[   20.441105] 
[   20.441125] Memory state around the buggy address:
[   20.441159]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.441206]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.441250] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.441291]                                      ^
[   20.441325]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.441380]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.441609] ==================================================================
[   20.556962] ==================================================================
[   20.557015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.557090] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.557227] 
[   20.557383] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.557512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.557561] Hardware name: linux,dummy-virt (DT)
[   20.557609] Call trace:
[   20.557635]  show_stack+0x20/0x38 (C)
[   20.557692]  dump_stack_lvl+0x8c/0xd0
[   20.557763]  print_report+0x118/0x608
[   20.557828]  kasan_report+0xdc/0x128
[   20.557894]  kasan_check_range+0x100/0x1a8
[   20.557954]  __kasan_check_write+0x20/0x30
[   20.558020]  kasan_atomics_helper+0x1644/0x4858
[   20.558095]  kasan_atomics+0x198/0x2e0
[   20.558142]  kunit_try_run_case+0x170/0x3f0
[   20.558195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.558252]  kthread+0x328/0x630
[   20.558300]  ret_from_fork+0x10/0x20
[   20.558362] 
[   20.558383] Allocated by task 267:
[   20.558414]  kasan_save_stack+0x3c/0x68
[   20.558663]  kasan_save_track+0x20/0x40
[   20.558758]  kasan_save_alloc_info+0x40/0x58
[   20.558878]  __kasan_kmalloc+0xd4/0xd8
[   20.558954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.559201]  kasan_atomics+0xb8/0x2e0
[   20.559267]  kunit_try_run_case+0x170/0x3f0
[   20.559357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.559409]  kthread+0x328/0x630
[   20.559447]  ret_from_fork+0x10/0x20
[   20.559503] 
[   20.559573] The buggy address belongs to the object at fff00000c6e72400
[   20.559573]  which belongs to the cache kmalloc-64 of size 64
[   20.559645] The buggy address is located 0 bytes to the right of
[   20.559645]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.559758] 
[   20.559843] The buggy address belongs to the physical page:
[   20.559931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.559987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.560036] page_type: f5(slab)
[   20.560293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.560377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.560472] page dumped because: kasan: bad access detected
[   20.560541] 
[   20.560620] Memory state around the buggy address:
[   20.560656]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.560702]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.560747] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.560797]                                      ^
[   20.560834]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.560888]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.560936] ==================================================================
[   20.528807] ==================================================================
[   20.528861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.528917] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.528969] 
[   20.529019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.529121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.529167] Hardware name: linux,dummy-virt (DT)
[   20.529205] Call trace:
[   20.529232]  show_stack+0x20/0x38 (C)
[   20.529371]  dump_stack_lvl+0x8c/0xd0
[   20.529430]  print_report+0x118/0x608
[   20.529476]  kasan_report+0xdc/0x128
[   20.529655]  kasan_check_range+0x100/0x1a8
[   20.529752]  __kasan_check_write+0x20/0x30
[   20.529819]  kasan_atomics_helper+0x1414/0x4858
[   20.529875]  kasan_atomics+0x198/0x2e0
[   20.529939]  kunit_try_run_case+0x170/0x3f0
[   20.530007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.530064]  kthread+0x328/0x630
[   20.530110]  ret_from_fork+0x10/0x20
[   20.530160] 
[   20.530180] Allocated by task 267:
[   20.530211]  kasan_save_stack+0x3c/0x68
[   20.530294]  kasan_save_track+0x20/0x40
[   20.530347]  kasan_save_alloc_info+0x40/0x58
[   20.530387]  __kasan_kmalloc+0xd4/0xd8
[   20.530427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.530469]  kasan_atomics+0xb8/0x2e0
[   20.530601]  kunit_try_run_case+0x170/0x3f0
[   20.530657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.530706]  kthread+0x328/0x630
[   20.530743]  ret_from_fork+0x10/0x20
[   20.530799] 
[   20.530823] The buggy address belongs to the object at fff00000c6e72400
[   20.530823]  which belongs to the cache kmalloc-64 of size 64
[   20.530904] The buggy address is located 0 bytes to the right of
[   20.530904]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.530987] 
[   20.531196] The buggy address belongs to the physical page:
[   20.531265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.531377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.531434] page_type: f5(slab)
[   20.531490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.531585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.531630] page dumped because: kasan: bad access detected
[   20.531664] 
[   20.531685] Memory state around the buggy address:
[   20.531719]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.531796]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.531840] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.531887]                                      ^
[   20.531931]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.531974]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.532013] ==================================================================
[   20.571463] ==================================================================
[   20.571675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.571741] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.571795] 
[   20.572052] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.572159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.572222] Hardware name: linux,dummy-virt (DT)
[   20.572429] Call trace:
[   20.572508]  show_stack+0x20/0x38 (C)
[   20.572603]  dump_stack_lvl+0x8c/0xd0
[   20.572694]  print_report+0x118/0x608
[   20.572780]  kasan_report+0xdc/0x128
[   20.572870]  __asan_report_load8_noabort+0x20/0x30
[   20.572970]  kasan_atomics_helper+0x3e10/0x4858
[   20.573058]  kasan_atomics+0x198/0x2e0
[   20.573165]  kunit_try_run_case+0x170/0x3f0
[   20.573218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.573275]  kthread+0x328/0x630
[   20.573322]  ret_from_fork+0x10/0x20
[   20.573384] 
[   20.573713] Allocated by task 267:
[   20.573800]  kasan_save_stack+0x3c/0x68
[   20.573888]  kasan_save_track+0x20/0x40
[   20.573964]  kasan_save_alloc_info+0x40/0x58
[   20.574045]  __kasan_kmalloc+0xd4/0xd8
[   20.574287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.574418]  kasan_atomics+0xb8/0x2e0
[   20.574486]  kunit_try_run_case+0x170/0x3f0
[   20.574563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574642]  kthread+0x328/0x630
[   20.574728]  ret_from_fork+0x10/0x20
[   20.574818] 
[   20.574871] The buggy address belongs to the object at fff00000c6e72400
[   20.574871]  which belongs to the cache kmalloc-64 of size 64
[   20.574961] The buggy address is located 0 bytes to the right of
[   20.574961]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.575028] 
[   20.575235] The buggy address belongs to the physical page:
[   20.575279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.575408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.575506] page_type: f5(slab)
[   20.575581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.575662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.575866] page dumped because: kasan: bad access detected
[   20.575965] 
[   20.576047] Memory state around the buggy address:
[   20.576113]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.576160]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.576213] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.576481]                                      ^
[   20.576550]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.576615]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.576697] ==================================================================
[   20.519234] ==================================================================
[   20.519288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.519454] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.519549] 
[   20.519595] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.519709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.519801] Hardware name: linux,dummy-virt (DT)
[   20.519833] Call trace:
[   20.519859]  show_stack+0x20/0x38 (C)
[   20.519908]  dump_stack_lvl+0x8c/0xd0
[   20.519959]  print_report+0x118/0x608
[   20.520005]  kasan_report+0xdc/0x128
[   20.520285]  kasan_check_range+0x100/0x1a8
[   20.520443]  __kasan_check_write+0x20/0x30
[   20.520539]  kasan_atomics_helper+0x1384/0x4858
[   20.520784]  kasan_atomics+0x198/0x2e0
[   20.520851]  kunit_try_run_case+0x170/0x3f0
[   20.520924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.520980]  kthread+0x328/0x630
[   20.521028]  ret_from_fork+0x10/0x20
[   20.521078] 
[   20.521099] Allocated by task 267:
[   20.521130]  kasan_save_stack+0x3c/0x68
[   20.521308]  kasan_save_track+0x20/0x40
[   20.521363]  kasan_save_alloc_info+0x40/0x58
[   20.521403]  __kasan_kmalloc+0xd4/0xd8
[   20.521568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.521675]  kasan_atomics+0xb8/0x2e0
[   20.521752]  kunit_try_run_case+0x170/0x3f0
[   20.521840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.521941]  kthread+0x328/0x630
[   20.521980]  ret_from_fork+0x10/0x20
[   20.522149] 
[   20.522223] The buggy address belongs to the object at fff00000c6e72400
[   20.522223]  which belongs to the cache kmalloc-64 of size 64
[   20.522319] The buggy address is located 0 bytes to the right of
[   20.522319]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.522424] 
[   20.522492] The buggy address belongs to the physical page:
[   20.522556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.522640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.522761] page_type: f5(slab)
[   20.522842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.522897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.522941] page dumped because: kasan: bad access detected
[   20.522974] 
[   20.522995] Memory state around the buggy address:
[   20.523253]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.523311]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.523388] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.523466]                                      ^
[   20.523616]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.523837]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.523919] ==================================================================
[   20.532306] ==================================================================
[   20.532377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.532482] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.532571] 
[   20.532638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.532869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.532963] Hardware name: linux,dummy-virt (DT)
[   20.533028] Call trace:
[   20.533083]  show_stack+0x20/0x38 (C)
[   20.533165]  dump_stack_lvl+0x8c/0xd0
[   20.533250]  print_report+0x118/0x608
[   20.533364]  kasan_report+0xdc/0x128
[   20.533461]  kasan_check_range+0x100/0x1a8
[   20.533523]  __kasan_check_write+0x20/0x30
[   20.533573]  kasan_atomics_helper+0x147c/0x4858
[   20.533620]  kasan_atomics+0x198/0x2e0
[   20.533909]  kunit_try_run_case+0x170/0x3f0
[   20.534051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.534156]  kthread+0x328/0x630
[   20.534496]  ret_from_fork+0x10/0x20
[   20.534605] 
[   20.534681] Allocated by task 267:
[   20.534758]  kasan_save_stack+0x3c/0x68
[   20.534831]  kasan_save_track+0x20/0x40
[   20.534948]  kasan_save_alloc_info+0x40/0x58
[   20.535001]  __kasan_kmalloc+0xd4/0xd8
[   20.535038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.535291]  kasan_atomics+0xb8/0x2e0
[   20.535386]  kunit_try_run_case+0x170/0x3f0
[   20.535442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.535488]  kthread+0x328/0x630
[   20.535526]  ret_from_fork+0x10/0x20
[   20.535574] 
[   20.535605] The buggy address belongs to the object at fff00000c6e72400
[   20.535605]  which belongs to the cache kmalloc-64 of size 64
[   20.535681] The buggy address is located 0 bytes to the right of
[   20.535681]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.535747] 
[   20.535784] The buggy address belongs to the physical page:
[   20.535816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.535878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.535926] page_type: f5(slab)
[   20.535964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.536017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.536061] page dumped because: kasan: bad access detected
[   20.536094] 
[   20.536137] Memory state around the buggy address:
[   20.536181]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.536629]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.536717] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.536801]                                      ^
[   20.536858]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.536901]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.536941] ==================================================================
[   20.462558] ==================================================================
[   20.462608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.462675] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.462729] 
[   20.462759] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.462865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.462893] Hardware name: linux,dummy-virt (DT)
[   20.462926] Call trace:
[   20.462949]  show_stack+0x20/0x38 (C)
[   20.462999]  dump_stack_lvl+0x8c/0xd0
[   20.463047]  print_report+0x118/0x608
[   20.463094]  kasan_report+0xdc/0x128
[   20.463149]  kasan_check_range+0x100/0x1a8
[   20.463208]  __kasan_check_write+0x20/0x30
[   20.463261]  kasan_atomics_helper+0xeb8/0x4858
[   20.463317]  kasan_atomics+0x198/0x2e0
[   20.463672]  kunit_try_run_case+0x170/0x3f0
[   20.463744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.463868]  kthread+0x328/0x630
[   20.463934]  ret_from_fork+0x10/0x20
[   20.464000] 
[   20.464035] Allocated by task 267:
[   20.464070]  kasan_save_stack+0x3c/0x68
[   20.464113]  kasan_save_track+0x20/0x40
[   20.464151]  kasan_save_alloc_info+0x40/0x58
[   20.464382]  __kasan_kmalloc+0xd4/0xd8
[   20.464501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.464567]  kasan_atomics+0xb8/0x2e0
[   20.464662]  kunit_try_run_case+0x170/0x3f0
[   20.464725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.464995]  kthread+0x328/0x630
[   20.465065]  ret_from_fork+0x10/0x20
[   20.465144] 
[   20.465235] The buggy address belongs to the object at fff00000c6e72400
[   20.465235]  which belongs to the cache kmalloc-64 of size 64
[   20.465330] The buggy address is located 0 bytes to the right of
[   20.465330]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.465473] 
[   20.465581] The buggy address belongs to the physical page:
[   20.465650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.465733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.465784] page_type: f5(slab)
[   20.465824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.465877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.465919] page dumped because: kasan: bad access detected
[   20.465954] 
[   20.465974] Memory state around the buggy address:
[   20.466007]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.466053]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.466098] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.466377]                                      ^
[   20.466474]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.466632]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.466701] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   20.011088] ==================================================================
[   20.011279] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   20.011379] Read of size 1 at addr fff00000c6e54a50 by task kunit_try_catch/261
[   20.011485] 
[   20.011521] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.011612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.011641] Hardware name: linux,dummy-virt (DT)
[   20.011675] Call trace:
[   20.011822]  show_stack+0x20/0x38 (C)
[   20.012048]  dump_stack_lvl+0x8c/0xd0
[   20.012235]  print_report+0x118/0x608
[   20.012328]  kasan_report+0xdc/0x128
[   20.012526]  __asan_report_load1_noabort+0x20/0x30
[   20.012582]  strcmp+0xc0/0xc8
[   20.012931]  kasan_strings+0x340/0xb00
[   20.013026]  kunit_try_run_case+0x170/0x3f0
[   20.013101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.013344]  kthread+0x328/0x630
[   20.013586]  ret_from_fork+0x10/0x20
[   20.013769] 
[   20.013854] Allocated by task 261:
[   20.013942]  kasan_save_stack+0x3c/0x68
[   20.014363]  kasan_save_track+0x20/0x40
[   20.014457]  kasan_save_alloc_info+0x40/0x58
[   20.014600]  __kasan_kmalloc+0xd4/0xd8
[   20.014688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.014811]  kasan_strings+0xc8/0xb00
[   20.014883]  kunit_try_run_case+0x170/0x3f0
[   20.014972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.015161]  kthread+0x328/0x630
[   20.015387]  ret_from_fork+0x10/0x20
[   20.015540] 
[   20.015592] Freed by task 261:
[   20.015706]  kasan_save_stack+0x3c/0x68
[   20.015786]  kasan_save_track+0x20/0x40
[   20.016006]  kasan_save_free_info+0x4c/0x78
[   20.016222]  __kasan_slab_free+0x6c/0x98
[   20.016302]  kfree+0x214/0x3c8
[   20.016705]  kasan_strings+0x24c/0xb00
[   20.016793]  kunit_try_run_case+0x170/0x3f0
[   20.017172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.017303]  kthread+0x328/0x630
[   20.017438]  ret_from_fork+0x10/0x20
[   20.017488] 
[   20.017510] The buggy address belongs to the object at fff00000c6e54a40
[   20.017510]  which belongs to the cache kmalloc-32 of size 32
[   20.017763] The buggy address is located 16 bytes inside of
[   20.017763]  freed 32-byte region [fff00000c6e54a40, fff00000c6e54a60)
[   20.017969] 
[   20.018068] The buggy address belongs to the physical page:
[   20.018284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54
[   20.018553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.018845] page_type: f5(slab)
[   20.018900] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.019200] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.019514] page dumped because: kasan: bad access detected
[   20.020327]  fff00000c6e54b00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.022861]  print_report+0x118/0x608
[   20.024175]  kthread+0x328/0x630
[   20.025000]  __kasan_kmalloc+0xd4/0xd8
[   20.025803]  kthread+0x328/0x630
[   20.026474]  kasan_save_free_info+0x4c/0x78
[   20.026943] The buggy address is located 16 bytes inside of
[   20.026943]  freed 32-byte region [fff00000c6e54a40, fff00000c6e54a60)
[   20.027574] >fff00000c6e54a00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.029974] 
[   20.030011] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.031669]  kunit_try_run_case+0x170/0x3f0
[   20.032935]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.033657]  ret_from_fork+0x10/0x20
[   20.036100] 
[   20.036344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54
[   20.037877] >fff00000c6e54a00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.040147] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   20.041816]  kasan_report+0xdc/0x128
[   20.043407] 
[   20.043789]  __kasan_kmalloc+0xd4/0xd8
[   20.044557]  kthread+0x328/0x630
[   20.044864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54
[   20.045168] 
[   20.045222]  fff00000c6e54900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.045324] >fff00000c6e54a00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.053257]     not ok 62 kasan_strings
[   20.058355] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   19.987999] ==================================================================
[   19.988061] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   19.988121] Read of size 1 at addr fff00000c6e54858 by task kunit_try_catch/259
[   19.988550] 
[   19.988617] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.988753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.988848] Hardware name: linux,dummy-virt (DT)
[   19.988894] Call trace:
[   19.988918]  show_stack+0x20/0x38 (C)
[   19.988977]  dump_stack_lvl+0x8c/0xd0
[   19.989029]  print_report+0x118/0x608
[   19.989197]  kasan_report+0xdc/0x128
[   19.989423]  __asan_report_load1_noabort+0x20/0x30
[   19.989616]  memcmp+0x198/0x1d8
[   19.989714]  kasan_memcmp+0x16c/0x300
[   19.990014]  kunit_try_run_case+0x170/0x3f0
[   19.990188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.990313]  kthread+0x328/0x630
[   19.990500]  ret_from_fork+0x10/0x20
[   19.990662] 
[   19.990685] Allocated by task 259:
[   19.991044]  kasan_save_stack+0x3c/0x68
[   19.991128]  kasan_save_track+0x20/0x40
[   19.991261]  kasan_save_alloc_info+0x40/0x58
[   19.991318]  __kasan_kmalloc+0xd4/0xd8
[   19.991386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.991431]  kasan_memcmp+0xbc/0x300
[   19.991470]  kunit_try_run_case+0x170/0x3f0
[   19.991561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.991615]  kthread+0x328/0x630
[   19.991670]  ret_from_fork+0x10/0x20
[   19.991708] 
[   19.991752] The buggy address belongs to the object at fff00000c6e54840
[   19.991752]  which belongs to the cache kmalloc-32 of size 32
[   19.991813] The buggy address is located 0 bytes to the right of
[   19.991813]  allocated 24-byte region [fff00000c6e54840, fff00000c6e54858)
[   19.991890] 
[   19.991914] The buggy address belongs to the physical page:
[   19.991948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e54
[   19.992021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.992075] page_type: f5(slab)
[   19.992115] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.992169] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.992347] page dumped because: kasan: bad access detected
[   19.992775] 
[   19.992862] Memory state around the buggy address:
[   19.992942]  fff00000c6e54700: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.993543]  fff00000c6e54780: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   19.993844] >fff00000c6e54800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.993922]                                                     ^
[   19.993979]  fff00000c6e54880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.994040]  fff00000c6e54900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.994107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   19.966531] ==================================================================
[   19.966592] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   19.966650] Read of size 1 at addr ffff8000809a7b4a by task kunit_try_catch/255
[   19.966712] 
[   19.966745] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.966844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.966883] Hardware name: linux,dummy-virt (DT)
[   19.966916] Call trace:
[   19.966940]  show_stack+0x20/0x38 (C)
[   19.966991]  dump_stack_lvl+0x8c/0xd0
[   19.967042]  print_report+0x310/0x608
[   19.967090]  kasan_report+0xdc/0x128
[   19.967136]  __asan_report_load1_noabort+0x20/0x30
[   19.967194]  kasan_alloca_oob_right+0x2dc/0x340
[   19.967248]  kunit_try_run_case+0x170/0x3f0
[   19.967297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.967374]  kthread+0x328/0x630
[   19.967421]  ret_from_fork+0x10/0x20
[   19.967478] 
[   19.967503] The buggy address belongs to stack of task kunit_try_catch/255
[   19.967559] 
[   19.967584] The buggy address belongs to the virtual mapping at
[   19.967584]  [ffff8000809a0000, ffff8000809a9000) created by:
[   19.967584]  kernel_clone+0x150/0x7a8
[   19.967664] 
[   19.967695] The buggy address belongs to the physical page:
[   19.967729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   19.967790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.967855] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.967905] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.967947] page dumped because: kasan: bad access detected
[   19.967980] 
[   19.968002] Memory state around the buggy address:
[   19.968035]  ffff8000809a7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.968079]  ffff8000809a7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.968125] >ffff8000809a7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   19.968166]                                               ^
[   19.969121]  ffff8000809a7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   19.969218]  ffff8000809a7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.969262] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   19.950495] ==================================================================
[   19.950576] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   19.950647] Read of size 1 at addr ffff8000808f7b5f by task kunit_try_catch/253
[   19.950701] 
[   19.950824] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.951019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.951082] Hardware name: linux,dummy-virt (DT)
[   19.951117] Call trace:
[   19.951146]  show_stack+0x20/0x38 (C)
[   19.951227]  dump_stack_lvl+0x8c/0xd0
[   19.951299]  print_report+0x310/0x608
[   19.951362]  kasan_report+0xdc/0x128
[   19.951434]  __asan_report_load1_noabort+0x20/0x30
[   19.951508]  kasan_alloca_oob_left+0x2b8/0x310
[   19.951562]  kunit_try_run_case+0x170/0x3f0
[   19.951614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.951687]  kthread+0x328/0x630
[   19.951741]  ret_from_fork+0x10/0x20
[   19.951792] 
[   19.951925] The buggy address belongs to stack of task kunit_try_catch/253
[   19.952002] 
[   19.952118] The buggy address belongs to the virtual mapping at
[   19.952118]  [ffff8000808f0000, ffff8000808f9000) created by:
[   19.952118]  kernel_clone+0x150/0x7a8
[   19.952240] 
[   19.952287] The buggy address belongs to the physical page:
[   19.952351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a8
[   19.952727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.952914] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.953021] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.953082] page dumped because: kasan: bad access detected
[   19.953117] 
[   19.953162] Memory state around the buggy address:
[   19.953195]  ffff8000808f7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.953240]  ffff8000808f7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.953419] >ffff8000808f7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   19.953631]                                                     ^
[   19.953750]  ffff8000808f7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   19.953836]  ffff8000808f7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.953951] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   19.938670] ==================================================================
[   19.938781] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   19.938866] Read of size 1 at addr ffff8000809a7c2a by task kunit_try_catch/251
[   19.938955] 
[   19.938995] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.939094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.939121] Hardware name: linux,dummy-virt (DT)
[   19.939169] Call trace:
[   19.939214]  show_stack+0x20/0x38 (C)
[   19.939266]  dump_stack_lvl+0x8c/0xd0
[   19.939381]  print_report+0x310/0x608
[   19.939429]  kasan_report+0xdc/0x128
[   19.939490]  __asan_report_load1_noabort+0x20/0x30
[   19.939541]  kasan_stack_oob+0x238/0x270
[   19.939587]  kunit_try_run_case+0x170/0x3f0
[   19.939798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.939868]  kthread+0x328/0x630
[   19.939915]  ret_from_fork+0x10/0x20
[   19.939980] 
[   19.940063] The buggy address belongs to stack of task kunit_try_catch/251
[   19.940171]  and is located at offset 138 in frame:
[   19.940240]  kasan_stack_oob+0x0/0x270
[   19.940566] 
[   19.940646] This frame has 4 objects:
[   19.940750]  [48, 49) '__assertion'
[   19.940785]  [64, 72) 'array'
[   19.940817]  [96, 112) '__assertion'
[   19.940992]  [128, 138) 'stack_array'
[   19.941054] 
[   19.941087] The buggy address belongs to the virtual mapping at
[   19.941087]  [ffff8000809a0000, ffff8000809a9000) created by:
[   19.941087]  kernel_clone+0x150/0x7a8
[   19.941217] 
[   19.941343] The buggy address belongs to the physical page:
[   19.941422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   19.941493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.941582] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.941669] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.941787] page dumped because: kasan: bad access detected
[   19.941864] 
[   19.941912] Memory state around the buggy address:
[   19.941946]  ffff8000809a7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.942584]  ffff8000809a7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   19.942815] >ffff8000809a7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   19.942962]                                   ^
[   19.943057]  ffff8000809a7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   19.943153]  ffff8000809a7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.943211] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   19.925764] ==================================================================
[   19.925840] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   19.925905] Read of size 1 at addr ffffaee417e035ad by task kunit_try_catch/247
[   19.925972] 
[   19.926047] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.926141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.926189] Hardware name: linux,dummy-virt (DT)
[   19.926220] Call trace:
[   19.926241]  show_stack+0x20/0x38 (C)
[   19.926466]  dump_stack_lvl+0x8c/0xd0
[   19.926532]  print_report+0x310/0x608
[   19.926580]  kasan_report+0xdc/0x128
[   19.926651]  __asan_report_load1_noabort+0x20/0x30
[   19.926708]  kasan_global_oob_right+0x230/0x270
[   19.926792]  kunit_try_run_case+0x170/0x3f0
[   19.926850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.926904]  kthread+0x328/0x630
[   19.926968]  ret_from_fork+0x10/0x20
[   19.927029] 
[   19.927080] The buggy address belongs to the variable:
[   19.927313]  global_array+0xd/0x40
[   19.927447] 
[   19.927527] The buggy address belongs to the virtual mapping at
[   19.927527]  [ffffaee416020000, ffffaee417ec1000) created by:
[   19.927527]  paging_init+0x66c/0x7d0
[   19.927639] 
[   19.927903] The buggy address belongs to the physical page:
[   19.927995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03
[   19.928069] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   19.928152] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000
[   19.928224] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.928290] page dumped because: kasan: bad access detected
[   19.928372] 
[   19.928393] Memory state around the buggy address:
[   19.928424]  ffffaee417e03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.928469]  ffffaee417e03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   19.928511] >ffffaee417e03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   19.928549]                                   ^
[   19.928582]  ffffaee417e03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   19.928911]  ffffaee417e03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   19.928976] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   19.906264] ==================================================================
[   19.906351] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.906409] Free of addr fff00000c6e6c501 by task kunit_try_catch/243
[   19.906451] 
[   19.906481] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.906561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.906589] Hardware name: linux,dummy-virt (DT)
[   19.906620] Call trace:
[   19.906641]  show_stack+0x20/0x38 (C)
[   19.906689]  dump_stack_lvl+0x8c/0xd0
[   19.906738]  print_report+0x118/0x608
[   19.906785]  kasan_report_invalid_free+0xc0/0xe8
[   19.906831]  check_slab_allocation+0xfc/0x108
[   19.906886]  __kasan_mempool_poison_object+0x78/0x150
[   19.906935]  mempool_free+0x28c/0x328
[   19.906981]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.907052]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.907103]  kunit_try_run_case+0x170/0x3f0
[   19.907152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.907204]  kthread+0x328/0x630
[   19.907250]  ret_from_fork+0x10/0x20
[   19.907296] 
[   19.907314] Allocated by task 243:
[   19.907859]  kasan_save_stack+0x3c/0x68
[   19.907920]  kasan_save_track+0x20/0x40
[   19.907958]  kasan_save_alloc_info+0x40/0x58
[   19.908151]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.908205]  remove_element+0x130/0x1f8
[   19.908245]  mempool_alloc_preallocated+0x58/0xc0
[   19.908300]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   19.908434]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.908478]  kunit_try_run_case+0x170/0x3f0
[   19.908518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.908585]  kthread+0x328/0x630
[   19.908635]  ret_from_fork+0x10/0x20
[   19.908671] 
[   19.908692] The buggy address belongs to the object at fff00000c6e6c500
[   19.908692]  which belongs to the cache kmalloc-128 of size 128
[   19.908751] The buggy address is located 1 bytes inside of
[   19.908751]  128-byte region [fff00000c6e6c500, fff00000c6e6c580)
[   19.908853] 
[   19.908874] The buggy address belongs to the physical page:
[   19.908908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   19.908962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.909010] page_type: f5(slab)
[   19.909051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.909218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.909343] page dumped because: kasan: bad access detected
[   19.909424] 
[   19.909533] Memory state around the buggy address:
[   19.909600]  fff00000c6e6c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.909763]  fff00000c6e6c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.909836] >fff00000c6e6c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.909881]                    ^
[   19.909908]  fff00000c6e6c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.910010]  fff00000c6e6c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.910087] ==================================================================
[   19.915818] ==================================================================
[   19.915923] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.915991] Free of addr fff00000c78e4001 by task kunit_try_catch/245
[   19.916034] 
[   19.916195] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.916346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.916421] Hardware name: linux,dummy-virt (DT)
[   19.916508] Call trace:
[   19.916568]  show_stack+0x20/0x38 (C)
[   19.916684]  dump_stack_lvl+0x8c/0xd0
[   19.916774]  print_report+0x118/0x608
[   19.916838]  kasan_report_invalid_free+0xc0/0xe8
[   19.916964]  __kasan_mempool_poison_object+0xfc/0x150
[   19.917052]  mempool_free+0x28c/0x328
[   19.917197]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.917273]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   19.917383]  kunit_try_run_case+0x170/0x3f0
[   19.917482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.917540]  kthread+0x328/0x630
[   19.917592]  ret_from_fork+0x10/0x20
[   19.917641] 
[   19.917665] The buggy address belongs to the physical page:
[   19.917738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4
[   19.917795] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.918006] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.918119] page_type: f8(unknown)
[   19.918187] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.918287] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.918401] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.918468] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.918724] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff
[   19.918790] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.918907] page dumped because: kasan: bad access detected
[   19.918986] 
[   19.919045] Memory state around the buggy address:
[   19.919125]  fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.919198]  fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.919272] >fff00000c78e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.919310]                    ^
[   19.919372]  fff00000c78e4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.919668]  fff00000c78e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.919754] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   19.898711] ==================================================================
[   19.898765] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.898839] Free of addr fff00000c78e4000 by task kunit_try_catch/241
[   19.899046] 
[   19.899084] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.899276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.899368] Hardware name: linux,dummy-virt (DT)
[   19.899409] Call trace:
[   19.899448]  show_stack+0x20/0x38 (C)
[   19.899512]  dump_stack_lvl+0x8c/0xd0
[   19.899564]  print_report+0x118/0x608
[   19.899618]  kasan_report_invalid_free+0xc0/0xe8
[   19.899671]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.899721]  mempool_free+0x24c/0x328
[   19.899770]  mempool_double_free_helper+0x150/0x2e8
[   19.899822]  mempool_page_alloc_double_free+0xbc/0x118
[   19.899871]  kunit_try_run_case+0x170/0x3f0
[   19.899920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899973]  kthread+0x328/0x630
[   19.900193]  ret_from_fork+0x10/0x20
[   19.900322] 
[   19.900391] The buggy address belongs to the physical page:
[   19.900423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4
[   19.900479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.900787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.900900] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.900954] page dumped because: kasan: bad access detected
[   19.900985] 
[   19.901018] Memory state around the buggy address:
[   19.901056]  fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901099]  fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901141] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901178]                    ^
[   19.901205]  fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901246]  fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.901285] ==================================================================
[   19.875830] ==================================================================
[   19.875886] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.875940] Free of addr fff00000c6e6c100 by task kunit_try_catch/237
[   19.875983] 
[   19.876014] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.876095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876123] Hardware name: linux,dummy-virt (DT)
[   19.876152] Call trace:
[   19.876382]  show_stack+0x20/0x38 (C)
[   19.876540]  dump_stack_lvl+0x8c/0xd0
[   19.876619]  print_report+0x118/0x608
[   19.876743]  kasan_report_invalid_free+0xc0/0xe8
[   19.876830]  check_slab_allocation+0xd4/0x108
[   19.876904]  __kasan_mempool_poison_object+0x78/0x150
[   19.876957]  mempool_free+0x28c/0x328
[   19.877032]  mempool_double_free_helper+0x150/0x2e8
[   19.877084]  mempool_kmalloc_double_free+0xc0/0x118
[   19.877137]  kunit_try_run_case+0x170/0x3f0
[   19.877397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.877471]  kthread+0x328/0x630
[   19.877562]  ret_from_fork+0x10/0x20
[   19.877658] 
[   19.877707] Allocated by task 237:
[   19.877777]  kasan_save_stack+0x3c/0x68
[   19.877866]  kasan_save_track+0x20/0x40
[   19.877903]  kasan_save_alloc_info+0x40/0x58
[   19.877959]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.878023]  remove_element+0x130/0x1f8
[   19.878311]  mempool_alloc_preallocated+0x58/0xc0
[   19.878418]  mempool_double_free_helper+0x94/0x2e8
[   19.878551]  mempool_kmalloc_double_free+0xc0/0x118
[   19.878606]  kunit_try_run_case+0x170/0x3f0
[   19.878644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.878920]  kthread+0x328/0x630
[   19.879001]  ret_from_fork+0x10/0x20
[   19.879105] 
[   19.879163] Freed by task 237:
[   19.879237]  kasan_save_stack+0x3c/0x68
[   19.879325]  kasan_save_track+0x20/0x40
[   19.879395]  kasan_save_free_info+0x4c/0x78
[   19.879432]  __kasan_mempool_poison_object+0xc0/0x150
[   19.879607]  mempool_free+0x28c/0x328
[   19.879788]  mempool_double_free_helper+0x100/0x2e8
[   19.879865]  mempool_kmalloc_double_free+0xc0/0x118
[   19.879968]  kunit_try_run_case+0x170/0x3f0
[   19.880045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.880188]  kthread+0x328/0x630
[   19.880244]  ret_from_fork+0x10/0x20
[   19.880302] 
[   19.880321] The buggy address belongs to the object at fff00000c6e6c100
[   19.880321]  which belongs to the cache kmalloc-128 of size 128
[   19.880394] The buggy address is located 0 bytes inside of
[   19.880394]  128-byte region [fff00000c6e6c100, fff00000c6e6c180)
[   19.880466] 
[   19.880499] The buggy address belongs to the physical page:
[   19.880529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   19.880581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.880627] page_type: f5(slab)
[   19.880805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.880874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.880991] page dumped because: kasan: bad access detected
[   19.881082] 
[   19.881129] Memory state around the buggy address:
[   19.881223]  fff00000c6e6c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.881272]  fff00000c6e6c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.881469] >fff00000c6e6c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.881644]                    ^
[   19.881706]  fff00000c6e6c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.881769]  fff00000c6e6c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.881808] ==================================================================
[   19.887845] ==================================================================
[   19.887908] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.887982] Free of addr fff00000c78e4000 by task kunit_try_catch/239
[   19.888053] 
[   19.888101] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.888183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.888208] Hardware name: linux,dummy-virt (DT)
[   19.888242] Call trace:
[   19.888263]  show_stack+0x20/0x38 (C)
[   19.888312]  dump_stack_lvl+0x8c/0xd0
[   19.888494]  print_report+0x118/0x608
[   19.888541]  kasan_report_invalid_free+0xc0/0xe8
[   19.888590]  __kasan_mempool_poison_object+0x14c/0x150
[   19.888639]  mempool_free+0x28c/0x328
[   19.888806]  mempool_double_free_helper+0x150/0x2e8
[   19.888942]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.889033]  kunit_try_run_case+0x170/0x3f0
[   19.889141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889274]  kthread+0x328/0x630
[   19.889352]  ret_from_fork+0x10/0x20
[   19.889432] 
[   19.889730] The buggy address belongs to the physical page:
[   19.889808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e4
[   19.889878] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.889935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.889988] page_type: f8(unknown)
[   19.890050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.890115] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.890171] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.890228] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.890292] head: 0bfffe0000000002 ffffc1ffc31e3901 00000000ffffffff 00000000ffffffff
[   19.890357] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.890397] page dumped because: kasan: bad access detected
[   19.890428] 
[   19.890454] Memory state around the buggy address:
[   19.890496]  fff00000c78e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890537]  fff00000c78e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890581] >fff00000c78e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890619]                    ^
[   19.890648]  fff00000c78e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890690]  fff00000c78e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.890729] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   18.247462] ==================================================================
[   18.247527] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   18.247587] Read of size 1 at addr fff00000c637d0c8 by task kunit_try_catch/209
[   18.247638] 
[   18.247669] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.247750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.247776] Hardware name: linux,dummy-virt (DT)
[   18.247809] Call trace:
[   18.247830]  show_stack+0x20/0x38 (C)
[   18.247880]  dump_stack_lvl+0x8c/0xd0
[   18.247927]  print_report+0x118/0x608
[   18.247973]  kasan_report+0xdc/0x128
[   18.248016]  __asan_report_load1_noabort+0x20/0x30
[   18.248066]  kmem_cache_oob+0x344/0x430
[   18.248112]  kunit_try_run_case+0x170/0x3f0
[   18.252151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.252214]  kthread+0x328/0x630
[   18.252263]  ret_from_fork+0x10/0x20
[   18.252314] 
[   18.252346] Allocated by task 209:
[   18.252375]  kasan_save_stack+0x3c/0x68
[   18.252415]  kasan_save_track+0x20/0x40
[   18.252451]  kasan_save_alloc_info+0x40/0x58
[   18.252488]  __kasan_slab_alloc+0xa8/0xb0
[   18.252526]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.252564]  kmem_cache_oob+0x12c/0x430
[   18.252600]  kunit_try_run_case+0x170/0x3f0
[   18.252639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.252684]  kthread+0x328/0x630
[   18.252722]  ret_from_fork+0x10/0x20
[   18.252759] 
[   18.252779] The buggy address belongs to the object at fff00000c637d000
[   18.252779]  which belongs to the cache test_cache of size 200
[   18.252837] The buggy address is located 0 bytes to the right of
[   18.252837]  allocated 200-byte region [fff00000c637d000, fff00000c637d0c8)
[   18.252900] 
[   18.252921] The buggy address belongs to the physical page:
[   18.252952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10637d
[   18.253008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.253058] page_type: f5(slab)
[   18.253097] raw: 0bfffe0000000000 fff00000c5b8bb40 dead000000000122 0000000000000000
[   18.253147] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.253188] page dumped because: kasan: bad access detected
[   18.253219] 
[   18.253236] Memory state around the buggy address:
[   18.253268]  fff00000c637cf80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   18.253313]  fff00000c637d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.253396] >fff00000c637d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.253436]                                               ^
[   18.253470]  fff00000c637d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.253513]  fff00000c637d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.253609] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   18.211099] ==================================================================
[   18.211183] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   18.211251] Read of size 8 at addr fff00000c6385540 by task kunit_try_catch/202
[   18.211312] 
[   18.211633] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.211741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.211787] Hardware name: linux,dummy-virt (DT)
[   18.211841] Call trace:
[   18.211866]  show_stack+0x20/0x38 (C)
[   18.211926]  dump_stack_lvl+0x8c/0xd0
[   18.212009]  print_report+0x118/0x608
[   18.212056]  kasan_report+0xdc/0x128
[   18.212102]  __asan_report_load8_noabort+0x20/0x30
[   18.212181]  workqueue_uaf+0x480/0x4a8
[   18.212438]  kunit_try_run_case+0x170/0x3f0
[   18.212535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.212724]  kthread+0x328/0x630
[   18.212800]  ret_from_fork+0x10/0x20
[   18.212886] 
[   18.212906] Allocated by task 202:
[   18.212961]  kasan_save_stack+0x3c/0x68
[   18.213084]  kasan_save_track+0x20/0x40
[   18.213154]  kasan_save_alloc_info+0x40/0x58
[   18.213291]  __kasan_kmalloc+0xd4/0xd8
[   18.213612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.213691]  workqueue_uaf+0x13c/0x4a8
[   18.213857]  kunit_try_run_case+0x170/0x3f0
[   18.213993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.214070]  kthread+0x328/0x630
[   18.214143]  ret_from_fork+0x10/0x20
[   18.214279] 
[   18.214380] Freed by task 51:
[   18.214458]  kasan_save_stack+0x3c/0x68
[   18.214497]  kasan_save_track+0x20/0x40
[   18.214756]  kasan_save_free_info+0x4c/0x78
[   18.214841]  __kasan_slab_free+0x6c/0x98
[   18.214905]  kfree+0x214/0x3c8
[   18.215016]  workqueue_uaf_work+0x18/0x30
[   18.215103]  process_one_work+0x530/0xf98
[   18.215219]  worker_thread+0x618/0xf38
[   18.215303]  kthread+0x328/0x630
[   18.215402]  ret_from_fork+0x10/0x20
[   18.215480] 
[   18.215537] Last potentially related work creation:
[   18.215566]  kasan_save_stack+0x3c/0x68
[   18.215603]  kasan_record_aux_stack+0xb4/0xc8
[   18.215761]  __queue_work+0x65c/0x1008
[   18.215807]  queue_work_on+0xbc/0xf8
[   18.215841]  workqueue_uaf+0x210/0x4a8
[   18.215985]  kunit_try_run_case+0x170/0x3f0
[   18.216065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.216201]  kthread+0x328/0x630
[   18.216327]  ret_from_fork+0x10/0x20
[   18.216454] 
[   18.216533] The buggy address belongs to the object at fff00000c6385540
[   18.216533]  which belongs to the cache kmalloc-32 of size 32
[   18.216683] The buggy address is located 0 bytes inside of
[   18.216683]  freed 32-byte region [fff00000c6385540, fff00000c6385560)
[   18.216745] 
[   18.216775] The buggy address belongs to the physical page:
[   18.216950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106385
[   18.217017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.217094] page_type: f5(slab)
[   18.217143] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.217260] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.217403] page dumped because: kasan: bad access detected
[   18.217502] 
[   18.217574] Memory state around the buggy address:
[   18.217685]  fff00000c6385400: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   18.217751]  fff00000c6385480: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.217810] >fff00000c6385500: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   18.218073]                                            ^
[   18.218211]  fff00000c6385580: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.218287]  fff00000c6385600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.218362] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   19.867542] ==================================================================
[   19.867640] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.867703] Read of size 1 at addr fff00000c78e0000 by task kunit_try_catch/235
[   19.867775] 
[   19.867829] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.867914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.867941] Hardware name: linux,dummy-virt (DT)
[   19.867974] Call trace:
[   19.867997]  show_stack+0x20/0x38 (C)
[   19.868044]  dump_stack_lvl+0x8c/0xd0
[   19.868130]  print_report+0x118/0x608
[   19.868179]  kasan_report+0xdc/0x128
[   19.868322]  __asan_report_load1_noabort+0x20/0x30
[   19.868411]  mempool_uaf_helper+0x314/0x340
[   19.868484]  mempool_page_alloc_uaf+0xc0/0x118
[   19.868531]  kunit_try_run_case+0x170/0x3f0
[   19.868590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868644]  kthread+0x328/0x630
[   19.868805]  ret_from_fork+0x10/0x20
[   19.868855] 
[   19.868876] The buggy address belongs to the physical page:
[   19.868907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   19.868961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.869153] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.869258] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.869347] page dumped because: kasan: bad access detected
[   19.869400] 
[   19.869448] Memory state around the buggy address:
[   19.869546]  fff00000c78dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.869619]  fff00000c78dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.869664] >fff00000c78e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.869924]                    ^
[   19.869994]  fff00000c78e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.870083]  fff00000c78e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.870233] ==================================================================
[   19.835816] ==================================================================
[   19.835872] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.835926] Read of size 1 at addr fff00000c78e0000 by task kunit_try_catch/231
[   19.835976] 
[   19.836005] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.836086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.836113] Hardware name: linux,dummy-virt (DT)
[   19.836142] Call trace:
[   19.836163]  show_stack+0x20/0x38 (C)
[   19.836210]  dump_stack_lvl+0x8c/0xd0
[   19.836814]  print_report+0x118/0x608
[   19.836927]  kasan_report+0xdc/0x128
[   19.837005]  __asan_report_load1_noabort+0x20/0x30
[   19.837115]  mempool_uaf_helper+0x314/0x340
[   19.837416]  mempool_kmalloc_large_uaf+0xc4/0x120
[   19.837478]  kunit_try_run_case+0x170/0x3f0
[   19.837527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.837842]  kthread+0x328/0x630
[   19.837951]  ret_from_fork+0x10/0x20
[   19.838071] 
[   19.838130] The buggy address belongs to the physical page:
[   19.838190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e0
[   19.838283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.838413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.838515] page_type: f8(unknown)
[   19.838639] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.838722] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.839001] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.839105] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.839244] head: 0bfffe0000000002 ffffc1ffc31e3801 00000000ffffffff 00000000ffffffff
[   19.839364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.839475] page dumped because: kasan: bad access detected
[   19.839553] 
[   19.839590] Memory state around the buggy address:
[   19.839759]  fff00000c78dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.839804]  fff00000c78dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.839978] >fff00000c78e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.840080]                    ^
[   19.840109]  fff00000c78e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.840159]  fff00000c78e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.840399] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   19.847495] ==================================================================
[   19.847556] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.847610] Read of size 1 at addr fff00000c6e6c240 by task kunit_try_catch/233
[   19.847676] 
[   19.847710] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.847790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.847817] Hardware name: linux,dummy-virt (DT)
[   19.847847] Call trace:
[   19.847870]  show_stack+0x20/0x38 (C)
[   19.847918]  dump_stack_lvl+0x8c/0xd0
[   19.847984]  print_report+0x118/0x608
[   19.848030]  kasan_report+0xdc/0x128
[   19.848072]  __asan_report_load1_noabort+0x20/0x30
[   19.848127]  mempool_uaf_helper+0x314/0x340
[   19.848174]  mempool_slab_uaf+0xc0/0x118
[   19.848225]  kunit_try_run_case+0x170/0x3f0
[   19.848274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.848329]  kthread+0x328/0x630
[   19.848388]  ret_from_fork+0x10/0x20
[   19.848450] 
[   19.848469] Allocated by task 233:
[   19.848497]  kasan_save_stack+0x3c/0x68
[   19.848534]  kasan_save_track+0x20/0x40
[   19.848571]  kasan_save_alloc_info+0x40/0x58
[   19.848616]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.848659]  remove_element+0x16c/0x1f8
[   19.848705]  mempool_alloc_preallocated+0x58/0xc0
[   19.848747]  mempool_uaf_helper+0xa4/0x340
[   19.848785]  mempool_slab_uaf+0xc0/0x118
[   19.848820]  kunit_try_run_case+0x170/0x3f0
[   19.848857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.848909]  kthread+0x328/0x630
[   19.848944]  ret_from_fork+0x10/0x20
[   19.848980] 
[   19.849006] Freed by task 233:
[   19.849031]  kasan_save_stack+0x3c/0x68
[   19.849067]  kasan_save_track+0x20/0x40
[   19.849101]  kasan_save_free_info+0x4c/0x78
[   19.849139]  __kasan_mempool_poison_object+0xc0/0x150
[   19.849177]  mempool_free+0x28c/0x328
[   19.849215]  mempool_uaf_helper+0x104/0x340
[   19.849254]  mempool_slab_uaf+0xc0/0x118
[   19.849288]  kunit_try_run_case+0x170/0x3f0
[   19.849347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849391]  kthread+0x328/0x630
[   19.849426]  ret_from_fork+0x10/0x20
[   19.849889] 
[   19.849926] The buggy address belongs to the object at fff00000c6e6c240
[   19.849926]  which belongs to the cache test_cache of size 123
[   19.850048] The buggy address is located 0 bytes inside of
[   19.850048]  freed 123-byte region [fff00000c6e6c240, fff00000c6e6c2bb)
[   19.850153] 
[   19.850181] The buggy address belongs to the physical page:
[   19.850212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e6c
[   19.850281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.850396] page_type: f5(slab)
[   19.850458] raw: 0bfffe0000000000 fff00000ffe8e000 dead000000000122 0000000000000000
[   19.850508] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.850547] page dumped because: kasan: bad access detected
[   19.850578] 
[   19.850595] Memory state around the buggy address:
[   19.850627]  fff00000c6e6c100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.850790]  fff00000c6e6c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.850925] >fff00000c6e6c200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.850994]                                            ^
[   19.851098]  fff00000c6e6c280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.851186]  fff00000c6e6c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851255] ==================================================================
[   19.825412] ==================================================================
[   19.825493] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.825575] Read of size 1 at addr fff00000c6369d00 by task kunit_try_catch/229
[   19.825627] 
[   19.825679] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.825925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.825991] Hardware name: linux,dummy-virt (DT)
[   19.826025] Call trace:
[   19.826048]  show_stack+0x20/0x38 (C)
[   19.826102]  dump_stack_lvl+0x8c/0xd0
[   19.826379]  print_report+0x118/0x608
[   19.826455]  kasan_report+0xdc/0x128
[   19.826520]  __asan_report_load1_noabort+0x20/0x30
[   19.826587]  mempool_uaf_helper+0x314/0x340
[   19.826653]  mempool_kmalloc_uaf+0xc4/0x120
[   19.826701]  kunit_try_run_case+0x170/0x3f0
[   19.826754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.826807]  kthread+0x328/0x630
[   19.826994]  ret_from_fork+0x10/0x20
[   19.827076] 
[   19.827115] Allocated by task 229:
[   19.827178]  kasan_save_stack+0x3c/0x68
[   19.827226]  kasan_save_track+0x20/0x40
[   19.827262]  kasan_save_alloc_info+0x40/0x58
[   19.827318]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.827393]  remove_element+0x130/0x1f8
[   19.827433]  mempool_alloc_preallocated+0x58/0xc0
[   19.827475]  mempool_uaf_helper+0xa4/0x340
[   19.827512]  mempool_kmalloc_uaf+0xc4/0x120
[   19.827639]  kunit_try_run_case+0x170/0x3f0
[   19.827753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.827834]  kthread+0x328/0x630
[   19.827890]  ret_from_fork+0x10/0x20
[   19.827926] 
[   19.827988] Freed by task 229:
[   19.828036]  kasan_save_stack+0x3c/0x68
[   19.828103]  kasan_save_track+0x20/0x40
[   19.828144]  kasan_save_free_info+0x4c/0x78
[   19.828182]  __kasan_mempool_poison_object+0xc0/0x150
[   19.828312]  mempool_free+0x28c/0x328
[   19.828531]  mempool_uaf_helper+0x104/0x340
[   19.828618]  mempool_kmalloc_uaf+0xc4/0x120
[   19.828696]  kunit_try_run_case+0x170/0x3f0
[   19.828771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.828861]  kthread+0x328/0x630
[   19.828938]  ret_from_fork+0x10/0x20
[   19.828975] 
[   19.828998] The buggy address belongs to the object at fff00000c6369d00
[   19.828998]  which belongs to the cache kmalloc-128 of size 128
[   19.829058] The buggy address is located 0 bytes inside of
[   19.829058]  freed 128-byte region [fff00000c6369d00, fff00000c6369d80)
[   19.829307] 
[   19.829466] The buggy address belongs to the physical page:
[   19.829565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106369
[   19.829659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.829718] page_type: f5(slab)
[   19.829757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.829845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.829943] page dumped because: kasan: bad access detected
[   19.830010] 
[   19.830028] Memory state around the buggy address:
[   19.830061]  fff00000c6369c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.830318]  fff00000c6369c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.830450] >fff00000c6369d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.830551]                    ^
[   19.830631]  fff00000c6369d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.830714]  fff00000c6369e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.830753] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   19.751072] ==================================================================
[   19.751156] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.751239] Read of size 1 at addr fff00000c6369973 by task kunit_try_catch/223
[   19.751291] 
[   19.751352] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.751440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.751469] Hardware name: linux,dummy-virt (DT)
[   19.751501] Call trace:
[   19.751528]  show_stack+0x20/0x38 (C)
[   19.751580]  dump_stack_lvl+0x8c/0xd0
[   19.751634]  print_report+0x118/0x608
[   19.751679]  kasan_report+0xdc/0x128
[   19.751722]  __asan_report_load1_noabort+0x20/0x30
[   19.751773]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.751824]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.751875]  kunit_try_run_case+0x170/0x3f0
[   19.751927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.751981]  kthread+0x328/0x630
[   19.752029]  ret_from_fork+0x10/0x20
[   19.752079] 
[   19.752098] Allocated by task 223:
[   19.752128]  kasan_save_stack+0x3c/0x68
[   19.752170]  kasan_save_track+0x20/0x40
[   19.752217]  kasan_save_alloc_info+0x40/0x58
[   19.752270]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.752313]  remove_element+0x130/0x1f8
[   19.752366]  mempool_alloc_preallocated+0x58/0xc0
[   19.752410]  mempool_oob_right_helper+0x98/0x2f0
[   19.752452]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.752495]  kunit_try_run_case+0x170/0x3f0
[   19.752535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752580]  kthread+0x328/0x630
[   19.752617]  ret_from_fork+0x10/0x20
[   19.752653] 
[   19.752673] The buggy address belongs to the object at fff00000c6369900
[   19.752673]  which belongs to the cache kmalloc-128 of size 128
[   19.752733] The buggy address is located 0 bytes to the right of
[   19.752733]  allocated 115-byte region [fff00000c6369900, fff00000c6369973)
[   19.752799] 
[   19.752821] The buggy address belongs to the physical page:
[   19.752852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106369
[   19.752908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.752960] page_type: f5(slab)
[   19.753003] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.753053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.753095] page dumped because: kasan: bad access detected
[   19.753127] 
[   19.753147] Memory state around the buggy address:
[   19.753181]  fff00000c6369800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.753225]  fff00000c6369880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753267] >fff00000c6369900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753306]                                                              ^
[   19.753354]  fff00000c6369980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.753396]  fff00000c6369a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.753434] ==================================================================
[   19.769355] ==================================================================
[   19.769419] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.769478] Read of size 1 at addr fff00000c65ba001 by task kunit_try_catch/225
[   19.769536] 
[   19.769681] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.770009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.770042] Hardware name: linux,dummy-virt (DT)
[   19.770137] Call trace:
[   19.770162]  show_stack+0x20/0x38 (C)
[   19.770216]  dump_stack_lvl+0x8c/0xd0
[   19.770987]  print_report+0x118/0x608
[   19.771218]  kasan_report+0xdc/0x128
[   19.771315]  __asan_report_load1_noabort+0x20/0x30
[   19.771380]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.771432]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.771833]  kunit_try_run_case+0x170/0x3f0
[   19.771953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.772023]  kthread+0x328/0x630
[   19.772074]  ret_from_fork+0x10/0x20
[   19.772169] 
[   19.772191] The buggy address belongs to the physical page:
[   19.772747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8
[   19.772848] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.773004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.773189] page_type: f8(unknown)
[   19.773258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.774055] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.774129] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.774180] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.774231] head: 0bfffe0000000002 ffffc1ffc3196e01 00000000ffffffff 00000000ffffffff
[   19.774280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.774322] page dumped because: kasan: bad access detected
[   19.774367] 
[   19.775050] Memory state around the buggy address:
[   19.775585]  fff00000c65b9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.775648]  fff00000c65b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.775750] >fff00000c65ba000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.776060]                    ^
[   19.776112]  fff00000c65ba080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.776161]  fff00000c65ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.776714] ==================================================================
[   19.787714] ==================================================================
[   19.788127] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.788200] Read of size 1 at addr fff00000c63952bb by task kunit_try_catch/227
[   19.788265] 
[   19.788298] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.788393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.788421] Hardware name: linux,dummy-virt (DT)
[   19.788450] Call trace:
[   19.788474]  show_stack+0x20/0x38 (C)
[   19.788522]  dump_stack_lvl+0x8c/0xd0
[   19.788701]  print_report+0x118/0x608
[   19.788932]  kasan_report+0xdc/0x128
[   19.789033]  __asan_report_load1_noabort+0x20/0x30
[   19.789135]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.789186]  mempool_slab_oob_right+0xc0/0x118
[   19.789233]  kunit_try_run_case+0x170/0x3f0
[   19.789644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.789711]  kthread+0x328/0x630
[   19.789759]  ret_from_fork+0x10/0x20
[   19.790107] 
[   19.790129] Allocated by task 227:
[   19.790159]  kasan_save_stack+0x3c/0x68
[   19.790199]  kasan_save_track+0x20/0x40
[   19.790236]  kasan_save_alloc_info+0x40/0x58
[   19.790887]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.790943]  remove_element+0x16c/0x1f8
[   19.791352]  mempool_alloc_preallocated+0x58/0xc0
[   19.791424]  mempool_oob_right_helper+0x98/0x2f0
[   19.791739]  mempool_slab_oob_right+0xc0/0x118
[   19.791994]  kunit_try_run_case+0x170/0x3f0
[   19.792106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792155]  kthread+0x328/0x630
[   19.792191]  ret_from_fork+0x10/0x20
[   19.792228] 
[   19.792373] The buggy address belongs to the object at fff00000c6395240
[   19.792373]  which belongs to the cache test_cache of size 123
[   19.792453] The buggy address is located 0 bytes to the right of
[   19.792453]  allocated 123-byte region [fff00000c6395240, fff00000c63952bb)
[   19.792522] 
[   19.792542] The buggy address belongs to the physical page:
[   19.792576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106395
[   19.793102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.793158] page_type: f5(slab)
[   19.793225] raw: 0bfffe0000000000 fff00000c1bc0b40 dead000000000122 0000000000000000
[   19.793308] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.793652] page dumped because: kasan: bad access detected
[   19.793693] 
[   19.793712] Memory state around the buggy address:
[   19.793876]  fff00000c6395180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.794205]  fff00000c6395200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.794252] >fff00000c6395280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.794290]                                         ^
[   19.794456]  fff00000c6395300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794544]  fff00000c6395380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.794845] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   19.197115] ==================================================================
[   19.197190] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.197266] Read of size 1 at addr fff00000c6e5a140 by task kunit_try_catch/217
[   19.197927] 
[   19.197977] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   19.198065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.198094] Hardware name: linux,dummy-virt (DT)
[   19.198134] Call trace:
[   19.198249]  show_stack+0x20/0x38 (C)
[   19.198472]  dump_stack_lvl+0x8c/0xd0
[   19.198598]  print_report+0x118/0x608
[   19.198645]  kasan_report+0xdc/0x128
[   19.198689]  __kasan_check_byte+0x54/0x70
[   19.198736]  kmem_cache_destroy+0x34/0x218
[   19.198782]  kmem_cache_double_destroy+0x174/0x300
[   19.198833]  kunit_try_run_case+0x170/0x3f0
[   19.198895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.199147]  kthread+0x328/0x630
[   19.199272]  ret_from_fork+0x10/0x20
[   19.199363] 
[   19.199382] Allocated by task 217:
[   19.199410]  kasan_save_stack+0x3c/0x68
[   19.199451]  kasan_save_track+0x20/0x40
[   19.199488]  kasan_save_alloc_info+0x40/0x58
[   19.199527]  __kasan_slab_alloc+0xa8/0xb0
[   19.199564]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.199671]  __kmem_cache_create_args+0x178/0x280
[   19.199714]  kmem_cache_double_destroy+0xc0/0x300
[   19.199757]  kunit_try_run_case+0x170/0x3f0
[   19.199795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.199840]  kthread+0x328/0x630
[   19.199878]  ret_from_fork+0x10/0x20
[   19.199914] 
[   19.199933] Freed by task 217:
[   19.200044]  kasan_save_stack+0x3c/0x68
[   19.200191]  kasan_save_track+0x20/0x40
[   19.200259]  kasan_save_free_info+0x4c/0x78
[   19.200452]  __kasan_slab_free+0x6c/0x98
[   19.200493]  kmem_cache_free+0x260/0x468
[   19.200530]  slab_kmem_cache_release+0x38/0x50
[   19.200643]  kmem_cache_release+0x1c/0x30
[   19.200684]  kobject_put+0x17c/0x420
[   19.200722]  sysfs_slab_release+0x1c/0x30
[   19.200760]  kmem_cache_destroy+0x118/0x218
[   19.200798]  kmem_cache_double_destroy+0x128/0x300
[   19.200849]  kunit_try_run_case+0x170/0x3f0
[   19.200937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.200982]  kthread+0x328/0x630
[   19.201036]  ret_from_fork+0x10/0x20
[   19.201073] 
[   19.201095] The buggy address belongs to the object at fff00000c6e5a140
[   19.201095]  which belongs to the cache kmem_cache of size 208
[   19.201153] The buggy address is located 0 bytes inside of
[   19.201153]  freed 208-byte region [fff00000c6e5a140, fff00000c6e5a210)
[   19.201289] 
[   19.201314] The buggy address belongs to the physical page:
[   19.201356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e5a
[   19.201409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.201579] page_type: f5(slab)
[   19.201622] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.201671] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.201710] page dumped because: kasan: bad access detected
[   19.201742] 
[   19.201759] Memory state around the buggy address:
[   19.201832]  fff00000c6e5a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.201877]  fff00000c6e5a080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.201940] >fff00000c6e5a100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.202065]                                            ^
[   19.202098]  fff00000c6e5a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.202211]  fff00000c6e5a200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.202349] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   18.984191] ==================================================================
[   18.984289] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   18.986139] Read of size 1 at addr fff00000c6e5c000 by task kunit_try_catch/215
[   18.986391] 
[   18.986689] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.986783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.986812] Hardware name: linux,dummy-virt (DT)
[   18.987551] Call trace:
[   18.987932]  show_stack+0x20/0x38 (C)
[   18.988604]  dump_stack_lvl+0x8c/0xd0
[   18.988672]  print_report+0x118/0x608
[   18.989221]  kasan_report+0xdc/0x128
[   18.989739]  __asan_report_load1_noabort+0x20/0x30
[   18.990393]  kmem_cache_rcu_uaf+0x388/0x468
[   18.990455]  kunit_try_run_case+0x170/0x3f0
[   18.990512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.990565]  kthread+0x328/0x630
[   18.990615]  ret_from_fork+0x10/0x20
[   18.991937] 
[   18.992511] Allocated by task 215:
[   18.992558]  kasan_save_stack+0x3c/0x68
[   18.992972]  kasan_save_track+0x20/0x40
[   18.993314]  kasan_save_alloc_info+0x40/0x58
[   18.994055]  __kasan_slab_alloc+0xa8/0xb0
[   18.994343]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.994876]  kmem_cache_rcu_uaf+0x12c/0x468
[   18.995545]  kunit_try_run_case+0x170/0x3f0
[   18.995601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.995649]  kthread+0x328/0x630
[   18.996625]  ret_from_fork+0x10/0x20
[   18.996689] 
[   18.996714] Freed by task 0:
[   18.996743]  kasan_save_stack+0x3c/0x68
[   18.997192]  kasan_save_track+0x20/0x40
[   18.997243]  kasan_save_free_info+0x4c/0x78
[   18.997660]  __kasan_slab_free+0x6c/0x98
[   18.998017]  slab_free_after_rcu_debug+0xd4/0x2f8
[   18.998499]  rcu_core+0x9f4/0x1e20
[   18.998571]  rcu_core_si+0x18/0x30
[   18.998608]  handle_softirqs+0x374/0xb28
[   18.999510]  __do_softirq+0x1c/0x28
[   18.999811] 
[   18.999837] Last potentially related work creation:
[   19.000166]  kasan_save_stack+0x3c/0x68
[   19.000712]  kasan_record_aux_stack+0xb4/0xc8
[   19.000769]  kmem_cache_free+0x120/0x468
[   19.001356]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.001434]  kunit_try_run_case+0x170/0x3f0
[   19.001477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.001523]  kthread+0x328/0x630
[   19.001561]  ret_from_fork+0x10/0x20
[   19.002676] 
[   19.002706] The buggy address belongs to the object at fff00000c6e5c000
[   19.002706]  which belongs to the cache test_cache of size 200
[   19.003080] The buggy address is located 0 bytes inside of
[   19.003080]  freed 200-byte region [fff00000c6e5c000, fff00000c6e5c0c8)
[   19.003670] 
[   19.003955] The buggy address belongs to the physical page:
[   19.004535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e5c
[   19.005101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.005172] page_type: f5(slab)
[   19.005219] raw: 0bfffe0000000000 fff00000c6e5a000 dead000000000122 0000000000000000
[   19.005272] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.005315] page dumped because: kasan: bad access detected
[   19.006502] 
[   19.006981] Memory state around the buggy address:
[   19.007130]  fff00000c6e5bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007298]  fff00000c6e5bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.007370] >fff00000c6e5c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.008211]                    ^
[   19.008244]  fff00000c6e5c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.008289]  fff00000c6e5c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.008331] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   18.554702] ==================================================================
[   18.554831] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   18.554906] Free of addr fff00000c6e5a001 by task kunit_try_catch/213
[   18.554951] 
[   18.555153] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.555388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.555450] Hardware name: linux,dummy-virt (DT)
[   18.555487] Call trace:
[   18.555682]  show_stack+0x20/0x38 (C)
[   18.555837]  dump_stack_lvl+0x8c/0xd0
[   18.556021]  print_report+0x118/0x608
[   18.556081]  kasan_report_invalid_free+0xc0/0xe8
[   18.556129]  check_slab_allocation+0xfc/0x108
[   18.556238]  __kasan_slab_pre_free+0x2c/0x48
[   18.556572]  kmem_cache_free+0xf0/0x468
[   18.556772]  kmem_cache_invalid_free+0x184/0x3c8
[   18.557134]  kunit_try_run_case+0x170/0x3f0
[   18.557817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.558065]  kthread+0x328/0x630
[   18.558474]  ret_from_fork+0x10/0x20
[   18.558597] 
[   18.558619] Allocated by task 213:
[   18.558826]  kasan_save_stack+0x3c/0x68
[   18.559052]  kasan_save_track+0x20/0x40
[   18.559165]  kasan_save_alloc_info+0x40/0x58
[   18.559433]  __kasan_slab_alloc+0xa8/0xb0
[   18.559508]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.559748]  kmem_cache_invalid_free+0x12c/0x3c8
[   18.559820]  kunit_try_run_case+0x170/0x3f0
[   18.559988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.560093]  kthread+0x328/0x630
[   18.560231]  ret_from_fork+0x10/0x20
[   18.560487] 
[   18.560659] The buggy address belongs to the object at fff00000c6e5a000
[   18.560659]  which belongs to the cache test_cache of size 200
[   18.560829] The buggy address is located 1 bytes inside of
[   18.560829]  200-byte region [fff00000c6e5a000, fff00000c6e5a0c8)
[   18.560942] 
[   18.561093] The buggy address belongs to the physical page:
[   18.561301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e5a
[   18.561444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.561565] page_type: f5(slab)
[   18.561727] raw: 0bfffe0000000000 fff00000c5b8bdc0 dead000000000122 0000000000000000
[   18.561823] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.562010] page dumped because: kasan: bad access detected
[   18.562246] 
[   18.562358] Memory state around the buggy address:
[   18.562441]  fff00000c6e59f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562577]  fff00000c6e59f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562653] >fff00000c6e5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.562693]                    ^
[   18.562745]  fff00000c6e5a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.563032]  fff00000c6e5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.563247] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   18.518571] ==================================================================
[   18.518652] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.518791] Free of addr fff00000c6e57000 by task kunit_try_catch/211
[   18.518871] 
[   18.518913] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.519284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.519392] Hardware name: linux,dummy-virt (DT)
[   18.519429] Call trace:
[   18.519454]  show_stack+0x20/0x38 (C)
[   18.519511]  dump_stack_lvl+0x8c/0xd0
[   18.519566]  print_report+0x118/0x608
[   18.519875]  kasan_report_invalid_free+0xc0/0xe8
[   18.519959]  check_slab_allocation+0xd4/0x108
[   18.520017]  __kasan_slab_pre_free+0x2c/0x48
[   18.520068]  kmem_cache_free+0xf0/0x468
[   18.520117]  kmem_cache_double_free+0x190/0x3c8
[   18.520167]  kunit_try_run_case+0x170/0x3f0
[   18.520249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.520305]  kthread+0x328/0x630
[   18.520509]  ret_from_fork+0x10/0x20
[   18.520635] 
[   18.520745] Allocated by task 211:
[   18.520780]  kasan_save_stack+0x3c/0x68
[   18.520821]  kasan_save_track+0x20/0x40
[   18.520859]  kasan_save_alloc_info+0x40/0x58
[   18.520897]  __kasan_slab_alloc+0xa8/0xb0
[   18.521270]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.521378]  kmem_cache_double_free+0x12c/0x3c8
[   18.521453]  kunit_try_run_case+0x170/0x3f0
[   18.521537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.521622]  kthread+0x328/0x630
[   18.521677]  ret_from_fork+0x10/0x20
[   18.522042] 
[   18.522121] Freed by task 211:
[   18.522190]  kasan_save_stack+0x3c/0x68
[   18.522308]  kasan_save_track+0x20/0x40
[   18.522397]  kasan_save_free_info+0x4c/0x78
[   18.522448]  __kasan_slab_free+0x6c/0x98
[   18.522486]  kmem_cache_free+0x260/0x468
[   18.522712]  kmem_cache_double_free+0x140/0x3c8
[   18.522834]  kunit_try_run_case+0x170/0x3f0
[   18.522905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.522952]  kthread+0x328/0x630
[   18.522997]  ret_from_fork+0x10/0x20
[   18.523034] 
[   18.523064] The buggy address belongs to the object at fff00000c6e57000
[   18.523064]  which belongs to the cache test_cache of size 200
[   18.523187] The buggy address is located 0 bytes inside of
[   18.523187]  200-byte region [fff00000c6e57000, fff00000c6e570c8)
[   18.523252] 
[   18.523275] The buggy address belongs to the physical page:
[   18.523308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e57
[   18.523389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.523746] page_type: f5(slab)
[   18.524014] raw: 0bfffe0000000000 fff00000c5b8bc80 dead000000000122 0000000000000000
[   18.524126] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.524225] page dumped because: kasan: bad access detected
[   18.524295] 
[   18.524315] Memory state around the buggy address:
[   18.524365]  fff00000c6e56f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524409]  fff00000c6e56f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.525066] >fff00000c6e57000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.525131]                    ^
[   18.525190]  fff00000c6e57080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.525280]  fff00000c6e57100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.525392] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   18.024136] ==================================================================
[   18.024201] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   18.024264] Free of addr fff00000c5cff700 by task kunit_try_catch/194
[   18.024306] 
[   18.024347] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.024790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.024890] Hardware name: linux,dummy-virt (DT)
[   18.024958] Call trace:
[   18.025009]  show_stack+0x20/0x38 (C)
[   18.025059]  dump_stack_lvl+0x8c/0xd0
[   18.025108]  print_report+0x118/0x608
[   18.025152]  kasan_report_invalid_free+0xc0/0xe8
[   18.025201]  check_slab_allocation+0xd4/0x108
[   18.025377]  __kasan_slab_pre_free+0x2c/0x48
[   18.025452]  kfree+0xe8/0x3c8
[   18.025506]  kfree_sensitive+0x3c/0xb0
[   18.025553]  kmalloc_double_kzfree+0x168/0x308
[   18.025601]  kunit_try_run_case+0x170/0x3f0
[   18.025650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.025703]  kthread+0x328/0x630
[   18.025815]  ret_from_fork+0x10/0x20
[   18.025912] 
[   18.025970] Allocated by task 194:
[   18.025999]  kasan_save_stack+0x3c/0x68
[   18.026066]  kasan_save_track+0x20/0x40
[   18.026145]  kasan_save_alloc_info+0x40/0x58
[   18.026212]  __kasan_kmalloc+0xd4/0xd8
[   18.026247]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.026517]  kmalloc_double_kzfree+0xb8/0x308
[   18.026598]  kunit_try_run_case+0x170/0x3f0
[   18.026639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.026710]  kthread+0x328/0x630
[   18.026787]  ret_from_fork+0x10/0x20
[   18.026875] 
[   18.026925] Freed by task 194:
[   18.026971]  kasan_save_stack+0x3c/0x68
[   18.027008]  kasan_save_track+0x20/0x40
[   18.027045]  kasan_save_free_info+0x4c/0x78
[   18.027081]  __kasan_slab_free+0x6c/0x98
[   18.027118]  kfree+0x214/0x3c8
[   18.027149]  kfree_sensitive+0x80/0xb0
[   18.027265]  kmalloc_double_kzfree+0x11c/0x308
[   18.027358]  kunit_try_run_case+0x170/0x3f0
[   18.027469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.027538]  kthread+0x328/0x630
[   18.027606]  ret_from_fork+0x10/0x20
[   18.027710] 
[   18.027758] The buggy address belongs to the object at fff00000c5cff700
[   18.027758]  which belongs to the cache kmalloc-16 of size 16
[   18.027823] The buggy address is located 0 bytes inside of
[   18.027823]  16-byte region [fff00000c5cff700, fff00000c5cff710)
[   18.028063] 
[   18.028141] The buggy address belongs to the physical page:
[   18.028193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[   18.028284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.028391] page_type: f5(slab)
[   18.028488] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.028772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.028817] page dumped because: kasan: bad access detected
[   18.028850] 
[   18.029952] Memory state around the buggy address:
[   18.030012]  fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.030068]  fff00000c5cff680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.030127] >fff00000c5cff700: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.030165]                    ^
[   18.030191]  fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.030242]  fff00000c5cff800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.030282] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   18.019078] ==================================================================
[   18.019135] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   18.019194] Read of size 1 at addr fff00000c5cff700 by task kunit_try_catch/194
[   18.019252] 
[   18.019284] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.019498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.019639] Hardware name: linux,dummy-virt (DT)
[   18.019677] Call trace:
[   18.019973]  show_stack+0x20/0x38 (C)
[   18.020039]  dump_stack_lvl+0x8c/0xd0
[   18.020117]  print_report+0x118/0x608
[   18.020182]  kasan_report+0xdc/0x128
[   18.020252]  __kasan_check_byte+0x54/0x70
[   18.020360]  kfree_sensitive+0x30/0xb0
[   18.020411]  kmalloc_double_kzfree+0x168/0x308
[   18.020463]  kunit_try_run_case+0x170/0x3f0
[   18.020514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.020568]  kthread+0x328/0x630
[   18.020612]  ret_from_fork+0x10/0x20
[   18.020754] 
[   18.020775] Allocated by task 194:
[   18.020874]  kasan_save_stack+0x3c/0x68
[   18.020950]  kasan_save_track+0x20/0x40
[   18.021025]  kasan_save_alloc_info+0x40/0x58
[   18.021096]  __kasan_kmalloc+0xd4/0xd8
[   18.021153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.021228]  kmalloc_double_kzfree+0xb8/0x308
[   18.021313]  kunit_try_run_case+0x170/0x3f0
[   18.021364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.021545]  kthread+0x328/0x630
[   18.021729]  ret_from_fork+0x10/0x20
[   18.021792] 
[   18.021870] Freed by task 194:
[   18.021919]  kasan_save_stack+0x3c/0x68
[   18.021995]  kasan_save_track+0x20/0x40
[   18.022114]  kasan_save_free_info+0x4c/0x78
[   18.022181]  __kasan_slab_free+0x6c/0x98
[   18.022220]  kfree+0x214/0x3c8
[   18.022390]  kfree_sensitive+0x80/0xb0
[   18.022439]  kmalloc_double_kzfree+0x11c/0x308
[   18.022481]  kunit_try_run_case+0x170/0x3f0
[   18.022537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.022585]  kthread+0x328/0x630
[   18.022622]  ret_from_fork+0x10/0x20
[   18.022657] 
[   18.022678] The buggy address belongs to the object at fff00000c5cff700
[   18.022678]  which belongs to the cache kmalloc-16 of size 16
[   18.022735] The buggy address is located 0 bytes inside of
[   18.022735]  freed 16-byte region [fff00000c5cff700, fff00000c5cff710)
[   18.022797] 
[   18.022832] The buggy address belongs to the physical page:
[   18.022871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[   18.022934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.022983] page_type: f5(slab)
[   18.023024] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.023084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.023123] page dumped because: kasan: bad access detected
[   18.023155] 
[   18.023174] Memory state around the buggy address:
[   18.023214]  fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.023268]  fff00000c5cff680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.023310] >fff00000c5cff700: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.023364]                    ^
[   18.023406]  fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.023456]  fff00000c5cff800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.023494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   17.997987] ==================================================================
[   17.998118] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   17.998203] Read of size 1 at addr fff00000c638a728 by task kunit_try_catch/190
[   17.998255] 
[   17.998353] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.998472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.998546] Hardware name: linux,dummy-virt (DT)
[   17.998594] Call trace:
[   17.998634]  show_stack+0x20/0x38 (C)
[   17.998687]  dump_stack_lvl+0x8c/0xd0
[   17.998743]  print_report+0x118/0x608
[   17.998991]  kasan_report+0xdc/0x128
[   17.999149]  __asan_report_load1_noabort+0x20/0x30
[   17.999214]  kmalloc_uaf2+0x3f4/0x468
[   17.999279]  kunit_try_run_case+0x170/0x3f0
[   17.999348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.999454]  kthread+0x328/0x630
[   17.999521]  ret_from_fork+0x10/0x20
[   17.999587] 
[   17.999672] Allocated by task 190:
[   17.999709]  kasan_save_stack+0x3c/0x68
[   17.999767]  kasan_save_track+0x20/0x40
[   17.999958]  kasan_save_alloc_info+0x40/0x58
[   18.000004]  __kasan_kmalloc+0xd4/0xd8
[   18.000142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.000185]  kmalloc_uaf2+0xc4/0x468
[   18.000230]  kunit_try_run_case+0x170/0x3f0
[   18.000360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.000456]  kthread+0x328/0x630
[   18.000537]  ret_from_fork+0x10/0x20
[   18.000623] 
[   18.000681] Freed by task 190:
[   18.000756]  kasan_save_stack+0x3c/0x68
[   18.000880]  kasan_save_track+0x20/0x40
[   18.000963]  kasan_save_free_info+0x4c/0x78
[   18.001002]  __kasan_slab_free+0x6c/0x98
[   18.001169]  kfree+0x214/0x3c8
[   18.001441]  kmalloc_uaf2+0x134/0x468
[   18.001632]  kunit_try_run_case+0x170/0x3f0
[   18.001719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.001865]  kthread+0x328/0x630
[   18.001942]  ret_from_fork+0x10/0x20
[   18.002022] 
[   18.002110] The buggy address belongs to the object at fff00000c638a700
[   18.002110]  which belongs to the cache kmalloc-64 of size 64
[   18.002212] The buggy address is located 40 bytes inside of
[   18.002212]  freed 64-byte region [fff00000c638a700, fff00000c638a740)
[   18.002277] 
[   18.002298] The buggy address belongs to the physical page:
[   18.002561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   18.002687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.002756] page_type: f5(slab)
[   18.002795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.002914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.002957] page dumped because: kasan: bad access detected
[   18.002988] 
[   18.003021] Memory state around the buggy address:
[   18.003064]  fff00000c638a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.003108]  fff00000c638a680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.003150] >fff00000c638a700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.003189]                                   ^
[   18.003222]  fff00000c638a780: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   18.003275]  fff00000c638a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.003313] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   17.977304] ==================================================================
[   17.977569] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   17.977664] Write of size 33 at addr fff00000c638a580 by task kunit_try_catch/188
[   17.978010] 
[   17.978106] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.978363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.978576] Hardware name: linux,dummy-virt (DT)
[   17.978692] Call trace:
[   17.978953]  show_stack+0x20/0x38 (C)
[   17.979120]  dump_stack_lvl+0x8c/0xd0
[   17.979401]  print_report+0x118/0x608
[   17.979573]  kasan_report+0xdc/0x128
[   17.979630]  kasan_check_range+0x100/0x1a8
[   17.979879]  __asan_memset+0x34/0x78
[   17.980112]  kmalloc_uaf_memset+0x170/0x310
[   17.980169]  kunit_try_run_case+0x170/0x3f0
[   17.980581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.980643]  kthread+0x328/0x630
[   17.980694]  ret_from_fork+0x10/0x20
[   17.980741] 
[   17.980760] Allocated by task 188:
[   17.980821]  kasan_save_stack+0x3c/0x68
[   17.980861]  kasan_save_track+0x20/0x40
[   17.981040]  kasan_save_alloc_info+0x40/0x58
[   17.981348]  __kasan_kmalloc+0xd4/0xd8
[   17.981407]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.981449]  kmalloc_uaf_memset+0xb8/0x310
[   17.981636]  kunit_try_run_case+0x170/0x3f0
[   17.981864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.981946]  kthread+0x328/0x630
[   17.981983]  ret_from_fork+0x10/0x20
[   17.982020] 
[   17.982039] Freed by task 188:
[   17.982068]  kasan_save_stack+0x3c/0x68
[   17.982114]  kasan_save_track+0x20/0x40
[   17.982150]  kasan_save_free_info+0x4c/0x78
[   17.982358]  __kasan_slab_free+0x6c/0x98
[   17.982574]  kfree+0x214/0x3c8
[   17.982638]  kmalloc_uaf_memset+0x11c/0x310
[   17.982940]  kunit_try_run_case+0x170/0x3f0
[   17.983115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.983163]  kthread+0x328/0x630
[   17.983351]  ret_from_fork+0x10/0x20
[   17.983621] 
[   17.983702] The buggy address belongs to the object at fff00000c638a580
[   17.983702]  which belongs to the cache kmalloc-64 of size 64
[   17.983779] The buggy address is located 0 bytes inside of
[   17.983779]  freed 64-byte region [fff00000c638a580, fff00000c638a5c0)
[   17.983841] 
[   17.983861] The buggy address belongs to the physical page:
[   17.983897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   17.984034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.984198] page_type: f5(slab)
[   17.984287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.984346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.984388] page dumped because: kasan: bad access detected
[   17.984732] 
[   17.984756] Memory state around the buggy address:
[   17.984789]  fff00000c638a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.985029]  fff00000c638a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.985085] >fff00000c638a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.985312]                    ^
[   17.985517]  fff00000c638a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.985597]  fff00000c638a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.986456] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   17.947328] ==================================================================
[   17.947457] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.947688] Read of size 64 at addr fff00000c638a104 by task kunit_try_catch/184
[   17.947914] 
[   17.948064] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.948232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.948259] Hardware name: linux,dummy-virt (DT)
[   17.948290] Call trace:
[   17.948673]  show_stack+0x20/0x38 (C)
[   17.948759]  dump_stack_lvl+0x8c/0xd0
[   17.948904]  print_report+0x118/0x608
[   17.949054]  kasan_report+0xdc/0x128
[   17.949151]  kasan_check_range+0x100/0x1a8
[   17.949259]  __asan_memmove+0x3c/0x98
[   17.949403]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.949478]  kunit_try_run_case+0x170/0x3f0
[   17.949550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.949603]  kthread+0x328/0x630
[   17.949650]  ret_from_fork+0x10/0x20
[   17.949827] 
[   17.949853] Allocated by task 184:
[   17.949883]  kasan_save_stack+0x3c/0x68
[   17.949924]  kasan_save_track+0x20/0x40
[   17.949960]  kasan_save_alloc_info+0x40/0x58
[   17.950000]  __kasan_kmalloc+0xd4/0xd8
[   17.950037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.950134]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   17.950210]  kunit_try_run_case+0x170/0x3f0
[   17.950261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.950352]  kthread+0x328/0x630
[   17.950481]  ret_from_fork+0x10/0x20
[   17.950571] 
[   17.950591] The buggy address belongs to the object at fff00000c638a100
[   17.950591]  which belongs to the cache kmalloc-64 of size 64
[   17.950649] The buggy address is located 4 bytes inside of
[   17.950649]  allocated 64-byte region [fff00000c638a100, fff00000c638a140)
[   17.950711] 
[   17.950731] The buggy address belongs to the physical page:
[   17.950817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   17.950990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.951043] page_type: f5(slab)
[   17.951082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.951139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.951225] page dumped because: kasan: bad access detected
[   17.951275] 
[   17.951293] Memory state around the buggy address:
[   17.951325]  fff00000c638a000: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.951400]  fff00000c638a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.951461] >fff00000c638a100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.951557]                                            ^
[   17.951610]  fff00000c638a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.951731]  fff00000c638a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.951770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   17.930752] ==================================================================
[   17.930824] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   17.931012] Read of size 18446744073709551614 at addr fff00000c63d1f04 by task kunit_try_catch/182
[   17.931287] 
[   17.931668] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.931909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.932161] Hardware name: linux,dummy-virt (DT)
[   17.932192] Call trace:
[   17.932215]  show_stack+0x20/0x38 (C)
[   17.932269]  dump_stack_lvl+0x8c/0xd0
[   17.933100]  print_report+0x118/0x608
[   17.933303]  kasan_report+0xdc/0x128
[   17.933405]  kasan_check_range+0x100/0x1a8
[   17.933580]  __asan_memmove+0x3c/0x98
[   17.933661]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.933722]  kunit_try_run_case+0x170/0x3f0
[   17.933770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.933918]  kthread+0x328/0x630
[   17.934169]  ret_from_fork+0x10/0x20
[   17.934472] 
[   17.934987] Allocated by task 182:
[   17.935281]  kasan_save_stack+0x3c/0x68
[   17.935376]  kasan_save_track+0x20/0x40
[   17.935650]  kasan_save_alloc_info+0x40/0x58
[   17.935825]  __kasan_kmalloc+0xd4/0xd8
[   17.935865]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.935905]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   17.935967]  kunit_try_run_case+0x170/0x3f0
[   17.936365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.936414]  kthread+0x328/0x630
[   17.936580]  ret_from_fork+0x10/0x20
[   17.936625] 
[   17.936780] The buggy address belongs to the object at fff00000c63d1f00
[   17.936780]  which belongs to the cache kmalloc-64 of size 64
[   17.936901] The buggy address is located 4 bytes inside of
[   17.936901]  64-byte region [fff00000c63d1f00, fff00000c63d1f40)
[   17.936962] 
[   17.937176] The buggy address belongs to the physical page:
[   17.937218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1
[   17.937274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.937536] page_type: f5(slab)
[   17.937722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.937843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.938183] page dumped because: kasan: bad access detected
[   17.938297] 
[   17.938316] Memory state around the buggy address:
[   17.938359]  fff00000c63d1e00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   17.938405]  fff00000c63d1e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.938654] >fff00000c63d1f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.938707]                    ^
[   17.938736]  fff00000c63d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.938896]  fff00000c63d2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.938942] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   17.919638] ==================================================================
[   17.919910] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   17.919966] Write of size 16 at addr fff00000c63d6569 by task kunit_try_catch/180
[   17.920154] 
[   17.920489] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.920826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.920853] Hardware name: linux,dummy-virt (DT)
[   17.920910] Call trace:
[   17.920933]  show_stack+0x20/0x38 (C)
[   17.920984]  dump_stack_lvl+0x8c/0xd0
[   17.921030]  print_report+0x118/0x608
[   17.921113]  kasan_report+0xdc/0x128
[   17.921182]  kasan_check_range+0x100/0x1a8
[   17.921489]  __asan_memset+0x34/0x78
[   17.921573]  kmalloc_oob_memset_16+0x150/0x2f8
[   17.921645]  kunit_try_run_case+0x170/0x3f0
[   17.921693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.921744]  kthread+0x328/0x630
[   17.922018]  ret_from_fork+0x10/0x20
[   17.922098] 
[   17.922116] Allocated by task 180:
[   17.922182]  kasan_save_stack+0x3c/0x68
[   17.922275]  kasan_save_track+0x20/0x40
[   17.922329]  kasan_save_alloc_info+0x40/0x58
[   17.922385]  __kasan_kmalloc+0xd4/0xd8
[   17.922455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.922493]  kmalloc_oob_memset_16+0xb0/0x2f8
[   17.922810]  kunit_try_run_case+0x170/0x3f0
[   17.923010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.923149]  kthread+0x328/0x630
[   17.923204]  ret_from_fork+0x10/0x20
[   17.923258] 
[   17.923285] The buggy address belongs to the object at fff00000c63d6500
[   17.923285]  which belongs to the cache kmalloc-128 of size 128
[   17.923380] The buggy address is located 105 bytes inside of
[   17.923380]  allocated 120-byte region [fff00000c63d6500, fff00000c63d6578)
[   17.923493] 
[   17.923587] The buggy address belongs to the physical page:
[   17.923670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   17.923726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.923875] page_type: f5(slab)
[   17.923971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.924040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.924078] page dumped because: kasan: bad access detected
[   17.924154] 
[   17.924173] Memory state around the buggy address:
[   17.924203]  fff00000c63d6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.924292]  fff00000c63d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.924341] >fff00000c63d6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.924377]                                                                 ^
[   17.924414]  fff00000c63d6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.924454]  fff00000c63d6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.924490] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   17.906364] ==================================================================
[   17.906517] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   17.906649] Write of size 8 at addr fff00000c63d6471 by task kunit_try_catch/178
[   17.906861] 
[   17.906903] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.907190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.907255] Hardware name: linux,dummy-virt (DT)
[   17.907285] Call trace:
[   17.907308]  show_stack+0x20/0x38 (C)
[   17.907372]  dump_stack_lvl+0x8c/0xd0
[   17.907562]  print_report+0x118/0x608
[   17.907640]  kasan_report+0xdc/0x128
[   17.907692]  kasan_check_range+0x100/0x1a8
[   17.907830]  __asan_memset+0x34/0x78
[   17.907874]  kmalloc_oob_memset_8+0x150/0x2f8
[   17.907924]  kunit_try_run_case+0x170/0x3f0
[   17.907971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908152]  kthread+0x328/0x630
[   17.908285]  ret_from_fork+0x10/0x20
[   17.908485] 
[   17.908510] Allocated by task 178:
[   17.908800]  kasan_save_stack+0x3c/0x68
[   17.908869]  kasan_save_track+0x20/0x40
[   17.908905]  kasan_save_alloc_info+0x40/0x58
[   17.908943]  __kasan_kmalloc+0xd4/0xd8
[   17.909403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.909453]  kmalloc_oob_memset_8+0xb0/0x2f8
[   17.909705]  kunit_try_run_case+0x170/0x3f0
[   17.909893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.910019]  kthread+0x328/0x630
[   17.910061]  ret_from_fork+0x10/0x20
[   17.910130] 
[   17.910188] The buggy address belongs to the object at fff00000c63d6400
[   17.910188]  which belongs to the cache kmalloc-128 of size 128
[   17.910256] The buggy address is located 113 bytes inside of
[   17.910256]  allocated 120-byte region [fff00000c63d6400, fff00000c63d6478)
[   17.910543] 
[   17.910567] The buggy address belongs to the physical page:
[   17.910610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   17.910708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.910883] page_type: f5(slab)
[   17.910962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.911143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.911240] page dumped because: kasan: bad access detected
[   17.911271] 
[   17.911289] Memory state around the buggy address:
[   17.911448]  fff00000c63d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.911561]  fff00000c63d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.911697] >fff00000c63d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.911737]                                                                 ^
[   17.911776]  fff00000c63d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.911939]  fff00000c63d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.912064] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   17.890258] ==================================================================
[   17.890546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   17.890614] Write of size 4 at addr fff00000c63d6375 by task kunit_try_catch/176
[   17.890662] 
[   17.890691] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.890770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.890795] Hardware name: linux,dummy-virt (DT)
[   17.890824] Call trace:
[   17.890853]  show_stack+0x20/0x38 (C)
[   17.890900]  dump_stack_lvl+0x8c/0xd0
[   17.890946]  print_report+0x118/0x608
[   17.890990]  kasan_report+0xdc/0x128
[   17.891033]  kasan_check_range+0x100/0x1a8
[   17.891078]  __asan_memset+0x34/0x78
[   17.891122]  kmalloc_oob_memset_4+0x150/0x300
[   17.891182]  kunit_try_run_case+0x170/0x3f0
[   17.891230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.891555]  kthread+0x328/0x630
[   17.891734]  ret_from_fork+0x10/0x20
[   17.892273] 
[   17.892302] Allocated by task 176:
[   17.892331]  kasan_save_stack+0x3c/0x68
[   17.892387]  kasan_save_track+0x20/0x40
[   17.892562]  kasan_save_alloc_info+0x40/0x58
[   17.892606]  __kasan_kmalloc+0xd4/0xd8
[   17.892641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.892701]  kmalloc_oob_memset_4+0xb0/0x300
[   17.892741]  kunit_try_run_case+0x170/0x3f0
[   17.892813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.892857]  kthread+0x328/0x630
[   17.892892]  ret_from_fork+0x10/0x20
[   17.892927] 
[   17.892946] The buggy address belongs to the object at fff00000c63d6300
[   17.892946]  which belongs to the cache kmalloc-128 of size 128
[   17.893135] The buggy address is located 117 bytes inside of
[   17.893135]  allocated 120-byte region [fff00000c63d6300, fff00000c63d6378)
[   17.893355] 
[   17.893422] The buggy address belongs to the physical page:
[   17.893487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   17.893610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.893752] page_type: f5(slab)
[   17.893849] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.893919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.893958] page dumped because: kasan: bad access detected
[   17.894007] 
[   17.894080] Memory state around the buggy address:
[   17.894110]  fff00000c63d6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.894242]  fff00000c63d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.894284] >fff00000c63d6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.894639]                                                                 ^
[   17.894889]  fff00000c63d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.894969]  fff00000c63d6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.895006] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   17.876137] ==================================================================
[   17.876408] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   17.876463] Write of size 2 at addr fff00000c63d6277 by task kunit_try_catch/174
[   17.876511] 
[   17.876564] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.876646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.876671] Hardware name: linux,dummy-virt (DT)
[   17.876701] Call trace:
[   17.876723]  show_stack+0x20/0x38 (C)
[   17.876901]  dump_stack_lvl+0x8c/0xd0
[   17.877143]  print_report+0x118/0x608
[   17.877194]  kasan_report+0xdc/0x128
[   17.877238]  kasan_check_range+0x100/0x1a8
[   17.877283]  __asan_memset+0x34/0x78
[   17.877328]  kmalloc_oob_memset_2+0x150/0x2f8
[   17.877399]  kunit_try_run_case+0x170/0x3f0
[   17.877446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.877787]  kthread+0x328/0x630
[   17.877839]  ret_from_fork+0x10/0x20
[   17.877887] 
[   17.878171] Allocated by task 174:
[   17.878215]  kasan_save_stack+0x3c/0x68
[   17.878256]  kasan_save_track+0x20/0x40
[   17.878293]  kasan_save_alloc_info+0x40/0x58
[   17.878330]  __kasan_kmalloc+0xd4/0xd8
[   17.878387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.878426]  kmalloc_oob_memset_2+0xb0/0x2f8
[   17.878624]  kunit_try_run_case+0x170/0x3f0
[   17.878826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.879188]  kthread+0x328/0x630
[   17.879297]  ret_from_fork+0x10/0x20
[   17.879346] 
[   17.879376] The buggy address belongs to the object at fff00000c63d6200
[   17.879376]  which belongs to the cache kmalloc-128 of size 128
[   17.879516] The buggy address is located 119 bytes inside of
[   17.879516]  allocated 120-byte region [fff00000c63d6200, fff00000c63d6278)
[   17.879576] 
[   17.879596] The buggy address belongs to the physical page:
[   17.879660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   17.879992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.880085] page_type: f5(slab)
[   17.880129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.880177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.880223] page dumped because: kasan: bad access detected
[   17.880375] 
[   17.880609] Memory state around the buggy address:
[   17.880669]  fff00000c63d6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.880735]  fff00000c63d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.880779] >fff00000c63d6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.880839]                                                                 ^
[   17.880879]  fff00000c63d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.880951]  fff00000c63d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.880989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   17.861775] ==================================================================
[   17.861998] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   17.862052] Write of size 128 at addr fff00000c63d6100 by task kunit_try_catch/172
[   17.862294] 
[   17.862430] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.862624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.862687] Hardware name: linux,dummy-virt (DT)
[   17.862720] Call trace:
[   17.862744]  show_stack+0x20/0x38 (C)
[   17.862824]  dump_stack_lvl+0x8c/0xd0
[   17.862881]  print_report+0x118/0x608
[   17.862925]  kasan_report+0xdc/0x128
[   17.863113]  kasan_check_range+0x100/0x1a8
[   17.863378]  __asan_memset+0x34/0x78
[   17.863473]  kmalloc_oob_in_memset+0x144/0x2d0
[   17.863521]  kunit_try_run_case+0x170/0x3f0
[   17.863576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.863651]  kthread+0x328/0x630
[   17.863844]  ret_from_fork+0x10/0x20
[   17.863976] 
[   17.863995] Allocated by task 172:
[   17.864253]  kasan_save_stack+0x3c/0x68
[   17.864304]  kasan_save_track+0x20/0x40
[   17.864455]  kasan_save_alloc_info+0x40/0x58
[   17.864594]  __kasan_kmalloc+0xd4/0xd8
[   17.864635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.864674]  kmalloc_oob_in_memset+0xb0/0x2d0
[   17.864713]  kunit_try_run_case+0x170/0x3f0
[   17.864751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.864794]  kthread+0x328/0x630
[   17.864830]  ret_from_fork+0x10/0x20
[   17.864866] 
[   17.864886] The buggy address belongs to the object at fff00000c63d6100
[   17.864886]  which belongs to the cache kmalloc-128 of size 128
[   17.864941] The buggy address is located 0 bytes inside of
[   17.864941]  allocated 120-byte region [fff00000c63d6100, fff00000c63d6178)
[   17.865294] 
[   17.865319] The buggy address belongs to the physical page:
[   17.865396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   17.865453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.865580] page_type: f5(slab)
[   17.865642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.865708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.865776] page dumped because: kasan: bad access detected
[   17.865860] 
[   17.865878] Memory state around the buggy address:
[   17.865915]  fff00000c63d6000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.866086]  fff00000c63d6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.866144] >fff00000c63d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.866237]                                                                 ^
[   17.866277]  fff00000c63d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.866323]  fff00000c63d6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.866469] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   17.843969] ==================================================================
[   17.844023] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   17.844074] Read of size 16 at addr fff00000c5cff6e0 by task kunit_try_catch/170
[   17.844122] 
[   17.844161] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.844318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.844357] Hardware name: linux,dummy-virt (DT)
[   17.844387] Call trace:
[   17.844500]  show_stack+0x20/0x38 (C)
[   17.844596]  dump_stack_lvl+0x8c/0xd0
[   17.844914]  print_report+0x118/0x608
[   17.844962]  kasan_report+0xdc/0x128
[   17.845007]  __asan_report_load16_noabort+0x20/0x30
[   17.845059]  kmalloc_uaf_16+0x3bc/0x438
[   17.845106]  kunit_try_run_case+0x170/0x3f0
[   17.845450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.845560]  kthread+0x328/0x630
[   17.845767]  ret_from_fork+0x10/0x20
[   17.845821] 
[   17.845952] Allocated by task 170:
[   17.845981]  kasan_save_stack+0x3c/0x68
[   17.846068]  kasan_save_track+0x20/0x40
[   17.846472]  kasan_save_alloc_info+0x40/0x58
[   17.846522]  __kasan_kmalloc+0xd4/0xd8
[   17.846559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.846608]  kmalloc_uaf_16+0x140/0x438
[   17.846745]  kunit_try_run_case+0x170/0x3f0
[   17.846783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.846825]  kthread+0x328/0x630
[   17.846892]  ret_from_fork+0x10/0x20
[   17.846927] 
[   17.846946] Freed by task 170:
[   17.847028]  kasan_save_stack+0x3c/0x68
[   17.847065]  kasan_save_track+0x20/0x40
[   17.847099]  kasan_save_free_info+0x4c/0x78
[   17.847136]  __kasan_slab_free+0x6c/0x98
[   17.847171]  kfree+0x214/0x3c8
[   17.847202]  kmalloc_uaf_16+0x190/0x438
[   17.847239]  kunit_try_run_case+0x170/0x3f0
[   17.847276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.847318]  kthread+0x328/0x630
[   17.847365]  ret_from_fork+0x10/0x20
[   17.847740] 
[   17.847798] The buggy address belongs to the object at fff00000c5cff6e0
[   17.847798]  which belongs to the cache kmalloc-16 of size 16
[   17.847855] The buggy address is located 0 bytes inside of
[   17.847855]  freed 16-byte region [fff00000c5cff6e0, fff00000c5cff6f0)
[   17.847913] 
[   17.847933] The buggy address belongs to the physical page:
[   17.847968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[   17.848194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.848270] page_type: f5(slab)
[   17.848358] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.848555] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.849155] page dumped because: kasan: bad access detected
[   17.849198] 
[   17.849230] Memory state around the buggy address:
[   17.849263]  fff00000c5cff580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.849327]  fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.849380] >fff00000c5cff680: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   17.849614]                                                        ^
[   17.849692]  fff00000c5cff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.849810]  fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.849858] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   17.831179] ==================================================================
[   17.831241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   17.831292] Write of size 16 at addr fff00000c5cff680 by task kunit_try_catch/168
[   17.831354] 
[   17.831384] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.832031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.832085] Hardware name: linux,dummy-virt (DT)
[   17.832319] Call trace:
[   17.832595]  show_stack+0x20/0x38 (C)
[   17.833016]  dump_stack_lvl+0x8c/0xd0
[   17.833114]  print_report+0x118/0x608
[   17.833160]  kasan_report+0xdc/0x128
[   17.833314]  __asan_report_store16_noabort+0x20/0x30
[   17.833385]  kmalloc_oob_16+0x3a0/0x3f8
[   17.833634]  kunit_try_run_case+0x170/0x3f0
[   17.833707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.833850]  kthread+0x328/0x630
[   17.833927]  ret_from_fork+0x10/0x20
[   17.834005] 
[   17.834025] Allocated by task 168:
[   17.834069]  kasan_save_stack+0x3c/0x68
[   17.834109]  kasan_save_track+0x20/0x40
[   17.834144]  kasan_save_alloc_info+0x40/0x58
[   17.834181]  __kasan_kmalloc+0xd4/0xd8
[   17.834215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.834635]  kmalloc_oob_16+0xb4/0x3f8
[   17.834693]  kunit_try_run_case+0x170/0x3f0
[   17.835000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.835056]  kthread+0x328/0x630
[   17.835129]  ret_from_fork+0x10/0x20
[   17.835165] 
[   17.835185] The buggy address belongs to the object at fff00000c5cff680
[   17.835185]  which belongs to the cache kmalloc-16 of size 16
[   17.835240] The buggy address is located 0 bytes inside of
[   17.835240]  allocated 13-byte region [fff00000c5cff680, fff00000c5cff68d)
[   17.835310] 
[   17.835418] The buggy address belongs to the physical page:
[   17.835448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[   17.835499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.835547] page_type: f5(slab)
[   17.835671] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.835940] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.836168] page dumped because: kasan: bad access detected
[   17.836309] 
[   17.836329] Memory state around the buggy address:
[   17.836400]  fff00000c5cff580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.836442]  fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.836483] >fff00000c5cff680: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.836665]                       ^
[   17.836702]  fff00000c5cff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.836818]  fff00000c5cff780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.836855] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   17.816702] ==================================================================
[   17.816749] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.816793] Read of size 1 at addr fff00000c4480e00 by task kunit_try_catch/166
[   17.816841] 
[   17.816869] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.816946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.816972] Hardware name: linux,dummy-virt (DT)
[   17.817002] Call trace:
[   17.817024]  show_stack+0x20/0x38 (C)
[   17.817070]  dump_stack_lvl+0x8c/0xd0
[   17.817116]  print_report+0x118/0x608
[   17.817160]  kasan_report+0xdc/0x128
[   17.817205]  __asan_report_load1_noabort+0x20/0x30
[   17.817281]  krealloc_uaf+0x4c8/0x520
[   17.817516]  kunit_try_run_case+0x170/0x3f0
[   17.817726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.817974]  kthread+0x328/0x630
[   17.818143]  ret_from_fork+0x10/0x20
[   17.818241] 
[   17.818331] Allocated by task 166:
[   17.818369]  kasan_save_stack+0x3c/0x68
[   17.818407]  kasan_save_track+0x20/0x40
[   17.818635]  kasan_save_alloc_info+0x40/0x58
[   17.818701]  __kasan_kmalloc+0xd4/0xd8
[   17.818736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.818772]  krealloc_uaf+0xc8/0x520
[   17.818804]  kunit_try_run_case+0x170/0x3f0
[   17.818847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.818889]  kthread+0x328/0x630
[   17.818924]  ret_from_fork+0x10/0x20
[   17.819435] 
[   17.819470] Freed by task 166:
[   17.819693]  kasan_save_stack+0x3c/0x68
[   17.819735]  kasan_save_track+0x20/0x40
[   17.819778]  kasan_save_free_info+0x4c/0x78
[   17.819994]  __kasan_slab_free+0x6c/0x98
[   17.820240]  kfree+0x214/0x3c8
[   17.820410]  krealloc_uaf+0x12c/0x520
[   17.820475]  kunit_try_run_case+0x170/0x3f0
[   17.820620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.820685]  kthread+0x328/0x630
[   17.820737]  ret_from_fork+0x10/0x20
[   17.820771] 
[   17.820790] The buggy address belongs to the object at fff00000c4480e00
[   17.820790]  which belongs to the cache kmalloc-256 of size 256
[   17.820861] The buggy address is located 0 bytes inside of
[   17.820861]  freed 256-byte region [fff00000c4480e00, fff00000c4480f00)
[   17.820986] 
[   17.821050] The buggy address belongs to the physical page:
[   17.821152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.821222] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.821267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.821353] page_type: f5(slab)
[   17.821458] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.821522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.821569] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.821616] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.821663] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.821709] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.821747] page dumped because: kasan: bad access detected
[   17.821776] 
[   17.821794] Memory state around the buggy address:
[   17.821823]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.821919]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.821982] >fff00000c4480e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.822111]                    ^
[   17.822159]  fff00000c4480e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.822227]  fff00000c4480f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.822309] ==================================================================
[   17.809781] ==================================================================
[   17.809842] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.809892] Read of size 1 at addr fff00000c4480e00 by task kunit_try_catch/166
[   17.809939] 
[   17.809969] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.810049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.810251] Hardware name: linux,dummy-virt (DT)
[   17.810475] Call trace:
[   17.810506]  show_stack+0x20/0x38 (C)
[   17.810821]  dump_stack_lvl+0x8c/0xd0
[   17.810881]  print_report+0x118/0x608
[   17.810924]  kasan_report+0xdc/0x128
[   17.810967]  __kasan_check_byte+0x54/0x70
[   17.811010]  krealloc_noprof+0x44/0x360
[   17.811065]  krealloc_uaf+0x180/0x520
[   17.811226]  kunit_try_run_case+0x170/0x3f0
[   17.811274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.811382]  kthread+0x328/0x630
[   17.811595]  ret_from_fork+0x10/0x20
[   17.811903] 
[   17.811923] Allocated by task 166:
[   17.811972]  kasan_save_stack+0x3c/0x68
[   17.812088]  kasan_save_track+0x20/0x40
[   17.812125]  kasan_save_alloc_info+0x40/0x58
[   17.812162]  __kasan_kmalloc+0xd4/0xd8
[   17.812197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.812270]  krealloc_uaf+0xc8/0x520
[   17.812517]  kunit_try_run_case+0x170/0x3f0
[   17.812606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.812650]  kthread+0x328/0x630
[   17.812685]  ret_from_fork+0x10/0x20
[   17.812721] 
[   17.812740] Freed by task 166:
[   17.812766]  kasan_save_stack+0x3c/0x68
[   17.812856]  kasan_save_track+0x20/0x40
[   17.812892]  kasan_save_free_info+0x4c/0x78
[   17.812930]  __kasan_slab_free+0x6c/0x98
[   17.812966]  kfree+0x214/0x3c8
[   17.812997]  krealloc_uaf+0x12c/0x520
[   17.813348]  kunit_try_run_case+0x170/0x3f0
[   17.813438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.813488]  kthread+0x328/0x630
[   17.813524]  ret_from_fork+0x10/0x20
[   17.813560] 
[   17.813579] The buggy address belongs to the object at fff00000c4480e00
[   17.813579]  which belongs to the cache kmalloc-256 of size 256
[   17.813672] The buggy address is located 0 bytes inside of
[   17.813672]  freed 256-byte region [fff00000c4480e00, fff00000c4480f00)
[   17.813733] 
[   17.813752] The buggy address belongs to the physical page:
[   17.813785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.813833] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.813891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.813940] page_type: f5(slab)
[   17.814276] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.814426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.814475] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.814522] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.814569] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.814849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.815221] page dumped because: kasan: bad access detected
[   17.815316] 
[   17.815345] Memory state around the buggy address:
[   17.815376]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.815427]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.815519] >fff00000c4480e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.815556]                    ^
[   17.815593]  fff00000c4480e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.815633]  fff00000c4480f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.815669] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   17.752830] ==================================================================
[   17.753015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.753090] Write of size 1 at addr fff00000c4480ceb by task kunit_try_catch/160
[   17.753157] 
[   17.753205] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.753282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.753357] Hardware name: linux,dummy-virt (DT)
[   17.753433] Call trace:
[   17.753462]  show_stack+0x20/0x38 (C)
[   17.753526]  dump_stack_lvl+0x8c/0xd0
[   17.753573]  print_report+0x118/0x608
[   17.753617]  kasan_report+0xdc/0x128
[   17.753660]  __asan_report_store1_noabort+0x20/0x30
[   17.753709]  krealloc_less_oob_helper+0xa58/0xc50
[   17.753754]  krealloc_less_oob+0x20/0x38
[   17.754394]  kunit_try_run_case+0x170/0x3f0
[   17.754457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.754527]  kthread+0x328/0x630
[   17.754599]  ret_from_fork+0x10/0x20
[   17.754666] 
[   17.754685] Allocated by task 160:
[   17.754711]  kasan_save_stack+0x3c/0x68
[   17.754749]  kasan_save_track+0x20/0x40
[   17.754783]  kasan_save_alloc_info+0x40/0x58
[   17.754855]  __kasan_krealloc+0x118/0x178
[   17.754890]  krealloc_noprof+0x128/0x360
[   17.754924]  krealloc_less_oob_helper+0x168/0xc50
[   17.754962]  krealloc_less_oob+0x20/0x38
[   17.755076]  kunit_try_run_case+0x170/0x3f0
[   17.755121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.755203]  kthread+0x328/0x630
[   17.755240]  ret_from_fork+0x10/0x20
[   17.755274] 
[   17.755293] The buggy address belongs to the object at fff00000c4480c00
[   17.755293]  which belongs to the cache kmalloc-256 of size 256
[   17.755427] The buggy address is located 34 bytes to the right of
[   17.755427]  allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9)
[   17.755570] 
[   17.755630] The buggy address belongs to the physical page:
[   17.755678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.755747] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.755792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.755858] page_type: f5(slab)
[   17.755974] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.756024] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.756071] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.756194] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.756355] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.756433] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.756530] page dumped because: kasan: bad access detected
[   17.756605] 
[   17.756676] Memory state around the buggy address:
[   17.756718]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.756759]  fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756815] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.756851]                                                           ^
[   17.756889]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.756928]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.756965] ==================================================================
[   17.789767] ==================================================================
[   17.789935] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.790184] Write of size 1 at addr fff00000c784a0da by task kunit_try_catch/164
[   17.790531] 
[   17.790622] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.790701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.790727] Hardware name: linux,dummy-virt (DT)
[   17.790766] Call trace:
[   17.790875]  show_stack+0x20/0x38 (C)
[   17.790930]  dump_stack_lvl+0x8c/0xd0
[   17.791000]  print_report+0x118/0x608
[   17.791130]  kasan_report+0xdc/0x128
[   17.791173]  __asan_report_store1_noabort+0x20/0x30
[   17.791221]  krealloc_less_oob_helper+0xa80/0xc50
[   17.791267]  krealloc_large_less_oob+0x20/0x38
[   17.791311]  kunit_try_run_case+0x170/0x3f0
[   17.791368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.791420]  kthread+0x328/0x630
[   17.791464]  ret_from_fork+0x10/0x20
[   17.791510] 
[   17.791659] The buggy address belongs to the physical page:
[   17.791697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.792085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.792305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.792366] page_type: f8(unknown)
[   17.792404] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.792452] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.792499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.792973] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.793045] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.793135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.793174] page dumped because: kasan: bad access detected
[   17.793204] 
[   17.793222] Memory state around the buggy address:
[   17.793531]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.793623]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.793786] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.793847]                                                     ^
[   17.793896]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.794017]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.794053] ==================================================================
[   17.736086] ==================================================================
[   17.736146] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.736406] Write of size 1 at addr fff00000c4480cd0 by task kunit_try_catch/160
[   17.736541] 
[   17.736833] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.736981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.737086] Hardware name: linux,dummy-virt (DT)
[   17.737148] Call trace:
[   17.737307]  show_stack+0x20/0x38 (C)
[   17.737538]  dump_stack_lvl+0x8c/0xd0
[   17.737701]  print_report+0x118/0x608
[   17.737799]  kasan_report+0xdc/0x128
[   17.737950]  __asan_report_store1_noabort+0x20/0x30
[   17.738071]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.738204]  krealloc_less_oob+0x20/0x38
[   17.738279]  kunit_try_run_case+0x170/0x3f0
[   17.738371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.738682]  kthread+0x328/0x630
[   17.738760]  ret_from_fork+0x10/0x20
[   17.738931] 
[   17.739028] Allocated by task 160:
[   17.739131]  kasan_save_stack+0x3c/0x68
[   17.739221]  kasan_save_track+0x20/0x40
[   17.739275]  kasan_save_alloc_info+0x40/0x58
[   17.739621]  __kasan_krealloc+0x118/0x178
[   17.739691]  krealloc_noprof+0x128/0x360
[   17.739744]  krealloc_less_oob_helper+0x168/0xc50
[   17.739858]  krealloc_less_oob+0x20/0x38
[   17.739913]  kunit_try_run_case+0x170/0x3f0
[   17.739957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.740008]  kthread+0x328/0x630
[   17.740045]  ret_from_fork+0x10/0x20
[   17.740126] 
[   17.740146] The buggy address belongs to the object at fff00000c4480c00
[   17.740146]  which belongs to the cache kmalloc-256 of size 256
[   17.740201] The buggy address is located 7 bytes to the right of
[   17.740201]  allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9)
[   17.740418] 
[   17.740439] The buggy address belongs to the physical page:
[   17.740469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.740551] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.740607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.740658] page_type: f5(slab)
[   17.740715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.740762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.740811] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.740857] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.740905] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.740968] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.741006] page dumped because: kasan: bad access detected
[   17.741041] 
[   17.741059] Memory state around the buggy address:
[   17.741088]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.741130]  fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.741170] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.741215]                                                  ^
[   17.741258]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.741307]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.741369] ==================================================================
[   17.777889] ==================================================================
[   17.778109] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.778328] Write of size 1 at addr fff00000c784a0c9 by task kunit_try_catch/164
[   17.778457] 
[   17.778486] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.778568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.778699] Hardware name: linux,dummy-virt (DT)
[   17.778736] Call trace:
[   17.778847]  show_stack+0x20/0x38 (C)
[   17.778900]  dump_stack_lvl+0x8c/0xd0
[   17.778948]  print_report+0x118/0x608
[   17.778992]  kasan_report+0xdc/0x128
[   17.779041]  __asan_report_store1_noabort+0x20/0x30
[   17.779261]  krealloc_less_oob_helper+0xa48/0xc50
[   17.779372]  krealloc_large_less_oob+0x20/0x38
[   17.779417]  kunit_try_run_case+0x170/0x3f0
[   17.779798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.780408]  kthread+0x328/0x630
[   17.780465]  ret_from_fork+0x10/0x20
[   17.780570] 
[   17.780597] The buggy address belongs to the physical page:
[   17.780672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.780722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.780767] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.780815] page_type: f8(unknown)
[   17.780877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.780926] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.781268] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.781370] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.781451] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.781497] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.781683] page dumped because: kasan: bad access detected
[   17.781921] 
[   17.781941] Memory state around the buggy address:
[   17.781973]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.782015]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.782057] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.782104]                                               ^
[   17.782139]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.782479]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.782738] ==================================================================
[   17.749254] ==================================================================
[   17.749362] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.749427] Write of size 1 at addr fff00000c4480cea by task kunit_try_catch/160
[   17.749476] 
[   17.749504] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.749599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.749625] Hardware name: linux,dummy-virt (DT)
[   17.749673] Call trace:
[   17.749699]  show_stack+0x20/0x38 (C)
[   17.749745]  dump_stack_lvl+0x8c/0xd0
[   17.749791]  print_report+0x118/0x608
[   17.749855]  kasan_report+0xdc/0x128
[   17.749899]  __asan_report_store1_noabort+0x20/0x30
[   17.749949]  krealloc_less_oob_helper+0xae4/0xc50
[   17.749996]  krealloc_less_oob+0x20/0x38
[   17.750039]  kunit_try_run_case+0x170/0x3f0
[   17.750087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.750267]  kthread+0x328/0x630
[   17.750322]  ret_from_fork+0x10/0x20
[   17.750400] 
[   17.750419] Allocated by task 160:
[   17.750445]  kasan_save_stack+0x3c/0x68
[   17.750502]  kasan_save_track+0x20/0x40
[   17.750548]  kasan_save_alloc_info+0x40/0x58
[   17.750586]  __kasan_krealloc+0x118/0x178
[   17.750621]  krealloc_noprof+0x128/0x360
[   17.750656]  krealloc_less_oob_helper+0x168/0xc50
[   17.750721]  krealloc_less_oob+0x20/0x38
[   17.750755]  kunit_try_run_case+0x170/0x3f0
[   17.750793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.750842]  kthread+0x328/0x630
[   17.750877]  ret_from_fork+0x10/0x20
[   17.750911] 
[   17.750931] The buggy address belongs to the object at fff00000c4480c00
[   17.750931]  which belongs to the cache kmalloc-256 of size 256
[   17.751007] The buggy address is located 33 bytes to the right of
[   17.751007]  allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9)
[   17.751078] 
[   17.751171] The buggy address belongs to the physical page:
[   17.751221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.751277] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.751331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.751414] page_type: f5(slab)
[   17.751450] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.751507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.751572] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.751646] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.751695] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.751765] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.751804] page dumped because: kasan: bad access detected
[   17.751833] 
[   17.751850] Memory state around the buggy address:
[   17.751879]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.752014]  fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.752061] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.752098]                                                           ^
[   17.752155]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.752218]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.752303] ==================================================================
[   17.783805] ==================================================================
[   17.783850] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.784347] Write of size 1 at addr fff00000c784a0d0 by task kunit_try_catch/164
[   17.784424] 
[   17.784454] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.784815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.784923] Hardware name: linux,dummy-virt (DT)
[   17.784960] Call trace:
[   17.785010]  show_stack+0x20/0x38 (C)
[   17.785060]  dump_stack_lvl+0x8c/0xd0
[   17.785254]  print_report+0x118/0x608
[   17.785305]  kasan_report+0xdc/0x128
[   17.785500]  __asan_report_store1_noabort+0x20/0x30
[   17.785644]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.785691]  krealloc_large_less_oob+0x20/0x38
[   17.785736]  kunit_try_run_case+0x170/0x3f0
[   17.785783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.786093]  kthread+0x328/0x630
[   17.786553]  ret_from_fork+0x10/0x20
[   17.786611] 
[   17.786631] The buggy address belongs to the physical page:
[   17.786667] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.786866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.787183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.787237] page_type: f8(unknown)
[   17.787288] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.787360] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.787764] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.787816] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.787864] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.787911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.787949] page dumped because: kasan: bad access detected
[   17.788241] 
[   17.788263] Memory state around the buggy address:
[   17.788294]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.788348]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.788388] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.788424]                                                  ^
[   17.788459]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.788499]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.788977] ==================================================================
[   17.743431] ==================================================================
[   17.744064] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.744127] Write of size 1 at addr fff00000c4480cda by task kunit_try_catch/160
[   17.744487] 
[   17.744526] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.744606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.744657] Hardware name: linux,dummy-virt (DT)
[   17.744688] Call trace:
[   17.744710]  show_stack+0x20/0x38 (C)
[   17.744759]  dump_stack_lvl+0x8c/0xd0
[   17.744969]  print_report+0x118/0x608
[   17.745046]  kasan_report+0xdc/0x128
[   17.745168]  __asan_report_store1_noabort+0x20/0x30
[   17.745231]  krealloc_less_oob_helper+0xa80/0xc50
[   17.745277]  krealloc_less_oob+0x20/0x38
[   17.745320]  kunit_try_run_case+0x170/0x3f0
[   17.745403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.745456]  kthread+0x328/0x630
[   17.745504]  ret_from_fork+0x10/0x20
[   17.745681] 
[   17.745768] Allocated by task 160:
[   17.745845]  kasan_save_stack+0x3c/0x68
[   17.745950]  kasan_save_track+0x20/0x40
[   17.745986]  kasan_save_alloc_info+0x40/0x58
[   17.746051]  __kasan_krealloc+0x118/0x178
[   17.746373]  krealloc_noprof+0x128/0x360
[   17.746452]  krealloc_less_oob_helper+0x168/0xc50
[   17.746567]  krealloc_less_oob+0x20/0x38
[   17.746637]  kunit_try_run_case+0x170/0x3f0
[   17.746686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.746729]  kthread+0x328/0x630
[   17.746764]  ret_from_fork+0x10/0x20
[   17.746798] 
[   17.746818] The buggy address belongs to the object at fff00000c4480c00
[   17.746818]  which belongs to the cache kmalloc-256 of size 256
[   17.747025] The buggy address is located 17 bytes to the right of
[   17.747025]  allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9)
[   17.747146] 
[   17.747184] The buggy address belongs to the physical page:
[   17.747248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.747367] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.747425] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.747474] page_type: f5(slab)
[   17.747510] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.747583] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.747792] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.747915] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.748011] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.748094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.748170] page dumped because: kasan: bad access detected
[   17.748201] 
[   17.748243] Memory state around the buggy address:
[   17.748297]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.748352]  fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.748495] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.748563]                                                     ^
[   17.748680]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.748768]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.748866] ==================================================================
[   17.794283] ==================================================================
[   17.794323] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.794563] Write of size 1 at addr fff00000c784a0ea by task kunit_try_catch/164
[   17.794615] 
[   17.794642] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.794719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.794744] Hardware name: linux,dummy-virt (DT)
[   17.794773] Call trace:
[   17.794842]  show_stack+0x20/0x38 (C)
[   17.795130]  dump_stack_lvl+0x8c/0xd0
[   17.795253]  print_report+0x118/0x608
[   17.795385]  kasan_report+0xdc/0x128
[   17.795429]  __asan_report_store1_noabort+0x20/0x30
[   17.795480]  krealloc_less_oob_helper+0xae4/0xc50
[   17.795813]  krealloc_large_less_oob+0x20/0x38
[   17.795901]  kunit_try_run_case+0x170/0x3f0
[   17.795955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.796007]  kthread+0x328/0x630
[   17.796051]  ret_from_fork+0x10/0x20
[   17.796096] 
[   17.796125] The buggy address belongs to the physical page:
[   17.796259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.796585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.796637] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.796686] page_type: f8(unknown)
[   17.796882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.796933] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.796981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.797092] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.797140] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.797186] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.797225] page dumped because: kasan: bad access detected
[   17.797303] 
[   17.797327] Memory state around the buggy address:
[   17.797369]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.797410]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.797451] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.797486]                                                           ^
[   17.797523]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.797573]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.797609] ==================================================================
[   17.798562] ==================================================================
[   17.798607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.798835] Write of size 1 at addr fff00000c784a0eb by task kunit_try_catch/164
[   17.798969] 
[   17.799115] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.799455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.799484] Hardware name: linux,dummy-virt (DT)
[   17.799514] Call trace:
[   17.799540]  show_stack+0x20/0x38 (C)
[   17.799629]  dump_stack_lvl+0x8c/0xd0
[   17.799676]  print_report+0x118/0x608
[   17.799926]  kasan_report+0xdc/0x128
[   17.799972]  __asan_report_store1_noabort+0x20/0x30
[   17.800023]  krealloc_less_oob_helper+0xa58/0xc50
[   17.800070]  krealloc_large_less_oob+0x20/0x38
[   17.800115]  kunit_try_run_case+0x170/0x3f0
[   17.800163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.800224]  kthread+0x328/0x630
[   17.800271]  ret_from_fork+0x10/0x20
[   17.800383] 
[   17.800410] The buggy address belongs to the physical page:
[   17.800690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.800809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.800856] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.800925] page_type: f8(unknown)
[   17.800969] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.801017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.801306] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.801482] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.801563] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.801696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.801735] page dumped because: kasan: bad access detected
[   17.801765] 
[   17.801783] Memory state around the buggy address:
[   17.801812]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.801854]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.801894] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.802083]                                                           ^
[   17.802192]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.802240]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.802276] ==================================================================
[   17.729819] ==================================================================
[   17.729873] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.729921] Write of size 1 at addr fff00000c4480cc9 by task kunit_try_catch/160
[   17.729969] 
[   17.729997] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.730074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.730100] Hardware name: linux,dummy-virt (DT)
[   17.730129] Call trace:
[   17.730150]  show_stack+0x20/0x38 (C)
[   17.730196]  dump_stack_lvl+0x8c/0xd0
[   17.730244]  print_report+0x118/0x608
[   17.730290]  kasan_report+0xdc/0x128
[   17.730352]  __asan_report_store1_noabort+0x20/0x30
[   17.730402]  krealloc_less_oob_helper+0xa48/0xc50
[   17.730449]  krealloc_less_oob+0x20/0x38
[   17.730493]  kunit_try_run_case+0x170/0x3f0
[   17.730541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.730593]  kthread+0x328/0x630
[   17.730639]  ret_from_fork+0x10/0x20
[   17.730685] 
[   17.730703] Allocated by task 160:
[   17.730729]  kasan_save_stack+0x3c/0x68
[   17.730766]  kasan_save_track+0x20/0x40
[   17.730801]  kasan_save_alloc_info+0x40/0x58
[   17.730843]  __kasan_krealloc+0x118/0x178
[   17.730878]  krealloc_noprof+0x128/0x360
[   17.730913]  krealloc_less_oob_helper+0x168/0xc50
[   17.730950]  krealloc_less_oob+0x20/0x38
[   17.733712]  kunit_try_run_case+0x170/0x3f0
[   17.733767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.733811]  kthread+0x328/0x630
[   17.733855]  ret_from_fork+0x10/0x20
[   17.733890] 
[   17.733909] The buggy address belongs to the object at fff00000c4480c00
[   17.733909]  which belongs to the cache kmalloc-256 of size 256
[   17.733967] The buggy address is located 0 bytes to the right of
[   17.733967]  allocated 201-byte region [fff00000c4480c00, fff00000c4480cc9)
[   17.734028] 
[   17.734047] The buggy address belongs to the physical page:
[   17.734078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.734128] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.734175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.734224] page_type: f5(slab)
[   17.734261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.734309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.734371] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.734418] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.734465] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.734512] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.734552] page dumped because: kasan: bad access detected
[   17.734582] 
[   17.734600] Memory state around the buggy address:
[   17.734629]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.734670]  fff00000c4480c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.734711] >fff00000c4480c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.734747]                                               ^
[   17.734780]  fff00000c4480d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.734820]  fff00000c4480d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.734862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   17.707757] ==================================================================
[   17.708219] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.708390] Write of size 1 at addr fff00000c4480aeb by task kunit_try_catch/158
[   17.708441] 
[   17.708577] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.708718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.708747] Hardware name: linux,dummy-virt (DT)
[   17.708777] Call trace:
[   17.708817]  show_stack+0x20/0x38 (C)
[   17.708953]  dump_stack_lvl+0x8c/0xd0
[   17.709001]  print_report+0x118/0x608
[   17.709045]  kasan_report+0xdc/0x128
[   17.709088]  __asan_report_store1_noabort+0x20/0x30
[   17.709889]  krealloc_more_oob_helper+0x60c/0x678
[   17.710016]  krealloc_more_oob+0x20/0x38
[   17.710119]  kunit_try_run_case+0x170/0x3f0
[   17.710167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.710260]  kthread+0x328/0x630
[   17.710488]  ret_from_fork+0x10/0x20
[   17.710628] 
[   17.710647] Allocated by task 158:
[   17.710718]  kasan_save_stack+0x3c/0x68
[   17.710852]  kasan_save_track+0x20/0x40
[   17.710888]  kasan_save_alloc_info+0x40/0x58
[   17.710925]  __kasan_krealloc+0x118/0x178
[   17.710975]  krealloc_noprof+0x128/0x360
[   17.711013]  krealloc_more_oob_helper+0x168/0x678
[   17.711058]  krealloc_more_oob+0x20/0x38
[   17.711113]  kunit_try_run_case+0x170/0x3f0
[   17.711251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.711345]  kthread+0x328/0x630
[   17.711382]  ret_from_fork+0x10/0x20
[   17.711417] 
[   17.711458] The buggy address belongs to the object at fff00000c4480a00
[   17.711458]  which belongs to the cache kmalloc-256 of size 256
[   17.711516] The buggy address is located 0 bytes to the right of
[   17.711516]  allocated 235-byte region [fff00000c4480a00, fff00000c4480aeb)
[   17.711577] 
[   17.711850] The buggy address belongs to the physical page:
[   17.711968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.712162] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.712417] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.712508] page_type: f5(slab)
[   17.712844] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.712965] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.713013] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.713262] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.713371] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.713655] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.713703] page dumped because: kasan: bad access detected
[   17.713734] 
[   17.713752] Memory state around the buggy address:
[   17.713825]  fff00000c4480980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.713867]  fff00000c4480a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.713907] >fff00000c4480a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.714202]                                                           ^
[   17.714244]  fff00000c4480b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.714285]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.714321] ==================================================================
[   17.766884] ==================================================================
[   17.766930] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.766975] Write of size 1 at addr fff00000c784a0f0 by task kunit_try_catch/162
[   17.767023] 
[   17.767051] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.767128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.767154] Hardware name: linux,dummy-virt (DT)
[   17.767190] Call trace:
[   17.767285]  show_stack+0x20/0x38 (C)
[   17.767637]  dump_stack_lvl+0x8c/0xd0
[   17.767827]  print_report+0x118/0x608
[   17.768002]  kasan_report+0xdc/0x128
[   17.768182]  __asan_report_store1_noabort+0x20/0x30
[   17.768514]  krealloc_more_oob_helper+0x5c0/0x678
[   17.768565]  krealloc_large_more_oob+0x20/0x38
[   17.768611]  kunit_try_run_case+0x170/0x3f0
[   17.768788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.768863]  kthread+0x328/0x630
[   17.768909]  ret_from_fork+0x10/0x20
[   17.768956] 
[   17.769016] The buggy address belongs to the physical page:
[   17.769048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.769198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.769246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.769371] page_type: f8(unknown)
[   17.769797] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.769850] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.769899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.769972] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.770018] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.770165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.770392] page dumped because: kasan: bad access detected
[   17.770424] 
[   17.770442] Memory state around the buggy address:
[   17.770473]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.770515]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.770763] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.770918]                                                              ^
[   17.770961]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.771003]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.771040] ==================================================================
[   17.715567] ==================================================================
[   17.716160] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.716267] Write of size 1 at addr fff00000c4480af0 by task kunit_try_catch/158
[   17.716482] 
[   17.716513] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.716591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.716616] Hardware name: linux,dummy-virt (DT)
[   17.716646] Call trace:
[   17.716667]  show_stack+0x20/0x38 (C)
[   17.716715]  dump_stack_lvl+0x8c/0xd0
[   17.716762]  print_report+0x118/0x608
[   17.716807]  kasan_report+0xdc/0x128
[   17.716863]  __asan_report_store1_noabort+0x20/0x30
[   17.716912]  krealloc_more_oob_helper+0x5c0/0x678
[   17.717213]  krealloc_more_oob+0x20/0x38
[   17.717358]  kunit_try_run_case+0x170/0x3f0
[   17.717408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.717461]  kthread+0x328/0x630
[   17.717505]  ret_from_fork+0x10/0x20
[   17.717552] 
[   17.717580] Allocated by task 158:
[   17.717749]  kasan_save_stack+0x3c/0x68
[   17.717905]  kasan_save_track+0x20/0x40
[   17.717942]  kasan_save_alloc_info+0x40/0x58
[   17.717979]  __kasan_krealloc+0x118/0x178
[   17.718014]  krealloc_noprof+0x128/0x360
[   17.718049]  krealloc_more_oob_helper+0x168/0x678
[   17.718598]  krealloc_more_oob+0x20/0x38
[   17.718652]  kunit_try_run_case+0x170/0x3f0
[   17.718691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.718742]  kthread+0x328/0x630
[   17.718778]  ret_from_fork+0x10/0x20
[   17.718812] 
[   17.719068] The buggy address belongs to the object at fff00000c4480a00
[   17.719068]  which belongs to the cache kmalloc-256 of size 256
[   17.719189] The buggy address is located 5 bytes to the right of
[   17.719189]  allocated 235-byte region [fff00000c4480a00, fff00000c4480aeb)
[   17.719252] 
[   17.719562] The buggy address belongs to the physical page:
[   17.719597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   17.719747] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.719804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.719856] page_type: f5(slab)
[   17.719976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.720095] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.720201] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.720712] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.720979] head: 0bfffe0000000001 ffffc1ffc3112001 00000000ffffffff 00000000ffffffff
[   17.721088] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.721128] page dumped because: kasan: bad access detected
[   17.721158] 
[   17.721176] Memory state around the buggy address:
[   17.721206]  fff00000c4480980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721250]  fff00000c4480a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.721525] >fff00000c4480a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.721635]                                                              ^
[   17.721710]  fff00000c4480b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721762]  fff00000c4480b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721831] ==================================================================
[   17.762068] ==================================================================
[   17.762121] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.762248] Write of size 1 at addr fff00000c784a0eb by task kunit_try_catch/162
[   17.762444] 
[   17.762482] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.762582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.762625] Hardware name: linux,dummy-virt (DT)
[   17.762673] Call trace:
[   17.762701]  show_stack+0x20/0x38 (C)
[   17.762753]  dump_stack_lvl+0x8c/0xd0
[   17.762819]  print_report+0x118/0x608
[   17.762871]  kasan_report+0xdc/0x128
[   17.762914]  __asan_report_store1_noabort+0x20/0x30
[   17.762979]  krealloc_more_oob_helper+0x60c/0x678
[   17.763026]  krealloc_large_more_oob+0x20/0x38
[   17.763187]  kunit_try_run_case+0x170/0x3f0
[   17.763284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.763460]  kthread+0x328/0x630
[   17.763521]  ret_from_fork+0x10/0x20
[   17.763568] 
[   17.763588] The buggy address belongs to the physical page:
[   17.763619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107848
[   17.763670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.763715] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.763764] page_type: f8(unknown)
[   17.763801] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763849] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763897] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763943] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763990] head: 0bfffe0000000002 ffffc1ffc31e1201 00000000ffffffff 00000000ffffffff
[   17.764036] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.764085] page dumped because: kasan: bad access detected
[   17.764116] 
[   17.764133] Memory state around the buggy address:
[   17.764180]  fff00000c7849f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764253]  fff00000c784a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764294] >fff00000c784a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.764330]                                                           ^
[   17.764452]  fff00000c784a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764586]  fff00000c784a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   17.689702] ==================================================================
[   17.689759] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   17.689810] Read of size 1 at addr fff00000c7850000 by task kunit_try_catch/156
[   17.689859] 
[   17.689890] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.690567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.690641] Hardware name: linux,dummy-virt (DT)
[   17.690672] Call trace:
[   17.690773]  show_stack+0x20/0x38 (C)
[   17.691024]  dump_stack_lvl+0x8c/0xd0
[   17.691139]  print_report+0x118/0x608
[   17.691183]  kasan_report+0xdc/0x128
[   17.691227]  __asan_report_load1_noabort+0x20/0x30
[   17.691275]  page_alloc_uaf+0x328/0x350
[   17.691325]  kunit_try_run_case+0x170/0x3f0
[   17.691400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.691893]  kthread+0x328/0x630
[   17.691957]  ret_from_fork+0x10/0x20
[   17.692061] 
[   17.692123] The buggy address belongs to the physical page:
[   17.692175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107850
[   17.692226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.692288] page_type: f0(buddy)
[   17.692481] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000
[   17.692617] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   17.692683] page dumped because: kasan: bad access detected
[   17.692824] 
[   17.692843] Memory state around the buggy address:
[   17.692876]  fff00000c784ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.692917]  fff00000c784ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.693013] >fff00000c7850000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.693105]                    ^
[   17.693142]  fff00000c7850080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.693319]  fff00000c7850100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.693507] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   17.667006] ==================================================================
[   17.667095] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   17.667154] Free of addr fff00000c5d30001 by task kunit_try_catch/152
[   17.667200] 
[   17.667230] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.667310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.667349] Hardware name: linux,dummy-virt (DT)
[   17.667379] Call trace:
[   17.667401]  show_stack+0x20/0x38 (C)
[   17.667461]  dump_stack_lvl+0x8c/0xd0
[   17.667508]  print_report+0x118/0x608
[   17.667576]  kasan_report_invalid_free+0xc0/0xe8
[   17.667958]  __kasan_kfree_large+0x5c/0xa8
[   17.668127]  free_large_kmalloc+0x64/0x190
[   17.668255]  kfree+0x270/0x3c8
[   17.668677]  kmalloc_large_invalid_free+0x108/0x270
[   17.668972]  kunit_try_run_case+0x170/0x3f0
[   17.669219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.669314]  kthread+0x328/0x630
[   17.669658]  ret_from_fork+0x10/0x20
[   17.670151] 
[   17.670177] The buggy address belongs to the physical page:
[   17.670210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d30
[   17.670261] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.670308] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.670371] page_type: f8(unknown)
[   17.670409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.670456] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.670503] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.670549] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.670596] head: 0bfffe0000000002 ffffc1ffc3174c01 00000000ffffffff 00000000ffffffff
[   17.670643] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.670682] page dumped because: kasan: bad access detected
[   17.670723] 
[   17.670742] Memory state around the buggy address:
[   17.670773]  fff00000c5d2ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671086]  fff00000c5d2ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.671458] >fff00000c5d30000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.671497]                    ^
[   17.671525]  fff00000c5d30080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.671565]  fff00000c5d30100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.672038] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   17.650992] ==================================================================
[   17.651370] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   17.651688] Read of size 1 at addr fff00000c5d30000 by task kunit_try_catch/150
[   17.651915] 
[   17.651952] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.652093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.652118] Hardware name: linux,dummy-virt (DT)
[   17.652154] Call trace:
[   17.652214]  show_stack+0x20/0x38 (C)
[   17.652262]  dump_stack_lvl+0x8c/0xd0
[   17.652308]  print_report+0x118/0x608
[   17.652360]  kasan_report+0xdc/0x128
[   17.652403]  __asan_report_load1_noabort+0x20/0x30
[   17.652450]  kmalloc_large_uaf+0x2cc/0x2f8
[   17.653275]  kunit_try_run_case+0x170/0x3f0
[   17.653676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.653749]  kthread+0x328/0x630
[   17.653796]  ret_from_fork+0x10/0x20
[   17.653843] 
[   17.653977] The buggy address belongs to the physical page:
[   17.654014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d30
[   17.654231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.654317] raw: 0bfffe0000000000 fff00000da4a1e00 fff00000da4a1e00 0000000000000000
[   17.654376] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   17.654534] page dumped because: kasan: bad access detected
[   17.654758] 
[   17.654780] Memory state around the buggy address:
[   17.654855]  fff00000c5d2ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.654897]  fff00000c5d2ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.654950] >fff00000c5d30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.654985]                    ^
[   17.655012]  fff00000c5d30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.655103]  fff00000c5d30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.655222] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   17.633555] ==================================================================
[   17.633659] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   17.633853] Write of size 1 at addr fff00000c5d3200a by task kunit_try_catch/148
[   17.634170] 
[   17.634204] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.634285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.634365] Hardware name: linux,dummy-virt (DT)
[   17.634604] Call trace:
[   17.634632]  show_stack+0x20/0x38 (C)
[   17.635014]  dump_stack_lvl+0x8c/0xd0
[   17.635154]  print_report+0x118/0x608
[   17.635202]  kasan_report+0xdc/0x128
[   17.635445]  __asan_report_store1_noabort+0x20/0x30
[   17.635495]  kmalloc_large_oob_right+0x278/0x2b8
[   17.635544]  kunit_try_run_case+0x170/0x3f0
[   17.635591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.635643]  kthread+0x328/0x630
[   17.635739]  ret_from_fork+0x10/0x20
[   17.636078] 
[   17.636142] The buggy address belongs to the physical page:
[   17.636173] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d30
[   17.636602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.636649] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.636710] page_type: f8(unknown)
[   17.636748] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.636796] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.636844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.637241] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.637389] head: 0bfffe0000000002 ffffc1ffc3174c01 00000000ffffffff 00000000ffffffff
[   17.637437] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.637475] page dumped because: kasan: bad access detected
[   17.637507] 
[   17.637525] Memory state around the buggy address:
[   17.637566]  fff00000c5d31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.637608]  fff00000c5d31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.637933] >fff00000c5d32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.637973]                       ^
[   17.638281]  fff00000c5d32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.638331]  fff00000c5d32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.638381] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   17.616542] ==================================================================
[   17.616616] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   17.616707] Write of size 1 at addr fff00000c7821f00 by task kunit_try_catch/146
[   17.616830] 
[   17.616860] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.616939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.617149] Hardware name: linux,dummy-virt (DT)
[   17.617426] Call trace:
[   17.617468]  show_stack+0x20/0x38 (C)
[   17.617573]  dump_stack_lvl+0x8c/0xd0
[   17.617622]  print_report+0x118/0x608
[   17.617665]  kasan_report+0xdc/0x128
[   17.617708]  __asan_report_store1_noabort+0x20/0x30
[   17.617756]  kmalloc_big_oob_right+0x2a4/0x2f0
[   17.617813]  kunit_try_run_case+0x170/0x3f0
[   17.617861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.618367]  kthread+0x328/0x630
[   17.618529]  ret_from_fork+0x10/0x20
[   17.618577] 
[   17.618597] Allocated by task 146:
[   17.618624]  kasan_save_stack+0x3c/0x68
[   17.618919]  kasan_save_track+0x20/0x40
[   17.619040]  kasan_save_alloc_info+0x40/0x58
[   17.619083]  __kasan_kmalloc+0xd4/0xd8
[   17.619119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.619171]  kmalloc_big_oob_right+0xb8/0x2f0
[   17.619233]  kunit_try_run_case+0x170/0x3f0
[   17.619278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.619357]  kthread+0x328/0x630
[   17.619395]  ret_from_fork+0x10/0x20
[   17.619430] 
[   17.619700] The buggy address belongs to the object at fff00000c7820000
[   17.619700]  which belongs to the cache kmalloc-8k of size 8192
[   17.619769] The buggy address is located 0 bytes to the right of
[   17.619769]  allocated 7936-byte region [fff00000c7820000, fff00000c7821f00)
[   17.619949] 
[   17.620030] The buggy address belongs to the physical page:
[   17.620117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820
[   17.620179] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.620441] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.620627] page_type: f5(slab)
[   17.620669] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.620718] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.620787] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.620834] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.620881] head: 0bfffe0000000003 ffffc1ffc31e0801 00000000ffffffff 00000000ffffffff
[   17.621218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.621260] page dumped because: kasan: bad access detected
[   17.621312] 
[   17.621341] Memory state around the buggy address:
[   17.621392]  fff00000c7821e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.621580]  fff00000c7821e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.621622] >fff00000c7821f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.621671]                    ^
[   17.621698]  fff00000c7821f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.621737]  fff00000c7822000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.621773] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   17.602819] ==================================================================
[   17.602879] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   17.602930] Write of size 1 at addr fff00000c63d6078 by task kunit_try_catch/144
[   17.602979] 
[   17.603129] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.603298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.603326] Hardware name: linux,dummy-virt (DT)
[   17.603369] Call trace:
[   17.603399]  show_stack+0x20/0x38 (C)
[   17.603595]  dump_stack_lvl+0x8c/0xd0
[   17.603649]  print_report+0x118/0x608
[   17.603705]  kasan_report+0xdc/0x128
[   17.603749]  __asan_report_store1_noabort+0x20/0x30
[   17.603804]  kmalloc_track_caller_oob_right+0x418/0x488
[   17.603909]  kunit_try_run_case+0x170/0x3f0
[   17.604091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.604204]  kthread+0x328/0x630
[   17.604256]  ret_from_fork+0x10/0x20
[   17.604303] 
[   17.604321] Allocated by task 144:
[   17.604739]  kasan_save_stack+0x3c/0x68
[   17.604847]  kasan_save_track+0x20/0x40
[   17.604892]  kasan_save_alloc_info+0x40/0x58
[   17.605096]  __kasan_kmalloc+0xd4/0xd8
[   17.605163]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.605205]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.605243]  kunit_try_run_case+0x170/0x3f0
[   17.605281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.605324]  kthread+0x328/0x630
[   17.605378]  ret_from_fork+0x10/0x20
[   17.605413] 
[   17.605432] The buggy address belongs to the object at fff00000c63d6000
[   17.605432]  which belongs to the cache kmalloc-128 of size 128
[   17.605883] The buggy address is located 0 bytes to the right of
[   17.605883]  allocated 120-byte region [fff00000c63d6000, fff00000c63d6078)
[   17.606291] 
[   17.606501] The buggy address belongs to the physical page:
[   17.606547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   17.606679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.606727] page_type: f5(slab)
[   17.607056] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.607109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.607148] page dumped because: kasan: bad access detected
[   17.607185] 
[   17.607204] Memory state around the buggy address:
[   17.607235]  fff00000c63d5f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.607397]  fff00000c63d5f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.607647] >fff00000c63d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.607898]                                                                 ^
[   17.608123]  fff00000c63d6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.608457]  fff00000c63d6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.608502] ==================================================================
[   17.587130] ==================================================================
[   17.587183] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.587233] Write of size 1 at addr fff00000c5b9df78 by task kunit_try_catch/144
[   17.587281] 
[   17.587312] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.589199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.589242] Hardware name: linux,dummy-virt (DT)
[   17.589410] Call trace:
[   17.589461]  show_stack+0x20/0x38 (C)
[   17.590461]  dump_stack_lvl+0x8c/0xd0
[   17.590519]  print_report+0x118/0x608
[   17.590564]  kasan_report+0xdc/0x128
[   17.590687]  __asan_report_store1_noabort+0x20/0x30
[   17.590845]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.590896]  kunit_try_run_case+0x170/0x3f0
[   17.591439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.591921]  kthread+0x328/0x630
[   17.592286]  ret_from_fork+0x10/0x20
[   17.592502] 
[   17.592591] Allocated by task 144:
[   17.592620]  kasan_save_stack+0x3c/0x68
[   17.592660]  kasan_save_track+0x20/0x40
[   17.592698]  kasan_save_alloc_info+0x40/0x58
[   17.592736]  __kasan_kmalloc+0xd4/0xd8
[   17.592770]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.592975]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.593046]  kunit_try_run_case+0x170/0x3f0
[   17.593736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.594035]  kthread+0x328/0x630
[   17.594098]  ret_from_fork+0x10/0x20
[   17.594346] 
[   17.594367] The buggy address belongs to the object at fff00000c5b9df00
[   17.594367]  which belongs to the cache kmalloc-128 of size 128
[   17.594669] The buggy address is located 0 bytes to the right of
[   17.594669]  allocated 120-byte region [fff00000c5b9df00, fff00000c5b9df78)
[   17.594932] 
[   17.594955] The buggy address belongs to the physical page:
[   17.595150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.595209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.595260] page_type: f5(slab)
[   17.595509] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.595732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.595948] page dumped because: kasan: bad access detected
[   17.595985] 
[   17.596119] Memory state around the buggy address:
[   17.596317]  fff00000c5b9de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.596391]  fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596627] >fff00000c5b9df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.596664]                                                                 ^
[   17.596703]  fff00000c5b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.596994]  fff00000c5b9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.597242] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   17.567421] ==================================================================
[   17.568049] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   17.568272] Read of size 1 at addr fff00000c5e3f000 by task kunit_try_catch/142
[   17.568373] 
[   17.568472] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.568576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.568673] Hardware name: linux,dummy-virt (DT)
[   17.568740] Call trace:
[   17.568857]  show_stack+0x20/0x38 (C)
[   17.568915]  dump_stack_lvl+0x8c/0xd0
[   17.568981]  print_report+0x118/0x608
[   17.569272]  kasan_report+0xdc/0x128
[   17.569513]  __asan_report_load1_noabort+0x20/0x30
[   17.569605]  kmalloc_node_oob_right+0x2f4/0x330
[   17.569996]  kunit_try_run_case+0x170/0x3f0
[   17.570091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.570353]  kthread+0x328/0x630
[   17.570491]  ret_from_fork+0x10/0x20
[   17.570881] 
[   17.570908] Allocated by task 142:
[   17.570938]  kasan_save_stack+0x3c/0x68
[   17.571015]  kasan_save_track+0x20/0x40
[   17.571060]  kasan_save_alloc_info+0x40/0x58
[   17.571112]  __kasan_kmalloc+0xd4/0xd8
[   17.571147]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   17.571189]  kmalloc_node_oob_right+0xbc/0x330
[   17.571226]  kunit_try_run_case+0x170/0x3f0
[   17.571273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.571316]  kthread+0x328/0x630
[   17.571363]  ret_from_fork+0x10/0x20
[   17.571407] 
[   17.571426] The buggy address belongs to the object at fff00000c5e3e000
[   17.571426]  which belongs to the cache kmalloc-4k of size 4096
[   17.571481] The buggy address is located 0 bytes to the right of
[   17.571481]  allocated 4096-byte region [fff00000c5e3e000, fff00000c5e3f000)
[   17.571542] 
[   17.571570] The buggy address belongs to the physical page:
[   17.571670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38
[   17.571890] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.571939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.572046] page_type: f5(slab)
[   17.572085] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.572143] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.572199] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.572833] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.573277] head: 0bfffe0000000003 ffffc1ffc3178e01 00000000ffffffff 00000000ffffffff
[   17.573375] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.573925] page dumped because: kasan: bad access detected
[   17.573962] 
[   17.573980] Memory state around the buggy address:
[   17.574044]  fff00000c5e3ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.574089]  fff00000c5e3ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.574451] >fff00000c5e3f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.574530]                    ^
[   17.574793]  fff00000c5e3f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.575129]  fff00000c5e3f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.575175] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.548793] ==================================================================
[   17.548884] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.549136] Read of size 1 at addr fff00000c5cff65f by task kunit_try_catch/140
[   17.549635] 
[   17.549973] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.550072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.550098] Hardware name: linux,dummy-virt (DT)
[   17.550172] Call trace:
[   17.550202]  show_stack+0x20/0x38 (C)
[   17.550255]  dump_stack_lvl+0x8c/0xd0
[   17.550550]  print_report+0x118/0x608
[   17.550633]  kasan_report+0xdc/0x128
[   17.550680]  __asan_report_load1_noabort+0x20/0x30
[   17.550797]  kmalloc_oob_left+0x2ec/0x320
[   17.550855]  kunit_try_run_case+0x170/0x3f0
[   17.550965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.551046]  kthread+0x328/0x630
[   17.551179]  ret_from_fork+0x10/0x20
[   17.551266] 
[   17.551318] Allocated by task 26:
[   17.551438]  kasan_save_stack+0x3c/0x68
[   17.551496]  kasan_save_track+0x20/0x40
[   17.551559]  kasan_save_alloc_info+0x40/0x58
[   17.551733]  __kasan_kmalloc+0xd4/0xd8
[   17.551970]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.552027]  kstrdup+0x54/0xc8
[   17.552065]  devtmpfs_work_loop+0x6f8/0xa58
[   17.552106]  devtmpfsd+0x50/0x58
[   17.552141]  kthread+0x328/0x630
[   17.552176]  ret_from_fork+0x10/0x20
[   17.552836] 
[   17.552915] Freed by task 26:
[   17.553067]  kasan_save_stack+0x3c/0x68
[   17.553133]  kasan_save_track+0x20/0x40
[   17.553723]  kasan_save_free_info+0x4c/0x78
[   17.553786]  __kasan_slab_free+0x6c/0x98
[   17.553983]  kfree+0x214/0x3c8
[   17.554050]  devtmpfs_work_loop+0x804/0xa58
[   17.554176]  devtmpfsd+0x50/0x58
[   17.554214]  kthread+0x328/0x630
[   17.554529]  ret_from_fork+0x10/0x20
[   17.554645] 
[   17.554724] The buggy address belongs to the object at fff00000c5cff640
[   17.554724]  which belongs to the cache kmalloc-16 of size 16
[   17.554874] The buggy address is located 15 bytes to the right of
[   17.554874]  allocated 16-byte region [fff00000c5cff640, fff00000c5cff650)
[   17.554974] 
[   17.555001] The buggy address belongs to the physical page:
[   17.555192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cff
[   17.555277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.555440] page_type: f5(slab)
[   17.555619] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.555992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.556153] page dumped because: kasan: bad access detected
[   17.556196] 
[   17.556388] Memory state around the buggy address:
[   17.556496]  fff00000c5cff500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.556703]  fff00000c5cff580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.556757] >fff00000c5cff600: 00 00 fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   17.556862]                                                     ^
[   17.556949]  fff00000c5cff680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.557006]  fff00000c5cff700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.557104] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   17.531419] ==================================================================
[   17.531746] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.531978] Write of size 1 at addr fff00000c5b9de78 by task kunit_try_catch/138
[   17.532028] 
[   17.532057] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.532519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.533134] Hardware name: linux,dummy-virt (DT)
[   17.533170] Call trace:
[   17.533192]  show_stack+0x20/0x38 (C)
[   17.533243]  dump_stack_lvl+0x8c/0xd0
[   17.533290]  print_report+0x118/0x608
[   17.533370]  kasan_report+0xdc/0x128
[   17.533426]  __asan_report_store1_noabort+0x20/0x30
[   17.533475]  kmalloc_oob_right+0x538/0x660
[   17.533522]  kunit_try_run_case+0x170/0x3f0
[   17.533569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.533622]  kthread+0x328/0x630
[   17.533667]  ret_from_fork+0x10/0x20
[   17.533714] 
[   17.533732] Allocated by task 138:
[   17.533759]  kasan_save_stack+0x3c/0x68
[   17.533796]  kasan_save_track+0x20/0x40
[   17.533831]  kasan_save_alloc_info+0x40/0x58
[   17.533868]  __kasan_kmalloc+0xd4/0xd8
[   17.533901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.533938]  kmalloc_oob_right+0xb0/0x660
[   17.533975]  kunit_try_run_case+0x170/0x3f0
[   17.534012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.534054]  kthread+0x328/0x630
[   17.534089]  ret_from_fork+0x10/0x20
[   17.534122] 
[   17.534140] The buggy address belongs to the object at fff00000c5b9de00
[   17.534140]  which belongs to the cache kmalloc-128 of size 128
[   17.534195] The buggy address is located 5 bytes to the right of
[   17.534195]  allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73)
[   17.534257] 
[   17.534278] The buggy address belongs to the physical page:
[   17.534307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.534368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.534413] page_type: f5(slab)
[   17.534450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.534877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.534940] page dumped because: kasan: bad access detected
[   17.535017] 
[   17.535036] Memory state around the buggy address:
[   17.535211]  fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.535620]  fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.535667] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.535713]                                                                 ^
[   17.535790]  fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.535831]  fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.535867] ==================================================================
[   17.523268] ==================================================================
[   17.523637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.524493] Write of size 1 at addr fff00000c5b9de73 by task kunit_try_catch/138
[   17.524601] 
[   17.525360] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.6-rc1 #1 PREEMPT 
[   17.525519] Tainted: [N]=TEST
[   17.525554] Hardware name: linux,dummy-virt (DT)
[   17.525770] Call trace:
[   17.525935]  show_stack+0x20/0x38 (C)
[   17.526066]  dump_stack_lvl+0x8c/0xd0
[   17.526129]  print_report+0x118/0x608
[   17.526175]  kasan_report+0xdc/0x128
[   17.526219]  __asan_report_store1_noabort+0x20/0x30
[   17.526269]  kmalloc_oob_right+0x5a4/0x660
[   17.526317]  kunit_try_run_case+0x170/0x3f0
[   17.526383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.526436]  kthread+0x328/0x630
[   17.526483]  ret_from_fork+0x10/0x20
[   17.526643] 
[   17.526682] Allocated by task 138:
[   17.526818]  kasan_save_stack+0x3c/0x68
[   17.526890]  kasan_save_track+0x20/0x40
[   17.526927]  kasan_save_alloc_info+0x40/0x58
[   17.526965]  __kasan_kmalloc+0xd4/0xd8
[   17.526999]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.527038]  kmalloc_oob_right+0xb0/0x660
[   17.527077]  kunit_try_run_case+0x170/0x3f0
[   17.527116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.527161]  kthread+0x328/0x630
[   17.527199]  ret_from_fork+0x10/0x20
[   17.527253] 
[   17.527311] The buggy address belongs to the object at fff00000c5b9de00
[   17.527311]  which belongs to the cache kmalloc-128 of size 128
[   17.527417] The buggy address is located 0 bytes to the right of
[   17.527417]  allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73)
[   17.527485] 
[   17.527570] The buggy address belongs to the physical page:
[   17.527764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.528030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.528349] page_type: f5(slab)
[   17.528652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.528714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.528821] page dumped because: kasan: bad access detected
[   17.528860] 
[   17.528885] Memory state around the buggy address:
[   17.529097]  fff00000c5b9dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.529163]  fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529217] >fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.529270]                                                              ^
[   17.529361]  fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529402]  fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529465] ==================================================================
[   17.536660] ==================================================================
[   17.536706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.536753] Read of size 1 at addr fff00000c5b9de80 by task kunit_try_catch/138
[   17.536800] 
[   17.536828] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   17.536904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.536929] Hardware name: linux,dummy-virt (DT)
[   17.536962] Call trace:
[   17.536982]  show_stack+0x20/0x38 (C)
[   17.537028]  dump_stack_lvl+0x8c/0xd0
[   17.537074]  print_report+0x118/0x608
[   17.537118]  kasan_report+0xdc/0x128
[   17.537161]  __asan_report_load1_noabort+0x20/0x30
[   17.537209]  kmalloc_oob_right+0x5d0/0x660
[   17.537256]  kunit_try_run_case+0x170/0x3f0
[   17.537303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.537402]  kthread+0x328/0x630
[   17.537448]  ret_from_fork+0x10/0x20
[   17.537494] 
[   17.537512] Allocated by task 138:
[   17.537538]  kasan_save_stack+0x3c/0x68
[   17.537575]  kasan_save_track+0x20/0x40
[   17.537610]  kasan_save_alloc_info+0x40/0x58
[   17.537648]  __kasan_kmalloc+0xd4/0xd8
[   17.537681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.537717]  kmalloc_oob_right+0xb0/0x660
[   17.537754]  kunit_try_run_case+0x170/0x3f0
[   17.537792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.537936]  kthread+0x328/0x630
[   17.537991]  ret_from_fork+0x10/0x20
[   17.538370] 
[   17.538424] The buggy address belongs to the object at fff00000c5b9de00
[   17.538424]  which belongs to the cache kmalloc-128 of size 128
[   17.539289] The buggy address is located 13 bytes to the right of
[   17.539289]  allocated 115-byte region [fff00000c5b9de00, fff00000c5b9de73)
[   17.542027] 
[   17.542508] The buggy address belongs to the physical page:
[   17.542575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b9d
[   17.542628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.542676] page_type: f5(slab)
[   17.542772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.543027] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.543288] page dumped because: kasan: bad access detected
[   17.543322] 
[   17.543351] Memory state around the buggy address:
[   17.543382]  fff00000c5b9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543424]  fff00000c5b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.543465] >fff00000c5b9de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543502]                    ^
[   17.543529]  fff00000c5b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.544553]  fff00000c5b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.544596] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   96.619702] WARNING: CPU: 1 PID: 658 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   96.622220] Modules linked in:
[   96.622452] CPU: 1 UID: 0 PID: 658 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.6-rc1 #1 PREEMPT 
[   96.622872] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   96.623501] Hardware name: linux,dummy-virt (DT)
[   96.623957] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   96.624739] pc : intlog10+0x38/0x48
[   96.625155] lr : intlog10_test+0xe4/0x200
[   96.625589] sp : ffff800082237c10
[   96.625954] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000
[   96.626721] x26: 1ffe0000191e6e01 x25: 0000000000000000 x24: ffff800082237ce0
[   96.627544] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82
[   96.628260] x20: ffffaee414035200 x19: ffff800080087990 x18: 00000000cb37bdb9
[   96.628631] x17: 000000006b64c51a x16: fff00000c096e03c x15: fff00000ff616b08
[   96.628989] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f81d x12: ffff75dc82fb9b71
[   96.629329] x11: 1ffff5dc82fb9b70 x10: ffff75dc82fb9b70 x9 : ffffaee411615aa4
[   96.629741] x8 : ffffaee417dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   96.630170] x5 : ffff700010446f82 x4 : 1ffff00010010f3a x3 : 1ffff5dc82806a40
[   96.630587] x2 : 1ffff5dc82806a40 x1 : 0000000000000003 x0 : 0000000000000000
[   96.631008] Call trace:
[   96.631151]  intlog10+0x38/0x48 (P)
[   96.631423]  kunit_try_run_case+0x170/0x3f0
[   96.631691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   96.632010]  kthread+0x328/0x630
[   96.632214]  ret_from_fork+0x10/0x20
[   96.632511] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   96.572650] WARNING: CPU: 1 PID: 640 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   96.575532] Modules linked in:
[   96.576102] CPU: 1 UID: 0 PID: 640 Comm: kunit_try_catch Tainted: G    B D          N  6.15.6-rc1 #1 PREEMPT 
[   96.577446] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   96.578152] Hardware name: linux,dummy-virt (DT)
[   96.578678] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   96.579689] pc : intlog2+0xd8/0xf8
[   96.580238] lr : intlog2_test+0xe4/0x200
[   96.580704] sp : ffff800082167c10
[   96.581297] x29: ffff800082167c90 x28: 0000000000000000 x27: 0000000000000000
[   96.582195] x26: 1ffe000018f52fc1 x25: 0000000000000000 x24: ffff800082167ce0
[   96.582578] x23: ffff800082167d00 x22: 0000000000000000 x21: 1ffff0001042cf82
[   96.582932] x20: ffffaee414035100 x19: ffff800080087990 x18: 000000001204bc20
[   96.583280] x17: 00000000559a84c6 x16: fff00000c096e03c x15: fff00000ff616b08
[   96.584161] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f81d x12: ffff75dc82fb9b71
[   96.585086] x11: 1ffff5dc82fb9b70 x10: ffff75dc82fb9b70 x9 : ffffaee411615ca4
[   96.585923] x8 : ffffaee417dcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   96.586740] x5 : ffff70001042cf82 x4 : 1ffff00010010f3a x3 : 1ffff5dc82806a20
[   96.587517] x2 : 1ffff5dc82806a20 x1 : 0000000000000003 x0 : 0000000000000000
[   96.588269] Call trace:
[   96.588580]  intlog2+0xd8/0xf8 (P)
[   96.589050]  kunit_try_run_case+0x170/0x3f0
[   96.589575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   96.590165]  kthread+0x328/0x630
[   96.590597]  ret_from_fork+0x10/0x20
[   96.591052] ---[ end trace 0000000000000000 ]---
[   95.686295] Internal error: Oops: 0000000096000005 [#1]  SMP
[   95.693662] Modules linked in:
[   95.694524] CPU: 1 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   95.695607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   95.696114] Hardware name: linux,dummy-virt (DT)
[   95.696891] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.697294] pc : kunit_test_null_dereference+0x70/0x170
[   95.697859] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.698440] sp : ffff800080f97d30
[   95.698629] x29: ffff800080f97d90 x28: 0000000000000000 x27: 0000000000000000
[   95.699050] x26: 1ffe000018c78341 x25: 0000000000000000 x24: 0000000000000004
[   95.699514] x23: fff00000c63c1a0c x22: ffffaee411603080 x21: fff00000c10d2b88
[   95.700263] x20: 1ffff000101f2fa6 x19: ffff800080087990 x18: 00000000c6d6f7f4
[   95.701166] x17: fff0511cc45d5000 x16: ffff800080010000 x15: 00000000cca2f16f
[   95.701923] x14: 000000007f7e8355 x13: 1ffe00001b493be0 x12: fffd800018f3f62c
[   95.702647] x11: 1ffe000018f3f62b x10: fffd800018f3f62b x9 : ffffaee4115fa4e8
[   95.703442] x8 : ffff800080f97c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   95.704175] x5 : ffff7000101f2fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   95.705080] x2 : dfff800000000000 x1 : fff00000c79fa880 x0 : ffff800080087990
[   95.705775] Call trace:
[   95.705940]  kunit_test_null_dereference+0x70/0x170 (P)
[   95.706186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.706453]  kthread+0x328/0x630
[   95.706691]  ret_from_fork+0x10/0x20
[   95.707137] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   95.707654] ---[ end trace 0000000000000000 ]---